| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Crypt::Passphrase::Argon2::Encrypted; |
|
2
|
|
|
|
|
|
|
$Crypt::Passphrase::Argon2::Encrypted::VERSION = '0.009'; |
|
3
|
1
|
|
|
1
|
|
70966
|
use strict; |
|
|
1
|
|
|
|
|
11
|
|
|
|
1
|
|
|
|
|
27
|
|
|
4
|
1
|
|
|
1
|
|
17
|
use warnings; |
|
|
1
|
|
|
|
|
3
|
|
|
|
1
|
|
|
|
|
41
|
|
|
5
|
|
|
|
|
|
|
|
|
6
|
1
|
|
|
1
|
|
466
|
use Crypt::Passphrase 0.010 -encoder; |
|
|
1
|
|
|
|
|
15124
|
|
|
|
1
|
|
|
|
|
7
|
|
|
7
|
1
|
|
|
1
|
|
7838
|
use Crypt::Passphrase::Argon2; |
|
|
1
|
|
|
|
|
4
|
|
|
|
1
|
|
|
|
|
33
|
|
|
8
|
|
|
|
|
|
|
|
|
9
|
1
|
|
|
1
|
|
7
|
use Carp 'croak'; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
52
|
|
|
10
|
1
|
|
|
1
|
|
5
|
use Crypt::Argon2 0.017 qw/argon2_raw argon2_verify argon2_types/; |
|
|
1
|
|
|
|
|
18
|
|
|
|
1
|
|
|
|
|
49
|
|
|
11
|
1
|
|
|
1
|
|
439
|
use MIME::Base64 qw/encode_base64 decode_base64/; |
|
|
1
|
|
|
|
|
658
|
|
|
|
1
|
|
|
|
|
1092
|
|
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
my %multiplier = ( |
|
14
|
|
|
|
|
|
|
k => 1024, |
|
15
|
|
|
|
|
|
|
M => 1024 * 1024, |
|
16
|
|
|
|
|
|
|
G => 1024 * 1024 * 1024, |
|
17
|
|
|
|
|
|
|
); |
|
18
|
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
sub new { |
|
20
|
2
|
|
|
2
|
1
|
123
|
my ($class, %args) = @_; |
|
21
|
2
|
|
|
|
|
14
|
my $self = bless Crypt::Passphrase::Argon2::_settings_for(%args), $class; |
|
22
|
2
|
|
|
|
|
35
|
$self->{memory_cost} =~ s/ \A (\d+) ([kMG]) \z / $1 * $multiplier{$2} /xe; |
|
|
2
|
|
|
|
|
18
|
|
|
23
|
2
|
|
|
|
|
7
|
$self->{cipher} = $args{cipher}; |
|
24
|
2
|
|
|
|
|
6
|
$self->{active} = $args{active}; |
|
25
|
2
|
|
|
|
|
10
|
return $self; |
|
26
|
|
|
|
|
|
|
} |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
my $format = '$%s-encrypted-%s$v=19$m=%d,t=%d,p=%d,keyid=%s$%s$%s'; |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
sub _pack_hash { |
|
31
|
7
|
|
|
7
|
|
37
|
my ($subtype, $cipher, $id, $m_cost, $t_cost, $parallel, $salt, $hash) = @_; |
|
32
|
7
|
|
|
|
|
47
|
my $encoded_salt = encode_base64($salt, '') =~ tr/=//dr; |
|
33
|
7
|
|
|
|
|
31
|
my $encoded_hash = encode_base64($hash, '') =~ tr/=//dr; |
|
34
|
7
|
|
|
|
|
117
|
return sprintf $format, $subtype, $cipher, $m_cost / 1024, $t_cost, $parallel, $id, $encoded_salt, $encoded_hash; |
|
35
|
|
|
|
|
|
|
} |
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
my $regex = qr/ ^ \$ ($Crypt::Argon2::type_regex)-encrypted-([^\$]+) \$ v=19 \$ m=(\d+), t=(\d+), p=(\d+), keyid=([^\$,]+) \$ ([^\$]+) \$ (.*) $ /x; |
|
38
|
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
sub _unpack_hash { |
|
40
|
14
|
|
|
14
|
|
35
|
my ($pwhash) = @_; |
|
41
|
14
|
100
|
|
|
|
365
|
my ($subtype, $alg, $m_cost, $t_cost, $parallel, $id, $encoded_salt, $encoded_hash) = $pwhash =~ $regex or return; |
|
42
|
11
|
|
|
|
|
51
|
my $salt = decode_base64($encoded_salt); |
|
43
|
11
|
|
|
|
|
39
|
my $hash = decode_base64($encoded_hash); |
|
44
|
11
|
|
|
|
|
106
|
return ($subtype, $alg, $id, $m_cost * 1024, $t_cost, $parallel, $salt, $hash); |
|
45
|
|
|
|
|
|
|
} |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
my $unencrypted_regex = qr/ ^ \$ ($Crypt::Argon2::type_regex) \$ v=19 \$ m=(\d+), t=(\d+), p=(\d+) \$ ([^\$]+) \$ (.*) $ /x; |
|
48
|
|
|
|
|
|
|
sub recode_hash { |
|
49
|
2
|
|
|
2
|
1
|
9
|
my ($self, $input, $to) = @_; |
|
50
|
2
|
|
33
|
|
|
18
|
$to //= $self->{active}; |
|
51
|
2
|
100
|
|
|
|
6
|
if (my ($subtype, $alg, $id, $m_cost, $t_cost, $parallel, $salt, $hash) = _unpack_hash($input)) { |
|
|
|
50
|
|
|
|
|
|
|
52
|
1
|
50
|
33
|
|
|
7
|
return $input if $id eq $to and $alg eq $self->{cipher}; |
|
53
|
1
|
|
|
|
|
6
|
my $decrypted = $self->decrypt_hash($alg, $id, $salt, $hash); |
|
54
|
1
|
|
|
|
|
63
|
my $encrypted = $self->encrypt_hash($self->{cipher}, $to, $salt, $decrypted); |
|
55
|
1
|
|
|
|
|
87
|
return _pack_hash($subtype, $self->{cipher}, $to, $m_cost, $t_cost, $parallel, $salt, $encrypted); |
|
56
|
|
|
|
|
|
|
} |
|
57
|
|
|
|
|
|
|
elsif (($subtype, $m_cost, $t_cost, $parallel, my $encoded_salt, my $encoded_hash) = $input =~ $unencrypted_regex) { |
|
58
|
1
|
|
|
|
|
7
|
my $salt = decode_base64($encoded_salt); |
|
59
|
1
|
|
|
|
|
4
|
my $hash = decode_base64($encoded_hash); |
|
60
|
1
|
|
|
|
|
7
|
my $encrypted = $self->encrypt_hash($self->{cipher}, $to, $salt, $hash); |
|
61
|
1
|
|
|
|
|
70
|
return _pack_hash($subtype, $self->{cipher}, $to, $m_cost * 1024, $t_cost, $parallel, $salt, $encrypted); |
|
62
|
|
|
|
|
|
|
} |
|
63
|
|
|
|
|
|
|
else { |
|
64
|
0
|
|
|
|
|
0
|
return $input; |
|
65
|
|
|
|
|
|
|
} |
|
66
|
|
|
|
|
|
|
} |
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
sub hash_password { |
|
69
|
1
|
|
|
1
|
1
|
12
|
my ($self, $password) = @_; |
|
70
|
|
|
|
|
|
|
|
|
71
|
1
|
|
|
|
|
9
|
my $salt = $self->random_bytes($self->{salt_size}); |
|
72
|
1
|
|
|
|
|
10431
|
my $raw = argon2_raw($self->{subtype}, $password, $salt, @{$self}{qw/time_cost memory_cost parallelism output_size/}); |
|
|
1
|
|
|
|
|
261911
|
|
|
73
|
1
|
|
|
|
|
29
|
my $encrypted = $self->encrypt_hash($self->{cipher}, $self->{active}, $salt, $raw); |
|
74
|
|
|
|
|
|
|
|
|
75
|
1
|
|
|
|
|
90
|
return _pack_hash(@{$self}{qw/subtype cipher active memory_cost time_cost parallelism/}, $salt, $encrypted); |
|
|
1
|
|
|
|
|
8
|
|
|
76
|
|
|
|
|
|
|
} |
|
77
|
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
sub needs_rehash { |
|
79
|
5
|
|
|
5
|
1
|
2467
|
my ($self, $pwhash) = @_; |
|
80
|
5
|
100
|
|
|
|
26
|
my ($subtype, $alg, $id, $m_cost, $t_cost, $parallel, $salt, $hash) = _unpack_hash($pwhash) or return 1; |
|
81
|
4
|
100
|
|
|
|
19
|
return 1 if $pwhash ne _pack_hash(@{$self}{qw/subtype cipher active memory_cost time_cost parallelism/}, $salt, $hash); |
|
|
4
|
|
|
|
|
22
|
|
|
82
|
3
|
|
33
|
|
|
41
|
return length $salt != $self->{salt_size} || length $hash != $self->{output_size}; |
|
83
|
|
|
|
|
|
|
} |
|
84
|
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
sub crypt_subtypes { |
|
86
|
0
|
|
|
0
|
1
|
0
|
my $self = shift; |
|
87
|
0
|
|
|
|
|
0
|
my @result; |
|
88
|
0
|
|
|
|
|
0
|
my @supported = $self->supported_ciphers; |
|
89
|
0
|
|
|
|
|
0
|
for my $argon2 (argon2_types) { |
|
90
|
0
|
|
|
|
|
0
|
push @result, $argon2, map { "$argon2-encrypted-$_" } @supported |
|
|
0
|
|
|
|
|
0
|
|
|
91
|
|
|
|
|
|
|
} |
|
92
|
0
|
|
|
|
|
0
|
return @result; |
|
93
|
|
|
|
|
|
|
} |
|
94
|
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
sub verify_password { |
|
96
|
7
|
|
|
7
|
1
|
725
|
my ($self, $password, $pwhash) = @_; |
|
97
|
7
|
100
|
|
|
|
43
|
if (my ($subtype, $alg, $id, $m_got, $t_got, $parallel_got, $salt, $hash) = _unpack_hash($pwhash)) { |
|
|
|
50
|
|
|
|
|
|
|
98
|
6
|
50
|
|
|
|
14
|
my $raw = eval { argon2_raw($subtype, $password, $salt, $t_got, $m_got, $parallel_got, length $hash) } or return !!0; |
|
|
6
|
|
|
|
|
1600234
|
|
|
99
|
6
|
50
|
|
|
|
66
|
my $decrypted = eval { $self->decrypt_hash($alg, $id, $salt, $hash) } or return !!0; |
|
|
6
|
|
|
|
|
74
|
|
|
100
|
|
|
|
|
|
|
|
|
101
|
6
|
|
|
|
|
700
|
return $self->secure_compare($decrypted, $raw); |
|
102
|
|
|
|
|
|
|
} |
|
103
|
|
|
|
|
|
|
elsif ($pwhash =~ $unencrypted_regex) { |
|
104
|
1
|
|
|
|
|
266932
|
return argon2_verify($pwhash, $password); |
|
105
|
|
|
|
|
|
|
} |
|
106
|
|
|
|
|
|
|
} |
|
107
|
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
#ABSTRACT: A base-class for encrypting/peppered Argon2 encoders for Crypt::Passphrase |
|
109
|
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
__END__ |