Ron Savage > Crypt-PasswdMD5 > Crypt::PasswdMD5

Download:
Crypt-PasswdMD5-1.40.tgz

Dependencies

Annotate this POD

Related Modules

CGI::Session
Digest::MD5
Apache::Session
Digest::SHA1
Authen::PAM
CGI::Carp
Data::Dumper
HTML::Mason
Crypt::Blowfish
Crypt::CBC
more...
By perlmonks.org

CPAN RT

Open  0
View/Report Bugs
Module Version: 1.40   Source  

NAME ^

Crypt::PasswdMD5 - Provide interoperable MD5-based crypt() functions

SYNOPSIS ^

        use strict;
        use warnings;

        use Crypt::PasswdMD5;

        my($password)       = 'seekrit';
        my($salt)           = 'pepperoni';
        my($unix_crypted)   = unix_md5_crypt($password, $salt);
        my($apache_crypted) = apache_md5_crypt($password, $salt);

        Or:

        use strict;
        use warnings;

        use Crypt::PasswdMD5 'random_md5_salt';

        my($length) = 7;
        my($salt_1) = random_md5_salt($length);
        my($salt_2) = random_md5_salt(); # Default to $length == 8.

DESCRIPTION ^

apache_md5_crypt() provides a function compatible with Apache's .htpasswd files. This was contributed by Bryan Hart <bryan@eai.com>. This function is exported by default.

The unix_md5_crypt() provides a crypt()-compatible interface to the rather new MD5-based crypt() function found in modern operating systems. It's based on the implementation found on FreeBSD 2.2.[56]-RELEASE. This function is also exported by default.

For both functions, if a salt value is not supplied, a random salt will be generated, using the function random_md5_salt(). This function is not exported by default.

LICENSE AND WARRANTY ^

This code and all accompanying software comes with NO WARRANTY. You use it at your own risk.

This code and all accompanying software can be used freely under the same terms as Perl itself.

METHODS ^

apache_md5_crypt($password, $salt)

This sets a magic variable, and then passes all the calling parameters to "unix_md5_crypt($password, $salt)".

Returns an encrypted version of the given password.

Basically, it's a very poor choice for anything other than password authentication.

random_md5_salt([$length])

Here, [] indicate an optional parameter.

Returns a random salt of the given length.

The maximum length is 8.

If $length is omitted, it defaults to 8.

unix_md5_crypt($password, $salt)

Returns an encrypted version of the given password.

Basically, it's a very poor choice for anything other than password authentication.

SUPPORT ^

Bugs should be reported via the CPAN bug tracker at

http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Crypt-PasswdMD5

AUTHOR ^

Luis E. Muñoz <luismunoz@cpan.org>.

Maintenance by Ron Savage <rsavage@cpan.org> as of V 1.40.

syntax highlighting: