package.json 3.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. {
  2. "_args": [
  3. [
  4. {
  5. "raw": "bcrypt-pbkdf@^1.0.0",
  6. "scope": null,
  7. "escapedName": "bcrypt-pbkdf",
  8. "name": "bcrypt-pbkdf",
  9. "rawSpec": "^1.0.0",
  10. "spec": ">=1.0.0 <2.0.0",
  11. "type": "range"
  12. },
  13. "/mnt/Data/bach/Documents/ola/OLA#4/OLA#4DOC/sys/node_modules/sshpk"
  14. ]
  15. ],
  16. "_from": "bcrypt-pbkdf@>=1.0.0 <2.0.0",
  17. "_id": "bcrypt-pbkdf@1.0.1",
  18. "_inCache": true,
  19. "_location": "/bcrypt-pbkdf",
  20. "_nodeVersion": "0.12.9",
  21. "_npmOperationalInternal": {
  22. "host": "packages-18-east.internal.npmjs.com",
  23. "tmp": "tmp/bcrypt-pbkdf-1.0.1.tgz_1486007687899_0.974529881728813"
  24. },
  25. "_npmUser": {
  26. "name": "arekinath",
  27. "email": "alex@cooperi.net"
  28. },
  29. "_npmVersion": "2.14.9",
  30. "_phantomChildren": {},
  31. "_requested": {
  32. "raw": "bcrypt-pbkdf@^1.0.0",
  33. "scope": null,
  34. "escapedName": "bcrypt-pbkdf",
  35. "name": "bcrypt-pbkdf",
  36. "rawSpec": "^1.0.0",
  37. "spec": ">=1.0.0 <2.0.0",
  38. "type": "range"
  39. },
  40. "_requiredBy": [
  41. "/sshpk"
  42. ],
  43. "_resolved": "https://registry.npmjs.org/bcrypt-pbkdf/-/bcrypt-pbkdf-1.0.1.tgz",
  44. "_shasum": "63bc5dcb61331b92bc05fd528953c33462a06f8d",
  45. "_shrinkwrap": null,
  46. "_spec": "bcrypt-pbkdf@^1.0.0",
  47. "_where": "/mnt/Data/bach/Documents/ola/OLA#4/OLA#4DOC/sys/node_modules/sshpk",
  48. "dependencies": {
  49. "tweetnacl": "^0.14.3"
  50. },
  51. "description": "Port of the OpenBSD bcrypt_pbkdf function to pure JS",
  52. "devDependencies": {},
  53. "directories": {},
  54. "dist": {
  55. "shasum": "63bc5dcb61331b92bc05fd528953c33462a06f8d",
  56. "tarball": "https://registry.npmjs.org/bcrypt-pbkdf/-/bcrypt-pbkdf-1.0.1.tgz"
  57. },
  58. "gitHead": "fa2ab3ae9efa15367264151398635a915c7b411d",
  59. "license": "BSD-3-Clause",
  60. "main": "index.js",
  61. "maintainers": [
  62. {
  63. "name": "arekinath",
  64. "email": "alex@cooperi.net"
  65. },
  66. {
  67. "name": "dap",
  68. "email": "dap@cs.brown.edu"
  69. },
  70. {
  71. "name": "jclulow",
  72. "email": "josh@sysmgr.org"
  73. },
  74. {
  75. "name": "trentm",
  76. "email": "trentm@gmail.com"
  77. }
  78. ],
  79. "name": "bcrypt-pbkdf",
  80. "optionalDependencies": {},
  81. "readme": "Port of the OpenBSD `bcrypt_pbkdf` function to pure Javascript. `npm`-ified\nversion of [Devi Mandiri's port]\n(https://github.com/devi/tmp/blob/master/js/bcrypt_pbkdf.js),\nwith some minor performance improvements. The code is copied verbatim (and\nun-styled) from Devi's work.\n\nThis product includes software developed by Niels Provos.\n\n## API\n\n### `bcrypt_pbkdf.pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds)`\n\nDerive a cryptographic key of arbitrary length from a given password and salt,\nusing the OpenBSD `bcrypt_pbkdf` function. This is a combination of Blowfish and\nSHA-512.\n\nSee [this article](http://www.tedunangst.com/flak/post/bcrypt-pbkdf) for\nfurther information.\n\nParameters:\n\n * `pass`, a Uint8Array of length `passlen`\n * `passlen`, an integer Number\n * `salt`, a Uint8Array of length `saltlen`\n * `saltlen`, an integer Number\n * `key`, a Uint8Array of length `keylen`, will be filled with output\n * `keylen`, an integer Number\n * `rounds`, an integer Number, number of rounds of the PBKDF to run\n\n### `bcrypt_pbkdf.hash(sha2pass, sha2salt, out)`\n\nCalculate a Blowfish hash, given SHA2-512 output of a password and salt. Used as\npart of the inner round function in the PBKDF.\n\nParameters:\n\n * `sha2pass`, a Uint8Array of length 64\n * `sha2salt`, a Uint8Array of length 64\n * `out`, a Uint8Array of length 32, will be filled with output\n",
  82. "readmeFilename": "README.md",
  83. "scripts": {},
  84. "version": "1.0.1"
  85. }