mirror of
https://github.com/WordPress/WordPress.git
synced 2024-12-23 17:48:01 +01:00
26c07ed8d9
Prevents JavaScript errors by checking zxcvbn is defined before calling. Changes `wp.passwordStrength.meter()` to return `-1` if the strength of the password is unknown. On the user profile screen, `generatePassword()` checks if the user has entered the password before setting the value of the password input box. Props peterwilsoncc, adamsilverstein. Fixes #34905. Built from https://develop.svn.wordpress.org/trunk@37940 git-svn-id: http://core.svn.wordpress.org/trunk@37881 1a063a9b-81f0-0310-95a4-ce76da25c4cd
81 lines
2.4 KiB
JavaScript
81 lines
2.4 KiB
JavaScript
/* global zxcvbn */
|
|
window.wp = window.wp || {};
|
|
|
|
var passwordStrength;
|
|
(function($){
|
|
wp.passwordStrength = {
|
|
/**
|
|
* Determine the strength of a given password
|
|
*
|
|
* @param string password1 The password
|
|
* @param array blacklist An array of words that will lower the entropy of the password
|
|
* @param string password2 The confirmed password
|
|
*/
|
|
meter : function( password1, blacklist, password2 ) {
|
|
if ( ! $.isArray( blacklist ) )
|
|
blacklist = [ blacklist.toString() ];
|
|
|
|
if (password1 != password2 && password2 && password2.length > 0)
|
|
return 5;
|
|
|
|
if ( 'undefined' === typeof window.zxcvbn ) {
|
|
// Password strength unknown.
|
|
return -1;
|
|
}
|
|
|
|
var result = zxcvbn( password1, blacklist );
|
|
return result.score;
|
|
},
|
|
|
|
/**
|
|
* Builds an array of data that should be penalized, because it would lower the entropy of a password if it were used
|
|
*
|
|
* @return array The array of data to be blacklisted
|
|
*/
|
|
userInputBlacklist : function() {
|
|
var i, userInputFieldsLength, rawValuesLength, currentField,
|
|
rawValues = [],
|
|
blacklist = [],
|
|
userInputFields = [ 'user_login', 'first_name', 'last_name', 'nickname', 'display_name', 'email', 'url', 'description', 'weblog_title', 'admin_email' ];
|
|
|
|
// Collect all the strings we want to blacklist
|
|
rawValues.push( document.title );
|
|
rawValues.push( document.URL );
|
|
|
|
userInputFieldsLength = userInputFields.length;
|
|
for ( i = 0; i < userInputFieldsLength; i++ ) {
|
|
currentField = $( '#' + userInputFields[ i ] );
|
|
|
|
if ( 0 === currentField.length ) {
|
|
continue;
|
|
}
|
|
|
|
rawValues.push( currentField[0].defaultValue );
|
|
rawValues.push( currentField.val() );
|
|
}
|
|
|
|
// Strip out non-alphanumeric characters and convert each word to an individual entry
|
|
rawValuesLength = rawValues.length;
|
|
for ( i = 0; i < rawValuesLength; i++ ) {
|
|
if ( rawValues[ i ] ) {
|
|
blacklist = blacklist.concat( rawValues[ i ].replace( /\W/g, ' ' ).split( ' ' ) );
|
|
}
|
|
}
|
|
|
|
// Remove empty values, short words, and duplicates. Short words are likely to cause many false positives.
|
|
blacklist = $.grep( blacklist, function( value, key ) {
|
|
if ( '' === value || 4 > value.length ) {
|
|
return false;
|
|
}
|
|
|
|
return $.inArray( value, blacklist ) === key;
|
|
});
|
|
|
|
return blacklist;
|
|
}
|
|
};
|
|
|
|
// Back-compat.
|
|
passwordStrength = wp.passwordStrength.meter;
|
|
})(jQuery);
|