kivitendo/SL/Auth/Password.pm @ e7c035b4
58fdd50d | Moritz Bunkus | package SL::Auth::Password;
|
||
use strict;
|
||||
use Carp;
|
||||
sub hash {
|
||||
my ($class, %params) = @_;
|
||||
if (!$params{algorithm}) {
|
||||
e0c3dcb8 | Moritz Bunkus | $params{algorithm} = 'SHA256S';
|
||
58fdd50d | Moritz Bunkus | $params{fallback_algorithm} = 'MD5';
|
||
}
|
||||
e0c3dcb8 | Moritz Bunkus | |||
my $salt = $params{algorithm} =~ m/S$/ ? $params{login} : '';
|
||||
if ($params{algorithm} =~ m/^SHA256/) {
|
||||
if (eval { require Digest::SHA; 1 }) {
|
||||
return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password});
|
||||
} elsif ($params{fallback_algorithm}) {
|
||||
1c38bb41 | Sven Schöling | return $class->hash(%params, algorithm => $params{fallback_algorithm});
|
||
e0c3dcb8 | Moritz Bunkus | |||
} else {
|
||||
die 'Digest::SHA is not available';
|
||||
}
|
||||
} elsif ($params{algorithm} =~ m/^SHA1/) {
|
||||
if (eval { require Digest::SHA; 1 }) {
|
||||
return '{' . $params{algorithm} . '}' . Digest::SHA::sha1_hex($salt . $params{password});
|
||||
} elsif (eval { require Digest::SHA1; 1 }) {
|
||||
return '{' . $params{algorithm} . '}' . Digest::SHA1::sha1_hex($salt . $params{password});
|
||||
58fdd50d | Moritz Bunkus | |||
} elsif ($params{fallback_algorithm}) {
|
||||
1c38bb41 | Sven Schöling | return $class->hash(%params, algorithm => $params{fallback_algorithm});
|
||
58fdd50d | Moritz Bunkus | |||
} else {
|
||||
e0c3dcb8 | Moritz Bunkus | die 'Neither Digest::SHA nor Digest::SHA1 is available';
|
||
58fdd50d | Moritz Bunkus | }
|
||
e0c3dcb8 | Moritz Bunkus | } elsif ($params{algorithm} =~ m/^MD5/) {
|
||
58fdd50d | Moritz Bunkus | require Digest::MD5;
|
||
e0c3dcb8 | Moritz Bunkus | return '{' . $params{algorithm} . '}' . Digest::MD5::md5_hex($salt . $params{password});
|
||
58fdd50d | Moritz Bunkus | |||
} elsif ($params{algorithm} eq 'CRYPT') {
|
||||
return '{CRYPT}' . crypt($params{password}, substr($params{login}, 0, 2));
|
||||
} else {
|
||||
croak 'Unsupported hash algorithm ' . $params{algorithm};
|
||||
}
|
||||
}
|
||||
d0c2cfbe | Moritz Bunkus | sub hash_if_unhashed {
|
||
my ($class, %params) = @_;
|
||||
my ($algorithm, $password) = $class->parse($params{password}, 'NONE');
|
||||
d3d6cb31 | Moritz Bunkus | return $params{password} unless $algorithm eq 'NONE';
|
||
if ($params{look_up_algorithm}) {
|
||||
my $stored_password = $params{auth}->get_stored_password($params{login});
|
||||
my ($stored_algorithm) = $class->parse($stored_password);
|
||||
$params{algorithm} = $stored_algorithm;
|
||||
}
|
||||
return $class->hash(%params);
|
||||
d0c2cfbe | Moritz Bunkus | }
|
||
58fdd50d | Moritz Bunkus | sub parse {
|
||
d0c2cfbe | Moritz Bunkus | my ($class, $password, $default_algorithm) = @_;
|
||
58fdd50d | Moritz Bunkus | |||
return ($1, $2) if $password =~ m/^\{ ([^\}]+) \} (.+)/x;
|
||||
d0c2cfbe | Moritz Bunkus | return ($default_algorithm || 'CRYPT', $password);
|
||
58fdd50d | Moritz Bunkus | }
|
||
1;
|