2016-07-07 18:54:16 -07:00
|
|
|
// Copyright 2016 Documize Inc. <legal@documize.com>. All rights reserved.
|
|
|
|
//
|
2016-07-25 11:40:26 -07:00
|
|
|
// This software (Documize Community Edition) is licensed under
|
2016-07-07 18:54:16 -07:00
|
|
|
// GNU AGPL v3 http://www.gnu.org/licenses/agpl-3.0.en.html
|
|
|
|
//
|
|
|
|
// You can operate outside the AGPL restrictions by purchasing
|
|
|
|
// Documize Enterprise Edition and obtaining a commercial license
|
2016-07-25 11:40:26 -07:00
|
|
|
// by contacting <sales@documize.com>.
|
2016-07-07 18:54:16 -07:00
|
|
|
//
|
|
|
|
// https://documize.com
|
|
|
|
|
2017-07-18 21:55:17 +01:00
|
|
|
package secrets
|
2016-07-07 18:54:16 -07:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"encoding/hex"
|
|
|
|
|
2017-07-18 21:55:17 +01:00
|
|
|
"golang.org/x/crypto/bcrypt"
|
2016-07-07 18:54:16 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
// GenerateRandomPassword provides a string suitable for use as a password.
|
|
|
|
func GenerateRandomPassword() string {
|
2016-07-25 11:40:26 -07:00
|
|
|
return GenerateRandom(5)
|
2016-07-07 18:54:16 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateSalt provides a string suitable for use as a salt value.
|
|
|
|
func GenerateSalt() string {
|
2016-07-25 11:40:26 -07:00
|
|
|
return GenerateRandom(20)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateRandom returns a string of the specified length using crypo/rand
|
|
|
|
func GenerateRandom(size int) string {
|
|
|
|
b := make([]byte, size)
|
2017-08-03 10:00:24 +01:00
|
|
|
rand.Read(b)
|
|
|
|
|
2016-07-07 18:54:16 -07:00
|
|
|
return hex.EncodeToString(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GeneratePassword returns a hashed password.
|
|
|
|
func GeneratePassword(password string, salt string) string {
|
|
|
|
pwd := []byte(salt + password)
|
|
|
|
|
|
|
|
// Hashing the password with the cost of 10
|
2017-08-03 10:00:24 +01:00
|
|
|
hashedPassword, _ := bcrypt.GenerateFromPassword(pwd, 10)
|
2016-07-07 18:54:16 -07:00
|
|
|
|
|
|
|
return string(hashedPassword)
|
|
|
|
}
|
|
|
|
|
|
|
|
// MatchPassword copares a hashed password with a clear one.
|
|
|
|
func MatchPassword(hashedPassword string, password string, salt string) bool {
|
|
|
|
pwd := []byte(salt + password)
|
|
|
|
|
|
|
|
err := bcrypt.CompareHashAndPassword([]byte(hashedPassword), pwd)
|
|
|
|
|
|
|
|
return err == nil
|
|
|
|
}
|