X-Git-Url: https://scripts.mit.edu/gitweb/autoinstalls/wordpress.git/blobdiff_plain/449d082fcc4873c1f7d363a0d9f7409be7f6e77d..b22765f41bf0b2021b9beb9120ee0ac91fa89292:/wp-admin/js/password-strength-meter.js diff --git a/wp-admin/js/password-strength-meter.js b/wp-admin/js/password-strength-meter.js index 516a3e25..efd26bbc 100644 --- a/wp-admin/js/password-strength-meter.js +++ b/wp-admin/js/password-strength-meter.js @@ -1,23 +1,80 @@ -// Password strength meter +/* global zxcvbn */ +window.wp = window.wp || {}; -function passwordStrength(password,username) { - var shortPass = 1, badPass = 2, goodPass = 3, strongPass = 4; +var passwordStrength; +(function($){ + wp.passwordStrength = { + /** + * Determine the strength of a given password + * + * @param string password1 The password + * @param array blacklist An array of words that will lower the entropy of the password + * @param string password2 The confirmed password + */ + meter : function( password1, blacklist, password2 ) { + if ( ! $.isArray( blacklist ) ) + blacklist = [ blacklist.toString() ]; - //password < 4 - if (password.length < 4 ) { return shortPass }; + if (password1 != password2 && password2 && password2.length > 0) + return 5; - //password == username - if (password.toLowerCase()==username.toLowerCase()) return badPass; + if ( 'undefined' === typeof window.zxcvbn ) { + // Password strength unknown. + return -1; + } - var symbolSize = 0; - if (password.match(/[0-9]/)) symbolSize +=10; - if (password.match(/[a-z]/)) symbolSize +=26; - if (password.match(/[A-Z]/)) symbolSize +=26; - if (password.match(/[^a-zA-Z0-9]/)) symbolSize +=31; + var result = zxcvbn( password1, blacklist ); + return result.score; + }, - var natLog = Math.log( Math.pow(symbolSize,password.length) ); - var score = natLog / Math.LN2; - if (score < 40 ) return badPass - if (score < 56 ) return goodPass - return strongPass; -} \ No newline at end of file + /** + * Builds an array of data that should be penalized, because it would lower the entropy of a password if it were used + * + * @return array The array of data to be blacklisted + */ + userInputBlacklist : function() { + var i, userInputFieldsLength, rawValuesLength, currentField, + rawValues = [], + blacklist = [], + userInputFields = [ 'user_login', 'first_name', 'last_name', 'nickname', 'display_name', 'email', 'url', 'description', 'weblog_title', 'admin_email' ]; + + // Collect all the strings we want to blacklist + rawValues.push( document.title ); + rawValues.push( document.URL ); + + userInputFieldsLength = userInputFields.length; + for ( i = 0; i < userInputFieldsLength; i++ ) { + currentField = $( '#' + userInputFields[ i ] ); + + if ( 0 === currentField.length ) { + continue; + } + + rawValues.push( currentField[0].defaultValue ); + rawValues.push( currentField.val() ); + } + + // Strip out non-alphanumeric characters and convert each word to an individual entry + rawValuesLength = rawValues.length; + for ( i = 0; i < rawValuesLength; i++ ) { + if ( rawValues[ i ] ) { + blacklist = blacklist.concat( rawValues[ i ].replace( /\W/g, ' ' ).split( ' ' ) ); + } + } + + // Remove empty values, short words, and duplicates. Short words are likely to cause many false positives. + blacklist = $.grep( blacklist, function( value, key ) { + if ( '' === value || 4 > value.length ) { + return false; + } + + return $.inArray( value, blacklist ) === key; + }); + + return blacklist; + } + }; + + // Back-compat. + passwordStrength = wp.passwordStrength.meter; +})(jQuery);