3 * Mark Murray. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY MARK MURRAY AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL MARK MURRAY OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * $FreeBSD: src/lib/libcrypt/crypt.c,v 1.14.2.2 2001/05/24 12:20:02 markm Exp $
27 * $DragonFly: src/lib/libcrypt/crypt.c,v 1.3 2005/08/04 17:27:09 drhodus Exp $
30 #include <sys/types.h>
38 * The deprecated sha256/512 functions are somehow sensitive to the
39 * order of this crypt_types array as well as their respective "name" members.
41 * In order to ensure that both existing passwords will continue to work and
42 * that new passwords will be more secure by using the new algorithms even
43 * without updating the existing login.conf, this array is now scanned
44 * backwards. This could be reverted in the future when the deprecated SHA
45 * functionality is removed.
48 const char *const name
;
49 char *(*const func
)(const char *, const char *);
50 const char *const magic
;
73 crypt_deprecated_sha256
,
78 crypt_deprecated_sha512
,
93 static int crypt_type
= -1;
96 crypt_setdefault(void)
101 if (crypt_type
!= -1)
103 def
= auth_getval("crypt_default");
108 for (i
= sizeof(crypt_types
) / sizeof(crypt_types
[0]) - 1; i
>= 0; i
--) {
109 if (strcmp(def
, crypt_types
[i
].name
) == 0) {
118 crypt_get_format(void)
122 return (crypt_types
[crypt_type
].name
);
126 crypt_set_format(char *type
)
131 for (i
= sizeof(crypt_types
) / sizeof(crypt_types
[0]) - 1; i
>= 0; i
--) {
132 if (strcmp(type
, crypt_types
[i
].name
) == 0) {
141 crypt(char *passwd
, char *salt
)
146 for (i
= sizeof(crypt_types
) / sizeof(crypt_types
[0]) - 1; i
>= 0; i
--) {
147 if (crypt_types
[i
].magic
!= NULL
&& strncmp(salt
,
148 crypt_types
[i
].magic
, strlen(crypt_types
[i
].magic
)) == 0)
149 return (crypt_types
[i
].func(passwd
, salt
));
151 return (crypt_types
[crypt_type
].func(passwd
, salt
));