2002-06-23 09:54:25 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* Utility routine.
|
|
|
|
*
|
2004-03-15 13:59:22 +05:30
|
|
|
* Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
|
2002-06-23 09:54:25 +05:30
|
|
|
*
|
2006-07-10 17:11:19 +05:30
|
|
|
* Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
|
2002-06-23 09:54:25 +05:30
|
|
|
*/
|
|
|
|
|
2006-06-19 01:50:07 +05:30
|
|
|
#include "libbb.h"
|
2002-06-23 09:54:25 +05:30
|
|
|
#include <crypt.h>
|
|
|
|
|
2006-03-07 02:17:33 +05:30
|
|
|
char *pw_encrypt(const char *clear, const char *salt)
|
2002-06-23 09:54:25 +05:30
|
|
|
{
|
|
|
|
static char cipher[128];
|
|
|
|
char *cp;
|
|
|
|
|
2006-09-28 05:01:59 +05:30
|
|
|
#if 0 /* was CONFIG_FEATURE_SHA1_PASSWORDS, but there is no such thing??? */
|
2002-06-23 09:54:25 +05:30
|
|
|
if (strncmp(salt, "$2$", 3) == 0) {
|
|
|
|
return sha1_crypt(clear);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
cp = (char *) crypt(clear, salt);
|
|
|
|
/* if crypt (a nonstandard crypt) returns a string too large,
|
|
|
|
truncate it so we don't overrun buffers and hope there is
|
|
|
|
enough security in what's left */
|
2003-05-26 19:37:50 +05:30
|
|
|
safe_strncpy(cipher, cp, sizeof(cipher));
|
2002-06-23 09:54:25 +05:30
|
|
|
return cipher;
|
|
|
|
}
|