/* vi: set sw=4 ts=4: */ /* * cryptpw.c * * Cooked from passwd.c by Thomas Lundquist */ #include "libbb.h" #define TESTING 0 /* set TESTING to 1 and pipe some file through this script if you played with bbox's crypt implementation. while read line; do n=`./busybox cryptpw -a des -- "$line"` o=`./busybox_old cryptpw -a des -- "$line"` test "$n" != "$o" && { echo n="$n" echo o="$o" exit } n=`./busybox cryptpw -- "$line"` o=`./busybox_old cryptpw -- "$line"` test "$n" != "$o" && { echo n="$n" echo o="$o" exit } done */ int cryptpw_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; int cryptpw_main(int argc ATTRIBUTE_UNUSED, char **argv) { char salt[sizeof("$N$XXXXXXXX")]; if (!getopt32(argv, "a:", NULL) || argv[optind - 1][0] != 'd') { strcpy(salt, "$1$"); /* Too ugly, and needs even more magic to handle endianness: */ //((uint32_t*)&salt)[0] = '$' + '1'*0x100 + '$'*0x10000; /* Hope one day gcc will do it itself (inlining strcpy) */ crypt_make_salt(salt + 3, 4, 0); /* md5 */ #if TESTING strcpy(salt + 3, "ajg./bcf"); #endif } else { crypt_make_salt(salt, 1, 0); /* des */ #if TESTING strcpy(salt, "a."); #endif } puts(pw_encrypt(argv[optind] ? argv[optind] : xmalloc_fgetline(stdin), salt, 1)); return 0; }