ecdhes.js 3.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. "use strict";
  2. Object.defineProperty(exports, "__esModule", { value: true });
  3. exports.ecdhAllowed = exports.generateEpk = exports.deriveKey = void 0;
  4. const crypto_1 = require("crypto");
  5. const util_1 = require("util");
  6. const get_named_curve_js_1 = require("./get_named_curve.js");
  7. const buffer_utils_js_1 = require("../lib/buffer_utils.js");
  8. const errors_js_1 = require("../util/errors.js");
  9. const webcrypto_js_1 = require("./webcrypto.js");
  10. const crypto_key_js_1 = require("../lib/crypto_key.js");
  11. const is_key_object_js_1 = require("./is_key_object.js");
  12. const invalid_key_input_js_1 = require("../lib/invalid_key_input.js");
  13. const is_key_like_js_1 = require("./is_key_like.js");
  14. const generateKeyPair = (0, util_1.promisify)(crypto_1.generateKeyPair);
  15. async function deriveKey(publicKee, privateKee, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
  16. let publicKey;
  17. if ((0, webcrypto_js_1.isCryptoKey)(publicKee)) {
  18. (0, crypto_key_js_1.checkEncCryptoKey)(publicKee, 'ECDH');
  19. publicKey = crypto_1.KeyObject.from(publicKee);
  20. }
  21. else if ((0, is_key_object_js_1.default)(publicKee)) {
  22. publicKey = publicKee;
  23. }
  24. else {
  25. throw new TypeError((0, invalid_key_input_js_1.default)(publicKee, ...is_key_like_js_1.types));
  26. }
  27. let privateKey;
  28. if ((0, webcrypto_js_1.isCryptoKey)(privateKee)) {
  29. (0, crypto_key_js_1.checkEncCryptoKey)(privateKee, 'ECDH', 'deriveBits');
  30. privateKey = crypto_1.KeyObject.from(privateKee);
  31. }
  32. else if ((0, is_key_object_js_1.default)(privateKee)) {
  33. privateKey = privateKee;
  34. }
  35. else {
  36. throw new TypeError((0, invalid_key_input_js_1.default)(privateKee, ...is_key_like_js_1.types));
  37. }
  38. const value = (0, buffer_utils_js_1.concat)((0, buffer_utils_js_1.lengthAndInput)(buffer_utils_js_1.encoder.encode(algorithm)), (0, buffer_utils_js_1.lengthAndInput)(apu), (0, buffer_utils_js_1.lengthAndInput)(apv), (0, buffer_utils_js_1.uint32be)(keyLength));
  39. const sharedSecret = (0, crypto_1.diffieHellman)({ privateKey, publicKey });
  40. return (0, buffer_utils_js_1.concatKdf)(sharedSecret, keyLength, value);
  41. }
  42. exports.deriveKey = deriveKey;
  43. async function generateEpk(kee) {
  44. let key;
  45. if ((0, webcrypto_js_1.isCryptoKey)(kee)) {
  46. key = crypto_1.KeyObject.from(kee);
  47. }
  48. else if ((0, is_key_object_js_1.default)(kee)) {
  49. key = kee;
  50. }
  51. else {
  52. throw new TypeError((0, invalid_key_input_js_1.default)(kee, ...is_key_like_js_1.types));
  53. }
  54. switch (key.asymmetricKeyType) {
  55. case 'x25519':
  56. return generateKeyPair('x25519');
  57. case 'x448': {
  58. return generateKeyPair('x448');
  59. }
  60. case 'ec': {
  61. const namedCurve = (0, get_named_curve_js_1.default)(key);
  62. return generateKeyPair('ec', { namedCurve });
  63. }
  64. default:
  65. throw new errors_js_1.JOSENotSupported('Invalid or unsupported EPK');
  66. }
  67. }
  68. exports.generateEpk = generateEpk;
  69. const ecdhAllowed = (key) => ['P-256', 'P-384', 'P-521', 'X25519', 'X448'].includes((0, get_named_curve_js_1.default)(key));
  70. exports.ecdhAllowed = ecdhAllowed;