aboutsummaryrefslogtreecommitdiff
path: root/toys/other
diff options
context:
space:
mode:
authorRob Landley <rob@landley.net>2014-06-28 20:02:57 -0500
committerRob Landley <rob@landley.net>2014-06-28 20:02:57 -0500
commit474d0a9e00b72ee73c0c908c65a09f7dde495019 (patch)
tree06bae6c9614dc1a344084863a7a378658ba97d59 /toys/other
parentc0e5ff3c9755503016581a2ed3ae91caaf785366 (diff)
downloadtoybox-474d0a9e00b72ee73c0c908c65a09f7dde495019.tar.gz
Promote mkpasswd from pending to other.
Diffstat (limited to 'toys/other')
-rw-r--r--toys/other/mkpasswd.c77
1 files changed, 77 insertions, 0 deletions
diff --git a/toys/other/mkpasswd.c b/toys/other/mkpasswd.c
new file mode 100644
index 00000000..2e1c1a98
--- /dev/null
+++ b/toys/other/mkpasswd.c
@@ -0,0 +1,77 @@
+/* mkpasswd.c - encrypt the given passwd using salt
+ *
+ * Copyright 2013 Ashwini Kumar <ak.ashwini@gmail.com>
+ * Copyright 2013 Kyungwan Han <asura321@gmail.com>
+ *
+ * No Standard
+
+USE_MKPASSWD(NEWTOY(mkpasswd, ">2S:m:P#=0<0", TOYFLAG_USR|TOYFLAG_BIN))
+
+config MKPASSWD
+ bool "mkpasswd"
+ default y
+ help
+ usage: mkpasswd [-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT]
+
+ Crypt PASSWORD using crypt(3)
+
+ -P FD Read password from file descriptor FD
+ -m TYPE Encryption method (des, md5, sha256, or sha512; default is des)
+ -S SALT
+*/
+
+#define FOR_mkpasswd
+#include "toys.h"
+
+GLOBALS(
+ long pfd;
+ char *method;
+ char *salt;
+)
+
+void mkpasswd_main(void)
+{
+ char salt[MAX_SALT_LEN] = {0,};
+ int i;
+
+ if (!TT.method) TT.method = "des";
+ if (toys.optc == 2) {
+ if (TT.salt) error_exit("duplicate salt");
+ TT.salt = toys.optargs[1];
+ }
+
+ if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m");
+ if (TT.salt) {
+ char *s = TT.salt;
+
+ // In C locale, isalnum() means [A-Za-Z0-0]
+ while (isalnum(*s) || *s == '.' || *s == '/') s++;
+ if (*s) error_exit("salt not in [./A-Za-z0-9]");
+
+ snprintf(salt+i, sizeof(salt)-i, "%s", TT.salt);
+ }
+
+ // Because read_password() doesn't have an fd argument
+ if (TT.pfd) {
+ if (dup2(TT.pfd, 0) == -1) perror_exit("fd");
+ close(TT.pfd);
+ }
+
+ // If we haven't got a password on the command line, read it from tty or FD
+ if (!*toys.optargs) {
+ // Prompt and read interactively?
+ if (isatty(0)) {
+ if (read_password(toybuf, sizeof(toybuf), "Password: "))
+ perror_exit("password read failed");
+ } else {
+ for (i = 0; i<sizeof(toybuf)-1; i++) {
+ if (!xread(0, toybuf+i, 1)) break;
+ if (toybuf[i] == '\n' || toybuf[i] == '\r') break;
+ }
+ toybuf[i] = 0;
+ }
+ }
+
+ // encrypt & print the password
+ xprintf("%s\n",crypt(*toys.optargs ? *toys.optargs : toybuf, salt));
+}