2020-03-04 12:18:11 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) Sapphirecode - All Rights Reserved
|
|
|
|
* Created by Timo Hocker <timo@scode.ovh>, March 2020
|
|
|
|
*/
|
|
|
|
|
2020-03-04 15:35:04 +01:00
|
|
|
// @ts-nocheck
|
2020-03-04 12:18:11 +01:00
|
|
|
/* eslint-disable no-magic-numbers */
|
|
|
|
'use strict';
|
|
|
|
|
|
|
|
const crypto = require ('crypto');
|
|
|
|
const encoding = require ('@scode/encoding-helper');
|
|
|
|
|
2020-03-04 14:51:22 +01:00
|
|
|
const encryption = {
|
2020-03-05 10:19:27 +01:00
|
|
|
algorithm: 'aes-256-cbc',
|
|
|
|
nonce_size: 16,
|
2020-03-04 15:35:04 +01:00
|
|
|
key_size: 32,
|
2020-03-04 14:51:22 +01:00
|
|
|
hash: 'sha256',
|
|
|
|
salt_size: 16,
|
|
|
|
iterations: 32767
|
|
|
|
};
|
|
|
|
|
2020-03-04 12:18:11 +01:00
|
|
|
/**
|
|
|
|
* creates a random string
|
|
|
|
*
|
|
|
|
* @param {number} len string length default: 6
|
|
|
|
* @returns {string} random string
|
|
|
|
*/
|
|
|
|
function random_string (len = 8) {
|
|
|
|
if (len < 1)
|
|
|
|
throw new Error ('invalid length');
|
|
|
|
return crypto.randomBytes (Math.ceil (len * 3 / 4))
|
|
|
|
.toString ('base64')
|
|
|
|
.replace (/[=]+$/u, '')
|
|
|
|
.substr (0, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* creates a random hexadecimal string
|
|
|
|
*
|
|
|
|
* @param {number} len length
|
|
|
|
* @returns {string} hex string
|
|
|
|
*/
|
|
|
|
function random_hex (len = 8) {
|
|
|
|
if (len < 1)
|
|
|
|
throw new Error ('invalid length');
|
|
|
|
return crypto.randomBytes (Math.ceil (len / 2))
|
|
|
|
.toString ('hex')
|
|
|
|
.substr (0, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* creates a 64 character long random hex string
|
|
|
|
*
|
|
|
|
* @returns {string} salt
|
|
|
|
*/
|
|
|
|
function create_salt () {
|
|
|
|
return random_hex (64);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* creates a sha512 hash
|
|
|
|
*
|
|
|
|
* @param {string} str string input
|
|
|
|
* @param {string} salt salt
|
|
|
|
* @returns {string} salt
|
|
|
|
*/
|
|
|
|
function hash_sha512 (str, salt) {
|
|
|
|
const md = crypto.createHash ('sha512');
|
|
|
|
md.update (str);
|
|
|
|
md.update (salt);
|
|
|
|
return md.digest ('hex');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* sign an object
|
|
|
|
*
|
|
|
|
* @param {any} obj object to sign
|
|
|
|
* @param {string} key key to use
|
|
|
|
* @param {string} key_info key identifier
|
|
|
|
* @returns {string} signed object
|
|
|
|
*/
|
|
|
|
function sign_object (obj, key, key_info = null) {
|
|
|
|
const payload = { iat: Date.now (), key_info, obj };
|
|
|
|
const str = encoding.to_b64 (JSON.stringify (payload));
|
|
|
|
const token = encoding.to_b64 (hash_sha512 (str, key), 'hex');
|
|
|
|
const res = `${str}.${token}`;
|
|
|
|
return encodeURIComponent (res);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* verify a signed object and return its contents
|
|
|
|
*
|
|
|
|
* @param {string} str string to verify
|
|
|
|
* @param {string} key used key
|
|
|
|
* @param {number} timeout timeout (optional)
|
|
|
|
* @returns {any} returns object if successful, else null
|
|
|
|
*/
|
|
|
|
function verify_signature (str, key, timeout = 0) {
|
|
|
|
const dec = decodeURIComponent (str)
|
|
|
|
.split ('.');
|
|
|
|
const json = JSON.parse (encoding.to_utf8 (dec[0], 'base64'));
|
|
|
|
const token = encoding.to_hex (dec[1], 'base64');
|
|
|
|
const verify_token = hash_sha512 (dec[0], key);
|
|
|
|
if (token !== verify_token)
|
|
|
|
return null;
|
|
|
|
const time = Date.now () - json.iat;
|
|
|
|
if (timeout !== 0 && time > timeout)
|
|
|
|
return null;
|
|
|
|
return json.obj;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get a signed object info and data
|
|
|
|
*
|
|
|
|
* @param {string} str string to decode
|
|
|
|
* @returns {any} data
|
|
|
|
*/
|
|
|
|
function get_signature_info (str) {
|
|
|
|
const dec = decodeURIComponent (str)
|
|
|
|
.split ('.');
|
|
|
|
const json = JSON.parse (encoding.to_utf8 (dec[0], 'base64'));
|
|
|
|
return json;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* decode a signed object without verifying the signature
|
|
|
|
*
|
|
|
|
* @param {string} str string to decode
|
|
|
|
* @returns {any} object
|
|
|
|
*/
|
|
|
|
function decode_signed (str) {
|
|
|
|
return get_signature_info (str).obj;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* creates a sha256 hash
|
|
|
|
*
|
|
|
|
* @param {any} data input
|
|
|
|
* @returns {string} hash
|
|
|
|
*/
|
|
|
|
function checksum (data) {
|
|
|
|
const md = crypto.createHash ('sha256');
|
|
|
|
md.update (String (data));
|
|
|
|
return md.digest ('hex');
|
|
|
|
}
|
|
|
|
|
2020-03-04 14:51:22 +01:00
|
|
|
/**
|
|
|
|
* encrypt plain text with aes
|
|
|
|
*
|
|
|
|
* @param {string} text plaintext
|
|
|
|
* @param {string} pass password
|
|
|
|
* @returns {string} encrypted
|
|
|
|
*/
|
|
|
|
function encrypt_aes (text, pass) {
|
2020-03-05 10:19:27 +01:00
|
|
|
const salt = crypto.randomBytes (encryption.salt_size);
|
2020-03-04 14:51:22 +01:00
|
|
|
// eslint-disable-next-line no-sync
|
|
|
|
const key = crypto.pbkdf2Sync (
|
|
|
|
Buffer.from (pass, 'utf-8'),
|
|
|
|
salt,
|
2020-03-05 10:19:27 +01:00
|
|
|
encryption.iterations,
|
|
|
|
encryption.key_size,
|
|
|
|
encryption.hash
|
2020-03-04 14:51:22 +01:00
|
|
|
);
|
2020-03-05 10:19:27 +01:00
|
|
|
const nonce = crypto.randomBytes (encryption.nonce_size);
|
|
|
|
const cipher = crypto.createCipheriv (encryption.algorithm, key, nonce);
|
2020-03-04 14:51:22 +01:00
|
|
|
return Buffer.concat ([
|
|
|
|
salt,
|
|
|
|
nonce,
|
|
|
|
cipher.update (Buffer.from (text)),
|
2020-03-05 10:19:27 +01:00
|
|
|
cipher.final ()
|
2020-03-04 14:51:22 +01:00
|
|
|
])
|
|
|
|
.toString ('base64');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* decrypt an aes string
|
|
|
|
*
|
|
|
|
* @param {string} ciphertext encrypted text
|
|
|
|
* @param {string} pass password
|
2020-03-05 10:24:27 +01:00
|
|
|
* @param {boolean} rethrow rethrow exceptions instead of returning null
|
2020-03-04 14:51:22 +01:00
|
|
|
* @returns {string} plaintext
|
|
|
|
*/
|
2020-03-05 10:24:27 +01:00
|
|
|
function decrypt_aes (ciphertext, pass, rethrow = false) {
|
2020-03-04 15:35:04 +01:00
|
|
|
try {
|
|
|
|
let buf = Buffer.from (ciphertext, 'base64');
|
|
|
|
const salt = buf.slice (0, encryption.salt_size);
|
|
|
|
buf = buf.slice (encryption.salt_size);
|
|
|
|
// eslint-disable-next-line no-sync
|
|
|
|
const key = crypto.pbkdf2Sync (
|
|
|
|
Buffer.from (pass, 'utf-8'),
|
|
|
|
salt,
|
|
|
|
encryption.iterations,
|
|
|
|
encryption.key_size,
|
|
|
|
encryption.hash
|
|
|
|
);
|
|
|
|
const nonce = buf.slice (0, encryption.nonce_size);
|
|
|
|
buf = buf.slice (encryption.nonce_size);
|
|
|
|
const cipher = crypto.createDecipheriv (encryption.algorithm, key, nonce);
|
|
|
|
return Buffer.concat ([
|
|
|
|
cipher.update (buf),
|
|
|
|
cipher.final ()
|
|
|
|
])
|
|
|
|
.toString ('utf-8');
|
|
|
|
}
|
|
|
|
catch (e) {
|
2020-03-05 10:24:27 +01:00
|
|
|
if (rethrow)
|
|
|
|
throw e;
|
2020-03-04 15:35:04 +01:00
|
|
|
}
|
2020-03-05 10:24:27 +01:00
|
|
|
return null;
|
2020-03-04 14:51:22 +01:00
|
|
|
}
|
|
|
|
|
2020-03-04 12:18:11 +01:00
|
|
|
module.exports = {
|
|
|
|
checksum,
|
|
|
|
create_salt,
|
|
|
|
decode_signed,
|
2020-03-04 14:51:22 +01:00
|
|
|
decrypt_aes,
|
|
|
|
encrypt_aes,
|
2020-03-04 12:18:11 +01:00
|
|
|
get_signature_info,
|
|
|
|
hash_sha512,
|
|
|
|
random_hex,
|
|
|
|
random_string,
|
|
|
|
sign_object,
|
|
|
|
verify_signature
|
|
|
|
};
|
|
|
|
|