You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Perhaps I am "doing it wrong" (it happens a lot), but the pbkdf2 function returns a 16 byte zeroed out key if an undefined klass is passed in as an argument:
varargs={key: pass,salt: salt,c: 1000,dkLen: 128,klass: undefined// XXX: using triplesec.HMAC_SHA256 of course works!};triplesec.pbkdf2(args,functioncallback(key){console.log('PBKDF2 callback key: ',key);// this key is basically [0,0,0,0,0,0,0...]});
btw: I would be happy to produce some clear usage examples if you have a place for them.
The text was updated successfully, but these errors were encountered:
Looking at the Iced Coffee source for the PBKDF2 function (triplesec/src/pbkdf2.iced
), there should be checks near line 73 and/or 106 to prevent that, where "if (klass==undefined) klass = HMAC-512," or something to that effect. I'm not familiar enough with the language nomenclature to suggest the exact fix.
Perhaps I am "doing it wrong" (it happens a lot), but the pbkdf2 function returns a 16 byte zeroed out key if an undefined klass is passed in as an argument:
btw: I would be happy to produce some clear usage examples if you have a place for them.
The text was updated successfully, but these errors were encountered: