Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
O
OpenLDAP
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Jaak Ristioja
OpenLDAP
Commits
df7804de
Commit
df7804de
authored
24 years ago
by
Kurt Zeilenga
Browse files
Options
Downloads
Patches
Plain Diff
ITS#899 LANMAN password contribution from Norbert Klasen
parent
8befe70f
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
libraries/liblutil/passwd.c
+154
-0
154 additions, 0 deletions
libraries/liblutil/passwd.c
with
154 additions
and
0 deletions
libraries/liblutil/passwd.c
+
154
−
0
View file @
df7804de
...
...
@@ -22,6 +22,10 @@
#include
<ac/stdlib.h>
#include
<ac/string.h>
#ifdef SLAPD_LMHASH
# include <openssl/des.h>
#endif
/* SLAPD_LMHASH */
#ifdef SLAPD_SPASSWD
# include <sasl.h>
#endif
...
...
@@ -95,6 +99,13 @@ static int chk_sha1(
const
struct
berval
*
passwd
,
const
struct
berval
*
cred
);
#ifdef SLAPD_LMHASH
static
int
chk_lanman
(
const
struct
pw_scheme
*
scheme
,
const
struct
berval
*
passwd
,
const
struct
berval
*
cred
);
#endif
#ifdef SLAPD_SPASSWD
static
int
chk_sasl
(
const
struct
pw_scheme
*
scheme
,
...
...
@@ -141,6 +152,12 @@ static struct berval *hash_md5(
const
struct
pw_scheme
*
scheme
,
const
struct
berval
*
passwd
);
#ifdef SLAPD_LMHASH
static
struct
berval
*
hash_lanman
(
const
struct
pw_scheme
*
scheme
,
const
struct
berval
*
passwd
);
#endif
#ifdef SLAPD_CRYPT
static
struct
berval
*
hash_crypt
(
const
struct
pw_scheme
*
scheme
,
...
...
@@ -156,6 +173,10 @@ static const struct pw_scheme pw_schemes[] =
{
{
sizeof
(
"{SMD5}"
)
-
1
,
"{SMD5}"
},
chk_smd5
,
hash_smd5
},
{
{
sizeof
(
"{MD5}"
)
-
1
,
"{MD5}"
},
chk_md5
,
hash_md5
},
#ifdef SLAPD_LMHASH
{
{
sizeof
(
"{LANMAN}"
)
-
1
,
"{LANMAN}"
},
chk_lanman
,
hash_lanman
},
#endif
/* SLAPD_LMHASH */
#ifdef SLAPD_SPASSWD
{
{
sizeof
(
"{SASL}"
)
-
1
,
"{SASL}"
},
chk_sasl
,
NULL
},
#endif
...
...
@@ -569,6 +590,19 @@ static int chk_md5(
return
rc
?
1
:
0
;
}
#ifdef SLAPD_LMHASH
static
int
chk_lanman
(
const
struct
pw_scheme
*
scheme
,
const
struct
berval
*
passwd
,
const
struct
berval
*
cred
)
{
struct
berval
*
hash
;
hash
=
hash_lanman
(
scheme
,
cred
);
return
memcmp
(
&
hash
->
bv_val
[
scheme
->
name
.
bv_len
],
passwd
->
bv_val
,
32
);
}
#endif
/* SLAPD_LMHASH */
#ifdef SLAPD_SPASSWD
#ifdef HAVE_CYRUS_SASL
sasl_conn_t
*
lutil_passwd_sasl_conn
=
NULL
;
...
...
@@ -1011,6 +1045,126 @@ static struct berval *hash_md5(
;
}
#ifdef SLAPD_LMHASH
/* pseudocode from RFC2433
* A.2 LmPasswordHash()
*
* LmPasswordHash(
* IN 0-to-14-oem-char Password,
* OUT 16-octet PasswordHash )
* {
* Set UcasePassword to the uppercased Password
* Zero pad UcasePassword to 14 characters
*
* DesHash( 1st 7-octets of UcasePassword,
* giving 1st 8-octets of PasswordHash )
*
* DesHash( 2nd 7-octets of UcasePassword,
* giving 2nd 8-octets of PasswordHash )
* }
*
*
* A.3 DesHash()
*
* DesHash(
* IN 7-octet Clear,
* OUT 8-octet Cypher )
* {
* *
* * Make Cypher an irreversibly encrypted form of Clear by
* * encrypting known text using Clear as the secret key.
* * The known text consists of the string
* *
* * KGS!@#$%
* *
*
* Set StdText to "KGS!@#$%"
* DesEncrypt( StdText, Clear, giving Cypher )
* }
*
*
* A.4 DesEncrypt()
*
* DesEncrypt(
* IN 8-octet Clear,
* IN 7-octet Key,
* OUT 8-octet Cypher )
* {
* *
* * Use the DES encryption algorithm [4] in ECB mode [9]
* * to encrypt Clear into Cypher such that Cypher can
* * only be decrypted back to Clear by providing Key.
* * Note that the DES algorithm takes as input a 64-bit
* * stream where the 8th, 16th, 24th, etc. bits are
* * parity bits ignored by the encrypting algorithm.
* * Unless you write your own DES to accept 56-bit input
* * without parity, you will need to insert the parity bits
* * yourself.
* *
* }
*/
static
struct
berval
*
hash_lanman
(
const
struct
pw_scheme
*
scheme
,
const
struct
berval
*
passwd
)
{
static
void
lmPasswd_to_key
(
const
unsigned
char
*
lmPasswd
,
des_cblock
*
key
)
{
/* make room for parity bits */
((
char
*
)
key
)[
0
]
=
lmPasswd
[
0
];
((
char
*
)
key
)[
1
]
=
((
lmPasswd
[
0
]
&
0x01
)
<<
7
)
|
(
lmPasswd
[
1
]
>>
1
);
((
char
*
)
key
)[
2
]
=
((
lmPasswd
[
1
]
&
0x03
)
<<
6
)
|
(
lmPasswd
[
2
]
>>
2
);
((
char
*
)
key
)[
3
]
=
((
lmPasswd
[
2
]
&
0x07
)
<<
5
)
|
(
lmPasswd
[
3
]
>>
3
);
((
char
*
)
key
)[
4
]
=
((
lmPasswd
[
3
]
&
0x0F
)
<<
4
)
|
(
lmPasswd
[
4
]
>>
4
);
((
char
*
)
key
)[
5
]
=
((
lmPasswd
[
4
]
&
0x1F
)
<<
3
)
|
(
lmPasswd
[
5
]
>>
5
);
((
char
*
)
key
)[
6
]
=
((
lmPasswd
[
5
]
&
0x3F
)
<<
2
)
|
(
lmPasswd
[
6
]
>>
6
);
((
char
*
)
key
)[
7
]
=
((
lmPasswd
[
6
]
&
0x7F
)
<<
1
);
des_set_odd_parity
(
key
);
}
int
i
;
char
UcasePassword
[
15
];
des_cblock
key
;
des_key_schedule
schedule
;
des_cblock
StdText
=
"KGS!@#$%"
;
des_cblock
hash1
,
hash2
;
char
lmhash
[
33
];
struct
berval
hash
;
for
(
i
=
0
;
i
<
passwd
->
bv_len
;
i
++
)
{
if
(
passwd
->
bv_val
[
i
]
==
'\0'
)
{
return
NULL
;
/* NUL character in password */
}
}
if
(
passwd
->
bv_val
[
i
]
!=
'\0'
)
{
return
NULL
;
/* passwd must behave like a string */
}
strncpy
(
UcasePassword
,
passwd
->
bv_val
,
14
);
UcasePassword
[
14
]
=
'\0'
;
ldap_pvt_str2upper
(
UcasePassword
);
lmPasswd_to_key
(
UcasePassword
,
&
key
);
des_set_key_unchecked
(
&
key
,
schedule
);
des_ecb_encrypt
(
&
StdText
,
&
hash1
,
schedule
,
DES_ENCRYPT
);
lmPasswd_to_key
(
&
UcasePassword
[
7
],
&
key
);
des_set_key_unchecked
(
&
key
,
schedule
);
des_ecb_encrypt
(
&
StdText
,
&
hash2
,
schedule
,
DES_ENCRYPT
);
sprintf
(
lmhash
,
"%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x"
,
hash1
[
0
],
hash1
[
1
],
hash1
[
2
],
hash1
[
3
],
hash1
[
4
],
hash1
[
5
],
hash1
[
6
],
hash1
[
7
],
hash2
[
0
],
hash2
[
1
],
hash2
[
2
],
hash2
[
3
],
hash2
[
4
],
hash2
[
5
],
hash2
[
6
],
hash2
[
7
]
);
hash
.
bv_val
=
lmhash
;
hash
.
bv_len
=
32
;
return
pw_string
(
scheme
,
&
hash
);
}
#endif
/* SLAPD_LMHASH */
#ifdef SLAPD_CRYPT
static
struct
berval
*
hash_crypt
(
const
struct
pw_scheme
*
scheme
,
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment