cryptpw.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. /* vi: set sw=4 ts=4: */
  2. /*
  3. * cryptpw.c - output a crypt(3)ed password to stdout.
  4. *
  5. * Licensed under GPLv2 or later, see file LICENSE in this source tree.
  6. *
  7. * Cooked from passwd.c by Thomas Lundquist <thomasez@zelow.no>
  8. * mkpasswd compatible options added by Bernhard Reutner-Fischer
  9. *
  10. * Licensed under GPLv2, see file LICENSE in this source tree.
  11. */
  12. //config:config CRYPTPW
  13. //config: bool "cryptpw (14 kb)"
  14. //config: default y
  15. //config: help
  16. //config: Encrypts the given password with the crypt(3) libc function
  17. //config: using the given salt.
  18. //config:
  19. //config:config MKPASSWD
  20. //config: bool "mkpasswd (15 kb)"
  21. //config: default y
  22. //config: help
  23. //config: Encrypts the given password with the crypt(3) libc function
  24. //config: using the given salt. Debian has this utility under mkpasswd
  25. //config: name. Busybox provides mkpasswd as an alias for cryptpw.
  26. //applet:IF_CRYPTPW( APPLET_NOEXEC(cryptpw, cryptpw, BB_DIR_USR_BIN, BB_SUID_DROP, cryptpw))
  27. // APPLET_NOEXEC:name main location suid_type help
  28. //applet:IF_MKPASSWD(APPLET_NOEXEC(mkpasswd, cryptpw, BB_DIR_USR_BIN, BB_SUID_DROP, cryptpw))
  29. //kbuild:lib-$(CONFIG_CRYPTPW) += cryptpw.o
  30. //kbuild:lib-$(CONFIG_MKPASSWD) += cryptpw.o
  31. //usage:#define cryptpw_trivial_usage
  32. //usage: "[-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT]"
  33. /* We do support -s, we just don't mention it */
  34. //usage:#define cryptpw_full_usage "\n\n"
  35. //usage: "Print crypt(3) hashed PASSWORD\n"
  36. //usage: "\n -P N Read password from fd N"
  37. /* //usage: "\n -s Use stdin; like -P0" */
  38. //usage: "\n -m TYPE "CRYPT_METHODS_HELP_STR
  39. //usage: "\n -S SALT"
  40. #include "libbb.h"
  41. /* Debian has 'mkpasswd' utility, manpage says:
  42. NAME
  43. mkpasswd - Overfeatured front end to crypt(3)
  44. SYNOPSIS
  45. mkpasswd PASSWORD SALT
  46. ...
  47. OPTIONS
  48. -S, --salt=STRING
  49. Use the STRING as salt. It must not contain prefixes such as
  50. $1$.
  51. -R, --rounds=NUMBER
  52. Use NUMBER rounds. This argument is ignored if the method
  53. chosen does not support variable rounds. For the OpenBSD Blowfish
  54. method this is the logarithm of the number of rounds.
  55. -m, --method=TYPE
  56. Compute the password using the TYPE method. If TYPE is 'help'
  57. then the available methods are printed.
  58. -P, --password-fd=NUM
  59. Read the password from file descriptor NUM instead of using getpass(3).
  60. If the file descriptor is not connected to a tty then
  61. no other message than the hashed password is printed on stdout.
  62. -s, --stdin
  63. Like --password-fd=0.
  64. ENVIRONMENT
  65. $MKPASSWD_OPTIONS
  66. A list of options which will be evaluated before the ones
  67. specified on the command line.
  68. BUGS
  69. This program suffers of a bad case of featuritis.
  70. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  71. Very true...
  72. cryptpw was in bbox before this gem, so we retain it, and alias mkpasswd
  73. to cryptpw. -a option (alias for -m) came from cryptpw.
  74. */
  75. int cryptpw_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
  76. int cryptpw_main(int argc UNUSED_PARAM, char **argv)
  77. {
  78. /* Supports: cryptpw -m sha256 PASS 'rounds=999999999$SALT' */
  79. char salt[MAX_PW_SALT_LEN + sizeof("rounds=999999999$")];
  80. char *salt_ptr;
  81. char *password;
  82. const char *opt_m, *opt_S;
  83. int fd;
  84. #if ENABLE_LONG_OPTS
  85. static const char mkpasswd_longopts[] ALIGN1 =
  86. "stdin\0" No_argument "s"
  87. "password-fd\0" Required_argument "P"
  88. "salt\0" Required_argument "S"
  89. "method\0" Required_argument "m"
  90. ;
  91. #endif
  92. fd = STDIN_FILENO;
  93. opt_m = CONFIG_FEATURE_DEFAULT_PASSWD_ALGO;
  94. opt_S = NULL;
  95. /* at most two non-option arguments; -P NUM */
  96. getopt32long(argv, "^" "sP:+S:m:a:" "\0" "?2",
  97. mkpasswd_longopts,
  98. &fd, &opt_S, &opt_m, &opt_m
  99. );
  100. argv += optind;
  101. /* have no idea how to handle -s... */
  102. if (argv[0] && !opt_S)
  103. opt_S = argv[1];
  104. salt_ptr = crypt_make_pw_salt(salt, opt_m);
  105. if (opt_S)
  106. /* put user's data after the "$N$" prefix */
  107. safe_strncpy(salt_ptr, opt_S, sizeof(salt) - (sizeof("$N$")-1));
  108. xmove_fd(fd, STDIN_FILENO);
  109. password = argv[0];
  110. if (!password) {
  111. /* Only mkpasswd, and only from tty, prompts.
  112. * Otherwise it is a plain read. */
  113. password = (ENABLE_MKPASSWD && applet_name[0] == 'm' && isatty(STDIN_FILENO))
  114. ? bb_ask_noecho_stdin("Password: ")
  115. : xmalloc_fgetline(stdin)
  116. ;
  117. /* may still be NULL on EOF/error */
  118. }
  119. if (password)
  120. puts(pw_encrypt(password, salt, 1));
  121. return EXIT_SUCCESS;
  122. }