Annotation of src/usr.bin/encrypt/encrypt.c, Revision 1.41
1.41 ! deraadt 1: /* $OpenBSD: encrypt.c,v 1.40 2015/02/26 17:46:15 tedu Exp $ */
1.1 downsj 2:
3: /*
4: * Copyright (c) 1996, Jason Downs. All rights reserved.
5: *
6: * Redistribution and use in source and binary forms, with or without
7: * modification, are permitted provided that the following conditions
8: * are met:
9: * 1. Redistributions of source code must retain the above copyright
10: * notice, this list of conditions and the following disclaimer.
11: * 2. Redistributions in binary form must reproduce the above copyright
12: * notice, this list of conditions and the following disclaimer in the
13: * documentation and/or other materials provided with the distribution.
14: *
15: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
16: * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
17: * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
18: * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
19: * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
20: * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
21: * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
22: * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25: * SUCH DAMAGE.
26: */
27:
28: #include <sys/types.h>
1.15 millert 29: #include <ctype.h>
1.1 downsj 30: #include <err.h>
1.3 downsj 31: #include <errno.h>
1.15 millert 32: #include <pwd.h>
33: #include <stdio.h>
1.7 kstailey 34: #include <stdlib.h>
1.1 downsj 35: #include <string.h>
36: #include <unistd.h>
1.14 millert 37: #include <login_cap.h>
1.27 jdixon 38: #include <limits.h>
1.1 downsj 39:
40: /*
41: * Very simple little program, for encrypting passwords from the command
42: * line. Useful for scripts and such.
43: */
44:
1.15 millert 45: extern char *__progname;
1.19 deraadt 46:
47: void usage(void);
1.3 downsj 48:
1.34 tedu 49: #define DO_BLF 0
50:
1.15 millert 51: void
52: usage(void)
1.1 downsj 53: {
1.15 millert 54:
55: (void)fprintf(stderr,
1.34 tedu 56: "usage: %s [-b rounds] [-c class] [-p | string]\n",
1.15 millert 57: __progname);
58: exit(1);
1.1 downsj 59: }
60:
1.37 tedu 61: static void
62: print_passwd(char *string, int operation, char *extra)
1.5 provos 63: {
1.34 tedu 64: char buffer[_PASSWORD_LEN];
1.37 tedu 65: const char *pref;
1.39 tedu 66: char prefbuf[64];
1.15 millert 67:
1.33 tedu 68: if (operation == DO_BLF) {
1.39 tedu 69: if (snprintf(prefbuf, sizeof(prefbuf), "blowfish,%s", extra) >=
70: sizeof(prefbuf))
71: errx(1, "pref too long");
1.37 tedu 72: pref = prefbuf;
1.34 tedu 73: } else {
74: login_cap_t *lc;
1.15 millert 75:
1.18 millert 76: if ((lc = login_getclass(extra)) == NULL)
77: errx(1, "unable to get login class `%s'",
78: extra ? (char *)extra : "default");
1.34 tedu 79: pref = login_getcapstr(lc, "localcipher", NULL, NULL);
1.15 millert 80: }
1.37 tedu 81: if (crypt_newhash(string, pref, buffer, sizeof(buffer)) != 0)
1.40 tedu 82: err(1, "can't generate hash");
1.15 millert 83:
1.34 tedu 84: fputs(buffer, stdout);
1.5 provos 85: }
86:
1.15 millert 87: int
88: main(int argc, char **argv)
1.1 downsj 89: {
1.15 millert 90: int opt;
91: int operation = -1;
92: int prompt = 0;
1.40 tedu 93: char *extra = NULL; /* Store login class or number of rounds */
1.27 jdixon 94: const char *errstr;
1.41 ! deraadt 95:
! 96: if (pledge("stdio rpath tty", NULL) == -1)
! 97: err(1, "pledge");
1.15 millert 98:
1.34 tedu 99: while ((opt = getopt(argc, argv, "pb:c:")) != -1) {
1.15 millert 100: switch (opt) {
101: case 'p':
102: prompt = 1;
103: break;
104: case 'b': /* Blowfish password hash */
105: if (operation != -1)
106: usage();
107: operation = DO_BLF;
1.37 tedu 108: if (strcmp(optarg, "a") != 0) {
109: (void)strtonum(optarg, 4, 31, &errstr);
1.36 deraadt 110: if (errstr != NULL)
1.40 tedu 111: errx(1, "rounds is %s: %s", errstr,
112: optarg);
1.36 deraadt 113: }
1.37 tedu 114: extra = optarg;
1.18 millert 115: break;
116: case 'c': /* user login class */
117: extra = optarg;
118: operation = -1;
1.15 millert 119: break;
120: default:
121: usage();
122: }
1.1 downsj 123: }
124:
1.34 tedu 125: if (((argc - optind) < 1)) {
1.15 millert 126: char line[BUFSIZ], *string;
1.1 downsj 127:
1.15 millert 128: if (prompt) {
1.20 otto 129: if ((string = getpass("Enter string: ")) == NULL)
130: err(1, "getpass");
1.15 millert 131: print_passwd(string, operation, extra);
132: (void)fputc('\n', stdout);
133: } else {
1.28 krw 134: size_t len;
1.15 millert 135: /* Encrypt stdin to stdout. */
136: while (!feof(stdin) &&
137: (fgets(line, sizeof(line), stdin) != NULL)) {
1.28 krw 138: len = strlen(line);
139: if (len == 0 || line[0] == '\n')
1.15 millert 140: continue;
1.28 krw 141: if (line[len - 1] == '\n')
142: line[len - 1] = '\0';
143:
144: print_passwd(line, operation, extra);
1.15 millert 145:
146: (void)fputc('\n', stdout);
147: }
148: }
1.9 alex 149: } else {
1.15 millert 150: char *string;
151:
152: /* can't combine -p with a supplied string */
153: if (prompt)
154: usage();
155:
156: /* Perhaps it isn't worth worrying about, but... */
157: if ((string = strdup(argv[optind])) == NULL)
158: err(1, NULL);
159: /* Wipe the argument. */
1.40 tedu 160: explicit_bzero(argv[optind], strlen(argv[optind]));
1.15 millert 161:
1.9 alex 162: print_passwd(string, operation, extra);
163:
1.15 millert 164: (void)fputc('\n', stdout);
165:
166: /* Wipe our copy, before we free it. */
1.40 tedu 167: explicit_bzero(string, strlen(string));
1.15 millert 168: free(string);
1.1 downsj 169: }
1.15 millert 170: exit(0);
1.1 downsj 171: }