Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save bestrocker221/f506eee8ccadc60cab71d5f633b7cc07 to your computer and use it in GitHub Desktop.
Save bestrocker221/f506eee8ccadc60cab71d5f633b7cc07 to your computer and use it in GitHub Desktop.
SSHA2-256 FreeRadius password hashing
from hashlib import sha256
from base64 import b64encode, b64decode
# salt size = 12
SALT_SIZE = 12
def hashPassword(password, salt):
ctx = sha256(password)
ctx.update(salt)
hash = b"{SSHA256}" + b64encode(ctx.digest() + salt)
hash_clean = b64encode(ctx.digest() + salt)
print("\nattribute: SSHA2-256-Password")
print("NB: save in the DB without {..}\n")
print("sha256 + salt = " + str(ctx.hexdigest() + str(salt)))
print("hashed_password = " + str(hash_clean))
return hash_clean
def checkPassword(challenge_password, password):
print("\n\nChecking password: " + str(challenge_password))
decoded_hash = b64decode(challenge_password)
salt = decoded_hash[32:]
digest = decoded_hash[:-12]
hashed_password = sha256(password + salt)
print("Password is correct? " + str(hashed_password.digest() == digest))
return hashed_password.digest() == digest
hash = hashPassword(b"test", b"saltsaltsalt")
checkPassword(hash, b"test")
@josephcsible
Copy link

If you change digest = decoded_hash[:-12] to digest = decoded_hash[:32], then this code will work with any salt size.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment