bcrypt 3.1.10-java → 3.1.14-java

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,53 +1,105 @@
1
1
  #include <ruby.h>
2
2
  #include <ow-crypt.h>
3
3
 
4
+ #ifdef HAVE_RUBY_THREAD_H
5
+ #include <ruby/thread.h>
6
+ #endif
7
+
4
8
  static VALUE mBCrypt;
5
9
  static VALUE cBCryptEngine;
6
10
 
11
+ struct bc_salt_args {
12
+ const char * prefix;
13
+ unsigned long count;
14
+ const char * input;
15
+ int size;
16
+ };
17
+
18
+ static void * bc_salt_nogvl(void * ptr) {
19
+ struct bc_salt_args * args = ptr;
20
+
21
+ return crypt_gensalt_ra(args->prefix, args->count, args->input, args->size);
22
+ }
23
+
7
24
  /* Given a logarithmic cost parameter, generates a salt for use with +bc_crypt+.
8
25
  */
9
26
  static VALUE bc_salt(VALUE self, VALUE prefix, VALUE count, VALUE input) {
10
27
  char * salt;
11
28
  VALUE str_salt;
12
-
13
- salt = crypt_gensalt_ra(
14
- StringValuePtr(prefix),
15
- NUM2ULONG(count),
16
- NIL_P(input) ? NULL : StringValuePtr(input),
17
- NIL_P(input) ? 0 : RSTRING_LEN(input));
29
+ struct bc_salt_args args;
30
+
31
+ /* duplicate the parameters for thread safety. If another thread has a
32
+ * reference to the parameters and mutates them while we are working,
33
+ * that would be very bad. Duping the strings means that the reference
34
+ * isn't shared. */
35
+ prefix = rb_str_new_frozen(prefix);
36
+ input = rb_str_new_frozen(input);
37
+
38
+ args.prefix = StringValueCStr(prefix);
39
+ args.count = NUM2ULONG(count);
40
+ args.input = NIL_P(input) ? NULL : StringValuePtr(input);
41
+ args.size = NIL_P(input) ? 0 : RSTRING_LEN(input);
42
+
43
+ #ifdef HAVE_RUBY_THREAD_H
44
+ salt = rb_thread_call_without_gvl(bc_salt_nogvl, &args, NULL, NULL);
45
+ #else
46
+ salt = bc_salt_nogvl((void *)&args);
47
+ #endif
18
48
 
19
49
  if(!salt) return Qnil;
20
50
 
21
51
  str_salt = rb_str_new2(salt);
22
- xfree(salt);
52
+ free(salt);
23
53
 
24
54
  return str_salt;
25
55
  }
26
56
 
57
+ struct bc_crypt_args {
58
+ const char * key;
59
+ const char * setting;
60
+ void * data;
61
+ int size;
62
+ };
63
+
64
+ static void * bc_crypt_nogvl(void * ptr) {
65
+ struct bc_crypt_args * args = ptr;
66
+
67
+ return crypt_ra(args->key, args->setting, &args->data, &args->size);
68
+ }
69
+
27
70
  /* Given a secret and a salt, generates a salted hash (which you can then store safely).
28
71
  */
29
72
  static VALUE bc_crypt(VALUE self, VALUE key, VALUE setting) {
30
73
  char * value;
31
- void * data;
32
- int size;
33
74
  VALUE out;
34
75
 
35
- data = NULL;
36
- size = 0xDEADBEEF;
76
+ struct bc_crypt_args args;
37
77
 
38
78
  if(NIL_P(key) || NIL_P(setting)) return Qnil;
39
79
 
40
- value = crypt_ra(
41
- NIL_P(key) ? NULL : StringValuePtr(key),
42
- NIL_P(setting) ? NULL : StringValuePtr(setting),
43
- &data,
44
- &size);
80
+ /* duplicate the parameters for thread safety. If another thread has a
81
+ * reference to the parameters and mutates them while we are working,
82
+ * that would be very bad. Duping the strings means that the reference
83
+ * isn't shared. */
84
+ key = rb_str_new_frozen(key);
85
+ setting = rb_str_new_frozen(setting);
86
+
87
+ args.data = NULL;
88
+ args.size = 0xDEADBEEF;
89
+ args.key = NIL_P(key) ? NULL : StringValueCStr(key);
90
+ args.setting = NIL_P(setting) ? NULL : StringValueCStr(setting);
91
+
92
+ #ifdef HAVE_RUBY_THREAD_H
93
+ value = rb_thread_call_without_gvl(bc_crypt_nogvl, &args, NULL, NULL);
94
+ #else
95
+ value = bc_crypt_nogvl((void *)&args);
96
+ #endif
45
97
 
46
- if(!value) return Qnil;
98
+ if(!value || !args.data) return Qnil;
47
99
 
48
- out = rb_str_new(data, size - 1);
100
+ out = rb_str_new(args.data, args.size - 1);
49
101
 
50
- xfree(data);
102
+ free(args.data);
51
103
 
52
104
  return out;
53
105
  }
@@ -1,5 +1,16 @@
1
1
  /*
2
- * Written by Solar Designer and placed in the public domain.
2
+ * Written by Solar Designer <solar at openwall.com> in 2000-2002.
3
+ * No copyright is claimed, and the software is hereby placed in the public
4
+ * domain. In case this attempt to disclaim copyright and place the software
5
+ * in the public domain is deemed null and void, then the software is
6
+ * Copyright (c) 2000-2002 Solar Designer and it is hereby released to the
7
+ * general public under the following terms:
8
+ *
9
+ * Redistribution and use in source and binary forms, with or without
10
+ * modification, are permitted.
11
+ *
12
+ * There's ABSOLUTELY NO WARRANTY, express or implied.
13
+ *
3
14
  * See crypt_blowfish.c for more information.
4
15
  */
5
16
 
@@ -1,26 +1,38 @@
1
1
  /*
2
+ * The crypt_blowfish homepage is:
3
+ *
4
+ * http://www.openwall.com/crypt/
5
+ *
2
6
  * This code comes from John the Ripper password cracker, with reentrant
3
7
  * and crypt(3) interfaces added, but optimizations specific to password
4
8
  * cracking removed.
5
9
  *
6
- * Written by Solar Designer <solar at openwall.com> in 1998-2002 and
7
- * placed in the public domain. Quick self-test added in 2011 and also
8
- * placed in the public domain.
10
+ * Written by Solar Designer <solar at openwall.com> in 1998-2014.
11
+ * No copyright is claimed, and the software is hereby placed in the public
12
+ * domain. In case this attempt to disclaim copyright and place the software
13
+ * in the public domain is deemed null and void, then the software is
14
+ * Copyright (c) 1998-2014 Solar Designer and it is hereby released to the
15
+ * general public under the following terms:
16
+ *
17
+ * Redistribution and use in source and binary forms, with or without
18
+ * modification, are permitted.
9
19
  *
10
- * There's absolutely no warranty.
20
+ * There's ABSOLUTELY NO WARRANTY, express or implied.
11
21
  *
12
22
  * It is my intent that you should be able to use this on your system,
13
- * as a part of a software package, or anywhere else to improve security,
23
+ * as part of a software package, or anywhere else to improve security,
14
24
  * ensure compatibility, or for any other purpose. I would appreciate
15
25
  * it if you give credit where it is due and keep your modifications in
16
26
  * the public domain as well, but I don't require that in order to let
17
27
  * you place this code and any modifications you make under a license
18
28
  * of your choice.
19
29
  *
20
- * This implementation is compatible with OpenBSD bcrypt.c (version 2a)
21
- * by Niels Provos <provos at citi.umich.edu>, and uses some of his
22
- * ideas. The password hashing algorithm was designed by David Mazieres
23
- * <dm at lcs.mit.edu>.
30
+ * This implementation is fully compatible with OpenBSD's bcrypt.c for prefix
31
+ * "$2b$", originally by Niels Provos <provos at citi.umich.edu>, and it uses
32
+ * some of his ideas. The password hashing algorithm was designed by David
33
+ * Mazieres <dm at lcs.mit.edu>. For information on the level of
34
+ * compatibility for bcrypt hash prefixes other than "$2b$", please refer to
35
+ * the comments in BF_set_key() below and to the included crypt(3) man page.
24
36
  *
25
37
  * There's a paper on the algorithm that explains its design decisions:
26
38
  *
@@ -38,21 +50,13 @@
38
50
  #define __set_errno(val) errno = (val)
39
51
  #endif
40
52
 
41
- #undef __CONST
42
- #ifdef __GNUC__
43
- #define __CONST __const
44
- #else
45
- #define __CONST
46
- #endif
53
+ /* Just to make sure the prototypes match the actual definitions */
54
+ #include "crypt_blowfish.h"
47
55
 
48
- /*
49
- * Please keep this enabled. We really don't want incompatible hashes to be
50
- * produced. The performance cost of this quick self-test is around 0.6% at
51
- * the "$2a$08" setting.
52
- */
53
- #define BF_SELF_TEST
54
-
55
- #if defined(__x86_64__) || defined(__alpha__) || defined(__hppa__)
56
+ #ifdef __i386__
57
+ #define BF_ASM 1
58
+ #define BF_SCALE 1
59
+ #elif defined(__x86_64__) || defined(__alpha__) || defined(__hppa__)
56
60
  #define BF_ASM 0
57
61
  #define BF_SCALE 1
58
62
  #else
@@ -357,7 +361,7 @@ static BF_ctx BF_init_state = {
357
361
  }
358
362
  };
359
363
 
360
- static unsigned char BF_itoa64[64 + 1] =
364
+ static const unsigned char BF_itoa64[64 + 1] =
361
365
  "./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
362
366
 
363
367
  static unsigned char BF_atoi64[0x60] = {
@@ -369,14 +373,6 @@ static unsigned char BF_atoi64[0x60] = {
369
373
  43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 64, 64, 64, 64, 64
370
374
  };
371
375
 
372
- /*
373
- * This may be optimized out if built with function inlining and no BF_ASM.
374
- */
375
- static void clean(void *data, int size)
376
- {
377
- memset(data, 0, size);
378
- }
379
-
380
376
  #define BF_safe_atoi64(dst, src) \
381
377
  { \
382
378
  tmp = (unsigned char)(src); \
@@ -386,14 +382,13 @@ static void clean(void *data, int size)
386
382
  (dst) = tmp; \
387
383
  }
388
384
 
389
- static int BF_decode(BF_word *dst, __CONST char *src, int size)
385
+ static int BF_decode(BF_word *dst, const char *src, int size)
390
386
  {
391
387
  unsigned char *dptr = (unsigned char *)dst;
392
388
  unsigned char *end = dptr + size;
393
- unsigned char *sptr = (unsigned char *)src;
394
- unsigned int tmp, c1, c2, c3, c4;
395
-
389
+ const unsigned char *sptr = (const unsigned char *)src;
396
390
  do {
391
+ unsigned int tmp, c1, c2, c3, c4;
397
392
  BF_safe_atoi64(c1, *sptr++);
398
393
  BF_safe_atoi64(c2, *sptr++);
399
394
  *dptr++ = (c1 << 2) | ((c2 & 0x30) >> 4);
@@ -406,18 +401,16 @@ static int BF_decode(BF_word *dst, __CONST char *src, int size)
406
401
  BF_safe_atoi64(c4, *sptr++);
407
402
  *dptr++ = ((c3 & 0x03) << 6) | c4;
408
403
  } while (dptr < end);
409
-
410
404
  return 0;
411
405
  }
412
406
 
413
- static void BF_encode(char *dst, __CONST BF_word *src, int size)
407
+ static void BF_encode(char *dst, const BF_word *src, int size)
414
408
  {
415
- unsigned char *sptr = (unsigned char *)src;
416
- unsigned char *end = sptr + size;
409
+ const unsigned char *sptr = (const unsigned char *)src;
410
+ const unsigned char *end = sptr + size;
417
411
  unsigned char *dptr = (unsigned char *)dst;
418
- unsigned int c1, c2;
419
-
420
412
  do {
413
+ unsigned int c1, c2;
421
414
  c1 = *sptr++;
422
415
  *dptr++ = BF_itoa64[c1 >> 2];
423
416
  c1 = (c1 & 0x03) << 4;
@@ -446,10 +439,9 @@ static void BF_swap(BF_word *x, int count)
446
439
  {
447
440
  static int endianness_check = 1;
448
441
  char *is_little_endian = (char *)&endianness_check;
449
- BF_word tmp;
450
-
451
442
  if (*is_little_endian)
452
443
  do {
444
+ BF_word tmp;
453
445
  tmp = *x;
454
446
  tmp = (tmp << 16) | (tmp >> 16);
455
447
  *x++ = ((tmp & 0x00FF00FF) << 8) | ((tmp >> 8) & 0x00FF00FF);
@@ -521,6 +513,10 @@ static void BF_swap(BF_word *x, int count)
521
513
  R = L; \
522
514
  L = tmp4 ^ data.ctx.P[BF_N + 1];
523
515
 
516
+ #if BF_ASM == 1
517
+ #define BF_body() \
518
+ _BF_body_r(&data.ctx);
519
+ #else
524
520
  #define BF_body() \
525
521
  L = R = 0; \
526
522
  ptr = data.ctx.P; \
@@ -538,35 +534,121 @@ static void BF_swap(BF_word *x, int count)
538
534
  *(ptr - 2) = L; \
539
535
  *(ptr - 1) = R; \
540
536
  } while (ptr < &data.ctx.S[3][0xFF]);
537
+ #endif
541
538
 
542
- static void BF_set_key(__CONST char *key, BF_key expanded, BF_key initial,
543
- int sign_extension_bug)
539
+ static void BF_set_key(const char *key, BF_key expanded, BF_key initial,
540
+ unsigned char flags)
544
541
  {
545
- __CONST char *ptr = key;
546
- int i, j;
547
- BF_word tmp;
542
+ const char *ptr = key;
543
+ unsigned int bug, i, j;
544
+ BF_word safety, sign, diff, tmp[2];
545
+
546
+ /*
547
+ * There was a sign extension bug in older revisions of this function. While
548
+ * we would have liked to simply fix the bug and move on, we have to provide
549
+ * a backwards compatibility feature (essentially the bug) for some systems and
550
+ * a safety measure for some others. The latter is needed because for certain
551
+ * multiple inputs to the buggy algorithm there exist easily found inputs to
552
+ * the correct algorithm that produce the same hash. Thus, we optionally
553
+ * deviate from the correct algorithm just enough to avoid such collisions.
554
+ * While the bug itself affected the majority of passwords containing
555
+ * characters with the 8th bit set (although only a percentage of those in a
556
+ * collision-producing way), the anti-collision safety measure affects
557
+ * only a subset of passwords containing the '\xff' character (not even all of
558
+ * those passwords, just some of them). This character is not found in valid
559
+ * UTF-8 sequences and is rarely used in popular 8-bit character encodings.
560
+ * Thus, the safety measure is unlikely to cause much annoyance, and is a
561
+ * reasonable tradeoff to use when authenticating against existing hashes that
562
+ * are not reliably known to have been computed with the correct algorithm.
563
+ *
564
+ * We use an approach that tries to minimize side-channel leaks of password
565
+ * information - that is, we mostly use fixed-cost bitwise operations instead
566
+ * of branches or table lookups. (One conditional branch based on password
567
+ * length remains. It is not part of the bug aftermath, though, and is
568
+ * difficult and possibly unreasonable to avoid given the use of C strings by
569
+ * the caller, which results in similar timing leaks anyway.)
570
+ *
571
+ * For actual implementation, we set an array index in the variable "bug"
572
+ * (0 means no bug, 1 means sign extension bug emulation) and a flag in the
573
+ * variable "safety" (bit 16 is set when the safety measure is requested).
574
+ * Valid combinations of settings are:
575
+ *
576
+ * Prefix "$2a$": bug = 0, safety = 0x10000
577
+ * Prefix "$2b$": bug = 0, safety = 0
578
+ * Prefix "$2x$": bug = 1, safety = 0
579
+ * Prefix "$2y$": bug = 0, safety = 0
580
+ */
581
+ bug = (unsigned int)flags & 1;
582
+ safety = ((BF_word)flags & 2) << 15;
583
+
584
+ sign = diff = 0;
548
585
 
549
586
  for (i = 0; i < BF_N + 2; i++) {
550
- tmp = 0;
587
+ tmp[0] = tmp[1] = 0;
551
588
  for (j = 0; j < 4; j++) {
552
- tmp <<= 8;
553
- if (sign_extension_bug)
554
- tmp |= (BF_word_signed)(signed char)*ptr;
589
+ tmp[0] <<= 8;
590
+ tmp[0] |= (unsigned char)*ptr; /* correct */
591
+ tmp[1] <<= 8;
592
+ tmp[1] |= (BF_word_signed)(signed char)*ptr; /* bug */
593
+ /*
594
+ * Sign extension in the first char has no effect - nothing to overwrite yet,
595
+ * and those extra 24 bits will be fully shifted out of the 32-bit word. For
596
+ * chars 2, 3, 4 in each four-char block, we set bit 7 of "sign" if sign
597
+ * extension in tmp[1] occurs. Once this flag is set, it remains set.
598
+ */
599
+ if (j)
600
+ sign |= tmp[1] & 0x80;
601
+ if (!*ptr)
602
+ ptr = key;
555
603
  else
556
- tmp |= (unsigned char)*ptr;
557
-
558
- if (!*ptr) ptr = key; else ptr++;
604
+ ptr++;
559
605
  }
606
+ diff |= tmp[0] ^ tmp[1]; /* Non-zero on any differences */
560
607
 
561
- expanded[i] = tmp;
562
- initial[i] = BF_init_state.P[i] ^ tmp;
608
+ expanded[i] = tmp[bug];
609
+ initial[i] = BF_init_state.P[i] ^ tmp[bug];
563
610
  }
611
+
612
+ /*
613
+ * At this point, "diff" is zero iff the correct and buggy algorithms produced
614
+ * exactly the same result. If so and if "sign" is non-zero, which indicates
615
+ * that there was a non-benign sign extension, this means that we have a
616
+ * collision between the correctly computed hash for this password and a set of
617
+ * passwords that could be supplied to the buggy algorithm. Our safety measure
618
+ * is meant to protect from such many-buggy to one-correct collisions, by
619
+ * deviating from the correct algorithm in such cases. Let's check for this.
620
+ */
621
+ diff |= diff >> 16; /* still zero iff exact match */
622
+ diff &= 0xffff; /* ditto */
623
+ diff += 0xffff; /* bit 16 set iff "diff" was non-zero (on non-match) */
624
+ sign <<= 9; /* move the non-benign sign extension flag to bit 16 */
625
+ sign &= ~diff & safety; /* action needed? */
626
+
627
+ /*
628
+ * If we have determined that we need to deviate from the correct algorithm,
629
+ * flip bit 16 in initial expanded key. (The choice of 16 is arbitrary, but
630
+ * let's stick to it now. It came out of the approach we used above, and it's
631
+ * not any worse than any other choice we could make.)
632
+ *
633
+ * It is crucial that we don't do the same to the expanded key used in the main
634
+ * Eksblowfish loop. By doing it to only one of these two, we deviate from a
635
+ * state that could be directly specified by a password to the buggy algorithm
636
+ * (and to the fully correct one as well, but that's a side-effect).
637
+ */
638
+ initial[0] ^= sign;
564
639
  }
565
640
 
566
- static char *BF_crypt(__CONST char *key, __CONST char *setting,
641
+ static const unsigned char flags_by_subtype[26] =
642
+ {2, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
643
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 4, 0};
644
+
645
+ static char *BF_crypt(const char *key, const char *setting,
567
646
  char *output, int size,
568
647
  BF_word min)
569
648
  {
649
+ #if BF_ASM == 1
650
+ extern void _BF_body_r(BF_ctx *ctx);
651
+ #endif
570
652
  struct {
571
653
  BF_ctx ctx;
572
654
  BF_key expanded_key;
@@ -588,7 +670,8 @@ static char *BF_crypt(__CONST char *key, __CONST char *setting,
588
670
 
589
671
  if (setting[0] != '$' ||
590
672
  setting[1] != '2' ||
591
- (setting[2] != 'a' && setting[2] != 'x') ||
673
+ setting[2] < 'a' || setting[2] > 'z' ||
674
+ !flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a'] ||
592
675
  setting[3] != '$' ||
593
676
  setting[4] < '0' || setting[4] > '3' ||
594
677
  setting[5] < '0' || setting[5] > '9' ||
@@ -600,13 +683,13 @@ static char *BF_crypt(__CONST char *key, __CONST char *setting,
600
683
 
601
684
  count = (BF_word)1 << ((setting[4] - '0') * 10 + (setting[5] - '0'));
602
685
  if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) {
603
- clean(data.binary.salt, sizeof(data.binary.salt));
604
686
  __set_errno(EINVAL);
605
687
  return NULL;
606
688
  }
607
689
  BF_swap(data.binary.salt, 4);
608
690
 
609
- BF_set_key(key, data.expanded_key, data.ctx.P, setting[2] == 'x');
691
+ BF_set_key(key, data.expanded_key, data.ctx.P,
692
+ flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a']);
610
693
 
611
694
  memcpy(data.ctx.S, BF_init_state.S, sizeof(data.ctx.S));
612
695
 
@@ -636,51 +719,33 @@ static char *BF_crypt(__CONST char *key, __CONST char *setting,
636
719
  } while (ptr < &data.ctx.S[3][0xFF]);
637
720
 
638
721
  do {
639
- data.ctx.P[0] ^= data.expanded_key[0];
640
- data.ctx.P[1] ^= data.expanded_key[1];
641
- data.ctx.P[2] ^= data.expanded_key[2];
642
- data.ctx.P[3] ^= data.expanded_key[3];
643
- data.ctx.P[4] ^= data.expanded_key[4];
644
- data.ctx.P[5] ^= data.expanded_key[5];
645
- data.ctx.P[6] ^= data.expanded_key[6];
646
- data.ctx.P[7] ^= data.expanded_key[7];
647
- data.ctx.P[8] ^= data.expanded_key[8];
648
- data.ctx.P[9] ^= data.expanded_key[9];
649
- data.ctx.P[10] ^= data.expanded_key[10];
650
- data.ctx.P[11] ^= data.expanded_key[11];
651
- data.ctx.P[12] ^= data.expanded_key[12];
652
- data.ctx.P[13] ^= data.expanded_key[13];
653
- data.ctx.P[14] ^= data.expanded_key[14];
654
- data.ctx.P[15] ^= data.expanded_key[15];
655
- data.ctx.P[16] ^= data.expanded_key[16];
656
- data.ctx.P[17] ^= data.expanded_key[17];
657
-
658
- BF_body();
659
-
660
- tmp1 = data.binary.salt[0];
661
- tmp2 = data.binary.salt[1];
662
- tmp3 = data.binary.salt[2];
663
- tmp4 = data.binary.salt[3];
664
- data.ctx.P[0] ^= tmp1;
665
- data.ctx.P[1] ^= tmp2;
666
- data.ctx.P[2] ^= tmp3;
667
- data.ctx.P[3] ^= tmp4;
668
- data.ctx.P[4] ^= tmp1;
669
- data.ctx.P[5] ^= tmp2;
670
- data.ctx.P[6] ^= tmp3;
671
- data.ctx.P[7] ^= tmp4;
672
- data.ctx.P[8] ^= tmp1;
673
- data.ctx.P[9] ^= tmp2;
674
- data.ctx.P[10] ^= tmp3;
675
- data.ctx.P[11] ^= tmp4;
676
- data.ctx.P[12] ^= tmp1;
677
- data.ctx.P[13] ^= tmp2;
678
- data.ctx.P[14] ^= tmp3;
679
- data.ctx.P[15] ^= tmp4;
680
- data.ctx.P[16] ^= tmp1;
681
- data.ctx.P[17] ^= tmp2;
682
-
683
- BF_body();
722
+ int done;
723
+
724
+ for (i = 0; i < BF_N + 2; i += 2) {
725
+ data.ctx.P[i] ^= data.expanded_key[i];
726
+ data.ctx.P[i + 1] ^= data.expanded_key[i + 1];
727
+ }
728
+
729
+ done = 0;
730
+ do {
731
+ BF_body();
732
+ if (done)
733
+ break;
734
+ done = 1;
735
+
736
+ tmp1 = data.binary.salt[0];
737
+ tmp2 = data.binary.salt[1];
738
+ tmp3 = data.binary.salt[2];
739
+ tmp4 = data.binary.salt[3];
740
+ for (i = 0; i < BF_N; i += 4) {
741
+ data.ctx.P[i] ^= tmp1;
742
+ data.ctx.P[i + 1] ^= tmp2;
743
+ data.ctx.P[i + 2] ^= tmp3;
744
+ data.ctx.P[i + 3] ^= tmp4;
745
+ }
746
+ data.ctx.P[16] ^= tmp1;
747
+ data.ctx.P[17] ^= tmp2;
748
+ } while (1);
684
749
  } while (--count);
685
750
 
686
751
  for (i = 0; i < 6; i += 2) {
@@ -706,64 +771,116 @@ static char *BF_crypt(__CONST char *key, __CONST char *setting,
706
771
  BF_encode(&output[7 + 22], data.binary.output, 23);
707
772
  output[7 + 22 + 31] = '\0';
708
773
 
709
- #ifndef BF_SELF_TEST
710
- /* Overwrite the most obvious sensitive data we have on the stack. Note
711
- * that this does not guarantee there's no sensitive data left on the
712
- * stack and/or in registers; I'm not aware of portable code that does. */
713
- clean(&data, sizeof(data));
714
- #endif
715
-
716
774
  return output;
717
775
  }
718
776
 
719
- char *_crypt_blowfish_rn(__CONST char *key, __CONST char *setting,
777
+ int _crypt_output_magic(const char *setting, char *output, int size)
778
+ {
779
+ if (size < 3)
780
+ return -1;
781
+
782
+ output[0] = '*';
783
+ output[1] = '0';
784
+ output[2] = '\0';
785
+
786
+ if (setting[0] == '*' && setting[1] == '0')
787
+ output[1] = '1';
788
+
789
+ return 0;
790
+ }
791
+
792
+ /*
793
+ * Please preserve the runtime self-test. It serves two purposes at once:
794
+ *
795
+ * 1. We really can't afford the risk of producing incompatible hashes e.g.
796
+ * when there's something like gcc bug 26587 again, whereas an application or
797
+ * library integrating this code might not also integrate our external tests or
798
+ * it might not run them after every build. Even if it does, the miscompile
799
+ * might only occur on the production build, but not on a testing build (such
800
+ * as because of different optimization settings). It is painful to recover
801
+ * from incorrectly-computed hashes - merely fixing whatever broke is not
802
+ * enough. Thus, a proactive measure like this self-test is needed.
803
+ *
804
+ * 2. We don't want to leave sensitive data from our actual password hash
805
+ * computation on the stack or in registers. Previous revisions of the code
806
+ * would do explicit cleanups, but simply running the self-test after hash
807
+ * computation is more reliable.
808
+ *
809
+ * The performance cost of this quick self-test is around 0.6% at the "$2a$08"
810
+ * setting.
811
+ */
812
+ char *_crypt_blowfish_rn(const char *key, const char *setting,
720
813
  char *output, int size)
721
814
  {
722
- #ifdef BF_SELF_TEST
723
- __CONST char *test_key = "8b \xd0\xc1\xd2\xcf\xcc\xd8";
724
- __CONST char *test_2a =
725
- "$2a$00$abcdefghijklmnopqrstuui1D709vfamulimlGcq0qq3UvuUasvEa"
726
- "\0"
727
- "canary";
728
- __CONST char *test_2x =
729
- "$2x$00$abcdefghijklmnopqrstuuVUrPmXD6q/nVSSp7pNDhCR9071IfIRe"
730
- "\0"
731
- "canary";
732
- __CONST char *test_hash, *p;
733
- int ok;
734
- char buf[7 + 22 + 31 + 1 + 6 + 1];
735
-
736
- output = BF_crypt(key, setting, output, size, 16);
737
-
738
- /* Do a quick self-test. This also happens to overwrite BF_crypt()'s data. */
739
- test_hash = (setting[2] == 'x') ? test_2x : test_2a;
740
- memcpy(buf, test_hash, sizeof(buf));
741
- memset(buf, -1, sizeof(buf) - (6 + 1)); /* keep "canary" only */
742
- p = BF_crypt(test_key, test_hash, buf, sizeof(buf) - 6, 1);
743
-
744
- ok = (p == buf && !memcmp(p, test_hash, sizeof(buf)));
745
-
746
- /* This could reveal what hash type we were using last. Unfortunately, we
747
- * can't reliably clean the test_hash pointer. */
748
- clean(&buf, sizeof(buf));
815
+ const char *test_key = "8b \xd0\xc1\xd2\xcf\xcc\xd8";
816
+ const char *test_setting = "$2a$00$abcdefghijklmnopqrstuu";
817
+ static const char * const test_hashes[2] =
818
+ {"i1D709vfamulimlGcq0qq3UvuUasvEa\0\x55", /* 'a', 'b', 'y' */
819
+ "VUrPmXD6q/nVSSp7pNDhCR9071IfIRe\0\x55"}; /* 'x' */
820
+ const char *test_hash = test_hashes[0];
821
+ char *retval;
822
+ const char *p;
823
+ int save_errno, ok;
824
+ struct {
825
+ char s[7 + 22 + 1];
826
+ char o[7 + 22 + 31 + 1 + 1 + 1];
827
+ } buf;
828
+
829
+ /* Hash the supplied password */
830
+ _crypt_output_magic(setting, output, size);
831
+ retval = BF_crypt(key, setting, output, size, 16);
832
+ save_errno = errno;
749
833
 
834
+ /*
835
+ * Do a quick self-test. It is important that we make both calls to BF_crypt()
836
+ * from the same scope such that they likely use the same stack locations,
837
+ * which makes the second call overwrite the first call's sensitive data on the
838
+ * stack and makes it more likely that any alignment related issues would be
839
+ * detected by the self-test.
840
+ */
841
+ memcpy(buf.s, test_setting, sizeof(buf.s));
842
+ if (retval) {
843
+ unsigned int flags = flags_by_subtype[
844
+ (unsigned int)(unsigned char)setting[2] - 'a'];
845
+ test_hash = test_hashes[flags & 1];
846
+ buf.s[2] = setting[2];
847
+ }
848
+ memset(buf.o, 0x55, sizeof(buf.o));
849
+ buf.o[sizeof(buf.o) - 1] = 0;
850
+ p = BF_crypt(test_key, buf.s, buf.o, sizeof(buf.o) - (1 + 1), 1);
851
+
852
+ ok = (p == buf.o &&
853
+ !memcmp(p, buf.s, 7 + 22) &&
854
+ !memcmp(p + (7 + 22), test_hash, 31 + 1 + 1 + 1));
855
+
856
+ {
857
+ const char *k = "\xff\xa3" "34" "\xff\xff\xff\xa3" "345";
858
+ BF_key ae, ai, ye, yi;
859
+ BF_set_key(k, ae, ai, 2); /* $2a$ */
860
+ BF_set_key(k, ye, yi, 4); /* $2y$ */
861
+ ai[0] ^= 0x10000; /* undo the safety (for comparison) */
862
+ ok = ok && ai[0] == 0xdb9c59bc && ye[17] == 0x33343500 &&
863
+ !memcmp(ae, ye, sizeof(ae)) &&
864
+ !memcmp(ai, yi, sizeof(ai));
865
+ }
866
+
867
+ __set_errno(save_errno);
750
868
  if (ok)
751
- return output;
869
+ return retval;
752
870
 
753
871
  /* Should not happen */
872
+ _crypt_output_magic(setting, output, size);
754
873
  __set_errno(EINVAL); /* pretend we don't support this hash type */
755
874
  return NULL;
756
- #else
757
- #warning Self-test is disabled, please enable
758
- return BF_crypt(key, setting, output, size, 16);
759
- #endif
760
875
  }
761
876
 
762
- char *_crypt_gensalt_blowfish_rn(unsigned long count,
763
- __CONST char *input, int size, char *output, int output_size)
877
+ char *_crypt_gensalt_blowfish_rn(const char *prefix, unsigned long count,
878
+ const char *input, int size, char *output, int output_size)
764
879
  {
765
880
  if (size < 16 || output_size < 7 + 22 + 1 ||
766
- (count && (count < 4 || count > 31))) {
881
+ (count && (count < 4 || count > 31)) ||
882
+ prefix[0] != '$' || prefix[1] != '2' ||
883
+ (prefix[2] != 'a' && prefix[2] != 'b' && prefix[2] != 'y')) {
767
884
  if (output_size > 0) output[0] = '\0';
768
885
  __set_errno((output_size < 7 + 22 + 1) ? ERANGE : EINVAL);
769
886
  return NULL;
@@ -773,13 +890,13 @@ char *_crypt_gensalt_blowfish_rn(unsigned long count,
773
890
 
774
891
  output[0] = '$';
775
892
  output[1] = '2';
776
- output[2] = 'a';
893
+ output[2] = prefix[2];
777
894
  output[3] = '$';
778
895
  output[4] = '0' + count / 10;
779
896
  output[5] = '0' + count % 10;
780
897
  output[6] = '$';
781
898
 
782
- BF_encode(&output[7], (BF_word *)input, 16);
899
+ BF_encode(&output[7], (const BF_word *)input, 16);
783
900
  output[7 + 22] = '\0';
784
901
 
785
902
  return output;