Source code for keystone.common.password_hashers.pbkdf2

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
#      http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.

import binascii
import os

from cryptography.exceptions import InvalidKey
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC

from keystone.common import password_hashers
from keystone import exception


[docs] class Sha512(password_hashers.PasswordHasher): """passlib transition class for PBKDF2 Sha512 password hashing""" name: str = "pbkdf2_sha512" ident: str = "$pbkdf2-sha512$" hash_algo = hashes.SHA512()
[docs] @staticmethod def hash(password: bytes, salt_size: int = 16, rounds: int = 25000) -> str: """Generate password hash string with ident and params https://cryptography.io/en/stable/hazmat/primitives/key-derivation-functions/#pbkdf2 :param bytes password: Password to be hashed. :param bytes salt: Salt. :param int iterations: Iterations count :returns: String in format `$pbkdf2-sha512$ln=logN,r=R,p=P$salt$checksum` """ salt: bytes = os.urandom(salt_size) # Prepave the kdf function with params kdf = PBKDF2HMAC( algorithm=Sha512.hash_algo, length=64, salt=salt, iterations=rounds ) # derive - create a digest key: bytes = kdf.derive(password) # make a `str` digest compatible with passlib digest_str: str = ( binascii.b2a_base64(key).rstrip(b"=\n").decode("ascii") ) # make a `str` salt salt_str: str = ( binascii.b2a_base64(salt).rstrip(b"=\n").decode("ascii") ) return f"$pbkdf2-sha512${rounds}${salt_str}${digest_str}"
[docs] @staticmethod def verify(password: bytes, hashed: str) -> bool: """Verify hashing password would be equal to the `hashed` value :param bytes password: Password to verify :param string hashed: Hashed password. Used to extract hashing parameters :returns: boolean whether hashing password with the same parameters would match hashed value """ data: str = hashed # split hashed string to extract parameters parts: list[str] = data[1:].split("$") rounds: int if len(parts) == 4: _, rounds_str, salt_str, digest_str = parts # Convert salt and digest back to bytes as opposite to how passlib # serializes them salt: bytes = password_hashers.b64s_decode( salt_str.replace(".", "+").encode("ascii") ) digest: bytes = password_hashers.b64s_decode( digest_str.replace(".", "+").encode("ascii") ) rounds = int(rounds_str) else: raise exception.PasswordValidationError("malformed password hash") # Prepave the kdf function with params kdf = PBKDF2HMAC( algorithm=Sha512.hash_algo, length=64, salt=salt, iterations=rounds ) # Verify the key. # NOTE(gtema): cryptography raises exception when key does not match try: kdf.verify(password, digest) return True except InvalidKey: return False