[BACK]Return to encrypt.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / encrypt

Annotation of src/usr.bin/encrypt/encrypt.c, Revision 1.39

1.39    ! tedu        1: /*     $OpenBSD: encrypt.c,v 1.38 2015/01/15 17:34:15 chl Exp $        */
1.1       downsj      2:
                      3: /*
                      4:  * Copyright (c) 1996, Jason Downs.  All rights reserved.
                      5:  *
                      6:  * Redistribution and use in source and binary forms, with or without
                      7:  * modification, are permitted provided that the following conditions
                      8:  * are met:
                      9:  * 1. Redistributions of source code must retain the above copyright
                     10:  *    notice, this list of conditions and the following disclaimer.
                     11:  * 2. Redistributions in binary form must reproduce the above copyright
                     12:  *    notice, this list of conditions and the following disclaimer in the
                     13:  *    documentation and/or other materials provided with the distribution.
                     14:  *
                     15:  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
                     16:  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
                     17:  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
                     18:  * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
                     19:  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
                     20:  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
                     21:  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
                     22:  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     23:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     24:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     25:  * SUCH DAMAGE.
                     26:  */
                     27:
                     28: #include <sys/types.h>
1.15      millert    29: #include <ctype.h>
1.1       downsj     30: #include <err.h>
1.3       downsj     31: #include <errno.h>
1.15      millert    32: #include <pwd.h>
                     33: #include <stdio.h>
1.7       kstailey   34: #include <stdlib.h>
1.1       downsj     35: #include <string.h>
                     36: #include <unistd.h>
1.14      millert    37: #include <login_cap.h>
1.27      jdixon     38: #include <limits.h>
1.1       downsj     39:
                     40: /*
                     41:  * Very simple little program, for encrypting passwords from the command
                     42:  * line.  Useful for scripts and such.
                     43:  */
                     44:
1.15      millert    45: extern char *__progname;
1.19      deraadt    46:
                     47: void   usage(void);
1.3       downsj     48:
1.34      tedu       49: #define DO_BLF         0
                     50:
1.15      millert    51: void
                     52: usage(void)
1.1       downsj     53: {
1.15      millert    54:
                     55:        (void)fprintf(stderr,
1.34      tedu       56:            "usage: %s [-b rounds] [-c class] [-p | string]\n",
1.15      millert    57:            __progname);
                     58:        exit(1);
1.1       downsj     59: }
                     60:
1.37      tedu       61: static void
                     62: print_passwd(char *string, int operation, char *extra)
1.5       provos     63: {
1.34      tedu       64:        char buffer[_PASSWORD_LEN];
1.37      tedu       65:        const char *pref;
1.39    ! tedu       66:        char prefbuf[64];
1.15      millert    67:
1.33      tedu       68:        if (operation == DO_BLF) {
1.39    ! tedu       69:                if (snprintf(prefbuf, sizeof(prefbuf), "blowfish,%s", extra) >=
        !            70:                    sizeof(prefbuf))
        !            71:                        errx(1, "pref too long");
1.37      tedu       72:                pref = prefbuf;
1.34      tedu       73:        } else {
                     74:                login_cap_t *lc;
1.15      millert    75:
1.18      millert    76:                if ((lc = login_getclass(extra)) == NULL)
                     77:                        errx(1, "unable to get login class `%s'",
                     78:                            extra ? (char *)extra : "default");
1.34      tedu       79:                pref = login_getcapstr(lc, "localcipher", NULL, NULL);
1.15      millert    80:        }
1.37      tedu       81:        if (crypt_newhash(string, pref, buffer, sizeof(buffer)) != 0)
                     82:                errx(1, "can't generate hash");
1.15      millert    83:
1.34      tedu       84:        fputs(buffer, stdout);
1.5       provos     85: }
                     86:
1.15      millert    87: int
                     88: main(int argc, char **argv)
1.1       downsj     89: {
1.15      millert    90:        int opt;
                     91:        int operation = -1;
                     92:        int prompt = 0;
1.37      tedu       93:        char *extra = NULL;             /* Store salt or number of rounds */
1.27      jdixon     94:        const char *errstr;
1.15      millert    95:
1.34      tedu       96:        while ((opt = getopt(argc, argv, "pb:c:")) != -1) {
1.15      millert    97:                switch (opt) {
                     98:                case 'p':
                     99:                        prompt = 1;
                    100:                        break;
                    101:                case 'b':                       /* Blowfish password hash */
                    102:                        if (operation != -1)
                    103:                                usage();
                    104:                        operation = DO_BLF;
1.37      tedu      105:                        if (strcmp(optarg, "a") != 0) {
                    106:                                (void)strtonum(optarg, 4, 31, &errstr);
1.36      deraadt   107:                                if (errstr != NULL)
1.37      tedu      108:                                        errx(1, "rounds is %s: %s", errstr, optarg);
1.36      deraadt   109:                        }
1.37      tedu      110:                        extra = optarg;
1.18      millert   111:                        break;
                    112:                case 'c':                       /* user login class */
                    113:                        extra = optarg;
                    114:                        operation = -1;
1.15      millert   115:                        break;
                    116:                default:
                    117:                        usage();
                    118:                }
1.1       downsj    119:        }
                    120:
1.34      tedu      121:        if (((argc - optind) < 1)) {
1.15      millert   122:                char line[BUFSIZ], *string;
1.1       downsj    123:
1.15      millert   124:                if (prompt) {
1.20      otto      125:                        if ((string = getpass("Enter string: ")) == NULL)
                    126:                                err(1, "getpass");
1.15      millert   127:                        print_passwd(string, operation, extra);
                    128:                        (void)fputc('\n', stdout);
                    129:                } else {
1.28      krw       130:                        size_t len;
1.15      millert   131:                        /* Encrypt stdin to stdout. */
                    132:                        while (!feof(stdin) &&
                    133:                            (fgets(line, sizeof(line), stdin) != NULL)) {
1.28      krw       134:                                len = strlen(line);
                    135:                                if (len == 0 || line[0] == '\n')
1.15      millert   136:                                        continue;
1.28      krw       137:                                if (line[len - 1] == '\n')
                    138:                                        line[len - 1] = '\0';
                    139:
                    140:                                print_passwd(line, operation, extra);
1.15      millert   141:
                    142:                                (void)fputc('\n', stdout);
                    143:                        }
                    144:                }
1.9       alex      145:        } else {
1.15      millert   146:                char *string;
                    147:
                    148:                /* can't combine -p with a supplied string */
                    149:                if (prompt)
                    150:                        usage();
                    151:
                    152:                /* Perhaps it isn't worth worrying about, but... */
                    153:                if ((string = strdup(argv[optind])) == NULL)
                    154:                        err(1, NULL);
                    155:                /* Wipe the argument. */
                    156:                memset(argv[optind], 0, strlen(argv[optind]));
                    157:
1.9       alex      158:                print_passwd(string, operation, extra);
                    159:
1.15      millert   160:                (void)fputc('\n', stdout);
                    161:
                    162:                /* Wipe our copy, before we free it. */
                    163:                memset(string, 0, strlen(string));
                    164:                free(string);
1.1       downsj    165:        }
1.15      millert   166:        exit(0);
1.1       downsj    167: }