mirror of
https://github.com/get-drexa/drive.git
synced 2025-12-01 05:51:39 +00:00
133 lines
2.5 KiB
Go
133 lines
2.5 KiB
Go
|
|
package auth
|
||
|
|
|
||
|
|
import (
|
||
|
|
"crypto/rand"
|
||
|
|
"crypto/subtle"
|
||
|
|
"encoding/base64"
|
||
|
|
"errors"
|
||
|
|
"fmt"
|
||
|
|
"strings"
|
||
|
|
|
||
|
|
"golang.org/x/crypto/argon2"
|
||
|
|
)
|
||
|
|
|
||
|
|
// argon2id parameters
|
||
|
|
const (
|
||
|
|
memory = 64 * 1024
|
||
|
|
iterations = 3
|
||
|
|
parallelism = 2
|
||
|
|
saltLength = 16
|
||
|
|
keyLength = 32
|
||
|
|
)
|
||
|
|
|
||
|
|
var (
|
||
|
|
ErrInvalidHash = errors.New("invalid hash format")
|
||
|
|
ErrIncompatibleHash = errors.New("incompatible hash algorithm")
|
||
|
|
ErrIncompatibleVersion = errors.New("incompatible argon2 version")
|
||
|
|
)
|
||
|
|
|
||
|
|
type argon2Hash struct {
|
||
|
|
memory uint32
|
||
|
|
iterations uint32
|
||
|
|
parallelism uint8
|
||
|
|
salt []byte
|
||
|
|
hash []byte
|
||
|
|
}
|
||
|
|
|
||
|
|
func HashPassword(password string) (string, error) {
|
||
|
|
salt := make([]byte, saltLength)
|
||
|
|
if _, err := rand.Read(salt); err != nil {
|
||
|
|
return "", fmt.Errorf("failed to generate salt: %w", err)
|
||
|
|
}
|
||
|
|
|
||
|
|
hash := argon2.IDKey(
|
||
|
|
[]byte(password),
|
||
|
|
salt,
|
||
|
|
iterations,
|
||
|
|
memory,
|
||
|
|
parallelism,
|
||
|
|
keyLength,
|
||
|
|
)
|
||
|
|
|
||
|
|
b64Salt := base64.RawStdEncoding.EncodeToString(salt)
|
||
|
|
b64Hash := base64.RawStdEncoding.EncodeToString(hash)
|
||
|
|
|
||
|
|
encodedHash := fmt.Sprintf(
|
||
|
|
"$argon2id$v=%d$m=%d,t=%d,p=%d$%s$%s",
|
||
|
|
argon2.Version,
|
||
|
|
memory,
|
||
|
|
iterations,
|
||
|
|
parallelism,
|
||
|
|
b64Salt,
|
||
|
|
b64Hash,
|
||
|
|
)
|
||
|
|
|
||
|
|
return encodedHash, nil
|
||
|
|
}
|
||
|
|
|
||
|
|
func VerifyPassword(password, encodedHash string) (bool, error) {
|
||
|
|
h, err := decodeHash(encodedHash)
|
||
|
|
if err != nil {
|
||
|
|
return false, err
|
||
|
|
}
|
||
|
|
|
||
|
|
otherHash := argon2.IDKey(
|
||
|
|
[]byte(password),
|
||
|
|
h.salt,
|
||
|
|
h.iterations,
|
||
|
|
h.memory,
|
||
|
|
h.parallelism,
|
||
|
|
uint32(len(h.hash)),
|
||
|
|
)
|
||
|
|
|
||
|
|
if subtle.ConstantTimeCompare(h.hash, otherHash) == 1 {
|
||
|
|
return true, nil
|
||
|
|
}
|
||
|
|
|
||
|
|
return false, nil
|
||
|
|
}
|
||
|
|
|
||
|
|
func decodeHash(encodedHash string) (*argon2Hash, error) {
|
||
|
|
parts := strings.Split(encodedHash, "$")
|
||
|
|
if len(parts) != 6 {
|
||
|
|
return nil, ErrInvalidHash
|
||
|
|
}
|
||
|
|
|
||
|
|
if parts[1] != "argon2id" {
|
||
|
|
return nil, ErrIncompatibleHash
|
||
|
|
}
|
||
|
|
|
||
|
|
var version int
|
||
|
|
if _, err := fmt.Sscanf(parts[2], "v=%d", &version); err != nil {
|
||
|
|
return nil, fmt.Errorf("failed to parse version: %w", err)
|
||
|
|
}
|
||
|
|
if version != argon2.Version {
|
||
|
|
return nil, ErrIncompatibleVersion
|
||
|
|
}
|
||
|
|
|
||
|
|
h := &argon2Hash{}
|
||
|
|
if _, err := fmt.Sscanf(
|
||
|
|
parts[3],
|
||
|
|
"m=%d,t=%d,p=%d",
|
||
|
|
&h.memory,
|
||
|
|
&h.iterations,
|
||
|
|
&h.parallelism,
|
||
|
|
); err != nil {
|
||
|
|
return nil, fmt.Errorf("failed to parse parameters: %w", err)
|
||
|
|
}
|
||
|
|
|
||
|
|
salt, err := base64.RawStdEncoding.DecodeString(parts[4])
|
||
|
|
if err != nil {
|
||
|
|
return nil, fmt.Errorf("failed to decode salt: %w", err)
|
||
|
|
}
|
||
|
|
h.salt = salt
|
||
|
|
|
||
|
|
hash, err := base64.RawStdEncoding.DecodeString(parts[5])
|
||
|
|
if err != nil {
|
||
|
|
return nil, fmt.Errorf("failed to decode hash: %w", err)
|
||
|
|
}
|
||
|
|
h.hash = hash
|
||
|
|
|
||
|
|
return h, nil
|
||
|
|
}
|