@@ -60,11 +60,11 @@ function HKDF_extract(salt, ikm) {
60
60
function HKDF_expand ( prk , info , l ) {
61
61
keylog ( 'prk' , prk ) ;
62
62
keylog ( 'info' , info ) ;
63
- var output = new Buffer ( 0 ) ;
64
- var T = new Buffer ( 0 ) ;
65
- info = new Buffer ( info , 'ascii' ) ;
63
+ var output = Buffer . alloc ( 0 ) ;
64
+ var T = Buffer . alloc ( 0 ) ;
65
+ info = Buffer . from ( info , 'ascii' ) ;
66
66
var counter = 0 ;
67
- var cbuf = new Buffer ( 1 ) ;
67
+ var cbuf = Buffer . alloc ( 1 ) ;
68
68
while ( output . length < l ) {
69
69
cbuf . writeUIntBE ( ++ counter , 0 , 1 ) ;
70
70
T = HMAC_hash ( prk , Buffer . concat ( [ T , info , cbuf ] ) ) ;
@@ -80,15 +80,15 @@ function HKDF(salt, ikm, info, len) {
80
80
81
81
function info ( base , context ) {
82
82
var result = Buffer . concat ( [
83
- new Buffer ( 'Content-Encoding: ' + base + '\0' , 'ascii' ) ,
83
+ Buffer . from ( 'Content-Encoding: ' + base + '\0' , 'ascii' ) ,
84
84
context
85
85
] ) ;
86
86
keylog ( 'info ' + base , result ) ;
87
87
return result ;
88
88
}
89
89
90
90
function lengthPrefix ( buffer ) {
91
- var b = Buffer . concat ( [ new Buffer ( 2 ) , buffer ] ) ;
91
+ var b = Buffer . concat ( [ Buffer . alloc ( 2 ) , buffer ] ) ;
92
92
b . writeUIntBE ( buffer . length , 0 , 2 ) ;
93
93
return b ;
94
94
}
@@ -118,7 +118,7 @@ function extractDH(header, mode) {
118
118
}
119
119
120
120
function extractSecretAndContext ( header , mode ) {
121
- var result = { secret : null , context : new Buffer ( 0 ) } ;
121
+ var result = { secret : null , context : Buffer . alloc ( 0 ) } ;
122
122
if ( header . key ) {
123
123
result . secret = header . key ;
124
124
if ( result . secret . length !== KEY_LENGTH ) {
@@ -136,7 +136,7 @@ function extractSecretAndContext(header, mode) {
136
136
keylog ( 'context' , result . context ) ;
137
137
if ( header . authSecret ) {
138
138
result . secret = HKDF ( header . authSecret , result . secret ,
139
- info ( 'auth' , new Buffer ( 0 ) ) , SHA_256_LENGTH ) ;
139
+ info ( 'auth' , Buffer . alloc ( 0 ) ) , SHA_256_LENGTH ) ;
140
140
keylog ( 'authsecret' , result . secret ) ;
141
141
}
142
142
return result ;
@@ -279,7 +279,7 @@ function parseParams(params) {
279
279
}
280
280
281
281
function generateNonce ( base , counter ) {
282
- var nonce = new Buffer ( base ) ;
282
+ var nonce = Buffer . from ( base ) ;
283
283
var m = nonce . readUIntBE ( nonce . length - 6 , 6 ) ;
284
284
var x = ( ( m ^ counter ) & 0xffffff ) +
285
285
( ( ( ( m / 0x1000000 ) ^ ( counter / 0x1000000 ) ) & 0xffffff ) * 0x1000000 ) ;
@@ -305,7 +305,7 @@ function unpadLegacy(data, version) {
305
305
throw new Error ( 'padding exceeds block size' ) ;
306
306
}
307
307
keylog ( 'padding' , data . slice ( 0 , padSize + pad ) ) ;
308
- var padCheck = new Buffer ( pad ) ;
308
+ var padCheck = Buffer . alloc ( pad ) ;
309
309
padCheck . fill ( 0 ) ;
310
310
if ( padCheck . compare ( data . slice ( padSize , padSize + pad ) ) !== 0 ) {
311
311
throw new Error ( 'invalid padding' ) ;
@@ -371,7 +371,7 @@ function decrypt(buffer, params, keyLookupCallback) {
371
371
}
372
372
var key = deriveKeyAndNonce ( header , MODE_DECRYPT , keyLookupCallback ) ;
373
373
var start = 0 ;
374
- var result = new Buffer ( 0 ) ;
374
+ var result = Buffer . alloc ( 0 ) ;
375
375
376
376
var chunkSize = header . rs ;
377
377
if ( header . version !== 'aes128gcm' ) {
@@ -403,7 +403,7 @@ function encryptRecord(key, counter, buffer, pad, header, last) {
403
403
404
404
var ciphertext = [ ] ;
405
405
var padSize = PAD_SIZE [ header . version ] ;
406
- var padding = new Buffer ( pad + padSize ) ;
406
+ var padding = Buffer . alloc ( pad + padSize ) ;
407
407
padding . fill ( 0 ) ;
408
408
409
409
if ( header . version !== 'aes128gcm' ) {
@@ -432,7 +432,7 @@ function encryptRecord(key, counter, buffer, pad, header, last) {
432
432
}
433
433
434
434
function writeHeader ( header ) {
435
- var ints = new Buffer ( 5 ) ;
435
+ var ints = Buffer . alloc ( 5 ) ;
436
436
var keyid = Buffer . from ( header . keyid || [ ] ) ;
437
437
if ( keyid . length > 255 ) {
438
438
throw new Error ( 'keyid is too large' ) ;
@@ -474,7 +474,7 @@ function encrypt(buffer, params, keyLookupCallback) {
474
474
result = writeHeader ( header ) ;
475
475
} else {
476
476
// No header on other versions
477
- result = new Buffer ( 0 ) ;
477
+ result = Buffer . alloc ( 0 ) ;
478
478
}
479
479
480
480
var key = deriveKeyAndNonce ( header , MODE_ENCRYPT , keyLookupCallback ) ;
0 commit comments