Lib to help you hash passwords.
bcrypt on wikipedia
Catalyst: How To Safely Store A Password
As should be the case with any security tool, this library should be scrutinized by anyone using it. If you find or suspect an issue with the code- please bring it to my attention and I'll spend some time trying to make sure that this tool is as secure as possible.
To make it easier for people using this tool to analyze what has been surveyed, here is a list of BCrypt related security issues/concerns as they've come up.
- GH-13 - There was a timing attack present in the comparator. This is fixed in versions higher than 0.2.1, but I recommend using 0.2.3 (code fixes) or later. HT @thegoleffect.
- An issue with passwords was found with a version of the Blowfish algorithm developed for John the Ripper. This is not present in the OpenBSD version and is thus not a problem for this module. HT @zookos.
- NodeJS
- OpenSSL
npm install bcrypt
Assuming you've already built node, you can run the waf script:
node-waf configure
node-waf build
npm link
To hash a password:
var bcrypt = require('bcrypt');
var salt = bcrypt.gen_salt_sync(10);
var hash = bcrypt.encrypt_sync("B4c0//", salt);
To check a password:
var bcrypt = require('bcrypt');
var salt = bcrypt.gen_salt_sync(10);
var hash = bcrypt.encrypt_sync("B4c0//", salt);
bcrypt.compare_sync("B4c0//", hash); // true
bcrypt.compare_sync("not_bacon", hash); // false
To hash a password:
var bcrypt = require('bcrypt');
bcrypt.gen_salt(10, function(err, salt) {
bcrypt.encrypt("B4c0//", salt, function(err, hash) {
//something
});
});
To check a password:
var bcrypt = require('bcrypt');
bcrypt.gen_salt(10, function(err, salt) {
bcrypt.encrypt("B4c0//", salt, function(err, hash) {
bcrypt.compare("B4c0//", hash, function(err, res) {
// res == true
});
bcrypt.compare("not_bacon", hash, function(err, res) {
// res = false
});
});
});
- BCrypt
- gen_salt_sync(rounds, seed_length)
- rounds - [OPTIONAL] - the number of rounds to process the data for. (default - 10)
- seed_length - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20)
- gen_salt(rounds, seed_length, cb)
- rounds - [OPTIONAL] - the number of rounds to process the data for. (default - 10)
- seed_length - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20)
- cb - [REQUIRED] - a callback to be fired once the salt has been generated. uses eio making it asynchronous.
- encrypt_sync(data, salt)
- data - [REQUIRED] - the data to be encrypted.
- salt - [REQUIRED] - the salt to be used in encryption.
- encrypt(data, salt, cb)
- data - [REQUIRED] - the data to be encrypted.
- salt - [REQUIRED] - the salt to be used in encryption.
- cb - [REQUIRED] - a callback to be fired once the data has been encrypted. uses eio making it asynchronous.
- compare_sync(data, encrypted)
- data - [REQUIRED] - data to compare.
- encrypted - [REQUIRED] - data to be compared to.
- compare(data, encrypted, cb)
- data - [REQUIRED] - data to compare.
- encrypted - [REQUIRED] - data to be compared to.
- cb - [REQUIRED] - a callback to be fired once the data has been compared. uses eio making it asynchronous.
- gen_salt_sync(rounds, seed_length)
The characters that comprise the resultant hash are ./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$
.
I am using nodeunit. I like the way you write tests with it and I like the default output. As such you'll need it to run the tests. I suspect my tests would run on an older version, but these were written and worked against 0.5.1 npm install [email protected] nodeunit test/
The code for this comes from a few sources:
- blowfish.cc - OpenBSD
- bcrypt.cc - OpenBSD
- bcrypt::gen_salt - gen_salt inclusion to bcrypt
- bcrypt_node.cc - me
Unless stated elsewhere, file headers or otherwise, the license as stated in the LICENSE file.
Node.js™ is an official trademark of Joyent. This module is not formally related to or endorsed by the official Joyent Node.js open source or commercial project