aboutsummaryrefslogtreecommitdiffstats
path: root/unix.c
diff options
context:
space:
mode:
authorWilmer van der Gaast <wilmer@gaast.net>2010-03-08 02:10:41 +0000
committerWilmer van der Gaast <wilmer@gaast.net>2010-03-08 02:10:41 +0000
commit7c9db249e4d94413f561841495d1e147d53327d5 (patch)
tree5918785802291eaee8f14737beeec9876f77883e /unix.c
parentb52e478f9cfea9c0319d3f0203b31e4b5d03f38b (diff)
Replaced obsolete (useless for the current .xml files) encode/decode tools
with a few command-line options to the BitlBee binary. Type "bitlbee -x" for more info.
Diffstat (limited to 'unix.c')
-rw-r--r--unix.c69
1 files changed, 66 insertions, 3 deletions
diff --git a/unix.c b/unix.c
index 56b0ab46..00bea6c8 100644
--- a/unix.c
+++ b/unix.c
@@ -24,11 +24,15 @@
*/
#include "bitlbee.h"
+
+#include "arc.h"
+#include "base64.h"
#include "commands.h"
-#include "crypting.h"
#include "protocols/nogaim.h"
#include "help.h"
#include "ipc.h"
+#include "md5.h"
+#include "misc.h"
#include <signal.h>
#include <unistd.h>
#include <sys/time.h>
@@ -39,12 +43,17 @@ global_t global; /* Against global namespace pollution */
static void sighandler( int signal );
+static int crypt_main( int argc, char *argv[] );
+
int main( int argc, char *argv[] )
{
int i = 0;
char *old_cwd = NULL;
struct sigaction sig, old;
+ if( argc > 1 && strcmp( argv[1], "-x" ) == 0 )
+ return crypt_main( argc, argv );
+
log_init();
global.conf_file = g_strdup( CONF_FILE_DEF );
global.conf = conf_load( argc, argv );
@@ -158,6 +167,62 @@ int main( int argc, char *argv[] )
return( 0 );
}
+static int crypt_main( int argc, char *argv[] )
+{
+ int pass_len;
+ unsigned char *pass_cr, *pass_cl;
+
+ if( argc < 3 )
+ {
+ printf( "Supported:\n"
+ " %s -x enc <key> <cleartext password>\n"
+ " %s -x dec <key> <encrypted password>\n"
+ " %s -x hash <cleartext password>\n"
+ " %s -x unhash <hashed password>\n"
+ " %s -x chkhash <hashed password> <cleartext password>\n",
+ argv[0], argv[0], argv[0], argv[0], argv[0] );
+ }
+ else if( strcmp( argv[2], "enc" ) == 0 )
+ {
+ pass_len = arc_encode( argv[4], strlen( argv[4] ), (unsigned char**) &pass_cr, argv[3], 12 );
+ printf( "%s\n", base64_encode( pass_cr, pass_len ) );
+ }
+ else if( strcmp( argv[2], "dec" ) == 0 )
+ {
+ pass_len = base64_decode( argv[4], (unsigned char**) &pass_cr );
+ arc_decode( pass_cr, pass_len, (char**) &pass_cl, argv[3] );
+ printf( "%s\n", pass_cl );
+ }
+ else if( strcmp( argv[2], "hash" ) == 0 )
+ {
+ md5_byte_t pass_md5[21];
+ md5_state_t md5_state;
+
+ random_bytes( pass_md5 + 16, 5 );
+ md5_init( &md5_state );
+ md5_append( &md5_state, (md5_byte_t*) argv[3], strlen( argv[3] ) );
+ md5_append( &md5_state, pass_md5 + 16, 5 ); /* Add the salt. */
+ md5_finish( &md5_state, pass_md5 );
+
+ printf( "%s\n", base64_encode( pass_md5, 21 ) );
+ }
+ else if( strcmp( argv[2], "unhash" ) == 0 )
+ {
+ printf( "Hash %s submitted to a massive Beowulf cluster of\n"
+ "overclocked 486s. Expect your answer next year somewhere around this time. :-)\n", argv[3] );
+ }
+ else if( strcmp( argv[2], "chkhash" ) == 0 )
+ {
+ int st = md5_verify_password( argv[4], argv[3] );
+
+ printf( "Hash %s given password.\n", st == 0 ? "matches" : "does not match" );
+
+ return st;
+ }
+
+ return 0;
+}
+
static void sighandler( int signal )
{
/* FIXME: Calling log_message() here is not a very good idea! */
@@ -213,5 +278,3 @@ double gettime()
gettimeofday( time, 0 );
return( (double) time->tv_sec + (double) time->tv_usec / 1000000 );
}
-
-