This might be a bit late, but I too have recently been looking into how to do client-side cryptographic hashing, and the answer by Kevin Hakanson was very helpful, the demo site is very useful too! It shows how to use a custom PseudoRandom Function with PBKDF2 (the HMAC and SHA1), but I figured out that if one is not passed in, SJCL has defaults and I just wanted to show how to do that, along with generating a random salt.
I also found the sjcl docs quite helpful.
To generate a random salt and use PBKDF2 on the password "password", you could do this, which ends up being just 3 lines:
// Each random "word" is 4 bytes, so 8 would be 32 bytes
var saltBits = sjcl.random.randomWords(8);
// eg. [588300265, -1755622410, -533744668, 1408647727, -876578935, 12500664, 179736681, 1321878387]
// I left out the 5th argument, which defaults to HMAC which in turn defaults to use SHA256
var derivedKey = sjcl.misc.pbkdf2("password", saltBits, 1000, 256);
// eg. [-605875851, 757263041, -993332615, 465335420, 1306210159, -1270931768, -1185781663, -477369628]
// Storing the key is probably easier encoded and not as a bitArray
// I choose base64 just because the output is shorter, but you could use sjcl.codec.hex.fromBits
var key = sjcl.codec.base64.fromBits(derivedKey);
// eg. "2+MRdS0i6sHEyvJ5G7x0fE3bL2+0Px7IuVJoYeOL6uQ="
If you wanted to store the salt, you probably want to encode it
var salt = sjcl.codec.base64.fromBits(saltBits);
// eg. "IxC/6ZdbU/bgL7PkU/ZCL8vAd4kAvr64CraQaU7KQ3M="
// Again I just used base64 because it's shorter, but you could use hex
// And to get the bitArray back, you would do the exact opposite
var saltBits = sjcl.codec.base64.toBits(salt);