/* $NetBSD: slappasswd.c,v 1.3 2021/08/14 16:14:58 christos Exp $ */
/* $OpenLDAP$ */
/* This work is part of OpenLDAP Software .
*
* Copyright 1998-2021 The OpenLDAP Foundation.
* Portions Copyright 1998-2003 Kurt D. Zeilenga.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted only as authorized by the OpenLDAP
* Public License.
*
* A copy of this license is available in file LICENSE in the
* top-level directory of the distribution or, alternatively, at
* .
*/
/* ACKNOWLEDGEMENTS:
* This work was initially developed by Kurt Zeilenga for inclusion
* in OpenLDAP Software.
*/
#include
__RCSID("$NetBSD: slappasswd.c,v 1.3 2021/08/14 16:14:58 christos Exp $");
#include "portable.h"
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include "ldap_defaults.h"
#include "slap.h"
#include "slap-config.h"
#include "slapcommon.h"
static char *modulepath = NULL;
static char *moduleload = NULL;
static int moduleargc = 0;
static char **moduleargv = NULL;
static void
usage(const char *s)
{
fprintf(stderr,
"Usage: %s [options]\n"
" -c format\tcrypt(3) salt format\n"
" -g\t\tgenerate random password\n"
" -h hash\tpassword scheme\n"
" -n\t\tomit trailing newline\n"
" -o [=val] specify an option with a(n optional) value\n"
" \tmodule-path=\n"
" \tmodule-load=\n"
" -s secret\tnew password\n"
" -u\t\tgenerate RFC2307 values (default)\n"
" -v\t\tincrease verbosity\n"
" -T file\tread file for new password\n"
, s );
exit( EXIT_FAILURE );
}
static int
parse_slappasswdopt( void )
{
size_t len = 0;
char *p;
p = strchr( optarg, '=' );
if ( p != NULL ) {
len = p - optarg;
p++;
}
if ( strncasecmp( optarg, "module-path", len ) == 0 ) {
modulepath = p;
} else if ( strncasecmp( optarg, "module-load", len ) == 0 ) {
ConfigArgs c = { .line = p };
if ( config_fp_parse_line( &c ) ) {
return -1;
}
moduleload = c.argv[0];
moduleargc = c.argc - 1;
if ( moduleargc ) {
moduleargv = c.argv+1;
}
} else {
return -1;
}
return 0;
}
int
slappasswd( int argc, char *argv[] )
{
int rc = EXIT_SUCCESS;
#ifdef LUTIL_SHA1_BYTES
char *default_scheme = "{SSHA}";
#else
char *default_scheme = "{SMD5}";
#endif
char *scheme = default_scheme;
char *newpw = NULL;
char *pwfile = NULL;
const char *text;
const char *progname = "slappasswd";
int i;
char *newline = "\n";
struct berval passwd = BER_BVNULL;
struct berval hash = BER_BVNULL;
#ifdef LDAP_DEBUG
/* tools default to "none", so that at least LDAP_DEBUG_ANY
* messages show up; use -d 0 to reset */
slap_debug = LDAP_DEBUG_NONE;
#endif
ldap_syslog = 0;
while( (i = getopt( argc, argv,
"c:d:gh:no:s:T:vu" )) != EOF )
{
switch (i) {
case 'c': /* crypt salt format */
scheme = "{CRYPT}";
lutil_salt_format( optarg );
break;
case 'g': /* new password (generate) */
if ( pwfile != NULL ) {
fprintf( stderr, "Option -g incompatible with -T\n" );
return EXIT_FAILURE;
} else if ( newpw != NULL ) {
fprintf( stderr, "New password already provided\n" );
return EXIT_FAILURE;
} else if ( lutil_passwd_generate( &passwd, 8 )) {
fprintf( stderr, "Password generation failed\n" );
return EXIT_FAILURE;
}
break;
case 'h': /* scheme */
if ( scheme != default_scheme ) {
fprintf( stderr, "Scheme already provided\n" );
return EXIT_FAILURE;
} else {
scheme = optarg;
}
break;
case 'n':
newline = "";
break;
case 'o':
if ( parse_slappasswdopt() ) {
usage ( progname );
}
break;
case 's': /* new password (secret) */
if ( pwfile != NULL ) {
fprintf( stderr, "Option -s incompatible with -T\n" );
return EXIT_FAILURE;
} else if ( newpw != NULL ) {
fprintf( stderr, "New password already provided\n" );
return EXIT_FAILURE;
} else {
char* p;
newpw = ch_strdup( optarg );
for( p = optarg; *p != '\0'; p++ ) {
*p = '\0';
}
}
break;
case 'T': /* password file */
if ( pwfile != NULL ) {
fprintf( stderr, "Password file already provided\n" );
return EXIT_FAILURE;
} else if ( newpw != NULL ) {
fprintf( stderr, "Option -T incompatible with -s/-g\n" );
return EXIT_FAILURE;
}
pwfile = optarg;
break;
case 'u': /* RFC2307 userPassword */
break;
case 'v': /* verbose */
verbose++;
break;
default:
usage ( progname );
}
}
slapTool = SLAPPASSWD;
if( argc - optind != 0 ) {
usage( progname );
}
#ifdef SLAPD_MODULES
if ( module_init() != 0 ) {
fprintf( stderr, "%s: module_init failed\n", progname );
return EXIT_FAILURE;
}
if ( modulepath && module_path(modulepath) ) {
rc = EXIT_FAILURE;
goto destroy;
}
if ( moduleload && module_load(moduleload, moduleargc, moduleargv) ) {
rc = EXIT_FAILURE;
goto destroy;
}
#endif
if( pwfile != NULL ) {
if( lutil_get_filed_password( pwfile, &passwd )) {
rc = EXIT_FAILURE;
goto destroy;
}
} else if ( BER_BVISEMPTY( &passwd )) {
if( newpw == NULL ) {
/* prompt for new password */
char *cknewpw;
newpw = ch_strdup(getpassphrase("New password: "));
cknewpw = getpassphrase("Re-enter new password: ");
if( strcmp( newpw, cknewpw )) {
fprintf( stderr, "Password values do not match\n" );
rc = EXIT_FAILURE;
goto destroy;
}
}
passwd.bv_val = newpw;
passwd.bv_len = strlen(passwd.bv_val);
} else {
hash = passwd;
goto print_pw;
}
lutil_passwd_hash( &passwd, scheme, &hash, &text );
if ( BER_BVISNULL( &hash ) ) {
fprintf( stderr,
"Password generation failed for scheme %s: %s\n",
scheme, text ? text : "" );
rc = EXIT_FAILURE;
goto destroy;
}
if( lutil_passwd( &hash, &passwd, NULL, &text ) ) {
fprintf( stderr, "Password verification failed. %s\n",
text ? text : "" );
rc = EXIT_FAILURE;
goto destroy;
}
print_pw:;
printf( "%s%s" , hash.bv_val, newline );
destroy:;
#ifdef SLAPD_MODULES
module_kill();
#endif
if ( !BER_BVISNULL( &hash ) ) {
ber_memfree( hash.bv_val );
}
if ( passwd.bv_val != hash.bv_val && !BER_BVISNULL( &passwd ) ) {
ber_memfree( passwd.bv_val );
}
return rc;
}