mirror of
https://github.com/bitwarden/browser.git
synced 2024-10-10 06:08:34 +02:00
115 lines
3.1 KiB
JavaScript
115 lines
3.1 KiB
JavaScript
|
angular
|
||
|
.module('bit.services')
|
||
|
|
||
|
.factory('cryptoService', function ($sessionStorage) {
|
||
|
var _service = {},
|
||
|
_key,
|
||
|
_b64Key,
|
||
|
_aes;
|
||
|
|
||
|
sjcl.beware["CBC mode is dangerous because it doesn't protect message integrity."]();
|
||
|
|
||
|
_service.setKey = function (key) {
|
||
|
_key = key;
|
||
|
$sessionStorage.key = sjcl.codec.base64.fromBits(key);
|
||
|
};
|
||
|
|
||
|
_service.getKey = function (b64) {
|
||
|
if (b64 && b64 === true && _b64Key) {
|
||
|
return _b64Key;
|
||
|
}
|
||
|
else if (!b64 && _key) {
|
||
|
return _key;
|
||
|
}
|
||
|
|
||
|
if ($sessionStorage.key) {
|
||
|
_key = sjcl.codec.base64.toBits($sessionStorage.key);
|
||
|
}
|
||
|
|
||
|
if (b64 && b64 === true) {
|
||
|
_b64Key = sjcl.codec.base64.fromBits(_key);
|
||
|
return _b64Key;
|
||
|
}
|
||
|
|
||
|
return _key;
|
||
|
};
|
||
|
|
||
|
_service.clearKey = function () {
|
||
|
_key = _b64Key = _aes = null;
|
||
|
delete $sessionStorage.key;
|
||
|
};
|
||
|
|
||
|
_service.makeKey = function (password, salt, b64) {
|
||
|
var key = sjcl.misc.pbkdf2(password, salt, 5000, 256, null);
|
||
|
|
||
|
if (b64 && b64 === true) {
|
||
|
return sjcl.codec.base64.fromBits(key);
|
||
|
}
|
||
|
|
||
|
return key;
|
||
|
};
|
||
|
|
||
|
_service.hashPassword = function (password, key) {
|
||
|
if (!key) {
|
||
|
key = _service.getKey();
|
||
|
}
|
||
|
|
||
|
if (!password || !key) {
|
||
|
throw 'Invalid parameters.';
|
||
|
}
|
||
|
|
||
|
var hashBits = sjcl.misc.pbkdf2(key, password, 1, 256, null);
|
||
|
return sjcl.codec.base64.fromBits(hashBits);
|
||
|
};
|
||
|
|
||
|
_service.getAes = function () {
|
||
|
if (!_aes && _service.getKey()) {
|
||
|
_aes = new sjcl.cipher.aes(_service.getKey());
|
||
|
}
|
||
|
|
||
|
return _aes;
|
||
|
};
|
||
|
|
||
|
_service.encrypt = function (plaintextValue, key) {
|
||
|
if (!_service.getKey() && !key) {
|
||
|
throw 'Encryption key unavailable.';
|
||
|
}
|
||
|
|
||
|
if (!key) {
|
||
|
key = _service.getKey();
|
||
|
}
|
||
|
|
||
|
var response = {};
|
||
|
var params = {
|
||
|
mode: "cbc",
|
||
|
iv: sjcl.random.randomWords(4, 0)
|
||
|
};
|
||
|
|
||
|
var ctJson = sjcl.encrypt(key, plaintextValue, params, response);
|
||
|
|
||
|
var ct = ctJson.match(/"ct":"([^"]*)"/)[1];
|
||
|
var iv = sjcl.codec.base64.fromBits(response.iv);
|
||
|
|
||
|
return iv + "|" + ct;
|
||
|
};
|
||
|
|
||
|
_service.decrypt = function (encValue) {
|
||
|
if (!_service.getAes()) {
|
||
|
throw 'AES encryption unavailable.';
|
||
|
}
|
||
|
|
||
|
var encPieces = encValue.split('|');
|
||
|
if (encPieces.length != 2) {
|
||
|
return '';
|
||
|
}
|
||
|
|
||
|
var ivBits = sjcl.codec.base64.toBits(encPieces[0]);
|
||
|
var ctBits = sjcl.codec.base64.toBits(encPieces[1]);
|
||
|
|
||
|
var decBits = sjcl.mode.cbc.decrypt(_service.getAes(), ctBits, ivBits, null);
|
||
|
return sjcl.codec.utf8String.fromBits(decBits);
|
||
|
};
|
||
|
|
||
|
return _service;
|
||
|
});
|