You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
97 lines
3.8 KiB
97 lines
3.8 KiB
/** |
|
* PBKDF (RFC 2898). Can be used to create a key from password and salt. |
|
* @module |
|
*/ |
|
import { hmac } from "./hmac.js"; |
|
// prettier-ignore |
|
import { ahash, anumber, asyncLoop, checkOpts, clean, createView, Hash, kdfInputToBytes } from "./utils.js"; |
|
// Common prologue and epilogue for sync/async functions |
|
function pbkdf2Init(hash, _password, _salt, _opts) { |
|
ahash(hash); |
|
const opts = checkOpts({ dkLen: 32, asyncTick: 10 }, _opts); |
|
const { c, dkLen, asyncTick } = opts; |
|
anumber(c); |
|
anumber(dkLen); |
|
anumber(asyncTick); |
|
if (c < 1) |
|
throw new Error('iterations (c) should be >= 1'); |
|
const password = kdfInputToBytes(_password); |
|
const salt = kdfInputToBytes(_salt); |
|
// DK = PBKDF2(PRF, Password, Salt, c, dkLen); |
|
const DK = new Uint8Array(dkLen); |
|
// U1 = PRF(Password, Salt + INT_32_BE(i)) |
|
const PRF = hmac.create(hash, password); |
|
const PRFSalt = PRF._cloneInto().update(salt); |
|
return { c, dkLen, asyncTick, DK, PRF, PRFSalt }; |
|
} |
|
function pbkdf2Output(PRF, PRFSalt, DK, prfW, u) { |
|
PRF.destroy(); |
|
PRFSalt.destroy(); |
|
if (prfW) |
|
prfW.destroy(); |
|
clean(u); |
|
return DK; |
|
} |
|
/** |
|
* PBKDF2-HMAC: RFC 2898 key derivation function |
|
* @param hash - hash function that would be used e.g. sha256 |
|
* @param password - password from which a derived key is generated |
|
* @param salt - cryptographic salt |
|
* @param opts - {c, dkLen} where c is work factor and dkLen is output message size |
|
* @example |
|
* const key = pbkdf2(sha256, 'password', 'salt', { dkLen: 32, c: Math.pow(2, 18) }); |
|
*/ |
|
export function pbkdf2(hash, password, salt, opts) { |
|
const { c, dkLen, DK, PRF, PRFSalt } = pbkdf2Init(hash, password, salt, opts); |
|
let prfW; // Working copy |
|
const arr = new Uint8Array(4); |
|
const view = createView(arr); |
|
const u = new Uint8Array(PRF.outputLen); |
|
// DK = T1 + T2 + ⋯ + Tdklen/hlen |
|
for (let ti = 1, pos = 0; pos < dkLen; ti++, pos += PRF.outputLen) { |
|
// Ti = F(Password, Salt, c, i) |
|
const Ti = DK.subarray(pos, pos + PRF.outputLen); |
|
view.setInt32(0, ti, false); |
|
// F(Password, Salt, c, i) = U1 ^ U2 ^ ⋯ ^ Uc |
|
// U1 = PRF(Password, Salt + INT_32_BE(i)) |
|
(prfW = PRFSalt._cloneInto(prfW)).update(arr).digestInto(u); |
|
Ti.set(u.subarray(0, Ti.length)); |
|
for (let ui = 1; ui < c; ui++) { |
|
// Uc = PRF(Password, Uc−1) |
|
PRF._cloneInto(prfW).update(u).digestInto(u); |
|
for (let i = 0; i < Ti.length; i++) |
|
Ti[i] ^= u[i]; |
|
} |
|
} |
|
return pbkdf2Output(PRF, PRFSalt, DK, prfW, u); |
|
} |
|
/** |
|
* PBKDF2-HMAC: RFC 2898 key derivation function. Async version. |
|
* @example |
|
* await pbkdf2Async(sha256, 'password', 'salt', { dkLen: 32, c: 500_000 }); |
|
*/ |
|
export async function pbkdf2Async(hash, password, salt, opts) { |
|
const { c, dkLen, asyncTick, DK, PRF, PRFSalt } = pbkdf2Init(hash, password, salt, opts); |
|
let prfW; // Working copy |
|
const arr = new Uint8Array(4); |
|
const view = createView(arr); |
|
const u = new Uint8Array(PRF.outputLen); |
|
// DK = T1 + T2 + ⋯ + Tdklen/hlen |
|
for (let ti = 1, pos = 0; pos < dkLen; ti++, pos += PRF.outputLen) { |
|
// Ti = F(Password, Salt, c, i) |
|
const Ti = DK.subarray(pos, pos + PRF.outputLen); |
|
view.setInt32(0, ti, false); |
|
// F(Password, Salt, c, i) = U1 ^ U2 ^ ⋯ ^ Uc |
|
// U1 = PRF(Password, Salt + INT_32_BE(i)) |
|
(prfW = PRFSalt._cloneInto(prfW)).update(arr).digestInto(u); |
|
Ti.set(u.subarray(0, Ti.length)); |
|
await asyncLoop(c - 1, asyncTick, () => { |
|
// Uc = PRF(Password, Uc−1) |
|
PRF._cloneInto(prfW).update(u).digestInto(u); |
|
for (let i = 0; i < Ti.length; i++) |
|
Ti[i] ^= u[i]; |
|
}); |
|
} |
|
return pbkdf2Output(PRF, PRFSalt, DK, prfW, u); |
|
} |
|
//# sourceMappingURL=pbkdf2.js.map
|