diff options
author | Andreas Gohr <andi@splitbrain.org> | 2012-02-01 11:29:32 -0800 |
---|---|---|
committer | Andreas Gohr <andi@splitbrain.org> | 2012-02-01 11:29:32 -0800 |
commit | d00208c2ec66849d743c0dc89440a9ab27efedbb (patch) | |
tree | 08966a1a5563a82c39632bafe4b062df22cec85a /inc | |
parent | bc9d46afa580ee1191b02e2fe3b03fd863045b8b (diff) | |
parent | 5c73ae04fa654072dbca15f016f31c68a0c7bcee (diff) | |
download | rpg-d00208c2ec66849d743c0dc89440a9ab27efedbb.tar.gz rpg-d00208c2ec66849d743c0dc89440a9ab27efedbb.tar.bz2 |
Merge pull request #58 from splitbrain/bcrypt
Added bcrypt support for password hashes
Diffstat (limited to 'inc')
-rw-r--r-- | inc/PassHash.class.php | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/inc/PassHash.class.php b/inc/PassHash.class.php index 31493c022..2558f37c6 100644 --- a/inc/PassHash.class.php +++ b/inc/PassHash.class.php @@ -47,9 +47,15 @@ class PassHash { }elseif(preg_match('/^md5\$(.{5})\$/',$hash,$m)){ $method = 'djangomd5'; $salt = $m[1]; + }elseif(preg_match('/^\$2a\$(.{2})\$/',$hash,$m)){ + $method = 'bcrypt'; + $salt = $hash; }elseif(substr($hash,0,6) == '{SSHA}'){ $method = 'ssha'; $salt = substr(base64_decode(substr($hash, 6)),20); + }elseif(substr($hash,0,6) == '{SMD5}'){ + $method = 'lsmd5'; + $salt = substr(base64_decode(substr($hash, 6)),16); }elseif($len == 32){ $method = 'md5'; }elseif($len == 40){ @@ -130,6 +136,20 @@ class PassHash { } } + + /** + * Password hashing method 'lsmd5' + * + * Uses salted MD5 hashs. Salt is 8 bytes long. + * + * This is the format used by LDAP. + */ + public function hash_lsmd5($clear, $salt=null){ + $this->init_salt($salt,8); + return "{SMD5}".base64_encode(md5($clear.$salt, true).$salt); + } + + /** * Password hashing method 'apr1' * @@ -379,4 +399,35 @@ class PassHash { return 'md5$'.$salt.'$'.md5($salt.$clear); } + + /** + * Passwordhashing method 'bcrypt' + * + * Uses a modified blowfish algorithm called eksblowfish + * This method works on PHP 5.3+ only and will throw an exception + * if the needed crypt support isn't available + * + * A full hash should be given as salt (starting with $a2$) or this + * will break. When no salt is given, the iteration count can be set + * through the $compute variable. + * + * @param string $clear - the clear text to hash + * @param string $salt - the salt to use, null for random + * @param int $compute - the iteration count (between 4 and 31) + * @returns string - hashed password + */ + public function hash_bcrypt($clear, $salt=null, $compute=8){ + if(!defined('CRYPT_BLOWFISH') || CRYPT_BLOWFISH != 1){ + throw new Exception('This PHP installation has no bcrypt support'); + } + + if(is_null($salt)){ + if($compute < 4 || $compute > 31) $compute = 8; + $salt = '$2a$'.str_pad($compute, 2, '0', STR_PAD_LEFT).'$'. + $this->gen_salt(22); + } + + return crypt($password, $salt); + } + } |