rev |
line source |
yuuji@0
|
1 /* ========================================================================
|
yuuji@0
|
2 * Copyright 1988-2007 University of Washington
|
yuuji@0
|
3 *
|
yuuji@0
|
4 * Licensed under the Apache License, Version 2.0 (the "License");
|
yuuji@0
|
5 * you may not use this file except in compliance with the License.
|
yuuji@0
|
6 * You may obtain a copy of the License at
|
yuuji@0
|
7 *
|
yuuji@0
|
8 * http://www.apache.org/licenses/LICENSE-2.0
|
yuuji@0
|
9 *
|
yuuji@0
|
10 *
|
yuuji@0
|
11 * ========================================================================
|
yuuji@0
|
12 */
|
yuuji@0
|
13
|
yuuji@0
|
14 /*
|
yuuji@0
|
15 * Program: CRAM-MD5 authenticator
|
yuuji@0
|
16 *
|
yuuji@0
|
17 * Author: Mark Crispin
|
yuuji@0
|
18 * Networks and Distributed Computing
|
yuuji@0
|
19 * Computing & Communications
|
yuuji@0
|
20 * University of Washington
|
yuuji@0
|
21 * Administration Building, AG-44
|
yuuji@0
|
22 * Seattle, WA 98195
|
yuuji@0
|
23 * Internet: MRC@CAC.Washington.EDU
|
yuuji@0
|
24 *
|
yuuji@0
|
25 * Date: 21 October 1998
|
yuuji@0
|
26 * Last Edited: 30 January 2007
|
yuuji@0
|
27 */
|
yuuji@0
|
28
|
yuuji@0
|
29 /* MD5 context */
|
yuuji@0
|
30
|
yuuji@0
|
31 #define MD5BLKLEN 64 /* MD5 block length */
|
yuuji@0
|
32 #define MD5DIGLEN 16 /* MD5 digest length */
|
yuuji@0
|
33
|
yuuji@0
|
34 typedef struct {
|
yuuji@0
|
35 unsigned long chigh; /* high 32bits of byte count */
|
yuuji@0
|
36 unsigned long clow; /* low 32bits of byte count */
|
yuuji@0
|
37 unsigned long state[4]; /* state (ABCD) */
|
yuuji@0
|
38 unsigned char buf[MD5BLKLEN]; /* input buffer */
|
yuuji@0
|
39 unsigned char *ptr; /* buffer position */
|
yuuji@0
|
40 } MD5CONTEXT;
|
yuuji@0
|
41
|
yuuji@0
|
42
|
yuuji@0
|
43 /* Prototypes */
|
yuuji@0
|
44
|
yuuji@0
|
45 long auth_md5_valid (void);
|
yuuji@0
|
46 long auth_md5_client (authchallenge_t challenger,authrespond_t responder,
|
yuuji@0
|
47 char *service,NETMBX *mb,void *stream,
|
yuuji@0
|
48 unsigned long *trial,char *user);
|
yuuji@0
|
49 char *auth_md5_server (authresponse_t responder,int argc,char *argv[]);
|
yuuji@0
|
50 char *auth_md5_pwd (char *user);
|
yuuji@0
|
51 char *apop_login (char *chal,char *user,char *md5,int argc,char *argv[]);
|
yuuji@0
|
52 char *hmac_md5 (char *text,unsigned long tl,char *key,unsigned long kl);
|
yuuji@0
|
53 void md5_init (MD5CONTEXT *ctx);
|
yuuji@0
|
54 void md5_update (MD5CONTEXT *ctx,unsigned char *data,unsigned long len);
|
yuuji@0
|
55 void md5_final (unsigned char *digest,MD5CONTEXT *ctx);
|
yuuji@0
|
56 static void md5_transform (unsigned long *state,unsigned char *block);
|
yuuji@0
|
57 static void md5_encode (unsigned char *dst,unsigned long *src,int len);
|
yuuji@0
|
58 static void md5_decode (unsigned long *dst,unsigned char *src,int len);
|
yuuji@0
|
59
|
yuuji@0
|
60
|
yuuji@0
|
61 /* Authenticator linkage */
|
yuuji@0
|
62
|
yuuji@0
|
63 AUTHENTICATOR auth_md5 = {
|
yuuji@0
|
64 AU_SECURE, /* secure authenticator */
|
yuuji@0
|
65 "CRAM-MD5", /* authenticator name */
|
yuuji@0
|
66 auth_md5_valid, /* check if valid */
|
yuuji@0
|
67 auth_md5_client, /* client method */
|
yuuji@0
|
68 auth_md5_server, /* server method */
|
yuuji@0
|
69 NIL /* next authenticator */
|
yuuji@0
|
70 };
|
yuuji@0
|
71
|
yuuji@0
|
72 /* Check if CRAM-MD5 valid on this system
|
yuuji@0
|
73 * Returns: T, always
|
yuuji@0
|
74 */
|
yuuji@0
|
75
|
yuuji@0
|
76 long auth_md5_valid (void)
|
yuuji@0
|
77 {
|
yuuji@4
|
78 #ifndef QMAIL /* qmail extension can always handle MD5 */
|
yuuji@0
|
79 struct stat sbuf;
|
yuuji@0
|
80 /* server forbids MD5 if no MD5 enable file */
|
yuuji@0
|
81 if (stat (MD5ENABLE,&sbuf)) auth_md5.server = NIL;
|
yuuji@4
|
82 #endif
|
yuuji@0
|
83 return T; /* MD5 is otherwise valid */
|
yuuji@0
|
84 }
|
yuuji@0
|
85
|
yuuji@0
|
86
|
yuuji@0
|
87 /* Client authenticator
|
yuuji@0
|
88 * Accepts: challenger function
|
yuuji@0
|
89 * responder function
|
yuuji@0
|
90 * SASL service name
|
yuuji@0
|
91 * parsed network mailbox structure
|
yuuji@0
|
92 * stream argument for functions
|
yuuji@0
|
93 * pointer to current trial count
|
yuuji@0
|
94 * returned user name
|
yuuji@0
|
95 * Returns: T if success, NIL otherwise, number of trials incremented if retry
|
yuuji@0
|
96 */
|
yuuji@0
|
97
|
yuuji@0
|
98 long auth_md5_client (authchallenge_t challenger,authrespond_t responder,
|
yuuji@0
|
99 char *service,NETMBX *mb,void *stream,
|
yuuji@0
|
100 unsigned long *trial,char *user)
|
yuuji@0
|
101 {
|
yuuji@0
|
102 char pwd[MAILTMPLEN];
|
yuuji@0
|
103 void *challenge;
|
yuuji@0
|
104 unsigned long clen;
|
yuuji@0
|
105 long ret = NIL;
|
yuuji@0
|
106 /* get challenge */
|
yuuji@0
|
107 if (challenge = (*challenger) (stream,&clen)) {
|
yuuji@0
|
108 pwd[0] = NIL; /* prompt user */
|
yuuji@0
|
109 mm_login (mb,user,pwd,*trial);
|
yuuji@0
|
110 if (!pwd[0]) { /* user requested abort */
|
yuuji@0
|
111 fs_give ((void **) &challenge);
|
yuuji@0
|
112 (*responder) (stream,NIL,0);
|
yuuji@0
|
113 *trial = 0; /* cancel subsequent attempts */
|
yuuji@0
|
114 ret = LONGT; /* will get a BAD response back */
|
yuuji@0
|
115 }
|
yuuji@0
|
116 else { /* got password, build response */
|
yuuji@0
|
117 sprintf (pwd,"%.65s %.33s",user,hmac_md5 (challenge,clen,
|
yuuji@0
|
118 pwd,strlen (pwd)));
|
yuuji@0
|
119 fs_give ((void **) &challenge);
|
yuuji@0
|
120 /* send credentials, allow retry if OK */
|
yuuji@0
|
121 if ((*responder) (stream,pwd,strlen (pwd))) {
|
yuuji@0
|
122 if (challenge = (*challenger) (stream,&clen))
|
yuuji@0
|
123 fs_give ((void **) &challenge);
|
yuuji@0
|
124 else {
|
yuuji@0
|
125 ++*trial; /* can try again if necessary */
|
yuuji@0
|
126 ret = LONGT; /* check the authentication */
|
yuuji@0
|
127 }
|
yuuji@0
|
128 }
|
yuuji@0
|
129 }
|
yuuji@0
|
130 }
|
yuuji@0
|
131 memset (pwd,0,MAILTMPLEN); /* erase password in case not overwritten */
|
yuuji@0
|
132 if (!ret) *trial = 65535; /* don't retry if bad protocol */
|
yuuji@0
|
133 return ret;
|
yuuji@0
|
134 }
|
yuuji@0
|
135
|
yuuji@0
|
136 /* Server authenticator
|
yuuji@0
|
137 * Accepts: responder function
|
yuuji@0
|
138 * argument count
|
yuuji@0
|
139 * argument vector
|
yuuji@0
|
140 * Returns: authenticated user name or NIL
|
yuuji@0
|
141 *
|
yuuji@0
|
142 * This is much hairier than it needs to be due to the necessary of zapping
|
yuuji@0
|
143 * the password data.
|
yuuji@0
|
144 */
|
yuuji@0
|
145
|
yuuji@0
|
146 static int md5try = MAXLOGINTRIALS;
|
yuuji@0
|
147
|
yuuji@0
|
148 char *auth_md5_server (authresponse_t responder,int argc,char *argv[])
|
yuuji@0
|
149 {
|
yuuji@0
|
150 char *ret = NIL;
|
yuuji@0
|
151 char *p,*u,*user,*authuser,*hash,chal[MAILTMPLEN];
|
yuuji@0
|
152 unsigned long cl,pl;
|
yuuji@0
|
153 /* generate challenge */
|
yuuji@0
|
154 sprintf (chal,"<%lu.%lu@%s>",(unsigned long) getpid (),
|
yuuji@0
|
155 (unsigned long) time (0),mylocalhost ());
|
yuuji@0
|
156 /* send challenge, get user and hash */
|
yuuji@0
|
157 if (user = (*responder) (chal,cl = strlen (chal),NIL)) {
|
yuuji@0
|
158 /* got user, locate hash */
|
yuuji@0
|
159 if (hash = strrchr (user,' ')) {
|
yuuji@0
|
160 *hash++ = '\0'; /* tie off user */
|
yuuji@0
|
161 /* see if authentication user */
|
yuuji@0
|
162 if (authuser = strchr (user,'*')) *authuser++ = '\0';
|
yuuji@0
|
163 /* get password */
|
yuuji@0
|
164 if (p = auth_md5_pwd ((authuser && *authuser) ? authuser : user)) {
|
yuuji@0
|
165 pl = strlen (p);
|
yuuji@0
|
166 u = (md5try && !strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? user : NIL;
|
yuuji@0
|
167 memset (p,0,pl); /* erase sensitive information */
|
yuuji@0
|
168 fs_give ((void **) &p); /* flush erased password */
|
yuuji@0
|
169 /* now log in for real */
|
yuuji@0
|
170 if (u && authserver_login (u,authuser,argc,argv)) ret = myusername ();
|
yuuji@0
|
171 else if (md5try) --md5try;
|
yuuji@0
|
172 }
|
yuuji@0
|
173 }
|
yuuji@0
|
174 fs_give ((void **) &user);
|
yuuji@0
|
175 }
|
yuuji@0
|
176 if (!ret) sleep (3); /* slow down possible cracker */
|
yuuji@0
|
177 return ret;
|
yuuji@0
|
178 }
|
yuuji@0
|
179
|
yuuji@0
|
180 /* Return MD5 password for user
|
yuuji@0
|
181 * Accepts: user name
|
yuuji@0
|
182 * Returns: plaintext password if success, else NIL
|
yuuji@0
|
183 *
|
yuuji@0
|
184 * This is much hairier than it needs to be due to the necessary of zapping
|
yuuji@0
|
185 * the password data. That's why we don't use stdio here.
|
yuuji@0
|
186 */
|
yuuji@0
|
187
|
yuuji@0
|
188 char *auth_md5_pwd (char *user)
|
yuuji@0
|
189 {
|
yuuji@0
|
190 struct stat sbuf;
|
yuuji@4
|
191 #ifndef QMAIL
|
yuuji@0
|
192 int fd = open (MD5ENABLE,O_RDONLY,NIL);
|
yuuji@0
|
193 unsigned char *s,*t,*buf,*lusr,*lret;
|
yuuji@0
|
194 char *r;
|
yuuji@0
|
195 char *ret = NIL;
|
yuuji@0
|
196 if (fd >= 0) { /* found the file? */
|
yuuji@0
|
197 fstat (fd,&sbuf); /* yes, slurp it into memory */
|
yuuji@0
|
198 read (fd,buf = (char *) fs_get (sbuf.st_size + 1),sbuf.st_size);
|
yuuji@0
|
199 /* see if any uppercase characters in user */
|
yuuji@0
|
200 for (s = user; *s && ((*s < 'A') || (*s > 'Z')); s++);
|
yuuji@0
|
201 /* yes, make lowercase copy */
|
yuuji@0
|
202 lusr = *s ? lcase (cpystr (user)) : NIL;
|
yuuji@0
|
203 for (s = strtok_r ((char *) buf,"\015\012",&r),lret = NIL; s;
|
yuuji@0
|
204 s = ret ? NIL : strtok_r (NIL,"\015\012",&r))
|
yuuji@0
|
205 /* must be valid entry line */
|
yuuji@0
|
206 if (*s && (*s != '#') && (t = strchr (s,'\t')) && t[1]) {
|
yuuji@0
|
207 *t++ = '\0'; /* found tab, tie off user, point to pwd */
|
yuuji@0
|
208 if (!strcmp (s,user)) ret = cpystr (t);
|
yuuji@0
|
209 else if (lusr && !lret) if (!strcmp (s,lusr)) lret = t;
|
yuuji@0
|
210 }
|
yuuji@0
|
211 /* accept case-independent name */
|
yuuji@0
|
212 if (!ret && lret) ret = cpystr (lret);
|
yuuji@0
|
213 /* don't need lowercase copy any more */
|
yuuji@0
|
214 if (lusr) fs_give ((void **) &lusr);
|
yuuji@0
|
215 /* erase sensitive information from buffer */
|
yuuji@0
|
216 memset (buf,0,sbuf.st_size + 1);
|
yuuji@0
|
217 fs_give ((void **) &buf); /* flush the buffer */
|
yuuji@0
|
218 close (fd); /* don't need file any longer */
|
yuuji@0
|
219 }
|
yuuji@4
|
220 #else
|
yuuji@4
|
221 # ifndef USERAPOPFILE
|
yuuji@4
|
222 # define USERAPOPFILE ".apop"
|
yuuji@4
|
223 # endif
|
yuuji@4
|
224 # ifndef XADDR_DELIM
|
yuuji@4
|
225 # ifdef POSTFIX /* Same if-condition is in maildir.c.. sorry */
|
yuuji@4
|
226 # define XADDR_DELIM "+"
|
yuuji@4
|
227 # else
|
yuuji@4
|
228 # define XADDR_DELIM "-"
|
yuuji@4
|
229 # endif
|
yuuji@4
|
230 # endif
|
yuuji@4
|
231 extern char *myMailSuffix;
|
yuuji@4
|
232 char mycrypt[BUFSIZ+1];
|
yuuji@4
|
233 char *ret = NIL, *tmp=NIL;
|
yuuji@4
|
234 FILE *apopfile = NIL;
|
yuuji@4
|
235 struct passwd *pw = getpwnam(user);
|
yuuji@4
|
236 if (!pw) pw = getpwnam(lcase(tmp=cpystr(user)));
|
yuuji@4
|
237 if (!pw && strstr(user, XADDR_DELIM)) { /* Check qmail alias */
|
yuuji@4
|
238 char tmp[BUFSIZ];
|
yuuji@4
|
239 char *s = user;
|
yuuji@4
|
240 memset(tmp, 0, BUFSIZ);
|
yuuji@4
|
241 while (*s && s && !pw) {
|
yuuji@4
|
242 s = strstr(s, XADDR_DELIM);
|
yuuji@4
|
243 if (!s) break;
|
yuuji@4
|
244 strncpy(tmp, user, s-user);
|
yuuji@4
|
245 s++;
|
yuuji@4
|
246 pw = getpwnam(tmp);
|
yuuji@4
|
247 }
|
yuuji@4
|
248 if (pw) {
|
yuuji@4
|
249 myMailSuffix = lcase(cpystr(s-1));
|
yuuji@4
|
250 user[strlen(tmp)] = '\0'; /* zap suffix */
|
yuuji@4
|
251 }
|
yuuji@4
|
252 }
|
yuuji@4
|
253 if (pw) {
|
yuuji@4
|
254 snprintf(mycrypt, BUFSIZ, "%s/%s", pw->pw_dir, USERAPOPFILE);
|
yuuji@4
|
255 if (NIL != myMailSuffix) strcat(mycrypt, myMailSuffix);
|
yuuji@4
|
256 if (stat(mycrypt, &sbuf) < 0) {
|
yuuji@4
|
257 /* printf("Cannot stat [%s]\015\n", mycrypt); */
|
yuuji@4
|
258 return ret;
|
yuuji@4
|
259 }
|
yuuji@4
|
260 if (sbuf.st_mode & ~(S_IFREG | S_IREAD | S_IWRITE)) {
|
yuuji@4
|
261 /* printf("Your apoppassword file is readable by others. Do chmod 600 %s%c\n", mycrypt, 015); */
|
yuuji@4
|
262 return ret;
|
yuuji@4
|
263 }
|
yuuji@4
|
264 #ifdef APOPOPEN
|
yuuji@4
|
265 if (stat(APOPOPEN, &sbuf) >= 0) { /* if APPOPEN exists */
|
yuuji@4
|
266 /* read apop password via APOPOPEN program */
|
yuuji@4
|
267 int bytes = 3+strlen(APOPOPEN)+strlen(mycrypt);
|
yuuji@4
|
268 char *aproc = (char*) fs_get(bytes);
|
yuuji@4
|
269 snprintf(aproc, bytes, "%s %s%c", APOPOPEN, mycrypt, '\0');
|
yuuji@4
|
270 apopfile = popen(aproc, "r");
|
yuuji@4
|
271 memset(aproc, 0, bytes);
|
yuuji@4
|
272 fs_give((void**)&aproc);
|
yuuji@4
|
273 }
|
yuuji@4
|
274 #endif /* APOPOPEN */
|
yuuji@4
|
275 if ((NIL!=apopfile) || (apopfile = fopen( mycrypt, "r" ))) {
|
yuuji@4
|
276 fgets(mycrypt, sizeof(mycrypt) - 1, apopfile);
|
yuuji@4
|
277 fclose(apopfile);
|
yuuji@4
|
278 if (mycrypt[0]) {
|
yuuji@4
|
279 char p = strlen(mycrypt);
|
yuuji@4
|
280 while (p > 0 && (mycrypt[p-1] == '\n' || mycrypt[p-1] == '\r')) {
|
yuuji@4
|
281 mycrypt[--p] = '\0'; /* zap trailing newlines */
|
yuuji@4
|
282 }
|
yuuji@4
|
283 }
|
yuuji@4
|
284 } else {
|
yuuji@4
|
285 return ret;
|
yuuji@4
|
286 }
|
yuuji@4
|
287 ret = cpystr(mycrypt);
|
yuuji@4
|
288 memset(mycrypt, 0, sizeof(mycrypt));
|
yuuji@4
|
289 }
|
yuuji@4
|
290 #endif /* if QMAIL */
|
yuuji@0
|
291 return ret; /* return password */
|
yuuji@0
|
292 }
|
yuuji@0
|
293
|
yuuji@0
|
294 /* APOP server login
|
yuuji@0
|
295 * Accepts: challenge
|
yuuji@0
|
296 * desired user name
|
yuuji@0
|
297 * purported MD5
|
yuuji@0
|
298 * argument count
|
yuuji@0
|
299 * argument vector
|
yuuji@0
|
300 * Returns: authenticated user name or NIL
|
yuuji@0
|
301 */
|
yuuji@0
|
302
|
yuuji@0
|
303 char *apop_login (char *chal,char *user,char *md5,int argc,char *argv[])
|
yuuji@0
|
304 {
|
yuuji@0
|
305 int i,j;
|
yuuji@0
|
306 char *ret = NIL;
|
yuuji@0
|
307 char *s,*authuser,tmp[MAILTMPLEN];
|
yuuji@4
|
308 #ifdef QMAIL
|
yuuji@4
|
309 char *userback = cpystr(user);
|
yuuji@4
|
310 #endif
|
yuuji@0
|
311 unsigned char digest[MD5DIGLEN];
|
yuuji@0
|
312 MD5CONTEXT ctx;
|
yuuji@0
|
313 char *hex = "0123456789abcdef";
|
yuuji@0
|
314 /* see if authentication user */
|
yuuji@0
|
315 if (authuser = strchr (user,'*')) *authuser++ = '\0';
|
yuuji@0
|
316 /* get password */
|
yuuji@0
|
317 if (s = auth_md5_pwd ((authuser && *authuser) ? authuser : user)) {
|
yuuji@0
|
318 md5_init (&ctx); /* initialize MD5 context */
|
yuuji@0
|
319 /* build string to get MD5 digest */
|
yuuji@0
|
320 sprintf (tmp,"%.128s%.128s",chal,s);
|
yuuji@0
|
321 memset (s,0,strlen (s)); /* erase sensitive information */
|
yuuji@0
|
322 fs_give ((void **) &s); /* flush erased password */
|
yuuji@0
|
323 md5_update (&ctx,(unsigned char *) tmp,strlen (tmp));
|
yuuji@0
|
324 memset (tmp,0,MAILTMPLEN); /* erase sensitive information */
|
yuuji@0
|
325 md5_final (digest,&ctx);
|
yuuji@0
|
326 /* convert to printable hex */
|
yuuji@0
|
327 for (i = 0, s = tmp; i < MD5DIGLEN; i++) {
|
yuuji@0
|
328 *s++ = hex[(j = digest[i]) >> 4];
|
yuuji@0
|
329 *s++ = hex[j & 0xf];
|
yuuji@0
|
330 }
|
yuuji@0
|
331 *s = '\0'; /* tie off hash text */
|
yuuji@0
|
332 memset (digest,0,MD5DIGLEN);/* erase sensitive information */
|
yuuji@0
|
333 if (md5try && !strcmp (md5,tmp) &&
|
yuuji@0
|
334 authserver_login (user,authuser,argc,argv))
|
yuuji@0
|
335 ret = cpystr (myusername ());
|
yuuji@0
|
336 else if (md5try) --md5try;
|
yuuji@0
|
337 memset (tmp,0,MAILTMPLEN); /* erase sensitive information */
|
yuuji@0
|
338 }
|
yuuji@0
|
339 if (!ret) sleep (3); /* slow down possible cracker */
|
yuuji@4
|
340 else {
|
yuuji@4
|
341 extern void permitsmtp();
|
yuuji@4
|
342 /* permitsmtp();*/
|
yuuji@4
|
343 }
|
yuuji@4
|
344 #ifdef QMAIL
|
yuuji@4
|
345 return (ret) ? userback : ret;
|
yuuji@4
|
346 #else
|
yuuji@0
|
347 return ret;
|
yuuji@4
|
348 #endif
|
yuuji@0
|
349 }
|
yuuji@0
|
350
|
yuuji@0
|
351 /*
|
yuuji@0
|
352 * RFC 2104 HMAC hashing
|
yuuji@0
|
353 * Accepts: text to hash
|
yuuji@0
|
354 * text length
|
yuuji@0
|
355 * key
|
yuuji@0
|
356 * key length
|
yuuji@0
|
357 * Returns: hash as text, always
|
yuuji@0
|
358 */
|
yuuji@0
|
359
|
yuuji@0
|
360 char *hmac_md5 (char *text,unsigned long tl,char *key,unsigned long kl)
|
yuuji@0
|
361 {
|
yuuji@0
|
362 int i,j;
|
yuuji@0
|
363 static char hshbuf[2*MD5DIGLEN + 1];
|
yuuji@0
|
364 char *s;
|
yuuji@0
|
365 MD5CONTEXT ctx;
|
yuuji@0
|
366 char *hex = "0123456789abcdef";
|
yuuji@0
|
367 unsigned char digest[MD5DIGLEN],k_ipad[MD5BLKLEN+1],k_opad[MD5BLKLEN+1];
|
yuuji@0
|
368 if (kl > MD5BLKLEN) { /* key longer than pad length? */
|
yuuji@0
|
369 md5_init (&ctx); /* yes, set key as MD5(key) */
|
yuuji@0
|
370 md5_update (&ctx,(unsigned char *) key,kl);
|
yuuji@0
|
371 md5_final (digest,&ctx);
|
yuuji@0
|
372 key = (char *) digest;
|
yuuji@0
|
373 kl = MD5DIGLEN;
|
yuuji@0
|
374 }
|
yuuji@0
|
375 memcpy (k_ipad,key,kl); /* store key in pads */
|
yuuji@0
|
376 memset (k_ipad+kl,0,(MD5BLKLEN+1)-kl);
|
yuuji@0
|
377 memcpy (k_opad,k_ipad,MD5BLKLEN+1);
|
yuuji@0
|
378 /* XOR key with ipad and opad values */
|
yuuji@0
|
379 for (i = 0; i < MD5BLKLEN; i++) {
|
yuuji@0
|
380 k_ipad[i] ^= 0x36;
|
yuuji@0
|
381 k_opad[i] ^= 0x5c;
|
yuuji@0
|
382 }
|
yuuji@0
|
383 md5_init (&ctx); /* inner MD5: hash ipad and text */
|
yuuji@0
|
384 md5_update (&ctx,k_ipad,MD5BLKLEN);
|
yuuji@0
|
385 md5_update (&ctx,(unsigned char *) text,tl);
|
yuuji@0
|
386 md5_final (digest,&ctx);
|
yuuji@0
|
387 md5_init (&ctx); /* outer MD5: hash opad and inner results */
|
yuuji@0
|
388 md5_update (&ctx,k_opad,MD5BLKLEN);
|
yuuji@0
|
389 md5_update (&ctx,digest,MD5DIGLEN);
|
yuuji@0
|
390 md5_final (digest,&ctx);
|
yuuji@0
|
391 /* convert to printable hex */
|
yuuji@0
|
392 for (i = 0, s = hshbuf; i < MD5DIGLEN; i++) {
|
yuuji@0
|
393 *s++ = hex[(j = digest[i]) >> 4];
|
yuuji@0
|
394 *s++ = hex[j & 0xf];
|
yuuji@0
|
395 }
|
yuuji@0
|
396 *s = '\0'; /* tie off hash text */
|
yuuji@0
|
397 return hshbuf;
|
yuuji@0
|
398 }
|
yuuji@0
|
399
|
yuuji@0
|
400 /* Everything after this point is derived from the RSA Data Security, Inc.
|
yuuji@0
|
401 * MD5 Message-Digest Algorithm
|
yuuji@0
|
402 */
|
yuuji@0
|
403
|
yuuji@0
|
404 /* You may wonder why these strange "a &= 0xffffffff;" statements are here.
|
yuuji@0
|
405 * This is to ensure correct results on machines with a unsigned long size of
|
yuuji@0
|
406 * larger than 32 bits.
|
yuuji@0
|
407 */
|
yuuji@0
|
408
|
yuuji@0
|
409 #define RND1(a,b,c,d,x,s,ac) \
|
yuuji@0
|
410 a += ((b & c) | (d & ~b)) + x + (unsigned long) ac; \
|
yuuji@0
|
411 a &= 0xffffffff; \
|
yuuji@0
|
412 a = b + ((a << s) | (a >> (32 - s)));
|
yuuji@0
|
413
|
yuuji@0
|
414 #define RND2(a,b,c,d,x,s,ac) \
|
yuuji@0
|
415 a += ((b & d) | (c & ~d)) + x + (unsigned long) ac; \
|
yuuji@0
|
416 a &= 0xffffffff; \
|
yuuji@0
|
417 a = b + ((a << s) | (a >> (32 - s)));
|
yuuji@0
|
418
|
yuuji@0
|
419 #define RND3(a,b,c,d,x,s,ac) \
|
yuuji@0
|
420 a += (b ^ c ^ d) + x + (unsigned long) ac; \
|
yuuji@0
|
421 a &= 0xffffffff; \
|
yuuji@0
|
422 a = b + ((a << s) | (a >> (32 - s)));
|
yuuji@0
|
423
|
yuuji@0
|
424 #define RND4(a,b,c,d,x,s,ac) \
|
yuuji@0
|
425 a += (c ^ (b | ~d)) + x + (unsigned long) ac; \
|
yuuji@0
|
426 a &= 0xffffffff; \
|
yuuji@0
|
427 a = b + ((a << s) | (a >> (32 - s)));
|
yuuji@0
|
428
|
yuuji@0
|
429 /* Initialize MD5 context
|
yuuji@0
|
430 * Accepts: context to initialize
|
yuuji@0
|
431 */
|
yuuji@0
|
432
|
yuuji@0
|
433 void md5_init (MD5CONTEXT *ctx)
|
yuuji@0
|
434 {
|
yuuji@0
|
435 ctx->clow = ctx->chigh = 0; /* initialize byte count to zero */
|
yuuji@0
|
436 /* initialization constants */
|
yuuji@0
|
437 ctx->state[0] = 0x67452301; ctx->state[1] = 0xefcdab89;
|
yuuji@0
|
438 ctx->state[2] = 0x98badcfe; ctx->state[3] = 0x10325476;
|
yuuji@0
|
439 ctx->ptr = ctx->buf; /* reset buffer pointer */
|
yuuji@0
|
440 }
|
yuuji@0
|
441
|
yuuji@0
|
442
|
yuuji@0
|
443 /* MD5 add data to context
|
yuuji@0
|
444 * Accepts: context
|
yuuji@0
|
445 * input data
|
yuuji@0
|
446 * length of data
|
yuuji@0
|
447 */
|
yuuji@0
|
448
|
yuuji@0
|
449 void md5_update (MD5CONTEXT *ctx,unsigned char *data,unsigned long len)
|
yuuji@0
|
450 {
|
yuuji@0
|
451 unsigned long i = (ctx->buf + MD5BLKLEN) - ctx->ptr;
|
yuuji@0
|
452 /* update double precision number of bytes */
|
yuuji@0
|
453 if ((ctx->clow += len) < len) ctx->chigh++;
|
yuuji@0
|
454 while (i <= len) { /* copy/transform data, 64 bytes at a time */
|
yuuji@0
|
455 memcpy (ctx->ptr,data,i); /* fill up 64 byte chunk */
|
yuuji@0
|
456 md5_transform (ctx->state,ctx->ptr = ctx->buf);
|
yuuji@0
|
457 data += i,len -= i,i = MD5BLKLEN;
|
yuuji@0
|
458 }
|
yuuji@0
|
459 memcpy (ctx->ptr,data,len); /* copy final bit of data in buffer */
|
yuuji@0
|
460 ctx->ptr += len; /* update buffer pointer */
|
yuuji@0
|
461 }
|
yuuji@0
|
462
|
yuuji@0
|
463 /* MD5 Finalization
|
yuuji@0
|
464 * Accepts: destination digest
|
yuuji@0
|
465 * context
|
yuuji@0
|
466 */
|
yuuji@0
|
467
|
yuuji@0
|
468 void md5_final (unsigned char *digest,MD5CONTEXT *ctx)
|
yuuji@0
|
469 {
|
yuuji@0
|
470 unsigned long i,bits[2];
|
yuuji@0
|
471 bits[0] = ctx->clow << 3; /* calculate length in bits (before padding) */
|
yuuji@0
|
472 bits[1] = (ctx->chigh << 3) + (ctx->clow >> 29);
|
yuuji@0
|
473 *ctx->ptr++ = 0x80; /* padding byte */
|
yuuji@0
|
474 if ((i = (ctx->buf + MD5BLKLEN) - ctx->ptr) < 8) {
|
yuuji@0
|
475 memset (ctx->ptr,0,i); /* pad out buffer with zeros */
|
yuuji@0
|
476 md5_transform (ctx->state,ctx->buf);
|
yuuji@0
|
477 /* pad out with zeros, leaving 8 bytes */
|
yuuji@0
|
478 memset (ctx->buf,0,MD5BLKLEN - 8);
|
yuuji@0
|
479 ctx->ptr = ctx->buf + MD5BLKLEN - 8;
|
yuuji@0
|
480 }
|
yuuji@0
|
481 else if (i -= 8) { /* need to pad this buffer? */
|
yuuji@0
|
482 memset (ctx->ptr,0,i); /* yes, pad out with zeros, leaving 8 bytes */
|
yuuji@0
|
483 ctx->ptr += i;
|
yuuji@0
|
484 }
|
yuuji@0
|
485 md5_encode (ctx->ptr,bits,2); /* make LSB-first length */
|
yuuji@0
|
486 md5_transform (ctx->state,ctx->buf);
|
yuuji@0
|
487 /* store state in digest */
|
yuuji@0
|
488 md5_encode (digest,ctx->state,4);
|
yuuji@0
|
489 /* erase context */
|
yuuji@0
|
490 memset (ctx,0,sizeof (MD5CONTEXT));
|
yuuji@0
|
491 }
|
yuuji@0
|
492
|
yuuji@0
|
493 /* MD5 basic transformation
|
yuuji@0
|
494 * Accepts: state vector
|
yuuji@0
|
495 * current 64-byte block
|
yuuji@0
|
496 */
|
yuuji@0
|
497
|
yuuji@0
|
498 static void md5_transform (unsigned long *state,unsigned char *block)
|
yuuji@0
|
499 {
|
yuuji@0
|
500 unsigned long a = state[0],b = state[1],c = state[2],d = state[3],x[16];
|
yuuji@0
|
501 md5_decode (x,block,16); /* decode into 16 longs */
|
yuuji@0
|
502 /* round 1 */
|
yuuji@0
|
503 RND1 (a,b,c,d,x[ 0], 7,0xd76aa478); RND1 (d,a,b,c,x[ 1],12,0xe8c7b756);
|
yuuji@0
|
504 RND1 (c,d,a,b,x[ 2],17,0x242070db); RND1 (b,c,d,a,x[ 3],22,0xc1bdceee);
|
yuuji@0
|
505 RND1 (a,b,c,d,x[ 4], 7,0xf57c0faf); RND1 (d,a,b,c,x[ 5],12,0x4787c62a);
|
yuuji@0
|
506 RND1 (c,d,a,b,x[ 6],17,0xa8304613); RND1 (b,c,d,a,x[ 7],22,0xfd469501);
|
yuuji@0
|
507 RND1 (a,b,c,d,x[ 8], 7,0x698098d8); RND1 (d,a,b,c,x[ 9],12,0x8b44f7af);
|
yuuji@0
|
508 RND1 (c,d,a,b,x[10],17,0xffff5bb1); RND1 (b,c,d,a,x[11],22,0x895cd7be);
|
yuuji@0
|
509 RND1 (a,b,c,d,x[12], 7,0x6b901122); RND1 (d,a,b,c,x[13],12,0xfd987193);
|
yuuji@0
|
510 RND1 (c,d,a,b,x[14],17,0xa679438e); RND1 (b,c,d,a,x[15],22,0x49b40821);
|
yuuji@0
|
511 /* round 2 */
|
yuuji@0
|
512 RND2 (a,b,c,d,x[ 1], 5,0xf61e2562); RND2 (d,a,b,c,x[ 6], 9,0xc040b340);
|
yuuji@0
|
513 RND2 (c,d,a,b,x[11],14,0x265e5a51); RND2 (b,c,d,a,x[ 0],20,0xe9b6c7aa);
|
yuuji@0
|
514 RND2 (a,b,c,d,x[ 5], 5,0xd62f105d); RND2 (d,a,b,c,x[10], 9, 0x2441453);
|
yuuji@0
|
515 RND2 (c,d,a,b,x[15],14,0xd8a1e681); RND2 (b,c,d,a,x[ 4],20,0xe7d3fbc8);
|
yuuji@0
|
516 RND2 (a,b,c,d,x[ 9], 5,0x21e1cde6); RND2 (d,a,b,c,x[14], 9,0xc33707d6);
|
yuuji@0
|
517 RND2 (c,d,a,b,x[ 3],14,0xf4d50d87); RND2 (b,c,d,a,x[ 8],20,0x455a14ed);
|
yuuji@0
|
518 RND2 (a,b,c,d,x[13], 5,0xa9e3e905); RND2 (d,a,b,c,x[ 2], 9,0xfcefa3f8);
|
yuuji@0
|
519 RND2 (c,d,a,b,x[ 7],14,0x676f02d9); RND2 (b,c,d,a,x[12],20,0x8d2a4c8a);
|
yuuji@0
|
520 /* round 3 */
|
yuuji@0
|
521 RND3 (a,b,c,d,x[ 5], 4,0xfffa3942); RND3 (d,a,b,c,x[ 8],11,0x8771f681);
|
yuuji@0
|
522 RND3 (c,d,a,b,x[11],16,0x6d9d6122); RND3 (b,c,d,a,x[14],23,0xfde5380c);
|
yuuji@0
|
523 RND3 (a,b,c,d,x[ 1], 4,0xa4beea44); RND3 (d,a,b,c,x[ 4],11,0x4bdecfa9);
|
yuuji@0
|
524 RND3 (c,d,a,b,x[ 7],16,0xf6bb4b60); RND3 (b,c,d,a,x[10],23,0xbebfbc70);
|
yuuji@0
|
525 RND3 (a,b,c,d,x[13], 4,0x289b7ec6); RND3 (d,a,b,c,x[ 0],11,0xeaa127fa);
|
yuuji@0
|
526 RND3 (c,d,a,b,x[ 3],16,0xd4ef3085); RND3 (b,c,d,a,x[ 6],23, 0x4881d05);
|
yuuji@0
|
527 RND3 (a,b,c,d,x[ 9], 4,0xd9d4d039); RND3 (d,a,b,c,x[12],11,0xe6db99e5);
|
yuuji@0
|
528 RND3 (c,d,a,b,x[15],16,0x1fa27cf8); RND3 (b,c,d,a,x[ 2],23,0xc4ac5665);
|
yuuji@0
|
529 /* round 4 */
|
yuuji@0
|
530 RND4 (a,b,c,d,x[ 0], 6,0xf4292244); RND4 (d,a,b,c,x[ 7],10,0x432aff97);
|
yuuji@0
|
531 RND4 (c,d,a,b,x[14],15,0xab9423a7); RND4 (b,c,d,a,x[ 5],21,0xfc93a039);
|
yuuji@0
|
532 RND4 (a,b,c,d,x[12], 6,0x655b59c3); RND4 (d,a,b,c,x[ 3],10,0x8f0ccc92);
|
yuuji@0
|
533 RND4 (c,d,a,b,x[10],15,0xffeff47d); RND4 (b,c,d,a,x[ 1],21,0x85845dd1);
|
yuuji@0
|
534 RND4 (a,b,c,d,x[ 8], 6,0x6fa87e4f); RND4 (d,a,b,c,x[15],10,0xfe2ce6e0);
|
yuuji@0
|
535 RND4 (c,d,a,b,x[ 6],15,0xa3014314); RND4 (b,c,d,a,x[13],21,0x4e0811a1);
|
yuuji@0
|
536 RND4 (a,b,c,d,x[ 4], 6,0xf7537e82); RND4 (d,a,b,c,x[11],10,0xbd3af235);
|
yuuji@0
|
537 RND4 (c,d,a,b,x[ 2],15,0x2ad7d2bb); RND4 (b,c,d,a,x[ 9],21,0xeb86d391);
|
yuuji@0
|
538 /* update state */
|
yuuji@0
|
539 state[0] += a; state[1] += b; state[2] += c; state[3] += d;
|
yuuji@0
|
540 memset (x,0,sizeof (x)); /* erase sensitive data */
|
yuuji@0
|
541 }
|
yuuji@0
|
542
|
yuuji@0
|
543 /* You may wonder why these strange "& 0xff" maskings are here. This is to
|
yuuji@0
|
544 * ensure correct results on machines with a char size of larger than 8 bits.
|
yuuji@0
|
545 * For example, the KCC compiler on the PDP-10 uses 9-bit chars.
|
yuuji@0
|
546 */
|
yuuji@0
|
547
|
yuuji@0
|
548 /* MD5 encode unsigned long into LSB-first bytes
|
yuuji@0
|
549 * Accepts: destination pointer
|
yuuji@0
|
550 * source
|
yuuji@0
|
551 * length of source
|
yuuji@0
|
552 */
|
yuuji@0
|
553
|
yuuji@0
|
554 static void md5_encode (unsigned char *dst,unsigned long *src,int len)
|
yuuji@0
|
555 {
|
yuuji@0
|
556 int i;
|
yuuji@0
|
557 for (i = 0; i < len; i++) {
|
yuuji@0
|
558 *dst++ = (unsigned char) (src[i] & 0xff);
|
yuuji@0
|
559 *dst++ = (unsigned char) ((src[i] >> 8) & 0xff);
|
yuuji@0
|
560 *dst++ = (unsigned char) ((src[i] >> 16) & 0xff);
|
yuuji@0
|
561 *dst++ = (unsigned char) ((src[i] >> 24) & 0xff);
|
yuuji@0
|
562 }
|
yuuji@0
|
563 }
|
yuuji@0
|
564
|
yuuji@0
|
565
|
yuuji@0
|
566 /* MD5 decode LSB-first bytes into unsigned long
|
yuuji@0
|
567 * Accepts: destination pointer
|
yuuji@0
|
568 * source
|
yuuji@0
|
569 * length of destination
|
yuuji@0
|
570 */
|
yuuji@0
|
571
|
yuuji@0
|
572 static void md5_decode (unsigned long *dst,unsigned char *src,int len)
|
yuuji@0
|
573 {
|
yuuji@0
|
574 int i, j;
|
yuuji@0
|
575 for (i = 0, j = 0; i < len; i++, j += 4)
|
yuuji@0
|
576 dst[i] = ((unsigned long) (src[j] & 0xff)) |
|
yuuji@0
|
577 (((unsigned long) (src[j+1] & 0xff)) << 8) |
|
yuuji@0
|
578 (((unsigned long) (src[j+2] & 0xff)) << 16) |
|
yuuji@0
|
579 (((unsigned long) (src[j+3] & 0xff)) << 24);
|
yuuji@0
|
580 }
|