Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Z
Zope
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
Zope
Commits
a791e0e9
Commit
a791e0e9
authored
Sep 13, 2001
by
Shane Hathaway
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
On Jeremy's suggestion, converted to the "SSHA" encryption scheme by default.
Added a framework for password digest schemes.
parent
80c9405c
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
279 additions
and
24 deletions
+279
-24
lib/python/AccessControl/AuthEncoding.py
lib/python/AccessControl/AuthEncoding.py
+118
-22
lib/python/AccessControl/User.py
lib/python/AccessControl/User.py
+2
-2
lib/python/AccessControl/tests/testPasswordDigest.py
lib/python/AccessControl/tests/testPasswordDigest.py
+159
-0
No files found.
lib/python/AccessControl/AuthEncoding.py
View file @
a791e0e9
...
...
@@ -83,45 +83,141 @@
#
##############################################################################
__version__
=
'$Revision: 1.
3
$'
[
11
:
-
2
]
__version__
=
'$Revision: 1.
4
$'
[
11
:
-
2
]
import
sha
,
binascii
from
binascii
import
b2a_base64
,
a2b_base64
from
string
import
upper
from
random
import
choice
,
randrange
class
PasswordEncryptionScheme
:
# An Interface
def
encrypt
(
pw
):
"""
Encrypt the provided plain text password.
"""
def
validate
(
reference
,
attempt
):
"""
Validate the provided password string. Reference is the
correct password, which may be encrypted; attempt is clear text
password attempt.
"""
_schemes
=
[]
def
registerScheme
(
id
,
s
):
'''
Registers an LDAP password encoding scheme.
'''
_schemes
.
append
((
id
,
'{%s}'
%
id
,
s
))
def
listSchemes
():
r
=
[]
for
id
,
prefix
,
scheme
in
_schemes
:
r
.
append
(
id
)
return
r
class
SSHADigestScheme
:
'''
SSHA is a modification of the SHA digest scheme with a salt
starting at byte 20 of the base64-encoded string.
'''
# Source: http://developer.netscape.com/docs/technote/ldap/pass_sha.html
def
generate_salt
(
self
):
# Salt can be any length, but not more than about 37 characters
# because of limitations of the binascii module.
# 7 is what Netscape's example used and should be enough.
# All 256 characters are available.
salt
=
''
for
n
in
range
(
7
):
salt
+=
chr
(
randrange
(
256
))
return
salt
def
encrypt
(
self
,
pw
):
pw
=
str
(
pw
)
salt
=
self
.
generate_salt
()
return
b2a_base64
(
sha
.
new
(
pw
+
salt
).
digest
()
+
salt
)[:
-
1
]
def
validate
(
self
,
reference
,
attempt
):
try
:
ref
=
a2b_base64
(
reference
)
except
binascii
.
Error
:
# Not valid base64.
return
0
salt
=
ref
[
20
:]
compare
=
b2a_base64
(
sha
.
new
(
attempt
+
salt
).
digest
()
+
salt
)[:
-
1
]
return
(
compare
==
reference
)
registerScheme
(
'SSHA'
,
SSHADigestScheme
())
class
SHADigestScheme
:
def
encrypt
(
self
,
pw
):
return
b2a_base64
(
sha
.
new
(
pw
).
digest
())[:
-
1
]
def
validate
(
self
,
reference
,
attempt
):
compare
=
b2a_base64
(
sha
.
new
(
attempt
).
digest
())[:
-
1
]
return
(
compare
==
reference
)
registerScheme
(
'SHA'
,
SHADigestScheme
())
# Bogosity on various platforms due to ITAR restrictions
try
:
import
crypt
from
crypt
import
crypt
except
ImportError
:
crypt
=
None
if
crypt
is
not
None
:
class
CryptDigestScheme
:
def
generate_salt
(
self
):
choices
=
(
"ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz"
"0123456789./"
)
return
choice
(
choices
)
+
choice
(
choices
)
def
encrypt
(
self
,
pw
):
return
crypt
(
pw
,
self
.
generate_salt
())
def
validate
(
self
,
reference
,
attempt
):
a
=
crypt
(
attempt
,
reference
[:
2
])
return
(
a
==
reference
)
registerScheme
(
'CRYPT'
,
CryptDigestScheme
())
def
pw_validate
(
reference
,
attempt
):
"""Validate the provided password string, which uses LDAP-style encoding
notation. Reference is the correct password, attempt is clear text
password attempt."""
result
=
0
if
upper
(
reference
[:
5
])
==
'{SHA}'
:
attempt
=
binascii
.
b2a_base64
(
sha
.
new
(
attempt
).
digest
())[:
-
1
]
result
=
reference
[
5
:]
==
attempt
elif
upper
(
reference
[:
7
])
==
'{CRYPT}'
and
crypt
is
not
None
:
#if crypt is None, it's not compiled in and everything will fail
attempt
=
crypt
.
crypt
(
attempt
,
reference
[
7
:
9
])
result
=
reference
[
7
:]
==
attempt
else
:
result
=
reference
==
attempt
return
result
for
id
,
prefix
,
scheme
in
_schemes
:
lp
=
len
(
prefix
)
if
reference
[:
lp
]
==
prefix
:
return
scheme
.
validate
(
reference
[
lp
:],
attempt
)
# Assume cleartext.
return
(
reference
==
attempt
)
def
is_encrypted
(
pw
):
return
pw
[:
5
]
==
'{SHA}'
or
pw
[:
7
]
==
'{CRYPT}'
for
id
,
prefix
,
scheme
in
_schemes
:
lp
=
len
(
prefix
)
if
pw
[:
lp
]
==
prefix
:
return
1
return
0
def
pw_encrypt
(
pw
,
encoding
=
'SHA'
):
def
pw_encrypt
(
pw
,
encoding
=
'S
S
HA'
):
"""Encrypt the provided plain text password using the encoding if provided
and return it in an LDAP-style representation."""
if
encoding
==
'SHA'
:
return
'{SHA}'
+
binascii
.
b2a_base64
(
sha
.
new
(
pw
).
digest
())[:
-
1
]
else
:
raise
ValueError
,
'Not supported: %s'
%
encoding
for
id
,
prefix
,
scheme
in
_schemes
:
if
encoding
==
id
:
return
prefix
+
scheme
.
encrypt
(
pw
)
raise
ValueError
,
'Not supported: %s'
%
encoding
pw_encode
=
pw_encrypt
# backward compatibility
lib/python/AccessControl/User.py
View file @
a791e0e9
...
...
@@ -84,7 +84,7 @@
##############################################################################
"""Access control package"""
__version__
=
'$Revision: 1.15
5
$'
[
11
:
-
2
]
__version__
=
'$Revision: 1.15
6
$'
[
11
:
-
2
]
import
Globals
,
socket
,
SpecialUsers
,
re
import
os
...
...
@@ -797,7 +797,7 @@ class BasicUserFolder(Implicit, Persistent, Navigation, Tabs, RoleManager,
return
AuthEncoding
.
is_encrypted
(
pw
)
def
_encryptPassword
(
self
,
pw
):
return
AuthEncoding
.
pw_encrypt
(
pw
,
'SHA'
)
return
AuthEncoding
.
pw_encrypt
(
pw
,
'S
S
HA'
)
def
domainSpecValidate
(
self
,
spec
):
for
ob
in
spec
:
...
...
lib/python/AccessControl/tests/testPasswordDigest.py
0 → 100644
View file @
a791e0e9
##############################################################################
#
# Zope Public License (ZPL) Version 1.0
# -------------------------------------
#
# Copyright (c) Digital Creations. All rights reserved.
#
# This license has been certified as Open Source(tm).
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
#
# 1. Redistributions in source code must retain the above copyright
# notice, this list of conditions, and the following disclaimer.
#
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions, and the following disclaimer in
# the documentation and/or other materials provided with the
# distribution.
#
# 3. Digital Creations requests that attribution be given to Zope
# in any manner possible. Zope includes a "Powered by Zope"
# button that is installed by default. While it is not a license
# violation to remove this button, it is requested that the
# attribution remain. A significant investment has been put
# into Zope, and this effort will continue if the Zope community
# continues to grow. This is one way to assure that growth.
#
# 4. All advertising materials and documentation mentioning
# features derived from or use of this software must display
# the following acknowledgement:
#
# "This product includes software developed by Digital Creations
# for use in the Z Object Publishing Environment
# (http://www.zope.org/)."
#
# In the event that the product being advertised includes an
# intact Zope distribution (with copyright and license included)
# then this clause is waived.
#
# 5. Names associated with Zope or Digital Creations must not be used to
# endorse or promote products derived from this software without
# prior written permission from Digital Creations.
#
# 6. Modified redistributions of any form whatsoever must retain
# the following acknowledgment:
#
# "This product includes software developed by Digital Creations
# for use in the Z Object Publishing Environment
# (http://www.zope.org/)."
#
# Intact (re-)distributions of any official Zope release do not
# require an external acknowledgement.
#
# 7. Modifications are encouraged but must be packaged separately as
# patches to official Zope releases. Distributions that do not
# clearly separate the patches from the original work must be clearly
# labeled as unofficial distributions. Modifications which do not
# carry the name Zope may be packaged in any form, as long as they
# conform to all of the clauses above.
#
#
# Disclaimer
#
# THIS SOFTWARE IS PROVIDED BY DIGITAL CREATIONS ``AS IS'' AND ANY
# EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL DIGITAL CREATIONS OR ITS
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
# ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
# OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
# SUCH DAMAGE.
#
#
# This software consists of contributions made by Digital Creations and
# many individuals on behalf of Digital Creations. Specific
# attributions are listed in the accompanying credits file.
#
##############################################################################
"""Test of AuthEncoding
"""
__rcs_id__
=
'$Id: testPasswordDigest.py,v 1.1 2001/09/13 16:26:47 shane Exp $'
__version__
=
'$Revision: 1.1 $'
[
11
:
-
2
]
import
os
,
sys
execfile
(
os
.
path
.
join
(
sys
.
path
[
0
],
'framework.py'
))
from
AccessControl
import
AuthEncoding
import
unittest
class
PasswordDigestTests
(
unittest
.
TestCase
):
def
testGoodPassword
(
self
):
pw
=
'good_password'
assert
len
(
AuthEncoding
.
listSchemes
())
>
0
# At least one must exist!
for
id
in
AuthEncoding
.
listSchemes
():
enc
=
AuthEncoding
.
pw_encrypt
(
pw
,
id
)
assert
enc
!=
pw
assert
AuthEncoding
.
pw_validate
(
enc
,
pw
)
assert
AuthEncoding
.
is_encrypted
(
enc
)
assert
not
AuthEncoding
.
is_encrypted
(
pw
)
def
testBadPasword
(
self
):
pw
=
'OK_pa55w0rd
\
n
'
for
id
in
AuthEncoding
.
listSchemes
():
enc
=
AuthEncoding
.
pw_encrypt
(
pw
,
id
)
assert
enc
!=
pw
assert
not
AuthEncoding
.
pw_validate
(
enc
,
'xxx'
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
enc
)
if
id
!=
'CRYPT'
:
# crypt truncates passwords and would fail this test.
assert
not
AuthEncoding
.
pw_validate
(
enc
,
pw
[:
-
1
])
assert
not
AuthEncoding
.
pw_validate
(
enc
,
pw
[
1
:])
assert
AuthEncoding
.
pw_validate
(
enc
,
pw
)
def
testShortPassword
(
self
):
pw
=
'1'
for
id
in
AuthEncoding
.
listSchemes
():
enc
=
AuthEncoding
.
pw_encrypt
(
pw
,
id
)
assert
enc
!=
pw
assert
AuthEncoding
.
pw_validate
(
enc
,
pw
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
enc
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
'xxx'
)
def
testLongPassword
(
self
):
pw
=
'Pw'
*
10000
for
id
in
AuthEncoding
.
listSchemes
():
enc
=
AuthEncoding
.
pw_encrypt
(
pw
,
id
)
assert
enc
!=
pw
assert
AuthEncoding
.
pw_validate
(
enc
,
pw
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
enc
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
'xxx'
)
if
id
!=
'CRYPT'
:
# crypt truncates passwords and would fail these tests.
assert
not
AuthEncoding
.
pw_validate
(
enc
,
pw
[:
-
2
])
assert
not
AuthEncoding
.
pw_validate
(
enc
,
pw
[
2
:])
def
testBlankPassword
(
self
):
pw
=
''
for
id
in
AuthEncoding
.
listSchemes
():
enc
=
AuthEncoding
.
pw_encrypt
(
pw
,
id
)
assert
enc
!=
pw
assert
AuthEncoding
.
pw_validate
(
enc
,
pw
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
enc
)
assert
not
AuthEncoding
.
pw_validate
(
enc
,
'xxx'
)
def
testUnencryptedPassword
(
self
):
# Sanity check
pw
=
'my-password'
assert
AuthEncoding
.
pw_validate
(
pw
,
pw
)
framework
()
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment