1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
|
function SRP()
{
// Variables that will be used in the SRP protocol
var Nstr = "115b8b692e0e045692cf280b436735c77a5a9e8a9e7ed56c965f87db5b2a2ece3";
var N = new BigInteger(Nstr, 16);
var g = new BigInteger("2");
var k = new BigInteger("c46d46600d87fef149bd79b81119842f3c20241fda67d06ef412d8f6d9479c58", 16);
var rng = new SecureRandom();
var a = new BigInteger(32, rng);
var A = g.modPow(a, N);
while(A.mod(N) == 0)
{
a = new BigInteger(32, rng);
A = g.modPow(a, N);
}
var Astr = A.toString(16);
var S = null;
var K = null;
var M = null;
var M2 = null;
var that = this;
var authenticated = false;
var I = document.getElementById("srp_username").value;
var p = document.getElementById("srp_password").value;
var xhr = null;
// *** Accessor methods ***
// allows setting the random number A for testing
this.calculateAndSetA = function(_a)
{
a = new BigInteger(_a, 16);
A = g.modPow(a, N);
Astr = A.toString(16);
return Astr;
};
// Returns the user's identity
this.getI = function()
{
return I;
};
// some 16 byte random number
this.salt = function() {
return new BigInteger(64, rng).toString(16);
}
// Returns the XMLHttpRequest object
this.getxhr = function()
{
return xhr;
};
// Returns the base URL - overwrite to use a different one
this.geturl = function()
{
return "";
};
// Returns the BigInteger, g
this.getg = function()
{
return g;
};
// Returns the BigInteger, N
this.getN = function()
{
return N;
};
// Calculates the X value and return it as a BigInteger
this.calcX = function(s)
{
return new BigInteger(SHA256(s + SHA256(I + ":" + p)), 16);
};
this.calcV = function(salt)
{
return this.getg().modPow(this.calcX(salt), this.getN());
}
// Overwrite this if you want to change the paths
this.paths = function(str)
{
return str;
};
// Check whether or not a variable is defined
function isdefined ( variable)
{
return (typeof(window[variable]) != "undefined");
};
// *** Actions ***
// Perform ajax requests at the specified url, with the specified parameters
// Calling back the specified function.
this.ajaxRequest = function(full_url, params, callback)
{
if( window.XMLHttpRequest)
xhr = new XMLHttpRequest();
else if (window.ActiveXObject){
try{
xhr = new ActiveXObject("Microsoft.XMLHTTP");
}catch (e){}
}
else
{
that.error_message("Ajax not supported.");
return;
}
if(xhr){
xhr.onreadystatechange = function() {
if(xhr.readyState == 4 && xhr.status == 200) {
callback(parseResponse());
}
};
xhr.open("POST", full_url, true);
xhr.setRequestHeader("Content-type", "application/x-www-form-urlencoded");
xhr.setRequestHeader("Content-length", params.length);
xhr.send(params);
}
else
{
that.error_message("Ajax failed.");
}
};
function parseResponse() {
if (responseIsXML()) {
return parseXML(xhr.responseXML);
} else if (responseIsJSON()) {
return JSON.parse(xhr.responseText);
}
};
function responseIsXML() {
return (xhr.responseType == 'document') ||
(xhr.getResponseHeader("Content-Type").indexOf('application/xml') >= 0)
}
function responseIsJSON() {
return (xhr.responseType == 'json') ||
(xhr.getResponseHeader("Content-Type").indexOf('application/json') >= 0)
}
function parseXML(xml) {
if (xml.getElementsByTagName("r").length > 0) {
return parseAttributesOfElement(xml.getElementsByTagName("r")[0]);
} else {
return parseNodes(xml.childNodes);
}
};
function parseAttributesOfElement(elem) {
var response = {};
for (var i = 0; i < elem.attributes.length; i++) {
var attrib = elem.attributes[i];
if (attrib.specified) {
response[attrib.name] = attrib.value;
}
}
return response;
};
function parseNodes(nodes) {
var response = {};
for (var i = 0; i < nodes.length; i++) {
var node = nodes[i];
response[node.tagName] = node.textContent || true;
}
return response;
};
// Start the login process by identifying the user
this.identify = function()
{
var handshake_url = that.geturl() + that.paths("handshake/");
var params = "I="+I+"&A="+Astr;
that.ajaxRequest(handshake_url, params, receive_salts);
};
// Receive login salts from the server, start calculations
function receive_salts(response)
{
if(response.error) {
that.error_message(response.error);
}
// B = 0 will make the algorithm always succeed - refuse such a server
// answer
else if(response.B == 0) {
that.error_message("Server send random number 0 - this is not allowed");
}
// If there is no algorithm specified, calculate M given s, B, and P
else if(!response.a)
{
calculations(response.s, response.B, p);
that.ajaxRequest(that.geturl()+that.paths("authenticate/"), "M="+M, confirm_authentication);
}
// If there is an algorithm specified, start the login process
else {
upgrade(response.s, response.B, response.a, response.d);
}
};
// Calculate S, M, and M2
// This is the client side of the SRP specification
function calculations(s, ephemeral, pass)
{
//S -> C: s | B
var B = new BigInteger(ephemeral, 16);
var Bstr = ephemeral;
// u = H(A,B)
var u = new BigInteger(SHA256(Astr + Bstr), 16);
// x = H(s, H(I:p))
var x = new BigInteger(SHA256(s + SHA256(I + ":" + pass)), 16);
//S = (B - kg^x) ^ (a + ux)
var kgx = k.multiply(g.modPow(x, N));
var aux = a.add(u.multiply(x));
S = B.subtract(kgx).modPow(aux, N);
// M = H(H(N) xor H(g), H(I), s, A, B, K)
var Mstr = A.toString(16) + B.toString(16) + S.toString(16);
M = SHA256(Mstr);
M2 = SHA256(A.toString(16) + M + S.toString(16));
//M2 = H(A, M, K)
};
// Receive M2 from the server and verify it
function confirm_authentication(response)
{
if(response.M)
{
if(response.M == M2)
{
authenticated = true;
that.success();
}
else
that.error_message("Server key does not match");
}
else if (response.error)
that.error_message(response.error);
};
// *** Upgrades ***
// Start the process to upgrade the user's account
function upgrade(s,ephemeral,algo,dsalt)
{
// First we need to import the hash functions
import_hashes();
// Once the hash functions are imported, do the calculations using the hashpass as the password
function do_upgrade()
{
// If sha1 and md5 are still undefined, sleep again
if(!isdefined("SHA1") || !isdefined("MD5"))
{
window.setTimeout(do_upgrade, 10);
return;
}
if(algo == "sha1")
hashfun = SHA1;
else if(algo == "md5")
hashfun = MD5;
//alert(hashfun(dsalt+p));
calculations(s, ephemeral, hashfun(dsalt+p));
that.ajaxRequest(that.geturl()+that.paths("upgrade/authenticate/"), "M="+M, confirm_upgrade);
};
window.setTimeout(do_upgrade,10);
};
// Encrypt plaintext using slowAES
function encrypt(plaintext)
{
var key = cryptoHelpers.toNumbers(that.key());
var byteMessage = cryptoHelpers.convertStringToByteArray(plaintext);
var iv = new Array(16);
rng.nextBytes(iv);
var paddedByteMessage = slowAES.getPaddedBlock(byteMessage, 0, byteMessage.length, slowAES.modeOfOperation.CFB);
var ciphertext = slowAES.encrypt(paddedByteMessage, slowAES.modeOfOperation.CFB, key, key.length, iv).cipher;
var retstring = cryptoHelpers.base64.encode(iv.concat(ciphertext));
while(retstring.indexOf("+",0) > -1)
retstring = retstring.replace("+", "_");
return retstring;
};
// Receive the server's M, confirming that the server has HASH(p)
// Next, send P in plaintext (this is the **only** time it should ever be sent plain text)
function confirm_upgrade(response)
{
if(response.M)
{
if(response.M == M2)
{
K = SHA256(S.toString(16));
var auth_url = that.geturl() + that.paths("upgrade/verifier/");
that.ajaxRequest(auth_url, "p="+encrypt(p)+"&l="+p.length, confirm_verifier);
}
else
that.error_message("Server key does not match");
}
else if (response.error)
{
that.error_message(response.error);
}
};
// After sending the password, check that the response is OK, then reidentify
function confirm_verifier(response)
{
K = null;
if(response.ok)
that.identify();
else
that.error_message("Verifier could not be confirmed");
};
// This loads javascript libraries. Fname is the path to the library to be imported
function import_file(fname)
{
var scriptElt = document.createElement('script');
scriptElt.type = 'text/javascript';
scriptElt.src = fname;
document.getElementsByTagName('head')[0].appendChild(scriptElt);
};
// If we need SHA1 or MD5, we need to load the javascript files
function import_hashes()
{
// First check that the functions aren't already loaded
if(isdefined("SHA1") && isdefined("MD5")) return;
// Get the directory that this javascript file was loaded from
var arr=that.srpPath.split("/");
var path = arr.slice(0, arr.length-1).join("/");
// If this file is called srp.min.js, we will load the packed hash file
if(arr[arr.length-1] == "srp.min.js")
import_file(path+"/crypto.min.js");
// Otherwise, this file is presumably srp.js, and we will load individual hash files
else
{
import_file(path+"/MD5.js");
import_file(path+"/SHA1.js");
import_file(path+"/cryptoHelpers.js");
import_file(path+"/aes.js");
}
}
// This function is called when authentication is successful.
// Developers can set this to other functions in specific implementations
// and change the functionality.
this.success = function()
{
var forward_url = document.getElementById("srp_forward").value;
if(forward_url.charAt(0) != "#")
window.location = forward_url;
else
{
window.location = forward_url;
alert("Login successful.");
}
};
// If someone wants to use the session key for encrypting traffic, they can
// access the key with this function.
this.key = function()
{
if(K == null)
if(authenticated)
{
K = SHA256(S.toString(16));
return K;
}
else
that.error_message("User has not been authenticated.");
else
return K;
};
// If an error occurs, raise it as an alert.
// Developers can set this to an alternative function to handle erros differently.
this.error_message = function(t)
{
alert(t);
};
};
// This line is run while the document is loading
// It gets a list of all <script> tags and finds the last instance.
// The path to this script is the "src" attribute of that tag.
SRP.prototype.srpPath = document.getElementsByTagName('script')[document.getElementsByTagName('script').length-1].getAttribute("src");
|