'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const crypto = require('crypto'); const { INT_MAX } = process.binding('constants').crypto; // // Test PBKDF2 with RFC 6070 test vectors (except #4) // function testPBKDF2(password, salt, iterations, keylen, expected) { const actual = crypto.pbkdf2Sync(password, salt, iterations, keylen, 'sha256'); assert.strictEqual(actual.toString('latin1'), expected); crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', (err, actual) => { assert.strictEqual(actual.toString('latin1'), expected); }); } testPBKDF2('password', 'salt', 1, 20, '\x12\x0f\xb6\xcf\xfc\xf8\xb3\x2c\x43\xe7\x22\x52' + '\x56\xc4\xf8\x37\xa8\x65\x48\xc9'); testPBKDF2('password', 'salt', 2, 20, '\xae\x4d\x0c\x95\xaf\x6b\x46\xd3\x2d\x0a\xdf\xf9' + '\x28\xf0\x6d\xd0\x2a\x30\x3f\x8e'); testPBKDF2('password', 'salt', 4096, 20, '\xc5\xe4\x78\xd5\x92\x88\xc8\x41\xaa\x53\x0d\xb6' + '\x84\x5c\x4c\x8d\x96\x28\x93\xa0'); testPBKDF2('passwordPASSWORDpassword', 'saltSALTsaltSALTsaltSALTsaltSALTsalt', 4096, 25, '\x34\x8c\x89\xdb\xcb\xd3\x2b\x2f\x32\xd8\x14\xb8\x11' + '\x6e\x84\xcf\x2b\x17\x34\x7e\xbc\x18\x00\x18\x1c'); testPBKDF2('pass\0word', 'sa\0lt', 4096, 16, '\x89\xb6\x9d\x05\x16\xf8\x29\x89\x3c\x69\x62\x26\x65' + '\x0a\x86\x87'); const expected = '64c486c55d30d4c5a079b8823b7d7cb37ff0556f537da8410233bcec330ed956'; const key = crypto.pbkdf2Sync('password', 'salt', 32, 32, 'sha256'); assert.strictEqual(key.toString('hex'), expected); crypto.pbkdf2('password', 'salt', 32, 32, 'sha256', common.mustCall(ondone)); function ondone(err, key) { assert.ifError(err); assert.strictEqual(key.toString('hex'), expected); } // Error path should not leak memory (check with valgrind). common.expectsError( () => crypto.pbkdf2('password', 'salt', 1, 20, null), { code: 'ERR_INVALID_CALLBACK', type: TypeError } ); [Infinity, -Infinity, NaN, -1, 4073741824, INT_MAX + 1].forEach((i) => { common.expectsError( () => { crypto.pbkdf2('password', 'salt', 1, i, 'sha256', common.mustNotCall()); }, { code: 'ERR_OUT_OF_RANGE', type: RangeError, message: 'The "keylen" argument is out of range' }); }); // Should not get FATAL ERROR with empty password and salt // https://github.com/nodejs/node/issues/8571 assert.doesNotThrow(() => { crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustCall((e) => { assert.ifError(e); })); }); common.expectsError( () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "digest" argument must be one of type string or null' }); common.expectsError( () => crypto.pbkdf2Sync('password', 'salt', 8, 8), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "digest" argument must be one of type string or null' }); [1, {}, [], true, undefined, null].forEach((i) => { common.expectsError( () => crypto.pbkdf2(i, 'salt', 8, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "password" argument must be one of type string, ' + 'Buffer, or TypedArray' } ); common.expectsError( () => crypto.pbkdf2('pass', i, 8, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "salt" argument must be one of type string, ' + 'Buffer, or TypedArray' } ); common.expectsError( () => crypto.pbkdf2Sync(i, 'salt', 8, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "password" argument must be one of type string, ' + 'Buffer, or TypedArray' } ); common.expectsError( () => crypto.pbkdf2Sync('pass', i, 8, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "salt" argument must be one of type string, ' + 'Buffer, or TypedArray' } ); }); ['test', {}, [], true, undefined, null].forEach((i) => { common.expectsError( () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "iterations" argument must be of type number' } ); common.expectsError( () => crypto.pbkdf2Sync('pass', 'salt', i, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', type: TypeError, message: 'The "iterations" argument must be of type number' } ); }); // Any TypedArray should work for password and salt crypto.pbkdf2(new Uint8Array(10), 'salt', 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2('pass', new Uint8Array(10), 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2(new Uint16Array(10), 'salt', 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2('pass', new Uint16Array(10), 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2(new Uint32Array(10), 'salt', 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2('pass', new Uint32Array(10), 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2(new Float32Array(10), 'salt', 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2('pass', new Float32Array(10), 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2(new Float64Array(10), 'salt', 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2('pass', new Float64Array(10), 8, 8, 'sha256', common.mustCall()); crypto.pbkdf2Sync(new Uint8Array(10), 'salt', 8, 8, 'sha256'); crypto.pbkdf2Sync('pass', new Uint8Array(10), 8, 8, 'sha256'); crypto.pbkdf2Sync(new Uint16Array(10), 'salt', 8, 8, 'sha256'); crypto.pbkdf2Sync('pass', new Uint16Array(10), 8, 8, 'sha256'); crypto.pbkdf2Sync(new Uint32Array(10), 'salt', 8, 8, 'sha256'); crypto.pbkdf2Sync('pass', new Uint32Array(10), 8, 8, 'sha256'); crypto.pbkdf2Sync(new Float32Array(10), 'salt', 8, 8, 'sha256'); crypto.pbkdf2Sync('pass', new Float32Array(10), 8, 8, 'sha256'); crypto.pbkdf2Sync(new Float64Array(10), 'salt', 8, 8, 'sha256'); crypto.pbkdf2Sync('pass', new Float64Array(10), 8, 8, 'sha256'); common.expectsError( () => crypto.pbkdf2('pass', 'salt', 8, 8, 'md55', common.mustNotCall()), { code: 'ERR_CRYPTO_INVALID_DIGEST', type: TypeError, message: 'Invalid digest: md55' } ); common.expectsError( () => crypto.pbkdf2Sync('pass', 'salt', 8, 8, 'md55'), { code: 'ERR_CRYPTO_INVALID_DIGEST', type: TypeError, message: 'Invalid digest: md55' } );