| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 | "use strict";Object.defineProperty(exports, "__esModule", { value: true });exports.pbkdf2Async = exports.pbkdf2 = void 0;const _assert_js_1 = require("./_assert.js");const hmac_js_1 = require("./hmac.js");const utils_js_1 = require("./utils.js");// Common prologue and epilogue for sync/async functionsfunction pbkdf2Init(hash, _password, _salt, _opts) {    (0, _assert_js_1.hash)(hash);    const opts = (0, utils_js_1.checkOpts)({ dkLen: 32, asyncTick: 10 }, _opts);    const { c, dkLen, asyncTick } = opts;    (0, _assert_js_1.number)(c);    (0, _assert_js_1.number)(dkLen);    (0, _assert_js_1.number)(asyncTick);    if (c < 1)        throw new Error('PBKDF2: iterations (c) should be >= 1');    const password = (0, utils_js_1.toBytes)(_password);    const salt = (0, utils_js_1.toBytes)(_salt);    // DK = PBKDF2(PRF, Password, Salt, c, dkLen);    const DK = new Uint8Array(dkLen);    // U1 = PRF(Password, Salt + INT_32_BE(i))    const PRF = hmac_js_1.hmac.create(hash, password);    const PRFSalt = PRF._cloneInto().update(salt);    return { c, dkLen, asyncTick, DK, PRF, PRFSalt };}function pbkdf2Output(PRF, PRFSalt, DK, prfW, u) {    PRF.destroy();    PRFSalt.destroy();    if (prfW)        prfW.destroy();    u.fill(0);    return DK;}/** * PBKDF2-HMAC: RFC 2898 key derivation function * @param hash - hash function that would be used e.g. sha256 * @param password - password from which a derived key is generated * @param salt - cryptographic salt * @param opts - {c, dkLen} where c is work factor and dkLen is output message size */function pbkdf2(hash, password, salt, opts) {    const { c, dkLen, DK, PRF, PRFSalt } = pbkdf2Init(hash, password, salt, opts);    let prfW; // Working copy    const arr = new Uint8Array(4);    const view = (0, utils_js_1.createView)(arr);    const u = new Uint8Array(PRF.outputLen);    // DK = T1 + T2 + ⋯ + Tdklen/hlen    for (let ti = 1, pos = 0; pos < dkLen; ti++, pos += PRF.outputLen) {        // Ti = F(Password, Salt, c, i)        const Ti = DK.subarray(pos, pos + PRF.outputLen);        view.setInt32(0, ti, false);        // F(Password, Salt, c, i) = U1 ^ U2 ^ ⋯ ^ Uc        // U1 = PRF(Password, Salt + INT_32_BE(i))        (prfW = PRFSalt._cloneInto(prfW)).update(arr).digestInto(u);        Ti.set(u.subarray(0, Ti.length));        for (let ui = 1; ui < c; ui++) {            // Uc = PRF(Password, Uc−1)            PRF._cloneInto(prfW).update(u).digestInto(u);            for (let i = 0; i < Ti.length; i++)                Ti[i] ^= u[i];        }    }    return pbkdf2Output(PRF, PRFSalt, DK, prfW, u);}exports.pbkdf2 = pbkdf2;async function pbkdf2Async(hash, password, salt, opts) {    const { c, dkLen, asyncTick, DK, PRF, PRFSalt } = pbkdf2Init(hash, password, salt, opts);    let prfW; // Working copy    const arr = new Uint8Array(4);    const view = (0, utils_js_1.createView)(arr);    const u = new Uint8Array(PRF.outputLen);    // DK = T1 + T2 + ⋯ + Tdklen/hlen    for (let ti = 1, pos = 0; pos < dkLen; ti++, pos += PRF.outputLen) {        // Ti = F(Password, Salt, c, i)        const Ti = DK.subarray(pos, pos + PRF.outputLen);        view.setInt32(0, ti, false);        // F(Password, Salt, c, i) = U1 ^ U2 ^ ⋯ ^ Uc        // U1 = PRF(Password, Salt + INT_32_BE(i))        (prfW = PRFSalt._cloneInto(prfW)).update(arr).digestInto(u);        Ti.set(u.subarray(0, Ti.length));        await (0, utils_js_1.asyncLoop)(c - 1, asyncTick, () => {            // Uc = PRF(Password, Uc−1)            PRF._cloneInto(prfW).update(u).digestInto(u);            for (let i = 0; i < Ti.length; i++)                Ti[i] ^= u[i];        });    }    return pbkdf2Output(PRF, PRFSalt, DK, prfW, u);}exports.pbkdf2Async = pbkdf2Async;//# sourceMappingURL=pbkdf2.js.map
 |