121 lines
4.2 KiB
PHP
121 lines
4.2 KiB
PHP
|
<?php
|
||
|
|
||
|
/*
|
||
|
* This file is part of the Symfony package.
|
||
|
*
|
||
|
* (c) Fabien Potencier <fabien@symfony.com>
|
||
|
*
|
||
|
* For the full copyright and license information, please view the LICENSE
|
||
|
* file that was distributed with this source code.
|
||
|
*/
|
||
|
|
||
|
namespace Symfony\Component\PasswordHasher\Hasher;
|
||
|
|
||
|
use Symfony\Component\PasswordHasher\Exception\InvalidPasswordException;
|
||
|
use Symfony\Component\PasswordHasher\PasswordHasherInterface;
|
||
|
|
||
|
/**
|
||
|
* Hashes passwords using password_hash().
|
||
|
*
|
||
|
* @author Elnur Abdurrakhimov <elnur@elnur.pro>
|
||
|
* @author Terje Bråten <terje@braten.be>
|
||
|
* @author Nicolas Grekas <p@tchwork.com>
|
||
|
*/
|
||
|
final class NativePasswordHasher implements PasswordHasherInterface
|
||
|
{
|
||
|
use CheckPasswordLengthTrait;
|
||
|
|
||
|
private $algorithm = \PASSWORD_BCRYPT;
|
||
|
private $options;
|
||
|
|
||
|
/**
|
||
|
* @param string|null $algorithm An algorithm supported by password_hash() or null to use the best available algorithm
|
||
|
*/
|
||
|
public function __construct(int $opsLimit = null, int $memLimit = null, int $cost = null, string $algorithm = null)
|
||
|
{
|
||
|
$cost = $cost ?? 13;
|
||
|
$opsLimit = $opsLimit ?? max(4, \defined('SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE') ? \SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE : 4);
|
||
|
$memLimit = $memLimit ?? max(64 * 1024 * 1024, \defined('SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE') ? \SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE : 64 * 1024 * 1024);
|
||
|
|
||
|
if (3 > $opsLimit) {
|
||
|
throw new \InvalidArgumentException('$opsLimit must be 3 or greater.');
|
||
|
}
|
||
|
|
||
|
if (10 * 1024 > $memLimit) {
|
||
|
throw new \InvalidArgumentException('$memLimit must be 10k or greater.');
|
||
|
}
|
||
|
|
||
|
if ($cost < 4 || 31 < $cost) {
|
||
|
throw new \InvalidArgumentException('$cost must be in the range of 4-31.');
|
||
|
}
|
||
|
|
||
|
if (null !== $algorithm) {
|
||
|
$algorithms = [1 => \PASSWORD_BCRYPT, '2y' => \PASSWORD_BCRYPT];
|
||
|
|
||
|
if (\defined('PASSWORD_ARGON2I')) {
|
||
|
$algorithms[2] = $algorithms['argon2i'] = \PASSWORD_ARGON2I;
|
||
|
}
|
||
|
|
||
|
if (\defined('PASSWORD_ARGON2ID')) {
|
||
|
$algorithms[3] = $algorithms['argon2id'] = \PASSWORD_ARGON2ID;
|
||
|
}
|
||
|
|
||
|
$this->algorithm = $algorithms[$algorithm] ?? $algorithm;
|
||
|
}
|
||
|
|
||
|
$this->options = [
|
||
|
'cost' => $cost,
|
||
|
'time_cost' => $opsLimit,
|
||
|
'memory_cost' => $memLimit >> 10,
|
||
|
'threads' => 1,
|
||
|
];
|
||
|
}
|
||
|
|
||
|
public function hash(string $plainPassword): string
|
||
|
{
|
||
|
if ($this->isPasswordTooLong($plainPassword)) {
|
||
|
throw new InvalidPasswordException();
|
||
|
}
|
||
|
|
||
|
if (\PASSWORD_BCRYPT === $this->algorithm && (72 < \strlen($plainPassword) || false !== strpos($plainPassword, "\0"))) {
|
||
|
$plainPassword = base64_encode(hash('sha512', $plainPassword, true));
|
||
|
}
|
||
|
|
||
|
return password_hash($plainPassword, $this->algorithm, $this->options);
|
||
|
}
|
||
|
|
||
|
public function verify(string $hashedPassword, string $plainPassword): bool
|
||
|
{
|
||
|
if ('' === $plainPassword || $this->isPasswordTooLong($plainPassword)) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
if (0 !== strpos($hashedPassword, '$argon')) {
|
||
|
// Bcrypt cuts on NUL chars and after 72 bytes
|
||
|
if (0 === strpos($hashedPassword, '$2') && (72 < \strlen($plainPassword) || false !== strpos($plainPassword, "\0"))) {
|
||
|
$plainPassword = base64_encode(hash('sha512', $plainPassword, true));
|
||
|
}
|
||
|
|
||
|
return password_verify($plainPassword, $hashedPassword);
|
||
|
}
|
||
|
|
||
|
if (\extension_loaded('sodium') && version_compare(\SODIUM_LIBRARY_VERSION, '1.0.14', '>=')) {
|
||
|
return sodium_crypto_pwhash_str_verify($hashedPassword, $plainPassword);
|
||
|
}
|
||
|
|
||
|
if (\extension_loaded('libsodium') && version_compare(phpversion('libsodium'), '1.0.14', '>=')) {
|
||
|
return \Sodium\crypto_pwhash_str_verify($hashedPassword, $plainPassword);
|
||
|
}
|
||
|
|
||
|
return password_verify($plainPassword, $hashedPassword);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* {@inheritdoc}
|
||
|
*/
|
||
|
public function needsRehash(string $hashedPassword): bool
|
||
|
{
|
||
|
return password_needs_rehash($hashedPassword, $this->algorithm, $this->options);
|
||
|
}
|
||
|
}
|