mirror of
https://github.com/OpenFusionProject/OpenFusion.git
synced 2025-06-13 16:40:09 +00:00

* Merge kamilprzyb and main repo's code * Update Makefile by FunnHornhoover * Update Makefile by FinnHornhoover * Add flag to Makefile by FinnHornhoover * Remove extra line from makefile * Remove lbcrypt from Makefile * Fix flag to Makefile by FinnHornhoover * Reimplement potential fix for tutorial blackscreen by Dongresources * Update CMakeLists.txt * Update CMakeLists.txt * Reinsert Jade's changes * Cosmetic Changes to Databases .h & .cpp * Remove CMakeSettings.json * Update Makefile by Finn Hornhoover * More cosmetic changes to Databases.cpp * More cosmetic changes to Databases.cpp * Remove unnecessary line (CMakeSettings.json) * Fix CNLoginServer.cpp * More cosmetic Changes to Database.hpp, edit Database.cpp to use JSON library onstead of json11 library, and delete json11 library files * Delete json11 library files * Delete JSON library to reupload * Reupload JSON library from main repo * Reupload JSON library from main repo * Fix syntax error * Fix Makefile * Remove commented line of code to be like master Co-authored-by: CPunch <sethtstubbs@gmail.com>
129 lines
3.9 KiB
C
129 lines
3.9 KiB
C
/*
|
|
* Written by Solar Designer <solar at openwall.com> in 2000-2011.
|
|
* No copyright is claimed, and the software is hereby placed in the public
|
|
* domain. In case this attempt to disclaim copyright and place the software
|
|
* in the public domain is deemed null and void, then the software is
|
|
* Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
|
|
* general public under the following terms:
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted.
|
|
*
|
|
* There's ABSOLUTELY NO WARRANTY, express or implied.
|
|
*
|
|
* See crypt_blowfish.c for more information.
|
|
*
|
|
* This file contains salt generation functions for the traditional and
|
|
* other common crypt(3) algorithms, except for bcrypt which is defined
|
|
* entirely in crypt_blowfish.c.
|
|
*/
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
#ifndef __set_errno
|
|
#define __set_errno(val) errno = (val)
|
|
#endif
|
|
|
|
/* Just to make sure the prototypes match the actual definitions */
|
|
#ifdef _WIN32
|
|
#include "crypt_gensalt.h"
|
|
#else
|
|
#include "crypt_gensalt.h"
|
|
#endif
|
|
|
|
unsigned char _crypt_itoa64[64 + 1] =
|
|
"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
|
|
|
char *_crypt_gensalt_traditional_rn(const char *prefix, unsigned long count,
|
|
const char *input, int size, char *output, int output_size)
|
|
{
|
|
(void) prefix;
|
|
|
|
if (size < 2 || output_size < 2 + 1 || (count && count != 25)) {
|
|
if (output_size > 0) output[0] = '\0';
|
|
__set_errno((output_size < 2 + 1) ? ERANGE : EINVAL);
|
|
return NULL;
|
|
}
|
|
|
|
output[0] = _crypt_itoa64[(unsigned int)input[0] & 0x3f];
|
|
output[1] = _crypt_itoa64[(unsigned int)input[1] & 0x3f];
|
|
output[2] = '\0';
|
|
|
|
return output;
|
|
}
|
|
|
|
char *_crypt_gensalt_extended_rn(const char *prefix, unsigned long count,
|
|
const char *input, int size, char *output, int output_size)
|
|
{
|
|
unsigned long value;
|
|
|
|
(void) prefix;
|
|
|
|
/* Even iteration counts make it easier to detect weak DES keys from a look
|
|
* at the hash, so they should be avoided */
|
|
if (size < 3 || output_size < 1 + 4 + 4 + 1 ||
|
|
(count && (count > 0xffffff || !(count & 1)))) {
|
|
if (output_size > 0) output[0] = '\0';
|
|
__set_errno((output_size < 1 + 4 + 4 + 1) ? ERANGE : EINVAL);
|
|
return NULL;
|
|
}
|
|
|
|
if (!count) count = 725;
|
|
|
|
output[0] = '_';
|
|
output[1] = _crypt_itoa64[count & 0x3f];
|
|
output[2] = _crypt_itoa64[(count >> 6) & 0x3f];
|
|
output[3] = _crypt_itoa64[(count >> 12) & 0x3f];
|
|
output[4] = _crypt_itoa64[(count >> 18) & 0x3f];
|
|
value = (unsigned long)(unsigned char)input[0] |
|
|
((unsigned long)(unsigned char)input[1] << 8) |
|
|
((unsigned long)(unsigned char)input[2] << 16);
|
|
output[5] = _crypt_itoa64[value & 0x3f];
|
|
output[6] = _crypt_itoa64[(value >> 6) & 0x3f];
|
|
output[7] = _crypt_itoa64[(value >> 12) & 0x3f];
|
|
output[8] = _crypt_itoa64[(value >> 18) & 0x3f];
|
|
output[9] = '\0';
|
|
|
|
return output;
|
|
}
|
|
|
|
char *_crypt_gensalt_md5_rn(const char *prefix, unsigned long count,
|
|
const char *input, int size, char *output, int output_size)
|
|
{
|
|
unsigned long value;
|
|
|
|
(void) prefix;
|
|
|
|
if (size < 3 || output_size < 3 + 4 + 1 || (count && count != 1000)) {
|
|
if (output_size > 0) output[0] = '\0';
|
|
__set_errno((output_size < 3 + 4 + 1) ? ERANGE : EINVAL);
|
|
return NULL;
|
|
}
|
|
|
|
output[0] = '$';
|
|
output[1] = '1';
|
|
output[2] = '$';
|
|
value = (unsigned long)(unsigned char)input[0] |
|
|
((unsigned long)(unsigned char)input[1] << 8) |
|
|
((unsigned long)(unsigned char)input[2] << 16);
|
|
output[3] = _crypt_itoa64[value & 0x3f];
|
|
output[4] = _crypt_itoa64[(value >> 6) & 0x3f];
|
|
output[5] = _crypt_itoa64[(value >> 12) & 0x3f];
|
|
output[6] = _crypt_itoa64[(value >> 18) & 0x3f];
|
|
output[7] = '\0';
|
|
|
|
if (size >= 6 && output_size >= 3 + 4 + 4 + 1) {
|
|
value = (unsigned long)(unsigned char)input[3] |
|
|
((unsigned long)(unsigned char)input[4] << 8) |
|
|
((unsigned long)(unsigned char)input[5] << 16);
|
|
output[7] = _crypt_itoa64[value & 0x3f];
|
|
output[8] = _crypt_itoa64[(value >> 6) & 0x3f];
|
|
output[9] = _crypt_itoa64[(value >> 12) & 0x3f];
|
|
output[10] = _crypt_itoa64[(value >> 18) & 0x3f];
|
|
output[11] = '\0';
|
|
}
|
|
|
|
return output;
|
|
}
|