
- Complete NestJS TypeScript implementation with WebSocket support - Direct messaging (DM) and group chat functionality - End-to-end encryption with AES encryption and key pairs - Media file support (images, videos, audio, documents) up to 100MB - Push notifications with Firebase Cloud Messaging integration - Mention alerts and real-time typing indicators - User authentication with JWT and Passport - SQLite database with TypeORM entities and relationships - Comprehensive API documentation with Swagger/OpenAPI - File upload handling with secure access control - Online/offline status tracking and presence management - Message editing, deletion, and reply functionality - Notification management with automatic cleanup - Health check endpoint for monitoring - CORS configuration for cross-origin requests - Environment-based configuration management - Structured for Flutter SDK integration Features implemented: ✅ Real-time messaging with Socket.IO ✅ User registration and authentication ✅ Direct messages and group chats ✅ Media file uploads and management ✅ End-to-end encryption ✅ Push notifications ✅ Mention alerts ✅ Typing indicators ✅ Message read receipts ✅ Online status tracking ✅ File access control ✅ Comprehensive API documentation Ready for Flutter SDK development and production deployment.
384 lines
17 KiB
JavaScript
384 lines
17 KiB
JavaScript
"use strict";
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.sha512_224 = exports.sha512_256 = exports.sha384 = exports.sha512 = exports.sha224 = exports.sha256 = exports.SHA512_256 = exports.SHA512_224 = exports.SHA384 = exports.SHA512 = exports.SHA224 = exports.SHA256 = void 0;
|
|
/**
|
|
* SHA2 hash function. A.k.a. sha256, sha384, sha512, sha512_224, sha512_256.
|
|
* SHA256 is the fastest hash implementable in JS, even faster than Blake3.
|
|
* Check out [RFC 4634](https://datatracker.ietf.org/doc/html/rfc4634) and
|
|
* [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).
|
|
* @module
|
|
*/
|
|
const _md_ts_1 = require("./_md.js");
|
|
const u64 = require("./_u64.js");
|
|
const utils_ts_1 = require("./utils.js");
|
|
/**
|
|
* Round constants:
|
|
* First 32 bits of fractional parts of the cube roots of the first 64 primes 2..311)
|
|
*/
|
|
// prettier-ignore
|
|
const SHA256_K = /* @__PURE__ */ Uint32Array.from([
|
|
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
|
|
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
|
|
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
|
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
|
|
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
|
|
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
|
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
|
|
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
|
]);
|
|
/** Reusable temporary buffer. "W" comes straight from spec. */
|
|
const SHA256_W = /* @__PURE__ */ new Uint32Array(64);
|
|
class SHA256 extends _md_ts_1.HashMD {
|
|
constructor(outputLen = 32) {
|
|
super(64, outputLen, 8, false);
|
|
// We cannot use array here since array allows indexing by variable
|
|
// which means optimizer/compiler cannot use registers.
|
|
this.A = _md_ts_1.SHA256_IV[0] | 0;
|
|
this.B = _md_ts_1.SHA256_IV[1] | 0;
|
|
this.C = _md_ts_1.SHA256_IV[2] | 0;
|
|
this.D = _md_ts_1.SHA256_IV[3] | 0;
|
|
this.E = _md_ts_1.SHA256_IV[4] | 0;
|
|
this.F = _md_ts_1.SHA256_IV[5] | 0;
|
|
this.G = _md_ts_1.SHA256_IV[6] | 0;
|
|
this.H = _md_ts_1.SHA256_IV[7] | 0;
|
|
}
|
|
get() {
|
|
const { A, B, C, D, E, F, G, H } = this;
|
|
return [A, B, C, D, E, F, G, H];
|
|
}
|
|
// prettier-ignore
|
|
set(A, B, C, D, E, F, G, H) {
|
|
this.A = A | 0;
|
|
this.B = B | 0;
|
|
this.C = C | 0;
|
|
this.D = D | 0;
|
|
this.E = E | 0;
|
|
this.F = F | 0;
|
|
this.G = G | 0;
|
|
this.H = H | 0;
|
|
}
|
|
process(view, offset) {
|
|
// Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array
|
|
for (let i = 0; i < 16; i++, offset += 4)
|
|
SHA256_W[i] = view.getUint32(offset, false);
|
|
for (let i = 16; i < 64; i++) {
|
|
const W15 = SHA256_W[i - 15];
|
|
const W2 = SHA256_W[i - 2];
|
|
const s0 = (0, utils_ts_1.rotr)(W15, 7) ^ (0, utils_ts_1.rotr)(W15, 18) ^ (W15 >>> 3);
|
|
const s1 = (0, utils_ts_1.rotr)(W2, 17) ^ (0, utils_ts_1.rotr)(W2, 19) ^ (W2 >>> 10);
|
|
SHA256_W[i] = (s1 + SHA256_W[i - 7] + s0 + SHA256_W[i - 16]) | 0;
|
|
}
|
|
// Compression function main loop, 64 rounds
|
|
let { A, B, C, D, E, F, G, H } = this;
|
|
for (let i = 0; i < 64; i++) {
|
|
const sigma1 = (0, utils_ts_1.rotr)(E, 6) ^ (0, utils_ts_1.rotr)(E, 11) ^ (0, utils_ts_1.rotr)(E, 25);
|
|
const T1 = (H + sigma1 + (0, _md_ts_1.Chi)(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;
|
|
const sigma0 = (0, utils_ts_1.rotr)(A, 2) ^ (0, utils_ts_1.rotr)(A, 13) ^ (0, utils_ts_1.rotr)(A, 22);
|
|
const T2 = (sigma0 + (0, _md_ts_1.Maj)(A, B, C)) | 0;
|
|
H = G;
|
|
G = F;
|
|
F = E;
|
|
E = (D + T1) | 0;
|
|
D = C;
|
|
C = B;
|
|
B = A;
|
|
A = (T1 + T2) | 0;
|
|
}
|
|
// Add the compressed chunk to the current hash value
|
|
A = (A + this.A) | 0;
|
|
B = (B + this.B) | 0;
|
|
C = (C + this.C) | 0;
|
|
D = (D + this.D) | 0;
|
|
E = (E + this.E) | 0;
|
|
F = (F + this.F) | 0;
|
|
G = (G + this.G) | 0;
|
|
H = (H + this.H) | 0;
|
|
this.set(A, B, C, D, E, F, G, H);
|
|
}
|
|
roundClean() {
|
|
(0, utils_ts_1.clean)(SHA256_W);
|
|
}
|
|
destroy() {
|
|
this.set(0, 0, 0, 0, 0, 0, 0, 0);
|
|
(0, utils_ts_1.clean)(this.buffer);
|
|
}
|
|
}
|
|
exports.SHA256 = SHA256;
|
|
class SHA224 extends SHA256 {
|
|
constructor() {
|
|
super(28);
|
|
this.A = _md_ts_1.SHA224_IV[0] | 0;
|
|
this.B = _md_ts_1.SHA224_IV[1] | 0;
|
|
this.C = _md_ts_1.SHA224_IV[2] | 0;
|
|
this.D = _md_ts_1.SHA224_IV[3] | 0;
|
|
this.E = _md_ts_1.SHA224_IV[4] | 0;
|
|
this.F = _md_ts_1.SHA224_IV[5] | 0;
|
|
this.G = _md_ts_1.SHA224_IV[6] | 0;
|
|
this.H = _md_ts_1.SHA224_IV[7] | 0;
|
|
}
|
|
}
|
|
exports.SHA224 = SHA224;
|
|
// SHA2-512 is slower than sha256 in js because u64 operations are slow.
|
|
// Round contants
|
|
// First 32 bits of the fractional parts of the cube roots of the first 80 primes 2..409
|
|
// prettier-ignore
|
|
const K512 = /* @__PURE__ */ (() => u64.split([
|
|
'0x428a2f98d728ae22', '0x7137449123ef65cd', '0xb5c0fbcfec4d3b2f', '0xe9b5dba58189dbbc',
|
|
'0x3956c25bf348b538', '0x59f111f1b605d019', '0x923f82a4af194f9b', '0xab1c5ed5da6d8118',
|
|
'0xd807aa98a3030242', '0x12835b0145706fbe', '0x243185be4ee4b28c', '0x550c7dc3d5ffb4e2',
|
|
'0x72be5d74f27b896f', '0x80deb1fe3b1696b1', '0x9bdc06a725c71235', '0xc19bf174cf692694',
|
|
'0xe49b69c19ef14ad2', '0xefbe4786384f25e3', '0x0fc19dc68b8cd5b5', '0x240ca1cc77ac9c65',
|
|
'0x2de92c6f592b0275', '0x4a7484aa6ea6e483', '0x5cb0a9dcbd41fbd4', '0x76f988da831153b5',
|
|
'0x983e5152ee66dfab', '0xa831c66d2db43210', '0xb00327c898fb213f', '0xbf597fc7beef0ee4',
|
|
'0xc6e00bf33da88fc2', '0xd5a79147930aa725', '0x06ca6351e003826f', '0x142929670a0e6e70',
|
|
'0x27b70a8546d22ffc', '0x2e1b21385c26c926', '0x4d2c6dfc5ac42aed', '0x53380d139d95b3df',
|
|
'0x650a73548baf63de', '0x766a0abb3c77b2a8', '0x81c2c92e47edaee6', '0x92722c851482353b',
|
|
'0xa2bfe8a14cf10364', '0xa81a664bbc423001', '0xc24b8b70d0f89791', '0xc76c51a30654be30',
|
|
'0xd192e819d6ef5218', '0xd69906245565a910', '0xf40e35855771202a', '0x106aa07032bbd1b8',
|
|
'0x19a4c116b8d2d0c8', '0x1e376c085141ab53', '0x2748774cdf8eeb99', '0x34b0bcb5e19b48a8',
|
|
'0x391c0cb3c5c95a63', '0x4ed8aa4ae3418acb', '0x5b9cca4f7763e373', '0x682e6ff3d6b2b8a3',
|
|
'0x748f82ee5defb2fc', '0x78a5636f43172f60', '0x84c87814a1f0ab72', '0x8cc702081a6439ec',
|
|
'0x90befffa23631e28', '0xa4506cebde82bde9', '0xbef9a3f7b2c67915', '0xc67178f2e372532b',
|
|
'0xca273eceea26619c', '0xd186b8c721c0c207', '0xeada7dd6cde0eb1e', '0xf57d4f7fee6ed178',
|
|
'0x06f067aa72176fba', '0x0a637dc5a2c898a6', '0x113f9804bef90dae', '0x1b710b35131c471b',
|
|
'0x28db77f523047d84', '0x32caab7b40c72493', '0x3c9ebe0a15c9bebc', '0x431d67c49c100d4c',
|
|
'0x4cc5d4becb3e42b6', '0x597f299cfc657e2a', '0x5fcb6fab3ad6faec', '0x6c44198c4a475817'
|
|
].map(n => BigInt(n))))();
|
|
const SHA512_Kh = /* @__PURE__ */ (() => K512[0])();
|
|
const SHA512_Kl = /* @__PURE__ */ (() => K512[1])();
|
|
// Reusable temporary buffers
|
|
const SHA512_W_H = /* @__PURE__ */ new Uint32Array(80);
|
|
const SHA512_W_L = /* @__PURE__ */ new Uint32Array(80);
|
|
class SHA512 extends _md_ts_1.HashMD {
|
|
constructor(outputLen = 64) {
|
|
super(128, outputLen, 16, false);
|
|
// We cannot use array here since array allows indexing by variable
|
|
// which means optimizer/compiler cannot use registers.
|
|
// h -- high 32 bits, l -- low 32 bits
|
|
this.Ah = _md_ts_1.SHA512_IV[0] | 0;
|
|
this.Al = _md_ts_1.SHA512_IV[1] | 0;
|
|
this.Bh = _md_ts_1.SHA512_IV[2] | 0;
|
|
this.Bl = _md_ts_1.SHA512_IV[3] | 0;
|
|
this.Ch = _md_ts_1.SHA512_IV[4] | 0;
|
|
this.Cl = _md_ts_1.SHA512_IV[5] | 0;
|
|
this.Dh = _md_ts_1.SHA512_IV[6] | 0;
|
|
this.Dl = _md_ts_1.SHA512_IV[7] | 0;
|
|
this.Eh = _md_ts_1.SHA512_IV[8] | 0;
|
|
this.El = _md_ts_1.SHA512_IV[9] | 0;
|
|
this.Fh = _md_ts_1.SHA512_IV[10] | 0;
|
|
this.Fl = _md_ts_1.SHA512_IV[11] | 0;
|
|
this.Gh = _md_ts_1.SHA512_IV[12] | 0;
|
|
this.Gl = _md_ts_1.SHA512_IV[13] | 0;
|
|
this.Hh = _md_ts_1.SHA512_IV[14] | 0;
|
|
this.Hl = _md_ts_1.SHA512_IV[15] | 0;
|
|
}
|
|
// prettier-ignore
|
|
get() {
|
|
const { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;
|
|
return [Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl];
|
|
}
|
|
// prettier-ignore
|
|
set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl) {
|
|
this.Ah = Ah | 0;
|
|
this.Al = Al | 0;
|
|
this.Bh = Bh | 0;
|
|
this.Bl = Bl | 0;
|
|
this.Ch = Ch | 0;
|
|
this.Cl = Cl | 0;
|
|
this.Dh = Dh | 0;
|
|
this.Dl = Dl | 0;
|
|
this.Eh = Eh | 0;
|
|
this.El = El | 0;
|
|
this.Fh = Fh | 0;
|
|
this.Fl = Fl | 0;
|
|
this.Gh = Gh | 0;
|
|
this.Gl = Gl | 0;
|
|
this.Hh = Hh | 0;
|
|
this.Hl = Hl | 0;
|
|
}
|
|
process(view, offset) {
|
|
// Extend the first 16 words into the remaining 64 words w[16..79] of the message schedule array
|
|
for (let i = 0; i < 16; i++, offset += 4) {
|
|
SHA512_W_H[i] = view.getUint32(offset);
|
|
SHA512_W_L[i] = view.getUint32((offset += 4));
|
|
}
|
|
for (let i = 16; i < 80; i++) {
|
|
// s0 := (w[i-15] rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15] rightshift 7)
|
|
const W15h = SHA512_W_H[i - 15] | 0;
|
|
const W15l = SHA512_W_L[i - 15] | 0;
|
|
const s0h = u64.rotrSH(W15h, W15l, 1) ^ u64.rotrSH(W15h, W15l, 8) ^ u64.shrSH(W15h, W15l, 7);
|
|
const s0l = u64.rotrSL(W15h, W15l, 1) ^ u64.rotrSL(W15h, W15l, 8) ^ u64.shrSL(W15h, W15l, 7);
|
|
// s1 := (w[i-2] rightrotate 19) xor (w[i-2] rightrotate 61) xor (w[i-2] rightshift 6)
|
|
const W2h = SHA512_W_H[i - 2] | 0;
|
|
const W2l = SHA512_W_L[i - 2] | 0;
|
|
const s1h = u64.rotrSH(W2h, W2l, 19) ^ u64.rotrBH(W2h, W2l, 61) ^ u64.shrSH(W2h, W2l, 6);
|
|
const s1l = u64.rotrSL(W2h, W2l, 19) ^ u64.rotrBL(W2h, W2l, 61) ^ u64.shrSL(W2h, W2l, 6);
|
|
// SHA256_W[i] = s0 + s1 + SHA256_W[i - 7] + SHA256_W[i - 16];
|
|
const SUMl = u64.add4L(s0l, s1l, SHA512_W_L[i - 7], SHA512_W_L[i - 16]);
|
|
const SUMh = u64.add4H(SUMl, s0h, s1h, SHA512_W_H[i - 7], SHA512_W_H[i - 16]);
|
|
SHA512_W_H[i] = SUMh | 0;
|
|
SHA512_W_L[i] = SUMl | 0;
|
|
}
|
|
let { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;
|
|
// Compression function main loop, 80 rounds
|
|
for (let i = 0; i < 80; i++) {
|
|
// S1 := (e rightrotate 14) xor (e rightrotate 18) xor (e rightrotate 41)
|
|
const sigma1h = u64.rotrSH(Eh, El, 14) ^ u64.rotrSH(Eh, El, 18) ^ u64.rotrBH(Eh, El, 41);
|
|
const sigma1l = u64.rotrSL(Eh, El, 14) ^ u64.rotrSL(Eh, El, 18) ^ u64.rotrBL(Eh, El, 41);
|
|
//const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;
|
|
const CHIh = (Eh & Fh) ^ (~Eh & Gh);
|
|
const CHIl = (El & Fl) ^ (~El & Gl);
|
|
// T1 = H + sigma1 + Chi(E, F, G) + SHA512_K[i] + SHA512_W[i]
|
|
// prettier-ignore
|
|
const T1ll = u64.add5L(Hl, sigma1l, CHIl, SHA512_Kl[i], SHA512_W_L[i]);
|
|
const T1h = u64.add5H(T1ll, Hh, sigma1h, CHIh, SHA512_Kh[i], SHA512_W_H[i]);
|
|
const T1l = T1ll | 0;
|
|
// S0 := (a rightrotate 28) xor (a rightrotate 34) xor (a rightrotate 39)
|
|
const sigma0h = u64.rotrSH(Ah, Al, 28) ^ u64.rotrBH(Ah, Al, 34) ^ u64.rotrBH(Ah, Al, 39);
|
|
const sigma0l = u64.rotrSL(Ah, Al, 28) ^ u64.rotrBL(Ah, Al, 34) ^ u64.rotrBL(Ah, Al, 39);
|
|
const MAJh = (Ah & Bh) ^ (Ah & Ch) ^ (Bh & Ch);
|
|
const MAJl = (Al & Bl) ^ (Al & Cl) ^ (Bl & Cl);
|
|
Hh = Gh | 0;
|
|
Hl = Gl | 0;
|
|
Gh = Fh | 0;
|
|
Gl = Fl | 0;
|
|
Fh = Eh | 0;
|
|
Fl = El | 0;
|
|
({ h: Eh, l: El } = u64.add(Dh | 0, Dl | 0, T1h | 0, T1l | 0));
|
|
Dh = Ch | 0;
|
|
Dl = Cl | 0;
|
|
Ch = Bh | 0;
|
|
Cl = Bl | 0;
|
|
Bh = Ah | 0;
|
|
Bl = Al | 0;
|
|
const All = u64.add3L(T1l, sigma0l, MAJl);
|
|
Ah = u64.add3H(All, T1h, sigma0h, MAJh);
|
|
Al = All | 0;
|
|
}
|
|
// Add the compressed chunk to the current hash value
|
|
({ h: Ah, l: Al } = u64.add(this.Ah | 0, this.Al | 0, Ah | 0, Al | 0));
|
|
({ h: Bh, l: Bl } = u64.add(this.Bh | 0, this.Bl | 0, Bh | 0, Bl | 0));
|
|
({ h: Ch, l: Cl } = u64.add(this.Ch | 0, this.Cl | 0, Ch | 0, Cl | 0));
|
|
({ h: Dh, l: Dl } = u64.add(this.Dh | 0, this.Dl | 0, Dh | 0, Dl | 0));
|
|
({ h: Eh, l: El } = u64.add(this.Eh | 0, this.El | 0, Eh | 0, El | 0));
|
|
({ h: Fh, l: Fl } = u64.add(this.Fh | 0, this.Fl | 0, Fh | 0, Fl | 0));
|
|
({ h: Gh, l: Gl } = u64.add(this.Gh | 0, this.Gl | 0, Gh | 0, Gl | 0));
|
|
({ h: Hh, l: Hl } = u64.add(this.Hh | 0, this.Hl | 0, Hh | 0, Hl | 0));
|
|
this.set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl);
|
|
}
|
|
roundClean() {
|
|
(0, utils_ts_1.clean)(SHA512_W_H, SHA512_W_L);
|
|
}
|
|
destroy() {
|
|
(0, utils_ts_1.clean)(this.buffer);
|
|
this.set(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0);
|
|
}
|
|
}
|
|
exports.SHA512 = SHA512;
|
|
class SHA384 extends SHA512 {
|
|
constructor() {
|
|
super(48);
|
|
this.Ah = _md_ts_1.SHA384_IV[0] | 0;
|
|
this.Al = _md_ts_1.SHA384_IV[1] | 0;
|
|
this.Bh = _md_ts_1.SHA384_IV[2] | 0;
|
|
this.Bl = _md_ts_1.SHA384_IV[3] | 0;
|
|
this.Ch = _md_ts_1.SHA384_IV[4] | 0;
|
|
this.Cl = _md_ts_1.SHA384_IV[5] | 0;
|
|
this.Dh = _md_ts_1.SHA384_IV[6] | 0;
|
|
this.Dl = _md_ts_1.SHA384_IV[7] | 0;
|
|
this.Eh = _md_ts_1.SHA384_IV[8] | 0;
|
|
this.El = _md_ts_1.SHA384_IV[9] | 0;
|
|
this.Fh = _md_ts_1.SHA384_IV[10] | 0;
|
|
this.Fl = _md_ts_1.SHA384_IV[11] | 0;
|
|
this.Gh = _md_ts_1.SHA384_IV[12] | 0;
|
|
this.Gl = _md_ts_1.SHA384_IV[13] | 0;
|
|
this.Hh = _md_ts_1.SHA384_IV[14] | 0;
|
|
this.Hl = _md_ts_1.SHA384_IV[15] | 0;
|
|
}
|
|
}
|
|
exports.SHA384 = SHA384;
|
|
/**
|
|
* Truncated SHA512/256 and SHA512/224.
|
|
* SHA512_IV is XORed with 0xa5a5a5a5a5a5a5a5, then used as "intermediary" IV of SHA512/t.
|
|
* Then t hashes string to produce result IV.
|
|
* See `test/misc/sha2-gen-iv.js`.
|
|
*/
|
|
/** SHA512/224 IV */
|
|
const T224_IV = /* @__PURE__ */ Uint32Array.from([
|
|
0x8c3d37c8, 0x19544da2, 0x73e19966, 0x89dcd4d6, 0x1dfab7ae, 0x32ff9c82, 0x679dd514, 0x582f9fcf,
|
|
0x0f6d2b69, 0x7bd44da8, 0x77e36f73, 0x04c48942, 0x3f9d85a8, 0x6a1d36c8, 0x1112e6ad, 0x91d692a1,
|
|
]);
|
|
/** SHA512/256 IV */
|
|
const T256_IV = /* @__PURE__ */ Uint32Array.from([
|
|
0x22312194, 0xfc2bf72c, 0x9f555fa3, 0xc84c64c2, 0x2393b86b, 0x6f53b151, 0x96387719, 0x5940eabd,
|
|
0x96283ee2, 0xa88effe3, 0xbe5e1e25, 0x53863992, 0x2b0199fc, 0x2c85b8aa, 0x0eb72ddc, 0x81c52ca2,
|
|
]);
|
|
class SHA512_224 extends SHA512 {
|
|
constructor() {
|
|
super(28);
|
|
this.Ah = T224_IV[0] | 0;
|
|
this.Al = T224_IV[1] | 0;
|
|
this.Bh = T224_IV[2] | 0;
|
|
this.Bl = T224_IV[3] | 0;
|
|
this.Ch = T224_IV[4] | 0;
|
|
this.Cl = T224_IV[5] | 0;
|
|
this.Dh = T224_IV[6] | 0;
|
|
this.Dl = T224_IV[7] | 0;
|
|
this.Eh = T224_IV[8] | 0;
|
|
this.El = T224_IV[9] | 0;
|
|
this.Fh = T224_IV[10] | 0;
|
|
this.Fl = T224_IV[11] | 0;
|
|
this.Gh = T224_IV[12] | 0;
|
|
this.Gl = T224_IV[13] | 0;
|
|
this.Hh = T224_IV[14] | 0;
|
|
this.Hl = T224_IV[15] | 0;
|
|
}
|
|
}
|
|
exports.SHA512_224 = SHA512_224;
|
|
class SHA512_256 extends SHA512 {
|
|
constructor() {
|
|
super(32);
|
|
this.Ah = T256_IV[0] | 0;
|
|
this.Al = T256_IV[1] | 0;
|
|
this.Bh = T256_IV[2] | 0;
|
|
this.Bl = T256_IV[3] | 0;
|
|
this.Ch = T256_IV[4] | 0;
|
|
this.Cl = T256_IV[5] | 0;
|
|
this.Dh = T256_IV[6] | 0;
|
|
this.Dl = T256_IV[7] | 0;
|
|
this.Eh = T256_IV[8] | 0;
|
|
this.El = T256_IV[9] | 0;
|
|
this.Fh = T256_IV[10] | 0;
|
|
this.Fl = T256_IV[11] | 0;
|
|
this.Gh = T256_IV[12] | 0;
|
|
this.Gl = T256_IV[13] | 0;
|
|
this.Hh = T256_IV[14] | 0;
|
|
this.Hl = T256_IV[15] | 0;
|
|
}
|
|
}
|
|
exports.SHA512_256 = SHA512_256;
|
|
/**
|
|
* SHA2-256 hash function from RFC 4634.
|
|
*
|
|
* It is the fastest JS hash, even faster than Blake3.
|
|
* To break sha256 using birthday attack, attackers need to try 2^128 hashes.
|
|
* BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.
|
|
*/
|
|
exports.sha256 = (0, utils_ts_1.createHasher)(() => new SHA256());
|
|
/** SHA2-224 hash function from RFC 4634 */
|
|
exports.sha224 = (0, utils_ts_1.createHasher)(() => new SHA224());
|
|
/** SHA2-512 hash function from RFC 4634. */
|
|
exports.sha512 = (0, utils_ts_1.createHasher)(() => new SHA512());
|
|
/** SHA2-384 hash function from RFC 4634. */
|
|
exports.sha384 = (0, utils_ts_1.createHasher)(() => new SHA384());
|
|
/**
|
|
* SHA2-512/256 "truncated" hash function, with improved resistance to length extension attacks.
|
|
* See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).
|
|
*/
|
|
exports.sha512_256 = (0, utils_ts_1.createHasher)(() => new SHA512_256());
|
|
/**
|
|
* SHA2-512/224 "truncated" hash function, with improved resistance to length extension attacks.
|
|
* See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).
|
|
*/
|
|
exports.sha512_224 = (0, utils_ts_1.createHasher)(() => new SHA512_224());
|
|
//# sourceMappingURL=sha2.js.map
|