94 lines
3.0 KiB
PHP
94 lines
3.0 KiB
PHP
|
<?php
|
||
|
|
||
|
/*
|
||
|
* This file is part of the Symfony package.
|
||
|
*
|
||
|
* (c) Fabien Potencier <fabien@symfony.com>
|
||
|
*
|
||
|
* For the full copyright and license information, please view the LICENSE
|
||
|
* file that was distributed with this source code.
|
||
|
*/
|
||
|
|
||
|
namespace Symfony\Component\PasswordHasher\Hasher;
|
||
|
|
||
|
use Symfony\Component\PasswordHasher\Exception\InvalidPasswordException;
|
||
|
use Symfony\Component\PasswordHasher\Exception\LogicException;
|
||
|
use Symfony\Component\PasswordHasher\LegacyPasswordHasherInterface;
|
||
|
|
||
|
/**
|
||
|
* MessageDigestPasswordHasher uses a message digest algorithm.
|
||
|
*
|
||
|
* @author Fabien Potencier <fabien@symfony.com>
|
||
|
*/
|
||
|
class MessageDigestPasswordHasher implements LegacyPasswordHasherInterface
|
||
|
{
|
||
|
use CheckPasswordLengthTrait;
|
||
|
|
||
|
private int $hashLength = -1;
|
||
|
|
||
|
/**
|
||
|
* @param string $algorithm The digest algorithm to use
|
||
|
* @param bool $encodeHashAsBase64 Whether to base64 encode the password hash
|
||
|
* @param int $iterations The number of iterations to use to stretch the password hash
|
||
|
*/
|
||
|
public function __construct(
|
||
|
private string $algorithm = 'sha512',
|
||
|
private bool $encodeHashAsBase64 = true,
|
||
|
private int $iterations = 5000,
|
||
|
) {
|
||
|
try {
|
||
|
$this->hashLength = \strlen($this->hash('', 'salt'));
|
||
|
} catch (\LogicException) {
|
||
|
// ignore algorithm not supported
|
||
|
}
|
||
|
}
|
||
|
|
||
|
public function hash(#[\SensitiveParameter] string $plainPassword, ?string $salt = null): string
|
||
|
{
|
||
|
if ($this->isPasswordTooLong($plainPassword)) {
|
||
|
throw new InvalidPasswordException();
|
||
|
}
|
||
|
|
||
|
if (!\in_array($this->algorithm, hash_algos(), true)) {
|
||
|
throw new LogicException(sprintf('The algorithm "%s" is not supported.', $this->algorithm));
|
||
|
}
|
||
|
|
||
|
$salted = $this->mergePasswordAndSalt($plainPassword, $salt);
|
||
|
$digest = hash($this->algorithm, $salted, true);
|
||
|
|
||
|
// "stretch" hash
|
||
|
for ($i = 1; $i < $this->iterations; ++$i) {
|
||
|
$digest = hash($this->algorithm, $digest.$salted, true);
|
||
|
}
|
||
|
|
||
|
return $this->encodeHashAsBase64 ? base64_encode($digest) : bin2hex($digest);
|
||
|
}
|
||
|
|
||
|
public function verify(string $hashedPassword, #[\SensitiveParameter] string $plainPassword, ?string $salt = null): bool
|
||
|
{
|
||
|
if (\strlen($hashedPassword) !== $this->hashLength || str_contains($hashedPassword, '$')) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return !$this->isPasswordTooLong($plainPassword) && hash_equals($hashedPassword, $this->hash($plainPassword, $salt));
|
||
|
}
|
||
|
|
||
|
public function needsRehash(string $hashedPassword): bool
|
||
|
{
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
private function mergePasswordAndSalt(#[\SensitiveParameter] string $password, ?string $salt): string
|
||
|
{
|
||
|
if (!$salt) {
|
||
|
return $password;
|
||
|
}
|
||
|
|
||
|
if (false !== strrpos($salt, '{') || false !== strrpos($salt, '}')) {
|
||
|
throw new \InvalidArgumentException('Cannot use { or } in salt.');
|
||
|
}
|
||
|
|
||
|
return $password.'{'.$salt.'}';
|
||
|
}
|
||
|
}
|