Initial import
这个提交包含在:
		
							
								
								
									
										339
									
								
								COPYING
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										339
									
								
								COPYING
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,339 @@
 | 
			
		||||
                    GNU GENERAL PUBLIC LICENSE
 | 
			
		||||
                       Version 2, June 1991
 | 
			
		||||
 | 
			
		||||
 Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
 | 
			
		||||
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
 | 
			
		||||
 Everyone is permitted to copy and distribute verbatim copies
 | 
			
		||||
 of this license document, but changing it is not allowed.
 | 
			
		||||
 | 
			
		||||
                            Preamble
 | 
			
		||||
 | 
			
		||||
  The licenses for most software are designed to take away your
 | 
			
		||||
freedom to share and change it.  By contrast, the GNU General Public
 | 
			
		||||
License is intended to guarantee your freedom to share and change free
 | 
			
		||||
software--to make sure the software is free for all its users.  This
 | 
			
		||||
General Public License applies to most of the Free Software
 | 
			
		||||
Foundation's software and to any other program whose authors commit to
 | 
			
		||||
using it.  (Some other Free Software Foundation software is covered by
 | 
			
		||||
the GNU Lesser General Public License instead.)  You can apply it to
 | 
			
		||||
your programs, too.
 | 
			
		||||
 | 
			
		||||
  When we speak of free software, we are referring to freedom, not
 | 
			
		||||
price.  Our General Public Licenses are designed to make sure that you
 | 
			
		||||
have the freedom to distribute copies of free software (and charge for
 | 
			
		||||
this service if you wish), that you receive source code or can get it
 | 
			
		||||
if you want it, that you can change the software or use pieces of it
 | 
			
		||||
in new free programs; and that you know you can do these things.
 | 
			
		||||
 | 
			
		||||
  To protect your rights, we need to make restrictions that forbid
 | 
			
		||||
anyone to deny you these rights or to ask you to surrender the rights.
 | 
			
		||||
These restrictions translate to certain responsibilities for you if you
 | 
			
		||||
distribute copies of the software, or if you modify it.
 | 
			
		||||
 | 
			
		||||
  For example, if you distribute copies of such a program, whether
 | 
			
		||||
gratis or for a fee, you must give the recipients all the rights that
 | 
			
		||||
you have.  You must make sure that they, too, receive or can get the
 | 
			
		||||
source code.  And you must show them these terms so they know their
 | 
			
		||||
rights.
 | 
			
		||||
 | 
			
		||||
  We protect your rights with two steps: (1) copyright the software, and
 | 
			
		||||
(2) offer you this license which gives you legal permission to copy,
 | 
			
		||||
distribute and/or modify the software.
 | 
			
		||||
 | 
			
		||||
  Also, for each author's protection and ours, we want to make certain
 | 
			
		||||
that everyone understands that there is no warranty for this free
 | 
			
		||||
software.  If the software is modified by someone else and passed on, we
 | 
			
		||||
want its recipients to know that what they have is not the original, so
 | 
			
		||||
that any problems introduced by others will not reflect on the original
 | 
			
		||||
authors' reputations.
 | 
			
		||||
 | 
			
		||||
  Finally, any free program is threatened constantly by software
 | 
			
		||||
patents.  We wish to avoid the danger that redistributors of a free
 | 
			
		||||
program will individually obtain patent licenses, in effect making the
 | 
			
		||||
program proprietary.  To prevent this, we have made it clear that any
 | 
			
		||||
patent must be licensed for everyone's free use or not licensed at all.
 | 
			
		||||
 | 
			
		||||
  The precise terms and conditions for copying, distribution and
 | 
			
		||||
modification follow.
 | 
			
		||||
 | 
			
		||||
                    GNU GENERAL PUBLIC LICENSE
 | 
			
		||||
   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
 | 
			
		||||
 | 
			
		||||
  0. This License applies to any program or other work which contains
 | 
			
		||||
a notice placed by the copyright holder saying it may be distributed
 | 
			
		||||
under the terms of this General Public License.  The "Program", below,
 | 
			
		||||
refers to any such program or work, and a "work based on the Program"
 | 
			
		||||
means either the Program or any derivative work under copyright law:
 | 
			
		||||
that is to say, a work containing the Program or a portion of it,
 | 
			
		||||
either verbatim or with modifications and/or translated into another
 | 
			
		||||
language.  (Hereinafter, translation is included without limitation in
 | 
			
		||||
the term "modification".)  Each licensee is addressed as "you".
 | 
			
		||||
 | 
			
		||||
Activities other than copying, distribution and modification are not
 | 
			
		||||
covered by this License; they are outside its scope.  The act of
 | 
			
		||||
running the Program is not restricted, and the output from the Program
 | 
			
		||||
is covered only if its contents constitute a work based on the
 | 
			
		||||
Program (independent of having been made by running the Program).
 | 
			
		||||
Whether that is true depends on what the Program does.
 | 
			
		||||
 | 
			
		||||
  1. You may copy and distribute verbatim copies of the Program's
 | 
			
		||||
source code as you receive it, in any medium, provided that you
 | 
			
		||||
conspicuously and appropriately publish on each copy an appropriate
 | 
			
		||||
copyright notice and disclaimer of warranty; keep intact all the
 | 
			
		||||
notices that refer to this License and to the absence of any warranty;
 | 
			
		||||
and give any other recipients of the Program a copy of this License
 | 
			
		||||
along with the Program.
 | 
			
		||||
 | 
			
		||||
You may charge a fee for the physical act of transferring a copy, and
 | 
			
		||||
you may at your option offer warranty protection in exchange for a fee.
 | 
			
		||||
 | 
			
		||||
  2. You may modify your copy or copies of the Program or any portion
 | 
			
		||||
of it, thus forming a work based on the Program, and copy and
 | 
			
		||||
distribute such modifications or work under the terms of Section 1
 | 
			
		||||
above, provided that you also meet all of these conditions:
 | 
			
		||||
 | 
			
		||||
    a) You must cause the modified files to carry prominent notices
 | 
			
		||||
    stating that you changed the files and the date of any change.
 | 
			
		||||
 | 
			
		||||
    b) You must cause any work that you distribute or publish, that in
 | 
			
		||||
    whole or in part contains or is derived from the Program or any
 | 
			
		||||
    part thereof, to be licensed as a whole at no charge to all third
 | 
			
		||||
    parties under the terms of this License.
 | 
			
		||||
 | 
			
		||||
    c) If the modified program normally reads commands interactively
 | 
			
		||||
    when run, you must cause it, when started running for such
 | 
			
		||||
    interactive use in the most ordinary way, to print or display an
 | 
			
		||||
    announcement including an appropriate copyright notice and a
 | 
			
		||||
    notice that there is no warranty (or else, saying that you provide
 | 
			
		||||
    a warranty) and that users may redistribute the program under
 | 
			
		||||
    these conditions, and telling the user how to view a copy of this
 | 
			
		||||
    License.  (Exception: if the Program itself is interactive but
 | 
			
		||||
    does not normally print such an announcement, your work based on
 | 
			
		||||
    the Program is not required to print an announcement.)
 | 
			
		||||
 | 
			
		||||
These requirements apply to the modified work as a whole.  If
 | 
			
		||||
identifiable sections of that work are not derived from the Program,
 | 
			
		||||
and can be reasonably considered independent and separate works in
 | 
			
		||||
themselves, then this License, and its terms, do not apply to those
 | 
			
		||||
sections when you distribute them as separate works.  But when you
 | 
			
		||||
distribute the same sections as part of a whole which is a work based
 | 
			
		||||
on the Program, the distribution of the whole must be on the terms of
 | 
			
		||||
this License, whose permissions for other licensees extend to the
 | 
			
		||||
entire whole, and thus to each and every part regardless of who wrote it.
 | 
			
		||||
 | 
			
		||||
Thus, it is not the intent of this section to claim rights or contest
 | 
			
		||||
your rights to work written entirely by you; rather, the intent is to
 | 
			
		||||
exercise the right to control the distribution of derivative or
 | 
			
		||||
collective works based on the Program.
 | 
			
		||||
 | 
			
		||||
In addition, mere aggregation of another work not based on the Program
 | 
			
		||||
with the Program (or with a work based on the Program) on a volume of
 | 
			
		||||
a storage or distribution medium does not bring the other work under
 | 
			
		||||
the scope of this License.
 | 
			
		||||
 | 
			
		||||
  3. You may copy and distribute the Program (or a work based on it,
 | 
			
		||||
under Section 2) in object code or executable form under the terms of
 | 
			
		||||
Sections 1 and 2 above provided that you also do one of the following:
 | 
			
		||||
 | 
			
		||||
    a) Accompany it with the complete corresponding machine-readable
 | 
			
		||||
    source code, which must be distributed under the terms of Sections
 | 
			
		||||
    1 and 2 above on a medium customarily used for software interchange; or,
 | 
			
		||||
 | 
			
		||||
    b) Accompany it with a written offer, valid for at least three
 | 
			
		||||
    years, to give any third party, for a charge no more than your
 | 
			
		||||
    cost of physically performing source distribution, a complete
 | 
			
		||||
    machine-readable copy of the corresponding source code, to be
 | 
			
		||||
    distributed under the terms of Sections 1 and 2 above on a medium
 | 
			
		||||
    customarily used for software interchange; or,
 | 
			
		||||
 | 
			
		||||
    c) Accompany it with the information you received as to the offer
 | 
			
		||||
    to distribute corresponding source code.  (This alternative is
 | 
			
		||||
    allowed only for noncommercial distribution and only if you
 | 
			
		||||
    received the program in object code or executable form with such
 | 
			
		||||
    an offer, in accord with Subsection b above.)
 | 
			
		||||
 | 
			
		||||
The source code for a work means the preferred form of the work for
 | 
			
		||||
making modifications to it.  For an executable work, complete source
 | 
			
		||||
code means all the source code for all modules it contains, plus any
 | 
			
		||||
associated interface definition files, plus the scripts used to
 | 
			
		||||
control compilation and installation of the executable.  However, as a
 | 
			
		||||
special exception, the source code distributed need not include
 | 
			
		||||
anything that is normally distributed (in either source or binary
 | 
			
		||||
form) with the major components (compiler, kernel, and so on) of the
 | 
			
		||||
operating system on which the executable runs, unless that component
 | 
			
		||||
itself accompanies the executable.
 | 
			
		||||
 | 
			
		||||
If distribution of executable or object code is made by offering
 | 
			
		||||
access to copy from a designated place, then offering equivalent
 | 
			
		||||
access to copy the source code from the same place counts as
 | 
			
		||||
distribution of the source code, even though third parties are not
 | 
			
		||||
compelled to copy the source along with the object code.
 | 
			
		||||
 | 
			
		||||
  4. You may not copy, modify, sublicense, or distribute the Program
 | 
			
		||||
except as expressly provided under this License.  Any attempt
 | 
			
		||||
otherwise to copy, modify, sublicense or distribute the Program is
 | 
			
		||||
void, and will automatically terminate your rights under this License.
 | 
			
		||||
However, parties who have received copies, or rights, from you under
 | 
			
		||||
this License will not have their licenses terminated so long as such
 | 
			
		||||
parties remain in full compliance.
 | 
			
		||||
 | 
			
		||||
  5. You are not required to accept this License, since you have not
 | 
			
		||||
signed it.  However, nothing else grants you permission to modify or
 | 
			
		||||
distribute the Program or its derivative works.  These actions are
 | 
			
		||||
prohibited by law if you do not accept this License.  Therefore, by
 | 
			
		||||
modifying or distributing the Program (or any work based on the
 | 
			
		||||
Program), you indicate your acceptance of this License to do so, and
 | 
			
		||||
all its terms and conditions for copying, distributing or modifying
 | 
			
		||||
the Program or works based on it.
 | 
			
		||||
 | 
			
		||||
  6. Each time you redistribute the Program (or any work based on the
 | 
			
		||||
Program), the recipient automatically receives a license from the
 | 
			
		||||
original licensor to copy, distribute or modify the Program subject to
 | 
			
		||||
these terms and conditions.  You may not impose any further
 | 
			
		||||
restrictions on the recipients' exercise of the rights granted herein.
 | 
			
		||||
You are not responsible for enforcing compliance by third parties to
 | 
			
		||||
this License.
 | 
			
		||||
 | 
			
		||||
  7. If, as a consequence of a court judgment or allegation of patent
 | 
			
		||||
infringement or for any other reason (not limited to patent issues),
 | 
			
		||||
conditions are imposed on you (whether by court order, agreement or
 | 
			
		||||
otherwise) that contradict the conditions of this License, they do not
 | 
			
		||||
excuse you from the conditions of this License.  If you cannot
 | 
			
		||||
distribute so as to satisfy simultaneously your obligations under this
 | 
			
		||||
License and any other pertinent obligations, then as a consequence you
 | 
			
		||||
may not distribute the Program at all.  For example, if a patent
 | 
			
		||||
license would not permit royalty-free redistribution of the Program by
 | 
			
		||||
all those who receive copies directly or indirectly through you, then
 | 
			
		||||
the only way you could satisfy both it and this License would be to
 | 
			
		||||
refrain entirely from distribution of the Program.
 | 
			
		||||
 | 
			
		||||
If any portion of this section is held invalid or unenforceable under
 | 
			
		||||
any particular circumstance, the balance of the section is intended to
 | 
			
		||||
apply and the section as a whole is intended to apply in other
 | 
			
		||||
circumstances.
 | 
			
		||||
 | 
			
		||||
It is not the purpose of this section to induce you to infringe any
 | 
			
		||||
patents or other property right claims or to contest validity of any
 | 
			
		||||
such claims; this section has the sole purpose of protecting the
 | 
			
		||||
integrity of the free software distribution system, which is
 | 
			
		||||
implemented by public license practices.  Many people have made
 | 
			
		||||
generous contributions to the wide range of software distributed
 | 
			
		||||
through that system in reliance on consistent application of that
 | 
			
		||||
system; it is up to the author/donor to decide if he or she is willing
 | 
			
		||||
to distribute software through any other system and a licensee cannot
 | 
			
		||||
impose that choice.
 | 
			
		||||
 | 
			
		||||
This section is intended to make thoroughly clear what is believed to
 | 
			
		||||
be a consequence of the rest of this License.
 | 
			
		||||
 | 
			
		||||
  8. If the distribution and/or use of the Program is restricted in
 | 
			
		||||
certain countries either by patents or by copyrighted interfaces, the
 | 
			
		||||
original copyright holder who places the Program under this License
 | 
			
		||||
may add an explicit geographical distribution limitation excluding
 | 
			
		||||
those countries, so that distribution is permitted only in or among
 | 
			
		||||
countries not thus excluded.  In such case, this License incorporates
 | 
			
		||||
the limitation as if written in the body of this License.
 | 
			
		||||
 | 
			
		||||
  9. The Free Software Foundation may publish revised and/or new versions
 | 
			
		||||
of the General Public License from time to time.  Such new versions will
 | 
			
		||||
be similar in spirit to the present version, but may differ in detail to
 | 
			
		||||
address new problems or concerns.
 | 
			
		||||
 | 
			
		||||
Each version is given a distinguishing version number.  If the Program
 | 
			
		||||
specifies a version number of this License which applies to it and "any
 | 
			
		||||
later version", you have the option of following the terms and conditions
 | 
			
		||||
either of that version or of any later version published by the Free
 | 
			
		||||
Software Foundation.  If the Program does not specify a version number of
 | 
			
		||||
this License, you may choose any version ever published by the Free Software
 | 
			
		||||
Foundation.
 | 
			
		||||
 | 
			
		||||
  10. If you wish to incorporate parts of the Program into other free
 | 
			
		||||
programs whose distribution conditions are different, write to the author
 | 
			
		||||
to ask for permission.  For software which is copyrighted by the Free
 | 
			
		||||
Software Foundation, write to the Free Software Foundation; we sometimes
 | 
			
		||||
make exceptions for this.  Our decision will be guided by the two goals
 | 
			
		||||
of preserving the free status of all derivatives of our free software and
 | 
			
		||||
of promoting the sharing and reuse of software generally.
 | 
			
		||||
 | 
			
		||||
                            NO WARRANTY
 | 
			
		||||
 | 
			
		||||
  11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
 | 
			
		||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
 | 
			
		||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
 | 
			
		||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
 | 
			
		||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 | 
			
		||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
 | 
			
		||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
 | 
			
		||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
 | 
			
		||||
REPAIR OR CORRECTION.
 | 
			
		||||
 | 
			
		||||
  12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
 | 
			
		||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
 | 
			
		||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
 | 
			
		||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
 | 
			
		||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
 | 
			
		||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
 | 
			
		||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
 | 
			
		||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
 | 
			
		||||
POSSIBILITY OF SUCH DAMAGES.
 | 
			
		||||
 | 
			
		||||
                     END OF TERMS AND CONDITIONS
 | 
			
		||||
 | 
			
		||||
            How to Apply These Terms to Your New Programs
 | 
			
		||||
 | 
			
		||||
  If you develop a new program, and you want it to be of the greatest
 | 
			
		||||
possible use to the public, the best way to achieve this is to make it
 | 
			
		||||
free software which everyone can redistribute and change under these terms.
 | 
			
		||||
 | 
			
		||||
  To do so, attach the following notices to the program.  It is safest
 | 
			
		||||
to attach them to the start of each source file to most effectively
 | 
			
		||||
convey the exclusion of warranty; and each file should have at least
 | 
			
		||||
the "copyright" line and a pointer to where the full notice is found.
 | 
			
		||||
 | 
			
		||||
    <one line to give the program's name and a brief idea of what it does.>
 | 
			
		||||
    Copyright (C) <year>  <name of author>
 | 
			
		||||
 | 
			
		||||
    This program is free software; you can redistribute it and/or modify
 | 
			
		||||
    it under the terms of the GNU General Public License as published by
 | 
			
		||||
    the Free Software Foundation; either version 2 of the License, or
 | 
			
		||||
    (at your option) any later version.
 | 
			
		||||
 | 
			
		||||
    This program is distributed in the hope that it will be useful,
 | 
			
		||||
    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
    GNU General Public License for more details.
 | 
			
		||||
 | 
			
		||||
    You should have received a copy of the GNU General Public License along
 | 
			
		||||
    with this program; if not, write to the Free Software Foundation, Inc.,
 | 
			
		||||
    51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 | 
			
		||||
 | 
			
		||||
Also add information on how to contact you by electronic and paper mail.
 | 
			
		||||
 | 
			
		||||
If the program is interactive, make it output a short notice like this
 | 
			
		||||
when it starts in an interactive mode:
 | 
			
		||||
 | 
			
		||||
    Gnomovision version 69, Copyright (C) year name of author
 | 
			
		||||
    Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
 | 
			
		||||
    This is free software, and you are welcome to redistribute it
 | 
			
		||||
    under certain conditions; type `show c' for details.
 | 
			
		||||
 | 
			
		||||
The hypothetical commands `show w' and `show c' should show the appropriate
 | 
			
		||||
parts of the General Public License.  Of course, the commands you use may
 | 
			
		||||
be called something other than `show w' and `show c'; they could even be
 | 
			
		||||
mouse-clicks or menu items--whatever suits your program.
 | 
			
		||||
 | 
			
		||||
You should also get your employer (if you work as a programmer) or your
 | 
			
		||||
school, if any, to sign a "copyright disclaimer" for the program, if
 | 
			
		||||
necessary.  Here is a sample; alter the names:
 | 
			
		||||
 | 
			
		||||
  Yoyodyne, Inc., hereby disclaims all copyright interest in the program
 | 
			
		||||
  `Gnomovision' (which makes passes at compilers) written by James Hacker.
 | 
			
		||||
 | 
			
		||||
  <signature of Ty Coon>, 1 April 1989
 | 
			
		||||
  Ty Coon, President of Vice
 | 
			
		||||
 | 
			
		||||
This General Public License does not permit incorporating your program into
 | 
			
		||||
proprietary programs.  If your program is a subroutine library, you may
 | 
			
		||||
consider it more useful to permit linking proprietary applications with the
 | 
			
		||||
library.  If this is what you want to do, use the GNU Lesser General
 | 
			
		||||
Public License instead of this License.
 | 
			
		||||
							
								
								
									
										30
									
								
								Makefile
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										30
									
								
								Makefile
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,30 @@
 | 
			
		||||
CC =		gcc
 | 
			
		||||
CFLAGS =	-O2 -s -D_GNU_SOURCE
 | 
			
		||||
LDLIBS =	-lcrypt
 | 
			
		||||
PREFIX =
 | 
			
		||||
BINDIR =	$(PREFIX)/usr/sbin
 | 
			
		||||
 | 
			
		||||
all: sessmgr
 | 
			
		||||
	@echo "All done!"
 | 
			
		||||
 | 
			
		||||
sessmgr: sessmgr.o sha256.o
 | 
			
		||||
	$(CC) $(CFLAGS) $(LDLIBS) sessmgr.o sha256.o -o sessmgr
 | 
			
		||||
 | 
			
		||||
sessmgr.o: sessmgr.c
 | 
			
		||||
	$(CC) $(CFLAGS) -c sessmgr.c
 | 
			
		||||
 | 
			
		||||
sha256.o: sha256.c
 | 
			
		||||
	$(CC) $(CFLAGS) -c sha256.c
 | 
			
		||||
 | 
			
		||||
install:
 | 
			
		||||
	mkdir -p $(BINDIR)
 | 
			
		||||
	cp sessmgr $(BINDIR)
 | 
			
		||||
	@echo "All done!"
 | 
			
		||||
 | 
			
		||||
uninstall:
 | 
			
		||||
	rm -f $(BINDIR)/sessmgr
 | 
			
		||||
	@echo "All done!"
 | 
			
		||||
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f sessmgr *.o
 | 
			
		||||
	@echo "All done!"
 | 
			
		||||
							
								
								
									
										10
									
								
								README
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										10
									
								
								README
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,10 @@
 | 
			
		||||
Session Manager
 | 
			
		||||
===============
 | 
			
		||||
 | 
			
		||||
SessMgr is a small utility for Kagera Firmware Administrator's WebUI session validation.
 | 
			
		||||
Its task is to check password, validate sessions and authorize administrator access.
 | 
			
		||||
For security reasons, it also saves all success authorization in system logger and allows
 | 
			
		||||
to easily log out from Web Interface.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
It is based on Gargoyle Session Validator <http://www.gargoyle-router.com/>
 | 
			
		||||
							
								
								
									
										317
									
								
								sessmgr.c
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										317
									
								
								sessmgr.c
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,317 @@
 | 
			
		||||
/**
 | 
			
		||||
 * @PROJECT			Session Manager
 | 
			
		||||
 * @COPYRIGHT		See COPYING in the top level directory
 | 
			
		||||
 * @FILE			sessmgr.h
 | 
			
		||||
 * @PURPOSE			WebUI session manager
 | 
			
		||||
 * @DEVELOPERS		Eric Bishop <eric@gargoyle-router.com>
 | 
			
		||||
 *					Rafal Kupiec <belliash@asiotec.eu.org>
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <unistd.h>
 | 
			
		||||
#include <pwd.h>
 | 
			
		||||
#include <stdarg.h>
 | 
			
		||||
#include <time.h>
 | 
			
		||||
 | 
			
		||||
#include "sessmgr.h"
 | 
			
		||||
#include "sha256.h"
 | 
			
		||||
 | 
			
		||||
char* get_cookie_time(time_t t) {
 | 
			
		||||
	struct tm* utc = gmtime(&t);
 | 
			
		||||
	char wday[4];
 | 
			
		||||
	char month[4];
 | 
			
		||||
	switch(utc->tm_wday) {
 | 
			
		||||
		case 0:
 | 
			
		||||
			sprintf(wday, "Sun");
 | 
			
		||||
			break;
 | 
			
		||||
		case 1:
 | 
			
		||||
			sprintf(wday, "Mon");
 | 
			
		||||
			break;
 | 
			
		||||
		case 2:
 | 
			
		||||
			sprintf(wday, "Tue");
 | 
			
		||||
			break;
 | 
			
		||||
		case 3:
 | 
			
		||||
			sprintf(wday, "Wed");
 | 
			
		||||
			break;
 | 
			
		||||
		case 4:
 | 
			
		||||
			sprintf(wday, "Thu");
 | 
			
		||||
			break;
 | 
			
		||||
		case 5:
 | 
			
		||||
			sprintf(wday, "Fri");
 | 
			
		||||
			break;
 | 
			
		||||
		case 6:
 | 
			
		||||
			sprintf(wday, "Sat");
 | 
			
		||||
			break;
 | 
			
		||||
		}
 | 
			
		||||
	switch(utc->tm_mon) {
 | 
			
		||||
		case 0:
 | 
			
		||||
			sprintf(month, "Jan");
 | 
			
		||||
			break;
 | 
			
		||||
		case 1:
 | 
			
		||||
			sprintf(month, "Feb");
 | 
			
		||||
			break;
 | 
			
		||||
		case 2:
 | 
			
		||||
			sprintf(month, "Mar");
 | 
			
		||||
			break;
 | 
			
		||||
		case 3:
 | 
			
		||||
			sprintf(month, "Apr");
 | 
			
		||||
			break;
 | 
			
		||||
		case 4:
 | 
			
		||||
			sprintf(month, "May");
 | 
			
		||||
			break;
 | 
			
		||||
		case 5:
 | 
			
		||||
			sprintf(month, "Jun");
 | 
			
		||||
			break;
 | 
			
		||||
		case 6:
 | 
			
		||||
			sprintf(month, "Jul");
 | 
			
		||||
			break;
 | 
			
		||||
		case 7:
 | 
			
		||||
			sprintf(month, "Aug");
 | 
			
		||||
			break;
 | 
			
		||||
		case 8:
 | 
			
		||||
			sprintf(month, "Sep");
 | 
			
		||||
			break;
 | 
			
		||||
		case 9:
 | 
			
		||||
			sprintf(month, "Oct");
 | 
			
		||||
			break;
 | 
			
		||||
		case 10:
 | 
			
		||||
			sprintf(month, "Nov");
 | 
			
		||||
			break;
 | 
			
		||||
		case 11:
 | 
			
		||||
			sprintf(month, "Dec");
 | 
			
		||||
			break;
 | 
			
		||||
	}
 | 
			
		||||
	char utc_str[200];
 | 
			
		||||
	sprintf(utc_str, "%s, %d %s %d %02d:%02d:%02d UTC", wday, utc->tm_mday, month, (utc->tm_year + 1900), utc->tm_hour, utc->tm_min, utc->tm_sec);
 | 
			
		||||
	return safe_strdup(utc_str);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char* get_root_hash(void) {
 | 
			
		||||
	char* root_hash = get_root_hash_from_file("/etc/shadow");
 | 
			
		||||
	if(root_hash == NULL) {
 | 
			
		||||
		root_hash = get_root_hash_from_file("/etc/passwd");
 | 
			
		||||
	}
 | 
			
		||||
	return root_hash;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char* get_root_hash_from_file(const char* passwd_file) {
 | 
			
		||||
	int found = 0;
 | 
			
		||||
	FILE *pw = fopen(passwd_file, "r");
 | 
			
		||||
	char* root_hash = NULL;
 | 
			
		||||
	if(pw != NULL) {
 | 
			
		||||
		char line[512];
 | 
			
		||||
		char* test = fgets(line, 511, pw);
 | 
			
		||||
		while(test != NULL && !found) {
 | 
			
		||||
			if(strlen(test) > 5) {
 | 
			
		||||
				test[4] = '\0';
 | 
			
		||||
				if(strcmp(test, "root") == 0) {
 | 
			
		||||
					char* hash_end;
 | 
			
		||||
					found = 1;
 | 
			
		||||
					test = test + 5;
 | 
			
		||||
					hash_end = strchr(test, ':');
 | 
			
		||||
					*hash_end = '\0';
 | 
			
		||||
					root_hash = safe_strdup(test);
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
			test = fgets(line, 511, pw);
 | 
			
		||||
		}
 | 
			
		||||
		fclose(pw);
 | 
			
		||||
	}
 | 
			
		||||
	return root_hash;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int main(int argc, char **argv) {
 | 
			
		||||
	char *password = NULL;
 | 
			
		||||
	char *cookie_hash = NULL;
 | 
			
		||||
	char *cookie_exp = NULL;
 | 
			
		||||
	char *user_agent = NULL;
 | 
			
		||||
	char *src_ip = NULL;
 | 
			
		||||
	char *redirect = NULL;
 | 
			
		||||
	int timeout_minutes = DEFAULT_SESSION_TIMEOUT;
 | 
			
		||||
	unsigned long browser_time = 0;
 | 
			
		||||
	int loggedout = 0;
 | 
			
		||||
	int unconditionally_generate = 0;
 | 
			
		||||
	int next_opt;
 | 
			
		||||
	int read;
 | 
			
		||||
 | 
			
		||||
	while((next_opt = getopt(argc, argv, "p:P:c:C:e:E:a:A:i:I:r:R:t:T:b:B:lL:gG")) != -1) {	
 | 
			
		||||
		switch(next_opt) {
 | 
			
		||||
			case 'p':
 | 
			
		||||
			case 'P':
 | 
			
		||||
				password = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 'c':
 | 
			
		||||
			case 'C':
 | 
			
		||||
				cookie_hash = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 'e':
 | 
			
		||||
			case 'E':
 | 
			
		||||
				cookie_exp = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 'a':
 | 
			
		||||
			case 'A':
 | 
			
		||||
				user_agent = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 'i':
 | 
			
		||||
			case 'I':
 | 
			
		||||
				src_ip = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 'r':
 | 
			
		||||
			case 'R':
 | 
			
		||||
				redirect = safe_strdup(optarg);
 | 
			
		||||
				break;
 | 
			
		||||
			case 't':
 | 
			
		||||
			case 'T':
 | 
			
		||||
				read = sscanf(optarg, "%d", &timeout_minutes);
 | 
			
		||||
				if(read > 0) {
 | 
			
		||||
					timeout_minutes = timeout_minutes > 0 ? timeout_minutes : DEFAULT_SESSION_TIMEOUT;
 | 
			
		||||
				} else {
 | 
			
		||||
					timeout_minutes = DEFAULT_SESSION_TIMEOUT;
 | 
			
		||||
				}
 | 
			
		||||
				timeout_minutes *= 60;
 | 
			
		||||
				break;
 | 
			
		||||
			case 'b':
 | 
			
		||||
			case 'B':
 | 
			
		||||
				read = sscanf(optarg, "%ld", &browser_time);
 | 
			
		||||
				browser_time = read > 0 ? browser_time : 0;
 | 
			
		||||
				break;
 | 
			
		||||
			case 'l':
 | 
			
		||||
			case 'L':
 | 
			
		||||
				loggedout = 1;
 | 
			
		||||
				break;
 | 
			
		||||
			case 'g':
 | 
			
		||||
			case 'G':
 | 
			
		||||
				unconditionally_generate = 1;
 | 
			
		||||
				break;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	int expired = 0;
 | 
			
		||||
	int valid = 0;
 | 
			
		||||
	char* root_hash = get_root_hash();
 | 
			
		||||
	if(loggedout == 1) {
 | 
			
		||||
		printf("echo \"Set-Cookie:kagera_sid=loggedout;\"; ");
 | 
			
		||||
	} else if(root_hash != NULL) {
 | 
			
		||||
		time_t now;
 | 
			
		||||
		time(&now);
 | 
			
		||||
		if(password != NULL) {
 | 
			
		||||
			valid = strcmp(crypt(password, root_hash), root_hash) == 0 ? 1 : 0;
 | 
			
		||||
			if(valid) {
 | 
			
		||||
				printf("logger -t webui \"Kagera Administration Interface authorization succeeded from ${REMOTE_ADDR}\"; ");
 | 
			
		||||
			}
 | 
			
		||||
		} else if(cookie_hash != NULL && cookie_exp != NULL && user_agent != NULL && src_ip != NULL) {
 | 
			
		||||
			time_t exp_time;
 | 
			
		||||
			int read = sscanf(cookie_exp, "%ld", &exp_time);
 | 
			
		||||
			if(read > 0) {
 | 
			
		||||
				expired = 1;
 | 
			
		||||
				if(exp_time > now && (exp_time - (timeout_minutes) - 2) <= now) {
 | 
			
		||||
					expired = 0;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
			char *combined = safe_strcat(4, root_hash, cookie_exp, user_agent, src_ip);
 | 
			
		||||
			char* hashed = get_sha256_hash_hex_str(combined);
 | 
			
		||||
			if(strcmp(hashed, cookie_hash) == 0) {
 | 
			
		||||
				if(expired == 0 && read > 0) {
 | 
			
		||||
					valid = 1;
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				expired = 0;
 | 
			
		||||
			}
 | 
			
		||||
			free(hashed);
 | 
			
		||||
			free(combined);
 | 
			
		||||
		}
 | 
			
		||||
		if(unconditionally_generate == 1) {
 | 
			
		||||
			valid = 1;
 | 
			
		||||
		}
 | 
			
		||||
		if(valid == 1 && src_ip != NULL && user_agent != NULL) {
 | 
			
		||||
			char* new_hash;
 | 
			
		||||
			char* combined;
 | 
			
		||||
			char new_exp[100] = "";
 | 
			
		||||
			time_t new_exp_t = now + (timeout_minutes);
 | 
			
		||||
			sprintf(new_exp, "%ld", new_exp_t);
 | 
			
		||||
			char* cookie_exp;
 | 
			
		||||
			if(browser_time > 0 && ((browser_time - now) < (-5*60) || (browser_time - now) > (5*60))) {
 | 
			
		||||
				time_t cookie_exp_t = browser_time+(timeout_minutes);
 | 
			
		||||
				cookie_exp = get_cookie_time(cookie_exp_t);
 | 
			
		||||
			} else {
 | 
			
		||||
				cookie_exp = get_cookie_time(new_exp_t);
 | 
			
		||||
			}
 | 
			
		||||
			combined = safe_strcat(4, root_hash, new_exp, user_agent, src_ip);
 | 
			
		||||
			new_hash = get_sha256_hash_hex_str(combined);
 | 
			
		||||
			if(browser_time == 0) {
 | 
			
		||||
				printf("echo \"Set-Cookie:kagera_sid=%s; Path=/;\"; echo \"Set-Cookie:kagera_exp=%s; Path=/;\"; ", new_hash, new_exp);
 | 
			
		||||
			} else {
 | 
			
		||||
				printf("echo \"Set-Cookie:kagera_sid=%s; Expires=%s; Path=/;\"; echo \"Set-Cookie:kagera_exp=%s; Expires=%s; Path=/;\"; ", new_hash, cookie_exp, new_exp, cookie_exp);
 | 
			
		||||
			}
 | 
			
		||||
			free(new_hash);
 | 
			
		||||
			free(combined);
 | 
			
		||||
			free(cookie_exp);
 | 
			
		||||
		} else {
 | 
			
		||||
			printf("KAGERA_LOGGEDOUT=1\n");
 | 
			
		||||
		}
 | 
			
		||||
		free(root_hash);
 | 
			
		||||
	}
 | 
			
		||||
	if(redirect != NULL) {
 | 
			
		||||
		char str[20] = "";
 | 
			
		||||
		if(expired == 1) {
 | 
			
		||||
			sprintf(str, "&expired=1");
 | 
			
		||||
		} else if(loggedout == 1) {
 | 
			
		||||
			sprintf(str, "&loggedout=1");
 | 
			
		||||
		}
 | 
			
		||||
		printf("echo \"HTTP/1.1 301 Moved Permanently;\"; echo \"Location: %s%s\"; exit", redirect, str);
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void* safe_malloc(size_t size) {
 | 
			
		||||
	void* val = malloc(size);
 | 
			
		||||
	if(val == NULL) {
 | 
			
		||||
		fprintf(stderr, "ERROR: MALLOC FAILURE!\n");
 | 
			
		||||
		exit(1);
 | 
			
		||||
	}
 | 
			
		||||
	return val;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char* safe_strcat(int num_strs, ...) {
 | 
			
		||||
	va_list strs;
 | 
			
		||||
	int new_length = 0;
 | 
			
		||||
	int i;
 | 
			
		||||
	int next_start;
 | 
			
		||||
	char* new_str;
 | 
			
		||||
 | 
			
		||||
	va_start(strs, num_strs);
 | 
			
		||||
	for(i=0; i < num_strs; i++) {
 | 
			
		||||
		char* next_arg = va_arg(strs, char*);
 | 
			
		||||
		if(next_arg != NULL) {
 | 
			
		||||
			new_length = new_length + strlen(next_arg);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	va_end(strs);
 | 
			
		||||
	new_str = safe_malloc((1 + new_length) * sizeof(char));
 | 
			
		||||
	va_start(strs, num_strs);
 | 
			
		||||
	next_start = 0;
 | 
			
		||||
	for(i=0; i < num_strs; i++) {
 | 
			
		||||
		char* next_arg = va_arg(strs, char*);
 | 
			
		||||
		if(next_arg != NULL) {
 | 
			
		||||
			int next_length = strlen(next_arg);
 | 
			
		||||
			memcpy(new_str+next_start,next_arg, next_length);
 | 
			
		||||
			next_start = next_start+next_length;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	new_str[next_start] = '\0';
 | 
			
		||||
	return new_str;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char* safe_strdup(const char* str) {
 | 
			
		||||
	char* new_str = NULL;
 | 
			
		||||
	if(str != NULL) {
 | 
			
		||||
		new_str = strdup(str);
 | 
			
		||||
		if(new_str == NULL) {
 | 
			
		||||
			fprintf(stderr, "ERROR: MALLOC FAILURE!\n");
 | 
			
		||||
			exit(1);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return new_str;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										23
									
								
								sessmgr.h
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										23
									
								
								sessmgr.h
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,23 @@
 | 
			
		||||
/**
 | 
			
		||||
 * @PROJECT			Session Manager
 | 
			
		||||
 * @COPYRIGHT		See COPYING in the top level directory
 | 
			
		||||
 * @FILE			sessmgr.h
 | 
			
		||||
 * @PURPOSE			WebUI session manager
 | 
			
		||||
 * @DEVELOPERS		Eric Bishop <eric@gargoyle-router.com>
 | 
			
		||||
 *					Rafal Kupiec <belliash@asiotec.eu.org>
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef __SESSMGR_H
 | 
			
		||||
#define __SESSMGR_H
 | 
			
		||||
 | 
			
		||||
#define DEFAULT_SESSION_TIMEOUT 15
 | 
			
		||||
 | 
			
		||||
extern char* crypt(const char* key, const char* setting);
 | 
			
		||||
char* get_cookie_time(time_t t);
 | 
			
		||||
char* get_root_hash(void);
 | 
			
		||||
char* get_root_hash_from_file(const char* passwd_file);
 | 
			
		||||
void* safe_malloc(size_t size);
 | 
			
		||||
char* safe_strcat(int num_strs, ...);
 | 
			
		||||
char* safe_strdup(const char* str);
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
							
								
								
									
										180
									
								
								sha256.c
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										180
									
								
								sha256.c
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,180 @@
 | 
			
		||||
/*
 | 
			
		||||
 * sha256.c - Implementation of the Secure Hash Algorithm-256 (SHA-256).
 | 
			
		||||
 *
 | 
			
		||||
 * Implemented from the description on the NIST Web site:
 | 
			
		||||
 *		http://csrc.nist.gov/cryptval/shs.html
 | 
			
		||||
 *
 | 
			
		||||
 *
 | 
			
		||||
 * Copyright (C) 2012  Rafal Kupiec (customized for sessmgr)
 | 
			
		||||
 * Copyright (C) 2009  Eric Bishop (adapted as standalone utility)
 | 
			
		||||
 * Copyright (C) 2002  Southern Storm Software, Pty Ltd.
 | 
			
		||||
 *
 | 
			
		||||
 * This program is free software; you can redistribute it and/or modify
 | 
			
		||||
 * it under the terms of the GNU General Public License as published by
 | 
			
		||||
 * the Free Software Foundation; either version 2 of the License, or
 | 
			
		||||
 * (at your option) any later version.
 | 
			
		||||
 *
 | 
			
		||||
 * This program is distributed in the hope that it will be useful,
 | 
			
		||||
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
 * GNU General Public License for more details.
 | 
			
		||||
 *
 | 
			
		||||
 * You should have received a copy of the GNU General Public License
 | 
			
		||||
 * along with this program; if not, write to the Free Software
 | 
			
		||||
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <ctype.h>
 | 
			
		||||
#include <unistd.h>
 | 
			
		||||
 | 
			
		||||
#include "sha256.h"
 | 
			
		||||
 | 
			
		||||
static void ProcessBlock(SHA256Context *sha, const unsigned char *block) {
 | 
			
		||||
	u_int32_t W[64];
 | 
			
		||||
	u_int32_t a, b, c, d, e, f, g, h;
 | 
			
		||||
	u_int32_t temp, temp2;
 | 
			
		||||
	int t;
 | 
			
		||||
 | 
			
		||||
	for(t = 0; t < 16; ++t) {
 | 
			
		||||
		W[t] = (((u_int32_t) (block[t * 4 + 0])) << 24) | (((u_int32_t) (block[t * 4 + 1])) << 16) | (((u_int32_t) (block[t * 4 + 2])) <<  8) | ((u_int32_t) (block[t * 4 + 3]));
 | 
			
		||||
	}
 | 
			
		||||
	for(t = 16; t < 64; ++t) {
 | 
			
		||||
		W[t] = TRUNCLONG(RHO1(W[t - 2]) + W[t - 7] + RHO0(W[t - 15]) + W[t - 16]);
 | 
			
		||||
	}
 | 
			
		||||
	a = sha->A;
 | 
			
		||||
	b = sha->B;
 | 
			
		||||
	c = sha->C;
 | 
			
		||||
	d = sha->D;
 | 
			
		||||
	e = sha->E;
 | 
			
		||||
	f = sha->F;
 | 
			
		||||
	g = sha->G;
 | 
			
		||||
	h = sha->H;
 | 
			
		||||
	for(t = 0; t < 64; ++t) {
 | 
			
		||||
		temp = TRUNCLONG(h + SUM1(e) + CH(e, f, g) + K[t] + W[t]);
 | 
			
		||||
		temp2 = TRUNCLONG(SUM0(a) + MAJ(a, b, c));
 | 
			
		||||
		h = g;
 | 
			
		||||
		g = f;
 | 
			
		||||
		f = e;
 | 
			
		||||
		e = TRUNCLONG(d + temp);
 | 
			
		||||
		d = c;
 | 
			
		||||
		c = b;
 | 
			
		||||
		b = a;
 | 
			
		||||
		a = TRUNCLONG(temp + temp2);
 | 
			
		||||
	}
 | 
			
		||||
	sha->A = TRUNCLONG(sha->A + a);
 | 
			
		||||
	sha->B = TRUNCLONG(sha->B + b);
 | 
			
		||||
	sha->C = TRUNCLONG(sha->C + c);
 | 
			
		||||
	sha->D = TRUNCLONG(sha->D + d);
 | 
			
		||||
	sha->E = TRUNCLONG(sha->E + e);
 | 
			
		||||
	sha->F = TRUNCLONG(sha->F + f);
 | 
			
		||||
	sha->G = TRUNCLONG(sha->G + g);
 | 
			
		||||
	sha->H = TRUNCLONG(sha->H + h);
 | 
			
		||||
	DoMemZero(W, sizeof(u_int32_t) * 64);
 | 
			
		||||
	a = b = c = d = e = f = g = h = temp = temp2 = 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void SHA256Data(SHA256Context *sha, const void *buffer, unsigned long len) {
 | 
			
		||||
	unsigned long templen;
 | 
			
		||||
 | 
			
		||||
	sha->totalLen += (u_int64_t)len;
 | 
			
		||||
	while(len > 0) {
 | 
			
		||||
		if(!(sha->inputLen) && len >= 64) {
 | 
			
		||||
			ProcessBlock(sha, (const unsigned char *) buffer);
 | 
			
		||||
			buffer = (const void *) (((const unsigned char *) buffer) + 64);
 | 
			
		||||
			len -= 64;
 | 
			
		||||
		} else {
 | 
			
		||||
			templen = len;
 | 
			
		||||
			if(templen > (64 - sha->inputLen)) {
 | 
			
		||||
				templen = 64 - sha->inputLen;
 | 
			
		||||
			}
 | 
			
		||||
			memcpy(sha->input + sha->inputLen, buffer, templen);
 | 
			
		||||
			if((sha->inputLen += templen) >= 64) {
 | 
			
		||||
				ProcessBlock(sha, sha->input);
 | 
			
		||||
				sha->inputLen = 0;
 | 
			
		||||
			}
 | 
			
		||||
			buffer = (const void *) (((const unsigned char *) buffer) + templen);
 | 
			
		||||
			len -= templen;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void SHA256Finalize(SHA256Context *sha, unsigned char hash[SHA256_HASH_SIZE]) {
 | 
			
		||||
	u_int64_t totalBits;
 | 
			
		||||
 | 
			
		||||
	if(hash) {
 | 
			
		||||
		if(sha->inputLen >= 56) {
 | 
			
		||||
			sha->input[(sha->inputLen)++] = (unsigned char) 0x80;
 | 
			
		||||
			while(sha->inputLen < 64) {
 | 
			
		||||
				sha->input[(sha->inputLen)++] = (unsigned char) 0x00;
 | 
			
		||||
			}
 | 
			
		||||
			ProcessBlock(sha, sha->input);
 | 
			
		||||
			sha->inputLen = 0;
 | 
			
		||||
		} else {
 | 
			
		||||
			sha->input[(sha->inputLen)++] = (unsigned char) 0x80;
 | 
			
		||||
		}
 | 
			
		||||
		while(sha->inputLen < 56) {
 | 
			
		||||
			sha->input[(sha->inputLen)++] = (unsigned char) 0x00;
 | 
			
		||||
		}
 | 
			
		||||
		totalBits = (sha->totalLen << 3);
 | 
			
		||||
		WriteLong(sha->input + 56, (u_int32_t) (totalBits >> 32));
 | 
			
		||||
		WriteLong(sha->input + 60, (u_int32_t) totalBits);
 | 
			
		||||
		ProcessBlock(sha, sha->input);
 | 
			
		||||
		WriteLong(hash, sha->A);
 | 
			
		||||
		WriteLong(hash + 4, sha->B);
 | 
			
		||||
		WriteLong(hash + 8, sha->C);
 | 
			
		||||
		WriteLong(hash + 12, sha->D);
 | 
			
		||||
		WriteLong(hash + 16, sha->E);
 | 
			
		||||
		WriteLong(hash + 20, sha->F);
 | 
			
		||||
		WriteLong(hash + 24, sha->G);
 | 
			
		||||
		WriteLong(hash + 28, sha->H);
 | 
			
		||||
	}
 | 
			
		||||
	DoMemZero(sha, sizeof(SHA256Context));
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void SHA256Init(SHA256Context *sha) {
 | 
			
		||||
	sha->inputLen = 0;
 | 
			
		||||
	sha->A = 0x6a09e667;
 | 
			
		||||
	sha->B = 0xbb67ae85;
 | 
			
		||||
	sha->C = 0x3c6ef372;
 | 
			
		||||
	sha->D = 0xa54ff53a;
 | 
			
		||||
	sha->E = 0x510e527f;
 | 
			
		||||
	sha->F = 0x9b05688c;
 | 
			
		||||
	sha->G = 0x1f83d9ab;
 | 
			
		||||
	sha->H = 0x5be0cd19;
 | 
			
		||||
	sha->totalLen = 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void WriteLong(unsigned char *buf, u_int32_t value) {
 | 
			
		||||
	buf[0] = (unsigned char)(value >> 24);
 | 
			
		||||
	buf[1] = (unsigned char)(value >> 16);
 | 
			
		||||
	buf[2] = (unsigned char)(value >> 8);
 | 
			
		||||
	buf[3] = (unsigned char)value;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
unsigned char* get_sha256_hash(const char* unhashed) {
 | 
			
		||||
	SHA256Context sha;
 | 
			
		||||
	unsigned char* hash = (unsigned char*) malloc(32);
 | 
			
		||||
 | 
			
		||||
	SHA256Init(&sha);
 | 
			
		||||
	SHA256Data(&sha, unhashed, strlen(unhashed));
 | 
			
		||||
	SHA256Finalize(&sha, hash);
 | 
			
		||||
	return hash;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char* get_sha256_hash_hex_str(const char* unhashed) {
 | 
			
		||||
	unsigned char* hashed = get_sha256_hash(unhashed);
 | 
			
		||||
	char* hashed_hex = (char*) malloc(65);
 | 
			
		||||
	char next_hex[3];
 | 
			
		||||
	int index =0;
 | 
			
		||||
 | 
			
		||||
	hashed_hex[0] = '\0';
 | 
			
		||||
	for(index=0; index < 32; index++) {
 | 
			
		||||
		sprintf(next_hex, "%02X", hashed[index]);
 | 
			
		||||
		strcat(hashed_hex, next_hex);
 | 
			
		||||
	}
 | 
			
		||||
	free(hashed);
 | 
			
		||||
	return hashed_hex;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										59
									
								
								sha256.h
									
									
									
									
									
										普通文件
									
								
							
							
						
						
									
										59
									
								
								sha256.h
									
									
									
									
									
										普通文件
									
								
							@@ -0,0 +1,59 @@
 | 
			
		||||
#ifndef __SHA256_H
 | 
			
		||||
#define __SHA256_H
 | 
			
		||||
 | 
			
		||||
#define DoMemZero(dest,len) (memset((dest), 0, (len)))
 | 
			
		||||
 | 
			
		||||
#if SIZEOF_LONG > 4
 | 
			
		||||
	#define TRUNCLONG(x) ((x) & IL_MAX_UINT32)
 | 
			
		||||
	#define ROTATE(x,n) (TRUNCLONG(((x) >> (n))) | ((x) << (32 - (n))))
 | 
			
		||||
	#define SHIFT(x,n) (TRUNCLONG(((x) >> (n))))
 | 
			
		||||
#else
 | 
			
		||||
	#define TRUNCLONG(x) (x)
 | 
			
		||||
	#define ROTATE(x,n) (((x) >> (n)) | ((x) << (32 - (n))))
 | 
			
		||||
	#define SHIFT(x,n) ((x) >> (n))
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#define CH(x,y,z) (((x) & (y)) ^ (TRUNCLONG(~(x)) & (z)))
 | 
			
		||||
#define MAJ(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
 | 
			
		||||
#define SUM0(x) (ROTATE((x), 2) ^ ROTATE((x), 13) ^ ROTATE((x), 22))
 | 
			
		||||
#define SUM1(x) (ROTATE((x), 6) ^ ROTATE((x), 11) ^ ROTATE((x), 25))
 | 
			
		||||
#define RHO0(x) (ROTATE((x), 7) ^ ROTATE((x), 18) ^ SHIFT((x), 3))
 | 
			
		||||
#define RHO1(x) (ROTATE((x), 17) ^ ROTATE((x), 19) ^ SHIFT((x), 10))
 | 
			
		||||
 | 
			
		||||
#define SHA256_HASH_SIZE 32
 | 
			
		||||
 | 
			
		||||
typedef struct _tagSHA256Context {
 | 
			
		||||
	unsigned char input[64];
 | 
			
		||||
	u_int32_t inputLen;
 | 
			
		||||
	u_int32_t A, B, C, D, E, F, G, H;
 | 
			
		||||
	u_int64_t totalLen;
 | 
			
		||||
} SHA256Context;
 | 
			
		||||
 | 
			
		||||
static u_int32_t const K[64] = {
 | 
			
		||||
	0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
 | 
			
		||||
	0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
 | 
			
		||||
	0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
 | 
			
		||||
	0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
 | 
			
		||||
	0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
 | 
			
		||||
	0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
 | 
			
		||||
	0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
 | 
			
		||||
	0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
 | 
			
		||||
	0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
 | 
			
		||||
	0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
 | 
			
		||||
	0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
 | 
			
		||||
	0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
 | 
			
		||||
	0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
 | 
			
		||||
	0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
 | 
			
		||||
	0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
 | 
			
		||||
	0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static void ProcessBlock(SHA256Context *sha, const unsigned char *block);
 | 
			
		||||
void SHA256Data(SHA256Context *sha, const void *buffer, unsigned long len);
 | 
			
		||||
void SHA256Finalize(SHA256Context *sha, unsigned char hash[SHA256_HASH_SIZE]);
 | 
			
		||||
void SHA256Init(SHA256Context *sha);
 | 
			
		||||
static void WriteLong(unsigned char *buf, u_int32_t value);
 | 
			
		||||
extern unsigned char* get_sha256_hash(const char* unhashed);
 | 
			
		||||
extern char* get_sha256_hash_hex_str(const char* unhashed);
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
		在新工单中引用
	
	屏蔽一个用户