# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 17
# self = https://watcher.sour.is/conv/6ov54wa
I made a thing. Its a multi password type checker. Using the PHC string format we can identify a password hashing format from the prefix $name$ and then dispatch the hashing or checking to its specific format.
Here is an example of usage:


func Example() {
\tpass := "my_pass"
\thash := "my_pass"

\tpwd := passwd.New(
\t\t&unix.MD5{}, // first is preferred type.
\t\t&plainPasswd{},
\t)

\t_, err := pwd.Passwd(pass, hash)
\tif err != nil {
\t\tfmt.Println("fail: ", err)
\t}

\t// Check if we want to update.
\tif !pwd.IsPreferred(hash) {
\t\tnewHash, err := pwd.Passwd(pass, "")
\t\tif err != nil {
\t\t\tfmt.Println("fail: ", err)
\t\t}

\t\tfmt.Println("new hash:", newHash)
\t}

\t// Output:
\t//  new hash: $1$81ed91e1131a3a5a50d8a68e8ef85fa0
}


This shows how one would set a preferred hashing type and if the current version of ones password is not the preferred type updates it to enhance the security of the hashed password when someone logs in.

https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L33-L59
Here is an example of usage:


func Example() {
\tpass := "my_pass"
\thash := "my_pass"

\tpwd := passwd.New(
\t\t&unix.MD5{}, // first is preferred type.
\t\t&plainPasswd{},
\t)

\t_, err := pwd.Passwd(pass, hash)
\tif err != nil {
\t\tfmt.Println("fail: ", err)
\t}

\t// Check if we want to update.
\tif !pwd.IsPreferred(hash) {
\t\tnewHash, err := pwd.Passwd(pass, "")
\t\tif err != nil {
\t\t\tfmt.Println("fail: ", err)
\t\t}

\t\tfmt.Println("new hash:", newHash)
\t}

\t// Output:
\t//  new hash: $1$81ed91e1131a3a5a50d8a68e8ef85fa0
}


This shows how one would set a preferred hashing type and if the current version of ones password is not the preferred type updates it to enhance the security of the hashed password when someone logs in.
Here is an example of usage:


func Example() {
	pass := "my_pass"
	hash := "my_pass"

	pwd := passwd.New(
		&unix.MD5{}, // first is preferred type.
		&plainPasswd{},
	)

	_, err := pwd.Passwd(pass, hash)
	if err != nil {
		fmt.Println("fail: ", err)
	}

	// Check if we want to update.
	if !pwd.IsPreferred(hash) {
		newHash, err := pwd.Passwd(pass, "")
		if err != nil {
			fmt.Println("fail: ", err)
		}

		fmt.Println("new hash:", newHash)
	}

	// Output:
	//  new hash: $1$81ed91e1131a3a5a50d8a68e8ef85fa0
}


This shows how one would set a preferred hashing type and if the current version of ones password is not the preferred type updates it to enhance the security of the hashed password when someone logs in.

https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L33-L59
Here is an example of usage:


func Example() {
\tpass := "my_pass"
\thash := "my_pass"

\tpwd := passwd.New(
\t\t&unix.MD5{}, // first is preferred type.
\t\t&plainPasswd{},
\t)

\t_, err := pwd.Passwd(pass, hash)
\tif err != nil {
\t\tfmt.Println("fail: ", err)
\t}

\t// Check if we want to update.
\tif !pwd.IsPreferred(hash) {
\t\tnewHash, err := pwd.Passwd(pass, "")
\t\tif err != nil {
\t\t\tfmt.Println("fail: ", err)
\t\t}

\t\tfmt.Println("new hash:", newHash)
\t}

\t// Output:
\t//  new hash: $1$81ed91e1131a3a5a50d8a68e8ef85fa0
}


This shows how one would set a preferred hashing type and if the current version of ones password is not the preferred type updates it to enhance the security of the hashed password when someone logs in.

https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L33-L59
> Hold up now, that example hash doesn't have a $ prefix!

Well for this there is the option for a hash type to set itself as a fall through if a matching hash doesn't exist. This is good for legacy password types that don't follow the convention.


func (p *plainPasswd) ApplyPasswd(passwd *passwd.Passwd) {
\tpasswd.Register("plain", p)
\tpasswd.SetFallthrough(p)
}


https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L28-L31
> Hold up now, that example hash doesn't have a $ prefix!

Well for this there is the option for a hash type to set itself as a fall through if one doesn't exist. This is good for legacy password types that don't follow the convention.


func (s *scryptpw) ApplyPasswd(p *passwd.Passwd) {
\tp.Register(s.name, s)
\tif s.name == "s1" {
\t\tp.SetFallthrough(s)
\t}
}


https://github.com/sour-is/go-passwd/blob/main/pkg/scrypt/scrypt.go#L90-L95
> Hold up now, that example hash doesn't have a $ prefix!

Well for this there is the option for a hash type to set itself as a fall through if a matching hash doesn't exist. This is good for legacy password types that don't follow the convention.


func (p *plainPasswd) ApplyPasswd(passwd *passwd.Passwd) {
\tpasswd.Register("plain", p)
\tpasswd.SetFallthrough(p)
}


https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L28-L31
> Hold up now, that example hash doesn't have a $ prefix!

Well for this there is the option for a hash type to set itself as a fall through if a matching hash doesn't exist. This is good for legacy password types that don't follow the convention.


func (p *plainPasswd) ApplyPasswd(passwd *passwd.Passwd) {
	passwd.Register("plain", p)
	passwd.SetFallthrough(p)
}


https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L28-L31
> Hold up now, that example hash doesn't have a $ prefix!

Well for this there is the option for a hash type to set itself as a fall through if one doesn't exist. This is good for legacy password types that don't follow the convention.


func (p *plainPasswd) ApplyPasswd(passwd *passwd.Passwd) {
\tpasswd.Register("plain", p)
\tpasswd.SetFallthrough(p)
}


https://github.com/sour-is/go-passwd/blob/main/passwd_test.go#L28-L31
Circling back to the IsPreferred method. A hasher can define its own IsPreferred method that will be called to check if the current hash meets the complexity requirements. This is good for updating the password hashes to be more secure over time.


func (p *Passwd) IsPreferred(hash string) bool {
	_, algo := p.getAlgo(hash)
	if algo != nil && algo == p.d {

		// if the algorithm defines its own check for preference.
		if ck, ok := algo.(interface{ IsPreferred(string) bool }); ok {
			return ck.IsPreferred(hash)
		}

		return true
	}
	return false
}

https://github.com/sour-is/go-passwd/blob/main/passwd.go#L62-L74

example: https://github.com/sour-is/go-passwd/blob/main/pkg/argon2/argon2.go#L104-L133
Circling back to the IsPreferred method. A hasher can define its own IsPreferred method that will be called to check if the current hash meets the complexity requirements. This is good for updating the password hashes to be more secure over time.


func (p *Passwd) IsPreferred(hash string) bool {
\t_, algo := p.getAlgo(hash)
\tif algo != nil && algo == p.d {

\t\t// if the algorithm defines its own check for preference.
\t\tif ck, ok := algo.(interface{ IsPreferred(string) bool }); ok {
\t\t\treturn ck.IsPreferred(hash)
\t\t}

\t\treturn true
\t}
\treturn false
}

https://github.com/sour-is/go-passwd/blob/main/passwd.go#L62-L74

example:
https://github.com/sour-is/go-passwd/blob/main/pkg/argon2/argon2.go#L104-L133
Circling back to the IsPreferred method. A hasher can define its own IsPreferred method that will be called to check if the current hash meets the complexity requirements. This is good for updating the password hashes to be more secure over time.


func (p *Passwd) IsPreferred(hash string) bool {
\t_, algo := p.getAlgo(hash)
\tif algo != nil && algo == p.d {

\t\t// if the algorithm defines its own check for preference.
\t\tif ck, ok := algo.(interface{ IsPreferred(string) bool }); ok {
\t\t\treturn ck.IsPreferred(hash)
\t\t}

\t\treturn true
\t}
\treturn false
}

https://github.com/sour-is/go-passwd/blob/main/passwd.go#L62-L74

example: https://github.com/sour-is/go-passwd/blob/main/pkg/argon2/argon2.go#L104-L133
Circling back to the IsPreferred method. A hasher can define its own IsPreferred method that will be called to check if the current hash meets the complexity requirements. This is good for updating the password hashes to be more secure over time.


func (p *Passwd) IsPreferred(hash string) bool {
\t_, algo := p.getAlgo(hash)
\tif algo != nil && algo == p.d {

\t\t// if the algorithm defines its own check for preference.
\t\tif ck, ok := algo.(interface{ IsPreferred(string) bool }); ok {
\t\t\treturn ck.IsPreferred(hash)
\t\t}

\t\treturn true
\t}
\treturn false
}

https://github.com/sour-is/go-passwd/blob/main/passwd.go#L62-L74

example: https://github.com/sour-is/go-passwd/blob/main/pkg/argon2/argon2.go#L104-L133
@xuu Really sweet! Why did you pick MD5 as the example?
I have submitted this to be used as the hash tooling for Yarn. See it as a good example on using this in a production environment!

https://git.mills.io/yarnsocial/yarn/pulls/1095
I have submitted this to be used as the hash tooling for Yarn. See it as a good example on using this in a production environment!

https://git.mills.io/yarnsocial/yarn/pulls/1095