|
|
| XP is just a number | |
| PerlMonks |
password encryption woesby rdfield (Priest) |
| on May 11, 2017 at 13:51 UTC ( [id://1190062]=perlquestion: print w/replies, xml ) | Need Help?? |
|
rdfield has asked for the wisdom of the Perl Monks concerning the following question:
I am maintaining a system which accepts pre-encrypted passwords from various sources. Recently I've been asked to support a system that generates hashed password like the following:
which looks to me like an SHA512 hash (hex encoded) with a 32 byte salt (base64 encoded). I've tried reformatting it to crypt SHA512 standard using but to no avail - the salt appears to be truncated: Then I tried Crypt::SaltedHash:
but the hex encoded line doesn't match the one in the original string. I'm wondering if the prepended $1$ is a clue? Maybe MD5 is involved somewhere along the line? Has anyone seen a hashed password like this before? And prepared to offer any hints? Edited to include a real example rdfield
Back to
Seekers of Perl Wisdom
|
|
||||||||||||||||||||||||||||||||||||