diff options
author | 1996-08-08 02:07:21 +0000 | |
---|---|---|
committer | 1996-08-08 02:07:21 +0000 | |
commit | 1501e9f0fc60064085da528bb91003a28023791c (patch) | |
tree | a2edee812e7050d3d8f9a0edfe29f4c858f5267d | |
parent | Document where the prototypes are. (diff) | |
download | wireguard-openbsd-1501e9f0fc60064085da528bb91003a28023791c.tar.xz wireguard-openbsd-1501e9f0fc60064085da528bb91003a28023791c.zip |
encrypt(1), little utility for encrypting passwords from the command line.
-rw-r--r-- | usr.bin/encrypt/Makefile | 5 | ||||
-rw-r--r-- | usr.bin/encrypt/encrypt.1 | 65 | ||||
-rw-r--r-- | usr.bin/encrypt/encrypt.c | 108 |
3 files changed, 178 insertions, 0 deletions
diff --git a/usr.bin/encrypt/Makefile b/usr.bin/encrypt/Makefile new file mode 100644 index 00000000000..3036d369f32 --- /dev/null +++ b/usr.bin/encrypt/Makefile @@ -0,0 +1,5 @@ +# $OpenBSD: Makefile,v 1.1 1996/08/08 02:07:21 downsj Exp $ + +PROG= encrypt + +.include <bsd.prog.mk> diff --git a/usr.bin/encrypt/encrypt.1 b/usr.bin/encrypt/encrypt.1 new file mode 100644 index 00000000000..9ab3a57989b --- /dev/null +++ b/usr.bin/encrypt/encrypt.1 @@ -0,0 +1,65 @@ +.\" $OpenBSD: encrypt.1,v 1.1 1996/08/08 02:07:22 downsj Exp $ +.\" +.\" Copyright (c) 1996, Jason Downs. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS +.\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED +.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +.\" DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, +.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES +.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +.\" CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.Dd August 7, 1996 +.Dt ENCRYPT 1 +.Os OpenBSD +.Sh NAME +.Nm encrypt +.Nd encrypt passwords from the command line +.Sh SYNOPSIS +.Nm encrypt +.Op Fl m +.Op Fl s Ar salt +.Op Ar string +.Sh DESCRIPTION +.Nm encrypt +prints the encrypted form of +.Ar string +to the standard output. This is mostly useful for encrypting passwords +from within scripts, such as +.Xr adduser 8 . +.Pp +The following options are supported: +.Bl -tag -width X +.It Fl m +Encrypt the string using MD5. +.It Fl s Ar salt +Encrypt the string using DES, with the specified +.Ar salt . +.El +.Pp +If no +.Ar string +is specified, +.Nm encrypt +reads one string per line from standard input, encrypting each one with +the same +.Ar salt . +.Sh SEE ALSO +.Xr adduser 8 +.Sh HISTORY +.Nm encrypt +first appeared in OpenBSD 1.2. diff --git a/usr.bin/encrypt/encrypt.c b/usr.bin/encrypt/encrypt.c new file mode 100644 index 00000000000..ac593c38ae4 --- /dev/null +++ b/usr.bin/encrypt/encrypt.c @@ -0,0 +1,108 @@ +/* $OpenBSD: encrypt.c,v 1.1 1996/08/08 02:07:22 downsj Exp $ */ + +/* + * Copyright (c) 1996, Jason Downs. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS + * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, + * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <stdio.h> +#include <sys/types.h> +#include <err.h> +#include <string.h> +#include <unistd.h> + +/* + * Very simple little program, for encrypting passwords from the command + * line. Useful for scripts and such. + */ + +extern char *__progname; +extern char *optarg; +extern int optind; + +void usage() +{ + errx(1, "usage: %s [-m] [-s salt] [string]", __progname); +} + +int main(argc, argv) + int argc; + char *argv[]; +{ + int opt; + int do_md5 = 0; + char *salt = (char *)NULL; + + while ((opt = getopt(argc, argv, "ms:")) != -1) { + switch (opt) { + case 'm': + do_md5 = 1; + break; + case 's': + salt = optarg; + break; + default: + usage(); + } + } + + if (do_md5 && (salt != (char *)NULL)) + usage(); + + if (!do_md5 && (salt == (char *)NULL)) + usage(); + + if ((argc - optind) < 1) { + char line[BUFSIZ]; + + /* Encrypt stdin to stdout. */ + while (!feof(stdin) && (fgets(line, sizeof(line), stdin) != NULL)) { + if ((line[0] == '\0') || (line[0] == '\n')) + continue; + + /* Kill the newline. */ + if (line[strlen(line)] == '\n') + line[strlen(line)] = '\0'; + + fputs(crypt(line, (do_md5 ? "$1$" : salt)), stdout); + fputc('\n', stdout); + } + } else { + char *string; + + /* Perhaps it isn't worth worrying about, but... */ + string = strdup(argv[optind]); + if (string == (char *)NULL) + err(1, NULL); + /* Wipe the argument. */ + bzero(argv[optind], strlen(argv[optind])); + + fputs(crypt(string, (do_md5 ? "$1$" : salt)), stdout); + fputc('\n', stdout); + + /* Wipe our copy, before we free it. */ + bzero(string, strlen(string)); + free(string); + } + exit(0); +} |