@pezkuwi/util-crypto 14.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (234) hide show
  1. package/README.md +17 -0
  2. package/package.json +45 -0
  3. package/src/address/addressToEvm.spec.ts +16 -0
  4. package/src/address/addressToEvm.ts +12 -0
  5. package/src/address/check.spec.ts +44 -0
  6. package/src/address/check.ts +34 -0
  7. package/src/address/checksum.spec.ts +45 -0
  8. package/src/address/checksum.ts +25 -0
  9. package/src/address/decode.spec.ts +138 -0
  10. package/src/address/decode.ts +41 -0
  11. package/src/address/defaults.ts +12 -0
  12. package/src/address/derive.spec.ts +26 -0
  13. package/src/address/derive.ts +36 -0
  14. package/src/address/encode.spec.ts +177 -0
  15. package/src/address/encode.ts +43 -0
  16. package/src/address/encodeDerived.spec.ts +14 -0
  17. package/src/address/encodeDerived.ts +19 -0
  18. package/src/address/encodeMulti.spec.ts +18 -0
  19. package/src/address/encodeMulti.ts +18 -0
  20. package/src/address/eq.spec.ts +45 -0
  21. package/src/address/eq.ts +24 -0
  22. package/src/address/evmToAddress.spec.ts +20 -0
  23. package/src/address/evmToAddress.ts +24 -0
  24. package/src/address/index.ts +21 -0
  25. package/src/address/is.spec.ts +113 -0
  26. package/src/address/is.ts +14 -0
  27. package/src/address/keyDerived.spec.ts +24 -0
  28. package/src/address/keyDerived.ts +22 -0
  29. package/src/address/keyMulti.spec.ts +20 -0
  30. package/src/address/keyMulti.ts +23 -0
  31. package/src/address/setSS58Format.spec.ts +21 -0
  32. package/src/address/setSS58Format.ts +20 -0
  33. package/src/address/sort.spec.ts +22 -0
  34. package/src/address/sort.ts +17 -0
  35. package/src/address/sshash.ts +12 -0
  36. package/src/address/types.ts +6 -0
  37. package/src/address/util.ts +8 -0
  38. package/src/address/validate.spec.ts +113 -0
  39. package/src/address/validate.ts +10 -0
  40. package/src/base32/bs32.ts +53 -0
  41. package/src/base32/decode.spec.ts +34 -0
  42. package/src/base32/encode.spec.ts +30 -0
  43. package/src/base32/helpers.ts +93 -0
  44. package/src/base32/index.ts +8 -0
  45. package/src/base32/is.spec.ts +32 -0
  46. package/src/base32/validate.spec.ts +44 -0
  47. package/src/base58/bs58.ts +43 -0
  48. package/src/base58/decode.spec.ts +31 -0
  49. package/src/base58/encode.spec.ts +26 -0
  50. package/src/base58/index.ts +8 -0
  51. package/src/base58/validate.spec.ts +20 -0
  52. package/src/base64/bs64.ts +43 -0
  53. package/src/base64/decode.spec.ts +42 -0
  54. package/src/base64/encode.spec.ts +14 -0
  55. package/src/base64/index.ts +10 -0
  56. package/src/base64/pad.spec.ts +14 -0
  57. package/src/base64/pad.ts +10 -0
  58. package/src/base64/trim.spec.ts +14 -0
  59. package/src/base64/trim.ts +14 -0
  60. package/src/base64/validate.spec.ts +32 -0
  61. package/src/blake2/asHex.spec.ts +57 -0
  62. package/src/blake2/asU8a.spec.ts +74 -0
  63. package/src/blake2/asU8a.ts +40 -0
  64. package/src/blake2/index.ts +8 -0
  65. package/src/bn.ts +15 -0
  66. package/src/bundle.ts +33 -0
  67. package/src/bundleInit.ts +11 -0
  68. package/src/crypto.spec.ts +18 -0
  69. package/src/crypto.ts +18 -0
  70. package/src/ed25519/deriveHard.ts +18 -0
  71. package/src/ed25519/index.ts +13 -0
  72. package/src/ed25519/pair/fromRandom.spec.ts +28 -0
  73. package/src/ed25519/pair/fromRandom.ts +25 -0
  74. package/src/ed25519/pair/fromSecret.spec.ts +33 -0
  75. package/src/ed25519/pair/fromSecret.ts +29 -0
  76. package/src/ed25519/pair/fromSeed.spec.ts +42 -0
  77. package/src/ed25519/pair/fromSeed.ts +41 -0
  78. package/src/ed25519/pair/fromString.spec.ts +17 -0
  79. package/src/ed25519/pair/fromString.ts +31 -0
  80. package/src/ed25519/sign.spec.ts +40 -0
  81. package/src/ed25519/sign.ts +38 -0
  82. package/src/ed25519/verify.spec.ts +84 -0
  83. package/src/ed25519/verify.ts +41 -0
  84. package/src/ethereum/encode.spec.ts +59 -0
  85. package/src/ethereum/encode.ts +39 -0
  86. package/src/ethereum/index.ts +6 -0
  87. package/src/ethereum/isAddress.spec.ts +34 -0
  88. package/src/ethereum/isAddress.ts +16 -0
  89. package/src/ethereum/isChecksum.ts +27 -0
  90. package/src/ethereum/isCheksum.spec.ts +30 -0
  91. package/src/hd/ethereum/index.spec.ts +54 -0
  92. package/src/hd/ethereum/index.ts +69 -0
  93. package/src/hd/index.ts +6 -0
  94. package/src/hd/ledger/derivePrivate.ts +34 -0
  95. package/src/hd/ledger/index.spec.ts +64 -0
  96. package/src/hd/ledger/index.ts +42 -0
  97. package/src/hd/ledger/master.spec.ts +19 -0
  98. package/src/hd/ledger/master.ts +26 -0
  99. package/src/hd/validatePath.spec.ts +30 -0
  100. package/src/hd/validatePath.ts +24 -0
  101. package/src/helpers.ts +38 -0
  102. package/src/hmac/index.ts +4 -0
  103. package/src/hmac/shaAsU8a.spec.ts +45 -0
  104. package/src/hmac/shaAsU8a.ts +48 -0
  105. package/src/index.ts +6 -0
  106. package/src/json/constants.ts +11 -0
  107. package/src/json/decrypt.ts +25 -0
  108. package/src/json/decryptData.ts +45 -0
  109. package/src/json/encrypt.ts +25 -0
  110. package/src/json/encryptFormat.ts +20 -0
  111. package/src/json/index.ts +7 -0
  112. package/src/json/types.ts +22 -0
  113. package/src/keccak/asHex.spec.ts +30 -0
  114. package/src/keccak/asU8a.spec.ts +56 -0
  115. package/src/keccak/asU8a.ts +45 -0
  116. package/src/keccak/index.ts +8 -0
  117. package/src/key/DeriveJunction.ts +79 -0
  118. package/src/key/extractPath.spec.ts +51 -0
  119. package/src/key/extractPath.ts +37 -0
  120. package/src/key/extractSuri.spec.ts +147 -0
  121. package/src/key/extractSuri.ts +40 -0
  122. package/src/key/fromPath.ts +28 -0
  123. package/src/key/hdkdDerive.ts +17 -0
  124. package/src/key/hdkdEcdsa.ts +8 -0
  125. package/src/key/hdkdEd25519.ts +7 -0
  126. package/src/key/hdkdSr25519.ts +14 -0
  127. package/src/key/index.ts +12 -0
  128. package/src/mnemonic/bip39.spec.ts +80 -0
  129. package/src/mnemonic/bip39.ts +127 -0
  130. package/src/mnemonic/generate.spec.ts +58 -0
  131. package/src/mnemonic/generate.ts +25 -0
  132. package/src/mnemonic/index.ts +11 -0
  133. package/src/mnemonic/toEntropy.spec.ts +36 -0
  134. package/src/mnemonic/toEntropy.ts +13 -0
  135. package/src/mnemonic/toLegacySeed.spec.ts +52 -0
  136. package/src/mnemonic/toLegacySeed.ts +39 -0
  137. package/src/mnemonic/toMiniSecret.spec.ts +67 -0
  138. package/src/mnemonic/toMiniSecret.ts +23 -0
  139. package/src/mnemonic/toMiniSecretCmp.spec.ts +64 -0
  140. package/src/mnemonic/validate.spec.ts +39 -0
  141. package/src/mnemonic/validate.ts +26 -0
  142. package/src/mnemonic/wordlists/en.ts +7 -0
  143. package/src/mnemonic/wordlists/es.ts +7 -0
  144. package/src/mnemonic/wordlists/fr.ts +7 -0
  145. package/src/mnemonic/wordlists/index.ts +11 -0
  146. package/src/mnemonic/wordlists/it.ts +7 -0
  147. package/src/mnemonic/wordlists/jp.ts +7 -0
  148. package/src/mnemonic/wordlists/ko.ts +7 -0
  149. package/src/mnemonic/wordlists/zh-s.ts +7 -0
  150. package/src/mnemonic/wordlists/zh-t.ts +7 -0
  151. package/src/mod.ts +4 -0
  152. package/src/nacl/decrypt.spec.ts +26 -0
  153. package/src/nacl/decrypt.ts +22 -0
  154. package/src/nacl/encrypt.spec.ts +20 -0
  155. package/src/nacl/encrypt.ts +31 -0
  156. package/src/nacl/index.ts +8 -0
  157. package/src/nacl/tweetnacl-secretbox-data.spec.ts +4629 -0
  158. package/src/nacl/tweetnacl-secretbox.spec.ts +161 -0
  159. package/src/nacl/tweetnacl.ts +1159 -0
  160. package/src/networks.ts +5 -0
  161. package/src/packageDetect.ts +14 -0
  162. package/src/packageInfo.ts +6 -0
  163. package/src/pbkdf2/encode.spec.ts +54 -0
  164. package/src/pbkdf2/encode.ts +29 -0
  165. package/src/pbkdf2/index.ts +4 -0
  166. package/src/random/asHex.spec.ts +38 -0
  167. package/src/random/asNumber.spec.ts +16 -0
  168. package/src/random/asNumber.ts +28 -0
  169. package/src/random/asU8a.spec.ts +36 -0
  170. package/src/random/asU8a.ts +30 -0
  171. package/src/random/index.ts +9 -0
  172. package/src/scrypt/defaults.ts +19 -0
  173. package/src/scrypt/encode.spec.ts +43 -0
  174. package/src/scrypt/encode.ts +30 -0
  175. package/src/scrypt/fromU8a.ts +44 -0
  176. package/src/scrypt/index.ts +6 -0
  177. package/src/scrypt/toU8a.ts +17 -0
  178. package/src/scrypt/types.ts +9 -0
  179. package/src/secp256k1/compress.spec.ts +47 -0
  180. package/src/secp256k1/compress.ts +21 -0
  181. package/src/secp256k1/deriveHard.ts +17 -0
  182. package/src/secp256k1/expand.spec.ts +47 -0
  183. package/src/secp256k1/expand.ts +30 -0
  184. package/src/secp256k1/hasher.spec.ts +24 -0
  185. package/src/secp256k1/hasher.ts +13 -0
  186. package/src/secp256k1/index.ts +10 -0
  187. package/src/secp256k1/pair/fromSeed.spec.ts +75 -0
  188. package/src/secp256k1/pair/fromSeed.ts +42 -0
  189. package/src/secp256k1/recover.spec.ts +35 -0
  190. package/src/secp256k1/recover.ts +36 -0
  191. package/src/secp256k1/sign.spec.ts +39 -0
  192. package/src/secp256k1/sign.ts +37 -0
  193. package/src/secp256k1/signVerify.spec.ts +94 -0
  194. package/src/secp256k1/tweakAdd.spec.ts +35 -0
  195. package/src/secp256k1/tweakAdd.ts +65 -0
  196. package/src/secp256k1/types.ts +4 -0
  197. package/src/secp256k1/verify.spec.ts +81 -0
  198. package/src/secp256k1/verify.ts +32 -0
  199. package/src/sha/asU8a.ts +30 -0
  200. package/src/sha/asU8a256.spec.ts +55 -0
  201. package/src/sha/asU8a512.spec.ts +33 -0
  202. package/src/sha/index.ts +8 -0
  203. package/src/signature/index.ts +8 -0
  204. package/src/signature/verify.spec.ts +230 -0
  205. package/src/signature/verify.ts +114 -0
  206. package/src/sr25519/agreement.spec.ts +31 -0
  207. package/src/sr25519/agreement.ts +23 -0
  208. package/src/sr25519/derive.ts +21 -0
  209. package/src/sr25519/deriveHard.ts +9 -0
  210. package/src/sr25519/derivePublic.ts +18 -0
  211. package/src/sr25519/deriveSoft.ts +9 -0
  212. package/src/sr25519/index.ts +12 -0
  213. package/src/sr25519/pair/fromSeed.spec.ts +35 -0
  214. package/src/sr25519/pair/fromSeed.ts +28 -0
  215. package/src/sr25519/pair/fromU8a.ts +23 -0
  216. package/src/sr25519/pair/testing.spec.ts +161 -0
  217. package/src/sr25519/pair/toU8a.ts +10 -0
  218. package/src/sr25519/sign.spec.ts +28 -0
  219. package/src/sr25519/sign.ts +22 -0
  220. package/src/sr25519/verify.spec.ts +42 -0
  221. package/src/sr25519/verify.ts +23 -0
  222. package/src/sr25519/vrfSign.ts +24 -0
  223. package/src/sr25519/vrfSignVerify.spec.ts +73 -0
  224. package/src/sr25519/vrfVerify.ts +25 -0
  225. package/src/test/index.ts +8 -0
  226. package/src/test/performance.ts +17 -0
  227. package/src/types.ts +33 -0
  228. package/src/xxhash/asHex.spec.ts +36 -0
  229. package/src/xxhash/asU8a.spec.ts +48 -0
  230. package/src/xxhash/asU8a.ts +45 -0
  231. package/src/xxhash/index.ts +8 -0
  232. package/src/xxhash/xxhash64.ts +155 -0
  233. package/tsconfig.build.json +18 -0
  234. package/tsconfig.spec.json +20 -0
@@ -0,0 +1,1159 @@
1
+ // Copyright 2017-2025 @polkadot/util-crypto authors & contributors
2
+ // SPDX-License-Identifier: Apache-2.0
3
+
4
+ /* eslint-disable brace-style,camelcase,comma-spacing,curly,one-var,padding-line-between-statements,space-infix-ops */
5
+
6
+ // Adapted from https://github.com/dchest/tweetnacl-js/blob/6a9594a35a27f9c723c5f1c107e376d1c65c23b3/nacl.js
7
+ //
8
+ // Changes made:
9
+ //
10
+ // - Added TS types
11
+ // - Change var to let/const
12
+ // - Comment out unused functions
13
+ // - export the only box/secretbox create/open functions (these are camelCase)
14
+ // - Linting style is mostly disabled below (apart form the changes above), so should be verifyable against original
15
+ // - Inline some calls (flatten, reduce call tree)
16
+ // - Some inline let definitions on loop variables
17
+ // - It is _messy_ the unused code is commented out, not removed
18
+ //
19
+ // Original headers:
20
+ //
21
+ // Ported in 2014 by Dmitry Chestnykh and Devi Mandiri.
22
+ // Public domain.
23
+ //
24
+ // Implementation derived from TweetNaCl version 20140427.
25
+ // See for details: http://tweetnacl.cr.yp.to/
26
+
27
+ // var u64 = function(h, l) { this.hi = h|0 >>> 0; this.lo = l|0 >>> 0; };
28
+ // var gf = function(init) {
29
+ // var i, r = new Float64Array(16);
30
+ // if (init) for (i = 0; i < init.length; i++) r[i] = init[i];
31
+ // return r;
32
+ // };
33
+
34
+ // // Pluggable, initialized in high-level API below.
35
+ // var randombytes = function(/* x, n */) { throw new Error('no PRNG'); };
36
+
37
+ // var _0 = new Uint8Array(16);
38
+ // var _9 = new Uint8Array(32); _9[0] = 9;
39
+
40
+ // var gf0 = gf(),
41
+ // gf1 = gf([1]),
42
+ // _121665 = gf([0xdb41, 1]),
43
+ // D = gf([0x78a3, 0x1359, 0x4dca, 0x75eb, 0xd8ab, 0x4141, 0x0a4d, 0x0070, 0xe898, 0x7779, 0x4079, 0x8cc7, 0xfe73, 0x2b6f, 0x6cee, 0x5203]),
44
+ // D2 = gf([0xf159, 0x26b2, 0x9b94, 0xebd6, 0xb156, 0x8283, 0x149a, 0x00e0, 0xd130, 0xeef3, 0x80f2, 0x198e, 0xfce7, 0x56df, 0xd9dc, 0x2406]),
45
+ // X = gf([0xd51a, 0x8f25, 0x2d60, 0xc956, 0xa7b2, 0x9525, 0xc760, 0x692c, 0xdc5c, 0xfdd6, 0xe231, 0xc0a4, 0x53fe, 0xcd6e, 0x36d3, 0x2169]),
46
+ // Y = gf([0x6658, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666]),
47
+ // I = gf([0xa0b0, 0x4a0e, 0x1b27, 0xc4ee, 0xe478, 0xad2f, 0x1806, 0x2f43, 0xd7a7, 0x3dfb, 0x0099, 0x2b4d, 0xdf0b, 0x4fc1, 0x2480, 0x2b83]);
48
+
49
+ function L32 (x: number, c: number): number { return (x << c) | (x >>> (32 - c)); }
50
+
51
+ function ld32 (x: Uint8Array, i: number): number {
52
+ let u = x[i+3] & 0xff;
53
+ u = (u<<8)|(x[i+2] & 0xff);
54
+ u = (u<<8)|(x[i+1] & 0xff);
55
+ return (u<<8)|(x[i+0] & 0xff);
56
+ }
57
+
58
+ // function dl64(x, i) {
59
+ // var h = (x[i] << 24) | (x[i+1] << 16) | (x[i+2] << 8) | x[i+3];
60
+ // var l = (x[i+4] << 24) | (x[i+5] << 16) | (x[i+6] << 8) | x[i+7];
61
+ // return new u64(h, l);
62
+ // }
63
+
64
+ function st32 (x: Uint8Array, j: number, u: number): void {
65
+ for (let i = 0; i < 4; i++) { x[j+i] = u & 255; u >>>= 8; }
66
+ }
67
+
68
+ // function ts64(x, i, u) {
69
+ // x[i] = (u.hi >> 24) & 0xff;
70
+ // x[i+1] = (u.hi >> 16) & 0xff;
71
+ // x[i+2] = (u.hi >> 8) & 0xff;
72
+ // x[i+3] = u.hi & 0xff;
73
+ // x[i+4] = (u.lo >> 24) & 0xff;
74
+ // x[i+5] = (u.lo >> 16) & 0xff;
75
+ // x[i+6] = (u.lo >> 8) & 0xff;
76
+ // x[i+7] = u.lo & 0xff;
77
+ // }
78
+
79
+ function vn (x: Uint8Array, xi: number, y: Uint8Array, yi: number, n: number): number {
80
+ let d = 0;
81
+ for (let i = 0; i < n; i++) d |= x[xi+i]^y[yi+i];
82
+ return (1 & ((d - 1) >>> 8)) - 1;
83
+ }
84
+
85
+ // function crypto_verify_16 (x: Uint8Array, xi: number, y: Uint8Array, yi: number): number {
86
+ // return vn(x,xi,y,yi,16);
87
+ // }
88
+
89
+ // function crypto_verify_32(x, xi, y, yi) {
90
+ // return vn(x,xi,y,yi,32);
91
+ // }
92
+
93
+ function core (out: Uint8Array, inp: Uint8Array, k: Uint8Array, c: Uint8Array, h: boolean): void {
94
+ const w = new Uint32Array(16), x = new Uint32Array(16), y = new Uint32Array(16), t = new Uint32Array(4);
95
+ let i, j, m;
96
+
97
+ for (i = 0; i < 4; i++) {
98
+ x[5*i] = ld32(c, 4*i);
99
+ x[1+i] = ld32(k, 4*i);
100
+ x[6+i] = ld32(inp, 4*i);
101
+ x[11+i] = ld32(k, 16+4*i);
102
+ }
103
+
104
+ for (i = 0; i < 16; i++) y[i] = x[i];
105
+
106
+ for (i = 0; i < 20; i++) {
107
+ for (j = 0; j < 4; j++) {
108
+ for (m = 0; m < 4; m++) t[m] = x[(5*j+4*m)%16];
109
+ t[1] ^= L32((t[0]+t[3])|0, 7);
110
+ t[2] ^= L32((t[1]+t[0])|0, 9);
111
+ t[3] ^= L32((t[2]+t[1])|0,13);
112
+ t[0] ^= L32((t[3]+t[2])|0,18);
113
+ for (m = 0; m < 4; m++) w[4*j+(j+m)%4] = t[m];
114
+ }
115
+ for (m = 0; m < 16; m++) x[m] = w[m];
116
+ }
117
+
118
+ if (h) {
119
+ for (i = 0; i < 16; i++) x[i] = (x[i] + y[i]) | 0;
120
+ for (i = 0; i < 4; i++) {
121
+ x[5*i] = (x[5*i] - ld32(c, 4*i)) | 0;
122
+ x[6+i] = (x[6+i] - ld32(inp, 4*i)) | 0;
123
+ }
124
+ for (i = 0; i < 4; i++) {
125
+ st32(out,4*i,x[5*i]);
126
+ st32(out,16+4*i,x[6+i]);
127
+ }
128
+ } else {
129
+ for (i = 0; i < 16; i++) st32(out, 4 * i, (x[i] + y[i]) | 0);
130
+ }
131
+ }
132
+
133
+ // function crypto_core_salsa20 (out: Uint8Array, inp: Uint8Array, k: Uint8Array, c: Uint8Array): number {
134
+ // core(out,inp,k,c,false);
135
+ // return 0;
136
+ // }
137
+
138
+ // function crypto_core_hsalsa20 (out: Uint8Array, inp: Uint8Array, k: Uint8Array, c: Uint8Array): number {
139
+ // core(out,inp,k,c,true);
140
+ // return 0;
141
+ // }
142
+
143
+ const sigma = new Uint8Array([101, 120, 112, 97, 110, 100, 32, 51, 50, 45, 98, 121, 116, 101, 32, 107]);
144
+ // "expand 32-byte k"
145
+
146
+ function crypto_stream_salsa20_xor (c: Uint8Array, cpos: number, m: Uint8Array | null, mpos: number, b: number, n: Uint8Array, k: Uint8Array): number {
147
+ const z = new Uint8Array(16), x = new Uint8Array(64);
148
+ let u, i;
149
+ if (!b) return 0;
150
+ for (i = 0; i < 16; i++) z[i] = 0;
151
+ for (i = 0; i < 8; i++) z[i] = n[i];
152
+ while (b >= 64) {
153
+ core(x, z, k, sigma, false);
154
+ for (i = 0; i < 64; i++) c[cpos+i] = (m?m[mpos+i]:0) ^ x[i];
155
+ u = 1;
156
+ for (i = 8; i < 16; i++) {
157
+ u = u + (z[i] & 0xff) | 0;
158
+ z[i] = u & 0xff;
159
+ u >>>= 8;
160
+ }
161
+ b -= 64;
162
+ cpos += 64;
163
+ if (m) mpos += 64;
164
+ }
165
+ if (b > 0) {
166
+ core(x, z, k, sigma, false);
167
+ for (i = 0; i < b; i++) c[cpos+i] = (m?m[mpos+i]:0) ^ x[i];
168
+ }
169
+ return 0;
170
+ }
171
+
172
+ // function crypto_stream_salsa20 (c: Uint8Array, cpos: number, d: number, n: Uint8Array, k: Uint8Array): number {
173
+ // return crypto_stream_salsa20_xor(c, cpos, null, 0, d, n, k);
174
+ // }
175
+
176
+ // function crypto_stream (c: Uint8Array, cpos: number, d: number, n: Uint8Array, k: Uint8Array): number {
177
+ // const s = new Uint8Array(32);
178
+ // crypto_core_hsalsa20(s,n,k,sigma);
179
+ // return crypto_stream_salsa20(c,cpos,d,n.subarray(16),s);
180
+ // }
181
+
182
+ function crypto_stream_xor (c: Uint8Array, cpos: number, m: Uint8Array | null, mpos: number, d: number, n: Uint8Array, k: Uint8Array): number {
183
+ const s = new Uint8Array(32);
184
+ core(s, n, k, sigma, true);
185
+ return crypto_stream_salsa20_xor(c, cpos, m, mpos, d, n.subarray(16), s);
186
+ }
187
+
188
+ function add1305 (h: Uint32Array, c: Uint32Array): void {
189
+ let u = 0;
190
+ for (let j = 0; j < 17; j++) {
191
+ u = (u + ((h[j] + c[j]) | 0)) | 0;
192
+ h[j] = u & 255;
193
+ u >>>= 8;
194
+ }
195
+ }
196
+
197
+ const minusp = new Uint32Array([5, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 252]);
198
+
199
+ function crypto_onetimeauth (out: Uint8Array, outpos: number, m: Uint8Array, mpos: number, n: number, k: Uint8Array): number {
200
+ let i, j, u;
201
+ const x = new Uint32Array(17), r = new Uint32Array(17), h = new Uint32Array(17), c = new Uint32Array(17), g = new Uint32Array(17);
202
+ for (j = 0; j < 17; j++) r[j]=h[j]=0;
203
+ for (j = 0; j < 16; j++) r[j]=k[j];
204
+ r[3]&=15;
205
+ r[4]&=252;
206
+ r[7]&=15;
207
+ r[8]&=252;
208
+ r[11]&=15;
209
+ r[12]&=252;
210
+ r[15]&=15;
211
+
212
+ while (n > 0) {
213
+ for (j = 0; j < 17; j++) c[j] = 0;
214
+ for (j = 0; (j < 16) && (j < n); ++j) c[j] = m[mpos+j];
215
+ c[j] = 1;
216
+ mpos += j; n -= j;
217
+ add1305(h,c);
218
+ for (i = 0; i < 17; i++) {
219
+ x[i] = 0;
220
+ for (j = 0; j < 17; j++) x[i] = (x[i] + (h[j] * ((j <= i) ? r[i - j] : ((320 * r[i + 17 - j])|0))) | 0) | 0;
221
+ }
222
+ for (i = 0; i < 17; i++) h[i] = x[i];
223
+ u = 0;
224
+ for (j = 0; j < 16; j++) {
225
+ u = (u + h[j]) | 0;
226
+ h[j] = u & 255;
227
+ u >>>= 8;
228
+ }
229
+ u = (u + h[16]) | 0; h[16] = u & 3;
230
+ u = (5 * (u >>> 2)) | 0;
231
+ for (j = 0; j < 16; j++) {
232
+ u = (u + h[j]) | 0;
233
+ h[j] = u & 255;
234
+ u >>>= 8;
235
+ }
236
+ u = (u + h[16]) | 0; h[16] = u;
237
+ }
238
+
239
+ for (j = 0; j < 17; j++) g[j] = h[j];
240
+ add1305(h,minusp);
241
+ const s = (-(h[16] >>> 7) | 0);
242
+ for (j = 0; j < 17; j++) h[j] ^= s & (g[j] ^ h[j]);
243
+
244
+ for (j = 0; j < 16; j++) c[j] = k[j + 16];
245
+ c[16] = 0;
246
+ add1305(h,c);
247
+ for (j = 0; j < 16; j++) out[outpos+j] = h[j];
248
+ return 0;
249
+ }
250
+
251
+ function crypto_onetimeauth_verify (h: Uint8Array, hpos: number, m: Uint8Array, mpos: number, n: number, k: Uint8Array) {
252
+ const x = new Uint8Array(16);
253
+ crypto_onetimeauth(x,0,m,mpos,n,k);
254
+ return vn(h, hpos, x, 0, 16);
255
+ }
256
+
257
+ function crypto_secretbox (c: Uint8Array, m: Uint8Array, d: number, n: Uint8Array, k: Uint8Array) {
258
+ if (d < 32) return -1;
259
+ crypto_stream_xor(c,0,m,0,d,n,k);
260
+ crypto_onetimeauth(c, 16, c, 32, d - 32, c);
261
+ for (let i = 0; i < 16; i++) c[i] = 0;
262
+ return 0;
263
+ }
264
+
265
+ function crypto_secretbox_open (m: Uint8Array, c: Uint8Array, d: number, n: Uint8Array, k: Uint8Array): number {
266
+ const x = new Uint8Array(32);
267
+ if (d < 32) return -1;
268
+ crypto_stream_xor(x, 0, null, 0, 32, n, k);
269
+ if (crypto_onetimeauth_verify(c, 16,c, 32,d - 32,x) !== 0) return -1;
270
+ crypto_stream_xor(m,0,c,0,d,n,k);
271
+ for (let i = 0; i < 32; i++) m[i] = 0;
272
+ return 0;
273
+ }
274
+
275
+ // function set25519(r, a) {
276
+ // var i;
277
+ // for (i = 0; i < 16; i++) r[i] = a[i]|0;
278
+ // }
279
+
280
+ // function car25519 (o: Float64Array): void {
281
+ // let c;
282
+ // let i;
283
+ // for (i = 0; i < 16; i++) {
284
+ // o[i] += 65536;
285
+ // c = Math.floor(o[i] / 65536);
286
+ // o[(i+1)*(i<15?1:0)] += c - 1 + 37 * (c-1) * (i===15?1:0);
287
+ // o[i] -= (c * 65536);
288
+ // }
289
+ // }
290
+
291
+ // function sel25519 (p: Float64Array, q: Float64Array, b: number): void {
292
+ // let t;
293
+ // const c = ~(b-1);
294
+ // for (let i = 0; i < 16; i++) {
295
+ // t = c & (p[i] ^ q[i]);
296
+ // p[i] ^= t;
297
+ // q[i] ^= t;
298
+ // }
299
+ // }
300
+
301
+ // function pack25519 (o: Uint8Array, n: Float64Array): void {
302
+ // let i, j, b;
303
+ // const m = gf(), t = gf();
304
+ // for (i = 0; i < 16; i++) t[i] = n[i];
305
+ // car25519(t);
306
+ // car25519(t);
307
+ // car25519(t);
308
+ // for (j = 0; j < 2; j++) {
309
+ // m[0] = t[0] - 0xffed;
310
+ // for (i = 1; i < 15; i++) {
311
+ // m[i] = t[i] - 0xffff - ((m[i-1]>>16) & 1);
312
+ // m[i-1] &= 0xffff;
313
+ // }
314
+ // m[15] = t[15] - 0x7fff - ((m[14]>>16) & 1);
315
+ // b = (m[15]>>16) & 1;
316
+ // m[14] &= 0xffff;
317
+ // sel25519(t, m, 1-b);
318
+ // }
319
+ // for (i = 0; i < 16; i++) {
320
+ // o[2*i] = t[i] & 0xff;
321
+ // o[2*i+1] = t[i]>>8;
322
+ // }
323
+ // }
324
+
325
+ // function neq25519(a, b) {
326
+ // var c = new Uint8Array(32), d = new Uint8Array(32);
327
+ // pack25519(c, a);
328
+ // pack25519(d, b);
329
+ // return crypto_verify_32(c, 0, d, 0);
330
+ // }
331
+
332
+ // function par25519(a) {
333
+ // var d = new Uint8Array(32);
334
+ // pack25519(d, a);
335
+ // return d[0] & 1;
336
+ // }
337
+
338
+ // function unpack25519 (o: Float64Array, n: Uint8Array): void {
339
+ // let i;
340
+ // for (i = 0; i < 16; i++) o[i] = n[2*i] + (n[2*i+1] << 8);
341
+ // o[15] &= 0x7fff;
342
+ // }
343
+
344
+ // function A (o: Float64Array, a: Float64Array, b: Float64Array): void {
345
+ // let i;
346
+ // for (i = 0; i < 16; i++) o[i] = (a[i] + b[i])|0;
347
+ // }
348
+
349
+ // function Z (o: Float64Array, a: Float64Array, b: Float64Array): void {
350
+ // let i;
351
+ // for (i = 0; i < 16; i++) o[i] = (a[i] - b[i])|0;
352
+ // }
353
+
354
+ // function M (o: Float64Array, a: Float64Array, b: Float64Array): void {
355
+ // let i, j;
356
+ // const t = new Float64Array(31);
357
+ // for (i = 0; i < 31; i++) t[i] = 0;
358
+ // for (i = 0; i < 16; i++) {
359
+ // for (j = 0; j < 16; j++) {
360
+ // t[i+j] += a[i] * b[j];
361
+ // }
362
+ // }
363
+ // for (i = 0; i < 15; i++) {
364
+ // t[i] += 38 * t[i+16];
365
+ // }
366
+ // for (i = 0; i < 16; i++) o[i] = t[i];
367
+ // car25519(o);
368
+ // car25519(o);
369
+ // }
370
+
371
+ // function S (o: Float64Array, a: Float64Array): void {
372
+ // M(o, a, a);
373
+ // }
374
+
375
+ // function inv25519 (o: Float64Array, i: Float64Array): void {
376
+ // const c = gf();
377
+ // let a;
378
+ // for (a = 0; a < 16; a++) c[a] = i[a];
379
+ // for (a = 253; a >= 0; a--) {
380
+ // S(c, c);
381
+ // if (a !== 2 && a !== 4) M(c, c, i);
382
+ // }
383
+ // for (a = 0; a < 16; a++) o[a] = c[a];
384
+ // }
385
+
386
+ // function pow2523(o, i) {
387
+ // var c = gf();
388
+ // var a;
389
+ // for (a = 0; a < 16; a++) c[a] = i[a];
390
+ // for (a = 250; a >= 0; a--) {
391
+ // S(c, c);
392
+ // if(a !== 1) M(c, c, i);
393
+ // }
394
+ // for (a = 0; a < 16; a++) o[a] = c[a];
395
+ // }
396
+
397
+ // function crypto_scalarmult (q: Uint8Array, n: Uint8Array, p: Uint8Array): number {
398
+ // const z = new Uint8Array(32);
399
+ // const x = new Float64Array(80);
400
+ // let r, i;
401
+ // const a = gf(), b = gf(), c = gf(), d = gf(), e = gf(), f = gf();
402
+ // for (i = 0; i < 31; i++) z[i] = n[i];
403
+ // z[31]=(n[31]&127)|64;
404
+ // z[0]&=248;
405
+ // unpack25519(x,p);
406
+ // for (i = 0; i < 16; i++) {
407
+ // b[i]=x[i];
408
+ // d[i]=a[i]=c[i]=0;
409
+ // }
410
+ // a[0]=d[0]=1;
411
+ // for (i=254; i>=0; --i) {
412
+ // r=(z[i>>>3]>>>(i&7))&1;
413
+ // sel25519(a,b,r);
414
+ // sel25519(c,d,r);
415
+ // A(e,a,c);
416
+ // Z(a,a,c);
417
+ // A(c,b,d);
418
+ // Z(b,b,d);
419
+ // S(d,e);
420
+ // S(f,a);
421
+ // M(a,c,a);
422
+ // M(c,b,e);
423
+ // A(e,a,c);
424
+ // Z(a,a,c);
425
+ // S(b,a);
426
+ // Z(c,d,f);
427
+ // M(a,c,_121665);
428
+ // A(a,a,d);
429
+ // M(c,c,a);
430
+ // M(a,d,f);
431
+ // M(d,b,x);
432
+ // S(b,e);
433
+ // sel25519(a,b,r);
434
+ // sel25519(c,d,r);
435
+ // }
436
+ // for (i = 0; i < 16; i++) {
437
+ // x[i+16]=a[i];
438
+ // x[i+32]=c[i];
439
+ // x[i+48]=b[i];
440
+ // x[i+64]=d[i];
441
+ // }
442
+ // const x32 = x.subarray(32);
443
+ // const x16 = x.subarray(16);
444
+ // inv25519(x32,x32);
445
+ // M(x16,x16,x32);
446
+ // pack25519(q,x16);
447
+ // return 0;
448
+ // }
449
+
450
+ // function crypto_scalarmult_base(q, n) {
451
+ // return crypto_scalarmult(q, n, _9);
452
+ // }
453
+
454
+ // function crypto_box_keypair(y, x) {
455
+ // randombytes(x, 32);
456
+ // return crypto_scalarmult_base(y, x);
457
+ // }
458
+
459
+ // function crypto_box_beforenm (k: Uint8Array, y: Uint8Array, x: Uint8Array): number {
460
+ // const s = new Uint8Array(32);
461
+ // crypto_scalarmult(s, x, y);
462
+ // return crypto_core_hsalsa20(k, _0, s, sigma);
463
+ // }
464
+
465
+ // var crypto_box_afternm = crypto_secretbox;
466
+ // var crypto_box_open_afternm = crypto_secretbox_open;
467
+
468
+ // function crypto_box(c, m, d, n, y, x) {
469
+ // var k = new Uint8Array(32);
470
+ // crypto_box_beforenm(k, y, x);
471
+ // return crypto_box_afternm(c, m, d, n, k);
472
+ // }
473
+
474
+ // function crypto_box_open(m, c, d, n, y, x) {
475
+ // var k = new Uint8Array(32);
476
+ // crypto_box_beforenm(k, y, x);
477
+ // return crypto_box_open_afternm(m, c, d, n, k);
478
+ // }
479
+
480
+ // function add64() {
481
+ // var a = 0, b = 0, c = 0, d = 0, m16 = 65535, l, h, i;
482
+ // for (i = 0; i < arguments.length; i++) {
483
+ // l = arguments[i].lo;
484
+ // h = arguments[i].hi;
485
+ // a += (l & m16); b += (l >>> 16);
486
+ // c += (h & m16); d += (h >>> 16);
487
+ // }
488
+
489
+ // b += (a >>> 16);
490
+ // c += (b >>> 16);
491
+ // d += (c >>> 16);
492
+
493
+ // return new u64((c & m16) | (d << 16), (a & m16) | (b << 16));
494
+ // }
495
+
496
+ // function shr64(x, c) {
497
+ // return new u64((x.hi >>> c), (x.lo >>> c) | (x.hi << (32 - c)));
498
+ // }
499
+
500
+ // function xor64() {
501
+ // var l = 0, h = 0, i;
502
+ // for (i = 0; i < arguments.length; i++) {
503
+ // l ^= arguments[i].lo;
504
+ // h ^= arguments[i].hi;
505
+ // }
506
+ // return new u64(h, l);
507
+ // }
508
+
509
+ // function R(x, c) {
510
+ // var h, l, c1 = 32 - c;
511
+ // if (c < 32) {
512
+ // h = (x.hi >>> c) | (x.lo << c1);
513
+ // l = (x.lo >>> c) | (x.hi << c1);
514
+ // } else if (c < 64) {
515
+ // h = (x.lo >>> c) | (x.hi << c1);
516
+ // l = (x.hi >>> c) | (x.lo << c1);
517
+ // }
518
+ // return new u64(h, l);
519
+ // }
520
+
521
+ // function Ch(x, y, z) {
522
+ // var h = (x.hi & y.hi) ^ (~x.hi & z.hi),
523
+ // l = (x.lo & y.lo) ^ (~x.lo & z.lo);
524
+ // return new u64(h, l);
525
+ // }
526
+
527
+ // function Maj(x, y, z) {
528
+ // var h = (x.hi & y.hi) ^ (x.hi & z.hi) ^ (y.hi & z.hi),
529
+ // l = (x.lo & y.lo) ^ (x.lo & z.lo) ^ (y.lo & z.lo);
530
+ // return new u64(h, l);
531
+ // }
532
+
533
+ // function Sigma0(x) { return xor64(R(x,28), R(x,34), R(x,39)); }
534
+ // function Sigma1(x) { return xor64(R(x,14), R(x,18), R(x,41)); }
535
+ // function sigma0(x) { return xor64(R(x, 1), R(x, 8), shr64(x,7)); }
536
+ // function sigma1(x) { return xor64(R(x,19), R(x,61), shr64(x,6)); }
537
+
538
+ // var K = [
539
+ // new u64(0x428a2f98, 0xd728ae22), new u64(0x71374491, 0x23ef65cd),
540
+ // new u64(0xb5c0fbcf, 0xec4d3b2f), new u64(0xe9b5dba5, 0x8189dbbc),
541
+ // new u64(0x3956c25b, 0xf348b538), new u64(0x59f111f1, 0xb605d019),
542
+ // new u64(0x923f82a4, 0xaf194f9b), new u64(0xab1c5ed5, 0xda6d8118),
543
+ // new u64(0xd807aa98, 0xa3030242), new u64(0x12835b01, 0x45706fbe),
544
+ // new u64(0x243185be, 0x4ee4b28c), new u64(0x550c7dc3, 0xd5ffb4e2),
545
+ // new u64(0x72be5d74, 0xf27b896f), new u64(0x80deb1fe, 0x3b1696b1),
546
+ // new u64(0x9bdc06a7, 0x25c71235), new u64(0xc19bf174, 0xcf692694),
547
+ // new u64(0xe49b69c1, 0x9ef14ad2), new u64(0xefbe4786, 0x384f25e3),
548
+ // new u64(0x0fc19dc6, 0x8b8cd5b5), new u64(0x240ca1cc, 0x77ac9c65),
549
+ // new u64(0x2de92c6f, 0x592b0275), new u64(0x4a7484aa, 0x6ea6e483),
550
+ // new u64(0x5cb0a9dc, 0xbd41fbd4), new u64(0x76f988da, 0x831153b5),
551
+ // new u64(0x983e5152, 0xee66dfab), new u64(0xa831c66d, 0x2db43210),
552
+ // new u64(0xb00327c8, 0x98fb213f), new u64(0xbf597fc7, 0xbeef0ee4),
553
+ // new u64(0xc6e00bf3, 0x3da88fc2), new u64(0xd5a79147, 0x930aa725),
554
+ // new u64(0x06ca6351, 0xe003826f), new u64(0x14292967, 0x0a0e6e70),
555
+ // new u64(0x27b70a85, 0x46d22ffc), new u64(0x2e1b2138, 0x5c26c926),
556
+ // new u64(0x4d2c6dfc, 0x5ac42aed), new u64(0x53380d13, 0x9d95b3df),
557
+ // new u64(0x650a7354, 0x8baf63de), new u64(0x766a0abb, 0x3c77b2a8),
558
+ // new u64(0x81c2c92e, 0x47edaee6), new u64(0x92722c85, 0x1482353b),
559
+ // new u64(0xa2bfe8a1, 0x4cf10364), new u64(0xa81a664b, 0xbc423001),
560
+ // new u64(0xc24b8b70, 0xd0f89791), new u64(0xc76c51a3, 0x0654be30),
561
+ // new u64(0xd192e819, 0xd6ef5218), new u64(0xd6990624, 0x5565a910),
562
+ // new u64(0xf40e3585, 0x5771202a), new u64(0x106aa070, 0x32bbd1b8),
563
+ // new u64(0x19a4c116, 0xb8d2d0c8), new u64(0x1e376c08, 0x5141ab53),
564
+ // new u64(0x2748774c, 0xdf8eeb99), new u64(0x34b0bcb5, 0xe19b48a8),
565
+ // new u64(0x391c0cb3, 0xc5c95a63), new u64(0x4ed8aa4a, 0xe3418acb),
566
+ // new u64(0x5b9cca4f, 0x7763e373), new u64(0x682e6ff3, 0xd6b2b8a3),
567
+ // new u64(0x748f82ee, 0x5defb2fc), new u64(0x78a5636f, 0x43172f60),
568
+ // new u64(0x84c87814, 0xa1f0ab72), new u64(0x8cc70208, 0x1a6439ec),
569
+ // new u64(0x90befffa, 0x23631e28), new u64(0xa4506ceb, 0xde82bde9),
570
+ // new u64(0xbef9a3f7, 0xb2c67915), new u64(0xc67178f2, 0xe372532b),
571
+ // new u64(0xca273ece, 0xea26619c), new u64(0xd186b8c7, 0x21c0c207),
572
+ // new u64(0xeada7dd6, 0xcde0eb1e), new u64(0xf57d4f7f, 0xee6ed178),
573
+ // new u64(0x06f067aa, 0x72176fba), new u64(0x0a637dc5, 0xa2c898a6),
574
+ // new u64(0x113f9804, 0xbef90dae), new u64(0x1b710b35, 0x131c471b),
575
+ // new u64(0x28db77f5, 0x23047d84), new u64(0x32caab7b, 0x40c72493),
576
+ // new u64(0x3c9ebe0a, 0x15c9bebc), new u64(0x431d67c4, 0x9c100d4c),
577
+ // new u64(0x4cc5d4be, 0xcb3e42b6), new u64(0x597f299c, 0xfc657e2a),
578
+ // new u64(0x5fcb6fab, 0x3ad6faec), new u64(0x6c44198c, 0x4a475817)
579
+ // ];
580
+
581
+ // function crypto_hashblocks(x, m, n) {
582
+ // var z = [], b = [], a = [], w = [], t, i, j;
583
+
584
+ // for (i = 0; i < 8; i++) z[i] = a[i] = dl64(x, 8*i);
585
+
586
+ // var pos = 0;
587
+ // while (n >= 128) {
588
+ // for (i = 0; i < 16; i++) w[i] = dl64(m, 8*i+pos);
589
+ // for (i = 0; i < 80; i++) {
590
+ // for (j = 0; j < 8; j++) b[j] = a[j];
591
+ // t = add64(a[7], Sigma1(a[4]), Ch(a[4], a[5], a[6]), K[i], w[i%16]);
592
+ // b[7] = add64(t, Sigma0(a[0]), Maj(a[0], a[1], a[2]));
593
+ // b[3] = add64(b[3], t);
594
+ // for (j = 0; j < 8; j++) a[(j+1)%8] = b[j];
595
+ // if (i%16 === 15) {
596
+ // for (j = 0; j < 16; j++) {
597
+ // w[j] = add64(w[j], w[(j+9)%16], sigma0(w[(j+1)%16]), sigma1(w[(j+14)%16]));
598
+ // }
599
+ // }
600
+ // }
601
+
602
+ // for (i = 0; i < 8; i++) {
603
+ // a[i] = add64(a[i], z[i]);
604
+ // z[i] = a[i];
605
+ // }
606
+
607
+ // pos += 128;
608
+ // n -= 128;
609
+ // }
610
+
611
+ // for (i = 0; i < 8; i++) ts64(x, 8*i, z[i]);
612
+ // return n;
613
+ // }
614
+
615
+ // var iv = new Uint8Array([
616
+ // 0x6a,0x09,0xe6,0x67,0xf3,0xbc,0xc9,0x08,
617
+ // 0xbb,0x67,0xae,0x85,0x84,0xca,0xa7,0x3b,
618
+ // 0x3c,0x6e,0xf3,0x72,0xfe,0x94,0xf8,0x2b,
619
+ // 0xa5,0x4f,0xf5,0x3a,0x5f,0x1d,0x36,0xf1,
620
+ // 0x51,0x0e,0x52,0x7f,0xad,0xe6,0x82,0xd1,
621
+ // 0x9b,0x05,0x68,0x8c,0x2b,0x3e,0x6c,0x1f,
622
+ // 0x1f,0x83,0xd9,0xab,0xfb,0x41,0xbd,0x6b,
623
+ // 0x5b,0xe0,0xcd,0x19,0x13,0x7e,0x21,0x79
624
+ // ]);
625
+
626
+ // function crypto_hash(out, m, n) {
627
+ // var h = new Uint8Array(64), x = new Uint8Array(256);
628
+ // var i, b = n;
629
+
630
+ // for (i = 0; i < 64; i++) h[i] = iv[i];
631
+
632
+ // crypto_hashblocks(h, m, n);
633
+ // n %= 128;
634
+
635
+ // for (i = 0; i < 256; i++) x[i] = 0;
636
+ // for (i = 0; i < n; i++) x[i] = m[b-n+i];
637
+ // x[n] = 128;
638
+
639
+ // n = 256-128*(n<112?1:0);
640
+ // x[n-9] = 0;
641
+ // ts64(x, n-8, new u64((b / 0x20000000) | 0, b << 3));
642
+ // crypto_hashblocks(h, x, n);
643
+
644
+ // for (i = 0; i < 64; i++) out[i] = h[i];
645
+
646
+ // return 0;
647
+ // }
648
+
649
+ // function add(p, q) {
650
+ // var a = gf(), b = gf(), c = gf(),
651
+ // d = gf(), e = gf(), f = gf(),
652
+ // g = gf(), h = gf(), t = gf();
653
+
654
+ // Z(a, p[1], p[0]);
655
+ // Z(t, q[1], q[0]);
656
+ // M(a, a, t);
657
+ // A(b, p[0], p[1]);
658
+ // A(t, q[0], q[1]);
659
+ // M(b, b, t);
660
+ // M(c, p[3], q[3]);
661
+ // M(c, c, D2);
662
+ // M(d, p[2], q[2]);
663
+ // A(d, d, d);
664
+ // Z(e, b, a);
665
+ // Z(f, d, c);
666
+ // A(g, d, c);
667
+ // A(h, b, a);
668
+
669
+ // M(p[0], e, f);
670
+ // M(p[1], h, g);
671
+ // M(p[2], g, f);
672
+ // M(p[3], e, h);
673
+ // }
674
+
675
+ // function cswap(p, q, b) {
676
+ // var i;
677
+ // for (i = 0; i < 4; i++) {
678
+ // sel25519(p[i], q[i], b);
679
+ // }
680
+ // }
681
+
682
+ // function pack(r, p) {
683
+ // var tx = gf(), ty = gf(), zi = gf();
684
+ // inv25519(zi, p[2]);
685
+ // M(tx, p[0], zi);
686
+ // M(ty, p[1], zi);
687
+ // pack25519(r, ty);
688
+ // r[31] ^= par25519(tx) << 7;
689
+ // }
690
+
691
+ // function scalarmult(p, q, s) {
692
+ // var b, i;
693
+ // set25519(p[0], gf0);
694
+ // set25519(p[1], gf1);
695
+ // set25519(p[2], gf1);
696
+ // set25519(p[3], gf0);
697
+ // for (i = 255; i >= 0; --i) {
698
+ // b = (s[(i/8)|0] >> (i&7)) & 1;
699
+ // cswap(p, q, b);
700
+ // add(q, p);
701
+ // add(p, p);
702
+ // cswap(p, q, b);
703
+ // }
704
+ // }
705
+
706
+ // function scalarbase(p, s) {
707
+ // var q = [gf(), gf(), gf(), gf()];
708
+ // set25519(q[0], X);
709
+ // set25519(q[1], Y);
710
+ // set25519(q[2], gf1);
711
+ // M(q[3], X, Y);
712
+ // scalarmult(p, q, s);
713
+ // }
714
+
715
+ // function crypto_sign_keypair(pk, sk, seeded) {
716
+ // var d = new Uint8Array(64);
717
+ // var p = [gf(), gf(), gf(), gf()];
718
+ // var i;
719
+
720
+ // if (!seeded) randombytes(sk, 32);
721
+ // crypto_hash(d, sk, 32);
722
+ // d[0] &= 248;
723
+ // d[31] &= 127;
724
+ // d[31] |= 64;
725
+
726
+ // scalarbase(p, d);
727
+ // pack(pk, p);
728
+
729
+ // for (i = 0; i < 32; i++) sk[i+32] = pk[i];
730
+ // return 0;
731
+ // }
732
+
733
+ // var L = new Float64Array([0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58, 0xd6, 0x9c, 0xf7, 0xa2, 0xde, 0xf9, 0xde, 0x14, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x10]);
734
+
735
+ // function modL(r, x) {
736
+ // var carry, i, j, k;
737
+ // for (i = 63; i >= 32; --i) {
738
+ // carry = 0;
739
+ // for (j = i - 32, k = i - 12; j < k; ++j) {
740
+ // x[j] += carry - 16 * x[i] * L[j - (i - 32)];
741
+ // carry = Math.floor((x[j] + 128) / 256);
742
+ // x[j] -= carry * 256;
743
+ // }
744
+ // x[j] += carry;
745
+ // x[i] = 0;
746
+ // }
747
+ // carry = 0;
748
+ // for (j = 0; j < 32; j++) {
749
+ // x[j] += carry - (x[31] >> 4) * L[j];
750
+ // carry = x[j] >> 8;
751
+ // x[j] &= 255;
752
+ // }
753
+ // for (j = 0; j < 32; j++) x[j] -= carry * L[j];
754
+ // for (i = 0; i < 32; i++) {
755
+ // x[i+1] += x[i] >> 8;
756
+ // r[i] = x[i] & 255;
757
+ // }
758
+ // }
759
+
760
+ // function reduce(r) {
761
+ // var x = new Float64Array(64), i;
762
+ // for (i = 0; i < 64; i++) x[i] = r[i];
763
+ // for (i = 0; i < 64; i++) r[i] = 0;
764
+ // modL(r, x);
765
+ // }
766
+
767
+ // // Note: difference from C - smlen returned, not passed as argument.
768
+ // function crypto_sign(sm, m, n, sk) {
769
+ // var d = new Uint8Array(64), h = new Uint8Array(64), r = new Uint8Array(64);
770
+ // var i, j, x = new Float64Array(64);
771
+ // var p = [gf(), gf(), gf(), gf()];
772
+
773
+ // crypto_hash(d, sk, 32);
774
+ // d[0] &= 248;
775
+ // d[31] &= 127;
776
+ // d[31] |= 64;
777
+
778
+ // var smlen = n + 64;
779
+ // for (i = 0; i < n; i++) sm[64 + i] = m[i];
780
+ // for (i = 0; i < 32; i++) sm[32 + i] = d[32 + i];
781
+
782
+ // crypto_hash(r, sm.subarray(32), n+32);
783
+ // reduce(r);
784
+ // scalarbase(p, r);
785
+ // pack(sm, p);
786
+
787
+ // for (i = 32; i < 64; i++) sm[i] = sk[i];
788
+ // crypto_hash(h, sm, n + 64);
789
+ // reduce(h);
790
+
791
+ // for (i = 0; i < 64; i++) x[i] = 0;
792
+ // for (i = 0; i < 32; i++) x[i] = r[i];
793
+ // for (i = 0; i < 32; i++) {
794
+ // for (j = 0; j < 32; j++) {
795
+ // x[i+j] += h[i] * d[j];
796
+ // }
797
+ // }
798
+
799
+ // modL(sm.subarray(32), x);
800
+ // return smlen;
801
+ // }
802
+
803
+ // function unpackneg(r, p) {
804
+ // var t = gf(), chk = gf(), num = gf(),
805
+ // den = gf(), den2 = gf(), den4 = gf(),
806
+ // den6 = gf();
807
+
808
+ // set25519(r[2], gf1);
809
+ // unpack25519(r[1], p);
810
+ // S(num, r[1]);
811
+ // M(den, num, D);
812
+ // Z(num, num, r[2]);
813
+ // A(den, r[2], den);
814
+
815
+ // S(den2, den);
816
+ // S(den4, den2);
817
+ // M(den6, den4, den2);
818
+ // M(t, den6, num);
819
+ // M(t, t, den);
820
+
821
+ // pow2523(t, t);
822
+ // M(t, t, num);
823
+ // M(t, t, den);
824
+ // M(t, t, den);
825
+ // M(r[0], t, den);
826
+
827
+ // S(chk, r[0]);
828
+ // M(chk, chk, den);
829
+ // if (neq25519(chk, num)) M(r[0], r[0], I);
830
+
831
+ // S(chk, r[0]);
832
+ // M(chk, chk, den);
833
+ // if (neq25519(chk, num)) return -1;
834
+
835
+ // if (par25519(r[0]) === (p[31]>>7)) Z(r[0], gf0, r[0]);
836
+
837
+ // M(r[3], r[0], r[1]);
838
+ // return 0;
839
+ // }
840
+
841
+ // function crypto_sign_open(m, sm, n, pk) {
842
+ // var i;
843
+ // var t = new Uint8Array(32), h = new Uint8Array(64);
844
+ // var p = [gf(), gf(), gf(), gf()],
845
+ // q = [gf(), gf(), gf(), gf()];
846
+
847
+ // if (n < 64) return -1;
848
+
849
+ // if (unpackneg(q, pk)) return -1;
850
+
851
+ // for (i = 0; i < n; i++) m[i] = sm[i];
852
+ // for (i = 0; i < 32; i++) m[i+32] = pk[i];
853
+ // crypto_hash(h, m, n);
854
+ // reduce(h);
855
+ // scalarmult(p, q, h);
856
+
857
+ // scalarbase(q, sm.subarray(32));
858
+ // add(p, q);
859
+ // pack(t, p);
860
+
861
+ // n -= 64;
862
+ // if (crypto_verify_32(sm, 0, t, 0)) {
863
+ // for (i = 0; i < n; i++) m[i] = 0;
864
+ // return -1;
865
+ // }
866
+
867
+ // for (i = 0; i < n; i++) m[i] = sm[i + 64];
868
+ // return n;
869
+ // }
870
+
871
+ const crypto_secretbox_KEYBYTES = 32;
872
+ const crypto_secretbox_NONCEBYTES = 24;
873
+ const crypto_secretbox_ZEROBYTES = 32;
874
+ const crypto_secretbox_BOXZEROBYTES = 16;
875
+ // const crypto_scalarmult_BYTES = 32;
876
+ // const crypto_scalarmult_SCALARBYTES = 32;
877
+ // const crypto_box_PUBLICKEYBYTES = 32;
878
+ // const crypto_box_SECRETKEYBYTES = 32;
879
+ // const crypto_box_BEFORENMBYTES = 32;
880
+ // const crypto_box_NONCEBYTES = crypto_secretbox_NONCEBYTES;
881
+ // const crypto_box_ZEROBYTES = crypto_secretbox_ZEROBYTES;
882
+ // const crypto_box_BOXZEROBYTES = crypto_secretbox_BOXZEROBYTES;
883
+ // const crypto_sign_BYTES = 64;
884
+ // const crypto_sign_PUBLICKEYBYTES = 32;
885
+ // const crypto_sign_SECRETKEYBYTES = 64;
886
+ // const crypto_sign_SEEDBYTES = 32;
887
+ // const crypto_hash_BYTES = 64;
888
+
889
+ // nacl.lowlevel = {
890
+ // crypto_core_hsalsa20: crypto_core_hsalsa20,
891
+ // crypto_stream_xor: crypto_stream_xor,
892
+ // crypto_stream: crypto_stream,
893
+ // crypto_stream_salsa20_xor: crypto_stream_salsa20_xor,
894
+ // crypto_stream_salsa20: crypto_stream_salsa20,
895
+ // crypto_onetimeauth: crypto_onetimeauth,
896
+ // crypto_onetimeauth_verify: crypto_onetimeauth_verify,
897
+ // crypto_verify_16: crypto_verify_16,
898
+ // crypto_verify_32: crypto_verify_32,
899
+ // crypto_secretbox: crypto_secretbox,
900
+ // crypto_secretbox_open: crypto_secretbox_open,
901
+ // crypto_scalarmult: crypto_scalarmult,
902
+ // crypto_scalarmult_base: crypto_scalarmult_base,
903
+ // crypto_box_beforenm: crypto_box_beforenm,
904
+ // crypto_box_afternm: crypto_box_afternm,
905
+ // crypto_box: crypto_box,
906
+ // crypto_box_open: crypto_box_open,
907
+ // crypto_box_keypair: crypto_box_keypair,
908
+ // crypto_hash: crypto_hash,
909
+ // crypto_sign: crypto_sign,
910
+ // crypto_sign_keypair: crypto_sign_keypair,
911
+ // crypto_sign_open: crypto_sign_open,
912
+
913
+ // crypto_secretbox_KEYBYTES: crypto_secretbox_KEYBYTES,
914
+ // crypto_secretbox_NONCEBYTES: crypto_secretbox_NONCEBYTES,
915
+ // crypto_secretbox_ZEROBYTES: crypto_secretbox_ZEROBYTES,
916
+ // crypto_secretbox_BOXZEROBYTES: crypto_secretbox_BOXZEROBYTES,
917
+ // crypto_scalarmult_BYTES: crypto_scalarmult_BYTES,
918
+ // crypto_scalarmult_SCALARBYTES: crypto_scalarmult_SCALARBYTES,
919
+ // crypto_box_PUBLICKEYBYTES: crypto_box_PUBLICKEYBYTES,
920
+ // crypto_box_SECRETKEYBYTES: crypto_box_SECRETKEYBYTES,
921
+ // crypto_box_BEFORENMBYTES: crypto_box_BEFORENMBYTES,
922
+ // crypto_box_NONCEBYTES: crypto_box_NONCEBYTES,
923
+ // crypto_box_ZEROBYTES: crypto_box_ZEROBYTES,
924
+ // crypto_box_BOXZEROBYTES: crypto_box_BOXZEROBYTES,
925
+ // crypto_sign_BYTES: crypto_sign_BYTES,
926
+ // crypto_sign_PUBLICKEYBYTES: crypto_sign_PUBLICKEYBYTES,
927
+ // crypto_sign_SECRETKEYBYTES: crypto_sign_SECRETKEYBYTES,
928
+ // crypto_sign_SEEDBYTES: crypto_sign_SEEDBYTES,
929
+ // crypto_hash_BYTES: crypto_hash_BYTES,
930
+
931
+ // gf: gf,
932
+ // D: D,
933
+ // L: L,
934
+ // pack25519: pack25519,
935
+ // unpack25519: unpack25519,
936
+ // M: M,
937
+ // A: A,
938
+ // S: S,
939
+ // Z: Z,
940
+ // pow2523: pow2523,
941
+ // add: add,
942
+ // set25519: set25519,
943
+ // modL: modL,
944
+ // scalarmult: scalarmult,
945
+ // scalarbase: scalarbase,
946
+ // };
947
+
948
+ // /* High-level API */
949
+
950
+ function checkLengths (k: Uint8Array, n: Uint8Array): void {
951
+ if (k.length !== crypto_secretbox_KEYBYTES) throw new Error('bad key size');
952
+ if (n.length !== crypto_secretbox_NONCEBYTES) throw new Error('bad nonce size');
953
+ }
954
+
955
+ // function checkBoxLengths (pk: Uint8Array, sk: Uint8Array): void {
956
+ // if (pk.length !== crypto_box_PUBLICKEYBYTES) throw new Error('bad public key size');
957
+ // if (sk.length !== crypto_box_SECRETKEYBYTES) throw new Error('bad secret key size');
958
+ // }
959
+
960
+ function checkArrayTypes (...args: unknown[]): void {
961
+ for (let i = 0, count = args.length; i < count; i++) {
962
+ if (!(args[i] instanceof Uint8Array))
963
+ throw new TypeError('unexpected type, use Uint8Array');
964
+ }
965
+ }
966
+
967
+ // function cleanup(arr) {
968
+ // for (var i = 0; i < arr.length; i++) arr[i] = 0;
969
+ // }
970
+
971
+ // nacl.randomBytes = function(n) {
972
+ // var b = new Uint8Array(n);
973
+ // randombytes(b, n);
974
+ // return b;
975
+ // };
976
+
977
+ export function naclSecretbox (msg: Uint8Array, nonce: Uint8Array, key: Uint8Array): Uint8Array {
978
+ checkArrayTypes(msg, nonce, key);
979
+ checkLengths(key, nonce);
980
+ const m = new Uint8Array(crypto_secretbox_ZEROBYTES + msg.length);
981
+ const c = new Uint8Array(m.length);
982
+ for (let i = 0; i < msg.length; i++) m[i+crypto_secretbox_ZEROBYTES] = msg[i];
983
+ crypto_secretbox(c, m, m.length, nonce, key);
984
+ return c.subarray(crypto_secretbox_BOXZEROBYTES);
985
+ }
986
+
987
+ export function naclSecretboxOpen (box: Uint8Array, nonce: Uint8Array, key: Uint8Array): Uint8Array | null {
988
+ checkArrayTypes(box, nonce, key);
989
+ checkLengths(key, nonce);
990
+ const c = new Uint8Array(crypto_secretbox_BOXZEROBYTES + box.length);
991
+ const m = new Uint8Array(c.length);
992
+ for (let i = 0; i < box.length; i++) c[i+crypto_secretbox_BOXZEROBYTES] = box[i];
993
+ if (c.length < 32) return null;
994
+ if (crypto_secretbox_open(m, c, c.length, nonce, key) !== 0) return null;
995
+ return m.subarray(crypto_secretbox_ZEROBYTES);
996
+ }
997
+
998
+ // nacl.secretbox.keyLength = crypto_secretbox_KEYBYTES;
999
+ // nacl.secretbox.nonceLength = crypto_secretbox_NONCEBYTES;
1000
+ // nacl.secretbox.overheadLength = crypto_secretbox_BOXZEROBYTES;
1001
+
1002
+ // nacl.scalarMult = function(n, p) {
1003
+ // checkArrayTypes(n, p);
1004
+ // if (n.length !== crypto_scalarmult_SCALARBYTES) throw new Error('bad n size');
1005
+ // if (p.length !== crypto_scalarmult_BYTES) throw new Error('bad p size');
1006
+ // var q = new Uint8Array(crypto_scalarmult_BYTES);
1007
+ // crypto_scalarmult(q, n, p);
1008
+ // return q;
1009
+ // };
1010
+
1011
+ // nacl.scalarMult.base = function(n) {
1012
+ // checkArrayTypes(n);
1013
+ // if (n.length !== crypto_scalarmult_SCALARBYTES) throw new Error('bad n size');
1014
+ // var q = new Uint8Array(crypto_scalarmult_BYTES);
1015
+ // crypto_scalarmult_base(q, n);
1016
+ // return q;
1017
+ // };
1018
+
1019
+ // nacl.scalarMult.scalarLength = crypto_scalarmult_SCALARBYTES;
1020
+ // nacl.scalarMult.groupElementLength = crypto_scalarmult_BYTES;
1021
+
1022
+ // nacl.box = function (msg, nonce, publicKey, secretKey) {
1023
+ // var k = nacl.box.before(publicKey, secretKey);
1024
+ // return nacl.secretbox(msg, nonce, k);
1025
+ // };
1026
+
1027
+ // nacl.box.before = function(publicKey, secretKey) {
1028
+ // checkArrayTypes(publicKey, secretKey);
1029
+ // checkBoxLengths(publicKey, secretKey);
1030
+ // var k = new Uint8Array(crypto_box_BEFORENMBYTES);
1031
+ // crypto_box_beforenm(k, publicKey, secretKey);
1032
+ // return k;
1033
+ // };
1034
+
1035
+ // nacl.box.after = nacl.secretbox;
1036
+
1037
+ // nacl.box.open = function (msg, nonce, publicKey, secretKey) {
1038
+ // var k = nacl.box.before(publicKey, secretKey);
1039
+ // return nacl.secretbox.open(msg, nonce, k);
1040
+ // };
1041
+
1042
+ // nacl.box.open.after = nacl.secretbox.open;
1043
+
1044
+ // nacl.box.keyPair = function() {
1045
+ // var pk = new Uint8Array(crypto_box_PUBLICKEYBYTES);
1046
+ // var sk = new Uint8Array(crypto_box_SECRETKEYBYTES);
1047
+ // crypto_box_keypair(pk, sk);
1048
+ // return {publicKey: pk, secretKey: sk};
1049
+ // };
1050
+
1051
+ // nacl.box.keyPair.fromSecretKey = function(secretKey) {
1052
+ // checkArrayTypes(secretKey);
1053
+ // if (secretKey.length !== crypto_box_SECRETKEYBYTES)
1054
+ // throw new Error('bad secret key size');
1055
+ // var pk = new Uint8Array(crypto_box_PUBLICKEYBYTES);
1056
+ // crypto_scalarmult_base(pk, secretKey);
1057
+ // return {publicKey: pk, secretKey: new Uint8Array(secretKey)};
1058
+ // };
1059
+
1060
+ // nacl.box.publicKeyLength = crypto_box_PUBLICKEYBYTES;
1061
+ // nacl.box.secretKeyLength = crypto_box_SECRETKEYBYTES;
1062
+ // nacl.box.sharedKeyLength = crypto_box_BEFORENMBYTES;
1063
+ // nacl.box.nonceLength = crypto_box_NONCEBYTES;
1064
+ // nacl.box.overheadLength = nacl.secretbox.overheadLength;
1065
+
1066
+ // nacl.sign = function(msg, secretKey) {
1067
+ // checkArrayTypes(msg, secretKey);
1068
+ // if (secretKey.length !== crypto_sign_SECRETKEYBYTES)
1069
+ // throw new Error('bad secret key size');
1070
+ // var signedMsg = new Uint8Array(crypto_sign_BYTES+msg.length);
1071
+ // crypto_sign(signedMsg, msg, msg.length, secretKey);
1072
+ // return signedMsg;
1073
+ // };
1074
+
1075
+ // nacl.sign.open = function(signedMsg, publicKey) {
1076
+ // checkArrayTypes(signedMsg, publicKey);
1077
+ // if (publicKey.length !== crypto_sign_PUBLICKEYBYTES)
1078
+ // throw new Error('bad public key size');
1079
+ // var tmp = new Uint8Array(signedMsg.length);
1080
+ // var mlen = crypto_sign_open(tmp, signedMsg, signedMsg.length, publicKey);
1081
+ // if (mlen < 0) return null;
1082
+ // var m = new Uint8Array(mlen);
1083
+ // for (var i = 0; i < m.length; i++) m[i] = tmp[i];
1084
+ // return m;
1085
+ // };
1086
+
1087
+ // nacl.sign.detached = function(msg, secretKey) {
1088
+ // var signedMsg = nacl.sign(msg, secretKey);
1089
+ // var sig = new Uint8Array(crypto_sign_BYTES);
1090
+ // for (var i = 0; i < sig.length; i++) sig[i] = signedMsg[i];
1091
+ // return sig;
1092
+ // };
1093
+
1094
+ // nacl.sign.detached.verify = function(msg, sig, publicKey) {
1095
+ // checkArrayTypes(msg, sig, publicKey);
1096
+ // if (sig.length !== crypto_sign_BYTES)
1097
+ // throw new Error('bad signature size');
1098
+ // if (publicKey.length !== crypto_sign_PUBLICKEYBYTES)
1099
+ // throw new Error('bad public key size');
1100
+ // var sm = new Uint8Array(crypto_sign_BYTES + msg.length);
1101
+ // var m = new Uint8Array(crypto_sign_BYTES + msg.length);
1102
+ // var i;
1103
+ // for (i = 0; i < crypto_sign_BYTES; i++) sm[i] = sig[i];
1104
+ // for (i = 0; i < msg.length; i++) sm[i+crypto_sign_BYTES] = msg[i];
1105
+ // return (crypto_sign_open(m, sm, sm.length, publicKey) >= 0);
1106
+ // };
1107
+
1108
+ // nacl.sign.keyPair = function() {
1109
+ // var pk = new Uint8Array(crypto_sign_PUBLICKEYBYTES);
1110
+ // var sk = new Uint8Array(crypto_sign_SECRETKEYBYTES);
1111
+ // crypto_sign_keypair(pk, sk);
1112
+ // return {publicKey: pk, secretKey: sk};
1113
+ // };
1114
+
1115
+ // nacl.sign.keyPair.fromSecretKey = function(secretKey) {
1116
+ // checkArrayTypes(secretKey);
1117
+ // if (secretKey.length !== crypto_sign_SECRETKEYBYTES)
1118
+ // throw new Error('bad secret key size');
1119
+ // var pk = new Uint8Array(crypto_sign_PUBLICKEYBYTES);
1120
+ // for (var i = 0; i < pk.length; i++) pk[i] = secretKey[32+i];
1121
+ // return {publicKey: pk, secretKey: new Uint8Array(secretKey)};
1122
+ // };
1123
+
1124
+ // nacl.sign.keyPair.fromSeed = function(seed) {
1125
+ // checkArrayTypes(seed);
1126
+ // if (seed.length !== crypto_sign_SEEDBYTES)
1127
+ // throw new Error('bad seed size');
1128
+ // var pk = new Uint8Array(crypto_sign_PUBLICKEYBYTES);
1129
+ // var sk = new Uint8Array(crypto_sign_SECRETKEYBYTES);
1130
+ // for (var i = 0; i < 32; i++) sk[i] = seed[i];
1131
+ // crypto_sign_keypair(pk, sk, true);
1132
+ // return {publicKey: pk, secretKey: sk};
1133
+ // };
1134
+
1135
+ // nacl.sign.publicKeyLength = crypto_sign_PUBLICKEYBYTES;
1136
+ // nacl.sign.secretKeyLength = crypto_sign_SECRETKEYBYTES;
1137
+ // nacl.sign.seedLength = crypto_sign_SEEDBYTES;
1138
+ // nacl.sign.signatureLength = crypto_sign_BYTES;
1139
+
1140
+ // nacl.hash = function(msg) {
1141
+ // checkArrayTypes(msg);
1142
+ // var h = new Uint8Array(crypto_hash_BYTES);
1143
+ // crypto_hash(h, msg, msg.length);
1144
+ // return h;
1145
+ // };
1146
+
1147
+ // nacl.hash.hashLength = crypto_hash_BYTES;
1148
+
1149
+ // nacl.verify = function(x, y) {
1150
+ // checkArrayTypes(x, y);
1151
+ // // Zero length arguments are considered not equal.
1152
+ // if (x.length === 0 || y.length === 0) return false;
1153
+ // if (x.length !== y.length) return false;
1154
+ // return (vn(x, 0, y, 0, x.length) === 0) ? true : false;
1155
+ // };
1156
+
1157
+ // nacl.setPRNG = function(fn) {
1158
+ // randombytes = fn;
1159
+ // };