VirtualBox

source: vbox/trunk/include/iprt/crypto/shacrypt.h

Last change on this file was 106061, checked in by vboxsync, 2 months ago

Copyright year updates by scm.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 11.5 KB
Line 
1/** @file
2 * IPRT - Crypto - SHA-crypt.
3 */
4
5/*
6 * Copyright (C) 2023-2024 Oracle and/or its affiliates.
7 *
8 * This file is part of VirtualBox base platform packages, as
9 * available from https://www.virtualbox.org.
10 *
11 * This program is free software; you can redistribute it and/or
12 * modify it under the terms of the GNU General Public License
13 * as published by the Free Software Foundation, in version 3 of the
14 * License.
15 *
16 * This program is distributed in the hope that it will be useful, but
17 * WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
19 * General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, see <https://www.gnu.org/licenses>.
23 *
24 * The contents of this file may alternatively be used under the terms
25 * of the Common Development and Distribution License Version 1.0
26 * (CDDL), a copy of it is provided in the "COPYING.CDDL" file included
27 * in the VirtualBox distribution, in which case the provisions of the
28 * CDDL are applicable instead of those of the GPL.
29 *
30 * You may elect to license modified versions of this file under the
31 * terms and conditions of either the GPL or the CDDL or both.
32 *
33 * SPDX-License-Identifier: GPL-3.0-only OR CDDL-1.0
34 */
35
36#ifndef IPRT_INCLUDED_crypto_shacrypt_h
37#define IPRT_INCLUDED_crypto_shacrypt_h
38#ifndef RT_WITHOUT_PRAGMA_ONCE
39# pragma once
40#endif
41
42#include <iprt/sha.h>
43
44
45RT_C_DECLS_BEGIN
46
47/** @defgroup grp_rt_crshacrypt RTCrShaCrypt - SHA-crypt
48 * @ingroup grp_rt_crypto
49 *
50 * This implements SHA-crypt.txt v0.6 (2016-08-31), which is a scheme to encrypt
51 * passwords using SHA-256 and SHA-512.
52 *
53 * @{
54 */
55
56/** Minimum salt string length for SHA-crypt (inclusive). */
57#define RT_SHACRYPT_SALT_MIN_LEN 8
58/** Maximum salt string length for SHA-crypt (inclusive). */
59#define RT_SHACRYPT_SALT_MAX_LEN 16
60
61
62/** Minimum number of rounds for SHA-crypt (inclusive). */
63#define RT_SHACRYPT_ROUNDS_MIN 1000
64/** Default number of rounds for SHA-crypt. */
65#define RT_SHACRYPT_ROUNDS_DEFAULT 5000
66/** Maximum number of rounds for SHA-crypt (inclusive). */
67#define RT_SHACRYPT_ROUNDS_MAX 999999999
68
69
70/** The maximum string length of a password encrypted with SHA-256
71 * (including the terminator). */
72#define RT_SHACRYPT_256_MAX_SIZE 80
73/** The maximum string length of a password encrypted with SHA-512.
74 * (including the terminator). */
75#define RT_SHACRYPT_512_MAX_SIZE 123
76
77
78/** The extended password '$ID$' part for SHA-256 encrypted passwords. */
79#define RT_SHACRYPT_ID_STR_256 "$5$"
80/** The extended password '$ID$' part for SHA-512 encrypted passwords. */
81#define RT_SHACRYPT_ID_STR_512 "$6$"
82
83
84/**
85 * Creates a randomized salt for the RTCrShaCryptXXX functions.
86 *
87 * @returns IPRT status code.
88 * @param pszSalt Where to return the generated salt string.
89 * @param cchSalt The length of the salt to generate. The buffer size is
90 * this value plus 1 (for the terminator character)!
91 *
92 * Must be in the range RT_SHACRYPT_MIN_SALT_LEN to
93 * RT_SHACRYPT_MAX_SALT_LEN (both inclusive).
94 *
95 * @warning Be very careful with the @a cchSalt parameter, as it must be at
96 * least one less than the actual buffer size!
97 */
98RTDECL(int) RTCrShaCryptGenerateSalt(char *pszSalt, size_t cchSalt);
99
100/**
101 * Encrypts @a pszPhrase using SHA-256, @a pszSalt and @a cRounds.
102 *
103 * @returns IPRT status code.
104 * @param pszPhrase The passphrase (password) to encrypt.
105 * @param pszSalt Salt to use. This can either be a pure salt, like from
106 * RTCrShaCryptGenerateSalt(), or a 'password' string as
107 * generated by RTCrShaCrypt256ToString().
108 *
109 * The latter allows for easy password validation by
110 * comparing the encrypted string with the one stored in
111 * the passwd file.
112 *
113 * The length of the actual salt portion of the string must
114 * be within RT_SHACRYPT_MIN_SALT_LEN to
115 * RT_SHACRYPT_MAX_SALT_LEN, both inclusive.
116 *
117 * @param cRounds Number of rounds to use, must be in the range
118 * RT_SHACRYPT_ROUNDS_MIN thru RT_SHACRYPT_ROUNDS_MAX.
119 * If unsure, use RT_SHACRYPT_ROUNDS_DEFAULT. This is
120 * ignored if the salt includes a 'rounds=xxx$' part.
121 * @param pszString Where to store the string on success.
122 * @param cbString The size of the buffer pointed to by @a pszString.
123 *
124 * The minimum length is 3 + salt + 1 + 43 + zero
125 * terminator. If a non-default @a cRounds value is used,
126 * add 8 + strlen(cRounds as decimal). The max buffer
127 * needed is 80 bytes (RT_SHACRYPT_256_MAX_SIZE).
128 */
129RTDECL(int) RTCrShaCrypt256(const char *pszPhrase, const char *pszSalt, uint32_t cRounds, char *pszString, size_t cbString);
130
131/**
132 * Encrypts @a pszPhrase using SHA-512, @a pszSalt and @a cRounds.
133 *
134 * @returns IPRT status code.
135 * @param pszPhrase The passphrase (password) to encrypt.
136 * @param pszSalt Salt to use. This can either be a pure salt, like from
137 * RTCrShaCryptGenerateSalt(), or a 'password' string as
138 * generated by RTCrShaCrypt512ToString().
139 *
140 * The latter allows for easy password validation by
141 * comparing the encrypted string with the one stored in
142 * the passwd file.
143 *
144 * The length of the actual salt portion of the string must
145 * be within RT_SHACRYPT_MIN_SALT_LEN to
146 * RT_SHACRYPT_MAX_SALT_LEN, both inclusive.
147 *
148 * @param cRounds Number of rounds to use, must be in the range
149 * RT_SHACRYPT_ROUNDS_MIN thru RT_SHACRYPT_ROUNDS_MAX.
150 * If unsure, use RT_SHACRYPT_ROUNDS_DEFAULT. This is
151 * ignored if the salt includes a 'rounds=xxx$' part.
152 * @param pszString Where to store the string on success.
153 * @param cbString The size of the buffer pointed to by @a pszString.
154 *
155 * The minimum length is 3 + salt + 1 + 86 + zero
156 * terminator. If a non-default @a cRounds value is used,
157 * add 8 + strlen(cRounds as decimal). The max buffer
158 * needed is 123 bytes (RT_SHACRYPT_512_MAX_SIZE).
159 */
160RTDECL(int) RTCrShaCrypt512(const char *pszPhrase, const char *pszSalt, uint32_t cRounds, char *pszString, size_t cbString);
161
162
163
164/**
165 * Encrypts @a pszPhrase using SHA-256, @a pszSalt and @a cRounds, returning raw
166 * bytes.
167 *
168 * @returns IPRT status code.
169 * @param pszPhrase The passphrase (password) to encrypt.
170 * @param pszSalt Salt to use. This can either be a pure salt, like from
171 * RTCrShaCryptGenerateSalt(), or a 'password' string as
172 * generated by RTCrShaCrypt256ToString().
173 *
174 * The latter allows for easy password validation by
175 * comparing the encrypted string with the one stored in
176 * the passwd file.
177 *
178 * The length of the actual salt portion of the string must
179 * be within RT_SHACRYPT_MIN_SALT_LEN to
180 * RT_SHACRYPT_MAX_SALT_LEN, both inclusive.
181 *
182 * @param cRounds Number of rounds to use, must be in the range
183 * RT_SHACRYPT_ROUNDS_MIN thru RT_SHACRYPT_ROUNDS_MAX.
184 * If unsure, use RT_SHACRYPT_ROUNDS_DEFAULT. This is
185 * ignored if the salt includes a 'rounds=xxx$' part.
186 * @param pabHash Where to return the hash on success.
187 * @see RTCrShaCrypt256, RTCrShaCrypt256ToString
188 */
189RTDECL(int) RTCrShaCrypt256Ex(const char *pszPhrase, const char *pszSalt, uint32_t cRounds, uint8_t pabHash[RTSHA256_HASH_SIZE]);
190
191
192/**
193 * Encrypts @a pszPhrase using SHA-512, @a pszSalt and @a cRounds, returning raw
194 * bytes.
195 *
196 * @returns IPRT status code.
197 * @param pszPhrase The passphrase (password) to encrypt.
198 * @param pszSalt Salt to use. This can either be a pure salt, like from
199 * RTCrShaCryptGenerateSalt(), or a 'password' string as
200 * generated by RTCrShaCrypt512ToString().
201 *
202 * The latter allows for easy password validation by
203 * comparing the encrypted string with the one stored in
204 * the passwd file.
205 *
206 * The length of the actual salt portion of the string must
207 * be within RT_SHACRYPT_MIN_SALT_LEN to
208 * RT_SHACRYPT_MAX_SALT_LEN, both inclusive.
209 *
210 * @param cRounds Number of rounds to use, must be in the range
211 * RT_SHACRYPT_ROUNDS_MIN thru RT_SHACRYPT_ROUNDS_MAX.
212 * If unsure, use RT_SHACRYPT_ROUNDS_DEFAULT. This is
213 * ignored if the salt includes a 'rounds=xxx$' part.
214 * @param pabHash Where to return the hash on success.
215 * @see RTCrShaCrypt512, RTCrShaCrypt512ToString
216 */
217RTDECL(int) RTCrShaCrypt512Ex(const char *pszPhrase, const char *pszSalt, uint32_t cRounds, uint8_t pabHash[RTSHA512_HASH_SIZE]);
218
219/**
220 * Formats the RTCrShaCrypt256Ex() result and non-secret inputs using the
221 * extended password format.
222 *
223 * @returns IPRT status code.
224 * @param pabHash The result from RTCrShaCrypt256().
225 * @param pszSalt The salt used when producing @a pabHash.
226 * @param cRounds Number of rounds used for producing @a pabHash.
227 * @param pszString Where to store the string on success.
228 * @param cbString The size of the buffer pointed to by @a pszString.
229 *
230 * The minimum length is 3 + salt + 1 + 43 + zero
231 * terminator. If a non-default @a cRounds value is used,
232 * add 8 + strlen(cRounds as decimal). The max buffer
233 * needed is 80 bytes (RT_SHACRYPT_256_MAX_SIZE).
234 *
235 * @note This implements step 22 of SHA-crypt.txt v0.6.
236 * @see RTCrShaCrypt256Ex
237 */
238RTDECL(int) RTCrShaCrypt256ToString(uint8_t const pabHash[RTSHA256_HASH_SIZE], const char *pszSalt, uint32_t cRounds,
239 char *pszString, size_t cbString);
240
241/**
242 * Formats the RTCrShaCrypt512Ex() result and non-secret inputs using the
243 * extended password format.
244 *
245 * @returns IPRT status code.
246 * @param pabHash The result from RTCrShaCrypt512().
247 * @param pszSalt The salt used when producing @a pabHash.
248 * @param cRounds Number of rounds used for producing @a pabHash.
249 * @param pszString Where to store the string on success.
250 * @param cbString The size of the buffer pointed to by @a pszString.
251 *
252 * The minimum length is 3 + salt + 1 + 86 + zero
253 * terminator. If a non-default @a cRounds value is used,
254 * add 8 + strlen(cRounds as decimal). The max buffer
255 * needed is 123 bytes (RT_SHACRYPT_512_MAX_SIZE).
256 *
257 * @note This implements step 22 of SHA-crypt.txt v0.6.
258 * @see RTCrShaCrypt512Ex
259 */
260RTDECL(int) RTCrShaCrypt512ToString(uint8_t const pabHash[RTSHA512_HASH_SIZE], const char *pszSalt, uint32_t cRounds,
261 char *pszString, size_t cbString);
262
263/** @} */
264
265RT_C_DECLS_END
266
267#endif /* !IPRT_INCLUDED_crypto_shacrypt_h */
268
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette