#!@perlbin@ # ==================================================================== # The Apache Software License, Version 1.1 # # Copyright (c) 2000-2002 The Apache Software Foundation. All rights # reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in # the documentation and/or other materials provided with the # distribution. # # 3. The end-user documentation included with the redistribution, # if any, must include the following acknowledgment: # "This product includes software developed by the # Apache Software Foundation (http://www.apache.org/)." # Alternately, this acknowledgment may appear in the software itself, # if and wherever such third-party acknowledgments normally appear. # # 4. The names "Apache" and "Apache Software Foundation" must # not be used to endorse or promote products derived from this # software without prior written permission. For written # permission, please contact apache@apache.org. # # 5. Products derived from this software may not be called "Apache", # nor may "Apache" appear in their name, without prior written # permission of the Apache Software Foundation. # # THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED # WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE # DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR # ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND # ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, # OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT # OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF # SUCH DAMAGE. # ==================================================================== # # This software consists of voluntary contributions made by many # individuals on behalf of the Apache Software Foundation. For more # information on the Apache Software Foundation, please see # . # #for more functionality see the HTTPD::UserAdmin module: # http://www.perl.com/CPAN/modules/by-module/HTTPD/HTTPD-Tools-x.xx.tar.gz # # usage: dbmmanage package dbmmanage; # -ldb -lndbm -lgdbm -lsdbm BEGIN { @AnyDBM_File::ISA = qw(DB_File NDBM_File GDBM_File SDBM_File) } use strict; use Fcntl; use AnyDBM_File (); sub usage { my $cmds = join "|", sort keys %dbmc::; die <$command(); untie %DB; my $x; sub genseed { my $psf; if ($not_unix) { srand (time ^ $$ or time ^ ($$ + ($$ << 15))); } else { for (qw(-xlwwa -le)) { `ps $_ 2>/dev/null`; $psf = $_, last unless $?; } srand (time ^ $$ ^ unpack("%L*", `ps $psf | gzip -f`)); } @range = (qw(. /), '0'..'9','a'..'z','A'..'Z'); $x = int scalar @range; } sub randchar { join '', map $range[rand $x], 1..shift||1; } sub saltpw_crypt { genseed() unless @range; return $newstyle_salt ? join '', "_", randchar, "a..", randchar(4) : randchar(2); } sub cryptpw_crypt { my ($pw, $salt) = @_; $salt = saltpw_crypt unless $salt; crypt $pw, $salt; } sub saltpw_md5 { genseed() unless @range; randchar(8); } sub cryptpw_md5 { my($pw, $salt) = @_; $salt = saltpw_md5 unless $salt; Crypt::PasswdMD5::apache_md5_crypt($pw, $salt); } sub cryptpw_sha1 { my($pw, $salt) = @_; '{SHA}' . Digest::SHA1::sha1_base64($pw) . "="; } sub cryptpw { if ($crypt_method eq "md5") { return cryptpw_md5(@_); } elsif ($crypt_method eq "sha1") { return cryptpw_sha1(@_); } elsif ($crypt_method eq "crypt") { return cryptpw_crypt(@_); } @_[0]; # otherwise return plaintext } sub getpass { my $prompt = shift || "Enter password:"; unless($not_unix) { open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n"; system "stty -echo;"; } my($c,$pwd); print STDERR $prompt; while (($c = getc(STDIN)) ne '' and $c ne "\n" and $c ne "\r") { $pwd .= $c; } system "stty echo" unless $not_unix; print STDERR "\n"; die "Can't use empty password!\n" unless length $pwd; return $pwd; } sub dbmc::update { die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; $crypted_pwd = (split /:/, $DB{$key}, 3)[0] if $crypted_pwd eq '.'; $groups = (split /:/, $DB{$key}, 3)[1] if !$groups || $groups eq '.'; $comment = (split /:/, $DB{$key}, 3)[2] if !$comment || $comment eq '.'; if (!$crypted_pwd || $crypted_pwd eq '-') { dbmc->adduser; } else { dbmc->add; } } sub dbmc::add { die "Can't use empty password!\n" unless $crypted_pwd; unless($is_update) { die "Sorry, user `$key' already exists!\n" if $DB{$key}; } $groups = '' if $groups eq '-'; $comment = '' if $comment eq '-'; $groups .= ":" . $comment if $comment; $crypted_pwd .= ":" . $groups if $groups; $DB{$key} = $crypted_pwd; my $action = $is_update ? "updated" : "added"; print "User $key $action with password encrypted to $DB{$key} using $crypt_method\n"; } sub dbmc::adduser { my $value = getpass "New password:"; die "They don't match, sorry.\n" unless getpass("Re-type new password:") eq $value; $crypted_pwd = cryptpw $value; dbmc->add; } sub dbmc::delete { die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; delete $DB{$key}, print "`$key' deleted\n"; } sub dbmc::view { print $key ? "$key:$DB{$key}\n" : map { "$_:$DB{$_}\n" if $DB{$_} } keys %DB; } sub dbmc::check { die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; my $chkpass = (split /:/, $DB{$key}, 3)[0]; my $testpass = getpass(); if (substr($chkpass, 0, 6) eq '$apr1$') { need_md5_crypt; $crypt_method = "md5"; } elsif (substr($chkpass, 0, 5) eq '{SHA}') { need_sha1_crypt; $crypt_method = "sha1"; } elsif (length($chkpass) == 13 && $chkpass ne $testpass) { $crypt_method = "crypt"; } else { $crypt_method = "plain"; } print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass ? " password ok\n" : " password mismatch\n"); } sub dbmc::import { while(defined($_ = ) and chomp) { ($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4; dbmc->add; } }