197 lines
5.4 KiB
Python
197 lines
5.4 KiB
Python
|
|
#########################################################
|
||
|
|
# md5crypt.py
|
||
|
|
#
|
||
|
|
# 0423.2000 by michal wallace http://www.sabren.com/
|
||
|
|
# based on perl's Crypt::PasswdMD5 by Luis Munoz (lem@cantv.net)
|
||
|
|
# based on /usr/src/libcrypt/crypt.c from FreeBSD 2.2.5-RELEASE
|
||
|
|
#
|
||
|
|
# MANY THANKS TO
|
||
|
|
#
|
||
|
|
# Carey Evans - http://home.clear.net.nz/pages/c.evans/
|
||
|
|
# Dennis Marti - http://users.starpower.net/marti1/
|
||
|
|
#
|
||
|
|
# For the patches that got this thing working!
|
||
|
|
#
|
||
|
|
#########################################################
|
||
|
|
"""md5crypt.py - Provides interoperable MD5-based crypt() function
|
||
|
|
|
||
|
|
SYNOPSIS
|
||
|
|
|
||
|
|
import md5crypt.py
|
||
|
|
|
||
|
|
cryptedpassword = md5crypt.md5crypt(password, salt);
|
||
|
|
|
||
|
|
DESCRIPTION
|
||
|
|
|
||
|
|
unix_md5_crypt() provides a crypt()-compatible interface to the
|
||
|
|
rather new MD5-based crypt() function found in modern operating systems.
|
||
|
|
It's based on the implementation found on FreeBSD 2.2.[56]-RELEASE and
|
||
|
|
contains the following license in it:
|
||
|
|
|
||
|
|
"THE BEER-WARE LICENSE" (Revision 42):
|
||
|
|
<phk@login.dknet.dk> wrote this file. As long as you retain this notice you
|
||
|
|
can do whatever you want with this stuff. If we meet some day, and you think
|
||
|
|
this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
||
|
|
|
||
|
|
apache_md5_crypt() provides a function compatible with Apache's
|
||
|
|
.htpasswd files. This was contributed by Bryan Hart <bryan@eai.com>.
|
||
|
|
|
||
|
|
"""
|
||
|
|
|
||
|
|
MAGIC = '$1$' # Magic string
|
||
|
|
ITOA64 = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
|
||
|
|
|
||
|
|
import hashlib
|
||
|
|
|
||
|
|
def to64 (v, n):
|
||
|
|
ret = ''
|
||
|
|
while (n - 1 >= 0):
|
||
|
|
n = n - 1
|
||
|
|
ret = ret + ITOA64[v & 0x3f]
|
||
|
|
v = v >> 6
|
||
|
|
return ret
|
||
|
|
|
||
|
|
|
||
|
|
def apache_md5_crypt (pw, salt):
|
||
|
|
# change the Magic string to match the one used by Apache
|
||
|
|
return unix_md5_crypt(pw, salt, '$apr1$')
|
||
|
|
|
||
|
|
|
||
|
|
def unix_md5_crypt(pw, salt, magic=None):
|
||
|
|
|
||
|
|
if magic == None:
|
||
|
|
magic = MAGIC
|
||
|
|
|
||
|
|
# Take care of the magic string if present
|
||
|
|
if salt[:len(magic)] == magic:
|
||
|
|
salt = salt[len(magic):]
|
||
|
|
|
||
|
|
|
||
|
|
# salt can have up to 8 characters:
|
||
|
|
import string
|
||
|
|
|
||
|
|
try:
|
||
|
|
salt = string.split(salt, '$', 1)[0]
|
||
|
|
except AttributeError:
|
||
|
|
salt = salt.decode("utf-8").split('$', 1)[0].encode("utf-8")
|
||
|
|
|
||
|
|
salt = salt[:8]
|
||
|
|
|
||
|
|
try:
|
||
|
|
ctx = pw + magic + salt
|
||
|
|
except TypeError:
|
||
|
|
ctx = pw + magic.encode("utf-8") + salt
|
||
|
|
|
||
|
|
final = hashlib.md5(pw + salt + pw).digest()
|
||
|
|
|
||
|
|
for pl in range(len(pw),0,-16):
|
||
|
|
if pl > 16:
|
||
|
|
ctx = ctx + final[:16]
|
||
|
|
else:
|
||
|
|
ctx = ctx + final[:pl]
|
||
|
|
|
||
|
|
|
||
|
|
# Now the 'weird' xform (??)
|
||
|
|
|
||
|
|
i = len(pw)
|
||
|
|
while i:
|
||
|
|
if i & 1:
|
||
|
|
try:
|
||
|
|
ctx = ctx + chr(0) #if ($i & 1) { $ctx->add(pack("C", 0)); }
|
||
|
|
except TypeError:
|
||
|
|
ctx = ctx + chr(0).encode("utf-8")
|
||
|
|
else:
|
||
|
|
try:
|
||
|
|
ctx = ctx + pw[0]
|
||
|
|
except TypeError:
|
||
|
|
ctx = ctx + chr(pw[0]).encode("utf-8")
|
||
|
|
i = i >> 1
|
||
|
|
|
||
|
|
final = hashlib.md5(ctx).digest()
|
||
|
|
|
||
|
|
# The following is supposed to make
|
||
|
|
# things run slower.
|
||
|
|
|
||
|
|
# my question: WTF???
|
||
|
|
|
||
|
|
for i in range(1000):
|
||
|
|
ctx1 = ''.encode("utf-8")
|
||
|
|
|
||
|
|
if i & 1:
|
||
|
|
ctx1 = ctx1 + pw
|
||
|
|
else:
|
||
|
|
ctx1 = ctx1 + final[:16]
|
||
|
|
|
||
|
|
if i % 3:
|
||
|
|
ctx1 = ctx1 + salt
|
||
|
|
|
||
|
|
if i % 7:
|
||
|
|
ctx1 = ctx1 + pw
|
||
|
|
|
||
|
|
if i & 1:
|
||
|
|
ctx1 = ctx1 + final[:16]
|
||
|
|
else:
|
||
|
|
ctx1 = ctx1 + pw
|
||
|
|
|
||
|
|
|
||
|
|
final = hashlib.md5(ctx1).digest()
|
||
|
|
|
||
|
|
|
||
|
|
# Final xform
|
||
|
|
|
||
|
|
passwd = ''
|
||
|
|
|
||
|
|
try:
|
||
|
|
passwd = passwd + to64((int(ord(final[0])) << 16)
|
||
|
|
|(int(ord(final[6])) << 8)
|
||
|
|
|(int(ord(final[12]))),4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(ord(final[1])) << 16)
|
||
|
|
|(int(ord(final[7])) << 8)
|
||
|
|
|(int(ord(final[13]))), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(ord(final[2])) << 16)
|
||
|
|
|(int(ord(final[8])) << 8)
|
||
|
|
|(int(ord(final[14]))), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(ord(final[3])) << 16)
|
||
|
|
|(int(ord(final[9])) << 8)
|
||
|
|
|(int(ord(final[15]))), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(ord(final[4])) << 16)
|
||
|
|
|(int(ord(final[10])) << 8)
|
||
|
|
|(int(ord(final[5]))), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(ord(final[11]))), 2)
|
||
|
|
|
||
|
|
return magic + salt + '$' + passwd
|
||
|
|
except TypeError:
|
||
|
|
passwd = passwd + to64((int(final[0]) << 16)
|
||
|
|
|(int(final[6]) << 8)
|
||
|
|
|(int(final[12])),4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(final[1]) << 16)
|
||
|
|
|(int(final[7]) << 8)
|
||
|
|
|(int(final[13])), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(final[2]) << 16)
|
||
|
|
|(int(final[8]) << 8)
|
||
|
|
|(int(final[14])), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(final[3]) << 16)
|
||
|
|
|(int(final[9]) << 8)
|
||
|
|
|(int(final[15])), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(final[4]) << 16)
|
||
|
|
|(int(final[10]) << 8)
|
||
|
|
|(int(final[5])), 4)
|
||
|
|
|
||
|
|
passwd = passwd + to64((int(final[11])), 2)
|
||
|
|
return magic + salt.decode("utf-8") + '$' + passwd
|
||
|
|
|
||
|
|
## assign a wrapper function:
|
||
|
|
md5crypt = unix_md5_crypt
|
||
|
|
|
||
|
|
if __name__ == "__main__":
|
||
|
|
print (unix_md5_crypt("cat", "hat"))
|