Comparing version 0.2.4 to 0.3.0
@@ -1,3 +0,6 @@ | ||
var bcrypt_lib = require('./bcrypt_lib'); | ||
module.exports = new bcrypt_lib.BCrypt(); | ||
try { | ||
module.exports = require('./build/default/bcrypt_lib'); | ||
} catch(e) { | ||
//update for v0.5.5+ | ||
module.exports = require('./build/Release/bcrypt_lib'); | ||
} |
{ | ||
"name": "bcrypt", | ||
"description": "A bcrypt library for NodeJS.", | ||
"keywords": ["bcrypt","password","auth","authentication","encryption","crypt","crypto"], | ||
"main": "./bcrypt", | ||
"version": "0.2.4", | ||
"version": "0.3.0", | ||
"author": "Nick Campbell (http://github.com/ncb000gt)", | ||
"engines": { "node": ">= 0.1.100" }, | ||
"engines": { "node": ">= 0.4.0" }, | ||
"repository": { | ||
@@ -21,7 +22,7 @@ "type": "git", | ||
"scripts": { | ||
"install": "node-waf configure build", | ||
"test": "node-waf configure build; nodeunit test/" | ||
"install": "make build", | ||
"test": "make test" | ||
}, | ||
"devDependencies": { | ||
"nodeunit": ">=0.5.1" | ||
"nodeunit": ">=0.5.4" | ||
}, | ||
@@ -35,4 +36,7 @@ "contributors": [ | ||
"Alfred Westerveld <alfredwesterveld@gmail.com> (https://github.com/alfredwesterveld)", | ||
"Vincent Côté-Roy <vincentcr@gmail.com> (https://github.com/vincentcr)" | ||
"Vincent Côté-Roy <vincentcr@gmail.com> (https://github.com/vincentcr)", | ||
"Lloyd Hilaiel <lloyd@hilaiel.com> (https://github.com/lloyd)", | ||
"Roman Shtylman <shtylman@gmail.com> (https://github.com/shtylman)", | ||
"Vadim Graboys <dimva13@gmail.com> (https://github.com/vadimg)" | ||
] | ||
} |
@@ -1,8 +0,8 @@ | ||
bcrypt-node | ||
node.bcrypt.js | ||
============= | ||
Lib to help you hash passwords. | ||
Lib to help you hash passwords. | ||
[bcrypt on wikipedia][bcryptwiki] | ||
Catalyst: [How To Safely Store A Password][codahale] | ||
Catalyst for this module: [How To Safely Store A Password][codahale] | ||
@@ -17,3 +17,2 @@ | ||
* [GH-13][gh13] - There was a timing attack present in the comparator. This is fixed in versions higher than 0.2.1, but I recommend using 0.2.3 (code fixes) or later. HT [thegoleffect][thegoleffect]. | ||
* An [issue with passwords][jtr] was found with a version of the Blowfish algorithm developed for John the Ripper. This is not present in the OpenBSD version and is thus not a problem for this module. HT [zooko][zooko]. | ||
@@ -88,25 +87,32 @@ | ||
* BCrypt | ||
* gen_salt_sync(rounds, seed_length) | ||
* rounds - [OPTIONAL] - the number of rounds to process the data for. (default - 10) | ||
* seed_length - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20) | ||
* gen_salt(rounds, seed_length, cb) | ||
* rounds - [OPTIONAL] - the number of rounds to process the data for. (default - 10) | ||
* seed_length - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20) | ||
* cb - [REQUIRED] - a callback to be fired once the salt has been generated. uses eio making it asynchronous. | ||
* encrypt_sync(data, salt) | ||
* data - [REQUIRED] - the data to be encrypted. | ||
* salt - [REQUIRED] - the salt to be used in encryption. | ||
* encrypt(data, salt, cb) | ||
* data - [REQUIRED] - the data to be encrypted. | ||
* salt - [REQUIRED] - the salt to be used in encryption. | ||
* cb - [REQUIRED] - a callback to be fired once the data has been encrypted. uses eio making it asynchronous. | ||
* compare_sync(data, encrypted) | ||
* data - [REQUIRED] - data to compare. | ||
* encrypted - [REQUIRED] - data to be compared to. | ||
* compare(data, encrypted, cb) | ||
* data - [REQUIRED] - data to compare. | ||
* encrypted - [REQUIRED] - data to be compared to. | ||
* cb - [REQUIRED] - a callback to be fired once the data has been compared. uses eio making it asynchronous. | ||
`BCrypt.` | ||
* `gen_salt_sync(rounds, seed_length)` | ||
* `rounds` - [OPTIONAL] - the number of rounds to process the data for. (default - 10) | ||
* `seed_length` - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20) | ||
* `gen_salt(rounds, seed_length, cb)` | ||
* `rounds` - [OPTIONAL] - the number of rounds to process the data for. (default - 10) | ||
* `seed_length` - [OPTIONAL] - RAND_bytes wants a length. to make that a bit flexible, you can specify a seed_length. (default - 20) | ||
* `cb` - [REQUIRED] - a callback to be fired once the salt has been generated. uses eio making it asynchronous. | ||
* `err` - First parameter to the callback detailing any errors. | ||
* `salt` - Second parameter to the callback providing the generated salt. | ||
* `encrypt_sync(data, salt)` | ||
* `data` - [REQUIRED] - the data to be encrypted. | ||
* `salt` - [REQUIRED] - the salt to be used in encryption. | ||
* `encrypt(data, salt, cb)` | ||
* `data` - [REQUIRED] - the data to be encrypted. | ||
* `salt` - [REQUIRED] - the salt to be used in encryption. | ||
* `cb` - [REQUIRED] - a callback to be fired once the data has been encrypted. uses eio making it asynchronous. | ||
* `err` - First parameter to the callback detailing any errors. | ||
* `encrypted` - Second parameter to the callback providing the encrypted form. | ||
* `compare_sync(data, encrypted)` | ||
* `data` - [REQUIRED] - data to compare. | ||
* `encrypted` - [REQUIRED] - data to be compared to. | ||
* `compare(data, encrypted, cb)` | ||
* `data` - [REQUIRED] - data to compare. | ||
* `encrypted` - [REQUIRED] - data to be compared to. | ||
* `cb` - [REQUIRED] - a callback to be fired once the data has been compared. uses eio making it asynchronous. | ||
* `err` - First parameter to the callback detailing any errors. | ||
* `same` - Second parameter to the callback providing whether the data and encrypted forms match [true | false]. | ||
Hash Info | ||
@@ -145,2 +151,5 @@ ============ | ||
* [Vincent Côté-Roy][vincentr] - Testing around concurrency issues | ||
* [Lloyd Hilaiel][lloyd] - Documentation fixes | ||
* [Roman Shtylman][shtylman] - Code refactoring and general rot reduction | ||
* [Vadim Graboys][vadimg] - Code changes to support 0.5.5+ | ||
@@ -152,9 +161,4 @@ License | ||
Trademarks? | ||
============ | ||
Node.js™ is an official trademark of Joyent. This module is not formally related to or endorsed by the official Joyent Node.js open source or commercial project | ||
[bcryptwiki]: http://en.wikipedia.org/wiki/Crypt_(Unix)#Blowfish-based_scheme | ||
@@ -174,1 +178,4 @@ [bcryptgs]: http://mail-index.netbsd.org/tech-crypto/2002/05/24/msg000204.html | ||
[vincentr]:https://twitter.com/vincentcr | ||
[lloyd]:https://github.com/lloyd | ||
[shtylman]:https://github.com/shtylman | ||
[vadimg]:https://github.com/vadimg |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
302
177
73456