]> git.ipfire.org Git - thirdparty/glibc.git/blob - crypt/crypt-entry.c
Update copyright dates with scripts/update-copyrights.
[thirdparty/glibc.git] / crypt / crypt-entry.c
1 /*
2 * UFC-crypt: ultra fast crypt(3) implementation
3 *
4 * Copyright (C) 1991-2016 Free Software Foundation, Inc.
5 *
6 * The GNU C Library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * The GNU C Library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with the GNU C Library; if not, see
18 * <http://www.gnu.org/licenses/>.
19 *
20 * crypt entry points
21 *
22 * @(#)crypt-entry.c 1.2 12/20/96
23 *
24 */
25
26 #ifdef DEBUG
27 #include <stdio.h>
28 #endif
29 #include <string.h>
30 #include <errno.h>
31 #include <fips-private.h>
32
33 #ifndef STATIC
34 #define STATIC static
35 #endif
36
37 #include "crypt-private.h"
38
39 /* Prototypes for local functions. */
40 #ifndef __GNU_LIBRARY__
41 void _ufc_clearmem (char *start, int cnt);
42 #else
43 #define _ufc_clearmem(start, cnt) memset(start, 0, cnt)
44 #endif
45 extern char *__md5_crypt_r (const char *key, const char *salt, char *buffer,
46 int buflen);
47 extern char *__md5_crypt (const char *key, const char *salt);
48 extern char *__sha256_crypt_r (const char *key, const char *salt,
49 char *buffer, int buflen);
50 extern char *__sha256_crypt (const char *key, const char *salt);
51 extern char *__sha512_crypt_r (const char *key, const char *salt,
52 char *buffer, int buflen);
53 extern char *__sha512_crypt (const char *key, const char *salt);
54
55 /* Define our magic string to mark salt for MD5 encryption
56 replacement. This is meant to be the same as for other MD5 based
57 encryption implementations. */
58 static const char md5_salt_prefix[] = "$1$";
59
60 /* Magic string for SHA256 encryption. */
61 static const char sha256_salt_prefix[] = "$5$";
62
63 /* Magic string for SHA512 encryption. */
64 static const char sha512_salt_prefix[] = "$6$";
65
66 /* For use by the old, non-reentrant routines (crypt/encrypt/setkey) */
67 extern struct crypt_data _ufc_foobar;
68
69 /*
70 * UNIX crypt function
71 */
72
73 char *
74 __crypt_r (const char *key, const char *salt,
75 struct crypt_data * __restrict data)
76 {
77 ufc_long res[4];
78 char ktab[9];
79 ufc_long xx = 25; /* to cope with GCC long long compiler bugs */
80
81 #ifdef _LIBC
82 /* Try to find out whether we have to use MD5 encryption replacement. */
83 if (strncmp (md5_salt_prefix, salt, sizeof (md5_salt_prefix) - 1) == 0)
84 {
85 /* FIPS rules out MD5 password encryption. */
86 if (fips_enabled_p ())
87 {
88 __set_errno (EPERM);
89 return NULL;
90 }
91 return __md5_crypt_r (key, salt, (char *) data,
92 sizeof (struct crypt_data));
93 }
94
95 /* Try to find out whether we have to use SHA256 encryption replacement. */
96 if (strncmp (sha256_salt_prefix, salt, sizeof (sha256_salt_prefix) - 1) == 0)
97 return __sha256_crypt_r (key, salt, (char *) data,
98 sizeof (struct crypt_data));
99
100 /* Try to find out whether we have to use SHA512 encryption replacement. */
101 if (strncmp (sha512_salt_prefix, salt, sizeof (sha512_salt_prefix) - 1) == 0)
102 return __sha512_crypt_r (key, salt, (char *) data,
103 sizeof (struct crypt_data));
104 #endif
105
106 /*
107 * Hack DES tables according to salt
108 */
109 if (!_ufc_setup_salt_r (salt, data))
110 {
111 __set_errno (EINVAL);
112 return NULL;
113 }
114
115 /* FIPS rules out DES password encryption. */
116 if (fips_enabled_p ())
117 {
118 __set_errno (EPERM);
119 return NULL;
120 }
121
122 /*
123 * Setup key schedule
124 */
125 _ufc_clearmem (ktab, (int) sizeof (ktab));
126 (void) strncpy (ktab, key, 8);
127 _ufc_mk_keytab_r (ktab, data);
128
129 /*
130 * Go for the 25 DES encryptions
131 */
132 _ufc_clearmem ((char*) res, (int) sizeof (res));
133 _ufc_doit_r (xx, data, &res[0]);
134
135 /*
136 * Do final permutations
137 */
138 _ufc_dofinalperm_r (res, data);
139
140 /*
141 * And convert back to 6 bit ASCII
142 */
143 _ufc_output_conversion_r (res[0], res[1], salt, data);
144 return data->crypt_3_buf;
145 }
146 weak_alias (__crypt_r, crypt_r)
147
148 char *
149 crypt (const char *key, const char *salt)
150 {
151 #ifdef _LIBC
152 /* Try to find out whether we have to use MD5 encryption replacement. */
153 if (strncmp (md5_salt_prefix, salt, sizeof (md5_salt_prefix) - 1) == 0
154 /* Let __crypt_r deal with the error code if FIPS is enabled. */
155 && !fips_enabled_p ())
156 return __md5_crypt (key, salt);
157
158 /* Try to find out whether we have to use SHA256 encryption replacement. */
159 if (strncmp (sha256_salt_prefix, salt, sizeof (sha256_salt_prefix) - 1) == 0)
160 return __sha256_crypt (key, salt);
161
162 /* Try to find out whether we have to use SHA512 encryption replacement. */
163 if (strncmp (sha512_salt_prefix, salt, sizeof (sha512_salt_prefix) - 1) == 0)
164 return __sha512_crypt (key, salt);
165 #endif
166
167 return __crypt_r (key, salt, &_ufc_foobar);
168 }
169
170
171 /*
172 * To make fcrypt users happy.
173 * They don't need to call init_des.
174 */
175 #ifdef _LIBC
176 weak_alias (crypt, fcrypt)
177 #else
178 char *
179 __fcrypt (const char *key, const char *salt)
180 {
181 return crypt (key, salt);
182 }
183 #endif