extern crate base64;
use self::base64::{decode_config, URL_SAFE_NO_PAD};
use std::str;
use crypto_utils;
#[derive(PartialEq, Debug)]
pub enum HasherError {
UnknownAlgorithm,
EmptyHash,
InvalidIterations,
InvalidArgon2Salt,
}
pub trait Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError>;
fn encode(&self, password: &str, salt: &str, iterations: u32) -> String;
}
pub struct PBKDF2Hasher;
impl Hasher for PBKDF2Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let salt = encoded_part[2];
let hash = encoded_part[3];
let iterations: u32;
match encoded_part[1].parse::<u32>() {
Ok(n) => {
iterations = n;
}
Err(_) => {
return Err(HasherError::InvalidIterations);
}
}
Ok(hash == crypto_utils::hash_pbkdf2_sha256(password, salt, iterations))
}
fn encode(&self, password: &str, salt: &str, iterations: u32) -> String {
let hash = crypto_utils::hash_pbkdf2_sha256(password, salt, iterations);
format!("{}${}${}${}", "pbkdf2_sha256", iterations, salt, hash)
}
}
pub struct PBKDF2SHA1Hasher;
impl Hasher for PBKDF2SHA1Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let salt = encoded_part[2];
let hash = encoded_part[3];
let iterations: u32;
match encoded_part[1].parse::<u32>() {
Ok(n) => {
iterations = n;
}
Err(_) => {
return Err(HasherError::InvalidIterations);
}
}
Ok(hash == crypto_utils::hash_pbkdf2_sha1(password, salt, iterations))
}
fn encode(&self, password: &str, salt: &str, iterations: u32) -> String {
let hash = crypto_utils::hash_pbkdf2_sha1(password, salt, iterations);
format!("{}${}${}${}", "pbkdf2_sha1", iterations, salt, hash)
}
}
pub struct Argon2Hasher;
const OLD_ARGON2_VERSION: u32 = 0x10;
const NEW_ARGON2_VERSION: u32 = 0x13;
impl Hasher for Argon2Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let segment_shift = 6 - encoded_part.len();
let settings = encoded_part[3 - segment_shift];
let salt = encoded_part[4 - segment_shift];
let string_hash = encoded_part[5 - segment_shift].replace("+", "-");
let hash = string_hash.as_str();
let version = match segment_shift {
0 => NEW_ARGON2_VERSION,
_ => OLD_ARGON2_VERSION,
};
let settings_part: Vec<&str> = settings.split(",").collect();
let memory_cost: u32 = settings_part[0].split("=").collect::<Vec<&str>>()[1].parse::<u32>().unwrap();
let time_cost: u32 = settings_part[1].split("=").collect::<Vec<&str>>()[1].parse::<u32>().unwrap();
let parallelism: u32 = settings_part[2].split("=").collect::<Vec<&str>>()[1].parse::<u32>().unwrap();
match decode_config(salt, URL_SAFE_NO_PAD) {
Ok(_) => {},
Err(_) => return Err(HasherError::InvalidArgon2Salt)
};
let hash_length = match decode_config(hash, URL_SAFE_NO_PAD) {
Ok(value) => value.len() as u32,
Err(_) => return Ok(false)
};
Ok(hash == crypto_utils::hash_argon2(password, salt, time_cost, memory_cost, parallelism, version, hash_length))
}
fn encode(&self, password: &str, salt: &str, _: u32) -> String {
let memory_cost: u32 = 512; let time_cost: u32 = 2; let parallelism: u32 = 2; let version: u32 = NEW_ARGON2_VERSION;
let hash_length: u32 = 16;
let hash = crypto_utils::hash_argon2(password, salt, time_cost, memory_cost, parallelism, version, hash_length);
format!("argon2$argon2i$v=19$m={},t={},p={}${}${}", memory_cost, time_cost, parallelism, salt, hash)
}
}
pub struct BCryptSHA256Hasher;
impl Hasher for BCryptSHA256Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let bcrypt_encoded_part: Vec<&str> = encoded.splitn(2, "$").collect();
let hash = bcrypt_encoded_part[1];
let hashed_password = crypto_utils::hash_sha256(password);
match crypto_utils::verify_bcrypt(&hashed_password, hash) {
Ok(valid) => {
return Ok(valid);
}
Err(_) => {
return Ok(false);
}
}
}
fn encode(&self, password: &str, _: &str, iterations: u32) -> String {
let hashed_password = crypto_utils::hash_sha256(password);
let hash = crypto_utils::hash_bcrypt(&hashed_password, iterations).unwrap();
format!("{}${}", "bcrypt_sha256", hash)
}
}
pub struct BCryptHasher;
impl Hasher for BCryptHasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let bcrypt_encoded_part: Vec<&str> = encoded.splitn(2, "$").collect();
let hash = bcrypt_encoded_part[1];
match crypto_utils::verify_bcrypt(password, hash) {
Ok(valid) => {
return Ok(valid);
}
Err(_) => {
return Ok(false);
}
}
}
fn encode(&self, password: &str, _: &str, iterations: u32) -> String {
let hash = crypto_utils::hash_bcrypt(password, iterations).unwrap();
format!("{}${}", "bcrypt", hash)
}
}
pub struct SHA1Hasher;
impl Hasher for SHA1Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let salt = encoded_part[1];
let hash = encoded_part[2];
Ok(hash == crypto_utils::hash_sha1(password, salt))
}
fn encode(&self, password: &str, salt: &str, _: u32) -> String {
let hash = crypto_utils::hash_sha1(password, salt);
format!("{}${}${}", "sha1", salt, hash)
}
}
pub struct MD5Hasher;
impl Hasher for MD5Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let salt = encoded_part[1];
let hash = encoded_part[2];
Ok(hash == crypto_utils::hash_md5(password, salt))
}
fn encode(&self, password: &str, salt: &str, _: u32) -> String {
let hash = crypto_utils::hash_md5(password, salt);
format!("{}${}${}", "md5", salt, hash)
}
}
pub struct UnsaltedSHA1Hasher;
impl Hasher for UnsaltedSHA1Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let hash = encoded_part[2];
Ok(hash == crypto_utils::hash_sha1(password, ""))
}
fn encode(&self, password: &str, _: &str, _: u32) -> String {
let hash = crypto_utils::hash_sha1(password, "");
format!("{}$${}", "sha1", hash)
}
}
pub struct UnsaltedMD5Hasher;
impl Hasher for UnsaltedMD5Hasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
Ok(encoded == crypto_utils::hash_md5(password, ""))
}
fn encode(&self, password: &str, _: &str, _: u32) -> String {
crypto_utils::hash_md5(password, "").to_string()
}
}
pub struct CryptHasher;
impl Hasher for CryptHasher {
fn verify(&self, password: &str, encoded: &str) -> Result<bool, HasherError> {
let encoded_part: Vec<&str> = encoded.split("$").collect();
let hash = encoded_part[2];
Ok(hash == crypto_utils::hash_unix_crypt(password, hash))
}
fn encode(&self, password: &str, salt: &str, _: u32) -> String {
let hash = crypto_utils::hash_unix_crypt(password, salt);
format!("{}$${}", "crypt", hash)
}
}