mirror of https://github.com/adamdruppe/arsd.git
99 lines
2.9 KiB
D
99 lines
2.9 KiB
D
/++
|
|
My minimal interface to https://github.com/p-h-c/phc-winner-argon2
|
|
|
|
You must compile and install the C library separately.
|
|
+/
|
|
module arsd.argon2;
|
|
|
|
// a password length limitation might legit make sense here cuz of the hashing function can get slow
|
|
|
|
// it is conceivably useful to hash the password with a secret key before passing to this function,
|
|
// but I'm not going to do that automatically here just to keep this thin and simple.
|
|
|
|
import core.stdc.stdint;
|
|
|
|
pragma(lib, "argon2");
|
|
|
|
extern(C)
|
|
int argon2id_hash_encoded(
|
|
const uint32_t t_cost,
|
|
const uint32_t m_cost,
|
|
const uint32_t parallelism,
|
|
const void *pwd, const size_t pwdlen,
|
|
const void *salt, const size_t saltlen,
|
|
const size_t hashlen, char *encoded,
|
|
const size_t encodedlen);
|
|
|
|
extern(C)
|
|
int argon2id_verify(const char *encoded, const void *pwd,
|
|
const size_t pwdlen);
|
|
|
|
enum ARGON2_OK = 0;
|
|
|
|
/// Parameters to the argon2 function. Bigger numbers make it harder to
|
|
/// crack, but also take more resources for legitimate users too
|
|
/// (e.g. making logins and signups slower and more memory-intensive). Some
|
|
/// examples are provided. HighSecurity is about 3/4 second on my computer,
|
|
/// MediumSecurity about 1/3 second, LowSecurity about 1/10 second.
|
|
struct SecurityParameters {
|
|
uint cpuCost;
|
|
uint memoryCost; /// in KiB fyi
|
|
uint parallelism;
|
|
}
|
|
|
|
/// ditto
|
|
enum HighSecurity = SecurityParameters(8, 512_000, 8);
|
|
/// ditto
|
|
enum MediumSecurity = SecurityParameters(4, 256_000, 4);
|
|
/// ditto
|
|
enum LowSecurity = SecurityParameters(2, 128_000, 4);
|
|
|
|
/// Check's a user's provided password against the saved password, and returns true if they matched. Neither string can be empty.
|
|
bool verify(string savedPassword, string providedPassword) {
|
|
return argon2id_verify((savedPassword[$-1] == 0 ? savedPassword : (savedPassword ~ '\0')).ptr, providedPassword.ptr, providedPassword.length) == ARGON2_OK;
|
|
}
|
|
|
|
/// encode a password for secure storage. verify later with [verify]
|
|
string encode(string password, SecurityParameters params = MediumSecurity) {
|
|
char[256] buffer;
|
|
enum HASHLEN = 80;
|
|
|
|
import core.stdc.string;
|
|
|
|
ubyte[32] salt = void;
|
|
|
|
version(linux) {{
|
|
import core.sys.posix.unistd;
|
|
import core.sys.posix.fcntl;
|
|
int fd = open("/dev/urandom", O_RDONLY);
|
|
auto ret = read(fd, salt.ptr, salt.length);
|
|
assert(ret == salt.length);
|
|
close(fd);
|
|
}} else version(Windows) {{
|
|
// https://docs.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptgenrandom
|
|
static assert(0);
|
|
}} else {
|
|
import std.random;
|
|
foreach(ref s; salt)
|
|
s = cast(ubyte) uniform(0, 256);
|
|
|
|
static assert(0, "csrng not implemented");
|
|
}
|
|
|
|
auto ret = argon2id_hash_encoded(
|
|
params.cpuCost,
|
|
params.memoryCost,
|
|
params.parallelism,
|
|
password.ptr, password.length,
|
|
salt.ptr, salt.length,
|
|
HASHLEN, // desired size of hash. I think this is fine being arbitrary
|
|
buffer.ptr,
|
|
buffer.length
|
|
);
|
|
|
|
if(ret != ARGON2_OK)
|
|
throw new Exception("wtf");
|
|
|
|
return buffer[0 .. strlen(buffer.ptr) + 1].idup;
|
|
}
|