ipfs storage for images and other nontext items. for use with etica - runs on etica network and currencys
https://collect.etica-stats.org
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
99 lines
3.8 KiB
99 lines
3.8 KiB
import { scrypt as _nobleSync, scryptAsync as _nobleAsync } from "@noble/hashes/scrypt"; |
|
import { getBytes, hexlify as H } from "../utils/index.js"; |
|
let lockedSync = false, lockedAsync = false; |
|
const _scryptAsync = async function (passwd, salt, N, r, p, dkLen, onProgress) { |
|
return await _nobleAsync(passwd, salt, { N, r, p, dkLen, onProgress }); |
|
}; |
|
const _scryptSync = function (passwd, salt, N, r, p, dkLen) { |
|
return _nobleSync(passwd, salt, { N, r, p, dkLen }); |
|
}; |
|
let __scryptAsync = _scryptAsync; |
|
let __scryptSync = _scryptSync; |
|
/** |
|
* The [[link-wiki-scrypt]] uses a memory and cpu hard method of |
|
* derivation to increase the resource cost to brute-force a password |
|
* for a given key. |
|
* |
|
* This means this algorithm is intentionally slow, and can be tuned to |
|
* become slower. As computation and memory speed improve over time, |
|
* increasing the difficulty maintains the cost of an attacker. |
|
* |
|
* For example, if a target time of 5 seconds is used, a legitimate user |
|
* which knows their password requires only 5 seconds to unlock their |
|
* account. A 6 character password has 68 billion possibilities, which |
|
* would require an attacker to invest over 10,000 years of CPU time. This |
|
* is of course a crude example (as password generally aren't random), |
|
* but demonstrates to value of imposing large costs to decryption. |
|
* |
|
* For this reason, if building a UI which involved decrypting or |
|
* encrypting datsa using scrypt, it is recommended to use a |
|
* [[ProgressCallback]] (as event short periods can seem lik an eternity |
|
* if the UI freezes). Including the phrase //"decrypting"// in the UI |
|
* can also help, assuring the user their waiting is for a good reason. |
|
* |
|
* @_docloc: api/crypto:Passwords |
|
* |
|
* @example: |
|
* // The password must be converted to bytes, and it is generally |
|
* // best practices to ensure the string has been normalized. Many |
|
* // formats explicitly indicate the normalization form to use. |
|
* password = "hello" |
|
* passwordBytes = toUtf8Bytes(password, "NFKC") |
|
* |
|
* salt = id("some-salt") |
|
* |
|
* // Compute the scrypt |
|
* scrypt(passwordBytes, salt, 1024, 8, 1, 16) |
|
* //_result: |
|
*/ |
|
export async function scrypt(_passwd, _salt, N, r, p, dkLen, progress) { |
|
const passwd = getBytes(_passwd, "passwd"); |
|
const salt = getBytes(_salt, "salt"); |
|
return H(await __scryptAsync(passwd, salt, N, r, p, dkLen, progress)); |
|
} |
|
scrypt._ = _scryptAsync; |
|
scrypt.lock = function () { lockedAsync = true; }; |
|
scrypt.register = function (func) { |
|
if (lockedAsync) { |
|
throw new Error("scrypt is locked"); |
|
} |
|
__scryptAsync = func; |
|
}; |
|
Object.freeze(scrypt); |
|
/** |
|
* Provides a synchronous variant of [[scrypt]]. |
|
* |
|
* This will completely lock up and freeze the UI in a browser and will |
|
* prevent any event loop from progressing. For this reason, it is |
|
* preferred to use the [async variant](scrypt). |
|
* |
|
* @_docloc: api/crypto:Passwords |
|
* |
|
* @example: |
|
* // The password must be converted to bytes, and it is generally |
|
* // best practices to ensure the string has been normalized. Many |
|
* // formats explicitly indicate the normalization form to use. |
|
* password = "hello" |
|
* passwordBytes = toUtf8Bytes(password, "NFKC") |
|
* |
|
* salt = id("some-salt") |
|
* |
|
* // Compute the scrypt |
|
* scryptSync(passwordBytes, salt, 1024, 8, 1, 16) |
|
* //_result: |
|
*/ |
|
export function scryptSync(_passwd, _salt, N, r, p, dkLen) { |
|
const passwd = getBytes(_passwd, "passwd"); |
|
const salt = getBytes(_salt, "salt"); |
|
return H(__scryptSync(passwd, salt, N, r, p, dkLen)); |
|
} |
|
scryptSync._ = _scryptSync; |
|
scryptSync.lock = function () { lockedSync = true; }; |
|
scryptSync.register = function (func) { |
|
if (lockedSync) { |
|
throw new Error("scryptSync is locked"); |
|
} |
|
__scryptSync = func; |
|
}; |
|
Object.freeze(scryptSync); |
|
//# sourceMappingURL=scrypt.js.map
|