diff options
author | Denys Vlasenko <vda.linux@googlemail.com> | 2017-01-15 21:48:31 +0100 |
---|---|---|
committer | Denys Vlasenko <vda.linux@googlemail.com> | 2017-01-15 21:48:31 +0100 |
commit | 6c73aaff38819533c55aecc53487d53521915e91 (patch) | |
tree | 0d2c0f0893420f61101d9501303c6e0e0165113c /loginutils | |
parent | 16e7f697f8064a4e5fc2f8e181fe6a7b9602b1b3 (diff) | |
download | busybox-w32-6c73aaff38819533c55aecc53487d53521915e91.tar.gz busybox-w32-6c73aaff38819533c55aecc53487d53521915e91.tar.bz2 busybox-w32-6c73aaff38819533c55aecc53487d53521915e91.zip |
cryptpw: support "rounds=NNNNNNN$" thing in salts
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'loginutils')
-rw-r--r-- | loginutils/cryptpw.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/loginutils/cryptpw.c b/loginutils/cryptpw.c index 9f5f40686..d630231c6 100644 --- a/loginutils/cryptpw.c +++ b/loginutils/cryptpw.c | |||
@@ -35,7 +35,7 @@ | |||
35 | //usage: "[OPTIONS] [PASSWORD] [SALT]" | 35 | //usage: "[OPTIONS] [PASSWORD] [SALT]" |
36 | /* We do support -s, we just don't mention it */ | 36 | /* We do support -s, we just don't mention it */ |
37 | //usage:#define cryptpw_full_usage "\n\n" | 37 | //usage:#define cryptpw_full_usage "\n\n" |
38 | //usage: "Crypt PASSWORD using crypt(3)\n" | 38 | //usage: "Print crypt(3) hashed PASSWORD\n" |
39 | //usage: IF_LONG_OPTS( | 39 | //usage: IF_LONG_OPTS( |
40 | //usage: "\n -P,--password-fd=N Read password from fd N" | 40 | //usage: "\n -P,--password-fd=N Read password from fd N" |
41 | /* //usage: "\n -s,--stdin Use stdin; like -P0" */ | 41 | /* //usage: "\n -s,--stdin Use stdin; like -P0" */ |
@@ -92,7 +92,8 @@ to cryptpw. -a option (alias for -m) came from cryptpw. | |||
92 | int cryptpw_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; | 92 | int cryptpw_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; |
93 | int cryptpw_main(int argc UNUSED_PARAM, char **argv) | 93 | int cryptpw_main(int argc UNUSED_PARAM, char **argv) |
94 | { | 94 | { |
95 | char salt[MAX_PW_SALT_LEN]; | 95 | /* Supports: cryptpw -m sha256 PASS 'rounds=999999999$SALT' */ |
96 | char salt[MAX_PW_SALT_LEN + sizeof("rounds=999999999$")]; | ||
96 | char *salt_ptr; | 97 | char *salt_ptr; |
97 | char *password; | 98 | char *password; |
98 | const char *opt_m, *opt_S; | 99 | const char *opt_m, *opt_S; |
@@ -122,6 +123,7 @@ int cryptpw_main(int argc UNUSED_PARAM, char **argv) | |||
122 | 123 | ||
123 | salt_ptr = crypt_make_pw_salt(salt, opt_m); | 124 | salt_ptr = crypt_make_pw_salt(salt, opt_m); |
124 | if (opt_S) | 125 | if (opt_S) |
126 | /* put user's data after the "$N$" prefix */ | ||
125 | safe_strncpy(salt_ptr, opt_S, sizeof(salt) - (sizeof("$N$")-1)); | 127 | safe_strncpy(salt_ptr, opt_S, sizeof(salt) - (sizeof("$N$")-1)); |
126 | 128 | ||
127 | xmove_fd(fd, STDIN_FILENO); | 129 | xmove_fd(fd, STDIN_FILENO); |