summaryrefslogtreecommitdiff
path: root/lib/srp_session.js
diff options
context:
space:
mode:
Diffstat (limited to 'lib/srp_session.js')
-rw-r--r--lib/srp_session.js138
1 files changed, 0 insertions, 138 deletions
diff --git a/lib/srp_session.js b/lib/srp_session.js
deleted file mode 100644
index 93bfbe5..0000000
--- a/lib/srp_session.js
+++ /dev/null
@@ -1,138 +0,0 @@
-SRP.prototype.Session = function() {
-
- // Variables session will be used in the SRP protocol
- var Nstr = "115b8b692e0e045692cf280b436735c77a5a9e8a9e7ed56c965f87db5b2a2ece3";
- var N = new BigInteger(Nstr, 16);
- var g = new BigInteger("2");
- var k = new BigInteger("c46d46600d87fef149bd79b81119842f3c20241fda67d06ef412d8f6d9479c58", 16);
-
- var rng = new SecureRandom();
- var a = new BigInteger(32, rng);
- var A = g.modPow(a, N);
- while(A.mod(N) == 0)
- {
- a = new BigInteger(32, rng);
- A = g.modPow(a, N);
- }
- var Astr = A.toString(16);
- var S = null;
- var K = null;
- var M = null;
- var M2 = null;
- var authenticated = false;
- var I = document.getElementById("srp_username").value;
- var pass = document.getElementById("srp_password").value;
- var V;
- var salt;
-
- // *** Accessor methods ***
-
- // allows setting the random number A for testing
-
- this.calculateAndSetA = function(_a)
- {
- a = new BigInteger(_a, 16);
- A = g.modPow(a, N);
- Astr = A.toString(16);
- return Astr;
- };
-
- this.getAstr = function() {
- return Astr;
- }
-
- // Returns the user's identity
- this.getI = function()
- {
- return I;
- };
-
- // some 16 byte random number
- this.getSalt = function() {
- salt = salt || new BigInteger(64, rng).toString(16);
- return salt
- }
-
- // Returns the BigInteger, g
- this.getg = function()
- {
- return g;
- };
-
- // Returns the BigInteger, N
- this.getN = function()
- {
- return N;
- };
-
- // Calculates the X value and return it as a BigInteger
- this.calcX = function(s)
- {
- return new BigInteger(SHA256(s + SHA256(I + ":" + pass)), 16);
- };
-
- this.getV = function(salt)
- {
- V = V || this.getg().modPow(this.calcX(salt), this.getN());
- return V;
- }
-
- // Calculate S, M, and M2
- // This is the client side of the SRP specification
- this.calculations = function(salt, ephemeral)
- {
- //S -> C: s | B
- var B = new BigInteger(ephemeral, 16);
- var Bstr = ephemeral;
- // u = H(A,B)
- var u = new BigInteger(SHA256(Astr + Bstr), 16);
- // x = H(s, H(I:p))
- var x = new BigInteger(SHA256(salt + SHA256(I + ":" + pass)), 16);
- //S = (B - kg^x) ^ (a + ux)
- var kgx = k.multiply(g.modPow(x, N));
- var aux = a.add(u.multiply(x));
- S = B.subtract(kgx).modPow(aux, N);
- // M = H(H(N) xor H(g), H(I), s, A, B, K)
- var Mstr = A.toString(16) + B.toString(16) + S.toString(16);
- M = SHA256(Mstr);
- M2 = SHA256(A.toString(16) + M + S.toString(16));
- //M2 = H(A, M, K)
- };
-
- this.getM = function() {
- return M;
- }
-
- this.validate = function(serverM2) {
- authenticated = (serverM2 && serverM2 == M2)
- return authenticated;
- }
-
- // If someone wants to use the session key for encrypting traffic, they can
- // access the key with this function.
- this.key = function()
- {
- if(K) return K;
- if(authenticated) {
- K = SHA256(S.toString(16));
- return K;
- }
- else
- this.onError("User has not been authenticated.");
- };
-
- // Encrypt plaintext using slowAES
- this.encrypt = function(plaintext)
- {
- var key = cryptoHelpers.toNumbers(session.key());
- var byteMessage = cryptoHelpers.convertStringToByteArray(plaintext);
- var iv = new Array(16);
- rng.nextBytes(iv);
- var paddedByteMessage = slowAES.getPaddedBlock(byteMessage, 0, byteMessage.length, slowAES.modeOfOperation.CFB);
- var ciphertext = slowAES.encrypt(paddedByteMessage, slowAES.modeOfOperation.CFB, key, key.length, iv).cipher;
- var retstring = cryptoHelpers.base64.encode(iv.concat(ciphertext));
- while(retstring.indexOf("+",0) > -1)
- retstring = retstring.replace("+", "_");
- return retstring;
- };
-}