1212
1313namespace workerd ::api::node {
1414
15- jsg::BufferSource CryptoImpl::getHkdf (jsg::Lock& js,
16- kj::String hash,
15+ kj::Array<kj::byte> CryptoImpl::getHkdf (kj::String hash,
1716 kj::Array<const kj::byte> key,
1817 kj::Array<const kj::byte> salt,
1918 kj::Array<const kj::byte> info,
@@ -44,10 +43,10 @@ jsg::BufferSource CryptoImpl::getHkdf(jsg::Lock& js,
4443 JSG_REQUIRE (
4544 length <= EVP_MD_size (digest) * kMaxDigestMultiplier , RangeError, " Invalid Hkdf key length" );
4645
47- return JSG_REQUIRE_NONNULL (hkdf (js, length, digest, key, salt, info), Error, " Hkdf failed" );
46+ return JSG_REQUIRE_NONNULL (hkdf (length, digest, key, salt, info), Error, " Hkdf failed" );
4847}
4948
50- jsg::BufferSource CryptoImpl::getPbkdf (jsg::Lock& js,
49+ kj::Array<kj::byte> CryptoImpl::getPbkdf (jsg::Lock& js,
5150 kj::Array<const kj::byte> password,
5251 kj::Array<const kj::byte> salt,
5352 uint32_t num_iterations,
@@ -71,10 +70,10 @@ jsg::BufferSource CryptoImpl::getPbkdf(jsg::Lock& js,
7170
7271 // Both pass and salt may be zero length here.
7372 return JSG_REQUIRE_NONNULL (
74- pbkdf2 (js, keylen, num_iterations, digest, password, salt), Error, " Pbkdf2 failed" );
73+ pbkdf2 (keylen, num_iterations, digest, password, salt), Error, " Pbkdf2 failed" );
7574}
7675
77- jsg::BufferSource CryptoImpl::getScrypt (jsg::Lock& js,
76+ kj::Array<kj::byte> CryptoImpl::getScrypt (jsg::Lock& js,
7877 kj::Array<const kj::byte> password,
7978 kj::Array<const kj::byte> salt,
8079 uint32_t N,
@@ -87,7 +86,7 @@ jsg::BufferSource CryptoImpl::getScrypt(jsg::Lock& js,
8786 JSG_REQUIRE (salt.size () <= INT32_MAX, RangeError, " Scrypt failed: salt is too large" );
8887
8988 return JSG_REQUIRE_NONNULL (
90- scrypt (js, keylen, N, r, p, maxmem, password, salt), Error, " Scrypt failed" );
89+ scrypt (keylen, N, r, p, maxmem, password, salt), Error, " Scrypt failed" );
9190}
9291
9392bool CryptoImpl::verifySpkac (kj::Array<const kj::byte> input) {
0 commit comments