2017-01-24 10:41:06 +00:00
|
|
|
'use strict';
|
|
|
|
|
|
|
|
// Based on https://github.com/dchest/tweetnacl-js/blob/6dcbcaf5f5cbfd313f2dcfe763db35c828c8ff5b/nacl-fast.js.
|
|
|
|
|
2017-02-12 02:37:17 +00:00
|
|
|
var sodium = module.exports
|
2017-01-24 10:41:06 +00:00
|
|
|
|
|
|
|
// Ported in 2014 by Dmitry Chestnykh and Devi Mandiri.
|
|
|
|
// Public domain.
|
|
|
|
//
|
|
|
|
// Implementation derived from TweetNaCl version 20140427.
|
|
|
|
// See for details: http://tweetnacl.cr.yp.to/
|
|
|
|
|
2017-06-19 20:32:33 +00:00
|
|
|
// also forwarded at the bottom but randombytes is non-enumerable
|
|
|
|
var randombytes = require('./randombytes').randombytes
|
2017-01-24 10:41:06 +00:00
|
|
|
|
|
|
|
function vn(x, xi, y, yi, n) {
|
|
|
|
var i,d = 0;
|
|
|
|
for (i = 0; i < n; i++) d |= x[xi+i]^y[yi+i];
|
|
|
|
return (1 & ((d - 1) >>> 8)) - 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_verify_16(x, xi, y, yi) {
|
|
|
|
return vn(x,xi,y,yi,16);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-06-28 09:11:38 +00:00
|
|
|
function crypto_stream_xor (c, cpos, m, mpos, clen, n, k) {
|
|
|
|
cs.crypto_stream_xor(c, m, n, k)
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_stream (c, cpos, clen, n, k) {
|
|
|
|
cs.crypto_stream(c, n, k)
|
|
|
|
}
|
|
|
|
|
2017-01-24 10:41:06 +00:00
|
|
|
function crypto_onetimeauth(out, outpos, m, mpos, n, k) {
|
|
|
|
var s = new poly1305(k);
|
|
|
|
s.update(m, mpos, n);
|
|
|
|
s.finish(out, outpos);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_onetimeauth_verify(h, hpos, m, mpos, n, k) {
|
|
|
|
var x = new Uint8Array(16);
|
|
|
|
crypto_onetimeauth(x,0,m,mpos,n,k);
|
|
|
|
return crypto_verify_16(h,hpos,x,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-03-18 04:36:26 +00:00
|
|
|
function crypto_box_keypair(pk, sk) {
|
|
|
|
check(pk, crypto_box_PUBLICKEYBYTES)
|
|
|
|
check(sk, crypto_box_SECRETKEYBYTES)
|
2019-08-13 15:00:27 +00:00
|
|
|
randombytes(sk, 32)
|
|
|
|
return crypto_scalarmult_base(pk, sk)
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_box_seal(c, m, pk) {
|
|
|
|
check(c, crypto_box_SEALBYTES + m.length)
|
|
|
|
check(pk, crypto_box_PUBLICKEYBYTES)
|
|
|
|
|
|
|
|
var epk = c.subarray(0, crypto_box_PUBLICKEYBYTES)
|
|
|
|
var esk = new Uint8Array(crypto_box_SECRETKEYBYTES)
|
|
|
|
crypto_box_keypair(epk, esk)
|
|
|
|
|
|
|
|
var n = new Uint8Array(crypto_box_NONCEBYTES)
|
|
|
|
sodium.crypto_generichash_batch(n, [ epk, pk ])
|
|
|
|
|
|
|
|
var s = new Uint8Array(crypto_box_PUBLICKEYBYTES)
|
|
|
|
crypto_scalarmult(s, esk, pk)
|
|
|
|
|
|
|
|
var k = new Uint8Array(crypto_box_BEFORENMBYTES)
|
|
|
|
var zero = new Uint8Array(16)
|
|
|
|
xsalsa20.core_hsalsa20(k, zero, s, xsalsa20.SIGMA)
|
|
|
|
|
|
|
|
crypto_secretbox_easy(c.subarray(epk.length), m, n, k)
|
|
|
|
|
|
|
|
cleanup(esk)
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_box_seal_open(m, c, pk, sk) {
|
|
|
|
check(c, crypto_box_SEALBYTES)
|
|
|
|
check(m, c.length - crypto_box_SEALBYTES)
|
|
|
|
check(pk, crypto_box_PUBLICKEYBYTES)
|
|
|
|
check(sk, crypto_box_SECRETKEYBYTES)
|
|
|
|
|
|
|
|
var epk = c.subarray(0, crypto_box_PUBLICKEYBYTES)
|
|
|
|
|
|
|
|
var n = new Uint8Array(crypto_box_NONCEBYTES)
|
|
|
|
sodium.crypto_generichash_batch(n, [ epk, pk ])
|
|
|
|
|
|
|
|
var s = new Uint8Array(crypto_box_PUBLICKEYBYTES)
|
|
|
|
crypto_scalarmult(s, sk, epk)
|
|
|
|
|
|
|
|
var k = new Uint8Array(crypto_box_BEFORENMBYTES)
|
|
|
|
var zero = new Uint8Array(16)
|
|
|
|
xsalsa20.core_hsalsa20(k, zero, s, xsalsa20.SIGMA)
|
|
|
|
|
|
|
|
return crypto_secretbox_open_easy(m, c.subarray(epk.length), n, k)
|
2018-03-17 01:19:19 +00:00
|
|
|
}
|
|
|
|
|
2017-01-24 10:41:06 +00:00
|
|
|
crypto_box_PUBLICKEYBYTES = 32,
|
|
|
|
crypto_box_SECRETKEYBYTES = 32,
|
|
|
|
crypto_box_BEFORENMBYTES = 32,
|
|
|
|
crypto_box_NONCEBYTES = crypto_secretbox_NONCEBYTES,
|
|
|
|
crypto_box_ZEROBYTES = crypto_secretbox_ZEROBYTES,
|
|
|
|
crypto_box_BOXZEROBYTES = crypto_secretbox_BOXZEROBYTES,
|
2019-08-13 15:00:27 +00:00
|
|
|
crypto_box_SEALBYTES = 48,
|
|
|
|
crypto_box_BEFORENMBYTES = 32,
|
2017-06-06 19:04:50 +00:00
|
|
|
sodium.memzero = function (len, offset) {
|
|
|
|
for (var i = offset; i < len; i++) arr[i] = 0;
|
|
|
|
}
|
|
|
|
|
2017-02-12 02:37:17 +00:00
|
|
|
|
2017-06-06 19:04:36 +00:00
|
|
|
forward(require('./crypto_generichash'))
|
2017-06-07 20:38:40 +00:00
|
|
|
forward(require('./crypto_kdf'))
|
2017-06-12 08:05:49 +00:00
|
|
|
forward(require('./crypto_shorthash'))
|
2017-06-19 20:32:33 +00:00
|
|
|
forward(require('./randombytes'))
|
2017-06-28 09:11:38 +00:00
|
|
|
forward(require('./crypto_stream'))
|
2017-02-12 02:37:17 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2018-03-17 01:19:19 +00:00
|
|
|
sodium.crypto_box_PUBLICKEYBYTES = crypto_box_PUBLICKEYBYTES
|
|
|
|
sodium.crypto_box_SECRETKEYBYTES = crypto_box_SECRETKEYBYTES
|
2019-08-13 15:00:27 +00:00
|
|
|
sodium.crypto_box_SEALBYTES = crypto_box_SEALBYTES
|
|
|
|
sodium.crypto_box_BEFORENMBYTES = crypto_box_BEFORENMBYTES
|
2018-03-17 01:19:19 +00:00
|
|
|
sodium.crypto_box_keypair = crypto_box_keypair
|
2019-08-13 15:00:27 +00:00
|
|
|
sodium.crypto_box_seal = crypto_box_seal
|
|
|
|
sodium.crypto_box_seal_open = crypto_box_seal_open
|
2018-03-17 01:19:19 +00:00
|
|
|
|
2020-03-04 13:50:09 +00:00
|
|
|
sodium.sodium_malloc = function (n) {
|
|
|
|
return new Uint8Array(n)
|
|
|
|
}
|
|
|
|
|
2017-01-24 10:41:06 +00:00
|
|
|
function cleanup(arr) {
|
|
|
|
for (var i = 0; i < arr.length; i++) arr[i] = 0;
|
|
|
|
}
|
|
|
|
|
2020-05-04 18:52:17 +00:00
|
|
|
forward(require('./crypto_hash'))
|
2020-05-04 18:49:21 +00:00
|
|
|
forward(require('./crypto_scalarmult'))
|
2020-05-04 19:04:41 +00:00
|
|
|
forward(require('./crypto_secretbox'))
|
2020-05-04 18:58:36 +00:00
|
|
|
forward(require('./crypto_sign'))
|
2020-05-04 16:47:52 +00:00
|
|
|
forward(require('./crypto_stream'))
|
2017-01-24 10:41:06 +00:00
|
|
|
|
2017-06-06 19:04:36 +00:00
|
|
|
function forward (submodule) {
|
|
|
|
Object.keys(submodule).forEach(function (prop) {
|
|
|
|
module.exports[prop] = submodule[prop]
|
|
|
|
})
|
|
|
|
}
|