/
encryption.go
81 lines (73 loc) · 1.92 KB
/
encryption.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package user
import (
"crypto/rand"
"crypto/sha512"
"crypto/subtle"
"encoding/hex"
"errors"
"fmt"
"io"
"strings"
)
const (
pwSaltBytes = 32
pwPasswordBytes = 64
sep = "$"
)
// GeneratePassword Generate a password/token for the user
func GeneratePassword() (string, string, error) {
salt, err := generateSalt()
if err != nil {
return "", "", err
}
password, err := generatePassword()
if err != nil {
return "", "", err
}
passwordHashed := hashPassword(password, salt)
hash := fmt.Sprintf("%s%s%s%s%s", "sha512", sep, salt, sep, passwordHashed)
return password, hash, nil
}
// IsCheckValid return false if hashedVersion of clar is not equals to hash. Hash contains $sha512$salt$passwordHashed$
func IsCheckValid(clear, hashField string) bool {
_, salt, hashedInDB, err := splitHash(hashField)
if err != nil {
fmt.Printf("Invalid Hash field in db : %s\n", err)
return false
}
hashed := hashPassword(clear, salt)
if subtle.ConstantTimeCompare([]byte(hashedInDB), []byte(hashed)) != 1 {
return false
}
return true
}
// splitHash split hash "sha512$salt$hash" to return method, salt, hashedPassword
func splitHash(hashField string) (string, string, string, error) {
s := strings.Split(hashField, sep)
if len(s) != 3 {
return "", "", "", errors.New("Invalid hash")
}
return s[0], s[1], s[2], nil
}
func generateSalt() (string, error) {
salt := make([]byte, pwSaltBytes)
_, err := io.ReadFull(rand.Reader, salt)
if err != nil {
fmt.Printf("GenerateSalt: Error generating salt: %s\n", err)
return "", err
}
return hex.EncodeToString(salt), nil
}
func generatePassword() (string, error) {
password := make([]byte, pwPasswordBytes)
_, err := io.ReadFull(rand.Reader, password)
if err != nil {
return "", err
}
return hex.EncodeToString(password), nil
}
func hashPassword(password, salt string) string {
h := password + salt
s := sha512.Sum512([]byte(h))
return hex.EncodeToString(s[:])
}