| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Crypt::Password::Util; |
|
2
|
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
our $DATE = '2016-01-20'; # DATE |
|
4
|
|
|
|
|
|
|
our $VERSION = '0.15'; # VERSION |
|
5
|
|
|
|
|
|
|
|
|
6
|
1
|
|
|
1
|
|
752
|
use 5.010001; |
|
|
1
|
|
|
|
|
2
|
|
|
7
|
1
|
|
|
1
|
|
5
|
use strict; |
|
|
1
|
|
|
|
|
1
|
|
|
|
1
|
|
|
|
|
20
|
|
|
8
|
1
|
|
|
1
|
|
4
|
use warnings; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
23
|
|
|
9
|
|
|
|
|
|
|
|
|
10
|
1
|
|
|
1
|
|
4
|
use Exporter; |
|
|
1
|
|
|
|
|
1
|
|
|
|
1
|
|
|
|
|
340
|
|
|
11
|
|
|
|
|
|
|
our @ISA = qw(Exporter); |
|
12
|
|
|
|
|
|
|
our @EXPORT_OK = qw(crypt_type looks_like_crypt crypt); |
|
13
|
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
my $b64d = qr![A-Za-z0-9./]!; |
|
15
|
|
|
|
|
|
|
my $hexd = qr![0-9a-f]!; |
|
16
|
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
our %CRYPT_TYPES = ( |
|
18
|
|
|
|
|
|
|
'MD5-CRYPT' => { |
|
19
|
|
|
|
|
|
|
summary => 'A baroque passphrase scheme based on MD5, designed by Poul-Henning Kamp and originally implemented in FreeBSD', |
|
20
|
|
|
|
|
|
|
re => qr/\A |
|
21
|
|
|
|
|
|
|
(?P |
|
22
|
|
|
|
|
|
|
(?P$b64d {0,8}) \$ |
|
23
|
|
|
|
|
|
|
(?P$b64d {22}) \z/x, |
|
24
|
|
|
|
|
|
|
re_summary => '$1$ or $apr1$ header', |
|
25
|
|
|
|
|
|
|
link => 'http://static.usenix.org/event/usenix99/provos/provos_html/node10.html', |
|
26
|
|
|
|
|
|
|
}, |
|
27
|
|
|
|
|
|
|
CRYPT => { |
|
28
|
|
|
|
|
|
|
summary => 'Traditional DES crypt', |
|
29
|
|
|
|
|
|
|
re => qr/\A |
|
30
|
|
|
|
|
|
|
(?P$b64d {2} | \$\$) # $$ is not accepted as salt, but we see crypts using those in the wild |
|
31
|
|
|
|
|
|
|
(?P$b64d {11}) \z/x, |
|
32
|
|
|
|
|
|
|
re_summary => '11 digit base64 characters', |
|
33
|
|
|
|
|
|
|
link => 'http://perldoc.perl.org/functions/crypt.html', |
|
34
|
|
|
|
|
|
|
}, |
|
35
|
|
|
|
|
|
|
'EXT-DES' => { |
|
36
|
|
|
|
|
|
|
summary => 'Extended DES crypt', |
|
37
|
|
|
|
|
|
|
re => qr/\A |
|
38
|
|
|
|
|
|
|
(?P_ $b64d {8} ) |
|
39
|
|
|
|
|
|
|
(?P$b64d {11}) \z/x, |
|
40
|
|
|
|
|
|
|
re_summary => 'underscore followed by 19 digit base64 characters', |
|
41
|
|
|
|
|
|
|
link => 'https://en.wikipedia.org/wiki/Crypt_%28C%29#BSDi_extended_DES-based_scheme', |
|
42
|
|
|
|
|
|
|
}, |
|
43
|
|
|
|
|
|
|
SSHA256 => { |
|
44
|
|
|
|
|
|
|
summary => 'Salted SHA256, supported by glibc 2.7+', |
|
45
|
|
|
|
|
|
|
re => qr/\A |
|
46
|
|
|
|
|
|
|
(?P |
|
47
|
|
|
|
|
|
|
(?P (?:rounds=[1-9][0-9]{3,8}\$)? $b64d {0,16}) \$ |
|
48
|
|
|
|
|
|
|
(?P$b64d {43}) \z/x, |
|
49
|
|
|
|
|
|
|
re_summary => '$5$ header', |
|
50
|
|
|
|
|
|
|
link => 'http://en.wikipedia.org/wiki/SHA-2', |
|
51
|
|
|
|
|
|
|
}, |
|
52
|
|
|
|
|
|
|
SSHA512 => { |
|
53
|
|
|
|
|
|
|
summary => 'Salted SHA512, supported by glibc 2.7+', |
|
54
|
|
|
|
|
|
|
re => qr/\A |
|
55
|
|
|
|
|
|
|
(?P |
|
56
|
|
|
|
|
|
|
(?P (?:rounds=[1-9][0-9]{3,8}\$)? $b64d {0,16}) \$ |
|
57
|
|
|
|
|
|
|
(?P$b64d {86}) \z/x, |
|
58
|
|
|
|
|
|
|
re_summary => '$6$ header', |
|
59
|
|
|
|
|
|
|
link => 'http://en.wikipedia.org/wiki/SHA-2', |
|
60
|
|
|
|
|
|
|
}, |
|
61
|
|
|
|
|
|
|
BCRYPT => { |
|
62
|
|
|
|
|
|
|
summary => 'Passphrase scheme based on Blowfish, designed by Niels Provos and David Mazieres for OpenBSD', |
|
63
|
|
|
|
|
|
|
re => qr/\A |
|
64
|
|
|
|
|
|
|
(?P |
|
65
|
|
|
|
|
|
|
(?P\d+) \$ |
|
66
|
|
|
|
|
|
|
(?P$b64d {22}) |
|
67
|
|
|
|
|
|
|
(?P$b64d {31}) \z/x, |
|
68
|
|
|
|
|
|
|
re_summary => '$2$ or $2a$ header followed by cost, followed by 22 base64-digits salt and 31 digits hash', |
|
69
|
|
|
|
|
|
|
link => 'https://www.usenix.org/legacy/event/usenix99/provos/provos_html/', |
|
70
|
|
|
|
|
|
|
}, |
|
71
|
|
|
|
|
|
|
'PLAIN-MD5' => { |
|
72
|
|
|
|
|
|
|
summary => 'Unsalted MD5 hash, popular with PHP web applications', |
|
73
|
|
|
|
|
|
|
re => qr/\A (?P$hexd {32}) \z/x, |
|
74
|
|
|
|
|
|
|
re_summary => '32 digits of hex characters', |
|
75
|
|
|
|
|
|
|
link => 'http://en.wikipedia.org/wiki/MD5', |
|
76
|
|
|
|
|
|
|
}, |
|
77
|
|
|
|
|
|
|
); |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
sub crypt_type { |
|
80
|
27
|
|
|
27
|
1
|
55
|
my $crypt = shift; |
|
81
|
27
|
|
|
|
|
34
|
my $detail = shift; |
|
82
|
|
|
|
|
|
|
|
|
83
|
27
|
|
|
|
|
86
|
for my $type (keys %CRYPT_TYPES) { |
|
84
|
112
|
100
|
|
|
|
539
|
if ($crypt =~ $CRYPT_TYPES{$type}{re}) { |
|
85
|
24
|
100
|
|
|
|
50
|
if ($detail) { |
|
86
|
1
|
|
|
1
|
|
776
|
my $res = {%+}; |
|
|
1
|
|
|
|
|
441
|
|
|
|
1
|
|
|
|
|
334
|
|
|
|
9
|
|
|
|
|
139
|
|
|
87
|
9
|
|
|
|
|
31
|
$res->{type} = $type; |
|
88
|
9
|
|
|
|
|
68
|
return $res; |
|
89
|
|
|
|
|
|
|
} else { |
|
90
|
15
|
|
|
|
|
93
|
return $type; |
|
91
|
|
|
|
|
|
|
} |
|
92
|
|
|
|
|
|
|
} |
|
93
|
|
|
|
|
|
|
} |
|
94
|
3
|
|
|
|
|
19
|
return undef; |
|
95
|
|
|
|
|
|
|
} |
|
96
|
|
|
|
|
|
|
|
|
97
|
2
|
|
|
2
|
1
|
7
|
sub looks_like_crypt { !!crypt_type($_[0]) } |
|
98
|
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
sub crypt { |
|
100
|
2
|
|
|
2
|
1
|
1214
|
require UUID::Random::Patch::UseMRS; |
|
101
|
2
|
|
|
|
|
5474999
|
require Digest::MD5; |
|
102
|
|
|
|
|
|
|
|
|
103
|
2
|
|
|
|
|
7
|
my $pass = shift; |
|
104
|
2
|
|
|
|
|
3
|
my ($salt, $crypt); |
|
105
|
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
# first use SSHA512 |
|
107
|
2
|
|
|
|
|
8
|
$salt = substr(Digest::MD5::md5_base64(UUID::Random::generate()), 0, 16); |
|
108
|
2
|
|
|
|
|
42261
|
$salt =~ tr/\+/./; |
|
109
|
2
|
|
|
|
|
12908
|
$crypt = CORE::crypt($pass, '$6$'.$salt.'$'); |
|
110
|
|
|
|
|
|
|
#say "D:salt=$salt, crypt=$crypt"; |
|
111
|
2
|
50
|
50
|
|
|
9
|
return $crypt if (crypt_type($crypt)//"") eq 'SSHA512'; |
|
112
|
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
# fallback to MD5-CRYPT if failed |
|
114
|
0
|
|
|
|
|
|
$salt = substr($salt, 0, 8); |
|
115
|
0
|
|
|
|
|
|
$crypt = CORE::crypt($pass, '$1$'.$salt.'$'); |
|
116
|
0
|
0
|
0
|
|
|
|
return $crypt if (crypt_type($crypt)//"") eq 'MD5-CRYPT'; |
|
117
|
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
# fallback to CRYPT if failed |
|
119
|
0
|
|
|
|
|
|
$salt = substr($salt, 0, 2); |
|
120
|
0
|
|
|
|
|
|
CORE::crypt($pass, $salt); |
|
121
|
|
|
|
|
|
|
} |
|
122
|
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
1; |
|
124
|
|
|
|
|
|
|
# ABSTRACT: Crypt password utilities |
|
125
|
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
__END__ |