aboutsummaryrefslogtreecommitdiff
path: root/libbb/pw_encrypt.c
diff options
context:
space:
mode:
authorDenis Vlasenko <vda.linux@googlemail.com>2007-06-18 10:35:06 +0000
committerDenis Vlasenko <vda.linux@googlemail.com>2007-06-18 10:35:06 +0000
commit91e149a3736ddc357950252c02d758515074447f (patch)
tree3f91621bb8958873a71699d8eb018838251e8c17 /libbb/pw_encrypt.c
parent2c91efb7c24da6370810991459ae360029022250 (diff)
downloadbusybox-w32-91e149a3736ddc357950252c02d758515074447f.tar.gz
busybox-w32-91e149a3736ddc357950252c02d758515074447f.tar.bz2
busybox-w32-91e149a3736ddc357950252c02d758515074447f.zip
libbb: random hunt for statics
function old new delta bb_askpass 306 321 +15 pw_encrypt 38 39 +1 static.passwd 64 4 -60 static.cipher 128 4 -124 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 2/2 up/down: 16/-184) Total: -168 bytes # size busybox_old busybox_unstripped text data bss dec hex filename 683705 2704 14240 700649 ab0e9 busybox_old 683721 2704 14064 700489 ab049 busybox_unstripped
Diffstat (limited to 'libbb/pw_encrypt.c')
-rw-r--r--libbb/pw_encrypt.c12
1 files changed, 5 insertions, 7 deletions
diff --git a/libbb/pw_encrypt.c b/libbb/pw_encrypt.c
index d546bc883..e9cf4e3b8 100644
--- a/libbb/pw_encrypt.c
+++ b/libbb/pw_encrypt.c
@@ -12,18 +12,16 @@
12 12
13char *pw_encrypt(const char *clear, const char *salt) 13char *pw_encrypt(const char *clear, const char *salt)
14{ 14{
15 static char cipher[128]; 15 /* Was static char[BIGNUM]. Malloced thing works as well */
16 char *cp; 16 static char *cipher;
17 17
18#if 0 /* was CONFIG_FEATURE_SHA1_PASSWORDS, but there is no such thing??? */ 18#if 0 /* was CONFIG_FEATURE_SHA1_PASSWORDS, but there is no such thing??? */
19 if (strncmp(salt, "$2$", 3) == 0) { 19 if (strncmp(salt, "$2$", 3) == 0) {
20 return sha1_crypt(clear); 20 return sha1_crypt(clear);
21 } 21 }
22#endif 22#endif
23 cp = (char *) crypt(clear, salt); 23
24 /* if crypt (a nonstandard crypt) returns a string too large, 24 free(cipher);
25 truncate it so we don't overrun buffers and hope there is 25 cipher = xstrdup(crypt(clear, salt));
26 enough security in what's left */
27 safe_strncpy(cipher, cp, sizeof(cipher));
28 return cipher; 26 return cipher;
29} 27}