You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							364 lines
						
					
					
						
							14 KiB
						
					
					
				
			
		
		
	
	
							364 lines
						
					
					
						
							14 KiB
						
					
					
				"""passlib.handlers.sun_md5_crypt - Sun's Md5 Crypt, used on Solaris
 | 
						|
 | 
						|
.. warning::
 | 
						|
 | 
						|
    This implementation may not reproduce
 | 
						|
    the original Solaris behavior in some border cases.
 | 
						|
    See documentation for details.
 | 
						|
"""
 | 
						|
 | 
						|
#=============================================================================
 | 
						|
# imports
 | 
						|
#=============================================================================
 | 
						|
# core
 | 
						|
from hashlib import md5
 | 
						|
import re
 | 
						|
import logging; log = logging.getLogger(__name__)
 | 
						|
from warnings import warn
 | 
						|
# site
 | 
						|
# pkg
 | 
						|
from passlib.utils import to_unicode
 | 
						|
from passlib.utils.binary import h64
 | 
						|
from passlib.utils.compat import byte_elem_value, irange, u, \
 | 
						|
                                 uascii_to_str, unicode, str_to_bascii
 | 
						|
import passlib.utils.handlers as uh
 | 
						|
# local
 | 
						|
__all__ = [
 | 
						|
    "sun_md5_crypt",
 | 
						|
]
 | 
						|
 | 
						|
#=============================================================================
 | 
						|
# backend
 | 
						|
#=============================================================================
 | 
						|
# constant data used by alg - Hamlet act 3 scene 1 + null char
 | 
						|
# exact bytes as in http://www.ibiblio.org/pub/docs/books/gutenberg/etext98/2ws2610.txt
 | 
						|
# from Project Gutenberg.
 | 
						|
 | 
						|
MAGIC_HAMLET = (
 | 
						|
    b"To be, or not to be,--that is the question:--\n"
 | 
						|
    b"Whether 'tis nobler in the mind to suffer\n"
 | 
						|
    b"The slings and arrows of outrageous fortune\n"
 | 
						|
    b"Or to take arms against a sea of troubles,\n"
 | 
						|
    b"And by opposing end them?--To die,--to sleep,--\n"
 | 
						|
    b"No more; and by a sleep to say we end\n"
 | 
						|
    b"The heartache, and the thousand natural shocks\n"
 | 
						|
    b"That flesh is heir to,--'tis a consummation\n"
 | 
						|
    b"Devoutly to be wish'd. To die,--to sleep;--\n"
 | 
						|
    b"To sleep! perchance to dream:--ay, there's the rub;\n"
 | 
						|
    b"For in that sleep of death what dreams may come,\n"
 | 
						|
    b"When we have shuffled off this mortal coil,\n"
 | 
						|
    b"Must give us pause: there's the respect\n"
 | 
						|
    b"That makes calamity of so long life;\n"
 | 
						|
    b"For who would bear the whips and scorns of time,\n"
 | 
						|
    b"The oppressor's wrong, the proud man's contumely,\n"
 | 
						|
    b"The pangs of despis'd love, the law's delay,\n"
 | 
						|
    b"The insolence of office, and the spurns\n"
 | 
						|
    b"That patient merit of the unworthy takes,\n"
 | 
						|
    b"When he himself might his quietus make\n"
 | 
						|
    b"With a bare bodkin? who would these fardels bear,\n"
 | 
						|
    b"To grunt and sweat under a weary life,\n"
 | 
						|
    b"But that the dread of something after death,--\n"
 | 
						|
    b"The undiscover'd country, from whose bourn\n"
 | 
						|
    b"No traveller returns,--puzzles the will,\n"
 | 
						|
    b"And makes us rather bear those ills we have\n"
 | 
						|
    b"Than fly to others that we know not of?\n"
 | 
						|
    b"Thus conscience does make cowards of us all;\n"
 | 
						|
    b"And thus the native hue of resolution\n"
 | 
						|
    b"Is sicklied o'er with the pale cast of thought;\n"
 | 
						|
    b"And enterprises of great pith and moment,\n"
 | 
						|
    b"With this regard, their currents turn awry,\n"
 | 
						|
    b"And lose the name of action.--Soft you now!\n"
 | 
						|
    b"The fair Ophelia!--Nymph, in thy orisons\n"
 | 
						|
    b"Be all my sins remember'd.\n\x00" #<- apparently null at end of C string is included (test vector won't pass otherwise)
 | 
						|
)
 | 
						|
 | 
						|
# NOTE: these sequences are pre-calculated iteration ranges used by X & Y loops w/in rounds function below
 | 
						|
xr = irange(7)
 | 
						|
_XY_ROUNDS = [
 | 
						|
    tuple((i,i,i+3) for i in xr), # xrounds 0
 | 
						|
    tuple((i,i+1,i+4) for i in xr), # xrounds 1
 | 
						|
    tuple((i,i+8,(i+11)&15) for i in xr), # yrounds 0
 | 
						|
    tuple((i,(i+9)&15, (i+12)&15) for i in xr), # yrounds 1
 | 
						|
]
 | 
						|
del xr
 | 
						|
 | 
						|
def raw_sun_md5_crypt(secret, rounds, salt):
 | 
						|
    """given secret & salt, return encoded sun-md5-crypt checksum"""
 | 
						|
    global MAGIC_HAMLET
 | 
						|
    assert isinstance(secret, bytes)
 | 
						|
    assert isinstance(salt, bytes)
 | 
						|
 | 
						|
    # validate rounds
 | 
						|
    if rounds <= 0:
 | 
						|
        rounds = 0
 | 
						|
    real_rounds = 4096 + rounds
 | 
						|
    # NOTE: spec seems to imply max 'rounds' is 2**32-1
 | 
						|
 | 
						|
    # generate initial digest to start off round 0.
 | 
						|
    # NOTE: algorithm 'salt' includes full config string w/ trailing "$"
 | 
						|
    result = md5(secret + salt).digest()
 | 
						|
    assert len(result) == 16
 | 
						|
 | 
						|
    # NOTE: many things in this function have been inlined (to speed up the loop
 | 
						|
    #       as much as possible), to the point that this code barely resembles
 | 
						|
    #       the algorithm as described in the docs. in particular:
 | 
						|
    #
 | 
						|
    #       * all accesses to a given bit have been inlined using the formula
 | 
						|
    #         rbitval(bit) = (rval((bit>>3) & 15) >> (bit & 7)) & 1
 | 
						|
    #
 | 
						|
    #       * the calculation of coinflip value R has been inlined
 | 
						|
    #
 | 
						|
    #       * the conditional division of coinflip value V has been inlined as
 | 
						|
    #         a shift right of 0 or 1.
 | 
						|
    #
 | 
						|
    #       * the i, i+3, etc iterations are precalculated in lists.
 | 
						|
    #
 | 
						|
    #       * the round-based conditional division of x & y is now performed
 | 
						|
    #         by choosing an appropriate precalculated list, so that it only
 | 
						|
    #         calculates the 7 bits which will actually be used.
 | 
						|
    #
 | 
						|
    X_ROUNDS_0, X_ROUNDS_1, Y_ROUNDS_0, Y_ROUNDS_1 = _XY_ROUNDS
 | 
						|
 | 
						|
    # NOTE: % appears to be *slightly* slower than &, so we prefer & if possible
 | 
						|
 | 
						|
    round = 0
 | 
						|
    while round < real_rounds:
 | 
						|
        # convert last result byte string to list of byte-ints for easy access
 | 
						|
        rval = [ byte_elem_value(c) for c in result ].__getitem__
 | 
						|
 | 
						|
        # build up X bit by bit
 | 
						|
        x = 0
 | 
						|
        xrounds = X_ROUNDS_1 if (rval((round>>3) & 15)>>(round & 7)) & 1 else X_ROUNDS_0
 | 
						|
        for i, ia, ib in xrounds:
 | 
						|
            a = rval(ia)
 | 
						|
            b = rval(ib)
 | 
						|
            v = rval((a >> (b % 5)) & 15) >> ((b>>(a&7)) & 1)
 | 
						|
            x |= ((rval((v>>3)&15)>>(v&7))&1) << i
 | 
						|
 | 
						|
        # build up Y bit by bit
 | 
						|
        y = 0
 | 
						|
        yrounds = Y_ROUNDS_1 if (rval(((round+64)>>3) & 15)>>(round & 7)) & 1 else Y_ROUNDS_0
 | 
						|
        for i, ia, ib in yrounds:
 | 
						|
            a = rval(ia)
 | 
						|
            b = rval(ib)
 | 
						|
            v = rval((a >> (b % 5)) & 15) >> ((b>>(a&7)) & 1)
 | 
						|
            y |= ((rval((v>>3)&15)>>(v&7))&1) << i
 | 
						|
 | 
						|
        # extract x'th and y'th bit, xoring them together to yeild "coin flip"
 | 
						|
        coin = ((rval(x>>3) >> (x&7)) ^ (rval(y>>3) >> (y&7))) & 1
 | 
						|
 | 
						|
        # construct hash for this round
 | 
						|
        h = md5(result)
 | 
						|
        if coin:
 | 
						|
            h.update(MAGIC_HAMLET)
 | 
						|
        h.update(unicode(round).encode("ascii"))
 | 
						|
        result = h.digest()
 | 
						|
 | 
						|
        round += 1
 | 
						|
 | 
						|
    # encode output
 | 
						|
    return h64.encode_transposed_bytes(result, _chk_offsets)
 | 
						|
 | 
						|
# NOTE: same offsets as md5_crypt
 | 
						|
_chk_offsets = (
 | 
						|
    12,6,0,
 | 
						|
    13,7,1,
 | 
						|
    14,8,2,
 | 
						|
    15,9,3,
 | 
						|
    5,10,4,
 | 
						|
    11,
 | 
						|
)
 | 
						|
 | 
						|
#=============================================================================
 | 
						|
# handler
 | 
						|
#=============================================================================
 | 
						|
class sun_md5_crypt(uh.HasRounds, uh.HasSalt, uh.GenericHandler):
 | 
						|
    """This class implements the Sun-MD5-Crypt password hash, and follows the :ref:`password-hash-api`.
 | 
						|
 | 
						|
    It supports a variable-length salt, and a variable number of rounds.
 | 
						|
 | 
						|
    The :meth:`~passlib.ifc.PasswordHash.using` method accepts the following optional keywords:
 | 
						|
 | 
						|
    :type salt: str
 | 
						|
    :param salt:
 | 
						|
        Optional salt string.
 | 
						|
        If not specified, a salt will be autogenerated (this is recommended).
 | 
						|
        If specified, it must be drawn from the regexp range ``[./0-9A-Za-z]``.
 | 
						|
 | 
						|
    :type salt_size: int
 | 
						|
    :param salt_size:
 | 
						|
        If no salt is specified, this parameter can be used to specify
 | 
						|
        the size (in characters) of the autogenerated salt.
 | 
						|
        It currently defaults to 8.
 | 
						|
 | 
						|
    :type rounds: int
 | 
						|
    :param rounds:
 | 
						|
        Optional number of rounds to use.
 | 
						|
        Defaults to 34000, must be between 0 and 4294963199, inclusive.
 | 
						|
 | 
						|
    :type bare_salt: bool
 | 
						|
    :param bare_salt:
 | 
						|
        Optional flag used to enable an alternate salt digest behavior
 | 
						|
        used by some hash strings in this scheme.
 | 
						|
        This flag can be ignored by most users.
 | 
						|
        Defaults to ``False``.
 | 
						|
        (see :ref:`smc-bare-salt` for details).
 | 
						|
 | 
						|
    :type relaxed: bool
 | 
						|
    :param relaxed:
 | 
						|
        By default, providing an invalid value for one of the other
 | 
						|
        keywords will result in a :exc:`ValueError`. If ``relaxed=True``,
 | 
						|
        and the error can be corrected, a :exc:`~passlib.exc.PasslibHashWarning`
 | 
						|
        will be issued instead. Correctable errors include ``rounds``
 | 
						|
        that are too small or too large, and ``salt`` strings that are too long.
 | 
						|
 | 
						|
        .. versionadded:: 1.6
 | 
						|
    """
 | 
						|
    #===================================================================
 | 
						|
    # class attrs
 | 
						|
    #===================================================================
 | 
						|
    name = "sun_md5_crypt"
 | 
						|
    setting_kwds = ("salt", "rounds", "bare_salt", "salt_size")
 | 
						|
    checksum_chars = uh.HASH64_CHARS
 | 
						|
    checksum_size = 22
 | 
						|
 | 
						|
    # NOTE: docs say max password length is 255.
 | 
						|
    # release 9u2
 | 
						|
 | 
						|
    # NOTE: not sure if original crypt has a salt size limit,
 | 
						|
    # all instances that have been seen use 8 chars.
 | 
						|
    default_salt_size = 8
 | 
						|
    max_salt_size = None
 | 
						|
    salt_chars = uh.HASH64_CHARS
 | 
						|
 | 
						|
    default_rounds = 34000 # current passlib default
 | 
						|
    min_rounds = 0
 | 
						|
    max_rounds = 4294963199 ##2**32-1-4096
 | 
						|
        # XXX: ^ not sure what it does if past this bound... does 32 int roll over?
 | 
						|
    rounds_cost = "linear"
 | 
						|
 | 
						|
    ident_values = (u("$md5$"), u("$md5,"))
 | 
						|
 | 
						|
    #===================================================================
 | 
						|
    # instance attrs
 | 
						|
    #===================================================================
 | 
						|
    bare_salt = False # flag to indicate legacy hashes that lack "$$" suffix
 | 
						|
 | 
						|
    #===================================================================
 | 
						|
    # constructor
 | 
						|
    #===================================================================
 | 
						|
    def __init__(self, bare_salt=False, **kwds):
 | 
						|
        self.bare_salt = bare_salt
 | 
						|
        super(sun_md5_crypt, self).__init__(**kwds)
 | 
						|
 | 
						|
    #===================================================================
 | 
						|
    # internal helpers
 | 
						|
    #===================================================================
 | 
						|
    @classmethod
 | 
						|
    def identify(cls, hash):
 | 
						|
        hash = uh.to_unicode_for_identify(hash)
 | 
						|
        return hash.startswith(cls.ident_values)
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def from_string(cls, hash):
 | 
						|
        hash = to_unicode(hash, "ascii", "hash")
 | 
						|
 | 
						|
        #
 | 
						|
        # detect if hash specifies rounds value.
 | 
						|
        # if so, parse and validate it.
 | 
						|
        # by end, set 'rounds' to int value, and 'tail' containing salt+chk
 | 
						|
        #
 | 
						|
        if hash.startswith(u("$md5$")):
 | 
						|
            rounds = 0
 | 
						|
            salt_idx = 5
 | 
						|
        elif hash.startswith(u("$md5,rounds=")):
 | 
						|
            idx = hash.find(u("$"), 12)
 | 
						|
            if idx == -1:
 | 
						|
                raise uh.exc.MalformedHashError(cls, "unexpected end of rounds")
 | 
						|
            rstr = hash[12:idx]
 | 
						|
            try:
 | 
						|
                rounds = int(rstr)
 | 
						|
            except ValueError:
 | 
						|
                raise uh.exc.MalformedHashError(cls, "bad rounds")
 | 
						|
            if rstr != unicode(rounds):
 | 
						|
                raise uh.exc.ZeroPaddedRoundsError(cls)
 | 
						|
            if rounds == 0:
 | 
						|
                # NOTE: not sure if this is forbidden by spec or not;
 | 
						|
                #      but allowing it would complicate things,
 | 
						|
                #      and it should never occur anyways.
 | 
						|
                raise uh.exc.MalformedHashError(cls, "explicit zero rounds")
 | 
						|
            salt_idx = idx+1
 | 
						|
        else:
 | 
						|
            raise uh.exc.InvalidHashError(cls)
 | 
						|
 | 
						|
        #
 | 
						|
        # salt/checksum separation is kinda weird,
 | 
						|
        # to deal cleanly with some backward-compatible workarounds
 | 
						|
        # implemented by original implementation.
 | 
						|
        #
 | 
						|
        chk_idx = hash.rfind(u("$"), salt_idx)
 | 
						|
        if chk_idx == -1:
 | 
						|
            # ''-config for $-hash
 | 
						|
            salt = hash[salt_idx:]
 | 
						|
            chk = None
 | 
						|
            bare_salt = True
 | 
						|
        elif chk_idx == len(hash)-1:
 | 
						|
            if chk_idx > salt_idx and hash[-2] == u("$"):
 | 
						|
                raise uh.exc.MalformedHashError(cls, "too many '$' separators")
 | 
						|
            # $-config for $$-hash
 | 
						|
            salt = hash[salt_idx:-1]
 | 
						|
            chk = None
 | 
						|
            bare_salt = False
 | 
						|
        elif chk_idx > 0 and hash[chk_idx-1] == u("$"):
 | 
						|
            # $$-hash
 | 
						|
            salt = hash[salt_idx:chk_idx-1]
 | 
						|
            chk = hash[chk_idx+1:]
 | 
						|
            bare_salt = False
 | 
						|
        else:
 | 
						|
            # $-hash
 | 
						|
            salt = hash[salt_idx:chk_idx]
 | 
						|
            chk = hash[chk_idx+1:]
 | 
						|
            bare_salt = True
 | 
						|
 | 
						|
        return cls(
 | 
						|
            rounds=rounds,
 | 
						|
            salt=salt,
 | 
						|
            checksum=chk,
 | 
						|
            bare_salt=bare_salt,
 | 
						|
        )
 | 
						|
 | 
						|
    def to_string(self, _withchk=True):
 | 
						|
        ss = u('') if self.bare_salt else u('$')
 | 
						|
        rounds = self.rounds
 | 
						|
        if rounds > 0:
 | 
						|
            hash = u("$md5,rounds=%d$%s%s") % (rounds, self.salt, ss)
 | 
						|
        else:
 | 
						|
            hash = u("$md5$%s%s") % (self.salt, ss)
 | 
						|
        if _withchk:
 | 
						|
            chk = self.checksum
 | 
						|
            hash = u("%s$%s") % (hash, chk)
 | 
						|
        return uascii_to_str(hash)
 | 
						|
 | 
						|
    #===================================================================
 | 
						|
    # primary interface
 | 
						|
    #===================================================================
 | 
						|
    # TODO: if we're on solaris, check for native crypt() support.
 | 
						|
    #       this will require extra testing, to make sure native crypt
 | 
						|
    #       actually behaves correctly. of particular importance:
 | 
						|
    #       when using ""-config, make sure to append "$x" to string.
 | 
						|
 | 
						|
    def _calc_checksum(self, secret):
 | 
						|
        # NOTE: no reference for how sun_md5_crypt handles unicode
 | 
						|
        if isinstance(secret, unicode):
 | 
						|
            secret = secret.encode("utf-8")
 | 
						|
        config = str_to_bascii(self.to_string(_withchk=False))
 | 
						|
        return raw_sun_md5_crypt(secret, self.rounds, config).decode("ascii")
 | 
						|
 | 
						|
    #===================================================================
 | 
						|
    # eoc
 | 
						|
    #===================================================================
 | 
						|
 | 
						|
#=============================================================================
 | 
						|
# eof
 | 
						|
#=============================================================================
 |