1/* vi: set sw=4 ts=4: */
2/*
3 * chpasswd.c
4 *
5 * Written for SLIND (from passwd.c) by Alexander Shishkin <virtuoso@slind.org>
6 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
7 */
8
9#include "libbb.h"
10
11#if ENABLE_GETOPT_LONG
12#include <getopt.h>
13
14static const char chpasswd_longopts[] ALIGN1 =
15	"encrypted\0" No_argument "e"
16	"md5\0"       No_argument "m"
17	;
18#endif
19
20#define OPT_ENC		1
21#define OPT_MD5		2
22
23int chpasswd_main(int argc, char **argv);
24int chpasswd_main(int argc, char **argv)
25{
26	char *name, *pass;
27	char salt[sizeof("$N$XXXXXXXX")];
28	int opt, rc;
29	int rnd = rnd; /* we *want* it to be non-initialized! */
30
31	if (getuid())
32		bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
33
34	opt_complementary = "m--e:e--m";
35	USE_GETOPT_LONG(applet_long_options = chpasswd_longopts;)
36	opt = getopt32(argv, "em");
37
38	while ((name = xmalloc_getline(stdin)) != NULL) {
39		pass = strchr(name, ':');
40		if (!pass)
41			bb_error_msg_and_die("missing new password");
42		*pass++ = '\0';
43
44		xuname2uid(name); /* dies if there is no such user */
45
46		if (!(opt & OPT_ENC)) {
47			rnd = crypt_make_salt(salt, 1, rnd);
48			if (opt & OPT_MD5) {
49				strcpy(salt, "$1$");
50				rnd = crypt_make_salt(salt + 3, 4, rnd);
51			}
52			pass = pw_encrypt(pass, salt);
53		}
54
55		/* This is rather complex: if user is not found in /etc/shadow,
56		 * we try to find & change his passwd in /etc/passwd */
57#if ENABLE_FEATURE_SHADOWPASSWDS
58		rc = update_passwd(bb_path_shadow_file, name, pass);
59		if (rc == 0) /* no lines updated, no errors detected */
60#endif
61			rc = update_passwd(bb_path_passwd_file, name, pass);
62		/* LOGMODE_BOTH logs to syslog also */
63		logmode = LOGMODE_BOTH;
64		if (rc < 0)
65			bb_error_msg_and_die("an error occurred updating password for %s", name);
66		if (rc)
67			bb_info_msg("Password for '%s' changed", name);
68		logmode = LOGMODE_STDIO;
69		free(name);
70	}
71
72	return 0;
73}
74