bcrypt 3.1.12.rc1-java → 3.1.13-java
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -5
- data/.travis.yml +3 -7
- data/CHANGELOG +7 -1
- data/Gemfile.lock +15 -22
- data/README.md +17 -15
- data/Rakefile +0 -27
- data/appveyor.yml +32 -32
- data/bcrypt.gemspec +1 -3
- data/ext/jruby/bcrypt_jruby/BCrypt.java +524 -351
- data/ext/mri/crypt.h +12 -1
- data/ext/mri/crypt_blowfish.c +265 -144
- data/ext/mri/crypt_blowfish.h +27 -0
- data/ext/mri/crypt_gensalt.c +26 -13
- data/ext/mri/crypt_gensalt.h +30 -0
- data/ext/mri/extconf.rb +6 -0
- data/ext/mri/ow-crypt.h +25 -17
- data/ext/mri/wrapper.c +335 -46
- data/ext/mri/x86.S +203 -0
- data/lib/bcrypt.rb +1 -6
- data/lib/bcrypt/engine.rb +4 -4
- data/lib/bcrypt/password.rb +1 -1
- data/spec/bcrypt/engine_spec.rb +67 -2
- metadata +8 -19
@@ -0,0 +1,27 @@
|
|
1
|
+
/*
|
2
|
+
* Written by Solar Designer <solar at openwall.com> in 2000-2011.
|
3
|
+
* No copyright is claimed, and the software is hereby placed in the public
|
4
|
+
* domain. In case this attempt to disclaim copyright and place the software
|
5
|
+
* in the public domain is deemed null and void, then the software is
|
6
|
+
* Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
|
7
|
+
* general public under the following terms:
|
8
|
+
*
|
9
|
+
* Redistribution and use in source and binary forms, with or without
|
10
|
+
* modification, are permitted.
|
11
|
+
*
|
12
|
+
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
13
|
+
*
|
14
|
+
* See crypt_blowfish.c for more information.
|
15
|
+
*/
|
16
|
+
|
17
|
+
#ifndef _CRYPT_BLOWFISH_H
|
18
|
+
#define _CRYPT_BLOWFISH_H
|
19
|
+
|
20
|
+
extern int _crypt_output_magic(const char *setting, char *output, int size);
|
21
|
+
extern char *_crypt_blowfish_rn(const char *key, const char *setting,
|
22
|
+
char *output, int size);
|
23
|
+
extern char *_crypt_gensalt_blowfish_rn(const char *prefix,
|
24
|
+
unsigned long count,
|
25
|
+
const char *input, int size, char *output, int output_size);
|
26
|
+
|
27
|
+
#endif
|
data/ext/mri/crypt_gensalt.c
CHANGED
@@ -1,5 +1,16 @@
|
|
1
1
|
/*
|
2
|
-
* Written by Solar Designer
|
2
|
+
* Written by Solar Designer <solar at openwall.com> in 2000-2011.
|
3
|
+
* No copyright is claimed, and the software is hereby placed in the public
|
4
|
+
* domain. In case this attempt to disclaim copyright and place the software
|
5
|
+
* in the public domain is deemed null and void, then the software is
|
6
|
+
* Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
|
7
|
+
* general public under the following terms:
|
8
|
+
*
|
9
|
+
* Redistribution and use in source and binary forms, with or without
|
10
|
+
* modification, are permitted.
|
11
|
+
*
|
12
|
+
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
13
|
+
*
|
3
14
|
* See crypt_blowfish.c for more information.
|
4
15
|
*
|
5
16
|
* This file contains salt generation functions for the traditional and
|
@@ -14,19 +25,17 @@
|
|
14
25
|
#define __set_errno(val) errno = (val)
|
15
26
|
#endif
|
16
27
|
|
17
|
-
|
18
|
-
#
|
19
|
-
#define __CONST __const
|
20
|
-
#else
|
21
|
-
#define __CONST
|
22
|
-
#endif
|
28
|
+
/* Just to make sure the prototypes match the actual definitions */
|
29
|
+
#include "crypt_gensalt.h"
|
23
30
|
|
24
31
|
unsigned char _crypt_itoa64[64 + 1] =
|
25
32
|
"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
26
33
|
|
27
|
-
char *_crypt_gensalt_traditional_rn(unsigned long count,
|
28
|
-
|
34
|
+
char *_crypt_gensalt_traditional_rn(const char *prefix, unsigned long count,
|
35
|
+
const char *input, int size, char *output, int output_size)
|
29
36
|
{
|
37
|
+
(void) prefix;
|
38
|
+
|
30
39
|
if (size < 2 || output_size < 2 + 1 || (count && count != 25)) {
|
31
40
|
if (output_size > 0) output[0] = '\0';
|
32
41
|
__set_errno((output_size < 2 + 1) ? ERANGE : EINVAL);
|
@@ -40,11 +49,13 @@ char *_crypt_gensalt_traditional_rn(unsigned long count,
|
|
40
49
|
return output;
|
41
50
|
}
|
42
51
|
|
43
|
-
char *_crypt_gensalt_extended_rn(unsigned long count,
|
44
|
-
|
52
|
+
char *_crypt_gensalt_extended_rn(const char *prefix, unsigned long count,
|
53
|
+
const char *input, int size, char *output, int output_size)
|
45
54
|
{
|
46
55
|
unsigned long value;
|
47
56
|
|
57
|
+
(void) prefix;
|
58
|
+
|
48
59
|
/* Even iteration counts make it easier to detect weak DES keys from a look
|
49
60
|
* at the hash, so they should be avoided */
|
50
61
|
if (size < 3 || output_size < 1 + 4 + 4 + 1 ||
|
@@ -73,11 +84,13 @@ char *_crypt_gensalt_extended_rn(unsigned long count,
|
|
73
84
|
return output;
|
74
85
|
}
|
75
86
|
|
76
|
-
char *_crypt_gensalt_md5_rn(unsigned long count,
|
77
|
-
|
87
|
+
char *_crypt_gensalt_md5_rn(const char *prefix, unsigned long count,
|
88
|
+
const char *input, int size, char *output, int output_size)
|
78
89
|
{
|
79
90
|
unsigned long value;
|
80
91
|
|
92
|
+
(void) prefix;
|
93
|
+
|
81
94
|
if (size < 3 || output_size < 3 + 4 + 1 || (count && count != 1000)) {
|
82
95
|
if (output_size > 0) output[0] = '\0';
|
83
96
|
__set_errno((output_size < 3 + 4 + 1) ? ERANGE : EINVAL);
|
@@ -0,0 +1,30 @@
|
|
1
|
+
/*
|
2
|
+
* Written by Solar Designer <solar at openwall.com> in 2000-2011.
|
3
|
+
* No copyright is claimed, and the software is hereby placed in the public
|
4
|
+
* domain. In case this attempt to disclaim copyright and place the software
|
5
|
+
* in the public domain is deemed null and void, then the software is
|
6
|
+
* Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
|
7
|
+
* general public under the following terms:
|
8
|
+
*
|
9
|
+
* Redistribution and use in source and binary forms, with or without
|
10
|
+
* modification, are permitted.
|
11
|
+
*
|
12
|
+
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
13
|
+
*
|
14
|
+
* See crypt_blowfish.c for more information.
|
15
|
+
*/
|
16
|
+
|
17
|
+
#ifndef _CRYPT_GENSALT_H
|
18
|
+
#define _CRYPT_GENSALT_H
|
19
|
+
|
20
|
+
extern unsigned char _crypt_itoa64[];
|
21
|
+
extern char *_crypt_gensalt_traditional_rn(const char *prefix,
|
22
|
+
unsigned long count,
|
23
|
+
const char *input, int size, char *output, int output_size);
|
24
|
+
extern char *_crypt_gensalt_extended_rn(const char *prefix,
|
25
|
+
unsigned long count,
|
26
|
+
const char *input, int size, char *output, int output_size);
|
27
|
+
extern char *_crypt_gensalt_md5_rn(const char *prefix, unsigned long count,
|
28
|
+
const char *input, int size, char *output, int output_size);
|
29
|
+
|
30
|
+
#endif
|
data/ext/mri/extconf.rb
CHANGED
@@ -11,6 +11,12 @@ if RUBY_PLATFORM == "java"
|
|
11
11
|
exit 0
|
12
12
|
else
|
13
13
|
require "mkmf"
|
14
|
+
|
15
|
+
# From Openwall's crypt_blowfish Makefile.
|
16
|
+
# This is `bcrypt_ext` (our extension) + CRYPT_OBJS from that Makefile.
|
17
|
+
$objs = %w(bcrypt_ext.o crypt_blowfish.o x86.o crypt_gensalt.o wrapper.o)
|
18
|
+
|
19
|
+
$defs << "-D__SKIP_GNU"
|
14
20
|
dir_config("bcrypt_ext")
|
15
21
|
create_makefile("bcrypt_ext")
|
16
22
|
end
|
data/ext/mri/ow-crypt.h
CHANGED
@@ -1,35 +1,43 @@
|
|
1
1
|
/*
|
2
|
-
* Written by Solar Designer
|
2
|
+
* Written by Solar Designer <solar at openwall.com> in 2000-2011.
|
3
|
+
* No copyright is claimed, and the software is hereby placed in the public
|
4
|
+
* domain. In case this attempt to disclaim copyright and place the software
|
5
|
+
* in the public domain is deemed null and void, then the software is
|
6
|
+
* Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
|
7
|
+
* general public under the following terms:
|
8
|
+
*
|
9
|
+
* Redistribution and use in source and binary forms, with or without
|
10
|
+
* modification, are permitted.
|
11
|
+
*
|
12
|
+
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
13
|
+
*
|
3
14
|
* See crypt_blowfish.c for more information.
|
4
15
|
*/
|
5
16
|
|
6
17
|
#ifndef _OW_CRYPT_H
|
7
18
|
#define _OW_CRYPT_H
|
8
19
|
|
9
|
-
#
|
10
|
-
#
|
11
|
-
#define
|
12
|
-
#elif defined _MSC_VER
|
13
|
-
#define __CONST const
|
14
|
-
#else
|
20
|
+
#ifndef __GNUC__
|
21
|
+
#undef __const
|
22
|
+
#define __const const
|
15
23
|
#endif
|
16
24
|
|
17
25
|
#ifndef __SKIP_GNU
|
18
|
-
extern char *crypt(
|
19
|
-
extern char *crypt_r(
|
26
|
+
extern char *crypt(__const char *key, __const char *setting);
|
27
|
+
extern char *crypt_r(__const char *key, __const char *setting, void *data);
|
20
28
|
#endif
|
21
29
|
|
22
30
|
#ifndef __SKIP_OW
|
23
|
-
extern char *crypt_rn(
|
31
|
+
extern char *crypt_rn(__const char *key, __const char *setting,
|
24
32
|
void *data, int size);
|
25
|
-
extern char *crypt_ra(
|
33
|
+
extern char *crypt_ra(__const char *key, __const char *setting,
|
26
34
|
void **data, int *size);
|
27
|
-
extern char *crypt_gensalt(
|
28
|
-
|
29
|
-
extern char *crypt_gensalt_rn(
|
30
|
-
|
31
|
-
extern char *crypt_gensalt_ra(
|
32
|
-
|
35
|
+
extern char *crypt_gensalt(__const char *prefix, unsigned long count,
|
36
|
+
__const char *input, int size);
|
37
|
+
extern char *crypt_gensalt_rn(__const char *prefix, unsigned long count,
|
38
|
+
__const char *input, int size, char *output, int output_size);
|
39
|
+
extern char *crypt_gensalt_ra(__const char *prefix, unsigned long count,
|
40
|
+
__const char *input, int size);
|
33
41
|
#endif
|
34
42
|
|
35
43
|
#endif
|
data/ext/mri/wrapper.c
CHANGED
@@ -1,5 +1,16 @@
|
|
1
1
|
/*
|
2
|
-
* Written by Solar Designer
|
2
|
+
* Written by Solar Designer <solar at openwall.com> in 2000-2014.
|
3
|
+
* No copyright is claimed, and the software is hereby placed in the public
|
4
|
+
* domain. In case this attempt to disclaim copyright and place the software
|
5
|
+
* in the public domain is deemed null and void, then the software is
|
6
|
+
* Copyright (c) 2000-2014 Solar Designer and it is hereby released to the
|
7
|
+
* general public under the following terms:
|
8
|
+
*
|
9
|
+
* Redistribution and use in source and binary forms, with or without
|
10
|
+
* modification, are permitted.
|
11
|
+
*
|
12
|
+
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
13
|
+
*
|
3
14
|
* See crypt_blowfish.c for more information.
|
4
15
|
*/
|
5
16
|
|
@@ -23,13 +34,6 @@
|
|
23
34
|
#endif
|
24
35
|
#endif
|
25
36
|
|
26
|
-
#include <ruby.h>
|
27
|
-
#ifdef HAVE_RUBY_UTIL_H
|
28
|
-
#include <ruby/util.h>
|
29
|
-
#else
|
30
|
-
#include <util.h>
|
31
|
-
#endif
|
32
|
-
|
33
37
|
#define CRYPT_OUTPUT_SIZE (7 + 22 + 31 + 1)
|
34
38
|
#define CRYPT_GENSALT_OUTPUT_SIZE (7 + 22 + 1)
|
35
39
|
|
@@ -38,18 +42,8 @@
|
|
38
42
|
#endif
|
39
43
|
#include "ow-crypt.h"
|
40
44
|
|
41
|
-
|
42
|
-
|
43
|
-
extern char *_crypt_gensalt_blowfish_rn(unsigned long count,
|
44
|
-
__CONST char *input, int size, char *output, int output_size);
|
45
|
-
|
46
|
-
extern unsigned char _crypt_itoa64[];
|
47
|
-
extern char *_crypt_gensalt_traditional_rn(unsigned long count,
|
48
|
-
__CONST char *input, int size, char *output, int output_size);
|
49
|
-
extern char *_crypt_gensalt_extended_rn(unsigned long count,
|
50
|
-
__CONST char *input, int size, char *output, int output_size);
|
51
|
-
extern char *_crypt_gensalt_md5_rn(unsigned long count,
|
52
|
-
__CONST char *input, int size, char *output, int output_size);
|
45
|
+
#include "crypt_blowfish.h"
|
46
|
+
#include "crypt_gensalt.h"
|
53
47
|
|
54
48
|
#if defined(__GLIBC__) && defined(_LIBC)
|
55
49
|
/* crypt.h from glibc-crypt-2.1 will define struct crypt_data for us */
|
@@ -90,17 +84,14 @@ static int _crypt_data_alloc(void **data, int *size, int need)
|
|
90
84
|
return 0;
|
91
85
|
}
|
92
86
|
|
93
|
-
static char *_crypt_retval_magic(char *retval,
|
94
|
-
char *output)
|
87
|
+
static char *_crypt_retval_magic(char *retval, const char *setting,
|
88
|
+
char *output, int size)
|
95
89
|
{
|
96
|
-
if (retval)
|
90
|
+
if (retval)
|
91
|
+
return retval;
|
97
92
|
|
98
|
-
output
|
99
|
-
|
100
|
-
output[2] = '\0';
|
101
|
-
|
102
|
-
if (setting[0] == '*' && setting[1] == '0')
|
103
|
-
output[1] = '1';
|
93
|
+
if (_crypt_output_magic(setting, output, size))
|
94
|
+
return NULL; /* shouldn't happen */
|
104
95
|
|
105
96
|
return output;
|
106
97
|
}
|
@@ -162,22 +153,22 @@ char *__crypt_r(__const char *key, __const char *setting,
|
|
162
153
|
{
|
163
154
|
return _crypt_retval_magic(
|
164
155
|
__crypt_rn(key, setting, data, sizeof(*data)),
|
165
|
-
setting, (char *)data);
|
156
|
+
setting, (char *)data, sizeof(*data));
|
166
157
|
}
|
167
158
|
|
168
159
|
char *__crypt(__const char *key, __const char *setting)
|
169
160
|
{
|
170
161
|
return _crypt_retval_magic(
|
171
162
|
__crypt_rn(key, setting, &_ufc_foobar, sizeof(_ufc_foobar)),
|
172
|
-
setting, (char *)&_ufc_foobar);
|
163
|
+
setting, (char *)&_ufc_foobar, sizeof(_ufc_foobar));
|
173
164
|
}
|
174
165
|
#else
|
175
|
-
char *crypt_rn(
|
166
|
+
char *crypt_rn(const char *key, const char *setting, void *data, int size)
|
176
167
|
{
|
177
168
|
return _crypt_blowfish_rn(key, setting, (char *)data, size);
|
178
169
|
}
|
179
170
|
|
180
|
-
char *crypt_ra(
|
171
|
+
char *crypt_ra(const char *key, const char *setting,
|
181
172
|
void **data, int *size)
|
182
173
|
{
|
183
174
|
if (_crypt_data_alloc(data, size, CRYPT_OUTPUT_SIZE))
|
@@ -185,11 +176,20 @@ char *crypt_ra(__CONST char *key, __CONST char *setting,
|
|
185
176
|
return _crypt_blowfish_rn(key, setting, (char *)*data, *size);
|
186
177
|
}
|
187
178
|
|
188
|
-
char *crypt_r(
|
179
|
+
char *crypt_r(const char *key, const char *setting, void *data)
|
189
180
|
{
|
190
181
|
return _crypt_retval_magic(
|
191
182
|
crypt_rn(key, setting, data, CRYPT_OUTPUT_SIZE),
|
192
|
-
setting, (char *)data);
|
183
|
+
setting, (char *)data, CRYPT_OUTPUT_SIZE);
|
184
|
+
}
|
185
|
+
|
186
|
+
char *crypt(const char *key, const char *setting)
|
187
|
+
{
|
188
|
+
static char output[CRYPT_OUTPUT_SIZE];
|
189
|
+
|
190
|
+
return _crypt_retval_magic(
|
191
|
+
crypt_rn(key, setting, output, sizeof(output)),
|
192
|
+
setting, output, sizeof(output));
|
193
193
|
}
|
194
194
|
|
195
195
|
#define __crypt_gensalt_rn crypt_gensalt_rn
|
@@ -197,11 +197,12 @@ char *crypt_r(__CONST char *key, __CONST char *setting, void *data)
|
|
197
197
|
#define __crypt_gensalt crypt_gensalt
|
198
198
|
#endif
|
199
199
|
|
200
|
-
char *__crypt_gensalt_rn(
|
201
|
-
|
200
|
+
char *__crypt_gensalt_rn(const char *prefix, unsigned long count,
|
201
|
+
const char *input, int size, char *output, int output_size)
|
202
202
|
{
|
203
|
-
char *(*use)(unsigned long
|
204
|
-
|
203
|
+
char *(*use)(const char *_prefix, unsigned long _count,
|
204
|
+
const char *_input, int _size,
|
205
|
+
char *_output, int _output_size);
|
205
206
|
|
206
207
|
/* This may be supported on some platforms in the future */
|
207
208
|
if (!input) {
|
@@ -209,7 +210,8 @@ char *__crypt_gensalt_rn(__CONST char *prefix, unsigned long count,
|
|
209
210
|
return NULL;
|
210
211
|
}
|
211
212
|
|
212
|
-
if (!strncmp(prefix, "$2a$", 4))
|
213
|
+
if (!strncmp(prefix, "$2a$", 4) || !strncmp(prefix, "$2b$", 4) ||
|
214
|
+
!strncmp(prefix, "$2y$", 4))
|
213
215
|
use = _crypt_gensalt_blowfish_rn;
|
214
216
|
else
|
215
217
|
if (!strncmp(prefix, "$1$", 3))
|
@@ -228,11 +230,11 @@ char *__crypt_gensalt_rn(__CONST char *prefix, unsigned long count,
|
|
228
230
|
return NULL;
|
229
231
|
}
|
230
232
|
|
231
|
-
return use(count, input, size, output, output_size);
|
233
|
+
return use(prefix, count, input, size, output, output_size);
|
232
234
|
}
|
233
235
|
|
234
|
-
char *__crypt_gensalt_ra(
|
235
|
-
|
236
|
+
char *__crypt_gensalt_ra(const char *prefix, unsigned long count,
|
237
|
+
const char *input, int size)
|
236
238
|
{
|
237
239
|
char output[CRYPT_GENSALT_OUTPUT_SIZE];
|
238
240
|
char *retval;
|
@@ -241,7 +243,7 @@ char *__crypt_gensalt_ra(__CONST char *prefix, unsigned long count,
|
|
241
243
|
input, size, output, sizeof(output));
|
242
244
|
|
243
245
|
if (retval) {
|
244
|
-
retval =
|
246
|
+
retval = strdup(retval);
|
245
247
|
#ifndef __GLIBC__
|
246
248
|
/* strdup(3) on glibc sets errno, so we don't need to bother */
|
247
249
|
if (!retval)
|
@@ -252,11 +254,298 @@ char *__crypt_gensalt_ra(__CONST char *prefix, unsigned long count,
|
|
252
254
|
return retval;
|
253
255
|
}
|
254
256
|
|
255
|
-
char *__crypt_gensalt(
|
256
|
-
|
257
|
+
char *__crypt_gensalt(const char *prefix, unsigned long count,
|
258
|
+
const char *input, int size)
|
257
259
|
{
|
258
260
|
static char output[CRYPT_GENSALT_OUTPUT_SIZE];
|
259
261
|
|
260
262
|
return __crypt_gensalt_rn(prefix, count,
|
261
263
|
input, size, output, sizeof(output));
|
262
264
|
}
|
265
|
+
|
266
|
+
#if defined(__GLIBC__) && defined(_LIBC)
|
267
|
+
weak_alias(__crypt_rn, crypt_rn)
|
268
|
+
weak_alias(__crypt_ra, crypt_ra)
|
269
|
+
weak_alias(__crypt_r, crypt_r)
|
270
|
+
weak_alias(__crypt, crypt)
|
271
|
+
weak_alias(__crypt_gensalt_rn, crypt_gensalt_rn)
|
272
|
+
weak_alias(__crypt_gensalt_ra, crypt_gensalt_ra)
|
273
|
+
weak_alias(__crypt_gensalt, crypt_gensalt)
|
274
|
+
weak_alias(crypt, fcrypt)
|
275
|
+
#endif
|
276
|
+
|
277
|
+
#ifdef TEST
|
278
|
+
static const char *tests[][3] = {
|
279
|
+
{"$2a$05$CCCCCCCCCCCCCCCCCCCCC.E5YPO9kmyuRGyh0XouQYb4YMJKvyOeW",
|
280
|
+
"U*U"},
|
281
|
+
{"$2a$05$CCCCCCCCCCCCCCCCCCCCC.VGOzA784oUp/Z0DY336zx7pLYAy0lwK",
|
282
|
+
"U*U*"},
|
283
|
+
{"$2a$05$XXXXXXXXXXXXXXXXXXXXXOAcXxm9kjPGEMsLznoKqmqw7tc8WCx4a",
|
284
|
+
"U*U*U"},
|
285
|
+
{"$2a$05$abcdefghijklmnopqrstuu5s2v8.iXieOjg/.AySBTTZIIVFJeBui",
|
286
|
+
"0123456789abcdefghijklmnopqrstuvwxyz"
|
287
|
+
"ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
|
288
|
+
"chars after 72 are ignored"},
|
289
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
290
|
+
"\xa3"},
|
291
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
292
|
+
"\xff\xff\xa3"},
|
293
|
+
{"$2y$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
294
|
+
"\xff\xff\xa3"},
|
295
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.nqd1wy.pTMdcvrRWxyiGL2eMz.2a85.",
|
296
|
+
"\xff\xff\xa3"},
|
297
|
+
{"$2b$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
298
|
+
"\xff\xff\xa3"},
|
299
|
+
{"$2y$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
300
|
+
"\xa3"},
|
301
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
302
|
+
"\xa3"},
|
303
|
+
{"$2b$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
304
|
+
"\xa3"},
|
305
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.o./n25XVfn6oAPaUvHe.Csk4zRfsYPi",
|
306
|
+
"1\xa3" "345"},
|
307
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.o./n25XVfn6oAPaUvHe.Csk4zRfsYPi",
|
308
|
+
"\xff\xa3" "345"},
|
309
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.o./n25XVfn6oAPaUvHe.Csk4zRfsYPi",
|
310
|
+
"\xff\xa3" "34" "\xff\xff\xff\xa3" "345"},
|
311
|
+
{"$2y$05$/OK.fbVrR/bpIqNJ5ianF.o./n25XVfn6oAPaUvHe.Csk4zRfsYPi",
|
312
|
+
"\xff\xa3" "34" "\xff\xff\xff\xa3" "345"},
|
313
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.ZC1JEJ8Z4gPfpe1JOr/oyPXTWl9EFd.",
|
314
|
+
"\xff\xa3" "34" "\xff\xff\xff\xa3" "345"},
|
315
|
+
{"$2y$05$/OK.fbVrR/bpIqNJ5ianF.nRht2l/HRhr6zmCp9vYUvvsqynflf9e",
|
316
|
+
"\xff\xa3" "345"},
|
317
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.nRht2l/HRhr6zmCp9vYUvvsqynflf9e",
|
318
|
+
"\xff\xa3" "345"},
|
319
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.6IflQkJytoRVc1yuaNtHfiuq.FRlSIS",
|
320
|
+
"\xa3" "ab"},
|
321
|
+
{"$2x$05$/OK.fbVrR/bpIqNJ5ianF.6IflQkJytoRVc1yuaNtHfiuq.FRlSIS",
|
322
|
+
"\xa3" "ab"},
|
323
|
+
{"$2y$05$/OK.fbVrR/bpIqNJ5ianF.6IflQkJytoRVc1yuaNtHfiuq.FRlSIS",
|
324
|
+
"\xa3" "ab"},
|
325
|
+
{"$2x$05$6bNw2HLQYeqHYyBfLMsv/OiwqTymGIGzFsA4hOTWebfehXHNprcAS",
|
326
|
+
"\xd1\x91"},
|
327
|
+
{"$2x$05$6bNw2HLQYeqHYyBfLMsv/O9LIGgn8OMzuDoHfof8AQimSGfcSWxnS",
|
328
|
+
"\xd0\xc1\xd2\xcf\xcc\xd8"},
|
329
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.swQOIzjOiJ9GHEPuhEkvqrUyvWhEMx6",
|
330
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
331
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
332
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
333
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
334
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
335
|
+
"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
336
|
+
"chars after 72 are ignored as usual"},
|
337
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.R9xrDjiycxMbQE2bp.vgqlYpW5wx2yy",
|
338
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"
|
339
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"
|
340
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"
|
341
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"
|
342
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"
|
343
|
+
"\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55\xaa\x55"},
|
344
|
+
{"$2a$05$/OK.fbVrR/bpIqNJ5ianF.9tQZzcJfm3uj2NvJ/n5xkhpqLrMpWCe",
|
345
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"
|
346
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"
|
347
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"
|
348
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"
|
349
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"
|
350
|
+
"\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff\x55\xaa\xff"},
|
351
|
+
{"$2a$05$CCCCCCCCCCCCCCCCCCCCC.7uG0VCzI2bS7j6ymqJi9CdcdxiRTWNy",
|
352
|
+
""},
|
353
|
+
{"*0", "", "$2a$03$CCCCCCCCCCCCCCCCCCCCC."},
|
354
|
+
{"*0", "", "$2a$32$CCCCCCCCCCCCCCCCCCCCC."},
|
355
|
+
{"*0", "", "$2c$05$CCCCCCCCCCCCCCCCCCCCC."},
|
356
|
+
{"*0", "", "$2z$05$CCCCCCCCCCCCCCCCCCCCC."},
|
357
|
+
{"*0", "", "$2`$05$CCCCCCCCCCCCCCCCCCCCC."},
|
358
|
+
{"*0", "", "$2{$05$CCCCCCCCCCCCCCCCCCCCC."},
|
359
|
+
{"*1", "", "*0"},
|
360
|
+
{NULL}
|
361
|
+
};
|
362
|
+
|
363
|
+
#define which tests[0]
|
364
|
+
|
365
|
+
static volatile sig_atomic_t running;
|
366
|
+
|
367
|
+
static void handle_timer(int signum)
|
368
|
+
{
|
369
|
+
(void) signum;
|
370
|
+
running = 0;
|
371
|
+
}
|
372
|
+
|
373
|
+
static void *run(void *arg)
|
374
|
+
{
|
375
|
+
unsigned long count = 0;
|
376
|
+
int i = 0;
|
377
|
+
void *data = NULL;
|
378
|
+
int size = 0x12345678;
|
379
|
+
|
380
|
+
do {
|
381
|
+
const char *hash = tests[i][0];
|
382
|
+
const char *key = tests[i][1];
|
383
|
+
const char *setting = tests[i][2];
|
384
|
+
|
385
|
+
if (!tests[++i][0])
|
386
|
+
i = 0;
|
387
|
+
|
388
|
+
if (setting && strlen(hash) < 30) /* not for benchmark */
|
389
|
+
continue;
|
390
|
+
|
391
|
+
if (strcmp(crypt_ra(key, hash, &data, &size), hash)) {
|
392
|
+
printf("%d: FAILED (crypt_ra/%d/%lu)\n",
|
393
|
+
(int)((char *)arg - (char *)0), i, count);
|
394
|
+
free(data);
|
395
|
+
return NULL;
|
396
|
+
}
|
397
|
+
count++;
|
398
|
+
} while (running);
|
399
|
+
|
400
|
+
free(data);
|
401
|
+
return count + (char *)0;
|
402
|
+
}
|
403
|
+
|
404
|
+
int main(void)
|
405
|
+
{
|
406
|
+
struct itimerval it;
|
407
|
+
struct tms buf;
|
408
|
+
clock_t clk_tck, start_real, start_virtual, end_real, end_virtual;
|
409
|
+
unsigned long count;
|
410
|
+
void *data;
|
411
|
+
int size;
|
412
|
+
char *setting1, *setting2;
|
413
|
+
int i;
|
414
|
+
#ifdef TEST_THREADS
|
415
|
+
pthread_t t[TEST_THREADS];
|
416
|
+
void *t_retval;
|
417
|
+
#endif
|
418
|
+
|
419
|
+
data = NULL;
|
420
|
+
size = 0x12345678;
|
421
|
+
|
422
|
+
for (i = 0; tests[i][0]; i++) {
|
423
|
+
const char *hash = tests[i][0];
|
424
|
+
const char *key = tests[i][1];
|
425
|
+
const char *setting = tests[i][2];
|
426
|
+
const char *p;
|
427
|
+
int ok = !setting || strlen(hash) >= 30;
|
428
|
+
int o_size;
|
429
|
+
char s_buf[30], o_buf[61];
|
430
|
+
if (!setting) {
|
431
|
+
memcpy(s_buf, hash, sizeof(s_buf) - 1);
|
432
|
+
s_buf[sizeof(s_buf) - 1] = 0;
|
433
|
+
setting = s_buf;
|
434
|
+
}
|
435
|
+
|
436
|
+
__set_errno(0);
|
437
|
+
p = crypt(key, setting);
|
438
|
+
if ((!ok && !errno) || strcmp(p, hash)) {
|
439
|
+
printf("FAILED (crypt/%d)\n", i);
|
440
|
+
return 1;
|
441
|
+
}
|
442
|
+
|
443
|
+
if (ok && strcmp(crypt(key, hash), hash)) {
|
444
|
+
printf("FAILED (crypt/%d)\n", i);
|
445
|
+
return 1;
|
446
|
+
}
|
447
|
+
|
448
|
+
for (o_size = -1; o_size <= (int)sizeof(o_buf); o_size++) {
|
449
|
+
int ok_n = ok && o_size == (int)sizeof(o_buf);
|
450
|
+
const char *x = "abc";
|
451
|
+
strcpy(o_buf, x);
|
452
|
+
if (o_size >= 3) {
|
453
|
+
x = "*0";
|
454
|
+
if (setting[0] == '*' && setting[1] == '0')
|
455
|
+
x = "*1";
|
456
|
+
}
|
457
|
+
__set_errno(0);
|
458
|
+
p = crypt_rn(key, setting, o_buf, o_size);
|
459
|
+
if ((ok_n && (!p || strcmp(p, hash))) ||
|
460
|
+
(!ok_n && (!errno || p || strcmp(o_buf, x)))) {
|
461
|
+
printf("FAILED (crypt_rn/%d)\n", i);
|
462
|
+
return 1;
|
463
|
+
}
|
464
|
+
}
|
465
|
+
|
466
|
+
__set_errno(0);
|
467
|
+
p = crypt_ra(key, setting, &data, &size);
|
468
|
+
if ((ok && (!p || strcmp(p, hash))) ||
|
469
|
+
(!ok && (!errno || p || strcmp((char *)data, hash)))) {
|
470
|
+
printf("FAILED (crypt_ra/%d)\n", i);
|
471
|
+
return 1;
|
472
|
+
}
|
473
|
+
}
|
474
|
+
|
475
|
+
setting1 = crypt_gensalt(which[0], 12, data, size);
|
476
|
+
if (!setting1 || strncmp(setting1, "$2a$12$", 7)) {
|
477
|
+
puts("FAILED (crypt_gensalt)\n");
|
478
|
+
return 1;
|
479
|
+
}
|
480
|
+
|
481
|
+
setting2 = crypt_gensalt_ra(setting1, 12, data, size);
|
482
|
+
if (strcmp(setting1, setting2)) {
|
483
|
+
puts("FAILED (crypt_gensalt_ra/1)\n");
|
484
|
+
return 1;
|
485
|
+
}
|
486
|
+
|
487
|
+
(*(char *)data)++;
|
488
|
+
setting1 = crypt_gensalt_ra(setting2, 12, data, size);
|
489
|
+
if (!strcmp(setting1, setting2)) {
|
490
|
+
puts("FAILED (crypt_gensalt_ra/2)\n");
|
491
|
+
return 1;
|
492
|
+
}
|
493
|
+
|
494
|
+
free(setting1);
|
495
|
+
free(setting2);
|
496
|
+
free(data);
|
497
|
+
|
498
|
+
#if defined(_SC_CLK_TCK) || !defined(CLK_TCK)
|
499
|
+
clk_tck = sysconf(_SC_CLK_TCK);
|
500
|
+
#else
|
501
|
+
clk_tck = CLK_TCK;
|
502
|
+
#endif
|
503
|
+
|
504
|
+
running = 1;
|
505
|
+
signal(SIGALRM, handle_timer);
|
506
|
+
|
507
|
+
memset(&it, 0, sizeof(it));
|
508
|
+
it.it_value.tv_sec = 5;
|
509
|
+
setitimer(ITIMER_REAL, &it, NULL);
|
510
|
+
|
511
|
+
start_real = times(&buf);
|
512
|
+
start_virtual = buf.tms_utime + buf.tms_stime;
|
513
|
+
|
514
|
+
count = (char *)run((char *)0) - (char *)0;
|
515
|
+
|
516
|
+
end_real = times(&buf);
|
517
|
+
end_virtual = buf.tms_utime + buf.tms_stime;
|
518
|
+
if (end_virtual == start_virtual) end_virtual++;
|
519
|
+
|
520
|
+
printf("%.1f c/s real, %.1f c/s virtual\n",
|
521
|
+
(float)count * clk_tck / (end_real - start_real),
|
522
|
+
(float)count * clk_tck / (end_virtual - start_virtual));
|
523
|
+
|
524
|
+
#ifdef TEST_THREADS
|
525
|
+
running = 1;
|
526
|
+
it.it_value.tv_sec = 60;
|
527
|
+
setitimer(ITIMER_REAL, &it, NULL);
|
528
|
+
start_real = times(&buf);
|
529
|
+
|
530
|
+
for (i = 0; i < TEST_THREADS; i++)
|
531
|
+
if (pthread_create(&t[i], NULL, run, i + (char *)0)) {
|
532
|
+
perror("pthread_create");
|
533
|
+
return 1;
|
534
|
+
}
|
535
|
+
|
536
|
+
for (i = 0; i < TEST_THREADS; i++) {
|
537
|
+
if (pthread_join(t[i], &t_retval)) {
|
538
|
+
perror("pthread_join");
|
539
|
+
continue;
|
540
|
+
}
|
541
|
+
if (!t_retval) continue;
|
542
|
+
count = (char *)t_retval - (char *)0;
|
543
|
+
end_real = times(&buf);
|
544
|
+
printf("%d: %.1f c/s real\n", i,
|
545
|
+
(float)count * clk_tck / (end_real - start_real));
|
546
|
+
}
|
547
|
+
#endif
|
548
|
+
|
549
|
+
return 0;
|
550
|
+
}
|
551
|
+
#endif
|