Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
S
syncEnrollments
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Yeray Santana Hualde
syncEnrollments
Commits
7f2e1e9c
Commit
7f2e1e9c
authored
Sep 11, 2011
by
Taylor Otwell
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
switched to simpler bcrypt implementation from phpass.
parent
096a4190
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
38 additions
and
238 deletions
+38
-238
container.php
laravel/config/container.php
+1
-1
bcrypt.php
laravel/security/hashing/bcrypt.php
+37
-237
No files found.
laravel/config/container.php
View file @
7f2e1e9c
...
@@ -81,7 +81,7 @@ return array(
...
@@ -81,7 +81,7 @@ return array(
'laravel.hasher'
=>
array
(
'singleton'
=>
true
,
'resolver'
=>
function
(
$container
)
'laravel.hasher'
=>
array
(
'singleton'
=>
true
,
'resolver'
=>
function
(
$container
)
{
{
return
new
Security\Hashing\B
Crypt
(
10
,
false
);
return
new
Security\Hashing\B
crypt
(
8
);
}),
}),
...
...
laravel/security/hashing/bcrypt.php
View file @
7f2e1e9c
<?php
namespace
Laravel\Security\Hashing
;
<?php
namespace
Laravel\Security\Hashing
;
#
# Portable PHP password hashing framework.
#
# Version 0.3 / genuine.
#
# Written by Solar Designer <solar at openwall.com> in 2004-2006 and placed in
# the public domain. Revised in subsequent years, still public domain.
#
# There's absolutely no warranty.
#
# The homepage URL for this framework is:
#
# http://www.openwall.com/phpass/
#
# Please be sure to update the Version line if you edit this file in any way.
# It is suggested that you leave the main version number intact, but indicate
# your project name (after the slash) and add your own revision information.
#
# Please do not change the "private" password hashing method implemented in
# here, thereby making your hashes incompatible. However, if you must, please
# change the hash type identifier (the "$P$") to something different.
#
# Obviously, since this code is in the public domain, the above are not
# requirements (there can be none), but merely suggestions.
#
class
BCrypt
implements
Engine
{
private
$itoa64
;
private
$iteration_count_log2
;
private
$portable_hashes
;
private
$random_state
;
public
function
__construct
(
$iteration_count_log2
,
$portable_hashes
)
class
Bcrypt
implements
Engine
{
{
$this
->
itoa64
=
'./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'
;
if
(
$iteration_count_log2
<
4
||
$iteration_count_log2
>
31
)
$iteration_count_log2
=
8
;
$this
->
iteration_count_log2
=
$iteration_count_log2
;
$this
->
portable_hashes
=
$portable_hashes
;
$this
->
random_state
=
microtime
();
/**
if
(
function_exists
(
'getmypid'
))
* The number of iterations that should be performed.
$this
->
random_state
.=
getmypid
();
*
}
* @var int
*/
protected
$rounds
;
private
function
get_random_bytes
(
$count
)
/**
* Create a new bcrypt hashing engine.
*
* @param int $rounds
* @return void
*/
public
function
__construct
(
$rounds
)
{
{
$output
=
''
;
$this
->
rounds
=
$rounds
;
if
(
is_readable
(
'/dev/urandom'
)
&&
(
$fh
=
@
fopen
(
'/dev/urandom'
,
'rb'
)))
{
$output
=
fread
(
$fh
,
$count
);
fclose
(
$fh
);
}
if
(
strlen
(
$output
)
<
$count
)
{
if
(
!
function_exists
(
'openssl_random_pseudo_bytes'
))
$output
=
''
;
{
for
(
$i
=
0
;
$i
<
$count
;
$i
+=
16
)
{
throw
new
\Exception
(
"The openssl PHP extension is required to perform bcrypt hashing."
);
$this
->
random_state
=
md5
(
microtime
()
.
$this
->
random_state
);
$output
.=
pack
(
'H*'
,
md5
(
$this
->
random_state
));
}
$output
=
substr
(
$output
,
0
,
$count
);
}
}
return
$output
;
}
}
private
function
encode64
(
$input
,
$count
)
/**
* Perform a one-way hash on a string using bcrypt.
*
* @param string $value
* @return string
*/
public
function
hash
(
$value
)
{
{
$output
=
''
;
$salt
=
sprintf
(
'$2a$%02d$'
,
$this
->
rounds
)
.
substr
(
base64_encode
(
openssl_random_pseudo_bytes
(
16
)),
0
,
22
);
$i
=
0
;
do
{
$value
=
ord
(
$input
[
$i
++
]);
$output
.=
$this
->
itoa64
[
$value
&
0x3f
];
if
(
$i
<
$count
)
$value
|=
ord
(
$input
[
$i
])
<<
8
;
$output
.=
$this
->
itoa64
[(
$value
>>
6
)
&
0x3f
];
if
(
$i
++
>=
$count
)
break
;
if
(
$i
<
$count
)
$value
|=
ord
(
$input
[
$i
])
<<
16
;
$output
.=
$this
->
itoa64
[(
$value
>>
12
)
&
0x3f
];
if
(
$i
++
>=
$count
)
break
;
$output
.=
$this
->
itoa64
[(
$value
>>
18
)
&
0x3f
];
}
while
(
$i
<
$count
);
return
$output
;
return
crypt
(
$value
,
str_replace
(
'+'
,
'.'
,
$salt
))
;
}
}
private
function
gensalt_private
(
$input
)
/**
* Determine if an unhashed value matches a given hash.
*
* @param string $value
* @param string $hash
* @return bool
*/
public
function
check
(
$value
,
$hash
)
{
{
$output
=
'$P$'
;
return
crypt
(
$value
,
$hash
)
===
$hash
;
$output
.=
$this
->
itoa64
[
min
(
$this
->
iteration_count_log2
+
((
PHP_VERSION
>=
'5'
)
?
5
:
3
),
30
)];
$output
.=
$this
->
encode64
(
$input
,
6
);
return
$output
;
}
private
function
crypt_private
(
$password
,
$setting
)
{
$output
=
'*0'
;
if
(
substr
(
$setting
,
0
,
2
)
==
$output
)
$output
=
'*1'
;
$id
=
substr
(
$setting
,
0
,
3
);
# We use "$P$", phpBB3 uses "$H$" for the same thing
if
(
$id
!=
'$P$'
&&
$id
!=
'$H$'
)
return
$output
;
$count_log2
=
strpos
(
$this
->
itoa64
,
$setting
[
3
]);
if
(
$count_log2
<
7
||
$count_log2
>
30
)
return
$output
;
$count
=
1
<<
$count_log2
;
$salt
=
substr
(
$setting
,
4
,
8
);
if
(
strlen
(
$salt
)
!=
8
)
return
$output
;
# We're kind of forced to use MD5 here since it's the only
# cryptographic primitive available in all versions of PHP
# currently in use. To implement our own low-level crypto
# in PHP would result in much worse performance and
# consequently in lower iteration counts and hashes that are
# quicker to crack (by non-PHP code).
if
(
PHP_VERSION
>=
'5'
)
{
$hash
=
md5
(
$salt
.
$password
,
TRUE
);
do
{
$hash
=
md5
(
$hash
.
$password
,
TRUE
);
}
while
(
--
$count
);
}
else
{
$hash
=
pack
(
'H*'
,
md5
(
$salt
.
$password
));
do
{
$hash
=
pack
(
'H*'
,
md5
(
$hash
.
$password
));
}
while
(
--
$count
);
}
$output
=
substr
(
$setting
,
0
,
12
);
$output
.=
$this
->
encode64
(
$hash
,
16
);
return
$output
;
}
private
function
gensalt_extended
(
$input
)
{
$count_log2
=
min
(
$this
->
iteration_count_log2
+
8
,
24
);
# This should be odd to not reveal weak DES keys, and the
# maximum valid value is (2**24 - 1) which is odd anyway.
$count
=
(
1
<<
$count_log2
)
-
1
;
$output
=
'_'
;
$output
.=
$this
->
itoa64
[
$count
&
0x3f
];
$output
.=
$this
->
itoa64
[(
$count
>>
6
)
&
0x3f
];
$output
.=
$this
->
itoa64
[(
$count
>>
12
)
&
0x3f
];
$output
.=
$this
->
itoa64
[(
$count
>>
18
)
&
0x3f
];
$output
.=
$this
->
encode64
(
$input
,
3
);
return
$output
;
}
private
function
gensalt_blowfish
(
$input
)
{
# This one needs to use a different order of characters and a
# different encoding scheme from the one in encode64() above.
# We care because the last character in our encoded string will
# only represent 2 bits. While two known implementations of
# bcrypt will happily accept and correct a salt string which
# has the 4 unused bits set to non-zero, we do not want to take
# chances and we also do not want to waste an additional byte
# of entropy.
$itoa64
=
'./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'
;
$output
=
'$2a$'
;
$output
.=
chr
(
ord
(
'0'
)
+
$this
->
iteration_count_log2
/
10
);
$output
.=
chr
(
ord
(
'0'
)
+
$this
->
iteration_count_log2
%
10
);
$output
.=
'$'
;
$i
=
0
;
do
{
$c1
=
ord
(
$input
[
$i
++
]);
$output
.=
$itoa64
[
$c1
>>
2
];
$c1
=
(
$c1
&
0x03
)
<<
4
;
if
(
$i
>=
16
)
{
$output
.=
$itoa64
[
$c1
];
break
;
}
$c2
=
ord
(
$input
[
$i
++
]);
$c1
|=
$c2
>>
4
;
$output
.=
$itoa64
[
$c1
];
$c1
=
(
$c2
&
0x0f
)
<<
2
;
$c2
=
ord
(
$input
[
$i
++
]);
$c1
|=
$c2
>>
6
;
$output
.=
$itoa64
[
$c1
];
$output
.=
$itoa64
[
$c2
&
0x3f
];
}
while
(
1
);
return
$output
;
}
public
function
hash
(
$password
)
{
$random
=
''
;
if
(
CRYPT_BLOWFISH
==
1
&&
!
$this
->
portable_hashes
)
{
$random
=
$this
->
get_random_bytes
(
16
);
$hash
=
crypt
(
$password
,
$this
->
gensalt_blowfish
(
$random
));
if
(
strlen
(
$hash
)
==
60
)
return
$hash
;
}
if
(
CRYPT_EXT_DES
==
1
&&
!
$this
->
portable_hashes
)
{
if
(
strlen
(
$random
)
<
3
)
$random
=
$this
->
get_random_bytes
(
3
);
$hash
=
crypt
(
$password
,
$this
->
gensalt_extended
(
$random
));
if
(
strlen
(
$hash
)
==
20
)
return
$hash
;
}
if
(
strlen
(
$random
)
<
6
)
$random
=
$this
->
get_random_bytes
(
6
);
$hash
=
$this
->
crypt_private
(
$password
,
$this
->
gensalt_private
(
$random
));
if
(
strlen
(
$hash
)
==
34
)
return
$hash
;
# Returning '*' on error is safe here, but would _not_ be safe
# in a crypt(3)-like function used _both_ for generating new
# hashes and for validating passwords against existing hashes.
return
'*'
;
}
public
function
check
(
$password
,
$stored_hash
)
{
$hash
=
$this
->
crypt_private
(
$password
,
$stored_hash
);
if
(
$hash
[
0
]
==
'*'
)
$hash
=
crypt
(
$password
,
$stored_hash
);
return
$hash
==
$stored_hash
;
}
}
}
?>
}
\ No newline at end of file
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment