pswHash is a simple Go password hashing module. This module uses the pbkdf2 algorithm along with a sha256 digest. It is a one-way hash.
$ go get github.com/saurabh0719/pswHashLatest - v1.0.1
Since it follows the exact same schematics the default password hasher in python's Django framework, it can be used to verify passwords when moving to a Go backend but with the same old database from Django.
Read the example.go file in the Example folder of this repository for a clear understanding.
func Encode(password string, salt []byte, iterations int) stringReturns an encoded string in the format of <algorithm>$<iterations>$<salt>$<hash>. Here <algorithm> is pbkdf2_sha256 and the number of iterations is 320000 by default.
func Decode(encoded string) *DecodedHashWhere DecodedHash is a struct of the form :
type DecodedHash struct {
algorithm string
hash string
iterations int
salt string
}func Verify(password string, encoded string) boolReturns true if they match, else false. Uses subtle.ConstantTimeCompare.
func SafeView(encoded string) *DecodedHashReturns a struct of type DecodedHash that contains the algorithm, iterations, salt and hash, however, the salt and the hash are masked with *.
// snippet of code from "github.com/saurabh0719/pswHash/pswHash.go"
safeView := &DecodedHash{
algorithm: decoded.algorithm,
iterations: decoded.iterations,
salt: maskHash(decoded.salt),
hash: maskHash(decoded.hash),
}func Salt(length int) ([]byte, error)Generates and returns a random salt of the given length.