Flatlogic Bot c2aa0f3687 V5
2026-02-16 07:39:54 +00:00

2273 lines
65 KiB
JavaScript

const binding = require('./binding')
const { isNode } = require('which-runtime')
const OPTIONAL = Buffer.from(new ArrayBuffer(0))
module.exports = exports = { ...binding }
// memory
exports.sodium_memzero = function (buf) {
binding.sodium_memzero(buf)
}
exports.sodium_mlock = function (buf) {
const res = binding.sodium_mlock(buf)
if (res !== 0) throw new Error('memory lock failed')
}
exports.sodium_munlock = function (buf) {
const res = binding.sodium_munlock(buf)
if (res !== 0) throw new Error('memory unlock failed')
}
exports.sodium_malloc = function (size) {
if (size < 0) throw new Error('invalid size')
const buf = Buffer.from(binding.sodium_malloc(size))
buf.secure = true
return buf
}
exports.sodium_free = function (buf) {
if (!buf?.secure) return
binding.sodium_free(buf.buffer)
}
exports.sodium_mprotect_noaccess = function (buf) {
const res = binding.sodium_mprotect_noaccess(buf.buffer)
if (res !== 0) throw new Error('failed to lock buffer')
}
exports.sodium_mprotect_readonly = function (buf) {
const res = binding.sodium_mprotect_readonly(buf.buffer)
if (res !== 0) throw new Error('failed to unlock buffer')
}
exports.sodium_mprotect_readwrite = function (buf) {
const res = binding.sodium_mprotect_readwrite(buf.buffer)
if (res !== 0) throw new Error('failed to unlock buffer')
}
// crypto_randombytes
exports.randombytes_buf = function (buffer) {
binding.randombytes_buf(buffer.buffer, buffer.byteOffset, buffer.byteLength)
}
exports.randombytes_buf_deterministic = function (buffer, seed) {
binding.randombytes_buf_deterministic(
buffer.buffer,
buffer.byteOffset,
buffer.byteLength,
seed.buffer,
seed.byteOffset,
seed.byteLength
)
}
// sodium_helpers
exports.sodium_memcmp = function (a, b) {
if (a?.byteLength !== b?.byteLength)
throw new Error('buffers must be of same length"')
return binding.sodium_memcmp(a, b)
}
exports.sodium_add = function (a, b) {
if (a?.byteLength !== b?.byteLength)
throw new Error('buffers must be of same length"')
binding.sodium_add(a, b)
}
exports.sodium_sub = function (a, b) {
if (a?.byteLength !== b?.byteLength)
throw new Error('buffers must be of same length"')
binding.sodium_sub(a, b)
}
exports.sodium_compare = function (a, b) {
if (a?.byteLength !== b?.byteLength)
throw new Error('buffers must be of same length"')
return binding.sodium_compare(a, b)
}
exports.sodium_is_zero = function (buffer, length) {
if (!buffer) throw new Error('invalid buffer')
length ??= buffer.byteLength
if (length > buffer.byteLength || length < 0)
throw new Error('invalid length')
return binding.sodium_is_zero(buffer, length)
}
exports.sodium_pad = function (buffer, unpaddedBuflen, blockSize) {
if (unpaddedBuflen > buffer.byteLength)
throw new Error('unpadded length cannot exceed buffer length')
if (blockSize > buffer.byteLength)
throw new Error('block size cannot exceed buffer length')
if (blockSize < 1) throw new Error('block sizemust be at least 1 byte')
if (
buffer?.byteLength <
unpaddedBuflen + (blockSize - (unpaddedBuflen % blockSize))
)
throw new Error('buf not long enough')
return binding.sodium_pad(buffer, unpaddedBuflen, blockSize)
}
exports.sodium_unpad = function (buffer, paddedBuflen, blockSize) {
if (paddedBuflen > buffer.byteLength)
throw new Error('unpadded length cannot exceed buffer length')
if (blockSize > buffer.byteLength)
throw new Error('block size cannot exceed buffer length')
if (blockSize < 1) throw new Error('block size must be at least 1 byte')
return binding.sodium_unpad(buffer, paddedBuflen, blockSize)
}
// crypto_sign
exports.crypto_sign_keypair = function (pk, sk) {
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
const res = binding.crypto_sign_keypair(pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_seed_keypair = function (pk, sk, seed) {
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
const res = binding.crypto_sign_seed_keypair(pk, sk, seed)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign = function (sm, m, sk) {
if (sm?.byteLength !== binding.crypto_sign_BYTES + m.byteLength)
throw new Error('sm must be "m.byteLength + crypto_sign_BYTES" bytes')
if (sk?.byteLength !== binding.crypto_sign_SECRETKEYBYTES)
throw new Error('sk')
const res = binding.crypto_sign(sm, m, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_open = function (m, sm, pk) {
if (sm?.byteLength < binding.crypto_sign_BYTES) throw new Error('sm')
if (m?.byteLength !== sm.byteLength - binding.crypto_sign_BYTES)
throw new Error('m must be "sm.byteLength - crypto_sign_BYTES" bytes')
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
const res = binding.crypto_sign_open(m, sm, pk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_open = function (m, sm, pk) {
if (sm?.byteLength < binding.crypto_sign_BYTES) throw new Error('sm')
if (m?.byteLength !== sm.byteLength - binding.crypto_sign_BYTES)
throw new Error('m must be "sm.byteLength - crypto_sign_BYTES" bytes')
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
return binding.crypto_sign_open(m, sm, pk)
}
exports.crypto_sign_detached = function (sig, m, sk) {
if (sig?.byteLength !== binding.crypto_sign_BYTES) throw new Error('sig')
if (sk?.byteLength !== binding.crypto_sign_SECRETKEYBYTES)
throw new Error('sk')
const res = binding.crypto_sign_detached(sig, m, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_verify_detached = function (sig, m, pk) {
return binding.crypto_sign_verify_detached(
sig.buffer,
sig.byteOffset,
sig.byteLength,
m.buffer,
m.byteOffset,
m.byteLength,
pk.buffer,
pk.byteOffset,
pk.byteLength
)
}
exports.crypto_sign_ed25519_sk_to_pk = function (pk, sk) {
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
if (sk?.byteLength !== binding.crypto_sign_SECRETKEYBYTES)
throw new Error('sk')
const res = binding.crypto_sign_ed25519_sk_to_pk(pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_ed25519_pk_to_curve25519 = function (x25519pk, ed25519pk) {
if (x25519pk?.byteLength !== binding.crypto_box_PUBLICKEYBYTES)
throw new Error('x25519_pk')
if (ed25519pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('ed25519_pk')
const res = binding.crypto_sign_ed25519_pk_to_curve25519(x25519pk, ed25519pk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_sign_ed25519_sk_to_curve25519 = function (x25519sk, ed25519sk) {
if (x25519sk?.byteLength !== binding.crypto_box_SECRETKEYBYTES)
throw new Error('x25519_sk')
const edLen = ed25519sk.byteLength
if (
edLen !== binding.crypto_sign_SECRETKEYBYTES &&
edLen !== binding.crypto_box_SECRETKEYBYTES
) {
throw new Error(
"ed25519_sk should either be 'crypto_sign_SECRETKEYBYTES' bytes or 'crypto_sign_SECRETKEYBYTES - crypto_sign_PUBLICKEYBYTES' bytes"
)
}
const res = binding.crypto_sign_ed25519_sk_to_curve25519(x25519sk, ed25519sk)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_box
exports.crypto_box_keypair = function (pk, sk) {
if (pk?.byteLength !== binding.crypto_box_PUBLICKEYBYTES)
throw new Error('pk')
if (sk?.byteLength !== binding.crypto_box_SECRETKEYBYTES)
throw new Error('sk')
const res = binding.crypto_box_keypair(pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_box_seed_keypair = function (pk, sk, seed) {
if (pk?.byteLength !== binding.crypto_box_PUBLICKEYBYTES)
throw new Error('pk')
if (sk?.byteLength !== binding.crypto_box_SECRETKEYBYTES)
throw new Error('sk')
const res = binding.crypto_box_seed_keypair(pk, sk, seed)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_box_easy = function (c, m, n, pk, sk) {
const res = binding.crypto_box_easy(c, m, n, pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_box_detached = function (c, mac, m, n, pk, sk) {
const res = binding.crypto_box_detached(c, mac, m, n, pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_box_seal = function (c, m, pk) {
const res = binding.crypto_box_seal(c, m, pk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_box_seal_open = function (m, c, pk, sk) {
return binding.crypto_box_seal_open(
m.buffer,
m.byteOffset,
m.byteLength,
c.buffer,
c.byteOffset,
c.byteLength,
pk.buffer,
pk.byteOffset,
pk.byteLength,
sk.buffer,
sk.byteOffset,
sk.byteLength
)
}
// crypto_secretbox
exports.crypto_secretbox_easy = function (c, m, n, k) {
if (c?.byteLength !== m.byteLength + binding.crypto_secretbox_MACBYTES)
throw new Error(
'c must be "m.byteLength + crypto_secretbox_MACBYTES" bytes'
)
if (n?.byteLength !== binding.crypto_secretbox_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_secretbox_KEYBYTES) throw new Error('k')
const res = binding.crypto_secretbox_easy(c, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_secretbox_open_easy = function (m, c, n, k) {
if (m?.byteLength !== c.byteLength - binding.crypto_secretbox_MACBYTES)
throw new Error('m must be "c - crypto_secretbox_MACBYTES" bytes')
if (c?.byteLength < binding.crypto_secretbox_MACBYTES) throw new Error('c')
if (n?.byteLength !== binding.crypto_secretbox_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_secretbox_KEYBYTES) throw new Error('k')
return binding.crypto_secretbox_open_easy(m, c, n, k)
}
exports.crypto_secretbox_detached = function (c, mac, m, n, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('c must "m.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_secretbox_MACBYTES)
throw new Error('mac')
if (n?.byteLength !== binding.crypto_secretbox_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_secretbox_KEYBYTES) throw new Error('k')
const res = binding.crypto_secretbox_detached(c, mac, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_secretbox_open_detached = function (m, c, mac, n, k) {
if (m?.byteLength !== c.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_secretbox_MACBYTES)
throw new Error('mac')
if (n?.byteLength !== binding.crypto_secretbox_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_secretbox_KEYBYTES) throw new Error('k')
return binding.crypto_secretbox_open_detached(m, c, mac, n, k)
}
// crypto_generichash
exports.crypto_generichash = function (output, input, key = OPTIONAL) {
const res = binding.crypto_generichash(
output.buffer,
output.byteOffset,
output.byteLength,
input.buffer,
input.byteOffset,
input.byteLength,
key.buffer,
key.byteOffset,
key.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_generichash_batch = function (output, batch, key) {
if (isNode || batch.length < 4) {
const res = binding.crypto_generichash_batch(
output,
batch,
!!key,
key || OPTIONAL
)
if (res !== 0) throw new Error('status: ' + res)
} else {
const state = Buffer.alloc(binding.crypto_generichash_STATEBYTES)
exports.crypto_generichash_init(state, key, output.byteLength)
for (const buf of batch) {
exports.crypto_generichash_update(state, buf)
}
exports.crypto_generichash_final(state, output)
}
}
exports.crypto_generichash_keygen = function (key) {
const res = binding.crypto_generichash_keygen(
key.buffer,
key.byteOffset,
key.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_generichash_init = function (state, key, outputLength) {
key ||= OPTIONAL
const res = binding.crypto_generichash_init(
state.buffer,
state.byteOffset,
state.byteLength,
key.buffer,
key.byteOffset,
key.byteLength,
outputLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_generichash_update = function (state, input) {
const res = binding.crypto_generichash_update(
state.buffer,
state.byteOffset,
state.byteLength,
input.buffer,
input.byteOffset,
input.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_generichash_final = function (state, output) {
const res = binding.crypto_generichash_final(
state.buffer,
state.byteOffset,
state.byteLength,
output.buffer,
output.byteOffset,
output.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
// secretstream
exports.crypto_secretstream_xchacha20poly1305_keygen = function (k) {
binding.crypto_secretstream_xchacha20poly1305_keygen(
k.buffer,
k.byteOffset,
k.byteLength
)
}
exports.crypto_secretstream_xchacha20poly1305_init_push = function (
state,
header,
k
) {
const res = binding.crypto_secretstream_xchacha20poly1305_init_push(
state.buffer,
state.byteOffset,
state.byteLength,
header.buffer,
header.byteOffset,
header.byteLength,
k.buffer,
k.byteOffset,
k.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_secretstream_xchacha20poly1305_init_pull = function (
state,
header,
k
) {
const res = binding.crypto_secretstream_xchacha20poly1305_init_pull(
state.buffer,
state.byteOffset,
state.byteLength,
header.buffer,
header.byteOffset,
header.byteLength,
k.buffer,
k.byteOffset,
k.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_secretstream_xchacha20poly1305_push = function (
state,
c,
m,
ad,
tag
) {
ad ||= OPTIONAL
const res = binding.crypto_secretstream_xchacha20poly1305_push(
state.buffer,
state.byteOffset,
state.byteLength,
c.buffer,
c.byteOffset,
c.byteLength,
m.buffer,
m.byteOffset,
m.byteLength,
ad.buffer,
ad.byteOffset,
ad.byteLength,
tag
)
if (res < 0) throw new Error('push failed')
return res
}
exports.crypto_secretstream_xchacha20poly1305_pull = function (
state,
m,
tag,
c,
ad
) {
ad ||= OPTIONAL
if (c?.byteLength < binding.crypto_secretstream_xchacha20poly1305_ABYTES)
throw new Error('invalid cipher length')
if (
m?.byteLength !==
c.byteLength - binding.crypto_secretstream_xchacha20poly1305_ABYTES
)
throw new Error('invalid message length')
const res = binding.crypto_secretstream_xchacha20poly1305_pull(
state.buffer,
state.byteOffset,
state.byteLength,
m.buffer,
m.byteOffset,
m.byteLength,
tag.buffer,
tag.byteOffset,
tag.byteLength,
c.buffer,
c.byteOffset,
c.byteLength,
ad.buffer,
ad.byteOffset,
ad.byteLength
)
if (res < 0) throw new Error('pull failed')
return res
}
exports.crypto_secretstream_xchacha20poly1305_rekey = function (state) {
binding.crypto_secretstream_xchacha20poly1305_rekey(
state.buffer,
state.byteOffset,
state.byteLength
)
}
// crypto_stream
exports.crypto_stream = function (c, n, k) {
if (n?.byteLength !== binding.crypto_stream_NONCEBYTES) throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_KEYBYTES) throw new Error('k')
const res = binding.crypto_stream(c, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_xor = function (c, m, n, k) {
const res = binding.crypto_stream_xor(
c.buffer,
c.byteOffset,
c.byteLength,
m.buffer,
m.byteOffset,
m.byteLength,
n.buffer,
n.byteOffset,
n.byteLength,
k.buffer,
k.byteOffset,
k.byteLength
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20 = function (c, n, k) {
if (n?.byteLength !== binding.crypto_stream_chacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20(c, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20_xor = function (c, m, n, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_chacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20_xor(c, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20_xor_ic = function (c, m, n, ic, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_chacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20_xor_ic(c, m, n, ic, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20_ietf = function (c, n, k) {
if (n?.byteLength !== binding.crypto_stream_chacha20_ietf_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20_ietf(c, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20_ietf_xor = function (c, m, n, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_chacha20_ietf_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20_ietf_xor(c, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_chacha20_ietf_xor_ic = function (c, m, n, ic, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_chacha20_ietf_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_chacha20_ietf_xor_ic(c, m, n, ic, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_xchacha20 = function (c, n, k) {
if (n?.byteLength !== binding.crypto_stream_xchacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_xchacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_xchacha20(c, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_xchacha20_xor = function (c, m, n, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_xchacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_xchacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_xchacha20_xor(c, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_xchacha20_xor_ic = function (c, m, n, ic, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_xchacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_xchacha20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_xchacha20_xor_ic(c, m, n, ic, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_salsa20 = function (c, n, k) {
if (n?.byteLength !== binding.crypto_stream_salsa20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_salsa20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_salsa20(c, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_salsa20_xor = function (c, m, n, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_salsa20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_salsa20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_salsa20_xor(c, m, n, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_stream_salsa20_xor_ic = function (c, m, n, ic, k) {
if (c?.byteLength !== m.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (n?.byteLength !== binding.crypto_stream_salsa20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_salsa20_KEYBYTES)
throw new Error('k')
const res = binding.crypto_stream_salsa20_xor_ic(c, m, n, ic, k)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_auth
exports.crypto_auth = function (out, input, k) {
if (out?.byteLength !== binding.crypto_auth_BYTES) throw new Error('out')
if (k?.byteLength !== binding.crypto_auth_KEYBYTES) throw new Error('k')
const res = binding.crypto_auth(out, input, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_auth_verify = function (h, input, k) {
if (h?.byteLength !== binding.crypto_auth_BYTES) throw new Error('h')
if (k?.byteLength !== binding.crypto_auth_KEYBYTES) throw new Error('k')
return binding.crypto_auth_verify(h, input, k)
}
// crypto_onetimeauth
exports.crypto_onetimeauth = function (out, input, k) {
if (out?.byteLength !== binding.crypto_onetimeauth_BYTES)
throw new Error('out')
if (k?.byteLength !== binding.crypto_onetimeauth_KEYBYTES)
throw new Error('k')
const res = binding.crypto_onetimeauth(out, input, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_onetimeauth_init = function (state, k) {
if (state?.byteLength !== binding.crypto_onetimeauth_STATEBYTES)
throw new Error("state must be 'crypto_onetimeauth_STATEBYTES' bytes")
if (k?.byteLength !== binding.crypto_onetimeauth_KEYBYTES)
throw new Error('k')
const res = binding.crypto_onetimeauth_init(state, k)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_onetimeauth_update = function (state, input) {
if (state?.byteLength !== binding.crypto_onetimeauth_STATEBYTES)
throw new Error("state must be 'crypto_onetimeauth_STATEBYTES' bytes")
const res = binding.crypto_onetimeauth_update(state, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_onetimeauth_final = function (state, out) {
if (state?.byteLength !== binding.crypto_onetimeauth_STATEBYTES)
throw new Error("state must be 'crypto_onetimeauth_STATEBYTES' bytes")
if (out?.byteLength !== binding.crypto_onetimeauth_BYTES)
throw new Error('out')
const res = binding.crypto_onetimeauth_final(state, out)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_onetimeauth_verify = function (h, input, k) {
if (h?.byteLength !== binding.crypto_onetimeauth_BYTES) throw new Error('h')
if (k?.byteLength !== binding.crypto_onetimeauth_KEYBYTES)
throw new Error('k')
return binding.crypto_onetimeauth_verify(h, input, k)
}
// crypto_pwhash
exports.crypto_pwhash = function (out, passwd, salt, opslimit, memlimit, alg) {
if (out?.byteLength < binding.crypto_pwhash_BYTES_MIN) throw new Error('out')
if (out?.byteLength > binding.crypto_pwhash_BYTES_MAX) throw new Error('out')
if (salt?.byteLength !== binding.crypto_pwhash_SALTBYTES)
throw new Error('salt')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
if (alg < 1 || alg > 2)
throw new Error('alg must be either Argon2i 1.3 or Argon2id 1.3')
const res = binding.crypto_pwhash(out, passwd, salt, opslimit, memlimit, alg)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_pwhash_async = function (
out,
passwd,
salt,
opslimit,
memlimit,
alg,
callback = undefined
) {
if (out?.byteLength < binding.crypto_pwhash_BYTES_MIN) throw new Error('out')
if (out?.byteLength > binding.crypto_pwhash_BYTES_MAX) throw new Error('out')
if (salt?.byteLength !== binding.crypto_pwhash_SALTBYTES)
throw new Error('salt')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
if (alg < 1 || alg > 2)
throw new Error('alg must be either Argon2i 1.3 or Argon2id 1.3')
const [done, promise] = checkStatus(callback)
binding.crypto_pwhash_async(
out.buffer,
out.byteOffset,
out.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
salt.buffer,
salt.byteOffset,
salt.byteLength,
opslimit,
memlimit,
alg,
done
)
return promise
}
exports.crypto_pwhash_str = function (out, passwd, opslimit, memlimit) {
if (out?.byteLength !== binding.crypto_pwhash_STRBYTES) throw new Error('out')
if (typeof opslimit !== 'number') throw new Error('opslimit')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (typeof memlimit !== 'number') throw new Error('memlimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
const res = binding.crypto_pwhash_str(out, passwd, opslimit, memlimit)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_pwhash_str_async = function (
out,
passwd,
opslimit,
memlimit,
callback = undefined
) {
if (out?.byteLength !== binding.crypto_pwhash_STRBYTES) throw new Error('out')
if (!passwd?.byteLength) throw new Error('passwd')
if (typeof opslimit !== 'number') throw new Error('opslimit')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (typeof memlimit !== 'number') throw new Error('memlimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
const [done, promise] = checkStatus(callback)
binding.crypto_pwhash_str_async(
out.buffer,
out.byteOffset,
out.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
opslimit,
memlimit,
done
)
return promise
}
exports.crypto_pwhash_str_verify = function (str, passwd) {
if (str?.byteLength !== binding.crypto_pwhash_STRBYTES) throw new Error('str')
return binding.crypto_pwhash_str_verify(str, passwd)
}
exports.crypto_pwhash_str_verify_async = function (
str,
passwd,
callback = undefined
) {
if (str?.byteLength !== binding.crypto_pwhash_STRBYTES) throw new Error('str')
if (!passwd?.byteLength) throw new Error('passwd')
const [done, promise] = checkStatus(callback, true)
binding.crypto_pwhash_str_verify_async(
str.buffer,
str.byteOffset,
str.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
done
)
return promise
}
exports.crypto_pwhash_str_needs_rehash = function (str, opslimit, memlimit) {
if (str?.byteLength !== binding.crypto_pwhash_STRBYTES) throw new Error('str')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
return binding.crypto_pwhash_str_needs_rehash(str, opslimit, memlimit)
}
exports.crypto_pwhash_scryptsalsa208sha256 = function (
out,
passwd,
salt,
opslimit,
memlimit
) {
if (out?.byteLength < binding.crypto_pwhash_scryptsalsa208sha256_BYTES_MIN)
throw new Error('out')
if (out?.byteLength > binding.crypto_pwhash_scryptsalsa208sha256_BYTES_MAX)
throw new Error('out')
if (salt?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_SALTBYTES)
throw new Error('salt')
if (opslimit < binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MIN)
throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MAX)
throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MIN)
throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MAX)
throw new Error('memlimit')
const res = binding.crypto_pwhash_scryptsalsa208sha256(
out,
passwd,
salt,
opslimit,
memlimit
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_pwhash_scryptsalsa208sha256_async = function (
out,
passwd,
salt,
opslimit,
memlimit,
callback = undefined
) {
if (out?.byteLength < binding.crypto_pwhash_scryptsalsa208sha256_BYTES_MIN)
throw new Error('out')
if (out?.byteLength > binding.crypto_pwhash_scryptsalsa208sha256_BYTES_MAX)
throw new Error('out')
if (!passwd?.byteLength) throw new Error('passwd')
if (salt?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_SALTBYTES)
throw new Error('salt')
if (opslimit < binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MIN)
throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MAX)
throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MIN)
throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MAX)
throw new Error('memlimit')
const [done, promise] = checkStatus(callback)
binding.crypto_pwhash_scryptsalsa208sha256_async(
out.buffer,
out.byteOffset,
out.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
salt.buffer,
salt.byteOffset,
salt.byteLength,
opslimit,
memlimit,
done
)
return promise
}
exports.crypto_pwhash_scryptsalsa208sha256_str_async = function (
out,
passwd,
opslimit,
memlimit,
callback = undefined
) {
if (out?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_STRBYTES)
throw new Error('out')
if (!passwd?.byteLength) throw new Error('passwd')
if (opslimit < binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MIN)
throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MAX)
throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MIN)
throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MAX)
throw new Error('memlimit')
const [done, promise] = checkStatus(callback)
binding.crypto_pwhash_scryptsalsa208sha256_str_async(
out.buffer,
out.byteOffset,
out.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
opslimit,
memlimit,
done
)
return promise
}
exports.crypto_pwhash_scryptsalsa208sha256_str = function (
out,
passwd,
opslimit,
memlimit
) {
if (out?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_STRBYTES)
throw new Error('out')
if (!passwd?.byteLength) throw new Error('passwd')
if (opslimit < binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MIN)
throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MAX)
throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MIN)
throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MAX)
throw new Error('memlimit')
const res = binding.crypto_pwhash_scryptsalsa208sha256_str(
out,
passwd,
opslimit,
memlimit
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_pwhash_scryptsalsa208sha256_str_verify_async = function (
str,
passwd,
callback = undefined
) {
if (str?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_STRBYTES)
throw new Error('str')
if (!passwd?.byteLength) throw new Error('passwd')
const [done, promise] = checkStatus(callback, true)
binding.crypto_pwhash_scryptsalsa208sha256_str_verify_async(
str.buffer,
str.byteOffset,
str.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
done
)
return promise
}
exports.crypto_pwhash_scryptsalsa208sha256_str_verify = function (str, passwd) {
if (str?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_STRBYTES)
throw new Error('str')
if (!passwd?.byteLength) throw new Error('passwd')
return binding.crypto_pwhash_scryptsalsa208sha256_str_verify(str, passwd)
}
exports.crypto_pwhash_scryptsalsa208sha256_str_needs_rehash = function (
str,
opslimit,
memlimit
) {
if (str?.byteLength !== binding.crypto_pwhash_scryptsalsa208sha256_STRBYTES)
throw new Error('str')
if (opslimit < binding.crypto_pwhash_OPSLIMIT_MIN) throw new Error('opslimit')
if (opslimit > binding.crypto_pwhash_OPSLIMIT_MAX) throw new Error('opslimit')
if (memlimit < binding.crypto_pwhash_MEMLIMIT_MIN) throw new Error('memlimit')
if (memlimit > binding.crypto_pwhash_MEMLIMIT_MAX) throw new Error('memlimit')
return binding.crypto_pwhash_scryptsalsa208sha256_str_needs_rehash(
str,
opslimit,
memlimit
)
}
// crypto_kx
exports.crypto_kx_keypair = function (pk, sk) {
if (pk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES) throw new Error('pk')
if (sk?.byteLength !== binding.crypto_kx_SECRETKEYBYTES) throw new Error('sk')
const res = binding.crypto_kx_keypair(pk, sk)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_kx_seed_keypair = function (pk, sk, seed) {
if (pk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES) throw new Error('pk')
if (sk?.byteLength !== binding.crypto_kx_SECRETKEYBYTES) throw new Error('sk')
if (seed?.byteLength !== binding.crypto_kx_SEEDBYTES) throw new Error('seed')
const res = binding.crypto_kx_seed_keypair(pk, sk, seed)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_kx_client_session_keys = function (
rx,
tx,
clientPk,
clientSk,
serverPk
) {
// match `std::optional` by coercing null to undefined
rx ??= undefined
tx ??= undefined
if (!rx && !tx) throw new Error('at least one session key must be specified')
if (rx) {
if (rx?.byteLength !== binding.crypto_kx_SESSIONKEYBYTES)
throw new Error(
'receiving key buffer must be "crypto_kx_SESSIONKEYBYTES" bytes or null'
)
} else {
if (tx?.byteLength !== binding.crypto_kx_SESSIONKEYBYTES)
throw new Error(
'transmitting key buffer must be "crypto_kx_SESSIONKEYBYTES" bytes or null'
)
}
if (clientPk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES)
throw new Error('client_pk')
if (clientSk?.byteLength !== binding.crypto_kx_SECRETKEYBYTES)
throw new Error('client_sk')
if (serverPk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES)
throw new Error('server_pk')
const res = binding.crypto_kx_client_session_keys(
rx,
tx,
clientPk,
clientSk,
serverPk
)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_kx_server_session_keys = function (
rx,
tx,
serverPk,
serverSk,
clientPk
) {
rx ??= undefined
tx ??= undefined
if (!rx && !tx) throw new Error('at least one session key must be specified')
if (rx) {
if (rx?.byteLength !== binding.crypto_kx_SESSIONKEYBYTES)
throw new Error(
'receiving key buffer must be "crypto_kx_SESSIONKEYBYTES" bytes or null'
)
} else {
if (tx?.byteLength !== binding.crypto_kx_SESSIONKEYBYTES)
throw new Error(
'transmitting key buffer must be "crypto_kx_SESSIONKEYBYTES" bytes or null'
)
}
if (serverPk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES)
throw new Error('server_pk')
if (serverSk?.byteLength !== binding.crypto_kx_SECRETKEYBYTES)
throw new Error('server_sk')
if (clientPk?.byteLength !== binding.crypto_kx_PUBLICKEYBYTES)
throw new Error('client_pk')
const res = binding.crypto_kx_server_session_keys(
rx,
tx,
serverPk,
serverSk,
clientPk
)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_scalarmult
exports.crypto_scalarmult_base = function (q, n) {
if (q?.byteLength !== binding.crypto_scalarmult_BYTES) throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_SCALARBYTES)
throw new Error('n')
const res = binding.crypto_scalarmult_base(q, n)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_scalarmult = function (q, n, p) {
if (q?.byteLength !== binding.crypto_scalarmult_BYTES) throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_SCALARBYTES)
throw new Error('n')
if (p?.byteLength !== binding.crypto_scalarmult_BYTES) throw new Error('p')
const res = binding.crypto_scalarmult(q, n, p)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_scalarmult_ed25519_base = function (q, n) {
if (q?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_ed25519_SCALARBYTES)
throw new Error('n')
const res = binding.crypto_scalarmult_ed25519_base(q, n)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_scalarmult_ed25519 = function (q, n, p) {
if (q?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_ed25519_SCALARBYTES)
throw new Error('n')
if (p?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('p')
const res = binding.crypto_scalarmult_ed25519(q, n, p)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_core_ed25519_is_valid_point = function (p) {
if (p?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('p')
return binding.crypto_core_ed25519_is_valid_point(p)
}
exports.crypto_core_ed25519_from_uniform = function (p, r) {
if (p?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('p')
if (r?.byteLength !== binding.crypto_core_ed25519_UNIFORMBYTES)
throw new Error('r')
const res = binding.crypto_core_ed25519_from_uniform(p, r)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_scalarmult_ed25519_base_noclamp = function (q, n) {
if (q?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_ed25519_SCALARBYTES)
throw new Error('n')
const res = binding.crypto_scalarmult_ed25519_base_noclamp(q, n)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_scalarmult_ed25519_noclamp = function (q, n, p) {
if (q?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('q')
if (n?.byteLength !== binding.crypto_scalarmult_ed25519_SCALARBYTES)
throw new Error('n')
if (p?.byteLength !== binding.crypto_scalarmult_ed25519_BYTES)
throw new Error('p')
const res = binding.crypto_scalarmult_ed25519_noclamp(q, n, p)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_core
exports.crypto_core_ed25519_add = function (r, p, q) {
if (r?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('r')
if (p?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('p')
if (q?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('q')
const res = binding.crypto_core_ed25519_add(r, p, q)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_core_ed25519_sub = function (r, p, q) {
if (r?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('r')
if (p?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('p')
if (q?.byteLength !== binding.crypto_core_ed25519_BYTES) throw new Error('q')
const res = binding.crypto_core_ed25519_sub(r, p, q)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_core_ed25519_scalar_random = function (r) {
if (r?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('r')
binding.crypto_core_ed25519_scalar_random(r)
}
exports.crypto_core_ed25519_scalar_reduce = function (r, s) {
if (r?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('r')
if (s?.byteLength !== binding.crypto_core_ed25519_NONREDUCEDSCALARBYTES)
throw new Error('s')
binding.crypto_core_ed25519_scalar_reduce(r, s)
}
exports.crypto_core_ed25519_scalar_invert = function (recip, s) {
if (recip?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('recip')
if (s?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('s')
binding.crypto_core_ed25519_scalar_invert(recip, s)
}
exports.crypto_core_ed25519_scalar_negate = function (neg, s) {
if (neg?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('neg')
if (s?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('s')
binding.crypto_core_ed25519_scalar_negate(neg, s)
}
exports.crypto_core_ed25519_scalar_complement = function (comp, s) {
if (comp?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('comp')
if (s?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('s')
binding.crypto_core_ed25519_scalar_complement(comp, s)
}
exports.crypto_core_ed25519_scalar_add = function (z, x, y) {
if (z?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('z')
if (x?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('x')
if (y?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('y')
binding.crypto_core_ed25519_scalar_add(z, x, y)
}
exports.crypto_core_ed25519_scalar_sub = function (z, x, y) {
if (z?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('z')
if (x?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('x')
if (y?.byteLength !== binding.crypto_core_ed25519_SCALARBYTES)
throw new Error('y')
binding.crypto_core_ed25519_scalar_sub(z, x, y)
}
// crypto_shorthash
exports.crypto_shorthash = function (out, input, k) {
if (out?.byteLength !== binding.crypto_shorthash_BYTES) throw new Error('out')
if (k?.byteLength !== binding.crypto_shorthash_KEYBYTES) throw new Error('k')
const res = binding.crypto_shorthash(out, input, k)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_kdf
exports.crypto_kdf_keygen = function (key) {
if (key?.byteLength !== binding.crypto_kdf_KEYBYTES) throw new Error('key')
binding.crypto_kdf_keygen(key)
}
exports.crypto_kdf_derive_from_key = function (subkey, subkeyId, ctx, key) {
if (subkey?.byteLength < binding.crypto_kdf_BYTES_MIN)
throw new Error('subkey')
if (subkey?.byteLength > binding.crypto_kdf_BYTES_MAX)
throw new Error('subkey')
if (ctx?.byteLength !== binding.crypto_kdf_CONTEXTBYTES)
throw new Error('ctx')
if (key?.byteLength !== binding.crypto_kdf_KEYBYTES) throw new Error('key')
const res = binding.crypto_kdf_derive_from_key(subkey, subkeyId, ctx, key)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_hash
exports.crypto_hash = function (out, input) {
if (out?.byteLength !== binding.crypto_hash_BYTES) throw new Error('out')
const res = binding.crypto_hash(out, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha256 = function (out, input) {
if (out?.byteLength !== binding.crypto_hash_sha256_BYTES)
throw new Error('out')
const res = binding.crypto_hash_sha256(out, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha256_init = function (state) {
if (state?.byteLength !== binding.crypto_hash_sha256_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha256_STATEBYTES' bytes")
}
const res = binding.crypto_hash_sha256_init(state)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha256_update = function (state, input) {
if (state?.byteLength !== binding.crypto_hash_sha256_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha256_STATEBYTES' bytes")
}
const res = binding.crypto_hash_sha256_update(state, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha256_final = function (state, out) {
if (state?.byteLength !== binding.crypto_hash_sha256_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha256_STATEBYTES' bytes")
}
if (out?.byteLength !== binding.crypto_hash_sha256_BYTES)
throw new Error('state')
const res = binding.crypto_hash_sha256_final(state, out)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha512 = function (out, input) {
if (out?.byteLength !== binding.crypto_hash_sha512_BYTES)
throw new Error('out')
const res = binding.crypto_hash_sha512(out, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha512_init = function (state) {
if (state?.byteLength !== binding.crypto_hash_sha512_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha512_STATEBYTES' bytes")
}
const res = binding.crypto_hash_sha512_init(state)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha512_update = function (state, input) {
if (state?.byteLength !== binding.crypto_hash_sha512_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha512_STATEBYTES' bytes")
}
const res = binding.crypto_hash_sha512_update(state, input)
if (res !== 0) throw new Error('status: ' + res)
}
exports.crypto_hash_sha512_final = function (state, out) {
if (state?.byteLength !== binding.crypto_hash_sha512_STATEBYTES) {
throw new Error("state must be 'crypto_hash_sha512_STATEBYTES' bytes")
}
if (out?.byteLength !== binding.crypto_hash_sha512_BYTES)
throw new Error('out')
const res = binding.crypto_hash_sha512_final(state, out)
if (res !== 0) throw new Error('status: ' + res)
}
// crypto_aead
exports.crypto_aead_xchacha20poly1305_ietf_keygen = function (k) {
if (k?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
binding.crypto_aead_xchacha20poly1305_ietf_keygen(k)
}
exports.crypto_aead_xchacha20poly1305_ietf_encrypt = function (
c,
m,
ad,
nsec = null,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (
c?.byteLength !==
m.byteLength + binding.crypto_aead_xchacha20poly1305_ietf_ABYTES
)
throw new Error(
'c must "m.byteLength + crypto_aead_xchacha20poly1305_ietf_ABYTES" bytes'
)
if (c?.byteLength > 0xffffffff)
throw new Error('c.byteLength must be a 32bit integer')
if (npub?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_xchacha20poly1305_ietf_encrypt(
c,
m,
ad,
npub,
k
)
if (res < 0) throw new Error('could not encrypt data')
return res
}
exports.crypto_aead_xchacha20poly1305_ietf_decrypt = function (
m,
nsec = null,
c,
ad,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (
m?.byteLength !==
c.byteLength - binding.crypto_aead_xchacha20poly1305_ietf_ABYTES
)
throw new Error(
'm must "c.byteLength - crypto_aead_xchacha20poly1305_ietf_ABYTES" bytes'
)
if (m?.byteLength > 0xffffffff)
throw new Error('m.byteLength must be a 32bit integer')
if (npub?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_xchacha20poly1305_ietf_decrypt(
m,
c,
ad,
npub,
k
)
if (res < 0) throw new Error('could not verify data')
return res
}
exports.crypto_aead_xchacha20poly1305_ietf_encrypt_detached = function (
c,
mac,
m,
ad,
nsec = null,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_ABYTES)
throw new Error('mac')
if (npub?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_xchacha20poly1305_ietf_encrypt_detached(
c,
mac,
m,
ad,
npub,
k
)
if (res < 0) throw new Error('could not encrypt data')
return res
}
exports.crypto_aead_xchacha20poly1305_ietf_decrypt_detached = function (
m,
nsec = null,
c,
mac,
ad,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (m?.byteLength !== c.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_ABYTES)
throw new Error('mac')
if (npub?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_xchacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_xchacha20poly1305_ietf_decrypt_detached(
m,
c,
mac,
ad,
npub,
k
)
if (res !== 0) throw new Error('could not verify data')
}
exports.crypto_aead_chacha20poly1305_ietf_keygen = function (k) {
if (k?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
binding.crypto_aead_chacha20poly1305_ietf_keygen(k)
}
exports.crypto_aead_chacha20poly1305_ietf_encrypt = function (
c,
m,
ad,
nsec = null,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (
c?.byteLength !==
m.byteLength + binding.crypto_aead_chacha20poly1305_ietf_ABYTES
)
throw new Error(
'c must "m.byteLength + crypto_aead_chacha20poly1305_ietf_ABYTES" bytes'
)
if (c?.byteLength > 0xffffffff)
throw new Error('c.byteLength must be a 32bit integer')
if (npub?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_chacha20poly1305_ietf_encrypt(
c,
m,
ad,
npub,
k
)
if (res < 0) throw new Error('could not encrypt data')
return res
}
exports.crypto_aead_chacha20poly1305_ietf_decrypt = function (
m,
nsec = null,
c,
ad,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (
m?.byteLength !==
c.byteLength - binding.crypto_aead_chacha20poly1305_ietf_ABYTES
)
throw new Error(
'm must "c.byteLength - crypto_aead_chacha20poly1305_ietf_ABYTES" bytes'
)
if (m?.byteLength > 0xffffffff)
throw new Error('m.byteLength must be a 32bit integer')
if (npub?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_chacha20poly1305_ietf_decrypt(
m,
c,
ad,
npub,
k
)
if (res < 0) throw new Error('could not verify data')
return res
}
exports.crypto_aead_chacha20poly1305_ietf_encrypt_detached = function (
c,
mac,
m,
ad,
nsec = null,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_ABYTES)
throw new Error('mac')
if (npub?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_chacha20poly1305_ietf_encrypt_detached(
c,
mac,
m,
ad,
npub,
k
)
if (res < 0) throw new Error('could not encrypt data')
return res
}
exports.crypto_aead_chacha20poly1305_ietf_decrypt_detached = function (
m,
nsec = null,
c,
mac,
ad,
npub,
k
) {
ad ??= undefined
if (nsec !== null) throw new Error('nsec must always be set to null')
if (m?.byteLength !== c.byteLength)
throw new Error('m must be "c.byteLength" bytes')
if (mac?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_ABYTES)
throw new Error('mac')
if (npub?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_NPUBBYTES)
throw new Error('npub')
if (k?.byteLength !== binding.crypto_aead_chacha20poly1305_ietf_KEYBYTES)
throw new Error('k')
const res = binding.crypto_aead_chacha20poly1305_ietf_decrypt_detached(
m,
c,
mac,
ad,
npub,
k
)
if (res !== 0) throw new Error('could not verify data')
}
// crypto_stream
exports.crypto_stream_xor_wrap_init = function (state, n, k) {
if (state?.byteLength !== binding.sn_crypto_stream_xor_STATEBYTES) {
throw new Error("state must be 'sn_crypto_stream_xor_STATEBYTES' bytes")
}
if (n?.byteLength !== binding.crypto_stream_NONCEBYTES) throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_KEYBYTES) throw new Error('k')
binding.crypto_stream_xor_wrap_init(state, n, k)
}
exports.crypto_stream_xor_wrap_update = function (state, c, m) {
if (state?.byteLength !== binding.sn_crypto_stream_xor_STATEBYTES) {
throw new Error("state must be 'sn_crypto_stream_xor_STATEBYTES' bytes")
}
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
binding.crypto_stream_xor_wrap_update(state, c, m)
}
exports.crypto_stream_xor_wrap_final = function (state) {
if (state?.byteLength !== binding.sn_crypto_stream_xor_STATEBYTES) {
throw new Error("state must be 'sn_crypto_stream_xor_STATEBYTES' bytes")
}
binding.crypto_stream_xor_wrap_final(state)
}
exports.crypto_stream_chacha20_xor_wrap_init = function (state, n, k) {
if (state?.byteLength !== binding.crypto_stream_chacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_chacha20_xor_STATEBYTES' bytes"
)
}
if (n?.byteLength !== binding.crypto_stream_chacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_KEYBYTES)
throw new Error('k')
binding.crypto_stream_chacha20_xor_wrap_init(state, n, k)
}
exports.crypto_stream_chacha20_xor_wrap_update = function (state, c, m) {
if (state?.byteLength !== binding.crypto_stream_chacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_chacha20_xor_STATEBYTES' bytes"
)
}
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
binding.crypto_stream_chacha20_xor_wrap_update(state, c, m)
}
exports.crypto_stream_chacha20_xor_wrap_final = function (state) {
if (state?.byteLength !== binding.crypto_stream_chacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_chacha20_xor_STATEBYTES' bytes"
)
}
binding.crypto_stream_chacha20_xor_wrap_final(state)
}
exports.crypto_stream_chacha20_ietf_xor_wrap_init = function (state, n, k) {
if (
state?.byteLength !== binding.crypto_stream_chacha20_ietf_xor_STATEBYTES
) {
throw new Error(
"state must be 'crypto_stream_chacha20_ietf_xor_STATEBYTES' bytes"
)
}
if (n?.byteLength !== binding.crypto_stream_chacha20_ietf_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_chacha20_ietf_KEYBYTES)
throw new Error('k')
binding.crypto_stream_chacha20_ietf_xor_wrap_init(state, n, k)
}
exports.crypto_stream_chacha20_ietf_xor_wrap_update = function (state, c, m) {
if (
state?.byteLength !== binding.crypto_stream_chacha20_ietf_xor_STATEBYTES
) {
throw new Error(
"state must be 'crypto_stream_chacha20_ietf_xor_STATEBYTES' bytes"
)
}
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
binding.crypto_stream_chacha20_ietf_xor_wrap_update(state, c, m)
}
exports.crypto_stream_chacha20_ietf_xor_wrap_final = function (state) {
if (
state?.byteLength !== binding.crypto_stream_chacha20_ietf_xor_STATEBYTES
) {
throw new Error(
"state must be 'crypto_stream_chacha20_ietf_xor_STATEBYTES' bytes"
)
}
binding.crypto_stream_chacha20_ietf_xor_wrap_final(state)
}
exports.crypto_stream_xchacha20_xor_wrap_init = function (state, n, k) {
if (state?.byteLength !== binding.crypto_stream_xchacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_xchacha20_xor_STATEBYTES' bytes"
)
}
if (n?.byteLength !== binding.crypto_stream_xchacha20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_xchacha20_KEYBYTES)
throw new Error('k')
binding.crypto_stream_xchacha20_xor_wrap_init(state, n, k)
}
exports.crypto_stream_xchacha20_xor_wrap_update = function (state, c, m) {
if (state?.byteLength !== binding.crypto_stream_xchacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_xchacha20_xor_STATEBYTES' bytes"
)
}
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
binding.crypto_stream_xchacha20_xor_wrap_update(state, c, m)
}
exports.crypto_stream_xchacha20_xor_wrap_final = function (state) {
if (state?.byteLength !== binding.crypto_stream_xchacha20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_xchacha20_xor_STATEBYTES' bytes"
)
}
binding.crypto_stream_xchacha20_xor_wrap_final(state)
}
exports.crypto_stream_salsa20_xor_wrap_init = function (state, n, k) {
if (state?.byteLength !== binding.crypto_stream_salsa20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_salsa20_xor_STATEBYTES' bytes"
)
}
if (n?.byteLength !== binding.crypto_stream_salsa20_NONCEBYTES)
throw new Error('n')
if (k?.byteLength !== binding.crypto_stream_salsa20_KEYBYTES)
throw new Error('k')
binding.crypto_stream_salsa20_xor_wrap_init(state, n, k)
}
exports.crypto_stream_salsa20_xor_wrap_update = function (state, c, m) {
if (state?.byteLength !== binding.crypto_stream_salsa20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_salsa20_xor_STATEBYTES' bytes"
)
}
if (c?.byteLength !== m.byteLength)
throw new Error('c must be "m.byteLength" bytes')
binding.crypto_stream_salsa20_xor_wrap_update(state, c, m)
}
exports.crypto_stream_salsa20_xor_wrap_final = function (state) {
if (state?.byteLength !== binding.crypto_stream_salsa20_xor_STATEBYTES) {
throw new Error(
"state must be 'crypto_stream_salsa20_xor_STATEBYTES' bytes"
)
}
binding.crypto_stream_salsa20_xor_wrap_final(state)
}
// experimental
exports.extension_tweak_ed25519_base = function (n, p, ns) {
if (n?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('n')
if (p?.byteLength !== binding.extension_tweak_ed25519_BYTES)
throw new Error('p')
binding.extension_tweak_ed25519_base(n, p, ns)
}
exports.extension_tweak_ed25519_sign_detached = function (sig, m, scalar, pk) {
if (sig?.byteLength !== binding.crypto_sign_BYTES) throw new Error('sig')
if (scalar?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar')
if (pk && pk.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
const res = binding.extension_tweak_ed25519_sign_detached(sig, m, scalar, pk)
if (res !== 0) throw new Error('failed to compute signature')
}
exports.extension_tweak_ed25519_sk_to_scalar = function (n, sk) {
if (n?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('n')
if (sk?.byteLength !== binding.crypto_sign_SECRETKEYBYTES)
throw new Error('sk')
binding.extension_tweak_ed25519_sk_to_scalar(n, sk)
}
exports.extension_tweak_ed25519_scalar = function (scalarOut, scalar, ns) {
if (scalarOut?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_out')
if (scalar?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar')
binding.extension_tweak_ed25519_scalar(scalarOut, scalar, ns)
}
exports.extension_tweak_ed25519_pk = function (tpk, pk, ns) {
if (tpk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('tpk')
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
const res = binding.extension_tweak_ed25519_pk(tpk, pk, ns)
if (res !== 0) throw new Error('failed to tweak public key')
}
exports.extension_tweak_ed25519_keypair = function (
pk,
scalarOut,
scalarIn,
ns
) {
if (pk?.byteLength !== binding.extension_tweak_ed25519_BYTES)
throw new Error('pk')
if (scalarOut?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_out')
if (scalarIn?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_in')
binding.extension_tweak_ed25519_keypair(pk, scalarOut, scalarIn, ns)
}
exports.extension_tweak_ed25519_scalar_add = function (scalarOut, scalar, n) {
if (scalarOut?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_out')
if (scalar?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar')
if (n?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('n')
binding.extension_tweak_ed25519_scalar_add(scalarOut, scalar, n)
}
exports.extension_tweak_ed25519_pk_add = function (tpk, pk, p) {
if (tpk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('tpk')
if (pk?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES)
throw new Error('pk')
if (p?.byteLength !== binding.crypto_sign_PUBLICKEYBYTES) throw new Error('p')
const res = binding.extension_tweak_ed25519_pk_add(tpk, pk, p)
if (res !== 0) throw new Error('failed to add tweak to public key')
}
exports.extension_tweak_ed25519_keypair_add = function (
pk,
scalarOut,
scalarIn,
tweak
) {
if (pk?.byteLength !== binding.extension_tweak_ed25519_BYTES)
throw new Error('pk')
if (scalarOut?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_out')
if (scalarIn?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('scalar_in')
if (tweak?.byteLength !== binding.extension_tweak_ed25519_SCALARBYTES)
throw new Error('tweak')
const res = binding.extension_tweak_ed25519_keypair_add(
pk,
scalarOut,
scalarIn,
tweak
)
if (res !== 0) throw new Error('failed to add tweak to keypair')
}
exports.extension_pbkdf2_sha512_async = function (
out,
passwd,
salt,
iter,
outlen,
callback = undefined
) {
if (iter < binding.extension_pbkdf2_sha512_ITERATIONS_MIN)
throw new Error('iterations')
if (outlen > binding.extension_pbkdf2_sha512_BYTES_MAX)
throw new Error('outlen')
if (out?.byteLength < outlen) throw new Error('out')
if (!out?.byteLength) throw new Error('out')
if (!passwd?.byteLength) throw new Error('passwd')
if (!salt?.byteLength) throw new Error('salt')
const [done, promise] = checkStatus(callback)
binding.extension_pbkdf2_sha512_async(
out.buffer,
out.byteOffset,
out.byteLength,
passwd.buffer,
passwd.byteOffset,
passwd.byteLength,
salt.buffer,
salt.byteOffset,
salt.byteLength,
iter,
outlen,
done
)
return promise
}
exports.extension_pbkdf2_sha512 = function (out, passwd, salt, iter, outlen) {
if (iter < binding.extension_pbkdf2_sha512_ITERATIONS_MIN)
throw new Error('iterations')
if (outlen > binding.extension_pbkdf2_sha512_BYTES_MAX)
throw new Error('outlen')
if (out?.byteLength < outlen) throw new Error('out')
const res = binding.extension_pbkdf2_sha512(out, passwd, salt, iter, outlen)
if (res !== 0) throw new Error('failed to add tweak to public key')
}
function checkStatus(callback, booleanResult = false) {
let done, promise
if (typeof callback === 'function') {
done = function (status) {
if (booleanResult) callback(null, status === 0)
else if (status === 0) callback(null)
else callback(new Error('status: ' + status))
}
} else {
promise = new Promise(function (resolve, reject) {
done = function (status) {
if (booleanResult) resolve(status === 0)
else if (status === 0) resolve()
else reject(new Error('status: ' + status))
}
})
}
return [done, promise]
}