ヤミRoot VoidGate
User / IP
:
216.73.216.143
Host / Server
:
146.88.233.70 / dev.loger.cm
System
:
Linux hybrid1120.fr.ns.planethoster.net 3.10.0-957.21.2.el7.x86_64 #1 SMP Wed Jun 5 14:26:44 UTC 2019 x86_64
Command
|
Upload
|
Create
Mass Deface
|
Jumping
|
Symlink
|
Reverse Shell
Ping
|
Port Scan
|
DNS Lookup
|
Whois
|
Header
|
cURL
:
/
home
/
logercm
/
dev.loger.cm
/
vendor
/
symfony
/
password-hasher
/
Hasher
/
Viewing: Pbkdf2PasswordHasher.php
<?php /* * This file is part of the Symfony package. * * (c) Fabien Potencier <fabien@symfony.com> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\PasswordHasher\Hasher; use Symfony\Component\PasswordHasher\Exception\InvalidPasswordException; use Symfony\Component\PasswordHasher\Exception\LogicException; use Symfony\Component\PasswordHasher\LegacyPasswordHasherInterface; /** * Pbkdf2PasswordHasher uses the PBKDF2 (Password-Based Key Derivation Function 2). * * Providing a high level of Cryptographic security, * PBKDF2 is recommended by the National Institute of Standards and Technology (NIST). * * But also warrants a warning, using PBKDF2 (with a high number of iterations) slows down the process. * PBKDF2 should be used with caution and care. * * @author Sebastiaan Stok <s.stok@rollerscapes.net> * @author Andrew Johnson * @author Fabien Potencier <fabien@symfony.com> */ final class Pbkdf2PasswordHasher implements LegacyPasswordHasherInterface { use CheckPasswordLengthTrait; private $algorithm; private $encodeHashAsBase64; private $iterations = 1; private $length; private $encodedLength = -1; /** * @param string $algorithm The digest algorithm to use * @param bool $encodeHashAsBase64 Whether to base64 encode the password hash * @param int $iterations The number of iterations to use to stretch the password hash * @param int $length Length of derived key to create */ public function __construct(string $algorithm = 'sha512', bool $encodeHashAsBase64 = true, int $iterations = 1000, int $length = 40) { $this->algorithm = $algorithm; $this->encodeHashAsBase64 = $encodeHashAsBase64; $this->length = $length; try { $this->encodedLength = \strlen($this->hash('', 'salt')); } catch (\LogicException $e) { // ignore unsupported algorithm } $this->iterations = $iterations; } public function hash(string $plainPassword, string $salt = null): string { if ($this->isPasswordTooLong($plainPassword)) { throw new InvalidPasswordException(); } if (!\in_array($this->algorithm, hash_algos(), true)) { throw new LogicException(sprintf('The algorithm "%s" is not supported.', $this->algorithm)); } $digest = hash_pbkdf2($this->algorithm, $plainPassword, $salt, $this->iterations, $this->length, true); return $this->encodeHashAsBase64 ? base64_encode($digest) : bin2hex($digest); } public function verify(string $hashedPassword, string $plainPassword, string $salt = null): bool { if (\strlen($hashedPassword) !== $this->encodedLength || false !== strpos($hashedPassword, '$')) { return false; } return !$this->isPasswordTooLong($plainPassword) && hash_equals($hashedPassword, $this->hash($plainPassword, $salt)); } public function needsRehash(string $hashedPassword): bool { return false; } }
Coded With 💗 by
0x6ick