File: cryptpasswd.in

package info (click to toggle)
freeradius 1.0.2-4sarge3
  • links: PTS
  • area: main
  • in suites: sarge
  • size: 9,792 kB
  • ctags: 6,980
  • sloc: ansic: 52,618; sh: 9,731; php: 5,764; perl: 2,309; makefile: 1,056; sql: 730; python: 159; tcl: 33; sed: 23
file content (80 lines) | stat: -rwxr-xr-x 2,145 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
#!@PERL@
#
# cryptpasswd	Generate or check md5 and DES hashed passwords.
#
#    This program is free software; you can redistribute it and/or modify
#    it under the terms of the GNU General Public License as published by
#    the Free Software Foundation; either version 2 of the License, or
#    (at your option) any later version.
#
#    This program is distributed in the hope that it will be useful,
#    but WITHOUT ANY WARRANTY; without even the implied warranty of
#    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
#    GNU General Public License for more details.
#
#    You should have received a copy of the GNU General Public License
#    along with this program; if not, write to the Free Software
#    Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
#
#    Copyright (C) 2001 The FreeRADIUS Project   http://www.freeradius.org
#
#    Written by Miquel van Smoorenburg <miquels@cistron-office.nl>
#
#    $Id: cryptpasswd.in,v 1.1 2001/09/28 14:04:29 aland Exp $
#

use Getopt::Long;

sub check_des {
	return (crypt("fnord", "aa") =~ m/^aa/);
}

sub check_md5 {
	return (crypt("fnord", "\$1\$aa") =~ m/^\$1\$/);
}

sub usage {
	die "Usage: cryptpasswd [--des|--md5|--check] plaintext_password [crypted_password]\n";
}

@saltc = ( '.', '/', '0'..'9', 'A'..'Z', 'a'..'z' );

#
#	MAIN
#
sub main {

	Getopt::Long::Configure("no_ignore_case", "bundling");
	my @options = (	"des|d+", "md5|m+", "check|c+" );
	usage() unless (eval { Getopt::Long::GetOptions(@options) } );

	if ($opt_check) {
		usage unless ($#ARGV == 1);
		if (crypt($ARGV[0], $ARGV[1]) ne $ARGV[1]) {
			print "Password BAD\n";
			return 0;
		} else {
			print "Password OK\n";
			return 1;
		}
	}

	usage() unless ($opt_des || $opt_md5);
	usage() unless ($#ARGV == 0);

	die "DES password hashing not available\n"
		if ($opt_des && !check_des());
	die "MD5 password hashing not available\n"
		if ($opt_md5 && !check_md5());

	$salt = ($opt_md5 ? '$1$' : '');
	for ($i = 0; $i < ($opt_md5 ? 8 : 2); $i++) {
		$salt .= $saltc[rand 64];
	}
	$salt .= '$' if ($opt_md5);
	print crypt($ARGV[0], $salt), "\n";

	1;
}

exit !main();