react / wstein / node_modules / browserify / node_modules / crypto-browserify / node_modules / pbkdf2 / browser.js
80540 viewsvar createHmac = require('create-hmac')1var MAX_ALLOC = Math.pow(2, 30) - 1 // default in iojs23exports.pbkdf2 = pbkdf24function pbkdf2 (password, salt, iterations, keylen, digest, callback) {5if (typeof digest === 'function') {6callback = digest7digest = undefined8}910if (typeof callback !== 'function') {11throw new Error('No callback provided to pbkdf2')12}1314var result = pbkdf2Sync(password, salt, iterations, keylen, digest)15setTimeout(function () {16callback(undefined, result)17})18}1920exports.pbkdf2Sync = pbkdf2Sync21function pbkdf2Sync (password, salt, iterations, keylen, digest) {22if (typeof iterations !== 'number') {23throw new TypeError('Iterations not a number')24}2526if (iterations < 0) {27throw new TypeError('Bad iterations')28}2930if (typeof keylen !== 'number') {31throw new TypeError('Key length not a number')32}3334if (keylen < 0 || keylen > MAX_ALLOC) {35throw new TypeError('Bad key length')36}3738digest = digest || 'sha1'3940if (!Buffer.isBuffer(password)) password = new Buffer(password, 'binary')41if (!Buffer.isBuffer(salt)) salt = new Buffer(salt, 'binary')4243var hLen44var l = 145var DK = new Buffer(keylen)46var block1 = new Buffer(salt.length + 4)47salt.copy(block1, 0, 0, salt.length)4849var r50var T5152for (var i = 1; i <= l; i++) {53block1.writeUInt32BE(i, salt.length)54var U = createHmac(digest, password).update(block1).digest()5556if (!hLen) {57hLen = U.length58T = new Buffer(hLen)59l = Math.ceil(keylen / hLen)60r = keylen - (l - 1) * hLen61}6263U.copy(T, 0, 0, hLen)6465for (var j = 1; j < iterations; j++) {66U = createHmac(digest, password).update(U).digest()6768for (var k = 0; k < hLen; k++) {69T[k] ^= U[k]70}71}7273var destPos = (i - 1) * hLen74var len = (i === l ? r : hLen)75T.copy(DK, destPos, 0, len)76}7778return DK79}808182