1999-04-22 08:25:57 +08:00
|
|
|
/*
|
|
|
|
+----------------------------------------------------------------------+
|
1999-07-16 21:13:16 +08:00
|
|
|
| PHP version 4.0 |
|
1999-04-22 08:25:57 +08:00
|
|
|
+----------------------------------------------------------------------+
|
2001-02-26 14:11:02 +08:00
|
|
|
| Copyright (c) 1997-2001 The PHP Group |
|
1999-04-22 08:25:57 +08:00
|
|
|
+----------------------------------------------------------------------+
|
2000-05-18 23:34:45 +08:00
|
|
|
| This source file is subject to version 2.02 of the PHP license, |
|
1999-07-16 21:13:16 +08:00
|
|
|
| that is bundled with this package in the file LICENSE, and is |
|
|
|
|
| available at through the world-wide-web at |
|
2000-05-18 23:34:45 +08:00
|
|
|
| http://www.php.net/license/2_02.txt. |
|
1999-07-16 21:13:16 +08:00
|
|
|
| If you did not receive a copy of the PHP license and are unable to |
|
|
|
|
| obtain it through the world-wide-web, please send a note to |
|
|
|
|
| license@php.net so we can mail you a copy immediately. |
|
1999-04-22 08:25:57 +08:00
|
|
|
+----------------------------------------------------------------------+
|
|
|
|
| Authors: Stig Bakken <ssb@gaurdian.no> |
|
1999-07-16 21:13:16 +08:00
|
|
|
| Zeev Suraski <zeev@zend.com> |
|
1999-04-22 08:25:57 +08:00
|
|
|
| Rasmus Lerdorf <rasmus@lerdorf.on.ca> |
|
|
|
|
+----------------------------------------------------------------------+
|
|
|
|
*/
|
|
|
|
/* $Id$ */
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
#include "php.h"
|
|
|
|
|
|
|
|
#if HAVE_CRYPT
|
|
|
|
|
|
|
|
#if HAVE_UNISTD_H
|
|
|
|
#include <unistd.h>
|
|
|
|
#endif
|
|
|
|
#if HAVE_CRYPT_H
|
|
|
|
#include <crypt.h>
|
|
|
|
#endif
|
|
|
|
#if TM_IN_SYS_TIME
|
|
|
|
#include <sys/time.h>
|
|
|
|
#else
|
|
|
|
#include <time.h>
|
|
|
|
#endif
|
|
|
|
#if HAVE_STRING_H
|
|
|
|
#include <string.h>
|
|
|
|
#else
|
|
|
|
#include <strings.h>
|
|
|
|
#endif
|
|
|
|
|
2000-02-11 23:59:30 +08:00
|
|
|
#ifdef PHP_WIN32
|
1999-04-22 08:25:57 +08:00
|
|
|
#include <process.h>
|
|
|
|
extern char *crypt(char *__key,char *__salt);
|
|
|
|
#endif
|
|
|
|
|
2000-07-27 00:35:32 +08:00
|
|
|
#include "php_lcg.h"
|
1999-12-05 03:19:57 +08:00
|
|
|
#include "php_crypt.h"
|
2001-02-22 11:37:32 +08:00
|
|
|
#include "php_rand.h"
|
1999-04-22 08:25:57 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
The capabilities of the crypt() function is determined by the test programs
|
2000-02-26 11:20:55 +08:00
|
|
|
run by configure from aclocal.m4. They will set PHP_STD_DES_CRYPT,
|
|
|
|
PHP_EXT_DES_CRYPT, PHP_MD5_CRYPT and PHP_BLOWFISH_CRYPT as appropriate
|
1999-04-22 08:25:57 +08:00
|
|
|
for the target platform
|
|
|
|
*/
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_STD_DES_CRYPT
|
|
|
|
#define PHP_MAX_SALT_LEN 2
|
1999-04-22 08:25:57 +08:00
|
|
|
#endif
|
2000-07-27 00:42:04 +08:00
|
|
|
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_EXT_DES_CRYPT
|
|
|
|
#undef PHP_MAX_SALT_LEN
|
|
|
|
#define PHP_MAX_SALT_LEN 9
|
1999-04-22 08:25:57 +08:00
|
|
|
#endif
|
2000-07-27 00:42:04 +08:00
|
|
|
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_MD5_CRYPT
|
|
|
|
#undef PHP_MAX_SALT_LEN
|
|
|
|
#define PHP_MAX_SALT_LEN 12
|
1999-04-22 08:25:57 +08:00
|
|
|
#endif
|
2000-07-27 00:42:04 +08:00
|
|
|
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_BLOWFISH_CRYPT
|
|
|
|
#undef PHP_MAX_SALT_LEN
|
2001-01-08 01:22:17 +08:00
|
|
|
#define PHP_MAX_SALT_LEN 60
|
2000-05-05 18:36:00 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the configure-time checks fail, we provide DES.
|
|
|
|
* XXX: This is a hack. Fix the real problem
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef PHP_MAX_SALT_LEN
|
|
|
|
#define PHP_MAX_SALT_LEN 2
|
|
|
|
#undef PHP_STD_DES_CRYPT
|
|
|
|
#define PHP_STD_DES_CRYPT 1
|
1999-04-22 08:25:57 +08:00
|
|
|
#endif
|
|
|
|
|
2001-02-22 08:24:19 +08:00
|
|
|
|
|
|
|
#define PHP_CRYPT_RAND php_rand()
|
|
|
|
|
1999-04-22 08:25:57 +08:00
|
|
|
|
1999-07-27 04:09:08 +08:00
|
|
|
PHP_MINIT_FUNCTION(crypt)
|
1999-04-22 08:25:57 +08:00
|
|
|
{
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_STD_DES_CRYPT
|
2001-04-06 02:48:03 +08:00
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_SALT_LENGTH", 2, CONST_CS | CONST_PERSISTENT);
|
2000-07-27 00:42:04 +08:00
|
|
|
#elif PHP_MD5_CRYPT
|
2001-04-06 02:48:03 +08:00
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_SALT_LENGTH", 12, CONST_CS | CONST_PERSISTENT);
|
1999-04-22 08:25:57 +08:00
|
|
|
#endif
|
2001-04-06 02:48:03 +08:00
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_STD_DES", PHP_STD_DES_CRYPT, CONST_CS | CONST_PERSISTENT);
|
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_EXT_DES", PHP_EXT_DES_CRYPT, CONST_CS | CONST_PERSISTENT);
|
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_MD5", PHP_MD5_CRYPT, CONST_CS | CONST_PERSISTENT);
|
2000-11-03 08:45:24 +08:00
|
|
|
REGISTER_LONG_CONSTANT("CRYPT_BLOWFISH", PHP_BLOWFISH_CRYPT, CONST_CS | CONST_PERSISTENT);
|
|
|
|
|
2001-02-22 08:24:19 +08:00
|
|
|
php_srand(time(0) * getpid() * (php_combined_lcg() * 10000.0));
|
2000-11-03 08:45:24 +08:00
|
|
|
|
2001-04-06 02:48:03 +08:00
|
|
|
return SUCCESS;
|
1999-04-22 08:25:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned char itoa64[] = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
|
|
|
|
1999-12-18 12:01:20 +08:00
|
|
|
static void php_to64(char *s, long v, int n) {
|
1999-04-22 08:25:57 +08:00
|
|
|
while (--n >= 0) {
|
|
|
|
*s++ = itoa64[v&0x3f];
|
|
|
|
v >>= 6;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-05-18 03:40:10 +08:00
|
|
|
/* {{{ proto string crypt(string str [, string salt])
|
|
|
|
Encrypt a string */
|
1999-05-16 19:19:26 +08:00
|
|
|
PHP_FUNCTION(crypt)
|
1999-04-22 08:25:57 +08:00
|
|
|
{
|
2000-02-26 11:20:55 +08:00
|
|
|
char salt[PHP_MAX_SALT_LEN+1];
|
1999-09-25 03:35:25 +08:00
|
|
|
pval **arg1, **arg2;
|
1999-04-22 08:25:57 +08:00
|
|
|
|
2000-02-26 11:20:55 +08:00
|
|
|
salt[0]=salt[PHP_MAX_SALT_LEN]='\0';
|
1999-09-06 21:24:36 +08:00
|
|
|
/* This will produce suitable results if people depend on DES-encryption
|
|
|
|
available (passing always 2-character salt). At least for glibc6.1 */
|
2000-02-26 11:20:55 +08:00
|
|
|
memset(&salt[1], '$', PHP_MAX_SALT_LEN-1);
|
1999-04-22 08:25:57 +08:00
|
|
|
|
2000-06-06 03:47:54 +08:00
|
|
|
switch (ZEND_NUM_ARGS()) {
|
1999-04-22 08:25:57 +08:00
|
|
|
case 1:
|
1999-12-19 06:40:35 +08:00
|
|
|
if (zend_get_parameters_ex(1, &arg1)==FAILURE) {
|
1999-04-22 08:25:57 +08:00
|
|
|
RETURN_FALSE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 2:
|
1999-12-19 06:40:35 +08:00
|
|
|
if (zend_get_parameters_ex(2, &arg1, &arg2)==FAILURE) {
|
1999-04-22 08:25:57 +08:00
|
|
|
RETURN_FALSE;
|
|
|
|
}
|
1999-09-25 03:35:25 +08:00
|
|
|
convert_to_string_ex(arg2);
|
2000-11-03 08:45:24 +08:00
|
|
|
memcpy(salt, Z_STRVAL_PP(arg2), MIN(PHP_MAX_SALT_LEN, Z_STRLEN_PP(arg2)));
|
1999-04-22 08:25:57 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
WRONG_PARAM_COUNT;
|
|
|
|
break;
|
|
|
|
}
|
1999-09-25 03:35:25 +08:00
|
|
|
convert_to_string_ex(arg1);
|
1999-04-22 08:25:57 +08:00
|
|
|
|
|
|
|
/* The automatic salt generation only covers standard DES and md5-crypt */
|
|
|
|
if(!*salt) {
|
2000-02-26 11:20:55 +08:00
|
|
|
#if PHP_STD_DES_CRYPT
|
|
|
|
php_to64(&salt[0], PHP_CRYPT_RAND, 2);
|
1999-04-22 08:25:57 +08:00
|
|
|
salt[2] = '\0';
|
2000-07-27 00:42:04 +08:00
|
|
|
#elif PHP_MD5_CRYPT
|
1999-04-22 08:25:57 +08:00
|
|
|
strcpy(salt, "$1$");
|
2000-02-26 11:20:55 +08:00
|
|
|
php_to64(&salt[3], PHP_CRYPT_RAND, 4);
|
|
|
|
php_to64(&salt[7], PHP_CRYPT_RAND, 4);
|
1999-04-22 08:25:57 +08:00
|
|
|
strcpy(&salt[11], "$");
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2000-11-27 21:31:21 +08:00
|
|
|
RETVAL_STRING(crypt(Z_STRVAL_PP(arg1), salt), 1);
|
1999-04-22 08:25:57 +08:00
|
|
|
}
|
2000-05-18 03:40:10 +08:00
|
|
|
/* }}} */
|
2000-05-28 03:27:20 +08:00
|
|
|
#endif
|
1999-04-22 08:25:57 +08:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Local variables:
|
|
|
|
* tab-width: 4
|
|
|
|
* c-basic-offset: 4
|
|
|
|
* End:
|
|
|
|
*/
|