1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-21 15:04:11 -05:00

fix(ext/node): update aead-gcm-stream to 0.3 (#25261)

Fixes https://github.com/denoland/deno/issues/25260
Fixes https://github.com/denoland/deno/issues/25254
Fixes https://github.com/denoland/deno/issues/23693

Verified that `web-push` GCM decryption works in the browser. See
`aead-gcm-stream` changes
[here](a9ffd0c07c)
This commit is contained in:
Divy Srivastava 2024-08-28 18:34:18 +05:30 committed by Luca Casonato
parent 14e9b5049d
commit a025475b3f
No known key found for this signature in database
GPG key ID: 01A83EB62563811F
4 changed files with 45 additions and 15 deletions

4
Cargo.lock generated
View file

@ -39,9 +39,9 @@ dependencies = [
[[package]]
name = "aead-gcm-stream"
version = "0.1.0"
version = "0.3.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "4a09ecb526d53de2842cc876ee5c9b51161ee60399edeca4cf74892a01b48177"
checksum = "4947a169074c7e038fa43051d1c4e073f4488b0e4b0a30658f1e1a1b06449ce8"
dependencies = [
"aead",
"aes",

View file

@ -17,7 +17,7 @@ path = "lib.rs"
sync_fs = ["deno_package_json/sync", "node_resolver/sync"]
[dependencies]
aead-gcm-stream = "0.1"
aead-gcm-stream = "0.3"
aes.workspace = true
async-trait.workspace = true
base64.workspace = true

View file

@ -137,16 +137,22 @@ impl Cipher {
"aes-192-ecb" => Aes192Ecb(Box::new(ecb::Encryptor::new(key.into()))),
"aes-256-ecb" => Aes256Ecb(Box::new(ecb::Encryptor::new(key.into()))),
"aes-128-gcm" => {
let mut cipher =
aead_gcm_stream::AesGcm::<aes::Aes128>::new(key.into());
cipher.init(iv.try_into()?);
if iv.len() != 12 {
return Err(type_error("IV length must be 12 bytes"));
}
let cipher =
aead_gcm_stream::AesGcm::<aes::Aes128>::new(key.into(), iv);
Aes128Gcm(Box::new(cipher))
}
"aes-256-gcm" => {
let mut cipher =
aead_gcm_stream::AesGcm::<aes::Aes256>::new(key.into());
cipher.init(iv.try_into()?);
if iv.len() != 12 {
return Err(type_error("IV length must be 12 bytes"));
}
let cipher =
aead_gcm_stream::AesGcm::<aes::Aes256>::new(key.into(), iv);
Aes256Gcm(Box::new(cipher))
}
@ -320,16 +326,22 @@ impl Decipher {
"aes-192-ecb" => Aes192Ecb(Box::new(ecb::Decryptor::new(key.into()))),
"aes-256-ecb" => Aes256Ecb(Box::new(ecb::Decryptor::new(key.into()))),
"aes-128-gcm" => {
let mut decipher =
aead_gcm_stream::AesGcm::<aes::Aes128>::new(key.into());
decipher.init(iv.try_into()?);
if iv.len() != 12 {
return Err(type_error("IV length must be 12 bytes"));
}
let decipher =
aead_gcm_stream::AesGcm::<aes::Aes128>::new(key.into(), iv);
Aes128Gcm(Box::new(decipher))
}
"aes-256-gcm" => {
let mut decipher =
aead_gcm_stream::AesGcm::<aes::Aes256>::new(key.into());
decipher.init(iv.try_into()?);
if iv.len() != 12 {
return Err(type_error("IV length must be 12 bytes"));
}
let decipher =
aead_gcm_stream::AesGcm::<aes::Aes256>::new(key.into(), iv);
Aes256Gcm(Box::new(decipher))
}

View file

@ -101,3 +101,21 @@ for (
});
}
}
Deno.test({
name: "aes-128-gcm encrypt multiple",
fn() {
const key = Buffer.alloc(16);
const nonce = Buffer.alloc(12);
const gcm = crypto.createCipheriv("aes-128-gcm", key, nonce);
assertEquals(gcm.update("hello", "utf8", "hex"), "6bedb6a20f");
assertEquals(gcm.update("world", "utf8", "hex"), "c1cce09f4c");
gcm.final();
assertEquals(
gcm.getAuthTag().toString("hex"),
"bf6d20a38e0c828bea3de63b7ff1dfbd",
);
},
});