The Ellipse subroutine msssec.cbl calls an external executable crypt (uses a standard Unix DES-based encryption algorithm) with the password (padded to 10 characters with white space) and a salt based on the userid (check msssec.cbl for the salt calculation).
The returned value from crypt is truncated to 10 characters and stored (or compared with during sign-on) in the field pass_word of the database table msf020.
So you could download a version of crypt from the internet and re-create the salt and compare the Ellipse password via a JDBC connection to the database, however this does not mean you can bypass the Ellipse Login process when creating a connection with Ellipse using the Ellipse API’s.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.