LCOV - code coverage report
Current view: top level - contrib/pgcrypto - crypt-gensalt.c (source / functions) Hit Total Coverage
Test: PostgreSQL 18devel Lines: 106 125 84.8 %
Date: 2025-04-24 13:15:39 Functions: 8 8 100.0 %
Legend: Lines: hit not hit

          Line data    Source code
       1             : /*
       2             :  * Written by Solar Designer and placed in the public domain.
       3             :  * See crypt_blowfish.c for more information.
       4             :  *
       5             :  * contrib/pgcrypto/crypt-gensalt.c
       6             :  *
       7             :  * This file contains salt generation functions for the traditional and
       8             :  * other common crypt(3) algorithms, except for bcrypt which is defined
       9             :  * entirely in crypt_blowfish.c.
      10             :  *
      11             :  * Put bcrypt generator also here as crypt-blowfish.c
      12             :  * may not be compiled always.        -- marko
      13             :  */
      14             : 
      15             : #include "postgres.h"
      16             : 
      17             : #include "px-crypt.h"
      18             : 
      19             : typedef unsigned int BF_word;
      20             : 
      21             : static unsigned char _crypt_itoa64[64 + 1] =
      22             : "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
      23             : 
      24             : char *
      25           2 : _crypt_gensalt_traditional_rn(unsigned long count,
      26             :                               const char *input, int size, char *output, int output_size)
      27             : {
      28           2 :     if (size < 2 || output_size < 2 + 1 || (count && count != 25))
      29             :     {
      30           0 :         if (output_size > 0)
      31           0 :             output[0] = '\0';
      32           0 :         return NULL;
      33             :     }
      34             : 
      35           2 :     output[0] = _crypt_itoa64[(unsigned int) input[0] & 0x3f];
      36           2 :     output[1] = _crypt_itoa64[(unsigned int) input[1] & 0x3f];
      37           2 :     output[2] = '\0';
      38             : 
      39           2 :     return output;
      40             : }
      41             : 
      42             : char *
      43           2 : _crypt_gensalt_extended_rn(unsigned long count,
      44             :                            const char *input, int size, char *output, int output_size)
      45             : {
      46             :     unsigned long value;
      47             : 
      48             : /* Even iteration counts make it easier to detect weak DES keys from a look
      49             :  * at the hash, so they should be avoided */
      50           2 :     if (size < 3 || output_size < 1 + 4 + 4 + 1 ||
      51           2 :         (count && (count > 0xffffff || !(count & 1))))
      52             :     {
      53           0 :         if (output_size > 0)
      54           0 :             output[0] = '\0';
      55           0 :         return NULL;
      56             :     }
      57             : 
      58           2 :     if (!count)
      59           0 :         count = 725;
      60             : 
      61           2 :     output[0] = '_';
      62           2 :     output[1] = _crypt_itoa64[count & 0x3f];
      63           2 :     output[2] = _crypt_itoa64[(count >> 6) & 0x3f];
      64           2 :     output[3] = _crypt_itoa64[(count >> 12) & 0x3f];
      65           2 :     output[4] = _crypt_itoa64[(count >> 18) & 0x3f];
      66           2 :     value = (unsigned long) (unsigned char) input[0] |
      67           2 :         ((unsigned long) (unsigned char) input[1] << 8) |
      68           2 :         ((unsigned long) (unsigned char) input[2] << 16);
      69           2 :     output[5] = _crypt_itoa64[value & 0x3f];
      70           2 :     output[6] = _crypt_itoa64[(value >> 6) & 0x3f];
      71           2 :     output[7] = _crypt_itoa64[(value >> 12) & 0x3f];
      72           2 :     output[8] = _crypt_itoa64[(value >> 18) & 0x3f];
      73           2 :     output[9] = '\0';
      74             : 
      75           2 :     return output;
      76             : }
      77             : 
      78             : char *
      79           2 : _crypt_gensalt_md5_rn(unsigned long count,
      80             :                       const char *input, int size, char *output, int output_size)
      81             : {
      82             :     unsigned long value;
      83             : 
      84           2 :     if (size < 3 || output_size < 3 + 4 + 1 || (count && count != 1000))
      85             :     {
      86           0 :         if (output_size > 0)
      87           0 :             output[0] = '\0';
      88           0 :         return NULL;
      89             :     }
      90             : 
      91           2 :     output[0] = '$';
      92           2 :     output[1] = '1';
      93           2 :     output[2] = '$';
      94           2 :     value = (unsigned long) (unsigned char) input[0] |
      95           2 :         ((unsigned long) (unsigned char) input[1] << 8) |
      96           2 :         ((unsigned long) (unsigned char) input[2] << 16);
      97           2 :     output[3] = _crypt_itoa64[value & 0x3f];
      98           2 :     output[4] = _crypt_itoa64[(value >> 6) & 0x3f];
      99           2 :     output[5] = _crypt_itoa64[(value >> 12) & 0x3f];
     100           2 :     output[6] = _crypt_itoa64[(value >> 18) & 0x3f];
     101           2 :     output[7] = '\0';
     102             : 
     103           2 :     if (size >= 6 && output_size >= 3 + 4 + 4 + 1)
     104             :     {
     105           2 :         value = (unsigned long) (unsigned char) input[3] |
     106           2 :             ((unsigned long) (unsigned char) input[4] << 8) |
     107           2 :             ((unsigned long) (unsigned char) input[5] << 16);
     108           2 :         output[7] = _crypt_itoa64[value & 0x3f];
     109           2 :         output[8] = _crypt_itoa64[(value >> 6) & 0x3f];
     110           2 :         output[9] = _crypt_itoa64[(value >> 12) & 0x3f];
     111           2 :         output[10] = _crypt_itoa64[(value >> 18) & 0x3f];
     112           2 :         output[11] = '\0';
     113             :     }
     114             : 
     115           2 :     return output;
     116             : }
     117             : 
     118             : 
     119             : 
     120             : static unsigned char BF_itoa64[64 + 1] =
     121             : "./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
     122             : 
     123             : static void
     124           2 : BF_encode(char *dst, const BF_word *src, int size)
     125             : {
     126           2 :     const unsigned char *sptr = (const unsigned char *) src;
     127           2 :     const unsigned char *end = sptr + size;
     128           2 :     unsigned char *dptr = (unsigned char *) dst;
     129             :     unsigned int c1,
     130             :                 c2;
     131             : 
     132             :     do
     133             :     {
     134          12 :         c1 = *sptr++;
     135          12 :         *dptr++ = BF_itoa64[c1 >> 2];
     136          12 :         c1 = (c1 & 0x03) << 4;
     137          12 :         if (sptr >= end)
     138             :         {
     139           2 :             *dptr++ = BF_itoa64[c1];
     140           2 :             break;
     141             :         }
     142             : 
     143          10 :         c2 = *sptr++;
     144          10 :         c1 |= c2 >> 4;
     145          10 :         *dptr++ = BF_itoa64[c1];
     146          10 :         c1 = (c2 & 0x0f) << 2;
     147          10 :         if (sptr >= end)
     148             :         {
     149           0 :             *dptr++ = BF_itoa64[c1];
     150           0 :             break;
     151             :         }
     152             : 
     153          10 :         c2 = *sptr++;
     154          10 :         c1 |= c2 >> 6;
     155          10 :         *dptr++ = BF_itoa64[c1];
     156          10 :         *dptr++ = BF_itoa64[c2 & 0x3f];
     157          10 :     } while (sptr < end);
     158           2 : }
     159             : 
     160             : char *
     161           2 : _crypt_gensalt_blowfish_rn(unsigned long count,
     162             :                            const char *input, int size, char *output, int output_size)
     163             : {
     164           2 :     if (size < 16 || output_size < 7 + 22 + 1 ||
     165           2 :         (count && (count < 4 || count > 31)))
     166             :     {
     167           0 :         if (output_size > 0)
     168           0 :             output[0] = '\0';
     169           0 :         return NULL;
     170             :     }
     171             : 
     172           2 :     if (!count)
     173           0 :         count = 5;
     174             : 
     175           2 :     output[0] = '$';
     176           2 :     output[1] = '2';
     177           2 :     output[2] = 'a';
     178           2 :     output[3] = '$';
     179           2 :     output[4] = '0' + count / 10;
     180           2 :     output[5] = '0' + count % 10;
     181           2 :     output[6] = '$';
     182             : 
     183           2 :     BF_encode(&output[7], (const BF_word *) input, 16);
     184           2 :     output[7 + 22] = '\0';
     185             : 
     186           2 :     return output;
     187             : }
     188             : 
     189             : /*
     190             :  * Helper for _crypt_gensalt_sha256_rn and _crypt_gensalt_sha512_rn
     191             :  */
     192             : static char *
     193           8 : _crypt_gensalt_sha(unsigned long count,
     194             :                    const char *input, int size, char *output, int output_size)
     195             : {
     196           8 :     char       *s_ptr = output;
     197           8 :     unsigned int result_bufsize = PX_SHACRYPT_SALT_BUF_LEN;
     198             :     int         rc;
     199             : 
     200             :     /* output buffer must be allocated with PX_MAX_SALT_LEN bytes */
     201           8 :     if (PX_MAX_SALT_LEN < result_bufsize)
     202           0 :         ereport(ERROR,
     203             :                 errcode(ERRCODE_SYNTAX_ERROR),
     204             :                 errmsg("invalid size of salt"));
     205             : 
     206             :     /*
     207             :      * Care must be taken to not exceed the buffer size allocated for the
     208             :      * input character buffer.
     209             :      */
     210           8 :     if ((PX_SHACRYPT_SALT_MAX_LEN != size) || (output_size < size))
     211           0 :         ereport(ERROR,
     212             :                 errcode(ERRCODE_INTERNAL_ERROR),
     213             :                 errmsg("invalid length of salt buffer"));
     214             : 
     215             :     /* Skip magic bytes, set by callers */
     216           8 :     s_ptr += 3;
     217           8 :     if ((rc = pg_snprintf(s_ptr, 18, "rounds=%lu$", count)) <= 0)
     218           0 :         ereport(ERROR,
     219             :                 errcode(ERRCODE_INTERNAL_ERROR),
     220             :                 errmsg("cannot format salt string"));
     221             : 
     222             :     /* s_ptr should now be positioned at the start of the salt string */
     223           8 :     s_ptr += rc;
     224             : 
     225             :     /*
     226             :      * Normalize salt string
     227             :      *
     228             :      * size of input buffer was checked above to not exceed
     229             :      * PX_SHACRYPT_SALT_LEN_MAX.
     230             :      */
     231         136 :     for (int i = 0; i < size; i++)
     232             :     {
     233         128 :         *s_ptr = _crypt_itoa64[input[i] & 0x3f];
     234         128 :         s_ptr++;
     235             :     }
     236             : 
     237             :     /* We're done */
     238           8 :     return output;
     239             : }
     240             : 
     241             : /* gen_list->gen function for sha512 */
     242             : char *
     243           4 : _crypt_gensalt_sha512_rn(unsigned long count,
     244             :                          char const *input, int size,
     245             :                          char *output, int output_size)
     246             : {
     247           4 :     memset(output, 0, output_size);
     248             :     /* set magic byte for sha512crypt */
     249           4 :     output[0] = '$';
     250           4 :     output[1] = '6';
     251           4 :     output[2] = '$';
     252             : 
     253           4 :     return _crypt_gensalt_sha(count, input, size, output, output_size);
     254             : }
     255             : 
     256             : /* gen_list->gen function for sha256 */
     257             : char *
     258           4 : _crypt_gensalt_sha256_rn(unsigned long count,
     259             :                          const char *input, int size,
     260             :                          char *output, int output_size)
     261             : {
     262           4 :     memset(output, 0, output_size);
     263             :     /* set magic byte for sha256crypt */
     264           4 :     output[0] = '$';
     265           4 :     output[1] = '5';
     266           4 :     output[2] = '$';
     267             : 
     268           4 :     return _crypt_gensalt_sha(count, input, size, output, output_size);
     269             : }

Generated by: LCOV version 1.14