summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordownsj <downsj@openbsd.org>1996-08-08 02:07:21 +0000
committerdownsj <downsj@openbsd.org>1996-08-08 02:07:21 +0000
commit1501e9f0fc60064085da528bb91003a28023791c (patch)
treea2edee812e7050d3d8f9a0edfe29f4c858f5267d
parentDocument where the prototypes are. (diff)
downloadwireguard-openbsd-1501e9f0fc60064085da528bb91003a28023791c.tar.xz
wireguard-openbsd-1501e9f0fc60064085da528bb91003a28023791c.zip
encrypt(1), little utility for encrypting passwords from the command line.
-rw-r--r--usr.bin/encrypt/Makefile5
-rw-r--r--usr.bin/encrypt/encrypt.165
-rw-r--r--usr.bin/encrypt/encrypt.c108
3 files changed, 178 insertions, 0 deletions
diff --git a/usr.bin/encrypt/Makefile b/usr.bin/encrypt/Makefile
new file mode 100644
index 00000000000..3036d369f32
--- /dev/null
+++ b/usr.bin/encrypt/Makefile
@@ -0,0 +1,5 @@
+# $OpenBSD: Makefile,v 1.1 1996/08/08 02:07:21 downsj Exp $
+
+PROG= encrypt
+
+.include <bsd.prog.mk>
diff --git a/usr.bin/encrypt/encrypt.1 b/usr.bin/encrypt/encrypt.1
new file mode 100644
index 00000000000..9ab3a57989b
--- /dev/null
+++ b/usr.bin/encrypt/encrypt.1
@@ -0,0 +1,65 @@
+.\" $OpenBSD: encrypt.1,v 1.1 1996/08/08 02:07:22 downsj Exp $
+.\"
+.\" Copyright (c) 1996, Jason Downs. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
+.\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+.\" DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
+.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+.\" CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd August 7, 1996
+.Dt ENCRYPT 1
+.Os OpenBSD
+.Sh NAME
+.Nm encrypt
+.Nd encrypt passwords from the command line
+.Sh SYNOPSIS
+.Nm encrypt
+.Op Fl m
+.Op Fl s Ar salt
+.Op Ar string
+.Sh DESCRIPTION
+.Nm encrypt
+prints the encrypted form of
+.Ar string
+to the standard output. This is mostly useful for encrypting passwords
+from within scripts, such as
+.Xr adduser 8 .
+.Pp
+The following options are supported:
+.Bl -tag -width X
+.It Fl m
+Encrypt the string using MD5.
+.It Fl s Ar salt
+Encrypt the string using DES, with the specified
+.Ar salt .
+.El
+.Pp
+If no
+.Ar string
+is specified,
+.Nm encrypt
+reads one string per line from standard input, encrypting each one with
+the same
+.Ar salt .
+.Sh SEE ALSO
+.Xr adduser 8
+.Sh HISTORY
+.Nm encrypt
+first appeared in OpenBSD 1.2.
diff --git a/usr.bin/encrypt/encrypt.c b/usr.bin/encrypt/encrypt.c
new file mode 100644
index 00000000000..ac593c38ae4
--- /dev/null
+++ b/usr.bin/encrypt/encrypt.c
@@ -0,0 +1,108 @@
+/* $OpenBSD: encrypt.c,v 1.1 1996/08/08 02:07:22 downsj Exp $ */
+
+/*
+ * Copyright (c) 1996, Jason Downs. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+ * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#include <stdio.h>
+#include <sys/types.h>
+#include <err.h>
+#include <string.h>
+#include <unistd.h>
+
+/*
+ * Very simple little program, for encrypting passwords from the command
+ * line. Useful for scripts and such.
+ */
+
+extern char *__progname;
+extern char *optarg;
+extern int optind;
+
+void usage()
+{
+ errx(1, "usage: %s [-m] [-s salt] [string]", __progname);
+}
+
+int main(argc, argv)
+ int argc;
+ char *argv[];
+{
+ int opt;
+ int do_md5 = 0;
+ char *salt = (char *)NULL;
+
+ while ((opt = getopt(argc, argv, "ms:")) != -1) {
+ switch (opt) {
+ case 'm':
+ do_md5 = 1;
+ break;
+ case 's':
+ salt = optarg;
+ break;
+ default:
+ usage();
+ }
+ }
+
+ if (do_md5 && (salt != (char *)NULL))
+ usage();
+
+ if (!do_md5 && (salt == (char *)NULL))
+ usage();
+
+ if ((argc - optind) < 1) {
+ char line[BUFSIZ];
+
+ /* Encrypt stdin to stdout. */
+ while (!feof(stdin) && (fgets(line, sizeof(line), stdin) != NULL)) {
+ if ((line[0] == '\0') || (line[0] == '\n'))
+ continue;
+
+ /* Kill the newline. */
+ if (line[strlen(line)] == '\n')
+ line[strlen(line)] = '\0';
+
+ fputs(crypt(line, (do_md5 ? "$1$" : salt)), stdout);
+ fputc('\n', stdout);
+ }
+ } else {
+ char *string;
+
+ /* Perhaps it isn't worth worrying about, but... */
+ string = strdup(argv[optind]);
+ if (string == (char *)NULL)
+ err(1, NULL);
+ /* Wipe the argument. */
+ bzero(argv[optind], strlen(argv[optind]));
+
+ fputs(crypt(string, (do_md5 ? "$1$" : salt)), stdout);
+ fputc('\n', stdout);
+
+ /* Wipe our copy, before we free it. */
+ bzero(string, strlen(string));
+ free(string);
+ }
+ exit(0);
+}