Press n or j to go to the next uncovered block, b, p or k for the previous block.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | 1x 1x 1x 1x 2x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 3x 3x 3x 3x 3x 3x 3x 3x 3x 3x 3x 3x 1x 1x 1x 1x 1x 1x 1x 2x 2x 1x 1x 1x 3x 3x 2x | import * as crypto from 'crypto' import * as bip39 from 'bip39' import * as triplesec from 'triplesec' /** * Encrypt a raw mnemonic phrase to be password protected * @param {string} phrase - Raw mnemonic phrase * @param {string} password - Password to encrypt mnemonic with * @return {Promise<Buffer>} The encrypted phrase * @private * @ignore * */ export function encryptMnemonic(phrase: string, password: string) { return Promise.resolve().then(() => { // must be bip39 mnemonic if (!bip39.validateMnemonic(phrase)) { throw new Error('Not a valid bip39 nmemonic') } // normalize plaintext to fixed length byte string const plaintextNormalized = Buffer.from( bip39.mnemonicToEntropy(phrase), 'hex' ) // AES-128-CBC with SHA256 HMAC const salt = crypto.randomBytes(16) const keysAndIV = crypto.pbkdf2Sync(password, salt, 100000, 48, 'sha512') const encKey = keysAndIV.slice(0, 16) const macKey = keysAndIV.slice(16, 32) const iv = keysAndIV.slice(32, 48) const cipher = crypto.createCipheriv('aes-128-cbc', encKey, iv) let cipherText = cipher.update(plaintextNormalized).toString('hex') cipherText += cipher.final().toString('hex') const hmacPayload = Buffer.concat([salt, Buffer.from(cipherText, 'hex')]) const hmac = crypto.createHmac('sha256', macKey) hmac.write(hmacPayload) const hmacDigest = hmac.digest() const payload = Buffer.concat([salt, hmacDigest, Buffer.from(cipherText, 'hex')]) return payload }) } // Used to distinguish bad password during decrypt vs invalid format class PasswordError extends Error { } /** * @ignore */ function decryptMnemonicBuffer(dataBuffer: Buffer, password: string) { return Promise.resolve().then(() => { const salt = dataBuffer.slice(0, 16) const hmacSig = dataBuffer.slice(16, 48) // 32 bytes const cipherText = dataBuffer.slice(48) const hmacPayload = Buffer.concat([salt, cipherText]) const keysAndIV = crypto.pbkdf2Sync(password, salt, 100000, 48, 'sha512') const encKey = keysAndIV.slice(0, 16) const macKey = keysAndIV.slice(16, 32) const iv = keysAndIV.slice(32, 48) const decipher = crypto.createDecipheriv('aes-128-cbc', encKey, iv) let plaintext = decipher.update(cipherText).toString('hex') plaintext += decipher.final().toString('hex') const hmac = crypto.createHmac('sha256', macKey) hmac.write(hmacPayload) const hmacDigest = hmac.digest() // hash both hmacSig and hmacDigest so string comparison time // is uncorrelated to the ciphertext const hmacSigHash = crypto.createHash('sha256') .update(hmacSig) .digest() .toString('hex') const hmacDigestHash = crypto.createHash('sha256') .update(hmacDigest) .digest() .toString('hex') if (hmacSigHash !== hmacDigestHash) { // not authentic throw new PasswordError('Wrong password (HMAC mismatch)') } const mnemonic = bip39.entropyToMnemonic(plaintext) if (!bip39.validateMnemonic(mnemonic)) { throw new PasswordError('Wrong password (invalid plaintext)') } return mnemonic }) } /** * Decrypt legacy triplesec keys * @param {Buffer} dataBuffer - The encrypted key * @param {String} password - Password for data * @return {Promise<Buffer>} Decrypted seed * @private * @ignore */ function decryptLegacy(dataBuffer: Buffer, password: string) { return new Promise<Buffer>((resolve, reject) => { triplesec.decrypt( { key: Buffer.from(password), data: dataBuffer }, (err, plaintextBuffer) => { if (!err) { resolve(plaintextBuffer) } else { reject(err) } } ) }) } /** * Encrypt a raw mnemonic phrase with a password * @param {string | Buffer} data - Buffer or hex-encoded string of the encrypted mnemonic * @param {string} password - Password for data * @return {Promise<string>} the raw mnemonic phrase * @private * @ignore */ export function decryptMnemonic(data: (string | Buffer), password: string): Promise<string> { const dataBuffer = Buffer.isBuffer(data) ? data : Buffer.from(data, 'hex') return decryptMnemonicBuffer(dataBuffer, password).catch((err) => { // If it was a password error, don't even bother with legacy if (err instanceof PasswordError) { throw err } return decryptLegacy(dataBuffer, password).then(data => data.toString()) }) } |