/usr/bin/radcrypt is in freeradius-utils 3.0.16+dfsg-1ubuntu3.
This file is owned by root:root, with mode 0o755.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 | #!/usr/bin/perl
#
# cryptpasswd Generate or check md5 and DES hashed passwords.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
#
# Copyright (C) 2001 The FreeRADIUS Project http://www.freeradius.org
#
# Written by Miquel van Smoorenburg <miquels@cistron-office.nl>
#
# $Id: dbc0f4f5c52fc88d0c5dd8379571892be3c765ed $
#
use Getopt::Long;
sub check_des {
return (crypt("fnord", "aa") =~ m/^aa/);
}
sub check_md5 {
return (crypt("fnord", "\$1\$aa") =~ m/^\$1\$/);
}
sub usage {
$name = $0;
$name =~ s,.*/,,;
die "Usage: $name [--des|--md5|--check] plaintext_password [crypted_password]\n";
}
@saltc = ( '.', '/', '0'..'9', 'A'..'Z', 'a'..'z' );
#
# MAIN
#
sub main {
Getopt::Long::Configure("no_ignore_case", "bundling");
my @options = ( "des|d+", "md5|m+", "check|c+" );
usage() unless (eval { Getopt::Long::GetOptions(@options) } );
if ($opt_check) {
usage unless ($#ARGV == 1);
if (crypt($ARGV[0], $ARGV[1]) ne $ARGV[1]) {
print "Password BAD\n";
return 0;
} else {
print "Password OK\n";
return 1;
}
}
$opt_des = 1 unless ($opt_des || $opt_md5);
usage() unless ($#ARGV == 0);
die "DES password hashing not available\n"
if ($opt_des && !check_des());
die "MD5 password hashing not available\n"
if ($opt_md5 && !check_md5());
$salt = ($opt_md5 ? '$1$' : '');
for ($i = 0; $i < ($opt_md5 ? 8 : 2); $i++) {
$salt .= $saltc[rand 64];
}
$salt .= '$' if ($opt_md5);
print crypt($ARGV[0], $salt), "\n";
1;
}
exit !main();
|