1 /* vi: set sw=4 ts=4: */
5 * Written for SLIND (from passwd.c) by Alexander Shishkin <virtuoso@slind.org>
6 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
11 #if ENABLE_GETOPT_LONG
14 static const char chpasswd_longopts[] =
15 "encrypted\0" No_argument "e"
16 "md5\0" No_argument "m"
23 int chpasswd_main(int argc, char **argv);
24 int chpasswd_main(int argc, char **argv)
27 char salt[sizeof("$N$XXXXXXXX")];
29 int rnd = rnd; /* we *want* it to be non-initialized! */
32 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
34 opt_complementary = "m--e:e--m";
35 USE_GETOPT_LONG(applet_long_options = chpasswd_longopts;)
36 opt = getopt32(argc, argv, "em");
38 while ((name = xmalloc_getline(stdin)) != NULL) {
39 pass = strchr(name, ':');
41 bb_error_msg_and_die("missing new password");
44 xuname2uid(name); /* dies if there is no such user */
46 if (!(opt & OPT_ENC)) {
47 rnd = crypt_make_salt(salt, 1, rnd);
50 rnd = crypt_make_salt(salt + 3, 4, rnd);
52 pass = pw_encrypt(pass, salt);
55 /* This is rather complex: if user is not found in /etc/shadow,
56 * we try to find & change his passwd in /etc/passwd */
57 #if ENABLE_FEATURE_SHADOWPASSWDS
58 rc = update_passwd(bb_path_shadow_file, name, pass);
59 if (rc == 0) /* no lines updated, no errors detected */
61 rc = update_passwd(bb_path_passwd_file, name, pass);
62 /* LOGMODE_BOTH logs to syslog also */
63 logmode = LOGMODE_BOTH;
65 bb_error_msg_and_die("an error occurred updating password for %s", name);
67 bb_info_msg("Password for '%s' changed", name);
68 logmode = LOGMODE_STDIO;