123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294 |
- /*
- +----------------------------------------------------------------------+
- | PHP Version 7 |
- +----------------------------------------------------------------------+
- | Copyright (c) 1997-2018 The PHP Group |
- +----------------------------------------------------------------------+
- | This source file is subject to version 3.01 of the PHP license, |
- | that is bundled with this package in the file LICENSE, and is |
- | available through the world-wide-web at the following url: |
- | http://www.php.net/license/3_01.txt |
- | If you did not receive a copy of the PHP license and are unable to |
- | obtain it through the world-wide-web, please send a note to |
- | license@php.net so we can mail you a copy immediately. |
- +----------------------------------------------------------------------+
- | Authors: Stig Bakken <ssb@php.net> |
- | Zeev Suraski <zeev@php.net> |
- | Rasmus Lerdorf <rasmus@php.net> |
- | Pierre Joye <pierre@php.net> |
- +----------------------------------------------------------------------+
- */
- #include <stdlib.h>
- #include "php.h"
- #if HAVE_UNISTD_H
- #include <unistd.h>
- #endif
- #if PHP_USE_PHP_CRYPT_R
- # include "php_crypt_r.h"
- # include "crypt_freesec.h"
- #else
- # if HAVE_CRYPT_H
- # if defined(CRYPT_R_GNU_SOURCE) && !defined(_GNU_SOURCE)
- # define _GNU_SOURCE
- # endif
- # include <crypt.h>
- # endif
- #endif
- #if TM_IN_SYS_TIME
- #include <sys/time.h>
- #else
- #include <time.h>
- #endif
- #if HAVE_STRING_H
- #include <string.h>
- #else
- #include <strings.h>
- #endif
- #ifdef PHP_WIN32
- #include <process.h>
- #endif
- #include "php_crypt.h"
- #include "php_random.h"
- /* sha512 crypt has the maximal salt length of 123 characters */
- #define PHP_MAX_SALT_LEN 123
- /* Used to check DES salts to ensure that they contain only valid characters */
- #define IS_VALID_SALT_CHARACTER(c) (((c) >= '.' && (c) <= '9') || ((c) >= 'A' && (c) <= 'Z') || ((c) >= 'a' && (c) <= 'z'))
- #define DES_INVALID_SALT_ERROR "Supplied salt is not valid for DES. Possible bug in provided salt format."
- PHP_MINIT_FUNCTION(crypt) /* {{{ */
- {
- REGISTER_LONG_CONSTANT("CRYPT_SALT_LENGTH", PHP_MAX_SALT_LEN, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_STD_DES", 1, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_EXT_DES", 1, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_MD5", 1, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_BLOWFISH", 1, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_SHA256", 1, CONST_CS | CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("CRYPT_SHA512", 1, CONST_CS | CONST_PERSISTENT);
- #if PHP_USE_PHP_CRYPT_R
- php_init_crypt_r();
- #endif
- return SUCCESS;
- }
- /* }}} */
- PHP_MSHUTDOWN_FUNCTION(crypt) /* {{{ */
- {
- #if PHP_USE_PHP_CRYPT_R
- php_shutdown_crypt_r();
- #endif
- return SUCCESS;
- }
- /* }}} */
- static unsigned char itoa64[] = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
- static void php_to64(char *s, int n) /* {{{ */
- {
- while (--n >= 0) {
- *s = itoa64[*s & 0x3f];
- s++;
- }
- }
- /* }}} */
- PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, zend_bool quiet)
- {
- char *crypt_res;
- zend_string *result;
- /* Windows (win32/crypt) has a stripped down version of libxcrypt and
- a CryptoApi md5_crypt implementation */
- #if PHP_USE_PHP_CRYPT_R
- {
- struct php_crypt_extended_data buffer;
- if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') {
- char output[MD5_HASH_MAX_LEN], *out;
- out = php_md5_crypt_r(password, salt, output);
- if (out) {
- return zend_string_init(out, strlen(out), 0);
- }
- return NULL;
- } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') {
- char *output;
- output = emalloc(PHP_MAX_SALT_LEN);
- crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
- if (!crypt_res) {
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
- efree(output);
- return NULL;
- } else {
- result = zend_string_init(output, strlen(output), 0);
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
- efree(output);
- return result;
- }
- } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') {
- char *output;
- output = emalloc(PHP_MAX_SALT_LEN);
- crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
- if (!crypt_res) {
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
- efree(output);
- return NULL;
- } else {
- result = zend_string_init(output, strlen(output), 0);
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
- efree(output);
- return result;
- }
- } else if (
- salt[0] == '$' &&
- salt[1] == '2' &&
- salt[3] == '$') {
- char output[PHP_MAX_SALT_LEN + 1];
- memset(output, 0, PHP_MAX_SALT_LEN + 1);
- crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
- if (!crypt_res) {
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN + 1);
- return NULL;
- } else {
- result = zend_string_init(output, strlen(output), 0);
- ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN + 1);
- return result;
- }
- } else if (salt[0] == '*' && (salt[1] == '0' || salt[1] == '1')) {
- return NULL;
- } else {
- /* DES Fallback */
- /* Only check the salt if it's not EXT_DES */
- if (salt[0] != '_') {
- /* DES style hashes */
- if (!IS_VALID_SALT_CHARACTER(salt[0]) || !IS_VALID_SALT_CHARACTER(salt[1])) {
- if (!quiet) {
- /* error consistently about invalid DES fallbacks */
- php_error_docref(NULL, E_DEPRECATED, DES_INVALID_SALT_ERROR);
- }
- }
- }
- memset(&buffer, 0, sizeof(buffer));
- _crypt_extended_init_r();
- crypt_res = _crypt_extended_r(password, salt, &buffer);
- if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
- return NULL;
- } else {
- result = zend_string_init(crypt_res, strlen(crypt_res), 0);
- return result;
- }
- }
- }
- #else
- if (salt[0] != '$' && salt[0] != '_' && (!IS_VALID_SALT_CHARACTER(salt[0]) || !IS_VALID_SALT_CHARACTER(salt[1]))) {
- if (!quiet) {
- /* error consistently about invalid DES fallbacks */
- php_error_docref(NULL, E_DEPRECATED, DES_INVALID_SALT_ERROR);
- }
- }
- # if defined(HAVE_CRYPT_R) && (defined(_REENTRANT) || defined(_THREAD_SAFE))
- {
- # if defined(CRYPT_R_STRUCT_CRYPT_DATA)
- struct crypt_data buffer;
- memset(&buffer, 0, sizeof(buffer));
- # elif defined(CRYPT_R_CRYPTD)
- CRYPTD buffer;
- # else
- # error Data struct used by crypt_r() is unknown. Please report.
- # endif
- crypt_res = crypt_r(password, salt, &buffer);
- }
- # elif defined(HAVE_CRYPT)
- crypt_res = crypt(password, salt);
- # else
- # error No crypt() implementation
- # endif
- #endif
- if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
- return NULL;
- } else {
- result = zend_string_init(crypt_res, strlen(crypt_res), 0);
- return result;
- }
- }
- /* }}} */
- /* {{{ proto string crypt(string str [, string salt])
- Hash a string */
- PHP_FUNCTION(crypt)
- {
- char salt[PHP_MAX_SALT_LEN + 1];
- char *str, *salt_in = NULL;
- size_t str_len, salt_in_len = 0;
- zend_string *result;
- ZEND_PARSE_PARAMETERS_START(1, 2)
- Z_PARAM_STRING(str, str_len)
- Z_PARAM_OPTIONAL
- Z_PARAM_STRING(salt_in, salt_in_len)
- ZEND_PARSE_PARAMETERS_END();
- salt[0] = salt[PHP_MAX_SALT_LEN] = '\0';
- /* This will produce suitable results if people depend on DES-encryption
- * available (passing always 2-character salt). At least for glibc6.1 */
- memset(&salt[1], '$', PHP_MAX_SALT_LEN - 1);
- if (salt_in) {
- memcpy(salt, salt_in, MIN(PHP_MAX_SALT_LEN, salt_in_len));
- } else {
- php_error_docref(NULL, E_NOTICE, "No salt parameter was specified. You must use a randomly generated salt and a strong hash function to produce a secure hash.");
- }
- /* The automatic salt generation covers standard DES, md5-crypt and Blowfish (simple) */
- if (!*salt) {
- strncpy(salt, "$1$", 3);
- php_random_bytes_throw(&salt[3], 8);
- php_to64(&salt[3], 8);
- strncpy(&salt[11], "$", PHP_MAX_SALT_LEN - 11);
- salt_in_len = strlen(salt);
- } else {
- salt_in_len = MIN(PHP_MAX_SALT_LEN, salt_in_len);
- }
- salt[salt_in_len] = '\0';
- if ((result = php_crypt(str, (int)str_len, salt, (int)salt_in_len, 0)) == NULL) {
- if (salt[0] == '*' && salt[1] == '0') {
- RETURN_STRING("*1");
- } else {
- RETURN_STRING("*0");
- }
- }
- RETURN_STR(result);
- }
- /* }}} */
- /*
- * Local variables:
- * tab-width: 4
- * c-basic-offset: 4
- * End:
- * vim600: sw=4 ts=4 fdm=marker
- * vim<600: sw=4 ts=4
- */
|