X-Git-Url: https://mudpy.org/gitweb?a=blobdiff_plain;f=lib%2Fmudpy%2Fpassword.py;h=f6c1abc5562cf4a13b82660346361933e816b139;hb=83f8bcba73b08734089d91e75c49f6939d47d906;hp=56bdbfe7f8d583663ce97447cc6d6e8aa11dee6c;hpb=0c80ffc6c6b1df42655f9bcec9fb3b8666b2e6ca;p=mudpy.git diff --git a/lib/mudpy/password.py b/lib/mudpy/password.py index 56bdbfe..f6c1abc 100644 --- a/lib/mudpy/password.py +++ b/lib/mudpy/password.py @@ -1,10 +1,17 @@ # -*- coding: utf-8 -*- """Password hashing functions and constants for the mudpy engine.""" -# Copyright (c) 2004-2012 Jeremy Stanley . Permission +# Copyright (c) 2004-2014 Jeremy Stanley . Permission # to use, copy, modify, and distribute this software is granted under # terms provided in the LICENSE file distributed with this software. +import base64 +import hashlib +import math +import random +import re +import struct + # convenience constants for indexing the supported hashing algorithms, # guaranteed a stable part of the interface MD5 = 0 # hashlib.md5 @@ -20,13 +27,10 @@ def _pack_bytes(numbers): This is a wrapper around struct.pack, used to turn a list of integers between 0 and 255 into a packed sequence akin to a C-style string. """ - import struct - # this will need to be declared as b"" during 2to3 migration - packed = "" + packed = b"" for number in numbers: number = int(number) assert 0 <= number <= 255 - # need to use b"B" during 2to3 migration packed += struct.pack("B", number) return packed @@ -36,11 +40,10 @@ def _bytes_to_text(byte_sequence): This is a wrapper around base64.b64encode with preferences appropriate for encoding Unix-style passwd hash strings. """ - import base64 return base64.b64encode( byte_sequence, - "./".encode("ascii") - ).rstrip("=") + b"./" + ).decode("ascii").rstrip("=") def _generate_salt(salt_len=2): @@ -52,8 +55,6 @@ def _generate_salt(salt_len=2): need and discard any excess characters over the specified length. This ensures full distribution over each character of the salt. """ - import math - import random salt = [] for i in range(int(math.ceil(salt_len * 0.75))): salt.append(random.randint(0, 255)) @@ -68,14 +69,12 @@ def upgrade_legacy_hash(legacy_hash, salt, sep="$"): facets to this function, a conforming new-style password hash will be returned. """ - import re assert re.match("^[0-9a-f]{32}$", legacy_hash), "Not a valid MD5 hexdigest" - # this needs to be declared as b"" in 2to3 - collapsed = "" + collapsed = b"" for i in range(16): # this needs to become a byte() call in 2to3 - collapsed += chr(int(legacy_hash[2 * i:2 * i + 2], 16)) + collapsed += bytes(legacy_hash[2 * i:2 * i + 2].decode("ascii")) return "%s%s%s%s%s%s%s%s" % ( sep, MD5, @@ -129,7 +128,6 @@ def create( create(password, algorithm=SHA256, rounds=12, salt_len=16) """ - import hashlib # if a specific salt wasn't specified, we need to generate one if not salt: @@ -164,11 +162,13 @@ def create( # iterate the hashing algorithm over its own digest the specified # number of times for i in range(2 ** rounds): - hashed = algorithms[algorithm](hashed).digest() + hashed = algorithms[algorithm](hashed.encode("utf-8")).digest() + hashed = "".join(format(x, "02x") for x in bytes(hashed)) # concatenate the output fields, coercing into text form as needed return "%s%s%s%s%s%s%s%s" % ( - sep, algorithm, sep, rounds, sep, salt, sep, _bytes_to_text(hashed) + sep, algorithm, sep, rounds, sep, salt, sep, + _bytes_to_text(hashed.encode("ascii")) ) @@ -180,7 +180,6 @@ def verify(password, encoded_hash): comes out the same as the encoded_hash. """ sep = encoded_hash[0] - import mudpy.misc algorithm, rounds, salt, hashed = encoded_hash.split(sep)[1:] if encoded_hash == create( password=password,