pbes2kw.js 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. "use strict";
  2. Object.defineProperty(exports, "__esModule", { value: true });
  3. exports.decrypt = exports.encrypt = void 0;
  4. const util_1 = require("util");
  5. const crypto_1 = require("crypto");
  6. const random_js_1 = require("./random.js");
  7. const buffer_utils_js_1 = require("../lib/buffer_utils.js");
  8. const base64url_js_1 = require("./base64url.js");
  9. const aeskw_js_1 = require("./aeskw.js");
  10. const check_p2s_js_1 = require("../lib/check_p2s.js");
  11. const webcrypto_js_1 = require("./webcrypto.js");
  12. const crypto_key_js_1 = require("../lib/crypto_key.js");
  13. const is_key_object_js_1 = require("./is_key_object.js");
  14. const invalid_key_input_js_1 = require("../lib/invalid_key_input.js");
  15. const is_key_like_js_1 = require("./is_key_like.js");
  16. const pbkdf2 = (0, util_1.promisify)(crypto_1.pbkdf2);
  17. function getPassword(key, alg) {
  18. if ((0, is_key_object_js_1.default)(key)) {
  19. return key.export();
  20. }
  21. if (key instanceof Uint8Array) {
  22. return key;
  23. }
  24. if ((0, webcrypto_js_1.isCryptoKey)(key)) {
  25. (0, crypto_key_js_1.checkEncCryptoKey)(key, alg, 'deriveBits', 'deriveKey');
  26. return crypto_1.KeyObject.from(key).export();
  27. }
  28. throw new TypeError((0, invalid_key_input_js_1.default)(key, ...is_key_like_js_1.types, 'Uint8Array'));
  29. }
  30. const encrypt = async (alg, key, cek, p2c = 2048, p2s = (0, random_js_1.default)(new Uint8Array(16))) => {
  31. (0, check_p2s_js_1.default)(p2s);
  32. const salt = (0, buffer_utils_js_1.p2s)(alg, p2s);
  33. const keylen = parseInt(alg.slice(13, 16), 10) >> 3;
  34. const password = getPassword(key, alg);
  35. const derivedKey = await pbkdf2(password, salt, p2c, keylen, `sha${alg.slice(8, 11)}`);
  36. const encryptedKey = await (0, aeskw_js_1.wrap)(alg.slice(-6), derivedKey, cek);
  37. return { encryptedKey, p2c, p2s: (0, base64url_js_1.encode)(p2s) };
  38. };
  39. exports.encrypt = encrypt;
  40. const decrypt = async (alg, key, encryptedKey, p2c, p2s) => {
  41. (0, check_p2s_js_1.default)(p2s);
  42. const salt = (0, buffer_utils_js_1.p2s)(alg, p2s);
  43. const keylen = parseInt(alg.slice(13, 16), 10) >> 3;
  44. const password = getPassword(key, alg);
  45. const derivedKey = await pbkdf2(password, salt, p2c, keylen, `sha${alg.slice(8, 11)}`);
  46. return (0, aeskw_js_1.unwrap)(alg.slice(-6), derivedKey, encryptedKey);
  47. };
  48. exports.decrypt = decrypt;