1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
|
<?php
/**
* Implements the BcryptPassword class for the MediaWiki software.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
* http://www.gnu.org/copyleft/gpl.html
*
* @file
*/
declare( strict_types = 1 );
/**
* A Bcrypt-hashed password
*
* This is a computationally complex password hash for use in modern applications.
* The number of rounds can be configured by $wgPasswordConfig['bcrypt']['cost'].
*
* @since 1.24
*/
class BcryptPassword extends ParameterizedPassword {
protected function getDefaultParams() : array {
return [
'rounds' => $this->config['cost'],
];
}
protected function getDelimiter() : string {
return '$';
}
protected function parseHash( ?string $hash ) : void {
parent::parseHash( $hash );
$this->params['rounds'] = (int)$this->params['rounds'];
}
/**
* @param string $password Password to encrypt
*
* @throws PasswordError If bcrypt has an unknown error
* @throws MWException If bcrypt is not supported by PHP
*/
public function crypt( string $password ) : void {
if ( !defined( 'CRYPT_BLOWFISH' ) ) {
throw new MWException( 'Bcrypt is not supported.' );
}
// Either use existing hash or make a new salt
// Bcrypt expects 22 characters of base64-encoded salt
// Note: bcrypt does not use MIME base64. It uses its own base64 without any '=' padding.
// It expects a 128 bit salt, so it will ignore anything after the first 128 bits
if ( !isset( $this->args[0] ) ) {
$this->args[] = substr(
// Replace + with ., because bcrypt uses a non-MIME base64 format
strtr(
// Random base64 encoded string
base64_encode( random_bytes( 16 ) ),
'+', '.'
),
0, 22
);
}
$hash = crypt( $password,
sprintf( '$2y$%02d$%s', (int)$this->params['rounds'], $this->args[0] ) );
if ( !is_string( $hash ) || strlen( $hash ) <= 13 ) {
throw new PasswordError( 'Error when hashing password.' );
}
// Strip the $2y$
$parts = explode( $this->getDelimiter(), substr( $hash, 4 ) );
$this->params['rounds'] = (int)$parts[0];
$this->args[0] = substr( $parts[1], 0, 22 );
$this->hash = substr( $parts[1], 22 );
}
}
|