2016-10-25 04:16:47 +02:00
|
|
|
function CryptoService(constantsService) {
|
|
|
|
this.constantsService = constantsService;
|
2017-04-22 16:58:32 +02:00
|
|
|
initCryptoService(constantsService);
|
2016-09-03 06:03:13 +02:00
|
|
|
};
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
function initCryptoService(constantsService) {
|
2016-09-03 06:03:13 +02:00
|
|
|
var _key,
|
2017-06-02 06:10:29 +02:00
|
|
|
_encKey,
|
2017-04-22 16:58:32 +02:00
|
|
|
_legacyEtmKey,
|
2016-10-25 04:16:47 +02:00
|
|
|
_keyHash,
|
2017-04-24 16:39:05 +02:00
|
|
|
_privateKey,
|
|
|
|
_orgKeys;
|
2016-09-05 07:49:44 +02:00
|
|
|
|
2016-09-03 06:03:13 +02:00
|
|
|
CryptoService.prototype.setKey = function (key, callback) {
|
2016-09-02 06:50:57 +02:00
|
|
|
if (!callback || typeof callback !== 'function') {
|
|
|
|
throw 'callback function required';
|
|
|
|
}
|
|
|
|
|
2016-10-25 04:16:47 +02:00
|
|
|
var self = this;
|
2016-09-02 06:50:57 +02:00
|
|
|
_key = key;
|
2016-10-25 04:16:47 +02:00
|
|
|
|
|
|
|
chrome.storage.local.get(self.constantsService.lockOptionKey, function (obj) {
|
|
|
|
if (obj && (obj[self.constantsService.lockOptionKey] || obj[self.constantsService.lockOptionKey] === 0)) {
|
|
|
|
// if we have a lock option set, we do not store the key
|
|
|
|
callback();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.storage.local.set({
|
2017-04-22 16:58:32 +02:00
|
|
|
'key': key.keyB64
|
2016-10-25 04:16:47 +02:00
|
|
|
}, function () {
|
|
|
|
callback();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
CryptoService.prototype.setKeyHash = function (keyHash, callback) {
|
|
|
|
if (!callback || typeof callback !== 'function') {
|
|
|
|
throw 'callback function required';
|
|
|
|
}
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
_keyHash = keyHash;
|
2016-10-25 04:16:47 +02:00
|
|
|
|
2016-09-02 06:50:57 +02:00
|
|
|
chrome.storage.local.set({
|
2017-04-22 16:58:32 +02:00
|
|
|
'keyHash': _keyHash
|
2016-09-02 06:50:57 +02:00
|
|
|
}, function () {
|
|
|
|
callback();
|
|
|
|
});
|
2016-09-03 06:03:13 +02:00
|
|
|
}
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
CryptoService.prototype.setEncKey = function (encKey) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
2017-06-06 14:48:05 +02:00
|
|
|
if (encKey === undefined) {
|
|
|
|
deferred.resolve();
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
chrome.storage.local.set({
|
|
|
|
'encKey': encKey
|
|
|
|
}, function () {
|
|
|
|
_encKey = null;
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
CryptoService.prototype.setEncPrivateKey = function (encPrivateKey) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
2017-06-06 14:48:05 +02:00
|
|
|
if (encPrivateKey === undefined) {
|
|
|
|
deferred.resolve();
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
chrome.storage.local.set({
|
|
|
|
'encPrivateKey': encPrivateKey
|
|
|
|
}, function () {
|
2017-06-02 06:10:29 +02:00
|
|
|
_privateKey = null;
|
2017-04-24 16:39:05 +02:00
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
CryptoService.prototype.setOrgKeys = function (orgs) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
|
|
|
var orgKeys = {};
|
|
|
|
for (var i = 0; i < orgs.length; i++) {
|
|
|
|
orgKeys[orgs[i].id] = orgs[i].key;
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.storage.local.set({
|
|
|
|
'encOrgKeys': orgKeys
|
|
|
|
}, function () {
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
CryptoService.prototype.getKey = function () {
|
|
|
|
var deferred = Q.defer();
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
if (_key) {
|
2017-06-02 06:10:29 +02:00
|
|
|
deferred.resolve(_key);
|
|
|
|
return deferred.promise;
|
2016-10-25 04:16:47 +02:00
|
|
|
}
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2016-10-25 04:16:47 +02:00
|
|
|
var self = this;
|
|
|
|
chrome.storage.local.get(self.constantsService.lockOptionKey, function (obj) {
|
|
|
|
if (obj && (obj[self.constantsService.lockOptionKey] || obj[self.constantsService.lockOptionKey] === 0)) {
|
|
|
|
// if we have a lock option set, we do not try to fetch the storage key since it should not even be there
|
2017-06-02 06:10:29 +02:00
|
|
|
deferred.resolve(null);
|
2016-10-25 04:16:47 +02:00
|
|
|
return;
|
2016-09-02 06:50:57 +02:00
|
|
|
}
|
|
|
|
|
2016-10-25 04:16:47 +02:00
|
|
|
chrome.storage.local.get('key', function (obj) {
|
|
|
|
if (obj && obj.key) {
|
2017-04-22 20:38:41 +02:00
|
|
|
_key = new SymmetricCryptoKey(obj.key, true);
|
2016-10-25 04:16:47 +02:00
|
|
|
}
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
deferred.resolve(_key);
|
2016-10-25 04:16:47 +02:00
|
|
|
});
|
|
|
|
});
|
2017-06-02 06:10:29 +02:00
|
|
|
|
|
|
|
return deferred.promise;
|
2016-10-25 04:16:47 +02:00
|
|
|
};
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
CryptoService.prototype.getKeyHash = function (callback) {
|
2016-10-25 04:16:47 +02:00
|
|
|
if (!callback || typeof callback !== 'function') {
|
|
|
|
throw 'callback function required';
|
|
|
|
}
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
if (_keyHash) {
|
2016-10-25 04:16:47 +02:00
|
|
|
callback(_keyHash);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.storage.local.get('keyHash', function (obj) {
|
|
|
|
if (obj && obj.keyHash) {
|
2017-04-22 16:58:32 +02:00
|
|
|
_keyHash = obj.keyHash;
|
2016-09-02 06:50:57 +02:00
|
|
|
}
|
|
|
|
|
2016-10-25 04:16:47 +02:00
|
|
|
callback(_keyHash);
|
2016-09-02 06:50:57 +02:00
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
CryptoService.prototype.getEncKey = function () {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
if (_encKey) {
|
|
|
|
deferred.resolve(_encKey);
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
var self = this;
|
|
|
|
chrome.storage.local.get('encKey', function (obj) {
|
|
|
|
if (!obj || !obj.encKey) {
|
|
|
|
deferred.resolve(null);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
self.getKey().then(function (key) {
|
|
|
|
return self.decrypt(new CipherString(obj.encKey), key, 'raw');
|
|
|
|
}).then(function (encKey) {
|
|
|
|
_encKey = new SymmetricCryptoKey(encKey);
|
|
|
|
deferred.resolve(_encKey);
|
|
|
|
}, function () {
|
|
|
|
deferred.reject('Cannot get enc key. Decryption failed.');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
CryptoService.prototype.getPrivateKey = function () {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
if (_privateKey) {
|
|
|
|
deferred.resolve(_privateKey);
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
var self = this;
|
|
|
|
chrome.storage.local.get('encPrivateKey', function (obj) {
|
|
|
|
if (!obj || !obj.encPrivateKey) {
|
2017-05-22 15:28:11 +02:00
|
|
|
deferred.resolve(null);
|
2017-04-24 16:39:05 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
self.decrypt(new CipherString(obj.encPrivateKey), null, 'raw').then(function (privateKey) {
|
|
|
|
var privateKeyB64 = forge.util.encode64(privateKey);
|
|
|
|
_privateKey = fromB64ToBuffer(privateKeyB64);
|
|
|
|
deferred.resolve(_privateKey);
|
|
|
|
}, function () {
|
|
|
|
deferred.reject('Cannot get private key. Decryption failed.');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.getOrgKeys = function () {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
|
|
|
if (_orgKeys && _orgKeys.length) {
|
|
|
|
deferred.resolve(_orgKeys);
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
var self = this;
|
|
|
|
chrome.storage.local.get('encOrgKeys', function (obj) {
|
|
|
|
if (obj && obj.encOrgKeys) {
|
|
|
|
var orgKeys = {},
|
|
|
|
setKey = false;
|
|
|
|
|
|
|
|
var decPromises = [];
|
|
|
|
for (var orgId in obj.encOrgKeys) {
|
|
|
|
if (obj.encOrgKeys.hasOwnProperty(orgId)) {
|
|
|
|
(function (orgIdInstance) {
|
|
|
|
var promise = self.rsaDecrypt(obj.encOrgKeys[orgIdInstance]).then(function (decValueB64) {
|
|
|
|
orgKeys[orgIdInstance] = new SymmetricCryptoKey(decValueB64, true);
|
|
|
|
setKey = true;
|
|
|
|
}, function (err) {
|
|
|
|
console.log('getOrgKeys error: ' + err);
|
|
|
|
});
|
|
|
|
decPromises.push(promise);
|
|
|
|
})(orgId);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Q.all(decPromises).then(function () {
|
|
|
|
if (setKey) {
|
|
|
|
_orgKeys = orgKeys;
|
|
|
|
}
|
|
|
|
|
|
|
|
deferred.resolve(_orgKeys);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
deferred.resolve(null);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.getOrgKey = function (orgId) {
|
|
|
|
if (!orgId) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
deferred.resolve(null);
|
|
|
|
return deferred.promise;
|
2016-09-02 06:50:57 +02:00
|
|
|
}
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
return this.getOrgKeys().then(function (orgKeys) {
|
|
|
|
if (!orgKeys || !(orgId in orgKeys)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return orgKeys[orgId];
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.clearKey = function (callback) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
_key = _legacyEtmKey = null;
|
2016-09-02 06:50:57 +02:00
|
|
|
chrome.storage.local.remove('key', function () {
|
2017-04-24 16:39:05 +02:00
|
|
|
deferred.resolve();
|
2016-09-02 06:50:57 +02:00
|
|
|
});
|
2017-04-24 16:39:05 +02:00
|
|
|
|
|
|
|
return deferred.promise;
|
2016-09-02 06:50:57 +02:00
|
|
|
};
|
|
|
|
|
2016-10-25 04:16:47 +02:00
|
|
|
CryptoService.prototype.clearKeyHash = function (callback) {
|
2017-04-24 16:39:05 +02:00
|
|
|
var deferred = Q.defer();
|
|
|
|
|
|
|
|
_keyHash = null;
|
|
|
|
chrome.storage.local.remove('keyHash', function () {
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
CryptoService.prototype.clearEncKey = function () {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
|
|
|
_encKey = null;
|
|
|
|
chrome.storage.local.remove('encKey', function () {
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
2017-06-05 22:01:29 +02:00
|
|
|
CryptoService.prototype.clearPrivateKey = function (memoryOnly) {
|
2017-06-02 06:10:29 +02:00
|
|
|
var deferred = Q.defer();
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
_privateKey = null;
|
2017-06-05 22:01:29 +02:00
|
|
|
if (memoryOnly) {
|
2017-06-02 06:10:29 +02:00
|
|
|
deferred.resolve();
|
2017-06-05 22:01:29 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
chrome.storage.local.remove('encPrivateKey', function () {
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
}
|
2017-06-02 06:10:29 +02:00
|
|
|
|
|
|
|
return deferred.promise;
|
2017-04-24 16:39:05 +02:00
|
|
|
};
|
|
|
|
|
2017-04-24 16:53:23 +02:00
|
|
|
CryptoService.prototype.clearOrgKeys = function (memoryOnly) {
|
2017-04-24 16:39:05 +02:00
|
|
|
var deferred = Q.defer();
|
|
|
|
|
2017-04-24 16:53:23 +02:00
|
|
|
_orgKeys = null;
|
|
|
|
if (memoryOnly) {
|
2017-04-24 16:39:05 +02:00
|
|
|
deferred.resolve();
|
2017-04-24 16:53:23 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
chrome.storage.local.remove('encOrgKeys', function () {
|
|
|
|
deferred.resolve();
|
|
|
|
});
|
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.clearKeys = function (callback) {
|
2016-10-25 04:16:47 +02:00
|
|
|
if (!callback || typeof callback !== 'function') {
|
|
|
|
throw 'callback function required';
|
|
|
|
}
|
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
var self = this;
|
2017-06-02 06:10:29 +02:00
|
|
|
Q.all([
|
|
|
|
self.clearKey(),
|
|
|
|
self.clearKeyHash(),
|
|
|
|
self.clearOrgKeys(),
|
|
|
|
self.clearEncKey(),
|
|
|
|
self.clearPrivateKey()
|
|
|
|
]).then(function () {
|
2016-10-25 04:16:47 +02:00
|
|
|
callback();
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.toggleKey = function (callback) {
|
|
|
|
if (!callback || typeof callback !== 'function') {
|
|
|
|
throw 'callback function required';
|
|
|
|
}
|
|
|
|
|
|
|
|
var self = this;
|
2017-06-02 06:10:29 +02:00
|
|
|
self.getKey().then(function (key) {
|
2016-10-25 04:16:47 +02:00
|
|
|
chrome.storage.local.get(self.constantsService.lockOptionKey, function (obj) {
|
|
|
|
if (obj && (obj[self.constantsService.lockOptionKey] || obj[self.constantsService.lockOptionKey] === 0)) {
|
|
|
|
// if we have a lock option set, clear the key
|
2017-04-24 16:39:05 +02:00
|
|
|
self.clearKey().then(function () {
|
2016-10-25 04:16:47 +02:00
|
|
|
_key = key;
|
|
|
|
callback();
|
|
|
|
return;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// no lock option, so store the current key
|
|
|
|
self.setKey(key, function () {
|
|
|
|
callback();
|
|
|
|
return;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
CryptoService.prototype.makeKey = function (password, salt) {
|
|
|
|
var keyBytes = forge.pbkdf2(forge.util.encodeUtf8(password), forge.util.encodeUtf8(salt),
|
2017-02-16 01:02:55 +01:00
|
|
|
5000, 256 / 8, 'sha256');
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-04-22 20:38:41 +02:00
|
|
|
return new SymmetricCryptoKey(keyBytes);
|
2016-09-02 06:50:57 +02:00
|
|
|
};
|
|
|
|
|
2016-09-05 06:03:49 +02:00
|
|
|
CryptoService.prototype.hashPassword = function (password, key, callback) {
|
2017-06-02 06:10:29 +02:00
|
|
|
this.getKey().then(function (storedKey) {
|
2017-04-22 16:58:32 +02:00
|
|
|
key = key || storedKey;
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2016-09-05 06:03:49 +02:00
|
|
|
if (!password || !key) {
|
|
|
|
throw 'Invalid parameters.';
|
|
|
|
}
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
var hashBits = forge.pbkdf2(key.key, forge.util.encodeUtf8(password), 1, 256 / 8, 'sha256');
|
2017-01-13 05:57:56 +01:00
|
|
|
callback(forge.util.encode64(hashBits));
|
2016-12-10 16:33:58 +01:00
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
CryptoService.prototype.makeEncKey = function (key) {
|
|
|
|
var bytes = forge.random.getBytesSync(512 / 8);
|
|
|
|
return this.encrypt(bytes, key, 'raw');
|
|
|
|
};
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
CryptoService.prototype.encrypt = function (plainValue, key, plainValueEncoding) {
|
2016-12-10 16:33:58 +01:00
|
|
|
var self = this;
|
2016-09-17 05:47:50 +02:00
|
|
|
var deferred = Q.defer();
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
if (plainValue === null || plainValue === undefined) {
|
2016-09-17 05:47:50 +02:00
|
|
|
deferred.resolve(null);
|
|
|
|
}
|
|
|
|
else {
|
2017-06-02 06:10:29 +02:00
|
|
|
getKeyForEncryption(self, key).then(function (keyToUse) {
|
|
|
|
key = keyToUse;
|
2017-04-22 16:58:32 +02:00
|
|
|
if (!key) {
|
2017-05-22 15:03:59 +02:00
|
|
|
deferred.reject('Encryption key unavailable.');
|
|
|
|
return;
|
2017-04-22 16:58:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
plainValueEncoding = plainValueEncoding || 'utf8';
|
|
|
|
var buffer = forge.util.createBuffer(plainValue, plainValueEncoding);
|
|
|
|
var ivBytes = forge.random.getBytesSync(16);
|
|
|
|
var cipher = forge.cipher.createCipher('AES-CBC', key.encKey);
|
|
|
|
cipher.start({ iv: ivBytes });
|
|
|
|
cipher.update(buffer);
|
|
|
|
cipher.finish();
|
|
|
|
|
|
|
|
var iv = forge.util.encode64(ivBytes);
|
|
|
|
var ctBytes = cipher.output.getBytes();
|
|
|
|
var ct = forge.util.encode64(ctBytes);
|
2017-04-27 18:01:22 +02:00
|
|
|
var mac = !key.macKey ? null : computeMac(ctBytes, ivBytes, key.macKey, true);
|
2017-04-22 16:58:32 +02:00
|
|
|
|
|
|
|
var cs = new CipherString(key.encType, iv, ct, mac);
|
|
|
|
deferred.resolve(cs);
|
2016-09-17 05:47:50 +02:00
|
|
|
});
|
2016-09-05 07:49:44 +02:00
|
|
|
}
|
|
|
|
|
2016-09-17 05:47:50 +02:00
|
|
|
return deferred.promise;
|
2016-09-02 06:50:57 +02:00
|
|
|
};
|
|
|
|
|
2017-04-22 16:58:32 +02:00
|
|
|
CryptoService.prototype.decrypt = function (cipherString, key, outputEncoding) {
|
2016-09-17 05:47:50 +02:00
|
|
|
var deferred = Q.defer();
|
2016-12-10 16:33:58 +01:00
|
|
|
var self = this;
|
2016-09-02 06:50:57 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
if (cipherString === null || cipherString === undefined || !cipherString.encryptedString) {
|
|
|
|
deferred.reject('cannot decrypt nothing');
|
|
|
|
return;
|
|
|
|
}
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
getKeyForEncryption(self, key).then(function (keyToUse) {
|
|
|
|
key = keyToUse;
|
2017-05-22 15:03:59 +02:00
|
|
|
if (!key) {
|
|
|
|
deferred.reject('Encryption key unavailable.');
|
|
|
|
return;
|
|
|
|
}
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
outputEncoding = outputEncoding || 'utf8';
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
if (cipherString.encryptionType === constantsService.encType.AesCbc128_HmacSha256_B64 &&
|
|
|
|
key.encType === constantsService.encType.AesCbc256_B64) {
|
|
|
|
// Old encrypt-then-mac scheme, swap out the key
|
|
|
|
_legacyEtmKey = _legacyEtmKey ||
|
|
|
|
new SymmetricCryptoKey(key.key, false, constantsService.encType.AesCbc128_HmacSha256_B64);
|
|
|
|
key = _legacyEtmKey;
|
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
if (cipherString.encryptionType !== key.encType) {
|
|
|
|
deferred.reject('encType unavailable.');
|
|
|
|
return;
|
|
|
|
}
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
var ivBytes = forge.util.decode64(cipherString.initializationVector);
|
|
|
|
var ctBytes = forge.util.decode64(cipherString.cipherText);
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
if (key.macKey && cipherString.mac) {
|
|
|
|
var macBytes = forge.util.decode64(cipherString.mac);
|
|
|
|
var computedMacBytes = computeMac(ctBytes, ivBytes, key.macKey, false);
|
|
|
|
if (!macsEqual(key.macKey, computedMacBytes, macBytes)) {
|
|
|
|
console.error('MAC failed.');
|
|
|
|
deferred.reject('MAC failed.');
|
2017-04-22 16:58:32 +02:00
|
|
|
}
|
2017-05-22 15:03:59 +02:00
|
|
|
}
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
var ctBuffer = forge.util.createBuffer(ctBytes);
|
|
|
|
var decipher = forge.cipher.createDecipher('AES-CBC', key.encKey);
|
|
|
|
decipher.start({ iv: ivBytes });
|
|
|
|
decipher.update(ctBuffer);
|
|
|
|
decipher.finish();
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
var decValue;
|
|
|
|
if (outputEncoding === 'utf8') {
|
|
|
|
decValue = decipher.output.toString('utf8');
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
decValue = decipher.output.getBytes();
|
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
|
2017-05-22 15:03:59 +02:00
|
|
|
deferred.resolve(decValue);
|
|
|
|
});
|
2017-04-24 16:39:05 +02:00
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
};
|
|
|
|
|
|
|
|
CryptoService.prototype.rsaDecrypt = function (encValue) {
|
|
|
|
var headerPieces = encValue.split('.'),
|
|
|
|
encType,
|
|
|
|
encPiece;
|
|
|
|
|
|
|
|
if (headerPieces.length === 1) {
|
|
|
|
encType = constantsService.encType.Rsa2048_OaepSha256_B64;
|
|
|
|
encPiece = headerPieces[0];
|
|
|
|
}
|
|
|
|
else if (headerPieces.length === 2) {
|
|
|
|
try {
|
|
|
|
encType = parseInt(headerPieces[0]);
|
|
|
|
encPiece = headerPieces[1];
|
2017-04-22 16:58:32 +02:00
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
catch (e) { }
|
|
|
|
}
|
|
|
|
|
|
|
|
var padding = null;
|
|
|
|
if (encType === constantsService.encType.Rsa2048_OaepSha256_B64) {
|
|
|
|
padding = {
|
|
|
|
name: 'RSA-OAEP',
|
|
|
|
hash: { name: 'SHA-256' }
|
2017-04-22 16:58:32 +02:00
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
}
|
|
|
|
else if (encType === constantsService.encType.Rsa2048_OaepSha1_B64) {
|
|
|
|
padding = {
|
|
|
|
name: 'RSA-OAEP',
|
|
|
|
hash: { name: 'SHA-1' }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
throw 'encType unavailable.';
|
|
|
|
}
|
2016-09-17 05:47:50 +02:00
|
|
|
|
2017-04-24 16:39:05 +02:00
|
|
|
return this.getPrivateKey().then(function (privateKeyBytes) {
|
|
|
|
if (!privateKeyBytes) {
|
|
|
|
throw 'No private key.';
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!padding) {
|
|
|
|
throw 'Cannot determine padding.';
|
|
|
|
}
|
|
|
|
|
|
|
|
return window.crypto.subtle.importKey('pkcs8', privateKeyBytes, padding, false, ['decrypt']);
|
|
|
|
}).then(function (privateKey) {
|
|
|
|
if (!encPiece) {
|
|
|
|
throw 'encPiece unavailable.';
|
|
|
|
}
|
|
|
|
|
|
|
|
var ctBytes = fromB64ToBuffer(encPiece);
|
|
|
|
return window.crypto.subtle.decrypt({ name: padding.name }, privateKey, ctBytes);
|
|
|
|
}, function () {
|
|
|
|
throw 'Cannot import privateKey.';
|
|
|
|
}).then(function (decBytes) {
|
|
|
|
var b64DecValue = toB64FromBuffer(decBytes);
|
|
|
|
return b64DecValue;
|
|
|
|
}, function () {
|
|
|
|
throw 'Cannot rsa decrypt.';
|
|
|
|
});
|
2016-09-02 06:50:57 +02:00
|
|
|
};
|
2016-12-10 16:33:58 +01:00
|
|
|
|
2017-04-27 18:01:22 +02:00
|
|
|
function computeMac(ct, iv, macKey, b64Output) {
|
2017-01-13 05:57:56 +01:00
|
|
|
var hmac = forge.hmac.create();
|
|
|
|
hmac.start('sha256', macKey);
|
2017-01-13 06:22:42 +01:00
|
|
|
hmac.update(iv + ct);
|
2017-01-13 05:57:56 +01:00
|
|
|
var mac = hmac.digest();
|
2017-04-27 18:01:22 +02:00
|
|
|
return b64Output ? forge.util.encode64(mac.getBytes()) : mac.getBytes();
|
|
|
|
}
|
|
|
|
|
2017-06-02 06:10:29 +02:00
|
|
|
function getKeyForEncryption(self, key) {
|
|
|
|
var deferred = Q.defer();
|
|
|
|
|
|
|
|
if (key) {
|
|
|
|
deferred.resolve(key);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
self.getEncKey().then(function (encKey) {
|
|
|
|
return encKey || self.getKey();
|
|
|
|
}).then(function (keyToUse) {
|
|
|
|
deferred.resolve(keyToUse);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return deferred.promise;
|
|
|
|
}
|
|
|
|
|
2017-04-27 18:13:55 +02:00
|
|
|
// Safely compare two MACs in a way that protects against timing attacks (Double HMAC Verification).
|
2017-04-27 18:01:22 +02:00
|
|
|
// ref: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2011/february/double-hmac-verification/
|
|
|
|
function macsEqual(macKey, mac1, mac2) {
|
|
|
|
var hmac = forge.hmac.create();
|
|
|
|
|
|
|
|
hmac.start('sha256', macKey);
|
|
|
|
hmac.update(mac1);
|
|
|
|
mac1 = hmac.digest().getBytes();
|
|
|
|
|
|
|
|
hmac.start(null, null);
|
|
|
|
hmac.update(mac2);
|
|
|
|
mac2 = hmac.digest().getBytes();
|
|
|
|
|
|
|
|
return mac1 === mac2;
|
2016-12-10 16:33:58 +01:00
|
|
|
}
|
2017-04-22 16:58:32 +02:00
|
|
|
|
2017-04-22 20:38:41 +02:00
|
|
|
function SymmetricCryptoKey(keyBytes, b64KeyBytes, encType) {
|
2017-04-22 16:58:32 +02:00
|
|
|
if (b64KeyBytes) {
|
|
|
|
keyBytes = forge.util.decode64(keyBytes);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!keyBytes) {
|
|
|
|
throw 'Must provide keyBytes';
|
|
|
|
}
|
|
|
|
|
|
|
|
var buffer = forge.util.createBuffer(keyBytes);
|
|
|
|
if (!buffer || buffer.length() === 0) {
|
|
|
|
throw 'Couldn\'t make buffer';
|
|
|
|
}
|
|
|
|
var bufferLength = buffer.length();
|
|
|
|
|
|
|
|
if (encType === null || encType === undefined) {
|
|
|
|
if (bufferLength === 32) {
|
|
|
|
encType = constantsService.encType.AesCbc256_B64;
|
|
|
|
}
|
|
|
|
else if (bufferLength === 64) {
|
|
|
|
encType = constantsService.encType.AesCbc256_HmacSha256_B64;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
throw 'Unable to determine encType.';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
this.key = keyBytes;
|
|
|
|
this.keyB64 = forge.util.encode64(keyBytes);
|
|
|
|
this.encType = encType;
|
|
|
|
|
|
|
|
if (encType === constantsService.encType.AesCbc256_B64 && bufferLength === 32) {
|
|
|
|
this.encKey = keyBytes;
|
|
|
|
this.macKey = null;
|
|
|
|
}
|
|
|
|
else if (encType === constantsService.encType.AesCbc128_HmacSha256_B64 && bufferLength === 32) {
|
|
|
|
this.encKey = buffer.getBytes(16); // first half
|
|
|
|
this.macKey = buffer.getBytes(16); // second half
|
|
|
|
}
|
|
|
|
else if (encType === constantsService.encType.AesCbc256_HmacSha256_B64 && bufferLength === 64) {
|
|
|
|
this.encKey = buffer.getBytes(32); // first half
|
|
|
|
this.macKey = buffer.getBytes(32); // second half
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
throw 'Unsupported encType/key length.';
|
|
|
|
}
|
|
|
|
}
|
2017-04-24 16:39:05 +02:00
|
|
|
|
|
|
|
function fromB64ToBuffer(str) {
|
|
|
|
var binary_string = window.atob(str);
|
|
|
|
var len = binary_string.length;
|
|
|
|
var bytes = new Uint8Array(len);
|
|
|
|
for (var i = 0; i < len; i++) {
|
|
|
|
bytes[i] = binary_string.charCodeAt(i);
|
|
|
|
}
|
|
|
|
return bytes.buffer;
|
|
|
|
}
|
|
|
|
|
|
|
|
function toB64FromBuffer(buffer) {
|
|
|
|
var binary = '';
|
|
|
|
var bytes = new Uint8Array(buffer);
|
|
|
|
var len = bytes.byteLength;
|
|
|
|
for (var i = 0; i < len; i++) {
|
|
|
|
binary += String.fromCharCode(bytes[i]);
|
|
|
|
}
|
|
|
|
return window.btoa(binary);
|
|
|
|
}
|
2016-09-04 06:34:24 +02:00
|
|
|
};
|