Created
May 14, 2010 12:53
-
-
Save darrinholst/401114 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html> | |
<head> | |
<script> | |
var chrsz = 8; | |
var hexcase = 0; | |
function hex2bin(hex_str) | |
{ | |
var char_str = ""; | |
var num_str = ""; | |
var i; | |
for(i = 0; i < hex_str.length; i += 2) { | |
char_str += String.fromCharCode(parseInt(hex_str.substring(i, i + 2), 16)); | |
} | |
return char_str; | |
} | |
function s2a(string) { | |
var array = []; | |
for(var i = 0; i < string.length; i++) | |
{ | |
array[i] = string.charCodeAt(i); | |
} | |
return array; | |
} | |
function str2binb(str) | |
{ | |
var bin = Array(); | |
var mask = (1 << chrsz) - 1; | |
for(var i = 0; i < str.length * chrsz; i += chrsz) | |
bin[i >> 5] |= (str.charCodeAt(i / chrsz) & mask) << (32 - chrsz - i % 32); | |
return bin; | |
} | |
function binb2hex(binarray) | |
{ | |
var hex_tab = hexcase ? "0123456789ABCDEF" : "0123456789abcdef"; | |
var str = ""; | |
for(var i = 0; i < binarray.length * 4; i++) | |
{ | |
str += hex_tab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8 + 4)) & 0xF) + | |
hex_tab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8 )) & 0xF); | |
} | |
return str; | |
} | |
function core_sha1(x, len) | |
{ | |
x[len >> 5] |= 0x80 << (24 - len % 32); | |
x[((len + 64 >> 9) << 4) + 15] = len; | |
var w = Array(80); | |
var a = 1732584193; | |
var b = -271733879; | |
var c = -1732584194; | |
var d = 271733878; | |
var e = -1009589776; | |
for(var i = 0; i < x.length; i += 16) | |
{ | |
var olda = a; | |
var oldb = b; | |
var oldc = c; | |
var oldd = d; | |
var olde = e; | |
for(var j = 0; j < 80; j++) | |
{ | |
if(j < 16) w[j] = x[i + j]; | |
else w[j] = rol(w[j - 3] ^ w[j - 8] ^ w[j - 14] ^ w[j - 16], 1); | |
var t = safe_add(safe_add(rol(a, 5), sha1_ft(j, b, c, d)), | |
safe_add(safe_add(e, w[j]), sha1_kt(j))); | |
e = d; | |
d = c; | |
c = rol(b, 30); | |
b = a; | |
a = t; | |
} | |
a = safe_add(a, olda); | |
b = safe_add(b, oldb); | |
c = safe_add(c, oldc); | |
d = safe_add(d, oldd); | |
e = safe_add(e, olde); | |
} | |
return Array(a, b, c, d, e); | |
} | |
function sha1_ft(t, b, c, d) | |
{ | |
if(t < 20) return (b & c) | ((~b) & d); | |
if(t < 40) return b ^ c ^ d; | |
if(t < 60) return (b & c) | (b & d) | (c & d); | |
return b ^ c ^ d; | |
} | |
function sha1_kt(t) | |
{ | |
return (t < 20) ? 1518500249 : (t < 40) ? 1859775393 : | |
(t < 60) ? -1894007588 : -899497514; | |
} | |
function safe_add(x, y) | |
{ | |
var lsw = (x & 0xFFFF) + (y & 0xFFFF); | |
var msw = (x >> 16) + (y >> 16) + (lsw >> 16); | |
return (msw << 16) | (lsw & 0xFFFF); | |
} | |
function rol(num, cnt) | |
{ | |
return (num << cnt) | (num >>> (32 - cnt)); | |
} | |
function PBKDF2(password, salt, num_iterations, num_bytes) { | |
var m_bpassword = str2binb(password); | |
var m_salt = salt; | |
var m_total_iterations = num_iterations; | |
var m_iterations_in_chunk = 100; | |
var m_iterations_done = 0; | |
var m_key_length = num_bytes; | |
var m_hash_length = 20; | |
var m_total_blocks = Math.ceil(m_key_length / m_hash_length); | |
var m_current_block = 1; | |
var m_ipad = new Array(16); | |
var m_opad = new Array(16); | |
var m_buffer = new Array(0x0, 0x0, 0x0, 0x0, 0x0); | |
var m_key = ""; | |
var m_result_func; | |
var m_status_func; | |
if(m_bpassword.length > 16) { | |
m_bpassword = core_sha1(m_bpassword, password.length * chrsz); | |
} | |
for(var i = 0; i < 16; ++i) { | |
m_ipad[i] = m_bpassword[i] ^ 0x36363636; | |
m_opad[i] = m_bpassword[i] ^ 0x5C5C5C5C; | |
} | |
this.deriveKey = function() { | |
return this.do_PBKDF2_iterations(); | |
} | |
this.do_PBKDF2_iterations = function() | |
{ | |
while(1) { | |
var iterations = m_total_iterations; | |
for(var i = 0; i < iterations; ++i) { | |
if(m_iterations_done == 0) { | |
var salt_block = m_salt + | |
String.fromCharCode(m_current_block >> 24 & 0xF) + | |
String.fromCharCode(m_current_block >> 16 & 0xF) + | |
String.fromCharCode(m_current_block >> 8 & 0xF) + | |
String.fromCharCode(m_current_block & 0xF); | |
m_hash = core_sha1(m_ipad.concat(str2binb(salt_block)), 512 + salt_block.length * 8); | |
m_hash = core_sha1(m_opad.concat(m_hash), 512 + 160); | |
} | |
else { | |
m_hash = core_sha1(m_ipad.concat(m_hash), 512 + m_hash.length * 32); | |
m_hash = core_sha1(m_opad.concat(m_hash), 512 + 160); | |
} | |
for(var j = 0; j < m_hash.length; ++j) { | |
m_buffer[j] ^= m_hash[j]; | |
} | |
m_iterations_done++; | |
} | |
if(m_current_block < m_total_blocks) { | |
m_key += binb2hex(m_buffer); | |
m_current_block++; | |
m_buffer = new Array(0x0, 0x0, 0x0, 0x0, 0x0); | |
m_iterations_done = 0; | |
} | |
else { | |
var tmp = binb2hex(m_buffer); | |
m_key += tmp.substr(0, (m_key_length - (m_total_blocks - 1) * m_hash_length) * 2); | |
return s2a(hex2bin(m_key)); | |
} | |
} | |
} | |
} | |
alert(new PBKDF2("password", "salt", 1000, 32).deriveKey()); | |
</script> | |
</head> | |
<body> | |
</body> | |
</html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment