aboutsummaryrefslogtreecommitdiffhomepage
path: root/public
diff options
context:
space:
mode:
Diffstat (limited to 'public')
-rw-r--r--public/scripts/chat.js4
-rw-r--r--public/scripts/encryption.js18
2 files changed, 21 insertions, 1 deletions
diff --git a/public/scripts/chat.js b/public/scripts/chat.js
index eac7246..b85a352 100644
--- a/public/scripts/chat.js
+++ b/public/scripts/chat.js
@@ -47,6 +47,8 @@ async function evaluateKeyGeneration() {
pinInput.init(async (pin, tryCount) => {
try {
if (await encryption.getId(await encryption.getPublic()) !== peerId) throw "Not verified!";
+ const fingerPrint = encryption.getFingerprint(pin);
+ console.log(fingerPrint);
passphrase = new Buffer(crypto.createHmac('SHA256', pin).update(pin).digest('hex')).toString('base64');
await encryption.decryptPrivate(await encryption.getPrivate(), passphrase);
chat()
@@ -84,7 +86,7 @@ function chat() {
$('#chat').fadeIn();
// start the peer
- const peer = new Peer(peerId, {host: host, port: 4242, path: '/api', debug: 0});
+ const peer = new Peer(peerId, {host: host, port: 4242, path: '/api', secure: true, debug: 0});
// Peer events
peer.on('call', call => getMediaStream(stream => call.answer(stream))); // TODO: Ask for call accept
diff --git a/public/scripts/encryption.js b/public/scripts/encryption.js
index fc5665b..4e3eeb4 100644
--- a/public/scripts/encryption.js
+++ b/public/scripts/encryption.js
@@ -8,6 +8,8 @@
const Dexie = require('dexie');
const moment = require('moment');
const crypto = require('crypto');
+const jsSHA = require("jssha");
+const fingerprint = require('fingerprintjs2');
const openpgp = require('openpgp');
const swal = require('sweetalert');
@@ -248,6 +250,21 @@ async function getPeerPublicKey(peerId) {
}
/**
+ * Gets the unique fingerprint of the user
+ * @param passphrase
+ * @returns {Promise<String>}
+ */
+async function getUniqueFingerprint(passphrase) {
+ return await fingerprint.get(components => {
+ const passphraseHash = new Buffer(crypto.createHmac('SHA256', passphrase).update(passphrase).digest('hex')).toString('HEX');
+ const userFingerprint = fingerprint.x64hash128(components.map(pair => pair.value).join(), 31);
+ console.log(passphraseHash + " - " + userFingerprint);
+ console.log(new Buffer(crypto.createHmac('SHA256', userFingerprint + passphraseHash).update(userFingerprint + passphraseHash).digest('hex')).toString('HEX'));
+ return new Buffer(crypto.createHmac('SHA256', userFingerprint + passphraseHash).update(userFingerprint + passphraseHash).digest('hex')).toString('HEX');
+ })
+}
+
+/**
* Returns user id of a public key
* @param publicKey
* @returns {Promise<String>}
@@ -279,4 +296,5 @@ exports.getMsgs = getMessages;
exports.store = storePeerPublicKey;
exports.get = getPeerPublicKey;
exports.getId = getPublicKeyUserId;
+exports.getFingerprint = getUniqueFingerprint;
exports.reset = reset;