diff options
Diffstat (limited to 'library/sodium-plus/lib/sodiumplus.js')
-rw-r--r-- | library/sodium-plus/lib/sodiumplus.js | 1212 |
1 files changed, 1212 insertions, 0 deletions
diff --git a/library/sodium-plus/lib/sodiumplus.js b/library/sodium-plus/lib/sodiumplus.js new file mode 100644 index 000000000..7f5bc4c08 --- /dev/null +++ b/library/sodium-plus/lib/sodiumplus.js @@ -0,0 +1,1212 @@ +const Backend = require('./backend'); +const CryptographyKey = require('./cryptography-key'); +const Ed25519SecretKey = require('./keytypes/ed25519sk'); +const Ed25519PublicKey = require('./keytypes/ed25519pk'); +const LibsodiumWrappersBackend = require('./backend/libsodium-wrappers'); +const SodiumError = require('./sodium-error'); +const SodiumNativeBackend = require('./backend/sodiumnative'); +const X25519PublicKey = require('./keytypes/x25519pk'); +const X25519SecretKey = require('./keytypes/x25519sk'); +const Util = require('./util'); + +/* istanbul ignore if */ +if (typeof (Buffer) === 'undefined') { + let Buffer = require('buffer/').Buffer; +} + +class SodiumPlus { + constructor(backend) { + /* istanbul ignore if */ + if (!(backend instanceof Backend)) { + throw new TypeError('Backend object must implement the backend function'); + } + this.backend = backend; + Util.populateConstants(this); + } + + /** + * Returns the name of the current active backend. + * This method is NOT async. + * + * @return {string} + */ + getBackendName() { + return this.backend.backendName; + } + + /** + * Is this powered by sodium-native? + * This method is NOT async. + * + * @return {boolean} + */ + isSodiumNative() { + return (this.backend instanceof SodiumNativeBackend); + } + + /** + * Is this powered by libsodium-wrappers? + * This method is NOT async. + * + * @return {boolean} + */ + isLibsodiumWrappers() { + return (this.backend instanceof LibsodiumWrappersBackend); + } + + /** + * Automatically select a backend. + * + * @return {Promise<SodiumPlus>} + */ + static async auto() { + let backend; + try { + backend = await SodiumNativeBackend.init(); + } catch (e) { + backend = await LibsodiumWrappersBackend.init(); + } + /* istanbul ignore if */ + if (!backend) { + backend = await LibsodiumWrappersBackend.init(); + } + Util.populateConstants(backend); + return new SodiumPlus(backend); + } + + /** + * If our backend isn't defined, it will trigger an autoload. + * + * Mostly used internally. `await SodiumPlus.auto()` provides the same + * exact guarantee as this method. + * + * @return {Promise<void>} + */ + async ensureLoaded() { + /* istanbul ignore if */ + if (typeof (this.backend) === 'undefined') { + try { + await SodiumPlus.auto(); + } catch (e) { + this.backend = await LibsodiumWrappersBackend.init(); + } + } + } + + /** + * Decrypt a message (and optional associated data) with XChaCha20-Poly1305 + * + * @param {String|Buffer} ciphertext + * @param {String|Buffer} nonce + * @param {CryptographyKey} key + * @param {String|Buffer} assocData + * @return {Promise<Buffer>} + * @throws {SodiumError} + */ + async crypto_aead_xchacha20poly1305_ietf_decrypt(ciphertext, nonce, key, assocData = '') { + await this.ensureLoaded(); + if (nonce.length !== 24) { + throw new SodiumError('Argument 2 must be 24 bytes'); + } + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 3 must be an instance of CryptographyKey'); + } + return await this.backend.crypto_aead_xchacha20poly1305_ietf_decrypt( + await Util.toBuffer(ciphertext), + assocData.length > 0 ? await Util.toBuffer(assocData) : null, + await Util.toBuffer(nonce), + key + ); + } + + /** + * Encrypt a message (and optional associated data) with XChaCha20-Poly1305. + * + * Throws a SodiumError if an invalid ciphertext/AAD is provided for this + * nonce and key. + * + * @param {String|Buffer} plaintext + * @param {String|Buffer} nonce + * @param {CryptographyKey} key + * @param {String|Buffer} assocData + * @return {Promise<Buffer>} + * @throws {SodiumError} + */ + async crypto_aead_xchacha20poly1305_ietf_encrypt(plaintext, nonce, key, assocData = '') { + await this.ensureLoaded(); + if (nonce.length !== 24) { + throw new SodiumError('Argument 2 must be 24 bytes'); + } + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 3 must be an instance of CryptographyKey'); + } + + return await this.backend.crypto_aead_xchacha20poly1305_ietf_encrypt( + await Util.toBuffer(plaintext), + assocData.length > 0 ? await Util.toBuffer(assocData) : null, + await Util.toBuffer(nonce), + key + ); + } + + /** + * Generate an XChaCha20-Poly1305 key. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_aead_xchacha20poly1305_ietf_keygen() { + return new CryptographyKey(await this.backend.randombytes_buf(32)); + } + + /** + * Get an authenticator for a message for a given key. + * + * Algorithm: HMAC-SHA512 truncated to 32 bytes. + * + * @param {string|Buffer} message + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_auth(message, key) { + await this.ensureLoaded(); + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 2 must be an instance of CryptographyKey'); + } + await this.ensureLoaded(); + return await this.backend.crypto_auth( + await Util.toBuffer(message), + key + ); + } + + /** + * @return {Promise<CryptographyKey>} + */ + async crypto_auth_keygen() { + return new CryptographyKey(await this.backend.randombytes_buf(32)); + } + + /** + * Verify an authenticator for a message for a given key. + * + * @param {string|Buffer} message + * @param {CryptographyKey} key + * @param {Buffer} mac + * @return {Promise<boolean>} + */ + async crypto_auth_verify(message, key, mac) { + await this.ensureLoaded(); + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 2 must be an instance of CryptographyKey'); + } + await this.ensureLoaded(); + return await this.backend.crypto_auth_verify( + await Util.toBuffer(mac), + await Util.toBuffer(message), + key + ); + } + + /** + * Public-key authenticated encryption. + * + * @param {string|Buffer} plaintext + * @param {Buffer} nonce + * @param {X25519SecretKey} myPrivateKey + * @param {X25519PublicKey} theirPublicKey + * @return {Promise<Buffer>} + */ + async crypto_box(plaintext, nonce, myPrivateKey, theirPublicKey) { + await this.ensureLoaded(); + if (!(myPrivateKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 3 must be an instance of X25519SecretKey'); + } + if (!(theirPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 4 must be an instance of X25519PublicKey'); + } + nonce = await Util.toBuffer(nonce); + if (nonce.length !== 24) { + throw new SodiumError('Nonce must be a buffer of exactly 24 bytes'); + } + return this.backend.crypto_box( + await Util.toBuffer(plaintext), + await Util.toBuffer(nonce), + myPrivateKey, + theirPublicKey + ); + } + + /** + * Public-key authenticated decryption. + * + * @param {Buffer} ciphertext + * @param {Buffer} nonce + * @param {X25519SecretKey} myPrivateKey + * @param {X25519PublicKey} theirPublicKey + * @return {Promise<Buffer>} + */ + async crypto_box_open(ciphertext, nonce, myPrivateKey, theirPublicKey) { + await this.ensureLoaded(); + if (!(myPrivateKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 3 must be an instance of X25519SecretKey'); + } + if (!(theirPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 4 must be an instance of X25519PublicKey'); + } + ciphertext = await Util.toBuffer(ciphertext); + if (ciphertext.length < 16) { + throw new SodiumError('Ciphertext must be a buffer of at least 16 bytes'); + } + nonce = await Util.toBuffer(nonce); + if (nonce.length !== 24) { + throw new SodiumError('Nonce must be a buffer of exactly 24 bytes'); + } + return this.backend.crypto_box_open( + ciphertext, + nonce, + myPrivateKey, + theirPublicKey + ); + } + + /** + * @return {Promise<CryptographyKey>} + */ + async crypto_box_keypair() { + await this.ensureLoaded(); + return this.backend.crypto_box_keypair(); + } + + /** + * Combine two X25519 keys (secret, public) into a keypair object. + * + * @param {X25519SecretKey} sKey + * @param {X25519PublicKey} pKey + * @return {Promise<CryptographyKey>} + */ + async crypto_box_keypair_from_secretkey_and_publickey(sKey, pKey) { + await this.ensureLoaded(); + if (!(sKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 1 must be an instance of X25519SecretKey'); + } + if (!(pKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of X25519PublicKey'); + } + return await this.backend.crypto_box_keypair_from_secretkey_and_publickey(sKey, pKey); + } + + /** + * Extract the secret key from an X25519 keypair object. + * + * @param {CryptographyKey} keypair + * @return {Promise<X25519SecretKey>} + */ + async crypto_box_secretkey(keypair) { + if (keypair.getLength()!== 64) { + throw new SodiumError('Keypair must be 64 bytes'); + } + return new X25519SecretKey( + Buffer.from(keypair.getBuffer().slice(0, 32)) + ); + } + + /** + * Extract the public key from an X25519 keypair object. + * + * @param {CryptographyKey} keypair + * @return {Promise<X25519PublicKey>} + */ + async crypto_box_publickey(keypair) { + if (keypair.getLength() !== 64) { + throw new SodiumError('Keypair must be 64 bytes'); + } + return new X25519PublicKey( + Buffer.from(keypair.getBuffer().slice(32, 64)) + ); + } + + /** + * Derive the public key from a given X25519 secret key. + * + * @param {X25519SecretKey} secretKey + * @return {Promise<X25519PublicKey>} + */ + async crypto_box_publickey_from_secretkey(secretKey) { + await this.ensureLoaded(); + if (!(secretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 1 must be an instance of X25519SecretKey'); + } + return new X25519PublicKey( + await this.backend.crypto_scalarmult_base(secretKey) + ); + } + + /** + * Anonymous public-key encryption. (Message integrity is still assured.) + * + * @param {string|Buffer} plaintext + * @param {X25519PublicKey} publicKey + * @return {Promise<Buffer>} + */ + async crypto_box_seal(plaintext, publicKey) { + await this.ensureLoaded(); + if (!(publicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of X25519PublicKey'); + } + return await this.backend.crypto_box_seal(plaintext, publicKey); + } + + /** + * Anonymous public-key decryption. (Message integrity is still assured.) + * + * @param {Buffer} ciphertext + * @param {X25519PublicKey} publicKey + * @param {X25519SecretKey} secretKey + * @return {Promise<Buffer>} + */ + async crypto_box_seal_open(ciphertext, publicKey, secretKey) { + await this.ensureLoaded(); + if (!(publicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of X25519PublicKey'); + } + if (!(secretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 3 must be an instance of X25519SecretKey'); + } + return await this.backend.crypto_box_seal_open( + await Util.toBuffer(ciphertext), + publicKey, + secretKey + ); + } + + /** + * Generic-purpose cryptographic hash. + * + * @param {string|Buffer} message + * @param {CryptographyKey|null} key + * @param {number} outputLength + * @return {Promise<Buffer>} + */ + async crypto_generichash(message, key = null, outputLength = 32) { + await this.ensureLoaded(); + return await this.backend.crypto_generichash(message, key, outputLength); + } + + /** + * Initialize a BLAKE2 hash context for stream hashing. + * + * @param {CryptographyKey|null} key + * @param {number} outputLength + * @return {Promise<Buffer>} + */ + async crypto_generichash_init(key = null, outputLength = 32) { + await this.ensureLoaded(); + return await this.backend.crypto_generichash_init(key, outputLength); + } + + + /** + * Update the BLAKE2 hash state with a block of data. + * + * @param {*} state + * @param {string|Buffer} message + * @return {Promise<*>} + */ + async crypto_generichash_update(state, message) { + await this.ensureLoaded(); + return await this.backend.crypto_generichash_update(state, message); + } + + /** + * Obtain the final BLAKE2 hash output. + * + * @param {*} state + * @param {number} outputLength + * @return {Promise<Buffer>} + */ + async crypto_generichash_final(state, outputLength = 32) { + await this.ensureLoaded(); + return await this.backend.crypto_generichash_final(state, outputLength); + } + + /** + * Generate a 256-bit random key for BLAKE2. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_generichash_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_GENERICHASH_KEYBYTES) + ); + } + + /** + * Derive a subkey from a master key. + * + * @param {number} length + * @param {number} subKeyId + * @param {string|Buffer} context + * @param {CryptographyKey} key + * @return {Promise<CryptographyKey>} + */ + async crypto_kdf_derive_from_key(length, subKeyId, context, key) { + await this.ensureLoaded(); + if (length < 1) { + throw new SodiumError('Length must be a positive integer.'); + } + if (subKeyId < 0) { + throw new SodiumError('Key ID must be an unsigned integer'); + } + return await this.backend.crypto_kdf_derive_from_key( + length, + subKeyId, + context, + key + ); + } + + /** + * Generate a 256-bit random key for our KDF. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_kdf_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_KDF_KEYBYTES) + ); + } + + /** + * This is functionally identical to crypto_box_keypair(). + * + * @return {Promise<CryptographyKey>} + */ + async crypto_kx_keypair() { + return this.crypto_box_keypair(); + } + + /** + * Generate an X25519 keypair from a seed. + * + * @param {string|Buffer} seed + * @return {Promise<CryptographyKey>} + */ + async crypto_kx_seed_keypair(seed) { + await this.ensureLoaded(); + const sk = await this.backend.crypto_generichash(seed, null, this.CRYPTO_KX_SECRETKEYBYTES); + const pk = await this.backend.crypto_scalarmult_base(new CryptographyKey(sk)); + return new CryptographyKey(Buffer.concat([sk, pk])); + } + + /** + * Perform a key exchange from the client's perspective. + * + * Returns an array of two CryptographyKey objects. + * + * The first is meant for data sent from the server to the client (incoming decryption). + * The second is meant for data sent from the client to the server (outgoing encryption). + * + * @param {X25519PublicKey} clientPublicKey + * @param {X25519SecretKey} clientSecretKey + * @param {X25519PublicKey} serverPublicKey + * @return {Promise<CryptographyKey[]>} + */ + async crypto_kx_client_session_keys(clientPublicKey, clientSecretKey, serverPublicKey) { + await this.ensureLoaded(); + if (!(clientPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 1 must be an instance of X25519PublicKey'); + } + if (!(clientSecretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 2 must be an instance of X25519SecretKey'); + } + if (!(serverPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 3 must be an instance of X25519PublicKey'); + } + return this.backend.crypto_kx_client_session_keys(clientPublicKey, clientSecretKey, serverPublicKey); + } + + /** + * Perform a key exchange from the server's perspective. + * + * Returns an array of two CryptographyKey objects. + * + * The first is meant for data sent from the client to the server (incoming decryption). + * The second is meant for data sent from the server to the client (outgoing encryption). + * + * @param {X25519PublicKey} serverPublicKey + * @param {X25519SecretKey} serverSecretKey + * @param {X25519PublicKey} clientPublicKey + * @return {Promise<CryptographyKey[]>} + */ + async crypto_kx_server_session_keys(serverPublicKey, serverSecretKey, clientPublicKey) { + await this.ensureLoaded(); + if (!(serverPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 1 must be an instance of X25519PublicKey'); + } + if (!(serverSecretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 2 must be an instance of X25519SecretKey'); + } + if (!(clientPublicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 3 must be an instance of X25519PublicKey'); + } + return this.backend.crypto_kx_server_session_keys(serverPublicKey, serverSecretKey, clientPublicKey); + } + + /** + * @param {string|Buffer} message + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_onetimeauth(message, key) { + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 2 must be an instance of CryptographyKey'); + } + return await this.backend.crypto_onetimeauth(await Util.toBuffer(message), key); + } + + /** + * @param {string|Buffer} message + * @param {CryptographyKey} key + * @param {Buffer} tag + * @return {Promise<boolean>} + */ + async crypto_onetimeauth_verify(message, key, tag) { + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Argument 2 must be an instance of CryptographyKey'); + } + return await this.backend.crypto_onetimeauth_verify( + await Util.toBuffer(message), + key, + await Util.toBuffer(tag) + ); + } + + /** + * @return {Promise<CryptographyKey>} + */ + async crypto_onetimeauth_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(32) + ); + } + + /** + * Derive a cryptography key from a password and salt. + * + * @param {number} length + * @param {string|Buffer} password + * @param {Buffer} salt + * @param {number} opslimit + * @param {number} memlimit + * @param {number|null} algorithm + * @return {Promise<CryptographyKey>} + */ + async crypto_pwhash(length, password, salt, opslimit, memlimit, algorithm = null) { + await this.ensureLoaded(); + /* istanbul ignore if */ + if (!algorithm) { + algorithm = this.CRYPTO_PWHASH_ALG_DEFAULT; + } + return new CryptographyKey( + await this.backend.crypto_pwhash( + length, + await Util.toBuffer(password), + await Util.toBuffer(salt), + opslimit, + memlimit, + algorithm + ) + ); + } + + /** + * Get a password hash (in a safe-for-storage format) + * + * @param {string|Buffer} password + * @param {number} opslimit + * @param {number} memlimit + * @return {Promise<string>} + */ + async crypto_pwhash_str(password, opslimit, memlimit) { + await this.ensureLoaded(); + return await this.backend.crypto_pwhash_str(password, opslimit, memlimit); + } + + /** + * Verify a password against a known password hash + * + * @param {string|Buffer} password + * @param {string|Buffer} hash + * @return {Promise<boolean>} + */ + async crypto_pwhash_str_verify(password, hash) { + await this.ensureLoaded(); + return await this.backend.crypto_pwhash_str_verify(password, hash); + } + + /** + * Does this password need to be rehashed? + * + * @param {string|Buffer} hash + * @param {number} opslimit + * @param {number} memlimit + * @return {Promise<boolean>} + */ + async crypto_pwhash_str_needs_rehash(hash, opslimit, memlimit) { + await this.ensureLoaded(); + return await this.backend.crypto_pwhash_str_needs_rehash(hash, opslimit, memlimit); + } + + /** + * Elliptic Curve Diffie-Hellman key exchange + * + * @param {X25519SecretKey} secretKey + * @param {X25519PublicKey} publicKey + * @return {Promise<CryptographyKey>} + */ + async crypto_scalarmult(secretKey, publicKey) { + await this.ensureLoaded(); + if (!(secretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 1 must be an instance of X25519SecretKey'); + } + if (!(publicKey instanceof X25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of X25519PublicKey'); + } + return await this.backend.crypto_scalarmult(secretKey, publicKey); + } + + /** + * Generate an X25519PublicKey from an X25519SecretKey + * + * @param {X25519SecretKey} secretKey + * @return {Promise<X25519PublicKey>} + */ + async crypto_scalarmult_base(secretKey) { + await this.ensureLoaded(); + if (!(secretKey instanceof X25519SecretKey)) { + throw new TypeError('Argument 1 must be an instance of X25519SecretKey'); + } + return new X25519PublicKey( + await this.backend.crypto_scalarmult_base(secretKey) + ); + } + + /** + * Shared-key authenticated encryption + * + * @param {string|Buffer} plaintext + * @param {Buffer} nonce + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_secretbox(plaintext, nonce, key) { + await this.ensureLoaded(); + if (key.isEd25519Key() || key.isX25519Key()) { + throw new TypeError('Argument 3 must not be an asymmetric key'); + } + nonce = await Util.toBuffer(nonce); + if (nonce.length !== 24) { + throw new SodiumError('Nonce must be a buffer of exactly 24 bytes'); + } + + return await this.backend.crypto_secretbox( + plaintext, + nonce, + key + ); + } + + /** + * Shared-key authenticated decryption + * + * @param {Buffer} ciphertext + * @param {Buffer} nonce + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_secretbox_open(ciphertext, nonce, key) { + await this.ensureLoaded(); + if (key.isEd25519Key() || key.isX25519Key()) { + throw new TypeError('Argument 3 must not be an asymmetric key'); + } + ciphertext = await Util.toBuffer(ciphertext); + if (ciphertext.length < 16) { + throw new SodiumError('Ciphertext must be a buffer of at least 16 bytes'); + } + nonce = await Util.toBuffer(nonce); + if (nonce.length !== 24) { + throw new SodiumError('Nonce must be a buffer of exactly 24 bytes'); + } + return await this.backend.crypto_secretbox_open( + ciphertext, + nonce, + key + ); + } + + /** + * Generate a key for shared-key authenticated encryption. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_secretbox_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_SECRETBOX_KEYBYTES) + ); + } + + /** + * Internalize the internal state and a random header for stream encryption. + * + * @param {CryptographyKey} key + * @return {Promise<array>} + */ + async crypto_secretstream_xchacha20poly1305_init_push(key) { + await this.ensureLoaded(); + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Key must be an instance of CryptographyKey'); + } + if (key.getLength() !== 32) { + throw new SodiumError('crypto_secretstream keys must be 32 bytes long'); + } + const [state, header] = await this.backend.crypto_secretstream_xchacha20poly1305_init_push(key); + return Object.freeze({ + header: header, + push: this.crypto_secretstream_xchacha20poly1305_push.bind(this, state), + rekey: this.crypto_secretstream_xchacha20poly1305_rekey.bind(this, state) + }); + } + + /** + * Initialize the internal state for stream decryption. + * + * @param {Buffer} header + * @param {CryptographyKey} key + * @return {Promise<*>} + */ + async crypto_secretstream_xchacha20poly1305_init_pull(key, header) { + await this.ensureLoaded(); + header = await Util.toBuffer(header); + if (header.length !== 24) { + throw new SodiumError('crypto_secretstream headers must be 24 bytes long'); + } + if (!(key instanceof CryptographyKey)) { + throw new TypeError('Key must be an instance of CryptographyKey'); + } + if (key.getLength() !== 32) { + throw new SodiumError('crypto_secretstream keys must be 32 bytes long'); + } + const state = await this.backend.crypto_secretstream_xchacha20poly1305_init_pull(header, key); + return Object.freeze({ + pull: this.crypto_secretstream_xchacha20poly1305_pull.bind(this, state) + }); + } + + /** + * Stream encryption. + * + * @param {*} state + * @param {string|Buffer} message + * @param {string|Buffer} ad + * @param {number} tag + * @return {Promise<Buffer>} + */ + async crypto_secretstream_xchacha20poly1305_push(state, message, ad = '', tag = 0) { + await this.ensureLoaded(); + return this.backend.crypto_secretstream_xchacha20poly1305_push(state, message, ad, tag); + } + + /** + * Stream decryption. + * + * @param {*} state + * @param {Buffer} ciphertext + * @param {string|Buffer} ad + * @param {number} tag + * @return {Promise<Buffer>} + */ + async crypto_secretstream_xchacha20poly1305_pull(state, ciphertext, ad = '', tag = 0) { + await this.ensureLoaded(); + return this.backend.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext, ad, tag); + } + + /** + * Deterministic rekeying. + * + * @param {*} state + * @return {Promise<void>} + */ + async crypto_secretstream_xchacha20poly1305_rekey(state) { + await this.ensureLoaded(); + await this.backend.crypto_secretstream_xchacha20poly1305_rekey(state); + } + + /** + * Generate a key for shared-key authenticated encryption. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_secretstream_xchacha20poly1305_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_KEYBYTES) + ); + } + + /** + * Calculate a fast hash for short inputs. + * + * Algorithm: SipHash-2-4 + * + * @param {string|Buffer} message + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_shorthash(message, key) { + await this.ensureLoaded(); + return await this.backend.crypto_shorthash(await Util.toBuffer(message), key); + } + + /** + * @return {Promise<CryptographyKey>} + */ + async crypto_shorthash_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_SHORTHASH_KEYBYTES) + ); + } + + /** + * Returns a signed message. + * + * @param {string|Buffer} message, + * @param {Ed25519SecretKey} secretKey + * @return {Promise<Buffer>} + */ + async crypto_sign(message, secretKey) { + await this.ensureLoaded(); + if (!(secretKey instanceof Ed25519SecretKey)) { + throw new TypeError('Argument 2 must be an instance of Ed25519SecretKey'); + } + return this.backend.crypto_sign(message, secretKey); + } + + /** + * Given a signed message, verify the Ed25519 signature. If it matches, return the + * bare message (no signature). + * + * @param {string|Buffer} message, + * @param {Ed25519PublicKey} publicKey + * @return {Promise<Buffer>} + */ + async crypto_sign_open(message, publicKey) { + await this.ensureLoaded(); + if (!(publicKey instanceof Ed25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of Ed25519PublicKey'); + } + return this.backend.crypto_sign_open(message, publicKey); + } + + /** + * Returns the Ed25519 signature of the message, for the given secret key. + * + * @param {string|Buffer} message, + * @param {Ed25519SecretKey} secretKey + * @return {Promise<Buffer>} + */ + async crypto_sign_detached(message, secretKey) { + await this.ensureLoaded(); + if (!(secretKey instanceof Ed25519SecretKey)) { + throw new TypeError('Argument 2 must be an instance of Ed25519SecretKey'); + } + return this.backend.crypto_sign_detached(message, secretKey); + } + + /** + * Returns true if the Ed25519 signature is valid for a given message and public key. + * + * @param {string|Buffer} message, + * @param {Ed25519PublicKey} publicKey + * @param {Buffer} signature + * @return {Promise<boolean>} + */ + async crypto_sign_verify_detached(message, publicKey, signature) { + await this.ensureLoaded(); + if (!(publicKey instanceof Ed25519PublicKey)) { + throw new TypeError('Argument 2 must be an instance of Ed25519PublicKey'); + } + return this.backend.crypto_sign_verify_detached(message, publicKey, signature); + } + + /** + * Extract the secret key from an Ed25519 keypair object. + * + * @param {CryptographyKey} keypair + * @return {Promise<Ed25519SecretKey>} + */ + async crypto_sign_secretkey(keypair) { + if (keypair.getLength() !== 96) { + throw new SodiumError('Keypair must be 96 bytes'); + } + return new Ed25519SecretKey( + await Util.toBuffer( + keypair.getBuffer().slice(0, 64) + ) + ); + } + + /** + * Extract the public key from an Ed25519 keypair object. + * + * @param {CryptographyKey} keypair + * @return {Promise<Ed25519PublicKey>} + */ + async crypto_sign_publickey(keypair) { + if (keypair.getLength() !== 96) { + throw new SodiumError('Keypair must be 96 bytes'); + } + return new Ed25519PublicKey( + keypair.getBuffer().slice(64, 96) + ); + } + + /** + * Generate an Ed25519 keypair object. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_sign_keypair() { + await this.ensureLoaded(); + return this.backend.crypto_sign_keypair(); + } + + /** + * Generate an Ed25519 keypair object from a seed. + * + * @param {Buffer} seed + * @return {Promise<CryptographyKey>} + */ + async crypto_sign_seed_keypair(seed) { + await this.ensureLoaded(); + if (seed instanceof CryptographyKey) { + seed = seed.getBuffer(); + } + seed = await Util.toBuffer(seed); + if (seed.length !== 32) { + throw new SodiumError(`Seed must be 32 bytes long; got ${seed.length}`); + } + return this.backend.crypto_sign_seed_keypair(seed); + } + + /** + * Obtain a birationally equivalent X25519 secret key, + * given an Ed25519 secret key. + * + * @param {Ed25519SecretKey} sk + * @return {Promise<X25519SecretKey>} + */ + async crypto_sign_ed25519_sk_to_curve25519(sk) { + await this.ensureLoaded(); + return new X25519SecretKey( + await this.backend.crypto_sign_ed25519_sk_to_curve25519(sk) + ); + } + + /** + * Obtain a birationally equivalent X25519 public key, + * given an Ed25519 public key. + * + * @param {Ed25519PublicKey} pk + * @return {Promise<X25519PublicKey>} + */ + async crypto_sign_ed25519_pk_to_curve25519(pk) { + await this.ensureLoaded(); + return new X25519PublicKey( + await this.backend.crypto_sign_ed25519_pk_to_curve25519(pk) + ); + } + + /** + * Generate an arbitrary number of pseudorandom bytes from a given + * nonce and key. + * + * @param {number} length + * @param {Buffer} nonce + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_stream(length, nonce, key) { + await this.ensureLoaded(); + return this.backend.crypto_stream(length, nonce, key); + } + + /** + * Encrypts a string (without authentication). + * + * @param {string|Buffer} plaintext + * @param {Buffer} nonce + * @param {CryptographyKey} key + * @return {Promise<Buffer>} + */ + async crypto_stream_xor(plaintext, nonce, key) { + await this.ensureLoaded(); + return this.backend.crypto_stream_xor(plaintext, nonce, key); + } + /** + * Generate a key for stream ciphers. + * + * @return {Promise<CryptographyKey>} + */ + async crypto_stream_keygen() { + return new CryptographyKey( + await this.backend.randombytes_buf(this.CRYPTO_STREAM_KEYBYTES) + ); + } + + /** + * Returns a buffer filled with random bytes. + * + * @param {number} num + * @return {Promise<Buffer>} + */ + async randombytes_buf(num) { + await this.ensureLoaded(); + return await this.backend.randombytes_buf(num); + } + + /** + * Generate an integer between 0 and upperBound (non-inclusive). + * + * For example, randombytes_uniform(10) returns an integer between 0 and 9. + * + * @param {number} upperBound + * @return {Promise<number>} + */ + async randombytes_uniform(upperBound) { + await this.ensureLoaded(); + return this.backend.randombytes_uniform(upperBound); + } + + /** + * Add two buffers (little-endian). Returns the value. + * + * @param {Buffer} val + * @param {Buffer} addv + * @return {Promise<Buffer>} + */ + async sodium_add(val, addv) { + await this.ensureLoaded(); + return await this.backend.sodium_add( + await Util.toBuffer(val), + await Util.toBuffer(addv) + ); + } + + /** + * Convert to hex. + * + * @param {Buffer} decoded + * @return {Promise<Buffer>} + */ + async sodium_bin2hex(decoded) { + await this.ensureLoaded(); + return this.backend.sodium_bin2hex(decoded); + } + + /** + * Compare two buffers in constant time. + * + * Returns -1 if b1 is less than b2. + * Returns 1 if b1 is greater than b2. + * Returns 0 if b1 is equal to b2. + * + * @param {Buffer} b1 + * @param {Buffer} b2 + * @return {Promise<number>} + */ + async sodium_compare(b1, b2) { + await this.ensureLoaded(); + return this.backend.sodium_compare(b1, b2); + } + /** + * Convert to hex. + * + * @param {Buffer|string} encoded + * @return {Promise<string>} + */ + async sodium_hex2bin(encoded) { + await this.ensureLoaded(); + return this.backend.sodium_hex2bin(encoded); + } + + /** + * Increment a buffer (little endian). Overwrites the buffer in-place. + * + * @param {Buffer} buf + * @return {Promise<Buffer>} + */ + async sodium_increment(buf) { + await this.ensureLoaded(); + return this.backend.sodium_increment(buf); + } + + /** + * Returns true if the buffer is zero. + * + * @param {Buffer} buf + * @param {number} len + * @return {Promise<Buffer>} + */ + async sodium_is_zero(buf, len) { + await this.ensureLoaded(); + return this.backend.sodium_is_zero(buf, len); + } + + /** + * Timing-safe buffer comparison. + * + * @param {Buffer} b1 + * @param {Buffer} b2 + * @return {Promise<boolean>} + */ + async sodium_memcmp(b1, b2) { + await this.ensureLoaded(); + return this.backend.sodium_memcmp(b1, b2); + } + + /** + * Zero out a buffer. Overwrites the buffer in-place. + * + * @param {Buffer} buf + * @return {Promise<void>} + */ + async sodium_memzero(buf) { + await this.ensureLoaded(); + await this.backend.sodium_memzero(buf); + } + + /** + * Pad a string. + * + * @param {string|Buffer} buf + * @param {number} blockSize + * @return {Promise<Buffer>} + */ + async sodium_pad(buf, blockSize) { + await this.ensureLoaded(); + return this.backend.sodium_pad(buf, blockSize); + } + + /** + * Unpad a string. + * + * @param {string|Buffer} buf + * @param {number} blockSize + * @return {Promise<Buffer>} + */ + async sodium_unpad(buf, blockSize) { + await this.ensureLoaded(); + return this.backend.sodium_unpad(buf, blockSize); + } +} + +module.exports = SodiumPlus; |