1/* $NetBSD: slappasswd.c,v 1.3 2021/08/14 16:14:58 christos Exp $ */ 2 3/* $OpenLDAP$ */ 4/* This work is part of OpenLDAP Software <http://www.openldap.org/>. 5 * 6 * Copyright 1998-2021 The OpenLDAP Foundation. 7 * Portions Copyright 1998-2003 Kurt D. Zeilenga. 8 * All rights reserved. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted only as authorized by the OpenLDAP 12 * Public License. 13 * 14 * A copy of this license is available in file LICENSE in the 15 * top-level directory of the distribution or, alternatively, at 16 * <http://www.OpenLDAP.org/license.html>. 17 */ 18/* ACKNOWLEDGEMENTS: 19 * This work was initially developed by Kurt Zeilenga for inclusion 20 * in OpenLDAP Software. 21 */ 22 23#include <sys/cdefs.h> 24__RCSID("$NetBSD: slappasswd.c,v 1.3 2021/08/14 16:14:58 christos Exp $"); 25 26#include "portable.h" 27 28#include <stdio.h> 29 30#include <ac/stdlib.h> 31 32#include <ac/ctype.h> 33#include <ac/signal.h> 34#include <ac/socket.h> 35#include <ac/string.h> 36#include <ac/time.h> 37#include <ac/unistd.h> 38 39#include <ldap.h> 40#include <lber_pvt.h> 41#include <lutil.h> 42#include <lutil_sha1.h> 43 44#include "ldap_defaults.h" 45 46#include "slap.h" 47#include "slap-config.h" 48#include "slapcommon.h" 49 50static char *modulepath = NULL; 51static char *moduleload = NULL; 52static int moduleargc = 0; 53static char **moduleargv = NULL; 54 55static void 56usage(const char *s) 57{ 58 fprintf(stderr, 59 "Usage: %s [options]\n" 60 " -c format\tcrypt(3) salt format\n" 61 " -g\t\tgenerate random password\n" 62 " -h hash\tpassword scheme\n" 63 " -n\t\tomit trailing newline\n" 64 " -o <opt>[=val] specify an option with a(n optional) value\n" 65 " \tmodule-path=<pathspec>\n" 66 " \tmodule-load=<filename>\n" 67 " -s secret\tnew password\n" 68 " -u\t\tgenerate RFC2307 values (default)\n" 69 " -v\t\tincrease verbosity\n" 70 " -T file\tread file for new password\n" 71 , s ); 72 73 exit( EXIT_FAILURE ); 74} 75 76static int 77parse_slappasswdopt( void ) 78{ 79 size_t len = 0; 80 char *p; 81 82 p = strchr( optarg, '=' ); 83 if ( p != NULL ) { 84 len = p - optarg; 85 p++; 86 } 87 88 if ( strncasecmp( optarg, "module-path", len ) == 0 ) { 89 modulepath = p; 90 91 } else if ( strncasecmp( optarg, "module-load", len ) == 0 ) { 92 ConfigArgs c = { .line = p }; 93 94 if ( config_fp_parse_line( &c ) ) { 95 return -1; 96 } 97 moduleload = c.argv[0]; 98 99 moduleargc = c.argc - 1; 100 if ( moduleargc ) { 101 moduleargv = c.argv+1; 102 } 103 104 } else { 105 return -1; 106 } 107 108 return 0; 109} 110 111int 112slappasswd( int argc, char *argv[] ) 113{ 114 int rc = EXIT_SUCCESS; 115#ifdef LUTIL_SHA1_BYTES 116 char *default_scheme = "{SSHA}"; 117#else 118 char *default_scheme = "{SMD5}"; 119#endif 120 char *scheme = default_scheme; 121 122 char *newpw = NULL; 123 char *pwfile = NULL; 124 const char *text; 125 const char *progname = "slappasswd"; 126 127 int i; 128 char *newline = "\n"; 129 struct berval passwd = BER_BVNULL; 130 struct berval hash = BER_BVNULL; 131 132#ifdef LDAP_DEBUG 133 /* tools default to "none", so that at least LDAP_DEBUG_ANY 134 * messages show up; use -d 0 to reset */ 135 slap_debug = LDAP_DEBUG_NONE; 136#endif 137 ldap_syslog = 0; 138 139 while( (i = getopt( argc, argv, 140 "c:d:gh:no:s:T:vu" )) != EOF ) 141 { 142 switch (i) { 143 case 'c': /* crypt salt format */ 144 scheme = "{CRYPT}"; 145 lutil_salt_format( optarg ); 146 break; 147 148 case 'g': /* new password (generate) */ 149 if ( pwfile != NULL ) { 150 fprintf( stderr, "Option -g incompatible with -T\n" ); 151 return EXIT_FAILURE; 152 153 } else if ( newpw != NULL ) { 154 fprintf( stderr, "New password already provided\n" ); 155 return EXIT_FAILURE; 156 157 } else if ( lutil_passwd_generate( &passwd, 8 )) { 158 fprintf( stderr, "Password generation failed\n" ); 159 return EXIT_FAILURE; 160 } 161 break; 162 163 case 'h': /* scheme */ 164 if ( scheme != default_scheme ) { 165 fprintf( stderr, "Scheme already provided\n" ); 166 return EXIT_FAILURE; 167 168 } else { 169 scheme = optarg; 170 } 171 break; 172 173 case 'n': 174 newline = ""; 175 break; 176 177 case 'o': 178 if ( parse_slappasswdopt() ) { 179 usage ( progname ); 180 } 181 break; 182 183 case 's': /* new password (secret) */ 184 if ( pwfile != NULL ) { 185 fprintf( stderr, "Option -s incompatible with -T\n" ); 186 return EXIT_FAILURE; 187 188 } else if ( newpw != NULL ) { 189 fprintf( stderr, "New password already provided\n" ); 190 return EXIT_FAILURE; 191 192 } else { 193 char* p; 194 newpw = ch_strdup( optarg ); 195 196 for( p = optarg; *p != '\0'; p++ ) { 197 *p = '\0'; 198 } 199 } 200 break; 201 202 case 'T': /* password file */ 203 if ( pwfile != NULL ) { 204 fprintf( stderr, "Password file already provided\n" ); 205 return EXIT_FAILURE; 206 207 } else if ( newpw != NULL ) { 208 fprintf( stderr, "Option -T incompatible with -s/-g\n" ); 209 return EXIT_FAILURE; 210 211 } 212 pwfile = optarg; 213 break; 214 215 case 'u': /* RFC2307 userPassword */ 216 break; 217 218 case 'v': /* verbose */ 219 verbose++; 220 break; 221 222 default: 223 usage ( progname ); 224 } 225 } 226 slapTool = SLAPPASSWD; 227 228 if( argc - optind != 0 ) { 229 usage( progname ); 230 } 231 232#ifdef SLAPD_MODULES 233 if ( module_init() != 0 ) { 234 fprintf( stderr, "%s: module_init failed\n", progname ); 235 return EXIT_FAILURE; 236 } 237 238 if ( modulepath && module_path(modulepath) ) { 239 rc = EXIT_FAILURE; 240 goto destroy; 241 } 242 243 if ( moduleload && module_load(moduleload, moduleargc, moduleargv) ) { 244 rc = EXIT_FAILURE; 245 goto destroy; 246 } 247#endif 248 249 if( pwfile != NULL ) { 250 if( lutil_get_filed_password( pwfile, &passwd )) { 251 rc = EXIT_FAILURE; 252 goto destroy; 253 } 254 } else if ( BER_BVISEMPTY( &passwd )) { 255 if( newpw == NULL ) { 256 /* prompt for new password */ 257 char *cknewpw; 258 newpw = ch_strdup(getpassphrase("New password: ")); 259 cknewpw = getpassphrase("Re-enter new password: "); 260 261 if( strcmp( newpw, cknewpw )) { 262 fprintf( stderr, "Password values do not match\n" ); 263 rc = EXIT_FAILURE; 264 goto destroy; 265 } 266 } 267 268 passwd.bv_val = newpw; 269 passwd.bv_len = strlen(passwd.bv_val); 270 } else { 271 hash = passwd; 272 goto print_pw; 273 } 274 275 lutil_passwd_hash( &passwd, scheme, &hash, &text ); 276 if ( BER_BVISNULL( &hash ) ) { 277 fprintf( stderr, 278 "Password generation failed for scheme %s: %s\n", 279 scheme, text ? text : "" ); 280 rc = EXIT_FAILURE; 281 goto destroy; 282 } 283 284 if( lutil_passwd( &hash, &passwd, NULL, &text ) ) { 285 fprintf( stderr, "Password verification failed. %s\n", 286 text ? text : "" ); 287 rc = EXIT_FAILURE; 288 goto destroy; 289 } 290 291print_pw:; 292 printf( "%s%s" , hash.bv_val, newline ); 293 294destroy:; 295#ifdef SLAPD_MODULES 296 module_kill(); 297#endif 298 if ( !BER_BVISNULL( &hash ) ) { 299 ber_memfree( hash.bv_val ); 300 } 301 if ( passwd.bv_val != hash.bv_val && !BER_BVISNULL( &passwd ) ) { 302 ber_memfree( passwd.bv_val ); 303 } 304 305 return rc; 306} 307