mirror of
https://github.com/php/php-src.git
synced 2026-04-18 05:21:02 +02:00
- Remove dead code from php_crypt_r.c This code has been commented out since the file was added in 2008. It's safe to say that no-one is ever going to use it. - Fix typo in comment in php_crypt_r.c - Remove redundant Windows-only implementation of php_md5_crypt_r There is a portable implementation in the same file, which is selected if not building for Windows. But why should Windows have its own special implementation of this function at all? There doesn't seem to be any good reason. Better to use the portable implementation on all platforms. - Don't define useless __CONST macro in php_crypt_r.h This preprocessor macro is not used anywhere. - Add comment on functions for encoding data as Base64 - Remove dead code from crypt_blowfish.h - Remove unneeded junk comments from crypt_freesec.c - Remove dead code from crypt_blowfish.c This function has been commented out since 2011.
260 lines
7.5 KiB
C
260 lines
7.5 KiB
C
/*
|
|
+----------------------------------------------------------------------+
|
|
| Copyright (c) The PHP Group |
|
|
+----------------------------------------------------------------------+
|
|
| This source file is subject to version 3.01 of the PHP license, |
|
|
| that is bundled with this package in the file LICENSE, and is |
|
|
| available through the world-wide-web at the following url: |
|
|
| http://www.php.net/license/3_01.txt |
|
|
| If you did not receive a copy of the PHP license and are unable to |
|
|
| obtain it through the world-wide-web, please send a note to |
|
|
| license@php.net so we can mail you a copy immediately. |
|
|
+----------------------------------------------------------------------+
|
|
| Authors: Stig Bakken <ssb@php.net> |
|
|
| Zeev Suraski <zeev@php.net> |
|
|
| Rasmus Lerdorf <rasmus@php.net> |
|
|
| Pierre Joye <pierre@php.net> |
|
|
+----------------------------------------------------------------------+
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include "php.h"
|
|
|
|
#if HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
#if PHP_USE_PHP_CRYPT_R
|
|
# include "php_crypt_r.h"
|
|
# include "crypt_freesec.h"
|
|
#else
|
|
# if HAVE_CRYPT_H
|
|
# if defined(CRYPT_R_GNU_SOURCE) && !defined(_GNU_SOURCE)
|
|
# define _GNU_SOURCE
|
|
# endif
|
|
# include <crypt.h>
|
|
# endif
|
|
#endif
|
|
#include <time.h>
|
|
#include <string.h>
|
|
|
|
#ifdef PHP_WIN32
|
|
#include <process.h>
|
|
#endif
|
|
|
|
#include "php_crypt.h"
|
|
#include "php_random.h"
|
|
|
|
/* sha512 crypt has the maximal salt length of 123 characters */
|
|
#define PHP_MAX_SALT_LEN 123
|
|
|
|
/* Used to check DES salts to ensure that they contain only valid characters */
|
|
#define IS_VALID_SALT_CHARACTER(c) (((c) >= '.' && (c) <= '9') || ((c) >= 'A' && (c) <= 'Z') || ((c) >= 'a' && (c) <= 'z'))
|
|
|
|
PHP_MINIT_FUNCTION(crypt) /* {{{ */
|
|
{
|
|
REGISTER_LONG_CONSTANT("CRYPT_SALT_LENGTH", PHP_MAX_SALT_LEN, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_STD_DES", 1, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_EXT_DES", 1, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_MD5", 1, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_BLOWFISH", 1, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_SHA256", 1, CONST_CS | CONST_PERSISTENT);
|
|
REGISTER_LONG_CONSTANT("CRYPT_SHA512", 1, CONST_CS | CONST_PERSISTENT);
|
|
|
|
#if PHP_USE_PHP_CRYPT_R
|
|
php_init_crypt_r();
|
|
#endif
|
|
|
|
return SUCCESS;
|
|
}
|
|
/* }}} */
|
|
|
|
PHP_MSHUTDOWN_FUNCTION(crypt) /* {{{ */
|
|
{
|
|
#if PHP_USE_PHP_CRYPT_R
|
|
php_shutdown_crypt_r();
|
|
#endif
|
|
|
|
return SUCCESS;
|
|
}
|
|
/* }}} */
|
|
|
|
static unsigned char itoa64[] = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
|
|
|
/* Encode a string of bytes as Base64 */
|
|
static void php_to64(char *s, int n) /* {{{ */
|
|
{
|
|
while (--n >= 0) {
|
|
*s = itoa64[*s & 0x3f];
|
|
s++;
|
|
}
|
|
}
|
|
/* }}} */
|
|
|
|
PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, zend_bool quiet)
|
|
{
|
|
char *crypt_res;
|
|
zend_string *result;
|
|
|
|
if (salt[0] == '*' && (salt[1] == '0' || salt[1] == '1')) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Windows (win32/crypt) has a stripped down version of libxcrypt and
|
|
a CryptoApi md5_crypt implementation */
|
|
#if PHP_USE_PHP_CRYPT_R
|
|
{
|
|
struct php_crypt_extended_data buffer;
|
|
|
|
if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') {
|
|
char output[MD5_HASH_MAX_LEN], *out;
|
|
|
|
out = php_md5_crypt_r(password, salt, output);
|
|
if (out) {
|
|
return zend_string_init(out, strlen(out), 0);
|
|
}
|
|
return NULL;
|
|
} else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') {
|
|
char *output;
|
|
output = emalloc(PHP_MAX_SALT_LEN);
|
|
|
|
crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
|
|
if (!crypt_res) {
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
|
|
efree(output);
|
|
return NULL;
|
|
} else {
|
|
result = zend_string_init(output, strlen(output), 0);
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
|
|
efree(output);
|
|
return result;
|
|
}
|
|
} else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') {
|
|
char *output;
|
|
output = emalloc(PHP_MAX_SALT_LEN);
|
|
|
|
crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
|
|
if (!crypt_res) {
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
|
|
efree(output);
|
|
return NULL;
|
|
} else {
|
|
result = zend_string_init(output, strlen(output), 0);
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN);
|
|
efree(output);
|
|
return result;
|
|
}
|
|
} else if (
|
|
salt[0] == '$' &&
|
|
salt[1] == '2' &&
|
|
salt[3] == '$') {
|
|
char output[PHP_MAX_SALT_LEN + 1];
|
|
|
|
memset(output, 0, PHP_MAX_SALT_LEN + 1);
|
|
|
|
crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
|
|
if (!crypt_res) {
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN + 1);
|
|
return NULL;
|
|
} else {
|
|
result = zend_string_init(output, strlen(output), 0);
|
|
ZEND_SECURE_ZERO(output, PHP_MAX_SALT_LEN + 1);
|
|
return result;
|
|
}
|
|
} else if (salt[0] == '_'
|
|
|| (IS_VALID_SALT_CHARACTER(salt[0]) && IS_VALID_SALT_CHARACTER(salt[1]))) {
|
|
/* DES Fallback */
|
|
memset(&buffer, 0, sizeof(buffer));
|
|
_crypt_extended_init_r();
|
|
|
|
crypt_res = _crypt_extended_r((const unsigned char *) password, salt, &buffer);
|
|
if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
|
|
return NULL;
|
|
} else {
|
|
result = zend_string_init(crypt_res, strlen(crypt_res), 0);
|
|
return result;
|
|
}
|
|
} else {
|
|
/* Unknown hash type */
|
|
return NULL;
|
|
}
|
|
}
|
|
#else
|
|
|
|
# if defined(HAVE_CRYPT_R) && (defined(_REENTRANT) || defined(_THREAD_SAFE))
|
|
# if defined(CRYPT_R_STRUCT_CRYPT_DATA)
|
|
struct crypt_data buffer;
|
|
memset(&buffer, 0, sizeof(buffer));
|
|
# elif defined(CRYPT_R_CRYPTD)
|
|
CRYPTD buffer;
|
|
# else
|
|
# error Data struct used by crypt_r() is unknown. Please report.
|
|
# endif
|
|
crypt_res = crypt_r(password, salt, &buffer);
|
|
# elif defined(HAVE_CRYPT)
|
|
crypt_res = crypt(password, salt);
|
|
# else
|
|
# error No crypt() implementation
|
|
# endif
|
|
#endif
|
|
|
|
if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) {
|
|
return NULL;
|
|
} else {
|
|
result = zend_string_init(crypt_res, strlen(crypt_res), 0);
|
|
return result;
|
|
}
|
|
}
|
|
/* }}} */
|
|
|
|
|
|
/* {{{ proto string crypt(string str [, string salt])
|
|
Hash a string */
|
|
PHP_FUNCTION(crypt)
|
|
{
|
|
char salt[PHP_MAX_SALT_LEN + 1];
|
|
char *str, *salt_in = NULL;
|
|
size_t str_len, salt_in_len = 0;
|
|
zend_string *result;
|
|
|
|
ZEND_PARSE_PARAMETERS_START(1, 2)
|
|
Z_PARAM_STRING(str, str_len)
|
|
Z_PARAM_OPTIONAL
|
|
Z_PARAM_STRING(salt_in, salt_in_len)
|
|
ZEND_PARSE_PARAMETERS_END();
|
|
|
|
salt[0] = salt[PHP_MAX_SALT_LEN] = '\0';
|
|
|
|
/* This will produce suitable results if people depend on DES-encryption
|
|
* available (passing always 2-character salt). At least for glibc6.1 */
|
|
memset(&salt[1], '$', PHP_MAX_SALT_LEN - 1);
|
|
|
|
if (salt_in) {
|
|
memcpy(salt, salt_in, MIN(PHP_MAX_SALT_LEN, salt_in_len));
|
|
} else {
|
|
php_error_docref(NULL, E_NOTICE, "No salt parameter was specified. You must use a randomly generated salt and a strong hash function to produce a secure hash.");
|
|
}
|
|
|
|
/* The automatic salt generation covers standard DES, md5-crypt and Blowfish (simple) */
|
|
if (!*salt) {
|
|
memcpy(salt, "$1$", 3);
|
|
php_random_bytes_throw(&salt[3], 8);
|
|
php_to64(&salt[3], 8);
|
|
strncpy(&salt[11], "$", PHP_MAX_SALT_LEN - 11);
|
|
salt_in_len = strlen(salt);
|
|
} else {
|
|
salt_in_len = MIN(PHP_MAX_SALT_LEN, salt_in_len);
|
|
}
|
|
salt[salt_in_len] = '\0';
|
|
|
|
if ((result = php_crypt(str, (int)str_len, salt, (int)salt_in_len, 0)) == NULL) {
|
|
if (salt[0] == '*' && salt[1] == '0') {
|
|
RETURN_STRING("*1");
|
|
} else {
|
|
RETURN_STRING("*0");
|
|
}
|
|
}
|
|
RETURN_STR(result);
|
|
}
|
|
/* }}} */
|