@xstorage/xs-js-libp2p-crypto v0.1.1
xS-js-libp2p-crypto
Crypto primitives for xS-js-libp2p in JavaScript
维护者: Paul Zhang, Chunhv Liu
This repo contains the JavaScript implementation of the crypto primitives needed for libp2p.
Table of Contents
安装
npm install --save xs-js-libp2p-cryptoAPI
crypto.aes
Expoes an interface to AES encryption (formerly Rijndael), as defined in U.S. Federal Information Processing Standards Publication 197.
This uses CTR mode.
crypto.aes.create(key, iv, callback)
key: BufferThe key, if length16thenAES 128is used. For length32,AES 256is used.iv: BufferMust have length16.callback: Function
decrypt(data, callback)
data: Buffercallback: Function
encrypt(data, callback)
data: Buffercallback: Function
TODO: Example of using aescrypto.hmac
Exposes an interface to the Keyed-Hash Message Authentication Code (HMAC) as defined in U.S. Federal Information Processing Standards Publication 198. An HMAC is a cryptographic hash that uses a key to sign a message. The receiver verifies the hash by recomputing it using the same key.
crypto.hmac.create(hash, secret, callback)
hash: Stringsecret: Buffercallback: Function
digest(data, callback)
data: Buffercallback: Function
Example:
TODO: Example of using hmaccrypto.keys
Supported Key Types
The generateKeyPair, marshalPublicKey, and marshalPrivateKey functions accept a string type argument.
Currently the 'RSA' and 'ed25519' types are supported, although ed25519 keys support only signing and verification of messages. For encryption / decryption support, RSA keys should be used.
Installing the xs-js-libp2p-crypto-secp256k1 module adds support for the 'secp256k1' type, which supports ECDSA signatures using the secp256k1 elliptic curve popularized by Bitcoin. This module is not installed by default, and should be explicitly depended on if your project requires secp256k1 support.
crypto.keys.generateKeyPair(type, bits, callback)
type: String, see Supported Key Types above.bits: NumberMinimum of 1024callback: Function
Generates a keypair of the given type and bitsize.
crypto.keys.generateEphemeralKeyPair(curve, callback)
curve: String, one of'P-256','P-384','P-521'is currently supportedcallback: Function
Generates an ephemeral public key and returns a function that will compute the shared secret key.
Focuses only on ECDH now, but can be made more general in the future.
Calls back with an object of the form
{
key: Buffer,
genSharedKey: Function
}crypto.keys.keyStretcher(cipherType, hashType, secret, callback)
cipherType: String, one of'AES-128','AES-256','Blowfish'hashType: String, one of'SHA1',SHA256,SHA512secret: Buffercallback: Function
Generates a set of keys for each party by stretching the shared key.
Calls back with an object of the form:
{
k1: {
iv: Buffer,
cipherKey: Buffer,
macKey: Buffer
},
k2: {
iv: Buffer,
cipherKey: Buffer,
macKey: Buffer
}
}crypto.keys.marshalPublicKey(key[, type], callback)
key: keys.rsa.RsaPublicKey | keys.ed25519.Ed25519PublicKey | require('libp2p-crypto-secp256k1').Secp256k1PublicKeytype: String, see Supported Key Types above.
Converts a public key object into a protobuf serialized public key.
crypto.keys.unmarshalPublicKey(buf)
buf: Buffer
Converts a protobuf serialized public key into its representative object.
crypto.keys.marshalPrivateKey(key[, type])
key: keys.rsa.RsaPrivateKey | keys.ed25519.Ed25519PrivateKey | require('libp2p-crypto-secp256k1').Secp256k1PrivateKeytype: String, see Supported Key Types above.
Converts a private key object into a protobuf serialized private key.
crypto.keys.unmarshalPrivateKey(buf, callback)
buf: Buffercallback: Function
Converts a protobuf serialized private key into its representative object.
crypto.keys.import(pem, password, callback)
pem: stringpassword: stringcallback: Function
Converts a PEM password protected private key into its representative object.
crypto.randomBytes(number)
number: Number
Generates a Buffer with length number populated by random bytes.
crypto.pbkdf2(password, salt, iterations, keySize, hash)
password: Stringsalt: Stringiterations: NumberkeySize: Numberin byteshash: Stringthe hashing algorithm ('sha1', 'sha2-512', ...)
Computes the Password Based Key Derivation Function 2; returning a new password.
Contribute
Contributions welcome. Please check out the issues.
致谢
@ libp2p
资助我们
Cryptocurrency is welcomed.
ETH: 0xCd0e5cE4a29Fd6441b95FA857753f68D09339628
License
MIT © 2016 Protocol Labs Inc.