Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
O
OpenLDAP
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Dragoș Haiduc
OpenLDAP
Commits
20707392
Commit
20707392
authored
15 years ago
by
Quanah Gibson-Mount
Browse files
Options
Downloads
Patches
Plain Diff
ITS#5696, more for MozNSS. Not usable by default.
parent
ed1de01e
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
3
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
include/portable.hin
+3
-0
3 additions, 0 deletions
include/portable.hin
libraries/libldap/tls_m.c
+1589
-257
1589 additions, 257 deletions
libraries/libldap/tls_m.c
libraries/liblutil/passwd.c
+138
-11
138 additions, 11 deletions
libraries/liblutil/passwd.c
with
1730 additions
and
268 deletions
include/portable.hin
+
3
−
0
View file @
20707392
...
...
@@ -397,6 +397,9 @@
/* define if you have OpenSSL */
#undef HAVE_OPENSSL
/* define if you have MozNSS */
#undef HAVE_MOZNSS
/* Define to 1 if you have the <openssl/bn.h> header file. */
#undef HAVE_OPENSSL_BN_H
...
...
This diff is collapsed.
Click to expand it.
libraries/libldap/tls_m.c
+
1589
−
257
View file @
20707392
This diff is collapsed.
Click to expand it.
libraries/liblutil/passwd.c
+
138
−
11
View file @
20707392
...
...
@@ -34,7 +34,25 @@
#include
<ac/unistd.h>
#if defined(SLAPD_LMHASH)
#if defined(HAVE_OPENSSL)
# include <openssl/des.h>
typedef
des_cblock
des_key
;
typedef
des_cblock
des_data_block
;
typedef
des_key_schedule
des_context
;
#define des_failed(encrypted) 0
#define des_finish(key, schedule)
#elif defined(HAVE_MOZNSS)
# include <pk11pub.h>
typedef
PK11SymKey
*
des_key
;
typedef
unsigned
char
des_data_block
[
8
];
typedef
PK11Context
*
des_context
[
1
];
#define DES_ENCRYPT CKA_ENCRYPT
#endif
#endif
/* SLAPD_LMHASH */
#include
<ac/param.h>
...
...
@@ -632,6 +650,106 @@ static int chk_md5(
}
#ifdef SLAPD_LMHASH
#if defined(HAVE_OPENSSL)
/*
* abstract away setting the parity.
*/
static
void
des_set_key_and_parity
(
des_key
*
key
,
unsigned
char
*
keyData
)
{
memcpy
(
key
,
keyData
,
8
);
des_set_odd_parity
(
key
);
}
#elif defined(HAVE_MOZNSS)
/*
* implement MozNSS wrappers for the openSSL calls
*/
static
void
des_set_key_and_parity
(
des_key
*
key
,
unsigned
char
*
keyData
)
{
SECItem
keyDataItem
;
PK11SlotInfo
*
slot
;
*
key
=
NULL
;
keyDataItem
.
data
=
keyData
;
keyDataItem
.
len
=
8
;
slot
=
PK11_GetBestSlot
(
CKM_DES_ECB
,
NULL
);
if
(
slot
==
NULL
)
{
return
;
}
/* NOTE: this will not work in FIPS mode. In order to make lmhash
* work in fips mode we need to define a LMHASH pbe mechanism and
* do the fulll key derivation inside the token */
*
key
=
PK11_ImportSymKey
(
slot
,
CKM_DES_ECB
,
PK11_OriginGenerated
,
CKA_ENCRYPT
,
&
keyDataItem
,
NULL
);
}
static
void
des_set_key_unchecked
(
des_key
*
key
,
des_context
ctxt
)
{
ctxt
[
0
]
=
NULL
;
/* handle error conditions from previous call */
if
(
!*
key
)
{
return
;
}
ctxt
[
0
]
=
PK11_CreateContextBySymKey
(
CKM_DES_ECB
,
CKA_ENCRYPT
,
*
key
,
NULL
);
}
static
void
des_ecb_encrypt
(
des_data_block
*
plain
,
des_data_block
*
encrypted
,
des_context
ctxt
,
int
op
)
{
SECStatus
rv
;
int
size
;
if
(
ctxt
[
0
]
==
NULL
)
{
/* need to fail here... */
memset
(
encrypted
,
0
,
sizeof
(
des_data_block
));
return
;
}
rv
=
PK11_CipherOp
(
ctxt
[
0
],
(
unsigned
char
*
)
&
encrypted
[
0
],
&
size
,
sizeof
(
des_data_block
),
(
unsigned
char
*
)
&
plain
[
0
],
sizeof
(
des_data_block
));
if
(
rv
!=
SECSuccess
)
{
/* signal failure */
memset
(
encrypted
,
0
,
sizeof
(
des_data_block
));
return
;
}
return
;
}
static
int
des_failed
(
des_data_block
*
encrypted
)
{
static
const
des_data_block
zero
=
{
0
};
return
memcmp
(
encrypted
,
zero
,
sizeof
(
zero
))
==
0
;
}
static
void
des_finish
(
des_key
*
key
,
des_context
ctxt
)
{
if
(
*
key
)
{
PK11_FreeSymKey
(
*
key
);
*
key
=
NULL
;
}
if
(
ctxt
[
0
])
{
PK11_Finalize
(
ctxt
[
0
]);
PK11_DestroyContext
(
ctxt
[
0
],
PR_TRUE
);
ctxt
[
0
]
=
NULL
;
}
}
#endif
/* pseudocode from RFC2433
* A.2 LmPasswordHash()
*
...
...
@@ -692,10 +810,10 @@ static int chk_md5(
static
void
lmPasswd_to_key
(
const
char
*
lmPasswd
,
des_
cblock
*
key
)
des_
key
*
key
)
{
const
unsigned
char
*
lpw
=
(
const
unsigned
char
*
)
lmPasswd
;
unsigned
char
*
k
=
(
unsigned
char
*
)
key
;
unsigned
char
k
[
8
]
;
/* make room for parity bits */
k
[
0
]
=
lpw
[
0
];
...
...
@@ -707,7 +825,7 @@ static void lmPasswd_to_key(
k
[
6
]
=
((
lpw
[
5
]
&
0x3F
)
<<
2
)
|
(
lpw
[
6
]
>>
6
);
k
[
7
]
=
((
lpw
[
6
]
&
0x7F
)
<<
1
);
des_set_
od
d_parity
(
key
);
des_set_
key_an
d_parity
(
key
,
k
);
}
static
int
chk_lanman
(
...
...
@@ -718,10 +836,10 @@ static int chk_lanman(
{
ber_len_t
i
;
char
UcasePassword
[
15
];
des_
cblock
key
;
des_
key_schedule
schedule
;
des_
c
block
StdText
=
"KGS!@#$%"
;
des_
c
block
PasswordHash1
,
PasswordHash2
;
des_
key
key
;
des_
context
schedule
;
des_
data_
block
StdText
=
"KGS!@#$%"
;
des_
data_
block
PasswordHash1
,
PasswordHash2
;
char
PasswordHash
[
33
],
storedPasswordHash
[
33
];
for
(
i
=
0
;
i
<
cred
->
bv_len
;
i
++
)
{
...
...
@@ -741,10 +859,19 @@ static int chk_lanman(
lmPasswd_to_key
(
UcasePassword
,
&
key
);
des_set_key_unchecked
(
&
key
,
schedule
);
des_ecb_encrypt
(
&
StdText
,
&
PasswordHash1
,
schedule
,
DES_ENCRYPT
);
if
(
des_failed
(
&
PasswordHash1
))
{
return
LUTIL_PASSWD_ERR
;
}
lmPasswd_to_key
(
&
UcasePassword
[
7
],
&
key
);
des_set_key_unchecked
(
&
key
,
schedule
);
des_ecb_encrypt
(
&
StdText
,
&
PasswordHash2
,
schedule
,
DES_ENCRYPT
);
if
(
des_failed
(
&
PasswordHash2
))
{
return
LUTIL_PASSWD_ERR
;
}
des_finish
(
&
key
,
schedule
);
sprintf
(
PasswordHash
,
"%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x"
,
PasswordHash1
[
0
],
PasswordHash1
[
1
],
PasswordHash1
[
2
],
PasswordHash1
[
3
],
...
...
@@ -1005,10 +1132,10 @@ static int hash_lanman(
ber_len_t
i
;
char
UcasePassword
[
15
];
des_
cblock
key
;
des_
key_schedule
schedule
;
des_
c
block
StdText
=
"KGS!@#$%"
;
des_
c
block
PasswordHash1
,
PasswordHash2
;
des_
key
key
;
des_
context
schedule
;
des_
data_
block
StdText
=
"KGS!@#$%"
;
des_
data_
block
PasswordHash1
,
PasswordHash2
;
char
PasswordHash
[
33
];
for
(
i
=
0
;
i
<
passwd
->
bv_len
;
i
++
)
{
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment