Browse Source

get javascript crypto code into repository (not used though)

master
Miguel Freitas 10 years ago
parent
commit
86bd86fb6c
  1. 22345
      js/twister-crypto-bundle.js
  2. 96
      js/twister-crypto.js
  3. 116
      twister-crypto-test.html

22345
js/twister-crypto-bundle.js

File diff suppressed because it is too large Load Diff

96
js/twister-crypto.js

@ -0,0 +1,96 @@
// Process with:
// browserify twister-crypto.js -o twister-crypto-bundle.js
var Bitcoin = require('bitcoinjs-lib');
var Crypto = require('crypto');
window.Buffer = require('buffer').Buffer;
window.Bencode = require('bencode');
var twister_network = {
magicPrefix: '\x18twister Signed Message:\n',
pubKeyHash: 0x00,
}
window.TwisterCrypto = {}
TwisterCrypto.PubKey = Bitcoin.ECPubKey;
TwisterCrypto.PrivKey = Bitcoin.ECKey;
TwisterCrypto.PubKey.prototype.encrypt = function ( message, enc )
{
var sec = { orig: message.length }
var ephemeral = Bitcoin.ECKey.makeRandom()
sec["key"] = enc ? ephemeral.pub.toBuffer().toString(enc) : ephemeral.pub.toBuffer()
var secret = this.Q.multiply(ephemeral.d).getEncoded().slice(1,33)
var hash_secret = Crypto.createHash('sha512').update(secret).digest()
var aes_key = hash_secret.slice(0,32)
var hmac_key = hash_secret.slice(32,64)
var crypter = Crypto.createCipheriv("aes-256-cbc",aes_key.slice(0,32),new Buffer(16))
var out = []
out.push(crypter.update(message))
out.push(crypter.final())
var sec_body = Buffer.concat(out)
sec["body"] = enc ? sec_body.toString(enc) : sec_body
hmac=Crypto.createHmac("sha512",hmac_key)
hmac.update(sec_body)
sec["mac"] = enc ? hmac.digest().toString(enc) : hmac.digest()
return sec;
}
TwisterCrypto.PrivKey.prototype.decrypt = function ( sec )
{
var sec_key = sec["key"];
var sec_body = sec["body"];
var sec_mac = sec["mac"];
var sec_orig = sec["orig"];
if (!Buffer.isBuffer(sec_key)) {
sec_key = new Buffer(sec_key, "hex");
}
if (!Buffer.isBuffer(sec_body)) {
sec_body = new Buffer(sec_body, "hex");
}
if (!Buffer.isBuffer(sec_mac)) {
sec_mac = new Buffer(sec_mac, "hex");
}
var pubkey = Bitcoin.ECPubKey.fromBuffer(sec_key)
var secret = pubkey.Q.multiply(this.d).getEncoded().slice(1,33)
var hash_secret = Crypto.createHash('sha512').update(secret).digest()
var aes_key = hash_secret.slice(0,32)
var hmac_key = hash_secret.slice(32,64)
var hmac=Crypto.createHmac("sha512",hmac_key)
hmac.update(sec_body)
var hmac_val = hmac.digest()
if( hmac_val.compare(sec_mac) != 0 ) {
return undefined;
}
var decrypter = Crypto.createDecipheriv("aes-256-cbc",aes_key.slice(0,32),new Buffer(16))
var out = []
out.push(decrypter.update(sec_body))
out.push(decrypter.final())
var decrypted = Buffer.concat(out).slice(0,sec_orig)
return decrypted;
}
TwisterCrypto.PrivKey.prototype.messageSign = function ( message, enc )
{
var signature = Bitcoin.Message.sign(this, message, twister_network);
return enc ? signature.toString(enc) : signature;
}
TwisterCrypto.PubKey.prototype.messageVerify = function ( message, signature )
{
if (!Buffer.isBuffer(signature)) {
signature = new Buffer(signature, 'hex')
}
return Bitcoin.Message.verify(this.getAddress(), signature, message, twister_network)
}

116
twister-crypto-test.html

@ -0,0 +1,116 @@
<!DOCTYPE html>
<meta charset="utf-8" />
<title>twister crypto test</title>
<script src="js/twister-crypto-bundle.js"></script>
<body>
<textarea id="myTextarea" name="something" rows="20" cols="80">running javascript tests...</textarea>
<script language="javascript" type="text/javascript">
var testvector =
{
"secret" : "KxQfV51HeY7dsML7jZonw1KxoEWrQ4f93QaQua2RZFNHc4d1VpkL",
"pubkey" : "02f3cfac52291c219fd42a6b842b9d2db99a81f6207118a9635029cef8984d7beb",
"hashMagic" : "9a3d46c1351cc70a0d89a2c2a4192913cc1bc4fce631b451e56c5239afc8f470",
"plaintext" : "The quick brown fox jumps over the lazy dog",
"hash" : "c9c558d851bc50b6f81bc6275ab4afb4f3fa3681b6182c2cba9a9cf187317d6a",
"sign" : "1f4b552cb138f761bf6567c13f16575d5a43e295d0cc494e1bf189a2f10c26ffee58a9db245481a4f69d154239f6cadad16272d76c9b91c50fbb4513415dcfaa26",
"sec" : {
"ecies_key_derivation" : "910d1b7dff1ce8373af697b0d0586a8f0934143127fec00d502e6fbbd86b8a02",
"aes_key" : "fba95549c948b84fb6e338626eaa6e2db7c963533b87d2da65e7b751413e055f3a599f8541aff2e2134508de8ca207be16890fb35e520b90d85f37bc1027da56",
"key" : "0337cf4c9db7e37943fab38c5e700c9c96c33a14bbe493f2bf3f49d8d9f5d7ef99",
"mac" : "811fcddf475b9aecf6f6cc2930024372dfad48ac731e347ac7fc0670ba51404fd39df704b7a32b4b69a05e781e58f88fd24cee111eba2bff2e8cb6b40de037f1",
"orig" : 43,
"body" : "2a1d32be3c58f869c92ef3cb784d0439b65892929f43b2995d26a391f3e1baaf5ded64662d80a1d43babeeab5eb93649"
}
}
var signedpost =
{
"sig_userpost":"1fb7922b8d6283168037d578cc4bed6c0af4e76d26db154bc5df881c5db3cfc74f969e90c3f76ee2cebc1ddd9b09ddf4b1e97040f9fe4dad749fcab6eb6fb5e984",
"userpost":
{
"height":66495,
"k":442,
"lastk":441,
"msg":"sucessfully decrypted my first ECIES testvector in javascript! \\o/",
"n":"mfreitas",
"time":1418265500
}
}
var signedpost_user_pubkey = "03bc75d34b1cb18646591567c441a4b7c35cf3fe37fd4cd8e6699b0c12ee11b9b4"
function log(msg)
{
document.getElementById('myTextarea').value += "\n" + msg;
}
var newKey = TwisterCrypto.PrivKey.makeRandom()
if( !newKey.pub.messageVerify(testvector["plaintext"],
newKey.messageSign(testvector["plaintext"])) ) {
log("ERROR: New key self test signature failure");
}
var key = TwisterCrypto.PrivKey.fromWIF(testvector["secret"]);
var pubkeyhex = key.pub.toHex()
if( pubkeyhex != testvector["pubkey"] ) {
log("ERROR: pubkey error: " + pubkeyhex);
}
var sig = key.messageSign(testvector["plaintext"]);
if( !key.pub.messageVerify(testvector["plaintext"], sig) ) {
log("ERROR: Provided key self test signature failure");
}
var sigRef = testvector["sign"]
if( !key.pub.messageVerify(testvector["plaintext"], sigRef) ) {
log("ERROR: Testvector signature failure");
}
msg = key.decrypt( testvector["sec"] );
if( msg ) {
log(msg.toString());
if( msg != testvector.plaintext ) {
log("ERROR: Testvector ECIES decrypt result != plaintext");
}
} else {
log("ERROR: Testvector ECIES decrypt failed");
}
enc = undefined
while(true) {
sec = key.pub.encrypt(testvector.plaintext, enc)
if( !enc && !Buffer.isBuffer(sec.body) ) {
log("ERROR: encrypt not producing Buffer outputs");
}
if( enc && Buffer.isBuffer(sec.body) ) {
log("ERROR: encrypt not producing hex outputs");
}
msg = key.decrypt(sec);
if( msg != testvector.plaintext ) {
log("ERROR: Testvector ECIES encrypt result != plaintext (enc=", enc, ")");
}
if( enc )
break
else
enc = "hex"
}
userpost = Bencode.encode(signedpost["userpost"])
if( key.pub.messageVerify(userpost, signedpost["sig_userpost"]) ) {
log("ERROR: false positive verify for userpost")
}
userPubKey = TwisterCrypto.PubKey.fromHex(signedpost_user_pubkey)
if( !userPubKey.messageVerify(userpost, signedpost["sig_userpost"]) ) {
log("ERROR: verify for userpost failed with the expected pubkey")
}
//sighex = new Buffer(sig).toString("hex")
log("test vector complete");
</script>
</body>
</html>
Loading…
Cancel
Save