-
Notifications
You must be signed in to change notification settings - Fork 70
/
Copy pathextension_pbkdf2.js
60 lines (48 loc) · 1.41 KB
/
extension_pbkdf2.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
const test = require('brittle')
const sodium = require('../')
const vectors = require('./fixtures/pbkdf2.json')
test('basic', async t => {
const password = Buffer.from('password')
const salt = Buffer.from('salt')
const output = Buffer.alloc(256)
await sodium.extension_pbkdf2_sha512(output, password, salt, 1000, 256)
t.unlike(output, Buffer.alloc(256))
try {
sodium.extension_pbkdf2_sha512()
t.fail()
} catch (e) {
t.pass()
}
try {
// output is too small
const small = output.subarray(2)
sodium.extension_pbkdf2_sha512(small, password, salt, 1000, 256)
t.fail()
} catch (e) {
t.pass()
}
const big = Buffer.alloc(300)
sodium.extension_pbkdf2_sha512(big, password, salt, 1000, 256)
t.alike(big.subarray(0, 256), output)
t.is(sodium.extension_pbkdf2_sha512_SALTBYTES, 16)
t.is(sodium.extension_pbkdf2_sha512_HASHBYTES, 64)
t.is(sodium.extension_pbkdf2_sha512_ITERATIONS_MIN, 1)
t.is(sodium.extension_pbkdf2_sha512_BYTES_MAX, 0x3fffffffc0)
})
test('vectors', { timeout: 0 }, async t => {
for (const v of vectors) {
const password = Buffer.from(v.P)
const salt = Buffer.from(v.S)
const iterations = v.c
const length = v.dkLen
const output = Buffer.alloc(length)
await sodium.extension_pbkdf2_sha512(
output,
password,
salt,
iterations,
length
)
t.alike(output.toString('hex'), v.pbkdf2_hmac_sha512)
}
})