77static const uint32_t
K[64] = {
78 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
79 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
80 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
81 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
82 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
83 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
84 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
85 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
86 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
87 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
88 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
89 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
90 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
91 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
92 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
93 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
327static char *
sha256_crypt_r(
const char *key,
const char *salt,
char *buffer,
int buflen)
330 unsigned char alt_result[32];
331 unsigned char temp_result[32];
333 unsigned char alt_result[32]
335 unsigned char temp_result[32]
344 char *copied_key = NULL;
345 char *copied_salt = NULL;
350 int rounds_custom = 0;
362 unsigned long int srounds = strtoul(num, &endp, 10);
371 key_len = strlen(key);
373 if ((key - (
char *) 0) % __alignof__(uint32_t) != 0) {
374 char *tmp = (
char *) alloca(key_len + __alignof__(uint32_t));
375 key = copied_key = (
char *) memcpy(tmp + __alignof__(uint32_t)
376 - (tmp - (
char *) 0) % __alignof__(uint32_t), key, key_len);
379 if ((salt - (
char *) 0) % __alignof__(uint32_t) != 0) {
380 char *tmp = (
char *) alloca(salt_len + __alignof__(uint32_t));
381 salt = copied_salt = (
char *) memcpy(tmp + __alignof__(uint32_t)
382 - (tmp - (
char *) 0) % __alignof__(uint32_t), salt, salt_len);
415 for (cnt = key_len; cnt > 32; cnt -= 32)
421 for (cnt = key_len; cnt > 0; cnt >>= 1)
434 for (cnt = 0; cnt < key_len; ++cnt)
441 cp = p_bytes = (
char*) alloca(key_len);
442 for (cnt = key_len; cnt >= 32; cnt -= 32) {
443 memcpy(cp, temp_result, 32);
446 memcpy(cp, temp_result, cnt);
452 for (cnt = 0; (int) cnt < 16 + alt_result[0]; ++cnt)
459 cp = s_bytes = (
char*) alloca(salt_len);
460 for (cnt = salt_len; cnt >= 32; cnt -= 32) {
461 memcpy(cp, temp_result, 32);
464 memcpy(cp, temp_result, cnt);
468 for (cnt = 0; cnt < rounds; ++cnt) {
504 int n = _snprintf(cp,
MAX(0,
buflen),
"%s%Iu$",
507 int n = snprintf(cp,
MAX(0,
buflen),
"%s%zu$",
514 strncpy(cp, salt,
MIN((
size_t)
MAX(0,
buflen), salt_len));
515 cp = cp + strlen(cp);
522#define b64_from_24bit(B2, B1, B0, N) \
524 unsigned int w = ((B2) << 16) | ((B1) << 8) | (B0); \
526 while (n-- > 0 && buflen > 0) \
528 *cp++ = b64t[w & 0x3f]; \
557 memset(temp_result,
'\0',
sizeof(temp_result));
558 memset(p_bytes,
'\0', key_len);
559 memset(s_bytes,
'\0', salt_len);
560 memset(&ctx,
'\0',
sizeof(ctx));
561 memset(&alt_ctx,
'\0',
sizeof(alt_ctx));
562 if (copied_key != NULL)
563 memset(copied_key,
'\0', key_len);
564 if (copied_salt != NULL)
565 memset(copied_salt,
'\0', salt_len);