Annotation of src/usr.bin/encrypt/encrypt.c, Revision 1.40
1.40 ! tedu 1: /* $OpenBSD: encrypt.c,v 1.39 2015/02/24 18:45:51 tedu Exp $ */
1.1 downsj 2:
3: /*
4: * Copyright (c) 1996, Jason Downs. All rights reserved.
5: *
6: * Redistribution and use in source and binary forms, with or without
7: * modification, are permitted provided that the following conditions
8: * are met:
9: * 1. Redistributions of source code must retain the above copyright
10: * notice, this list of conditions and the following disclaimer.
11: * 2. Redistributions in binary form must reproduce the above copyright
12: * notice, this list of conditions and the following disclaimer in the
13: * documentation and/or other materials provided with the distribution.
14: *
15: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
16: * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
17: * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
18: * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
19: * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
20: * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
21: * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
22: * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25: * SUCH DAMAGE.
26: */
27:
28: #include <sys/types.h>
1.15 millert 29: #include <ctype.h>
1.1 downsj 30: #include <err.h>
1.3 downsj 31: #include <errno.h>
1.15 millert 32: #include <pwd.h>
33: #include <stdio.h>
1.7 kstailey 34: #include <stdlib.h>
1.1 downsj 35: #include <string.h>
36: #include <unistd.h>
1.14 millert 37: #include <login_cap.h>
1.27 jdixon 38: #include <limits.h>
1.1 downsj 39:
40: /*
41: * Very simple little program, for encrypting passwords from the command
42: * line. Useful for scripts and such.
43: */
44:
1.15 millert 45: extern char *__progname;
1.19 deraadt 46:
47: void usage(void);
1.3 downsj 48:
1.34 tedu 49: #define DO_BLF 0
50:
1.15 millert 51: void
52: usage(void)
1.1 downsj 53: {
1.15 millert 54:
55: (void)fprintf(stderr,
1.34 tedu 56: "usage: %s [-b rounds] [-c class] [-p | string]\n",
1.15 millert 57: __progname);
58: exit(1);
1.1 downsj 59: }
60:
1.37 tedu 61: static void
62: print_passwd(char *string, int operation, char *extra)
1.5 provos 63: {
1.34 tedu 64: char buffer[_PASSWORD_LEN];
1.37 tedu 65: const char *pref;
1.39 tedu 66: char prefbuf[64];
1.15 millert 67:
1.33 tedu 68: if (operation == DO_BLF) {
1.39 tedu 69: if (snprintf(prefbuf, sizeof(prefbuf), "blowfish,%s", extra) >=
70: sizeof(prefbuf))
71: errx(1, "pref too long");
1.37 tedu 72: pref = prefbuf;
1.34 tedu 73: } else {
74: login_cap_t *lc;
1.15 millert 75:
1.18 millert 76: if ((lc = login_getclass(extra)) == NULL)
77: errx(1, "unable to get login class `%s'",
78: extra ? (char *)extra : "default");
1.34 tedu 79: pref = login_getcapstr(lc, "localcipher", NULL, NULL);
1.15 millert 80: }
1.37 tedu 81: if (crypt_newhash(string, pref, buffer, sizeof(buffer)) != 0)
1.40 ! tedu 82: err(1, "can't generate hash");
1.15 millert 83:
1.34 tedu 84: fputs(buffer, stdout);
1.5 provos 85: }
86:
1.15 millert 87: int
88: main(int argc, char **argv)
1.1 downsj 89: {
1.15 millert 90: int opt;
91: int operation = -1;
92: int prompt = 0;
1.40 ! tedu 93: char *extra = NULL; /* Store login class or number of rounds */
1.27 jdixon 94: const char *errstr;
1.15 millert 95:
1.34 tedu 96: while ((opt = getopt(argc, argv, "pb:c:")) != -1) {
1.15 millert 97: switch (opt) {
98: case 'p':
99: prompt = 1;
100: break;
101: case 'b': /* Blowfish password hash */
102: if (operation != -1)
103: usage();
104: operation = DO_BLF;
1.37 tedu 105: if (strcmp(optarg, "a") != 0) {
106: (void)strtonum(optarg, 4, 31, &errstr);
1.36 deraadt 107: if (errstr != NULL)
1.40 ! tedu 108: errx(1, "rounds is %s: %s", errstr,
! 109: optarg);
1.36 deraadt 110: }
1.37 tedu 111: extra = optarg;
1.18 millert 112: break;
113: case 'c': /* user login class */
114: extra = optarg;
115: operation = -1;
1.15 millert 116: break;
117: default:
118: usage();
119: }
1.1 downsj 120: }
121:
1.34 tedu 122: if (((argc - optind) < 1)) {
1.15 millert 123: char line[BUFSIZ], *string;
1.1 downsj 124:
1.15 millert 125: if (prompt) {
1.20 otto 126: if ((string = getpass("Enter string: ")) == NULL)
127: err(1, "getpass");
1.15 millert 128: print_passwd(string, operation, extra);
129: (void)fputc('\n', stdout);
130: } else {
1.28 krw 131: size_t len;
1.15 millert 132: /* Encrypt stdin to stdout. */
133: while (!feof(stdin) &&
134: (fgets(line, sizeof(line), stdin) != NULL)) {
1.28 krw 135: len = strlen(line);
136: if (len == 0 || line[0] == '\n')
1.15 millert 137: continue;
1.28 krw 138: if (line[len - 1] == '\n')
139: line[len - 1] = '\0';
140:
141: print_passwd(line, operation, extra);
1.15 millert 142:
143: (void)fputc('\n', stdout);
144: }
145: }
1.9 alex 146: } else {
1.15 millert 147: char *string;
148:
149: /* can't combine -p with a supplied string */
150: if (prompt)
151: usage();
152:
153: /* Perhaps it isn't worth worrying about, but... */
154: if ((string = strdup(argv[optind])) == NULL)
155: err(1, NULL);
156: /* Wipe the argument. */
1.40 ! tedu 157: explicit_bzero(argv[optind], strlen(argv[optind]));
1.15 millert 158:
1.9 alex 159: print_passwd(string, operation, extra);
160:
1.15 millert 161: (void)fputc('\n', stdout);
162:
163: /* Wipe our copy, before we free it. */
1.40 ! tedu 164: explicit_bzero(string, strlen(string));
1.15 millert 165: free(string);
1.1 downsj 166: }
1.15 millert 167: exit(0);
1.1 downsj 168: }