X-Git-Url: http://wagnertech.de/git?a=blobdiff_plain;f=SL%2FAuth%2FPassword.pm;h=5ae75eac5469556a26b1fc5db9d4cdd0fdbd0b72;hb=db3b23aa8ab6baaa3854259b59b033fbd23541ad;hp=9b0f1aec7be4ccfa8e5878eb4a88bbe406655929;hpb=58fdd50dbb6b909d48b2846f36857b2bd2219441;p=kivitendo-erp.git diff --git a/SL/Auth/Password.pm b/SL/Auth/Password.pm index 9b0f1aec7..5ae75eac5 100644 --- a/SL/Auth/Password.pm +++ b/SL/Auth/Password.pm @@ -3,29 +3,24 @@ package SL::Auth::Password; use strict; use Carp; +use Digest::MD5 (); +use Digest::SHA (); sub hash { my ($class, %params) = @_; - if (!$params{algorithm}) { - $params{algorithm} = 'SHA1'; - $params{fallback_algorithm} = 'MD5'; - } + $params{algorithm} ||= 'SHA256S'; - if ($params{algorithm} eq 'SHA1') { - if (eval { require Digest::SHA1; 1 }) { - return '{SHA1}' . Digest::SHA1::sha1_hex($params{password}); + my $salt = $params{algorithm} =~ m/S$/ ? $params{login} : ''; - } elsif ($params{fallback_algorithm}) { - return $class->hash_password(%params, algorithm => $params{fallback_algorithm}); + if ($params{algorithm} =~ m/^SHA256/) { + return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password}); - } else { - die 'Digest::SHA1 not available'; - } + } elsif ($params{algorithm} =~ m/^SHA1/) { + return '{' . $params{algorithm} . '}' . Digest::SHA::sha1_hex($salt . $params{password}); - } elsif ($params{algorithm} eq 'MD5') { - require Digest::MD5; - return '{MD5}' . Digest::MD5::md5_hex($params{password}); + } elsif ($params{algorithm} =~ m/^MD5/) { + return '{' . $params{algorithm} . '}' . Digest::MD5::md5_hex($salt . $params{password}); } elsif ($params{algorithm} eq 'CRYPT') { return '{CRYPT}' . crypt($params{password}, substr($params{login}, 0, 2)); @@ -35,11 +30,27 @@ sub hash { } } +sub hash_if_unhashed { + my ($class, %params) = @_; + + my ($algorithm, $password) = $class->parse($params{password}, 'NONE'); + + return $params{password} unless $algorithm eq 'NONE'; + + if ($params{look_up_algorithm}) { + my $stored_password = $params{auth}->get_stored_password($params{login}); + my ($stored_algorithm) = $class->parse($stored_password); + $params{algorithm} = $stored_algorithm; + } + + return $class->hash(%params); +} + sub parse { - my ($class, $password) = @_; + my ($class, $password, $default_algorithm) = @_; return ($1, $2) if $password =~ m/^\{ ([^\}]+) \} (.+)/x; - return ('CRYPT', $password); + return ($default_algorithm || 'CRYPT', $password); } 1;