GT2/GT2-iOS/node_modules/bcrypt-pbkdf/package.json

86 lines
3.5 KiB
JSON

{
"_args": [
[
{
"raw": "bcrypt-pbkdf@^1.0.0",
"scope": null,
"escapedName": "bcrypt-pbkdf",
"name": "bcrypt-pbkdf",
"rawSpec": "^1.0.0",
"spec": ">=1.0.0 <2.0.0",
"type": "range"
},
"/Volumes/2009-SSD/GT2/GT2-iOS/node_modules/sshpk"
]
],
"_from": "bcrypt-pbkdf@>=1.0.0 <2.0.0",
"_id": "bcrypt-pbkdf@1.0.1",
"_inCache": true,
"_location": "/bcrypt-pbkdf",
"_nodeVersion": "0.12.9",
"_npmOperationalInternal": {
"host": "packages-18-east.internal.npmjs.com",
"tmp": "tmp/bcrypt-pbkdf-1.0.1.tgz_1486007687899_0.974529881728813"
},
"_npmUser": {
"name": "arekinath",
"email": "alex@cooperi.net"
},
"_npmVersion": "2.14.9",
"_phantomChildren": {},
"_requested": {
"raw": "bcrypt-pbkdf@^1.0.0",
"scope": null,
"escapedName": "bcrypt-pbkdf",
"name": "bcrypt-pbkdf",
"rawSpec": "^1.0.0",
"spec": ">=1.0.0 <2.0.0",
"type": "range"
},
"_requiredBy": [
"/sshpk"
],
"_resolved": "https://registry.npmjs.org/bcrypt-pbkdf/-/bcrypt-pbkdf-1.0.1.tgz",
"_shasum": "63bc5dcb61331b92bc05fd528953c33462a06f8d",
"_shrinkwrap": null,
"_spec": "bcrypt-pbkdf@^1.0.0",
"_where": "/Volumes/2009-SSD/GT2/GT2-iOS/node_modules/sshpk",
"dependencies": {
"tweetnacl": "^0.14.3"
},
"description": "Port of the OpenBSD bcrypt_pbkdf function to pure JS",
"devDependencies": {},
"directories": {},
"dist": {
"shasum": "63bc5dcb61331b92bc05fd528953c33462a06f8d",
"tarball": "https://registry.npmjs.org/bcrypt-pbkdf/-/bcrypt-pbkdf-1.0.1.tgz"
},
"gitHead": "fa2ab3ae9efa15367264151398635a915c7b411d",
"license": "BSD-3-Clause",
"main": "index.js",
"maintainers": [
{
"name": "arekinath",
"email": "alex@cooperi.net"
},
{
"name": "dap",
"email": "dap@cs.brown.edu"
},
{
"name": "jclulow",
"email": "josh@sysmgr.org"
},
{
"name": "trentm",
"email": "trentm@gmail.com"
}
],
"name": "bcrypt-pbkdf",
"optionalDependencies": {},
"readme": "Port of the OpenBSD `bcrypt_pbkdf` function to pure Javascript. `npm`-ified\nversion of [Devi Mandiri's port]\n(https://github.com/devi/tmp/blob/master/js/bcrypt_pbkdf.js),\nwith some minor performance improvements. The code is copied verbatim (and\nun-styled) from Devi's work.\n\nThis product includes software developed by Niels Provos.\n\n## API\n\n### `bcrypt_pbkdf.pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds)`\n\nDerive a cryptographic key of arbitrary length from a given password and salt,\nusing the OpenBSD `bcrypt_pbkdf` function. This is a combination of Blowfish and\nSHA-512.\n\nSee [this article](http://www.tedunangst.com/flak/post/bcrypt-pbkdf) for\nfurther information.\n\nParameters:\n\n * `pass`, a Uint8Array of length `passlen`\n * `passlen`, an integer Number\n * `salt`, a Uint8Array of length `saltlen`\n * `saltlen`, an integer Number\n * `key`, a Uint8Array of length `keylen`, will be filled with output\n * `keylen`, an integer Number\n * `rounds`, an integer Number, number of rounds of the PBKDF to run\n\n### `bcrypt_pbkdf.hash(sha2pass, sha2salt, out)`\n\nCalculate a Blowfish hash, given SHA2-512 output of a password and salt. Used as\npart of the inner round function in the PBKDF.\n\nParameters:\n\n * `sha2pass`, a Uint8Array of length 64\n * `sha2salt`, a Uint8Array of length 64\n * `out`, a Uint8Array of length 32, will be filled with output\n",
"readmeFilename": "README.md",
"scripts": {},
"version": "1.0.1"
}