003 File Manager
Current Path:
/usr/src/crypto/openssh/openbsd-compat
usr
/
src
/
crypto
/
openssh
/
openbsd-compat
/
📁
..
📄
Makefile.in
(1.77 KB)
📄
arc4random.c
(7.06 KB)
📄
base64.c
(10.25 KB)
📄
base64.h
(2.69 KB)
📄
basename.c
(1.78 KB)
📄
bcrypt_pbkdf.c
(5.38 KB)
📄
bindresvport.c
(3.24 KB)
📄
blf.h
(3.49 KB)
📄
blowfish.c
(23.11 KB)
📄
bsd-asprintf.c
(2.31 KB)
📄
bsd-closefrom.c
(2.84 KB)
📄
bsd-cygwin_util.c
(3.15 KB)
📄
bsd-cygwin_util.h
(2.34 KB)
📄
bsd-err.c
(2.15 KB)
📄
bsd-flock.c
(2.23 KB)
📄
bsd-getline.c
(2.9 KB)
📄
bsd-getpagesize.c
(463 B)
📄
bsd-getpeereid.c
(1.68 KB)
📄
bsd-malloc.c
(1.4 KB)
📄
bsd-misc.c
(5.88 KB)
📄
bsd-misc.h
(3.61 KB)
📄
bsd-nextstep.c
(2.5 KB)
📄
bsd-nextstep.h
(2.22 KB)
📄
bsd-openpty.c
(4.92 KB)
📄
bsd-poll.c
(2.91 KB)
📄
bsd-poll.h
(2.06 KB)
📄
bsd-setres_id.c
(2.34 KB)
📄
bsd-setres_id.h
(930 B)
📄
bsd-signal.c
(1.55 KB)
📄
bsd-signal.h
(1.15 KB)
📄
bsd-snprintf.c
(20.58 KB)
📄
bsd-statvfs.c
(2.09 KB)
📄
bsd-statvfs.h
(2.24 KB)
📄
bsd-waitpid.c
(1.77 KB)
📄
bsd-waitpid.h
(2.02 KB)
📄
chacha_private.h
(5.26 KB)
📄
charclass.h
(702 B)
📄
daemon.c
(2.32 KB)
📄
dirname.c
(1.87 KB)
📄
explicit_bzero.c
(1.09 KB)
📄
fake-rfc2553.c
(6.15 KB)
📄
fake-rfc2553.h
(5.2 KB)
📄
fmt_scaled.c
(7.69 KB)
📄
freezero.c
(1.01 KB)
📄
getcwd.c
(5.95 KB)
📄
getgrouplist.c
(2.7 KB)
📄
getopt.h
(2.71 KB)
📄
getopt_long.c
(14.46 KB)
📄
getrrsetbyname-ldns.c
(7.81 KB)
📄
getrrsetbyname.c
(13.56 KB)
📄
getrrsetbyname.h
(3.62 KB)
📄
glob.c
(25.53 KB)
📄
glob.h
(4.54 KB)
📄
inet_aton.c
(5.23 KB)
📄
inet_ntoa.c
(2.21 KB)
📄
inet_ntop.c
(5.42 KB)
📄
kludge-fd_set.c
(882 B)
📄
libressl-api-compat.c
(16.19 KB)
📄
md5.c
(7.83 KB)
📄
md5.h
(1.85 KB)
📄
mktemp.c
(3.14 KB)
📄
openbsd-compat.h
(8.68 KB)
📄
openssl-compat.c
(2.43 KB)
📄
openssl-compat.h
(7.22 KB)
📄
port-aix.c
(12.61 KB)
📄
port-aix.h
(4.22 KB)
📄
port-irix.c
(2.94 KB)
📄
port-irix.h
(1.65 KB)
📄
port-linux.c
(7.66 KB)
📄
port-linux.h
(1.18 KB)
📄
port-net.c
(8.33 KB)
📄
port-net.h
(1.58 KB)
📄
port-solaris.c
(9.56 KB)
📄
port-solaris.h
(1.27 KB)
📄
port-uw.c
(4.16 KB)
📄
port-uw.h
(1.37 KB)
📄
pwcache.c
(3.22 KB)
📄
readpassphrase.c
(5.79 KB)
📄
readpassphrase.h
(1.75 KB)
📄
reallocarray.c
(1.49 KB)
📄
realpath.c
(6.08 KB)
📄
recallocarray.c
(2.4 KB)
📁
regress
📄
rmd160.c
(11.72 KB)
📄
rmd160.h
(2.81 KB)
📄
rresvport.c
(2.97 KB)
📄
setenv.c
(5.76 KB)
📄
setproctitle.c
(4.55 KB)
📄
sha1.c
(5.18 KB)
📄
sha1.h
(2.23 KB)
📄
sha2.c
(24.88 KB)
📄
sha2.h
(5.66 KB)
📄
sigact.c
(3.82 KB)
📄
sigact.h
(3.66 KB)
📄
strcasestr.c
(2.35 KB)
📄
strlcat.c
(1.76 KB)
📄
strlcpy.c
(1.64 KB)
📄
strmode.c
(3.38 KB)
📄
strndup.c
(1.27 KB)
📄
strnlen.c
(1.18 KB)
📄
strptime.c
(9.28 KB)
📄
strsep.c
(2.59 KB)
📄
strtoll.c
(4.29 KB)
📄
strtonum.c
(1.85 KB)
📄
strtoul.c
(3.07 KB)
📄
strtoull.c
(3.13 KB)
📄
sys-queue.h
(21.04 KB)
📄
sys-tree.h
(24.68 KB)
📄
timingsafe_bcmp.c
(1.17 KB)
📄
vis.c
(5.97 KB)
📄
vis.h
(3.57 KB)
📄
xcrypt.c
(4.26 KB)
Editing: bcrypt_pbkdf.c
/* $OpenBSD: bcrypt_pbkdf.c,v 1.13 2015/01/12 03:20:04 tedu Exp $ */ /* * Copyright (c) 2013 Ted Unangst <tedu@openbsd.org> * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include "includes.h" #ifndef HAVE_BCRYPT_PBKDF #include <sys/types.h> #include <sys/param.h> #ifdef HAVE_STDLIB_H # include <stdlib.h> #endif #include <string.h> #ifdef HAVE_BLF_H # include <blf.h> #endif #include "crypto_api.h" #ifdef SHA512_DIGEST_LENGTH # undef SHA512_DIGEST_LENGTH #endif #define SHA512_DIGEST_LENGTH crypto_hash_sha512_BYTES #define MINIMUM(a,b) (((a) < (b)) ? (a) : (b)) /* * pkcs #5 pbkdf2 implementation using the "bcrypt" hash * * The bcrypt hash function is derived from the bcrypt password hashing * function with the following modifications: * 1. The input password and salt are preprocessed with SHA512. * 2. The output length is expanded to 256 bits. * 3. Subsequently the magic string to be encrypted is lengthened and modified * to "OxychromaticBlowfishSwatDynamite" * 4. The hash function is defined to perform 64 rounds of initial state * expansion. (More rounds are performed by iterating the hash.) * * Note that this implementation pulls the SHA512 operations into the caller * as a performance optimization. * * One modification from official pbkdf2. Instead of outputting key material * linearly, we mix it. pbkdf2 has a known weakness where if one uses it to * generate (e.g.) 512 bits of key material for use as two 256 bit keys, an * attacker can merely run once through the outer loop, but the user * always runs it twice. Shuffling output bytes requires computing the * entirety of the key material to assemble any subkey. This is something a * wise caller could do; we just do it for you. */ #define BCRYPT_WORDS 8 #define BCRYPT_HASHSIZE (BCRYPT_WORDS * 4) static void bcrypt_hash(u_int8_t *sha2pass, u_int8_t *sha2salt, u_int8_t *out) { blf_ctx state; u_int8_t ciphertext[BCRYPT_HASHSIZE] = "OxychromaticBlowfishSwatDynamite"; uint32_t cdata[BCRYPT_WORDS]; int i; uint16_t j; size_t shalen = SHA512_DIGEST_LENGTH; /* key expansion */ Blowfish_initstate(&state); Blowfish_expandstate(&state, sha2salt, shalen, sha2pass, shalen); for (i = 0; i < 64; i++) { Blowfish_expand0state(&state, sha2salt, shalen); Blowfish_expand0state(&state, sha2pass, shalen); } /* encryption */ j = 0; for (i = 0; i < BCRYPT_WORDS; i++) cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), &j); for (i = 0; i < 64; i++) blf_enc(&state, cdata, sizeof(cdata) / sizeof(uint64_t)); /* copy out */ for (i = 0; i < BCRYPT_WORDS; i++) { out[4 * i + 3] = (cdata[i] >> 24) & 0xff; out[4 * i + 2] = (cdata[i] >> 16) & 0xff; out[4 * i + 1] = (cdata[i] >> 8) & 0xff; out[4 * i + 0] = cdata[i] & 0xff; } /* zap */ explicit_bzero(ciphertext, sizeof(ciphertext)); explicit_bzero(cdata, sizeof(cdata)); explicit_bzero(&state, sizeof(state)); } int bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, u_int8_t *key, size_t keylen, unsigned int rounds) { u_int8_t sha2pass[SHA512_DIGEST_LENGTH]; u_int8_t sha2salt[SHA512_DIGEST_LENGTH]; u_int8_t out[BCRYPT_HASHSIZE]; u_int8_t tmpout[BCRYPT_HASHSIZE]; u_int8_t *countsalt; size_t i, j, amt, stride; uint32_t count; size_t origkeylen = keylen; /* nothing crazy */ if (rounds < 1) return -1; if (passlen == 0 || saltlen == 0 || keylen == 0 || keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) return -1; if ((countsalt = calloc(1, saltlen + 4)) == NULL) return -1; stride = (keylen + sizeof(out) - 1) / sizeof(out); amt = (keylen + stride - 1) / stride; memcpy(countsalt, salt, saltlen); /* collapse password */ crypto_hash_sha512(sha2pass, pass, passlen); /* generate key, sizeof(out) at a time */ for (count = 1; keylen > 0; count++) { countsalt[saltlen + 0] = (count >> 24) & 0xff; countsalt[saltlen + 1] = (count >> 16) & 0xff; countsalt[saltlen + 2] = (count >> 8) & 0xff; countsalt[saltlen + 3] = count & 0xff; /* first round, salt is salt */ crypto_hash_sha512(sha2salt, countsalt, saltlen + 4); bcrypt_hash(sha2pass, sha2salt, tmpout); memcpy(out, tmpout, sizeof(out)); for (i = 1; i < rounds; i++) { /* subsequent rounds, salt is previous output */ crypto_hash_sha512(sha2salt, tmpout, sizeof(tmpout)); bcrypt_hash(sha2pass, sha2salt, tmpout); for (j = 0; j < sizeof(out); j++) out[j] ^= tmpout[j]; } /* * pbkdf2 deviation: output the key material non-linearly. */ amt = MINIMUM(amt, keylen); for (i = 0; i < amt; i++) { size_t dest = i * stride + (count - 1); if (dest >= origkeylen) break; key[dest] = out[i]; } keylen -= i; } /* zap */ explicit_bzero(out, sizeof(out)); free(countsalt); return 0; } #endif /* HAVE_BCRYPT_PBKDF */
Upload File
Create Folder