Added js box implementation
This commit is contained in:
parent
25fcd0cae2
commit
03a17f5b6a
@ -1,6 +1,7 @@
|
|||||||
package ext.libsodium.com.ionspin.kotlin.crypto
|
package ext.libsodium.com.ionspin.kotlin.crypto
|
||||||
|
|
||||||
|
|
||||||
|
import com.ionspin.kotlin.crypto.box.BoxKeyPair
|
||||||
import org.khronos.webgl.Uint8Array
|
import org.khronos.webgl.Uint8Array
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -123,6 +124,39 @@ interface JsSodiumInterface {
|
|||||||
|
|
||||||
// ---- Auth end ----
|
// ---- Auth end ----
|
||||||
|
|
||||||
|
// ---- Box ----
|
||||||
|
|
||||||
|
fun crypto_box_keypair() : dynamic
|
||||||
|
fun crypto_box_seed_keypair(seed : Uint8Array) : dynamic
|
||||||
|
fun crypto_box_easy(message: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
recipientsPublicKey: Uint8Array,
|
||||||
|
sendersSecretKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_open_easy(ciphertext: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
sendersPublicKey: Uint8Array,
|
||||||
|
recipientsSecretKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_detached(message: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
recipientsPublicKey: Uint8Array,
|
||||||
|
sendersSecretKey: Uint8Array) : dynamic
|
||||||
|
fun crypto_box_open_detached(ciphertext: Uint8Array,
|
||||||
|
tag: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
sendersPublicKey: Uint8Array,
|
||||||
|
recipientsSecretKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_beforenm(publicKey: Uint8Array, secretKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_easy_afternm(message: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
precomputedKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_open_easy_afternm(ciphertext: Uint8Array,
|
||||||
|
nonce: Uint8Array,
|
||||||
|
precomputedKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_seal(message: Uint8Array, recipientsPublicKey: Uint8Array) : Uint8Array
|
||||||
|
fun crypto_box_seal_open(ciphertext: Uint8Array, recipientsPublicKey: Uint8Array, recipientsSecretKey: Uint8Array) : Uint8Array
|
||||||
|
|
||||||
|
// ---- Box end ----
|
||||||
|
|
||||||
//util
|
//util
|
||||||
fun memzero(array: Uint8Array)
|
fun memzero(array: Uint8Array)
|
||||||
|
|
||||||
|
@ -0,0 +1,200 @@
|
|||||||
|
package com.ionspin.kotlin.crypto.box
|
||||||
|
|
||||||
|
import com.ionspin.kotlin.crypto.getSodium
|
||||||
|
import ext.libsodium.com.ionspin.kotlin.crypto.toUByteArray
|
||||||
|
import ext.libsodium.com.ionspin.kotlin.crypto.toUInt8Array
|
||||||
|
import org.khronos.webgl.Uint8Array
|
||||||
|
|
||||||
|
actual object Box {
|
||||||
|
/**
|
||||||
|
* The crypto_box_keypair() function randomly generates a secret key and a corresponding public key.
|
||||||
|
* The public key is put into pk (crypto_box_PUBLICKEYBYTES bytes) and the secret key into
|
||||||
|
* sk (crypto_box_SECRETKEYBYTES bytes).
|
||||||
|
*/
|
||||||
|
actual fun keypair(): BoxKeyPair {
|
||||||
|
val keypair = getSodium().crypto_box_keypair()
|
||||||
|
return BoxKeyPair(
|
||||||
|
(keypair.publicKey as Uint8Array).toUByteArray(),
|
||||||
|
(keypair.privateKey as Uint8Array).toUByteArray()
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Using crypto_box_seed_keypair(), the key pair can also be deterministically derived from a single key seed (crypto_box_SEEDBYTES bytes).
|
||||||
|
*/
|
||||||
|
actual fun seedKeypair(seed: UByteArray): BoxKeyPair {
|
||||||
|
val keypair = getSodium().crypto_box_seed_keypair(seed.toUInt8Array())
|
||||||
|
return BoxKeyPair(
|
||||||
|
(keypair.publicKey as Uint8Array).toUByteArray(),
|
||||||
|
(keypair.privateKey as Uint8Array).toUByteArray()
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The crypto_box_easy() function encrypts a message m whose length is mlen bytes, with a recipient's public key pk, a sender's secret key sk and a nonce n.
|
||||||
|
* n should be crypto_box_NONCEBYTES bytes.
|
||||||
|
* c should be at least crypto_box_MACBYTES + mlen bytes long.
|
||||||
|
* This function writes the authentication tag, whose length is crypto_box_MACBYTES bytes, in c,
|
||||||
|
* immediately followed by the encrypted message, whose length is the same as the plaintext: mlen.
|
||||||
|
*/
|
||||||
|
actual fun easy(
|
||||||
|
message: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
recipientsPublicKey: UByteArray,
|
||||||
|
sendersSecretKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
return getSodium().crypto_box_easy(
|
||||||
|
message.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
recipientsPublicKey.toUInt8Array(),
|
||||||
|
sendersSecretKey.toUInt8Array(),
|
||||||
|
).toUByteArray()
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The crypto_box_open_easy() function verifies and decrypts a ciphertext produced by crypto_box_easy().
|
||||||
|
* c is a pointer to an authentication tag + encrypted message combination, as produced by crypto_box_easy(). clen is the length of this authentication tag + encrypted message combination. Put differently, clen is the number of bytes written by crypto_box_easy(), which is crypto_box_MACBYTES + the length of the message.
|
||||||
|
* The nonce n has to match the nonce used to encrypt and authenticate the message.
|
||||||
|
* pk is the public key of the sender that encrypted the message. sk is the secret key of the recipient that is willing to verify and decrypt it.
|
||||||
|
* The function throws [BoxCorruptedOrTamperedDataException] if the verification fails.
|
||||||
|
*/
|
||||||
|
actual fun openEasy(
|
||||||
|
ciphertext: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
sendersPublicKey: UByteArray,
|
||||||
|
recipientsSecretKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
try {
|
||||||
|
return getSodium().crypto_box_open_easy(
|
||||||
|
ciphertext.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
sendersPublicKey.toUInt8Array(),
|
||||||
|
recipientsSecretKey.toUInt8Array(),
|
||||||
|
).toUByteArray()
|
||||||
|
} catch (error: Throwable) {
|
||||||
|
throw BoxCorruptedOrTamperedDataException()
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The crypto_box_beforenm() function computes a shared secret key given a public key pk and a secret key sk,
|
||||||
|
* and puts it into k (crypto_box_BEFORENMBYTES bytes).
|
||||||
|
*/
|
||||||
|
actual fun beforeNM(publicKey: UByteArray, secretKey: UByteArray): UByteArray {
|
||||||
|
return getSodium().crypto_box_beforenm(
|
||||||
|
publicKey.toUInt8Array(),
|
||||||
|
secretKey.toUInt8Array()
|
||||||
|
).toUByteArray()
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The _afternm variants of the previously described functions accept a precalculated shared secret key k instead of a key pair.
|
||||||
|
*/
|
||||||
|
actual fun easyAfterNM(
|
||||||
|
message: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
precomputedKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
return getSodium().crypto_box_easy_afternm(
|
||||||
|
message.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
precomputedKey.toUInt8Array()
|
||||||
|
).toUByteArray()
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The _afternm variants of the previously described functions accept a precalculated shared secret key k instead of a key pair.
|
||||||
|
*/
|
||||||
|
actual fun openEasyAfterNM(
|
||||||
|
ciphertext: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
precomputedKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
try {
|
||||||
|
return getSodium().crypto_box_open_easy_afternm(
|
||||||
|
ciphertext.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
precomputedKey.toUInt8Array(),
|
||||||
|
).toUByteArray()
|
||||||
|
} catch (error: Throwable) {
|
||||||
|
throw BoxCorruptedOrTamperedDataException()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This function encrypts a message m of length mlen with a nonce n and a secret key sk for a recipient whose
|
||||||
|
* public key is pk, and puts the encrypted message into c.
|
||||||
|
* Exactly mlen bytes will be put into c, since this function does not prepend the authentication tag.
|
||||||
|
* The tag, whose size is crypto_box_MACBYTES bytes, will be put into mac.
|
||||||
|
*/
|
||||||
|
actual fun detached(
|
||||||
|
message: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
recipientsPublicKey: UByteArray,
|
||||||
|
sendersSecretKey: UByteArray
|
||||||
|
): BoxEncryptedDataAndTag {
|
||||||
|
val detached = getSodium().crypto_box_detached(
|
||||||
|
message.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
recipientsPublicKey.toUInt8Array(),
|
||||||
|
sendersSecretKey.toUInt8Array(),
|
||||||
|
)
|
||||||
|
return BoxEncryptedDataAndTag(
|
||||||
|
(detached.ciphertext as Uint8Array).toUByteArray(),
|
||||||
|
(detached.mac as Uint8Array).toUByteArray()
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The crypto_box_open_detached() function verifies and decrypts an encrypted message c whose length is clen using the recipient's secret key sk and the sender's public key pk.
|
||||||
|
* clen doesn't include the tag, so this length is the same as the plaintext.
|
||||||
|
* The plaintext is put into m after verifying that mac is a valid authentication tag for this ciphertext, with the given nonce n and key k.
|
||||||
|
* The function throws [BoxCorruptedOrTamperedDataException] if the verification fails.
|
||||||
|
*/
|
||||||
|
actual fun openDetached(
|
||||||
|
ciphertext: UByteArray,
|
||||||
|
tag: UByteArray,
|
||||||
|
nonce: UByteArray,
|
||||||
|
sendersPublicKey: UByteArray,
|
||||||
|
recipientsSecretKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
try {
|
||||||
|
return getSodium().crypto_box_open_detached(
|
||||||
|
ciphertext.toUInt8Array(),
|
||||||
|
tag.toUInt8Array(),
|
||||||
|
nonce.toUInt8Array(),
|
||||||
|
sendersPublicKey.toUInt8Array(),
|
||||||
|
recipientsSecretKey.toUInt8Array(),
|
||||||
|
).toUByteArray()
|
||||||
|
} catch (error: Throwable) {
|
||||||
|
throw BoxCorruptedOrTamperedDataException()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
actual fun seal(message: UByteArray, recipientsPublicKey: UByteArray): UByteArray {
|
||||||
|
return getSodium().crypto_box_seal(
|
||||||
|
message.toUInt8Array(),
|
||||||
|
recipientsPublicKey.toUInt8Array()
|
||||||
|
).toUByteArray()
|
||||||
|
}
|
||||||
|
|
||||||
|
actual fun sealOpen(
|
||||||
|
ciphertext: UByteArray,
|
||||||
|
recipientsPublicKey: UByteArray,
|
||||||
|
recipientsSecretKey: UByteArray
|
||||||
|
): UByteArray {
|
||||||
|
try {
|
||||||
|
return getSodium().crypto_box_seal_open(
|
||||||
|
ciphertext.toUInt8Array(),
|
||||||
|
recipientsPublicKey.toUInt8Array(),
|
||||||
|
recipientsSecretKey.toUInt8Array(),
|
||||||
|
).toUByteArray()
|
||||||
|
} catch (error: Throwable) {
|
||||||
|
throw BoxCorruptedOrTamperedDataException()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
}
|
@ -41,7 +41,7 @@ actual object SecretStream {
|
|||||||
state, ciphertext.toUInt8Array(), associatedData.toUInt8Array()
|
state, ciphertext.toUInt8Array(), associatedData.toUInt8Array()
|
||||||
)
|
)
|
||||||
if (dataAndTag == false) {
|
if (dataAndTag == false) {
|
||||||
throw SecretStreamCorrupedOrTamperedDataException()
|
throw SecretStreamCorruptedOrTamperedDataException()
|
||||||
}
|
}
|
||||||
return DecryptedDataAndTag((dataAndTag.message as Uint8Array).toUByteArray(), dataAndTag.tag)
|
return DecryptedDataAndTag((dataAndTag.message as Uint8Array).toUByteArray(), dataAndTag.tag)
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user