001: /*
002: * This file is part of PFIXCORE.
003: *
004: * PFIXCORE is free software; you can redistribute it and/or modify
005: * it under the terms of the GNU Lesser General Public License as published by
006: * the Free Software Foundation; either version 2 of the License, or
007: * (at your option) any later version.
008: *
009: * PFIXCORE is distributed in the hope that it will be useful,
010: * but WITHOUT ANY WARRANTY; without even the implied warranty of
011: * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
012: * GNU Lesser General Public License for more details.
013: *
014: * You should have received a copy of the GNU Lesser General Public License
015: * along with PFIXCORE; if not, write to the Free Software
016: * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
017: *
018: */
019: package de.schlund.pfixcore.util;
020:
021: /**
022: * This class provides us with the ability to encrypt passwords when sent
023: * over the network stream
024: *
025: * <P>Contains static methods to encrypt and compare
026: * passwords with Unix encrypted passwords.</P>
027: *
028: * <P>See <A HREF="http://www.zeh.com/local/jfd/crypt.html">
029: * John Dumas's Java Crypt page</A> for the original source.</P>
030: *
031: * @author jdumas@zgs.com (John Dumas)
032: */
033:
034: public class UnixCrypt extends Object {
035: //
036: // Null constructor - can't instantiate class
037: private UnixCrypt() {
038: }
039:
040: private static final char[] saltChars = ("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789./"
041: .toCharArray());
042:
043: private static final int ITERATIONS = 16;
044:
045: private static final int[] con_salt = { 0x00, 0x00, 0x00, 0x00,
046: 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
047: 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
048: 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
049: 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
050: 0x00, 0x00, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
051: 0x08, 0x09, 0x0A, 0x0B, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A,
052: 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14,
053: 0x15, 0x16, 0x17, 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E,
054: 0x1F, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x20, 0x21, 0x22,
055: 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2A, 0x2B, 0x2C,
056: 0x2D, 0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36,
057: 0x37, 0x38, 0x39, 0x3A, 0x3B, 0x3C, 0x3D, 0x3E, 0x3F, 0x00,
058: 0x00, 0x00, 0x00, 0x00, };
059:
060: private static final boolean[] shifts2 = { false, false, true,
061: true, true, true, true, true, false, true, true, true,
062: true, true, true, false };
063:
064: private static final int[][] skb = {
065: {
066: /* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
067: 0x00000000, 0x00000010, 0x20000000, 0x20000010, 0x00010000,
068: 0x00010010, 0x20010000, 0x20010010, 0x00000800,
069: 0x00000810, 0x20000800, 0x20000810, 0x00010800,
070: 0x00010810, 0x20010800, 0x20010810, 0x00000020,
071: 0x00000030, 0x20000020, 0x20000030, 0x00010020,
072: 0x00010030, 0x20010020, 0x20010030, 0x00000820,
073: 0x00000830, 0x20000820, 0x20000830, 0x00010820,
074: 0x00010830, 0x20010820, 0x20010830, 0x00080000,
075: 0x00080010, 0x20080000, 0x20080010, 0x00090000,
076: 0x00090010, 0x20090000, 0x20090010, 0x00080800,
077: 0x00080810, 0x20080800, 0x20080810, 0x00090800,
078: 0x00090810, 0x20090800, 0x20090810, 0x00080020,
079: 0x00080030, 0x20080020, 0x20080030, 0x00090020,
080: 0x00090030, 0x20090020, 0x20090030, 0x00080820,
081: 0x00080830, 0x20080820, 0x20080830, 0x00090820,
082: 0x00090830, 0x20090820, 0x20090830, },
083: {
084: /* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
085: 0x00000000, 0x02000000, 0x00002000, 0x02002000, 0x00200000,
086: 0x02200000, 0x00202000, 0x02202000, 0x00000004,
087: 0x02000004, 0x00002004, 0x02002004, 0x00200004,
088: 0x02200004, 0x00202004, 0x02202004, 0x00000400,
089: 0x02000400, 0x00002400, 0x02002400, 0x00200400,
090: 0x02200400, 0x00202400, 0x02202400, 0x00000404,
091: 0x02000404, 0x00002404, 0x02002404, 0x00200404,
092: 0x02200404, 0x00202404, 0x02202404, 0x10000000,
093: 0x12000000, 0x10002000, 0x12002000, 0x10200000,
094: 0x12200000, 0x10202000, 0x12202000, 0x10000004,
095: 0x12000004, 0x10002004, 0x12002004, 0x10200004,
096: 0x12200004, 0x10202004, 0x12202004, 0x10000400,
097: 0x12000400, 0x10002400, 0x12002400, 0x10200400,
098: 0x12200400, 0x10202400, 0x12202400, 0x10000404,
099: 0x12000404, 0x10002404, 0x12002404, 0x10200404,
100: 0x12200404, 0x10202404, 0x12202404, },
101: {
102: /* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
103: 0x00000000, 0x00000001, 0x00040000, 0x00040001, 0x01000000,
104: 0x01000001, 0x01040000, 0x01040001, 0x00000002,
105: 0x00000003, 0x00040002, 0x00040003, 0x01000002,
106: 0x01000003, 0x01040002, 0x01040003, 0x00000200,
107: 0x00000201, 0x00040200, 0x00040201, 0x01000200,
108: 0x01000201, 0x01040200, 0x01040201, 0x00000202,
109: 0x00000203, 0x00040202, 0x00040203, 0x01000202,
110: 0x01000203, 0x01040202, 0x01040203, 0x08000000,
111: 0x08000001, 0x08040000, 0x08040001, 0x09000000,
112: 0x09000001, 0x09040000, 0x09040001, 0x08000002,
113: 0x08000003, 0x08040002, 0x08040003, 0x09000002,
114: 0x09000003, 0x09040002, 0x09040003, 0x08000200,
115: 0x08000201, 0x08040200, 0x08040201, 0x09000200,
116: 0x09000201, 0x09040200, 0x09040201, 0x08000202,
117: 0x08000203, 0x08040202, 0x08040203, 0x09000202,
118: 0x09000203, 0x09040202, 0x09040203, },
119: {
120: /* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
121: 0x00000000, 0x00100000, 0x00000100, 0x00100100, 0x00000008,
122: 0x00100008, 0x00000108, 0x00100108, 0x00001000,
123: 0x00101000, 0x00001100, 0x00101100, 0x00001008,
124: 0x00101008, 0x00001108, 0x00101108, 0x04000000,
125: 0x04100000, 0x04000100, 0x04100100, 0x04000008,
126: 0x04100008, 0x04000108, 0x04100108, 0x04001000,
127: 0x04101000, 0x04001100, 0x04101100, 0x04001008,
128: 0x04101008, 0x04001108, 0x04101108, 0x00020000,
129: 0x00120000, 0x00020100, 0x00120100, 0x00020008,
130: 0x00120008, 0x00020108, 0x00120108, 0x00021000,
131: 0x00121000, 0x00021100, 0x00121100, 0x00021008,
132: 0x00121008, 0x00021108, 0x00121108, 0x04020000,
133: 0x04120000, 0x04020100, 0x04120100, 0x04020008,
134: 0x04120008, 0x04020108, 0x04120108, 0x04021000,
135: 0x04121000, 0x04021100, 0x04121100, 0x04021008,
136: 0x04121008, 0x04021108, 0x04121108, },
137: {
138: /* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
139: 0x00000000, 0x10000000, 0x00010000, 0x10010000, 0x00000004,
140: 0x10000004, 0x00010004, 0x10010004, 0x20000000,
141: 0x30000000, 0x20010000, 0x30010000, 0x20000004,
142: 0x30000004, 0x20010004, 0x30010004, 0x00100000,
143: 0x10100000, 0x00110000, 0x10110000, 0x00100004,
144: 0x10100004, 0x00110004, 0x10110004, 0x20100000,
145: 0x30100000, 0x20110000, 0x30110000, 0x20100004,
146: 0x30100004, 0x20110004, 0x30110004, 0x00001000,
147: 0x10001000, 0x00011000, 0x10011000, 0x00001004,
148: 0x10001004, 0x00011004, 0x10011004, 0x20001000,
149: 0x30001000, 0x20011000, 0x30011000, 0x20001004,
150: 0x30001004, 0x20011004, 0x30011004, 0x00101000,
151: 0x10101000, 0x00111000, 0x10111000, 0x00101004,
152: 0x10101004, 0x00111004, 0x10111004, 0x20101000,
153: 0x30101000, 0x20111000, 0x30111000, 0x20101004,
154: 0x30101004, 0x20111004, 0x30111004, },
155: {
156: /* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
157: 0x00000000, 0x08000000, 0x00000008, 0x08000008, 0x00000400,
158: 0x08000400, 0x00000408, 0x08000408, 0x00020000,
159: 0x08020000, 0x00020008, 0x08020008, 0x00020400,
160: 0x08020400, 0x00020408, 0x08020408, 0x00000001,
161: 0x08000001, 0x00000009, 0x08000009, 0x00000401,
162: 0x08000401, 0x00000409, 0x08000409, 0x00020001,
163: 0x08020001, 0x00020009, 0x08020009, 0x00020401,
164: 0x08020401, 0x00020409, 0x08020409, 0x02000000,
165: 0x0A000000, 0x02000008, 0x0A000008, 0x02000400,
166: 0x0A000400, 0x02000408, 0x0A000408, 0x02020000,
167: 0x0A020000, 0x02020008, 0x0A020008, 0x02020400,
168: 0x0A020400, 0x02020408, 0x0A020408, 0x02000001,
169: 0x0A000001, 0x02000009, 0x0A000009, 0x02000401,
170: 0x0A000401, 0x02000409, 0x0A000409, 0x02020001,
171: 0x0A020001, 0x02020009, 0x0A020009, 0x02020401,
172: 0x0A020401, 0x02020409, 0x0A020409, },
173: {
174: /* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
175: 0x00000000, 0x00000100, 0x00080000, 0x00080100, 0x01000000,
176: 0x01000100, 0x01080000, 0x01080100, 0x00000010,
177: 0x00000110, 0x00080010, 0x00080110, 0x01000010,
178: 0x01000110, 0x01080010, 0x01080110, 0x00200000,
179: 0x00200100, 0x00280000, 0x00280100, 0x01200000,
180: 0x01200100, 0x01280000, 0x01280100, 0x00200010,
181: 0x00200110, 0x00280010, 0x00280110, 0x01200010,
182: 0x01200110, 0x01280010, 0x01280110, 0x00000200,
183: 0x00000300, 0x00080200, 0x00080300, 0x01000200,
184: 0x01000300, 0x01080200, 0x01080300, 0x00000210,
185: 0x00000310, 0x00080210, 0x00080310, 0x01000210,
186: 0x01000310, 0x01080210, 0x01080310, 0x00200200,
187: 0x00200300, 0x00280200, 0x00280300, 0x01200200,
188: 0x01200300, 0x01280200, 0x01280300, 0x00200210,
189: 0x00200310, 0x00280210, 0x00280310, 0x01200210,
190: 0x01200310, 0x01280210, 0x01280310, },
191: {
192: /* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
193: 0x00000000, 0x04000000, 0x00040000, 0x04040000, 0x00000002,
194: 0x04000002, 0x00040002, 0x04040002, 0x00002000,
195: 0x04002000, 0x00042000, 0x04042000, 0x00002002,
196: 0x04002002, 0x00042002, 0x04042002, 0x00000020,
197: 0x04000020, 0x00040020, 0x04040020, 0x00000022,
198: 0x04000022, 0x00040022, 0x04040022, 0x00002020,
199: 0x04002020, 0x00042020, 0x04042020, 0x00002022,
200: 0x04002022, 0x00042022, 0x04042022, 0x00000800,
201: 0x04000800, 0x00040800, 0x04040800, 0x00000802,
202: 0x04000802, 0x00040802, 0x04040802, 0x00002800,
203: 0x04002800, 0x00042800, 0x04042800, 0x00002802,
204: 0x04002802, 0x00042802, 0x04042802, 0x00000820,
205: 0x04000820, 0x00040820, 0x04040820, 0x00000822,
206: 0x04000822, 0x00040822, 0x04040822, 0x00002820,
207: 0x04002820, 0x00042820, 0x04042820, 0x00002822,
208: 0x04002822, 0x00042822, 0x04042822, }, };
209:
210: private static final int[][] SPtrans = {
211: {
212: /* nibble 0 */
213: 0x00820200, 0x00020000, 0x80800000, 0x80820200, 0x00800000,
214: 0x80020200, 0x80020000, 0x80800000, 0x80020200,
215: 0x00820200, 0x00820000, 0x80000200, 0x80800200,
216: 0x00800000, 0x00000000, 0x80020000, 0x00020000,
217: 0x80000000, 0x00800200, 0x00020200, 0x80820200,
218: 0x00820000, 0x80000200, 0x00800200, 0x80000000,
219: 0x00000200, 0x00020200, 0x80820000, 0x00000200,
220: 0x80800200, 0x80820000, 0x00000000, 0x00000000,
221: 0x80820200, 0x00800200, 0x80020000, 0x00820200,
222: 0x00020000, 0x80000200, 0x00800200, 0x80820000,
223: 0x00000200, 0x00020200, 0x80800000, 0x80020200,
224: 0x80000000, 0x80800000, 0x00820000, 0x80820200,
225: 0x00020200, 0x00820000, 0x80800200, 0x00800000,
226: 0x80000200, 0x80020000, 0x00000000, 0x00020000,
227: 0x00800000, 0x80800200, 0x00820200, 0x80000000,
228: 0x80820000, 0x00000200, 0x80020200, },
229: {
230: /* nibble 1 */
231: 0x10042004, 0x00000000, 0x00042000, 0x10040000, 0x10000004,
232: 0x00002004, 0x10002000, 0x00042000, 0x00002000,
233: 0x10040004, 0x00000004, 0x10002000, 0x00040004,
234: 0x10042000, 0x10040000, 0x00000004, 0x00040000,
235: 0x10002004, 0x10040004, 0x00002000, 0x00042004,
236: 0x10000000, 0x00000000, 0x00040004, 0x10002004,
237: 0x00042004, 0x10042000, 0x10000004, 0x10000000,
238: 0x00040000, 0x00002004, 0x10042004, 0x00040004,
239: 0x10042000, 0x10002000, 0x00042004, 0x10042004,
240: 0x00040004, 0x10000004, 0x00000000, 0x10000000,
241: 0x00002004, 0x00040000, 0x10040004, 0x00002000,
242: 0x10000000, 0x00042004, 0x10002004, 0x10042000,
243: 0x00002000, 0x00000000, 0x10000004, 0x00000004,
244: 0x10042004, 0x00042000, 0x10040000, 0x10040004,
245: 0x00040000, 0x00002004, 0x10002000, 0x10002004,
246: 0x00000004, 0x10040000, 0x00042000, },
247: {
248: /* nibble 2 */
249: 0x41000000, 0x01010040, 0x00000040, 0x41000040, 0x40010000,
250: 0x01000000, 0x41000040, 0x00010040, 0x01000040,
251: 0x00010000, 0x01010000, 0x40000000, 0x41010040,
252: 0x40000040, 0x40000000, 0x41010000, 0x00000000,
253: 0x40010000, 0x01010040, 0x00000040, 0x40000040,
254: 0x41010040, 0x00010000, 0x41000000, 0x41010000,
255: 0x01000040, 0x40010040, 0x01010000, 0x00010040,
256: 0x00000000, 0x01000000, 0x40010040, 0x01010040,
257: 0x00000040, 0x40000000, 0x00010000, 0x40000040,
258: 0x40010000, 0x01010000, 0x41000040, 0x00000000,
259: 0x01010040, 0x00010040, 0x41010000, 0x40010000,
260: 0x01000000, 0x41010040, 0x40000000, 0x40010040,
261: 0x41000000, 0x01000000, 0x41010040, 0x00010000,
262: 0x01000040, 0x41000040, 0x00010040, 0x01000040,
263: 0x00000000, 0x41010000, 0x40000040, 0x41000000,
264: 0x40010040, 0x00000040, 0x01010000, },
265: {
266: /* nibble 3 */
267: 0x00100402, 0x04000400, 0x00000002, 0x04100402, 0x00000000,
268: 0x04100000, 0x04000402, 0x00100002, 0x04100400,
269: 0x04000002, 0x04000000, 0x00000402, 0x04000002,
270: 0x00100402, 0x00100000, 0x04000000, 0x04100002,
271: 0x00100400, 0x00000400, 0x00000002, 0x00100400,
272: 0x04000402, 0x04100000, 0x00000400, 0x00000402,
273: 0x00000000, 0x00100002, 0x04100400, 0x04000400,
274: 0x04100002, 0x04100402, 0x00100000, 0x04100002,
275: 0x00000402, 0x00100000, 0x04000002, 0x00100400,
276: 0x04000400, 0x00000002, 0x04100000, 0x04000402,
277: 0x00000000, 0x00000400, 0x00100002, 0x00000000,
278: 0x04100002, 0x04100400, 0x00000400, 0x04000000,
279: 0x04100402, 0x00100402, 0x00100000, 0x04100402,
280: 0x00000002, 0x04000400, 0x00100402, 0x00100002,
281: 0x00100400, 0x04100000, 0x04000402, 0x00000402,
282: 0x04000000, 0x04000002, 0x04100400, },
283: {
284: /* nibble 4 */
285: 0x02000000, 0x00004000, 0x00000100, 0x02004108, 0x02004008,
286: 0x02000100, 0x00004108, 0x02004000, 0x00004000,
287: 0x00000008, 0x02000008, 0x00004100, 0x02000108,
288: 0x02004008, 0x02004100, 0x00000000, 0x00004100,
289: 0x02000000, 0x00004008, 0x00000108, 0x02000100,
290: 0x00004108, 0x00000000, 0x02000008, 0x00000008,
291: 0x02000108, 0x02004108, 0x00004008, 0x02004000,
292: 0x00000100, 0x00000108, 0x02004100, 0x02004100,
293: 0x02000108, 0x00004008, 0x02004000, 0x00004000,
294: 0x00000008, 0x02000008, 0x02000100, 0x02000000,
295: 0x00004100, 0x02004108, 0x00000000, 0x00004108,
296: 0x02000000, 0x00000100, 0x00004008, 0x02000108,
297: 0x00000100, 0x00000000, 0x02004108, 0x02004008,
298: 0x02004100, 0x00000108, 0x00004000, 0x00004100,
299: 0x02004008, 0x02000100, 0x00000108, 0x00000008,
300: 0x00004108, 0x02004000, 0x02000008, },
301: {
302: /* nibble 5 */
303: 0x20000010, 0x00080010, 0x00000000, 0x20080800, 0x00080010,
304: 0x00000800, 0x20000810, 0x00080000, 0x00000810,
305: 0x20080810, 0x00080800, 0x20000000, 0x20000800,
306: 0x20000010, 0x20080000, 0x00080810, 0x00080000,
307: 0x20000810, 0x20080010, 0x00000000, 0x00000800,
308: 0x00000010, 0x20080800, 0x20080010, 0x20080810,
309: 0x20080000, 0x20000000, 0x00000810, 0x00000010,
310: 0x00080800, 0x00080810, 0x20000800, 0x00000810,
311: 0x20000000, 0x20000800, 0x00080810, 0x20080800,
312: 0x00080010, 0x00000000, 0x20000800, 0x20000000,
313: 0x00000800, 0x20080010, 0x00080000, 0x00080010,
314: 0x20080810, 0x00080800, 0x00000010, 0x20080810,
315: 0x00080800, 0x00080000, 0x20000810, 0x20000010,
316: 0x20080000, 0x00080810, 0x00000000, 0x00000800,
317: 0x20000010, 0x20000810, 0x20080800, 0x20080000,
318: 0x00000810, 0x00000010, 0x20080010, },
319: {
320: /* nibble 6 */
321: 0x00001000, 0x00000080, 0x00400080, 0x00400001, 0x00401081,
322: 0x00001001, 0x00001080, 0x00000000, 0x00400000,
323: 0x00400081, 0x00000081, 0x00401000, 0x00000001,
324: 0x00401080, 0x00401000, 0x00000081, 0x00400081,
325: 0x00001000, 0x00001001, 0x00401081, 0x00000000,
326: 0x00400080, 0x00400001, 0x00001080, 0x00401001,
327: 0x00001081, 0x00401080, 0x00000001, 0x00001081,
328: 0x00401001, 0x00000080, 0x00400000, 0x00001081,
329: 0x00401000, 0x00401001, 0x00000081, 0x00001000,
330: 0x00000080, 0x00400000, 0x00401001, 0x00400081,
331: 0x00001081, 0x00001080, 0x00000000, 0x00000080,
332: 0x00400001, 0x00000001, 0x00400080, 0x00000000,
333: 0x00400081, 0x00400080, 0x00001080, 0x00000081,
334: 0x00001000, 0x00401081, 0x00400000, 0x00401080,
335: 0x00000001, 0x00001001, 0x00401081, 0x00400001,
336: 0x00401080, 0x00401000, 0x00001001, },
337: {
338: /* nibble 7 */
339: 0x08200020, 0x08208000, 0x00008020, 0x00000000, 0x08008000,
340: 0x00200020, 0x08200000, 0x08208020, 0x00000020,
341: 0x08000000, 0x00208000, 0x00008020, 0x00208020,
342: 0x08008020, 0x08000020, 0x08200000, 0x00008000,
343: 0x00208020, 0x00200020, 0x08008000, 0x08208020,
344: 0x08000020, 0x00000000, 0x00208000, 0x08000000,
345: 0x00200000, 0x08008020, 0x08200020, 0x00200000,
346: 0x00008000, 0x08208000, 0x00000020, 0x00200000,
347: 0x00008000, 0x08000020, 0x08208020, 0x00008020,
348: 0x08000000, 0x00000000, 0x00208000, 0x08200020,
349: 0x08008020, 0x08008000, 0x00200020, 0x08208000,
350: 0x00000020, 0x00200020, 0x08008000, 0x08208020,
351: 0x00200000, 0x08200000, 0x08000020, 0x00208000,
352: 0x00008020, 0x08008020, 0x08200000, 0x00000020,
353: 0x08208000, 0x00208020, 0x00000000, 0x08000000,
354: 0x08200020, 0x00008000, 0x00208020 } };
355:
356: private static final int[] cov_2char = { 0x2E, 0x2F, 0x30, 0x31,
357: 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x41, 0x42,
358: 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C,
359: 0x4D, 0x4E, 0x4F, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56,
360: 0x57, 0x58, 0x59, 0x5A, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
361: 0x67, 0x68, 0x69, 0x6A, 0x6B, 0x6C, 0x6D, 0x6E, 0x6F, 0x70,
362: 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7A };
363:
364: private static final int byteToUnsigned(byte b) {
365: int value = b;
366:
367: return (value >= 0 ? value : value + 256);
368: }
369:
370: private static int fourBytesToInt(byte[] b, int offset) {
371: int value;
372:
373: value = byteToUnsigned(b[offset++]);
374: value |= (byteToUnsigned(b[offset++]) << 8);
375: value |= (byteToUnsigned(b[offset++]) << 16);
376: value |= (byteToUnsigned(b[offset++]) << 24);
377:
378: return (value);
379: }
380:
381: private static final void intToFourBytes(int iValue, byte[] b,
382: int offset) {
383: b[offset++] = (byte) ((iValue) & 0xff);
384: b[offset++] = (byte) ((iValue >>> 8) & 0xff);
385: b[offset++] = (byte) ((iValue >>> 16) & 0xff);
386: b[offset++] = (byte) ((iValue >>> 24) & 0xff);
387: }
388:
389: private static final void PERM_OP(int a, int b, int n, int m,
390: int[] results) {
391: int t;
392:
393: t = ((a >>> n) ^ b) & m;
394: a ^= t << n;
395: b ^= t;
396:
397: results[0] = a;
398: results[1] = b;
399: }
400:
401: private static final int HPERM_OP(int a, int n, int m) {
402: int t;
403:
404: t = ((a << (16 - n)) ^ a) & m;
405: a = a ^ t ^ (t >>> (16 - n));
406:
407: return (a);
408: }
409:
410: private static int[] des_set_key(byte[] key) {
411: int[] schedule = new int[ITERATIONS * 2];
412:
413: int c = fourBytesToInt(key, 0);
414: int d = fourBytesToInt(key, 4);
415:
416: int[] results = new int[2];
417:
418: PERM_OP(d, c, 4, 0x0f0f0f0f, results);
419: d = results[0];
420: c = results[1];
421:
422: c = HPERM_OP(c, -2, 0xcccc0000);
423: d = HPERM_OP(d, -2, 0xcccc0000);
424:
425: PERM_OP(d, c, 1, 0x55555555, results);
426: d = results[0];
427: c = results[1];
428:
429: PERM_OP(c, d, 8, 0x00ff00ff, results);
430: c = results[0];
431: d = results[1];
432:
433: PERM_OP(d, c, 1, 0x55555555, results);
434: d = results[0];
435: c = results[1];
436:
437: d = (((d & 0x000000ff) << 16) | (d & 0x0000ff00)
438: | ((d & 0x00ff0000) >>> 16) | ((c & 0xf0000000) >>> 4));
439: c &= 0x0fffffff;
440:
441: int s, t;
442: int j = 0;
443:
444: for (int i = 0; i < ITERATIONS; i++) {
445: if (shifts2[i]) {
446: c = (c >>> 2) | (c << 26);
447: d = (d >>> 2) | (d << 26);
448: } else {
449: c = (c >>> 1) | (c << 27);
450: d = (d >>> 1) | (d << 27);
451: }
452:
453: c &= 0x0fffffff;
454: d &= 0x0fffffff;
455:
456: s = skb[0][(c) & 0x3f]
457: | skb[1][((c >>> 6) & 0x03) | ((c >>> 7) & 0x3c)]
458: | skb[2][((c >>> 13) & 0x0f) | ((c >>> 14) & 0x30)]
459: | skb[3][((c >>> 20) & 0x01) | ((c >>> 21) & 0x06)
460: | ((c >>> 22) & 0x38)];
461:
462: t = skb[4][(d) & 0x3f]
463: | skb[5][((d >>> 7) & 0x03) | ((d >>> 8) & 0x3c)]
464: | skb[6][(d >>> 15) & 0x3f]
465: | skb[7][((d >>> 21) & 0x0f) | ((d >>> 22) & 0x30)];
466:
467: schedule[j++] = ((t << 16) | (s & 0x0000ffff)) & 0xffffffff;
468: s = ((s >>> 16) | (t & 0xffff0000));
469:
470: s = (s << 4) | (s >>> 28);
471: schedule[j++] = s & 0xffffffff;
472: }
473: return (schedule);
474: }
475:
476: private static final int D_ENCRYPT(int L, int R, int S, int E0,
477: int E1, int[] s) {
478: int t, u, v;
479:
480: v = R ^ (R >>> 16);
481: u = v & E0;
482: v = v & E1;
483: u = (u ^ (u << 16)) ^ R ^ s[S];
484: t = (v ^ (v << 16)) ^ R ^ s[S + 1];
485: t = (t >>> 4) | (t << 28);
486:
487: L ^= SPtrans[1][(t) & 0x3f] | SPtrans[3][(t >>> 8) & 0x3f]
488: | SPtrans[5][(t >>> 16) & 0x3f]
489: | SPtrans[7][(t >>> 24) & 0x3f]
490: | SPtrans[0][(u) & 0x3f] | SPtrans[2][(u >>> 8) & 0x3f]
491: | SPtrans[4][(u >>> 16) & 0x3f]
492: | SPtrans[6][(u >>> 24) & 0x3f];
493:
494: return (L);
495: }
496:
497: private static final int[] body(int[] schedule, int Eswap0,
498: int Eswap1) {
499: int left = 0;
500: int right = 0;
501: int t = 0;
502:
503: for (int j = 0; j < 25; j++) {
504: for (int i = 0; i < ITERATIONS * 2; i += 4) {
505: left = D_ENCRYPT(left, right, i, Eswap0, Eswap1,
506: schedule);
507: right = D_ENCRYPT(right, left, i + 2, Eswap0, Eswap1,
508: schedule);
509: }
510: t = left;
511: left = right;
512: right = t;
513: }
514:
515: t = right;
516:
517: right = (left >>> 1) | (left << 31);
518: left = (t >>> 1) | (t << 31);
519:
520: left &= 0xffffffff;
521: right &= 0xffffffff;
522:
523: int[] results = new int[2];
524:
525: PERM_OP(right, left, 1, 0x55555555, results);
526: right = results[0];
527: left = results[1];
528:
529: PERM_OP(left, right, 8, 0x00ff00ff, results);
530: left = results[0];
531: right = results[1];
532:
533: PERM_OP(right, left, 2, 0x33333333, results);
534: right = results[0];
535: left = results[1];
536:
537: PERM_OP(left, right, 16, 0x0000ffff, results);
538: left = results[0];
539: right = results[1];
540:
541: PERM_OP(right, left, 4, 0x0f0f0f0f, results);
542: right = results[0];
543: left = results[1];
544:
545: int[] out = new int[2];
546:
547: out[0] = left;
548: out[1] = right;
549:
550: return (out);
551: }
552:
553: /**
554: * <P>Encrypt a password given the cleartext password and a "salt".</P>
555: * @param salt A two-character string representing the salt used to
556: * iterate the encryption engine in lots of different ways. If you
557: * are generating a new encryption then this value should be
558: * randomised.
559: * @param original The password to be encrypted.
560: * @return A string consisting of the 2-character salt followed by the
561: * encrypted password.
562: */
563: public static final String crypt(String salt, String original) {
564: while (salt.length() < 2)
565: salt += "A";
566:
567: StringBuffer buffer = new StringBuffer(" ");
568:
569: char charZero = salt.charAt(0);
570: char charOne = salt.charAt(1);
571:
572: buffer.setCharAt(0, charZero);
573: buffer.setCharAt(1, charOne);
574:
575: int Eswap0 = con_salt[charZero];
576: int Eswap1 = con_salt[charOne] << 4;
577:
578: byte[] key = new byte[8];
579:
580: for (int i = 0; i < key.length; i++)
581: key[i] = (byte) 0;
582:
583: for (int i = 0; i < key.length && i < original.length(); i++) {
584: int iChar = original.charAt(i);
585:
586: key[i] = (byte) (iChar << 1);
587: }
588:
589: int[] schedule = des_set_key(key);
590: int[] out = body(schedule, Eswap0, Eswap1);
591:
592: byte[] b = new byte[9];
593:
594: intToFourBytes(out[0], b, 0);
595: intToFourBytes(out[1], b, 4);
596: b[8] = 0;
597:
598: for (int i = 2, y = 0, u = 0x80; i < 13; i++) {
599: for (int j = 0, c = 0; j < 6; j++) {
600: c <<= 1;
601:
602: if ((b[y] & u) != 0)
603: c |= 1;
604:
605: u >>>= 1;
606:
607: if (u == 0) {
608: y++;
609: u = 0x80;
610: }
611: buffer.setCharAt(i, (char) cov_2char[c]);
612: }
613: }
614: return (buffer.toString());
615: }
616:
617: /**
618: * <P>Encrypt a password given the cleartext password. This method
619: * generates a random salt using the 'java.util.Random' class.</P>
620: * @param original The password to be encrypted.
621: * @return A string consisting of the 2-character salt followed by the
622: * encrypted password.
623: */
624: public static final String crypt(String original) {
625: java.util.Random randomGenerator = new java.util.Random();
626: int numSaltChars = saltChars.length;
627: String salt;
628:
629: salt = (new StringBuffer()).append(
630: saltChars[Math.abs(randomGenerator.nextInt())
631: % numSaltChars]).append(
632: saltChars[Math.abs(randomGenerator.nextInt())
633: % numSaltChars]).toString();
634:
635: return crypt(salt, original);
636: }
637:
638: /**
639: * <P>Check that <I>enteredPassword</I> encrypts to
640: * <I>encryptedPassword</I>.</P>
641: * @param encryptedPassword The <I>encryptedPassword</I>. The first
642: * two characters are assumed to be the salt. This string would
643: * be the same as one found in a Unix <U>/etc/passwd</U> file.
644: * @param enteredPassword The password as entered by the user (or
645: * otherwise aquired).
646: * @return <B>true</B> if the password should be considered correct.
647: */
648: public final static boolean matches(String encryptedPassword,
649: String enteredPassword) {
650: String salt = encryptedPassword.substring(0, 3);
651: String newCrypt = crypt(salt, enteredPassword);
652:
653: return newCrypt.equals(encryptedPassword);
654: }
655: }
|