mirror of
https://gogs.blitter.com/RLabs/xs
synced 2024-08-14 10:26:42 +00:00
f5be3578a8
2/3 Added vendor/ dir to lock down dependent pkg versions. The author of git.schwanenlied.me/yawning/{chacha20,newhope,kyber}.git has copied their repos to gitlab.com/yawning/ but some imports of chacha20 from newhope still inconsistently refer to git.schwanenlied.me/, breaking build. Licenses for chacha20 also changed from CC0 to AGPL, which may or may not be an issue. Until the two aforementioned issues are resolved, locking to last-good versions is probably the best way forward for now. To build with vendored deps, use make VENDOR=1 clean all 3/3 Moved body of CI push script into bacillus/
95 lines
2.1 KiB
Go
95 lines
2.1 KiB
Go
// Package raw provides a raw implementation of the modular-crypt-wrapped scrypt primitive.
|
|
package raw
|
|
|
|
import "golang.org/x/crypto/scrypt"
|
|
import "encoding/base64"
|
|
import "strings"
|
|
import "strconv"
|
|
import "fmt"
|
|
|
|
// The current recommended N value for interactive logins.
|
|
const RecommendedN = 16384
|
|
|
|
// The current recommended r value for interactive logins.
|
|
const Recommendedr = 8
|
|
|
|
// The current recommended p value for interactive logins.
|
|
const Recommendedp = 1
|
|
|
|
// Wrapper for golang.org/x/crypto/scrypt implementing a sensible
|
|
// modular crypt interface.
|
|
//
|
|
// password should be a UTF-8 plaintext password.
|
|
// salt should be a random salt value in binary form.
|
|
//
|
|
// N, r and p are parameters to scrypt.
|
|
//
|
|
// Returns a modular crypt hash.
|
|
func ScryptSHA256(password string, salt []byte, N, r, p int) string {
|
|
passwordb := []byte(password)
|
|
|
|
hash, err := scrypt.Key(passwordb, salt, N, r, p, 32)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
hstr := base64.StdEncoding.EncodeToString(hash)
|
|
sstr := base64.StdEncoding.EncodeToString(salt)
|
|
|
|
return fmt.Sprintf("$s2$%d$%d$%d$%s$%s", N, r, p, sstr, hstr)
|
|
}
|
|
|
|
// Indicates that a password hash or stub is invalid.
|
|
var ErrInvalidStub = fmt.Errorf("invalid scrypt password stub")
|
|
|
|
// Parses an scrypt modular hash or stub string.
|
|
//
|
|
// The format is as follows:
|
|
//
|
|
// $s2$N$r$p$salt$hash // hash
|
|
// $s2$N$r$p$salt // stub
|
|
//
|
|
func Parse(stub string) (salt, hash []byte, N, r, p int, err error) {
|
|
if len(stub) < 10 || !strings.HasPrefix(stub, "$s2$") {
|
|
err = ErrInvalidStub
|
|
return
|
|
}
|
|
|
|
// $s2$ N$r$p$salt-base64$hash-base64
|
|
parts := strings.Split(stub[4:], "$")
|
|
|
|
if len(parts) < 4 {
|
|
err = ErrInvalidStub
|
|
return
|
|
}
|
|
|
|
var Ni, ri, pi uint64
|
|
|
|
Ni, err = strconv.ParseUint(parts[0], 10, 31)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
ri, err = strconv.ParseUint(parts[1], 10, 31)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
pi, err = strconv.ParseUint(parts[2], 10, 31)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
N, r, p = int(Ni), int(ri), int(pi)
|
|
|
|
salt, err = base64.StdEncoding.DecodeString(parts[3])
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
if len(parts) >= 5 {
|
|
hash, err = base64.StdEncoding.DecodeString(parts[4])
|
|
}
|
|
|
|
return
|
|
}
|