Applied patch shadow-utils-4.0.18.2-salt.patch. Thanks to Dan Kopecek <dkopecek@redhat.com>

This commit is contained in:
nekral-guest 2007-11-23 20:51:43 +00:00
parent 1cc6fd0d16
commit 43b10b311a
5 changed files with 63 additions and 33 deletions

View File

@ -1,3 +1,16 @@
2007-11-23 Nicolas François <nicolas.francois@centraliens.net>
Patch contributed by Dan Kopecek <dkopecek@redhat.com>
* src/chpasswd.c, src/chgpasswd.c, src/newusers.c: Fix compilation
when ENCRYPTMETHOD_SELECT is not defined.
* libmisc/salt.c (MAGNUM): The nul char was put on (array)[2]
instead of (array)[3].
* libmisc/salt.c: MAGNUM should be defined even if
ENCRYPTMETHOD_SELECT is not defined.
* libmisc/salt.c: Use random instead of rand.
* libmisc/salt.c (gensalt): New function to generate a salt
(instead of using gettimeofday).
2007-11-23 Nicolas François <nicolas.francois@centraliens.net> 2007-11-23 Nicolas François <nicolas.francois@centraliens.net>
* NEWS, src/newusers.c: New options -c/--crypt-method * NEWS, src/newusers.c: New options -c/--crypt-method

View File

@ -13,6 +13,7 @@
#include <sys/time.h> #include <sys/time.h>
#include <stdlib.h> #include <stdlib.h>
#include <assert.h>
#include "prototypes.h" #include "prototypes.h"
#include "defines.h" #include "defines.h"
#include "getdef.h" #include "getdef.h"
@ -52,14 +53,12 @@ char *l64a(long value)
} }
#endif /* !HAVE_L64A */ #endif /* !HAVE_L64A */
#ifdef ENCRYPTMETHOD_SELECT
/* /*
* Add the salt prefix. * Add the salt prefix.
*/ */
#define MAGNUM(array,ch) (array)[0]= (array)[2] = '$',\ #define MAGNUM(array,ch) (array)[0]=(array)[2]='$',(array)[1]=(ch),(array)[3]='\0'
(array)[1]=(ch),\
(array)[2]='\0'
#ifdef ENCRYPTMETHOD_SELECT
/* /*
* Return the salt size. * Return the salt size.
* The size of the salt string is between 8 and 16 bytes for the SHA crypt * The size of the salt string is between 8 and 16 bytes for the SHA crypt
@ -67,8 +66,8 @@ char *l64a(long value)
*/ */
static unsigned int SHA_salt_size (void) static unsigned int SHA_salt_size (void)
{ {
srand (time (NULL)); srandom ((unsigned int)time (NULL));
return 8 + (double)rand () * 9 / RAND_MAX; return 8 + (double)random () * 9 / RAND_MAX;
} }
/* ! Arguments evaluated twice ! */ /* ! Arguments evaluated twice ! */
@ -133,6 +132,29 @@ static char *SHA_salt_rounds (int *prefered_rounds)
} }
#endif #endif
/*
* Generate salt of size salt_size.
*/
#define MAX_SALT_SIZE 16
#define MIN_SALT_SIZE 8
char *gensalt (unsigned int salt_size) {
static char salt[32];
salt[0] = '\0';
if (salt_size >= MIN_SALT_SIZE &&
salt_size <= MAX_SALT_SIZE) {
strcat (salt, l64a (random()));
do {
strcat (salt, l64a (random()));
} while (strlen (salt) < salt_size);
salt[salt_size] = '\0';
}
return salt;
}
/* /*
* Generate 8 base64 ASCII characters of random salt. If MD5_CRYPT_ENAB * Generate 8 base64 ASCII characters of random salt. If MD5_CRYPT_ENAB
* in /etc/login.defs is "yes", the salt string will be prefixed by "$1$" * in /etc/login.defs is "yes", the salt string will be prefixed by "$1$"
@ -150,7 +172,6 @@ static char *SHA_salt_rounds (int *prefered_rounds)
*/ */
char *crypt_make_salt (char *meth, void *arg) char *crypt_make_salt (char *meth, void *arg)
{ {
struct timeval tv;
/* Max result size for the SHA methods: /* Max result size for the SHA methods:
* +3 $5$ * +3 $5$
* +17 rounds=999999999$ * +17 rounds=999999999$
@ -158,7 +179,7 @@ char *crypt_make_salt (char *meth, void *arg)
* +1 \0 * +1 \0
*/ */
static char result[40]; static char result[40];
size_t max_salt_len = 8; size_t salt_len = 8;
char *method = "DES"; char *method = "DES";
result[0] = '\0'; result[0] = '\0';
@ -174,16 +195,15 @@ char *crypt_make_salt (char *meth, void *arg)
if (!strcmp (method, "MD5")) { if (!strcmp (method, "MD5")) {
MAGNUM(result, '1'); MAGNUM(result, '1');
max_salt_len = 11;
#ifdef ENCRYPTMETHOD_SELECT #ifdef ENCRYPTMETHOD_SELECT
} else if (!strcmp (method, "SHA256")) { } else if (!strcmp (method, "SHA256")) {
MAGNUM(result, '5'); MAGNUM(result, '5');
strcat(result, SHA_salt_rounds((int *)arg)); strcat(result, SHA_salt_rounds((int *)arg));
max_salt_len = strlen(result) + SHA_salt_size(); salt_len = SHA_salt_size();
} else if (!strcmp (method, "SHA512")) { } else if (!strcmp (method, "SHA512")) {
MAGNUM(result, '6'); MAGNUM(result, '6');
strcat(result, SHA_salt_rounds((int *)arg)); strcat(result, SHA_salt_rounds((int *)arg));
max_salt_len = strlen(result) + SHA_salt_size(); salt_len = SHA_salt_size();
#endif #endif
} else if (0 != strcmp (method, "DES")) { } else if (0 != strcmp (method, "DES")) {
fprintf (stderr, fprintf (stderr,
@ -196,13 +216,10 @@ char *crypt_make_salt (char *meth, void *arg)
/* /*
* Concatenate a pseudo random salt. * Concatenate a pseudo random salt.
*/ */
gettimeofday (&tv, (struct timezone *) 0); assert (sizeof (result) > strlen (result) + salt_len);
strncat (result, l64a (tv.tv_usec), sizeof(result)); srandom ((unsigned int)time(NULL));
strncat (result, l64a (tv.tv_sec + getpid () + clock ()), strncat (result, gensalt (salt_len),
sizeof(result)); sizeof (result) - strlen (result) - 1);
if (strlen (result) > max_salt_len) /* magic+salt */
result[max_salt_len] = '\0';
return result; return result;
} }

View File

@ -183,12 +183,12 @@ int main (int argc, char **argv)
usage (); usage ();
} }
if (cflg) { if (cflg) {
if (0 != strcmp (crypt_method, "DES") && if ( 0 != strcmp (crypt_method, "DES")
0 != strcmp (crypt_method, "MD5") && && 0 != strcmp (crypt_method, "MD5")
0 != strcmp (crypt_method, "NONE") && && 0 != strcmp (crypt_method, "NONE")
#ifdef ENCRYPTMETHOD_SELECT #ifdef ENCRYPTMETHOD_SELECT
0 != strcmp (crypt_method, "SHA256") && && 0 != strcmp (crypt_method, "SHA256")
0 != strcmp (crypt_method, "SHA512") && 0 != strcmp (crypt_method, "SHA512")
#endif #endif
) { ) {
fprintf (stderr, fprintf (stderr,

View File

@ -179,12 +179,12 @@ int main (int argc, char **argv)
usage (); usage ();
} }
if (cflg) { if (cflg) {
if (0 != strcmp (crypt_method, "DES") && if ( 0 != strcmp (crypt_method, "DES")
0 != strcmp (crypt_method, "MD5") && && 0 != strcmp (crypt_method, "MD5")
0 != strcmp (crypt_method, "NONE") && && 0 != strcmp (crypt_method, "NONE")
#ifdef ENCRYPTMETHOD_SELECT #ifdef ENCRYPTMETHOD_SELECT
0 != strcmp (crypt_method, "SHA256") && && 0 != strcmp (crypt_method, "SHA256")
0 != strcmp (crypt_method, "SHA512") && 0 != strcmp (crypt_method, "SHA512")
#endif #endif
) { ) {
fprintf (stderr, fprintf (stderr,

View File

@ -379,12 +379,12 @@ int main (int argc, char **argv)
usage (); usage ();
} }
if (cflg) { if (cflg) {
if (0 != strcmp (crypt_method, "DES") && if ( 0 != strcmp (crypt_method, "DES")
0 != strcmp (crypt_method, "MD5") && && 0 != strcmp (crypt_method, "MD5")
0 != strcmp (crypt_method, "NONE") && && 0 != strcmp (crypt_method, "NONE")
#ifdef ENCRYPTMETHOD_SELECT #ifdef ENCRYPTMETHOD_SELECT
0 != strcmp (crypt_method, "SHA256") && && 0 != strcmp (crypt_method, "SHA256")
0 != strcmp (crypt_method, "SHA512") && 0 != strcmp (crypt_method, "SHA512")
#endif #endif
) { ) {
fprintf (stderr, fprintf (stderr,