/* $OpenBSD: encrypt.c,v 1.4 1997/03/27 23:43:36 downsj Exp $ */ /* * Copyright (c) 1996, Jason Downs. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #include #include #include #include #include /* * Very simple little program, for encrypting passwords from the command * line. Useful for scripts and such. */ extern char *optarg; extern int optind; char *progname; void usage() { errx(1, "usage: %s [-k] [-m] [-s salt] [string]", progname); } char *trim(line) char *line; { char *ptr; for (ptr = &line[strlen(line)-1]; ptr > line; ptr--) { if (!isspace(*ptr)) break; } ptr[1] = '\0'; for (ptr = line; *ptr && isspace(*ptr); ptr++); return(ptr); } int main(argc, argv) int argc; char *argv[]; { int opt; int do_md5 = 0; int do_makekey = 0; char *salt = (char *)NULL; if ((progname = strrchr(argv[0], '/'))) progname++; else progname = argv[0]; if (strcmp(progname, "makekey") == 0) do_makekey = 1; while ((opt = getopt(argc, argv, "kms:")) != -1) { switch (opt) { case 'k': do_makekey = 1; break; case 'm': do_md5 = 1; break; case 's': salt = optarg; if (salt[0] == '$') /* -s is only for DES. */ usage(); break; default: usage(); } } if (do_md5 && !do_makekey && (salt != (char *)NULL)) usage(); if (!do_md5 && !do_makekey && (salt == (char *)NULL)) usage(); if (do_makekey && (do_md5 || (salt != (char *)NULL))) usage(); if (((argc - optind) < 1) || do_makekey) { char line[BUFSIZ], *string, msalt[3]; /* Encrypt stdin to stdout. */ while (!feof(stdin) && (fgets(line, sizeof(line), stdin) != NULL)) { /* Kill the whitesapce. */ string = trim(line); if (*string == '\0') continue; if (do_makekey) { /* * makekey mode: parse string into seperate DES key and salt. */ if (strlen(string) != 10) { /* To be compatible... */ fprintf (stderr, "%s: %s\n", progname, strerror(EFTYPE)); exit (1); } strcpy(msalt, &string[8]); salt = msalt; } fputs(crypt(string, (do_md5 ? "$1$" : salt)), stdout); if (do_makekey) { fflush(stdout); break; } fputc('\n', stdout); } } else { char *string; /* Perhaps it isn't worth worrying about, but... */ string = strdup(argv[optind]); if (string == (char *)NULL) err(1, NULL); /* Wipe the argument. */ bzero(argv[optind], strlen(argv[optind])); fputs(crypt(string, (do_md5 ? "$1$" : salt)), stdout); fputc('\n', stdout); /* Wipe our copy, before we free it. */ bzero(string, strlen(string)); free(string); } exit(0); }