passmakr 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- data/COPYING +339 -0
- data/bin/passmakr +88 -0
- data/lib/passmakr.rb +336 -0
- data/passmakr.gemspec +16 -0
- metadata +66 -0
data/COPYING
ADDED
@@ -0,0 +1,339 @@
|
|
1
|
+
GNU GENERAL PUBLIC LICENSE
|
2
|
+
Version 2, June 1991
|
3
|
+
|
4
|
+
Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
|
5
|
+
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
6
|
+
Everyone is permitted to copy and distribute verbatim copies
|
7
|
+
of this license document, but changing it is not allowed.
|
8
|
+
|
9
|
+
Preamble
|
10
|
+
|
11
|
+
The licenses for most software are designed to take away your
|
12
|
+
freedom to share and change it. By contrast, the GNU General Public
|
13
|
+
License is intended to guarantee your freedom to share and change free
|
14
|
+
software--to make sure the software is free for all its users. This
|
15
|
+
General Public License applies to most of the Free Software
|
16
|
+
Foundation's software and to any other program whose authors commit to
|
17
|
+
using it. (Some other Free Software Foundation software is covered by
|
18
|
+
the GNU Lesser General Public License instead.) You can apply it to
|
19
|
+
your programs, too.
|
20
|
+
|
21
|
+
When we speak of free software, we are referring to freedom, not
|
22
|
+
price. Our General Public Licenses are designed to make sure that you
|
23
|
+
have the freedom to distribute copies of free software (and charge for
|
24
|
+
this service if you wish), that you receive source code or can get it
|
25
|
+
if you want it, that you can change the software or use pieces of it
|
26
|
+
in new free programs; and that you know you can do these things.
|
27
|
+
|
28
|
+
To protect your rights, we need to make restrictions that forbid
|
29
|
+
anyone to deny you these rights or to ask you to surrender the rights.
|
30
|
+
These restrictions translate to certain responsibilities for you if you
|
31
|
+
distribute copies of the software, or if you modify it.
|
32
|
+
|
33
|
+
For example, if you distribute copies of such a program, whether
|
34
|
+
gratis or for a fee, you must give the recipients all the rights that
|
35
|
+
you have. You must make sure that they, too, receive or can get the
|
36
|
+
source code. And you must show them these terms so they know their
|
37
|
+
rights.
|
38
|
+
|
39
|
+
We protect your rights with two steps: (1) copyright the software, and
|
40
|
+
(2) offer you this license which gives you legal permission to copy,
|
41
|
+
distribute and/or modify the software.
|
42
|
+
|
43
|
+
Also, for each author's protection and ours, we want to make certain
|
44
|
+
that everyone understands that there is no warranty for this free
|
45
|
+
software. If the software is modified by someone else and passed on, we
|
46
|
+
want its recipients to know that what they have is not the original, so
|
47
|
+
that any problems introduced by others will not reflect on the original
|
48
|
+
authors' reputations.
|
49
|
+
|
50
|
+
Finally, any free program is threatened constantly by software
|
51
|
+
patents. We wish to avoid the danger that redistributors of a free
|
52
|
+
program will individually obtain patent licenses, in effect making the
|
53
|
+
program proprietary. To prevent this, we have made it clear that any
|
54
|
+
patent must be licensed for everyone's free use or not licensed at all.
|
55
|
+
|
56
|
+
The precise terms and conditions for copying, distribution and
|
57
|
+
modification follow.
|
58
|
+
|
59
|
+
GNU GENERAL PUBLIC LICENSE
|
60
|
+
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
61
|
+
|
62
|
+
0. This License applies to any program or other work which contains
|
63
|
+
a notice placed by the copyright holder saying it may be distributed
|
64
|
+
under the terms of this General Public License. The "Program", below,
|
65
|
+
refers to any such program or work, and a "work based on the Program"
|
66
|
+
means either the Program or any derivative work under copyright law:
|
67
|
+
that is to say, a work containing the Program or a portion of it,
|
68
|
+
either verbatim or with modifications and/or translated into another
|
69
|
+
language. (Hereinafter, translation is included without limitation in
|
70
|
+
the term "modification".) Each licensee is addressed as "you".
|
71
|
+
|
72
|
+
Activities other than copying, distribution and modification are not
|
73
|
+
covered by this License; they are outside its scope. The act of
|
74
|
+
running the Program is not restricted, and the output from the Program
|
75
|
+
is covered only if its contents constitute a work based on the
|
76
|
+
Program (independent of having been made by running the Program).
|
77
|
+
Whether that is true depends on what the Program does.
|
78
|
+
|
79
|
+
1. You may copy and distribute verbatim copies of the Program's
|
80
|
+
source code as you receive it, in any medium, provided that you
|
81
|
+
conspicuously and appropriately publish on each copy an appropriate
|
82
|
+
copyright notice and disclaimer of warranty; keep intact all the
|
83
|
+
notices that refer to this License and to the absence of any warranty;
|
84
|
+
and give any other recipients of the Program a copy of this License
|
85
|
+
along with the Program.
|
86
|
+
|
87
|
+
You may charge a fee for the physical act of transferring a copy, and
|
88
|
+
you may at your option offer warranty protection in exchange for a fee.
|
89
|
+
|
90
|
+
2. You may modify your copy or copies of the Program or any portion
|
91
|
+
of it, thus forming a work based on the Program, and copy and
|
92
|
+
distribute such modifications or work under the terms of Section 1
|
93
|
+
above, provided that you also meet all of these conditions:
|
94
|
+
|
95
|
+
a) You must cause the modified files to carry prominent notices
|
96
|
+
stating that you changed the files and the date of any change.
|
97
|
+
|
98
|
+
b) You must cause any work that you distribute or publish, that in
|
99
|
+
whole or in part contains or is derived from the Program or any
|
100
|
+
part thereof, to be licensed as a whole at no charge to all third
|
101
|
+
parties under the terms of this License.
|
102
|
+
|
103
|
+
c) If the modified program normally reads commands interactively
|
104
|
+
when run, you must cause it, when started running for such
|
105
|
+
interactive use in the most ordinary way, to print or display an
|
106
|
+
announcement including an appropriate copyright notice and a
|
107
|
+
notice that there is no warranty (or else, saying that you provide
|
108
|
+
a warranty) and that users may redistribute the program under
|
109
|
+
these conditions, and telling the user how to view a copy of this
|
110
|
+
License. (Exception: if the Program itself is interactive but
|
111
|
+
does not normally print such an announcement, your work based on
|
112
|
+
the Program is not required to print an announcement.)
|
113
|
+
|
114
|
+
These requirements apply to the modified work as a whole. If
|
115
|
+
identifiable sections of that work are not derived from the Program,
|
116
|
+
and can be reasonably considered independent and separate works in
|
117
|
+
themselves, then this License, and its terms, do not apply to those
|
118
|
+
sections when you distribute them as separate works. But when you
|
119
|
+
distribute the same sections as part of a whole which is a work based
|
120
|
+
on the Program, the distribution of the whole must be on the terms of
|
121
|
+
this License, whose permissions for other licensees extend to the
|
122
|
+
entire whole, and thus to each and every part regardless of who wrote it.
|
123
|
+
|
124
|
+
Thus, it is not the intent of this section to claim rights or contest
|
125
|
+
your rights to work written entirely by you; rather, the intent is to
|
126
|
+
exercise the right to control the distribution of derivative or
|
127
|
+
collective works based on the Program.
|
128
|
+
|
129
|
+
In addition, mere aggregation of another work not based on the Program
|
130
|
+
with the Program (or with a work based on the Program) on a volume of
|
131
|
+
a storage or distribution medium does not bring the other work under
|
132
|
+
the scope of this License.
|
133
|
+
|
134
|
+
3. You may copy and distribute the Program (or a work based on it,
|
135
|
+
under Section 2) in object code or executable form under the terms of
|
136
|
+
Sections 1 and 2 above provided that you also do one of the following:
|
137
|
+
|
138
|
+
a) Accompany it with the complete corresponding machine-readable
|
139
|
+
source code, which must be distributed under the terms of Sections
|
140
|
+
1 and 2 above on a medium customarily used for software interchange; or,
|
141
|
+
|
142
|
+
b) Accompany it with a written offer, valid for at least three
|
143
|
+
years, to give any third party, for a charge no more than your
|
144
|
+
cost of physically performing source distribution, a complete
|
145
|
+
machine-readable copy of the corresponding source code, to be
|
146
|
+
distributed under the terms of Sections 1 and 2 above on a medium
|
147
|
+
customarily used for software interchange; or,
|
148
|
+
|
149
|
+
c) Accompany it with the information you received as to the offer
|
150
|
+
to distribute corresponding source code. (This alternative is
|
151
|
+
allowed only for noncommercial distribution and only if you
|
152
|
+
received the program in object code or executable form with such
|
153
|
+
an offer, in accord with Subsection b above.)
|
154
|
+
|
155
|
+
The source code for a work means the preferred form of the work for
|
156
|
+
making modifications to it. For an executable work, complete source
|
157
|
+
code means all the source code for all modules it contains, plus any
|
158
|
+
associated interface definition files, plus the scripts used to
|
159
|
+
control compilation and installation of the executable. However, as a
|
160
|
+
special exception, the source code distributed need not include
|
161
|
+
anything that is normally distributed (in either source or binary
|
162
|
+
form) with the major components (compiler, kernel, and so on) of the
|
163
|
+
operating system on which the executable runs, unless that component
|
164
|
+
itself accompanies the executable.
|
165
|
+
|
166
|
+
If distribution of executable or object code is made by offering
|
167
|
+
access to copy from a designated place, then offering equivalent
|
168
|
+
access to copy the source code from the same place counts as
|
169
|
+
distribution of the source code, even though third parties are not
|
170
|
+
compelled to copy the source along with the object code.
|
171
|
+
|
172
|
+
4. You may not copy, modify, sublicense, or distribute the Program
|
173
|
+
except as expressly provided under this License. Any attempt
|
174
|
+
otherwise to copy, modify, sublicense or distribute the Program is
|
175
|
+
void, and will automatically terminate your rights under this License.
|
176
|
+
However, parties who have received copies, or rights, from you under
|
177
|
+
this License will not have their licenses terminated so long as such
|
178
|
+
parties remain in full compliance.
|
179
|
+
|
180
|
+
5. You are not required to accept this License, since you have not
|
181
|
+
signed it. However, nothing else grants you permission to modify or
|
182
|
+
distribute the Program or its derivative works. These actions are
|
183
|
+
prohibited by law if you do not accept this License. Therefore, by
|
184
|
+
modifying or distributing the Program (or any work based on the
|
185
|
+
Program), you indicate your acceptance of this License to do so, and
|
186
|
+
all its terms and conditions for copying, distributing or modifying
|
187
|
+
the Program or works based on it.
|
188
|
+
|
189
|
+
6. Each time you redistribute the Program (or any work based on the
|
190
|
+
Program), the recipient automatically receives a license from the
|
191
|
+
original licensor to copy, distribute or modify the Program subject to
|
192
|
+
these terms and conditions. You may not impose any further
|
193
|
+
restrictions on the recipients' exercise of the rights granted herein.
|
194
|
+
You are not responsible for enforcing compliance by third parties to
|
195
|
+
this License.
|
196
|
+
|
197
|
+
7. If, as a consequence of a court judgment or allegation of patent
|
198
|
+
infringement or for any other reason (not limited to patent issues),
|
199
|
+
conditions are imposed on you (whether by court order, agreement or
|
200
|
+
otherwise) that contradict the conditions of this License, they do not
|
201
|
+
excuse you from the conditions of this License. If you cannot
|
202
|
+
distribute so as to satisfy simultaneously your obligations under this
|
203
|
+
License and any other pertinent obligations, then as a consequence you
|
204
|
+
may not distribute the Program at all. For example, if a patent
|
205
|
+
license would not permit royalty-free redistribution of the Program by
|
206
|
+
all those who receive copies directly or indirectly through you, then
|
207
|
+
the only way you could satisfy both it and this License would be to
|
208
|
+
refrain entirely from distribution of the Program.
|
209
|
+
|
210
|
+
If any portion of this section is held invalid or unenforceable under
|
211
|
+
any particular circumstance, the balance of the section is intended to
|
212
|
+
apply and the section as a whole is intended to apply in other
|
213
|
+
circumstances.
|
214
|
+
|
215
|
+
It is not the purpose of this section to induce you to infringe any
|
216
|
+
patents or other property right claims or to contest validity of any
|
217
|
+
such claims; this section has the sole purpose of protecting the
|
218
|
+
integrity of the free software distribution system, which is
|
219
|
+
implemented by public license practices. Many people have made
|
220
|
+
generous contributions to the wide range of software distributed
|
221
|
+
through that system in reliance on consistent application of that
|
222
|
+
system; it is up to the author/donor to decide if he or she is willing
|
223
|
+
to distribute software through any other system and a licensee cannot
|
224
|
+
impose that choice.
|
225
|
+
|
226
|
+
This section is intended to make thoroughly clear what is believed to
|
227
|
+
be a consequence of the rest of this License.
|
228
|
+
|
229
|
+
8. If the distribution and/or use of the Program is restricted in
|
230
|
+
certain countries either by patents or by copyrighted interfaces, the
|
231
|
+
original copyright holder who places the Program under this License
|
232
|
+
may add an explicit geographical distribution limitation excluding
|
233
|
+
those countries, so that distribution is permitted only in or among
|
234
|
+
countries not thus excluded. In such case, this License incorporates
|
235
|
+
the limitation as if written in the body of this License.
|
236
|
+
|
237
|
+
9. The Free Software Foundation may publish revised and/or new versions
|
238
|
+
of the General Public License from time to time. Such new versions will
|
239
|
+
be similar in spirit to the present version, but may differ in detail to
|
240
|
+
address new problems or concerns.
|
241
|
+
|
242
|
+
Each version is given a distinguishing version number. If the Program
|
243
|
+
specifies a version number of this License which applies to it and "any
|
244
|
+
later version", you have the option of following the terms and conditions
|
245
|
+
either of that version or of any later version published by the Free
|
246
|
+
Software Foundation. If the Program does not specify a version number of
|
247
|
+
this License, you may choose any version ever published by the Free Software
|
248
|
+
Foundation.
|
249
|
+
|
250
|
+
10. If you wish to incorporate parts of the Program into other free
|
251
|
+
programs whose distribution conditions are different, write to the author
|
252
|
+
to ask for permission. For software which is copyrighted by the Free
|
253
|
+
Software Foundation, write to the Free Software Foundation; we sometimes
|
254
|
+
make exceptions for this. Our decision will be guided by the two goals
|
255
|
+
of preserving the free status of all derivatives of our free software and
|
256
|
+
of promoting the sharing and reuse of software generally.
|
257
|
+
|
258
|
+
NO WARRANTY
|
259
|
+
|
260
|
+
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
261
|
+
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
262
|
+
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
263
|
+
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
264
|
+
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
265
|
+
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
266
|
+
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
267
|
+
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
268
|
+
REPAIR OR CORRECTION.
|
269
|
+
|
270
|
+
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
271
|
+
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
272
|
+
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
273
|
+
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
274
|
+
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
275
|
+
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
276
|
+
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
277
|
+
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
278
|
+
POSSIBILITY OF SUCH DAMAGES.
|
279
|
+
|
280
|
+
END OF TERMS AND CONDITIONS
|
281
|
+
|
282
|
+
How to Apply These Terms to Your New Programs
|
283
|
+
|
284
|
+
If you develop a new program, and you want it to be of the greatest
|
285
|
+
possible use to the public, the best way to achieve this is to make it
|
286
|
+
free software which everyone can redistribute and change under these terms.
|
287
|
+
|
288
|
+
To do so, attach the following notices to the program. It is safest
|
289
|
+
to attach them to the start of each source file to most effectively
|
290
|
+
convey the exclusion of warranty; and each file should have at least
|
291
|
+
the "copyright" line and a pointer to where the full notice is found.
|
292
|
+
|
293
|
+
<one line to give the program's name and a brief idea of what it does.>
|
294
|
+
Copyright (C) <year> <name of author>
|
295
|
+
|
296
|
+
This program is free software; you can redistribute it and/or modify
|
297
|
+
it under the terms of the GNU General Public License as published by
|
298
|
+
the Free Software Foundation; either version 2 of the License, or
|
299
|
+
(at your option) any later version.
|
300
|
+
|
301
|
+
This program is distributed in the hope that it will be useful,
|
302
|
+
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
303
|
+
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
304
|
+
GNU General Public License for more details.
|
305
|
+
|
306
|
+
You should have received a copy of the GNU General Public License along
|
307
|
+
with this program; if not, write to the Free Software Foundation, Inc.,
|
308
|
+
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
309
|
+
|
310
|
+
Also add information on how to contact you by electronic and paper mail.
|
311
|
+
|
312
|
+
If the program is interactive, make it output a short notice like this
|
313
|
+
when it starts in an interactive mode:
|
314
|
+
|
315
|
+
Gnomovision version 69, Copyright (C) year name of author
|
316
|
+
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
317
|
+
This is free software, and you are welcome to redistribute it
|
318
|
+
under certain conditions; type `show c' for details.
|
319
|
+
|
320
|
+
The hypothetical commands `show w' and `show c' should show the appropriate
|
321
|
+
parts of the General Public License. Of course, the commands you use may
|
322
|
+
be called something other than `show w' and `show c'; they could even be
|
323
|
+
mouse-clicks or menu items--whatever suits your program.
|
324
|
+
|
325
|
+
You should also get your employer (if you work as a programmer) or your
|
326
|
+
school, if any, to sign a "copyright disclaimer" for the program, if
|
327
|
+
necessary. Here is a sample; alter the names:
|
328
|
+
|
329
|
+
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
330
|
+
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
331
|
+
|
332
|
+
<signature of Ty Coon>, 1 April 1989
|
333
|
+
Ty Coon, President of Vice
|
334
|
+
|
335
|
+
This General Public License does not permit incorporating your program into
|
336
|
+
proprietary programs. If your program is a subroutine library, you may
|
337
|
+
consider it more useful to permit linking proprietary applications with the
|
338
|
+
library. If this is what you want to do, use the GNU Lesser General
|
339
|
+
Public License instead of this License.
|
data/bin/passmakr
ADDED
@@ -0,0 +1,88 @@
|
|
1
|
+
#!/usr/bin/ruby
|
2
|
+
|
3
|
+
# == Synopsis
|
4
|
+
#
|
5
|
+
# passmakr: Create passwords and displays common used formats
|
6
|
+
#
|
7
|
+
# == Description
|
8
|
+
# Simple script to create passwords using either phonemic, random or urandom algorithms.
|
9
|
+
# Also shows the password in other common used formats:
|
10
|
+
#
|
11
|
+
# * Crypt - for use with Apache and other Unix password mechanisms
|
12
|
+
# * MD5 - use in many web sites and also in shadow passwords etc
|
13
|
+
# * Nato - good for reading out over the phone
|
14
|
+
# * Rot 13 - some nostalgic laughs!
|
15
|
+
#
|
16
|
+
# == Usage
|
17
|
+
# --length, -l:
|
18
|
+
# How long the password shold be, defaults to 8
|
19
|
+
#
|
20
|
+
# --phonemic, -p:
|
21
|
+
# Creates human readable and pronouncable passwords
|
22
|
+
# this is the default mode.
|
23
|
+
#
|
24
|
+
# --random, -r
|
25
|
+
# Creates pseudo random passwords using the ruby rand() function
|
26
|
+
#
|
27
|
+
# --urandom, -u
|
28
|
+
# Creates better random numbers by using /dev/urandom
|
29
|
+
#
|
30
|
+
# == Download and Further Information
|
31
|
+
# Latest version and other information can be fond at http://code.google.com/p/passmakr/
|
32
|
+
#
|
33
|
+
# == Author
|
34
|
+
# R.I.Pienaar <rip@devco.net>
|
35
|
+
#
|
36
|
+
# == Licence
|
37
|
+
# GPL v2
|
38
|
+
|
39
|
+
require 'rubygems'
|
40
|
+
require 'passmakr'
|
41
|
+
require 'getoptlong'
|
42
|
+
|
43
|
+
opts = GetoptLong.new(
|
44
|
+
[ '--length', '-l', GetoptLong::REQUIRED_ARGUMENT],
|
45
|
+
[ '--phonemic', '-p', GetoptLong::NO_ARGUMENT],
|
46
|
+
[ '--random', '-r', GetoptLong::NO_ARGUMENT],
|
47
|
+
[ '--urandom', '-u', GetoptLong::NO_ARGUMENT],
|
48
|
+
[ '--help', '-h', GetoptLong::NO_ARGUMENT]
|
49
|
+
)
|
50
|
+
|
51
|
+
length = 8
|
52
|
+
mode = :phonemic
|
53
|
+
|
54
|
+
opts.each do |opt, arg|
|
55
|
+
case opt
|
56
|
+
when '--phonemic'
|
57
|
+
mode = :phonemic
|
58
|
+
when '--random'
|
59
|
+
mode = :random
|
60
|
+
when '--urandom'
|
61
|
+
mode = :urandom
|
62
|
+
when '--help'
|
63
|
+
begin
|
64
|
+
require 'rdoc/ri/ri_paths'
|
65
|
+
require 'rdoc/usage'
|
66
|
+
RDoc::usage
|
67
|
+
rescue Exception => e
|
68
|
+
puts("Install RDoc::usage or view the comments in the top of the script to get detailed help")
|
69
|
+
end
|
70
|
+
|
71
|
+
exit
|
72
|
+
when '--length'
|
73
|
+
length = arg.to_i
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
pw = Passmakr.new(mode, length)
|
78
|
+
|
79
|
+
puts("#{length} character #{mode.to_s} password:")
|
80
|
+
puts
|
81
|
+
puts(" Password: #{pw.password[:string]}")
|
82
|
+
puts(" Crypt: #{pw.password[:crypt]}")
|
83
|
+
puts(" MD5: #{pw.password[:md5]}")
|
84
|
+
puts(" Rot 13: #{pw.password[:rot13]}")
|
85
|
+
puts(" NATO: #{pw.password[:nato]}")
|
86
|
+
puts
|
87
|
+
|
88
|
+
# vim:tabstop=4:expandtab:ai
|
data/lib/passmakr.rb
ADDED
@@ -0,0 +1,336 @@
|
|
1
|
+
# Class to generate easy to remember passwords, random passwords and urandom passwords,
|
2
|
+
# it also has various utilities to crypt and hash passwords in ways compatable with various
|
3
|
+
# things like apache htpasswd, /etc/passwd, /etc/shadow and so forth
|
4
|
+
#
|
5
|
+
# It include code from http://www.caliban.org/ruby/ruby-password.shtml
|
6
|
+
class Passmakr
|
7
|
+
attr_reader :password
|
8
|
+
|
9
|
+
# :stopdoc:
|
10
|
+
|
11
|
+
# This flag is used in conjunction with Passmakr.phonemic and states that a
|
12
|
+
# password must include a digit.
|
13
|
+
ONE_DIGIT = 1
|
14
|
+
|
15
|
+
# This flag is used in conjunction with Passmakr.phonemic and states that a
|
16
|
+
# password must include a capital letter.
|
17
|
+
ONE_CASE = 1 << 1
|
18
|
+
|
19
|
+
# MD5 algorithm (see <em>crypt(3)</em> for more information)
|
20
|
+
MD5 = false
|
21
|
+
|
22
|
+
# DES algorithm
|
23
|
+
DES = true
|
24
|
+
|
25
|
+
# Characters that may appear in generated passwords. Passmakr.urandom may
|
26
|
+
# also use the characters + and /.
|
27
|
+
PASSWD_CHARS = '0123456789' +
|
28
|
+
'ABCDEFGHIJKLMNOPQRSTUVWXYZ' +
|
29
|
+
'abcdefghijklmnopqrstuvwxyz'
|
30
|
+
|
31
|
+
# Valid salt characters for use by Passmakr#crypt.
|
32
|
+
SALT_CHARS = '0123456789' +
|
33
|
+
'ABCDEFGHIJKLMNOPQRSTUVWXYZ' +
|
34
|
+
'abcdefghijklmnopqrstuvwxyz' +
|
35
|
+
'./'
|
36
|
+
|
37
|
+
# phoneme flags
|
38
|
+
CONSONANT = 1
|
39
|
+
VOWEL = 1 << 1
|
40
|
+
DIPHTHONG = 1 << 2
|
41
|
+
NOT_FIRST = 1 << 3 # indicates that a given phoneme may not occur first
|
42
|
+
|
43
|
+
PHONEMES = {
|
44
|
+
:a => VOWEL,
|
45
|
+
:ae => VOWEL | DIPHTHONG,
|
46
|
+
:ah => VOWEL | DIPHTHONG,
|
47
|
+
:ai => VOWEL | DIPHTHONG,
|
48
|
+
:b => CONSONANT,
|
49
|
+
:c => CONSONANT,
|
50
|
+
:ch => CONSONANT | DIPHTHONG,
|
51
|
+
:d => CONSONANT,
|
52
|
+
:e => VOWEL,
|
53
|
+
:ee => VOWEL | DIPHTHONG,
|
54
|
+
:ei => VOWEL | DIPHTHONG,
|
55
|
+
:f => CONSONANT,
|
56
|
+
:g => CONSONANT,
|
57
|
+
:gh => CONSONANT | DIPHTHONG | NOT_FIRST,
|
58
|
+
:h => CONSONANT,
|
59
|
+
:i => VOWEL,
|
60
|
+
:ie => VOWEL | DIPHTHONG,
|
61
|
+
:j => CONSONANT,
|
62
|
+
:k => CONSONANT,
|
63
|
+
:l => CONSONANT,
|
64
|
+
:m => CONSONANT,
|
65
|
+
:n => CONSONANT,
|
66
|
+
:ng => CONSONANT | DIPHTHONG | NOT_FIRST,
|
67
|
+
:o => VOWEL,
|
68
|
+
:oh => VOWEL | DIPHTHONG,
|
69
|
+
:oo => VOWEL | DIPHTHONG,
|
70
|
+
:p => CONSONANT,
|
71
|
+
:ph => CONSONANT | DIPHTHONG,
|
72
|
+
:qu => CONSONANT | DIPHTHONG,
|
73
|
+
:r => CONSONANT,
|
74
|
+
:s => CONSONANT,
|
75
|
+
:sh => CONSONANT | DIPHTHONG,
|
76
|
+
:t => CONSONANT,
|
77
|
+
:th => CONSONANT | DIPHTHONG,
|
78
|
+
:u => VOWEL,
|
79
|
+
:v => CONSONANT,
|
80
|
+
:w => CONSONANT,
|
81
|
+
:x => CONSONANT,
|
82
|
+
:y => CONSONANT,
|
83
|
+
:z => CONSONANT
|
84
|
+
}
|
85
|
+
|
86
|
+
# :startdoc:
|
87
|
+
|
88
|
+
# Creates a password instance, possible modes are:
|
89
|
+
#
|
90
|
+
# * :phonemic - produces easily remembered passwords
|
91
|
+
# * :random - uses the ruby random function to generate a password
|
92
|
+
# * :urandom - uses linux /dev/urandom to generate a password
|
93
|
+
#
|
94
|
+
# Each instance will have a unique hash of password information
|
95
|
+
# in the password attribute, the hash will have members:
|
96
|
+
#
|
97
|
+
# * :string - the actual password string
|
98
|
+
# * :crypt - a crypt encoded version with a salt, usable in unix password hashes
|
99
|
+
# * :md5 - a md5 hash usable in unix password hashes
|
100
|
+
# * :nato - a NATO alphabet readable version of the password
|
101
|
+
# * :rot13 - for kicks, a ro13 encoded version of the password
|
102
|
+
def initialize(mode=:phonemic, length=8)
|
103
|
+
pw = nil
|
104
|
+
|
105
|
+
case mode
|
106
|
+
when :urandom
|
107
|
+
pw = urandom(length)
|
108
|
+
when :random
|
109
|
+
pw = random(length)
|
110
|
+
else
|
111
|
+
pw = phonemic(length)
|
112
|
+
end
|
113
|
+
|
114
|
+
preppw(pw)
|
115
|
+
end
|
116
|
+
|
117
|
+
private
|
118
|
+
# Determine whether next character should be a vowel or consonant.
|
119
|
+
def get_vowel_or_consonant
|
120
|
+
rand( 2 ) == 1 ? VOWEL : CONSONANT
|
121
|
+
end
|
122
|
+
|
123
|
+
# Generate a memorable password of _length_ characters, using phonemes that
|
124
|
+
# a human-being can easily remember. _flags_ is one or more of
|
125
|
+
# <em>Passmakr::ONE_DIGIT</em> and <em>Passmakr::ONE_CASE</em>, logically
|
126
|
+
# OR'ed together. For example:
|
127
|
+
#
|
128
|
+
# pw = Passmakr.phonemic( 8, Passmakr::ONE_DIGIT | Passmakr::ONE_CASE )
|
129
|
+
#
|
130
|
+
# This would generate an eight character password, containing a digit and an
|
131
|
+
# upper-case letter, such as <b>Ug2shoth</b>.
|
132
|
+
#
|
133
|
+
# This method was inspired by the
|
134
|
+
# pwgen[http://sourceforge.net/projects/pwgen/] tool, written by Theodore
|
135
|
+
# Ts'o.
|
136
|
+
#
|
137
|
+
# Generated passwords may contain any of the characters in
|
138
|
+
# <em>Passmakr::PASSWD_CHARS</em>.
|
139
|
+
def phonemic(length=8, flags=Passmakr::ONE_CASE)
|
140
|
+
|
141
|
+
pw = nil
|
142
|
+
ph_flags = flags
|
143
|
+
|
144
|
+
loop do
|
145
|
+
|
146
|
+
pw = ""
|
147
|
+
|
148
|
+
# Separate the flags integer into an array of individual flags
|
149
|
+
feature_flags = [ flags & ONE_DIGIT, flags & ONE_CASE ]
|
150
|
+
|
151
|
+
prev = []
|
152
|
+
first = true
|
153
|
+
desired = get_vowel_or_consonant
|
154
|
+
|
155
|
+
# Get an Array of all of the phonemes
|
156
|
+
phonemes = PHONEMES.keys.map { |ph| ph.to_s }
|
157
|
+
nr_phonemes = phonemes.size
|
158
|
+
|
159
|
+
while pw.length < length do
|
160
|
+
|
161
|
+
# Get a random phoneme and its length
|
162
|
+
phoneme = phonemes[ rand( nr_phonemes ) ]
|
163
|
+
ph_len = phoneme.length
|
164
|
+
|
165
|
+
# Get its flags as an Array
|
166
|
+
ph_flags = PHONEMES[ phoneme.to_sym ]
|
167
|
+
ph_flags = [ ph_flags & CONSONANT, ph_flags & VOWEL,
|
168
|
+
ph_flags & DIPHTHONG, ph_flags & NOT_FIRST ]
|
169
|
+
|
170
|
+
# Filter on the basic type of the next phoneme
|
171
|
+
next if ph_flags.include? desired
|
172
|
+
|
173
|
+
# Handle the NOT_FIRST flag
|
174
|
+
next if first and ph_flags.include? NOT_FIRST
|
175
|
+
|
176
|
+
# Don't allow a VOWEL followed a vowel/diphthong pair
|
177
|
+
next if prev.include? VOWEL and ph_flags.include? VOWEL and
|
178
|
+
ph_flags.include? DIPHTHONG
|
179
|
+
|
180
|
+
# Don't allow us to go longer than the desired length
|
181
|
+
next if ph_len > length - pw.length
|
182
|
+
|
183
|
+
# We've found a phoneme that meets our criteria
|
184
|
+
pw << phoneme
|
185
|
+
|
186
|
+
# Handle ONE_CASE
|
187
|
+
if feature_flags.include? ONE_CASE
|
188
|
+
|
189
|
+
if (first or ph_flags.include? CONSONANT) and rand( 10 ) < 3
|
190
|
+
pw[-ph_len, 1] = pw[-ph_len, 1].upcase
|
191
|
+
feature_flags.delete ONE_CASE
|
192
|
+
end
|
193
|
+
|
194
|
+
end
|
195
|
+
|
196
|
+
# Is password already long enough?
|
197
|
+
break if pw.length >= length
|
198
|
+
|
199
|
+
# Handle ONE_DIGIT
|
200
|
+
if feature_flags.include? ONE_DIGIT
|
201
|
+
|
202
|
+
if ! first and rand( 10 ) < 3
|
203
|
+
pw << ( rand( 10 ) + ?0 ).chr
|
204
|
+
feature_flags.delete ONE_DIGIT
|
205
|
+
|
206
|
+
first = true
|
207
|
+
prev = []
|
208
|
+
desired = get_vowel_or_consonant
|
209
|
+
next
|
210
|
+
end
|
211
|
+
|
212
|
+
end
|
213
|
+
|
214
|
+
if desired == CONSONANT
|
215
|
+
desired = VOWEL
|
216
|
+
elsif prev.include? VOWEL or ph_flags.include? DIPHTHONG or
|
217
|
+
rand(10) > 3
|
218
|
+
desired = CONSONANT
|
219
|
+
else
|
220
|
+
desired = VOWEL
|
221
|
+
end
|
222
|
+
|
223
|
+
prev = ph_flags
|
224
|
+
first = false
|
225
|
+
end
|
226
|
+
|
227
|
+
# Try again
|
228
|
+
break unless feature_flags.include? ONE_CASE or feature_flags.include? ONE_DIGIT
|
229
|
+
|
230
|
+
end
|
231
|
+
|
232
|
+
pw
|
233
|
+
end
|
234
|
+
|
235
|
+
|
236
|
+
# Generate a random password of _length_ characters. Unlike the
|
237
|
+
# Passmakr.phonemic method, no attempt will be made to generate a memorable
|
238
|
+
# password. Generated passwords may contain any of the characters in
|
239
|
+
# <em>Passmakr::PASSWD_CHARS</em>.
|
240
|
+
def random(length=8)
|
241
|
+
pw = ""
|
242
|
+
nr_chars = PASSWD_CHARS.size
|
243
|
+
|
244
|
+
srand()
|
245
|
+
|
246
|
+
length.times { pw << PASSWD_CHARS[ rand( nr_chars ) ] }
|
247
|
+
|
248
|
+
pw
|
249
|
+
end
|
250
|
+
|
251
|
+
|
252
|
+
# An alternative to Passmakr.random. It uses the <tt>/dev/urandom</tt>
|
253
|
+
# device to generate passwords, returning +nil+ on systems that do not
|
254
|
+
# implement the device. The passwords it generates may contain any of the
|
255
|
+
# characters in <em>Passmakr::PASSWD_CHARS</em>, plus the additional
|
256
|
+
# characters + and /.
|
257
|
+
def urandom(length=8)
|
258
|
+
return nil unless File.chardev? '/dev/urandom'
|
259
|
+
|
260
|
+
rand_data = nil
|
261
|
+
File.open( "/dev/urandom" ) { |f| rand_data = f.read( length ) }
|
262
|
+
|
263
|
+
# Base64 encode it
|
264
|
+
pw = [ rand_data ].pack( 'm' )[ 0 .. length - 1 ]
|
265
|
+
end
|
266
|
+
|
267
|
+
# Encrypt a password using _type_ encryption. _salt_, if supplied, will be
|
268
|
+
# used to perturb the encryption algorithm and should be chosen from the
|
269
|
+
# <em>Passmakr::SALT_CHARS</em>. If no salt is given, a randomly generated
|
270
|
+
# salt will be used.
|
271
|
+
def crypt(pw, type=DES, salt='')
|
272
|
+
|
273
|
+
unless ( salt.split( // ) - SALT_CHARS.split( // ) ).empty?
|
274
|
+
raise CryptError, 'bad salt'
|
275
|
+
end
|
276
|
+
|
277
|
+
salt = random( type ? 2 : 8 ) if salt.empty?
|
278
|
+
|
279
|
+
# (Linux glibc2 interprets a salt prefix of '$1$' as a call to use MD5
|
280
|
+
# instead of DES when calling crypt(3))
|
281
|
+
salt = '$1$' + salt if type == MD5
|
282
|
+
|
283
|
+
crypt = pw.crypt(salt)
|
284
|
+
|
285
|
+
# Raise an exception if MD5 was wanted, but result is not recognisable
|
286
|
+
if type == MD5 && crypt !~ /^\$1\$/
|
287
|
+
raise CryptError, 'MD5 not implemented'
|
288
|
+
end
|
289
|
+
|
290
|
+
crypt
|
291
|
+
end
|
292
|
+
|
293
|
+
# prepares @password using the password passed as a string
|
294
|
+
def preppw(pw)
|
295
|
+
rot13 = pw.tr("A-Za-z", "N-ZA-Mn-za-m")
|
296
|
+
|
297
|
+
@password = {:string => pw, :nato => pw.to_nato,
|
298
|
+
:crypt => crypt(pw), :md5 => crypt(pw, MD5),
|
299
|
+
:rot13 => rot13 }
|
300
|
+
end
|
301
|
+
end
|
302
|
+
|
303
|
+
class String
|
304
|
+
NATOALPHA = ["alfa", "bravo", "charlie", "delta", "echo", "foxtrot", "golf", "hotel",
|
305
|
+
"india", "juliet", "kilo", "lima", "mike", "november", "oscar", "papa",
|
306
|
+
"quebec", "romeo", "sierra", "tango", "uniform", "victor", "whiskey",
|
307
|
+
"xray", "yankee", "zulu"]
|
308
|
+
|
309
|
+
NATODIGITS = ["zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"]
|
310
|
+
|
311
|
+
# Returns a NATO alphabet version of the string
|
312
|
+
def to_nato
|
313
|
+
result = nil
|
314
|
+
|
315
|
+
# for strings we call ourself recursively for each char to build up the eventual string
|
316
|
+
if self.size > 1
|
317
|
+
result = self.split("").map {|c| c.to_nato }.join(" ")
|
318
|
+
else
|
319
|
+
ansi = self[0]
|
320
|
+
|
321
|
+
if ansi >= 65 && ansi <= 90
|
322
|
+
result = NATOALPHA[ansi-65].capitalize
|
323
|
+
elsif ansi >= 97 && ansi <= 122
|
324
|
+
result = NATOALPHA[ansi-97]
|
325
|
+
elsif ansi >= 48 && ansi <= 57
|
326
|
+
result = NATODIGITS[ansi-48]
|
327
|
+
else
|
328
|
+
result = self
|
329
|
+
end
|
330
|
+
end
|
331
|
+
|
332
|
+
result
|
333
|
+
end
|
334
|
+
end
|
335
|
+
|
336
|
+
# vim:tabstop=4:expandtab:ai
|
data/passmakr.gemspec
ADDED
@@ -0,0 +1,16 @@
|
|
1
|
+
Gem::Specification.new do |s|
|
2
|
+
s.name = "passmakr"
|
3
|
+
s.version = "1.0.0"
|
4
|
+
|
5
|
+
s.authors = ["R.I.Pienaar"]
|
6
|
+
s.date = %q{2009-10-11}
|
7
|
+
s.default_executable = "passmakr"
|
8
|
+
s.description = "Creates various types of passwords and shows them in often used formats"
|
9
|
+
s.email = ["rip@devco.net"]
|
10
|
+
s.executables = ["passmakr"]
|
11
|
+
s.files = ["COPYING", "passmakr.gemspec", "bin/passmakr", "lib/passmakr.rb"]
|
12
|
+
s.has_rdoc = true
|
13
|
+
s.homepage = "http://code.google.com/p/passmakr/"
|
14
|
+
s.require_paths = ["lib"]
|
15
|
+
s.summary = s.description
|
16
|
+
end
|
metadata
ADDED
@@ -0,0 +1,66 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: passmakr
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
prerelease: false
|
5
|
+
segments:
|
6
|
+
- 1
|
7
|
+
- 0
|
8
|
+
- 0
|
9
|
+
version: 1.0.0
|
10
|
+
platform: ruby
|
11
|
+
authors:
|
12
|
+
- R.I.Pienaar
|
13
|
+
autorequire:
|
14
|
+
bindir: bin
|
15
|
+
cert_chain: []
|
16
|
+
|
17
|
+
date: 2009-10-11 00:00:00 +01:00
|
18
|
+
default_executable: passmakr
|
19
|
+
dependencies: []
|
20
|
+
|
21
|
+
description: Creates various types of passwords and shows them in often used formats
|
22
|
+
email:
|
23
|
+
- rip@devco.net
|
24
|
+
executables:
|
25
|
+
- passmakr
|
26
|
+
extensions: []
|
27
|
+
|
28
|
+
extra_rdoc_files: []
|
29
|
+
|
30
|
+
files:
|
31
|
+
- COPYING
|
32
|
+
- passmakr.gemspec
|
33
|
+
- bin/passmakr
|
34
|
+
- lib/passmakr.rb
|
35
|
+
has_rdoc: true
|
36
|
+
homepage: http://code.google.com/p/passmakr/
|
37
|
+
licenses: []
|
38
|
+
|
39
|
+
post_install_message:
|
40
|
+
rdoc_options: []
|
41
|
+
|
42
|
+
require_paths:
|
43
|
+
- lib
|
44
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
45
|
+
requirements:
|
46
|
+
- - ">="
|
47
|
+
- !ruby/object:Gem::Version
|
48
|
+
segments:
|
49
|
+
- 0
|
50
|
+
version: "0"
|
51
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
52
|
+
requirements:
|
53
|
+
- - ">="
|
54
|
+
- !ruby/object:Gem::Version
|
55
|
+
segments:
|
56
|
+
- 0
|
57
|
+
version: "0"
|
58
|
+
requirements: []
|
59
|
+
|
60
|
+
rubyforge_project:
|
61
|
+
rubygems_version: 1.3.6
|
62
|
+
signing_key:
|
63
|
+
specification_version: 3
|
64
|
+
summary: Creates various types of passwords and shows them in often used formats
|
65
|
+
test_files: []
|
66
|
+
|