summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--acconfig.h1
-rw-r--r--configure.in2
-rw-r--r--lib/Makefile.am5
-rw-r--r--lib/cert_b64.c5
-rw-r--r--lib/crypt.c52
-rw-r--r--lib/crypt_bcrypt.c831
-rw-r--r--lib/defines.h9
-rw-r--r--lib/gnutls.h8
-rw-r--r--lib/gnutls_cipher.c5
-rw-r--r--lib/gnutls_cipher_int.h1
-rw-r--r--lib/gnutls_handshake.c13
-rw-r--r--lib/gnutls_hash_int.h2
-rw-r--r--lib/gnutls_int.h3
-rw-r--r--lib/gnutls_random.c78
-rw-r--r--lib/gnutls_random.h12
-rw-r--r--src/Makefile.am6
-rw-r--r--src/crypt.c84
-rw-r--r--src/crypt.gaa13
-rw-r--r--src/gaa.h35
-rw-r--r--src/gaaout.c723
20 files changed, 1868 insertions, 20 deletions
diff --git a/acconfig.h b/acconfig.h
index 3d913e433f..cc3a33a79d 100644
--- a/acconfig.h
+++ b/acconfig.h
@@ -18,4 +18,5 @@
#undef LT_AGE
#undef USE_DMALLOC
+#undef USE_GCRYPT
\ No newline at end of file
diff --git a/configure.in b/configure.in
index 69a7bab7b4..606639ee4d 100644
--- a/configure.in
+++ b/configure.in
@@ -30,6 +30,8 @@ AM_PATH_GCRYPT(1.1.1a,,
*** ftp://ftp.gnupg.org/pub/gcrypt/alpha/gnupg/
***
]]))
+dnl Can't disable for now
+AC_DEFINE(USE_GCRYPT)
AC_SUBST(GNUTLS_MAJOR_VERSION)
AC_SUBST(GNUTLS_MINOR_VERSION)
diff --git a/lib/Makefile.am b/lib/Makefile.am
index f808633f39..16f6a20fe2 100644
--- a/lib/Makefile.am
+++ b/lib/Makefile.am
@@ -5,12 +5,13 @@ EXTRA_DIST = debug.h gnutls_compress.h defines.h gnutls_plaintext.h \
gnutls_kx.h gnutls_hash_int.h gnutls_cipher_int.h gnutls_db.h \
gnutls_compress_int.h gnutls_session.h gnutls_priority.h gnutls_auth.h \
auth_anon.h auth_dhe_dss.h gnutls_extensions.h ext_srp.h \
- gnutls_auth_int.h
+ gnutls_auth_int.h crypt_bcrypt.h gnutls_random.h
lib_LTLIBRARIES = libgnutls.la
libgnutls_la_SOURCES = gnutls.c gnutls_compress.c debug.c gnutls_plaintext.c \
gnutls_cipher.c gnutls_buffers.c gnutls_handshake.c gnutls_num.c \
gnutls_errors.c gnutls_algorithms.c gnutls_dh.c gnutls_kx.c \
gnutls_priority.c gnutls_hash_int.c gnutls_cipher_int.c \
gnutls_compress_int.c gnutls_session.c gnutls_db.c cert_b64.c \
- auth_anon.c auth_dhe_dss.c gnutls_extensions.c ext_srp.c gnutls_auth.c
+ auth_anon.c auth_dhe_dss.c gnutls_extensions.c ext_srp.c gnutls_auth.c \
+ crypt_bcrypt.c crypt.c gnutls_random.c
libgnutls_la_LDFLAGS = -version-info $(LT_CURRENT):$(LT_REVISION):$(LT_AGE)
diff --git a/lib/cert_b64.c b/lib/cert_b64.c
index 1dda9655d7..098f10ba85 100644
--- a/lib/cert_b64.c
+++ b/lib/cert_b64.c
@@ -49,7 +49,7 @@ const static uint8 asciitable[128] = {
0xff, 0xff
};
-inline static int encode(uint8 * result, uint8 * data, int left)
+inline static int encode(uint8 * result, const uint8 * data, int left)
{
int data_len;
@@ -97,7 +97,7 @@ inline static int encode(uint8 * result, uint8 * data, int left)
* result should be 3 bytes
*/
#define TOASCII(c) (c<127 ? asciitable[c] : 0xff)
-inline static int decode(uint8 * result, uint8 * data)
+inline static int decode(uint8 * result, const uint8 * data)
{
uint8 a1, a2;
int ret = 3;
@@ -360,6 +360,7 @@ int _gnutls_fbase64_decode(char *msg, uint8 * data, int data_size,
return ret;
}
+
#ifdef B64_TEST
int main()
{
diff --git a/lib/crypt.c b/lib/crypt.c
new file mode 100644
index 0000000000..054f8a56af
--- /dev/null
+++ b/lib/crypt.c
@@ -0,0 +1,52 @@
+/*
+ * Copyright (C) 2000,2001 Nikos Mavroyanopoulos
+ *
+ * This file is part of GNUTLS.
+ *
+ * GNUTLS is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * GNUTLS is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+ */
+
+#include "defines.h"
+#include "crypt_bcrypt.h"
+#include "gnutls_random.h"
+
+enum crypt_algo { MD5_CRYPT, BLOWFISH_CRYPT };
+typedef enum crypt_algo crypt_algo;
+
+char * gnutls_crypt(const char* username, const char *passwd, crypt_algo algo) {
+
+ switch(algo) {
+ case MD5_CRYPT:
+ break;
+ case BLOWFISH_CRYPT: /* bcrypt */
+ return crypt_bcrypt_wrapper(passwd, 6);
+ break;
+ }
+ return NULL;
+}
+
+int gnutls_crypt_vrfy(const char* username, const char *passwd, char* salt) {
+ char* cr;
+
+ switch(salt[0]) {
+ case '$':
+ switch(salt[1]) {
+ case '2':
+ cr = crypt_bcrypt(passwd, salt);
+ if (strncmp(cr, salt, strlen(cr))==0) return 0;
+ }
+ }
+ return 1;
+}
diff --git a/lib/crypt_bcrypt.c b/lib/crypt_bcrypt.c
new file mode 100644
index 0000000000..1b666d1b53
--- /dev/null
+++ b/lib/crypt_bcrypt.c
@@ -0,0 +1,831 @@
+/*
+ * Copyright (C) 2000,2001 Nikos Mavroyanopoulos
+ *
+ * This file is part of GNUTLS.
+ *
+ * GNUTLS is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * GNUTLS is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+ */
+
+/*
+ * This is a modified version of the blowfish algorithm.
+ * It is an implementation of the bcrypt algorithm as described
+ * in a usenix paper by Niels Provos and David Mazieres.
+ * This is the encoding algorithm used in OpenBSD for passwords.
+ * (includes a modified version of b64.c)
+ */
+
+#include "defines.h"
+#include "crypt_bcrypt.h"
+#include "gnutls_random.h"
+
+const static uint8 b64table[64] =
+ "./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
+const static uint8 asciitable[128] = {
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0x00, 0x01,
+ 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b,
+ 0x3c, 0x3d, 0x3e, 0x3f, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0x02,
+ 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
+ 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e,
+ 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14,
+ 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a,
+ 0x1b, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0x1c, 0x1d, 0x1e, 0x1f, 0x20,
+ 0x21, 0x22, 0x23, 0x24, 0x25, 0x26,
+ 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c,
+ 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32,
+ 0x33, 0x34, 0x35, 0xff, 0xff, 0xff,
+ 0xff, 0xff
+};
+
+inline static int encode(uint8 * result, const uint8 * data, int left)
+{
+
+ int data_len;
+
+ if (left > 3)
+ data_len = 3;
+ else
+ data_len = left;
+
+ switch (data_len) {
+ case 3:
+ result[0] = b64table[(data[0] >> 2)];
+ result[1] =
+ b64table[(((((data[0] & 0x03) & 0xff) << 4) & 0xff) |
+ (data[1] >> 4))];
+ result[2] =
+ b64table[((((data[1] & 0x0f) << 2) & 0xff) |
+ (data[2] >> 6))];
+ result[3] = b64table[(((data[2] << 2) & 0xff) >> 2)];
+ break;
+ case 2:
+ result[0] = b64table[(data[0] >> 2)];
+ result[1] =
+ b64table[(((((data[0] & 0x03) & 0xff) << 4) & 0xff) |
+ (data[1] >> 4))];
+ result[2] = b64table[(((data[1] << 4) & 0xff) >> 2)];
+ result[3] = '\0';
+ break;
+ case 1:
+ result[0] = b64table[(data[0] >> 2)];
+ result[1] =
+ b64table[(((((data[0] & 0x03) & 0xff) << 4) & 0xff))];
+ result[2] = '\0';
+ result[3] = '\0';
+ break;
+ default:
+ return -1;
+ }
+
+ return 4;
+
+}
+
+/* data must be 4 bytes
+ * result should be 3 bytes
+ */
+#define TOASCII(c) (c<127 ? asciitable[c] : 0xff)
+inline static int decode(uint8 * result, const uint8 * data)
+{
+ uint8 a1, a2;
+ int ret = 3;
+
+ a1 = TOASCII(data[0]);
+ a2 = TOASCII(data[1]);
+ if (a1 == 0xff || a2 == 0xff)
+ return -1;
+ result[0] = ((a1 << 2) & 0xff) | ((a2 >> 4) & 0xff);
+
+ a1 = a2;
+ a2 = TOASCII(data[2]);
+ if (a2 == 0xff)
+ return -1;
+ result[1] = ((a1 << 4) & 0xff) | ((a2 >> 2) & 0xff);
+
+ a1 = a2;
+ a2 = TOASCII(data[3]);
+ if (a2 == 0xff)
+ return -1;
+ result[2] = ((a1 << 6) & 0xff) | (a2 & 0xff);
+
+ if (data[3] == '=')
+ ret--;
+ if (data[4] == '=')
+ ret--;
+
+ return ret;
+}
+
+
+/* encodes data and puts the result into result (result should have 4/3 of the original size)
+ * The result_size is the return value
+ */
+static int _crypt_encode_base64(uint8 * result, const uint8 * data,
+ const uint16 data_size)
+{
+ int i, ret, tmp, j;
+ uint8 tmpres[4];
+
+ ret = data_size % 3;
+ if (ret != 0)
+ ret = 4;
+ else
+ ret = 0;
+
+ ret += (data_size / 3) * 4;
+
+ if ((result) == NULL)
+ return ret;
+
+ for (i = j = 0; i < data_size; i += 3, j += 4) {
+ tmp = encode(tmpres, &data[i], data_size - i);
+ if (tmp == -1)
+ return -1;
+ memcpy(&result[j], tmpres, tmp);
+ }
+
+ return ret;
+}
+
+
+/* decodes data and puts the result into result
+ * The result_size is the return value
+ */
+static int _crypt_decode_base64(uint8 * result, const uint16 result_size,
+ const uint8 * data)
+{
+ int i, ret, tmp, j;
+ uint8 tmpres[3];
+
+ ret = result_size;
+
+ if (result == NULL)
+ return ret;
+
+ for (i = j = 0; j < result_size; i += 4) {
+ tmp = decode(tmpres, &data[i]);
+ if (tmp < 0)
+ return tmp;
+ memcpy(&result[j], tmpres, tmp);
+ if (tmp < 3)
+ ret -= (3 - tmp);
+ j += 3;
+ }
+ return ret;
+}
+
+
+
+#define rotl(x,n) (((x) << ((uint32)(n))) | ((x) >> (32 - (uint32)(n))))
+#define rotr(x,n) (((x) >> ((uint32)(n))) | ((x) << (32 - (uint32)(n))))
+#define byteswap(x) ((rotl(x, 8) & 0x00ff00ff) | (rotr(x, 8) & 0xff00ff00))
+
+typedef struct {
+ uint32 S[4][256], P[18];
+} blf_ctx;
+
+#define BF_N 16
+
+#define F(bc, x) ( ((bc->S[0][(x >> 24) & 0xff] + bc->S[1][(x >> 16) & 0xff]) ^ bc->S[2][(x >> 8) & 0xff]) + bc->S[3][x & 0xff] )
+
+/* x should be a 64 bit integer */
+static void _blf_encrypt(blf_ctx * c, uint8 * x)
+{
+ uint32 Xl;
+ uint32 Xr, temp;
+ short i;
+
+ Xl = x[0] << 24 | x[1] << 16 | x[2] << 8 | x[3];
+ Xr = x[4] << 24 | x[5] << 16 | x[6] << 8 | x[7];
+
+ for (i = 0; i < BF_N; ++i) {
+ Xl ^= c->P[i];
+ Xr ^= F(c, Xl);
+
+ temp = Xl;
+ Xl = Xr;
+ Xr = temp;
+ }
+
+ temp = Xl;
+ Xl = Xr;
+ Xr = temp;
+
+ Xr ^= c->P[BF_N];
+ Xl ^= c->P[BF_N + 1];
+
+ x[0] = (Xl >> 24) & 0xff;
+ x[1] = (Xl >> 16) & 0xff;
+ x[2] = (Xl >> 8) & 0xff;
+ x[3] = (Xl ) & 0xff;
+ x[4] = (Xr >> 24) & 0xff;
+ x[5] = (Xr >> 16) & 0xff;
+ x[6] = (Xr >> 8) & 0xff;
+ x[7] = (Xr ) & 0xff;
+}
+
+/* x should be a 64 bit integer */
+static void enblf_noswap(blf_ctx * c, uint32 * x)
+{ /* Used internally */
+ uint32 Xl;
+ uint32 Xr, temp;
+ short i;
+
+ Xl = x[0];
+ Xr = x[1];
+
+ for (i = 0; i < BF_N; ++i) {
+ Xl ^= c->P[i];
+ Xr ^= F(c, Xl);
+
+ temp = Xl;
+ Xl = Xr;
+ Xr = temp;
+ }
+
+ temp = Xl;
+ Xl = Xr;
+ Xr = temp;
+
+ Xr ^= c->P[BF_N];
+ Xl ^= c->P[BF_N + 1];
+
+ x[0] = Xl;
+ x[1] = Xr;
+}
+
+
+/* salt is an 128 bit integer */
+static short initialize_blowfish(blf_ctx * c)
+{
+ short i;
+
+ uint32 ks0[] =
+ {
+ 0xd1310ba6UL, 0x98dfb5acUL, 0x2ffd72dbUL, 0xd01adfb7UL,
+ 0xb8e1afedUL, 0x6a267e96UL,
+ 0xba7c9045UL, 0xf12c7f99UL, 0x24a19947UL, 0xb3916cf7UL,
+ 0x0801f2e2UL, 0x858efc16UL,
+ 0x636920d8UL, 0x71574e69UL, 0xa458fea3UL, 0xf4933d7eUL,
+ 0x0d95748fUL, 0x728eb658UL,
+ 0x718bcd58UL, 0x82154aeeUL, 0x7b54a41dUL, 0xc25a59b5UL,
+ 0x9c30d539UL, 0x2af26013UL,
+ 0xc5d1b023UL, 0x286085f0UL, 0xca417918UL, 0xb8db38efUL,
+ 0x8e79dcb0UL, 0x603a180eUL,
+ 0x6c9e0e8bUL, 0xb01e8a3eUL, 0xd71577c1UL, 0xbd314b27UL,
+ 0x78af2fdaUL, 0x55605c60UL,
+ 0xe65525f3UL, 0xaa55ab94UL, 0x57489862UL, 0x63e81440UL,
+ 0x55ca396aUL, 0x2aab10b6UL,
+ 0xb4cc5c34UL, 0x1141e8ceUL, 0xa15486afUL, 0x7c72e993UL,
+ 0xb3ee1411UL, 0x636fbc2aUL,
+ 0x2ba9c55dUL, 0x741831f6UL, 0xce5c3e16UL, 0x9b87931eUL,
+ 0xafd6ba33UL, 0x6c24cf5cUL,
+ 0x7a325381UL, 0x28958677UL, 0x3b8f4898UL, 0x6b4bb9afUL,
+ 0xc4bfe81bUL, 0x66282193UL,
+ 0x61d809ccUL, 0xfb21a991UL, 0x487cac60UL, 0x5dec8032UL,
+ 0xef845d5dUL, 0xe98575b1UL,
+ 0xdc262302UL, 0xeb651b88UL, 0x23893e81UL, 0xd396acc5UL,
+ 0x0f6d6ff3UL, 0x83f44239UL,
+ 0x2e0b4482UL, 0xa4842004UL, 0x69c8f04aUL, 0x9e1f9b5eUL,
+ 0x21c66842UL, 0xf6e96c9aUL,
+ 0x670c9c61UL, 0xabd388f0UL, 0x6a51a0d2UL, 0xd8542f68UL,
+ 0x960fa728UL, 0xab5133a3UL,
+ 0x6eef0b6cUL, 0x137a3be4UL, 0xba3bf050UL, 0x7efb2a98UL,
+ 0xa1f1651dUL, 0x39af0176UL,
+ 0x66ca593eUL, 0x82430e88UL, 0x8cee8619UL, 0x456f9fb4UL,
+ 0x7d84a5c3UL, 0x3b8b5ebeUL,
+ 0xe06f75d8UL, 0x85c12073UL, 0x401a449fUL, 0x56c16aa6UL,
+ 0x4ed3aa62UL, 0x363f7706UL,
+ 0x1bfedf72UL, 0x429b023dUL, 0x37d0d724UL, 0xd00a1248UL,
+ 0xdb0fead3UL, 0x49f1c09bUL,
+ 0x075372c9UL, 0x80991b7bUL, 0x25d479d8UL, 0xf6e8def7UL,
+ 0xe3fe501aUL, 0xb6794c3bUL,
+ 0x976ce0bdUL, 0x04c006baUL, 0xc1a94fb6UL, 0x409f60c4UL,
+ 0x5e5c9ec2UL, 0x196a2463UL,
+ 0x68fb6fafUL, 0x3e6c53b5UL, 0x1339b2ebUL, 0x3b52ec6fUL,
+ 0x6dfc511fUL, 0x9b30952cUL,
+ 0xcc814544UL, 0xaf5ebd09UL, 0xbee3d004UL, 0xde334afdUL,
+ 0x660f2807UL, 0x192e4bb3UL,
+ 0xc0cba857UL, 0x45c8740fUL, 0xd20b5f39UL, 0xb9d3fbdbUL,
+ 0x5579c0bdUL, 0x1a60320aUL,
+ 0xd6a100c6UL, 0x402c7279UL, 0x679f25feUL, 0xfb1fa3ccUL,
+ 0x8ea5e9f8UL, 0xdb3222f8UL,
+ 0x3c7516dfUL, 0xfd616b15UL, 0x2f501ec8UL, 0xad0552abUL,
+ 0x323db5faUL, 0xfd238760UL,
+ 0x53317b48UL, 0x3e00df82UL, 0x9e5c57bbUL, 0xca6f8ca0UL,
+ 0x1a87562eUL, 0xdf1769dbUL,
+ 0xd542a8f6UL, 0x287effc3UL, 0xac6732c6UL, 0x8c4f5573UL,
+ 0x695b27b0UL, 0xbbca58c8UL,
+ 0xe1ffa35dUL, 0xb8f011a0UL, 0x10fa3d98UL, 0xfd2183b8UL,
+ 0x4afcb56cUL, 0x2dd1d35bUL,
+ 0x9a53e479UL, 0xb6f84565UL, 0xd28e49bcUL, 0x4bfb9790UL,
+ 0xe1ddf2daUL, 0xa4cb7e33UL,
+ 0x62fb1341UL, 0xcee4c6e8UL, 0xef20cadaUL, 0x36774c01UL,
+ 0xd07e9efeUL, 0x2bf11fb4UL,
+ 0x95dbda4dUL, 0xae909198UL, 0xeaad8e71UL, 0x6b93d5a0UL,
+ 0xd08ed1d0UL, 0xafc725e0UL,
+ 0x8e3c5b2fUL, 0x8e7594b7UL, 0x8ff6e2fbUL, 0xf2122b64UL,
+ 0x8888b812UL, 0x900df01cUL,
+ 0x4fad5ea0UL, 0x688fc31cUL, 0xd1cff191UL, 0xb3a8c1adUL,
+ 0x2f2f2218UL, 0xbe0e1777UL,
+ 0xea752dfeUL, 0x8b021fa1UL, 0xe5a0cc0fUL, 0xb56f74e8UL,
+ 0x18acf3d6UL, 0xce89e299UL,
+ 0xb4a84fe0UL, 0xfd13e0b7UL, 0x7cc43b81UL, 0xd2ada8d9UL,
+ 0x165fa266UL, 0x80957705UL,
+ 0x93cc7314UL, 0x211a1477UL, 0xe6ad2065UL, 0x77b5fa86UL,
+ 0xc75442f5UL, 0xfb9d35cfUL,
+ 0xebcdaf0cUL, 0x7b3e89a0UL, 0xd6411bd3UL, 0xae1e7e49UL,
+ 0x00250e2dUL, 0x2071b35eUL,
+ 0x226800bbUL, 0x57b8e0afUL, 0x2464369bUL, 0xf009b91eUL,
+ 0x5563911dUL, 0x59dfa6aaUL,
+ 0x78c14389UL, 0xd95a537fUL, 0x207d5ba2UL, 0x02e5b9c5UL,
+ 0x83260376UL, 0x6295cfa9UL,
+ 0x11c81968UL, 0x4e734a41UL, 0xb3472dcaUL, 0x7b14a94aUL,
+ 0x1b510052UL, 0x9a532915UL,
+ 0xd60f573fUL, 0xbc9bc6e4UL, 0x2b60a476UL, 0x81e67400UL,
+ 0x08ba6fb5UL, 0x571be91fUL,
+ 0xf296ec6bUL, 0x2a0dd915UL, 0xb6636521UL, 0xe7b9f9b6UL,
+ 0xff34052eUL, 0xc5855664UL,
+ 0x53b02d5dUL, 0xa99f8fa1UL, 0x08ba4799UL, 0x6e85076aUL
+ };
+
+ uint32 ks1[] =
+ {
+ 0x4b7a70e9UL, 0xb5b32944UL, 0xdb75092eUL, 0xc4192623UL,
+ 0xad6ea6b0UL, 0x49a7df7dUL,
+ 0x9cee60b8UL, 0x8fedb266UL, 0xecaa8c71UL, 0x699a17ffUL,
+ 0x5664526cUL, 0xc2b19ee1UL,
+ 0x193602a5UL, 0x75094c29UL, 0xa0591340UL, 0xe4183a3eUL,
+ 0x3f54989aUL, 0x5b429d65UL,
+ 0x6b8fe4d6UL, 0x99f73fd6UL, 0xa1d29c07UL, 0xefe830f5UL,
+ 0x4d2d38e6UL, 0xf0255dc1UL,
+ 0x4cdd2086UL, 0x8470eb26UL, 0x6382e9c6UL, 0x021ecc5eUL,
+ 0x09686b3fUL, 0x3ebaefc9UL,
+ 0x3c971814UL, 0x6b6a70a1UL, 0x687f3584UL, 0x52a0e286UL,
+ 0xb79c5305UL, 0xaa500737UL,
+ 0x3e07841cUL, 0x7fdeae5cUL, 0x8e7d44ecUL, 0x5716f2b8UL,
+ 0xb03ada37UL, 0xf0500c0dUL,
+ 0xf01c1f04UL, 0x0200b3ffUL, 0xae0cf51aUL, 0x3cb574b2UL,
+ 0x25837a58UL, 0xdc0921bdUL,
+ 0xd19113f9UL, 0x7ca92ff6UL, 0x94324773UL, 0x22f54701UL,
+ 0x3ae5e581UL, 0x37c2dadcUL,
+ 0xc8b57634UL, 0x9af3dda7UL, 0xa9446146UL, 0x0fd0030eUL,
+ 0xecc8c73eUL, 0xa4751e41UL,
+ 0xe238cd99UL, 0x3bea0e2fUL, 0x3280bba1UL, 0x183eb331UL,
+ 0x4e548b38UL, 0x4f6db908UL,
+ 0x6f420d03UL, 0xf60a04bfUL, 0x2cb81290UL, 0x24977c79UL,
+ 0x5679b072UL, 0xbcaf89afUL,
+ 0xde9a771fUL, 0xd9930810UL, 0xb38bae12UL, 0xdccf3f2eUL,
+ 0x5512721fUL, 0x2e6b7124UL,
+ 0x501adde6UL, 0x9f84cd87UL, 0x7a584718UL, 0x7408da17UL,
+ 0xbc9f9abcUL, 0xe94b7d8cUL,
+ 0xec7aec3aUL, 0xdb851dfaUL, 0x63094366UL, 0xc464c3d2UL,
+ 0xef1c1847UL, 0x3215d908UL,
+ 0xdd433b37UL, 0x24c2ba16UL, 0x12a14d43UL, 0x2a65c451UL,
+ 0x50940002UL, 0x133ae4ddUL,
+ 0x71dff89eUL, 0x10314e55UL, 0x81ac77d6UL, 0x5f11199bUL,
+ 0x043556f1UL, 0xd7a3c76bUL,
+ 0x3c11183bUL, 0x5924a509UL, 0xf28fe6edUL, 0x97f1fbfaUL,
+ 0x9ebabf2cUL, 0x1e153c6eUL,
+ 0x86e34570UL, 0xeae96fb1UL, 0x860e5e0aUL, 0x5a3e2ab3UL,
+ 0x771fe71cUL, 0x4e3d06faUL,
+ 0x2965dcb9UL, 0x99e71d0fUL, 0x803e89d6UL, 0x5266c825UL,
+ 0x2e4cc978UL, 0x9c10b36aUL,
+ 0xc6150ebaUL, 0x94e2ea78UL, 0xa5fc3c53UL, 0x1e0a2df4UL,
+ 0xf2f74ea7UL, 0x361d2b3dUL,
+ 0x1939260fUL, 0x19c27960UL, 0x5223a708UL, 0xf71312b6UL,
+ 0xebadfe6eUL, 0xeac31f66UL,
+ 0xe3bc4595UL, 0xa67bc883UL, 0xb17f37d1UL, 0x018cff28UL,
+ 0xc332ddefUL, 0xbe6c5aa5UL,
+ 0x65582185UL, 0x68ab9802UL, 0xeecea50fUL, 0xdb2f953bUL,
+ 0x2aef7dadUL, 0x5b6e2f84UL,
+ 0x1521b628UL, 0x29076170UL, 0xecdd4775UL, 0x619f1510UL,
+ 0x13cca830UL, 0xeb61bd96UL,
+ 0x0334fe1eUL, 0xaa0363cfUL, 0xb5735c90UL, 0x4c70a239UL,
+ 0xd59e9e0bUL, 0xcbaade14UL,
+ 0xeecc86bcUL, 0x60622ca7UL, 0x9cab5cabUL, 0xb2f3846eUL,
+ 0x648b1eafUL, 0x19bdf0caUL,
+ 0xa02369b9UL, 0x655abb50UL, 0x40685a32UL, 0x3c2ab4b3UL,
+ 0x319ee9d5UL, 0xc021b8f7UL,
+ 0x9b540b19UL, 0x875fa099UL, 0x95f7997eUL, 0x623d7da8UL,
+ 0xf837889aUL, 0x97e32d77UL,
+ 0x11ed935fUL, 0x16681281UL, 0x0e358829UL, 0xc7e61fd6UL,
+ 0x96dedfa1UL, 0x7858ba99UL,
+ 0x57f584a5UL, 0x1b227263UL, 0x9b83c3ffUL, 0x1ac24696UL,
+ 0xcdb30aebUL, 0x532e3054UL,
+ 0x8fd948e4UL, 0x6dbc3128UL, 0x58ebf2efUL, 0x34c6ffeaUL,
+ 0xfe28ed61UL, 0xee7c3c73UL,
+ 0x5d4a14d9UL, 0xe864b7e3UL, 0x42105d14UL, 0x203e13e0UL,
+ 0x45eee2b6UL, 0xa3aaabeaUL,
+ 0xdb6c4f15UL, 0xfacb4fd0UL, 0xc742f442UL, 0xef6abbb5UL,
+ 0x654f3b1dUL, 0x41cd2105UL,
+ 0xd81e799eUL, 0x86854dc7UL, 0xe44b476aUL, 0x3d816250UL,
+ 0xcf62a1f2UL, 0x5b8d2646UL,
+ 0xfc8883a0UL, 0xc1c7b6a3UL, 0x7f1524c3UL, 0x69cb7492UL,
+ 0x47848a0bUL, 0x5692b285UL,
+ 0x095bbf00UL, 0xad19489dUL, 0x1462b174UL, 0x23820e00UL,
+ 0x58428d2aUL, 0x0c55f5eaUL,
+ 0x1dadf43eUL, 0x233f7061UL, 0x3372f092UL, 0x8d937e41UL,
+ 0xd65fecf1UL, 0x6c223bdbUL,
+ 0x7cde3759UL, 0xcbee7460UL, 0x4085f2a7UL, 0xce77326eUL,
+ 0xa6078084UL, 0x19f8509eUL,
+ 0xe8efd855UL, 0x61d99735UL, 0xa969a7aaUL, 0xc50c06c2UL,
+ 0x5a04abfcUL, 0x800bcadcUL,
+ 0x9e447a2eUL, 0xc3453484UL, 0xfdd56705UL, 0x0e1e9ec9UL,
+ 0xdb73dbd3UL, 0x105588cdUL,
+ 0x675fda79UL, 0xe3674340UL, 0xc5c43465UL, 0x713e38d8UL,
+ 0x3d28f89eUL, 0xf16dff20UL,
+ 0x153e21e7UL, 0x8fb03d4aUL, 0xe6e39f2bUL, 0xdb83adf7UL
+ };
+
+ uint32 ks2[] =
+ {
+ 0xe93d5a68UL, 0x948140f7UL, 0xf64c261cUL, 0x94692934UL,
+ 0x411520f7UL, 0x7602d4f7UL,
+ 0xbcf46b2eUL, 0xd4a20068UL, 0xd4082471UL, 0x3320f46aUL,
+ 0x43b7d4b7UL, 0x500061afUL,
+ 0x1e39f62eUL, 0x97244546UL, 0x14214f74UL, 0xbf8b8840UL,
+ 0x4d95fc1dUL, 0x96b591afUL,
+ 0x70f4ddd3UL, 0x66a02f45UL, 0xbfbc09ecUL, 0x03bd9785UL,
+ 0x7fac6dd0UL, 0x31cb8504UL,
+ 0x96eb27b3UL, 0x55fd3941UL, 0xda2547e6UL, 0xabca0a9aUL,
+ 0x28507825UL, 0x530429f4UL,
+ 0x0a2c86daUL, 0xe9b66dfbUL, 0x68dc1462UL, 0xd7486900UL,
+ 0x680ec0a4UL, 0x27a18deeUL,
+ 0x4f3ffea2UL, 0xe887ad8cUL, 0xb58ce006UL, 0x7af4d6b6UL,
+ 0xaace1e7cUL, 0xd3375fecUL,
+ 0xce78a399UL, 0x406b2a42UL, 0x20fe9e35UL, 0xd9f385b9UL,
+ 0xee39d7abUL, 0x3b124e8bUL,
+ 0x1dc9faf7UL, 0x4b6d1856UL, 0x26a36631UL, 0xeae397b2UL,
+ 0x3a6efa74UL, 0xdd5b4332UL,
+ 0x6841e7f7UL, 0xca7820fbUL, 0xfb0af54eUL, 0xd8feb397UL,
+ 0x454056acUL, 0xba489527UL,
+ 0x55533a3aUL, 0x20838d87UL, 0xfe6ba9b7UL, 0xd096954bUL,
+ 0x55a867bcUL, 0xa1159a58UL,
+ 0xcca92963UL, 0x99e1db33UL, 0xa62a4a56UL, 0x3f3125f9UL,
+ 0x5ef47e1cUL, 0x9029317cUL,
+ 0xfdf8e802UL, 0x04272f70UL, 0x80bb155cUL, 0x05282ce3UL,
+ 0x95c11548UL, 0xe4c66d22UL,
+ 0x48c1133fUL, 0xc70f86dcUL, 0x07f9c9eeUL, 0x41041f0fUL,
+ 0x404779a4UL, 0x5d886e17UL,
+ 0x325f51ebUL, 0xd59bc0d1UL, 0xf2bcc18fUL, 0x41113564UL,
+ 0x257b7834UL, 0x602a9c60UL,
+ 0xdff8e8a3UL, 0x1f636c1bUL, 0x0e12b4c2UL, 0x02e1329eUL,
+ 0xaf664fd1UL, 0xcad18115UL,
+ 0x6b2395e0UL, 0x333e92e1UL, 0x3b240b62UL, 0xeebeb922UL,
+ 0x85b2a20eUL, 0xe6ba0d99UL,
+ 0xde720c8cUL, 0x2da2f728UL, 0xd0127845UL, 0x95b794fdUL,
+ 0x647d0862UL, 0xe7ccf5f0UL,
+ 0x5449a36fUL, 0x877d48faUL, 0xc39dfd27UL, 0xf33e8d1eUL,
+ 0x0a476341UL, 0x992eff74UL,
+ 0x3a6f6eabUL, 0xf4f8fd37UL, 0xa812dc60UL, 0xa1ebddf8UL,
+ 0x991be14cUL, 0xdb6e6b0dUL,
+ 0xc67b5510UL, 0x6d672c37UL, 0x2765d43bUL, 0xdcd0e804UL,
+ 0xf1290dc7UL, 0xcc00ffa3UL,
+ 0xb5390f92UL, 0x690fed0bUL, 0x667b9ffbUL, 0xcedb7d9cUL,
+ 0xa091cf0bUL, 0xd9155ea3UL,
+ 0xbb132f88UL, 0x515bad24UL, 0x7b9479bfUL, 0x763bd6ebUL,
+ 0x37392eb3UL, 0xcc115979UL,
+ 0x8026e297UL, 0xf42e312dUL, 0x6842ada7UL, 0xc66a2b3bUL,
+ 0x12754cccUL, 0x782ef11cUL,
+ 0x6a124237UL, 0xb79251e7UL, 0x06a1bbe6UL, 0x4bfb6350UL,
+ 0x1a6b1018UL, 0x11caedfaUL,
+ 0x3d25bdd8UL, 0xe2e1c3c9UL, 0x44421659UL, 0x0a121386UL,
+ 0xd90cec6eUL, 0xd5abea2aUL,
+ 0x64af674eUL, 0xda86a85fUL, 0xbebfe988UL, 0x64e4c3feUL,
+ 0x9dbc8057UL, 0xf0f7c086UL,
+ 0x60787bf8UL, 0x6003604dUL, 0xd1fd8346UL, 0xf6381fb0UL,
+ 0x7745ae04UL, 0xd736fcccUL,
+ 0x83426b33UL, 0xf01eab71UL, 0xb0804187UL, 0x3c005e5fUL,
+ 0x77a057beUL, 0xbde8ae24UL,
+ 0x55464299UL, 0xbf582e61UL, 0x4e58f48fUL, 0xf2ddfda2UL,
+ 0xf474ef38UL, 0x8789bdc2UL,
+ 0x5366f9c3UL, 0xc8b38e74UL, 0xb475f255UL, 0x46fcd9b9UL,
+ 0x7aeb2661UL, 0x8b1ddf84UL,
+ 0x846a0e79UL, 0x915f95e2UL, 0x466e598eUL, 0x20b45770UL,
+ 0x8cd55591UL, 0xc902de4cUL,
+ 0xb90bace1UL, 0xbb8205d0UL, 0x11a86248UL, 0x7574a99eUL,
+ 0xb77f19b6UL, 0xe0a9dc09UL,
+ 0x662d09a1UL, 0xc4324633UL, 0xe85a1f02UL, 0x09f0be8cUL,
+ 0x4a99a025UL, 0x1d6efe10UL,
+ 0x1ab93d1dUL, 0x0ba5a4dfUL, 0xa186f20fUL, 0x2868f169UL,
+ 0xdcb7da83UL, 0x573906feUL,
+ 0xa1e2ce9bUL, 0x4fcd7f52UL, 0x50115e01UL, 0xa70683faUL,
+ 0xa002b5c4UL, 0x0de6d027UL,
+ 0x9af88c27UL, 0x773f8641UL, 0xc3604c06UL, 0x61a806b5UL,
+ 0xf0177a28UL, 0xc0f586e0UL,
+ 0x006058aaUL, 0x30dc7d62UL, 0x11e69ed7UL, 0x2338ea63UL,
+ 0x53c2dd94UL, 0xc2c21634UL,
+ 0xbbcbee56UL, 0x90bcb6deUL, 0xebfc7da1UL, 0xce591d76UL,
+ 0x6f05e409UL, 0x4b7c0188UL,
+ 0x39720a3dUL, 0x7c927c24UL, 0x86e3725fUL, 0x724d9db9UL,
+ 0x1ac15bb4UL, 0xd39eb8fcUL,
+ 0xed545578UL, 0x08fca5b5UL, 0xd83d7cd3UL, 0x4dad0fc4UL,
+ 0x1e50ef5eUL, 0xb161e6f8UL,
+ 0xa28514d9UL, 0x6c51133cUL, 0x6fd5c7e7UL, 0x56e14ec4UL,
+ 0x362abfceUL, 0xddc6c837UL,
+ 0xd79a3234UL, 0x92638212UL, 0x670efa8eUL, 0x406000e0UL
+ };
+
+ uint32 ks3[] =
+ {
+ 0x3a39ce37UL, 0xd3faf5cfUL, 0xabc27737UL, 0x5ac52d1bUL,
+ 0x5cb0679eUL, 0x4fa33742UL,
+ 0xd3822740UL, 0x99bc9bbeUL, 0xd5118e9dUL, 0xbf0f7315UL,
+ 0xd62d1c7eUL, 0xc700c47bUL,
+ 0xb78c1b6bUL, 0x21a19045UL, 0xb26eb1beUL, 0x6a366eb4UL,
+ 0x5748ab2fUL, 0xbc946e79UL,
+ 0xc6a376d2UL, 0x6549c2c8UL, 0x530ff8eeUL, 0x468dde7dUL,
+ 0xd5730a1dUL, 0x4cd04dc6UL,
+ 0x2939bbdbUL, 0xa9ba4650UL, 0xac9526e8UL, 0xbe5ee304UL,
+ 0xa1fad5f0UL, 0x6a2d519aUL,
+ 0x63ef8ce2UL, 0x9a86ee22UL, 0xc089c2b8UL, 0x43242ef6UL,
+ 0xa51e03aaUL, 0x9cf2d0a4UL,
+ 0x83c061baUL, 0x9be96a4dUL, 0x8fe51550UL, 0xba645bd6UL,
+ 0x2826a2f9UL, 0xa73a3ae1UL,
+ 0x4ba99586UL, 0xef5562e9UL, 0xc72fefd3UL, 0xf752f7daUL,
+ 0x3f046f69UL, 0x77fa0a59UL,
+ 0x80e4a915UL, 0x87b08601UL, 0x9b09e6adUL, 0x3b3ee593UL,
+ 0xe990fd5aUL, 0x9e34d797UL,
+ 0x2cf0b7d9UL, 0x022b8b51UL, 0x96d5ac3aUL, 0x017da67dUL,
+ 0xd1cf3ed6UL, 0x7c7d2d28UL,
+ 0x1f9f25cfUL, 0xadf2b89bUL, 0x5ad6b472UL, 0x5a88f54cUL,
+ 0xe029ac71UL, 0xe019a5e6UL,
+ 0x47b0acfdUL, 0xed93fa9bUL, 0xe8d3c48dUL, 0x283b57ccUL,
+ 0xf8d56629UL, 0x79132e28UL,
+ 0x785f0191UL, 0xed756055UL, 0xf7960e44UL, 0xe3d35e8cUL,
+ 0x15056dd4UL, 0x88f46dbaUL,
+ 0x03a16125UL, 0x0564f0bdUL, 0xc3eb9e15UL, 0x3c9057a2UL,
+ 0x97271aecUL, 0xa93a072aUL,
+ 0x1b3f6d9bUL, 0x1e6321f5UL, 0xf59c66fbUL, 0x26dcf319UL,
+ 0x7533d928UL, 0xb155fdf5UL,
+ 0x03563482UL, 0x8aba3cbbUL, 0x28517711UL, 0xc20ad9f8UL,
+ 0xabcc5167UL, 0xccad925fUL,
+ 0x4de81751UL, 0x3830dc8eUL, 0x379d5862UL, 0x9320f991UL,
+ 0xea7a90c2UL, 0xfb3e7bceUL,
+ 0x5121ce64UL, 0x774fbe32UL, 0xa8b6e37eUL, 0xc3293d46UL,
+ 0x48de5369UL, 0x6413e680UL,
+ 0xa2ae0810UL, 0xdd6db224UL, 0x69852dfdUL, 0x09072166UL,
+ 0xb39a460aUL, 0x6445c0ddUL,
+ 0x586cdecfUL, 0x1c20c8aeUL, 0x5bbef7ddUL, 0x1b588d40UL,
+ 0xccd2017fUL, 0x6bb4e3bbUL,
+ 0xdda26a7eUL, 0x3a59ff45UL, 0x3e350a44UL, 0xbcb4cdd5UL,
+ 0x72eacea8UL, 0xfa6484bbUL,
+ 0x8d6612aeUL, 0xbf3c6f47UL, 0xd29be463UL, 0x542f5d9eUL,
+ 0xaec2771bUL, 0xf64e6370UL,
+ 0x740e0d8dUL, 0xe75b1357UL, 0xf8721671UL, 0xaf537d5dUL,
+ 0x4040cb08UL, 0x4eb4e2ccUL,
+ 0x34d2466aUL, 0x0115af84UL, 0xe1b00428UL, 0x95983a1dUL,
+ 0x06b89fb4UL, 0xce6ea048UL,
+ 0x6f3f3b82UL, 0x3520ab82UL, 0x011a1d4bUL, 0x277227f8UL,
+ 0x611560b1UL, 0xe7933fdcUL,
+ 0xbb3a792bUL, 0x344525bdUL, 0xa08839e1UL, 0x51ce794bUL,
+ 0x2f32c9b7UL, 0xa01fbac9UL,
+ 0xe01cc87eUL, 0xbcc7d1f6UL, 0xcf0111c3UL, 0xa1e8aac7UL,
+ 0x1a908749UL, 0xd44fbd9aUL,
+ 0xd0dadecbUL, 0xd50ada38UL, 0x0339c32aUL, 0xc6913667UL,
+ 0x8df9317cUL, 0xe0b12b4fUL,
+ 0xf79e59b7UL, 0x43f5bb3aUL, 0xf2d519ffUL, 0x27d9459cUL,
+ 0xbf97222cUL, 0x15e6fc2aUL,
+ 0x0f91fc71UL, 0x9b941525UL, 0xfae59361UL, 0xceb69cebUL,
+ 0xc2a86459UL, 0x12baa8d1UL,
+ 0xb6c1075eUL, 0xe3056a0cUL, 0x10d25065UL, 0xcb03a442UL,
+ 0xe0ec6e0eUL, 0x1698db3bUL,
+ 0x4c98a0beUL, 0x3278e964UL, 0x9f1f9532UL, 0xe0d392dfUL,
+ 0xd3a0342bUL, 0x8971f21eUL,
+ 0x1b0a7441UL, 0x4ba3348cUL, 0xc5be7120UL, 0xc37632d8UL,
+ 0xdf359f8dUL, 0x9b992f2eUL,
+ 0xe60b6f47UL, 0x0fe3f11dUL, 0xe54cda54UL, 0x1edad891UL,
+ 0xce6279cfUL, 0xcd3e7e6fUL,
+ 0x1618b166UL, 0xfd2c1d05UL, 0x848fd2c5UL, 0xf6fb2299UL,
+ 0xf523f357UL, 0xa6327623UL,
+ 0x93a83531UL, 0x56cccd02UL, 0xacf08162UL, 0x5a75ebb5UL,
+ 0x6e163697UL, 0x88d273ccUL,
+ 0xde966292UL, 0x81b949d0UL, 0x4c50901bUL, 0x71c65614UL,
+ 0xe6c6c7bdUL, 0x327a140aUL,
+ 0x45e1d006UL, 0xc3f27b9aUL, 0xc9aa53fdUL, 0x62a80f00UL,
+ 0xbb25bfe2UL, 0x35bdd2f6UL,
+ 0x71126905UL, 0xb2040222UL, 0xb6cbcf7cUL, 0xcd769c2bUL,
+ 0x53113ec0UL, 0x1640e3d3UL,
+ 0x38abbd60UL, 0x2547adf0UL, 0xba38209cUL, 0xf746ce76UL,
+ 0x77afa1c5UL, 0x20756060UL,
+ 0x85cbfe4eUL, 0x8ae88dd8UL, 0x7aaaf9b0UL, 0x4cf9aa7eUL,
+ 0x1948c25cUL, 0x02fb8a8cUL,
+ 0x01c36ae4UL, 0xd6ebe1f9UL, 0x90d4f869UL, 0xa65cdea0UL,
+ 0x3f09252dUL, 0xc208e69fUL,
+ 0xb74e6132UL, 0xce77e25bUL, 0x578fdfe3UL, 0x3ac372e6UL
+ };
+
+
+ uint32 pi[] =
+ {
+ 0x243f6a88UL, 0x85a308d3UL, 0x13198a2eUL, 0x03707344UL,
+ 0xa4093822UL, 0x299f31d0UL,
+ 0x082efa98UL, 0xec4e6c89UL, 0x452821e6UL, 0x38d01377UL,
+ 0xbe5466cfUL, 0x34e90c6cUL,
+ 0xc0ac29b7UL, 0xc97c50ddUL, 0x3f84d5b5UL, 0xb5470917UL,
+ 0x9216d5d9UL, 0x8979fb1bUL
+ };
+
+
+/* Initialize s-boxes without file read. */
+ for (i = 0; i < 256; i++) {
+ c->S[0][i] = ks0[i];
+ c->S[1][i] = ks1[i];
+ c->S[2][i] = ks2[i];
+ c->S[3][i] = ks3[i];
+ }
+
+/* P-boxes */
+ for (i = 0; i < 18; i++) {
+ c->P[i] = pi[i];
+ }
+ return 0;
+}
+
+static short _blf_ExpandKey(blf_ctx * c, const uint8 * key, short keybytes, const uint8* bsalt)
+{
+ short i, j;
+ int k;
+ uint32 data, *temp;
+ uint32 wsalt[4];
+
+ if (bsalt!=NULL) {
+ wsalt[0] = 0x00000000;
+ wsalt[1] = 0x00000000;
+ wsalt[2] = 0x00000000;
+ wsalt[3] = 0x00000000;
+ for (i=0;i<4;i++) {
+ wsalt[0] = (wsalt[0] << 8) | bsalt[i];
+ wsalt[1] = (wsalt[1] << 8) | bsalt[i+4];
+ wsalt[2] = (wsalt[2] << 8) | bsalt[i+8];
+ wsalt[3] = (wsalt[3] << 8) | bsalt[i+12];
+ }
+ }
+
+ temp = malloc(8);
+ temp[0] = temp[1] = 0x00000000;
+
+ j = 0;
+ /* Step 1: XOR the Pbox with the key */
+ for (i = 0; i < BF_N + 2; i++) {
+ data = 0x00000000;
+ data = (data << 8) | key[(j) % keybytes];
+ data = (data << 8) | key[(j+1) % keybytes];
+ data = (data << 8) | key[(j+2) % keybytes];
+ data = (data << 8) | key[(j+3) % keybytes];
+
+ c->P[i] ^= data;
+ j = (j + 4) % keybytes;
+ }
+
+ k = 2; /* This should be 0 ??? */
+ /* Step 2: Use the salt on Pbox */
+ for (i = 0; i < BF_N + 2; i += 2) {
+ if (bsalt != NULL) {
+ temp[0] ^= wsalt[(k + 2) % 4];
+ temp[1] ^= wsalt[(k + 3) % 4];
+ k = (k + 2) % 4;
+ }
+ enblf_noswap(c, temp);
+ c->P[i] = temp[0];
+ c->P[i + 1] = temp[1];
+ }
+
+ for (i = 0; i < 4; i++) {
+ for (j = 0; j < 256; j += 2) {
+ if (bsalt != NULL) {
+ temp[0] ^= wsalt[(k + 2) % 4];
+ temp[1] ^= wsalt[(k + 3) % 4];
+ k = (k + 2) % 4;
+ }
+ enblf_noswap(c, temp);
+ c->S[i][j] = temp[0];
+ c->S[i][j + 1] = temp[1];
+
+ }
+ }
+ return 0;
+}
+
+
+
+
+static blf_ctx *
+ _blf_init( uint8 *salt, const char *key, int key_len, int cost)
+{
+ blf_ctx *state = malloc(sizeof(blf_ctx));
+ uint32 i, rcost;
+
+ rcost = (uint32) 1 << cost; /* 2^cost */
+
+ initialize_blowfish(state);
+ _blf_ExpandKey(state, (uint8 *) key, key_len, salt);
+ for (i = 0; i < rcost; i++) {
+ /* these should have been in reverse order */
+ _blf_ExpandKey(state, (uint8 *) key, key_len, NULL);
+ _blf_ExpandKey(state, salt, 16, NULL);
+ }
+ return state;
+}
+
+static void _blf_deinit(blf_ctx *ctx)
+{
+ free(ctx);
+}
+
+char *
+ crypt_bcrypt(const char *passwd, const char *salt)
+{
+ unsigned char *sp, *tsp;
+ const char *magic = "$2a$";
+ blf_ctx *ctx;
+ const unsigned char text[24] = "OrpheanBeholderScryDoubt";
+ uint8 csalt[16];
+ uint8 rtext[120];
+ int cost;
+ int i, salt_size = strlen(salt);
+ unsigned char *local_salt;
+ int passwd_len;
+ char * password;
+ char tmp[200];
+
+ passwd_len = strlen(passwd) + 1; /* we want the null also */
+ if (passwd_len > 56)
+ passwd_len = 56;
+
+ local_salt = malloc(salt_size + 1);
+ strcpy((char *) local_salt, salt);
+ sp = local_salt;
+
+ /* If it starts with the magic string, then skip that */
+ if (!strncmp((char *) sp, magic, strlen(magic)))
+ sp += strlen(magic);
+
+ cost = atoi((char *) sp);
+ do { /* move to salt */
+ sp++;
+ } while (*sp != '$' && *sp != '\0');
+ sp++;
+ tsp = sp;
+ tsp += 22;
+ *tsp = '\0'; /* put a null after the end of salt */
+
+ _crypt_decode_base64( csalt, 16, sp);
+
+ ctx = _blf_init( csalt, passwd, passwd_len, cost);
+ for (i = 0; i < 64; i++) {
+ _blf_encrypt(ctx, (uint8 *) text);
+ _blf_encrypt(ctx, (uint8 *) &text[8]);
+ _blf_encrypt(ctx, (uint8 *) &text[16]);
+ }
+
+ _crypt_encode_base64(rtext, text, 23);
+
+ sprintf( tmp, "$2a$%.2u$%s%s", (unsigned int) cost, sp, rtext);
+ password = strdup(tmp);
+
+ _blf_deinit(ctx);
+ return password;
+}
+
+char *crypt_bcrypt_wrapper(const char *pass_new, int cost)
+{
+ unsigned char result[40];
+ char *cp = (char *) result;
+ unsigned char* tmp;
+ char *e = NULL;
+
+ tmp = _gnutls_get_random( 16, GNUTLS_WEAK_RANDOM);
+ /* cost should be <32 and >6 */
+ sprintf(cp, "$2a$%.2u$", cost); /* magic for the BCRYPT */
+ cp += strlen(cp);
+ _crypt_encode_base64( cp, tmp, 16);
+
+ _gnutls_free_rand(tmp);
+ /* no longer need cleartext */
+ e = crypt_bcrypt(pass_new, (const char *) result);
+
+ return e;
+}
+
diff --git a/lib/defines.h b/lib/defines.h
index 61644626b7..9b08abf1c8 100644
--- a/lib/defines.h
+++ b/lib/defines.h
@@ -18,6 +18,9 @@
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
+#ifndef DEFINES_H
+# define DEFINES_H
+
#include <config.h>
#ifdef STDC_HEADERS
@@ -42,6 +45,10 @@
# include <sys/types.h>
#endif
+#ifdef USE_GCRYPT
+# include <gcrypt.h>
+#endif
+
#ifdef HAVE_SYS_STAT_H
# include <sys/stat.h>
#endif
@@ -99,3 +106,5 @@
# error "Neither memmove nor bcopy exists on your system."
# endif
#endif
+
+#endif /* defines_h */
diff --git a/lib/gnutls.h b/lib/gnutls.h
index e86d5ccab8..41d117ec01 100644
--- a/lib/gnutls.h
+++ b/lib/gnutls.h
@@ -95,6 +95,14 @@ int gnutls_set_cache_expiration( GNUTLS_STATE state, int seconds);
int gnutls_set_db_name( GNUTLS_STATE state, char* filename);
int gnutls_clean_db( GNUTLS_STATE state);
+
+/* crypt functions */
+enum crypt_algo { MD5_CRYPT, BLOWFISH_CRYPT };
+typedef enum crypt_algo crypt_algo;
+
+char * gnutls_crypt(const char* username, const char *passwd, crypt_algo algo);
+int gnutls_crypt_vrfy(const char* username, const char *passwd, char* salt);
+
/* these are deprecated must be replaced by gnutls_errors.h */
#define GNUTLS_E_MAC_FAILED -1
#define GNUTLS_E_UNKNOWN_CIPHER -2
diff --git a/lib/gnutls_cipher.c b/lib/gnutls_cipher.c
index c922727f97..71166cb1b5 100644
--- a/lib/gnutls_cipher.c
+++ b/lib/gnutls_cipher.c
@@ -28,6 +28,7 @@
#include "gnutls_cipher_int.h"
#include "gnutls_plaintext.h"
#include "debug.h"
+#include "gnutls_random.h"
int _gnutls_encrypt(GNUTLS_STATE state, char *data, size_t data_size,
uint8 ** ciphertext, ContentType type)
@@ -491,7 +492,7 @@ int _gnutls_TLSCompressed2TLSCiphertext(GNUTLS_STATE state,
break;
case CIPHER_BLOCK:
- rand = gcry_random_bytes(1, GCRY_WEAK_RANDOM);
+ rand = _gnutls_get_random(1, GNUTLS_WEAK_RANDOM);
/* make rand a multiple of blocksize */
if (_gnutls_version_ssl3(state->connection_state.version) == 0) {
@@ -523,7 +524,7 @@ int _gnutls_TLSCompressed2TLSCiphertext(GNUTLS_STATE state,
ciphertext->version.major = compressed->version.major;
ciphertext->version.minor = compressed->version.minor;
- gcry_free(rand);
+ _gnutls_free_rand(rand);
break;
default:
gnutls_free(*cipher);
diff --git a/lib/gnutls_cipher_int.h b/lib/gnutls_cipher_int.h
index 85c48afb61..1fee972c3c 100644
--- a/lib/gnutls_cipher_int.h
+++ b/lib/gnutls_cipher_int.h
@@ -26,7 +26,6 @@
# define GNUTLS_CIPHER_HANDLE MCRYPT
# define GNUTLS_CIPHER_FAILED MCRYPT_FAILED
#else
-# include <gcrypt.h>
# define GNUTLS_CIPHER_HANDLE GCRY_CIPHER_HD
# define GNUTLS_CIPHER_FAILED NULL
#endif
diff --git a/lib/gnutls_handshake.c b/lib/gnutls_handshake.c
index 4390ea6935..ec8173b30b 100644
--- a/lib/gnutls_handshake.c
+++ b/lib/gnutls_handshake.c
@@ -34,6 +34,7 @@
#include "gnutls_hash_int.h"
#include "gnutls_db.h"
#include "gnutls_extensions.h"
+#include "gnutls_random.h"
#ifdef DEBUG
#define ERR(x, y) fprintf(stderr, "GNUTLS Error: %s (%d)\n", x,y)
@@ -506,10 +507,10 @@ int _gnutls_send_hello(int cd, GNUTLS_STATE state, opaque * SessionID,
memmove(state->security_parameters.client_random,
&cur_time, 4);
- rand = gcry_random_bytes(28, GCRY_STRONG_RANDOM);
+ rand = _gnutls_get_random(28, GNUTLS_STRONG_RANDOM);
memmove(&state->security_parameters.client_random[4], rand,
28);
- gcry_free(rand);
+ _gnutls_free_rand(rand);
state->security_parameters.timestamp = time(0);
@@ -791,10 +792,10 @@ int _gnutls_recv_hello(int cd, GNUTLS_STATE state, char *data, int datalen)
#endif
memmove(state->security_parameters.server_random,
&cur_time, 4);
- rand = gcry_random_bytes(28, GCRY_STRONG_RANDOM);
+ rand = _gnutls_get_random(28, GNUTLS_STRONG_RANDOM);
memmove(&state->security_parameters.server_random[4], rand,
28);
- gcry_free(rand);
+ _gnutls_free_rand(rand);
state->security_parameters.timestamp = time(NULL);
memmove(&session_id_len, &data[pos++], 1);
@@ -1249,10 +1250,10 @@ int gnutls_handshake_finish(int cd, GNUTLS_STATE state)
int _gnutls_generate_session_id(char *session_id, uint8 * len)
{
char *rand;
- rand = gcry_random_bytes(32, GCRY_WEAK_RANDOM);
+ rand = _gnutls_get_random(32, GNUTLS_WEAK_RANDOM);
memmove(session_id, rand, 32);
- gcry_free(rand);
+ _gnutls_free_rand(rand);
*len = 32;
#ifdef HARD_DEBUG
diff --git a/lib/gnutls_hash_int.h b/lib/gnutls_hash_int.h
index a54daf9726..dd2b7ce53f 100644
--- a/lib/gnutls_hash_int.h
+++ b/lib/gnutls_hash_int.h
@@ -25,8 +25,6 @@
#ifdef USE_MHASH
# include <mhash.h>
-#else
-# include <gcrypt.h>
#endif
/* for message digests */
diff --git a/lib/gnutls_int.h b/lib/gnutls_int.h
index a95e837bcc..4cbdb46deb 100644
--- a/lib/gnutls_int.h
+++ b/lib/gnutls_int.h
@@ -40,9 +40,6 @@
#define HEADER_SIZE 5
#define MAX_RECV_SIZE 18432+HEADER_SIZE /* 2^14+2048+HEADER_SIZE */
-/* for big numbers support */ /* FIXME */
-#include <gcrypt.h>
-
#ifdef USE_DMALLOC
#include <dmalloc.h>
#endif
diff --git a/lib/gnutls_random.c b/lib/gnutls_random.c
new file mode 100644
index 0000000000..b7e3839a46
--- /dev/null
+++ b/lib/gnutls_random.c
@@ -0,0 +1,78 @@
+/*
+ * Copyright (C) 2001 Nikos Mavroyanopoulos
+ *
+ * This file is part of GNUTLS.
+ *
+ * GNUTLS is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * GNUTLS is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+ */
+
+#include "defines.h"
+#include "gnutls_int.h"
+#include "gnutls_random.h"
+#ifndef USE_GCRYPT
+# include <unistd.h>
+# include <sys/types.h>
+# include <sys/stat.h>
+# include <fcntl.h>
+# include <sys/time.h>
+#endif
+
+char *_gnutls_get_random(int bytes, int dev)
+{
+#ifndef USE_GCRYPT
+ int fd;
+ struct timeval tv;
+ char prand[16];
+ char * buf = gnutls_malloc(bytes);
+ char *device;
+
+ switch(dev) {
+ case 1:
+ device = "/dev/random";
+ break;
+ default:
+ device = "dev/urandom";
+ }
+
+ fd = open(device, O_RDONLY);
+ if (device == NULL || fd < 0) {
+ gettimeofday(&tv, (struct timezone *) 0);
+ memcpy(prand, &tv, sizeof(tv));
+ fd = getpid();
+ memcpy(&prand[8], &fd, sizeof(fd));
+ fd = clock();
+ memcpy(&prand[12], &fd, sizeof(fd));
+ memset(buf, 0, bytes);
+ if (bytes > 16)
+ bytes = 16;
+ memcpy(buf, prand, bytes);
+ } else {
+ read(fd, buf, bytes);
+ close(fd);
+ }
+ return buf;
+#else /* using gcrypt */
+ return gcry_random_bytes(bytes, dev);
+#endif
+
+}
+
+void _gnutls_free_rand(void* rand) {
+#ifndef USE_GCRYPT
+ gnutls_free(rand);
+#else
+ gcry_free(rand);
+#endif
+} \ No newline at end of file
diff --git a/lib/gnutls_random.h b/lib/gnutls_random.h
new file mode 100644
index 0000000000..b226900e93
--- /dev/null
+++ b/lib/gnutls_random.h
@@ -0,0 +1,12 @@
+#include "defines.h"
+
+#ifndef USE_GCRYPT
+# define GNUTLS_WEAK_RANDOM 0
+# define GNUTLS_STRONG_RANDOM 1
+#else
+# define GNUTLS_WEAK_RANDOM GCRY_WEAK_RANDOM
+# define GNUTLS_STRONG_RANDOM GCRY_STRONG_RANDOM
+#endif
+
+char *_gnutls_get_random(int bytes, int);
+void _gnutls_free_rand(void* rand);
diff --git a/src/Makefile.am b/src/Makefile.am
index dc4bd9abf3..c11b0dd905 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -1,7 +1,9 @@
-EXTRA_DIST = port.h
-noinst_PROGRAMS = serv cli
+EXTRA_DIST = port.h crypt.gaa
+noinst_PROGRAMS = serv cli crypt
serv_SOURCES = serv.c
serv_LDADD = ../lib/libgnutls.la $(GCRYPT_LIBS)
+crypt_SOURCES = crypt.c gaaout.c
+crypt_LDADD = ../lib/libgnutls.la $(GCRYPT_LIBS)
cli_SOURCES = cli.c
cli_LDADD = ../lib/libgnutls.la $(GCRYPT_LIBS)
diff --git a/src/crypt.c b/src/crypt.c
new file mode 100644
index 0000000000..d86752a8d3
--- /dev/null
+++ b/src/crypt.c
@@ -0,0 +1,84 @@
+/*
+ * Copyright (C) 2001 Nikos Mavroyanopoulos
+ *
+ * This file is part of GNUTLS.
+ *
+ * GNUTLS is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * GNUTLS is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+ */
+
+#include <stdio.h>
+#include <string.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include "../lib/gnutls.h"
+#include "gaa.h"
+
+int verify_passwd(char *file, char* username, char* passwd) {
+ FILE* fd;
+ char line[513];
+ int i;
+
+ fd = fopen( file, "r");
+ if (fd==NULL) {
+ fprintf(stderr, "Cannot open file '%s'\n", file);
+ return -1;
+ }
+
+ while( fgets( line, sizeof(line), fd) != NULL) {
+ /* move to first ':' */
+ i=0;
+ while( (line[i]!=':') && (line[i]!='\0') && (i < sizeof(line)) ) {
+ i++;
+ }
+ if (strncmp( username, line, i) == 0) {
+ if (gnutls_crypt_vrfy( username, passwd, &line[++i]) == 0) {
+ fprintf(stderr, "Password verified\n");
+ } else {
+ fprintf(stderr, "Password does NOT match\n");
+ }
+ return 0;
+ }
+ }
+
+ fclose(fd);
+ return -1;
+
+}
+
+int main(int argc, char** argv) {
+gaainfo info;
+char* passwd;
+char* cr=NULL;
+
+ if ( gaa(argc, argv, &info) != -1) {
+ fprintf(stderr, "Error in the arguments.\n");
+ return -1;
+ }
+
+ passwd = getpass("Enter password: ");
+
+ if (info.passwd != NULL) {
+ verify_passwd( info.passwd, info.username, passwd);
+ free(cr);
+ return 0;
+ }
+
+ cr = gnutls_crypt( info.username, passwd, BLOWFISH_CRYPT);
+ printf("%s:%s\n", info.username, cr);
+ free(cr);
+ return 0;
+
+
+} \ No newline at end of file
diff --git a/src/crypt.gaa b/src/crypt.gaa
new file mode 100644
index 0000000000..157e8c719f
--- /dev/null
+++ b/src/crypt.gaa
@@ -0,0 +1,13 @@
+helpnode "Crypt help\nUsage : crypt [-u user] [-p password file]"
+
+#char *username;
+option (u,username) STR "username" { $username = $1 } "specify username."
+
+#char *passwd;
+option (p, passwd) STR "passwd" { $passwd = $1 } "specify a password file."
+
+option (h, help) { gaa_help(); exit(0); } "shows this help text"
+
+init { $username=NULL; $passwd=NULL; }
+
+OBLIGAT u
diff --git a/src/gaa.h b/src/gaa.h
new file mode 100644
index 0000000000..162e3ab3ab
--- /dev/null
+++ b/src/gaa.h
@@ -0,0 +1,35 @@
+
+#line 104 "gaa.skel"
+/* GAA HEADER */
+#ifndef GAA_HEADER_POKY
+#define GAA_HEADER_POKY
+
+typedef struct _gaainfo gaainfo;
+
+struct _gaainfo
+{
+#line 6 "crypt.gaa"
+ char *passwd;
+#line 3 "crypt.gaa"
+ char *username;
+
+#line 114 "gaa.skel"
+};
+
+#ifdef __cplusplus
+extern "C"
+{
+#endif
+
+ int gaa(int argc, char *argv[], gaainfo *gaaval);
+
+ void gaa_help();
+
+ int gaa_file(char *name, gaainfo *gaaval);
+
+#ifdef __cplusplus
+}
+#endif
+
+
+#endif
diff --git a/src/gaaout.c b/src/gaaout.c
new file mode 100644
index 0000000000..9f4e46a6bc
--- /dev/null
+++ b/src/gaaout.c
@@ -0,0 +1,723 @@
+#include <stdio.h>
+#include <string.h>
+
+#ifndef GAA_NO_WIN32
+#if defined(_WIN32) || defined(__WIN32__) || defined(WIN32) || defined(WINDOWS)
+#define GAA_WIN32
+#endif
+#endif
+
+void __gaa_helpsingle(char short_name, char *name,
+ char *arg_desc, char *opt_help)
+{
+ int col1, col3, col4, tabsize = 3, curr;
+ int i;
+
+ col1 = 5; /* Default values */
+ col3 = 30;
+ col4 = 70;
+
+ curr = 0;
+ for(i = 0; i < col1; i++)
+ {
+ printf(" ");
+ curr++;
+ }
+ if(short_name)
+ {
+ if(name && *name)
+ {
+ printf("-%c, ", short_name);
+ curr += 4;
+ }
+ else
+ {
+ printf("-%c ", short_name);
+ curr += 3;
+ }
+ }
+ if(name && *name)
+ {
+ printf("--%s ", name);
+ curr += 3 + strlen(name);
+ }
+ if(arg_desc && *arg_desc)
+ {
+ printf("%s ", arg_desc);
+ curr += 1 + strlen(arg_desc);
+ }
+ if(curr >= col3)
+ {
+ printf("\n");
+ curr = 0;
+ }
+ if(opt_help) /* let's print the option's help body */
+ {
+ const char *str = opt_help;
+ while(*str)
+ {
+ while(curr < col3)
+ {
+ printf(" ");
+ curr++;
+ }
+ switch(*str)
+ {
+ case '\n':
+ printf("\n");
+ curr = 0;
+ break;
+ case '\t':
+ do
+ {
+ printf(" ");
+ curr++;
+ }
+ while((curr - col3) % tabsize != 0 && curr < col4);
+ case ' ':
+ if(*str == ' ')
+ {
+ curr++;
+ printf(" ");
+ }
+ for(i = 1; str[i] && str[i] != ' ' && str[i] != '\n'
+ && str[i] != '\t'; i++);
+ if(curr + i - 1 >= col4)
+ curr = col4;
+ break;
+ default:
+ printf("%c", *str);
+ curr++;
+ }
+ if(curr >= col4)
+ {
+ printf("\n");
+ curr = 0;
+ }
+ str++;
+ }
+ }
+ printf("\n");
+}
+
+void gaa_help()
+{
+ printf("Crypt help\nUsage : crypt [-u user] [-p password file]""\n");
+ __gaa_helpsingle('u', "username", """username"" ", "specify username.");
+ __gaa_helpsingle('p', "passwd", """passwd"" ", "specify a password file.");
+ __gaa_helpsingle('h', "help", "", "shows this help text");
+
+#line 100 "gaa.skel"
+}
+/* Copy of C area */
+
+#line 104 "gaa.skel"
+/* GAA HEADER */
+#ifndef GAA_HEADER_POKY
+#define GAA_HEADER_POKY
+
+typedef struct _gaainfo gaainfo;
+
+struct _gaainfo
+{
+#line 6 "crypt.gaa"
+ char *passwd;
+#line 3 "crypt.gaa"
+ char *username;
+
+#line 114 "gaa.skel"
+};
+
+#ifdef __cplusplus
+extern "C"
+{
+#endif
+
+ int gaa(int argc, char *argv[], gaainfo *gaaval);
+
+ void gaa_help();
+
+ int gaa_file(char *name, gaainfo *gaaval);
+
+#ifdef __cplusplus
+}
+#endif
+
+
+#endif
+
+#line 135 "gaa.skel"
+
+/* C declarations */
+
+#define GAAERROR \
+{ \
+gaa_error = 1; \
+return; \
+}
+
+char *gaa_current_option;
+int gaa_error = 0;
+
+/* Generated by gaa */
+
+#include <string.h>
+#include <stdlib.h>
+
+
+#define GAA_OK -1
+
+#define GAA_ERROR_NOMATCH 0
+#define GAA_ERROR_NOTENOUGH_ARGS 1
+#define GAA_ERROR_INVALID_ARG 2
+#define GAA_ERROR_UNKNOWN 3
+
+#define GAA_NOT_AN_OPTION 0
+#define GAA_WORD_OPTION 1
+#define GAA_LETTER_OPTION 2
+#define GAA_MULTIPLE_OPTION 3
+
+#define GAA_REST 0
+#define GAA_NB_OPTION 3
+#define GAAOPTID_help 1
+#define GAAOPTID_passwd 2
+#define GAAOPTID_username 3
+
+#line 168 "gaa.skel"
+
+#define GAA_CHECK1STR(a,b) \
+if(a[0] == str[0]) \
+{ \
+ gaa_current_option = a; \
+ return b; \
+}
+
+#define GAA_CHECKSTR(a,b) \
+if(strcmp(a,str) == 0) \
+{ \
+ gaa_current_option = a; \
+ return b; \
+}
+
+#define GAA_TESTMOREARGS \
+if(!OK) \
+{ \
+while((gaa_last_non_option != gaa_index) && (gaa_arg_used[gaa_index] == 1)) \
+ gaa_index++; \
+if(gaa_last_non_option == gaa_index) \
+ return GAA_ERROR_NOTENOUGH_ARGS; \
+}
+
+#define GAA_TESTMOREOPTIONALARGS \
+if(!OK) \
+{ \
+while((gaa_last_non_option != gaa_index) && (gaa_arg_used[gaa_index] == 1)) \
+ gaa_index++; \
+if(gaa_last_non_option == gaa_index) \
+ OK = 1; \
+}
+
+#define GAA_FILL_2ARGS(target, func) \
+target = func(GAAargv[gaa_index]); \
+gaa_arg_used[gaa_index] = 1; \
+if(gaa_error == 1) \
+{ \
+ gaa_error = 0; \
+ return GAA_ERROR_INVALID_ARG; \
+}
+
+
+
+#define GAA_FILL(target, func, num) \
+if(!OK) \
+{ \
+target = func(GAAargv[gaa_index]); \
+gaa_arg_used[gaa_index] = 1; \
+if(gaa_error == 1) \
+{ \
+ gaa_error = 0; \
+ return GAA_ERROR_INVALID_ARG; \
+} \
+num = 1; \
+} \
+else \
+{ \
+num = 0; \
+}
+
+#define GAA_LIST_FILL(target, func, type ,num) \
+if(!OK) \
+{ \
+num = 0; \
+target = malloc((gaa_last_non_option - gaa_index) * sizeof(type)); \
+for(; gaa_index < gaa_last_non_option; gaa_index++) \
+{ \
+ if(gaa_arg_used[gaa_index] == 0) \
+ { \
+ GAA_FILL_2ARGS(target[num], func); \
+ num++; \
+ } \
+} \
+if(num == 0) \
+ return GAA_ERROR_NOTENOUGH_ARGS; \
+}
+
+#define GAA_OPTIONALLIST_FILL(target, func, type ,num) \
+if(!OK) \
+{ \
+num = 0; \
+target = malloc((gaa_last_non_option - gaa_index) * sizeof(type)); \
+for(; gaa_index < gaa_last_non_option; gaa_index++) \
+{ \
+ if(gaa_arg_used[gaa_index] == 0) \
+ { \
+ GAA_FILL_2ARGS(target[num], func); \
+ num++; \
+ } \
+} \
+}
+
+#define GAA_OBLIGAT(str) \
+k = 0; \
+for(i = 0; i < strlen(str); i++) \
+{ \
+ j = gaa_get_option_num(str + i, GAA_LETTER_OPTION); \
+ if(j == GAA_ERROR_NOMATCH) \
+ { \
+ printf("Error : invalid 'obligat' set\n"); \
+ exit(-1); \
+ } \
+ if(opt_list[j] == 1) \
+ k = 1; \
+} \
+if(k == 0) \
+{ \
+ if(strlen(str) == 1) \
+ printf("You must give the -%s option\n", str); \
+ else \
+ printf("You must give at least one option of '%s'\n", str); \
+ return 0; \
+}
+
+#define GAA_INCOMP(str) \
+k = 0; \
+for(i = 0; i < strlen(str); i++) \
+{ \
+ j = gaa_get_option_num(str + i, GAA_LETTER_OPTION); \
+ if(j == GAA_ERROR_NOMATCH) \
+ { \
+ printf("Error : invalid 'obligat' set\n"); \
+ exit(-1); \
+ } \
+ if(opt_list[j] == 1) \
+ k++; \
+} \
+if(k > 1) \
+{ \
+ printf("The options '%s' are incompatible\n", str); \
+ return 0; \
+}
+
+
+char **GAAargv;
+int GAAargc;
+char *gaa_arg_used;
+int gaa_processing_file = 0;
+int inited = 0;
+
+int gaa_getint(char *arg)
+{
+ int tmp;
+ char a;
+ if(sscanf(arg, "%d%c", &tmp, &a) != 1)
+ {
+ printf("Option %s : '%s' isn't an integer\n", gaa_current_option, arg);
+ GAAERROR;
+ }
+ return tmp;
+}
+
+char gaa_getchar(char *arg)
+{
+ if(strlen(arg) != 1)
+ {
+ printf("Option %s : '%s' isn't an character\n", gaa_current_option, arg);
+ GAAERROR;
+ }
+ return arg[0];
+}
+
+char* gaa_getstr(char *arg)
+{
+ return arg;
+}
+float gaa_getfloat(char *arg)
+{
+ float tmp;
+ char a;
+ if(sscanf(arg, "%f%c", &tmp, &a) != 1)
+ {
+ printf("Option %s : '%s' isn't a float number\n", gaa_current_option, arg);
+ GAAERROR;
+ }
+ return tmp;
+}
+/* option structures */
+
+struct GAAOPTION_passwd
+{
+ char* arg1;
+ int size1;
+};
+
+struct GAAOPTION_username
+{
+ char* arg1;
+ int size1;
+};
+
+#line 349 "gaa.skel"
+int gaa_is_an_argument(char *str)
+{
+#ifdef GAA_WIN32
+ if(str[0] == '/' && str[1] != 0)
+ return GAA_MULTIPLE_OPTION;
+#endif
+ if(str[0] != '-')
+ return GAA_NOT_AN_OPTION;
+ if(str[1] == 0)
+ return GAA_NOT_AN_OPTION;
+ if(str[1] == '-')
+ {
+ if(str[2] != 0)
+ return GAA_WORD_OPTION;
+ else
+ return GAA_NOT_AN_OPTION;
+ }
+ if(str[2] == 0)
+ return GAA_LETTER_OPTION;
+ else
+ return GAA_MULTIPLE_OPTION;
+}
+
+int gaa_get_option_num(char *str, int status)
+{
+ switch(status)
+ {
+ case GAA_LETTER_OPTION:
+ GAA_CHECK1STR("p", GAAOPTID_passwd);
+ GAA_CHECK1STR("u", GAAOPTID_username);
+ case GAA_MULTIPLE_OPTION:
+#line 375 "gaa.skel"
+ GAA_CHECK1STR("h", GAAOPTID_help);
+
+#line 277 "gaa.skel"
+ break;
+ case GAA_WORD_OPTION:
+ GAA_CHECKSTR("help", GAAOPTID_help);
+ GAA_CHECKSTR("passwd", GAAOPTID_passwd);
+ GAA_CHECKSTR("username", GAAOPTID_username);
+
+#line 281 "gaa.skel"
+ break;
+ default: break;
+ }
+ return GAA_ERROR_NOMATCH;
+}
+
+int gaa_try(int gaa_num, int gaa_index, gaainfo *gaaval, char *opt_list)
+{
+ int OK = 0;
+ int gaa_last_non_option;
+ struct GAAOPTION_passwd GAATMP_passwd;
+ struct GAAOPTION_username GAATMP_username;
+
+#line 393 "gaa.skel"
+#ifdef GAA_REST_EXISTS
+ struct GAAREST GAAREST_tmp;
+#endif
+
+ opt_list[gaa_num] = 1;
+
+ for(gaa_last_non_option = gaa_index;
+ (gaa_last_non_option != GAAargc) && (gaa_is_an_argument(GAAargv[gaa_last_non_option]) == GAA_NOT_AN_OPTION);
+ gaa_last_non_option++);
+
+ if(gaa_num == GAA_REST)
+ {
+ gaa_index = 1;
+ gaa_last_non_option = GAAargc;
+ }
+
+ switch(gaa_num)
+ {
+ case GAAOPTID_help:
+ OK = 0;
+#line 9 "crypt.gaa"
+{ gaa_help(); exit(0); ;};
+
+ return GAA_OK;
+ break;
+ case GAAOPTID_passwd:
+ OK = 0;
+ GAA_TESTMOREARGS;
+ GAA_FILL(GAATMP_passwd.arg1, gaa_getstr, GAATMP_passwd.size1);
+ gaa_index++;
+#line 7 "crypt.gaa"
+{ gaaval->passwd = GAATMP_passwd.arg1 ;};
+
+ return GAA_OK;
+ break;
+ case GAAOPTID_username:
+ OK = 0;
+ GAA_TESTMOREARGS;
+ GAA_FILL(GAATMP_username.arg1, gaa_getstr, GAATMP_username.size1);
+ gaa_index++;
+#line 4 "crypt.gaa"
+{ gaaval->username = GAATMP_username.arg1 ;};
+
+ return GAA_OK;
+ break;
+
+#line 413 "gaa.skel"
+ default: break;
+ }
+ return GAA_ERROR_UNKNOWN;
+}
+
+int gaa(int argc, char **argv, gaainfo *gaaval)
+{
+ int tmp1, tmp2;
+ int i, j, k;
+ char *opt_list;
+
+ GAAargv = argv;
+ GAAargc = argc;
+
+ opt_list = (char*) malloc(GAA_NB_OPTION + 1);
+ for(i = 0; i < GAA_NB_OPTION + 1; i++)
+ opt_list[i] = 0;
+ /* initialization */
+ if(inited == 0)
+ {
+
+#line 11 "crypt.gaa"
+{ gaaval->username=NULL; gaaval->passwd=NULL; ;};
+
+ }
+ inited = 1;
+#line 438 "gaa.skel"
+ gaa_arg_used = malloc(argc * sizeof(char));
+ for(i = 1; i < argc; i++)
+ gaa_arg_used[i] = 0;
+ for(i = 1; i < argc; i++)
+ {
+ if(gaa_arg_used[i] == 0)
+ {
+ j = 0;
+ tmp1 = gaa_is_an_argument(GAAargv[i]);
+ switch(tmp1)
+ {
+ case GAA_WORD_OPTION:
+ j++;
+ case GAA_LETTER_OPTION:
+ j++;
+ tmp2 = gaa_get_option_num(argv[i]+j, tmp1);
+ if(tmp2 == GAA_ERROR_NOMATCH)
+ {
+ printf("Invalid option '%s'\n", argv[i]+j);
+ return 0;
+ }
+ switch(gaa_try(tmp2, i+1, gaaval, opt_list))
+ {
+ case GAA_ERROR_NOTENOUGH_ARGS:
+ printf("'%s' : not enough arguments\n",gaa_current_option);
+ return 0;
+ case GAA_ERROR_INVALID_ARG:
+ printf("Invalid arguments\n");
+ return 0;
+ case GAA_OK:
+ break;
+ default:
+ printf("Unknown error\n");
+ }
+ gaa_arg_used[i] = 1;
+ break;
+ case GAA_MULTIPLE_OPTION:
+ for(j = 1; j < strlen(argv[i]); j++)
+ {
+ tmp2 = gaa_get_option_num(argv[i]+j, tmp1);
+ if(tmp2 == GAA_ERROR_NOMATCH)
+ {
+ printf("Invalid option '%c'\n", *(argv[i]+j));
+ return 0;
+ }
+ switch(gaa_try(tmp2, i+1, gaaval, opt_list))
+ {
+ case GAA_ERROR_NOTENOUGH_ARGS:
+ printf("'%s' : not enough arguments\n",gaa_current_option);
+ return 0;
+ case GAA_ERROR_INVALID_ARG:
+ printf("Invalid arguments\n");
+ return 0;
+ case GAA_OK:
+ break;
+ default:
+ printf("Unknown error\n");
+ }
+ }
+ gaa_arg_used[i] = 1;
+ break;
+ default: break;
+ }
+ }
+ }
+if(gaa_processing_file == 0)
+{
+ GAA_OBLIGAT("u");
+
+#line 507 "gaa.skel"
+#ifdef GAA_REST_EXISTS
+ switch(gaa_try(GAA_REST, 1, gaaval, opt_list))
+ {
+ case GAA_ERROR_NOTENOUGH_ARGS:
+ printf("Rest : not enough arguments\n");
+ return 0;
+ case GAA_ERROR_INVALID_ARG:
+ printf("Invalid arguments\n");
+ return 0;
+ case GAA_OK:
+ break;
+ default:
+ printf("Unknown error\n");
+ }
+#endif
+}
+ for(i = 1; i < argc; i++)
+ {
+ if(gaa_arg_used[i] == 0)
+ {
+ printf("Too many arguments\n");
+ return 0;
+ }
+ }
+ free(gaa_arg_used);
+ free(opt_list);
+ return -1;
+}
+
+struct gaastrnode
+{
+ char *str;
+ struct gaastrnode *next;
+};
+
+typedef struct gaastrnode gaa_str_node;
+
+int gaa_internal_get_next_str(FILE *file, gaa_str_node *tmp_str, int argc)
+{
+ int pos_ini;
+ char a;
+ int i = 0, len = 0, newline = 0;
+
+ if(argc == 1)
+ newline = 1;
+
+ if(fscanf(file,"%c", &a) != 1) return 0;
+
+ while(a == ' ' || a == 9 || a == '\n')
+ {
+ if(a == '\n')
+ {
+ newline=1;
+ len = 2;
+ }
+ if(fscanf(file,"%c", &a) != 1) return 0;
+ }
+
+ pos_ini = ftell(file) - 1;
+
+ while(a != ' ' && a != 9 && a != '\n')
+ {
+
+ len++;
+ if(fscanf(file,"%c", &a) != 1) a = ' ';
+ }
+
+ tmp_str->str = malloc((len + 1) * sizeof(char));
+ if(newline == 1)
+ {
+ tmp_str->str[0] = '-';
+ tmp_str->str[1] = '-';
+ i = 2;
+ }
+ else
+ {
+ i = 0;
+ }
+
+ fseek(file,pos_ini, SEEK_SET);
+ do
+ {
+ if(fscanf(file, "%c", &a) != 1)
+ {
+ i+=2;
+ break;
+ }
+ tmp_str->str[i] = a;
+ i++;
+ }
+ while(a != ' ' && a != 9 && a != '\n');
+
+ tmp_str->str[i - 1] = 0;
+
+ fseek(file,- 1, SEEK_CUR);
+
+ return -1;
+}
+
+int gaa_file(char *name, gaainfo *gaaval)
+{
+ gaa_str_node *first_str, **tmp_str, *tmp_str2;
+ int rval, i;
+ char **argv;
+ int argc = 0;
+ FILE *file;
+
+ gaa_processing_file = 1;
+
+ if((file = fopen(name, "r")) == NULL)
+ {
+ printf("Couldn't open '%s' configuration file for reading\n", name);
+ return 0;
+ }
+
+ tmp_str = &first_str;
+ do
+ {
+ argc++;
+ *tmp_str = malloc(sizeof(gaa_str_node));
+ (*tmp_str)->str = NULL;
+ (*tmp_str)->next = NULL;
+
+ rval = gaa_internal_get_next_str(file, *tmp_str, argc);
+ tmp_str = &((*tmp_str)->next);
+ }
+ while(rval == -1);
+
+ if(rval == 1)
+ return 0;
+
+ argv = malloc((1 + argc) * sizeof(char*));
+ tmp_str2 = first_str;
+ argv[0] = "cfg";
+ for(i = 1; i < argc; i++)
+ {
+ argv[i] = tmp_str2->str;
+ tmp_str2 = tmp_str2->next;
+ }
+
+ rval = gaa(argc, argv, gaaval);
+ gaa_processing_file = 0;
+ return rval;
+}