X-Git-Url: http://wagnertech.de/git?a=blobdiff_plain;f=SL%2FAuth%2FPassword.pm;h=5ae75eac5469556a26b1fc5db9d4cdd0fdbd0b72;hb=3171c37870f8d169128b81f35d9a597c03322f00;hp=4141bba4df226c5f6eaadf0ca36a3429092785cc;hpb=e0c3dcb8647d811bf327ad3f50175acb3289a986;p=kivitendo-erp.git diff --git a/SL/Auth/Password.pm b/SL/Auth/Password.pm index 4141bba4d..5ae75eac5 100644 --- a/SL/Auth/Password.pm +++ b/SL/Auth/Password.pm @@ -3,45 +3,23 @@ package SL::Auth::Password; use strict; use Carp; +use Digest::MD5 (); +use Digest::SHA (); sub hash { my ($class, %params) = @_; - if (!$params{algorithm}) { - $params{algorithm} = 'SHA256S'; - $params{fallback_algorithm} = 'MD5'; - } - + $params{algorithm} ||= 'SHA256S'; my $salt = $params{algorithm} =~ m/S$/ ? $params{login} : ''; if ($params{algorithm} =~ m/^SHA256/) { - if (eval { require Digest::SHA; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password}); - - } elsif ($params{fallback_algorithm}) { - return $class->hash_password(%params, algorithm => $params{fallback_algorithm}); - - } else { - die 'Digest::SHA is not available'; - } + return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password}); } elsif ($params{algorithm} =~ m/^SHA1/) { - if (eval { require Digest::SHA; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA::sha1_hex($salt . $params{password}); - - } elsif (eval { require Digest::SHA1; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA1::sha1_hex($salt . $params{password}); - - } elsif ($params{fallback_algorithm}) { - return $class->hash_password(%params, algorithm => $params{fallback_algorithm}); - - } else { - die 'Neither Digest::SHA nor Digest::SHA1 is available'; - } + return '{' . $params{algorithm} . '}' . Digest::SHA::sha1_hex($salt . $params{password}); } elsif ($params{algorithm} =~ m/^MD5/) { - require Digest::MD5; return '{' . $params{algorithm} . '}' . Digest::MD5::md5_hex($salt . $params{password}); } elsif ($params{algorithm} eq 'CRYPT') {