Source code for keystone.common.password_hashers.pbkdf2
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import binascii
import os
from cryptography.exceptions import InvalidKey
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
from keystone.common import password_hashers
from keystone import exception
[docs]
class Sha512(password_hashers.PasswordHasher):
"""passlib transition class for PBKDF2 Sha512 password hashing"""
name: str = "pbkdf2_sha512"
ident: str = "$pbkdf2-sha512$"
hash_algo = hashes.SHA512()
[docs]
@staticmethod
def hash(password: bytes, salt_size: int = 16, rounds: int = 25000) -> str:
"""Generate password hash string with ident and params
https://cryptography.io/en/stable/hazmat/primitives/key-derivation-functions/#pbkdf2
:param bytes password: Password to be hashed.
:param bytes salt: Salt.
:param int iterations: Iterations count
:returns: String in format
`$pbkdf2-sha512$ln=logN,r=R,p=P$salt$checksum`
"""
salt: bytes = os.urandom(salt_size)
# Prepave the kdf function with params
kdf = PBKDF2HMAC(
algorithm=Sha512.hash_algo, length=64, salt=salt, iterations=rounds
)
# derive - create a digest
key: bytes = kdf.derive(password)
# make a `str` digest compatible with passlib
digest_str: str = (
binascii.b2a_base64(key).rstrip(b"=\n").decode("ascii")
)
# make a `str` salt
salt_str: str = (
binascii.b2a_base64(salt).rstrip(b"=\n").decode("ascii")
)
return f"$pbkdf2-sha512${rounds}${salt_str}${digest_str}"
[docs]
@staticmethod
def verify(password: bytes, hashed: str) -> bool:
"""Verify hashing password would be equal to the `hashed` value
:param bytes password: Password to verify
:param string hashed: Hashed password. Used to extract hashing
parameters
:returns: boolean whether hashing password with the same parameters
would match hashed value
"""
data: str = hashed
# split hashed string to extract parameters
parts: list[str] = data[1:].split("$")
rounds: int
if len(parts) == 4:
_, rounds_str, salt_str, digest_str = parts
# Convert salt and digest back to bytes as opposite to how passlib
# serializes them
salt: bytes = password_hashers.b64s_decode(
salt_str.replace(".", "+").encode("ascii")
)
digest: bytes = password_hashers.b64s_decode(
digest_str.replace(".", "+").encode("ascii")
)
rounds = int(rounds_str)
else:
raise exception.PasswordValidationError("malformed password hash")
# Prepave the kdf function with params
kdf = PBKDF2HMAC(
algorithm=Sha512.hash_algo, length=64, salt=salt, iterations=rounds
)
# Verify the key.
# NOTE(gtema): cryptography raises exception when key does not match
try:
kdf.verify(password, digest)
return True
except InvalidKey:
return False