extern crate rand;
extern crate regex;
#[macro_use] extern crate lazy_static;
use rand::Rng;
mod crypto_utils;
mod hashers;
use regex::Regex;
pub use hashers::*;
#[derive(PartialEq)]
pub enum Algorithm {
PBKDF2,
PBKDF2SHA1,
Argon2,
BCryptSHA256,
BCrypt,
SHA1,
MD5,
UnsaltedSHA1,
UnsaltedMD5,
Crypt,
}
fn identify_hasher(encoded: &str) -> Option<Algorithm> {
if encoded.len() == 32 && !encoded.contains("$") {
Some(Algorithm::UnsaltedMD5)
} else if encoded.len() == 46 && encoded.starts_with("sha1$$") {
Some(Algorithm::UnsaltedSHA1)
} else {
let encoded_part: Vec<&str> = encoded.splitn(2, "$").collect();
match encoded_part[0] {
"pbkdf2_sha256" => Some(Algorithm::PBKDF2),
"pbkdf2_sha1" => Some(Algorithm::PBKDF2SHA1),
"argon2" => Some(Algorithm::Argon2),
"bcrypt_sha256" => Some(Algorithm::BCryptSHA256),
"bcrypt" => Some(Algorithm::BCrypt),
"sha1" => Some(Algorithm::SHA1),
"md5" => Some(Algorithm::MD5),
"crypt" => Some(Algorithm::Crypt),
_ => None,
}
}
}
fn get_hasher(algorithm: &Algorithm) -> Box<Hasher + 'static> {
match algorithm {
&Algorithm::PBKDF2 => Box::new(PBKDF2Hasher),
&Algorithm::PBKDF2SHA1 => Box::new(PBKDF2SHA1Hasher),
&Algorithm::Argon2 => Box::new(Argon2Hasher),
&Algorithm::BCryptSHA256 => Box::new(BCryptSHA256Hasher),
&Algorithm::BCrypt => Box::new(BCryptHasher),
&Algorithm::SHA1 => Box::new(SHA1Hasher),
&Algorithm::MD5 => Box::new(MD5Hasher),
&Algorithm::UnsaltedSHA1 => Box::new(UnsaltedSHA1Hasher),
&Algorithm::UnsaltedMD5 => Box::new(UnsaltedMD5Hasher),
&Algorithm::Crypt => Box::new(CryptHasher),
}
}
pub fn is_password_usable(encoded: &str) -> bool {
match identify_hasher(encoded) {
Some(_) => !(encoded == "" || encoded.starts_with("!")),
None => false,
}
}
pub fn check_password(password: &str, encoded: &str) -> Result<bool, HasherError> {
if encoded == "" {
return Err(HasherError::EmptyHash);
}
match identify_hasher(encoded) {
Some(algorithm) => {
let hasher = get_hasher(&algorithm);
hasher.verify(password, encoded)
}
None => Err(HasherError::UnknownAlgorithm),
}
}
pub fn check_password_tolerant(password: &str, encoded: &str) -> bool {
match check_password(password, encoded) {
Ok(valid) => valid,
Err(_) => false,
}
}
#[derive(Clone)]
pub enum Version {
Current,
V14,
V15,
V16,
V17,
V18,
V19,
V110,
V111,
}
fn iterations(version: &Version, algorithm: &Algorithm) -> u32 {
match algorithm {
&Algorithm::BCryptSHA256 | &Algorithm::BCrypt => 12,
&Algorithm::PBKDF2 | &Algorithm::PBKDF2SHA1 => match version {
&Version::V14 | &Version::V15 => 10000,
&Version::V16 | &Version::V17 => 12000,
&Version::V18 => 20000,
&Version::V19 => 24000,
&Version::V110 => 30000,
&Version::V111 | &Version::Current => 36000,
},
&Algorithm::Argon2 => 1, _ => 1,
}
}
fn random_salt() -> String {
rand::thread_rng().gen_ascii_chars().take(12).collect::<String>()
}
lazy_static! {
pub static ref VALID_SALT_RE: Regex = Regex::new(r"^[A-Za-z0-9]*$").unwrap();
}
pub fn make_password_core(password: &str, salt: &str, algorithm: Algorithm, version: Version) -> String {
assert!(VALID_SALT_RE.is_match(salt), "Salt can only contain letters and numbers.");
let hasher = get_hasher(&algorithm);
hasher.encode(password, salt, iterations(&version, &algorithm))
}
pub fn make_password_with_settings(password: &str, salt: &str, algorithm: Algorithm) -> String {
make_password_core(password, salt, algorithm, Version::Current)
}
pub fn make_password_with_algorithm(password: &str, algorithm: Algorithm) -> String {
make_password_core(password, &random_salt(), algorithm, Version::Current)
}
pub fn make_password(password: &str) -> String {
make_password_core(password, &random_salt(), Algorithm::PBKDF2, Version::Current)
}
pub struct Django {
pub version: Version
}
impl Django {
pub fn make_password_with_settings(&self, password: &str, salt: &str, algorithm: Algorithm) -> String {
make_password_core(password, salt, algorithm, self.version.clone())
}
pub fn make_password_with_algorithm(&self, password: &str, algorithm: Algorithm) -> String {
make_password_core(password, &random_salt(), algorithm, self.version.clone())
}
pub fn make_password(&self, password: &str) -> String {
make_password_core(password, &random_salt(), Algorithm::PBKDF2, self.version.clone())
}
}
#[test]
fn test_identify_hasher() {
assert!(identify_hasher("pbkdf2_sha256$24000$KQ8zeK6wKRuR$cmhbSt1XVKuO4FGd9+AX8qSBD4Z0395nZatXTJpEtTY=")
.unwrap() == Algorithm::PBKDF2);
assert!(identify_hasher("pbkdf2_sha1$24000$KQ8zeK6wKRuR$tSJh4xdxfMJotlxfkCGjTFpGYZU=")
.unwrap() == Algorithm::PBKDF2SHA1);
assert!(identify_hasher("sha1$KQ8zeK6wKRuR$f83371bca01fa6089456e673ccfb17f42d810b00")
.unwrap() == Algorithm::SHA1);
assert!(identify_hasher("md5$KQ8zeK6wKRuR$0137e4d74cb2d9ed9cb1a5f391f6175e")
.unwrap() == Algorithm::MD5);
assert!(identify_hasher("7cf6409a82cd4c8b96a9ecf6ad679119")
.unwrap() == Algorithm::UnsaltedMD5);
assert!(identify_hasher("md5$$7cf6409a82cd4c8b96a9ecf6ad679119")
.unwrap() == Algorithm::MD5);
assert!(identify_hasher("sha1$$22e6217f026c7a395f0840c1ffbdb163072419e7")
.unwrap() == Algorithm::UnsaltedSHA1);
assert!(identify_hasher("bcrypt_sha256$$2b$12$LZSJchsWG/DrBy1erNs4eeYo6tZNlLFQmONdxN9HPesa1EyXVcTXK")
.unwrap() == Algorithm::BCryptSHA256);
assert!(identify_hasher("bcrypt$$2b$12$LZSJchsWG/DrBy1erNs4ee31eJ7DaWiuwhDOC7aqIyqGGggfu6Y/.")
.unwrap() == Algorithm::BCrypt);
assert!(identify_hasher("crypt$$ab1Hv2Lg7ltQo")
.unwrap() == Algorithm::Crypt);
assert!(identify_hasher("argon2$argon2i$v=19$m=512,t=2,p=2$MktOZjRsaTBNWnVp$/s1VqdEUfHOPKJyIokwa2A")
.unwrap() == Algorithm::Argon2);
assert!(identify_hasher("").is_none());
assert!(identify_hasher("password").is_none());
assert!(identify_hasher("7cf6409a82cd4c8b96a9ecf6ad6791190").is_none());
assert!(identify_hasher("blah$KQ8zeK6wKRuR$f83371bca01fa6089456e673ccfb17f42d810b00").is_none());
}
#[test]
#[should_panic]
fn test_invalid_salt_should_panic() {
let _ = make_password_core("pass", "$alt", Algorithm::PBKDF2, Version::Current);
}