Home  /  Autodocs  /  amiga.lib

NAME

ACrypt
Encrypt a password

SYNOPSIS

newpass = ACrypt( buffer, password, username )

UBYTE *ACrypt( UBYTE *, UBYTE *, UBYTE *) ;

FUNCTION

This function takes a buffer of at least 12 characters in length, an unencrypted password and the user's name (as known to the host system) and returns an encrypted password in the passed buffer. This is a one-way encryption. Normally, the user's encrypted password is stored in a file for future password comparison.

INPUTS

buffer
A pointer to a buffer at least 12 bytes in length.

password
A pointer to an unencrypted password string.

username
A pointer to the user's name.

RESULT

newpass
A pointer to the passed buffer if successful, NULL upon failure. The encrypted password placed in the buffer will be be eleven (11) characters in length and will be NULL-terminated.

EXAMPLE



UBYTE *pw, *getpassword() ;
UBYTE *user = "alf"
UBYTE *newpass ;
UBYTE buffer[16] ; \* size >= 12 *\

pw = getpassword() ; \* your own function *\

if((newpass = ACrypt(buffer, pw, user)) != NULL)
{
printf("pw = %s\n", newpass) ; \* newpass = &buffer[0] *\
}
else
{
printf("ACrypt failed\n") ;
}

NOTES

This function first appeared in later V39 versions of amiga.lib, but works under V37 and up.

This function will return NULL if utility.library cannot be opened.

Both the user name and the password must be NUL-terminated if they are shorter than 12 characters.

Neither user name nor password should be empty strings.

This function combines the user name and password, using only the first 11 characters from each, producing a NUL-terminated "digest" string of ASCII characters. This process should not be assumed to be secure in any way. Encryption alone does not induce security.

ACrypt() was designed for use with the Envoy peer-to-peer Amiga network resource sharing product and lacks even the basic properties of a secure password storage system. Do not use ACrypt() if you can avoid it.