summaryrefslogtreecommitdiff
path: root/src/mailman/utilities/passwords.py
blob: b9981f057a49f397831e72c9325b8dbb0951717c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
# Copyright (C) 2012 by the Free Software Foundation, Inc.
#
# This file is part of GNU Mailman.
#
# GNU Mailman is free software: you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# GNU Mailman is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
# more details.
#
# You should have received a copy of the GNU General Public License along with
# GNU Mailman.  If not, see <http://www.gnu.org/licenses/>.

"""A wrapper around passlib."""

from __future__ import absolute_import, print_function, unicode_literals

__metaclass__ = type
__all__ = [
    'encrypt',
    'verify',
    ]


import re

from passlib.registry import get_crypt_handler

from mailman.config import config
from mailman.testing import layers
from mailman.utilities.modules import find_name

SCHEME_RE = r'{(?P<scheme>[^}]+?)}(?P<rest>.*)'.encode()



def encrypt(secret):
    hasher = find_name(config.passwords.password_scheme)
    # For reproducibility, don't use any salt in the test suite.
    kws = {}
    if layers.is_testing and 'salt' in hasher.setting_kwds:
        kws['salt'] = b''
    hashed = hasher.encrypt(secret, **kws)
    return b'{{{0}}}{1}'.format(hasher.name, hashed)


def verify(hashed, password):
    mo = re.match(SCHEME_RE, hashed, re.IGNORECASE)
    if not mo:
        return False
    scheme, secret = mo.groups(('scheme', 'rest'))
    hasher = get_crypt_handler(scheme)
    return hasher.verify(password, secret)