"use strict"; var _interopRequireWildcard = require("@babel/runtime/helpers/interopRequireWildcard"); var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault"); Object.defineProperty(exports, "__esModule", { value: true }); exports.decryptEncryptedPrivateKeyInfo = exports.encryptEncryptedPrivateKeyInfo = void 0; var _regenerator = _interopRequireDefault(require("@babel/runtime/regenerator")); var _asyncToGenerator2 = _interopRequireDefault(require("@babel/runtime/helpers/asyncToGenerator")); var _params = _interopRequireWildcard(require("./params.js")); var _asn1def = require("./asn1def.js"); var _des = _interopRequireDefault(require("des.js")); var _buffer = _interopRequireDefault(require("buffer")); var _asn = _interopRequireDefault(require("asn1.js")); var _jsEncodingUtils = _interopRequireDefault(require("js-encoding-utils")); var _jsCryptoPbkdf = _interopRequireDefault(require("js-crypto-pbkdf")); var _jsCryptoAes = _interopRequireDefault(require("js-crypto-aes")); var _jsCryptoRandom = _interopRequireDefault(require("js-crypto-random")); /** * rfc8081 */ var Buffer = _buffer.default.Buffer; var BN = _asn.default.bignum; /////////////////////////////////////////////////////////////////// /** * Generate EncryptedPrivateKeyInfo ASN.1 object. * @param {DER} binKey - Binary key in DER format. * @param {AsnEncryptOptionsWithPassphrase} [options={passphrase: ''}] - Encryption options for ASN.1 private key. * @return {Promise} - Encrypted private key in DER. */ var encryptEncryptedPrivateKeyInfo = /*#__PURE__*/ function () { var _ref = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee(binKey) { var options, kdfAlgorithm, encryptedPBES2, encryptedPBES1, _args = arguments; return _regenerator.default.wrap(function _callee$(_context) { while (1) { switch (_context.prev = _context.next) { case 0: options = _args.length > 1 && _args[1] !== undefined ? _args[1] : { passphrase: '' }; // default params if (typeof options.algorithm === 'undefined') options.algorithm = 'pbes2'; if (typeof options.iterationCount === 'undefined') options.iterationCount = 2048; if (!(options.algorithm === 'pbes2')) { _context.next = 15; break; } if (typeof options.cipher === 'undefined') options.cipher = 'aes256-cbc'; if (typeof options.prf === 'undefined') options.prf = 'hmacWithSHA256'; kdfAlgorithm = 'pbkdf2'; // TODO: currently only pbkdf2 is available _context.next = 9; return encryptPBES2(binKey, options.passphrase, kdfAlgorithm, options.prf, options.iterationCount, options.cipher); case 9: encryptedPBES2 = _context.sent; _context.next = 12; return encodePBES2(encryptedPBES2); case 12: return _context.abrupt("return", _context.sent); case 15: _context.next = 17; return encryptPBES1(binKey, options.passphrase, options.algorithm, options.iterationCount); case 17: encryptedPBES1 = _context.sent; encryptedPBES1.encryptionAlgorithm.algorithm = _params.default.passwordBasedEncryptionSchemes[encryptedPBES1.encryptionAlgorithm.algorithm].oid; encryptedPBES1.encryptionAlgorithm.parameters = _asn1def.PBEParameter.encode(encryptedPBES1.encryptionAlgorithm.parameters, 'der'); return _context.abrupt("return", _asn1def.EncryptedPrivateKeyInfo.encode(encryptedPBES1, 'der')); case 21: case "end": return _context.stop(); } } }, _callee); })); return function encryptEncryptedPrivateKeyInfo(_x) { return _ref.apply(this, arguments); }; }(); /** * Decrypt EncryptedPrivateKeyInfo * @param {Object} epki - Parsed encrypted * @param {String} passphrase - Passphrase to decyrpt the object. * @return {Promise} - Decrypted object. */ exports.encryptEncryptedPrivateKeyInfo = encryptEncryptedPrivateKeyInfo; var decryptEncryptedPrivateKeyInfo = /*#__PURE__*/ function () { var _ref2 = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee2(epki, passphrase) { var decoded; return _regenerator.default.wrap(function _callee2$(_context2) { while (1) { switch (_context2.prev = _context2.next) { case 0: decoded = {}; // encryptionAlgorithm.algorithm decoded.encryptionAlgorithm = { algorithm: (0, _params.getAlgorithmFromOidStrict)(epki.encryptionAlgorithm.algorithm, _params.default.passwordBasedEncryptionSchemes) }; if (decoded.encryptionAlgorithm.algorithm === 'pbes2') { decoded.encryptionAlgorithm.parameters = decodePBES2(epki.encryptionAlgorithm.parameters); } else { decoded.encryptionAlgorithm.parameters = _asn1def.PBEParameter.decode(epki.encryptionAlgorithm.parameters, 'der'); } decoded.encryptedData = epki.encryptedData; // decrypt if (!(decoded.encryptionAlgorithm.algorithm === 'pbes2')) { _context2.next = 10; break; } _context2.next = 7; return decryptPBES2(decoded, passphrase); case 7: return _context2.abrupt("return", _context2.sent); case 10: _context2.next = 12; return decryptPBES1(decoded, passphrase); case 12: return _context2.abrupt("return", _context2.sent); case 13: case "end": return _context2.stop(); } } }, _callee2); })); return function decryptEncryptedPrivateKeyInfo(_x2, _x3) { return _ref2.apply(this, arguments); }; }(); ////////////////////////////// exports.decryptEncryptedPrivateKeyInfo = decryptEncryptedPrivateKeyInfo; var encodePBES2 = function encodePBES2(decoded) { var epki = { encryptionAlgorithm: {} }; // algorithm epki.encryptionAlgorithm.algorithm = _params.default.passwordBasedEncryptionSchemes[decoded.encryptionAlgorithm.algorithm].oid; // kdf var kdf = decoded.encryptionAlgorithm.parameters.keyDerivationFunc; if (kdf.algorithm === 'pbkdf2') { kdf.parameters.prf.algorithm = _params.default.pbkdf2Prfs[kdf.parameters.prf.algorithm].oid; kdf.parameters = _asn1def.PBKDF2Params.encode(kdf.parameters, 'der'); } else throw new Error('UnsupportedKDF'); kdf.algorithm = _params.default.keyDerivationFunctions[kdf.algorithm].oid; // encryptionScheme var eS = decoded.encryptionAlgorithm.parameters.encryptionScheme; if (Object.keys(_asn1def.PBES2ESParams).indexOf(eS.algorithm) >= 0) { eS.parameters = _asn1def.PBES2ESParams[eS.algorithm].encode(eS.parameters, 'der'); } else throw new Error('UnsupportedCipher'); eS.algorithm = _params.default.encryptionSchemes[eS.algorithm].oid; // params epki.encryptionAlgorithm.parameters = _asn1def.PBES2Params.encode({ keyDerivationFunc: kdf, encryptionScheme: eS }, 'der'); // encoded data epki.encryptedData = decoded.encryptedData; return _asn1def.EncryptedPrivateKeyInfo.encode(epki, 'der'); }; var decodePBES2 = function decodePBES2(rawParams) { var pbes2Params = _asn1def.PBES2Params.decode(rawParams, 'der'); // keyDerivationFunc var kdfAlgorithm = (0, _params.getAlgorithmFromOidStrict)(pbes2Params.keyDerivationFunc.algorithm, _params.default.keyDerivationFunctions); var iterationCount; var salt; var prf; if (kdfAlgorithm === 'pbkdf2') { var pbkdf2Params = _asn1def.PBKDF2Params.decode(pbes2Params.keyDerivationFunc.parameters, 'der'); prf = { algorithm: (0, _params.getAlgorithmFromOidStrict)(pbkdf2Params.prf.algorithm, _params.default.pbkdf2Prfs), parameters: pbkdf2Params.prf.parameters }; iterationCount = pbkdf2Params.iterationCount; salt = { type: pbkdf2Params.salt.type, value: pbkdf2Params.salt.value }; } else throw new Error('UnsupportedKDF'); //encryptionScheme var encryptionScheme = (0, _params.getAlgorithmFromOidStrict)(pbes2Params.encryptionScheme.algorithm, _params.default.encryptionSchemes); var encryptionParams; if (Object.keys(_asn1def.PBES2ESParams).indexOf(encryptionScheme) >= 0) { encryptionParams = _asn1def.PBES2ESParams[encryptionScheme].decode(pbes2Params.encryptionScheme.parameters, 'der'); } else throw new Error('UnsupportedCipher'); // TODO: Other Encryption Scheme return { keyDerivationFunc: { algorithm: kdfAlgorithm, parameters: { salt: salt, iterationCount: iterationCount, prf: prf } }, encryptionScheme: { algorithm: encryptionScheme, parameters: encryptionParams } }; }; ////////////////////// // PBES2 RFC8018 Section 6.2.1 var encryptPBES2 = /*#__PURE__*/ function () { var _ref3 = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee3(binKey, passphrase, kdfAlgorithm, prf, iterationCount, cipher) { var pBuffer, salt, keyLength, key, iv, encryptedData, CBC, ct; return _regenerator.default.wrap(function _callee3$(_context3) { while (1) { switch (_context3.prev = _context3.next) { case 0: // kdf pBuffer = _jsEncodingUtils.default.encoder.stringToArrayBuffer(passphrase); _context3.next = 3; return _jsCryptoRandom.default.getRandomBytes(_params.default.keyDerivationFunctions[kdfAlgorithm].defaultSaltLen); case 3: salt = _context3.sent; // TODO: currently only salt length of 8 is available keyLength = _params.default.encryptionSchemes[cipher].keyLength; // get keyLength if (!(kdfAlgorithm === 'pbkdf2')) { _context3.next = 11; break; } _context3.next = 8; return _jsCryptoPbkdf.default.pbkdf2(pBuffer, salt, iterationCount, keyLength, _params.default.pbkdf2Prfs[prf].hash); case 8: key = _context3.sent; _context3.next = 12; break; case 11: throw new Error('UnsupportedKDF'); case 12: if (!(cipher === 'des-ede3-cbc')) { _context3.next = 23; break; } _context3.t0 = Buffer; _context3.next = 16; return _jsCryptoRandom.default.getRandomBytes(_params.default.encryptionSchemes[cipher].ivLength); case 16: _context3.t1 = _context3.sent; iv = _context3.t0.from.call(_context3.t0, _context3.t1); CBC = _des.default.CBC.instantiate(_des.default.EDE); ct = CBC.create({ type: 'encrypt', key: Buffer.from(key), iv: iv }); encryptedData = Buffer.from(ct.update(binKey).concat(ct.final())); _context3.next = 36; break; case 23: if (!(cipher === 'aes128-cbc' || cipher === 'aes192-cbc' || cipher === 'aes256-cbc')) { _context3.next = 35; break; } _context3.next = 26; return _jsCryptoRandom.default.getRandomBytes(_params.default.encryptionSchemes[cipher].ivLength); case 26: iv = _context3.sent; _context3.t2 = Buffer; _context3.next = 30; return _jsCryptoAes.default.encrypt(new Uint8Array(binKey), key, { name: 'AES-CBC', iv: iv }); case 30: _context3.t3 = _context3.sent; encryptedData = _context3.t2.from.call(_context3.t2, _context3.t3); iv = Buffer.from(iv); _context3.next = 36; break; case 35: throw new Error('UnsupportedCipher'); case 36: return _context3.abrupt("return", { encryptedData: encryptedData, encryptionAlgorithm: { algorithm: 'pbes2', parameters: { keyDerivationFunc: { algorithm: kdfAlgorithm, parameters: { salt: { type: 'specified', value: Buffer.from(salt) }, iterationCount: new BN(iterationCount), prf: { algorithm: prf, parameters: Buffer.from([0x05, 0x00]) } } }, encryptionScheme: { algorithm: cipher, parameters: iv } } } }); case 37: case "end": return _context3.stop(); } } }, _callee3); })); return function encryptPBES2(_x4, _x5, _x6, _x7, _x8, _x9) { return _ref3.apply(this, arguments); }; }(); ////////////////////////////// // PBES2 RFC8018 Section 6.2.2 var decryptPBES2 = /*#__PURE__*/ function () { var _ref4 = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee4(decoded, passphrase) { var kdf, eS, keyLength, key, pBuffer, salt, iterationCount, prf, out, iv, CBC, pt, _iv; return _regenerator.default.wrap(function _callee4$(_context4) { while (1) { switch (_context4.prev = _context4.next) { case 0: kdf = decoded.encryptionAlgorithm.parameters.keyDerivationFunc; eS = decoded.encryptionAlgorithm.parameters.encryptionScheme; // pbkdf2 keyLength = _params.default.encryptionSchemes[eS.algorithm].keyLength; // get keyLength if (!(kdf.algorithm === 'pbkdf2')) { _context4.next = 15; break; } pBuffer = _jsEncodingUtils.default.encoder.stringToArrayBuffer(passphrase); if (!(kdf.parameters.salt.type !== 'specified')) { _context4.next = 7; break; } throw new Error('UnsupportedSaltSource'); case 7: salt = new Uint8Array(kdf.parameters.salt.value); iterationCount = kdf.parameters.iterationCount.toNumber(); prf = kdf.parameters.prf.algorithm; _context4.next = 12; return _jsCryptoPbkdf.default.pbkdf2(pBuffer, salt, iterationCount, keyLength, _params.default.pbkdf2Prfs[prf].hash); case 12: key = _context4.sent; _context4.next = 16; break; case 15: throw new Error('UnsupportedKDF'); case 16: if (!(eS.algorithm === 'des-ede3-cbc')) { _context4.next = 23; break; } iv = eS.parameters; CBC = _des.default.CBC.instantiate(_des.default.EDE); pt = CBC.create({ type: 'decrypt', key: key, iv: iv }); out = Buffer.from(pt.update(decoded.encryptedData).concat(pt.final())); _context4.next = 33; break; case 23: if (!(eS.algorithm === 'aes128-cbc' || eS.algorithm === 'aes192-cbc' || eS.algorithm === 'aes256-cbc')) { _context4.next = 32; break; } _iv = new Uint8Array(eS.parameters); _context4.t0 = Buffer; _context4.next = 28; return _jsCryptoAes.default.decrypt(new Uint8Array(decoded.encryptedData), key, { name: 'AES-CBC', iv: _iv }); case 28: _context4.t1 = _context4.sent; out = _context4.t0.from.call(_context4.t0, _context4.t1); _context4.next = 33; break; case 32: throw new Error('UnsupportedEncryptionAlgorithm'); case 33: return _context4.abrupt("return", _asn1def.OneAsymmetricKey.decode(out, 'der')); case 34: case "end": return _context4.stop(); } } }, _callee4); })); return function decryptPBES2(_x10, _x11) { return _ref4.apply(this, arguments); }; }(); ////////////////////////////// // PBES1 RFC8018 Section 6.1.1 var encryptPBES1 = /*#__PURE__*/ function () { var _ref5 = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee5(binKey, passphrase, algorithm, iterationCount) { var pBuffer, salt, hash, keyIv, key, iv, encrypt, out, CBC, ct; return _regenerator.default.wrap(function _callee5$(_context5) { while (1) { switch (_context5.prev = _context5.next) { case 0: // pbkdf1 pBuffer = _jsEncodingUtils.default.encoder.stringToArrayBuffer(passphrase); _context5.next = 3; return _jsCryptoRandom.default.getRandomBytes(8); case 3: salt = _context5.sent; // defined as 8 octet hash = _params.default.passwordBasedEncryptionSchemes[algorithm].hash; _context5.next = 7; return _jsCryptoPbkdf.default.pbkdf1(pBuffer, salt, iterationCount, 16, hash); case 7: keyIv = _context5.sent; key = keyIv.slice(0, 8); iv = keyIv.slice(8, 16); // decryption encrypt = _params.default.passwordBasedEncryptionSchemes[algorithm].encrypt; if (!(encrypt === 'DES-CBC')) { _context5.next = 17; break; } CBC = _des.default.CBC.instantiate(_des.default.DES); ct = CBC.create({ type: 'encrypt', key: key, iv: iv }); out = Buffer.from(ct.update(binKey).concat(ct.final())); _context5.next = 18; break; case 17: throw new Error('UnsupportedEncryptionAlgorithm'); case 18: return _context5.abrupt("return", { encryptionAlgorithm: { algorithm: algorithm, parameters: { salt: Buffer.from(salt), iterationCount: new BN(iterationCount) } }, encryptedData: out }); case 19: case "end": return _context5.stop(); } } }, _callee5); })); return function encryptPBES1(_x12, _x13, _x14, _x15) { return _ref5.apply(this, arguments); }; }(); ////////////////////////////// // PBES1 RFC8018 Section 6.1.2 var decryptPBES1 = /*#__PURE__*/ function () { var _ref6 = (0, _asyncToGenerator2.default)( /*#__PURE__*/ _regenerator.default.mark(function _callee6(decoded, passphrase) { var pBuffer, salt, hash, iterationCount, keyIv, key, iv, encrypt, out, CBC, ct; return _regenerator.default.wrap(function _callee6$(_context6) { while (1) { switch (_context6.prev = _context6.next) { case 0: // pbkdf1 pBuffer = _jsEncodingUtils.default.encoder.stringToArrayBuffer(passphrase); salt = new Uint8Array(decoded.encryptionAlgorithm.parameters.salt); hash = _params.default.passwordBasedEncryptionSchemes[decoded.encryptionAlgorithm.algorithm].hash; iterationCount = decoded.encryptionAlgorithm.parameters.iterationCount.toNumber(); _context6.next = 6; return _jsCryptoPbkdf.default.pbkdf1(pBuffer, salt, iterationCount, 16, hash); case 6: keyIv = _context6.sent; key = keyIv.slice(0, 8); iv = keyIv.slice(8, 16); // decryption encrypt = _params.default.passwordBasedEncryptionSchemes[decoded.encryptionAlgorithm.algorithm].encrypt; if (!(encrypt === 'DES-CBC')) { _context6.next = 16; break; } CBC = _des.default.CBC.instantiate(_des.default.DES); ct = CBC.create({ type: 'decrypt', key: key, iv: iv }); out = Buffer.from(ct.update(decoded.encryptedData).concat(ct.final())); _context6.next = 17; break; case 16: throw new Error('UnsupportedEncryptionAlgorithm'); case 17: return _context6.abrupt("return", _asn1def.OneAsymmetricKey.decode(out, 'der')); case 18: case "end": return _context6.stop(); } } }, _callee6); })); return function decryptPBES1(_x16, _x17) { return _ref6.apply(this, arguments); }; }();