blob: 0e4eb9f8a8635a6207ff7cb635e8e522ad57d6a8 [file] [log] [blame]
Eric Andersen27f64e12002-06-23 04:24:25 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routine.
4 *
5 * Copyright (C) 1999-2002 by Erik Andersen <andersee@debian.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 *
21 */
22
23#include <string.h>
24#include <crypt.h>
25#include "libbb.h"
26
27
28extern char *pw_encrypt(const char *clear, const char *salt)
29{
30 static char cipher[128];
31 char *cp;
32
33#ifdef CONFIG_FEATURE_SHA1_PASSWORDS
34 if (strncmp(salt, "$2$", 3) == 0) {
35 return sha1_crypt(clear);
36 }
37#endif
38 cp = (char *) crypt(clear, salt);
39 /* if crypt (a nonstandard crypt) returns a string too large,
40 truncate it so we don't overrun buffers and hope there is
41 enough security in what's left */
42 if (strlen(cp) > sizeof(cipher)-1) {
43 cp[sizeof(cipher)-1] = 0;
44 }
45 strcpy(cipher, cp);
46 return cipher;
47}
48