aboutsummaryrefslogtreecommitdiff
path: root/toys/pending/mkpasswd.c
blob: a46c514c20cb944b308e8c7fa1ff6ad74d880d72 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
/* mkpasswd.c - encrypt the given passwd using salt
 *
 * Copyright 2013 Ashwini Kumar <ak.ashwini@gmail.com>
 * Copyright 2013 Kyungwan Han <asura321@gmail.com>
 *
 * No Standard

USE_MKPASSWD(NEWTOY(mkpasswd, ">2S:m:P#=0<0", TOYFLAG_USR|TOYFLAG_BIN))

config MKPASSWD
  bool "mkpasswd"
  default n
  help
    usage: mkpasswd [OPTIONS] [PASSWORD] [SALT]

    Crypt PASSWORD using crypt(3)

    -P N    Read password from fd N
    -m TYPE Encryption method, when TYPE='help', then show the methods available
    -S SALT
*/

#define FOR_mkpasswd
#include "toys.h"

GLOBALS(
  long pfd;
  char *method;
  char *salt;
)


/*
 * validate the salt provided by user.
 * the allowed character set for salt is [./A-Za-z0-9]
 */
static void is_salt_valid(char *salt)
{
  regex_t rp;
  regmatch_t rm[1];
  char *regex = "[./A-Za-z0-9]*"; //salt REGEX

  xregcomp(&rp, regex, REG_NEWLINE);

  /* compare string against pattern --  remember that patterns 
     are anchored to the beginning of the line */
  if (regexec(&rp, salt, 1, rm, 0) == 0 && rm[0].rm_so == 0 
      && rm[0].rm_eo == strlen(salt))
      return;

  error_exit("salt should be in character set [./A-Za-z0-9]");
}

void mkpasswd_main(void)
{
  int offset = 0;
  char salt[MAX_SALT_LEN] = {0,};

  if (!(toys.optflags & FLAG_m)) TT.method = "des";
  else if (!strcmp(TT.method, "help")) {
    xprintf("Available encryption methods are:\n"
        " des\n md5\n sha256\n sha512\n");
    return;
  }
  // If arguments are there, then the second argument is Salt, can be NULL also
  if ((toys.optc == 2) && !(toys.optflags & FLAG_S)) TT.salt = toys.optargs[1];

  offset= get_salt(salt, TT.method);
  if (offset == -1) error_exit("unknown encryption method");
  if (TT.salt) {
    is_salt_valid(TT.salt);
    snprintf(salt + offset, MAX_SALT_LEN - offset, "%s", TT.salt);
  }

  if (toys.optflags & FLAG_P) {
    if (dup2(TT.pfd, STDIN_FILENO) == -1) perror_exit("fd");
    close(TT.pfd);
  }

  if (!toys.optc) {
    if (isatty(STDIN_FILENO)) {
      if (read_password(toybuf, sizeof(toybuf), "Password: ")) 
        perror_exit("password read failed");
    } else {
      // read from the given FD
      int i = 0;
      while (1) {
        int ret = read(0, &toybuf[i], 1);
        if ( ret < 0 ) perror_exit("password read failed");
        else if (ret == 0 || toybuf[i] == '\n' || toybuf[i] == '\r' ||
            sizeof(toybuf) == i+1) {
          toybuf[i] = '\0';
          break;
        }
        i++;
      }
    }
  } else snprintf(toybuf, sizeof(toybuf), "%s", toys.optargs[0]);

  // encrypt & print the password
  xprintf("%s\n",crypt(toybuf, salt));
}