mirror of
				https://github.com/Ylianst/MeshCentral.git
				synced 2025-03-09 15:40:18 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			62 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			62 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| // check out https://github.com/tj/node-pwd
 | |
| 
 | |
| /*jslint node: true */
 | |
| /*jshint node: true */
 | |
| /*jshint strict:false */
 | |
| /*jshint -W097 */
 | |
| /*jshint esversion: 6 */
 | |
| "use strict";
 | |
| 
 | |
| // Module dependencies.
 | |
| const crypto = require('crypto');
 | |
| 
 | |
| // Bytesize.
 | |
| const len = 128;
 | |
| 
 | |
| // Iterations. ~300ms
 | |
| const iterations = 12000;
 | |
| 
 | |
| /**
 | |
|  * Hashes a password with optional `salt`, otherwise
 | |
|  * generate a salt for `pass` and invoke `fn(err, salt, hash)`.
 | |
|  *
 | |
|  * @param {String} password to hash
 | |
|  * @param {String} optional salt
 | |
|  * @param {Function} callback
 | |
|  * @api public
 | |
|  */
 | |
| exports.hash = function (pwd, salt, fn, tag) {
 | |
|     if (4 == arguments.length) {
 | |
|         try {
 | |
|             crypto.pbkdf2(pwd, salt, iterations, len, 'sha384', function (err, hash) { fn(err, hash.toString('base64'), tag); });
 | |
|         } catch (e) {
 | |
|             // If this previous call fails, it's probably because older pbkdf2 did not specify the hashing function, just use the default.
 | |
|             crypto.pbkdf2(pwd, salt, iterations, len, function (err, hash) { fn(err, hash.toString('base64'), tag); });
 | |
|         }
 | |
|     } else {
 | |
|         tag = fn;
 | |
|         fn = salt;
 | |
|         crypto.randomBytes(len, function (err, salt) {
 | |
|             if (err) return fn(err);
 | |
|             salt = salt.toString('base64');
 | |
|             try {
 | |
|                 crypto.pbkdf2(pwd, salt, iterations, len, 'sha384', function (err, hash) { if (err) { return fn(err); } fn(null, salt, hash.toString('base64'), tag); });
 | |
|             } catch (e) {
 | |
|                 // If this previous call fails, it's probably because older pbkdf2 did not specify the hashing function, just use the default.
 | |
|                 crypto.pbkdf2(pwd, salt, iterations, len, function (err, hash) { if (err) { return fn(err); } fn(null, salt, hash.toString('base64'), tag); });
 | |
|             }
 | |
|         });
 | |
|     }
 | |
| };
 | |
| 
 | |
| exports.iishash = function (type, pwd, salt, fn) {
 | |
|     if (type == 0) {
 | |
|         fn(null, pwd);
 | |
|     } else if (type == 1) {
 | |
|         const hash = crypto.createHash('sha1');
 | |
|         hash.update(Buffer.concat([Buffer.from(salt, 'base64'), Buffer.from(pwd, 'utf16le')]));
 | |
|         fn(null, hash.digest().toString('base64'));
 | |
|     } else {
 | |
|         fn('invalid type');
 | |
|     }
 | |
| };
 |