Socket
Socket
Sign inDemoInstall

bcryptjs

Package Overview
Dependencies
0
Maintainers
1
Versions
25
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

    bcryptjs

Optimized bcrypt in plain JavaScript with zero dependencies. Compatible to 'bcrypt'.


Version published
Weekly downloads
2M
increased by2.27%
Maintainers
1
Install size
217 kB
Created
Weekly downloads
 

Package description

What is bcryptjs?

The bcryptjs npm package is a library that allows developers to hash and compare passwords securely in Node.js applications. It is a pure JavaScript implementation of the bcrypt password hashing algorithm and is compatible with the C++ bcrypt binding on npm. It's designed to be a reliable and secure way to handle password storage and verification.

What are bcryptjs's main functionalities?

Hashing Passwords

This feature allows you to securely hash passwords using bcrypt. The `genSalt` function generates a salt, and the `hash` function applies the bcrypt hashing algorithm to the password along with the salt.

const bcrypt = require('bcryptjs');
const password = 'myPassword123';
bcrypt.genSalt(10, function(err, salt) {
  bcrypt.hash(password, salt, function(err, hash) {
    // Store hash in your password DB.
  });
});

Comparing Passwords

This feature is used to compare a plaintext password with a previously hashed one to check if they match. It is commonly used during the login process to verify user credentials.

const bcrypt = require('bcryptjs');
const password = 'myPassword123';
const hash = '$2a$10$N9qo8uLOickgx2ZMRZoMye';
bcrypt.compare(password, hash, function(err, isMatch) {
  if (err) throw err;
  console.log('Password match:', isMatch);
});

Other packages similar to bcryptjs

Readme

Source

bcrypt.js

Optimized bcrypt in JavaScript with zero dependencies. Compatible to the C++ bcrypt binding on node.js and also working in the browser.

build static donate ❤

Security considerations

Besides incorporating a salt to protect against rainbow table attacks, bcrypt is an adaptive function: over time, the iteration count can be increased to make it slower, so it remains resistant to brute-force search attacks even with increasing computation power. (see)

While bcrypt.js is compatible to the C++ bcrypt binding, it is written in pure JavaScript and thus slower (about 30%), effectively reducing the number of iterations that can be processed in an equal time span.

The maximum input length is 72 bytes (note that UTF8 encoded characters use up to 4 bytes) and the length of generated hashes is 60 characters.

Usage

The library is compatible with CommonJS and AMD loaders and is exposed globally as dcodeIO.bcrypt if neither is available.

node.js

On node.js, the inbuilt crypto module's randomBytes interface is used to obtain secure random numbers.

npm install bcryptjs

var bcrypt = require('bcryptjs');
...

Browser

In the browser, bcrypt.js relies on Web Crypto API's getRandomValues interface to obtain secure random numbers. If no cryptographically secure source of randomness is available, you may specify one through bcrypt.setRandomFallback.

var bcrypt = dcodeIO.bcrypt;
...

or

require.config({
    paths: { "bcrypt": "/path/to/bcrypt.js" }
});
require(["bcrypt"], function(bcrypt) {
    ...
});

Usage - Sync

To hash a password:

var bcrypt = require('bcryptjs');
var salt = bcrypt.genSaltSync(10);
var hash = bcrypt.hashSync("B4c0/\/", salt);
// Store hash in your password DB.

To check a password:

// Load hash from your password DB.
bcrypt.compareSync("B4c0/\/", hash); // true
bcrypt.compareSync("not_bacon", hash); // false

Auto-gen a salt and hash:

var hash = bcrypt.hashSync('bacon', 8);

Usage - Async

To hash a password:

var bcrypt = require('bcryptjs');
bcrypt.genSalt(10, function(err, salt) {
    bcrypt.hash("B4c0/\/", salt, function(err, hash) {
        // Store hash in your password DB.
    });
});

To check a password:

// Load hash from your password DB.
bcrypt.compare("B4c0/\/", hash, function(err, res) {
    // res === true
});
bcrypt.compare("not_bacon", hash, function(err, res) {
    // res === false
});

// As of bcryptjs 2.4.0, compare returns a promise if callback is omitted:
bcrypt.compare("B4c0/\/", hash).then((res) => {
    // res === true
});

Auto-gen a salt and hash:

bcrypt.hash('bacon', 8, function(err, hash) {
});

Note: Under the hood, asynchronisation splits a crypto operation into small chunks. After the completion of a chunk, the execution of the next chunk is placed on the back of JS event loop queue, thus efficiently sharing the computational resources with the other operations in the queue.

API

setRandomFallback(random)

Sets the pseudo random number generator to use as a fallback if neither node's crypto module nor the Web Crypto API is available. Please note: It is highly important that the PRNG used is cryptographically secure and that it is seeded properly!

ParameterTypeDescription
randomfunction(number):!Array.<number>Function taking the number of bytes to generate as its sole argument, returning the corresponding array of cryptographically secure random byte values.
@seehttp://nodejs.org/api/crypto.html
@seehttp://www.w3.org/TR/WebCryptoAPI/

Hint: You might use isaac.js as a CSPRNG but you still have to make sure to seed it properly.

genSaltSync(rounds=, seed_length=)

Synchronously generates a salt.

ParameterTypeDescription
roundsnumberNumber of rounds to use, defaults to 10 if omitted
seed_lengthnumberNot supported.
@returnsstringResulting salt
@throwsErrorIf a random fallback is required but not set

genSalt(rounds=, seed_length=, callback)

Asynchronously generates a salt.

ParameterTypeDescription
roundsnumber | function(Error, string=)Number of rounds to use, defaults to 10 if omitted
seed_lengthnumber | function(Error, string=)Not supported.
callbackfunction(Error, string=)Callback receiving the error, if any, and the resulting salt
@returnsPromiseIf callback has been omitted
@throwsErrorIf callback is present but not a function

hashSync(s, salt=)

Synchronously generates a hash for the given string.

ParameterTypeDescription
sstringString to hash
saltnumber | stringSalt length to generate or salt to use, default to 10
@returnsstringResulting hash

hash(s, salt, callback, progressCallback=)

Asynchronously generates a hash for the given string.

ParameterTypeDescription
sstringString to hash
saltnumber | stringSalt length to generate or salt to use
callbackfunction(Error, string=)Callback receiving the error, if any, and the resulting hash
progressCallbackfunction(number)Callback successively called with the percentage of rounds completed (0.0 - 1.0), maximally once per MAX_EXECUTION_TIME = 100 ms.
@returnsPromiseIf callback has been omitted
@throwsErrorIf callback is present but not a function

compareSync(s, hash)

Synchronously tests a string against a hash.

ParameterTypeDescription
sstringString to compare
hashstringHash to test against
@returnsbooleantrue if matching, otherwise false
@throwsErrorIf an argument is illegal

compare(s, hash, callback, progressCallback=)

Asynchronously compares the given data against the given hash.

ParameterTypeDescription
sstringData to compare
hashstringData to be compared to
callbackfunction(Error, boolean)Callback receiving the error, if any, otherwise the result
progressCallbackfunction(number)Callback successively called with the percentage of rounds completed (0.0 - 1.0), maximally once per MAX_EXECUTION_TIME = 100 ms.
@returnsPromiseIf callback has been omitted
@throwsErrorIf callback is present but not a function

getRounds(hash)

Gets the number of rounds used to encrypt the specified hash.

ParameterTypeDescription
hashstringHash to extract the used number of rounds from
@returnsnumberNumber of rounds used
@throwsErrorIf hash is not a string

getSalt(hash)

Gets the salt portion from a hash. Does not validate the hash.

ParameterTypeDescription
hashstringHash to extract the salt from
@returnsstringExtracted salt part
@throwsErrorIf hash is not a string or otherwise invalid

Command line

Usage: bcrypt <input> [salt]

If the input has spaces inside, simply surround it with quotes.

Downloads

Credits

Based on work started by Shane Girish at bcrypt-nodejs (MIT-licensed), which is itself based on javascript-bcrypt (New BSD-licensed).

License

New-BSD / MIT (see)

Keywords

FAQs

Last updated on 07 Feb 2017

Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc