1253732Speter/*
2253732Speter * The crypt_blowfish homepage is:
3253732Speter *
4253732Speter *	http://www.openwall.com/crypt/
5253732Speter *
6253732Speter * This code comes from John the Ripper password cracker, with reentrant
7253732Speter * and crypt(3) interfaces added, but optimizations specific to password
8253732Speter * cracking removed.
9253732Speter *
10253732Speter * Written by Solar Designer <solar at openwall.com> in 1998-2011.
11253732Speter * No copyright is claimed, and the software is hereby placed in the public
12253732Speter * domain.  In case this attempt to disclaim copyright and place the software
13253732Speter * in the public domain is deemed null and void, then the software is
14253732Speter * Copyright (c) 1998-2011 Solar Designer and it is hereby released to the
15253732Speter * general public under the following terms:
16253732Speter *
17253732Speter * Redistribution and use in source and binary forms, with or without
18253732Speter * modification, are permitted.
19253732Speter *
20253732Speter * There's ABSOLUTELY NO WARRANTY, express or implied.
21253732Speter *
22253732Speter * It is my intent that you should be able to use this on your system,
23253732Speter * as part of a software package, or anywhere else to improve security,
24253732Speter * ensure compatibility, or for any other purpose.  I would appreciate
25253732Speter * it if you give credit where it is due and keep your modifications in
26253732Speter * the public domain as well, but I don't require that in order to let
27253732Speter * you place this code and any modifications you make under a license
28253732Speter * of your choice.
29253732Speter *
30253732Speter * This implementation is mostly compatible with OpenBSD's bcrypt.c (prefix
31253732Speter * "$2a$") by Niels Provos <provos at citi.umich.edu>, and uses some of his
32253732Speter * ideas.  The password hashing algorithm was designed by David Mazieres
33253732Speter * <dm at lcs.mit.edu>.  For more information on the level of compatibility,
34253732Speter * prefer refer to the comments in BF_set_key() below and to the included
35253732Speter * crypt(3) man page.
36253732Speter *
37253732Speter * There's a paper on the algorithm that explains its design decisions:
38253732Speter *
39253732Speter *	http://www.usenix.org/events/usenix99/provos.html
40253732Speter *
41253732Speter * Some of the tricks in BF_ROUND might be inspired by Eric Young's
42253732Speter * Blowfish library (I can't be sure if I would think of something if I
43253732Speter * hadn't seen his code).
44253732Speter */
45253732Speter
46253732Speter#include <string.h>
47253732Speter
48253732Speter#include <errno.h>
49253732Speter#ifndef __set_errno
50253732Speter#define __set_errno(val) errno = (val)
51253732Speter#endif
52253732Speter
53253732Speter/* Just to make sure the prototypes match the actual definitions */
54253732Speter#include "crypt_blowfish.h"
55253732Speter
56253732Speter#ifdef __i386__
57253732Speter#define BF_ASM				0
58253732Speter#define BF_SCALE			1
59253732Speter#elif defined(__x86_64__) || defined(__alpha__) || defined(__hppa__)
60253732Speter#define BF_ASM				0
61253732Speter#define BF_SCALE			1
62253732Speter#else
63253732Speter#define BF_ASM				0
64253732Speter#define BF_SCALE			0
65253732Speter#endif
66253732Speter
67253732Spetertypedef unsigned int BF_word;
68253732Spetertypedef signed int BF_word_signed;
69253732Speter
70253732Speter/* Number of Blowfish rounds, this is also hardcoded into a few places */
71253732Speter#define BF_N				16
72253732Speter
73253732Spetertypedef BF_word BF_key[BF_N + 2];
74253732Speter
75253732Spetertypedef struct {
76253732Speter	BF_word S[4][0x100];
77253732Speter	BF_key P;
78253732Speter} BF_ctx;
79253732Speter
80253732Speter/*
81253732Speter * Magic IV for 64 Blowfish encryptions that we do at the end.
82253732Speter * The string is "OrpheanBeholderScryDoubt" on big-endian.
83253732Speter */
84253732Speterstatic BF_word BF_magic_w[6] = {
85253732Speter	0x4F727068, 0x65616E42, 0x65686F6C,
86253732Speter	0x64657253, 0x63727944, 0x6F756274
87253732Speter};
88253732Speter
89253732Speter/*
90253732Speter * P-box and S-box tables initialized with digits of Pi.
91253732Speter */
92253732Speterstatic BF_ctx BF_init_state = {
93253732Speter	{
94253732Speter		{
95253732Speter			0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7,
96253732Speter			0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,
97253732Speter			0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
98253732Speter			0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,
99253732Speter			0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,
100253732Speter			0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
101253732Speter			0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef,
102253732Speter			0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e,
103253732Speter			0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
104253732Speter			0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,
105253732Speter			0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce,
106253732Speter			0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
107253732Speter			0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e,
108253732Speter			0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x28958677,
109253732Speter			0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
110253732Speter			0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032,
111253732Speter			0xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b88,
112253732Speter			0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
113253732Speter			0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e,
114253732Speter			0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,
115253732Speter			0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
116253732Speter			0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98,
117253732Speter			0xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e88,
118253732Speter			0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
119253732Speter			0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,
120253732Speter			0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d,
121253732Speter			0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
122253732Speter			0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7,
123253732Speter			0xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba,
124253732Speter			0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
125253732Speter			0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f,
126253732Speter			0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd09,
127253732Speter			0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
128253732Speter			0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb,
129253732Speter			0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c7279,
130253732Speter			0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
131253732Speter			0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab,
132253732Speter			0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df82,
133253732Speter			0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
134253732Speter			0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,
135253732Speter			0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0,
136253732Speter			0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
137253732Speter			0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790,
138253732Speter			0xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e8,
139253732Speter			0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
140253732Speter			0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0,
141253732Speter			0xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b7,
142253732Speter			0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
143253732Speter			0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad,
144253732Speter			0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,
145253732Speter			0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
146253732Speter			0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9,
147253732Speter			0x165fa266, 0x80957705, 0x93cc7314, 0x211a1477,
148253732Speter			0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
149253732Speter			0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,
150253732Speter			0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,
151253732Speter			0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
152253732Speter			0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,
153253732Speter			0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,
154253732Speter			0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
155253732Speter			0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,
156253732Speter			0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
157253732Speter			0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
158253732Speter			0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a
159253732Speter		}, {
160253732Speter			0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,
161253732Speter			0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
162253732Speter			0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
163253732Speter			0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
164253732Speter			0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
165253732Speter			0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
166253732Speter			0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,
167253732Speter			0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,
168253732Speter			0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,
169253732Speter			0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,
170253732Speter			0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,
171253732Speter			0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,
172253732Speter			0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701,
173253732Speter			0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,
174253732Speter			0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
175253732Speter			0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331,
176253732Speter			0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,
177253732Speter			0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,
178253732Speter			0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e,
179253732Speter			0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
180253732Speter			0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,
181253732Speter			0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2,
182253732Speter			0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,
183253732Speter			0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,
184253732Speter			0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,
185253732Speter			0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,
186253732Speter			0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,
187253732Speter			0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3,
188253732Speter			0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,
189253732Speter			0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
190253732Speter			0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4,
191253732Speter			0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,
192253732Speter			0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,
193253732Speter			0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28,
194253732Speter			0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
195253732Speter			0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,
196253732Speter			0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510,
197253732Speter			0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,
198253732Speter			0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,
199253732Speter			0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,
200253732Speter			0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,
201253732Speter			0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,
202253732Speter			0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8,
203253732Speter			0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,
204253732Speter			0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
205253732Speter			0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696,
206253732Speter			0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,
207253732Speter			0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,
208253732Speter			0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0,
209253732Speter			0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
210253732Speter			0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,
211253732Speter			0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250,
212253732Speter			0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,
213253732Speter			0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,
214253732Speter			0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,
215253732Speter			0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
216253732Speter			0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
217253732Speter			0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,
218253732Speter			0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
219253732Speter			0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
220253732Speter			0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,
221253732Speter			0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
222253732Speter			0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
223253732Speter			0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7
224253732Speter		}, {
225253732Speter			0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
226253732Speter			0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
227253732Speter			0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
228253732Speter			0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
229253732Speter			0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
230253732Speter			0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
231253732Speter			0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,
232253732Speter			0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb,
233253732Speter			0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,
234253732Speter			0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
235253732Speter			0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42,
236253732Speter			0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,
237253732Speter			0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,
238253732Speter			0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb,
239253732Speter			0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
240253732Speter			0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,
241253732Speter			0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33,
242253732Speter			0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,
243253732Speter			0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,
244253732Speter			0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,
245253732Speter			0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,
246253732Speter			0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,
247253732Speter			0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b,
248253732Speter			0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,
249253732Speter			0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
250253732Speter			0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728,
251253732Speter			0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,
252253732Speter			0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,
253253732Speter			0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37,
254253732Speter			0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
255253732Speter			0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,
256253732Speter			0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b,
257253732Speter			0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,
258253732Speter			0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,
259253732Speter			0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,
260253732Speter			0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,
261253732Speter			0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,
262253732Speter			0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9,
263253732Speter			0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,
264253732Speter			0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
265253732Speter			0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d,
266253732Speter			0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,
267253732Speter			0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,
268253732Speter			0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61,
269253732Speter			0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
270253732Speter			0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,
271253732Speter			0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2,
272253732Speter			0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,
273253732Speter			0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,
274253732Speter			0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,
275253732Speter			0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,
276253732Speter			0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,
277253732Speter			0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52,
278253732Speter			0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,
279253732Speter			0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
280253732Speter			0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,
281253732Speter			0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
282253732Speter			0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
283253732Speter			0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,
284253732Speter			0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
285253732Speter			0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
286253732Speter			0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
287253732Speter			0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
288253732Speter			0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0
289253732Speter		}, {
290253732Speter			0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,
291253732Speter			0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
292253732Speter			0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
293253732Speter			0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
294253732Speter			0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
295253732Speter			0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
296253732Speter			0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,
297253732Speter			0xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee22,
298253732Speter			0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
299253732Speter			0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,
300253732Speter			0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9,
301253732Speter			0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
302253732Speter			0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593,
303253732Speter			0xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b51,
304253732Speter			0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
305253732Speter			0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c,
306253732Speter			0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b,
307253732Speter			0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
308253732Speter			0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c,
309253732Speter			0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,
310253732Speter			0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
311253732Speter			0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319,
312253732Speter			0x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb,
313253732Speter			0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
314253732Speter			0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,
315253732Speter			0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32,
316253732Speter			0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
317253732Speter			0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166,
318253732Speter			0xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae,
319253732Speter			0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
320253732Speter			0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5,
321253732Speter			0x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f47,
322253732Speter			0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
323253732Speter			0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d,
324253732Speter			0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,
325253732Speter			0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
326253732Speter			0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8,
327253732Speter			0x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd,
328253732Speter			0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
329253732Speter			0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,
330253732Speter			0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38,
331253732Speter			0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
332253732Speter			0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c,
333253732Speter			0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b941525,
334253732Speter			0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
335253732Speter			0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442,
336253732Speter			0xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e964,
337253732Speter			0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
338253732Speter			0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8,
339253732Speter			0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,
340253732Speter			0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
341253732Speter			0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299,
342253732Speter			0xf523f357, 0xa6327623, 0x93a83531, 0x56cccd02,
343253732Speter			0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
344253732Speter			0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,
345253732Speter			0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,
346253732Speter			0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
347253732Speter			0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,
348253732Speter			0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,
349253732Speter			0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
350253732Speter			0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,
351253732Speter			0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
352253732Speter			0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
353253732Speter			0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6
354253732Speter		}
355253732Speter	}, {
356253732Speter		0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344,
357253732Speter		0xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c89,
358253732Speter		0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
359253732Speter		0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917,
360253732Speter		0x9216d5d9, 0x8979fb1b
361253732Speter	}
362253732Speter};
363253732Speter
364253732Speterstatic unsigned char BF_itoa64[64 + 1] =
365253732Speter	"./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
366253732Speter
367253732Speterstatic unsigned char BF_atoi64[0x60] = {
368253732Speter	64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 0, 1,
369253732Speter	54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 64, 64, 64, 64, 64,
370253732Speter	64, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
371253732Speter	17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 64, 64, 64, 64, 64,
372253732Speter	64, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42,
373253732Speter	43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 64, 64, 64, 64, 64
374253732Speter};
375253732Speter
376253732Speter#define BF_safe_atoi64(dst, src) \
377253732Speter{ \
378253732Speter	tmp = (unsigned char)(src); \
379253732Speter	if ((unsigned int)(tmp -= 0x20) >= 0x60) return -1; \
380253732Speter	tmp = BF_atoi64[tmp]; \
381253732Speter	if (tmp > 63) return -1; \
382253732Speter	(dst) = tmp; \
383253732Speter}
384253732Speter
385253732Speterstatic int BF_decode(BF_word *dst, const char *src, int size)
386253732Speter{
387253732Speter	unsigned char *dptr = (unsigned char *)dst;
388253732Speter	unsigned char *end = dptr + size;
389253732Speter	const unsigned char *sptr = (const unsigned char *)src;
390253732Speter	unsigned int tmp, c1, c2, c3, c4;
391253732Speter
392253732Speter	do {
393253732Speter		BF_safe_atoi64(c1, *sptr++);
394253732Speter		BF_safe_atoi64(c2, *sptr++);
395253732Speter		*dptr++ = (c1 << 2) | ((c2 & 0x30) >> 4);
396253732Speter		if (dptr >= end) break;
397253732Speter
398253732Speter		BF_safe_atoi64(c3, *sptr++);
399253732Speter		*dptr++ = ((c2 & 0x0F) << 4) | ((c3 & 0x3C) >> 2);
400253732Speter		if (dptr >= end) break;
401253732Speter
402253732Speter		BF_safe_atoi64(c4, *sptr++);
403253732Speter		*dptr++ = ((c3 & 0x03) << 6) | c4;
404253732Speter	} while (dptr < end);
405253732Speter
406253732Speter	return 0;
407253732Speter}
408253732Speter
409253732Speterstatic void BF_encode(char *dst, const BF_word *src, int size)
410253732Speter{
411253732Speter	const unsigned char *sptr = (const unsigned char *)src;
412253732Speter	const unsigned char *end = sptr + size;
413253732Speter	unsigned char *dptr = (unsigned char *)dst;
414253732Speter	unsigned int c1, c2;
415253732Speter
416253732Speter	do {
417253732Speter		c1 = *sptr++;
418253732Speter		*dptr++ = BF_itoa64[c1 >> 2];
419253732Speter		c1 = (c1 & 0x03) << 4;
420253732Speter		if (sptr >= end) {
421253732Speter			*dptr++ = BF_itoa64[c1];
422253732Speter			break;
423253732Speter		}
424253732Speter
425253732Speter		c2 = *sptr++;
426253732Speter		c1 |= c2 >> 4;
427253732Speter		*dptr++ = BF_itoa64[c1];
428253732Speter		c1 = (c2 & 0x0f) << 2;
429253732Speter		if (sptr >= end) {
430253732Speter			*dptr++ = BF_itoa64[c1];
431253732Speter			break;
432253732Speter		}
433253732Speter
434253732Speter		c2 = *sptr++;
435253732Speter		c1 |= c2 >> 6;
436253732Speter		*dptr++ = BF_itoa64[c1];
437253732Speter		*dptr++ = BF_itoa64[c2 & 0x3f];
438253732Speter	} while (sptr < end);
439253732Speter}
440253732Speter
441253732Speterstatic void BF_swap(BF_word *x, int count)
442253732Speter{
443253732Speter	static int endianness_check = 1;
444253732Speter	char *is_little_endian = (char *)&endianness_check;
445253732Speter	BF_word tmp;
446253732Speter
447253732Speter	if (*is_little_endian)
448253732Speter	do {
449253732Speter		tmp = *x;
450253732Speter		tmp = (tmp << 16) | (tmp >> 16);
451253732Speter		*x++ = ((tmp & 0x00FF00FF) << 8) | ((tmp >> 8) & 0x00FF00FF);
452253732Speter	} while (--count);
453253732Speter}
454253732Speter
455253732Speter#if BF_SCALE
456253732Speter/* Architectures which can shift addresses left by 2 bits with no extra cost */
457253732Speter#define BF_ROUND(L, R, N) \
458253732Speter	tmp1 = L & 0xFF; \
459253732Speter	tmp2 = L >> 8; \
460253732Speter	tmp2 &= 0xFF; \
461253732Speter	tmp3 = L >> 16; \
462253732Speter	tmp3 &= 0xFF; \
463253732Speter	tmp4 = L >> 24; \
464253732Speter	tmp1 = data.ctx.S[3][tmp1]; \
465253732Speter	tmp2 = data.ctx.S[2][tmp2]; \
466253732Speter	tmp3 = data.ctx.S[1][tmp3]; \
467253732Speter	tmp3 += data.ctx.S[0][tmp4]; \
468253732Speter	tmp3 ^= tmp2; \
469253732Speter	R ^= data.ctx.P[N + 1]; \
470253732Speter	tmp3 += tmp1; \
471253732Speter	R ^= tmp3;
472253732Speter#else
473253732Speter/* Architectures with no complicated addressing modes supported */
474253732Speter#define BF_INDEX(S, i) \
475253732Speter	(*((BF_word *)(((unsigned char *)S) + (i))))
476253732Speter#define BF_ROUND(L, R, N) \
477253732Speter	tmp1 = L & 0xFF; \
478253732Speter	tmp1 <<= 2; \
479253732Speter	tmp2 = L >> 6; \
480253732Speter	tmp2 &= 0x3FC; \
481253732Speter	tmp3 = L >> 14; \
482253732Speter	tmp3 &= 0x3FC; \
483253732Speter	tmp4 = L >> 22; \
484253732Speter	tmp4 &= 0x3FC; \
485253732Speter	tmp1 = BF_INDEX(data.ctx.S[3], tmp1); \
486253732Speter	tmp2 = BF_INDEX(data.ctx.S[2], tmp2); \
487253732Speter	tmp3 = BF_INDEX(data.ctx.S[1], tmp3); \
488253732Speter	tmp3 += BF_INDEX(data.ctx.S[0], tmp4); \
489253732Speter	tmp3 ^= tmp2; \
490253732Speter	R ^= data.ctx.P[N + 1]; \
491253732Speter	tmp3 += tmp1; \
492253732Speter	R ^= tmp3;
493253732Speter#endif
494253732Speter
495253732Speter/*
496253732Speter * Encrypt one block, BF_N is hardcoded here.
497253732Speter */
498253732Speter#define BF_ENCRYPT \
499253732Speter	L ^= data.ctx.P[0]; \
500253732Speter	BF_ROUND(L, R, 0); \
501253732Speter	BF_ROUND(R, L, 1); \
502253732Speter	BF_ROUND(L, R, 2); \
503253732Speter	BF_ROUND(R, L, 3); \
504253732Speter	BF_ROUND(L, R, 4); \
505253732Speter	BF_ROUND(R, L, 5); \
506253732Speter	BF_ROUND(L, R, 6); \
507253732Speter	BF_ROUND(R, L, 7); \
508253732Speter	BF_ROUND(L, R, 8); \
509253732Speter	BF_ROUND(R, L, 9); \
510253732Speter	BF_ROUND(L, R, 10); \
511253732Speter	BF_ROUND(R, L, 11); \
512253732Speter	BF_ROUND(L, R, 12); \
513253732Speter	BF_ROUND(R, L, 13); \
514253732Speter	BF_ROUND(L, R, 14); \
515253732Speter	BF_ROUND(R, L, 15); \
516253732Speter	tmp4 = R; \
517253732Speter	R = L; \
518253732Speter	L = tmp4 ^ data.ctx.P[BF_N + 1];
519253732Speter
520253732Speter#if BF_ASM
521253732Speter#define BF_body() \
522253732Speter	_BF_body_r(&data.ctx);
523253732Speter#else
524253732Speter#define BF_body() \
525253732Speter	L = R = 0; \
526253732Speter	ptr = data.ctx.P; \
527253732Speter	do { \
528253732Speter		ptr += 2; \
529253732Speter		BF_ENCRYPT; \
530253732Speter		*(ptr - 2) = L; \
531253732Speter		*(ptr - 1) = R; \
532253732Speter	} while (ptr < &data.ctx.P[BF_N + 2]); \
533253732Speter\
534253732Speter	ptr = data.ctx.S[0]; \
535253732Speter	do { \
536253732Speter		ptr += 2; \
537253732Speter		BF_ENCRYPT; \
538253732Speter		*(ptr - 2) = L; \
539253732Speter		*(ptr - 1) = R; \
540253732Speter	} while (ptr < &data.ctx.S[3][0xFF]);
541253732Speter#endif
542253732Speter
543253732Speterstatic void BF_set_key(const char *key, BF_key expanded, BF_key initial,
544253732Speter    unsigned char flags)
545253732Speter{
546253732Speter	const char *ptr = key;
547253732Speter	unsigned int bug, i, j;
548253732Speter	BF_word safety, sign, diff, tmp[2];
549253732Speter
550253732Speter/*
551253732Speter * There was a sign extension bug in older revisions of this function.  While
552253732Speter * we would have liked to simply fix the bug and move on, we have to provide
553253732Speter * a backwards compatibility feature (essentially the bug) for some systems and
554253732Speter * a safety measure for some others.  The latter is needed because for certain
555253732Speter * multiple inputs to the buggy algorithm there exist easily found inputs to
556253732Speter * the correct algorithm that produce the same hash.  Thus, we optionally
557253732Speter * deviate from the correct algorithm just enough to avoid such collisions.
558253732Speter * While the bug itself affected the majority of passwords containing
559253732Speter * characters with the 8th bit set (although only a percentage of those in a
560253732Speter * collision-producing way), the anti-collision safety measure affects
561253732Speter * only a subset of passwords containing the '\xff' character (not even all of
562253732Speter * those passwords, just some of them).  This character is not found in valid
563253732Speter * UTF-8 sequences and is rarely used in popular 8-bit character encodings.
564253732Speter * Thus, the safety measure is unlikely to cause much annoyance, and is a
565253732Speter * reasonable tradeoff to use when authenticating against existing hashes that
566253732Speter * are not reliably known to have been computed with the correct algorithm.
567253732Speter *
568253732Speter * We use an approach that tries to minimize side-channel leaks of password
569253732Speter * information - that is, we mostly use fixed-cost bitwise operations instead
570253732Speter * of branches or table lookups.  (One conditional branch based on password
571253732Speter * length remains.  It is not part of the bug aftermath, though, and is
572253732Speter * difficult and possibly unreasonable to avoid given the use of C strings by
573253732Speter * the caller, which results in similar timing leaks anyway.)
574253732Speter *
575253732Speter * For actual implementation, we set an array index in the variable "bug"
576253732Speter * (0 means no bug, 1 means sign extension bug emulation) and a flag in the
577253732Speter * variable "safety" (bit 16 is set when the safety measure is requested).
578253732Speter * Valid combinations of settings are:
579253732Speter *
580253732Speter * Prefix "$2a$": bug = 0, safety = 0x10000
581253732Speter * Prefix "$2x$": bug = 1, safety = 0
582253732Speter * Prefix "$2y$": bug = 0, safety = 0
583253732Speter */
584253732Speter	bug = (unsigned int)flags & 1;
585253732Speter	safety = ((BF_word)flags & 2) << 15;
586253732Speter
587253732Speter	sign = diff = 0;
588253732Speter
589253732Speter	for (i = 0; i < BF_N + 2; i++) {
590253732Speter		tmp[0] = tmp[1] = 0;
591253732Speter		for (j = 0; j < 4; j++) {
592253732Speter			tmp[0] <<= 8;
593253732Speter			tmp[0] |= (unsigned char)*ptr; /* correct */
594253732Speter			tmp[1] <<= 8;
595253732Speter			tmp[1] |= (BF_word_signed)(signed char)*ptr; /* bug */
596253732Speter/*
597253732Speter * Sign extension in the first char has no effect - nothing to overwrite yet,
598253732Speter * and those extra 24 bits will be fully shifted out of the 32-bit word.  For
599253732Speter * chars 2, 3, 4 in each four-char block, we set bit 7 of "sign" if sign
600253732Speter * extension in tmp[1] occurs.  Once this flag is set, it remains set.
601253732Speter */
602253732Speter			if (j)
603253732Speter				sign |= tmp[1] & 0x80;
604253732Speter			if (!*ptr)
605253732Speter				ptr = key;
606253732Speter			else
607253732Speter				ptr++;
608253732Speter		}
609253732Speter		diff |= tmp[0] ^ tmp[1]; /* Non-zero on any differences */
610253732Speter
611253732Speter		expanded[i] = tmp[bug];
612253732Speter		initial[i] = BF_init_state.P[i] ^ tmp[bug];
613253732Speter	}
614253732Speter
615253732Speter/*
616253732Speter * At this point, "diff" is zero iff the correct and buggy algorithms produced
617253732Speter * exactly the same result.  If so and if "sign" is non-zero, which indicates
618253732Speter * that there was a non-benign sign extension, this means that we have a
619253732Speter * collision between the correctly computed hash for this password and a set of
620253732Speter * passwords that could be supplied to the buggy algorithm.  Our safety measure
621253732Speter * is meant to protect from such many-buggy to one-correct collisions, by
622253732Speter * deviating from the correct algorithm in such cases.  Let's check for this.
623253732Speter */
624253732Speter	diff |= diff >> 16; /* still zero iff exact match */
625253732Speter	diff &= 0xffff; /* ditto */
626253732Speter	diff += 0xffff; /* bit 16 set iff "diff" was non-zero (on non-match) */
627253732Speter	sign <<= 9; /* move the non-benign sign extension flag to bit 16 */
628253732Speter	sign &= ~diff & safety; /* action needed? */
629253732Speter
630253732Speter/*
631253732Speter * If we have determined that we need to deviate from the correct algorithm,
632253732Speter * flip bit 16 in initial expanded key.  (The choice of 16 is arbitrary, but
633253732Speter * let's stick to it now.  It came out of the approach we used above, and it's
634253732Speter * not any worse than any other choice we could make.)
635253732Speter *
636253732Speter * It is crucial that we don't do the same to the expanded key used in the main
637253732Speter * Eksblowfish loop.  By doing it to only one of these two, we deviate from a
638253732Speter * state that could be directly specified by a password to the buggy algorithm
639253732Speter * (and to the fully correct one as well, but that's a side-effect).
640253732Speter */
641253732Speter	initial[0] ^= sign;
642253732Speter}
643253732Speter
644253732Speterstatic char *BF_crypt(const char *key, const char *setting,
645253732Speter	char *output, int size,
646253732Speter	BF_word min)
647253732Speter{
648253732Speter#if BF_ASM
649253732Speter	extern void _BF_body_r(BF_ctx *ctx);
650253732Speter#endif
651253732Speter	static const unsigned char flags_by_subtype[26] =
652253732Speter		{2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
653253732Speter		0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 4, 0};
654253732Speter	struct {
655253732Speter		BF_ctx ctx;
656253732Speter		BF_key expanded_key;
657253732Speter		union {
658253732Speter			BF_word salt[4];
659253732Speter			BF_word output[6];
660253732Speter		} binary;
661253732Speter	} data;
662253732Speter	BF_word L, R;
663253732Speter	BF_word tmp1, tmp2, tmp3, tmp4;
664253732Speter	BF_word *ptr;
665253732Speter	BF_word count;
666253732Speter	int i;
667253732Speter
668253732Speter	if (size < 7 + 22 + 31 + 1) {
669253732Speter		__set_errno(ERANGE);
670253732Speter		return NULL;
671253732Speter	}
672253732Speter
673253732Speter	if (setting[0] != '$' ||
674253732Speter	    setting[1] != '2' ||
675253732Speter	    setting[2] < 'a' || setting[2] > 'z' ||
676253732Speter	    !flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a'] ||
677253732Speter	    setting[3] != '$' ||
678253732Speter	    setting[4] < '0' || setting[4] > '3' ||
679253732Speter	    setting[5] < '0' || setting[5] > '9' ||
680253732Speter	    (setting[4] == '3' && setting[5] > '1') ||
681253732Speter	    setting[6] != '$') {
682253732Speter		__set_errno(EINVAL);
683253732Speter		return NULL;
684253732Speter	}
685253732Speter
686253732Speter	count = (BF_word)1 << ((setting[4] - '0') * 10 + (setting[5] - '0'));
687253732Speter	if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) {
688253732Speter		__set_errno(EINVAL);
689253732Speter		return NULL;
690253732Speter	}
691253732Speter	BF_swap(data.binary.salt, 4);
692253732Speter
693253732Speter	BF_set_key(key, data.expanded_key, data.ctx.P,
694253732Speter	    flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a']);
695253732Speter
696253732Speter	memcpy(data.ctx.S, BF_init_state.S, sizeof(data.ctx.S));
697253732Speter
698253732Speter	L = R = 0;
699253732Speter	for (i = 0; i < BF_N + 2; i += 2) {
700253732Speter		L ^= data.binary.salt[i & 2];
701253732Speter		R ^= data.binary.salt[(i & 2) + 1];
702253732Speter		BF_ENCRYPT;
703253732Speter		data.ctx.P[i] = L;
704253732Speter		data.ctx.P[i + 1] = R;
705253732Speter	}
706253732Speter
707253732Speter	ptr = data.ctx.S[0];
708253732Speter	do {
709253732Speter		ptr += 4;
710253732Speter		L ^= data.binary.salt[(BF_N + 2) & 3];
711253732Speter		R ^= data.binary.salt[(BF_N + 3) & 3];
712253732Speter		BF_ENCRYPT;
713253732Speter		*(ptr - 4) = L;
714253732Speter		*(ptr - 3) = R;
715253732Speter
716253732Speter		L ^= data.binary.salt[(BF_N + 4) & 3];
717253732Speter		R ^= data.binary.salt[(BF_N + 5) & 3];
718253732Speter		BF_ENCRYPT;
719253732Speter		*(ptr - 2) = L;
720253732Speter		*(ptr - 1) = R;
721253732Speter	} while (ptr < &data.ctx.S[3][0xFF]);
722253732Speter
723253732Speter	do {
724253732Speter		int done;
725253732Speter
726253732Speter		for (i = 0; i < BF_N + 2; i += 2) {
727253732Speter			data.ctx.P[i] ^= data.expanded_key[i];
728253732Speter			data.ctx.P[i + 1] ^= data.expanded_key[i + 1];
729253732Speter		}
730253732Speter
731253732Speter		done = 0;
732253732Speter		do {
733253732Speter			BF_body();
734253732Speter			if (done)
735253732Speter				break;
736253732Speter			done = 1;
737253732Speter
738253732Speter			tmp1 = data.binary.salt[0];
739253732Speter			tmp2 = data.binary.salt[1];
740253732Speter			tmp3 = data.binary.salt[2];
741253732Speter			tmp4 = data.binary.salt[3];
742253732Speter			for (i = 0; i < BF_N; i += 4) {
743253732Speter				data.ctx.P[i] ^= tmp1;
744253732Speter				data.ctx.P[i + 1] ^= tmp2;
745253732Speter				data.ctx.P[i + 2] ^= tmp3;
746253732Speter				data.ctx.P[i + 3] ^= tmp4;
747253732Speter			}
748253732Speter			data.ctx.P[16] ^= tmp1;
749253732Speter			data.ctx.P[17] ^= tmp2;
750253732Speter		} while (1);
751253732Speter	} while (--count);
752253732Speter
753253732Speter	for (i = 0; i < 6; i += 2) {
754253732Speter		L = BF_magic_w[i];
755253732Speter		R = BF_magic_w[i + 1];
756253732Speter
757253732Speter		count = 64;
758253732Speter		do {
759253732Speter			BF_ENCRYPT;
760253732Speter		} while (--count);
761253732Speter
762253732Speter		data.binary.output[i] = L;
763253732Speter		data.binary.output[i + 1] = R;
764253732Speter	}
765253732Speter
766253732Speter	memcpy(output, setting, 7 + 22 - 1);
767253732Speter	output[7 + 22 - 1] = BF_itoa64[(int)
768253732Speter		BF_atoi64[(int)setting[7 + 22 - 1] - 0x20] & 0x30];
769253732Speter
770253732Speter/* This has to be bug-compatible with the original implementation, so
771253732Speter * only encode 23 of the 24 bytes. :-) */
772253732Speter	BF_swap(data.binary.output, 6);
773253732Speter	BF_encode(&output[7 + 22], data.binary.output, 23);
774253732Speter	output[7 + 22 + 31] = '\0';
775253732Speter
776253732Speter	return output;
777253732Speter}
778253732Speter
779253732Speterint _crypt_output_magic(const char *setting, char *output, int size)
780253732Speter{
781253732Speter	if (size < 3)
782253732Speter		return -1;
783253732Speter
784253732Speter	output[0] = '*';
785253732Speter	output[1] = '0';
786253732Speter	output[2] = '\0';
787253732Speter
788253732Speter	if (setting[0] == '*' && setting[1] == '0')
789253732Speter		output[1] = '1';
790253732Speter
791253732Speter	return 0;
792253732Speter}
793253732Speter
794253732Speter/*
795253732Speter * Please preserve the runtime self-test.  It serves two purposes at once:
796253732Speter *
797253732Speter * 1. We really can't afford the risk of producing incompatible hashes e.g.
798253732Speter * when there's something like gcc bug 26587 again, whereas an application or
799253732Speter * library integrating this code might not also integrate our external tests or
800253732Speter * it might not run them after every build.  Even if it does, the miscompile
801253732Speter * might only occur on the production build, but not on a testing build (such
802253732Speter * as because of different optimization settings).  It is painful to recover
803253732Speter * from incorrectly-computed hashes - merely fixing whatever broke is not
804253732Speter * enough.  Thus, a proactive measure like this self-test is needed.
805253732Speter *
806253732Speter * 2. We don't want to leave sensitive data from our actual password hash
807253732Speter * computation on the stack or in registers.  Previous revisions of the code
808253732Speter * would do explicit cleanups, but simply running the self-test after hash
809253732Speter * computation is more reliable.
810253732Speter *
811253732Speter * The performance cost of this quick self-test is around 0.6% at the "$2a$08"
812253732Speter * setting.
813253732Speter */
814253732Speterchar *_crypt_blowfish_rn(const char *key, const char *setting,
815253732Speter	char *output, int size)
816253732Speter{
817253732Speter	const char *test_key = "8b \xd0\xc1\xd2\xcf\xcc\xd8";
818253732Speter	const char *test_setting = "$2a$00$abcdefghijklmnopqrstuu";
819253732Speter	static const char * const test_hash[2] =
820253732Speter		{"VUrPmXD6q/nVSSp7pNDhCR9071IfIRe\0\x55", /* $2x$ */
821253732Speter		"i1D709vfamulimlGcq0qq3UvuUasvEa\0\x55"}; /* $2a$, $2y$ */
822253732Speter	char *retval;
823253732Speter	const char *p;
824253732Speter	int save_errno, ok;
825253732Speter	struct {
826253732Speter		char s[7 + 22 + 1];
827253732Speter		char o[7 + 22 + 31 + 1 + 1 + 1];
828253732Speter	} buf;
829253732Speter
830253732Speter/* Hash the supplied password */
831253732Speter	_crypt_output_magic(setting, output, size);
832253732Speter	retval = BF_crypt(key, setting, output, size, 16);
833253732Speter	save_errno = errno;
834253732Speter
835253732Speter/*
836253732Speter * Do a quick self-test.  It is important that we make both calls to BF_crypt()
837253732Speter * from the same scope such that they likely use the same stack locations,
838253732Speter * which makes the second call overwrite the first call's sensitive data on the
839253732Speter * stack and makes it more likely that any alignment related issues would be
840253732Speter * detected by the self-test.
841253732Speter */
842253732Speter	memcpy(buf.s, test_setting, sizeof(buf.s));
843253732Speter	if (retval)
844253732Speter		buf.s[2] = setting[2];
845253732Speter	memset(buf.o, 0x55, sizeof(buf.o));
846253732Speter	buf.o[sizeof(buf.o) - 1] = 0;
847253732Speter	p = BF_crypt(test_key, buf.s, buf.o, sizeof(buf.o) - (1 + 1), 1);
848253732Speter
849253732Speter	ok = (p == buf.o &&
850253732Speter	    !memcmp(p, buf.s, 7 + 22) &&
851253732Speter	    !memcmp(p + (7 + 22),
852253732Speter	    test_hash[(unsigned int)(unsigned char)buf.s[2] & 1],
853253732Speter	    31 + 1 + 1 + 1));
854253732Speter
855253732Speter	{
856253732Speter		const char *k = "\xff\xa3" "34" "\xff\xff\xff\xa3" "345";
857253732Speter		BF_key ae, ai, ye, yi;
858253732Speter		BF_set_key(k, ae, ai, 2); /* $2a$ */
859253732Speter		BF_set_key(k, ye, yi, 4); /* $2y$ */
860253732Speter		ai[0] ^= 0x10000; /* undo the safety (for comparison) */
861253732Speter		ok = ok && ai[0] == 0xdb9c59bc && ye[17] == 0x33343500 &&
862253732Speter		    !memcmp(ae, ye, sizeof(ae)) &&
863253732Speter		    !memcmp(ai, yi, sizeof(ai));
864253732Speter	}
865253732Speter
866253732Speter	__set_errno(save_errno);
867253732Speter	if (ok)
868253732Speter		return retval;
869253732Speter
870253732Speter/* Should not happen */
871253732Speter	_crypt_output_magic(setting, output, size);
872253732Speter	__set_errno(EINVAL); /* pretend we don't support this hash type */
873253732Speter	return NULL;
874253732Speter}
875253732Speter
876253732Speterchar *_crypt_gensalt_blowfish_rn(const char *prefix, unsigned long count,
877253732Speter	const char *input, int size, char *output, int output_size)
878253732Speter{
879253732Speter	if (size < 16 || output_size < 7 + 22 + 1 ||
880253732Speter	    (count && (count < 4 || count > 31)) ||
881253732Speter	    prefix[0] != '$' || prefix[1] != '2' ||
882253732Speter	    (prefix[2] != 'a' && prefix[2] != 'y')) {
883253732Speter		if (output_size > 0) output[0] = '\0';
884253732Speter		__set_errno((output_size < 7 + 22 + 1) ? ERANGE : EINVAL);
885253732Speter		return NULL;
886253732Speter	}
887253732Speter
888253732Speter	if (!count) count = 5;
889253732Speter
890253732Speter	output[0] = '$';
891253732Speter	output[1] = '2';
892253732Speter	output[2] = prefix[2];
893253732Speter	output[3] = '$';
894253732Speter	output[4] = '0' + count / 10;
895253732Speter	output[5] = '0' + count % 10;
896253732Speter	output[6] = '$';
897253732Speter
898253732Speter	BF_encode(&output[7], (const BF_word *)input, 16);
899253732Speter	output[7 + 22] = '\0';
900253732Speter
901253732Speter	return output;
902253732Speter}
903