Subversion Repositories oidplus

Compare Revisions

Regard whitespace Rev 1087 → Rev 1088

/trunk/plugins/viathinksoft/auth/A3_bcrypt/OIDplusAuthPluginBCrypt.class.php
26,6 → 26,7
class OIDplusAuthPluginBCrypt extends OIDplusAuthPlugin {
 
public function init($html=true) {
// Note: Example #3 here https://www.php.net/manual/en/function.password-hash.php can help you with finding a good cost value
OIDplus::config()->prepareConfigKey('ra_bcrypt_cost', 'How complex should the BCrypt hash of RA passwords be? (Only for plugin A3_bcrypt; values 4-31, default 10)', 10, OIDplusConfig::PROTECTION_EDITABLE, function($value) {
if (empty($value) || !is_int($value) || ($value<4) || ($value>31)) {
throw new OIDplusException(_L('Invalid value for "cost" (must be 4-31, default 10).'));
33,30 → 34,64
});
}
 
private function supportedCryptAlgo($authKey) {
return str_starts_with($authKey, '$2$') ||
str_starts_with($authKey, '$2a$') ||
str_starts_with($authKey, '$2b$') ||
str_starts_with($authKey, '$2x$') ||
str_starts_with($authKey, '$2y$');
}
 
public function verify(OIDplusRAAuthInfo $authInfo, $check_password) {
$authKey = $authInfo->getAuthKey();
$salt = $authInfo->getSalt();
@list($s_authmethod, $s_authkey) = explode('#', $authKey, 2);
 
if ($s_authmethod == 'A3') {
// A3#$2a$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
// \__/\/ \____________________/\_____________________________/
// Alg Cost Salt (128 bit) Hash
if ($salt != '') {
throw new OIDplusException(_L('This function does not accept a salt'));
if (str_starts_with($authKey, 'A3#')) {
$authKey = substr($authKey, strlen('A3#')); // Backwards compatibility: Remove "A3#" prefix.
}
return password_verify($check_password, $s_authkey);
} else {
// Invalid auth code
 
if (!$this->supportedCryptAlgo($authKey)) {
// Unsupported algorithm
return false;
}
 
// $2a$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
// \/ \/ \____________________/\_____________________________/
// Alg Cost Salt (128 bit) Hash
 
if ($salt != '') {
throw new OIDplusException(_L('This function does not accept an explicit salt'));
}
 
return password_verify($check_password, $authKey);
}
 
public function generate($password): OIDplusRAAuthInfo {
if (strlen($password) > 72) throw new OIDplusException(_L('Password is too long (max %1 bytes)',72));
$s_salt = ''; // BCrypt automatically generates a salt
$cost = OIDplus::config()->getValue('ra_bcrypt_cost', 10);
$calc_authkey = 'A3#'.password_hash($password, PASSWORD_BCRYPT, array("cost" => $cost));
$calc_authkey = password_hash($password, PASSWORD_BCRYPT, array("cost" => $cost));
if (!$calc_authkey) throw new OIDplusException(_L('Error creating password hash'));
assert($this->supportedCryptAlgo($calc_authkey));
return new OIDplusRAAuthInfo($s_salt, $calc_authkey);
}
 
public function available(&$reason): bool {
if (version_compare(PHP_VERSION, '7.4.0') >= 0) {
$ok = in_array('2', password_algos()) ||
in_array('2a', password_algos()) ||
in_array('2b', password_algos()) ||
in_array('2x', password_algos()) ||
in_array('2y', password_algos());
 
} else {
$ok = defined('PASSWORD_BCRYPT');
}
 
if ($ok) return true;
 
$reason = _L('No fitting hash algorithm found');
return false;
}
 
}