úι†     0Encapsulates the three tuning parameters to the   function: N,  r and p7. The parameters affect running time and memory usage:  Memory usage is approximately 128*r*N bytes. Note that the    function takes log_2(N)$ as a parameter. As an example, the   defaultParams  ! log_2(N) = 14, r = 8 and p = 1lead to   using 128 * 8 * 2^14 = 16M bytes of memory.  Running time is proportional to all of N, r and p . However  pC only as an insignificant influence on memory usage an can thus be # used to tune the running time of  .  Constructor function for the  data type log_2(N). Scrypt's N* parameter must be a power of two greater  than one, thus it'4s logarithm to base two must be greater than zero. The parameter r, must be greater than zero. The parameter p, must be greater than zero. r and p  must satisfy r*p < 2^30. Returns + the parameter object for valid arguments,  otherwise . HCalculates a 64-byte hash from the given password, salt and parameters. Note the prime symbol (' ). Calls   with default parameters as # recommended in the scrypt paper:   N = 2^14, r = 8, p = 1Equivalent to   ( (  14 8 1)). !Reads a 32-byte random salt from /dev/urandom.             scrypt-0.2.0 Crypto.Scrypt ScryptParamsPassHashunHashSaltunSaltPassunPassparamsscryptscrypt'getSalt crypto_scryptParamslogNrpbufLenbase Data.MaybeJustNothingfromJust