From: Jason A. Donenfeld Date: Thu, 26 Jul 2018 18:05:47 +0000 (+0200) Subject: keygen-html: bring back pure javascript implementation X-Git-Tag: v1.0.20191226~55 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=3ac679e7a1930c322e9f37e0f106cdaabc18bc13;p=thirdparty%2Fwireguard-tools.git keygen-html: bring back pure javascript implementation This reverts commit 9d5baf7d1d14ca7eb0852b41566330259229d489. BenoƮt Viguier has proofs that values will stay well within 2^53. We also have an improved carry function that's much simpler. Signed-off-by: Jason A. Donenfeld --- diff --git a/contrib/keygen-html/Makefile b/contrib/keygen-html/Makefile deleted file mode 100644 index a3acec0..0000000 --- a/contrib/keygen-html/Makefile +++ /dev/null @@ -1,6 +0,0 @@ -curve25519_generate.js: src/curve25519_generate.c src/glue.js - emcc -O2 --memory-init-file 0 --closure 1 --post-js src/glue.js -s 'EXTRA_EXPORTED_RUNTIME_METHODS=["Pointer_stringify"]' -o $@ src/curve25519_generate.c -clean: - rm -f curve25519_generate.js -all: curve25519_generate.js -.PHONY: clean all diff --git a/contrib/keygen-html/README b/contrib/keygen-html/README index eaa4244..f1c3412 100644 --- a/contrib/keygen-html/README +++ b/contrib/keygen-html/README @@ -17,11 +17,3 @@ introduces interesting side-channel attacks. Secrets aren't zerored after use. Maybe you can get around this with some tricks taking advantage of browser allocator behavior and different processes, but it seems pretty hard. - -Building --------- - -In order to use the example `keygen.html` file, you must first build -the C sources using emscripten. Simply run: - - $ make diff --git a/contrib/keygen-html/keygen.html b/contrib/keygen-html/keygen.html index af2a545..939e637 100644 --- a/contrib/keygen-html/keygen.html +++ b/contrib/keygen-html/keygen.html @@ -1,4 +1,4 @@ - +