Press n or j to go to the next uncovered block, b, p or k for the previous block.
| 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 | 4x 1x 3x 1x 2x 2x 2x 2x 1x | /**
* @file MFKDF Passkey Factor Derivation
* @copyright Multifactor, Inc. 2022–2025
*
* @description
* Derive passkey factor for multi-factor key derivation
*
* @author Vivek Nair (https://nair.me) <vivek@nair.me>
*/
/**
* Derive an MFKDF passkey factor
*
* @example
* const prf = await crypto.randomBytes(32)
*
* const setup = await mfkdf.setup.key([
* await mfkdf.setup.factors.passkey(prf)
* ])
*
* const derive = await mfkdf.derive.key(setup.policy, {
* passkey: mfkdf.derive.factors.passkey(prf)
* })
*
* derive.key.toString('hex').should.equal(setup.key.toString('hex'))
*
* @param {Buffer} secret - The 256-bit PRF secret from which to derive an MFKDF factor
* @returns {function(config:Object): Promise<MFKDFFactor>} Async function to generate MFKDF factor information
* @author Vivek Nair (https://nair.me) <vivek@nair.me>
* @since 2.0.0
* @memberof derive.factors
*/
function passkey (secret) {
if (!Buffer.isBuffer(secret)) {
throw new TypeError('secret must be a Buffer')
}
if (Buffer.byteLength(secret) !== 32) {
throw new RangeError('secret must be 32 bytes (256 bits) in length')
}
return async () => {
return {
type: 'passkey',
data: secret,
params: async () => {
return {}
},
output: async () => {
return {}
}
}
}
}
module.exports.passkey = passkey
|