2016-05-19 18:47:48 +02:00
|
|
|
'use strict'
|
|
|
|
|
2016-05-19 21:45:43 +02:00
|
|
|
const protobuf = require('protocol-buffers')
|
2016-09-13 13:23:11 +02:00
|
|
|
const pbm = protobuf(require('./crypto.proto'))
|
|
|
|
const c = require('./crypto')
|
2016-05-19 21:45:43 +02:00
|
|
|
|
2016-09-13 13:23:11 +02:00
|
|
|
exports.hmac = c.hmac
|
|
|
|
exports.aes = c.aes
|
|
|
|
exports.webcrypto = c.webcrypto
|
2016-05-19 18:47:48 +02:00
|
|
|
|
2016-09-13 13:23:11 +02:00
|
|
|
const keys = exports.keys = require('./keys')
|
2016-12-23 08:52:40 -05:00
|
|
|
const KEY_TYPES = ['rsa', 'ed25519']
|
|
|
|
|
2016-05-19 22:33:09 +02:00
|
|
|
exports.keyStretcher = require('./key-stretcher')
|
|
|
|
exports.generateEphemeralKeyPair = require('./ephemeral-keys')
|
|
|
|
|
2016-05-19 18:47:48 +02:00
|
|
|
// Generates a keypair of the given type and bitsize
|
2016-09-13 13:23:11 +02:00
|
|
|
exports.generateKeyPair = (type, bits, cb) => {
|
2016-05-19 20:18:31 +02:00
|
|
|
let key = keys[type.toLowerCase()]
|
|
|
|
if (!key) {
|
2016-09-13 13:23:11 +02:00
|
|
|
return cb(new Error('invalid or unsupported key type'))
|
2016-05-19 18:47:48 +02:00
|
|
|
}
|
|
|
|
|
2016-09-13 13:23:11 +02:00
|
|
|
key.generateKeyPair(bits, cb)
|
2016-05-19 18:47:48 +02:00
|
|
|
}
|
|
|
|
|
2016-05-19 21:45:43 +02:00
|
|
|
// Converts a protobuf serialized public key into its
|
|
|
|
// representative object
|
|
|
|
exports.unmarshalPublicKey = (buf) => {
|
|
|
|
const decoded = pbm.PublicKey.decode(buf)
|
|
|
|
|
|
|
|
switch (decoded.Type) {
|
|
|
|
case pbm.KeyType.RSA:
|
|
|
|
return keys.rsa.unmarshalRsaPublicKey(decoded.Data)
|
2016-12-23 08:52:40 -05:00
|
|
|
case pbm.KeyType.Ed25519:
|
|
|
|
return keys.ed25519.unmarshalEd25519PublicKey(decoded.Data)
|
2016-05-19 21:45:43 +02:00
|
|
|
default:
|
|
|
|
throw new Error('invalid or unsupported key type')
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Converts a public key object into a protobuf serialized public key
|
|
|
|
exports.marshalPublicKey = (key, type) => {
|
|
|
|
type = (type || 'rsa').toLowerCase()
|
2016-12-23 08:52:40 -05:00
|
|
|
if (KEY_TYPES.indexOf(type) < 0) {
|
2016-05-19 21:45:43 +02:00
|
|
|
throw new Error('invalid or unsupported key type')
|
|
|
|
}
|
|
|
|
|
2016-09-13 13:23:11 +02:00
|
|
|
return key.bytes
|
2016-05-19 21:45:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Converts a protobuf serialized private key into its
|
|
|
|
// representative object
|
2016-09-13 13:23:11 +02:00
|
|
|
exports.unmarshalPrivateKey = (buf, callback) => {
|
2016-05-19 21:45:43 +02:00
|
|
|
const decoded = pbm.PrivateKey.decode(buf)
|
|
|
|
|
|
|
|
switch (decoded.Type) {
|
|
|
|
case pbm.KeyType.RSA:
|
2016-09-13 13:23:11 +02:00
|
|
|
return keys.rsa.unmarshalRsaPrivateKey(decoded.Data, callback)
|
2016-12-23 08:52:40 -05:00
|
|
|
case pbm.KeyType.Ed25519:
|
|
|
|
return keys.ed25519.unmarshalEd25519PrivateKey(decoded.Data, callback)
|
2016-05-19 21:45:43 +02:00
|
|
|
default:
|
2016-09-13 13:23:11 +02:00
|
|
|
callback(new Error('invalid or unsupported key type'))
|
2016-05-19 21:45:43 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Converts a private key object into a protobuf serialized private key
|
|
|
|
exports.marshalPrivateKey = (key, type) => {
|
|
|
|
type = (type || 'rsa').toLowerCase()
|
2016-12-23 08:52:40 -05:00
|
|
|
if (KEY_TYPES.indexOf(type) < 0) {
|
2016-05-19 21:45:43 +02:00
|
|
|
throw new Error('invalid or unsupported key type')
|
|
|
|
}
|
|
|
|
|
2016-09-13 13:23:11 +02:00
|
|
|
return key.bytes
|
2016-05-19 21:45:43 +02:00
|
|
|
}
|
2016-12-01 11:42:19 +00:00
|
|
|
|
|
|
|
exports.randomBytes = (number) => {
|
|
|
|
if (!number || typeof number !== 'number') {
|
|
|
|
throw new Error('first argument must be a Number bigger than 0')
|
|
|
|
}
|
|
|
|
const buf = new Buffer(number)
|
|
|
|
c.rsa.getRandomValues(buf)
|
|
|
|
return buf
|
|
|
|
}
|