mirror of
				https://github.com/Ylianst/MeshCentral.git
				synced 2025-03-09 15:40:18 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			62 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			62 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
// check out https://github.com/tj/node-pwd
 | 
						|
 | 
						|
/*jslint node: true */
 | 
						|
/*jshint node: true */
 | 
						|
/*jshint strict:false */
 | 
						|
/*jshint -W097 */
 | 
						|
/*jshint esversion: 6 */
 | 
						|
"use strict";
 | 
						|
 | 
						|
// Module dependencies.
 | 
						|
const crypto = require('crypto');
 | 
						|
 | 
						|
// Bytesize.
 | 
						|
const len = 128;
 | 
						|
 | 
						|
// Iterations. ~300ms
 | 
						|
const iterations = 12000;
 | 
						|
 | 
						|
/**
 | 
						|
 * Hashes a password with optional `salt`, otherwise
 | 
						|
 * generate a salt for `pass` and invoke `fn(err, salt, hash)`.
 | 
						|
 *
 | 
						|
 * @param {String} password to hash
 | 
						|
 * @param {String} optional salt
 | 
						|
 * @param {Function} callback
 | 
						|
 * @api public
 | 
						|
 */
 | 
						|
exports.hash = function (pwd, salt, fn, tag) {
 | 
						|
    if (4 == arguments.length) {
 | 
						|
        try {
 | 
						|
            crypto.pbkdf2(pwd, salt, iterations, len, 'sha384', function (err, hash) { fn(err, hash.toString('base64'), tag); });
 | 
						|
        } catch (e) {
 | 
						|
            // If this previous call fails, it's probably because older pbkdf2 did not specify the hashing function, just use the default.
 | 
						|
            crypto.pbkdf2(pwd, salt, iterations, len, function (err, hash) { fn(err, hash.toString('base64'), tag); });
 | 
						|
        }
 | 
						|
    } else {
 | 
						|
        tag = fn;
 | 
						|
        fn = salt;
 | 
						|
        crypto.randomBytes(len, function (err, salt) {
 | 
						|
            if (err) return fn(err);
 | 
						|
            salt = salt.toString('base64');
 | 
						|
            try {
 | 
						|
                crypto.pbkdf2(pwd, salt, iterations, len, 'sha384', function (err, hash) { if (err) { return fn(err); } fn(null, salt, hash.toString('base64'), tag); });
 | 
						|
            } catch (e) {
 | 
						|
                // If this previous call fails, it's probably because older pbkdf2 did not specify the hashing function, just use the default.
 | 
						|
                crypto.pbkdf2(pwd, salt, iterations, len, function (err, hash) { if (err) { return fn(err); } fn(null, salt, hash.toString('base64'), tag); });
 | 
						|
            }
 | 
						|
        });
 | 
						|
    }
 | 
						|
};
 | 
						|
 | 
						|
exports.iishash = function (type, pwd, salt, fn) {
 | 
						|
    if (type == 0) {
 | 
						|
        fn(null, pwd);
 | 
						|
    } else if (type == 1) {
 | 
						|
        const hash = crypto.createHash('sha1');
 | 
						|
        hash.update(Buffer.concat([Buffer.from(salt, 'base64'), Buffer.from(pwd, 'utf16le')]));
 | 
						|
        fn(null, hash.digest().toString('base64'));
 | 
						|
    } else {
 | 
						|
        fn('invalid type');
 | 
						|
    }
 | 
						|
};
 |