mirror of
https://github.com/nodejs/node.git
synced 2025-05-05 11:29:34 +00:00

PR-URL: https://github.com/nodejs/node/pull/20816 Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de>
101 lines
3.1 KiB
JavaScript
101 lines
3.1 KiB
JavaScript
'use strict';
|
|
|
|
const { AsyncWrap, Providers } = process.binding('async_wrap');
|
|
const { Buffer } = require('buffer');
|
|
const { INT_MAX, scrypt: _scrypt } = process.binding('crypto');
|
|
const { validateInt32 } = require('internal/validators');
|
|
const {
|
|
ERR_CRYPTO_SCRYPT_INVALID_PARAMETER,
|
|
ERR_CRYPTO_SCRYPT_NOT_SUPPORTED,
|
|
ERR_INVALID_CALLBACK,
|
|
} = require('internal/errors').codes;
|
|
const {
|
|
checkIsArrayBufferView,
|
|
getDefaultEncoding,
|
|
} = require('internal/crypto/util');
|
|
|
|
const defaults = {
|
|
N: 16384,
|
|
r: 8,
|
|
p: 1,
|
|
maxmem: 32 << 20, // 32 MB, matches SCRYPT_MAX_MEM.
|
|
};
|
|
|
|
function scrypt(password, salt, keylen, options, callback = defaults) {
|
|
if (callback === defaults) {
|
|
callback = options;
|
|
options = defaults;
|
|
}
|
|
|
|
options = check(password, salt, keylen, options);
|
|
const { N, r, p, maxmem } = options;
|
|
({ password, salt, keylen } = options);
|
|
|
|
if (typeof callback !== 'function')
|
|
throw new ERR_INVALID_CALLBACK();
|
|
|
|
const encoding = getDefaultEncoding();
|
|
const keybuf = Buffer.alloc(keylen);
|
|
|
|
const wrap = new AsyncWrap(Providers.SCRYPTREQUEST);
|
|
wrap.ondone = (ex) => { // Retains keybuf while request is in flight.
|
|
if (ex) return callback.call(wrap, ex);
|
|
if (encoding === 'buffer') return callback.call(wrap, null, keybuf);
|
|
callback.call(wrap, null, keybuf.toString(encoding));
|
|
};
|
|
|
|
handleError(keybuf, password, salt, N, r, p, maxmem, wrap);
|
|
}
|
|
|
|
function scryptSync(password, salt, keylen, options = defaults) {
|
|
options = check(password, salt, keylen, options);
|
|
const { N, r, p, maxmem } = options;
|
|
({ password, salt, keylen } = options);
|
|
const keybuf = Buffer.alloc(keylen);
|
|
handleError(keybuf, password, salt, N, r, p, maxmem);
|
|
const encoding = getDefaultEncoding();
|
|
if (encoding === 'buffer') return keybuf;
|
|
return keybuf.toString(encoding);
|
|
}
|
|
|
|
function handleError(keybuf, password, salt, N, r, p, maxmem, wrap) {
|
|
const ex = _scrypt(keybuf, password, salt, N, r, p, maxmem, wrap);
|
|
|
|
if (ex === undefined)
|
|
return;
|
|
|
|
if (ex === null)
|
|
throw new ERR_CRYPTO_SCRYPT_INVALID_PARAMETER(); // Bad N, r, p, or maxmem.
|
|
|
|
throw ex; // Scrypt operation failed, exception object contains details.
|
|
}
|
|
|
|
function check(password, salt, keylen, options, callback) {
|
|
if (_scrypt === undefined)
|
|
throw new ERR_CRYPTO_SCRYPT_NOT_SUPPORTED();
|
|
|
|
password = checkIsArrayBufferView('password', password);
|
|
salt = checkIsArrayBufferView(salt, 'salt');
|
|
keylen = validateInt32(keylen, 'keylen', 0, INT_MAX);
|
|
|
|
let { N, r, p, maxmem } = defaults;
|
|
if (options && options !== defaults) {
|
|
if (options.hasOwnProperty('N'))
|
|
N = validateInt32(options.N, 'N', 0, INT_MAX);
|
|
if (options.hasOwnProperty('r'))
|
|
r = validateInt32(options.r, 'r', 0, INT_MAX);
|
|
if (options.hasOwnProperty('p'))
|
|
p = validateInt32(options.p, 'p', 0, INT_MAX);
|
|
if (options.hasOwnProperty('maxmem'))
|
|
maxmem = validateInt32(options.maxmem, 'maxmem', 0, INT_MAX);
|
|
if (N === 0) N = defaults.N;
|
|
if (r === 0) r = defaults.r;
|
|
if (p === 0) p = defaults.p;
|
|
if (maxmem === 0) maxmem = defaults.maxmem;
|
|
}
|
|
|
|
return { password, salt, keylen, N, r, p, maxmem };
|
|
}
|
|
|
|
module.exports = { scrypt, scryptSync };
|