4 require_once
'Services/Password/classes/class.ilBasePasswordEncoder.php';
51 foreach($config as $key => $value)
53 switch(strtolower($key))
59 case 'ignore_security_flaw':
82 return PHP_VERSION_ID >= 50307;
151 if($costs < 4 || $costs > 31)
153 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
156 $this->costs = sprintf(
'%1$02d',
$costs);
168 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
174 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
178 return $this->
encode($raw, $salt);
188 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
218 protected function encode($raw, $user_secret)
221 $hashed_password = hash_hmac(
'whirlpool', str_pad($raw, strlen($raw) * 4, sha1($user_secret), STR_PAD_BOTH), $client_secret,
true);
222 $salt = substr(str_shuffle(str_repeat(
'./0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ', 22)), 0, 22);
238 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
240 'The bcrypt implementation used by PHP can contain a security flaw ' .
241 'using passwords with 8-bit characters. ' .
242 'We suggest to upgrade to PHP 5.3.7+ or use passwords with only 7-bit characters.' 247 $salted_password = crypt($hashed_password, $prefix . $this->
getCosts() .
'$' . $salt);
248 if(strlen($salted_password) <= 13)
250 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
254 return $salted_password;
264 protected function check($encoded, $raw, $salt)
266 $hashed_password = hash_hmac(
'whirlpool', str_pad($raw, strlen($raw) * 4, sha1($salt), STR_PAD_BOTH), $this->
getClientSalt(),
true);
267 return crypt($hashed_password, substr($encoded, 0, 30)) == $encoded;
286 if(strlen(trim($contents)))
303 require_once
'Services/Password/classes/class.ilPasswordUtils.php';
317 require_once
'Services/Password/exceptions/class.ilPasswordException.php';
const SALT_STORAGE_FILENAME
setBackwardCompatibility($backward_compatibility)
Set the backward compatibility $2a$ instead of $2y$ for PHP 5.3.7+.
encodePassword($raw, $salt)
{Encodes the raw password.The password to encode The salt string The encoded password} ...
requiresSalt()
{Returns whether or not the encoder requires a salt.boolean}
$is_security_flaw_ignored
isBackwardCompatibilityEnabled()
Class for user password exception handling in ILIAS.
static getBytes($length)
Generate random bytes using OpenSSL or Mcrypt and mt_rand() as fallback.
setIsSecurityFlawIgnored($is_security_flaw_ignored)
__construct(array $config=array())
static getDataDir()
get data directory (outside webspace)
getName()
{Returns a unique name/id of the concrete password encoder.string}
setClientSalt($client_salt)
encode($raw, $user_secret)
Generates a bcrypt encoded string.
isPasswordValid($encoded, $raw, $salt)
{Checks a raw password against an encoded password.The raw password has to be injected into the encod...
check($encoded, $raw, $salt)
Verifies a bcrypt encoded string.
isPasswordTooLong($password)
Checks if the password is too long.