crypt_sha512.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822
  1. /* SHA512-based Unix crypt implementation.
  2. Released into the Public Domain by Ulrich Drepper <drepper@redhat.com>. */
  3. /* Windows VC++ port by Pierre Joye <pierre@php.net> */
  4. #include "php.h"
  5. #include "php_main.h"
  6. #include <errno.h>
  7. #include <limits.h>
  8. #ifdef PHP_WIN32
  9. # define __alignof__ __alignof
  10. # define alloca _alloca
  11. #else
  12. # ifndef HAVE_ALIGNOF
  13. # include <stddef.h>
  14. # define __alignof__(type) offsetof (struct { char c; type member;}, member)
  15. # endif
  16. # if HAVE_ATTRIBUTE_ALIGNED
  17. # define ALIGNED(size) __attribute__ ((__aligned__ (size)))
  18. # else
  19. # define ALIGNED(size)
  20. # endif
  21. #endif
  22. #include <stdio.h>
  23. #include <stdlib.h>
  24. #ifdef PHP_WIN32
  25. # include <string.h>
  26. #else
  27. # include <sys/param.h>
  28. # include <sys/types.h>
  29. # if HAVE_STRING_H
  30. # include <string.h>
  31. # else
  32. # include <strings.h>
  33. # endif
  34. #endif
  35. extern void * __php_mempcpy(void * dst, const void * src, size_t len);
  36. extern char * __php_stpncpy(char *dst, const char *src, size_t len);
  37. #ifndef MIN
  38. # define MIN(a, b) (((a) < (b)) ? (a) : (b))
  39. #endif
  40. #ifndef MAX
  41. # define MAX(a, b) (((a) > (b)) ? (a) : (b))
  42. #endif
  43. /* See #51582 */
  44. #ifndef UINT64_C
  45. # define UINT64_C(value) __CONCAT(value, ULL)
  46. #endif
  47. /* Structure to save state of computation between the single steps. */
  48. struct sha512_ctx
  49. {
  50. uint64_t H[8];
  51. uint64_t total[2];
  52. uint64_t buflen;
  53. char buffer[256]; /* NB: always correctly aligned for uint64_t. */
  54. };
  55. #if PHP_WIN32 || (!defined(WORDS_BIGENDIAN))
  56. # define SWAP(n) \
  57. (((n) << 56) \
  58. | (((n) & 0xff00) << 40) \
  59. | (((n) & 0xff0000) << 24) \
  60. | (((n) & 0xff000000) << 8) \
  61. | (((n) >> 8) & 0xff000000) \
  62. | (((n) >> 24) & 0xff0000) \
  63. | (((n) >> 40) & 0xff00) \
  64. | ((n) >> 56))
  65. #else
  66. # define SWAP(n) (n)
  67. #endif
  68. /* This array contains the bytes used to pad the buffer to the next
  69. 64-byte boundary. (FIPS 180-2:5.1.2) */
  70. static const unsigned char fillbuf[128] = { 0x80, 0 /* , 0, 0, ... */ };
  71. /* Constants for SHA512 from FIPS 180-2:4.2.3. */
  72. static const uint64_t K[80] = {
  73. UINT64_C (0x428a2f98d728ae22), UINT64_C (0x7137449123ef65cd),
  74. UINT64_C (0xb5c0fbcfec4d3b2f), UINT64_C (0xe9b5dba58189dbbc),
  75. UINT64_C (0x3956c25bf348b538), UINT64_C (0x59f111f1b605d019),
  76. UINT64_C (0x923f82a4af194f9b), UINT64_C (0xab1c5ed5da6d8118),
  77. UINT64_C (0xd807aa98a3030242), UINT64_C (0x12835b0145706fbe),
  78. UINT64_C (0x243185be4ee4b28c), UINT64_C (0x550c7dc3d5ffb4e2),
  79. UINT64_C (0x72be5d74f27b896f), UINT64_C (0x80deb1fe3b1696b1),
  80. UINT64_C (0x9bdc06a725c71235), UINT64_C (0xc19bf174cf692694),
  81. UINT64_C (0xe49b69c19ef14ad2), UINT64_C (0xefbe4786384f25e3),
  82. UINT64_C (0x0fc19dc68b8cd5b5), UINT64_C (0x240ca1cc77ac9c65),
  83. UINT64_C (0x2de92c6f592b0275), UINT64_C (0x4a7484aa6ea6e483),
  84. UINT64_C (0x5cb0a9dcbd41fbd4), UINT64_C (0x76f988da831153b5),
  85. UINT64_C (0x983e5152ee66dfab), UINT64_C (0xa831c66d2db43210),
  86. UINT64_C (0xb00327c898fb213f), UINT64_C (0xbf597fc7beef0ee4),
  87. UINT64_C (0xc6e00bf33da88fc2), UINT64_C (0xd5a79147930aa725),
  88. UINT64_C (0x06ca6351e003826f), UINT64_C (0x142929670a0e6e70),
  89. UINT64_C (0x27b70a8546d22ffc), UINT64_C (0x2e1b21385c26c926),
  90. UINT64_C (0x4d2c6dfc5ac42aed), UINT64_C (0x53380d139d95b3df),
  91. UINT64_C (0x650a73548baf63de), UINT64_C (0x766a0abb3c77b2a8),
  92. UINT64_C (0x81c2c92e47edaee6), UINT64_C (0x92722c851482353b),
  93. UINT64_C (0xa2bfe8a14cf10364), UINT64_C (0xa81a664bbc423001),
  94. UINT64_C (0xc24b8b70d0f89791), UINT64_C (0xc76c51a30654be30),
  95. UINT64_C (0xd192e819d6ef5218), UINT64_C (0xd69906245565a910),
  96. UINT64_C (0xf40e35855771202a), UINT64_C (0x106aa07032bbd1b8),
  97. UINT64_C (0x19a4c116b8d2d0c8), UINT64_C (0x1e376c085141ab53),
  98. UINT64_C (0x2748774cdf8eeb99), UINT64_C (0x34b0bcb5e19b48a8),
  99. UINT64_C (0x391c0cb3c5c95a63), UINT64_C (0x4ed8aa4ae3418acb),
  100. UINT64_C (0x5b9cca4f7763e373), UINT64_C (0x682e6ff3d6b2b8a3),
  101. UINT64_C (0x748f82ee5defb2fc), UINT64_C (0x78a5636f43172f60),
  102. UINT64_C (0x84c87814a1f0ab72), UINT64_C (0x8cc702081a6439ec),
  103. UINT64_C (0x90befffa23631e28), UINT64_C (0xa4506cebde82bde9),
  104. UINT64_C (0xbef9a3f7b2c67915), UINT64_C (0xc67178f2e372532b),
  105. UINT64_C (0xca273eceea26619c), UINT64_C (0xd186b8c721c0c207),
  106. UINT64_C (0xeada7dd6cde0eb1e), UINT64_C (0xf57d4f7fee6ed178),
  107. UINT64_C (0x06f067aa72176fba), UINT64_C (0x0a637dc5a2c898a6),
  108. UINT64_C (0x113f9804bef90dae), UINT64_C (0x1b710b35131c471b),
  109. UINT64_C (0x28db77f523047d84), UINT64_C (0x32caab7b40c72493),
  110. UINT64_C (0x3c9ebe0a15c9bebc), UINT64_C (0x431d67c49c100d4c),
  111. UINT64_C (0x4cc5d4becb3e42b6), UINT64_C (0x597f299cfc657e2a),
  112. UINT64_C (0x5fcb6fab3ad6faec), UINT64_C (0x6c44198c4a475817)
  113. };
  114. /* Process LEN bytes of BUFFER, accumulating context into CTX.
  115. It is assumed that LEN % 128 == 0. */
  116. static void
  117. sha512_process_block(const void *buffer, size_t len, struct sha512_ctx *ctx) {
  118. const uint64_t *words = buffer;
  119. size_t nwords = len / sizeof(uint64_t);
  120. uint64_t a = ctx->H[0];
  121. uint64_t b = ctx->H[1];
  122. uint64_t c = ctx->H[2];
  123. uint64_t d = ctx->H[3];
  124. uint64_t e = ctx->H[4];
  125. uint64_t f = ctx->H[5];
  126. uint64_t g = ctx->H[6];
  127. uint64_t h = ctx->H[7];
  128. /* First increment the byte count. FIPS 180-2 specifies the possible
  129. length of the file up to 2^128 bits. Here we only compute the
  130. number of bytes. Do a double word increment. */
  131. ctx->total[0] += len;
  132. if (ctx->total[0] < len) {
  133. ++ctx->total[1];
  134. }
  135. /* Process all bytes in the buffer with 128 bytes in each round of
  136. the loop. */
  137. while (nwords > 0) {
  138. uint64_t W[80];
  139. uint64_t a_save = a;
  140. uint64_t b_save = b;
  141. uint64_t c_save = c;
  142. uint64_t d_save = d;
  143. uint64_t e_save = e;
  144. uint64_t f_save = f;
  145. uint64_t g_save = g;
  146. uint64_t h_save = h;
  147. unsigned int t;
  148. /* Operators defined in FIPS 180-2:4.1.2. */
  149. #define Ch(x, y, z) ((x & y) ^ (~x & z))
  150. #define Maj(x, y, z) ((x & y) ^ (x & z) ^ (y & z))
  151. #define S0(x) (CYCLIC (x, 28) ^ CYCLIC (x, 34) ^ CYCLIC (x, 39))
  152. #define S1(x) (CYCLIC (x, 14) ^ CYCLIC (x, 18) ^ CYCLIC (x, 41))
  153. #define R0(x) (CYCLIC (x, 1) ^ CYCLIC (x, 8) ^ (x >> 7))
  154. #define R1(x) (CYCLIC (x, 19) ^ CYCLIC (x, 61) ^ (x >> 6))
  155. /* It is unfortunate that C does not provide an operator for
  156. cyclic rotation. Hope the C compiler is smart enough. */
  157. #define CYCLIC(w, s) ((w >> s) | (w << (64 - s)))
  158. /* Compute the message schedule according to FIPS 180-2:6.3.2 step 2. */
  159. for (t = 0; t < 16; ++t) {
  160. W[t] = SWAP (*words);
  161. ++words;
  162. }
  163. for (t = 16; t < 80; ++t) {
  164. W[t] = R1 (W[t - 2]) + W[t - 7] + R0 (W[t - 15]) + W[t - 16];
  165. }
  166. /* The actual computation according to FIPS 180-2:6.3.2 step 3. */
  167. for (t = 0; t < 80; ++t) {
  168. uint64_t T1 = h + S1 (e) + Ch (e, f, g) + K[t] + W[t];
  169. uint64_t T2 = S0 (a) + Maj (a, b, c);
  170. h = g;
  171. g = f;
  172. f = e;
  173. e = d + T1;
  174. d = c;
  175. c = b;
  176. b = a;
  177. a = T1 + T2;
  178. }
  179. /* Add the starting values of the context according to FIPS 180-2:6.3.2
  180. step 4. */
  181. a += a_save;
  182. b += b_save;
  183. c += c_save;
  184. d += d_save;
  185. e += e_save;
  186. f += f_save;
  187. g += g_save;
  188. h += h_save;
  189. /* Prepare for the next round. */
  190. nwords -= 16;
  191. }
  192. /* Put checksum in context given as argument. */
  193. ctx->H[0] = a;
  194. ctx->H[1] = b;
  195. ctx->H[2] = c;
  196. ctx->H[3] = d;
  197. ctx->H[4] = e;
  198. ctx->H[5] = f;
  199. ctx->H[6] = g;
  200. ctx->H[7] = h;
  201. }
  202. /* Initialize structure containing state of computation.
  203. (FIPS 180-2:5.3.3) */
  204. static void sha512_init_ctx (struct sha512_ctx *ctx) {
  205. ctx->H[0] = UINT64_C (0x6a09e667f3bcc908);
  206. ctx->H[1] = UINT64_C (0xbb67ae8584caa73b);
  207. ctx->H[2] = UINT64_C (0x3c6ef372fe94f82b);
  208. ctx->H[3] = UINT64_C (0xa54ff53a5f1d36f1);
  209. ctx->H[4] = UINT64_C (0x510e527fade682d1);
  210. ctx->H[5] = UINT64_C (0x9b05688c2b3e6c1f);
  211. ctx->H[6] = UINT64_C (0x1f83d9abfb41bd6b);
  212. ctx->H[7] = UINT64_C (0x5be0cd19137e2179);
  213. ctx->total[0] = ctx->total[1] = 0;
  214. ctx->buflen = 0;
  215. }
  216. /* Process the remaining bytes in the internal buffer and the usual
  217. prolog according to the standard and write the result to RESBUF.
  218. IMPORTANT: On some systems it is required that RESBUF is correctly
  219. aligned for a 32 bits value. */
  220. static void * sha512_finish_ctx (struct sha512_ctx *ctx, void *resbuf) {
  221. /* Take yet unprocessed bytes into account. */
  222. uint64_t bytes = ctx->buflen;
  223. size_t pad;
  224. unsigned int i;
  225. /* Now count remaining bytes. */
  226. ctx->total[0] += bytes;
  227. if (ctx->total[0] < bytes) {
  228. ++ctx->total[1];
  229. }
  230. pad = bytes >= 112 ? 128 + 112 - (size_t)bytes : 112 - (size_t)bytes;
  231. memcpy(&ctx->buffer[bytes], fillbuf, pad);
  232. /* Put the 128-bit file length in *bits* at the end of the buffer. */
  233. *(uint64_t *) &ctx->buffer[bytes + pad + 8] = SWAP(ctx->total[0] << 3);
  234. *(uint64_t *) &ctx->buffer[bytes + pad] = SWAP((ctx->total[1] << 3) |
  235. (ctx->total[0] >> 61));
  236. /* Process last bytes. */
  237. sha512_process_block(ctx->buffer, (size_t)(bytes + pad + 16), ctx);
  238. /* Put result from CTX in first 64 bytes following RESBUF. */
  239. for (i = 0; i < 8; ++i) {
  240. ((uint64_t *) resbuf)[i] = SWAP(ctx->H[i]);
  241. }
  242. return resbuf;
  243. }
  244. static void
  245. sha512_process_bytes(const void *buffer, size_t len, struct sha512_ctx *ctx) {
  246. /* When we already have some bits in our internal buffer concatenate
  247. both inputs first. */
  248. if (ctx->buflen != 0) {
  249. size_t left_over = (size_t)ctx->buflen;
  250. size_t add = (size_t)(256 - left_over > len ? len : 256 - left_over);
  251. memcpy(&ctx->buffer[left_over], buffer, add);
  252. ctx->buflen += add;
  253. if (ctx->buflen > 128) {
  254. sha512_process_block(ctx->buffer, ctx->buflen & ~127, ctx);
  255. ctx->buflen &= 127;
  256. /* The regions in the following copy operation cannot overlap. */
  257. memcpy(ctx->buffer, &ctx->buffer[(left_over + add) & ~127],
  258. (size_t)ctx->buflen);
  259. }
  260. buffer = (const char *) buffer + add;
  261. len -= add;
  262. }
  263. /* Process available complete blocks. */
  264. if (len >= 128) {
  265. #if !_STRING_ARCH_unaligned
  266. /* To check alignment gcc has an appropriate operator. Other
  267. compilers don't. */
  268. # if __GNUC__ >= 2
  269. # define UNALIGNED_P(p) (((uintptr_t) p) % __alignof__ (uint64_t) != 0)
  270. # else
  271. # define UNALIGNED_P(p) (((uintptr_t) p) % sizeof(uint64_t) != 0)
  272. # endif
  273. if (UNALIGNED_P(buffer))
  274. while (len > 128) {
  275. sha512_process_block(memcpy(ctx->buffer, buffer, 128), 128, ctx);
  276. buffer = (const char *) buffer + 128;
  277. len -= 128;
  278. }
  279. else
  280. #endif
  281. {
  282. sha512_process_block(buffer, len & ~127, ctx);
  283. buffer = (const char *) buffer + (len & ~127);
  284. len &= 127;
  285. }
  286. }
  287. /* Move remaining bytes into internal buffer. */
  288. if (len > 0) {
  289. size_t left_over = (size_t)ctx->buflen;
  290. memcpy(&ctx->buffer[left_over], buffer, len);
  291. left_over += len;
  292. if (left_over >= 128) {
  293. sha512_process_block(ctx->buffer, 128, ctx);
  294. left_over -= 128;
  295. memcpy(ctx->buffer, &ctx->buffer[128], left_over);
  296. }
  297. ctx->buflen = left_over;
  298. }
  299. }
  300. /* Define our magic string to mark salt for SHA512 "encryption"
  301. replacement. */
  302. static const char sha512_salt_prefix[] = "$6$";
  303. /* Prefix for optional rounds specification. */
  304. static const char sha512_rounds_prefix[] = "rounds=";
  305. /* Maximum salt string length. */
  306. #define SALT_LEN_MAX 16
  307. /* Default number of rounds if not explicitly specified. */
  308. #define ROUNDS_DEFAULT 5000
  309. /* Minimum number of rounds. */
  310. #define ROUNDS_MIN 1000
  311. /* Maximum number of rounds. */
  312. #define ROUNDS_MAX 999999999
  313. /* Table with characters for base64 transformation. */
  314. static const char b64t[64] =
  315. "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
  316. char *
  317. php_sha512_crypt_r(const char *key, const char *salt, char *buffer, int buflen) {
  318. #ifdef PHP_WIN32
  319. # if _MSC <= 1300
  320. # pragma pack(push, 16)
  321. unsigned char alt_result[64];
  322. unsigned char temp_result[64];
  323. # pragma pack(pop)
  324. # else
  325. __declspec(align(64)) unsigned char alt_result[64];
  326. __declspec(align(64)) unsigned char temp_result[64];
  327. # endif
  328. #else
  329. unsigned char alt_result[64] ALIGNED(__alignof__ (uint64_t));
  330. unsigned char temp_result[64] ALIGNED(__alignof__ (uint64_t));
  331. #endif
  332. struct sha512_ctx ctx;
  333. struct sha512_ctx alt_ctx;
  334. size_t salt_len;
  335. size_t key_len;
  336. size_t cnt;
  337. char *cp;
  338. char *copied_key = NULL;
  339. char *copied_salt = NULL;
  340. char *p_bytes;
  341. char *s_bytes;
  342. /* Default number of rounds. */
  343. size_t rounds = ROUNDS_DEFAULT;
  344. zend_bool rounds_custom = 0;
  345. /* Find beginning of salt string. The prefix should normally always
  346. be present. Just in case it is not. */
  347. if (strncmp(sha512_salt_prefix, salt, sizeof(sha512_salt_prefix) - 1) == 0) {
  348. /* Skip salt prefix. */
  349. salt += sizeof(sha512_salt_prefix) - 1;
  350. }
  351. if (strncmp(salt, sha512_rounds_prefix, sizeof(sha512_rounds_prefix) - 1) == 0) {
  352. const char *num = salt + sizeof(sha512_rounds_prefix) - 1;
  353. char *endp;
  354. unsigned long int srounds = strtoul(num, &endp, 10);
  355. if (*endp == '$') {
  356. salt = endp + 1;
  357. rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX));
  358. rounds_custom = 1;
  359. }
  360. }
  361. salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
  362. key_len = strlen(key);
  363. if ((key - (char *) 0) % __alignof__ (uint64_t) != 0) {
  364. char *tmp = (char *) alloca (key_len + __alignof__ (uint64_t));
  365. key = copied_key =
  366. memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_t), key, key_len);
  367. }
  368. if ((salt - (char *) 0) % __alignof__ (uint64_t) != 0) {
  369. char *tmp = (char *) alloca(salt_len + 1 + __alignof__(uint64_t));
  370. salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_t), salt, salt_len);
  371. copied_salt[salt_len] = 0;
  372. }
  373. /* Prepare for the real work. */
  374. sha512_init_ctx(&ctx);
  375. /* Add the key string. */
  376. sha512_process_bytes(key, key_len, &ctx);
  377. /* The last part is the salt string. This must be at most 16
  378. characters and it ends at the first `$' character (for
  379. compatibility with existing implementations). */
  380. sha512_process_bytes(salt, salt_len, &ctx);
  381. /* Compute alternate SHA512 sum with input KEY, SALT, and KEY. The
  382. final result will be added to the first context. */
  383. sha512_init_ctx(&alt_ctx);
  384. /* Add key. */
  385. sha512_process_bytes(key, key_len, &alt_ctx);
  386. /* Add salt. */
  387. sha512_process_bytes(salt, salt_len, &alt_ctx);
  388. /* Add key again. */
  389. sha512_process_bytes(key, key_len, &alt_ctx);
  390. /* Now get result of this (64 bytes) and add it to the other
  391. context. */
  392. sha512_finish_ctx(&alt_ctx, alt_result);
  393. /* Add for any character in the key one byte of the alternate sum. */
  394. for (cnt = key_len; cnt > 64; cnt -= 64) {
  395. sha512_process_bytes(alt_result, 64, &ctx);
  396. }
  397. sha512_process_bytes(alt_result, cnt, &ctx);
  398. /* Take the binary representation of the length of the key and for every
  399. 1 add the alternate sum, for every 0 the key. */
  400. for (cnt = key_len; cnt > 0; cnt >>= 1) {
  401. if ((cnt & 1) != 0) {
  402. sha512_process_bytes(alt_result, 64, &ctx);
  403. } else {
  404. sha512_process_bytes(key, key_len, &ctx);
  405. }
  406. }
  407. /* Create intermediate result. */
  408. sha512_finish_ctx(&ctx, alt_result);
  409. /* Start computation of P byte sequence. */
  410. sha512_init_ctx(&alt_ctx);
  411. /* For every character in the password add the entire password. */
  412. for (cnt = 0; cnt < key_len; ++cnt) {
  413. sha512_process_bytes(key, key_len, &alt_ctx);
  414. }
  415. /* Finish the digest. */
  416. sha512_finish_ctx(&alt_ctx, temp_result);
  417. /* Create byte sequence P. */
  418. cp = p_bytes = alloca(key_len);
  419. for (cnt = key_len; cnt >= 64; cnt -= 64) {
  420. cp = __php_mempcpy((void *) cp, (const void *)temp_result, 64);
  421. }
  422. memcpy(cp, temp_result, cnt);
  423. /* Start computation of S byte sequence. */
  424. sha512_init_ctx(&alt_ctx);
  425. /* For every character in the password add the entire password. */
  426. for (cnt = 0; cnt < (size_t) (16 + alt_result[0]); ++cnt) {
  427. sha512_process_bytes(salt, salt_len, &alt_ctx);
  428. }
  429. /* Finish the digest. */
  430. sha512_finish_ctx(&alt_ctx, temp_result);
  431. /* Create byte sequence S. */
  432. cp = s_bytes = alloca(salt_len);
  433. for (cnt = salt_len; cnt >= 64; cnt -= 64) {
  434. cp = __php_mempcpy(cp, temp_result, 64);
  435. }
  436. memcpy(cp, temp_result, cnt);
  437. /* Repeatedly run the collected hash value through SHA512 to burn
  438. CPU cycles. */
  439. for (cnt = 0; cnt < rounds; ++cnt) {
  440. /* New context. */
  441. sha512_init_ctx(&ctx);
  442. /* Add key or last result. */
  443. if ((cnt & 1) != 0) {
  444. sha512_process_bytes(p_bytes, key_len, &ctx);
  445. } else {
  446. sha512_process_bytes(alt_result, 64, &ctx);
  447. }
  448. /* Add salt for numbers not divisible by 3. */
  449. if (cnt % 3 != 0) {
  450. sha512_process_bytes(s_bytes, salt_len, &ctx);
  451. }
  452. /* Add key for numbers not divisible by 7. */
  453. if (cnt % 7 != 0) {
  454. sha512_process_bytes(p_bytes, key_len, &ctx);
  455. }
  456. /* Add key or last result. */
  457. if ((cnt & 1) != 0) {
  458. sha512_process_bytes(alt_result, 64, &ctx);
  459. } else {
  460. sha512_process_bytes(p_bytes, key_len, &ctx);
  461. }
  462. /* Create intermediate result. */
  463. sha512_finish_ctx(&ctx, alt_result);
  464. }
  465. /* Now we can construct the result string. It consists of three
  466. parts. */
  467. cp = __php_stpncpy(buffer, sha512_salt_prefix, MAX(0, buflen));
  468. buflen -= sizeof(sha512_salt_prefix) - 1;
  469. if (rounds_custom) {
  470. #ifdef PHP_WIN32
  471. int n = _snprintf(cp, MAX(0, buflen), "%s%u$", sha512_rounds_prefix, rounds);
  472. #else
  473. int n = snprintf(cp, MAX(0, buflen), "%s%zu$", sha512_rounds_prefix, rounds);
  474. #endif
  475. cp += n;
  476. buflen -= n;
  477. }
  478. cp = __php_stpncpy(cp, salt, MIN((size_t) MAX(0, buflen), salt_len));
  479. buflen -= (int) MIN((size_t) MAX(0, buflen), salt_len);
  480. if (buflen > 0) {
  481. *cp++ = '$';
  482. --buflen;
  483. }
  484. #define b64_from_24bit(B2, B1, B0, N) \
  485. do { \
  486. unsigned int w = ((B2) << 16) | ((B1) << 8) | (B0); \
  487. int n = (N); \
  488. while (n-- > 0 && buflen > 0) \
  489. { \
  490. *cp++ = b64t[w & 0x3f]; \
  491. --buflen; \
  492. w >>= 6; \
  493. } \
  494. } while (0)
  495. b64_from_24bit(alt_result[0], alt_result[21], alt_result[42], 4);
  496. b64_from_24bit(alt_result[22], alt_result[43], alt_result[1], 4);
  497. b64_from_24bit(alt_result[44], alt_result[2], alt_result[23], 4);
  498. b64_from_24bit(alt_result[3], alt_result[24], alt_result[45], 4);
  499. b64_from_24bit(alt_result[25], alt_result[46], alt_result[4], 4);
  500. b64_from_24bit(alt_result[47], alt_result[5], alt_result[26], 4);
  501. b64_from_24bit(alt_result[6], alt_result[27], alt_result[48], 4);
  502. b64_from_24bit(alt_result[28], alt_result[49], alt_result[7], 4);
  503. b64_from_24bit(alt_result[50], alt_result[8], alt_result[29], 4);
  504. b64_from_24bit(alt_result[9], alt_result[30], alt_result[51], 4);
  505. b64_from_24bit(alt_result[31], alt_result[52], alt_result[10], 4);
  506. b64_from_24bit(alt_result[53], alt_result[11], alt_result[32], 4);
  507. b64_from_24bit(alt_result[12], alt_result[33], alt_result[54], 4);
  508. b64_from_24bit(alt_result[34], alt_result[55], alt_result[13], 4);
  509. b64_from_24bit(alt_result[56], alt_result[14], alt_result[35], 4);
  510. b64_from_24bit(alt_result[15], alt_result[36], alt_result[57], 4);
  511. b64_from_24bit(alt_result[37], alt_result[58], alt_result[16], 4);
  512. b64_from_24bit(alt_result[59], alt_result[17], alt_result[38], 4);
  513. b64_from_24bit(alt_result[18], alt_result[39], alt_result[60], 4);
  514. b64_from_24bit(alt_result[40], alt_result[61], alt_result[19], 4);
  515. b64_from_24bit(alt_result[62], alt_result[20], alt_result[41], 4);
  516. b64_from_24bit(0, 0, alt_result[63], 2);
  517. if (buflen <= 0) {
  518. errno = ERANGE;
  519. buffer = NULL;
  520. } else {
  521. *cp = '\0'; /* Terminate the string. */
  522. }
  523. /* Clear the buffer for the intermediate result so that people
  524. attaching to processes or reading core dumps cannot get any
  525. information. We do it in this way to clear correct_words[]
  526. inside the SHA512 implementation as well. */
  527. sha512_init_ctx(&ctx);
  528. sha512_finish_ctx(&ctx, alt_result);
  529. memset(temp_result, '\0', sizeof(temp_result));
  530. memset(p_bytes, '\0', key_len);
  531. memset(s_bytes, '\0', salt_len);
  532. memset(&ctx, '\0', sizeof(ctx));
  533. memset(&alt_ctx, '\0', sizeof(alt_ctx));
  534. if (copied_key != NULL) {
  535. memset(copied_key, '\0', key_len);
  536. }
  537. if (copied_salt != NULL) {
  538. memset(copied_salt, '\0', salt_len);
  539. }
  540. return buffer;
  541. }
  542. /* This entry point is equivalent to the `crypt' function in Unix
  543. libcs. */
  544. char *
  545. php_sha512_crypt(const char *key, const char *salt) {
  546. /* We don't want to have an arbitrary limit in the size of the
  547. password. We can compute an upper bound for the size of the
  548. result in advance and so we can prepare the buffer we pass to
  549. `sha512_crypt_r'. */
  550. static char *buffer;
  551. static int buflen;
  552. int needed = (int)(sizeof(sha512_salt_prefix) - 1
  553. + sizeof(sha512_rounds_prefix) + 9 + 1
  554. + strlen(salt) + 1 + 86 + 1);
  555. if (buflen < needed) {
  556. char *new_buffer = (char *) realloc(buffer, needed);
  557. if (new_buffer == NULL) {
  558. return NULL;
  559. }
  560. buffer = new_buffer;
  561. buflen = needed;
  562. }
  563. return php_sha512_crypt_r (key, salt, buffer, buflen);
  564. }
  565. #ifdef TEST
  566. static const struct {
  567. const char *input;
  568. const char result[64];
  569. } tests[] =
  570. {
  571. /* Test vectors from FIPS 180-2: appendix C.1. */
  572. { "abc",
  573. "\xdd\xaf\x35\xa1\x93\x61\x7a\xba\xcc\x41\x73\x49\xae\x20\x41\x31"
  574. "\x12\xe6\xfa\x4e\x89\xa9\x7e\xa2\x0a\x9e\xee\xe6\x4b\x55\xd3\x9a"
  575. "\x21\x92\x99\x2a\x27\x4f\xc1\xa8\x36\xba\x3c\x23\xa3\xfe\xeb\xbd"
  576. "\x45\x4d\x44\x23\x64\x3c\xe8\x0e\x2a\x9a\xc9\x4f\xa5\x4c\xa4\x9f" },
  577. /* Test vectors from FIPS 180-2: appendix C.2. */
  578. { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn"
  579. "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
  580. "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14\x3f"
  581. "\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88\x90\x18"
  582. "\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4\xb5\x43\x3a"
  583. "\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b\x87\x4b\xe9\x09" },
  584. /* Test vectors from the NESSIE project. */
  585. { "",
  586. "\xcf\x83\xe1\x35\x7e\xef\xb8\xbd\xf1\x54\x28\x50\xd6\x6d\x80\x07"
  587. "\xd6\x20\xe4\x05\x0b\x57\x15\xdc\x83\xf4\xa9\x21\xd3\x6c\xe9\xce"
  588. "\x47\xd0\xd1\x3c\x5d\x85\xf2\xb0\xff\x83\x18\xd2\x87\x7e\xec\x2f"
  589. "\x63\xb9\x31\xbd\x47\x41\x7a\x81\xa5\x38\x32\x7a\xf9\x27\xda\x3e" },
  590. { "a",
  591. "\x1f\x40\xfc\x92\xda\x24\x16\x94\x75\x09\x79\xee\x6c\xf5\x82\xf2"
  592. "\xd5\xd7\xd2\x8e\x18\x33\x5d\xe0\x5a\xbc\x54\xd0\x56\x0e\x0f\x53"
  593. "\x02\x86\x0c\x65\x2b\xf0\x8d\x56\x02\x52\xaa\x5e\x74\x21\x05\x46"
  594. "\xf3\x69\xfb\xbb\xce\x8c\x12\xcf\xc7\x95\x7b\x26\x52\xfe\x9a\x75" },
  595. { "message digest",
  596. "\x10\x7d\xbf\x38\x9d\x9e\x9f\x71\xa3\xa9\x5f\x6c\x05\x5b\x92\x51"
  597. "\xbc\x52\x68\xc2\xbe\x16\xd6\xc1\x34\x92\xea\x45\xb0\x19\x9f\x33"
  598. "\x09\xe1\x64\x55\xab\x1e\x96\x11\x8e\x8a\x90\x5d\x55\x97\xb7\x20"
  599. "\x38\xdd\xb3\x72\xa8\x98\x26\x04\x6d\xe6\x66\x87\xbb\x42\x0e\x7c" },
  600. { "abcdefghijklmnopqrstuvwxyz",
  601. "\x4d\xbf\xf8\x6c\xc2\xca\x1b\xae\x1e\x16\x46\x8a\x05\xcb\x98\x81"
  602. "\xc9\x7f\x17\x53\xbc\xe3\x61\x90\x34\x89\x8f\xaa\x1a\xab\xe4\x29"
  603. "\x95\x5a\x1b\xf8\xec\x48\x3d\x74\x21\xfe\x3c\x16\x46\x61\x3a\x59"
  604. "\xed\x54\x41\xfb\x0f\x32\x13\x89\xf7\x7f\x48\xa8\x79\xc7\xb1\xf1" },
  605. { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
  606. "\x20\x4a\x8f\xc6\xdd\xa8\x2f\x0a\x0c\xed\x7b\xeb\x8e\x08\xa4\x16"
  607. "\x57\xc1\x6e\xf4\x68\xb2\x28\xa8\x27\x9b\xe3\x31\xa7\x03\xc3\x35"
  608. "\x96\xfd\x15\xc1\x3b\x1b\x07\xf9\xaa\x1d\x3b\xea\x57\x78\x9c\xa0"
  609. "\x31\xad\x85\xc7\xa7\x1d\xd7\x03\x54\xec\x63\x12\x38\xca\x34\x45" },
  610. { "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
  611. "\x1e\x07\xbe\x23\xc2\x6a\x86\xea\x37\xea\x81\x0c\x8e\xc7\x80\x93"
  612. "\x52\x51\x5a\x97\x0e\x92\x53\xc2\x6f\x53\x6c\xfc\x7a\x99\x96\xc4"
  613. "\x5c\x83\x70\x58\x3e\x0a\x78\xfa\x4a\x90\x04\x1d\x71\xa4\xce\xab"
  614. "\x74\x23\xf1\x9c\x71\xb9\xd5\xa3\xe0\x12\x49\xf0\xbe\xbd\x58\x94" },
  615. { "123456789012345678901234567890123456789012345678901234567890"
  616. "12345678901234567890",
  617. "\x72\xec\x1e\xf1\x12\x4a\x45\xb0\x47\xe8\xb7\xc7\x5a\x93\x21\x95"
  618. "\x13\x5b\xb6\x1d\xe2\x4e\xc0\xd1\x91\x40\x42\x24\x6e\x0a\xec\x3a"
  619. "\x23\x54\xe0\x93\xd7\x6f\x30\x48\xb4\x56\x76\x43\x46\x90\x0c\xb1"
  620. "\x30\xd2\xa4\xfd\x5d\xd1\x6a\xbb\x5e\x30\xbc\xb8\x50\xde\xe8\x43" }
  621. };
  622. #define ntests (sizeof (tests) / sizeof (tests[0]))
  623. static const struct
  624. {
  625. const char *salt;
  626. const char *input;
  627. const char *expected;
  628. } tests2[] = {
  629. { "$6$saltstring", "Hello world!",
  630. "$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJu"
  631. "esI68u4OTLiBFdcbYEdFCoEOfaS35inz1"},
  632. { "$6$rounds=10000$saltstringsaltstring", "Hello world!",
  633. "$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sb"
  634. "HbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v." },
  635. { "$6$rounds=5000$toolongsaltstring", "This is just a test",
  636. "$6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQ"
  637. "zQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0" },
  638. { "$6$rounds=1400$anotherlongsaltstring",
  639. "a very much longer text to encrypt. This one even stretches over more"
  640. "than one line.",
  641. "$6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wP"
  642. "vMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1" },
  643. { "$6$rounds=77777$short",
  644. "we have a short salt string but not a short password",
  645. "$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0g"
  646. "ge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0" },
  647. { "$6$rounds=123456$asaltof16chars..", "a short string",
  648. "$6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwc"
  649. "elCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1" },
  650. { "$6$rounds=10$roundstoolow", "the minimum number is still observed",
  651. "$6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1x"
  652. "hLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX." },
  653. };
  654. #define ntests2 (sizeof (tests2) / sizeof (tests2[0]))
  655. int main (void) {
  656. struct sha512_ctx ctx;
  657. char sum[64];
  658. int result = 0;
  659. int cnt;
  660. int i;
  661. char buf[1000];
  662. static const char expected[64] =
  663. "\xe7\x18\x48\x3d\x0c\xe7\x69\x64\x4e\x2e\x42\xc7\xbc\x15\xb4\x63"
  664. "\x8e\x1f\x98\xb1\x3b\x20\x44\x28\x56\x32\xa8\x03\xaf\xa9\x73\xeb"
  665. "\xde\x0f\xf2\x44\x87\x7e\xa6\x0a\x4c\xb0\x43\x2c\xe5\x77\xc3\x1b"
  666. "\xeb\x00\x9c\x5c\x2c\x49\xaa\x2e\x4e\xad\xb2\x17\xad\x8c\xc0\x9b";
  667. for (cnt = 0; cnt < (int) ntests; ++cnt) {
  668. sha512_init_ctx (&ctx);
  669. sha512_process_bytes (tests[cnt].input, strlen (tests[cnt].input), &ctx);
  670. sha512_finish_ctx (&ctx, sum);
  671. if (memcmp (tests[cnt].result, sum, 64) != 0) {
  672. printf ("test %d run %d failed\n", cnt, 1);
  673. result = 1;
  674. }
  675. sha512_init_ctx (&ctx);
  676. for (i = 0; tests[cnt].input[i] != '\0'; ++i) {
  677. sha512_process_bytes (&tests[cnt].input[i], 1, &ctx);
  678. }
  679. sha512_finish_ctx (&ctx, sum);
  680. if (memcmp (tests[cnt].result, sum, 64) != 0) {
  681. printf ("test %d run %d failed\n", cnt, 2);
  682. result = 1;
  683. }
  684. }
  685. /* Test vector from FIPS 180-2: appendix C.3. */
  686. memset (buf, 'a', sizeof (buf));
  687. sha512_init_ctx (&ctx);
  688. for (i = 0; i < 1000; ++i) {
  689. sha512_process_bytes (buf, sizeof (buf), &ctx);
  690. }
  691. sha512_finish_ctx (&ctx, sum);
  692. if (memcmp (expected, sum, 64) != 0) {
  693. printf ("test %d failed\n", cnt);
  694. result = 1;
  695. }
  696. for (cnt = 0; cnt < ntests2; ++cnt) {
  697. char *cp = php_sha512_crypt(tests2[cnt].input, tests2[cnt].salt);
  698. if (strcmp (cp, tests2[cnt].expected) != 0) {
  699. printf ("test %d: expected \"%s\", got \"%s\"\n",
  700. cnt, tests2[cnt].expected, cp);
  701. result = 1;
  702. }
  703. }
  704. if (result == 0) {
  705. puts ("all tests OK");
  706. }
  707. return result;
  708. }
  709. #endif