mirror of
https://github.com/musix-org/musix-oss
synced 2024-12-23 16:13:18 +00:00
1024 lines
30 KiB
JavaScript
1024 lines
30 KiB
JavaScript
/**
|
|
* Password-based encryption functions.
|
|
*
|
|
* @author Dave Longley
|
|
* @author Stefan Siegl <stesie@brokenpipe.de>
|
|
*
|
|
* Copyright (c) 2010-2013 Digital Bazaar, Inc.
|
|
* Copyright (c) 2012 Stefan Siegl <stesie@brokenpipe.de>
|
|
*
|
|
* An EncryptedPrivateKeyInfo:
|
|
*
|
|
* EncryptedPrivateKeyInfo ::= SEQUENCE {
|
|
* encryptionAlgorithm EncryptionAlgorithmIdentifier,
|
|
* encryptedData EncryptedData }
|
|
*
|
|
* EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
|
|
*
|
|
* EncryptedData ::= OCTET STRING
|
|
*/
|
|
var forge = require('./forge');
|
|
require('./aes');
|
|
require('./asn1');
|
|
require('./des');
|
|
require('./md');
|
|
require('./oids');
|
|
require('./pbkdf2');
|
|
require('./pem');
|
|
require('./random');
|
|
require('./rc2');
|
|
require('./rsa');
|
|
require('./util');
|
|
|
|
if(typeof BigInteger === 'undefined') {
|
|
var BigInteger = forge.jsbn.BigInteger;
|
|
}
|
|
|
|
// shortcut for asn.1 API
|
|
var asn1 = forge.asn1;
|
|
|
|
/* Password-based encryption implementation. */
|
|
var pki = forge.pki = forge.pki || {};
|
|
module.exports = pki.pbe = forge.pbe = forge.pbe || {};
|
|
var oids = pki.oids;
|
|
|
|
// validator for an EncryptedPrivateKeyInfo structure
|
|
// Note: Currently only works w/algorithm params
|
|
var encryptedPrivateKeyValidator = {
|
|
name: 'EncryptedPrivateKeyInfo',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'EncryptedPrivateKeyInfo.encryptionAlgorithm',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'AlgorithmIdentifier.algorithm',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OID,
|
|
constructed: false,
|
|
capture: 'encryptionOid'
|
|
}, {
|
|
name: 'AlgorithmIdentifier.parameters',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
captureAsn1: 'encryptionParams'
|
|
}]
|
|
}, {
|
|
// encryptedData
|
|
name: 'EncryptedPrivateKeyInfo.encryptedData',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OCTETSTRING,
|
|
constructed: false,
|
|
capture: 'encryptedData'
|
|
}]
|
|
};
|
|
|
|
// validator for a PBES2Algorithms structure
|
|
// Note: Currently only works w/PBKDF2 + AES encryption schemes
|
|
var PBES2AlgorithmsValidator = {
|
|
name: 'PBES2Algorithms',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'PBES2Algorithms.keyDerivationFunc',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'PBES2Algorithms.keyDerivationFunc.oid',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OID,
|
|
constructed: false,
|
|
capture: 'kdfOid'
|
|
}, {
|
|
name: 'PBES2Algorithms.params',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'PBES2Algorithms.params.salt',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OCTETSTRING,
|
|
constructed: false,
|
|
capture: 'kdfSalt'
|
|
}, {
|
|
name: 'PBES2Algorithms.params.iterationCount',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.INTEGER,
|
|
constructed: false,
|
|
capture: 'kdfIterationCount'
|
|
}, {
|
|
name: 'PBES2Algorithms.params.keyLength',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.INTEGER,
|
|
constructed: false,
|
|
optional: true,
|
|
capture: 'keyLength'
|
|
}, {
|
|
// prf
|
|
name: 'PBES2Algorithms.params.prf',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
optional: true,
|
|
value: [{
|
|
name: 'PBES2Algorithms.params.prf.algorithm',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OID,
|
|
constructed: false,
|
|
capture: 'prfOid'
|
|
}]
|
|
}]
|
|
}]
|
|
}, {
|
|
name: 'PBES2Algorithms.encryptionScheme',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'PBES2Algorithms.encryptionScheme.oid',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OID,
|
|
constructed: false,
|
|
capture: 'encOid'
|
|
}, {
|
|
name: 'PBES2Algorithms.encryptionScheme.iv',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OCTETSTRING,
|
|
constructed: false,
|
|
capture: 'encIv'
|
|
}]
|
|
}]
|
|
};
|
|
|
|
var pkcs12PbeParamsValidator = {
|
|
name: 'pkcs-12PbeParams',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.SEQUENCE,
|
|
constructed: true,
|
|
value: [{
|
|
name: 'pkcs-12PbeParams.salt',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.OCTETSTRING,
|
|
constructed: false,
|
|
capture: 'salt'
|
|
}, {
|
|
name: 'pkcs-12PbeParams.iterations',
|
|
tagClass: asn1.Class.UNIVERSAL,
|
|
type: asn1.Type.INTEGER,
|
|
constructed: false,
|
|
capture: 'iterations'
|
|
}]
|
|
};
|
|
|
|
/**
|
|
* Encrypts a ASN.1 PrivateKeyInfo object, producing an EncryptedPrivateKeyInfo.
|
|
*
|
|
* PBES2Algorithms ALGORITHM-IDENTIFIER ::=
|
|
* { {PBES2-params IDENTIFIED BY id-PBES2}, ...}
|
|
*
|
|
* id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13}
|
|
*
|
|
* PBES2-params ::= SEQUENCE {
|
|
* keyDerivationFunc AlgorithmIdentifier {{PBES2-KDFs}},
|
|
* encryptionScheme AlgorithmIdentifier {{PBES2-Encs}}
|
|
* }
|
|
*
|
|
* PBES2-KDFs ALGORITHM-IDENTIFIER ::=
|
|
* { {PBKDF2-params IDENTIFIED BY id-PBKDF2}, ... }
|
|
*
|
|
* PBES2-Encs ALGORITHM-IDENTIFIER ::= { ... }
|
|
*
|
|
* PBKDF2-params ::= SEQUENCE {
|
|
* salt CHOICE {
|
|
* specified OCTET STRING,
|
|
* otherSource AlgorithmIdentifier {{PBKDF2-SaltSources}}
|
|
* },
|
|
* iterationCount INTEGER (1..MAX),
|
|
* keyLength INTEGER (1..MAX) OPTIONAL,
|
|
* prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1
|
|
* }
|
|
*
|
|
* @param obj the ASN.1 PrivateKeyInfo object.
|
|
* @param password the password to encrypt with.
|
|
* @param options:
|
|
* algorithm the encryption algorithm to use
|
|
* ('aes128', 'aes192', 'aes256', '3des'), defaults to 'aes128'.
|
|
* count the iteration count to use.
|
|
* saltSize the salt size to use.
|
|
* prfAlgorithm the PRF message digest algorithm to use
|
|
* ('sha1', 'sha224', 'sha256', 'sha384', 'sha512')
|
|
*
|
|
* @return the ASN.1 EncryptedPrivateKeyInfo.
|
|
*/
|
|
pki.encryptPrivateKeyInfo = function(obj, password, options) {
|
|
// set default options
|
|
options = options || {};
|
|
options.saltSize = options.saltSize || 8;
|
|
options.count = options.count || 2048;
|
|
options.algorithm = options.algorithm || 'aes128';
|
|
options.prfAlgorithm = options.prfAlgorithm || 'sha1';
|
|
|
|
// generate PBE params
|
|
var salt = forge.random.getBytesSync(options.saltSize);
|
|
var count = options.count;
|
|
var countBytes = asn1.integerToDer(count);
|
|
var dkLen;
|
|
var encryptionAlgorithm;
|
|
var encryptedData;
|
|
if(options.algorithm.indexOf('aes') === 0 || options.algorithm === 'des') {
|
|
// do PBES2
|
|
var ivLen, encOid, cipherFn;
|
|
switch(options.algorithm) {
|
|
case 'aes128':
|
|
dkLen = 16;
|
|
ivLen = 16;
|
|
encOid = oids['aes128-CBC'];
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case 'aes192':
|
|
dkLen = 24;
|
|
ivLen = 16;
|
|
encOid = oids['aes192-CBC'];
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case 'aes256':
|
|
dkLen = 32;
|
|
ivLen = 16;
|
|
encOid = oids['aes256-CBC'];
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case 'des':
|
|
dkLen = 8;
|
|
ivLen = 8;
|
|
encOid = oids['desCBC'];
|
|
cipherFn = forge.des.createEncryptionCipher;
|
|
break;
|
|
default:
|
|
var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.');
|
|
error.algorithm = options.algorithm;
|
|
throw error;
|
|
}
|
|
|
|
// get PRF message digest
|
|
var prfAlgorithm = 'hmacWith' + options.prfAlgorithm.toUpperCase();
|
|
var md = prfAlgorithmToMessageDigest(prfAlgorithm);
|
|
|
|
// encrypt private key using pbe SHA-1 and AES/DES
|
|
var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md);
|
|
var iv = forge.random.getBytesSync(ivLen);
|
|
var cipher = cipherFn(dk);
|
|
cipher.start(iv);
|
|
cipher.update(asn1.toDer(obj));
|
|
cipher.finish();
|
|
encryptedData = cipher.output.getBytes();
|
|
|
|
// get PBKDF2-params
|
|
var params = createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm);
|
|
|
|
encryptionAlgorithm = asn1.create(
|
|
asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
|
|
asn1.oidToDer(oids['pkcs5PBES2']).getBytes()),
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
// keyDerivationFunc
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
|
|
asn1.oidToDer(oids['pkcs5PBKDF2']).getBytes()),
|
|
// PBKDF2-params
|
|
params
|
|
]),
|
|
// encryptionScheme
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
|
|
asn1.oidToDer(encOid).getBytes()),
|
|
// iv
|
|
asn1.create(
|
|
asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, iv)
|
|
])
|
|
])
|
|
]);
|
|
} else if(options.algorithm === '3des') {
|
|
// Do PKCS12 PBE
|
|
dkLen = 24;
|
|
|
|
var saltBytes = new forge.util.ByteBuffer(salt);
|
|
var dk = pki.pbe.generatePkcs12Key(password, saltBytes, 1, count, dkLen);
|
|
var iv = pki.pbe.generatePkcs12Key(password, saltBytes, 2, count, dkLen);
|
|
var cipher = forge.des.createEncryptionCipher(dk);
|
|
cipher.start(iv);
|
|
cipher.update(asn1.toDer(obj));
|
|
cipher.finish();
|
|
encryptedData = cipher.output.getBytes();
|
|
|
|
encryptionAlgorithm = asn1.create(
|
|
asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
|
|
asn1.oidToDer(oids['pbeWithSHAAnd3-KeyTripleDES-CBC']).getBytes()),
|
|
// pkcs-12PbeParams
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
// salt
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt),
|
|
// iteration count
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
|
|
countBytes.getBytes())
|
|
])
|
|
]);
|
|
} else {
|
|
var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.');
|
|
error.algorithm = options.algorithm;
|
|
throw error;
|
|
}
|
|
|
|
// EncryptedPrivateKeyInfo
|
|
var rval = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
// encryptionAlgorithm
|
|
encryptionAlgorithm,
|
|
// encryptedData
|
|
asn1.create(
|
|
asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, encryptedData)
|
|
]);
|
|
return rval;
|
|
};
|
|
|
|
/**
|
|
* Decrypts a ASN.1 PrivateKeyInfo object.
|
|
*
|
|
* @param obj the ASN.1 EncryptedPrivateKeyInfo object.
|
|
* @param password the password to decrypt with.
|
|
*
|
|
* @return the ASN.1 PrivateKeyInfo on success, null on failure.
|
|
*/
|
|
pki.decryptPrivateKeyInfo = function(obj, password) {
|
|
var rval = null;
|
|
|
|
// get PBE params
|
|
var capture = {};
|
|
var errors = [];
|
|
if(!asn1.validate(obj, encryptedPrivateKeyValidator, capture, errors)) {
|
|
var error = new Error('Cannot read encrypted private key. ' +
|
|
'ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
|
|
error.errors = errors;
|
|
throw error;
|
|
}
|
|
|
|
// get cipher
|
|
var oid = asn1.derToOid(capture.encryptionOid);
|
|
var cipher = pki.pbe.getCipher(oid, capture.encryptionParams, password);
|
|
|
|
// get encrypted data
|
|
var encrypted = forge.util.createBuffer(capture.encryptedData);
|
|
|
|
cipher.update(encrypted);
|
|
if(cipher.finish()) {
|
|
rval = asn1.fromDer(cipher.output);
|
|
}
|
|
|
|
return rval;
|
|
};
|
|
|
|
/**
|
|
* Converts a EncryptedPrivateKeyInfo to PEM format.
|
|
*
|
|
* @param epki the EncryptedPrivateKeyInfo.
|
|
* @param maxline the maximum characters per line, defaults to 64.
|
|
*
|
|
* @return the PEM-formatted encrypted private key.
|
|
*/
|
|
pki.encryptedPrivateKeyToPem = function(epki, maxline) {
|
|
// convert to DER, then PEM-encode
|
|
var msg = {
|
|
type: 'ENCRYPTED PRIVATE KEY',
|
|
body: asn1.toDer(epki).getBytes()
|
|
};
|
|
return forge.pem.encode(msg, {maxline: maxline});
|
|
};
|
|
|
|
/**
|
|
* Converts a PEM-encoded EncryptedPrivateKeyInfo to ASN.1 format. Decryption
|
|
* is not performed.
|
|
*
|
|
* @param pem the EncryptedPrivateKeyInfo in PEM-format.
|
|
*
|
|
* @return the ASN.1 EncryptedPrivateKeyInfo.
|
|
*/
|
|
pki.encryptedPrivateKeyFromPem = function(pem) {
|
|
var msg = forge.pem.decode(pem)[0];
|
|
|
|
if(msg.type !== 'ENCRYPTED PRIVATE KEY') {
|
|
var error = new Error('Could not convert encrypted private key from PEM; ' +
|
|
'PEM header type is "ENCRYPTED PRIVATE KEY".');
|
|
error.headerType = msg.type;
|
|
throw error;
|
|
}
|
|
if(msg.procType && msg.procType.type === 'ENCRYPTED') {
|
|
throw new Error('Could not convert encrypted private key from PEM; ' +
|
|
'PEM is encrypted.');
|
|
}
|
|
|
|
// convert DER to ASN.1 object
|
|
return asn1.fromDer(msg.body);
|
|
};
|
|
|
|
/**
|
|
* Encrypts an RSA private key. By default, the key will be wrapped in
|
|
* a PrivateKeyInfo and encrypted to produce a PKCS#8 EncryptedPrivateKeyInfo.
|
|
* This is the standard, preferred way to encrypt a private key.
|
|
*
|
|
* To produce a non-standard PEM-encrypted private key that uses encapsulated
|
|
* headers to indicate the encryption algorithm (old-style non-PKCS#8 OpenSSL
|
|
* private key encryption), set the 'legacy' option to true. Note: Using this
|
|
* option will cause the iteration count to be forced to 1.
|
|
*
|
|
* Note: The 'des' algorithm is supported, but it is not considered to be
|
|
* secure because it only uses a single 56-bit key. If possible, it is highly
|
|
* recommended that a different algorithm be used.
|
|
*
|
|
* @param rsaKey the RSA key to encrypt.
|
|
* @param password the password to use.
|
|
* @param options:
|
|
* algorithm: the encryption algorithm to use
|
|
* ('aes128', 'aes192', 'aes256', '3des', 'des').
|
|
* count: the iteration count to use.
|
|
* saltSize: the salt size to use.
|
|
* legacy: output an old non-PKCS#8 PEM-encrypted+encapsulated
|
|
* headers (DEK-Info) private key.
|
|
*
|
|
* @return the PEM-encoded ASN.1 EncryptedPrivateKeyInfo.
|
|
*/
|
|
pki.encryptRsaPrivateKey = function(rsaKey, password, options) {
|
|
// standard PKCS#8
|
|
options = options || {};
|
|
if(!options.legacy) {
|
|
// encrypt PrivateKeyInfo
|
|
var rval = pki.wrapRsaPrivateKey(pki.privateKeyToAsn1(rsaKey));
|
|
rval = pki.encryptPrivateKeyInfo(rval, password, options);
|
|
return pki.encryptedPrivateKeyToPem(rval);
|
|
}
|
|
|
|
// legacy non-PKCS#8
|
|
var algorithm;
|
|
var iv;
|
|
var dkLen;
|
|
var cipherFn;
|
|
switch(options.algorithm) {
|
|
case 'aes128':
|
|
algorithm = 'AES-128-CBC';
|
|
dkLen = 16;
|
|
iv = forge.random.getBytesSync(16);
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case 'aes192':
|
|
algorithm = 'AES-192-CBC';
|
|
dkLen = 24;
|
|
iv = forge.random.getBytesSync(16);
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case 'aes256':
|
|
algorithm = 'AES-256-CBC';
|
|
dkLen = 32;
|
|
iv = forge.random.getBytesSync(16);
|
|
cipherFn = forge.aes.createEncryptionCipher;
|
|
break;
|
|
case '3des':
|
|
algorithm = 'DES-EDE3-CBC';
|
|
dkLen = 24;
|
|
iv = forge.random.getBytesSync(8);
|
|
cipherFn = forge.des.createEncryptionCipher;
|
|
break;
|
|
case 'des':
|
|
algorithm = 'DES-CBC';
|
|
dkLen = 8;
|
|
iv = forge.random.getBytesSync(8);
|
|
cipherFn = forge.des.createEncryptionCipher;
|
|
break;
|
|
default:
|
|
var error = new Error('Could not encrypt RSA private key; unsupported ' +
|
|
'encryption algorithm "' + options.algorithm + '".');
|
|
error.algorithm = options.algorithm;
|
|
throw error;
|
|
}
|
|
|
|
// encrypt private key using OpenSSL legacy key derivation
|
|
var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen);
|
|
var cipher = cipherFn(dk);
|
|
cipher.start(iv);
|
|
cipher.update(asn1.toDer(pki.privateKeyToAsn1(rsaKey)));
|
|
cipher.finish();
|
|
|
|
var msg = {
|
|
type: 'RSA PRIVATE KEY',
|
|
procType: {
|
|
version: '4',
|
|
type: 'ENCRYPTED'
|
|
},
|
|
dekInfo: {
|
|
algorithm: algorithm,
|
|
parameters: forge.util.bytesToHex(iv).toUpperCase()
|
|
},
|
|
body: cipher.output.getBytes()
|
|
};
|
|
return forge.pem.encode(msg);
|
|
};
|
|
|
|
/**
|
|
* Decrypts an RSA private key.
|
|
*
|
|
* @param pem the PEM-formatted EncryptedPrivateKeyInfo to decrypt.
|
|
* @param password the password to use.
|
|
*
|
|
* @return the RSA key on success, null on failure.
|
|
*/
|
|
pki.decryptRsaPrivateKey = function(pem, password) {
|
|
var rval = null;
|
|
|
|
var msg = forge.pem.decode(pem)[0];
|
|
|
|
if(msg.type !== 'ENCRYPTED PRIVATE KEY' &&
|
|
msg.type !== 'PRIVATE KEY' &&
|
|
msg.type !== 'RSA PRIVATE KEY') {
|
|
var error = new Error('Could not convert private key from PEM; PEM header type ' +
|
|
'is not "ENCRYPTED PRIVATE KEY", "PRIVATE KEY", or "RSA PRIVATE KEY".');
|
|
error.headerType = error;
|
|
throw error;
|
|
}
|
|
|
|
if(msg.procType && msg.procType.type === 'ENCRYPTED') {
|
|
var dkLen;
|
|
var cipherFn;
|
|
switch(msg.dekInfo.algorithm) {
|
|
case 'DES-CBC':
|
|
dkLen = 8;
|
|
cipherFn = forge.des.createDecryptionCipher;
|
|
break;
|
|
case 'DES-EDE3-CBC':
|
|
dkLen = 24;
|
|
cipherFn = forge.des.createDecryptionCipher;
|
|
break;
|
|
case 'AES-128-CBC':
|
|
dkLen = 16;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'AES-192-CBC':
|
|
dkLen = 24;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'AES-256-CBC':
|
|
dkLen = 32;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'RC2-40-CBC':
|
|
dkLen = 5;
|
|
cipherFn = function(key) {
|
|
return forge.rc2.createDecryptionCipher(key, 40);
|
|
};
|
|
break;
|
|
case 'RC2-64-CBC':
|
|
dkLen = 8;
|
|
cipherFn = function(key) {
|
|
return forge.rc2.createDecryptionCipher(key, 64);
|
|
};
|
|
break;
|
|
case 'RC2-128-CBC':
|
|
dkLen = 16;
|
|
cipherFn = function(key) {
|
|
return forge.rc2.createDecryptionCipher(key, 128);
|
|
};
|
|
break;
|
|
default:
|
|
var error = new Error('Could not decrypt private key; unsupported ' +
|
|
'encryption algorithm "' + msg.dekInfo.algorithm + '".');
|
|
error.algorithm = msg.dekInfo.algorithm;
|
|
throw error;
|
|
}
|
|
|
|
// use OpenSSL legacy key derivation
|
|
var iv = forge.util.hexToBytes(msg.dekInfo.parameters);
|
|
var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen);
|
|
var cipher = cipherFn(dk);
|
|
cipher.start(iv);
|
|
cipher.update(forge.util.createBuffer(msg.body));
|
|
if(cipher.finish()) {
|
|
rval = cipher.output.getBytes();
|
|
} else {
|
|
return rval;
|
|
}
|
|
} else {
|
|
rval = msg.body;
|
|
}
|
|
|
|
if(msg.type === 'ENCRYPTED PRIVATE KEY') {
|
|
rval = pki.decryptPrivateKeyInfo(asn1.fromDer(rval), password);
|
|
} else {
|
|
// decryption already performed above
|
|
rval = asn1.fromDer(rval);
|
|
}
|
|
|
|
if(rval !== null) {
|
|
rval = pki.privateKeyFromAsn1(rval);
|
|
}
|
|
|
|
return rval;
|
|
};
|
|
|
|
/**
|
|
* Derives a PKCS#12 key.
|
|
*
|
|
* @param password the password to derive the key material from, null or
|
|
* undefined for none.
|
|
* @param salt the salt, as a ByteBuffer, to use.
|
|
* @param id the PKCS#12 ID byte (1 = key material, 2 = IV, 3 = MAC).
|
|
* @param iter the iteration count.
|
|
* @param n the number of bytes to derive from the password.
|
|
* @param md the message digest to use, defaults to SHA-1.
|
|
*
|
|
* @return a ByteBuffer with the bytes derived from the password.
|
|
*/
|
|
pki.pbe.generatePkcs12Key = function(password, salt, id, iter, n, md) {
|
|
var j, l;
|
|
|
|
if(typeof md === 'undefined' || md === null) {
|
|
if(!('sha1' in forge.md)) {
|
|
throw new Error('"sha1" hash algorithm unavailable.');
|
|
}
|
|
md = forge.md.sha1.create();
|
|
}
|
|
|
|
var u = md.digestLength;
|
|
var v = md.blockLength;
|
|
var result = new forge.util.ByteBuffer();
|
|
|
|
/* Convert password to Unicode byte buffer + trailing 0-byte. */
|
|
var passBuf = new forge.util.ByteBuffer();
|
|
if(password !== null && password !== undefined) {
|
|
for(l = 0; l < password.length; l++) {
|
|
passBuf.putInt16(password.charCodeAt(l));
|
|
}
|
|
passBuf.putInt16(0);
|
|
}
|
|
|
|
/* Length of salt and password in BYTES. */
|
|
var p = passBuf.length();
|
|
var s = salt.length();
|
|
|
|
/* 1. Construct a string, D (the "diversifier"), by concatenating
|
|
v copies of ID. */
|
|
var D = new forge.util.ByteBuffer();
|
|
D.fillWithByte(id, v);
|
|
|
|
/* 2. Concatenate copies of the salt together to create a string S of length
|
|
v * ceil(s / v) bytes (the final copy of the salt may be trunacted
|
|
to create S).
|
|
Note that if the salt is the empty string, then so is S. */
|
|
var Slen = v * Math.ceil(s / v);
|
|
var S = new forge.util.ByteBuffer();
|
|
for(l = 0; l < Slen; l++) {
|
|
S.putByte(salt.at(l % s));
|
|
}
|
|
|
|
/* 3. Concatenate copies of the password together to create a string P of
|
|
length v * ceil(p / v) bytes (the final copy of the password may be
|
|
truncated to create P).
|
|
Note that if the password is the empty string, then so is P. */
|
|
var Plen = v * Math.ceil(p / v);
|
|
var P = new forge.util.ByteBuffer();
|
|
for(l = 0; l < Plen; l++) {
|
|
P.putByte(passBuf.at(l % p));
|
|
}
|
|
|
|
/* 4. Set I=S||P to be the concatenation of S and P. */
|
|
var I = S;
|
|
I.putBuffer(P);
|
|
|
|
/* 5. Set c=ceil(n / u). */
|
|
var c = Math.ceil(n / u);
|
|
|
|
/* 6. For i=1, 2, ..., c, do the following: */
|
|
for(var i = 1; i <= c; i++) {
|
|
/* a) Set Ai=H^r(D||I). (l.e. the rth hash of D||I, H(H(H(...H(D||I)))) */
|
|
var buf = new forge.util.ByteBuffer();
|
|
buf.putBytes(D.bytes());
|
|
buf.putBytes(I.bytes());
|
|
for(var round = 0; round < iter; round++) {
|
|
md.start();
|
|
md.update(buf.getBytes());
|
|
buf = md.digest();
|
|
}
|
|
|
|
/* b) Concatenate copies of Ai to create a string B of length v bytes (the
|
|
final copy of Ai may be truncated to create B). */
|
|
var B = new forge.util.ByteBuffer();
|
|
for(l = 0; l < v; l++) {
|
|
B.putByte(buf.at(l % u));
|
|
}
|
|
|
|
/* c) Treating I as a concatenation I0, I1, ..., Ik-1 of v-byte blocks,
|
|
where k=ceil(s / v) + ceil(p / v), modify I by setting
|
|
Ij=(Ij+B+1) mod 2v for each j. */
|
|
var k = Math.ceil(s / v) + Math.ceil(p / v);
|
|
var Inew = new forge.util.ByteBuffer();
|
|
for(j = 0; j < k; j++) {
|
|
var chunk = new forge.util.ByteBuffer(I.getBytes(v));
|
|
var x = 0x1ff;
|
|
for(l = B.length() - 1; l >= 0; l--) {
|
|
x = x >> 8;
|
|
x += B.at(l) + chunk.at(l);
|
|
chunk.setAt(l, x & 0xff);
|
|
}
|
|
Inew.putBuffer(chunk);
|
|
}
|
|
I = Inew;
|
|
|
|
/* Add Ai to A. */
|
|
result.putBuffer(buf);
|
|
}
|
|
|
|
result.truncate(result.length() - n);
|
|
return result;
|
|
};
|
|
|
|
/**
|
|
* Get new Forge cipher object instance.
|
|
*
|
|
* @param oid the OID (in string notation).
|
|
* @param params the ASN.1 params object.
|
|
* @param password the password to decrypt with.
|
|
*
|
|
* @return new cipher object instance.
|
|
*/
|
|
pki.pbe.getCipher = function(oid, params, password) {
|
|
switch(oid) {
|
|
case pki.oids['pkcs5PBES2']:
|
|
return pki.pbe.getCipherForPBES2(oid, params, password);
|
|
|
|
case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']:
|
|
case pki.oids['pbewithSHAAnd40BitRC2-CBC']:
|
|
return pki.pbe.getCipherForPKCS12PBE(oid, params, password);
|
|
|
|
default:
|
|
var error = new Error('Cannot read encrypted PBE data block. Unsupported OID.');
|
|
error.oid = oid;
|
|
error.supportedOids = [
|
|
'pkcs5PBES2',
|
|
'pbeWithSHAAnd3-KeyTripleDES-CBC',
|
|
'pbewithSHAAnd40BitRC2-CBC'
|
|
];
|
|
throw error;
|
|
}
|
|
};
|
|
|
|
/**
|
|
* Get new Forge cipher object instance according to PBES2 params block.
|
|
*
|
|
* The returned cipher instance is already started using the IV
|
|
* from PBES2 parameter block.
|
|
*
|
|
* @param oid the PKCS#5 PBKDF2 OID (in string notation).
|
|
* @param params the ASN.1 PBES2-params object.
|
|
* @param password the password to decrypt with.
|
|
*
|
|
* @return new cipher object instance.
|
|
*/
|
|
pki.pbe.getCipherForPBES2 = function(oid, params, password) {
|
|
// get PBE params
|
|
var capture = {};
|
|
var errors = [];
|
|
if(!asn1.validate(params, PBES2AlgorithmsValidator, capture, errors)) {
|
|
var error = new Error('Cannot read password-based-encryption algorithm ' +
|
|
'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
|
|
error.errors = errors;
|
|
throw error;
|
|
}
|
|
|
|
// check oids
|
|
oid = asn1.derToOid(capture.kdfOid);
|
|
if(oid !== pki.oids['pkcs5PBKDF2']) {
|
|
var error = new Error('Cannot read encrypted private key. ' +
|
|
'Unsupported key derivation function OID.');
|
|
error.oid = oid;
|
|
error.supportedOids = ['pkcs5PBKDF2'];
|
|
throw error;
|
|
}
|
|
oid = asn1.derToOid(capture.encOid);
|
|
if(oid !== pki.oids['aes128-CBC'] &&
|
|
oid !== pki.oids['aes192-CBC'] &&
|
|
oid !== pki.oids['aes256-CBC'] &&
|
|
oid !== pki.oids['des-EDE3-CBC'] &&
|
|
oid !== pki.oids['desCBC']) {
|
|
var error = new Error('Cannot read encrypted private key. ' +
|
|
'Unsupported encryption scheme OID.');
|
|
error.oid = oid;
|
|
error.supportedOids = [
|
|
'aes128-CBC', 'aes192-CBC', 'aes256-CBC', 'des-EDE3-CBC', 'desCBC'];
|
|
throw error;
|
|
}
|
|
|
|
// set PBE params
|
|
var salt = capture.kdfSalt;
|
|
var count = forge.util.createBuffer(capture.kdfIterationCount);
|
|
count = count.getInt(count.length() << 3);
|
|
var dkLen;
|
|
var cipherFn;
|
|
switch(pki.oids[oid]) {
|
|
case 'aes128-CBC':
|
|
dkLen = 16;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'aes192-CBC':
|
|
dkLen = 24;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'aes256-CBC':
|
|
dkLen = 32;
|
|
cipherFn = forge.aes.createDecryptionCipher;
|
|
break;
|
|
case 'des-EDE3-CBC':
|
|
dkLen = 24;
|
|
cipherFn = forge.des.createDecryptionCipher;
|
|
break;
|
|
case 'desCBC':
|
|
dkLen = 8;
|
|
cipherFn = forge.des.createDecryptionCipher;
|
|
break;
|
|
}
|
|
|
|
// get PRF message digest
|
|
var md = prfOidToMessageDigest(capture.prfOid);
|
|
|
|
// decrypt private key using pbe with chosen PRF and AES/DES
|
|
var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md);
|
|
var iv = capture.encIv;
|
|
var cipher = cipherFn(dk);
|
|
cipher.start(iv);
|
|
|
|
return cipher;
|
|
};
|
|
|
|
/**
|
|
* Get new Forge cipher object instance for PKCS#12 PBE.
|
|
*
|
|
* The returned cipher instance is already started using the key & IV
|
|
* derived from the provided password and PKCS#12 PBE salt.
|
|
*
|
|
* @param oid The PKCS#12 PBE OID (in string notation).
|
|
* @param params The ASN.1 PKCS#12 PBE-params object.
|
|
* @param password The password to decrypt with.
|
|
*
|
|
* @return the new cipher object instance.
|
|
*/
|
|
pki.pbe.getCipherForPKCS12PBE = function(oid, params, password) {
|
|
// get PBE params
|
|
var capture = {};
|
|
var errors = [];
|
|
if(!asn1.validate(params, pkcs12PbeParamsValidator, capture, errors)) {
|
|
var error = new Error('Cannot read password-based-encryption algorithm ' +
|
|
'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
|
|
error.errors = errors;
|
|
throw error;
|
|
}
|
|
|
|
var salt = forge.util.createBuffer(capture.salt);
|
|
var count = forge.util.createBuffer(capture.iterations);
|
|
count = count.getInt(count.length() << 3);
|
|
|
|
var dkLen, dIvLen, cipherFn;
|
|
switch(oid) {
|
|
case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']:
|
|
dkLen = 24;
|
|
dIvLen = 8;
|
|
cipherFn = forge.des.startDecrypting;
|
|
break;
|
|
|
|
case pki.oids['pbewithSHAAnd40BitRC2-CBC']:
|
|
dkLen = 5;
|
|
dIvLen = 8;
|
|
cipherFn = function(key, iv) {
|
|
var cipher = forge.rc2.createDecryptionCipher(key, 40);
|
|
cipher.start(iv, null);
|
|
return cipher;
|
|
};
|
|
break;
|
|
|
|
default:
|
|
var error = new Error('Cannot read PKCS #12 PBE data block. Unsupported OID.');
|
|
error.oid = oid;
|
|
throw error;
|
|
}
|
|
|
|
// get PRF message digest
|
|
var md = prfOidToMessageDigest(capture.prfOid);
|
|
var key = pki.pbe.generatePkcs12Key(password, salt, 1, count, dkLen, md);
|
|
md.start();
|
|
var iv = pki.pbe.generatePkcs12Key(password, salt, 2, count, dIvLen, md);
|
|
|
|
return cipherFn(key, iv);
|
|
};
|
|
|
|
/**
|
|
* OpenSSL's legacy key derivation function.
|
|
*
|
|
* See: http://www.openssl.org/docs/crypto/EVP_BytesToKey.html
|
|
*
|
|
* @param password the password to derive the key from.
|
|
* @param salt the salt to use, null for none.
|
|
* @param dkLen the number of bytes needed for the derived key.
|
|
* @param [options] the options to use:
|
|
* [md] an optional message digest object to use.
|
|
*/
|
|
pki.pbe.opensslDeriveBytes = function(password, salt, dkLen, md) {
|
|
if(typeof md === 'undefined' || md === null) {
|
|
if(!('md5' in forge.md)) {
|
|
throw new Error('"md5" hash algorithm unavailable.');
|
|
}
|
|
md = forge.md.md5.create();
|
|
}
|
|
if(salt === null) {
|
|
salt = '';
|
|
}
|
|
var digests = [hash(md, password + salt)];
|
|
for(var length = 16, i = 1; length < dkLen; ++i, length += 16) {
|
|
digests.push(hash(md, digests[i - 1] + password + salt));
|
|
}
|
|
return digests.join('').substr(0, dkLen);
|
|
};
|
|
|
|
function hash(md, bytes) {
|
|
return md.start().update(bytes).digest().getBytes();
|
|
}
|
|
|
|
function prfOidToMessageDigest(prfOid) {
|
|
// get PRF algorithm, default to SHA-1
|
|
var prfAlgorithm;
|
|
if(!prfOid) {
|
|
prfAlgorithm = 'hmacWithSHA1';
|
|
} else {
|
|
prfAlgorithm = pki.oids[asn1.derToOid(prfOid)];
|
|
if(!prfAlgorithm) {
|
|
var error = new Error('Unsupported PRF OID.');
|
|
error.oid = prfOid;
|
|
error.supported = [
|
|
'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384',
|
|
'hmacWithSHA512'];
|
|
throw error;
|
|
}
|
|
}
|
|
return prfAlgorithmToMessageDigest(prfAlgorithm);
|
|
}
|
|
|
|
function prfAlgorithmToMessageDigest(prfAlgorithm) {
|
|
var factory = forge.md;
|
|
switch(prfAlgorithm) {
|
|
case 'hmacWithSHA224':
|
|
factory = forge.md.sha512;
|
|
case 'hmacWithSHA1':
|
|
case 'hmacWithSHA256':
|
|
case 'hmacWithSHA384':
|
|
case 'hmacWithSHA512':
|
|
prfAlgorithm = prfAlgorithm.substr(8).toLowerCase();
|
|
break;
|
|
default:
|
|
var error = new Error('Unsupported PRF algorithm.');
|
|
error.algorithm = prfAlgorithm;
|
|
error.supported = [
|
|
'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384',
|
|
'hmacWithSHA512'];
|
|
throw error;
|
|
}
|
|
if(!factory || !(prfAlgorithm in factory)) {
|
|
throw new Error('Unknown hash algorithm: ' + prfAlgorithm);
|
|
}
|
|
return factory[prfAlgorithm].create();
|
|
}
|
|
|
|
function createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm) {
|
|
var params = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
// salt
|
|
asn1.create(
|
|
asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt),
|
|
// iteration count
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
|
|
countBytes.getBytes())
|
|
]);
|
|
// when PRF algorithm is not SHA-1 default, add key length and PRF algorithm
|
|
if(prfAlgorithm !== 'hmacWithSHA1') {
|
|
params.value.push(
|
|
// key length
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
|
|
forge.util.hexToBytes(dkLen.toString(16))),
|
|
// AlgorithmIdentifier
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
|
|
// algorithm
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
|
|
asn1.oidToDer(pki.oids[prfAlgorithm]).getBytes()),
|
|
// parameters (null)
|
|
asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
|
|
]));
|
|
}
|
|
return params;
|
|
}
|