Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Browse files

Refactoring, setting up for Heroku

  • Loading branch information...
commit d2cc68da666d3650ff701ee05797c22a2ed14701 1 parent 0691ce1
@matb33 authored
Showing with 194 additions and 2,921 deletions.
  1. +1 −0  .gitignore
  2. +2 −2 client/js/auth.js
  3. +70 −67 client/js/lib/rpc.js
  4. +2 −2 client/js/notes.js
  5. +2 −2 client/js/users.js
  6. +13 −0 package.json
  7. +1 −0  public/.gitignore
  8. +0 −9 public/node_modules/bcrypt/.lock-wscript
  9. +0 −5 public/node_modules/bcrypt/.npmignore
  10. +0 −6 public/node_modules/bcrypt/.travis.yml
  11. +0 −45 public/node_modules/bcrypt/CHANGELOG
  12. +0 −19 public/node_modules/bcrypt/LICENSE
  13. +0 −22 public/node_modules/bcrypt/Makefile
  14. +0 −177 public/node_modules/bcrypt/README.md
  15. +0 −184 public/node_modules/bcrypt/bcrypt.js
  16. +0 −7 public/node_modules/bcrypt/build/.conf_check_0/test.cpp
  17. BIN  public/node_modules/bcrypt/build/.conf_check_0/testbuild/.wafpickle-7
  18. BIN  public/node_modules/bcrypt/build/.conf_check_0/testbuild/Release/test_1.o
  19. BIN  public/node_modules/bcrypt/build/.wafpickle-7
  20. BIN  public/node_modules/bcrypt/build/Release/bcrypt_lib.node
  21. BIN  public/node_modules/bcrypt/build/Release/src/bcrypt_1.o
  22. BIN  public/node_modules/bcrypt/build/Release/src/bcrypt_node_1.o
  23. BIN  public/node_modules/bcrypt/build/Release/src/blowfish_1.o
  24. +0 −63 public/node_modules/bcrypt/build/c4che/Release.cache.py
  25. +0 −2  public/node_modules/bcrypt/build/c4che/build.config.py
  26. +0 −66 public/node_modules/bcrypt/build/config.log
  27. +0 −21 public/node_modules/bcrypt/examples/async_compare.js
  28. +0 −7 public/node_modules/bcrypt/examples/forever_gen_salt.js
  29. +0 −104 public/node_modules/bcrypt/package.json
  30. +0 −319 public/node_modules/bcrypt/src/bcrypt.cc
  31. +0 −490 public/node_modules/bcrypt/src/bcrypt_node.cc
  32. +0 −686 public/node_modules/bcrypt/src/blowfish.cc
  33. +0 −104 public/node_modules/bcrypt/src/node_blf.h
  34. +0 −130 public/node_modules/bcrypt/test/async.js
  35. +0 −34 public/node_modules/bcrypt/test/deprecated.js
  36. +0 −118 public/node_modules/bcrypt/test/repetitions.js
  37. +0 −104 public/node_modules/bcrypt/test/sync.js
  38. +0 −58 public/node_modules/bcrypt/wscript
  39. +2 −6 server/authentication/make-authentication-manager.js
  40. +12 −12 server/bootstrap.js
  41. +70 −36 server/models.js
  42. +16 −12 server/rpc-endpoints.js
  43. +3 −2 server/startup.js
View
1  .gitignore
@@ -0,0 +1 @@
+.DS_Store
View
4 client/js/auth.js
@@ -8,7 +8,7 @@ Template.auth.is_authenticated = function () {
Template.auth.events = {
"click button[name='login']": function (evt) {
- login(
+ RPC.login(
$("input[name='username']").val(),
$("input[name='password']").val()
);
@@ -16,6 +16,6 @@ Template.auth.events = {
evt.preventDefault();
},
"click button[name='logout']": function (evt) {
- logout();
+ RPC.logout();
}
};
View
137 client/js/lib/rpc.js
@@ -1,76 +1,79 @@
-/*******************************************
-* Users
-*******************************************/
+var RPC = {
-var addUser = function (name, username, password) {
- Meteor.call("addUser", getSessionToken(), name, username, password, function (error, result) {
- if (!error) {
- info("User " + name + " added successfully.");
- } else {
- info(error.reason);
- }
- });
-};
+ /*******************************************
+ * Users
+ *******************************************/
-var removeUser = function (user) {
- var name = user.name;
- Meteor.call("removeUser", getSessionToken(), user._id, function (error, result) {
- if (!error) {
- info("User " + name + " removed successfully.");
- forgetSessionToken(); // can only remove self, so since we're deleted, log out!
- } else {
- info(error.reason);
- }
- });
-};
+ addUser: function (name, username, password) {
+ Meteor.call("addUser", getSessionToken(), name, username, password, function (error, result) {
+ if (!error) {
+ info("User " + name + " added successfully.");
+ } else {
+ info(error.reason);
+ }
+ });
+ },
-/*******************************************
-* Notes
-*******************************************/
+ removeUser: function (user) {
+ var name = user.name;
+ Meteor.call("removeUser", getSessionToken(), user._id, function (error, result) {
+ if (!error) {
+ info("User " + name + " removed successfully.");
+ forgetSessionToken(); // can only remove self, so since we're deleted, log out!
+ } else {
+ info(error.reason);
+ }
+ });
+ },
-var addNote = function (title, is_private) {
- Meteor.call("addNote", getSessionToken(), title, is_private, function (error, result) {
- if (!error) {
- info("Note '" + title + "' added successfully.");
- } else {
- info(error.reason);
- }
- });
-};
+ /*******************************************
+ * Notes
+ *******************************************/
-var removeNote = function (note) {
- var title = note.title;
- Meteor.call("removeNote", getSessionToken(), note._id, function (error, result) {
- if (!error) {
- info("Note '" + title + "' removed successfully.");
- } else {
- info(error.reason);
- }
- });
-};
+ addNote: function (title, is_private) {
+ Meteor.call("addNote", getSessionToken(), title, is_private, function (error, result) {
+ if (!error) {
+ info("Note '" + title + "' added successfully.");
+ } else {
+ info(error.reason);
+ }
+ });
+ },
-/*******************************************
-* Authentication
-*******************************************/
+ removeNote: function (note) {
+ var title = note.title;
+ Meteor.call("removeNote", getSessionToken(), note._id, function (error, result) {
+ if (!error) {
+ info("Note '" + title + "' removed successfully.");
+ } else {
+ info(error.reason);
+ }
+ });
+ },
-var login = function (username, password) {
- Meteor.call("login", username, password, function (error, sessionToken) {
- if (!error) {
- rememberSessionToken(sessionToken);
- info("Password verified!");
- } else {
- info(error.reason);
- }
- });
-};
+ /*******************************************
+ * Authentication
+ *******************************************/
-var logout = function () {
- Meteor.call("logout", getSessionToken(), function (error, result) {
- forgetSessionToken();
- if (!error) {
- info("Logout successful.");
- } else {
- info(error.reason);
- }
- });
+ login: function (username, password) {
+ Meteor.call("login", username, password, function (error, sessionToken) {
+ if (!error) {
+ rememberSessionToken(sessionToken);
+ info("Password verified!");
+ } else {
+ info(error.reason);
+ }
+ });
+ },
+
+ logout: function () {
+ Meteor.call("logout", getSessionToken(), function (error, result) {
+ forgetSessionToken();
+ if (!error) {
+ info("Logout successful.");
+ } else {
+ info(error.reason);
+ }
+ });
+ }
};
View
4 client/js/notes.js
@@ -18,7 +18,7 @@ Template.notes.events = {
"click button[name='add']": function (evt) {
var $form = $(evt.target).closest("form");
- addNote(
+ RPC.createNote(
$("input[name='title']", $form).val(),
$("input[name='is_private']", $form).is(":checked")
);
@@ -43,6 +43,6 @@ Template.note_row.is_owned_by_session_user = function () {
Template.note_row.events = {
"click button[name='delete']": function (evt) {
- removeNote(this);
+ RPC.deleteNote(this);
}
};
View
4 client/js/users.js
@@ -10,7 +10,7 @@ Template.users.events = {
"click button[name='add']": function (evt) {
var $form = $(evt.target).closest("form");
- addUser(
+ RPC.createUser(
$("input[name='name']", $form).val(),
$("input[name='username']", $form).val(),
$("input[name='password']", $form).val()
@@ -31,6 +31,6 @@ Template.user_row.is_session_user = function () {
Template.user_row.events = {
"click button[name='delete']": function (evt) {
- removeUser(this);
+ RPC.deleteUser(this);
}
};
View
13 package.json
@@ -0,0 +1,13 @@
+{
+ "name": "meteor-userauth",
+ "version": "0.0.1",
+ "engines": {
+ "node": "0.6.x"
+ },
+ "dependencies": {
+ "bcrypt": "0.5.0"
+ },
+ "scripts": {
+ "install": "mv -f node_modules public/node_modules"
+ }
+}
View
1  public/.gitignore
@@ -0,0 +1 @@
+node_modules
View
9 public/node_modules/bcrypt/.lock-wscript
@@ -1,9 +0,0 @@
-argv = ['/usr/bin/node-waf', 'configure']
-blddir = '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt/build'
-commands = {'dist': 0, 'configure': True, 'distcheck': 0, 'install': 0, 'build': 0, 'clean': 0, 'distclean': 0, 'check': 0, 'uninstall': 0}
-cwd = '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt'
-environ = {'npm_config_color': 'true', 'npm_config_searchopts': '', 'LC_CTYPE': 'en_CA.UTF-8', 'npm_package_contributors_3_name': 'Ben Glow', 'npm_config_group': '1000', 'npm_config_browser': 'google-chrome', 'npm_config_global': '', 'npm_package_author_url': 'http://github.com/ncb000gt', 'npm_package_main': './bcrypt', 'npm_package_contributors_8_email': 'shtylman@gmail.com', 'SHELL': '/bin/bash', 'npm_config_pre': '', 'MFLAGS': '', 'npm_config_logfd': '2', 'npm_config_tmp': '/tmp', 'npm_package_engines_node': '>= 0.6.0', 'npm_config_argv': '{"remain":["bcrypt"],"cooked":["install","bcrypt"],"original":["install","bcrypt"]}', 'npm_package_contributors_7_email': 'lloyd@hilaiel.com', 'npm_package_contributors_6_email': 'vincentcr@gmail.com', 'npm_package_contributors_7_name': 'Lloyd Hilaiel', 'npm_config_init_version': '0.0.0', 'LC_MESSAGES': 'en_CA.UTF-8', 'npm_lifecycle_event': 'install', 'npm_package_contributors_7_url': 'https://github.com/lloyd', 'npm_config_init_author_name': '', 'npm_config_yes': '', 'npm_config_usage': '', 'npm_package_description': 'A bcrypt library for NodeJS.', 'npm_config_shell': '/bin/bash', 'MAIL': '/var/mail/root', 'LS_COLORS': 'rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arj=01;31:*.taz=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lz=01;31:*.xz=01;31:*.bz2=01;31:*.bz=01;31:*.tbz=01;31:*.tbz2=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.webm=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.axv=01;35:*.anx=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=00;36:*.au=00;36:*.flac=00;36:*.mid=00;36:*.midi=00;36:*.mka=00;36:*.mp3=00;36:*.mpc=00;36:*.ogg=00;36:*.ra=00;36:*.wav=00;36:*.axa=00;36:*.oga=00;36:*.spx=00;36:*.xspf=00;36:', 'npm_config_ignore': '', 'npm_config_ca': '"-----BEGIN CERTIFICATE-----\\nMIIChzCCAfACCQDauvz/KHp8ejANBgkqhkiG9w0BAQUFADCBhzELMAkGA1UEBhMC\\nVVMxCzAJBgNVBAgTAkNBMRAwDgYDVQQHEwdPYWtsYW5kMQwwCgYDVQQKEwNucG0x\\nIjAgBgNVBAsTGW5wbSBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxDjAMBgNVBAMTBW5w\\nbUNBMRcwFQYJKoZIhvcNAQkBFghpQGl6cy5tZTAeFw0xMTA5MDUwMTQ3MTdaFw0y\\nMTA5MDIwMTQ3MTdaMIGHMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExEDAOBgNV\\nBAcTB09ha2xhbmQxDDAKBgNVBAoTA25wbTEiMCAGA1UECxMZbnBtIENlcnRpZmlj\\nYXRlIEF1dGhvcml0eTEOMAwGA1UEAxMFbnBtQ0ExFzAVBgkqhkiG9w0BCQEWCGlA\\naXpzLm1lMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDLI4tIqPpRW+ACw9GE\\nOgBlJZwK5f8nnKCLK629Pv5yJpQKs3DENExAyOgDcyaF0HD0zk8zTp+ZsLaNdKOz\\nGn2U181KGprGKAXP6DU6ByOJDWmTlY6+Ad1laYT0m64fERSpHw/hjD3D+iX4aMOl\\ny0HdbT5m1ZGh6SJz3ZqxavhHLQIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAC4ySDbC\\nl7W1WpLmtLGEQ/yuMLUf6Jy/vr+CRp4h+UzL+IQpCv8FfxsYE7dhf/bmWTEupBkv\\nyNL18lipt2jSvR3v6oAHAReotvdjqhxddpe5Holns6EQd1/xEZ7sB1YhQKJtvUrl\\nZNufy1Jf1r0ldEGeA+0ISck7s+xSh9rQD2Op\\n-----END CERTIFICATE-----"', 'npm_config_globalconfig': '/etc/npmrc', 'npm_package_contributors_10_url': 'https://github.com/bnoordhuis', 'npm_package_contributors_2_email': 'david@dtrejo.com', 'npm_config_parseable': '', 'npm_package_contributors_1_email': 'the.gol.effect@gmail.com', 'LESSOPEN': '| /usr/bin/lesspipe %s', 'npm_config_userignorefile': '/root/.npmignore', 'USER': 'root', 'npm_package_author_name': 'Nick Campbell', 'npm_package_contributors_0_url': 'https://github.com/Shadowfiend', 'npm_config_versions': '', 'XAUTHORITY': '/home/mbouchard/.Xauthority', 'LANGUAGE': 'en_CA:en', 'SHLVL': '1', 'npm_config_init_author_url': '', 'npm_config_prefix': '/usr/local', 'npm_config_cache': '/root/.npm', 'SUDO_USER': 'mbouchard', 'npm_config_proxy': '', 'npm_config_depth': 'null', 'npm_config_logprefix': 'true', 'npm_config_umask': '022', 'npm_package_contributors_4_name': 'NewITFarmer.com', 'npm_config_force': '', 'npm_config_long': '', 'npm_package_contributors_0_name': 'Antonio Salazar Cardozo', 'npm_config_editor': 'vi', 'TMPDIR': '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt', 'npm_package_repository_type': 'git', 'npm_package_contributors_1_name': 'Van Nguyen', 'npm_config_npat': '', 'npm_config_json': '', 'npm_config_searchsort': 'name', 'npm_lifecycle_script': 'make build', 'COLORTERM': 'gnome-terminal', 'npm_config_git': 'git', 'npm_package_contributors_1_url': 'https://github.com/thegoleffect', 'npm_package_contributors_6_url': 'https://github.com/vincentcr', 'npm_config_rollback': 'true', 'npm_package_repository_url': 'git://github.com/ncb000gt/node.bcrypt.js.git', 'npm_package_contributors_5_url': 'https://github.com/alfredwesterveld', 'HOME': '/root', 'DISPLAY': ':0', 'LANG': 'en_CA.UTF-8', 'npm_config_save': '', 'npm_config_registry': 'https://registry.npmjs.org/', 'npm_config_unicode': 'true', 'npm_config_production': '', 'npm_config_message': '%s', 'npm_config_always_auth': '', '_': '/usr/bin/npm', 'npm_package_contributors_8_url': 'https://github.com/shtylman', 'npm_config_searchexclude': '', 'npm_config_loglevel': 'http', 'USERNAME': 'root', 'npm_package_devDependencies_nodeunit': '>=0.6.4', 'npm_package_scripts_test': 'make test', 'SUDO_COMMAND': '/bin/su', 'npm_config_strict_ssl': 'true', 'npm_package_keywords_2': 'auth', 'npm_package_keywords_3': 'authentication', 'npm_package_keywords_0': 'bcrypt', 'npm_package_keywords_1': 'password', 'npm_package_keywords_6': 'crypto', 'npm_package_keywords_4': 'encryption', 'npm_package_keywords_5': 'crypt', 'npm_package_contributors_2_name': 'David Trejo', 'npm_package_contributors_5_email': 'alfredwesterveld@gmail.com', 'npm_config_tag': 'latest', 'npm_package_licenses_0_type': 'MIT', 'SUDO_GID': '1000', 'LESSCLOSE': '/usr/bin/lesspipe %s %s', 'npm_package_contributors_3_url': 'https://github.com/pixelglow', 'LC_COLLATE': 'en_CA.UTF-8', 'npm_config_globalignorefile': '/etc/npmignore', 'MAKELEVEL': '1', 'npm_config_npaturl': 'http://npat.npmjs.org/', 'npm_package_bugs_url': 'http://github.com/ncb000gt/node.bcrypt.js/issues', 'npm_package_contributors_0_email': 'savedfastcool@gmail.com', 'npm_package_contributors_9_name': 'Vadim Graboys', 'LOGNAME': 'root', 'npm_config_user': '1000', 'npm_config_link': '', 'npm_package_contributors_9_url': 'https://github.com/vadimg', 'npm_package_name': 'bcrypt', 'npm_config_userconfig': '/root/.npmrc', 'npm_package_scripts_install': 'make build', 'npm_config_dev': '', 'npm_package_contributors_10_name': 'Ben Noorduis', 'npm_config_rebuild_bundle': 'true', 'npm_config_version': '', 'npm_config_username': '', 'npm_package_contributors_6_name': 'Vincent C\xc3\xb4t\xc3\xa9-Roy', 'PATH': '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt/node_modules/.bin:/home/mbouchard/Sites/userauth/lib/node_modules/.bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games', 'npm_package_contributors_5_name': 'Alfred Westerveld', 'npm_config_coverage': '', 'npm_config_proprietary_attribs': 'true', 'XDG_SESSION_COOKIE': '403de9e08e21aa3272cdca9500000003-1337175106.31503-1377833558', 'npm_config_onload_script': '', 'npm_config_description': 'true', 'npm_package_contributors_8_name': 'Roman Shtylman', 'npm_config_bindist': '0.6-ares1.7.5-evundefined-openssl1.0.1-v83.7.12.22-linux-x64-3.2.0-24-generic', 'MAKEFLAGS': '', 'npm_config___DO_NOT_MODIFY_THIS_FILE___use__etc_npmrc_instead_': 'true', 'npm_config_viewer': 'man', 'npm_config_showlevel': '2', 'npm_config_unsafe_perm': '', 'npm_package_contributors_4_url': 'https://github.com/newitfarmer', 'SUDO_UID': '1000', 'TERM': 'xterm', 'npm_package_version': '0.5.0', 'npm_config_https_proxy': '', 'npm_config_node_version': '0.6.12', 'npm_config_init_author_email': '', 'npm_package_contributors_2_url': 'https://github.com/dtrejo', 'npm_package_contributors_3_email': 'glen.low@pixelglow.com', 'OLDPWD': '/home/mbouchard/Sites/userauth', 'npm_config_outfd': '1', 'npm_config_bin_publish': '', 'PWD': '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt', 'npm_package_contributors_9_email': 'dimva13@gmail.com'}
-files = []
-hash = 0
-options = {'compile_targets': None, 'force': False, 'verbose': 0, 'nocache': False, 'progress_bar': 0, 'destdir': '', 'keep': False, 'zones': '', 'blddir': '', 'prefix': '/usr/local/', 'jobs': 8, 'srcdir': '', 'check_cxx_compiler': 'g++ icpc sunc++', 'check_c_compiler': 'gcc icc suncc'}
-srcdir = '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt'
View
5 public/node_modules/bcrypt/.npmignore
@@ -1,5 +0,0 @@
-.lock*
-build
-*.node
-*.sw[a-z]
-node_modules
View
6 public/node_modules/bcrypt/.travis.yml
@@ -1,6 +0,0 @@
-language: node_js
-node_js:
- - 0.6
-notifications:
- email:
- on_success: never
View
45 public/node_modules/bcrypt/CHANGELOG
@@ -1,45 +0,0 @@
-v0.5.0
-* Fix for issue around empty string params throwing Errors.
-* Method deprecation.
-* Upgrade from libeio/ev to libuv. (shtylman)
-* EV_MULTIPLICITY compile flag.
-
-v0.4.1
-* Thread safety fix around OpenSSL (GH-32). (bnoordhuis - through node)
-* C++ code changes using delete and new instead of malloc and free. (shtylman)
-* Compile options for speed, zoom. (shtylman)
-* Move much of the type and variable checking to the JS. (shtylman)
-
-v0.4.0
-* Added getRounds function that will tell you the number of rounds within a hash/salt
-
-v0.3.2
-* Fix api issue with async salt gen first param
-
-v0.3.1
-* Compile under node 0.5.x
-
-v0.3.0
-* Internal Refactoring
-* Remove pthread dependencies and locking
-* Fix compiler warnings and a memory bug
-
-v0.2.4
-* Use threadsafe functions instead of pthread mutexes
-* salt validation to make sure the salt is of the correct size and format
-
-v0.2.3
-* cygwin support
-
-v0.2.2
-* Remove dependency on libbsd, use libssl instead
-
-v0.2.0
-* Added async functionality
-* API changes
- * hashpw -> encrypt
- * all old sync methods now end with _sync
-* Removed libbsd(arc4random) dependency...now uses openssl which is more widely spread
-
-v0.1.2
-* Security fix. Wasn't reading rounds in properly and was always only using 4 rounds
View
19 public/node_modules/bcrypt/LICENSE
@@ -1,19 +0,0 @@
-Copyright (c) 2010 Nicholas Campbell
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in
-all copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-THE SOFTWARE.
View
22 public/node_modules/bcrypt/Makefile
@@ -1,22 +0,0 @@
-TESTS = test/*.js
-
-all: test
-
-build: clean configure compile
-
-configure:
- node-waf configure
-
-compile: configure
- node-waf build
-
-test: build
- @./node_modules/nodeunit/bin/nodeunit \
- $(TESTS)
-
-clean:
- rm -f bcrypt_lib.node
- rm -Rf build
-
-
-.PHONY: clean test build
View
177 public/node_modules/bcrypt/README.md
@@ -1,177 +0,0 @@
-node.bcrypt.js
-=============
-
-[![Build Status](https://secure.travis-ci.org/ncb000gt/node.bcrypt.js.png)](http://travis-ci.org/#!/ncb000gt/node.bcrypt.js)
-
-Lib to help you hash passwords.
-[bcrypt on wikipedia][bcryptwiki]
-
-Catalyst for this module: [How To Safely Store A Password][codahale]
-
-
-Security Issues/Concerns
-=============
-
-As should be the case with any security tool, this library should be scrutinized by anyone using it. If you find or suspect an issue with the code- please bring it to my attention and I'll spend some time trying to make sure that this tool is as secure as possible.
-
-To make it easier for people using this tool to analyze what has been surveyed, here is a list of BCrypt related security issues/concerns as they've come up.
-
-* An [issue with passwords][jtr] was found with a version of the Blowfish algorithm developed for John the Ripper. This is not present in the OpenBSD version and is thus not a problem for this module. HT [zooko][zooko].
-
-Dependencies
-=============
-
-* NodeJS
-* OpenSSL
-
-From NPM
-============
-
-npm install bcrypt
-
-
-From Source
-============
-
-Assuming you've already built node, you can run the waf script:
-
- node-waf configure
- node-waf build
- npm link
-
-Usage - Sync
-============
-
-To hash a password:
-
- var bcrypt = require('bcrypt');
- var salt = bcrypt.genSaltSync(10);
- var hash = bcrypt.encryptSync("B4c0/\/", salt);
- // Store hash in your password DB.
-
-To check a password:
-
- // Load hash from your password DB.
- bcrypt.compareSync("B4c0/\/", hash); // true
- bcrypt.compareSync("not_bacon", hash); // false
-
-Usage - Async
-============
-
-To hash a password:
-
- var bcrypt = require('bcrypt');
- bcrypt.genSalt(10, function(err, salt) {
- bcrypt.hash("B4c0/\/", salt, function(err, hash) {
- // Store hash in your password DB.
- });
- });
-
-To check a password:
-
- // Load hash from your password DB.
- bcrypt.compare("B4c0/\/", hash, function(err, res) {
- // res == true
- });
- bcrypt.compare("not_bacon", hash, function(err, res) {
- // res = false
- });
-
-API
-============
-
-`BCrypt.`
-
- * `genSaltSync(rounds, seed_length)`
- * `rounds` - [OPTIONAL] - the number of rounds to process the data for. (default - 10)
- * `seed_length` - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20)
- * `genSalt(rounds, seed_length, cb)`
- * `rounds` - [OPTIONAL] - the number of rounds to process the data for. (default - 10)
- * `seed_length` - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20)
- * `cb` - [REQUIRED] - a callback to be fired once the salt has been generated. uses eio making it asynchronous.
- * `err` - First parameter to the callback detailing any errors.
- * `salt` - Second parameter to the callback providing the generated salt.
- * `hashSync(data, salt)`
- * `data` - [REQUIRED] - the data to be encrypted.
- * `salt` - [REQUIRED] - the salt to be used in encryption.
- * `hash(data, salt, cb)`
- * `data` - [REQUIRED] - the data to be encrypted.
- * `salt` - [REQUIRED] - the salt to be used in encryption.
- * `cb` - [REQUIRED] - a callback to be fired once the data has been encrypted. uses eio making it asynchronous.
- * `err` - First parameter to the callback detailing any errors.
- * `encrypted` - Second parameter to the callback providing the encrypted form.
- * `compareSync(data, encrypted)`
- * `data` - [REQUIRED] - data to compare.
- * `encrypted` - [REQUIRED] - data to be compared to.
- * `compare(data, encrypted, cb)`
- * `data` - [REQUIRED] - data to compare.
- * `encrypted` - [REQUIRED] - data to be compared to.
- * `cb` - [REQUIRED] - a callback to be fired once the data has been compared. uses eio making it asynchronous.
- * `err` - First parameter to the callback detailing any errors.
- * `same` - Second parameter to the callback providing whether the data and encrypted forms match [true | false].
- * `getRounds(encrypted)` - return the number of rounds used to encrypt a given hash
- * `encrypted` - [REQUIRED] - hash from which the number of rounds used should be extracted.
-
-
-Hash Info
-============
-
-The characters that comprise the resultant hash are `./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$`.
-
-Testing
-============
-
-I am using nodeunit. I like the way you write tests with it and I like the default output. As such you'll need it to run the tests. I suspect my tests would run on an older version, but these were written and worked against 0.5.1
-
- npm install nodeunit@0.5.1
- nodeunit test/
-
-Credits
-============
-
-The code for this comes from a few sources:
-
-* blowfish.cc - OpenBSD
-* bcrypt.cc - OpenBSD
-* bcrypt::gen_salt - [gen_salt inclusion to bcrypt][bcryptgs]
-* bcrypt_node.cc - me
-
-Contributors
-============
-
-* [Antonio Salazar Cardozo][shadowfiend] - Early MacOS X support (when we used libbsd)
-* [Ben Glow][pixelglow] - Fixes for thread safety with async calls
-* [Van Nguyen][thegoleffect] - Found a timing attack in the comparator
-* [NewITFarmer][newitfarmer] - Initial Cygwin support
-* [David Trejo][dtrejo] - packaging fixes
-* [Alfred Westerveld][alfredwesterveld] - packaging fixes
-* [Vincent Côté-Roy][vincentr] - Testing around concurrency issues
-* [Lloyd Hilaiel][lloyd] - Documentation fixes
-* [Roman Shtylman][shtylman] - Code refactoring, general rot reduction, compile options, better memory management with delete and new, and an upgrade to libuv over eio/ev.
-* [Vadim Graboys][vadimg] - Code changes to support 0.5.5+
-* [Ben Noordhuis][bnoordhuis] - Fixed a thread safety issue in nodejs that was perfectly mappable to this module.
-
-License
-============
-
-Unless stated elsewhere, file headers or otherwise, the license as stated in the LICENSE file.
-
-
-
-[bcryptwiki]: http://en.wikipedia.org/wiki/Crypt_(Unix)#Blowfish-based_scheme
-[bcryptgs]: http://mail-index.netbsd.org/tech-crypto/2002/05/24/msg000204.html
-[codahale]: http://codahale.com/how-to-safely-store-a-password/
-[gh13]: https://github.com/ncb000gt/node.bcrypt.js/issues/13
-[jtr]: http://www.openwall.com/lists/oss-security/2011/06/20/2
-
-[shadowfiend]:https://github.com/Shadowfiend
-[thegoleffect]:https://github.com/thegoleffect
-[pixelglow]:https://github.com/pixelglow
-[dtrejo]:https://github.com/dtrejo
-[alfredwesterveld]:https://github.com/alfredwesterveld
-[newitfarmer]:https://github.com/newitfarmer
-[zooko]:https://twitter.com/zooko
-[vincentr]:https://twitter.com/vincentcr
-[lloyd]:https://github.com/lloyd
-[shtylman]:https://github.com/shtylman
-[vadimg]:https://github.com/vadimg
View
184 public/node_modules/bcrypt/bcrypt.js
@@ -1,184 +0,0 @@
-try {
- var bindings = require('./build/default/bcrypt_lib');
-} catch(e) {
- //update for v0.5.5+
- var bindings = require('./build/Release/bcrypt_lib');
-}
-
-/// generate a salt (sync)
-/// @param {Number} [rounds] number of rounds (default 10)
-/// @param {Number} [seed_length] number of random bytes (default 20)
-/// @return {String} salt
-module.exports.gen_salt_sync = function(rounds, seed_length) {
- console.log("DEPRECATION WARNING: `gen_salt_sync` has been deprecated. Please use `genSaltSync` instead.");
-
- return module.exports.genSaltSync(rounds, seed_length);
-}
-
-module.exports.genSaltSync = function(rounds, seed_length) {
- // default 10 rounds
- if (!rounds) {
- rounds = 10;
- } else if (typeof rounds !== 'number') {
- throw new Error('rounds must be a number');
- }
-
- // default length 20
- if (!seed_length) {
- seed_length = 20;
- } else if (typeof seed_length !== 'number') {
- throw new Error('seed_length must be a number');
- }
-
- return bindings.gen_salt_sync(rounds, seed_length);
-};
-
-/// generate a salt
-/// @param {Number} [rounds] number of rounds (default 10)
-/// @param {Number} [seed_length] number of random bytes (default 20)
-/// @param {Function} cb callback(err, salt)
-module.exports.gen_salt = function(rounds, seed_length, cb) {
- console.log("DEPRECATION WARNING: `gen_salt` has been deprecated. Please use `genSalt` instead.");
-
- return module.exports.genSalt(rounds, seed_length, cb);
-}
-
-module.exports.genSalt = function(rounds, seed_length, cb) {
- // if callback is first argument, then use defaults for others
- if (typeof arguments[0] === 'function') {
- // have to set callback first otherwise arguments are overriden
- cb = arguments[0];
- rounds = 10;
- seed_length = 20;
- // callback is second argument
- } else if (typeof arguments[1] === 'function') {
- // have to set callback first otherwise arguments are overriden
- cb = arguments[1];
- seed_length = 20;
- }
-
- // default 10 rounds
- if (!rounds) {
- rounds = 10;
- } else if (typeof rounds !== 'number') {
- throw new Error('rounds must be a number');
- }
-
- // default length 20
- if (!seed_length) {
- seed_length = 20;
- } else if (typeof seed_length !== 'number') {
- throw new Error('seed_length must be a number');
- }
-
- if (!cb) {
- throw new Error('callback required for gen_salt');
- }
-
- return bindings.gen_salt(rounds, seed_length, cb);
-};
-
-/// hash data using a salt
-/// @param {String} data the data to encrypt
-/// @param {String} salt the salt to use when hashing
-/// @return {String} hash
-module.exports.encrypt_sync = function(data, salt) {
- console.log("DEPRECATION WARNING: `encrypt_sync` has been deprecated. Please use `hashSync` instead.");
-
- return module.exports.hashSync(data, salt);
-}
-
-module.exports.hashSync = function(data, salt) {
- if (data == null || data == undefined || salt == null || salt == undefined) {
- throw new Error('data and salt arguments required');
- } else if (typeof data !== 'string' || typeof salt !== 'string') {
- throw new Error('data and salt must be strings');
- }
-
- return bindings.encrypt_sync(data, salt);
-};
-
-/// hash data using a salt
-/// @param {String} data the data to encrypt
-/// @param {String} salt the salt to use when hashing
-/// @param {Function} cb callback(err, hash)
-module.exports.encrypt = function(data, salt, cb) {
- console.log("DEPRECATION WARNING: `encrypt` has been deprecated. Please use `hash` instead.");
-
- return module.exports.hash(data, salt, cb);
-}
-
-module.exports.hash = function(data, salt, cb) {
- if (data == null || data == undefined || salt == null || salt == undefined) {
- throw new Error('data and salt arguments required');
- } else if (typeof data !== 'string' || typeof salt !== 'string') {
- throw new Error('data and salt must be strings');
- }
-
- if (!cb) {
- throw new Error('callback required for async compare');
- } else if (typeof cb !== 'function') {
- throw new Error('callback must be a function');
- }
-
- return bindings.encrypt(data, salt, cb);
-};
-
-/// compare raw data to hash
-/// @param {String} data the data to hash and compare
-/// @param {String} hash expected hash
-/// @return {bool} true if hashed data matches hash
-module.exports.compare_sync = function(data, hash) {
- console.log("DEPRECATION WARNING: `compare_sync` has been deprecated. Please use `compareSync` instead.");
-
- return module.exports.compareSync(data, hash);
-}
-
-module.exports.compareSync = function(data, hash) {
- if (data == null || data == undefined || hash == null || hash == undefined) {
- throw new Error('data and hash arguments required');
- } else if (typeof data !== 'string' || typeof hash !== 'string') {
- throw new Error('data and hash must be strings');
- }
-
- return bindings.compare_sync(data, hash);
-};
-
-/// compare raw data to hash
-/// @param {String} data the data to hash and compare
-/// @param {String} hash expected hash
-/// @param {Function} cb callback(err, matched) - matched is true if hashed data matches hash
-module.exports.compare = function(data, hash, cb) {
- if (data == null || data == undefined || hash == null || hash == undefined) {
- throw new Error('data and hash arguments required');
- } else if (typeof data !== 'string' || typeof hash !== 'string') {
- throw new Error('data and hash must be strings');
- }
-
- if (!cb) {
- throw new Error('callback required for async compare');
- } else if (typeof cb !== 'function') {
- throw new Error('callback must be a function');
- }
-
- return bindings.compare(data, hash, cb);
-};
-
-/// @param {String} hash extract rounds from this hash
-/// @return {Number} the number of rounds used to encrypt a given hash
-module.exports.get_rounds = function(hash) {
- console.log("DEPRECATION WARNING: `get_rounds` has been deprecated. Please use `getRounds` instead.");
-
- return module.exports.getRounds(hash);
-}
-
-module.exports.getRounds = function(hash) {
- if (hash == null || hash == undefined) {
- throw new Error('hash argument required');
- } else if (typeof hash !== 'string') {
- throw new Error('hash must be a string');
- }
-
- return bindings.get_rounds(hash);
-};
-
View
7 public/node_modules/bcrypt/build/.conf_check_0/test.cpp
@@ -1,7 +0,0 @@
-#include <openssl/rand.h>
-
- int main() {
- void *p;
- p=(void*)(RAND_bytes);
- return 0;
-}
View
BIN  public/node_modules/bcrypt/build/.conf_check_0/testbuild/.wafpickle-7
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/.conf_check_0/testbuild/Release/test_1.o
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/.wafpickle-7
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/Release/bcrypt_lib.node
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/Release/src/bcrypt_1.o
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/Release/src/bcrypt_node_1.o
Binary file not shown
View
BIN  public/node_modules/bcrypt/build/Release/src/blowfish_1.o
Binary file not shown
View
63 public/node_modules/bcrypt/build/c4che/Release.cache.py
@@ -1,63 +0,0 @@
-AR = '/usr/bin/ar'
-ARFLAGS = 'rcs'
-CC = ['/usr/bin/gcc']
-CCDEFINES_ST = '-D%s'
-CCFLAGS = ['-g']
-CCFLAGS_DEBUG = ['-g']
-CCFLAGS_MACBUNDLE = ['-fPIC']
-CCFLAGS_NODE = ['-D_LARGEFILE_SOURCE', '-D_FILE_OFFSET_BITS=64']
-CCFLAGS_RELEASE = ['-O2']
-CCLNK_SRC_F = ''
-CCLNK_TGT_F = ['-o', '']
-CC_NAME = 'gcc'
-CC_SRC_F = ''
-CC_TGT_F = ['-c', '-o', '']
-CC_VERSION = ('4', '6', '3')
-COMPILER_CC = 'gcc'
-COMPILER_CXX = 'g++'
-CPP = '/usr/bin/cpp'
-CPPFLAGS_NODE = ['-D_GNU_SOURCE']
-CPPPATH_NODE = '/usr/include/nodejs'
-CPPPATH_ST = '-I%s'
-CXX = ['/usr/bin/g++']
-CXXDEFINES_ST = '-D%s'
-CXXFLAGS = ['-g']
-CXXFLAGS_DEBUG = ['-g']
-CXXFLAGS_NODE = ['-D_LARGEFILE_SOURCE', '-D_FILE_OFFSET_BITS=64']
-CXXFLAGS_RELEASE = ['-O2']
-CXXLNK_SRC_F = ''
-CXXLNK_TGT_F = ['-o', '']
-CXX_NAME = 'gcc'
-CXX_SRC_F = ''
-CXX_TGT_F = ['-c', '-o', '']
-DEST_BINFMT = 'elf'
-DEST_CPU = 'x86_64'
-DEST_OS = 'linux'
-FULLSTATIC_MARKER = '-static'
-HAVE_RAND_BYTES = ()
-LIBDIR = '/root/.node_libraries'
-LIBPATH_NODE = '/usr/lib'
-LIBPATH_ST = '-L%s'
-LIB_ST = '-l%s'
-LINKFLAGS_MACBUNDLE = ['-bundle', '-undefined', 'dynamic_lookup']
-LINK_CC = ['/usr/bin/gcc']
-LINK_CXX = ['/usr/bin/g++']
-NODE_PATH = '/root/.node_libraries'
-PREFIX = '/usr/local'
-PREFIX_NODE = '/usr'
-RANLIB = '/usr/bin/ranlib'
-RPATH_ST = '-Wl,-rpath,%s'
-SHLIB_MARKER = '-Wl,-Bdynamic'
-SONAME_ST = '-Wl,-h,%s'
-STATICLIBPATH_ST = '-L%s'
-STATICLIB_MARKER = '-Wl,-Bstatic'
-STATICLIB_ST = '-l%s'
-defines = {'HAVE_RAND_BYTES': ()}
-macbundle_PATTERN = '%s.bundle'
-program_PATTERN = '%s'
-shlib_CCFLAGS = ['-fPIC', '-DPIC']
-shlib_CXXFLAGS = ['-fPIC', '-DPIC']
-shlib_LINKFLAGS = ['-shared']
-shlib_PATTERN = 'lib%s.so'
-staticlib_LINKFLAGS = ['-Wl,-Bstatic']
-staticlib_PATTERN = 'lib%s.a'
View
2  public/node_modules/bcrypt/build/c4che/build.config.py
@@ -1,2 +0,0 @@
-version = 0x105016
-tools = [{'tool': 'ar', 'tooldir': None, 'funs': None}, {'tool': 'cxx', 'tooldir': None, 'funs': None}, {'tool': 'gxx', 'tooldir': None, 'funs': None}, {'tool': 'compiler_cxx', 'tooldir': None, 'funs': None}, {'tool': 'cc', 'tooldir': None, 'funs': None}, {'tool': 'gcc', 'tooldir': None, 'funs': None}, {'tool': 'compiler_cc', 'tooldir': None, 'funs': None}, {'tool': 'node_addon', 'tooldir': None, 'funs': None}]
View
66 public/node_modules/bcrypt/build/config.log
@@ -1,66 +0,0 @@
-# project noname (0.0.1) configured on Wed May 16 09:35:14 2012 by
-# waf 1.5.16 (abi 7, python 20703f0 on linux2)
-# using /usr/bin/node-waf configure
-#
-
-----------------------------------------
-Checking for program g++ or c++
- find program=['g++', 'c++'] paths=[] var='CXX'
- -> '/usr/bin/g++'
-
-----------------------------------------
-Checking for program cpp
- find program=['cpp'] paths=[] var='CPP'
- -> '/usr/bin/cpp'
-
-----------------------------------------
-Checking for program ar
- find program=['ar'] paths=[] var='AR'
- -> '/usr/bin/ar'
-
-----------------------------------------
-Checking for program ranlib
- find program=['ranlib'] paths=[] var='RANLIB'
- -> '/usr/bin/ranlib'
-
-----------------------------------------
-Checking for g++
-ok
-
-----------------------------------------
-Checking for program gcc or cc
- find program=['gcc', 'cc'] paths=[] var='CC'
- -> '/usr/bin/gcc'
-
-----------------------------------------
-Checking for gcc
-ok
-
-----------------------------------------
-Checking for node path
-not found
-
-----------------------------------------
-Checking for node prefix
-ok /usr
-
-----------------------------------------
-Checking for function RAND_bytes
-==>
-#include <openssl/rand.h>
-
- int main() {
- void *p;
- p=(void*)(RAND_bytes);
- return 0;
-}
-
-<==
-[1/2] cxx: build/.conf_check_0/test.cpp -> build/.conf_check_0/testbuild/Release/test_1.o
-['/usr/bin/g++', '-g', '-I/usr/sfw/lib', '-I/opt/local/includes', '-I/usr/local/includes', '-I/usr/includes', '-I/usr/include', '../test.cpp', '-c', '-o', 'Release/test_1.o']
-[2/2] cxx_link: build/.conf_check_0/testbuild/Release/test_1.o -> build/.conf_check_0/testbuild/Release/testprog
-Release/test_1.o: In function `main':
-/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt/build/.conf_check_0/testbuild/../test.cpp:5: undefined reference to `RAND_bytes'
-collect2: ld returned 1 exit status
-['/usr/bin/g++', 'Release/test_1.o', '-o', '/home/mbouchard/Sites/userauth/lib/node_modules/bcrypt/build/.conf_check_0/testbuild/Release/testprog', '-L/lib', '-L/usr/lib', '-L/usr/local/lib', '-L/opt/local/lib', '-L/usr/sfw/lib', '-Wl,-Bdynamic', '-lssl']
-command returned 'Build failed: -> task failed (err #1): \n\t{task: cxx_link test_1.o -> testprog}'not found
View
21 public/node_modules/bcrypt/examples/async_compare.js
@@ -1,21 +0,0 @@
-var bcrypt = require('../bcrypt');
-
-var start = Date.now();
-bcrypt.gen_salt(10, function(err, salt) {
- console.log('salt: ' + salt);
- console.log('salt cb end: ' + (Date.now() - start) + 'ms');
- bcrypt.encrypt('test', salt, function(err, crypted) {
- console.log('crypted: ' + crypted);
- console.log('crypted cb end: ' + (Date.now() - start) + 'ms');
- console.log('rounds used from hash:', bcrypt.get_rounds(crypted));
- bcrypt.compare('test', crypted, function(err, res) {
- console.log('compared true: ' + res);
- console.log('compared true cb end: ' + (Date.now() - start) + 'ms');
- });
- bcrypt.compare('bacon', crypted, function(err, res) {
- console.log('compared false: ' + res);
- console.log('compared false cb end: ' + (Date.now() - start) + 'ms');
- });
- });
-})
-console.log('end: ' + (Date.now() - start) + 'ms');
View
7 public/node_modules/bcrypt/examples/forever_gen_salt.js
@@ -1,7 +0,0 @@
-var bcrypt = require('../bcrypt');
-
-while (true) {
- bcrypt.gen_salt(10, function(err, salt) {
- console.log('salt: ' + salt);
- });
-}
View
104 public/node_modules/bcrypt/package.json
@@ -1,104 +0,0 @@
-{
- "name": "bcrypt",
- "description": "A bcrypt library for NodeJS.",
- "keywords": [
- "bcrypt",
- "password",
- "auth",
- "authentication",
- "encryption",
- "crypt",
- "crypto"
- ],
- "main": "./bcrypt",
- "version": "0.5.0",
- "author": {
- "name": "Nick Campbell",
- "url": "http://github.com/ncb000gt"
- },
- "engines": {
- "node": ">= 0.6.0"
- },
- "repository": {
- "type": "git",
- "url": "git://github.com/ncb000gt/node.bcrypt.js.git"
- },
- "licenses": [
- {
- "type": "MIT"
- }
- ],
- "bugs": {
- "url": "http://github.com/ncb000gt/node.bcrypt.js/issues"
- },
- "scripts": {
- "install": "make build",
- "test": "make test"
- },
- "devDependencies": {
- "nodeunit": ">=0.6.4"
- },
- "contributors": [
- {
- "name": "Antonio Salazar Cardozo",
- "email": "savedfastcool@gmail.com",
- "url": "https://github.com/Shadowfiend"
- },
- {
- "name": "Van Nguyen",
- "email": "the.gol.effect@gmail.com",
- "url": "https://github.com/thegoleffect"
- },
- {
- "name": "David Trejo",
- "email": "david@dtrejo.com",
- "url": "https://github.com/dtrejo"
- },
- {
- "name": "Ben Glow",
- "email": "glen.low@pixelglow.com",
- "url": "https://github.com/pixelglow"
- },
- {
- "name": "NewITFarmer.com",
- "url": "https://github.com/newitfarmer"
- },
- {
- "name": "Alfred Westerveld",
- "email": "alfredwesterveld@gmail.com",
- "url": "https://github.com/alfredwesterveld"
- },
- {
- "name": "Vincent Côté-Roy",
- "email": "vincentcr@gmail.com",
- "url": "https://github.com/vincentcr"
- },
- {
- "name": "Lloyd Hilaiel",
- "email": "lloyd@hilaiel.com",
- "url": "https://github.com/lloyd"
- },
- {
- "name": "Roman Shtylman",
- "email": "shtylman@gmail.com",
- "url": "https://github.com/shtylman"
- },
- {
- "name": "Vadim Graboys",
- "email": "dimva13@gmail.com",
- "url": "https://github.com/vadimg"
- },
- {
- "name": "Ben Noorduis",
- "url": "https://github.com/bnoordhuis"
- }
- ],
- "_id": "bcrypt@0.5.0",
- "dependencies": {},
- "optionalDependencies": {},
- "_engineSupported": true,
- "_npmVersion": "1.1.4",
- "_nodeVersion": "v0.6.12",
- "_defaultsLoaded": true,
- "_from": "bcrypt"
-}
View
319 public/node_modules/bcrypt/src/bcrypt.cc
@@ -1,319 +0,0 @@
-/* $OpenBSD: bcrypt.c,v 1.24 2008/04/02 19:54:05 millert Exp $ */
-
-/*
- * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. All advertising materials mentioning features or use of this software
- * must display the following acknowledgement:
- * This product includes software developed by Niels Provos.
- * 4. The name of the author may not be used to endorse or promote products
- * derived from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-/* This password hashing algorithm was designed by David Mazieres
- * <dm@lcs.mit.edu> and works as follows:
- *
- * 1. state := InitState ()
- * 2. state := ExpandKey (state, salt, password) 3.
- * REPEAT rounds:
- * state := ExpandKey (state, 0, salt)
- * state := ExpandKey(state, 0, password)
- * 4. ctext := "OrpheanBeholderScryDoubt"
- * 5. REPEAT 64:
- * ctext := Encrypt_ECB (state, ctext);
- * 6. RETURN Concatenate (salt, ctext);
- *
- */
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <sys/types.h>
-#include <string.h>
-#include <pwd.h>
-#include "node_blf.h"
-
-//#if !defined(__APPLE__) && !defined(__MACH__)
-//#include "bsd/stdlib.h"
-//#endif
-
-/* This implementation is adaptable to current computing power.
- * You can have up to 2^31 rounds which should be enough for some
- * time to come.
- */
-
-/*char *bcrypt(const char *, const char *);
-void encode_salt(char *, u_int8_t *, u_int16_t, u_int8_t);
-char * bcrypt_gensalt(u_int8_t log_rounds);*/
-
-static void encode_base64(u_int8_t *, u_int8_t *, u_int16_t);
-static void decode_base64(u_int8_t *, u_int16_t, u_int8_t *);
-
-const static char* error = ":";
-
-const static u_int8_t Base64Code[] =
-"./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
-
-const static u_int8_t index_64[128] = {
- 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
- 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
- 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
- 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
- 255, 255, 255, 255, 255, 255, 0, 1, 54, 55,
- 56, 57, 58, 59, 60, 61, 62, 63, 255, 255,
- 255, 255, 255, 255, 255, 2, 3, 4, 5, 6,
- 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
- 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27,
- 255, 255, 255, 255, 255, 255, 28, 29, 30,
- 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
- 41, 42, 43, 44, 45, 46, 47, 48, 49, 50,
- 51, 52, 53, 255, 255, 255, 255, 255
-};
-#define CHAR64(c) ( (c) > 127 ? 255 : index_64[(c)])
-
-static void
-decode_base64(u_int8_t *buffer, u_int16_t len, u_int8_t *data)
-{
- u_int8_t *bp = buffer;
- u_int8_t *p = data;
- u_int8_t c1, c2, c3, c4;
- while (bp < buffer + len) {
- c1 = CHAR64(*p);
- c2 = CHAR64(*(p + 1));
-
- /* Invalid data */
- if (c1 == 255 || c2 == 255)
- break;
-
- *bp++ = (c1 << 2) | ((c2 & 0x30) >> 4);
- if (bp >= buffer + len)
- break;
-
- c3 = CHAR64(*(p + 2));
- if (c3 == 255)
- break;
-
- *bp++ = ((c2 & 0x0f) << 4) | ((c3 & 0x3c) >> 2);
- if (bp >= buffer + len)
- break;
-
- c4 = CHAR64(*(p + 3));
- if (c4 == 255)
- break;
- *bp++ = ((c3 & 0x03) << 6) | c4;
-
- p += 4;
- }
-}
-
-void
-encode_salt(char *salt, u_int8_t *csalt, u_int16_t clen, u_int8_t logr)
-{
- salt[0] = '$';
- salt[1] = BCRYPT_VERSION;
- salt[2] = 'a';
- salt[3] = '$';
-
- snprintf(salt + 4, 4, "%2.2u$", logr);
-
- encode_base64((u_int8_t *) salt + 7, csalt, clen);
-}
-
-
-/* Generates a salt for this version of crypt.
- Since versions may change. Keeping this here
- seems sensible.
- from: http://mail-index.netbsd.org/tech-crypto/2002/05/24/msg000204.html
-*/
-void
-bcrypt_gensalt(u_int8_t log_rounds, u_int8_t *seed, char *gsalt)
-{
- if (log_rounds < 4)
- log_rounds = 4;
- else if (log_rounds > 31)
- log_rounds = 31;
-
- encode_salt(gsalt, seed, BCRYPT_MAXSALT, log_rounds);
-}
-
-/* We handle $Vers$log2(NumRounds)$salt+passwd$
- i.e. $2$04$iwouldntknowwhattosayetKdJ6iFtacBqJdKe6aW7ou */
-
-void
-bcrypt(const char *key, const char *salt, char *encrypted)
-{
- blf_ctx state;
- u_int32_t rounds, i, k;
- u_int16_t j;
- u_int8_t key_len, salt_len, logr, minor;
- u_int8_t ciphertext[4 * BCRYPT_BLOCKS+1] = "OrpheanBeholderScryDoubt";
- u_int8_t csalt[BCRYPT_MAXSALT];
- u_int32_t cdata[BCRYPT_BLOCKS];
- int n;
-
- /* Discard "$" identifier */
- salt++;
-
- if (*salt > BCRYPT_VERSION) {
- /* How do I handle errors ? Return ':' */
- strcpy(encrypted, error);
- return;
- }
-
- /* Check for minor versions */
- if (salt[1] != '$') {
- switch (salt[1]) {
- case 'a':
- /* 'ab' should not yield the same as 'abab' */
- minor = salt[1];
- salt++;
- break;
- default:
- strcpy(encrypted, error);
- return;
- }
- } else
- minor = 0;
-
- /* Discard version + "$" identifier */
- salt += 2;
-
- if (salt[2] != '$') {
- /* Out of sync with passwd entry */
- strcpy(encrypted, error);
- return;
- }
-
- /* Computer power doesn't increase linear, 2^x should be fine */
- n = atoi(salt);
- if (n > 31 || n < 0) {
- strcpy(encrypted, error);
- return;
- }
- logr = (u_int8_t)n;
- if ((rounds = (u_int32_t) 1 << logr) < BCRYPT_MINROUNDS) {
- strcpy(encrypted, error);
- return;
- }
-
- /* Discard num rounds + "$" identifier */
- salt += 3;
-
- if (strlen(salt) * 3 / 4 < BCRYPT_MAXSALT) {
- strcpy(encrypted, error);
- return;
- }
-
- /* We dont want the base64 salt but the raw data */
- decode_base64(csalt, BCRYPT_MAXSALT, (u_int8_t *) salt);
- salt_len = BCRYPT_MAXSALT;
- key_len = strlen(key) + (minor >= 'a' ? 1 : 0);
-
-
- /* Setting up S-Boxes and Subkeys */
- Blowfish_initstate(&state);
- Blowfish_expandstate(&state, csalt, salt_len,
- (u_int8_t *) key, key_len);
- for (k = 0; k < rounds; k++) {
- Blowfish_expand0state(&state, (u_int8_t *) key, key_len);
- Blowfish_expand0state(&state, csalt, salt_len);
- }
-
- /* This can be precomputed later */
- j = 0;
- for (i = 0; i < BCRYPT_BLOCKS; i++)
- cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
-
- /* Now do the encryption */
- for (k = 0; k < 64; k++)
- blf_enc(&state, cdata, BCRYPT_BLOCKS / 2);
-
- for (i = 0; i < BCRYPT_BLOCKS; i++) {
- ciphertext[4 * i + 3] = cdata[i] & 0xff;
- cdata[i] = cdata[i] >> 8;
- ciphertext[4 * i + 2] = cdata[i] & 0xff;
- cdata[i] = cdata[i] >> 8;
- ciphertext[4 * i + 1] = cdata[i] & 0xff;
- cdata[i] = cdata[i] >> 8;
- ciphertext[4 * i + 0] = cdata[i] & 0xff;
- }
-
- i = 0;
- encrypted[i++] = '$';
- encrypted[i++] = BCRYPT_VERSION;
- if (minor)
- encrypted[i++] = minor;
- encrypted[i++] = '$';
-
- snprintf(encrypted + i, 4, "%2.2u$", logr);
-
- encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT);
- encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext,
- 4 * BCRYPT_BLOCKS - 1);
- memset(&state, 0, sizeof(state));
- memset(ciphertext, 0, sizeof(ciphertext));
- memset(csalt, 0, sizeof(csalt));
- memset(cdata, 0, sizeof(cdata));
-}
-
-u_int32_t bcrypt_get_rounds(const char * hash)
-{
- /* skip past the leading "$" */
- if (!hash || *(hash++) != '$') return 0;
-
- /* skip past version */
- if (0 == (*hash++)) return 0;
- if (*hash && *hash != '$') hash++;
- if (*hash++ != '$') return 0;
-
- return atoi(hash);
-}
-
-static void
-encode_base64(u_int8_t *buffer, u_int8_t *data, u_int16_t len)
-{
- u_int8_t *bp = buffer;
- u_int8_t *p = data;
- u_int8_t c1, c2;
- while (p < data + len) {
- c1 = *p++;
- *bp++ = Base64Code[(c1 >> 2)];
- c1 = (c1 & 0x03) << 4;
- if (p >= data + len) {
- *bp++ = Base64Code[c1];
- break;
- }
- c2 = *p++;
- c1 |= (c2 >> 4) & 0x0f;
- *bp++ = Base64Code[c1];
- c1 = (c2 & 0x0f) << 2;
- if (p >= data + len) {
- *bp++ = Base64Code[c1];
- break;
- }
- c2 = *p++;
- c1 |= (c2 >> 6) & 0x03;
- *bp++ = Base64Code[c1];
- *bp++ = Base64Code[c2 & 0x3f];
- }
- *bp = '\0';
-}
View
490 public/node_modules/bcrypt/src/bcrypt_node.cc
@@ -1,490 +0,0 @@
-/*
- * Copyright (c) 2010, Nicholas Campbell <nicholas.j.campbell@gmail.com>
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the <ORGANIZATION> nor the names of its
- * contributors may be used to endorse or promote products derived from
- * this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <node.h>
-#include <node_version.h>
-
-#include <string>
-#include <cstring>
-
-#include <openssl/rand.h>
-#include <openssl/crypto.h>
-#include "node_blf.h"
-
-//pulled from node commit - 97cada0
-#ifdef _WIN32
-# include <windows.h>
-#else
-# include <pthread.h>
-#endif
-
-#define NODE_LESS_THAN (!(NODE_VERSION_AT_LEAST(0, 5, 4)))
-
-using namespace v8;
-using namespace node;
-
-#ifdef _WIN32
-
-static HANDLE* locks;
-
-
-static void crypto_lock_init(void) {
- int i, n;
-
- n = CRYPTO_num_locks();
- locks = new HANDLE[n];
-
- for (i = 0; i < n; i++)
- if (!(locks[i] = CreateMutex(NULL, FALSE, NULL)))
- abort();
-}
-
-static void crypto_lock_cb(int mode, int n, const char* file, int line) {
- if (mode & CRYPTO_LOCK)
- WaitForSingleObject(locks[type], INFINITE);
- else
- ReleaseMutex(locks[type]);
-}
-
-static unsigned long crypto_id_cb(void) {
- return (unsigned long) GetCurrentThreadId();
-}
-
-#else /* !_WIN32 */
-
-static pthread_rwlock_t* locks;
-
-static void crypto_lock_init(void) {
- int i, n;
-
- n = CRYPTO_num_locks();
- locks = new pthread_rwlock_t[n];
-
- for (i = 0; i < n; i++)
- if (pthread_rwlock_init(locks + i, NULL))
- abort();
-}
-
-static void crypto_lock_cb(int mode, int n, const char* file, int line) {
- if (mode & CRYPTO_LOCK) {
- if (mode & CRYPTO_READ) pthread_rwlock_rdlock(locks + n);
- if (mode & CRYPTO_WRITE) pthread_rwlock_wrlock(locks + n);
- } else {
- pthread_rwlock_unlock(locks + n);
- }
-}
-
-
-static unsigned long crypto_id_cb(void) {
- return (unsigned long) pthread_self();
-}
-
-#endif /* !_WIN32 */
-
-namespace {
-
-struct baton_base {
- v8::Persistent<v8::Function> callback;
- std::string error;
-
- virtual ~baton_base() {
- callback.Dispose();
- }
-};
-
-struct salt_baton : baton_base {
- std::string salt;
- int rand_len;
- ssize_t rounds;
-};
-
-struct encrypt_baton : baton_base {
- std::string salt;
- std::string input;
- std::string output;
-};
-
-struct compare_baton : baton_base {
- std::string input;
- std::string encrypted;
- bool result;
-};
-
-int GetSeed(uint8_t* seed, int size) {
- switch (RAND_bytes((unsigned char *)seed, size)) {
- case -1:
- case 0:
- switch (RAND_pseudo_bytes(seed, size)) {
- case -1:
- return -1;
- case 0:
- return 0;
- default:
- return 1;
- }
- default:
- return 1;
- }
-}
-
-bool ValidateSalt(const char* salt) {
-
- if (!salt || *salt != '$') {
- return false;
- }
-
- // discard $
- salt++;
-
- if (*salt > BCRYPT_VERSION) {
- return false;
- }
-
- if (salt[1] != '$') {
- switch (salt[1]) {
- case 'a':
- salt++;
- break;
- default:
- return false;
- }
- }
-
- // discard version + $
- salt += 2;
-
- if (salt[2] != '$') {
- return false;
- }
-
- int n = atoi(salt);
- if (n > 31 || n < 0) {
- return false;
- }
-
- if (((uint8_t)1 << (uint8_t)n) < BCRYPT_MINROUNDS) {
- return false;
- }
-
- salt += 3;
- if (strlen(salt) * 3 / 4 < BCRYPT_MAXSALT) {
- return false;
- }
-
- return true;
-}
-
-/* SALT GENERATION */
-void GenSaltAsync(uv_work_t* req) {
-
- salt_baton* baton = static_cast<salt_baton*>(req->data);
-
- char* salt = new char[_SALT_LEN];
- uint8_t* seed = new uint8_t[baton->rand_len];
- switch(GetSeed(seed, baton->rand_len)) {
- case -1:
- baton->error = "Rand operation not supported.";
- case 0:
- baton->error = "Rand operation did not generate a cryptographically sound seed.";
- }
-
- bcrypt_gensalt(baton->rounds, seed, salt);
- baton->salt = std::string(salt);
-
- delete[] salt;
- delete[] seed;
-}
-
-void GenSaltAsyncAfter(uv_work_t* req) {
- HandleScope scope;
-
- salt_baton* baton = static_cast<salt_baton*>(req->data);
- delete req;
-
- Handle<Value> argv[2];
-
- if (!baton->error.empty()) {
- argv[0] = Exception::Error(String::New(baton->error.c_str()));
- argv[1] = Undefined();
- }
- else {
- argv[0] = Undefined();
- argv[1] = Encode(baton->salt.c_str(), baton->salt.size(), BINARY);
- }
-
- TryCatch try_catch; // don't quite see the necessity of this
-
- baton->callback->Call(Context::GetCurrent()->Global(), 2, argv);
-
- if (try_catch.HasCaught())
- FatalException(try_catch);
-
- delete baton;
-}
-
-Handle<Value> GenerateSalt(const Arguments &args) {
- HandleScope scope;
-
- const ssize_t rounds = args[0]->Int32Value();
- const int rand_len = args[1]->Int32Value();
- Local<Function> callback = Local<Function>::Cast(args[2]);
-
- salt_baton* baton = new salt_baton();
-
- baton->callback = Persistent<Function>::New(callback);
- baton->rand_len = rand_len;
- baton->rounds = rounds;
-
- uv_work_t* req = new uv_work_t;
- req->data = baton;
- uv_queue_work(uv_default_loop(), req, GenSaltAsync, GenSaltAsyncAfter);
-
-
- return Undefined();
-}
-
-Handle<Value> GenerateSaltSync(const Arguments& args) {
- HandleScope scope;
-
- const ssize_t rounds = args[0]->Int32Value();
- const int size = args[1]->Int32Value();
-
- uint8_t* seed = new uint8_t[size];
- switch(GetSeed(seed, size)) {
- case -1:
- return ThrowException(Exception::Error(String::New("Rand operation not supported.")));
- case 0:
- return ThrowException(Exception::Error(String::New("Rand operation did not generate a cryptographically sound seed.")));
- }
-
- char salt[_SALT_LEN];
- bcrypt_gensalt(rounds, seed, salt);
- delete[] seed;
-
- return scope.Close(Encode(salt, strlen(salt), BINARY));
-}
-
-/* ENCRYPT DATA - USED TO BE HASHPW */
-void EncryptAsync(uv_work_t* req) {
- encrypt_baton* baton = static_cast<encrypt_baton*>(req->data);
-
- if (!(ValidateSalt(baton->salt.c_str()))) {
- baton->error = "Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue";
- }
-
- char* bcrypted = new char[_PASSWORD_LEN];
- bcrypt(baton->input.c_str(), baton->salt.c_str(), bcrypted);
- baton->output = std::string(bcrypted);
-
- delete[] bcrypted;
-}
-
-void EncryptAsyncAfter(uv_work_t* req) {
- HandleScope scope;
-
- encrypt_baton* baton = static_cast<encrypt_baton*>(req->data);
- delete req;
-
- Handle<Value> argv[2];
-
- if (!baton->error.empty()) {
- argv[0] = Exception::Error(String::New(baton->error.c_str()));
- argv[1] = Undefined();
- }
- else {
- argv[0] = Undefined();
- argv[1] = Encode(baton->output.c_str(), baton->output.size(), BINARY);
- }
-
- TryCatch try_catch; // don't quite see the necessity of this
-
- baton->callback->Call(Context::GetCurrent()->Global(), 2, argv);
-
- if (try_catch.HasCaught())
- FatalException(try_catch);
-
- delete baton;
-}
-
-Handle<Value> Encrypt(const Arguments& args) {
- HandleScope scope;
-
- String::Utf8Value data(args[0]->ToString());
- String::Utf8Value salt(args[1]->ToString());
- Local<Function> callback = Local<Function>::Cast(args[2]);
-
- encrypt_baton* baton = new encrypt_baton();
- baton->callback = Persistent<Function>::New(callback);
- baton->input = std::string(*data);
- baton->salt = std::string(*salt);
-
- uv_work_t* req = new uv_work_t;
- req->data = baton;
- uv_queue_work(uv_default_loop(), req, EncryptAsync, EncryptAsyncAfter);
-
- return Undefined();
-}
-
-Handle<Value> EncryptSync(const Arguments& args) {
- HandleScope scope;
-
- String::Utf8Value data(args[0]->ToString());
- String::Utf8Value salt(args[1]->ToString());
-
- if (!(ValidateSalt(*salt))) {
- return ThrowException(Exception::Error(String::New("Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue")));
- }
-
- char bcrypted[_PASSWORD_LEN];
- bcrypt(*data, *salt, bcrypted);
- return scope.Close(Encode(bcrypted, strlen(bcrypted), BINARY));
-}
-
-/* COMPARATOR */
-bool CompareStrings(const char* s1, const char* s2) {
-
- bool eq = true;
- int s1_len = strlen(s1);
- int s2_len = strlen(s2);
-
- if (s1_len != s2_len) {
- eq = false;
- }
-
- const int max_len = (s2_len < s1_len) ? s1_len : s2_len;
-
- // to prevent timing attacks, should check entire string
- // don't exit after found to be false
- for (int i = 0; i < max_len; ++i) {
- if (s1_len >= i && s2_len >= i && s1[i] != s2[i]) {
- eq = false;
- }
- }
-
- return eq;
-}
-
-void CompareAsync(uv_work_t* req) {
- compare_baton* baton = static_cast<compare_baton*>(req->data);
-
- char bcrypted[_PASSWORD_LEN];
- bcrypt(baton->input.c_str(), baton->encrypted.c_str(), bcrypted);
- baton->result = CompareStrings(bcrypted, baton->encrypted.c_str());
-}
-
-void CompareAsyncAfter(uv_work_t* req) {
- HandleScope scope;
-
- compare_baton* baton = static_cast<compare_baton*>(req->data);
- delete req;
-
- Handle<Value> argv[2];
-
- if (!baton->error.empty()) {
- argv[0] = Exception::Error(String::New(baton->error.c_str()));
- argv[1] = Undefined();
- } else {
- argv[0] = Undefined();
- argv[1] = Boolean::New(baton->result);
- }
-
- TryCatch try_catch; // don't quite see the necessity of this
-
- baton->callback->Call(Context::GetCurrent()->Global(), 2, argv);
-
- if (try_catch.HasCaught())
- FatalException(try_catch);
-
- // done with the baton
- // free the memory and callback
- delete baton;
-}
-
-Handle<Value> Compare(const Arguments& args) {
- HandleScope scope;
-
- String::Utf8Value input(args[0]->ToString());
- String::Utf8Value encrypted(args[1]->ToString());
- Local<Function> callback = Local<Function>::Cast(args[2]);
-
- compare_baton* baton = new compare_baton();
- baton->callback = Persistent<Function>::New(callback);
- baton->input = std::string(*input);
- baton->encrypted = std::string(*encrypted);
-
- uv_work_t* req = new uv_work_t;
- req->data = baton;
- uv_queue_work(uv_default_loop(), req, CompareAsync, CompareAsyncAfter);
-
- return Undefined();
-}
-
-Handle<Value> CompareSync(const Arguments& args) {
- HandleScope scope;
-
- String::Utf8Value pw(args[0]->ToString());
- String::Utf8Value hash(args[1]->ToString());
-
- char bcrypted[_PASSWORD_LEN];
- bcrypt(*pw, *hash, bcrypted);
- return Boolean::New(CompareStrings(bcrypted, *hash));
-}
-
-Handle<Value> GetRounds(const Arguments& args) {
- HandleScope scope;
-
- String::Utf8Value hash(args[0]->ToString());
- u_int32_t rounds;
- if (!(rounds = bcrypt_get_rounds(*hash))) {
- return ThrowException(Exception::Error(String::New("invalid hash provided")));
- }
-
- return Integer::New(rounds);
-}
-
-} // anonymous namespace
-
-// bind the bcrypt module
-extern "C" void init(Handle<Object> target) {
- HandleScope scope;
-
- crypto_lock_init();
- CRYPTO_set_locking_callback(crypto_lock_cb);
- CRYPTO_set_id_callback(crypto_id_cb);
-
- NODE_SET_METHOD(target, "gen_salt_sync", GenerateSaltSync);
- NODE_SET_METHOD(target, "encrypt_sync", EncryptSync);
- NODE_SET_METHOD(target, "compare_sync", CompareSync);
- NODE_SET_METHOD(target, "get_rounds", GetRounds);
- NODE_SET_METHOD(target, "gen_salt", GenerateSalt);
- NODE_SET_METHOD(target, "encrypt", Encrypt);
- NODE_SET_METHOD(target, "compare", Compare);
-};
-
View
686 public/node_modules/bcrypt/src/blowfish.cc
@@ -1,686 +0,0 @@
-/* $OpenBSD: blowfish.c,v 1.18 2004/11/02 17:23:26 hshoexer Exp $ */
-/*
- * Blowfish block cipher for OpenBSD
- * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
- * All rights reserved.
- *
- * Implementation advice by David Mazieres <dm@lcs.mit.edu>.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. All advertising materials mentioning features or use of this software
- * must display the following acknowledgement:
- * This product includes software developed by Niels Provos.
- * 4. The name of the author may not be used to endorse or promote products
- * derived from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-/*
- * This code is derived from section 14.3 and the given source
- * in section V of Applied Cryptography, second edition.
- * Blowfish is an unpatented fast block cipher designed by
- * Bruce Schneier.
- */
-
-#if 0
-#include <stdio.h> /* used for debugging */
-#include <string.h>
-#endif
-
-#include <sys/types.h>
-
-#include "node_blf.h"
-
-#undef inline
-#ifdef __GNUC__
-#define inline __inline
-#else /* !__GNUC__ */
-#define inline
-#endif /* !__GNUC__ */
-
-/* Function for Feistel Networks */
-
-#define F(s, x) ((((s)[ (((x)>>24)&0xFF)] \
- + (s)[0x100 + (((x)>>16)&0xFF)]) \
- ^ (s)[0x200 + (((x)>> 8)&0xFF)]) \
- + (s)[0x300 + ( (x) &0xFF)])
-
-#define BLFRND(s,p,i,j,n) (i ^= F(s,j) ^ (p)[n])
-
-void
-Blowfish_encipher(blf_ctx *c, u_int32_t *xl, u_int32_t *xr)
-{
- u_int32_t Xl;
- u_int32_t Xr;
- u_int32_t *s = c->S[0];
- u_int32_t *p = c->P;
-
- Xl = *xl;
- Xr = *xr;
-
- Xl ^= p[0];
- BLFRND(s, p, Xr, Xl, 1); BLFRND(s, p, Xl, Xr, 2);
- BLFRND(s, p, Xr, Xl, 3); BLFRND(s, p, Xl, Xr, 4);
- BLFRND(s, p, Xr, Xl, 5); BLFRND(s, p, Xl, Xr, 6);
- BLFRND(s, p, Xr, Xl, 7); BLFRND(s, p, Xl, Xr, 8);
- BLFRND(s, p, Xr, Xl, 9); BLFRND(s, p, Xl, Xr, 10);
- BLFRND(s, p, Xr, Xl, 11); BLFRND(s, p, Xl, Xr, 12);
- BLFRND(s, p, Xr, Xl, 13); BLFRND(s, p, Xl, Xr, 14);
- BLFRND(s, p, Xr, Xl, 15); BLFRND(s, p, Xl, Xr, 16);
-
- *xl = Xr ^ p[17];
- *xr = Xl;
-}
-
-void
-Blowfish_decipher(blf_ctx *c, u_int32_t *xl, u_int32_t *xr)
-{
- u_int32_t Xl;
- u_int32_t Xr;
- u_int32_t *s = c->S[0];
- u_int32_t *p = c->P;
-
- Xl = *xl;
- Xr = *xr;
-
- Xl ^= p[17];
- BLFRND(s, p, Xr, Xl, 16); BLFRND(s, p, Xl, Xr, 15);
- BLFRND(s, p, Xr, Xl, 14); BLFRND(s, p, Xl, Xr, 13);
- BLFRND(s, p, Xr, Xl, 12); BLFRND(s, p, Xl, Xr, 11);
- BLFRND(s, p, Xr, Xl, 10); BLFRND(s, p, Xl, Xr, 9);
- BLFRND(s, p, Xr, Xl, 8); BLFRND(s, p, Xl, Xr, 7);
- BLFRND(s, p, Xr, Xl, 6); BLFRND(s, p, Xl, Xr, 5);
- BLFRND(s, p, Xr, Xl, 4); BLFRND(s, p, Xl, Xr, 3);
- BLFRND(s, p, Xr, Xl, 2); BLFRND(s, p, Xl, Xr, 1);
-
- *xl = Xr ^ p[0];
- *xr = Xl;
-}
-
-void
-Blowfish_initstate(blf_ctx *c)
-{
- /* P-box and S-box tables initialized with digits of Pi */
-
- static const blf_ctx initstate =
- { {
- {
- 0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7,
- 0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,
- 0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
- 0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,
- 0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,
- 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
- 0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef,
- 0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e,
- 0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
- 0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,
- 0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce,
- 0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
- 0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e,
- 0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x28958677,
- 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
- 0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032,
- 0xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b88,
- 0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
- 0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e,
- 0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,
- 0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
- 0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98,
- 0xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e88,
- 0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
- 0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,
- 0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d,
- 0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
- 0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7,
- 0xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba,
- 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
- 0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f,
- 0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd09,
- 0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
- 0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb,
- 0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c7279,
- 0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
- 0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab,
- 0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df82,
- 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
- 0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,
- 0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0,
- 0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
- 0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790,
- 0xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e8,
- 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
- 0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0,
- 0xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b7,
- 0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
- 0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad,
- 0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,
- 0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
- 0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9,
- 0x165fa266, 0x80957705, 0x93cc7314, 0x211a1477,
- 0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
- 0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,
- 0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,
- 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
- 0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,
- 0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,
- 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
- 0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,
- 0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
- 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
- 0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a},
- {
- 0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,
- 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
- 0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
- 0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
- 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
- 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
- 0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,
- 0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,
- 0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,
- 0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,
- 0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,
- 0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,
- 0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701,
- 0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,
- 0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
- 0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331,
- 0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,
- 0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,
- 0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e,
- 0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
- 0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,
- 0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2,
- 0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,
- 0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,
- 0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,
- 0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,
- 0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,
- 0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3,
- 0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,
- 0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
- 0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4,
- 0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,
- 0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,
- 0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28,
- 0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
- 0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,
- 0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510,
- 0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,
- 0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,
- 0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,
- 0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,
- 0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,
- 0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8,
- 0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,
- 0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
- 0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696,
- 0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,
- 0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,
- 0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0,
- 0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
- 0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,
- 0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250,
- 0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,
- 0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,
- 0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,
- 0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
- 0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
- 0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,
- 0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
- 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
- 0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,
- 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
- 0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
- 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7},
- {
- 0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
- 0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
- 0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
- 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
- 0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
- 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
- 0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,
- 0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb,
- 0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,
- 0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
- 0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42,
- 0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,
- 0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,
- 0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb,
- 0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
- 0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,
- 0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33,
- 0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,
- 0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,
- 0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,
- 0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,
- 0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,
- 0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b,
- 0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,
- 0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
- 0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728,
- 0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,
- 0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,
- 0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37,
- 0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
- 0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,
- 0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b,
- 0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,
- 0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,
- 0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,
- 0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,
- 0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,
- 0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9,
- 0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,
- 0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
- 0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d,
- 0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,
- 0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,
- 0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61,
- 0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
- 0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,
- 0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2,
- 0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,
- 0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,
- 0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,
- 0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,
- 0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,
- 0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52,
- 0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,
- 0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
- 0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,
- 0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
- 0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
- 0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,
- 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
- 0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
- 0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
- 0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
- 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0},
- {
- 0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,
- 0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
- 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
- 0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
- 0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
- 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
- 0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,
- 0xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee22,
- 0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
- 0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,
- 0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9,
- 0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
- 0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593,
- 0xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b51,
- 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
- 0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c,
- 0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b,
- 0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
- 0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c,
- 0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,
- 0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
- 0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319,
- 0x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb,
- 0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
- 0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,
- 0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32,
- 0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
- 0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166,
- 0xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae,
- 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
- 0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5,
- 0x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f47,
- 0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
- 0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d,
- 0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,
- 0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
- 0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8,
- 0x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd,
- 0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
- 0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,
- 0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38,
- 0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
- 0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c,
- 0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b941525,
- 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
- 0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442,
- 0xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e964,
- 0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
- 0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8,
- 0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,
- 0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
- 0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299,
- 0xf523f357, 0xa6327623, 0x93a83531, 0x56cccd02,
- 0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
- 0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,
- 0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,
- 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
- 0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,
- 0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,
- 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
- 0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,
- 0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
- 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
- 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6}
- },
- {
- 0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344,
- 0xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c89,
- 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
- 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917,
- 0x9216d5d9, 0x8979fb1b
- } };
-
- *c = initstate;
-}
-
-u_int32_t
-Blowfish_stream2word(const u_int8_t *data, u_int16_t databytes,
- u_int16_t *current)
-{
- u_int8_t i;
- u_int16_t j;
- u_int32_t temp;
-
- temp = 0x00000000;
- j = *current;
-
- for (i = 0; i < 4; i++, j++) {
- if (j >= databytes)
- j = 0;
- temp = (temp << 8) | data[j];
- }
-
- *current = j;
- return temp;
-}
-
-void
-Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes)
-{
- u_int16_t i;
- u_int16_t j;
- u_int16_t k;
- u_int32_t temp;
- u_int32_t datal;
- u_int32_t datar;
-
- j = 0;
- for (i = 0; i < BLF_N + 2; i++) {
- /* Extract 4 int8 to 1 int32 from keystream */
- temp = Blowfish_stream2word(key, keybytes, &j);
- c->P[i] = c->P[i] ^ temp;
- }
-
- j = 0;
- datal = 0x00000000;
- datar = 0x00000000;
- for (i = 0; i < BLF_N + 2; i += 2) {
- Blowfish_encipher(c, &datal, &datar);
-
- c->P[i] = datal;
- c->P[i + 1] = datar;
- }
-
- for (i = 0; i < 4; i++) {
- for (k = 0; k < 256; k += 2) {
- Blowfish_encipher(c, &datal, &datar);
-
- c->S[i][k] = datal;
- c->S[i][k + 1] = datar;
- }
- }
-}
-
-
-void
-Blowfish_expandstate(blf_ctx *c, const u_int8_t *data, u_int16_t databytes,
- const u_int8_t *key, u_int16_t keybytes)
-{
- u_int16_t i;
- u_int16_t j;
- u_int16_t k;
- u_int32_t temp;
- u_int32_t datal;
- u_int32_t datar;
-
- j = 0;
- for (i = 0; i < BLF_N + 2; i++) {
- /* Extract 4 int8 to 1 int32 from keystream */
- temp = Blowfish_stream2word(key, keybytes, &j);
- c->P[i] = c->P[i] ^ temp;
- }
-
- j = 0;
- datal = 0x00000000;
- datar = 0x00000000;
- for (i = 0; i < BLF_N + 2; i += 2) {
- datal ^= Blowfish_stream2word(data, databytes, &j);
- datar ^= Blowfish_stream2word(data, databytes, &j);
- Blowfish_encipher(c, &datal, &datar);
-
- c->P[i] = datal;
- c->P[i + 1] = datar;
- }
-
- for (i = 0; i < 4; i++) {
- for (k = 0; k < 256; k += 2) {
- datal ^= Blowfish_stream2word(data, databytes, &j);
- datar ^= Blowfish_stream2word(data, databytes, &j);
- Blowfish_encipher(c, &datal, &datar);
-
- c->S[i][k] = datal;
- c->S[i][k + 1] = datar;
- }
- }
-
-}
-
-void
-blf_key(blf_ctx *c, const u_int8_t *k, u_int16_t len)
-{
- /* Initialize S-boxes and subkeys with Pi */
- Blowfish_initstate(c);
-
- /* Transform S-boxes and subkeys with key */
- Blowfish_expand0state(c, k, len);
-}
-
-void
-blf_enc(blf_ctx *c, u_int32_t *data, u_int16_t blocks)
-{
- u_int32_t *d;
- u_int16_t i;
-
- d = data;
- for (i = 0; i < blocks; i++) {