Line data Source code
1 : /*
2 : * Written by Solar Designer and placed in the public domain.
3 : * See crypt_blowfish.c for more information.
4 : *
5 : * contrib/pgcrypto/crypt-gensalt.c
6 : *
7 : * This file contains salt generation functions for the traditional and
8 : * other common crypt(3) algorithms, except for bcrypt which is defined
9 : * entirely in crypt_blowfish.c.
10 : *
11 : * Put bcrypt generator also here as crypt-blowfish.c
12 : * may not be compiled always. -- marko
13 : */
14 :
15 : #include "postgres.h"
16 :
17 : #include "px-crypt.h"
18 :
19 : typedef unsigned int BF_word;
20 :
21 : static unsigned char _crypt_itoa64[64 + 1] =
22 : "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
23 :
24 : char *
25 2 : _crypt_gensalt_traditional_rn(unsigned long count,
26 : const char *input, int size, char *output, int output_size)
27 : {
28 2 : if (size < 2 || output_size < 2 + 1 || (count && count != 25))
29 : {
30 0 : if (output_size > 0)
31 0 : output[0] = '\0';
32 0 : return NULL;
33 : }
34 :
35 2 : output[0] = _crypt_itoa64[(unsigned int) input[0] & 0x3f];
36 2 : output[1] = _crypt_itoa64[(unsigned int) input[1] & 0x3f];
37 2 : output[2] = '\0';
38 :
39 2 : return output;
40 : }
41 :
42 : char *
43 2 : _crypt_gensalt_extended_rn(unsigned long count,
44 : const char *input, int size, char *output, int output_size)
45 : {
46 : unsigned long value;
47 :
48 : /* Even iteration counts make it easier to detect weak DES keys from a look
49 : * at the hash, so they should be avoided */
50 2 : if (size < 3 || output_size < 1 + 4 + 4 + 1 ||
51 2 : (count && (count > 0xffffff || !(count & 1))))
52 : {
53 0 : if (output_size > 0)
54 0 : output[0] = '\0';
55 0 : return NULL;
56 : }
57 :
58 2 : if (!count)
59 0 : count = 725;
60 :
61 2 : output[0] = '_';
62 2 : output[1] = _crypt_itoa64[count & 0x3f];
63 2 : output[2] = _crypt_itoa64[(count >> 6) & 0x3f];
64 2 : output[3] = _crypt_itoa64[(count >> 12) & 0x3f];
65 2 : output[4] = _crypt_itoa64[(count >> 18) & 0x3f];
66 2 : value = (unsigned long) (unsigned char) input[0] |
67 2 : ((unsigned long) (unsigned char) input[1] << 8) |
68 2 : ((unsigned long) (unsigned char) input[2] << 16);
69 2 : output[5] = _crypt_itoa64[value & 0x3f];
70 2 : output[6] = _crypt_itoa64[(value >> 6) & 0x3f];
71 2 : output[7] = _crypt_itoa64[(value >> 12) & 0x3f];
72 2 : output[8] = _crypt_itoa64[(value >> 18) & 0x3f];
73 2 : output[9] = '\0';
74 :
75 2 : return output;
76 : }
77 :
78 : char *
79 2 : _crypt_gensalt_md5_rn(unsigned long count,
80 : const char *input, int size, char *output, int output_size)
81 : {
82 : unsigned long value;
83 :
84 2 : if (size < 3 || output_size < 3 + 4 + 1 || (count && count != 1000))
85 : {
86 0 : if (output_size > 0)
87 0 : output[0] = '\0';
88 0 : return NULL;
89 : }
90 :
91 2 : output[0] = '$';
92 2 : output[1] = '1';
93 2 : output[2] = '$';
94 2 : value = (unsigned long) (unsigned char) input[0] |
95 2 : ((unsigned long) (unsigned char) input[1] << 8) |
96 2 : ((unsigned long) (unsigned char) input[2] << 16);
97 2 : output[3] = _crypt_itoa64[value & 0x3f];
98 2 : output[4] = _crypt_itoa64[(value >> 6) & 0x3f];
99 2 : output[5] = _crypt_itoa64[(value >> 12) & 0x3f];
100 2 : output[6] = _crypt_itoa64[(value >> 18) & 0x3f];
101 2 : output[7] = '\0';
102 :
103 2 : if (size >= 6 && output_size >= 3 + 4 + 4 + 1)
104 : {
105 2 : value = (unsigned long) (unsigned char) input[3] |
106 2 : ((unsigned long) (unsigned char) input[4] << 8) |
107 2 : ((unsigned long) (unsigned char) input[5] << 16);
108 2 : output[7] = _crypt_itoa64[value & 0x3f];
109 2 : output[8] = _crypt_itoa64[(value >> 6) & 0x3f];
110 2 : output[9] = _crypt_itoa64[(value >> 12) & 0x3f];
111 2 : output[10] = _crypt_itoa64[(value >> 18) & 0x3f];
112 2 : output[11] = '\0';
113 : }
114 :
115 2 : return output;
116 : }
117 :
118 :
119 :
120 : static unsigned char BF_itoa64[64 + 1] =
121 : "./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
122 :
123 : static void
124 2 : BF_encode(char *dst, const BF_word *src, int size)
125 : {
126 2 : const unsigned char *sptr = (const unsigned char *) src;
127 2 : const unsigned char *end = sptr + size;
128 2 : unsigned char *dptr = (unsigned char *) dst;
129 : unsigned int c1,
130 : c2;
131 :
132 : do
133 : {
134 12 : c1 = *sptr++;
135 12 : *dptr++ = BF_itoa64[c1 >> 2];
136 12 : c1 = (c1 & 0x03) << 4;
137 12 : if (sptr >= end)
138 : {
139 2 : *dptr++ = BF_itoa64[c1];
140 2 : break;
141 : }
142 :
143 10 : c2 = *sptr++;
144 10 : c1 |= c2 >> 4;
145 10 : *dptr++ = BF_itoa64[c1];
146 10 : c1 = (c2 & 0x0f) << 2;
147 10 : if (sptr >= end)
148 : {
149 0 : *dptr++ = BF_itoa64[c1];
150 0 : break;
151 : }
152 :
153 10 : c2 = *sptr++;
154 10 : c1 |= c2 >> 6;
155 10 : *dptr++ = BF_itoa64[c1];
156 10 : *dptr++ = BF_itoa64[c2 & 0x3f];
157 10 : } while (sptr < end);
158 2 : }
159 :
160 : char *
161 2 : _crypt_gensalt_blowfish_rn(unsigned long count,
162 : const char *input, int size, char *output, int output_size)
163 : {
164 2 : if (size < 16 || output_size < 7 + 22 + 1 ||
165 2 : (count && (count < 4 || count > 31)))
166 : {
167 0 : if (output_size > 0)
168 0 : output[0] = '\0';
169 0 : return NULL;
170 : }
171 :
172 2 : if (!count)
173 0 : count = 5;
174 :
175 2 : output[0] = '$';
176 2 : output[1] = '2';
177 2 : output[2] = 'a';
178 2 : output[3] = '$';
179 2 : output[4] = '0' + count / 10;
180 2 : output[5] = '0' + count % 10;
181 2 : output[6] = '$';
182 :
183 2 : BF_encode(&output[7], (const BF_word *) input, 16);
184 2 : output[7 + 22] = '\0';
185 :
186 2 : return output;
187 : }
188 :
189 : /*
190 : * Helper for _crypt_gensalt_sha256_rn and _crypt_gensalt_sha512_rn
191 : */
192 : static char *
193 8 : _crypt_gensalt_sha(unsigned long count,
194 : const char *input, int size, char *output, int output_size)
195 : {
196 8 : char *s_ptr = output;
197 8 : unsigned int result_bufsize = PX_SHACRYPT_SALT_BUF_LEN;
198 : int rc;
199 :
200 : /* output buffer must be allocated with PX_MAX_SALT_LEN bytes */
201 8 : if (PX_MAX_SALT_LEN < result_bufsize)
202 0 : ereport(ERROR,
203 : errcode(ERRCODE_SYNTAX_ERROR),
204 : errmsg("invalid size of salt"));
205 :
206 : /*
207 : * Care must be taken to not exceed the buffer size allocated for the
208 : * input character buffer.
209 : */
210 8 : if ((PX_SHACRYPT_SALT_MAX_LEN != size) || (output_size < size))
211 0 : ereport(ERROR,
212 : errcode(ERRCODE_INTERNAL_ERROR),
213 : errmsg("invalid length of salt buffer"));
214 :
215 : /* Skip magic bytes, set by callers */
216 8 : s_ptr += 3;
217 8 : if ((rc = pg_snprintf(s_ptr, 18, "rounds=%lu$", count)) <= 0)
218 0 : ereport(ERROR,
219 : errcode(ERRCODE_INTERNAL_ERROR),
220 : errmsg("cannot format salt string"));
221 :
222 : /* s_ptr should now be positioned at the start of the salt string */
223 8 : s_ptr += rc;
224 :
225 : /*
226 : * Normalize salt string
227 : *
228 : * size of input buffer was checked above to not exceed
229 : * PX_SHACRYPT_SALT_LEN_MAX.
230 : */
231 136 : for (int i = 0; i < size; i++)
232 : {
233 128 : *s_ptr = _crypt_itoa64[input[i] & 0x3f];
234 128 : s_ptr++;
235 : }
236 :
237 : /* We're done */
238 8 : return output;
239 : }
240 :
241 : /* gen_list->gen function for sha512 */
242 : char *
243 4 : _crypt_gensalt_sha512_rn(unsigned long count,
244 : char const *input, int size,
245 : char *output, int output_size)
246 : {
247 4 : memset(output, 0, output_size);
248 : /* set magic byte for sha512crypt */
249 4 : output[0] = '$';
250 4 : output[1] = '6';
251 4 : output[2] = '$';
252 :
253 4 : return _crypt_gensalt_sha(count, input, size, output, output_size);
254 : }
255 :
256 : /* gen_list->gen function for sha256 */
257 : char *
258 4 : _crypt_gensalt_sha256_rn(unsigned long count,
259 : const char *input, int size,
260 : char *output, int output_size)
261 : {
262 4 : memset(output, 0, output_size);
263 : /* set magic byte for sha256crypt */
264 4 : output[0] = '$';
265 4 : output[1] = '5';
266 4 : output[2] = '$';
267 :
268 4 : return _crypt_gensalt_sha(count, input, size, output, output_size);
269 : }
|