crypt.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Stig Bakken <ssb@php.net> |
  16. | Zeev Suraski <zeev@zend.com> |
  17. | Rasmus Lerdorf <rasmus@php.net> |
  18. | Pierre Joye <pierre@php.net> |
  19. +----------------------------------------------------------------------+
  20. */
  21. /* $Id$ */
  22. #include <stdlib.h>
  23. #include "php.h"
  24. #if HAVE_CRYPT
  25. #if HAVE_UNISTD_H
  26. #include <unistd.h>
  27. #endif
  28. #if PHP_USE_PHP_CRYPT_R
  29. # include "php_crypt_r.h"
  30. # include "crypt_freesec.h"
  31. #else
  32. # if HAVE_CRYPT_H
  33. # if defined(CRYPT_R_GNU_SOURCE) && !defined(_GNU_SOURCE)
  34. # define _GNU_SOURCE
  35. # endif
  36. # include <crypt.h>
  37. # endif
  38. #endif
  39. #if TM_IN_SYS_TIME
  40. #include <sys/time.h>
  41. #else
  42. #include <time.h>
  43. #endif
  44. #if HAVE_STRING_H
  45. #include <string.h>
  46. #else
  47. #include <strings.h>
  48. #endif
  49. #ifdef PHP_WIN32
  50. #include <process.h>
  51. #endif
  52. #include "php_lcg.h"
  53. #include "php_crypt.h"
  54. #include "php_rand.h"
  55. /* The capabilities of the crypt() function is determined by the test programs
  56. * run by configure from aclocal.m4. They will set PHP_STD_DES_CRYPT,
  57. * PHP_EXT_DES_CRYPT, PHP_MD5_CRYPT and PHP_BLOWFISH_CRYPT as appropriate
  58. * for the target platform. */
  59. #if PHP_STD_DES_CRYPT
  60. #define PHP_MAX_SALT_LEN 2
  61. #endif
  62. #if PHP_EXT_DES_CRYPT
  63. #undef PHP_MAX_SALT_LEN
  64. #define PHP_MAX_SALT_LEN 9
  65. #endif
  66. #if PHP_MD5_CRYPT
  67. #undef PHP_MAX_SALT_LEN
  68. #define PHP_MAX_SALT_LEN 12
  69. #endif
  70. #if PHP_BLOWFISH_CRYPT
  71. #undef PHP_MAX_SALT_LEN
  72. #define PHP_MAX_SALT_LEN 60
  73. #endif
  74. #if PHP_SHA512_CRYPT
  75. #undef PHP_MAX_SALT_LEN
  76. #define PHP_MAX_SALT_LEN 123
  77. #endif
  78. /* If the configure-time checks fail, we provide DES.
  79. * XXX: This is a hack. Fix the real problem! */
  80. #ifndef PHP_MAX_SALT_LEN
  81. #define PHP_MAX_SALT_LEN 2
  82. #undef PHP_STD_DES_CRYPT
  83. #define PHP_STD_DES_CRYPT 1
  84. #endif
  85. #define PHP_CRYPT_RAND php_rand(TSRMLS_C)
  86. PHP_MINIT_FUNCTION(crypt) /* {{{ */
  87. {
  88. REGISTER_LONG_CONSTANT("CRYPT_SALT_LENGTH", PHP_MAX_SALT_LEN, CONST_CS | CONST_PERSISTENT);
  89. REGISTER_LONG_CONSTANT("CRYPT_STD_DES", PHP_STD_DES_CRYPT, CONST_CS | CONST_PERSISTENT);
  90. REGISTER_LONG_CONSTANT("CRYPT_EXT_DES", PHP_EXT_DES_CRYPT, CONST_CS | CONST_PERSISTENT);
  91. REGISTER_LONG_CONSTANT("CRYPT_MD5", PHP_MD5_CRYPT, CONST_CS | CONST_PERSISTENT);
  92. REGISTER_LONG_CONSTANT("CRYPT_BLOWFISH", PHP_BLOWFISH_CRYPT, CONST_CS | CONST_PERSISTENT);
  93. #ifdef PHP_SHA256_CRYPT
  94. REGISTER_LONG_CONSTANT("CRYPT_SHA256", PHP_SHA256_CRYPT, CONST_CS | CONST_PERSISTENT);
  95. #endif
  96. #ifdef PHP_SHA512_CRYPT
  97. REGISTER_LONG_CONSTANT("CRYPT_SHA512", PHP_SHA512_CRYPT, CONST_CS | CONST_PERSISTENT);
  98. #endif
  99. #if PHP_USE_PHP_CRYPT_R
  100. php_init_crypt_r();
  101. #endif
  102. return SUCCESS;
  103. }
  104. /* }}} */
  105. PHP_MSHUTDOWN_FUNCTION(crypt) /* {{{ */
  106. {
  107. #if PHP_USE_PHP_CRYPT_R
  108. php_shutdown_crypt_r();
  109. #endif
  110. return SUCCESS;
  111. }
  112. /* }}} */
  113. static unsigned char itoa64[] = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
  114. static void php_to64(char *s, long v, int n) /* {{{ */
  115. {
  116. while (--n >= 0) {
  117. *s++ = itoa64[v&0x3f];
  118. v >>= 6;
  119. }
  120. }
  121. /* }}} */
  122. PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result)
  123. {
  124. char *crypt_res;
  125. /* Windows (win32/crypt) has a stripped down version of libxcrypt and
  126. a CryptoApi md5_crypt implementation */
  127. #if PHP_USE_PHP_CRYPT_R
  128. {
  129. struct php_crypt_extended_data buffer;
  130. if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') {
  131. char output[MD5_HASH_MAX_LEN], *out;
  132. out = php_md5_crypt_r(password, salt, output);
  133. if (out) {
  134. *result = estrdup(out);
  135. return SUCCESS;
  136. }
  137. return FAILURE;
  138. } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') {
  139. char *output;
  140. output = emalloc(PHP_MAX_SALT_LEN);
  141. crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
  142. if (!crypt_res) {
  143. memset(output, 0, PHP_MAX_SALT_LEN);
  144. efree(output);
  145. return FAILURE;
  146. } else {
  147. *result = estrdup(output);
  148. memset(output, 0, PHP_MAX_SALT_LEN);
  149. efree(output);
  150. return SUCCESS;
  151. }
  152. } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') {
  153. char *output;
  154. output = emalloc(PHP_MAX_SALT_LEN);
  155. crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
  156. if (!crypt_res) {
  157. memset(output, 0, PHP_MAX_SALT_LEN);
  158. efree(output);
  159. return FAILURE;
  160. } else {
  161. *result = estrdup(output);
  162. memset(output, 0, PHP_MAX_SALT_LEN);
  163. efree(output);
  164. return SUCCESS;
  165. }
  166. } else if (
  167. salt[0] == '$' &&
  168. salt[1] == '2' &&
  169. salt[3] == '$' &&
  170. salt[4] >= '0' && salt[4] <= '3' &&
  171. salt[5] >= '0' && salt[5] <= '9' &&
  172. salt[6] == '$') {
  173. char output[PHP_MAX_SALT_LEN + 1];
  174. memset(output, 0, PHP_MAX_SALT_LEN + 1);
  175. crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
  176. if (!crypt_res) {
  177. memset(output, 0, PHP_MAX_SALT_LEN + 1);
  178. return FAILURE;
  179. } else {
  180. *result = estrdup(output);
  181. memset(output, 0, PHP_MAX_SALT_LEN + 1);
  182. return SUCCESS;
  183. }
  184. } else {
  185. memset(&buffer, 0, sizeof(buffer));
  186. _crypt_extended_init_r();
  187. crypt_res = _crypt_extended_r(password, salt, &buffer);
  188. if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
  189. return FAILURE;
  190. } else {
  191. *result = estrdup(crypt_res);
  192. return SUCCESS;
  193. }
  194. }
  195. }
  196. #else
  197. # if defined(HAVE_CRYPT_R) && (defined(_REENTRANT) || defined(_THREAD_SAFE))
  198. {
  199. # if defined(CRYPT_R_STRUCT_CRYPT_DATA)
  200. struct crypt_data buffer;
  201. memset(&buffer, 0, sizeof(buffer));
  202. # elif defined(CRYPT_R_CRYPTD)
  203. CRYPTD buffer;
  204. # else
  205. # error Data struct used by crypt_r() is unknown. Please report.
  206. # endif
  207. crypt_res = crypt_r(password, salt, &buffer);
  208. }
  209. # elif defined(HAVE_CRYPT)
  210. crypt_res = crypt(password, salt);
  211. # else
  212. # error No crypt() implementation
  213. # endif
  214. #endif
  215. if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
  216. return FAILURE;
  217. } else {
  218. *result = estrdup(crypt_res);
  219. return SUCCESS;
  220. }
  221. }
  222. /* }}} */
  223. /* {{{ proto string crypt(string str [, string salt])
  224. Hash a string */
  225. PHP_FUNCTION(crypt)
  226. {
  227. char salt[PHP_MAX_SALT_LEN + 1];
  228. char *str, *salt_in = NULL, *result = NULL;
  229. int str_len, salt_in_len = 0;
  230. salt[0] = salt[PHP_MAX_SALT_LEN] = '\0';
  231. /* This will produce suitable results if people depend on DES-encryption
  232. * available (passing always 2-character salt). At least for glibc6.1 */
  233. memset(&salt[1], '$', PHP_MAX_SALT_LEN - 1);
  234. if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|s", &str, &str_len, &salt_in, &salt_in_len) == FAILURE) {
  235. return;
  236. }
  237. if (salt_in) {
  238. memcpy(salt, salt_in, MIN(PHP_MAX_SALT_LEN, salt_in_len));
  239. } else {
  240. php_error_docref(NULL TSRMLS_CC, E_NOTICE, "No salt parameter was specified. You must use a randomly generated salt and a strong hash function to produce a secure hash.");
  241. }
  242. /* The automatic salt generation covers standard DES, md5-crypt and Blowfish (simple) */
  243. if (!*salt) {
  244. #if PHP_MD5_CRYPT
  245. strncpy(salt, "$1$", PHP_MAX_SALT_LEN);
  246. php_to64(&salt[3], PHP_CRYPT_RAND, 4);
  247. php_to64(&salt[7], PHP_CRYPT_RAND, 4);
  248. strncpy(&salt[11], "$", PHP_MAX_SALT_LEN - 11);
  249. #elif PHP_STD_DES_CRYPT
  250. php_to64(&salt[0], PHP_CRYPT_RAND, 2);
  251. salt[2] = '\0';
  252. #endif
  253. salt_in_len = strlen(salt);
  254. } else {
  255. salt_in_len = MIN(PHP_MAX_SALT_LEN, salt_in_len);
  256. }
  257. salt[salt_in_len] = '\0';
  258. if (php_crypt(str, str_len, salt, salt_in_len, &result) == FAILURE) {
  259. if (salt[0] == '*' && salt[1] == '0') {
  260. RETURN_STRING("*1", 1);
  261. } else {
  262. RETURN_STRING("*0", 1);
  263. }
  264. }
  265. RETURN_STRING(result, 0);
  266. }
  267. /* }}} */
  268. #endif
  269. /*
  270. * Local variables:
  271. * tab-width: 4
  272. * c-basic-offset: 4
  273. * End:
  274. * vim600: sw=4 ts=4 fdm=marker
  275. * vim<600: sw=4 ts=4
  276. */