| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273 |
- 'use strict';
- var sizes = {
- __proto__: null,
- md5: 16,
- sha1: 20,
- sha224: 28,
- sha256: 32,
- sha384: 48,
- sha512: 64,
- 'sha512-256': 32,
- rmd160: 20,
- ripemd160: 20
- };
- var mapping = {
- __proto__: null,
- 'sha-1': 'sha1',
- 'sha-224': 'sha224',
- 'sha-256': 'sha256',
- 'sha-384': 'sha384',
- 'sha-512': 'sha512',
- 'ripemd-160': 'ripemd160'
- };
- var createHmac = require('create-hmac');
- var Buffer = require('safe-buffer').Buffer;
- var checkParameters = require('./precondition');
- var defaultEncoding = require('./default-encoding');
- var toBuffer = require('./to-buffer');
- function pbkdf2(password, salt, iterations, keylen, digest) {
- checkParameters(iterations, keylen);
- password = toBuffer(password, defaultEncoding, 'Password');
- salt = toBuffer(salt, defaultEncoding, 'Salt');
- var lowerDigest = (digest || 'sha1').toLowerCase();
- var mappedDigest = mapping[lowerDigest] || lowerDigest;
- var size = sizes[mappedDigest];
- if (typeof size !== 'number' || !size) {
- throw new TypeError('Digest algorithm not supported: ' + digest);
- }
- var DK = Buffer.allocUnsafe(keylen);
- var block1 = Buffer.allocUnsafe(salt.length + 4);
- salt.copy(block1, 0, 0, salt.length);
- var destPos = 0;
- var hLen = size;
- var l = Math.ceil(keylen / hLen);
- for (var i = 1; i <= l; i++) {
- block1.writeUInt32BE(i, salt.length);
- var T = createHmac(mappedDigest, password).update(block1).digest();
- var U = T;
- for (var j = 1; j < iterations; j++) {
- U = createHmac(mappedDigest, password).update(U).digest();
- for (var k = 0; k < hLen; k++) {
- T[k] ^= U[k];
- }
- }
- T.copy(DK, destPos);
- destPos += hLen;
- }
- return DK;
- }
- module.exports = pbkdf2;
|