X-Git-Url: https://git.quassel-irc.org/?p=quassel.git;a=blobdiff_plain;f=src%2Fcore%2Fstorage.cpp;h=4b56573220e17a241c935c3c0690198e51237ae0;hp=4a84e9bb35ea623e2878a23b4f8e1e92b3bac15c;hb=32c0bb666209932d7540c22ddc393fd4550d5418;hpb=5924533c6d0f9777d38c01ed7e1510a55db2b876 diff --git a/src/core/storage.cpp b/src/core/storage.cpp index 4a84e9bb..4b565732 100644 --- a/src/core/storage.cpp +++ b/src/core/storage.cpp @@ -21,6 +21,11 @@ #include "storage.h" #include +#include + +#if QT_VERSION < 0x050000 +# include "../../3rdparty/sha512/sha512.h" +#endif Storage::Storage(QObject *parent) : QObject(parent) @@ -29,7 +34,7 @@ Storage::Storage(QObject *parent) QString Storage::hashPassword(const QString &password) { - return hashPasswordSha1(password); + return hashPasswordSha2_512(password); } bool Storage::checkHashedPassword(const UserId user, const QString &password, const QString &hashedPassword, const Storage::HashVersion version) @@ -37,15 +42,19 @@ bool Storage::checkHashedPassword(const UserId user, const QString &password, co bool passwordCorrect = false; switch (version) { - case Storage::HashVersion::sha1: + case Storage::HashVersion::Sha1: passwordCorrect = checkHashedPasswordSha1(password, hashedPassword); break; + case Storage::HashVersion::Sha2_512: + passwordCorrect = checkHashedPasswordSha2_512(password, hashedPassword); + break; + default: qWarning() << "Password hash version" << QString(version) << "is not supported, please reset password"; } - if (passwordCorrect && version < Storage::HashVersion::latest) { + if (passwordCorrect && version < Storage::HashVersion::Latest) { updateUser(user, password); } @@ -61,3 +70,46 @@ bool Storage::checkHashedPasswordSha1(const QString &password, const QString &ha { return hashPasswordSha1(password) == hashedPassword; } + +QString Storage::hashPasswordSha2_512(const QString &password) +{ + // Generate a salt of 512 bits (64 bytes) using the Mersenne Twister + std::random_device seed; + std::mt19937 generator(seed()); + std::uniform_int_distribution distribution(0, 255); + QByteArray saltBytes; + saltBytes.resize(64); + for (int i = 0; i < 64; i++) { + saltBytes[i] = (unsigned char) distribution(generator); + } + QString salt(saltBytes.toHex()); + + // Append the salt to the password, hash the result, and append the salt value + return sha2_512(password + salt) + ":" + salt; +} + +bool Storage::checkHashedPasswordSha2_512(const QString &password, const QString &hashedPassword) +{ + QRegExp colonSplitter("\\:"); + QStringList hashedPasswordAndSalt = hashedPassword.split(colonSplitter); + + if (hashedPasswordAndSalt.size() == 2){ + return sha2_512(password + hashedPasswordAndSalt[1]) == hashedPasswordAndSalt[0]; + } + else { + qWarning() << "Password hash and salt were not in the correct format"; + return false; + } +} + +QString Storage::sha2_512(const QString &input) +{ +#if QT_VERSION >= 0x050000 + return QString(QCryptographicHash::hash(input.toUtf8(), QCryptographicHash::Sha512).toHex()); +#else + QByteArray inputBytes = input.toUtf8(); + unsigned char output[64]; + sha512((unsigned char*) inputBytes.constData(), inputBytes.size(), output, false); + return QString(QByteArray::fromRawData((char*) output, 64).toHex()); +#endif +}