passmakr 1.0.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (5) hide show
  1. data/COPYING +339 -0
  2. data/bin/passmakr +88 -0
  3. data/lib/passmakr.rb +336 -0
  4. data/passmakr.gemspec +16 -0
  5. metadata +66 -0
data/COPYING ADDED
@@ -0,0 +1,339 @@
1
+ GNU GENERAL PUBLIC LICENSE
2
+ Version 2, June 1991
3
+
4
+ Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
5
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
6
+ Everyone is permitted to copy and distribute verbatim copies
7
+ of this license document, but changing it is not allowed.
8
+
9
+ Preamble
10
+
11
+ The licenses for most software are designed to take away your
12
+ freedom to share and change it. By contrast, the GNU General Public
13
+ License is intended to guarantee your freedom to share and change free
14
+ software--to make sure the software is free for all its users. This
15
+ General Public License applies to most of the Free Software
16
+ Foundation's software and to any other program whose authors commit to
17
+ using it. (Some other Free Software Foundation software is covered by
18
+ the GNU Lesser General Public License instead.) You can apply it to
19
+ your programs, too.
20
+
21
+ When we speak of free software, we are referring to freedom, not
22
+ price. Our General Public Licenses are designed to make sure that you
23
+ have the freedom to distribute copies of free software (and charge for
24
+ this service if you wish), that you receive source code or can get it
25
+ if you want it, that you can change the software or use pieces of it
26
+ in new free programs; and that you know you can do these things.
27
+
28
+ To protect your rights, we need to make restrictions that forbid
29
+ anyone to deny you these rights or to ask you to surrender the rights.
30
+ These restrictions translate to certain responsibilities for you if you
31
+ distribute copies of the software, or if you modify it.
32
+
33
+ For example, if you distribute copies of such a program, whether
34
+ gratis or for a fee, you must give the recipients all the rights that
35
+ you have. You must make sure that they, too, receive or can get the
36
+ source code. And you must show them these terms so they know their
37
+ rights.
38
+
39
+ We protect your rights with two steps: (1) copyright the software, and
40
+ (2) offer you this license which gives you legal permission to copy,
41
+ distribute and/or modify the software.
42
+
43
+ Also, for each author's protection and ours, we want to make certain
44
+ that everyone understands that there is no warranty for this free
45
+ software. If the software is modified by someone else and passed on, we
46
+ want its recipients to know that what they have is not the original, so
47
+ that any problems introduced by others will not reflect on the original
48
+ authors' reputations.
49
+
50
+ Finally, any free program is threatened constantly by software
51
+ patents. We wish to avoid the danger that redistributors of a free
52
+ program will individually obtain patent licenses, in effect making the
53
+ program proprietary. To prevent this, we have made it clear that any
54
+ patent must be licensed for everyone's free use or not licensed at all.
55
+
56
+ The precise terms and conditions for copying, distribution and
57
+ modification follow.
58
+
59
+ GNU GENERAL PUBLIC LICENSE
60
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
61
+
62
+ 0. This License applies to any program or other work which contains
63
+ a notice placed by the copyright holder saying it may be distributed
64
+ under the terms of this General Public License. The "Program", below,
65
+ refers to any such program or work, and a "work based on the Program"
66
+ means either the Program or any derivative work under copyright law:
67
+ that is to say, a work containing the Program or a portion of it,
68
+ either verbatim or with modifications and/or translated into another
69
+ language. (Hereinafter, translation is included without limitation in
70
+ the term "modification".) Each licensee is addressed as "you".
71
+
72
+ Activities other than copying, distribution and modification are not
73
+ covered by this License; they are outside its scope. The act of
74
+ running the Program is not restricted, and the output from the Program
75
+ is covered only if its contents constitute a work based on the
76
+ Program (independent of having been made by running the Program).
77
+ Whether that is true depends on what the Program does.
78
+
79
+ 1. You may copy and distribute verbatim copies of the Program's
80
+ source code as you receive it, in any medium, provided that you
81
+ conspicuously and appropriately publish on each copy an appropriate
82
+ copyright notice and disclaimer of warranty; keep intact all the
83
+ notices that refer to this License and to the absence of any warranty;
84
+ and give any other recipients of the Program a copy of this License
85
+ along with the Program.
86
+
87
+ You may charge a fee for the physical act of transferring a copy, and
88
+ you may at your option offer warranty protection in exchange for a fee.
89
+
90
+ 2. You may modify your copy or copies of the Program or any portion
91
+ of it, thus forming a work based on the Program, and copy and
92
+ distribute such modifications or work under the terms of Section 1
93
+ above, provided that you also meet all of these conditions:
94
+
95
+ a) You must cause the modified files to carry prominent notices
96
+ stating that you changed the files and the date of any change.
97
+
98
+ b) You must cause any work that you distribute or publish, that in
99
+ whole or in part contains or is derived from the Program or any
100
+ part thereof, to be licensed as a whole at no charge to all third
101
+ parties under the terms of this License.
102
+
103
+ c) If the modified program normally reads commands interactively
104
+ when run, you must cause it, when started running for such
105
+ interactive use in the most ordinary way, to print or display an
106
+ announcement including an appropriate copyright notice and a
107
+ notice that there is no warranty (or else, saying that you provide
108
+ a warranty) and that users may redistribute the program under
109
+ these conditions, and telling the user how to view a copy of this
110
+ License. (Exception: if the Program itself is interactive but
111
+ does not normally print such an announcement, your work based on
112
+ the Program is not required to print an announcement.)
113
+
114
+ These requirements apply to the modified work as a whole. If
115
+ identifiable sections of that work are not derived from the Program,
116
+ and can be reasonably considered independent and separate works in
117
+ themselves, then this License, and its terms, do not apply to those
118
+ sections when you distribute them as separate works. But when you
119
+ distribute the same sections as part of a whole which is a work based
120
+ on the Program, the distribution of the whole must be on the terms of
121
+ this License, whose permissions for other licensees extend to the
122
+ entire whole, and thus to each and every part regardless of who wrote it.
123
+
124
+ Thus, it is not the intent of this section to claim rights or contest
125
+ your rights to work written entirely by you; rather, the intent is to
126
+ exercise the right to control the distribution of derivative or
127
+ collective works based on the Program.
128
+
129
+ In addition, mere aggregation of another work not based on the Program
130
+ with the Program (or with a work based on the Program) on a volume of
131
+ a storage or distribution medium does not bring the other work under
132
+ the scope of this License.
133
+
134
+ 3. You may copy and distribute the Program (or a work based on it,
135
+ under Section 2) in object code or executable form under the terms of
136
+ Sections 1 and 2 above provided that you also do one of the following:
137
+
138
+ a) Accompany it with the complete corresponding machine-readable
139
+ source code, which must be distributed under the terms of Sections
140
+ 1 and 2 above on a medium customarily used for software interchange; or,
141
+
142
+ b) Accompany it with a written offer, valid for at least three
143
+ years, to give any third party, for a charge no more than your
144
+ cost of physically performing source distribution, a complete
145
+ machine-readable copy of the corresponding source code, to be
146
+ distributed under the terms of Sections 1 and 2 above on a medium
147
+ customarily used for software interchange; or,
148
+
149
+ c) Accompany it with the information you received as to the offer
150
+ to distribute corresponding source code. (This alternative is
151
+ allowed only for noncommercial distribution and only if you
152
+ received the program in object code or executable form with such
153
+ an offer, in accord with Subsection b above.)
154
+
155
+ The source code for a work means the preferred form of the work for
156
+ making modifications to it. For an executable work, complete source
157
+ code means all the source code for all modules it contains, plus any
158
+ associated interface definition files, plus the scripts used to
159
+ control compilation and installation of the executable. However, as a
160
+ special exception, the source code distributed need not include
161
+ anything that is normally distributed (in either source or binary
162
+ form) with the major components (compiler, kernel, and so on) of the
163
+ operating system on which the executable runs, unless that component
164
+ itself accompanies the executable.
165
+
166
+ If distribution of executable or object code is made by offering
167
+ access to copy from a designated place, then offering equivalent
168
+ access to copy the source code from the same place counts as
169
+ distribution of the source code, even though third parties are not
170
+ compelled to copy the source along with the object code.
171
+
172
+ 4. You may not copy, modify, sublicense, or distribute the Program
173
+ except as expressly provided under this License. Any attempt
174
+ otherwise to copy, modify, sublicense or distribute the Program is
175
+ void, and will automatically terminate your rights under this License.
176
+ However, parties who have received copies, or rights, from you under
177
+ this License will not have their licenses terminated so long as such
178
+ parties remain in full compliance.
179
+
180
+ 5. You are not required to accept this License, since you have not
181
+ signed it. However, nothing else grants you permission to modify or
182
+ distribute the Program or its derivative works. These actions are
183
+ prohibited by law if you do not accept this License. Therefore, by
184
+ modifying or distributing the Program (or any work based on the
185
+ Program), you indicate your acceptance of this License to do so, and
186
+ all its terms and conditions for copying, distributing or modifying
187
+ the Program or works based on it.
188
+
189
+ 6. Each time you redistribute the Program (or any work based on the
190
+ Program), the recipient automatically receives a license from the
191
+ original licensor to copy, distribute or modify the Program subject to
192
+ these terms and conditions. You may not impose any further
193
+ restrictions on the recipients' exercise of the rights granted herein.
194
+ You are not responsible for enforcing compliance by third parties to
195
+ this License.
196
+
197
+ 7. If, as a consequence of a court judgment or allegation of patent
198
+ infringement or for any other reason (not limited to patent issues),
199
+ conditions are imposed on you (whether by court order, agreement or
200
+ otherwise) that contradict the conditions of this License, they do not
201
+ excuse you from the conditions of this License. If you cannot
202
+ distribute so as to satisfy simultaneously your obligations under this
203
+ License and any other pertinent obligations, then as a consequence you
204
+ may not distribute the Program at all. For example, if a patent
205
+ license would not permit royalty-free redistribution of the Program by
206
+ all those who receive copies directly or indirectly through you, then
207
+ the only way you could satisfy both it and this License would be to
208
+ refrain entirely from distribution of the Program.
209
+
210
+ If any portion of this section is held invalid or unenforceable under
211
+ any particular circumstance, the balance of the section is intended to
212
+ apply and the section as a whole is intended to apply in other
213
+ circumstances.
214
+
215
+ It is not the purpose of this section to induce you to infringe any
216
+ patents or other property right claims or to contest validity of any
217
+ such claims; this section has the sole purpose of protecting the
218
+ integrity of the free software distribution system, which is
219
+ implemented by public license practices. Many people have made
220
+ generous contributions to the wide range of software distributed
221
+ through that system in reliance on consistent application of that
222
+ system; it is up to the author/donor to decide if he or she is willing
223
+ to distribute software through any other system and a licensee cannot
224
+ impose that choice.
225
+
226
+ This section is intended to make thoroughly clear what is believed to
227
+ be a consequence of the rest of this License.
228
+
229
+ 8. If the distribution and/or use of the Program is restricted in
230
+ certain countries either by patents or by copyrighted interfaces, the
231
+ original copyright holder who places the Program under this License
232
+ may add an explicit geographical distribution limitation excluding
233
+ those countries, so that distribution is permitted only in or among
234
+ countries not thus excluded. In such case, this License incorporates
235
+ the limitation as if written in the body of this License.
236
+
237
+ 9. The Free Software Foundation may publish revised and/or new versions
238
+ of the General Public License from time to time. Such new versions will
239
+ be similar in spirit to the present version, but may differ in detail to
240
+ address new problems or concerns.
241
+
242
+ Each version is given a distinguishing version number. If the Program
243
+ specifies a version number of this License which applies to it and "any
244
+ later version", you have the option of following the terms and conditions
245
+ either of that version or of any later version published by the Free
246
+ Software Foundation. If the Program does not specify a version number of
247
+ this License, you may choose any version ever published by the Free Software
248
+ Foundation.
249
+
250
+ 10. If you wish to incorporate parts of the Program into other free
251
+ programs whose distribution conditions are different, write to the author
252
+ to ask for permission. For software which is copyrighted by the Free
253
+ Software Foundation, write to the Free Software Foundation; we sometimes
254
+ make exceptions for this. Our decision will be guided by the two goals
255
+ of preserving the free status of all derivatives of our free software and
256
+ of promoting the sharing and reuse of software generally.
257
+
258
+ NO WARRANTY
259
+
260
+ 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
261
+ FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
262
+ OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
263
+ PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
264
+ OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
265
+ MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
266
+ TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
267
+ PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
268
+ REPAIR OR CORRECTION.
269
+
270
+ 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
271
+ WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
272
+ REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
273
+ INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
274
+ OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
275
+ TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
276
+ YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
277
+ PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
278
+ POSSIBILITY OF SUCH DAMAGES.
279
+
280
+ END OF TERMS AND CONDITIONS
281
+
282
+ How to Apply These Terms to Your New Programs
283
+
284
+ If you develop a new program, and you want it to be of the greatest
285
+ possible use to the public, the best way to achieve this is to make it
286
+ free software which everyone can redistribute and change under these terms.
287
+
288
+ To do so, attach the following notices to the program. It is safest
289
+ to attach them to the start of each source file to most effectively
290
+ convey the exclusion of warranty; and each file should have at least
291
+ the "copyright" line and a pointer to where the full notice is found.
292
+
293
+ <one line to give the program's name and a brief idea of what it does.>
294
+ Copyright (C) <year> <name of author>
295
+
296
+ This program is free software; you can redistribute it and/or modify
297
+ it under the terms of the GNU General Public License as published by
298
+ the Free Software Foundation; either version 2 of the License, or
299
+ (at your option) any later version.
300
+
301
+ This program is distributed in the hope that it will be useful,
302
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
303
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
304
+ GNU General Public License for more details.
305
+
306
+ You should have received a copy of the GNU General Public License along
307
+ with this program; if not, write to the Free Software Foundation, Inc.,
308
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
309
+
310
+ Also add information on how to contact you by electronic and paper mail.
311
+
312
+ If the program is interactive, make it output a short notice like this
313
+ when it starts in an interactive mode:
314
+
315
+ Gnomovision version 69, Copyright (C) year name of author
316
+ Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
317
+ This is free software, and you are welcome to redistribute it
318
+ under certain conditions; type `show c' for details.
319
+
320
+ The hypothetical commands `show w' and `show c' should show the appropriate
321
+ parts of the General Public License. Of course, the commands you use may
322
+ be called something other than `show w' and `show c'; they could even be
323
+ mouse-clicks or menu items--whatever suits your program.
324
+
325
+ You should also get your employer (if you work as a programmer) or your
326
+ school, if any, to sign a "copyright disclaimer" for the program, if
327
+ necessary. Here is a sample; alter the names:
328
+
329
+ Yoyodyne, Inc., hereby disclaims all copyright interest in the program
330
+ `Gnomovision' (which makes passes at compilers) written by James Hacker.
331
+
332
+ <signature of Ty Coon>, 1 April 1989
333
+ Ty Coon, President of Vice
334
+
335
+ This General Public License does not permit incorporating your program into
336
+ proprietary programs. If your program is a subroutine library, you may
337
+ consider it more useful to permit linking proprietary applications with the
338
+ library. If this is what you want to do, use the GNU Lesser General
339
+ Public License instead of this License.
data/bin/passmakr ADDED
@@ -0,0 +1,88 @@
1
+ #!/usr/bin/ruby
2
+
3
+ # == Synopsis
4
+ #
5
+ # passmakr: Create passwords and displays common used formats
6
+ #
7
+ # == Description
8
+ # Simple script to create passwords using either phonemic, random or urandom algorithms.
9
+ # Also shows the password in other common used formats:
10
+ #
11
+ # * Crypt - for use with Apache and other Unix password mechanisms
12
+ # * MD5 - use in many web sites and also in shadow passwords etc
13
+ # * Nato - good for reading out over the phone
14
+ # * Rot 13 - some nostalgic laughs!
15
+ #
16
+ # == Usage
17
+ # --length, -l:
18
+ # How long the password shold be, defaults to 8
19
+ #
20
+ # --phonemic, -p:
21
+ # Creates human readable and pronouncable passwords
22
+ # this is the default mode.
23
+ #
24
+ # --random, -r
25
+ # Creates pseudo random passwords using the ruby rand() function
26
+ #
27
+ # --urandom, -u
28
+ # Creates better random numbers by using /dev/urandom
29
+ #
30
+ # == Download and Further Information
31
+ # Latest version and other information can be fond at http://code.google.com/p/passmakr/
32
+ #
33
+ # == Author
34
+ # R.I.Pienaar <rip@devco.net>
35
+ #
36
+ # == Licence
37
+ # GPL v2
38
+
39
+ require 'rubygems'
40
+ require 'passmakr'
41
+ require 'getoptlong'
42
+
43
+ opts = GetoptLong.new(
44
+ [ '--length', '-l', GetoptLong::REQUIRED_ARGUMENT],
45
+ [ '--phonemic', '-p', GetoptLong::NO_ARGUMENT],
46
+ [ '--random', '-r', GetoptLong::NO_ARGUMENT],
47
+ [ '--urandom', '-u', GetoptLong::NO_ARGUMENT],
48
+ [ '--help', '-h', GetoptLong::NO_ARGUMENT]
49
+ )
50
+
51
+ length = 8
52
+ mode = :phonemic
53
+
54
+ opts.each do |opt, arg|
55
+ case opt
56
+ when '--phonemic'
57
+ mode = :phonemic
58
+ when '--random'
59
+ mode = :random
60
+ when '--urandom'
61
+ mode = :urandom
62
+ when '--help'
63
+ begin
64
+ require 'rdoc/ri/ri_paths'
65
+ require 'rdoc/usage'
66
+ RDoc::usage
67
+ rescue Exception => e
68
+ puts("Install RDoc::usage or view the comments in the top of the script to get detailed help")
69
+ end
70
+
71
+ exit
72
+ when '--length'
73
+ length = arg.to_i
74
+ end
75
+ end
76
+
77
+ pw = Passmakr.new(mode, length)
78
+
79
+ puts("#{length} character #{mode.to_s} password:")
80
+ puts
81
+ puts(" Password: #{pw.password[:string]}")
82
+ puts(" Crypt: #{pw.password[:crypt]}")
83
+ puts(" MD5: #{pw.password[:md5]}")
84
+ puts(" Rot 13: #{pw.password[:rot13]}")
85
+ puts(" NATO: #{pw.password[:nato]}")
86
+ puts
87
+
88
+ # vim:tabstop=4:expandtab:ai
data/lib/passmakr.rb ADDED
@@ -0,0 +1,336 @@
1
+ # Class to generate easy to remember passwords, random passwords and urandom passwords,
2
+ # it also has various utilities to crypt and hash passwords in ways compatable with various
3
+ # things like apache htpasswd, /etc/passwd, /etc/shadow and so forth
4
+ #
5
+ # It include code from http://www.caliban.org/ruby/ruby-password.shtml
6
+ class Passmakr
7
+ attr_reader :password
8
+
9
+ # :stopdoc:
10
+
11
+ # This flag is used in conjunction with Passmakr.phonemic and states that a
12
+ # password must include a digit.
13
+ ONE_DIGIT = 1
14
+
15
+ # This flag is used in conjunction with Passmakr.phonemic and states that a
16
+ # password must include a capital letter.
17
+ ONE_CASE = 1 << 1
18
+
19
+ # MD5 algorithm (see <em>crypt(3)</em> for more information)
20
+ MD5 = false
21
+
22
+ # DES algorithm
23
+ DES = true
24
+
25
+ # Characters that may appear in generated passwords. Passmakr.urandom may
26
+ # also use the characters + and /.
27
+ PASSWD_CHARS = '0123456789' +
28
+ 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' +
29
+ 'abcdefghijklmnopqrstuvwxyz'
30
+
31
+ # Valid salt characters for use by Passmakr#crypt.
32
+ SALT_CHARS = '0123456789' +
33
+ 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' +
34
+ 'abcdefghijklmnopqrstuvwxyz' +
35
+ './'
36
+
37
+ # phoneme flags
38
+ CONSONANT = 1
39
+ VOWEL = 1 << 1
40
+ DIPHTHONG = 1 << 2
41
+ NOT_FIRST = 1 << 3 # indicates that a given phoneme may not occur first
42
+
43
+ PHONEMES = {
44
+ :a => VOWEL,
45
+ :ae => VOWEL | DIPHTHONG,
46
+ :ah => VOWEL | DIPHTHONG,
47
+ :ai => VOWEL | DIPHTHONG,
48
+ :b => CONSONANT,
49
+ :c => CONSONANT,
50
+ :ch => CONSONANT | DIPHTHONG,
51
+ :d => CONSONANT,
52
+ :e => VOWEL,
53
+ :ee => VOWEL | DIPHTHONG,
54
+ :ei => VOWEL | DIPHTHONG,
55
+ :f => CONSONANT,
56
+ :g => CONSONANT,
57
+ :gh => CONSONANT | DIPHTHONG | NOT_FIRST,
58
+ :h => CONSONANT,
59
+ :i => VOWEL,
60
+ :ie => VOWEL | DIPHTHONG,
61
+ :j => CONSONANT,
62
+ :k => CONSONANT,
63
+ :l => CONSONANT,
64
+ :m => CONSONANT,
65
+ :n => CONSONANT,
66
+ :ng => CONSONANT | DIPHTHONG | NOT_FIRST,
67
+ :o => VOWEL,
68
+ :oh => VOWEL | DIPHTHONG,
69
+ :oo => VOWEL | DIPHTHONG,
70
+ :p => CONSONANT,
71
+ :ph => CONSONANT | DIPHTHONG,
72
+ :qu => CONSONANT | DIPHTHONG,
73
+ :r => CONSONANT,
74
+ :s => CONSONANT,
75
+ :sh => CONSONANT | DIPHTHONG,
76
+ :t => CONSONANT,
77
+ :th => CONSONANT | DIPHTHONG,
78
+ :u => VOWEL,
79
+ :v => CONSONANT,
80
+ :w => CONSONANT,
81
+ :x => CONSONANT,
82
+ :y => CONSONANT,
83
+ :z => CONSONANT
84
+ }
85
+
86
+ # :startdoc:
87
+
88
+ # Creates a password instance, possible modes are:
89
+ #
90
+ # * :phonemic - produces easily remembered passwords
91
+ # * :random - uses the ruby random function to generate a password
92
+ # * :urandom - uses linux /dev/urandom to generate a password
93
+ #
94
+ # Each instance will have a unique hash of password information
95
+ # in the password attribute, the hash will have members:
96
+ #
97
+ # * :string - the actual password string
98
+ # * :crypt - a crypt encoded version with a salt, usable in unix password hashes
99
+ # * :md5 - a md5 hash usable in unix password hashes
100
+ # * :nato - a NATO alphabet readable version of the password
101
+ # * :rot13 - for kicks, a ro13 encoded version of the password
102
+ def initialize(mode=:phonemic, length=8)
103
+ pw = nil
104
+
105
+ case mode
106
+ when :urandom
107
+ pw = urandom(length)
108
+ when :random
109
+ pw = random(length)
110
+ else
111
+ pw = phonemic(length)
112
+ end
113
+
114
+ preppw(pw)
115
+ end
116
+
117
+ private
118
+ # Determine whether next character should be a vowel or consonant.
119
+ def get_vowel_or_consonant
120
+ rand( 2 ) == 1 ? VOWEL : CONSONANT
121
+ end
122
+
123
+ # Generate a memorable password of _length_ characters, using phonemes that
124
+ # a human-being can easily remember. _flags_ is one or more of
125
+ # <em>Passmakr::ONE_DIGIT</em> and <em>Passmakr::ONE_CASE</em>, logically
126
+ # OR'ed together. For example:
127
+ #
128
+ # pw = Passmakr.phonemic( 8, Passmakr::ONE_DIGIT | Passmakr::ONE_CASE )
129
+ #
130
+ # This would generate an eight character password, containing a digit and an
131
+ # upper-case letter, such as <b>Ug2shoth</b>.
132
+ #
133
+ # This method was inspired by the
134
+ # pwgen[http://sourceforge.net/projects/pwgen/] tool, written by Theodore
135
+ # Ts'o.
136
+ #
137
+ # Generated passwords may contain any of the characters in
138
+ # <em>Passmakr::PASSWD_CHARS</em>.
139
+ def phonemic(length=8, flags=Passmakr::ONE_CASE)
140
+
141
+ pw = nil
142
+ ph_flags = flags
143
+
144
+ loop do
145
+
146
+ pw = ""
147
+
148
+ # Separate the flags integer into an array of individual flags
149
+ feature_flags = [ flags & ONE_DIGIT, flags & ONE_CASE ]
150
+
151
+ prev = []
152
+ first = true
153
+ desired = get_vowel_or_consonant
154
+
155
+ # Get an Array of all of the phonemes
156
+ phonemes = PHONEMES.keys.map { |ph| ph.to_s }
157
+ nr_phonemes = phonemes.size
158
+
159
+ while pw.length < length do
160
+
161
+ # Get a random phoneme and its length
162
+ phoneme = phonemes[ rand( nr_phonemes ) ]
163
+ ph_len = phoneme.length
164
+
165
+ # Get its flags as an Array
166
+ ph_flags = PHONEMES[ phoneme.to_sym ]
167
+ ph_flags = [ ph_flags & CONSONANT, ph_flags & VOWEL,
168
+ ph_flags & DIPHTHONG, ph_flags & NOT_FIRST ]
169
+
170
+ # Filter on the basic type of the next phoneme
171
+ next if ph_flags.include? desired
172
+
173
+ # Handle the NOT_FIRST flag
174
+ next if first and ph_flags.include? NOT_FIRST
175
+
176
+ # Don't allow a VOWEL followed a vowel/diphthong pair
177
+ next if prev.include? VOWEL and ph_flags.include? VOWEL and
178
+ ph_flags.include? DIPHTHONG
179
+
180
+ # Don't allow us to go longer than the desired length
181
+ next if ph_len > length - pw.length
182
+
183
+ # We've found a phoneme that meets our criteria
184
+ pw << phoneme
185
+
186
+ # Handle ONE_CASE
187
+ if feature_flags.include? ONE_CASE
188
+
189
+ if (first or ph_flags.include? CONSONANT) and rand( 10 ) < 3
190
+ pw[-ph_len, 1] = pw[-ph_len, 1].upcase
191
+ feature_flags.delete ONE_CASE
192
+ end
193
+
194
+ end
195
+
196
+ # Is password already long enough?
197
+ break if pw.length >= length
198
+
199
+ # Handle ONE_DIGIT
200
+ if feature_flags.include? ONE_DIGIT
201
+
202
+ if ! first and rand( 10 ) < 3
203
+ pw << ( rand( 10 ) + ?0 ).chr
204
+ feature_flags.delete ONE_DIGIT
205
+
206
+ first = true
207
+ prev = []
208
+ desired = get_vowel_or_consonant
209
+ next
210
+ end
211
+
212
+ end
213
+
214
+ if desired == CONSONANT
215
+ desired = VOWEL
216
+ elsif prev.include? VOWEL or ph_flags.include? DIPHTHONG or
217
+ rand(10) > 3
218
+ desired = CONSONANT
219
+ else
220
+ desired = VOWEL
221
+ end
222
+
223
+ prev = ph_flags
224
+ first = false
225
+ end
226
+
227
+ # Try again
228
+ break unless feature_flags.include? ONE_CASE or feature_flags.include? ONE_DIGIT
229
+
230
+ end
231
+
232
+ pw
233
+ end
234
+
235
+
236
+ # Generate a random password of _length_ characters. Unlike the
237
+ # Passmakr.phonemic method, no attempt will be made to generate a memorable
238
+ # password. Generated passwords may contain any of the characters in
239
+ # <em>Passmakr::PASSWD_CHARS</em>.
240
+ def random(length=8)
241
+ pw = ""
242
+ nr_chars = PASSWD_CHARS.size
243
+
244
+ srand()
245
+
246
+ length.times { pw << PASSWD_CHARS[ rand( nr_chars ) ] }
247
+
248
+ pw
249
+ end
250
+
251
+
252
+ # An alternative to Passmakr.random. It uses the <tt>/dev/urandom</tt>
253
+ # device to generate passwords, returning +nil+ on systems that do not
254
+ # implement the device. The passwords it generates may contain any of the
255
+ # characters in <em>Passmakr::PASSWD_CHARS</em>, plus the additional
256
+ # characters + and /.
257
+ def urandom(length=8)
258
+ return nil unless File.chardev? '/dev/urandom'
259
+
260
+ rand_data = nil
261
+ File.open( "/dev/urandom" ) { |f| rand_data = f.read( length ) }
262
+
263
+ # Base64 encode it
264
+ pw = [ rand_data ].pack( 'm' )[ 0 .. length - 1 ]
265
+ end
266
+
267
+ # Encrypt a password using _type_ encryption. _salt_, if supplied, will be
268
+ # used to perturb the encryption algorithm and should be chosen from the
269
+ # <em>Passmakr::SALT_CHARS</em>. If no salt is given, a randomly generated
270
+ # salt will be used.
271
+ def crypt(pw, type=DES, salt='')
272
+
273
+ unless ( salt.split( // ) - SALT_CHARS.split( // ) ).empty?
274
+ raise CryptError, 'bad salt'
275
+ end
276
+
277
+ salt = random( type ? 2 : 8 ) if salt.empty?
278
+
279
+ # (Linux glibc2 interprets a salt prefix of '$1$' as a call to use MD5
280
+ # instead of DES when calling crypt(3))
281
+ salt = '$1$' + salt if type == MD5
282
+
283
+ crypt = pw.crypt(salt)
284
+
285
+ # Raise an exception if MD5 was wanted, but result is not recognisable
286
+ if type == MD5 && crypt !~ /^\$1\$/
287
+ raise CryptError, 'MD5 not implemented'
288
+ end
289
+
290
+ crypt
291
+ end
292
+
293
+ # prepares @password using the password passed as a string
294
+ def preppw(pw)
295
+ rot13 = pw.tr("A-Za-z", "N-ZA-Mn-za-m")
296
+
297
+ @password = {:string => pw, :nato => pw.to_nato,
298
+ :crypt => crypt(pw), :md5 => crypt(pw, MD5),
299
+ :rot13 => rot13 }
300
+ end
301
+ end
302
+
303
+ class String
304
+ NATOALPHA = ["alfa", "bravo", "charlie", "delta", "echo", "foxtrot", "golf", "hotel",
305
+ "india", "juliet", "kilo", "lima", "mike", "november", "oscar", "papa",
306
+ "quebec", "romeo", "sierra", "tango", "uniform", "victor", "whiskey",
307
+ "xray", "yankee", "zulu"]
308
+
309
+ NATODIGITS = ["zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"]
310
+
311
+ # Returns a NATO alphabet version of the string
312
+ def to_nato
313
+ result = nil
314
+
315
+ # for strings we call ourself recursively for each char to build up the eventual string
316
+ if self.size > 1
317
+ result = self.split("").map {|c| c.to_nato }.join(" ")
318
+ else
319
+ ansi = self[0]
320
+
321
+ if ansi >= 65 && ansi <= 90
322
+ result = NATOALPHA[ansi-65].capitalize
323
+ elsif ansi >= 97 && ansi <= 122
324
+ result = NATOALPHA[ansi-97]
325
+ elsif ansi >= 48 && ansi <= 57
326
+ result = NATODIGITS[ansi-48]
327
+ else
328
+ result = self
329
+ end
330
+ end
331
+
332
+ result
333
+ end
334
+ end
335
+
336
+ # vim:tabstop=4:expandtab:ai
data/passmakr.gemspec ADDED
@@ -0,0 +1,16 @@
1
+ Gem::Specification.new do |s|
2
+ s.name = "passmakr"
3
+ s.version = "1.0.0"
4
+
5
+ s.authors = ["R.I.Pienaar"]
6
+ s.date = %q{2009-10-11}
7
+ s.default_executable = "passmakr"
8
+ s.description = "Creates various types of passwords and shows them in often used formats"
9
+ s.email = ["rip@devco.net"]
10
+ s.executables = ["passmakr"]
11
+ s.files = ["COPYING", "passmakr.gemspec", "bin/passmakr", "lib/passmakr.rb"]
12
+ s.has_rdoc = true
13
+ s.homepage = "http://code.google.com/p/passmakr/"
14
+ s.require_paths = ["lib"]
15
+ s.summary = s.description
16
+ end
metadata ADDED
@@ -0,0 +1,66 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: passmakr
3
+ version: !ruby/object:Gem::Version
4
+ prerelease: false
5
+ segments:
6
+ - 1
7
+ - 0
8
+ - 0
9
+ version: 1.0.0
10
+ platform: ruby
11
+ authors:
12
+ - R.I.Pienaar
13
+ autorequire:
14
+ bindir: bin
15
+ cert_chain: []
16
+
17
+ date: 2009-10-11 00:00:00 +01:00
18
+ default_executable: passmakr
19
+ dependencies: []
20
+
21
+ description: Creates various types of passwords and shows them in often used formats
22
+ email:
23
+ - rip@devco.net
24
+ executables:
25
+ - passmakr
26
+ extensions: []
27
+
28
+ extra_rdoc_files: []
29
+
30
+ files:
31
+ - COPYING
32
+ - passmakr.gemspec
33
+ - bin/passmakr
34
+ - lib/passmakr.rb
35
+ has_rdoc: true
36
+ homepage: http://code.google.com/p/passmakr/
37
+ licenses: []
38
+
39
+ post_install_message:
40
+ rdoc_options: []
41
+
42
+ require_paths:
43
+ - lib
44
+ required_ruby_version: !ruby/object:Gem::Requirement
45
+ requirements:
46
+ - - ">="
47
+ - !ruby/object:Gem::Version
48
+ segments:
49
+ - 0
50
+ version: "0"
51
+ required_rubygems_version: !ruby/object:Gem::Requirement
52
+ requirements:
53
+ - - ">="
54
+ - !ruby/object:Gem::Version
55
+ segments:
56
+ - 0
57
+ version: "0"
58
+ requirements: []
59
+
60
+ rubyforge_project:
61
+ rubygems_version: 1.3.6
62
+ signing_key:
63
+ specification_version: 3
64
+ summary: Creates various types of passwords and shows them in often used formats
65
+ test_files: []
66
+