# pbkdf2-password [![Build Status](https://travis-ci.org/mcollina/pbkdf2-password.svg?branch=master)](https://travis-ci.org/mcollina/pbkdf2-password)
Easy salt/password creation for Node.js, extracted from
[Mosca](http://npm.im/mosca).
Usage
-----
```js
var bkfd2Password = require("pbkdf2-password");
var hasher = bkfd2Password();
var assert = require("assert");
var opts = {
password: "helloworld"
};
hasher(opts, function(err, pass, salt, hash) {
opts.salt = salt;
hasher(opts, function(err, pass, salt, hash2) {
assert.deepEqual(hash2, hash);
// password mismatch
opts.password = "aaa";
hasher(opts, function(err, pass, salt, hash2) {
assert.notDeepEqual(hash2, hash);
console.log("OK");
});
});
});
```
API
---
* bkfd2Password
* hasher()
### bkfd2Password(options)
Creates a new [hasher](#hasher) functions, with the specified options.
Options:
* `saltLength`, the length of the random salt
* `iterations`, number of pbkdf2 iterations
* `keyLength`, the length of the generated keys
* `digest`, the digest algorithm, default `'sha1'`
### hasher(opts, function(err, pass, salt, hash))
Hash a password, using a hash and the pbkd2
crypto module.
Options:
- `password`, the password to hash.
- `salt`, the salt to use, as a base64 string.
If the `password` is left undefined, a new
10-bytes password will be generated, and converted
to base64.
If the `salt` is left undefined, a new salt is generated.
The callback will be called with the following arguments:
- the error, if something when wrong.
- the password.
- the salt, encoded in base64.
- the hash, encoded in base64.
License
-------
MIT