Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

authen::passphrase::eggdropblowfish(3pm) [debian man page]

Authen::Passphrase::EggdropBlowfish(3pm)		User Contributed Perl Documentation		  Authen::Passphrase::EggdropBlowfish(3pm)

NAME
Authen::Passphrase::EggdropBlowfish - passphrases using Eggdrop's blowfish.mod SYNOPSIS
use Authen::Passphrase::EggdropBlowfish; $ppr = Authen::Passphrase::EggdropBlowfish->new( hash_base64 => "9tpsG/61YqX/"); $ppr = Authen::Passphrase::EggdropBlowfish->new( passphrase => "passphrase"); $hash = $ppr->hash; $hash_base64 = $ppr->hash_base64; if($ppr->match($passphrase)) { ... DESCRIPTION
An object of this class encapsulates a passphrase hashed using the Blowfish-based algorithm used in Eggdrop's blowfish.mod. This is a subclass of Authen::Passphrase, and this document assumes that the reader is familiar with the documentation for that class. This hash scheme uses no salt, and does not accept a zero-length passphrase. It uses the passphrase as a Blowfish key to encrypt a standard plaintext block. The hash is the ciphertext block. The standard Blowfish key schedule only accepts keys from 8 to 56 bytes long; this algorithm relaxes that requirement and accepts any non-zero length. Up to 72 bytes of passphrase/key are significant; any more are ignored. In Eggdrop the hash is represented as a "+" followed by twelve base 64 digits. The first six digits encode the second half of the hash, and the last six encode the first half. Within each half the bytes are encoded in reverse order. The base 64 digits are ".", "/", "0" to "9", "a" to "z", "A" to "Z" (in that order). Warning: The hash is small by modern standards, and the lack of salt is a weakness in this scheme. For a scheme that makes better use of Blowfish see Authen::Passphrase::BlowfishCrypt. CONSTRUCTOR
Authen::Passphrase::EggdropBlowfish->new(ATTR => VALUE, ...) Generates a new passphrase recogniser object using the Eggdrop blowfish.mod algorithm. The following attributes may be given: hash The hash, as a string of eight bytes. hash_base64 The hash, as a string of twelve base 64 digits. passphrase A passphrase that will be accepted. Either the hash or the passphrase must be given. METHODS
$ppr->hash Returns the hash value, as a string of eight bytes. $ppr->hash_base64 Returns the hash value, as a string of twelve base 64 digits. $ppr->match(PASSPHRASE) This method is part of the standard Authen::Passphrase interface. SEE ALSO
Authen::Passphrase, Crypt::Eksblowfish::Uklblowfish AUTHOR
Andrew Main (Zefram) <zefram@fysh.org> COPYRIGHT
Copyright (C) 2006, 2007, 2009, 2010, 2012 Andrew Main (Zefram) <zefram@fysh.org> LICENSE
This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.14.2 2012-02-07 Authen::Passphrase::EggdropBlowfish(3pm)

Check Out this Related Man Page

Authen::Passphrase::BigCrypt(3pm)			User Contributed Perl Documentation			 Authen::Passphrase::BigCrypt(3pm)

NAME
Authen::Passphrase::BigCrypt - passphrases using bigcrypt algorithm SYNOPSIS
use Authen::Passphrase::BigCrypt; $ppr = Authen::Passphrase::BigCrypt->new( salt_base64 => "qi", hash_base64 => "yh4XPJGsOZ2MEAyLkfWqeQ"); $ppr = Authen::Passphrase::BigCrypt->new( salt_random => 12, passphrase => "passphrase"); $salt = $ppr->salt; $salt_base64 = $ppr->salt_base64_2; $hash = $ppr->hash; $hash_base64 = $ppr->hash_base64; $pprs = $ppr->sections; if($ppr->match($passphrase)) { ... DESCRIPTION
An object of this class encapsulates a passphrase hashed using the "bigcrypt" hash function found in HP-UX, Digital Unix, OSF/1, and some other flavours of Unix. Do not confuse this with the "crypt16" found on Ultrix and Tru64 (for which see Authen::Passphrase::Crypt16). This is a subclass of Authen::Passphrase, and this document assumes that the reader is familiar with the documentation for that class. This is a derivation of the original DES-based crypt function found on all Unices (see Authen::Passphrase::DESCrypt). The first eight bytes of the passphrase are used as a DES key to encrypt the all-bits-zero block through 25 rounds of (12-bit) salted DES, just like the original crypt. Then, if the passphrase is longer than eight bytes, the next eight bytes are used as a DES key to encrypt the all-bits- zero block through 25 rounds of salted DES, using as salt the first 12 bits of the hash of the first section. Then, if the passphrase is longer than sixteen bytes, the next eight bytes are used, with salt consisting of the first 12 bits of the hash of the second section. This repeats until the entire passphrase has been used. The hashes of all the sections are concatenated to form the final hash. A password hash of this scheme is conventionally represented in ASCII using the base 64 encoding of the underlying DES-based crypt function. The first two characters give the salt for the first section, the next eleven give the hash of the first section, the next eleven give the hash of the second section, and so on. A hash thus encoded is used as a crypt string, on those systems where the bigcrypt algorithm is part of crypt(), but the syntax clashes with that of crypt16. This module does not treat it as a crypt string syntax. Because the sections of the passphrase are hashed separately, it is possible to manipulate (e.g., crack) a section hash in isolation. See Authen::Passphrase::DESCrypt for handling of a single section. Warning: This is a fatally flawed design, often providing less security than the plain DES scheme alone. Do not use seriously. CONSTRUCTOR
Authen::Passphrase::BigCrypt->new(ATTR => VALUE, ...) Generates a new passphrase recogniser object using the bigcrypt hash algorithm. The following attributes may be given: salt The salt for the first section, as an integer in the range [0, 4096). salt_base64 The salt for the first section, as a string of two base 64 digits. salt_random Causes salt for the first section to be generated randomly. The value given for this attribute must be 12, indicating generation of 12 bits of salt. The source of randomness may be controlled by the facility described in Data::Entropy. hash The hash, as a string of bytes. hash_base64 The hash, as a string of base 64 digits. passphrase A passphrase that will be accepted. The salt for the first section must be given, and either the hash or the passphrase. METHODS
$ppr->salt Returns the salt for the first section, as a Perl integer. $ppr->salt_base64_2 Returns the salt for the first section, as a string of two base 64 digits. $ppr->hash Returns the hash value, as a string of bytes. $ppr->hash_base64 Returns the hash value, as a string of base 64 digits. This is the concatenation of the base 64 encodings of the section hashes, rather than a base64 encoding of the combined hash. $ppr->sections Returns a reference to an array of Authen::Passphrase::DESCrypt passphrase recognisers for the sections of the passphrase. $ppr->match(PASSPHRASE) This method is part of the standard Authen::Passphrase interface. SEE ALSO
Authen::Passphrase, Authen::Passphrase::DESCrypt AUTHOR
Andrew Main (Zefram) <zefram@fysh.org> COPYRIGHT
Copyright (C) 2006, 2007, 2009, 2010, 2012 Andrew Main (Zefram) <zefram@fysh.org> LICENSE
This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.14.2 2012-02-07 Authen::Passphrase::BigCrypt(3pm)
Man Page