gambas-source-code/gb.crypt/src/c_crypt.c
gambas 17a6ad0c73 No need to include <crypt.h> anymore.
[GB.CRYPT]
* NEW: No need to include <crypt.h> anymore.
2018-08-29 13:41:57 +02:00

203 lines
4.9 KiB
C

/***************************************************************************
c_crypt.c
(c) 2000-2017 Benoît Minisini <g4mba5@gmail.com>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2, or (at your option)
any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
MA 02110-1301, USA.
***************************************************************************/
#define __C_CRYPT_C
#include "gb_common.h"
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <time.h>
#include "c_crypt.h"
#include "main.h"
enum { USE_DES, USE_MD5, USE_SHA256, USE_SHA512 };
static char *do_crypt(const char *passwd, const char *prefix, int mode)
{
static char key_table[65] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcedefghijklmnopqrstuvwxyz./";
static bool init = FALSE;
int i, n;
char key[18];
char *result;
char errormsg[64];
switch(mode)
{
case USE_MD5:
strcpy(key, "$1$");
n = 8;
break;
case USE_SHA256:
strcpy(key, "$5$");
n = 13;
break;
case USE_SHA512:
strcpy(key, "$6$");
n = 13;
break;
case USE_DES:
default:
n = 2;
}
if (prefix)
{
if (strlen(prefix) != n)
{
snprintf(errormsg, sizeof(errormsg), "must be %d characters long", n);
goto __BAD_PREFIX;
}
for (i = 0; i < n; i++)
{
if (strchr(key_table, prefix[i]) == NULL)
{
snprintf(errormsg, sizeof(errormsg), "character '%c' is not allowed" , prefix[i]);
goto __BAD_PREFIX;
}
}
if (mode == USE_DES)
strcpy(key, prefix);
else
strcat(key, prefix);
}
else
{
if (!init)
{
srandom((unsigned int)time(NULL));
init = TRUE;
}
if (mode == USE_DES)
{
for (i = 0; i < 2; i++)
key[i] = key_table[(int)((random() / (RAND_MAX + 1.0)) * sizeof(key_table))];
key[2] = 0;
}
else if (mode == USE_MD5)
{
for (i = 0; i < 8; i++)
key[i + 3] = key_table[(int)((random() / (RAND_MAX + 1.0)) * sizeof(key_table))];
key[11] = '$';
key[12] = 0;
}
else
{
for (i = 0; i < 13; i++)
key[i + 3] = key_table[(int)((random() / (RAND_MAX + 1.0)) * sizeof(key_table))];
key[16] = '$';
key[17] = 0;
}
}
result = crypt(passwd, key);
if (!result && errno == ENOSYS)
GB.Error("Crypting is not supported on this system");
return result;
__BAD_PREFIX:
GB.Error("Bad prefix, &1",errormsg);
return NULL;
}
static bool check_crypt(const char *passwd, const char *crypted)
{
char *result = crypt(passwd, crypted);
if (!result && errno == ENOSYS)
GB.Error("Crypting is not supported on this system");
if (!result)
return TRUE;
else
return strcmp(result, crypted) != 0;
}
BEGIN_METHOD(CCRYPT_call_des, GB_STRING password; GB_STRING key)
char *result;
result = do_crypt(GB.ToZeroString(ARG(password)), MISSING(key) ? NULL : GB.ToZeroString(ARG(key)), USE_DES);
if (result)
GB.ReturnNewZeroString(result);
END_METHOD
BEGIN_METHOD(CCRYPT_call_md5, GB_STRING password; GB_STRING key)
char *result;
result = do_crypt(GB.ToZeroString(ARG(password)), MISSING(key) ? NULL : GB.ToZeroString(ARG(key)), USE_MD5);
if (result)
GB.ReturnNewZeroString(result);
END_METHOD
BEGIN_METHOD(CCRYPT_call_sha256, GB_STRING password; GB_STRING key)
char *result;
result = do_crypt(GB.ToZeroString(ARG(password)), MISSING(key) ? NULL : GB.ToZeroString(ARG(key)), USE_SHA256);
if (result)
GB.ReturnNewZeroString(result);
END_METHOD
BEGIN_METHOD(CCRYPT_call_sha512, GB_STRING password; GB_STRING key)
char *result;
result = do_crypt(GB.ToZeroString(ARG(password)), MISSING(key) ? NULL : GB.ToZeroString(ARG(key)), USE_SHA512);
if (result)
GB.ReturnNewZeroString(result);
END_METHOD
BEGIN_METHOD(CCRYPT_check, GB_STRING password; GB_STRING crypt)
GB.ReturnBoolean(check_crypt(GB.ToZeroString(ARG(password)), GB.ToZeroString(ARG(crypt))));
END_METHOD
GB_DESC CCryptDesc[] =
{
GB_DECLARE("Crypt", 0), GB_VIRTUAL_CLASS(),
GB_STATIC_METHOD("_call", "s", CCRYPT_call_md5, "(Password)s[(Prefix)s]"),
GB_STATIC_METHOD("Check", "b", CCRYPT_check, "(Password)s(Crypt)s"),
GB_STATIC_METHOD("DES", "s", CCRYPT_call_des, "(Password)s[(Prefix)s]"),
GB_STATIC_METHOD("MD5", "s", CCRYPT_call_md5, "(Password)s[(Prefix)s]"),
GB_STATIC_METHOD("SHA256", "s", CCRYPT_call_sha256, "(Password)s[(Prefix)s]"),
GB_STATIC_METHOD("SHA512", "s", CCRYPT_call_sha512, "(Password)s[(Prefix)s]"),
GB_END_DECLARE
};