passwd.c 26.1 KB
Newer Older
R
Rich Salz 已提交
1
/*
2
 * Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8
 */
B
Bodo Möller 已提交
9

10
#if defined OPENSSL_NO_MD5 || defined CHARSET_EBCDIC
11
# define NO_MD5CRYPT_1
B
Bodo Möller 已提交
12 13
#endif

14 15 16 17 18
#if defined OPENSSL_NO_SHA || defined CHARSET_EBCDIC
# define NO_SHACRYPT
#endif

#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1) || !defined(NO_SHACRYPT)
B
Bodo Möller 已提交
19

20 21 22 23 24 25 26 27 28 29 30 31 32 33
# include <string.h>

# include "apps.h"

# include <openssl/bio.h>
# include <openssl/err.h>
# include <openssl/evp.h>
# include <openssl/rand.h>
# ifndef OPENSSL_NO_DES
#  include <openssl/des.h>
# endif
# ifndef NO_MD5CRYPT_1
#  include <openssl/md5.h>
# endif
34 35 36
# ifndef NO_SHACRYPT
#  include <openssl/sha.h>
# endif
37 38 39 40 41 42 43 44 45 46 47

static unsigned const char cov_2char[64] = {
    /* from crypto/des/fcrypt.c */
    0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35,
    0x36, 0x37, 0x38, 0x39, 0x41, 0x42, 0x43, 0x44,
    0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C,
    0x4D, 0x4E, 0x4F, 0x50, 0x51, 0x52, 0x53, 0x54,
    0x55, 0x56, 0x57, 0x58, 0x59, 0x5A, 0x61, 0x62,
    0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6A,
    0x6B, 0x6C, 0x6D, 0x6E, 0x6F, 0x70, 0x71, 0x72,
    0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7A
B
Bodo Möller 已提交
48 49
};

50 51 52 53 54 55
typedef enum {
    passwd_unset = 0,
    passwd_crypt,
    passwd_md5,
    passwd_apr1,
    passwd_sha256,
56 57
    passwd_sha512,
    passwd_aixmd5
58 59
} passwd_modes;

60
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
61
                     char *passwd, BIO *out, int quiet, int table,
62
                     int reverse, size_t pw_maxlen, passwd_modes mode);
63

64 65 66 67
typedef enum OPTION_choice {
    OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
    OPT_IN,
    OPT_NOVERIFY, OPT_QUIET, OPT_TABLE, OPT_REVERSE, OPT_APR1,
R
Rich Salz 已提交
68 69
    OPT_1, OPT_5, OPT_6, OPT_CRYPT, OPT_AIXMD5, OPT_SALT, OPT_STDIN,
    OPT_R_ENUM,
70 71
} OPTION_CHOICE;

F
FdaSilvaYY 已提交
72
const OPTIONS passwd_options[] = {
73
    {"help", OPT_HELP, '-', "Display this summary"},
F
FdaSilvaYY 已提交
74
    {"in", OPT_IN, '<', "Read passwords from file"},
75 76 77 78 79
    {"noverify", OPT_NOVERIFY, '-',
     "Never verify when reading password from terminal"},
    {"quiet", OPT_QUIET, '-', "No warnings"},
    {"table", OPT_TABLE, '-', "Format output as table"},
    {"reverse", OPT_REVERSE, '-', "Switch table columns"},
80 81
    {"salt", OPT_SALT, 's', "Use provided salt"},
    {"stdin", OPT_STDIN, '-', "Read passwords from stdin"},
82 83 84 85
# ifndef NO_SHACRYPT
    {"6", OPT_6, '-', "SHA512-based password algorithm"},
    {"5", OPT_5, '-', "SHA256-based password algorithm"},
# endif
86 87 88
# ifndef NO_MD5CRYPT_1
    {"apr1", OPT_APR1, '-', "MD5-based password algorithm, Apache variant"},
    {"1", OPT_1, '-', "MD5-based password algorithm"},
89
    {"aixmd5", OPT_AIXMD5, '-', "AIX MD5-based password algorithm"},
90 91 92 93
# endif
# ifndef OPENSSL_NO_DES
    {"crypt", OPT_CRYPT, '-', "Standard Unix password algorithm (default)"},
# endif
R
Rich Salz 已提交
94
    OPT_R_OPTIONS,
95 96
    {NULL}
};
97

98
int passwd_main(int argc, char **argv)
99
{
100 101 102 103
    BIO *in = NULL;
    char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL;
    char *salt_malloc = NULL, *passwd_malloc = NULL, *prog;
    OPTION_CHOICE o;
R
Richard Levitte 已提交
104
    int in_stdin = 0, pw_source_defined = 0;
105
# ifndef OPENSSL_NO_UI_CONSOLE
R
Richard Levitte 已提交
106
    int in_noverify = 0;
P
Paul Yang 已提交
107
# endif
108
    int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
109 110 111 112 113
    int ret = 1;
    passwd_modes mode = passwd_unset;
    size_t passwd_malloc_size = 0;
    size_t pw_maxlen = 256; /* arbitrary limit, should be enough for most
                             * passwords */
114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133

    prog = opt_init(argc, argv, passwd_options);
    while ((o = opt_next()) != OPT_EOF) {
        switch (o) {
        case OPT_EOF:
        case OPT_ERR:
 opthelp:
            BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
            goto end;
        case OPT_HELP:
            opt_help(passwd_options);
            ret = 0;
            goto end;
        case OPT_IN:
            if (pw_source_defined)
                goto opthelp;
            infile = opt_arg();
            pw_source_defined = 1;
            break;
        case OPT_NOVERIFY:
134
# ifndef OPENSSL_NO_UI_CONSOLE
135
            in_noverify = 1;
P
Paul Yang 已提交
136
# endif
137 138
            break;
        case OPT_QUIET:
139
            quiet = 1;
140 141
            break;
        case OPT_TABLE:
142
            table = 1;
143 144
            break;
        case OPT_REVERSE:
145
            reverse = 1;
146
            break;
147 148 149 150 151
        case OPT_1:
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_md5;
            break;
152
        case OPT_5:
153 154 155
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_sha256;
156 157
            break;
        case OPT_6:
158 159 160
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_sha512;
161 162
            break;
        case OPT_APR1:
163 164 165
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_apr1;
166
            break;
167 168 169 170 171
        case OPT_AIXMD5:
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_aixmd5;
            break;
172
        case OPT_CRYPT:
173 174 175
            if (mode != passwd_unset)
                goto opthelp;
            mode = passwd_crypt;
176 177 178 179 180 181 182 183 184
            break;
        case OPT_SALT:
            passed_salt = 1;
            salt = opt_arg();
            break;
        case OPT_STDIN:
            if (pw_source_defined)
                goto opthelp;
            in_stdin = 1;
M
Matt Caswell 已提交
185
            pw_source_defined = 1;
186
            break;
R
Rich Salz 已提交
187 188 189 190
        case OPT_R_CASES:
            if (!opt_rand(o))
                goto end;
            break;
191 192 193 194 195
        }
    }
    argc = opt_num_rest();
    argv = opt_rest();

196
    if (*argv != NULL) {
197 198 199 200
        if (pw_source_defined)
            goto opthelp;
        pw_source_defined = 1;
        passwds = argv;
201 202
    }

203
    if (mode == passwd_unset) {
204
        /* use default */
205
        mode = passwd_crypt;
206
    }
207 208

# ifdef OPENSSL_NO_DES
209
    if (mode == passwd_crypt)
210
        goto opthelp;
211 212
# endif
# ifdef NO_MD5CRYPT_1
213
    if (mode == passwd_md5 || mode == passwd_apr1 || mode == passwd_aixmd5)
214
        goto opthelp;
215
# endif
216
# ifdef NO_SHACRYPT
217
    if (mode == passwd_sha256 || mode == passwd_sha512)
218 219
        goto opthelp;
# endif
220

221
    if (infile != NULL && in_stdin) {
222 223
        BIO_printf(bio_err, "%s: Can't combine -in and -stdin\n", prog);
        goto end;
224 225
    }

226 227 228 229 230 231 232 233 234
    if (infile != NULL || in_stdin) {
        /*
         * If in_stdin is true, we know that infile is NULL, and that
         * bio_open_default() will give us back an alias for stdin.
         */
        in = bio_open_default(infile, 'r', FORMAT_TEXT);
        if (in == NULL)
            goto end;
    }
235

236
    if (mode == passwd_crypt)
237 238 239 240 241 242
        pw_maxlen = 8;

    if (passwds == NULL) {
        /* no passwords on the command line */

        passwd_malloc_size = pw_maxlen + 2;
R
Rich Salz 已提交
243 244 245
        /* longer than necessary so that we can warn about truncation */
        passwd = passwd_malloc =
            app_malloc(passwd_malloc_size, "password buffer");
246 247 248
    }

    if ((in == NULL) && (passwds == NULL)) {
P
Paul Yang 已提交
249 250 251 252 253
        /*
         * we use the following method to make sure what
         * in the 'else' section is always compiled, to
         * avoid rot of not-frequently-used code.
         */
R
Richard Levitte 已提交
254
        if (1) {
255
# ifndef OPENSSL_NO_UI_CONSOLE
R
Richard Levitte 已提交
256 257
            /* build a null-terminated list */
            static char *passwds_static[2] = { NULL, NULL };
258

R
Richard Levitte 已提交
259
            passwds = passwds_static;
P
Paul Yang 已提交
260
            if (in == NULL) {
R
Richard Levitte 已提交
261 262 263 264
                if (EVP_read_pw_string
                    (passwd_malloc, passwd_malloc_size, "Password: ",
                     !(passed_salt || in_noverify)) != 0)
                    goto end;
P
Paul Yang 已提交
265
            }
R
Richard Levitte 已提交
266 267
            passwds[0] = passwd_malloc;
        } else {
P
Paul Yang 已提交
268
# endif
R
Richard Levitte 已提交
269 270 271
            BIO_printf(bio_err, "password required\n");
            goto end;
        }
272 273 274 275 276 277 278 279
    }

    if (in == NULL) {
        assert(passwds != NULL);
        assert(*passwds != NULL);

        do {                    /* loop over list of passwords */
            passwd = *passwds++;
280
            if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out,
281
                           quiet, table, reverse, pw_maxlen, mode))
282
                goto end;
P
Paul Yang 已提交
283 284
        } while (*passwds != NULL);
    } else {
285 286 287 288 289 290 291 292
        /* in != NULL */
        int done;

        assert(passwd != NULL);
        do {
            int r = BIO_gets(in, passwd, pw_maxlen + 1);
            if (r > 0) {
                char *c = (strchr(passwd, '\n'));
P
Paul Yang 已提交
293
                if (c != NULL) {
294
                    *c = 0;     /* truncate at newline */
P
Paul Yang 已提交
295
                } else {
296 297 298 299 300 301 302
                    /* ignore rest of line */
                    char trash[BUFSIZ];
                    do
                        r = BIO_gets(in, trash, sizeof trash);
                    while ((r > 0) && (!strchr(trash, '\n')));
                }

303 304
                if (!do_passwd
                    (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet,
305
                     table, reverse, pw_maxlen, mode))
306
                    goto end;
307 308
            }
            done = (r <= 0);
P
Paul Yang 已提交
309
        } while (!done);
310 311 312
    }
    ret = 0;

313
 end:
314
    ERR_print_errors(bio_err);
R
Rich Salz 已提交
315 316
    OPENSSL_free(salt_malloc);
    OPENSSL_free(passwd_malloc);
R
Rich Salz 已提交
317
    BIO_free(in);
318
    return (ret);
319 320 321 322 323 324 325 326 327 328 329
}

# ifndef NO_MD5CRYPT_1
/*
 * MD5-based password algorithm (should probably be available as a library
 * function; then the static buffer would not be acceptable). For magic
 * string "1", this should be compatible to the MD5-based BSD password
 * algorithm. For 'magic' string "apr1", this is compatible to the MD5-based
 * Apache password algorithm. (Apparently, the Apache password algorithm is
 * identical except that the 'magic' string was changed -- the laziest
 * application of the NIH principle I've ever encountered.)
330 331
 */
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
332 333 334 335 336 337 338
{
    /* "$apr1$..salt..$.......md5hash..........\0" */
    static char out_buf[6 + 9 + 24 + 2];
    unsigned char buf[MD5_DIGEST_LENGTH];
    char *salt_out;
    int n;
    unsigned int i;
339
    EVP_MD_CTX *md = NULL, *md2 = NULL;
F
FdaSilvaYY 已提交
340
    size_t passwd_len, salt_len, magic_len;
341 342

    passwd_len = strlen(passwd);
343 344

    out_buf[0] = 0;
F
FdaSilvaYY 已提交
345 346
    magic_len = strlen(magic);

347 348 349 350 351 352 353 354 355 356
    if (magic_len > 0) {
        out_buf[0] = '$';
        out_buf[1] = 0;

        if (magic_len > 4)    /* assert it's  "1" or "apr1" */
            return NULL;

        OPENSSL_strlcat(out_buf, magic, sizeof out_buf);
        OPENSSL_strlcat(out_buf, "$", sizeof out_buf);
    }
F
FdaSilvaYY 已提交
357

R
Rich Salz 已提交
358
    OPENSSL_strlcat(out_buf, salt, sizeof out_buf);
F
FdaSilvaYY 已提交
359

360
    if (strlen(out_buf) > 6 + 8) /* assert "$apr1$..salt.." */
F
FdaSilvaYY 已提交
361 362
        return NULL;

363 364 365
    salt_out = out_buf;
    if (magic_len > 0)
        salt_out += 2 + magic_len;
366
    salt_len = strlen(salt_out);
F
FdaSilvaYY 已提交
367 368 369

    if (salt_len > 8)
        return NULL;
370

371
    md = EVP_MD_CTX_new();
372 373
    if (md == NULL
        || !EVP_DigestInit_ex(md, EVP_md5(), NULL)
374 375 376 377 378 379 380 381 382 383
        || !EVP_DigestUpdate(md, passwd, passwd_len))
        goto err;

    if (magic_len > 0)
        if (!EVP_DigestUpdate(md, "$", 1)
            || !EVP_DigestUpdate(md, magic, magic_len)
            || !EVP_DigestUpdate(md, "$", 1))
          goto err;

    if (!EVP_DigestUpdate(md, salt_out, salt_len))
384
        goto err;
385

386
    md2 = EVP_MD_CTX_new();
387 388 389 390 391 392 393 394 395 396 397 398 399 400
    if (md2 == NULL
        || !EVP_DigestInit_ex(md2, EVP_md5(), NULL)
        || !EVP_DigestUpdate(md2, passwd, passwd_len)
        || !EVP_DigestUpdate(md2, salt_out, salt_len)
        || !EVP_DigestUpdate(md2, passwd, passwd_len)
        || !EVP_DigestFinal_ex(md2, buf, NULL))
        goto err;

    for (i = passwd_len; i > sizeof buf; i -= sizeof buf) {
        if (!EVP_DigestUpdate(md, buf, sizeof buf))
            goto err;
    }
    if (!EVP_DigestUpdate(md, buf, i))
        goto err;
401 402 403

    n = passwd_len;
    while (n) {
404 405
        if (!EVP_DigestUpdate(md, (n & 1) ? "\0" : passwd, 1))
            goto err;
406 407
        n >>= 1;
    }
408 409
    if (!EVP_DigestFinal_ex(md, buf, NULL))
        return NULL;
410 411

    for (i = 0; i < 1000; i++) {
412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431
        if (!EVP_DigestInit_ex(md2, EVP_md5(), NULL))
            goto err;
        if (!EVP_DigestUpdate(md2,
                              (i & 1) ? (unsigned const char *)passwd : buf,
                              (i & 1) ? passwd_len : sizeof buf))
            goto err;
        if (i % 3) {
            if (!EVP_DigestUpdate(md2, salt_out, salt_len))
                goto err;
        }
        if (i % 7) {
            if (!EVP_DigestUpdate(md2, passwd, passwd_len))
                goto err;
        }
        if (!EVP_DigestUpdate(md2,
                              (i & 1) ? buf : (unsigned const char *)passwd,
                              (i & 1) ? sizeof buf : passwd_len))
                goto err;
        if (!EVP_DigestFinal_ex(md2, buf, NULL))
                goto err;
432
    }
433 434
    EVP_MD_CTX_free(md2);
    EVP_MD_CTX_free(md);
435 436
    md2 = NULL;
    md = NULL;
437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475

    {
        /* transform buf into output string */
        unsigned char buf_perm[sizeof buf];
        int dest, source;
        char *output;

        /* silly output permutation */
        for (dest = 0, source = 0; dest < 14;
             dest++, source = (source + 6) % 17)
            buf_perm[dest] = buf[source];
        buf_perm[14] = buf[5];
        buf_perm[15] = buf[11];
#  ifndef PEDANTIC              /* Unfortunately, this generates a "no
                                 * effect" warning */
        assert(16 == sizeof buf_perm);
#  endif

        output = salt_out + salt_len;
        assert(output == out_buf + strlen(out_buf));

        *output++ = '$';

        for (i = 0; i < 15; i += 3) {
            *output++ = cov_2char[buf_perm[i + 2] & 0x3f];
            *output++ = cov_2char[((buf_perm[i + 1] & 0xf) << 2) |
                                  (buf_perm[i + 2] >> 6)];
            *output++ = cov_2char[((buf_perm[i] & 3) << 4) |
                                  (buf_perm[i + 1] >> 4)];
            *output++ = cov_2char[buf_perm[i] >> 2];
        }
        assert(i == 15);
        *output++ = cov_2char[buf_perm[i] & 0x3f];
        *output++ = cov_2char[buf_perm[i] >> 6];
        *output = 0;
        assert(strlen(out_buf) < sizeof(out_buf));
    }

    return out_buf;
476 477 478 479 480

 err:
    EVP_MD_CTX_free(md2);
    EVP_MD_CTX_free(md);
    return NULL;
481 482
}
# endif
483

484 485 486 487 488 489 490 491 492 493 494
# ifndef NO_SHACRYPT
/*
 * SHA based password algorithm, describe by Ulrich Drepper here:
 * https://www.akkadia.org/drepper/SHA-crypt.txt
 * (note that it's in the public domain)
 */
static char *shacrypt(const char *passwd, const char *magic, const char *salt)
{
    /* Prefix for optional rounds specification.  */
    static const char rounds_prefix[] = "rounds=";
    /* Maximum salt string length.  */
P
Paul Yang 已提交
495
#  define SALT_LEN_MAX 16
496
    /* Default number of rounds if not explicitly specified.  */
P
Paul Yang 已提交
497
#  define ROUNDS_DEFAULT 5000
498
    /* Minimum number of rounds.  */
P
Paul Yang 已提交
499
#  define ROUNDS_MIN 1000
500
    /* Maximum number of rounds.  */
P
Paul Yang 已提交
501
#  define ROUNDS_MAX 999999999
502 503 504 505 506 507 508 509 510 511 512

    /* "$6$rounds=<N>$......salt......$...shahash(up to 86 chars)...\0" */
    static char out_buf[3 + 17 + 17 + 86 + 1];
    unsigned char buf[SHA512_DIGEST_LENGTH];
    unsigned char temp_buf[SHA512_DIGEST_LENGTH];
    size_t buf_size = 0;
    char salt_copy[17];          /* Max 16 chars plus '\0' */
    size_t n;
    EVP_MD_CTX *md = NULL, *md2 = NULL;
    const EVP_MD *sha = NULL;
    size_t passwd_len, salt_len, magic_len;
513
    unsigned int rounds = 5000;        /* Default */
514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
    char rounds_custom = 0;
    char *p_bytes = NULL;
    char *s_bytes = NULL;
    char *cp = NULL;

    passwd_len = strlen(passwd);
    magic_len = strlen(magic);

    /* assert it's "5" or "6" */
    if (magic_len != 1)
        return NULL;

    switch (magic[0]) {
    case '5':
        sha = EVP_sha256();
        buf_size = 32;
        break;
    case '6':
        sha = EVP_sha512();
        buf_size = 64;
        break;
    default:
        return NULL;
    }

    if (strncmp(salt, rounds_prefix, sizeof(rounds_prefix) - 1) == 0) {
        const char *num = salt + sizeof(rounds_prefix) - 1;
        char *endp;
        unsigned long int srounds = strtoul (num, &endp, 10);
        if (*endp == '$') {
            salt = endp + 1;
            if (srounds > ROUNDS_MAX)
                rounds = ROUNDS_MAX;
            else if (srounds < ROUNDS_MIN)
                rounds = ROUNDS_MIN;
            else
550
                rounds = (unsigned int)srounds;
551 552 553 554 555 556 557 558 559 560 561 562 563 564 565
            rounds_custom = 1;
        } else {
            return NULL;
        }
    }

    /* The salt gets truncated to 16 chars */
    OPENSSL_strlcpy(salt_copy, salt, sizeof salt_copy);
    salt_len = strlen(salt_copy);

    out_buf[0] = 0;
    OPENSSL_strlcat(out_buf, "$", sizeof out_buf);
    OPENSSL_strlcat(out_buf, magic, sizeof out_buf);
    OPENSSL_strlcat(out_buf, "$", sizeof out_buf);
    if (rounds_custom) {
566
        char tmp_buf[80]; /* "rounds=999999999" */
567
        sprintf(tmp_buf, "rounds=%u", rounds);
568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678
        OPENSSL_strlcat(out_buf, tmp_buf, sizeof out_buf);
        OPENSSL_strlcat(out_buf, "$", sizeof out_buf);
    }
    OPENSSL_strlcat(out_buf, salt_copy, sizeof out_buf);

    /* assert "$5$rounds=999999999$......salt......" */
    if (strlen(out_buf) > 3 + 17 * rounds_custom + salt_len )
        return NULL;

    md = EVP_MD_CTX_new();
    if (md == NULL
        || !EVP_DigestInit_ex(md, sha, NULL)
        || !EVP_DigestUpdate(md, passwd, passwd_len)
        || !EVP_DigestUpdate(md, salt_copy, salt_len))
        goto err;

    md2 = EVP_MD_CTX_new();
    if (md2 == NULL
        || !EVP_DigestInit_ex(md2, sha, NULL)
        || !EVP_DigestUpdate(md2, passwd, passwd_len)
        || !EVP_DigestUpdate(md2, salt_copy, salt_len)
        || !EVP_DigestUpdate(md2, passwd, passwd_len)
        || !EVP_DigestFinal_ex(md2, buf, NULL))
        goto err;

    for (n = passwd_len; n > buf_size; n -= buf_size) {
        if (!EVP_DigestUpdate(md, buf, buf_size))
            goto err;
    }
    if (!EVP_DigestUpdate(md, buf, n))
        goto err;

    n = passwd_len;
    while (n) {
        if (!EVP_DigestUpdate(md,
                              (n & 1) ? buf : (unsigned const char *)passwd,
                              (n & 1) ? buf_size : passwd_len))
            goto err;
        n >>= 1;
    }
    if (!EVP_DigestFinal_ex(md, buf, NULL))
        return NULL;

    /* P sequence */
    if (!EVP_DigestInit_ex(md2, sha, NULL))
        goto err;

    for (n = passwd_len; n > 0; n--)
        if (!EVP_DigestUpdate(md2, passwd, passwd_len))
            goto err;

    if (!EVP_DigestFinal_ex(md2, temp_buf, NULL))
        return NULL;

    if ((p_bytes = OPENSSL_zalloc(passwd_len)) == NULL)
        goto err;
    for (cp = p_bytes, n = passwd_len; n > buf_size; n -= buf_size, cp += buf_size)
        memcpy(cp, temp_buf, buf_size);
    memcpy(cp, temp_buf, n);

    /* S sequence */
    if (!EVP_DigestInit_ex(md2, sha, NULL))
        goto err;

    for (n = 16 + buf[0]; n > 0; n--)
        if (!EVP_DigestUpdate(md2, salt, salt_len))
            goto err;

    if (!EVP_DigestFinal_ex(md2, temp_buf, NULL))
        return NULL;

    if ((s_bytes = OPENSSL_zalloc(salt_len)) == NULL)
        goto err;
    for (cp = s_bytes, n = salt_len; n > buf_size; n -= buf_size, cp += buf_size)
        memcpy(cp, temp_buf, buf_size);
    memcpy(cp, temp_buf, n);

    for (n = 0; n < rounds; n++) {
        if (!EVP_DigestInit_ex(md2, sha, NULL))
            goto err;
        if (!EVP_DigestUpdate(md2,
                              (n & 1) ? (unsigned const char *)p_bytes : buf,
                              (n & 1) ? passwd_len : buf_size))
            goto err;
        if (n % 3) {
            if (!EVP_DigestUpdate(md2, s_bytes, salt_len))
                goto err;
        }
        if (n % 7) {
            if (!EVP_DigestUpdate(md2, p_bytes, passwd_len))
                goto err;
        }
        if (!EVP_DigestUpdate(md2,
                              (n & 1) ? buf : (unsigned const char *)p_bytes,
                              (n & 1) ? buf_size : passwd_len))
                goto err;
        if (!EVP_DigestFinal_ex(md2, buf, NULL))
                goto err;
    }
    EVP_MD_CTX_free(md2);
    EVP_MD_CTX_free(md);
    md2 = NULL;
    md = NULL;
    OPENSSL_free(p_bytes);
    OPENSSL_free(s_bytes);
    p_bytes = NULL;
    s_bytes = NULL;

    cp = out_buf + strlen(out_buf);
    *cp++ = '$';

P
Paul Yang 已提交
679
#  define b64_from_24bit(B2, B1, B0, N)                                   \
680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743
    do {                                                                \
        unsigned int w = ((B2) << 16) | ((B1) << 8) | (B0);             \
        int i = (N);                                                    \
        while (i-- > 0)                                                 \
            {                                                           \
                *cp++ = cov_2char[w & 0x3f];                            \
                w >>= 6;                                                \
            }                                                           \
    } while (0)

    switch (*magic) {
    case '5':
        b64_from_24bit (buf[0], buf[10], buf[20], 4);
        b64_from_24bit (buf[21], buf[1], buf[11], 4);
        b64_from_24bit (buf[12], buf[22], buf[2], 4);
        b64_from_24bit (buf[3], buf[13], buf[23], 4);
        b64_from_24bit (buf[24], buf[4], buf[14], 4);
        b64_from_24bit (buf[15], buf[25], buf[5], 4);
        b64_from_24bit (buf[6], buf[16], buf[26], 4);
        b64_from_24bit (buf[27], buf[7], buf[17], 4);
        b64_from_24bit (buf[18], buf[28], buf[8], 4);
        b64_from_24bit (buf[9], buf[19], buf[29], 4);
        b64_from_24bit (0, buf[31], buf[30], 3);
        break;
    case '6':
        b64_from_24bit (buf[0], buf[21], buf[42], 4);
        b64_from_24bit (buf[22], buf[43], buf[1], 4);
        b64_from_24bit (buf[44], buf[2], buf[23], 4);
        b64_from_24bit (buf[3], buf[24], buf[45], 4);
        b64_from_24bit (buf[25], buf[46], buf[4], 4);
        b64_from_24bit (buf[47], buf[5], buf[26], 4);
        b64_from_24bit (buf[6], buf[27], buf[48], 4);
        b64_from_24bit (buf[28], buf[49], buf[7], 4);
        b64_from_24bit (buf[50], buf[8], buf[29], 4);
        b64_from_24bit (buf[9], buf[30], buf[51], 4);
        b64_from_24bit (buf[31], buf[52], buf[10], 4);
        b64_from_24bit (buf[53], buf[11], buf[32], 4);
        b64_from_24bit (buf[12], buf[33], buf[54], 4);
        b64_from_24bit (buf[34], buf[55], buf[13], 4);
        b64_from_24bit (buf[56], buf[14], buf[35], 4);
        b64_from_24bit (buf[15], buf[36], buf[57], 4);
        b64_from_24bit (buf[37], buf[58], buf[16], 4);
        b64_from_24bit (buf[59], buf[17], buf[38], 4);
        b64_from_24bit (buf[18], buf[39], buf[60], 4);
        b64_from_24bit (buf[40], buf[61], buf[19], 4);
        b64_from_24bit (buf[62], buf[20], buf[41], 4);
        b64_from_24bit (0, 0, buf[63], 2);
        break;
    default:
        goto err;
    }
    *cp = '\0';

    return out_buf;

 err:
    EVP_MD_CTX_free(md2);
    EVP_MD_CTX_free(md);
    OPENSSL_free(p_bytes);
    OPENSSL_free(s_bytes);
    return NULL;
}
# endif

744
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
745
                     char *passwd, BIO *out, int quiet, int table,
746
                     int reverse, size_t pw_maxlen, passwd_modes mode)
747 748 749 750 751 752 753 754 755
{
    char *hash = NULL;

    assert(salt_p != NULL);
    assert(salt_malloc_p != NULL);

    /* first make sure we have a salt */
    if (!passed_salt) {
# ifndef OPENSSL_NO_DES
756
        if (mode == passwd_crypt) {
P
Paul Yang 已提交
757
            if (*salt_malloc_p == NULL)
R
Rich Salz 已提交
758
                *salt_p = *salt_malloc_p = app_malloc(3, "salt buffer");
M
Matt Caswell 已提交
759
            if (RAND_bytes((unsigned char *)*salt_p, 2) <= 0)
760
                goto end;
761 762 763 764 765 766 767 768 769 770 771
            (*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
            (*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
            (*salt_p)[2] = 0;
#  ifdef CHARSET_EBCDIC
            ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert back
                                                * to ASCII */
#  endif
        }
# endif                         /* !OPENSSL_NO_DES */

# ifndef NO_MD5CRYPT_1
772
        if (mode == passwd_md5 || mode == passwd_apr1 || mode == passwd_aixmd5) {
773 774
            int i;

P
Paul Yang 已提交
775
            if (*salt_malloc_p == NULL)
R
Rich Salz 已提交
776
                *salt_p = *salt_malloc_p = app_malloc(9, "salt buffer");
M
Matt Caswell 已提交
777
            if (RAND_bytes((unsigned char *)*salt_p, 8) <= 0)
778
                goto end;
779 780 781 782 783 784

            for (i = 0; i < 8; i++)
                (*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
            (*salt_p)[8] = 0;
        }
# endif                         /* !NO_MD5CRYPT_1 */
785 786

# ifndef NO_SHACRYPT
787
        if (mode == passwd_sha256 || mode == passwd_sha512) {
788 789
            int i;

P
Paul Yang 已提交
790
            if (*salt_malloc_p == NULL)
791 792 793 794 795 796 797 798 799
                *salt_p = *salt_malloc_p = app_malloc(17, "salt buffer");
            if (RAND_bytes((unsigned char *)*salt_p, 16) <= 0)
                goto end;

            for (i = 0; i < 16; i++)
                (*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
            (*salt_p)[16] = 0;
        }
# endif                         /* !NO_SHACRYPT */
800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818
    }

    assert(*salt_p != NULL);

    /* truncate password if necessary */
    if ((strlen(passwd) > pw_maxlen)) {
        if (!quiet)
            /*
             * XXX: really we should know how to print a size_t, not cast it
             */
            BIO_printf(bio_err,
                       "Warning: truncating password to %u characters\n",
                       (unsigned)pw_maxlen);
        passwd[pw_maxlen] = 0;
    }
    assert(strlen(passwd) <= pw_maxlen);

    /* now compute password hash */
# ifndef OPENSSL_NO_DES
819
    if (mode == passwd_crypt)
820 821 822
        hash = DES_crypt(passwd, *salt_p);
# endif
# ifndef NO_MD5CRYPT_1
823 824
    if (mode == passwd_md5 || mode == passwd_apr1)
        hash = md5crypt(passwd, (mode == passwd_md5 ? "1" : "apr1"), *salt_p);
825 826
    if (mode == passwd_aixmd5)
        hash = md5crypt(passwd, "", *salt_p);
827 828
# endif
# ifndef NO_SHACRYPT
829 830
    if (mode == passwd_sha256 || mode == passwd_sha512)
        hash = shacrypt(passwd, (mode == passwd_sha256 ? "5" : "6"), *salt_p);
831 832 833 834 835 836 837 838 839
# endif
    assert(hash != NULL);

    if (table && !reverse)
        BIO_printf(out, "%s\t%s\n", passwd, hash);
    else if (table && reverse)
        BIO_printf(out, "%s\t%s\n", hash, passwd);
    else
        BIO_printf(out, "%s\n", hash);
840
    return 1;
841 842

 end:
843
    return 0;
844
}
B
Bodo Möller 已提交
845
#else
846

847
int passwd_main(int argc, char **argv)
848
{
R
Rich Salz 已提交
849 850
    BIO_printf(bio_err, "Program not available.\n");
    return (1);
851
}
B
Bodo Möller 已提交
852
#endif