// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. // Copyright Joyent, Inc. and Node.js contributors. All rights reserved. MIT license. // TODO(petamoriken): enable prefer-primordials for node polyfills // deno-lint-ignore-file prefer-primordials import { ERR_INVALID_ARG_TYPE } from "ext:deno_node/internal/errors.ts"; import { validateInt32, validateObject, } from "ext:deno_node/internal/validators.mjs"; import { Buffer } from "node:buffer"; import { notImplemented } from "ext:deno_node/_utils.ts"; import type { TransformOptions } from "ext:deno_node/_stream.d.ts"; import { Transform } from "ext:deno_node/_stream.mjs"; import { getArrayBufferOrView, KeyObject, } from "ext:deno_node/internal/crypto/keys.ts"; import type { BufferEncoding } from "ext:deno_node/_global.d.ts"; import type { BinaryLike, Encoding, } from "ext:deno_node/internal/crypto/types.ts"; import { getDefaultEncoding } from "ext:deno_node/internal/crypto/util.ts"; import { isAnyArrayBuffer, isArrayBufferView, } from "ext:deno_node/internal/util/types.ts"; export function isStringOrBuffer(val) { return typeof val === "string" || isArrayBufferView(val) || isAnyArrayBuffer(val); } const { ops, encode } = globalThis.__bootstrap.core; const NO_TAG = new Uint8Array(); export type CipherCCMTypes = | "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm" | "chacha20-poly1305"; export type CipherGCMTypes = "aes-128-gcm" | "aes-192-gcm" | "aes-256-gcm"; export type CipherOCBTypes = "aes-128-ocb" | "aes-192-ocb" | "aes-256-ocb"; export type CipherKey = BinaryLike | KeyObject; export interface CipherCCMOptions extends TransformOptions { authTagLength: number; } export interface CipherGCMOptions extends TransformOptions { authTagLength?: number | undefined; } export interface CipherOCBOptions extends TransformOptions { authTagLength: number; } export interface Cipher extends ReturnType { update( data: string, inputEncoding?: Encoding, outputEncoding?: Encoding, ): string; final(outputEncoding?: BufferEncoding): string; setAutoPadding(autoPadding?: boolean): this; } export type Decipher = Cipher; export interface CipherCCM extends Cipher { setAAD( buffer: ArrayBufferView, options: { plaintextLength: number; }, ): this; getAuthTag(): Buffer; } export interface CipherGCM extends Cipher { setAAD( buffer: ArrayBufferView, options?: { plaintextLength: number; }, ): this; getAuthTag(): Buffer; } export interface CipherOCB extends Cipher { setAAD( buffer: ArrayBufferView, options?: { plaintextLength: number; }, ): this; getAuthTag(): Buffer; } export interface DecipherCCM extends Decipher { setAuthTag(buffer: ArrayBufferView): this; setAAD( buffer: ArrayBufferView, options: { plaintextLength: number; }, ): this; } export interface DecipherGCM extends Decipher { setAuthTag(buffer: ArrayBufferView): this; setAAD( buffer: ArrayBufferView, options?: { plaintextLength: number; }, ): this; } export interface DecipherOCB extends Decipher { setAuthTag(buffer: ArrayBufferView): this; setAAD( buffer: ArrayBufferView, options?: { plaintextLength: number; }, ): this; } function toU8(input: string | Uint8Array): Uint8Array { return typeof input === "string" ? encode(input) : input; } export class Cipheriv extends Transform implements Cipher { /** CipherContext resource id */ #context: number; /** plaintext data cache */ #cache: BlockModeCache; #needsBlockCache: boolean; #authTag?: Buffer; constructor( cipher: string, key: CipherKey, iv: BinaryLike | null, options?: TransformOptions, ) { super({ transform(chunk, encoding, cb) { this.push(this.update(chunk, encoding)); cb(); }, final(cb) { this.push(this.final()); cb(); }, ...options, }); this.#cache = new BlockModeCache(false); this.#context = ops.op_node_create_cipheriv(cipher, toU8(key), toU8(iv)); this.#needsBlockCache = !(cipher == "aes-128-gcm" || cipher == "aes-256-gcm"); if (this.#context == 0) { throw new TypeError("Unknown cipher"); } } final(encoding: string = getDefaultEncoding()): Buffer | string { const buf = new Buffer(16); const maybeTag = ops.op_node_cipheriv_final( this.#context, this.#cache.cache, buf, ); if (maybeTag) { this.#authTag = Buffer.from(maybeTag); return encoding === "buffer" ? Buffer.from([]) : ""; } return encoding === "buffer" ? buf : buf.toString(encoding); } getAuthTag(): Buffer { return this.#authTag!; } setAAD( buffer: ArrayBufferView, _options?: { plaintextLength: number; }, ): this { ops.op_node_cipheriv_set_aad(this.#context, buffer); return this; } setAutoPadding(_autoPadding?: boolean): this { notImplemented("crypto.Cipheriv.prototype.setAutoPadding"); return this; } update( data: string | Buffer | ArrayBufferView, inputEncoding?: Encoding, outputEncoding: Encoding = getDefaultEncoding(), ): Buffer | string { // TODO(kt3k): throw ERR_INVALID_ARG_TYPE if data is not string, Buffer, or ArrayBufferView let buf = data; if (typeof data === "string" && typeof inputEncoding === "string") { buf = Buffer.from(data, inputEncoding); } let output; if (!this.#needsBlockCache) { output = Buffer.allocUnsafe(buf.length); ops.op_node_cipheriv_encrypt(this.#context, buf, output); return outputEncoding === "buffer" ? output : output.toString(outputEncoding); } this.#cache.add(buf); const input = this.#cache.get(); if (input === null) { output = Buffer.alloc(0); } else { output = Buffer.allocUnsafe(input.length); ops.op_node_cipheriv_encrypt(this.#context, input, output); } return outputEncoding === "buffer" ? output : output.toString(outputEncoding); } } /** Caches data and output the chunk of multiple of 16. * Used by CBC, ECB modes of block ciphers */ class BlockModeCache { cache: Uint8Array; // The last chunk can be padded when decrypting. #lastChunkIsNonZero: boolean; constructor(lastChunkIsNotZero = false) { this.cache = new Uint8Array(0); this.#lastChunkIsNonZero = lastChunkIsNotZero; } add(data: Uint8Array) { const cache = this.cache; this.cache = new Uint8Array(cache.length + data.length); this.cache.set(cache); this.cache.set(data, cache.length); } /** Gets the chunk of the length of largest multiple of 16. * Used for preparing data for encryption/decryption */ get(): Uint8Array | null { let len = this.cache.length; if (this.#lastChunkIsNonZero) { // Reduces the available chunk length by 1 to keep the last chunk len -= 1; } if (len < 16) { return null; } len = Math.floor(len / 16) * 16; const out = this.cache.subarray(0, len); this.cache = this.cache.subarray(len); return out; } } export class Decipheriv extends Transform implements Cipher { /** DecipherContext resource id */ #context: number; /** ciphertext data cache */ #cache: BlockModeCache; #needsBlockCache: boolean; #authTag?: BinaryLike; constructor( cipher: string, key: CipherKey, iv: BinaryLike | null, options?: TransformOptions, ) { super({ transform(chunk, encoding, cb) { this.push(this.update(chunk, encoding)); cb(); }, final(cb) { this.push(this.final()); cb(); }, ...options, }); this.#cache = new BlockModeCache(true); this.#context = ops.op_node_create_decipheriv(cipher, toU8(key), toU8(iv)); this.#needsBlockCache = !(cipher == "aes-128-gcm" || cipher == "aes-256-gcm"); if (this.#context == 0) { throw new TypeError("Unknown cipher"); } } final(encoding: string = getDefaultEncoding()): Buffer | string { let buf = new Buffer(16); ops.op_node_decipheriv_final( this.#context, this.#cache.cache, buf, this.#authTag || NO_TAG, ); if (!this.#needsBlockCache) { return encoding === "buffer" ? Buffer.from([]) : ""; } buf = buf.subarray(0, 16 - buf.at(-1)); // Padded in Pkcs7 mode return encoding === "buffer" ? buf : buf.toString(encoding); } setAAD( buffer: ArrayBufferView, _options?: { plaintextLength: number; }, ): this { ops.op_node_decipheriv_set_aad(this.#context, buffer); return this; } setAuthTag(buffer: BinaryLike, _encoding?: string): this { this.#authTag = buffer; return this; } setAutoPadding(_autoPadding?: boolean): this { notImplemented("crypto.Decipheriv.prototype.setAutoPadding"); } update( data: string | Buffer | ArrayBufferView, inputEncoding?: Encoding, outputEncoding: Encoding = getDefaultEncoding(), ): Buffer | string { // TODO(kt3k): throw ERR_INVALID_ARG_TYPE if data is not string, Buffer, or ArrayBufferView let buf = data; if (typeof data === "string" && typeof inputEncoding === "string") { buf = Buffer.from(data, inputEncoding); } let output; if (!this.#needsBlockCache) { output = Buffer.allocUnsafe(buf.length); ops.op_node_decipheriv_decrypt(this.#context, buf, output); return outputEncoding === "buffer" ? output : output.toString(outputEncoding); } this.#cache.add(buf); const input = this.#cache.get(); if (input === null) { output = Buffer.alloc(0); } else { output = new Buffer(input.length); ops.op_node_decipheriv_decrypt(this.#context, input, output); } return outputEncoding === "buffer" ? output : output.toString(outputEncoding); } } export function getCipherInfo( nameOrNid: string | number, options?: { keyLength?: number; ivLength?: number }, ) { if (typeof nameOrNid !== "string" && typeof nameOrNid !== "number") { throw new ERR_INVALID_ARG_TYPE( "nameOrNid", ["string", "number"], nameOrNid, ); } if (typeof nameOrNid === "number") { validateInt32(nameOrNid, "nameOrNid"); } let keyLength, ivLength; if (options !== undefined) { validateObject(options, "options"); ({ keyLength, ivLength } = options); if (keyLength !== undefined) { validateInt32(keyLength, "options.keyLength"); } if (ivLength !== undefined) { validateInt32(ivLength, "options.ivLength"); } } notImplemented("crypto.getCipherInfo"); } export function privateEncrypt( privateKey: ArrayBufferView | string | KeyObject, buffer: ArrayBufferView | string | KeyObject, ): Buffer { const { data } = prepareKey(privateKey); const padding = privateKey.padding || 1; buffer = getArrayBufferOrView(buffer, "buffer"); return ops.op_node_private_encrypt(data, buffer, padding); } export function privateDecrypt( privateKey: ArrayBufferView | string | KeyObject, buffer: ArrayBufferView | string | KeyObject, ): Buffer { const { data } = prepareKey(privateKey); const padding = privateKey.padding || 1; buffer = getArrayBufferOrView(buffer, "buffer"); return ops.op_node_private_decrypt(data, buffer, padding); } export function publicEncrypt( publicKey: ArrayBufferView | string | KeyObject, buffer: ArrayBufferView | string | KeyObject, ): Buffer { const { data } = prepareKey(publicKey); const padding = publicKey.padding || 1; buffer = getArrayBufferOrView(buffer, "buffer"); return ops.op_node_public_encrypt(data, buffer, padding); } export function prepareKey(key) { // TODO(@littledivy): handle these cases // - node KeyObject // - web CryptoKey if (isStringOrBuffer(key)) { return { data: getArrayBufferOrView(key, "key") }; } else if (typeof key == "object") { const { key: data, encoding } = key; if (!isStringOrBuffer(data)) { throw new TypeError("Invalid key type"); } return { data: getArrayBufferOrView(data, "key", encoding) }; } throw new TypeError("Invalid key type"); } export function publicDecrypt() { notImplemented("crypto.publicDecrypt"); } export default { privateDecrypt, privateEncrypt, publicDecrypt, publicEncrypt, Cipheriv, Decipheriv, prepareKey, getCipherInfo, };