Browser-compatible implementation of Node.js crypto module providing cryptographic operations in web environments.
Overall
score
100%
{
"context": "This evaluation assesses how effectively an engineer uses crypto-browserify's PBKDF2 functionality (pbkdf2 and pbkdf2Sync functions) to implement password-based key derivation. The focus is on proper usage of the library's API for both synchronous and asynchronous key generation with appropriate parameters.",
"type": "weighted_checklist",
"checklist": [
{
"name": "Uses pbkdf2Sync",
"description": "Implementation correctly uses crypto-browserify's pbkdf2Sync function for synchronous key derivation with all required parameters (password, salt, iterations, keylen, digest)",
"max_score": 30
},
{
"name": "Uses pbkdf2",
"description": "Implementation correctly uses crypto-browserify's pbkdf2 function for asynchronous key derivation with all required parameters including the callback function",
"max_score": 30
},
{
"name": "Proper parameter passing",
"description": "All five parameters (password, salt, iterations, keyLength, algorithm/digest) are correctly passed to both pbkdf2 and pbkdf2Sync functions in the correct order",
"max_score": 20
},
{
"name": "Callback handling",
"description": "Asynchronous implementation properly handles the callback pattern with error-first callback (err, derivedKey) as specified by crypto-browserify's pbkdf2 API",
"max_score": 15
},
{
"name": "Returns Buffer",
"description": "Functions correctly return or pass Buffer objects as the derived keys, matching crypto-browserify's pbkdf2/pbkdf2Sync return types",
"max_score": 5
}
]
}Install with Tessl CLI
npx tessl i tessl/npm-crypto-browserifydocs
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10