react-native-quick-crypto 1.0.0-beta.8 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/QuickCrypto.podspec +145 -6
- package/README.md +14 -27
- package/android/CMakeLists.txt +62 -7
- package/android/build.gradle +12 -2
- package/android/src/main/java/com/margelo/nitro/quickcrypto/QuickCryptoPackage.java +0 -2
- package/app.plugin.js +3 -0
- package/cpp/blake3/HybridBlake3.cpp +118 -0
- package/cpp/blake3/HybridBlake3.hpp +35 -0
- package/cpp/cipher/CCMCipher.cpp +199 -0
- package/cpp/cipher/CCMCipher.hpp +26 -0
- package/cpp/cipher/ChaCha20Cipher.cpp +97 -0
- package/cpp/cipher/ChaCha20Cipher.hpp +25 -0
- package/cpp/cipher/ChaCha20Poly1305Cipher.cpp +170 -0
- package/cpp/cipher/ChaCha20Poly1305Cipher.hpp +30 -0
- package/cpp/cipher/GCMCipher.cpp +68 -0
- package/cpp/cipher/GCMCipher.hpp +14 -0
- package/cpp/cipher/HybridCipher.cpp +322 -0
- package/cpp/cipher/HybridCipher.hpp +68 -0
- package/cpp/cipher/HybridCipherFactory.hpp +105 -0
- package/cpp/cipher/HybridRsaCipher.cpp +348 -0
- package/cpp/cipher/HybridRsaCipher.hpp +29 -0
- package/cpp/cipher/OCBCipher.cpp +55 -0
- package/cpp/cipher/OCBCipher.hpp +19 -0
- package/cpp/cipher/XSalsa20Cipher.cpp +61 -0
- package/cpp/cipher/XSalsa20Cipher.hpp +33 -0
- package/cpp/ec/HybridEcKeyPair.cpp +428 -0
- package/cpp/ec/HybridEcKeyPair.hpp +48 -0
- package/cpp/ed25519/HybridEdKeyPair.cpp +228 -98
- package/cpp/ed25519/HybridEdKeyPair.hpp +42 -56
- package/cpp/hash/HybridHash.cpp +185 -0
- package/cpp/hash/HybridHash.hpp +43 -0
- package/cpp/hmac/HybridHmac.cpp +95 -0
- package/cpp/hmac/HybridHmac.hpp +31 -0
- package/cpp/keys/HybridKeyObjectHandle.cpp +749 -0
- package/cpp/keys/HybridKeyObjectHandle.hpp +51 -0
- package/cpp/keys/KeyObjectData.cpp +268 -0
- package/cpp/keys/KeyObjectData.hpp +71 -0
- package/cpp/keys/node.h +5 -0
- package/cpp/pbkdf2/HybridPbkdf2.cpp +34 -55
- package/cpp/pbkdf2/HybridPbkdf2.hpp +5 -16
- package/cpp/random/HybridRandom.cpp +6 -17
- package/cpp/random/HybridRandom.hpp +5 -6
- package/cpp/rsa/HybridRsaKeyPair.cpp +154 -0
- package/cpp/rsa/HybridRsaKeyPair.hpp +43 -0
- package/cpp/sign/HybridSignHandle.cpp +191 -0
- package/cpp/sign/HybridSignHandle.hpp +36 -0
- package/cpp/sign/HybridVerifyHandle.cpp +158 -0
- package/cpp/sign/HybridVerifyHandle.hpp +36 -0
- package/cpp/sign/SignUtils.hpp +108 -0
- package/cpp/utils/Macros.hpp +68 -0
- package/cpp/utils/Utils.hpp +43 -2
- package/cpp/utils/base64.h +309 -0
- package/deps/blake3/.cargo/config.toml +2 -0
- package/deps/blake3/.git-blame-ignore-revs +2 -0
- package/deps/blake3/.github/workflows/build_b3sum.py +38 -0
- package/deps/blake3/.github/workflows/ci.yml +491 -0
- package/deps/blake3/.github/workflows/tag.yml +43 -0
- package/deps/blake3/.github/workflows/upload_github_release_asset.py +73 -0
- package/deps/blake3/CONTRIBUTING.md +31 -0
- package/deps/blake3/Cargo.toml +135 -0
- package/deps/blake3/LICENSE_A2 +202 -0
- package/deps/blake3/LICENSE_A2LLVM +219 -0
- package/deps/blake3/LICENSE_CC0 +121 -0
- package/deps/blake3/README.md +229 -0
- package/deps/blake3/b3sum/Cargo.lock +513 -0
- package/deps/blake3/b3sum/Cargo.toml +26 -0
- package/deps/blake3/b3sum/README.md +72 -0
- package/deps/blake3/b3sum/src/main.rs +564 -0
- package/deps/blake3/b3sum/src/unit_tests.rs +235 -0
- package/deps/blake3/b3sum/tests/cli_tests.rs +680 -0
- package/deps/blake3/b3sum/what_does_check_do.md +176 -0
- package/deps/blake3/benches/bench.rs +623 -0
- package/deps/blake3/build.rs +389 -0
- package/deps/blake3/c/CMakeLists.txt +383 -0
- package/deps/blake3/c/CMakePresets.json +73 -0
- package/deps/blake3/c/Makefile.testing +82 -0
- package/deps/blake3/c/README.md +403 -0
- package/deps/blake3/c/blake3-config.cmake.in +14 -0
- package/deps/blake3/c/blake3.c +650 -0
- package/deps/blake3/c/blake3.h +86 -0
- package/deps/blake3/c/blake3_avx2.c +326 -0
- package/deps/blake3/c/blake3_avx2_x86-64_unix.S +1815 -0
- package/deps/blake3/c/blake3_avx2_x86-64_windows_gnu.S +1817 -0
- package/deps/blake3/c/blake3_avx2_x86-64_windows_msvc.asm +1828 -0
- package/deps/blake3/c/blake3_avx512.c +1388 -0
- package/deps/blake3/c/blake3_avx512_x86-64_unix.S +4824 -0
- package/deps/blake3/c/blake3_avx512_x86-64_windows_gnu.S +2615 -0
- package/deps/blake3/c/blake3_avx512_x86-64_windows_msvc.asm +2634 -0
- package/deps/blake3/c/blake3_c_rust_bindings/Cargo.toml +32 -0
- package/deps/blake3/c/blake3_c_rust_bindings/README.md +4 -0
- package/deps/blake3/c/blake3_c_rust_bindings/benches/bench.rs +477 -0
- package/deps/blake3/c/blake3_c_rust_bindings/build.rs +253 -0
- package/deps/blake3/c/blake3_c_rust_bindings/cross_test.sh +31 -0
- package/deps/blake3/c/blake3_c_rust_bindings/src/lib.rs +333 -0
- package/deps/blake3/c/blake3_c_rust_bindings/src/test.rs +696 -0
- package/deps/blake3/c/blake3_dispatch.c +332 -0
- package/deps/blake3/c/blake3_impl.h +333 -0
- package/deps/blake3/c/blake3_neon.c +366 -0
- package/deps/blake3/c/blake3_portable.c +160 -0
- package/deps/blake3/c/blake3_sse2.c +566 -0
- package/deps/blake3/c/blake3_sse2_x86-64_unix.S +2291 -0
- package/deps/blake3/c/blake3_sse2_x86-64_windows_gnu.S +2332 -0
- package/deps/blake3/c/blake3_sse2_x86-64_windows_msvc.asm +2350 -0
- package/deps/blake3/c/blake3_sse41.c +560 -0
- package/deps/blake3/c/blake3_sse41_x86-64_unix.S +2028 -0
- package/deps/blake3/c/blake3_sse41_x86-64_windows_gnu.S +2069 -0
- package/deps/blake3/c/blake3_sse41_x86-64_windows_msvc.asm +2089 -0
- package/deps/blake3/c/blake3_tbb.cpp +37 -0
- package/deps/blake3/c/dependencies/CMakeLists.txt +3 -0
- package/deps/blake3/c/dependencies/tbb/CMakeLists.txt +28 -0
- package/deps/blake3/c/example.c +36 -0
- package/deps/blake3/c/example_tbb.c +57 -0
- package/deps/blake3/c/libblake3.pc.in +12 -0
- package/deps/blake3/c/main.c +166 -0
- package/deps/blake3/c/test.py +97 -0
- package/deps/blake3/media/B3.svg +70 -0
- package/deps/blake3/media/BLAKE3.svg +85 -0
- package/deps/blake3/media/speed.svg +1474 -0
- package/deps/blake3/reference_impl/Cargo.toml +8 -0
- package/deps/blake3/reference_impl/README.md +14 -0
- package/deps/blake3/reference_impl/reference_impl.rs +374 -0
- package/deps/blake3/src/ffi_avx2.rs +65 -0
- package/deps/blake3/src/ffi_avx512.rs +169 -0
- package/deps/blake3/src/ffi_neon.rs +82 -0
- package/deps/blake3/src/ffi_sse2.rs +126 -0
- package/deps/blake3/src/ffi_sse41.rs +126 -0
- package/deps/blake3/src/guts.rs +60 -0
- package/deps/blake3/src/hazmat.rs +704 -0
- package/deps/blake3/src/io.rs +64 -0
- package/deps/blake3/src/join.rs +92 -0
- package/deps/blake3/src/lib.rs +1835 -0
- package/deps/blake3/src/platform.rs +587 -0
- package/deps/blake3/src/portable.rs +198 -0
- package/deps/blake3/src/rust_avx2.rs +474 -0
- package/deps/blake3/src/rust_sse2.rs +775 -0
- package/deps/blake3/src/rust_sse41.rs +766 -0
- package/deps/blake3/src/test.rs +1049 -0
- package/deps/blake3/src/traits.rs +227 -0
- package/deps/blake3/src/wasm32_simd.rs +794 -0
- package/deps/blake3/test_vectors/Cargo.toml +19 -0
- package/deps/blake3/test_vectors/cross_test.sh +25 -0
- package/deps/blake3/test_vectors/src/bin/generate.rs +4 -0
- package/deps/blake3/test_vectors/src/lib.rs +350 -0
- package/deps/blake3/test_vectors/test_vectors.json +217 -0
- package/deps/blake3/tools/compiler_version/Cargo.toml +7 -0
- package/deps/blake3/tools/compiler_version/build.rs +6 -0
- package/deps/blake3/tools/compiler_version/src/main.rs +27 -0
- package/deps/blake3/tools/instruction_set_support/Cargo.toml +6 -0
- package/deps/blake3/tools/instruction_set_support/src/main.rs +10 -0
- package/deps/blake3/tools/release.md +16 -0
- package/deps/fastpbkdf2/fastpbkdf2.c +5 -1
- package/deps/ncrypto/ncrypto.cc +4679 -0
- package/deps/ncrypto/ncrypto.h +1625 -0
- package/lib/commonjs/blake3.js +98 -0
- package/lib/commonjs/blake3.js.map +1 -0
- package/lib/commonjs/cipher.js +180 -0
- package/lib/commonjs/cipher.js.map +1 -0
- package/lib/commonjs/constants.js +32 -0
- package/lib/commonjs/constants.js.map +1 -0
- package/lib/commonjs/ec.js +480 -0
- package/lib/commonjs/ec.js.map +1 -0
- package/lib/commonjs/ed.js +214 -2
- package/lib/commonjs/ed.js.map +1 -1
- package/lib/commonjs/expo-plugin/@types.js +2 -0
- package/lib/commonjs/expo-plugin/@types.js.map +1 -0
- package/lib/commonjs/expo-plugin/withRNQC.js +25 -0
- package/lib/commonjs/expo-plugin/withRNQC.js.map +1 -0
- package/lib/commonjs/expo-plugin/withSodiumAndroid.js +25 -0
- package/lib/commonjs/expo-plugin/withSodiumAndroid.js.map +1 -0
- package/lib/commonjs/expo-plugin/withSodiumIos.js +26 -0
- package/lib/commonjs/expo-plugin/withSodiumIos.js.map +1 -0
- package/lib/commonjs/expo-plugin/withXCode.js +51 -0
- package/lib/commonjs/expo-plugin/withXCode.js.map +1 -0
- package/lib/commonjs/hash.js +215 -0
- package/lib/commonjs/hash.js.map +1 -0
- package/lib/commonjs/hmac.js +109 -0
- package/lib/commonjs/hmac.js.map +1 -0
- package/lib/commonjs/index.js +102 -24
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/keys/classes.js +109 -52
- package/lib/commonjs/keys/classes.js.map +1 -1
- package/lib/commonjs/keys/generateKeyPair.js +141 -144
- package/lib/commonjs/keys/generateKeyPair.js.map +1 -1
- package/lib/commonjs/keys/index.js +229 -0
- package/lib/commonjs/keys/index.js.map +1 -1
- package/lib/commonjs/keys/publicCipher.js +152 -0
- package/lib/commonjs/keys/publicCipher.js.map +1 -0
- package/lib/commonjs/keys/signVerify.js +178 -39
- package/lib/commonjs/keys/signVerify.js.map +1 -1
- package/lib/commonjs/keys/utils.js +18 -13
- package/lib/commonjs/keys/utils.js.map +1 -1
- package/lib/commonjs/pbkdf2.js.map +1 -1
- package/lib/commonjs/random.js +6 -0
- package/lib/commonjs/random.js.map +1 -1
- package/lib/commonjs/rsa.js +202 -0
- package/lib/commonjs/rsa.js.map +1 -0
- package/lib/commonjs/specs/blake3.nitro.js +6 -0
- package/lib/commonjs/specs/blake3.nitro.js.map +1 -0
- package/lib/commonjs/specs/cipher.nitro.js +6 -0
- package/lib/commonjs/specs/cipher.nitro.js.map +1 -0
- package/lib/commonjs/specs/ecKeyPair.nitro.js +6 -0
- package/lib/commonjs/specs/ecKeyPair.nitro.js.map +1 -0
- package/lib/commonjs/specs/hash.nitro.js +6 -0
- package/lib/commonjs/specs/hash.nitro.js.map +1 -0
- package/lib/commonjs/specs/hmac.nitro.js +6 -0
- package/lib/commonjs/specs/hmac.nitro.js.map +1 -0
- package/lib/commonjs/specs/rsaCipher.nitro.js +6 -0
- package/lib/commonjs/specs/rsaCipher.nitro.js.map +1 -0
- package/lib/commonjs/specs/rsaKeyPair.nitro.js +6 -0
- package/lib/commonjs/specs/rsaKeyPair.nitro.js.map +1 -0
- package/lib/commonjs/specs/sign.nitro.js +6 -0
- package/lib/commonjs/specs/sign.nitro.js.map +1 -0
- package/lib/commonjs/subtle.js +987 -0
- package/lib/commonjs/subtle.js.map +1 -0
- package/lib/commonjs/utils/cipher.js +64 -0
- package/lib/commonjs/utils/cipher.js.map +1 -0
- package/lib/commonjs/utils/conversion.js +44 -5
- package/lib/commonjs/utils/conversion.js.map +1 -1
- package/lib/commonjs/utils/hashnames.js +2 -1
- package/lib/commonjs/utils/hashnames.js.map +1 -1
- package/lib/commonjs/utils/index.js +11 -0
- package/lib/commonjs/utils/index.js.map +1 -1
- package/lib/commonjs/utils/noble.js +82 -0
- package/lib/commonjs/utils/noble.js.map +1 -0
- package/lib/commonjs/utils/types.js +32 -17
- package/lib/commonjs/utils/types.js.map +1 -1
- package/lib/commonjs/utils/validation.js +74 -1
- package/lib/commonjs/utils/validation.js.map +1 -1
- package/lib/module/blake3.js +90 -0
- package/lib/module/blake3.js.map +1 -0
- package/lib/module/cipher.js +173 -0
- package/lib/module/cipher.js.map +1 -0
- package/lib/module/constants.js +28 -0
- package/lib/module/constants.js.map +1 -0
- package/lib/module/ec.js +470 -0
- package/lib/module/ec.js.map +1 -0
- package/lib/module/ed.js +212 -3
- package/lib/module/ed.js.map +1 -1
- package/lib/module/expo-plugin/@types.js +2 -0
- package/lib/module/expo-plugin/@types.js.map +1 -0
- package/lib/module/expo-plugin/withRNQC.js +21 -0
- package/lib/module/expo-plugin/withRNQC.js.map +1 -0
- package/lib/module/expo-plugin/withSodiumAndroid.js +20 -0
- package/lib/module/expo-plugin/withSodiumAndroid.js.map +1 -0
- package/lib/module/expo-plugin/withSodiumIos.js +20 -0
- package/lib/module/expo-plugin/withSodiumIos.js.map +1 -0
- package/lib/module/expo-plugin/withXCode.js +46 -0
- package/lib/module/expo-plugin/withXCode.js.map +1 -0
- package/lib/module/hash.js +207 -0
- package/lib/module/hash.js.map +1 -0
- package/lib/module/hmac.js +104 -0
- package/lib/module/hmac.js.map +1 -0
- package/lib/module/index.js +21 -21
- package/lib/module/index.js.map +1 -1
- package/lib/module/keys/classes.js +106 -49
- package/lib/module/keys/classes.js.map +1 -1
- package/lib/module/keys/generateKeyPair.js +134 -143
- package/lib/module/keys/generateKeyPair.js.map +1 -1
- package/lib/module/keys/index.js +161 -22
- package/lib/module/keys/index.js.map +1 -1
- package/lib/module/keys/publicCipher.js +145 -0
- package/lib/module/keys/publicCipher.js.map +1 -0
- package/lib/module/keys/signVerify.js +170 -39
- package/lib/module/keys/signVerify.js.map +1 -1
- package/lib/module/keys/utils.js +16 -12
- package/lib/module/keys/utils.js.map +1 -1
- package/lib/module/pbkdf2.js.map +1 -1
- package/lib/module/random.js +6 -0
- package/lib/module/random.js.map +1 -1
- package/lib/module/rsa.js +194 -0
- package/lib/module/rsa.js.map +1 -0
- package/lib/module/specs/blake3.nitro.js +4 -0
- package/lib/module/specs/blake3.nitro.js.map +1 -0
- package/lib/module/specs/cipher.nitro.js +4 -0
- package/lib/module/specs/cipher.nitro.js.map +1 -0
- package/lib/module/specs/ecKeyPair.nitro.js +4 -0
- package/lib/module/specs/ecKeyPair.nitro.js.map +1 -0
- package/lib/module/specs/hash.nitro.js +4 -0
- package/lib/module/specs/hash.nitro.js.map +1 -0
- package/lib/module/specs/hmac.nitro.js +4 -0
- package/lib/module/specs/hmac.nitro.js.map +1 -0
- package/lib/module/specs/rsaCipher.nitro.js +4 -0
- package/lib/module/specs/rsaCipher.nitro.js.map +1 -0
- package/lib/module/specs/rsaKeyPair.nitro.js +4 -0
- package/lib/module/specs/rsaKeyPair.nitro.js.map +1 -0
- package/lib/module/specs/sign.nitro.js +4 -0
- package/lib/module/specs/sign.nitro.js.map +1 -0
- package/lib/module/subtle.js +982 -0
- package/lib/module/subtle.js.map +1 -0
- package/lib/module/utils/cipher.js +56 -0
- package/lib/module/utils/cipher.js.map +1 -0
- package/lib/module/utils/conversion.js +26 -5
- package/lib/module/utils/conversion.js.map +1 -1
- package/lib/module/utils/hashnames.js +2 -1
- package/lib/module/utils/hashnames.js.map +1 -1
- package/lib/module/utils/index.js +1 -0
- package/lib/module/utils/index.js.map +1 -1
- package/lib/module/utils/noble.js +76 -0
- package/lib/module/utils/noble.js.map +1 -0
- package/lib/module/utils/types.js +32 -17
- package/lib/module/utils/types.js.map +1 -1
- package/lib/module/utils/validation.js +69 -1
- package/lib/module/utils/validation.js.map +1 -1
- package/lib/tsconfig.tsbuildinfo +1 -1
- package/lib/typescript/blake3.d.ts +33 -0
- package/lib/typescript/blake3.d.ts.map +1 -0
- package/lib/typescript/cipher.d.ts +60 -0
- package/lib/typescript/cipher.d.ts.map +1 -0
- package/lib/typescript/constants.d.ts +21 -0
- package/lib/typescript/constants.d.ts.map +1 -0
- package/lib/typescript/ec.d.ts +22 -0
- package/lib/typescript/ec.d.ts.map +1 -0
- package/lib/typescript/ed.d.ts +28 -1
- package/lib/typescript/ed.d.ts.map +1 -1
- package/lib/typescript/expo-plugin/@types.d.ts +8 -0
- package/lib/typescript/expo-plugin/@types.d.ts.map +1 -0
- package/lib/typescript/expo-plugin/withRNQC.d.ts +4 -0
- package/lib/typescript/expo-plugin/withRNQC.d.ts.map +1 -0
- package/lib/typescript/expo-plugin/withSodiumAndroid.d.ts +4 -0
- package/lib/typescript/expo-plugin/withSodiumAndroid.d.ts.map +1 -0
- package/lib/typescript/expo-plugin/withSodiumIos.d.ts +4 -0
- package/lib/typescript/expo-plugin/withSodiumIos.d.ts.map +1 -0
- package/lib/typescript/expo-plugin/withXCode.d.ts +9 -0
- package/lib/typescript/expo-plugin/withXCode.d.ts.map +1 -0
- package/lib/typescript/hash.d.ts +122 -0
- package/lib/typescript/hash.d.ts.map +1 -0
- package/lib/typescript/hmac.d.ts +66 -0
- package/lib/typescript/hmac.d.ts.map +1 -0
- package/lib/typescript/index.d.ts +102 -10
- package/lib/typescript/index.d.ts.map +1 -1
- package/lib/typescript/keys/classes.d.ts +50 -8
- package/lib/typescript/keys/classes.d.ts.map +1 -1
- package/lib/typescript/keys/generateKeyPair.d.ts +5 -0
- package/lib/typescript/keys/generateKeyPair.d.ts.map +1 -1
- package/lib/typescript/keys/index.d.ts +22 -2
- package/lib/typescript/keys/index.d.ts.map +1 -1
- package/lib/typescript/keys/publicCipher.d.ts +20 -0
- package/lib/typescript/keys/publicCipher.d.ts.map +1 -0
- package/lib/typescript/keys/signVerify.d.ts +28 -0
- package/lib/typescript/keys/signVerify.d.ts.map +1 -1
- package/lib/typescript/keys/utils.d.ts +3 -1
- package/lib/typescript/keys/utils.d.ts.map +1 -1
- package/lib/typescript/pbkdf2.d.ts +1 -1
- package/lib/typescript/pbkdf2.d.ts.map +1 -1
- package/lib/typescript/random.d.ts +6 -0
- package/lib/typescript/random.d.ts.map +1 -1
- package/lib/typescript/rsa.d.ts +19 -0
- package/lib/typescript/rsa.d.ts.map +1 -0
- package/lib/typescript/specs/blake3.nitro.d.ts +15 -0
- package/lib/typescript/specs/blake3.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/cipher.nitro.d.ts +29 -0
- package/lib/typescript/specs/cipher.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/ecKeyPair.nitro.d.ts +20 -0
- package/lib/typescript/specs/ecKeyPair.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/edKeyPair.nitro.d.ts +1 -0
- package/lib/typescript/specs/edKeyPair.nitro.d.ts.map +1 -1
- package/lib/typescript/specs/hash.nitro.d.ts +13 -0
- package/lib/typescript/specs/hash.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/hmac.nitro.d.ts +10 -0
- package/lib/typescript/specs/hmac.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/keyObjectHandle.nitro.d.ts +1 -1
- package/lib/typescript/specs/keyObjectHandle.nitro.d.ts.map +1 -1
- package/lib/typescript/specs/rsaCipher.nitro.d.ts +44 -0
- package/lib/typescript/specs/rsaCipher.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/rsaKeyPair.nitro.d.ts +20 -0
- package/lib/typescript/specs/rsaKeyPair.nitro.d.ts.map +1 -0
- package/lib/typescript/specs/sign.nitro.d.ts +19 -0
- package/lib/typescript/specs/sign.nitro.d.ts.map +1 -0
- package/lib/typescript/subtle.d.ts +17 -0
- package/lib/typescript/subtle.d.ts.map +1 -0
- package/lib/typescript/utils/cipher.d.ts +7 -0
- package/lib/typescript/utils/cipher.d.ts.map +1 -0
- package/lib/typescript/utils/conversion.d.ts +1 -0
- package/lib/typescript/utils/conversion.d.ts.map +1 -1
- package/lib/typescript/utils/hashnames.d.ts +3 -1
- package/lib/typescript/utils/hashnames.d.ts.map +1 -1
- package/lib/typescript/utils/index.d.ts +1 -0
- package/lib/typescript/utils/index.d.ts.map +1 -1
- package/lib/typescript/utils/noble.d.ts +19 -0
- package/lib/typescript/utils/noble.d.ts.map +1 -0
- package/lib/typescript/utils/types.d.ts +125 -23
- package/lib/typescript/utils/types.d.ts.map +1 -1
- package/lib/typescript/utils/validation.d.ts +5 -0
- package/lib/typescript/utils/validation.d.ts.map +1 -1
- package/nitrogen/generated/.gitattributes +1 -0
- package/nitrogen/generated/android/QuickCrypto+autolinking.cmake +30 -1
- package/nitrogen/generated/android/QuickCrypto+autolinking.gradle +1 -1
- package/nitrogen/generated/android/QuickCryptoOnLoad.cpp +115 -1
- package/nitrogen/generated/android/QuickCryptoOnLoad.hpp +1 -1
- package/nitrogen/generated/android/kotlin/com/margelo/nitro/crypto/QuickCryptoOnLoad.kt +35 -0
- package/nitrogen/generated/ios/QuickCrypto+autolinking.rb +3 -1
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.cpp +1 -1
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.hpp +1 -1
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Umbrella.hpp +3 -3
- package/nitrogen/generated/ios/QuickCryptoAutolinking.mm +111 -1
- package/nitrogen/generated/ios/QuickCryptoAutolinking.swift +1 -1
- package/nitrogen/generated/shared/c++/AsymmetricKeyType.hpp +104 -0
- package/nitrogen/generated/shared/c++/CipherArgs.hpp +86 -0
- package/nitrogen/generated/shared/c++/HybridBlake3Spec.cpp +28 -0
- package/nitrogen/generated/shared/c++/HybridBlake3Spec.hpp +76 -0
- package/nitrogen/generated/shared/c++/HybridCipherFactorySpec.cpp +21 -0
- package/nitrogen/generated/shared/c++/HybridCipherFactorySpec.hpp +67 -0
- package/nitrogen/generated/shared/c++/HybridCipherSpec.cpp +28 -0
- package/nitrogen/generated/shared/c++/HybridCipherSpec.hpp +76 -0
- package/nitrogen/generated/shared/c++/HybridEcKeyPairSpec.cpp +29 -0
- package/nitrogen/generated/shared/c++/HybridEcKeyPairSpec.hpp +77 -0
- package/nitrogen/generated/shared/c++/HybridEdKeyPairSpec.cpp +2 -1
- package/nitrogen/generated/shared/c++/HybridEdKeyPairSpec.hpp +5 -4
- package/nitrogen/generated/shared/c++/HybridHashSpec.cpp +26 -0
- package/nitrogen/generated/shared/c++/HybridHashSpec.hpp +75 -0
- package/nitrogen/generated/shared/c++/HybridHmacSpec.cpp +23 -0
- package/nitrogen/generated/shared/c++/HybridHmacSpec.hpp +66 -0
- package/nitrogen/generated/shared/c++/HybridKeyObjectHandleSpec.cpp +1 -1
- package/nitrogen/generated/shared/c++/HybridKeyObjectHandleSpec.hpp +8 -8
- package/nitrogen/generated/shared/c++/HybridPbkdf2Spec.cpp +1 -1
- package/nitrogen/generated/shared/c++/HybridPbkdf2Spec.hpp +3 -3
- package/nitrogen/generated/shared/c++/HybridRandomSpec.cpp +1 -1
- package/nitrogen/generated/shared/c++/HybridRandomSpec.hpp +3 -3
- package/nitrogen/generated/shared/c++/HybridRsaCipherSpec.cpp +24 -0
- package/nitrogen/generated/shared/c++/HybridRsaCipherSpec.hpp +72 -0
- package/nitrogen/generated/shared/c++/HybridRsaKeyPairSpec.cpp +29 -0
- package/nitrogen/generated/shared/c++/HybridRsaKeyPairSpec.hpp +77 -0
- package/nitrogen/generated/shared/c++/HybridSignHandleSpec.cpp +23 -0
- package/nitrogen/generated/shared/c++/HybridSignHandleSpec.hpp +71 -0
- package/nitrogen/generated/shared/c++/HybridVerifyHandleSpec.cpp +23 -0
- package/nitrogen/generated/shared/c++/HybridVerifyHandleSpec.hpp +71 -0
- package/nitrogen/generated/shared/c++/JWK.hpp +17 -18
- package/nitrogen/generated/shared/c++/JWKkty.hpp +12 -14
- package/nitrogen/generated/shared/c++/JWKuse.hpp +8 -10
- package/nitrogen/generated/shared/c++/KFormatType.hpp +14 -16
- package/nitrogen/generated/shared/c++/KeyDetail.hpp +6 -7
- package/nitrogen/generated/shared/c++/KeyEncoding.hpp +15 -17
- package/nitrogen/generated/shared/c++/KeyObject.hpp +67 -0
- package/nitrogen/generated/shared/c++/KeyType.hpp +11 -13
- package/nitrogen/generated/shared/c++/KeyUsage.hpp +38 -24
- package/nitrogen/generated/shared/c++/NamedCurve.hpp +10 -12
- package/package.json +28 -23
- package/src/blake3.ts +123 -0
- package/src/cipher.ts +335 -0
- package/src/constants.ts +32 -0
- package/src/ec.ts +657 -0
- package/src/ed.ts +297 -13
- package/src/expo-plugin/@types.ts +7 -0
- package/src/expo-plugin/withRNQC.ts +23 -0
- package/src/expo-plugin/withSodiumAndroid.ts +24 -0
- package/src/expo-plugin/withSodiumIos.ts +30 -0
- package/src/expo-plugin/withXCode.ts +55 -0
- package/src/hash.ts +274 -0
- package/src/hmac.ts +135 -0
- package/src/index.ts +20 -20
- package/src/keys/classes.ts +148 -55
- package/src/keys/generateKeyPair.ts +177 -134
- package/src/keys/index.ts +226 -14
- package/src/keys/publicCipher.ts +229 -0
- package/src/keys/signVerify.ts +239 -39
- package/src/keys/utils.ts +24 -18
- package/src/pbkdf2.ts +1 -1
- package/src/random.ts +7 -0
- package/src/rsa.ts +310 -0
- package/src/specs/blake3.nitro.ts +12 -0
- package/src/specs/cipher.nitro.ts +25 -0
- package/src/specs/ecKeyPair.nitro.ts +38 -0
- package/src/specs/edKeyPair.nitro.ts +2 -0
- package/src/specs/hash.nitro.ts +10 -0
- package/src/specs/hmac.nitro.ts +7 -0
- package/src/specs/keyObjectHandle.nitro.ts +1 -1
- package/src/specs/rsaCipher.nitro.ts +65 -0
- package/src/specs/rsaKeyPair.nitro.ts +33 -0
- package/src/specs/sign.nitro.ts +31 -0
- package/src/subtle.ts +1436 -0
- package/src/utils/cipher.ts +60 -0
- package/src/utils/conversion.ts +33 -4
- package/src/utils/hashnames.ts +4 -2
- package/src/utils/index.ts +1 -0
- package/src/utils/noble.ts +85 -0
- package/src/utils/types.ts +209 -29
- package/src/utils/validation.ts +96 -1
- package/lib/module/package.json +0 -1
- package/nitrogen/generated/android/QuickCryptoOnLoad.kt +0 -1
- package/nitrogen/generated/shared/c++/CFRGKeyPairType.hpp +0 -86
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
#pragma once
|
|
2
|
+
|
|
3
|
+
#include <memory>
|
|
4
|
+
#include <optional>
|
|
5
|
+
#include <string>
|
|
6
|
+
|
|
7
|
+
#include "HybridKeyObjectHandleSpec.hpp"
|
|
8
|
+
#include "JWK.hpp"
|
|
9
|
+
#include "KeyDetail.hpp"
|
|
10
|
+
#include "KeyObjectData.hpp"
|
|
11
|
+
#include "KeyType.hpp"
|
|
12
|
+
#include "NamedCurve.hpp"
|
|
13
|
+
|
|
14
|
+
namespace margelo::nitro::crypto {
|
|
15
|
+
|
|
16
|
+
class HybridKeyObjectHandle : public HybridKeyObjectHandleSpec {
|
|
17
|
+
public:
|
|
18
|
+
HybridKeyObjectHandle() : HybridObject(TAG) {}
|
|
19
|
+
|
|
20
|
+
public:
|
|
21
|
+
std::shared_ptr<ArrayBuffer> exportKey(std::optional<KFormatType> format, std::optional<KeyEncoding> type,
|
|
22
|
+
const std::optional<std::string>& cipher,
|
|
23
|
+
const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase) override;
|
|
24
|
+
|
|
25
|
+
JWK exportJwk(const JWK& key, bool handleRsaPss) override;
|
|
26
|
+
|
|
27
|
+
AsymmetricKeyType getAsymmetricKeyType() override;
|
|
28
|
+
|
|
29
|
+
bool init(KeyType keyType, const std::variant<std::string, std::shared_ptr<ArrayBuffer>>& key, std::optional<KFormatType> format,
|
|
30
|
+
std::optional<KeyEncoding> type, const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase) override;
|
|
31
|
+
|
|
32
|
+
bool initECRaw(const std::string& namedCurve, const std::shared_ptr<ArrayBuffer>& keyData) override;
|
|
33
|
+
|
|
34
|
+
std::optional<KeyType> initJwk(const JWK& keyData, std::optional<NamedCurve> namedCurve) override;
|
|
35
|
+
|
|
36
|
+
KeyDetail keyDetail() override;
|
|
37
|
+
|
|
38
|
+
KeyObjectData& getKeyObjectData() {
|
|
39
|
+
return data_;
|
|
40
|
+
}
|
|
41
|
+
const KeyObjectData& getKeyObjectData() const {
|
|
42
|
+
return data_;
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
private:
|
|
46
|
+
KeyObjectData data_;
|
|
47
|
+
|
|
48
|
+
bool initRawKey(KeyType keyType, std::shared_ptr<ArrayBuffer> keyData);
|
|
49
|
+
};
|
|
50
|
+
|
|
51
|
+
} // namespace margelo::nitro::crypto
|
|
@@ -0,0 +1,268 @@
|
|
|
1
|
+
#include "KeyObjectData.hpp"
|
|
2
|
+
#include "Utils.hpp"
|
|
3
|
+
#include <cstdio>
|
|
4
|
+
#include <optional>
|
|
5
|
+
|
|
6
|
+
namespace margelo::nitro::crypto {
|
|
7
|
+
|
|
8
|
+
ncrypto::EVPKeyPointer::PrivateKeyEncodingConfig GetPrivateKeyEncodingConfig(KFormatType format, KeyEncoding type) {
|
|
9
|
+
auto pk_format = static_cast<ncrypto::EVPKeyPointer::PKFormatType>(format);
|
|
10
|
+
auto pk_type = static_cast<ncrypto::EVPKeyPointer::PKEncodingType>(type);
|
|
11
|
+
|
|
12
|
+
auto config = ncrypto::EVPKeyPointer::PrivateKeyEncodingConfig(false, pk_format, pk_type);
|
|
13
|
+
return config;
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
ncrypto::EVPKeyPointer::PublicKeyEncodingConfig GetPublicKeyEncodingConfig(KFormatType format, KeyEncoding type) {
|
|
17
|
+
auto pk_format = static_cast<ncrypto::EVPKeyPointer::PKFormatType>(format);
|
|
18
|
+
auto pk_type = static_cast<ncrypto::EVPKeyPointer::PKEncodingType>(type);
|
|
19
|
+
|
|
20
|
+
auto config = ncrypto::EVPKeyPointer::PublicKeyEncodingConfig(false, pk_format, pk_type);
|
|
21
|
+
return config;
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
KeyObjectData TryParsePrivateKey(std::shared_ptr<ArrayBuffer> key, std::optional<KFormatType> format, std::optional<KeyEncoding> type,
|
|
25
|
+
const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase) {
|
|
26
|
+
// For PEM format, use PKCS8 as default encoding
|
|
27
|
+
KeyEncoding actualType = type.value_or(KeyEncoding::PKCS8);
|
|
28
|
+
auto config = GetPrivateKeyEncodingConfig(format.value(), actualType);
|
|
29
|
+
|
|
30
|
+
if (passphrase.has_value()) {
|
|
31
|
+
auto& passphrase_ptr = passphrase.value();
|
|
32
|
+
config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
auto buffer = ncrypto::Buffer<const unsigned char>{key->data(), key->size()};
|
|
36
|
+
|
|
37
|
+
// Clear any existing OpenSSL errors before parsing
|
|
38
|
+
ERR_clear_error();
|
|
39
|
+
|
|
40
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePrivateKey(config, buffer);
|
|
41
|
+
if (res) {
|
|
42
|
+
return KeyObjectData::CreateAsymmetric(KeyType::PRIVATE, std::move(res.value));
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
if (res.error.has_value() && res.error.value() == ncrypto::EVPKeyPointer::PKParseError::NEED_PASSPHRASE) {
|
|
46
|
+
throw std::runtime_error("Passphrase required for encrypted key");
|
|
47
|
+
} else {
|
|
48
|
+
// Get OpenSSL error details
|
|
49
|
+
unsigned long err = ERR_get_error();
|
|
50
|
+
char err_buf[256];
|
|
51
|
+
ERR_error_string_n(err, err_buf, sizeof(err_buf));
|
|
52
|
+
throw std::runtime_error("Failed to read private key: " + std::string(err_buf));
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
KeyObjectData::KeyObjectData(std::nullptr_t) : key_type_(KeyType::SECRET) {}
|
|
57
|
+
|
|
58
|
+
KeyObjectData::KeyObjectData(std::shared_ptr<ArrayBuffer> symmetric_key)
|
|
59
|
+
: key_type_(KeyType::SECRET), data_(std::make_shared<Data>(std::move(symmetric_key))) {}
|
|
60
|
+
|
|
61
|
+
KeyObjectData::KeyObjectData(KeyType type, ncrypto::EVPKeyPointer&& pkey)
|
|
62
|
+
: key_type_(type), data_(std::make_shared<Data>(std::move(pkey))) {}
|
|
63
|
+
|
|
64
|
+
KeyObjectData KeyObjectData::CreateSecret(std::shared_ptr<ArrayBuffer> key) {
|
|
65
|
+
return KeyObjectData(std::move(key));
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
KeyObjectData KeyObjectData::CreateAsymmetric(KeyType key_type, ncrypto::EVPKeyPointer&& pkey) {
|
|
69
|
+
CHECK(pkey);
|
|
70
|
+
return KeyObjectData(key_type, std::move(pkey));
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
KeyType KeyObjectData::GetKeyType() const {
|
|
74
|
+
if (!data_) {
|
|
75
|
+
throw std::runtime_error("Invalid key object: no key data available");
|
|
76
|
+
}
|
|
77
|
+
return key_type_;
|
|
78
|
+
}
|
|
79
|
+
|
|
80
|
+
const ncrypto::EVPKeyPointer& KeyObjectData::GetAsymmetricKey() const {
|
|
81
|
+
if (key_type_ == KeyType::SECRET) {
|
|
82
|
+
throw std::runtime_error("Cannot get asymmetric key from secret key object");
|
|
83
|
+
}
|
|
84
|
+
if (!data_) {
|
|
85
|
+
throw std::runtime_error("Invalid key object: no key data available");
|
|
86
|
+
}
|
|
87
|
+
return data_->asymmetric_key;
|
|
88
|
+
}
|
|
89
|
+
|
|
90
|
+
std::shared_ptr<ArrayBuffer> KeyObjectData::GetSymmetricKey() const {
|
|
91
|
+
if (key_type_ != KeyType::SECRET) {
|
|
92
|
+
throw std::runtime_error("Cannot get symmetric key from asymmetric key object");
|
|
93
|
+
}
|
|
94
|
+
if (!data_) {
|
|
95
|
+
throw std::runtime_error("Invalid key object: no key data available");
|
|
96
|
+
}
|
|
97
|
+
return data_->symmetric_key;
|
|
98
|
+
}
|
|
99
|
+
|
|
100
|
+
size_t KeyObjectData::GetSymmetricKeySize() const {
|
|
101
|
+
if (key_type_ != KeyType::SECRET) {
|
|
102
|
+
throw std::runtime_error("Cannot get symmetric key size from asymmetric key object");
|
|
103
|
+
}
|
|
104
|
+
if (!data_) {
|
|
105
|
+
throw std::runtime_error("Invalid key object: no key data available");
|
|
106
|
+
}
|
|
107
|
+
return data_->symmetric_key->size();
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
KeyObjectData KeyObjectData::GetPublicOrPrivateKey(std::shared_ptr<ArrayBuffer> key, std::optional<KFormatType> format,
|
|
111
|
+
std::optional<KeyEncoding> type,
|
|
112
|
+
const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase) {
|
|
113
|
+
if (key->size() > static_cast<size_t>(std::numeric_limits<int32_t>::max())) {
|
|
114
|
+
throw std::runtime_error("key is too big");
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
KFormatType actualFormat = format.value_or(KFormatType::DER);
|
|
118
|
+
|
|
119
|
+
if (actualFormat == KFormatType::PEM || actualFormat == KFormatType::DER) {
|
|
120
|
+
auto buffer = ncrypto::Buffer<const unsigned char>{key->data(), key->size()};
|
|
121
|
+
|
|
122
|
+
if (actualFormat == KFormatType::PEM) {
|
|
123
|
+
if (type.has_value() && type.value() == KeyEncoding::SPKI) {
|
|
124
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePublicKeyPEM(buffer);
|
|
125
|
+
if (res) {
|
|
126
|
+
return CreateAsymmetric(KeyType::PUBLIC, std::move(res.value));
|
|
127
|
+
}
|
|
128
|
+
throw std::runtime_error("Failed to read PEM public key: key is not in SPKI format");
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
if (type.has_value() &&
|
|
132
|
+
(type.value() == KeyEncoding::PKCS8 || type.value() == KeyEncoding::SEC1 || type.value() == KeyEncoding::PKCS1)) {
|
|
133
|
+
auto config = GetPrivateKeyEncodingConfig(actualFormat, type.value());
|
|
134
|
+
if (passphrase.has_value()) {
|
|
135
|
+
auto& passphrase_ptr = passphrase.value();
|
|
136
|
+
config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
137
|
+
}
|
|
138
|
+
ERR_clear_error();
|
|
139
|
+
auto private_res = ncrypto::EVPKeyPointer::TryParsePrivateKey(config, buffer);
|
|
140
|
+
if (private_res) {
|
|
141
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(private_res.value));
|
|
142
|
+
}
|
|
143
|
+
unsigned long err = ERR_get_error();
|
|
144
|
+
char err_buf[256];
|
|
145
|
+
ERR_error_string_n(err, err_buf, sizeof(err_buf));
|
|
146
|
+
throw std::runtime_error("Failed to read PEM private key: " + std::string(err_buf));
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePublicKeyPEM(buffer);
|
|
150
|
+
if (res) {
|
|
151
|
+
return CreateAsymmetric(KeyType::PUBLIC, std::move(res.value));
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
KeyEncoding actualType = KeyEncoding::PKCS8;
|
|
155
|
+
auto config = GetPrivateKeyEncodingConfig(actualFormat, actualType);
|
|
156
|
+
if (passphrase.has_value()) {
|
|
157
|
+
auto& passphrase_ptr = passphrase.value();
|
|
158
|
+
config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
159
|
+
}
|
|
160
|
+
|
|
161
|
+
ERR_clear_error();
|
|
162
|
+
|
|
163
|
+
auto private_res = ncrypto::EVPKeyPointer::TryParsePrivateKey(config, buffer);
|
|
164
|
+
if (private_res) {
|
|
165
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(private_res.value));
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
unsigned long err = ERR_get_error();
|
|
169
|
+
char err_buf[256];
|
|
170
|
+
ERR_error_string_n(err, err_buf, sizeof(err_buf));
|
|
171
|
+
throw std::runtime_error("Failed to read PEM asymmetric key: " + std::string(err_buf));
|
|
172
|
+
} else if (actualFormat == KFormatType::DER) {
|
|
173
|
+
// For DER, try parsing as public key first
|
|
174
|
+
if (type.has_value() && type.value() == KeyEncoding::SPKI) {
|
|
175
|
+
auto public_config = GetPublicKeyEncodingConfig(actualFormat, type.value());
|
|
176
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePublicKey(public_config, buffer);
|
|
177
|
+
if (res) {
|
|
178
|
+
return CreateAsymmetric(KeyType::PUBLIC, std::move(res.value));
|
|
179
|
+
}
|
|
180
|
+
} else if (type.has_value() && type.value() == KeyEncoding::PKCS8) {
|
|
181
|
+
auto private_config = GetPrivateKeyEncodingConfig(actualFormat, type.value());
|
|
182
|
+
if (passphrase.has_value()) {
|
|
183
|
+
auto& passphrase_ptr = passphrase.value();
|
|
184
|
+
private_config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
185
|
+
}
|
|
186
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePrivateKey(private_config, buffer);
|
|
187
|
+
if (res) {
|
|
188
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(res.value));
|
|
189
|
+
}
|
|
190
|
+
} else {
|
|
191
|
+
// If no encoding type specified, try both SPKI and PKCS8
|
|
192
|
+
auto public_config = GetPublicKeyEncodingConfig(actualFormat, KeyEncoding::SPKI);
|
|
193
|
+
auto public_res = ncrypto::EVPKeyPointer::TryParsePublicKey(public_config, buffer);
|
|
194
|
+
if (public_res) {
|
|
195
|
+
return CreateAsymmetric(KeyType::PUBLIC, std::move(public_res.value));
|
|
196
|
+
}
|
|
197
|
+
|
|
198
|
+
auto private_config = GetPrivateKeyEncodingConfig(actualFormat, KeyEncoding::PKCS8);
|
|
199
|
+
auto private_res = ncrypto::EVPKeyPointer::TryParsePrivateKey(private_config, buffer);
|
|
200
|
+
if (private_res) {
|
|
201
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(private_res.value));
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
throw std::runtime_error("Failed to read DER asymmetric key");
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
|
|
208
|
+
throw std::runtime_error("Unsupported key format for GetPublicOrPrivateKey. Only PEM and DER are supported.");
|
|
209
|
+
}
|
|
210
|
+
|
|
211
|
+
KeyObjectData KeyObjectData::GetPrivateKey(std::shared_ptr<ArrayBuffer> key, std::optional<KFormatType> format,
|
|
212
|
+
std::optional<KeyEncoding> type, const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase,
|
|
213
|
+
bool /* isPublic */) {
|
|
214
|
+
// Check if key size fits in int32_t without using double conversion
|
|
215
|
+
if (key->size() > static_cast<size_t>(std::numeric_limits<int32_t>::max())) {
|
|
216
|
+
std::string error_msg = "key is too big (int32): size=" + std::to_string(key->size()) +
|
|
217
|
+
", max_int32=" + std::to_string(std::numeric_limits<int32_t>::max());
|
|
218
|
+
throw std::runtime_error(error_msg);
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
// If no format is specified, assume DER format for binary data
|
|
222
|
+
KFormatType actualFormat = format.has_value() ? format.value() : KFormatType::DER;
|
|
223
|
+
|
|
224
|
+
if (actualFormat == KFormatType::PEM || actualFormat == KFormatType::DER) {
|
|
225
|
+
auto buffer = ncrypto::Buffer<const unsigned char>{key->data(), key->size()};
|
|
226
|
+
|
|
227
|
+
if (actualFormat == KFormatType::PEM) {
|
|
228
|
+
return TryParsePrivateKey(key, format, type, passphrase);
|
|
229
|
+
} else if (actualFormat == KFormatType::DER) {
|
|
230
|
+
// Try the specified encoding first, or PKCS8 as default
|
|
231
|
+
KeyEncoding primaryEncoding = type.value_or(KeyEncoding::PKCS8);
|
|
232
|
+
auto private_config = GetPrivateKeyEncodingConfig(actualFormat, primaryEncoding);
|
|
233
|
+
if (passphrase.has_value()) {
|
|
234
|
+
auto& passphrase_ptr = passphrase.value();
|
|
235
|
+
private_config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
// Clear any existing OpenSSL errors before parsing
|
|
239
|
+
ERR_clear_error();
|
|
240
|
+
|
|
241
|
+
auto res = ncrypto::EVPKeyPointer::TryParsePrivateKey(private_config, buffer);
|
|
242
|
+
if (res) {
|
|
243
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(res.value));
|
|
244
|
+
}
|
|
245
|
+
|
|
246
|
+
// If no specific encoding was provided, try other encodings as fallback
|
|
247
|
+
if (!type.has_value()) {
|
|
248
|
+
std::vector<KeyEncoding> fallbackEncodings = {KeyEncoding::SEC1, KeyEncoding::PKCS1};
|
|
249
|
+
for (auto encoding : fallbackEncodings) {
|
|
250
|
+
auto config = GetPrivateKeyEncodingConfig(actualFormat, encoding);
|
|
251
|
+
if (passphrase.has_value()) {
|
|
252
|
+
auto& passphrase_ptr = passphrase.value();
|
|
253
|
+
config.passphrase = std::make_optional(ncrypto::DataPointer(passphrase_ptr->data(), passphrase_ptr->size()));
|
|
254
|
+
}
|
|
255
|
+
auto fallback_res = ncrypto::EVPKeyPointer::TryParsePrivateKey(config, buffer);
|
|
256
|
+
if (fallback_res) {
|
|
257
|
+
return CreateAsymmetric(KeyType::PRIVATE, std::move(fallback_res.value));
|
|
258
|
+
}
|
|
259
|
+
}
|
|
260
|
+
}
|
|
261
|
+
throw std::runtime_error("Failed to read DER private key");
|
|
262
|
+
}
|
|
263
|
+
}
|
|
264
|
+
|
|
265
|
+
throw std::runtime_error("Unsupported key format for GetPrivateKey. Only PEM and DER are supported.");
|
|
266
|
+
}
|
|
267
|
+
|
|
268
|
+
} // namespace margelo::nitro::crypto
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
#include <memory>
|
|
2
|
+
|
|
3
|
+
#include <NitroModules/ArrayBuffer.hpp>
|
|
4
|
+
|
|
5
|
+
#include "../../deps/ncrypto/ncrypto.h"
|
|
6
|
+
#include "KFormatType.hpp"
|
|
7
|
+
#include "KeyEncoding.hpp"
|
|
8
|
+
#include "KeyType.hpp"
|
|
9
|
+
#include "Utils.hpp"
|
|
10
|
+
|
|
11
|
+
namespace margelo::nitro::crypto {
|
|
12
|
+
|
|
13
|
+
class KeyObjectData final {
|
|
14
|
+
public:
|
|
15
|
+
static KeyObjectData CreateSecret(std::shared_ptr<ArrayBuffer> key);
|
|
16
|
+
|
|
17
|
+
static KeyObjectData CreateAsymmetric(KeyType type, ncrypto::EVPKeyPointer&& pkey);
|
|
18
|
+
|
|
19
|
+
KeyObjectData(std::nullptr_t = nullptr);
|
|
20
|
+
|
|
21
|
+
inline operator bool() const {
|
|
22
|
+
return data_ != nullptr;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
KeyType GetKeyType() const;
|
|
26
|
+
|
|
27
|
+
// These functions allow unprotected access to the raw key material and should
|
|
28
|
+
// only be used to implement cryptographic operations requiring the key.
|
|
29
|
+
const ncrypto::EVPKeyPointer& GetAsymmetricKey() const;
|
|
30
|
+
std::shared_ptr<ArrayBuffer> GetSymmetricKey() const;
|
|
31
|
+
size_t GetSymmetricKeySize() const;
|
|
32
|
+
|
|
33
|
+
static KeyObjectData GetPublicOrPrivateKey(std::shared_ptr<ArrayBuffer> key, std::optional<KFormatType> format,
|
|
34
|
+
std::optional<KeyEncoding> type,
|
|
35
|
+
const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase);
|
|
36
|
+
|
|
37
|
+
static KeyObjectData GetPrivateKey(std::shared_ptr<ArrayBuffer> key, std::optional<KFormatType> format, std::optional<KeyEncoding> type,
|
|
38
|
+
const std::optional<std::shared_ptr<ArrayBuffer>>& passphrase, bool isPublic);
|
|
39
|
+
|
|
40
|
+
inline KeyObjectData addRef() const {
|
|
41
|
+
return KeyObjectData(key_type_, data_);
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
inline KeyObjectData addRefWithType(KeyType type) const {
|
|
45
|
+
return KeyObjectData(type, data_);
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
private:
|
|
49
|
+
explicit KeyObjectData(std::shared_ptr<ArrayBuffer> symmetric_key);
|
|
50
|
+
explicit KeyObjectData(KeyType type, ncrypto::EVPKeyPointer&& pkey);
|
|
51
|
+
|
|
52
|
+
// static KeyObjectData GetParsedKey(KeyType type,
|
|
53
|
+
// Environment* env,
|
|
54
|
+
// ncrypto::EVPKeyPointer&& pkey,
|
|
55
|
+
// ParseKeyResult ret,
|
|
56
|
+
// const char* default_msg);
|
|
57
|
+
|
|
58
|
+
KeyType key_type_;
|
|
59
|
+
|
|
60
|
+
struct Data {
|
|
61
|
+
const std::shared_ptr<ArrayBuffer> symmetric_key;
|
|
62
|
+
const ncrypto::EVPKeyPointer asymmetric_key;
|
|
63
|
+
explicit Data(std::shared_ptr<ArrayBuffer> symmetric_key) : symmetric_key(std::move(symmetric_key)) {}
|
|
64
|
+
explicit Data(ncrypto::EVPKeyPointer asymmetric_key) : asymmetric_key(std::move(asymmetric_key)) {}
|
|
65
|
+
};
|
|
66
|
+
std::shared_ptr<Data> data_;
|
|
67
|
+
|
|
68
|
+
KeyObjectData(KeyType type, std::shared_ptr<Data> data) : key_type_(type), data_(data) {}
|
|
69
|
+
};
|
|
70
|
+
|
|
71
|
+
} // namespace margelo::nitro::crypto
|
package/cpp/keys/node.h
ADDED
|
@@ -3,70 +3,49 @@
|
|
|
3
3
|
|
|
4
4
|
namespace margelo::nitro::crypto {
|
|
5
5
|
|
|
6
|
-
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>>
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
const std::shared_ptr<ArrayBuffer>& salt,
|
|
10
|
-
double iterations,
|
|
11
|
-
double keylen,
|
|
12
|
-
const std::string& digest
|
|
13
|
-
) {
|
|
6
|
+
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>> HybridPbkdf2::pbkdf2(const std::shared_ptr<ArrayBuffer>& password,
|
|
7
|
+
const std::shared_ptr<ArrayBuffer>& salt, double iterations,
|
|
8
|
+
double keylen, const std::string& digest) {
|
|
14
9
|
// get owned NativeArrayBuffers before passing to sync function
|
|
15
10
|
auto nativePassword = ToNativeArrayBuffer(password);
|
|
16
11
|
auto nativeSalt = ToNativeArrayBuffer(salt);
|
|
17
12
|
|
|
18
|
-
return Promise<std::shared_ptr<ArrayBuffer>>::async(
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
}
|
|
22
|
-
);
|
|
13
|
+
return Promise<std::shared_ptr<ArrayBuffer>>::async([this, nativePassword, nativeSalt, iterations, keylen, digest]() {
|
|
14
|
+
return this->pbkdf2Sync(nativePassword, nativeSalt, iterations, keylen, digest);
|
|
15
|
+
});
|
|
23
16
|
}
|
|
24
17
|
|
|
25
|
-
std::shared_ptr<ArrayBuffer>
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
const std::string& digest
|
|
32
|
-
) {
|
|
33
|
-
size_t bufferSize = static_cast<size_t>(keylen);
|
|
34
|
-
uint8_t* data = new uint8_t[bufferSize];
|
|
35
|
-
auto result = std::make_shared<NativeArrayBuffer>(data, bufferSize, [=]() { delete[] data; });
|
|
18
|
+
std::shared_ptr<ArrayBuffer> HybridPbkdf2::pbkdf2Sync(const std::shared_ptr<ArrayBuffer>& password,
|
|
19
|
+
const std::shared_ptr<ArrayBuffer>& salt, double iterations, double keylen,
|
|
20
|
+
const std::string& digest) {
|
|
21
|
+
size_t bufferSize = static_cast<size_t>(keylen);
|
|
22
|
+
uint8_t* data = new uint8_t[bufferSize];
|
|
23
|
+
auto result = std::make_shared<NativeArrayBuffer>(data, bufferSize, [=]() { delete[] data; });
|
|
36
24
|
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
result.get()->data(), result.get()->size());
|
|
53
|
-
} else {
|
|
54
|
-
// fallback to OpenSSL
|
|
55
|
-
auto *digestByName = EVP_get_digestbyname(digest.c_str());
|
|
56
|
-
if (digestByName == nullptr) {
|
|
57
|
-
throw std::runtime_error("Invalid hash-algorithm: " + digest);
|
|
58
|
-
}
|
|
59
|
-
char *passAsCharA = reinterpret_cast<char *>(password.get()->data());
|
|
60
|
-
const unsigned char *saltAsCharA =
|
|
61
|
-
reinterpret_cast<const unsigned char *>(salt.get()->data());
|
|
62
|
-
unsigned char *resultAsCharA =
|
|
63
|
-
reinterpret_cast<unsigned char *>(result.get()->data());
|
|
64
|
-
PKCS5_PBKDF2_HMAC(passAsCharA, password.get()->size(), saltAsCharA,
|
|
65
|
-
salt.get()->size(), static_cast<uint32_t>(iterations),
|
|
66
|
-
digestByName, result.get()->size(), resultAsCharA);
|
|
25
|
+
// use fastpbkdf2 when possible
|
|
26
|
+
if (digest == "sha1") {
|
|
27
|
+
fastpbkdf2_hmac_sha1(password.get()->data(), password.get()->size(), salt.get()->data(), salt.get()->size(),
|
|
28
|
+
static_cast<uint32_t>(iterations), result.get()->data(), result.get()->size());
|
|
29
|
+
} else if (digest == "sha256") {
|
|
30
|
+
fastpbkdf2_hmac_sha256(password.get()->data(), password.get()->size(), salt.get()->data(), salt.get()->size(),
|
|
31
|
+
static_cast<uint32_t>(iterations), result.get()->data(), result.get()->size());
|
|
32
|
+
} else if (digest == "sha512") {
|
|
33
|
+
fastpbkdf2_hmac_sha512(password.get()->data(), password.get()->size(), salt.get()->data(), salt.get()->size(),
|
|
34
|
+
static_cast<uint32_t>(iterations), result.get()->data(), result.get()->size());
|
|
35
|
+
} else {
|
|
36
|
+
// fallback to OpenSSL
|
|
37
|
+
auto* digestByName = EVP_get_digestbyname(digest.c_str());
|
|
38
|
+
if (digestByName == nullptr) {
|
|
39
|
+
throw std::runtime_error("Invalid hash-algorithm: " + digest);
|
|
67
40
|
}
|
|
41
|
+
char* passAsCharA = reinterpret_cast<char*>(password.get()->data());
|
|
42
|
+
const unsigned char* saltAsCharA = reinterpret_cast<const unsigned char*>(salt.get()->data());
|
|
43
|
+
unsigned char* resultAsCharA = reinterpret_cast<unsigned char*>(result.get()->data());
|
|
44
|
+
PKCS5_PBKDF2_HMAC(passAsCharA, password.get()->size(), saltAsCharA, salt.get()->size(), static_cast<uint32_t>(iterations), digestByName,
|
|
45
|
+
result.get()->size(), resultAsCharA);
|
|
46
|
+
}
|
|
68
47
|
|
|
69
|
-
|
|
48
|
+
return result;
|
|
70
49
|
}
|
|
71
50
|
|
|
72
51
|
} // namespace margelo::nitro::crypto
|
|
@@ -13,23 +13,12 @@ class HybridPbkdf2 : public HybridPbkdf2Spec {
|
|
|
13
13
|
|
|
14
14
|
public:
|
|
15
15
|
// Methods
|
|
16
|
-
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>>
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
const std::shared_ptr<ArrayBuffer>& salt,
|
|
20
|
-
double iterations,
|
|
21
|
-
double keylen,
|
|
22
|
-
const std::string& digest
|
|
23
|
-
) override;
|
|
16
|
+
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>> pbkdf2(const std::shared_ptr<ArrayBuffer>& password,
|
|
17
|
+
const std::shared_ptr<ArrayBuffer>& salt, double iterations, double keylen,
|
|
18
|
+
const std::string& digest) override;
|
|
24
19
|
|
|
25
|
-
std::shared_ptr<ArrayBuffer>
|
|
26
|
-
|
|
27
|
-
const std::shared_ptr<ArrayBuffer>& password,
|
|
28
|
-
const std::shared_ptr<ArrayBuffer>& salt,
|
|
29
|
-
double iterations,
|
|
30
|
-
double keylen,
|
|
31
|
-
const std::string& digest
|
|
32
|
-
) override;
|
|
20
|
+
std::shared_ptr<ArrayBuffer> pbkdf2Sync(const std::shared_ptr<ArrayBuffer>& password, const std::shared_ptr<ArrayBuffer>& salt,
|
|
21
|
+
double iterations, double keylen, const std::string& digest) override;
|
|
33
22
|
};
|
|
34
23
|
|
|
35
24
|
} // namespace margelo::nitro::crypto
|
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
#include "HybridRandom.hpp"
|
|
5
5
|
#include "Utils.hpp"
|
|
6
6
|
|
|
7
|
+
namespace margelo::nitro::crypto {
|
|
7
8
|
|
|
8
9
|
size_t checkSize(double size) {
|
|
9
10
|
if (!CheckIsUint32(size)) {
|
|
@@ -25,33 +26,21 @@ size_t checkOffset(double size, double offset) {
|
|
|
25
26
|
return static_cast<size_t>(offset);
|
|
26
27
|
}
|
|
27
28
|
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>>
|
|
32
|
-
HybridRandom::randomFill(const std::shared_ptr<ArrayBuffer>& buffer,
|
|
33
|
-
double dOffset,
|
|
34
|
-
double dSize) {
|
|
29
|
+
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>> HybridRandom::randomFill(const std::shared_ptr<ArrayBuffer>& buffer, double dOffset,
|
|
30
|
+
double dSize) {
|
|
35
31
|
// get owned NativeArrayBuffer before passing to sync function
|
|
36
32
|
auto nativeBuffer = ToNativeArrayBuffer(buffer);
|
|
37
33
|
|
|
38
34
|
return Promise<std::shared_ptr<ArrayBuffer>>::async(
|
|
39
|
-
|
|
40
|
-
return this->randomFillSync(nativeBuffer, dOffset, dSize);
|
|
41
|
-
}
|
|
42
|
-
);
|
|
35
|
+
[this, nativeBuffer, dOffset, dSize]() { return this->randomFillSync(nativeBuffer, dOffset, dSize); });
|
|
43
36
|
};
|
|
44
37
|
|
|
45
|
-
std::shared_ptr<ArrayBuffer>
|
|
46
|
-
HybridRandom::randomFillSync(const std::shared_ptr<ArrayBuffer>& buffer,
|
|
47
|
-
double dOffset,
|
|
48
|
-
double dSize) {
|
|
38
|
+
std::shared_ptr<ArrayBuffer> HybridRandom::randomFillSync(const std::shared_ptr<ArrayBuffer>& buffer, double dOffset, double dSize) {
|
|
49
39
|
size_t size = checkSize(dSize);
|
|
50
40
|
size_t offset = checkOffset(dSize, dOffset);
|
|
51
41
|
uint8_t* data = buffer.get()->data();
|
|
52
42
|
if (RAND_bytes(data + offset, (int)size) != 1) {
|
|
53
|
-
throw std::runtime_error("error calling RAND_bytes" +
|
|
54
|
-
std::to_string(ERR_get_error()));
|
|
43
|
+
throw std::runtime_error("error calling RAND_bytes: " + std::to_string(ERR_get_error()));
|
|
55
44
|
}
|
|
56
45
|
return buffer;
|
|
57
46
|
};
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
#include <cmath>
|
|
2
2
|
#include <future>
|
|
3
|
-
#include <memory>
|
|
4
3
|
#include <iostream>
|
|
4
|
+
#include <memory>
|
|
5
5
|
|
|
6
6
|
#include "HybridRandomSpec.hpp"
|
|
7
7
|
|
|
@@ -15,17 +15,16 @@ class HybridRandom : public HybridRandomSpec {
|
|
|
15
15
|
|
|
16
16
|
public:
|
|
17
17
|
// Methods
|
|
18
|
-
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>>
|
|
19
|
-
|
|
18
|
+
std::shared_ptr<Promise<std::shared_ptr<ArrayBuffer>>> randomFill(const std::shared_ptr<ArrayBuffer>& buffer, double dOffset,
|
|
19
|
+
double dSize) override;
|
|
20
20
|
|
|
21
|
-
std::shared_ptr<ArrayBuffer>
|
|
22
|
-
randomFillSync(const std::shared_ptr<ArrayBuffer>& buffer, double dOffset, double dSize) override;
|
|
21
|
+
std::shared_ptr<ArrayBuffer> randomFillSync(const std::shared_ptr<ArrayBuffer>& buffer, double dOffset, double dSize) override;
|
|
23
22
|
};
|
|
24
23
|
|
|
25
24
|
inline void printData(std::string name, uint8_t* data, size_t size) {
|
|
26
25
|
std::cout << "data - " << name << std::endl;
|
|
27
26
|
for (size_t i = 0; i < size; i++) {
|
|
28
|
-
|
|
27
|
+
printf("%u ", data[i]);
|
|
29
28
|
}
|
|
30
29
|
printf("\n");
|
|
31
30
|
}
|