diff options
Diffstat (limited to 'public')
-rw-r--r-- | public/scripts/chat.js | 4 | ||||
-rw-r--r-- | public/scripts/encryption.js | 18 |
2 files changed, 21 insertions, 1 deletions
diff --git a/public/scripts/chat.js b/public/scripts/chat.js index eac7246..b85a352 100644 --- a/public/scripts/chat.js +++ b/public/scripts/chat.js @@ -47,6 +47,8 @@ async function evaluateKeyGeneration() { pinInput.init(async (pin, tryCount) => { try { if (await encryption.getId(await encryption.getPublic()) !== peerId) throw "Not verified!"; + const fingerPrint = encryption.getFingerprint(pin); + console.log(fingerPrint); passphrase = new Buffer(crypto.createHmac('SHA256', pin).update(pin).digest('hex')).toString('base64'); await encryption.decryptPrivate(await encryption.getPrivate(), passphrase); chat() @@ -84,7 +86,7 @@ function chat() { $('#chat').fadeIn(); // start the peer - const peer = new Peer(peerId, {host: host, port: 4242, path: '/api', debug: 0}); + const peer = new Peer(peerId, {host: host, port: 4242, path: '/api', secure: true, debug: 0}); // Peer events peer.on('call', call => getMediaStream(stream => call.answer(stream))); // TODO: Ask for call accept diff --git a/public/scripts/encryption.js b/public/scripts/encryption.js index fc5665b..4e3eeb4 100644 --- a/public/scripts/encryption.js +++ b/public/scripts/encryption.js @@ -8,6 +8,8 @@ const Dexie = require('dexie'); const moment = require('moment'); const crypto = require('crypto'); +const jsSHA = require("jssha"); +const fingerprint = require('fingerprintjs2'); const openpgp = require('openpgp'); const swal = require('sweetalert'); @@ -248,6 +250,21 @@ async function getPeerPublicKey(peerId) { } /** + * Gets the unique fingerprint of the user + * @param passphrase + * @returns {Promise<String>} + */ +async function getUniqueFingerprint(passphrase) { + return await fingerprint.get(components => { + const passphraseHash = new Buffer(crypto.createHmac('SHA256', passphrase).update(passphrase).digest('hex')).toString('HEX'); + const userFingerprint = fingerprint.x64hash128(components.map(pair => pair.value).join(), 31); + console.log(passphraseHash + " - " + userFingerprint); + console.log(new Buffer(crypto.createHmac('SHA256', userFingerprint + passphraseHash).update(userFingerprint + passphraseHash).digest('hex')).toString('HEX')); + return new Buffer(crypto.createHmac('SHA256', userFingerprint + passphraseHash).update(userFingerprint + passphraseHash).digest('hex')).toString('HEX'); + }) +} + +/** * Returns user id of a public key * @param publicKey * @returns {Promise<String>} @@ -279,4 +296,5 @@ exports.getMsgs = getMessages; exports.store = storePeerPublicKey; exports.get = getPeerPublicKey; exports.getId = getPublicKeyUserId; +exports.getFingerprint = getUniqueFingerprint; exports.reset = reset; |