2007-01-25 06:40:21 +00:00
|
|
|
/* simple password generator by Nelson Minar (minar@reed.edu)
|
|
|
|
** copyright 1991, all rights reserved.
|
|
|
|
** You can use this code as long as my name stays with it.
|
|
|
|
**
|
|
|
|
** md5 patch by W. Campbell <wcampbel@botbay.net>
|
|
|
|
** Modernization, getopt, etc for the Hybrid IRCD team
|
|
|
|
** by W. Campbell
|
2014-03-03 04:25:47 +00:00
|
|
|
**
|
|
|
|
** /dev/random for salt generation added by
|
2007-01-25 06:40:21 +00:00
|
|
|
** Aaron Sethman <androsyn@ratbox.org>
|
|
|
|
**
|
2009-02-21 23:59:16 +00:00
|
|
|
** $Id: mkpasswd.c 26439 2009-02-01 15:27:24Z jilles $
|
2007-01-25 06:40:21 +00:00
|
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
2009-02-21 23:59:16 +00:00
|
|
|
#include "ratbox_lib.h"
|
|
|
|
#ifndef __MINGW32__
|
|
|
|
#include <pwd.h>
|
|
|
|
#endif
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
#define FLAG_MD5 0x00000001
|
|
|
|
#define FLAG_DES 0x00000002
|
|
|
|
#define FLAG_SALT 0x00000004
|
|
|
|
#define FLAG_PASS 0x00000008
|
|
|
|
#define FLAG_LENGTH 0x00000010
|
2007-01-25 06:40:21 +00:00
|
|
|
#define FLAG_BLOWFISH 0x00000020
|
2009-02-21 23:59:16 +00:00
|
|
|
#define FLAG_ROUNDS 0x00000040
|
|
|
|
#define FLAG_EXT 0x00000080
|
|
|
|
#define FLAG_SHA256 0x00000100
|
|
|
|
#define FLAG_SHA512 0x00000200
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
|
|
|
|
static char *make_des_salt(void);
|
|
|
|
static char *make_ext_salt(int);
|
|
|
|
static char *make_ext_salt_para(int, char *);
|
|
|
|
static char *make_md5_salt(int);
|
|
|
|
static char *make_md5_salt_para(char *);
|
2009-02-21 23:59:16 +00:00
|
|
|
static char *make_sha256_salt(int);
|
|
|
|
static char *make_sha256_salt_para(char *);
|
|
|
|
static char *make_sha512_salt(int);
|
|
|
|
static char *make_sha512_salt_para(char *);
|
2007-01-25 06:40:21 +00:00
|
|
|
static char *make_bf_salt(int, int);
|
|
|
|
static char *make_bf_salt_para(int, char *);
|
|
|
|
static char *int_to_base64(int);
|
|
|
|
static char *generate_random_salt(char *, int);
|
|
|
|
static char *generate_poor_salt(char *, int);
|
|
|
|
|
2017-07-31 01:55:24 +00:00
|
|
|
static void full_usage(void) __attribute__((noreturn));
|
|
|
|
static void brief_usage(void) __attribute__((noreturn));
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
static char saltChars[] = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
2007-01-25 06:40:21 +00:00
|
|
|
/* 0 .. 63, ascii - 64 */
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
#ifdef __MINGW32__
|
|
|
|
#include <conio.h>
|
|
|
|
#ifdef PASS_MAX
|
|
|
|
#undef PASS_MAX
|
|
|
|
#endif
|
|
|
|
#define PASS_MAX 256
|
|
|
|
static char getpassbuf[PASS_MAX + 1];
|
|
|
|
|
|
|
|
static char *
|
|
|
|
getpass(const char *prompt)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
int c;
|
|
|
|
int i = 0;
|
|
|
|
|
2015-04-20 05:55:20 +00:00
|
|
|
memset(getpassbuf, 0, sizeof(getpassbuf));
|
2009-02-21 23:59:16 +00:00
|
|
|
fputs(prompt, stderr);
|
|
|
|
for(;;)
|
|
|
|
{
|
|
|
|
c = _getch();
|
|
|
|
if(c == '\r')
|
|
|
|
{
|
|
|
|
getpassbuf[i] = '\0';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if(i < PASS_MAX)
|
|
|
|
{
|
|
|
|
getpassbuf[i++] = c;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fputs("\r\n", stderr);
|
|
|
|
|
|
|
|
return getpassbuf;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
2009-02-21 23:59:16 +00:00
|
|
|
#endif
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
char *plaintext = NULL;
|
|
|
|
int c;
|
|
|
|
char *saltpara = NULL;
|
|
|
|
char *salt;
|
2016-12-20 03:54:08 +00:00
|
|
|
char *hashed, *hashed2;
|
2009-02-21 23:59:16 +00:00
|
|
|
int flag = 0;
|
|
|
|
int length = 0; /* Not Set */
|
|
|
|
int rounds = 0; /* Not set, since extended DES needs 25 and blowfish needs
|
|
|
|
** 4 by default, a side effect of this being the encryption
|
|
|
|
** type parameter must be specified before the rounds
|
|
|
|
** parameter.
|
|
|
|
*/
|
|
|
|
|
|
|
|
while((c = getopt(argc, argv, "xymdber:h?l:s:p:")) != -1)
|
|
|
|
{
|
|
|
|
switch (c)
|
|
|
|
{
|
|
|
|
case 'm':
|
|
|
|
flag |= FLAG_MD5;
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
flag |= FLAG_DES;
|
|
|
|
break;
|
|
|
|
case 'b':
|
|
|
|
flag |= FLAG_BLOWFISH;
|
|
|
|
rounds = 4;
|
|
|
|
break;
|
|
|
|
case 'e':
|
|
|
|
flag |= FLAG_EXT;
|
|
|
|
rounds = 25;
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
flag |= FLAG_LENGTH;
|
|
|
|
length = atoi(optarg);
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
flag |= FLAG_ROUNDS;
|
|
|
|
rounds = atoi(optarg);
|
|
|
|
break;
|
|
|
|
case 's':
|
|
|
|
flag |= FLAG_SALT;
|
|
|
|
saltpara = optarg;
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
flag |= FLAG_PASS;
|
|
|
|
plaintext = optarg;
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
flag |= FLAG_SHA256;
|
|
|
|
break;
|
|
|
|
case 'y':
|
|
|
|
flag |= FLAG_SHA512;
|
|
|
|
break;
|
|
|
|
case 'h':
|
|
|
|
full_usage();
|
|
|
|
/* NOT REACHED */
|
|
|
|
case '?':
|
|
|
|
brief_usage();
|
|
|
|
/* NOT REACHED */
|
|
|
|
default:
|
|
|
|
printf("Invalid Option: -%c\n", c);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-01-06 06:56:47 +00:00
|
|
|
if(flag & FLAG_MD5)
|
|
|
|
{
|
|
|
|
if(length == 0)
|
|
|
|
length = 8;
|
|
|
|
if(flag & FLAG_SALT)
|
|
|
|
salt = make_md5_salt_para(saltpara);
|
|
|
|
else
|
|
|
|
salt = make_md5_salt(length);
|
|
|
|
}
|
|
|
|
else if(flag & FLAG_BLOWFISH)
|
2009-02-21 23:59:16 +00:00
|
|
|
{
|
|
|
|
if(length == 0)
|
|
|
|
length = 22;
|
|
|
|
if(flag & FLAG_SALT)
|
|
|
|
salt = make_bf_salt_para(rounds, saltpara);
|
|
|
|
else
|
|
|
|
salt = make_bf_salt(rounds, length);
|
|
|
|
}
|
|
|
|
else if(flag & FLAG_SHA256)
|
|
|
|
{
|
|
|
|
if(length == 0)
|
|
|
|
length = 16;
|
|
|
|
if(flag & FLAG_SALT)
|
|
|
|
salt = make_sha256_salt_para(saltpara);
|
|
|
|
else
|
|
|
|
salt = make_sha256_salt(length);
|
|
|
|
}
|
|
|
|
else if(flag & FLAG_EXT)
|
|
|
|
{
|
|
|
|
/* XXX - rounds needs to be done */
|
|
|
|
if(flag & FLAG_SALT)
|
|
|
|
{
|
|
|
|
if((strlen(saltpara) == 4))
|
|
|
|
{
|
|
|
|
salt = make_ext_salt_para(rounds, saltpara);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
printf("Invalid salt, please enter 4 alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
salt = make_ext_salt(rounds);
|
|
|
|
}
|
|
|
|
}
|
2010-09-15 08:44:58 +00:00
|
|
|
else if (flag & FLAG_DES)
|
2009-02-21 23:59:16 +00:00
|
|
|
{
|
|
|
|
if(flag & FLAG_SALT)
|
|
|
|
{
|
|
|
|
if((strlen(saltpara) == 2))
|
|
|
|
{
|
|
|
|
salt = saltpara;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
printf("Invalid salt, please enter 2 alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
salt = make_des_salt();
|
|
|
|
}
|
|
|
|
}
|
2010-09-15 08:44:58 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
if(length == 0)
|
2011-01-06 06:56:47 +00:00
|
|
|
length = 16;
|
2010-09-15 08:44:58 +00:00
|
|
|
if(flag & FLAG_SALT)
|
2011-01-06 06:56:47 +00:00
|
|
|
salt = make_sha512_salt_para(saltpara);
|
2010-09-15 08:44:58 +00:00
|
|
|
else
|
2011-01-06 06:56:47 +00:00
|
|
|
salt = make_sha512_salt(length);
|
2010-09-15 08:44:58 +00:00
|
|
|
}
|
2009-02-21 23:59:16 +00:00
|
|
|
|
|
|
|
if(flag & FLAG_PASS)
|
|
|
|
{
|
|
|
|
if(!plaintext)
|
2014-04-04 23:46:44 +00:00
|
|
|
{
|
|
|
|
fprintf(stderr, "Please enter a valid password\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
hashed = rb_crypt(plaintext, salt);
|
2009-02-21 23:59:16 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2016-12-20 03:54:08 +00:00
|
|
|
plaintext = getpass("plaintext: ");
|
|
|
|
hashed = rb_crypt(plaintext, salt);
|
|
|
|
if (!hashed)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "rb_crypt() failed\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
hashed = strdup(hashed);
|
|
|
|
|
2014-04-04 23:46:44 +00:00
|
|
|
plaintext = getpass("again: ");
|
2016-12-20 03:54:08 +00:00
|
|
|
hashed2 = rb_crypt(plaintext, salt);
|
|
|
|
if (!hashed2)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "rb_crypt() failed\n");
|
|
|
|
return 1;
|
|
|
|
}
|
2014-04-04 23:46:44 +00:00
|
|
|
|
2016-12-20 03:54:08 +00:00
|
|
|
if (strcmp(hashed, hashed2) != 0)
|
2014-04-04 23:46:44 +00:00
|
|
|
{
|
|
|
|
fprintf(stderr, "Passwords do not match\n");
|
|
|
|
return 1;
|
|
|
|
}
|
2009-02-21 23:59:16 +00:00
|
|
|
}
|
|
|
|
|
2014-04-04 23:46:44 +00:00
|
|
|
printf("%s\n", hashed);
|
2009-02-21 23:59:16 +00:00
|
|
|
return 0;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
static char *
|
|
|
|
make_des_salt()
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[3];
|
|
|
|
generate_random_salt(salt, 2);
|
|
|
|
salt[2] = '\0';
|
|
|
|
return salt;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
int_to_base64(int value)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char buf[5];
|
|
|
|
int i;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
for(i = 0; i < 4; i++)
|
|
|
|
{
|
|
|
|
buf[i] = saltChars[value & 63];
|
|
|
|
value >>= 6; /* Right shifting 6 places is the same as dividing by 64 */
|
|
|
|
}
|
|
|
|
|
|
|
|
buf[i] = '\0'; /* not REALLY needed as it's static, and thus initialized
|
|
|
|
** to \0.
|
|
|
|
*/
|
|
|
|
return buf;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
make_ext_salt(int rounds)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[10];
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
sprintf(salt, "_%s", int_to_base64(rounds));
|
|
|
|
generate_random_salt(&salt[5], 4);
|
|
|
|
salt[9] = '\0';
|
|
|
|
return salt;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
make_ext_salt_para(int rounds, char *saltpara)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[10];
|
|
|
|
|
|
|
|
sprintf(salt, "_%s%s", int_to_base64(rounds), saltpara);
|
|
|
|
return salt;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
2009-02-21 23:59:16 +00:00
|
|
|
|
|
|
|
char *
|
|
|
|
make_md5_salt_para(char *saltpara)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[21];
|
|
|
|
if(saltpara && (strlen(saltpara) <= 16))
|
|
|
|
{
|
|
|
|
/* sprintf used because of portability requirements, the length
|
|
|
|
** is checked above, so it should not be too much of a concern
|
|
|
|
*/
|
|
|
|
sprintf(salt, "$1$%s$", saltpara);
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
printf("Invalid Salt, please use up to 16 random alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
/* NOT REACHED */
|
|
|
|
return NULL;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
make_md5_salt(int length)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[21];
|
|
|
|
if(length > 16)
|
|
|
|
{
|
|
|
|
printf("MD5 salt length too long\n");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
salt[0] = '$';
|
|
|
|
salt[1] = '1';
|
|
|
|
salt[2] = '$';
|
|
|
|
generate_random_salt(&salt[3], length);
|
|
|
|
salt[length + 3] = '$';
|
|
|
|
salt[length + 4] = '\0';
|
|
|
|
return salt;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
make_sha256_salt_para(char *saltpara)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[21];
|
|
|
|
if(saltpara && (strlen(saltpara) <= 16))
|
|
|
|
{
|
|
|
|
/* sprintf used because of portability requirements, the length
|
|
|
|
** is checked above, so it should not be too much of a concern
|
|
|
|
*/
|
|
|
|
sprintf(salt, "$5$%s$", saltpara);
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
printf("Invalid Salt, please use up to 16 random alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
/* NOT REACHED */
|
|
|
|
return NULL;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
char *
|
|
|
|
make_sha512_salt_para(char *saltpara)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[21];
|
|
|
|
if(saltpara && (strlen(saltpara) <= 16))
|
|
|
|
{
|
|
|
|
/* sprintf used because of portability requirements, the length
|
|
|
|
** is checked above, so it should not be too much of a concern
|
|
|
|
*/
|
|
|
|
sprintf(salt, "$6$%s$", saltpara);
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
printf("Invalid Salt, please use up to 16 random alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
/* NOT REACHED */
|
|
|
|
return NULL;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-21 23:59:16 +00:00
|
|
|
|
|
|
|
char *
|
|
|
|
make_sha256_salt(int length)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
static char salt[21];
|
|
|
|
if(length > 16)
|
|
|
|
{
|
|
|
|
printf("SHA256 salt length too long\n");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
salt[0] = '$';
|
|
|
|
salt[1] = '5';
|
|
|
|
salt[2] = '$';
|
|
|
|
generate_random_salt(&salt[3], length);
|
|
|
|
salt[length + 3] = '$';
|
|
|
|
salt[length + 4] = '\0';
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
make_sha512_salt(int length)
|
|
|
|
{
|
|
|
|
static char salt[21];
|
|
|
|
if(length > 16)
|
|
|
|
{
|
|
|
|
printf("SHA512 salt length too long\n");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
salt[0] = '$';
|
|
|
|
salt[1] = '6';
|
|
|
|
salt[2] = '$';
|
|
|
|
generate_random_salt(&salt[3], length);
|
|
|
|
salt[length + 3] = '$';
|
|
|
|
salt[length + 4] = '\0';
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
make_bf_salt_para(int rounds, char *saltpara)
|
|
|
|
{
|
|
|
|
static char salt[31];
|
|
|
|
char tbuf[3];
|
|
|
|
if(saltpara && (strlen(saltpara) <= 22))
|
|
|
|
{
|
|
|
|
/* sprintf used because of portability requirements, the length
|
|
|
|
** is checked above, so it should not be too much of a concern
|
|
|
|
*/
|
|
|
|
sprintf(tbuf, "%02d", rounds);
|
|
|
|
sprintf(salt, "$2a$%s$%s$", tbuf, saltpara);
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
printf("Invalid Salt, please use up to 22 random alphanumeric characters\n");
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
/* NOT REACHED */
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
make_bf_salt(int rounds, int length)
|
|
|
|
{
|
|
|
|
static char salt[31];
|
|
|
|
char tbuf[3];
|
|
|
|
if(length > 22)
|
|
|
|
{
|
2011-01-06 05:20:04 +00:00
|
|
|
printf("Blowfish salt length too long\n");
|
2009-02-21 23:59:16 +00:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
sprintf(tbuf, "%02d", rounds);
|
|
|
|
sprintf(salt, "$2a$%s$", tbuf);
|
|
|
|
generate_random_salt(&salt[7], length);
|
|
|
|
salt[length + 7] = '$';
|
|
|
|
salt[length + 8] = '\0';
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
generate_poor_salt(char *salt, int length)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
srand(time(NULL));
|
|
|
|
for(i = 0; i < length; i++)
|
|
|
|
{
|
|
|
|
salt[i] = saltChars[rand() % 64];
|
|
|
|
}
|
|
|
|
return (salt);
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
generate_random_salt(char *salt, int length)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
int fd, i;
|
|
|
|
if((fd = open("/dev/random", O_RDONLY)) < 0)
|
|
|
|
{
|
|
|
|
return (generate_poor_salt(salt, length));
|
|
|
|
}
|
|
|
|
buf = calloc(1, length);
|
|
|
|
if(read(fd, buf, length) != length)
|
|
|
|
{
|
|
|
|
free(buf);
|
|
|
|
return (generate_poor_salt(salt, length));
|
|
|
|
}
|
|
|
|
|
|
|
|
for(i = 0; i < length; i++)
|
|
|
|
{
|
|
|
|
salt[i] = saltChars[abs(buf[i]) % 64];
|
|
|
|
}
|
|
|
|
free(buf);
|
|
|
|
return (salt);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2017-07-31 01:55:24 +00:00
|
|
|
static void
|
2009-02-21 23:59:16 +00:00
|
|
|
full_usage()
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
printf("mkpasswd [-m|-d|-b|-e] [-l saltlength] [-r rounds] [-s salt] [-p plaintext]\n");
|
|
|
|
printf("-x Generate a SHA256 password\n");
|
|
|
|
printf("-y Generate a SHA512 password\n");
|
|
|
|
printf("-m Generate an MD5 password\n");
|
|
|
|
printf("-d Generate a DES password\n");
|
2011-01-06 05:20:04 +00:00
|
|
|
printf("-b Generate a Blowfish password\n");
|
2009-02-21 23:59:16 +00:00
|
|
|
printf("-e Generate an Extended DES password\n");
|
2011-01-06 05:20:04 +00:00
|
|
|
printf("-l Specify a length for a random MD5 or Blowfish salt\n");
|
|
|
|
printf("-r Specify a number of rounds for a Blowfish or Extended DES password\n");
|
|
|
|
printf(" Blowfish: default 4, no more than 6 recommended\n");
|
2009-02-21 23:59:16 +00:00
|
|
|
printf(" Extended DES: default 25\n");
|
|
|
|
printf("-s Specify a salt, 2 alphanumeric characters for DES, up to 16 for MD5,\n");
|
2011-01-06 05:20:04 +00:00
|
|
|
printf(" up to 22 for Blowfish, and 4 for Extended DES\n");
|
2009-02-21 23:59:16 +00:00
|
|
|
printf("-p Specify a plaintext password to use\n");
|
|
|
|
printf("Example: mkpasswd -m -s 3dr -p test\n");
|
|
|
|
exit(0);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2017-07-31 01:55:24 +00:00
|
|
|
static void
|
2009-02-21 23:59:16 +00:00
|
|
|
brief_usage()
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2009-02-21 23:59:16 +00:00
|
|
|
printf("mkpasswd - password hash generator\n");
|
|
|
|
printf("Standard DES: mkpasswd [-d] [-s salt] [-p plaintext]\n");
|
|
|
|
printf("Extended DES: mkpasswd -e [-r rounds] [-s salt] [-p plaintext]\n");
|
|
|
|
printf(" MD5: mkpasswd -m [-l saltlength] [-s salt] [-p plaintext]\n");
|
2011-01-06 05:20:04 +00:00
|
|
|
printf(" Blowfish: mkpasswd -b [-r rounds] [-l saltlength] [-s salt]\n");
|
2009-02-21 23:59:16 +00:00
|
|
|
printf(" [-p plaintext]\n");
|
|
|
|
printf("Use -h for full usage\n");
|
|
|
|
exit(0);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|