diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 16:35:32 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 16:35:32 +0000 |
commit | 5ea77a75dd2d2158401331879f3c8f47940a732c (patch) | |
tree | d89dc06e9f4850a900f161e25f84e922c4f86cc8 /servers/slapd/slappasswd.c | |
parent | Initial commit. (diff) | |
download | openldap-5ea77a75dd2d2158401331879f3c8f47940a732c.tar.xz openldap-5ea77a75dd2d2158401331879f3c8f47940a732c.zip |
Adding upstream version 2.5.13+dfsg.upstream/2.5.13+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | servers/slapd/slappasswd.c | 301 |
1 files changed, 301 insertions, 0 deletions
diff --git a/servers/slapd/slappasswd.c b/servers/slapd/slappasswd.c new file mode 100644 index 0000000..9c2adef --- /dev/null +++ b/servers/slapd/slappasswd.c @@ -0,0 +1,301 @@ +/* $OpenLDAP$ */ +/* This work is part of OpenLDAP Software <http://www.openldap.org/>. + * + * Copyright 1998-2022 The OpenLDAP Foundation. + * Portions Copyright 1998-2003 Kurt D. Zeilenga. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * <http://www.OpenLDAP.org/license.html>. + */ +/* ACKNOWLEDGEMENTS: + * This work was initially developed by Kurt Zeilenga for inclusion + * in OpenLDAP Software. + */ + +#include "portable.h" + +#include <stdio.h> + +#include <ac/stdlib.h> + +#include <ac/ctype.h> +#include <ac/signal.h> +#include <ac/socket.h> +#include <ac/string.h> +#include <ac/time.h> +#include <ac/unistd.h> + +#include <ldap.h> +#include <lber_pvt.h> +#include <lutil.h> +#include <lutil_sha1.h> + +#include "ldap_defaults.h" + +#include "slap.h" +#include "slap-config.h" +#include "slapcommon.h" + +static char *modulepath = NULL; +static char *moduleload = NULL; +static int moduleargc = 0; +static char **moduleargv = NULL; + +static void +usage(const char *s) +{ + fprintf(stderr, + "Usage: %s [options]\n" + " -c format\tcrypt(3) salt format\n" + " -g\t\tgenerate random password\n" + " -h hash\tpassword scheme\n" + " -n\t\tomit trailing newline\n" + " -o <opt>[=val] specify an option with a(n optional) value\n" + " \tmodule-path=<pathspec>\n" + " \tmodule-load=<filename>\n" + " -s secret\tnew password\n" + " -u\t\tgenerate RFC2307 values (default)\n" + " -v\t\tincrease verbosity\n" + " -T file\tread file for new password\n" + , s ); + + exit( EXIT_FAILURE ); +} + +static int +parse_slappasswdopt( void ) +{ + size_t len = 0; + char *p; + + p = strchr( optarg, '=' ); + if ( p != NULL ) { + len = p - optarg; + p++; + } + + if ( strncasecmp( optarg, "module-path", len ) == 0 ) { + modulepath = p; + + } else if ( strncasecmp( optarg, "module-load", len ) == 0 ) { + ConfigArgs c = { .line = p }; + + if ( config_fp_parse_line( &c ) ) { + return -1; + } + moduleload = c.argv[0]; + + moduleargc = c.argc - 1; + if ( moduleargc ) { + moduleargv = c.argv+1; + } + + } else { + return -1; + } + + return 0; +} + +int +slappasswd( int argc, char *argv[] ) +{ + int rc = EXIT_SUCCESS; +#ifdef LUTIL_SHA1_BYTES + char *default_scheme = "{SSHA}"; +#else + char *default_scheme = "{SMD5}"; +#endif + char *scheme = default_scheme; + + char *newpw = NULL; + char *pwfile = NULL; + const char *text; + const char *progname = "slappasswd"; + + int i; + char *newline = "\n"; + struct berval passwd = BER_BVNULL; + struct berval hash = BER_BVNULL; + +#ifdef LDAP_DEBUG + /* tools default to "none", so that at least LDAP_DEBUG_ANY + * messages show up; use -d 0 to reset */ + slap_debug = LDAP_DEBUG_NONE; +#endif + ldap_syslog = 0; + + while( (i = getopt( argc, argv, + "c:d:gh:no:s:T:vu" )) != EOF ) + { + switch (i) { + case 'c': /* crypt salt format */ + scheme = "{CRYPT}"; + lutil_salt_format( optarg ); + break; + + case 'g': /* new password (generate) */ + if ( pwfile != NULL ) { + fprintf( stderr, "Option -g incompatible with -T\n" ); + return EXIT_FAILURE; + + } else if ( newpw != NULL ) { + fprintf( stderr, "New password already provided\n" ); + return EXIT_FAILURE; + + } else if ( lutil_passwd_generate( &passwd, 8 )) { + fprintf( stderr, "Password generation failed\n" ); + return EXIT_FAILURE; + } + break; + + case 'h': /* scheme */ + if ( scheme != default_scheme ) { + fprintf( stderr, "Scheme already provided\n" ); + return EXIT_FAILURE; + + } else { + scheme = optarg; + } + break; + + case 'n': + newline = ""; + break; + + case 'o': + if ( parse_slappasswdopt() ) { + usage ( progname ); + } + break; + + case 's': /* new password (secret) */ + if ( pwfile != NULL ) { + fprintf( stderr, "Option -s incompatible with -T\n" ); + return EXIT_FAILURE; + + } else if ( newpw != NULL ) { + fprintf( stderr, "New password already provided\n" ); + return EXIT_FAILURE; + + } else { + char* p; + newpw = ch_strdup( optarg ); + + for( p = optarg; *p != '\0'; p++ ) { + *p = '\0'; + } + } + break; + + case 'T': /* password file */ + if ( pwfile != NULL ) { + fprintf( stderr, "Password file already provided\n" ); + return EXIT_FAILURE; + + } else if ( newpw != NULL ) { + fprintf( stderr, "Option -T incompatible with -s/-g\n" ); + return EXIT_FAILURE; + + } + pwfile = optarg; + break; + + case 'u': /* RFC2307 userPassword */ + break; + + case 'v': /* verbose */ + verbose++; + break; + + default: + usage ( progname ); + } + } + slapTool = SLAPPASSWD; + + if( argc - optind != 0 ) { + usage( progname ); + } + +#ifdef SLAPD_MODULES + if ( module_init() != 0 ) { + fprintf( stderr, "%s: module_init failed\n", progname ); + return EXIT_FAILURE; + } + + if ( modulepath && module_path(modulepath) ) { + rc = EXIT_FAILURE; + goto destroy; + } + + if ( moduleload && module_load(moduleload, moduleargc, moduleargv) ) { + rc = EXIT_FAILURE; + goto destroy; + } +#endif + + if( pwfile != NULL ) { + if( lutil_get_filed_password( pwfile, &passwd )) { + rc = EXIT_FAILURE; + goto destroy; + } + } else if ( BER_BVISEMPTY( &passwd )) { + if( newpw == NULL ) { + /* prompt for new password */ + char *cknewpw; + newpw = ch_strdup(getpassphrase("New password: ")); + cknewpw = getpassphrase("Re-enter new password: "); + + if( strcmp( newpw, cknewpw )) { + fprintf( stderr, "Password values do not match\n" ); + rc = EXIT_FAILURE; + goto destroy; + } + } + + passwd.bv_val = newpw; + passwd.bv_len = strlen(passwd.bv_val); + } else { + hash = passwd; + goto print_pw; + } + + lutil_passwd_hash( &passwd, scheme, &hash, &text ); + if ( BER_BVISNULL( &hash ) ) { + fprintf( stderr, + "Password generation failed for scheme %s: %s\n", + scheme, text ? text : "" ); + rc = EXIT_FAILURE; + goto destroy; + } + + if( lutil_passwd( &hash, &passwd, NULL, &text ) ) { + fprintf( stderr, "Password verification failed. %s\n", + text ? text : "" ); + rc = EXIT_FAILURE; + goto destroy; + } + +print_pw:; + printf( "%s%s" , hash.bv_val, newline ); + +destroy:; +#ifdef SLAPD_MODULES + module_kill(); +#endif + if ( !BER_BVISNULL( &hash ) ) { + ber_memfree( hash.bv_val ); + } + if ( passwd.bv_val != hash.bv_val && !BER_BVISNULL( &passwd ) ) { + ber_memfree( passwd.bv_val ); + } + + return rc; +} |