1
0
mirror of https://github.com/bitwarden/browser.git synced 2024-10-10 06:08:34 +02:00
bitwarden-browser/src/app/services/cryptoService.js

268 lines
8.4 KiB
JavaScript
Raw Normal View History

2015-12-09 04:35:05 +01:00
angular
.module('bit.services')
.factory('cryptoService', function ($sessionStorage) {
var _service = {},
_key,
_b64Key,
2017-02-28 06:18:11 +01:00
_privateKey,
_publicKey;
2015-12-09 04:35:05 +01:00
_service.setKey = function (key) {
_key = key;
$sessionStorage.key = forge.util.encode64(key);
2015-12-09 04:35:05 +01:00
};
2017-02-21 06:29:15 +01:00
_service.setPrivateKey = function (privateKeyCt, key) {
try {
var privateKey = _service.decrypt(privateKeyCt, key, 'raw');
_privateKey = privateKey;
$sessionStorage.privateKey = forge.util.encode64(privateKey);
}
catch (e) {
console.log('Cannot set private key. Decryption failed.');
}
};
2015-12-09 04:35:05 +01:00
_service.getKey = function (b64) {
if (b64 && b64 === true && _b64Key) {
return _b64Key;
}
else if (!b64 && _key) {
return _key;
}
if ($sessionStorage.key) {
_key = forge.util.decode64($sessionStorage.key);
2015-12-09 04:35:05 +01:00
}
if (b64 && b64 === true) {
_b64Key = forge.util.encode64(_key);
2015-12-09 04:35:05 +01:00
return _b64Key;
}
return _key;
};
2016-12-09 04:21:46 +01:00
_service.getEncKey = function (key) {
key = key || _service.getKey();
var buffer = forge.util.createBuffer(key);
return buffer.getBytes(16);
2016-12-09 04:21:46 +01:00
};
_service.getMacKey = function (key) {
key = key || _service.getKey();
var buffer = forge.util.createBuffer(key);
buffer.getBytes(16); // skip first half
return buffer.getBytes(16);
2016-12-09 04:21:46 +01:00
};
_service.getPrivateKey = function () {
if (_privateKey) {
return _privateKey;
}
if ($sessionStorage.privateKey) {
2017-02-28 06:18:11 +01:00
var privateKeyBytes = forge.util.decode64($sessionStorage.privateKey);
_privateKey = forge.pki.privateKeyFromAsn1(forge.asn1.fromDer(privateKeyBytes));
}
return _privateKey;
};
2017-02-28 06:18:11 +01:00
_service.getPublicKey = function () {
if (_publicKey) {
return _publicKey;
}
var privateKey = _service.getPrivateKey();
if (!privateKey) {
return null;
}
_publicKey = forge.pki.setRsaPublicKey(privateKey.n, privateKey.e);
return _publicKey;
};
2015-12-09 04:35:05 +01:00
_service.clearKey = function () {
_key = _b64Key = null;
2015-12-09 04:35:05 +01:00
delete $sessionStorage.key;
};
2017-02-28 06:18:11 +01:00
_service.clearKeyPair = function () {
_privateKey = null;
2017-02-28 06:18:11 +01:00
_publicKey = null;
delete $sessionStorage.privateKey;
};
_service.clearKeys = function () {
_service.clearKey();
2017-02-28 06:18:11 +01:00
_service.clearKeyPair();
};
2015-12-09 04:35:05 +01:00
_service.makeKey = function (password, salt, b64) {
2017-02-16 01:03:56 +01:00
var key = forge.pbkdf2(forge.util.encodeUtf8(password), forge.util.encodeUtf8(salt),
5000, 256 / 8, 'sha256');
2015-12-09 04:35:05 +01:00
if (b64 && b64 === true) {
return forge.util.encode64(key);
2015-12-09 04:35:05 +01:00
}
return key;
};
2017-02-21 05:59:12 +01:00
_service.makeKeyPair = function (key, callback) {
forge.pki.rsa.generateKeyPair({ bits: 2048, workers: 2 }, function (error, keypair) {
if (error) {
callback(null, null, error);
return;
}
var privateKey = forge.pki.privateKeyToAsn1(keypair.privateKey);
var privateKeyBytes = forge.asn1.toDer(privateKey).getBytes();
2017-02-21 05:59:12 +01:00
var privateKeyEnc = _service.encrypt(privateKeyBytes, key, 'raw');
var publicKey = forge.pki.publicKeyToAsn1(keypair.publicKey);
var publicKeyBytes = forge.asn1.toDer(publicKey).getBytes();
2017-02-21 05:59:12 +01:00
callback(forge.util.encode64(publicKeyBytes), privateKeyEnc, null);
});
};
2017-02-28 06:18:11 +01:00
_service.makeShareKey = function () {
return forge.random.getBytesSync(32);
};
2015-12-09 04:35:05 +01:00
_service.hashPassword = function (password, key) {
if (!key) {
key = _service.getKey();
}
if (!password || !key) {
throw 'Invalid parameters.';
}
2017-02-16 01:03:56 +01:00
var hashBits = forge.pbkdf2(key, forge.util.encodeUtf8(password), 1, 256 / 8, 'sha256');
return forge.util.encode64(hashBits);
2016-12-09 04:21:46 +01:00
};
2017-02-21 06:29:15 +01:00
_service.encrypt = function (plainValue, key, plainValueEncoding) {
2015-12-09 04:35:05 +01:00
if (!_service.getKey() && !key) {
throw 'Encryption key unavailable.';
}
2016-12-09 04:21:46 +01:00
// TODO: Turn on whenever ready to support encrypt-then-mac
var encKey = null;
if (false) {
encKey = _service.getEncKey(key);
}
else {
encKey = key || _service.getKey();
2015-12-09 04:35:05 +01:00
}
2017-02-21 06:29:15 +01:00
plainValueEncoding = plainValueEncoding || 'utf8';
var buffer = forge.util.createBuffer(plainValue, plainValueEncoding);
var ivBytes = forge.random.getBytesSync(16);
var cipher = forge.cipher.createCipher('AES-CBC', encKey);
cipher.start({ iv: ivBytes });
cipher.update(buffer);
cipher.finish();
2015-12-09 04:35:05 +01:00
var iv = forge.util.encode64(ivBytes);
var ctBytes = cipher.output.getBytes();
var ct = forge.util.encode64(ctBytes);
2016-12-09 04:21:46 +01:00
var cipherString = iv + '|' + ct;
// TODO: Turn on whenever ready to support encrypt-then-mac
if (false) {
var mac = computeMac(ctBytes, ivBytes);
2016-12-09 04:21:46 +01:00
cipherString = cipherString + '|' + mac;
}
return cipherString;
2015-12-09 04:35:05 +01:00
};
2017-02-28 06:18:11 +01:00
_service.rsaEncrypt = function (plainValue, publicKey) {
publicKey = publicKey || _service.getPublicKey();
if (!publicKey) {
throw 'Public key unavailable.';
}
var encryptedBytes = publicKey.encrypt(plainValue, 'RSA-OAEP', {
md: forge.md.sha256.create()
});
return forge.util.encode64(encryptedBytes);
2017-03-01 04:53:19 +01:00
};
2017-02-28 06:18:11 +01:00
2017-02-21 06:29:15 +01:00
_service.decrypt = function (encValue, key, outputEncoding) {
if (!_service.getKey() && !key) {
throw 'Encryption key unavailable.';
2015-12-09 04:35:05 +01:00
}
var encPieces = encValue.split('|');
2016-12-09 04:21:46 +01:00
if (encPieces.length !== 2 && encPieces.length !== 3) {
2015-12-09 04:35:05 +01:00
return '';
}
var ivBytes = forge.util.decode64(encPieces[0]);
var ctBytes = forge.util.decode64(encPieces[1]);
2015-12-09 04:35:05 +01:00
2016-12-09 04:21:46 +01:00
var computedMac = null;
if (encPieces.length === 3) {
computedMac = computeMac(ctBytes, ivBytes);
2016-12-09 04:21:46 +01:00
if (computedMac !== encPieces[2]) {
console.error('MAC failed.');
return '';
}
}
2017-02-21 06:29:15 +01:00
var encKey;
if (computedMac) {
encKey = _service.getEncKey(key);
}
else {
encKey = key || _service.getKey();
}
var ctBuffer = forge.util.createBuffer(ctBytes);
2017-02-21 06:29:15 +01:00
var decipher = forge.cipher.createDecipher('AES-CBC', encKey);
decipher.start({ iv: ivBytes });
decipher.update(ctBuffer);
decipher.finish();
2015-12-09 04:35:05 +01:00
outputEncoding = outputEncoding || 'utf8';
if (outputEncoding === 'utf8') {
return decipher.output.toString('utf8');
}
else {
return decipher.output.getBytes();
}
};
2016-12-09 04:21:46 +01:00
2017-02-28 06:18:11 +01:00
_service.rsaDecrypt = function (encValue, privateKey) {
privateKey = privateKey || _service.getPrivateKey();
if (!privateKey) {
throw 'Private key unavailable.';
}
var ctBytes = forge.util.decode64(encValue);
var decBytes = privateKey.decrypt(ctBytes, 'RSA-OAEP', {
md: forge.md.sha256.create()
});
return decBytes;
2017-03-01 04:53:19 +01:00
};
2017-02-28 06:18:11 +01:00
function computeMac(ct, iv, macKey) {
var hmac = forge.hmac.create();
hmac.start('sha256', macKey || _service.getMacKey());
hmac.update(iv + ct);
var mac = hmac.digest();
return forge.util.encode64(mac.getBytes());
2016-12-09 04:21:46 +01:00
}
2015-12-09 04:35:05 +01:00
return _service;
});