2019-05-02 18:17:27 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2021-05-20 21:43:47 -04:00
|
|
|
# Note: This logic was originally extracted from the Pbkdf2 gem to fix Ruby 2.0
|
2020-08-31 15:20:44 -04:00
|
|
|
# issues, but that gem has gone stale so we won't be returning to it.
|
2013-03-06 07:12:16 -05:00
|
|
|
|
|
|
|
require "openssl"
|
2020-08-31 15:20:44 -04:00
|
|
|
require "xorcist"
|
2013-03-06 07:12:16 -05:00
|
|
|
|
|
|
|
class Pbkdf2
|
2013-07-22 21:36:01 -04:00
|
|
|
def self.hash_password(password, salt, iterations, algorithm = "sha256")
|
2014-01-20 12:33:40 -05:00
|
|
|
h = OpenSSL::Digest.new(algorithm)
|
2013-07-22 21:36:01 -04:00
|
|
|
|
2013-03-06 07:12:16 -05:00
|
|
|
u = ret = prf(h, password, salt + [1].pack("N"))
|
|
|
|
|
2013-07-22 21:36:01 -04:00
|
|
|
2.upto(iterations) do
|
2013-03-06 07:12:16 -05:00
|
|
|
u = prf(h, password, u)
|
2022-02-03 00:19:30 -05:00
|
|
|
Xorcist.xor!(ret, u)
|
2013-03-06 07:12:16 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
ret.bytes.map { |b| ("0" + b.to_s(16))[-2..-1] }.join("")
|
|
|
|
end
|
|
|
|
|
2013-07-22 21:36:01 -04:00
|
|
|
protected
|
2013-03-06 07:12:16 -05:00
|
|
|
|
|
|
|
def self.prf(hash_function, password, data)
|
|
|
|
OpenSSL::HMAC.digest(hash_function, password, data)
|
|
|
|
end
|
|
|
|
end
|