3 * The DragonFly Project. All rights reserved.
5 * This code is derived from software contributed to The DragonFly Project
6 * by Nolan Lum <nol888@gmail.com>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
18 * 3. Neither the name of The DragonFly Project nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific, prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include <sys/types.h>
46 crypt_sha512(const char *pw, const char *salt)
48 static const char *magic = "$4$"; /* Magic string for this
49 * algorithm. Easier to change
50 * when factored as constant.
52 static char passwd[120], *p;
53 static const char *sp, *ep;
54 unsigned char final[SHA512_SIZE];
59 /* Refine the salt. */
62 /* If it starts with the magic string, then skip that. */
63 if (!strncmp(sp, magic, strlen(magic)))
66 /* Stop at the first '$', max 8 chars. */
67 for (ep = sp; *ep && *ep != '$' && ep < (sp + 8); ep++)
70 /* Get the actual salt length. */
75 /* Hash in the password first. */
76 SHA512_Update(&ctx, pw, strlen(pw));
78 /* Then the magic string */
79 SHA512_Update(&ctx, magic, sizeof(magic));
81 /* Then the raw salt. */
82 SHA512_Update(&ctx, sp, sl);
84 /* Finish and create the output string. */
85 SHA512_Final(final, &ctx);
86 strcpy(passwd, magic);
87 strncat(passwd, sp, sl);
90 p = passwd + strlen(passwd);
93 * For-loop form of the algorithm in sha256.c;
94 * breaks the final output up into 3cols and then base64's each row.
96 for (i = 0; i < 20; i++) {
97 l = (final[i] << 16) | (final[i + 21] << 8) | final[i + 42];
98 _crypt_to64(p, l, 4); p += 4;
100 l = (final[20] << 16) | (final[41] << 8);
101 _crypt_to64(p, l, 4); p += 4;
105 memset(final, 0, sizeof(final));