#include <features.h> #include <stdlib.h> #include <string.h> #include <netinet/in.h> #include "crypt_old.h" /* TEA based crypt(), version 0.0 <ndf@linux.mit.edu> * It looks like there are problems with key bits carrying through * to the encryted data, and I want to get rid of that libc call.. * This is just so rob could see it ;) */ char * crypt_old(const char * key, const char * salt) { /* n is the number of rounds, delta is a golden # derivative, k is the key, v is the data to be encrypted. */ unsigned long v[2], sum=0, delta=0x9e3779b9, n=64, k[4]; static char rkey[16]; unsigned char i; /* Our constant string will be a string of zeros .. */ v[0]=v[1]=k[0]=k[1]=k[2]=k[3]=0; for(i=0;i<16;i++) rkey[i]=0; rkey[0]=*salt; rkey[1]=salt[1]; for (i=0;i<15 && key[i];i++) rkey[i+1]=key[i]; memcpy(k, rkey, 4*sizeof(long)); for (i=0; i<4; i++) k[i] = ntohl(k[i]); while (n-->0) { sum += delta; v[0] += ((v[1]<<4)+k[0]) ^ (v[1]+sum) ^ ((v[1]>>5)+k[1]); v[1] += ((v[0]<<4)+k[2]) ^ (v[0]+sum) ^ ((v[0]>>5)+k[3]); } *rkey=*salt; rkey[1]=salt[1]; /* Now we need to unpack the bits and map it to "A-Za-z0-9./" for printing in /etc/passwd */ for (i=2;i<13;i++) { /* This unpacks the 6 bit data, each cluster into its own byte */ if (i==8) v[0]|=v[1]>>28; rkey[i]=v[(i-2)/6]&0x3F; v[(i-2)/6]>>=6; /* Now we map to the proper chars */ if (rkey[i]>=0 && rkey[i]<12) rkey[i]+=46; else if (rkey[i]>11 && rkey[i]<38) rkey[i]+=53; else if (rkey[i]>37 && rkey[i]<64) rkey[i]+=59; else return NULL; } rkey[13]='\0'; return rkey; }