2021-09-21 11:21:04 +02:00
|
|
|
package hibp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"crypto/sha1"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2021-09-21 18:21:23 +02:00
|
|
|
// PwnedPassApi is a HIBP Pwned Passwords API client
|
|
|
|
type PwnedPassApi struct {
|
2021-09-21 19:46:48 +02:00
|
|
|
hibp *Client // References back to the parent HIBP client
|
2021-09-21 11:21:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Match represents a match in the Pwned Passwords API
|
|
|
|
type Match struct {
|
2021-09-21 19:46:48 +02:00
|
|
|
Hash string // SHA1 hash of the matching password
|
|
|
|
Count int64 // Represents the number of leaked accounts that hold/held this password
|
2021-09-21 11:21:04 +02:00
|
|
|
}
|
|
|
|
|
2021-09-21 18:21:23 +02:00
|
|
|
// PwnedPasswordOptions is a struct of additional options for the PP API
|
|
|
|
type PwnedPasswordOptions struct {
|
2021-09-21 19:46:48 +02:00
|
|
|
// WithPadding controls if the PwnedPassword API returns with padding or not
|
|
|
|
// See: https://haveibeenpwned.com/API/v3#PwnedPasswordsPadding
|
2021-09-21 18:21:23 +02:00
|
|
|
WithPadding bool
|
|
|
|
}
|
|
|
|
|
2021-09-21 11:21:04 +02:00
|
|
|
// CheckPassword checks the Pwned Passwords database against a given password string
|
2021-09-21 18:21:23 +02:00
|
|
|
func (p *PwnedPassApi) CheckPassword(pw string) (*Match, *http.Response, error) {
|
2021-09-21 11:21:04 +02:00
|
|
|
shaSum := fmt.Sprintf("%x", sha1.Sum([]byte(pw)))
|
|
|
|
return p.CheckSHA1(shaSum)
|
|
|
|
}
|
|
|
|
|
|
|
|
// CheckSHA1 checks the Pwned Passwords database against a given SHA1 checksum of a password
|
2021-09-21 18:21:23 +02:00
|
|
|
func (p *PwnedPassApi) CheckSHA1(h string) (*Match, *http.Response, error) {
|
2021-09-21 11:21:04 +02:00
|
|
|
pwMatches, hr, err := p.apiCall(h)
|
|
|
|
if err != nil {
|
|
|
|
return &Match{}, hr, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range pwMatches {
|
|
|
|
if m.Hash == h {
|
|
|
|
return &m, hr, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, hr, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// apiCall performs the API call to the Pwned Password API endpoint and returns
|
|
|
|
// the http.Response
|
2021-09-21 18:21:23 +02:00
|
|
|
func (p *PwnedPassApi) apiCall(h string) ([]Match, *http.Response, error) {
|
2021-09-21 11:21:04 +02:00
|
|
|
sh := h[:5]
|
2021-09-21 19:46:48 +02:00
|
|
|
hreq, err := p.hibp.HttpReq(http.MethodGet, fmt.Sprintf("https://api.pwnedpasswords.com/range/%s", sh),
|
|
|
|
nil)
|
2021-09-21 11:21:04 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2021-09-21 18:21:23 +02:00
|
|
|
hr, err := p.hibp.hc.Do(hreq)
|
2021-09-21 11:21:04 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
if hr.StatusCode != 200 {
|
|
|
|
return nil, hr, fmt.Errorf("API responded with non HTTP-200: %s", hr.Status)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = hr.Body.Close()
|
|
|
|
}()
|
|
|
|
|
|
|
|
var pwMatches []Match
|
|
|
|
scanObj := bufio.NewScanner(hr.Body)
|
|
|
|
for scanObj.Scan() {
|
|
|
|
hp := strings.SplitN(scanObj.Text(), ":", 2)
|
|
|
|
fh := fmt.Sprintf("%s%s", sh, strings.ToLower(hp[0]))
|
|
|
|
hc, err := strconv.ParseInt(hp[1], 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
pwMatches = append(pwMatches, Match{
|
|
|
|
Hash: fh,
|
|
|
|
Count: hc,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := scanObj.Err(); err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return pwMatches, hr, nil
|
|
|
|
}
|