move libtextsecure/crypto.js to ts
used mostly for attachments encrypting before upload/decrypt and profile encrypt/deryptpull/2242/head
parent
5bc576249b
commit
79bf0c53ee
@ -1,17 +0,0 @@
|
|||||||
export interface LibTextsecureCryptoInterface {
|
|
||||||
encryptAttachment(
|
|
||||||
plaintext: ArrayBuffer,
|
|
||||||
keys: ArrayBuffer,
|
|
||||||
iv: ArrayBuffer
|
|
||||||
): Promise<{
|
|
||||||
digest: ArrayBuffer;
|
|
||||||
ciphertext: ArrayBuffer;
|
|
||||||
}>;
|
|
||||||
decryptAttachment(
|
|
||||||
encryptedBin: ArrayBuffer,
|
|
||||||
keys: ArrayBuffer,
|
|
||||||
theirDigest: ArrayBuffer
|
|
||||||
): Promise<ArrayBuffer>;
|
|
||||||
decryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promise<ArrayBuffer>;
|
|
||||||
encryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promise<ArrayBuffer>;
|
|
||||||
}
|
|
@ -1,178 +0,0 @@
|
|||||||
/* global libsignal, crypto, textsecure, dcodeIO, window */
|
|
||||||
|
|
||||||
/* eslint-disable more/no-then, no-bitwise */
|
|
||||||
|
|
||||||
// eslint-disable-next-line func-names
|
|
||||||
(function() {
|
|
||||||
const { encrypt, decrypt, calculateMAC, verifyMAC } = libsignal.crypto;
|
|
||||||
|
|
||||||
const PROFILE_IV_LENGTH = 12; // bytes
|
|
||||||
const PROFILE_KEY_LENGTH = 32; // bytes
|
|
||||||
const PROFILE_TAG_LENGTH = 128; // bits
|
|
||||||
const PROFILE_NAME_PADDED_LENGTH = 26; // bytes
|
|
||||||
|
|
||||||
function verifyDigest(data, theirDigest) {
|
|
||||||
return crypto.subtle.digest({ name: 'SHA-256' }, data).then(ourDigest => {
|
|
||||||
const a = new Uint8Array(ourDigest);
|
|
||||||
const b = new Uint8Array(theirDigest);
|
|
||||||
let result = 0;
|
|
||||||
for (let i = 0; i < theirDigest.byteLength; i += 1) {
|
|
||||||
result |= a[i] ^ b[i];
|
|
||||||
}
|
|
||||||
if (result !== 0) {
|
|
||||||
throw new Error('Bad digest');
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
function calculateDigest(data) {
|
|
||||||
return crypto.subtle.digest({ name: 'SHA-256' }, data);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getRandomBytesFromLength(n) {
|
|
||||||
const bytes = new Uint8Array(n);
|
|
||||||
crypto.getRandomValues(bytes);
|
|
||||||
return bytes;
|
|
||||||
}
|
|
||||||
|
|
||||||
window.textsecure = window.textsecure || {};
|
|
||||||
window.textsecure.crypto = {
|
|
||||||
decryptAttachment(encryptedBin, keys, theirDigest) {
|
|
||||||
if (keys.byteLength !== 64) {
|
|
||||||
throw new Error('Got invalid length attachment keys');
|
|
||||||
}
|
|
||||||
if (encryptedBin.byteLength < 16 + 32) {
|
|
||||||
throw new Error('Got invalid length attachment');
|
|
||||||
}
|
|
||||||
|
|
||||||
const aesKey = keys.slice(0, 32);
|
|
||||||
const macKey = keys.slice(32, 64);
|
|
||||||
|
|
||||||
const iv = encryptedBin.slice(0, 16);
|
|
||||||
const ciphertext = encryptedBin.slice(16, encryptedBin.byteLength - 32);
|
|
||||||
const ivAndCiphertext = encryptedBin.slice(0, encryptedBin.byteLength - 32);
|
|
||||||
const mac = encryptedBin.slice(encryptedBin.byteLength - 32, encryptedBin.byteLength);
|
|
||||||
|
|
||||||
return verifyMAC(ivAndCiphertext, macKey, mac, 32)
|
|
||||||
.then(() => {
|
|
||||||
if (!theirDigest) {
|
|
||||||
throw new Error('Failure: Ask sender to update Signal and resend.');
|
|
||||||
}
|
|
||||||
return verifyDigest(encryptedBin, theirDigest);
|
|
||||||
})
|
|
||||||
.then(() => decrypt(aesKey, ciphertext, iv));
|
|
||||||
},
|
|
||||||
|
|
||||||
encryptAttachment(plaintext, keys, iv) {
|
|
||||||
if (!(plaintext instanceof ArrayBuffer) && !ArrayBuffer.isView(plaintext)) {
|
|
||||||
throw new TypeError(
|
|
||||||
`\`plaintext\` must be an \`ArrayBuffer\` or \`ArrayBufferView\`; got: ${typeof plaintext}`
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keys.byteLength !== 64) {
|
|
||||||
throw new Error('Got invalid length attachment keys');
|
|
||||||
}
|
|
||||||
if (iv.byteLength !== 16) {
|
|
||||||
throw new Error('Got invalid length attachment iv');
|
|
||||||
}
|
|
||||||
const aesKey = keys.slice(0, 32);
|
|
||||||
const macKey = keys.slice(32, 64);
|
|
||||||
|
|
||||||
return encrypt(aesKey, plaintext, iv).then(ciphertext => {
|
|
||||||
const ivAndCiphertext = new Uint8Array(16 + ciphertext.byteLength);
|
|
||||||
ivAndCiphertext.set(new Uint8Array(iv));
|
|
||||||
ivAndCiphertext.set(new Uint8Array(ciphertext), 16);
|
|
||||||
|
|
||||||
return calculateMAC(macKey, ivAndCiphertext.buffer).then(mac => {
|
|
||||||
const encryptedBin = new Uint8Array(16 + ciphertext.byteLength + 32);
|
|
||||||
encryptedBin.set(ivAndCiphertext);
|
|
||||||
encryptedBin.set(new Uint8Array(mac), 16 + ciphertext.byteLength);
|
|
||||||
return calculateDigest(encryptedBin.buffer).then(digest => ({
|
|
||||||
ciphertext: encryptedBin.buffer,
|
|
||||||
digest,
|
|
||||||
}));
|
|
||||||
});
|
|
||||||
});
|
|
||||||
},
|
|
||||||
encryptProfile(data, key) {
|
|
||||||
const iv = getRandomBytesFromLength(PROFILE_IV_LENGTH);
|
|
||||||
if (key.byteLength !== PROFILE_KEY_LENGTH) {
|
|
||||||
throw new Error('Got invalid length profile key');
|
|
||||||
}
|
|
||||||
if (iv.byteLength !== PROFILE_IV_LENGTH) {
|
|
||||||
throw new Error('Got invalid length profile iv');
|
|
||||||
}
|
|
||||||
return crypto.subtle
|
|
||||||
.importKey('raw', key, { name: 'AES-GCM' }, false, ['encrypt'])
|
|
||||||
.then(keyForEncryption =>
|
|
||||||
crypto.subtle
|
|
||||||
.encrypt({ name: 'AES-GCM', iv, tagLength: PROFILE_TAG_LENGTH }, keyForEncryption, data)
|
|
||||||
.then(ciphertext => {
|
|
||||||
const ivAndCiphertext = new Uint8Array(PROFILE_IV_LENGTH + ciphertext.byteLength);
|
|
||||||
ivAndCiphertext.set(new Uint8Array(iv));
|
|
||||||
ivAndCiphertext.set(new Uint8Array(ciphertext), PROFILE_IV_LENGTH);
|
|
||||||
return ivAndCiphertext.buffer;
|
|
||||||
})
|
|
||||||
);
|
|
||||||
},
|
|
||||||
decryptProfile(data, key) {
|
|
||||||
if (data.byteLength < 12 + 16 + 1) {
|
|
||||||
throw new Error(`Got too short input: ${data.byteLength}`);
|
|
||||||
}
|
|
||||||
const iv = data.slice(0, PROFILE_IV_LENGTH);
|
|
||||||
const ciphertext = data.slice(PROFILE_IV_LENGTH, data.byteLength);
|
|
||||||
if (key.byteLength !== PROFILE_KEY_LENGTH) {
|
|
||||||
throw new Error('Got invalid length profile key');
|
|
||||||
}
|
|
||||||
if (iv.byteLength !== PROFILE_IV_LENGTH) {
|
|
||||||
throw new Error('Got invalid length profile iv');
|
|
||||||
}
|
|
||||||
const error = new Error(); // save stack
|
|
||||||
return crypto.subtle
|
|
||||||
.importKey('raw', key, { name: 'AES-GCM' }, false, ['decrypt'])
|
|
||||||
.then(keyForEncryption =>
|
|
||||||
crypto.subtle
|
|
||||||
.decrypt(
|
|
||||||
{ name: 'AES-GCM', iv, tagLength: PROFILE_TAG_LENGTH },
|
|
||||||
keyForEncryption,
|
|
||||||
ciphertext
|
|
||||||
)
|
|
||||||
.catch(e => {
|
|
||||||
if (e.name === 'OperationError') {
|
|
||||||
// bad mac, basically.
|
|
||||||
error.message =
|
|
||||||
'Failed to decrypt profile data. Most likely the profile key has changed.';
|
|
||||||
error.name = 'ProfileDecryptError';
|
|
||||||
throw error;
|
|
||||||
}
|
|
||||||
})
|
|
||||||
);
|
|
||||||
},
|
|
||||||
encryptProfileName(name, key) {
|
|
||||||
const padded = new Uint8Array(PROFILE_NAME_PADDED_LENGTH);
|
|
||||||
padded.set(new Uint8Array(name));
|
|
||||||
return textsecure.crypto.encryptProfile(padded.buffer, key);
|
|
||||||
},
|
|
||||||
decryptProfileName(encryptedProfileName, key) {
|
|
||||||
const data = dcodeIO.ByteBuffer.wrap(encryptedProfileName, 'base64').toArrayBuffer();
|
|
||||||
return textsecure.crypto.decryptProfile(data, key).then(decrypted => {
|
|
||||||
// unpad
|
|
||||||
const padded = new Uint8Array(decrypted);
|
|
||||||
let i;
|
|
||||||
for (i = padded.length; i > 0; i -= 1) {
|
|
||||||
if (padded[i - 1] !== 0x00) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return dcodeIO.ByteBuffer.wrap(padded)
|
|
||||||
.slice(0, i)
|
|
||||||
.toArrayBuffer();
|
|
||||||
});
|
|
||||||
},
|
|
||||||
|
|
||||||
getRandomBytes(size) {
|
|
||||||
return getRandomBytesFromLength(size);
|
|
||||||
},
|
|
||||||
};
|
|
||||||
})();
|
|
@ -0,0 +1,88 @@
|
|||||||
|
const { encrypt, decrypt, calculateMAC, verifyMAC } = window.libsignal.crypto;
|
||||||
|
// tslint:disable: binary-expression-operand-order
|
||||||
|
// tslint:disable: restrict-plus-operands
|
||||||
|
|
||||||
|
async function verifyDigest(data: ArrayBuffer, theirDigest: ArrayBuffer) {
|
||||||
|
return crypto.subtle.digest({ name: 'SHA-256' }, data).then(ourDigest => {
|
||||||
|
const a = new Uint8Array(ourDigest);
|
||||||
|
const b = new Uint8Array(theirDigest);
|
||||||
|
let result = 0;
|
||||||
|
for (let i = 0; i < theirDigest.byteLength; i += 1) {
|
||||||
|
// tslint:disable-next-line: no-bitwise
|
||||||
|
result |= a[i] ^ b[i];
|
||||||
|
}
|
||||||
|
if (result !== 0) {
|
||||||
|
throw new Error('Bad digest');
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
async function calculateDigest(data: ArrayBuffer) {
|
||||||
|
return crypto.subtle.digest({ name: 'SHA-256' }, data);
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function decryptAttachment(
|
||||||
|
encryptedBin: ArrayBuffer,
|
||||||
|
keys: ArrayBuffer,
|
||||||
|
theirDigest: ArrayBuffer
|
||||||
|
) {
|
||||||
|
if (keys.byteLength !== 64) {
|
||||||
|
throw new Error('Got invalid length attachment keys');
|
||||||
|
}
|
||||||
|
if (encryptedBin.byteLength < 16 + 32) {
|
||||||
|
throw new Error('Got invalid length attachment');
|
||||||
|
}
|
||||||
|
|
||||||
|
const aesKey = keys.slice(0, 32);
|
||||||
|
const macKey = keys.slice(32, 64);
|
||||||
|
|
||||||
|
const iv = encryptedBin.slice(0, 16);
|
||||||
|
const ciphertext = encryptedBin.slice(16, encryptedBin.byteLength - 32);
|
||||||
|
const ivAndCiphertext = encryptedBin.slice(0, encryptedBin.byteLength - 32);
|
||||||
|
const mac = encryptedBin.slice(encryptedBin.byteLength - 32, encryptedBin.byteLength);
|
||||||
|
|
||||||
|
return verifyMAC(ivAndCiphertext, macKey, mac, 32)
|
||||||
|
.then(async () => {
|
||||||
|
if (!theirDigest) {
|
||||||
|
throw new Error('Failure: Ask sender to update Signal and resend.');
|
||||||
|
}
|
||||||
|
return verifyDigest(encryptedBin, theirDigest);
|
||||||
|
})
|
||||||
|
.then(() => decrypt(aesKey, ciphertext, iv));
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function encryptAttachment(
|
||||||
|
plaintext: ArrayBuffer,
|
||||||
|
keys: ArrayBuffer,
|
||||||
|
iv: ArrayBuffer
|
||||||
|
) {
|
||||||
|
if (!(plaintext instanceof ArrayBuffer) && !ArrayBuffer.isView(plaintext)) {
|
||||||
|
throw new TypeError(
|
||||||
|
`\`plaintext\` must be an \`ArrayBuffer\` or \`ArrayBufferView\`; got: ${typeof plaintext}`
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (keys.byteLength !== 64) {
|
||||||
|
throw new Error('Got invalid length attachment keys');
|
||||||
|
}
|
||||||
|
if (iv.byteLength !== 16) {
|
||||||
|
throw new Error('Got invalid length attachment iv');
|
||||||
|
}
|
||||||
|
const aesKey = keys.slice(0, 32);
|
||||||
|
const macKey = keys.slice(32, 64);
|
||||||
|
|
||||||
|
return encrypt(aesKey, plaintext, iv).then((ciphertext: any) => {
|
||||||
|
const ivAndCiphertext = new Uint8Array(16 + ciphertext.byteLength);
|
||||||
|
ivAndCiphertext.set(new Uint8Array(iv));
|
||||||
|
ivAndCiphertext.set(new Uint8Array(ciphertext), 16);
|
||||||
|
|
||||||
|
return calculateMAC(macKey, ivAndCiphertext.buffer).then(async (mac: any) => {
|
||||||
|
const encryptedBin = new Uint8Array(16 + ciphertext.byteLength + 32);
|
||||||
|
encryptedBin.set(ivAndCiphertext);
|
||||||
|
encryptedBin.set(new Uint8Array(mac), 16 + ciphertext.byteLength);
|
||||||
|
return calculateDigest(encryptedBin.buffer).then(digest => ({
|
||||||
|
ciphertext: encryptedBin.buffer,
|
||||||
|
digest,
|
||||||
|
}));
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
@ -0,0 +1,66 @@
|
|||||||
|
import { getSodium } from '../../session/crypto';
|
||||||
|
|
||||||
|
const PROFILE_IV_LENGTH = 12; // bytes
|
||||||
|
const PROFILE_KEY_LENGTH = 32; // bytes
|
||||||
|
const PROFILE_TAG_LENGTH = 128; // bits
|
||||||
|
|
||||||
|
export async function decryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promise<ArrayBuffer> {
|
||||||
|
if (data.byteLength < 12 + 16 + 1) {
|
||||||
|
throw new Error(`Got too short input: ${data.byteLength}`);
|
||||||
|
}
|
||||||
|
const iv = data.slice(0, PROFILE_IV_LENGTH);
|
||||||
|
const ciphertext = data.slice(PROFILE_IV_LENGTH, data.byteLength);
|
||||||
|
if (key.byteLength !== PROFILE_KEY_LENGTH) {
|
||||||
|
throw new Error('Got invalid length profile key');
|
||||||
|
}
|
||||||
|
if (iv.byteLength !== PROFILE_IV_LENGTH) {
|
||||||
|
throw new Error('Got invalid length profile iv');
|
||||||
|
}
|
||||||
|
const error = new Error(); // save stack
|
||||||
|
return crypto.subtle
|
||||||
|
.importKey('raw', key, { name: 'AES-GCM' }, false, ['decrypt'])
|
||||||
|
.then(keyForEncryption =>
|
||||||
|
crypto.subtle
|
||||||
|
.decrypt(
|
||||||
|
{ name: 'AES-GCM', iv, tagLength: PROFILE_TAG_LENGTH },
|
||||||
|
keyForEncryption,
|
||||||
|
ciphertext
|
||||||
|
)
|
||||||
|
.catch(e => {
|
||||||
|
if (e.name === 'OperationError') {
|
||||||
|
// bad mac, basically.
|
||||||
|
error.message =
|
||||||
|
'Failed to decrypt profile data. Most likely the profile key has changed.';
|
||||||
|
error.name = 'ProfileDecryptError';
|
||||||
|
throw error;
|
||||||
|
}
|
||||||
|
})
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
async function getRandomBytesFromLength(n: number) {
|
||||||
|
return (await getSodium()).randombytes_buf(n);
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function encryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promise<ArrayBuffer> {
|
||||||
|
const iv = await getRandomBytesFromLength(PROFILE_IV_LENGTH);
|
||||||
|
if (key.byteLength !== PROFILE_KEY_LENGTH) {
|
||||||
|
throw new Error('Got invalid length profile key');
|
||||||
|
}
|
||||||
|
if (iv.byteLength !== PROFILE_IV_LENGTH) {
|
||||||
|
throw new Error('Got invalid length profile iv');
|
||||||
|
}
|
||||||
|
return crypto.subtle
|
||||||
|
.importKey('raw', key, { name: 'AES-GCM' }, false, ['encrypt'])
|
||||||
|
.then(keyForEncryption =>
|
||||||
|
crypto.subtle
|
||||||
|
.encrypt({ name: 'AES-GCM', iv, tagLength: PROFILE_TAG_LENGTH }, keyForEncryption, data)
|
||||||
|
.then(ciphertext => {
|
||||||
|
// tslint:disable-next-line: restrict-plus-operands
|
||||||
|
const ivAndCiphertext = new Uint8Array(PROFILE_IV_LENGTH + ciphertext.byteLength);
|
||||||
|
ivAndCiphertext.set(new Uint8Array(iv));
|
||||||
|
ivAndCiphertext.set(new Uint8Array(ciphertext), PROFILE_IV_LENGTH);
|
||||||
|
return ivAndCiphertext.buffer;
|
||||||
|
})
|
||||||
|
);
|
||||||
|
}
|
Loading…
Reference in New Issue