1 /* vi: set sw=4 ts=4: */
3 * cryptpw.c - output a crypt(3)ed password to stdout.
5 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
7 * Cooked from passwd.c by Thomas Lundquist <thomasez@zelow.no>
8 * mkpasswd compatible options added by Bernhard Reutner-Fischer
10 * Licensed under GPLv2, see file LICENSE in this source tree.
12 //config:config CRYPTPW
13 //config: bool "cryptpw (15 kb)"
16 //config: Encrypts the given password with the crypt(3) libc function
17 //config: using the given salt.
19 //config:config MKPASSWD
20 //config: bool "mkpasswd (16 kb)"
23 //config: Encrypts the given password with the crypt(3) libc function
24 //config: using the given salt. Debian has this utility under mkpasswd
25 //config: name. Busybox provides mkpasswd as an alias for cryptpw.
27 //applet:IF_CRYPTPW( APPLET_NOEXEC(cryptpw, cryptpw, BB_DIR_USR_BIN, BB_SUID_DROP, cryptpw))
28 // APPLET_NOEXEC:name main location suid_type help
29 //applet:IF_MKPASSWD(APPLET_NOEXEC(mkpasswd, cryptpw, BB_DIR_USR_BIN, BB_SUID_DROP, cryptpw))
31 //kbuild:lib-$(CONFIG_CRYPTPW) += cryptpw.o
32 //kbuild:lib-$(CONFIG_MKPASSWD) += cryptpw.o
34 //usage:#define cryptpw_trivial_usage
35 //usage: "[-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT]"
36 /* We do support -s, we just don't mention it */
37 //usage:#define cryptpw_full_usage "\n\n"
38 //usage: "Print crypt(3) hashed PASSWORD\n"
39 //usage: "\n -P N Read password from fd N"
40 /* //usage: "\n -s Use stdin; like -P0" */
41 //usage: "\n -m TYPE "CRYPT_METHODS_HELP_STR
46 /* Debian has 'mkpasswd' utility, manpage says:
49 mkpasswd - Overfeatured front end to crypt(3)
51 mkpasswd PASSWORD SALT
55 Use the STRING as salt. It must not contain prefixes such as
58 Use NUMBER rounds. This argument is ignored if the method
59 chosen does not support variable rounds. For the OpenBSD Blowfish
60 method this is the logarithm of the number of rounds.
62 Compute the password using the TYPE method. If TYPE is 'help'
63 then the available methods are printed.
65 Read the password from file descriptor NUM instead of using getpass(3).
66 If the file descriptor is not connected to a tty then
67 no other message than the hashed password is printed on stdout.
72 A list of options which will be evaluated before the ones
73 specified on the command line.
75 This program suffers of a bad case of featuritis.
76 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
80 cryptpw was in bbox before this gem, so we retain it, and alias mkpasswd
81 to cryptpw. -a option (alias for -m) came from cryptpw.
84 int cryptpw_main(int argc
, char **argv
) MAIN_EXTERNALLY_VISIBLE
;
85 int cryptpw_main(int argc UNUSED_PARAM
, char **argv
)
87 /* Supports: cryptpw -m sha256 PASS 'rounds=999999999$SALT' */
88 char salt
[MAX_PW_SALT_LEN
+ sizeof("rounds=999999999$")];
91 const char *opt_m
, *opt_S
;
95 static const char mkpasswd_longopts
[] ALIGN1
=
96 "stdin\0" No_argument
"s"
97 "password-fd\0" Required_argument
"P"
98 "salt\0" Required_argument
"S"
99 "method\0" Required_argument
"m"
103 opt_m
= CONFIG_FEATURE_DEFAULT_PASSWD_ALGO
;
105 /* at most two non-option arguments; -P NUM */
106 getopt32long(argv
, "^" "sP:+S:m:a:" "\0" "?2",
108 &fd
, &opt_S
, &opt_m
, &opt_m
112 /* have no idea how to handle -s... */
114 if (argv
[0] && !opt_S
)
117 salt_ptr
= crypt_make_pw_salt(salt
, opt_m
);
119 /* put user's data after the "$N$" prefix */
120 safe_strncpy(salt_ptr
, opt_S
, sizeof(salt
) - (sizeof("$N$")-1));
122 xmove_fd(fd
, STDIN_FILENO
);
126 /* Only mkpasswd, and only from tty, prompts.
127 * Otherwise it is a plain read. */
128 password
= (ENABLE_MKPASSWD
&& applet_name
[0] == 'm' && isatty(STDIN_FILENO
))
129 ? bb_ask_noecho_stdin("Password: ")
130 : xmalloc_fgetline(stdin
)
132 /* may still be NULL on EOF/error */
136 puts(pw_encrypt(password
, salt
, 1));