diff options
| author | Bartek Iwańczuk <biwanczuk@gmail.com> | 2023-04-24 12:22:21 +0200 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-04-24 12:22:21 +0200 |
| commit | 1f0360c07382dbd86066d1aa8aa4bae34aff18c5 (patch) | |
| tree | cc82d00aea829f0b3d3949f40df9696b099ee662 /ext/node/crypto | |
| parent | 28e2c7204fe02304a8fc3339d7758eec0f64f723 (diff) | |
refactor(ext/node): reorganize ops (#18799)
Move all op related code of "ext/node" to "ext/node/ops" module.
These files were unnecessarily scattered around the extension.
Diffstat (limited to 'ext/node/crypto')
| -rw-r--r-- | ext/node/crypto/cipher.rs | 204 | ||||
| -rw-r--r-- | ext/node/crypto/dh.rs | 288 | ||||
| -rw-r--r-- | ext/node/crypto/digest.rs | 117 | ||||
| -rw-r--r-- | ext/node/crypto/mod.rs | 903 | ||||
| -rw-r--r-- | ext/node/crypto/primes.rs | 330 | ||||
| -rw-r--r-- | ext/node/crypto/x509.rs | 319 |
6 files changed, 0 insertions, 2161 deletions
diff --git a/ext/node/crypto/cipher.rs b/ext/node/crypto/cipher.rs deleted file mode 100644 index 4f3f7f20d..000000000 --- a/ext/node/crypto/cipher.rs +++ /dev/null @@ -1,204 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. - -use aes::cipher::block_padding::Pkcs7; -use aes::cipher::BlockDecryptMut; -use aes::cipher::BlockEncryptMut; -use aes::cipher::KeyIvInit; -use deno_core::error::type_error; -use deno_core::error::AnyError; -use deno_core::Resource; -use digest::KeyInit; - -use std::borrow::Cow; -use std::cell::RefCell; -use std::rc::Rc; - -enum Cipher { - Aes128Cbc(Box<cbc::Encryptor<aes::Aes128>>), - Aes128Ecb(Box<ecb::Encryptor<aes::Aes128>>), - // TODO(kt3k): add more algorithms Aes192Cbc, Aes256Cbc, Aes128GCM, etc. -} - -enum Decipher { - Aes128Cbc(Box<cbc::Decryptor<aes::Aes128>>), - Aes128Ecb(Box<ecb::Decryptor<aes::Aes128>>), - // TODO(kt3k): add more algorithms Aes192Cbc, Aes256Cbc, Aes128GCM, etc. -} - -pub struct CipherContext { - cipher: Rc<RefCell<Cipher>>, -} - -pub struct DecipherContext { - decipher: Rc<RefCell<Decipher>>, -} - -impl CipherContext { - pub fn new(algorithm: &str, key: &[u8], iv: &[u8]) -> Result<Self, AnyError> { - Ok(Self { - cipher: Rc::new(RefCell::new(Cipher::new(algorithm, key, iv)?)), - }) - } - - pub fn encrypt(&self, input: &[u8], output: &mut [u8]) { - self.cipher.borrow_mut().encrypt(input, output); - } - - pub fn r#final( - self, - input: &[u8], - output: &mut [u8], - ) -> Result<(), AnyError> { - Rc::try_unwrap(self.cipher) - .map_err(|_| type_error("Cipher context is already in use"))? - .into_inner() - .r#final(input, output) - } -} - -impl DecipherContext { - pub fn new(algorithm: &str, key: &[u8], iv: &[u8]) -> Result<Self, AnyError> { - Ok(Self { - decipher: Rc::new(RefCell::new(Decipher::new(algorithm, key, iv)?)), - }) - } - - pub fn decrypt(&self, input: &[u8], output: &mut [u8]) { - self.decipher.borrow_mut().decrypt(input, output); - } - - pub fn r#final( - self, - input: &[u8], - output: &mut [u8], - ) -> Result<(), AnyError> { - Rc::try_unwrap(self.decipher) - .map_err(|_| type_error("Decipher context is already in use"))? - .into_inner() - .r#final(input, output) - } -} - -impl Resource for CipherContext { - fn name(&self) -> Cow<str> { - "cryptoCipher".into() - } -} - -impl Resource for DecipherContext { - fn name(&self) -> Cow<str> { - "cryptoDecipher".into() - } -} - -impl Cipher { - fn new( - algorithm_name: &str, - key: &[u8], - iv: &[u8], - ) -> Result<Self, AnyError> { - use Cipher::*; - Ok(match algorithm_name { - "aes-128-cbc" => { - Aes128Cbc(Box::new(cbc::Encryptor::new(key.into(), iv.into()))) - } - "aes-128-ecb" => Aes128Ecb(Box::new(ecb::Encryptor::new(key.into()))), - _ => return Err(type_error(format!("Unknown cipher {algorithm_name}"))), - }) - } - - /// encrypt encrypts the data in the middle of the input. - fn encrypt(&mut self, input: &[u8], output: &mut [u8]) { - use Cipher::*; - match self { - Aes128Cbc(encryptor) => { - assert!(input.len() % 16 == 0); - for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) { - encryptor.encrypt_block_b2b_mut(input.into(), output.into()); - } - } - Aes128Ecb(encryptor) => { - assert!(input.len() % 16 == 0); - for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) { - encryptor.encrypt_block_b2b_mut(input.into(), output.into()); - } - } - } - } - - /// r#final encrypts the last block of the input data. - fn r#final(self, input: &[u8], output: &mut [u8]) -> Result<(), AnyError> { - assert!(input.len() < 16); - use Cipher::*; - match self { - Aes128Cbc(encryptor) => { - let _ = (*encryptor) - .encrypt_padded_b2b_mut::<Pkcs7>(input, output) - .map_err(|_| type_error("Cannot pad the input data"))?; - Ok(()) - } - Aes128Ecb(encryptor) => { - let _ = (*encryptor) - .encrypt_padded_b2b_mut::<Pkcs7>(input, output) - .map_err(|_| type_error("Cannot pad the input data"))?; - Ok(()) - } - } - } -} - -impl Decipher { - fn new( - algorithm_name: &str, - key: &[u8], - iv: &[u8], - ) -> Result<Self, AnyError> { - use Decipher::*; - Ok(match algorithm_name { - "aes-128-cbc" => { - Aes128Cbc(Box::new(cbc::Decryptor::new(key.into(), iv.into()))) - } - "aes-128-ecb" => Aes128Ecb(Box::new(ecb::Decryptor::new(key.into()))), - _ => return Err(type_error(format!("Unknown cipher {algorithm_name}"))), - }) - } - - /// decrypt decrypts the data in the middle of the input. - fn decrypt(&mut self, input: &[u8], output: &mut [u8]) { - use Decipher::*; - match self { - Aes128Cbc(decryptor) => { - assert!(input.len() % 16 == 0); - for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) { - decryptor.decrypt_block_b2b_mut(input.into(), output.into()); - } - } - Aes128Ecb(decryptor) => { - assert!(input.len() % 16 == 0); - for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) { - decryptor.decrypt_block_b2b_mut(input.into(), output.into()); - } - } - } - } - - /// r#final decrypts the last block of the input data. - fn r#final(self, input: &[u8], output: &mut [u8]) -> Result<(), AnyError> { - assert!(input.len() == 16); - use Decipher::*; - match self { - Aes128Cbc(decryptor) => { - let _ = (*decryptor) - .decrypt_padded_b2b_mut::<Pkcs7>(input, output) - .map_err(|_| type_error("Cannot unpad the input data"))?; - Ok(()) - } - Aes128Ecb(decryptor) => { - let _ = (*decryptor) - .decrypt_padded_b2b_mut::<Pkcs7>(input, output) - .map_err(|_| type_error("Cannot unpad the input data"))?; - Ok(()) - } - } - } -} diff --git a/ext/node/crypto/dh.rs b/ext/node/crypto/dh.rs deleted file mode 100644 index 4da9a01bf..000000000 --- a/ext/node/crypto/dh.rs +++ /dev/null @@ -1,288 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. - -use super::primes::Prime; -use num_bigint_dig::BigUint; -use num_bigint_dig::RandBigInt; -use num_traits::FromPrimitive; - -pub struct PublicKey(BigUint); - -impl PublicKey { - pub fn into_vec(self) -> Vec<u8> { - self.0.to_bytes_be() - } -} - -pub struct PrivateKey(BigUint); - -impl PrivateKey { - pub fn new(exponent_size: usize) -> Self { - let mut rng = rand::thread_rng(); - let exponent = rng.gen_biguint(exponent_size); - Self(exponent) - } - - /// Diffie-Hellman modular exponentiation. - /// s = g^x mod p - pub fn compute_public_key( - &self, - generator: &BigUint, - modulus: &BigUint, - ) -> PublicKey { - let public_key = generator.modpow(&self.0, modulus); - PublicKey(public_key) - } - - pub fn into_vec(self) -> Vec<u8> { - self.0.to_bytes_be() - } -} - -/// Classic DH -pub struct DiffieHellman { - pub private_key: PrivateKey, - pub public_key: PublicKey, -} - -impl DiffieHellman { - pub fn group<G>() -> Self - where - G: DiffieHellmanGroup, - { - let private_key = PrivateKey::new(G::EXPONENT_SIZE / 8); - - let generator = BigUint::from_usize(G::GENERATOR).unwrap(); - let modulus = BigUint::from_slice(G::MODULUS); - - let public_key = private_key.compute_public_key(&generator, &modulus); - - Self { - private_key, - public_key, - } - } - - pub fn new(prime: Prime, generator: usize) -> Self { - let private_key = PrivateKey::new(32); - - let generator = BigUint::from_usize(generator).unwrap(); - let public_key = private_key.compute_public_key(&generator, &prime); - - Self { - private_key, - public_key, - } - } -} - -/// Well-known modp groups -// -/// More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) -/// https://www.rfc-editor.org/rfc/rfc3526 -/// -/// Insecure groups `modp1` and `modp2` from https://www.rfc-editor.org/rfc/rfc2409.txt -/// are deprecated in Node.js. We don't support them. -pub trait DiffieHellmanGroup { - const GENERATOR: usize; - const MODULUS: &'static [u32]; - /// Size of the exponent in bits - const EXPONENT_SIZE: usize; -} - -/// 1536-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-2 -pub struct Modp1536; -impl DiffieHellmanGroup for Modp1536 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 192; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA237327, 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} - -/// 2048-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-3 -pub struct Modp2048; -impl DiffieHellmanGroup for Modp2048 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 256; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B, - 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9, - 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510, - 0x15728E5A, 0x8AACAA68, 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} - -/// 3072-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-4 -pub struct Modp3072; -impl DiffieHellmanGroup for Modp3072 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 384; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B, - 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9, - 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510, - 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64, - 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7, - 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B, - 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C, - 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31, - 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA93AD2CA, 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} - -/// 4096-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-5 -pub struct Modp4096; -impl DiffieHellmanGroup for Modp4096 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 512; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B, - 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9, - 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510, - 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64, - 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7, - 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B, - 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C, - 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31, - 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7, - 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA, - 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6, - 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED, - 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9, - 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34063199, - 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} - -/// 6144-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-6 -pub struct Modp6144; -impl DiffieHellmanGroup for Modp6144 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 768; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B, - 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9, - 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510, - 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64, - 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7, - 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B, - 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C, - 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31, - 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7, - 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA, - 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6, - 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED, - 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9, - 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34028492, - 0x36C3FAB4, 0xD27C7026, 0xC1D4DCB2, 0x602646DE, 0xC9751E76, 0x3DBA37BD, - 0xF8FF9406, 0xAD9E530E, 0xE5DB382F, 0x413001AE, 0xB06A53ED, 0x9027D831, - 0x179727B0, 0x865A8918, 0xDA3EDBEB, 0xCF9B14ED, 0x44CE6CBA, 0xCED4BB1B, - 0xDB7F1447, 0xE6CC254B, 0x33205151, 0x2BD7AF42, 0x6FB8F401, 0x378CD2BF, - 0x5983CA01, 0xC64B92EC, 0xF032EA15, 0xD1721D03, 0xF482D7CE, 0x6E74FEF6, - 0xD55E702F, 0x46980C82, 0xB5A84031, 0x900B1C9E, 0x59E7C97F, 0xBEC7E8F3, - 0x23A97A7E, 0x36CC88BE, 0x0F1D45B7, 0xFF585AC5, 0x4BD407B2, 0x2B4154AA, - 0xCC8F6D7E, 0xBF48E1D8, 0x14CC5ED2, 0x0F8037E0, 0xA79715EE, 0xF29BE328, - 0x06A1D58B, 0xB7C5DA76, 0xF550AA3D, 0x8A1FBFF0, 0xEB19CCB1, 0xA313D55C, - 0xDA56C9EC, 0x2EF29632, 0x387FE8D7, 0x6E3C0468, 0x043E8F66, 0x3F4860EE, - 0x12BF2D5B, 0x0B7474D6, 0xE694F91E, 0x6DCC4024, 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} - -/// 8192-bit MODP Group -/// https://www.rfc-editor.org/rfc/rfc3526#section-7 -pub struct Modp8192; -impl DiffieHellmanGroup for Modp8192 { - const GENERATOR: usize = 2; - const EXPONENT_SIZE: usize = 1024; - - const MODULUS: &'static [u32] = &[ - 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1, - 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD, - 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245, - 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED, - 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D, - 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F, - 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D, - 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B, - 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9, - 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510, - 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64, - 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7, - 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B, - 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C, - 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31, - 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7, - 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA, - 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6, - 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED, - 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9, - 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34028492, - 0x36C3FAB4, 0xD27C7026, 0xC1D4DCB2, 0x602646DE, 0xC9751E76, 0x3DBA37BD, - 0xF8FF9406, 0xAD9E530E, 0xE5DB382F, 0x413001AE, 0xB06A53ED, 0x9027D831, - 0x179727B0, 0x865A8918, 0xDA3EDBEB, 0xCF9B14ED, 0x44CE6CBA, 0xCED4BB1B, - 0xDB7F1447, 0xE6CC254B, 0x33205151, 0x2BD7AF42, 0x6FB8F401, 0x378CD2BF, - 0x5983CA01, 0xC64B92EC, 0xF032EA15, 0xD1721D03, 0xF482D7CE, 0x6E74FEF6, - 0xD55E702F, 0x46980C82, 0xB5A84031, 0x900B1C9E, 0x59E7C97F, 0xBEC7E8F3, - 0x23A97A7E, 0x36CC88BE, 0x0F1D45B7, 0xFF585AC5, 0x4BD407B2, 0x2B4154AA, - 0xCC8F6D7E, 0xBF48E1D8, 0x14CC5ED2, 0x0F8037E0, 0xA79715EE, 0xF29BE328, - 0x06A1D58B, 0xB7C5DA76, 0xF550AA3D, 0x8A1FBFF0, 0xEB19CCB1, 0xA313D55C, - 0xDA56C9EC, 0x2EF29632, 0x387FE8D7, 0x6E3C0468, 0x043E8F66, 0x3F4860EE, - 0x12BF2D5B, 0x0B7474D6, 0xE694F91E, 0x6DBE1159, 0x74A3926F, 0x12FEE5E4, - 0x38777CB6, 0xA932DF8C, 0xD8BEC4D0, 0x73B931BA, 0x3BC832B6, 0x8D9DD300, - 0x741FA7BF, 0x8AFC47ED, 0x2576F693, 0x6BA42466, 0x3AAB639C, 0x5AE4F568, - 0x3423B474, 0x2BF1C978, 0x238F16CB, 0xE39D652D, 0xE3FDB8BE, 0xFC848AD9, - 0x22222E04, 0xA4037C07, 0x13EB57A8, 0x1A23F0C7, 0x3473FC64, 0x6CEA306B, - 0x4BCBC886, 0x2F8385DD, 0xFA9D4B7F, 0xA2C087E8, 0x79683303, 0xED5BDD3A, - 0x062B3CF5, 0xB3A278A6, 0x6D2A13F8, 0x3F44F82D, 0xDF310EE0, 0x74AB6A36, - 0x4597E899, 0xA0255DC1, 0x64F31CC5, 0x0846851D, 0xF9AB4819, 0x5DED7EA1, - 0xB1D510BD, 0x7EE74D73, 0xFAF36BC3, 0x1ECFA268, 0x359046F4, 0xEB879F92, - 0x4009438B, 0x481C6CD7, 0x889A002E, 0xD5EE382B, 0xC9190DA6, 0xFC026E47, - 0x9558E447, 0x5677E9AA, 0x9E3050E2, 0x765694DF, 0xC81F56E8, 0x80B96E71, - 0x60C980DD, 0x98EDD3DF, 0xFFFFFFFF, 0xFFFFFFFF, - ]; -} diff --git a/ext/node/crypto/digest.rs b/ext/node/crypto/digest.rs deleted file mode 100644 index 4fab58a43..000000000 --- a/ext/node/crypto/digest.rs +++ /dev/null @@ -1,117 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. -use deno_core::error::type_error; -use deno_core::error::AnyError; -use deno_core::Resource; -use digest::Digest; -use digest::DynDigest; -use std::borrow::Cow; -use std::cell::RefCell; -use std::rc::Rc; - -pub enum Hash { - Md4(Box<md4::Md4>), - Md5(Box<md5::Md5>), - Ripemd160(Box<ripemd::Ripemd160>), - Sha1(Box<sha1::Sha1>), - Sha224(Box<sha2::Sha224>), - Sha256(Box<sha2::Sha256>), - Sha384(Box<sha2::Sha384>), - Sha512(Box<sha2::Sha512>), -} - -pub struct Context { - pub hash: Rc<RefCell<Hash>>, -} - -impl Context { - pub fn new(algorithm: &str) -> Result<Self, AnyError> { - Ok(Self { - hash: Rc::new(RefCell::new(Hash::new(algorithm)?)), - }) - } - - pub fn update(&self, data: &[u8]) { - self.hash.borrow_mut().update(data); - } - - pub fn digest(self) -> Result<Box<[u8]>, AnyError> { - let hash = Rc::try_unwrap(self.hash) - .map_err(|_| type_error("Hash context is already in use"))?; - - let hash = hash.into_inner(); - Ok(hash.digest_and_drop()) - } -} - -impl Clone for Context { - fn clone(&self) -> Self { - Self { - hash: Rc::new(RefCell::new(self.hash.borrow().clone())), - } - } -} - -impl Resource for Context { - fn name(&self) -> Cow<str> { - "cryptoDigest".into() - } -} - -use Hash::*; - -impl Hash { - pub fn new(algorithm_name: &str) -> Result<Self, AnyError> { - Ok(match algorithm_name { - "md4" => Md4(Default::default()), - "md5" => Md5(Default::default()), - "ripemd160" => Ripemd160(Default::default()), - "sha1" => Sha1(Default::default()), - "sha224" => Sha224(Default::default()), - "sha256" => Sha256(Default::default()), - "sha384" => Sha384(Default::default()), - "sha512" => Sha512(Default::default()), - _ => return Err(type_error("unsupported algorithm")), - }) - } - - pub fn update(&mut self, data: &[u8]) { - match self { - Md4(context) => Digest::update(&mut **context, data), - Md5(context) => Digest::update(&mut **context, data), - Ripemd160(context) => Digest::update(&mut **context, data), - Sha1(context) => Digest::update(&mut **context, data), - Sha224(context) => Digest::update(&mut **context, data), - Sha256(context) => Digest::update(&mut **context, data), - Sha384(context) => Digest::update(&mut **context, data), - Sha512(context) => Digest::update(&mut **context, data), - }; - } - - pub fn digest_and_drop(self) -> Box<[u8]> { - match self { - Md4(context) => context.finalize(), - Md5(context) => context.finalize(), - Ripemd160(context) => context.finalize(), - Sha1(context) => context.finalize(), - Sha224(context) => context.finalize(), - Sha256(context) => context.finalize(), - Sha384(context) => context.finalize(), - Sha512(context) => context.finalize(), - } - } -} - -impl Clone for Hash { - fn clone(&self) -> Self { - match self { - Md4(_) => Md4(Default::default()), - Md5(_) => Md5(Default::default()), - Ripemd160(_) => Ripemd160(Default::default()), - Sha1(_) => Sha1(Default::default()), - Sha224(_) => Sha224(Default::default()), - Sha256(_) => Sha256(Default::default()), - Sha384(_) => Sha384(Default::default()), - Sha512(_) => Sha512(Default::default()), - } - } -} diff --git a/ext/node/crypto/mod.rs b/ext/node/crypto/mod.rs deleted file mode 100644 index d224b40f7..000000000 --- a/ext/node/crypto/mod.rs +++ /dev/null @@ -1,903 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. -use deno_core::error::generic_error; -use deno_core::error::type_error; -use deno_core::error::AnyError; -use deno_core::op; -use deno_core::serde_v8; -use deno_core::OpState; -use deno_core::ResourceId; -use deno_core::StringOrBuffer; -use deno_core::ZeroCopyBuf; -use hkdf::Hkdf; -use num_bigint::BigInt; -use num_traits::FromPrimitive; -use rand::distributions::Distribution; -use rand::distributions::Uniform; -use rand::thread_rng; -use rand::Rng; -use std::future::Future; -use std::rc::Rc; - -use rsa::padding::PaddingScheme; -use rsa::pkcs8::DecodePrivateKey; -use rsa::pkcs8::DecodePublicKey; -use rsa::PublicKey; -use rsa::RsaPrivateKey; -use rsa::RsaPublicKey; - -mod cipher; -mod dh; -mod digest; -mod primes; -pub mod x509; - -#[op] -pub fn op_node_check_prime(num: serde_v8::BigInt, checks: usize) -> bool { - primes::is_probably_prime(&num, checks) -} - -#[op] -pub fn op_node_check_prime_bytes( - bytes: &[u8], - checks: usize, -) -> Result<bool, AnyError> { - let candidate = BigInt::from_bytes_be(num_bigint::Sign::Plus, bytes); - Ok(primes::is_probably_prime(&candidate, checks)) -} - -#[op] -pub async fn op_node_check_prime_async( - num: serde_v8::BigInt, - checks: usize, -) -> Result<bool, AnyError> { - // TODO(@littledivy): use rayon for CPU-bound tasks - Ok( - tokio::task::spawn_blocking(move || { - primes::is_probably_prime(&num, checks) - }) - .await?, - ) -} - -#[op] -pub fn op_node_check_prime_bytes_async( - bytes: &[u8], - checks: usize, -) -> Result<impl Future<Output = Result<bool, AnyError>> + 'static, AnyError> { - let candidate = BigInt::from_bytes_be(num_bigint::Sign::Plus, bytes); - // TODO(@littledivy): use rayon for CPU-bound tasks - Ok(async move { - Ok( - tokio::task::spawn_blocking(move || { - primes::is_probably_prime(&candidate, checks) - }) - .await?, - ) - }) -} - -#[op(fast)] -pub fn op_node_create_hash(state: &mut OpState, algorithm: &str) -> u32 { - state - .resource_table - .add(match digest::Context::new(algorithm) { - Ok(context) => context, - Err(_) => return 0, - }) -} - -#[op(fast)] -pub fn op_node_hash_update(state: &mut OpState, rid: u32, data: &[u8]) -> bool { - let context = match state.resource_table.get::<digest::Context>(rid) { - Ok(context) => context, - _ => return false, - }; - context.update(data); - true -} - -#[op(fast)] -pub fn op_node_hash_update_str( - state: &mut OpState, - rid: u32, - data: &str, -) -> bool { - let context = match state.resource_table.get::<digest::Context>(rid) { - Ok(context) => context, - _ => return false, - }; - context.update(data.as_bytes()); - true -} - -#[op] -pub fn op_node_hash_digest( - state: &mut OpState, - rid: ResourceId, -) -> Result<ZeroCopyBuf, AnyError> { - let context = state.resource_table.take::<digest::Context>(rid)?; - let context = Rc::try_unwrap(context) - .map_err(|_| type_error("Hash context is already in use"))?; - Ok(context.digest()?.into()) -} - -#[op] -pub fn op_node_hash_digest_hex( - state: &mut OpState, - rid: ResourceId, -) -> Result<String, AnyError> { - let context = state.resource_table.take::<digest::Context>(rid)?; - let context = Rc::try_unwrap(context) - .map_err(|_| type_error("Hash context is already in use"))?; - let digest = context.digest()?; - Ok(hex::encode(digest)) -} - -#[op] -pub fn op_node_hash_clone( - state: &mut OpState, - rid: ResourceId, -) -> Result<ResourceId, AnyError> { - let context = state.resource_table.get::<digest::Context>(rid)?; - Ok(state.resource_table.add(context.as_ref().clone())) -} - -#[op] -pub fn op_node_private_encrypt( - key: StringOrBuffer, - msg: StringOrBuffer, - padding: u32, -) -> Result<ZeroCopyBuf, AnyError> { - let key = RsaPrivateKey::from_pkcs8_pem((&key).try_into()?)?; - - let mut rng = rand::thread_rng(); - match padding { - 1 => Ok( - key - .encrypt(&mut rng, PaddingScheme::new_pkcs1v15_encrypt(), &msg)? - .into(), - ), - 4 => Ok( - key - .encrypt(&mut rng, PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)? - .into(), - ), - _ => Err(type_error("Unknown padding")), - } -} - -#[op] -pub fn op_node_private_decrypt( - key: StringOrBuffer, - msg: StringOrBuffer, - padding: u32, -) -> Result<ZeroCopyBuf, AnyError> { - let key = RsaPrivateKey::from_pkcs8_pem((&key).try_into()?)?; - - match padding { - 1 => Ok( - key - .decrypt(PaddingScheme::new_pkcs1v15_encrypt(), &msg)? - .into(), - ), - 4 => Ok( - key - .decrypt(PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)? - .into(), - ), - _ => Err(type_error("Unknown padding")), - } -} - -#[op] -pub fn op_node_public_encrypt( - key: StringOrBuffer, - msg: StringOrBuffer, - padding: u32, -) -> Result<ZeroCopyBuf, AnyError> { - let key = RsaPublicKey::from_public_key_pem((&key).try_into()?)?; - - let mut rng = rand::thread_rng(); - match padding { - 1 => Ok( - key - .encrypt(&mut rng, PaddingScheme::new_pkcs1v15_encrypt(), &msg)? - .into(), - ), - 4 => Ok( - key - .encrypt(&mut rng, PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)? - .into(), - ), - _ => Err(type_error("Unknown padding")), - } -} - -#[op(fast)] -pub fn op_node_create_cipheriv( - state: &mut OpState, - algorithm: &str, - key: &[u8], - iv: &[u8], -) -> u32 { - state.resource_table.add( - match cipher::CipherContext::new(algorithm, key, iv) { - Ok(context) => context, - Err(_) => return 0, - }, - ) -} - -#[op(fast)] -pub fn op_node_cipheriv_encrypt( - state: &mut OpState, - rid: u32, - input: &[u8], - output: &mut [u8], -) -> bool { - let context = match state.resource_table.get::<cipher::CipherContext>(rid) { - Ok(context) => context, - Err(_) => return false, - }; - context.encrypt(input, output); - true -} - -#[op] -pub fn op_node_cipheriv_final( - state: &mut OpState, - rid: u32, - input: &[u8], - output: &mut [u8], -) -> Result<(), AnyError> { - let context = state.resource_table.take::<cipher::CipherContext>(rid)?; - let context = Rc::try_unwrap(context) - .map_err(|_| type_error("Cipher context is already in use"))?; - context.r#final(input, output) -} - -#[op(fast)] -pub fn op_node_create_decipheriv( - state: &mut OpState, - algorithm: &str, - key: &[u8], - iv: &[u8], -) -> u32 { - state.resource_table.add( - match cipher::DecipherContext::new(algorithm, key, iv) { - Ok(context) => context, - Err(_) => return 0, - }, - ) -} - -#[op(fast)] -pub fn op_node_decipheriv_decrypt( - state: &mut OpState, - rid: u32, - input: &[u8], - output: &mut [u8], -) -> bool { - let context = match state.resource_table.get::<cipher::DecipherContext>(rid) { - Ok(context) => context, - Err(_) => return false, - }; - context.decrypt(input, output); - true -} - -#[op] -pub fn op_node_decipheriv_final( - state: &mut OpState, - rid: u32, - input: &[u8], - output: &mut [u8], -) -> Result<(), AnyError> { - let context = state.resource_table.take::<cipher::DecipherContext>(rid)?; - let context = Rc::try_unwrap(context) - .map_err(|_| type_error("Cipher context is already in use"))?; - context.r#final(input, output) -} - -#[op] -pub fn op_node_sign( - digest: &[u8], - digest_type: &str, - key: StringOrBuffer, - key_type: &str, - key_format: &str, -) -> Result<ZeroCopyBuf, AnyError> { - match key_type { - "rsa" => { - use rsa::pkcs1v15::SigningKey; - use signature::hazmat::PrehashSigner; - let key = match key_format { - "pem" => RsaPrivateKey::from_pkcs8_pem((&key).try_into()?) - .map_err(|_| type_error("Invalid RSA private key"))?, - // TODO(kt3k): Support der and jwk formats - _ => { - return Err(type_error(format!( - "Unsupported key format: {}", - key_format - ))) - } - }; - Ok( - match digest_type { - "sha224" => { - let signing_key = SigningKey::<sha2::Sha224>::new_with_prefix(key); - signing_key.sign_prehash(digest)?.to_vec() - } - "sha256" => { - let signing_key = SigningKey::<sha2::Sha256>::new_with_prefix(key); - signing_key.sign_prehash(digest)?.to_vec() - } - "sha384" => { - let signing_key = SigningKey::<sha2::Sha384>::new_with_prefix(key); - signing_key.sign_prehash(digest)?.to_vec() - } - "sha512" => { - let signing_key = SigningKey::<sha2::Sha512>::new_with_prefix(key); - signing_key.sign_prehash(digest)?.to_vec() - } - _ => { - return Err(type_error(format!( - "Unknown digest algorithm: {}", - digest_type - ))) - } - } - .into(), - ) - } - _ => Err(type_error(format!( - "Signing with {} keys is not supported yet", - key_type - ))), - } -} - -#[op] -fn op_node_verify( - digest: &[u8], - digest_type: &str, - key: StringOrBuffer, - key_type: &str, - key_format: &str, - signature: &[u8], -) -> Result<bool, AnyError> { - match key_type { - "rsa" => { - use rsa::pkcs1v15::VerifyingKey; - use signature::hazmat::PrehashVerifier; - let key = match key_format { - "pem" => RsaPublicKey::from_public_key_pem((&key).try_into()?) - .map_err(|_| type_error("Invalid RSA public key"))?, - // TODO(kt3k): Support der and jwk formats - _ => { - return Err(type_error(format!( - "Unsupported key format: {}", - key_format - ))) - } - }; - Ok(match digest_type { - "sha224" => VerifyingKey::<sha2::Sha224>::new_with_prefix(key) - .verify_prehash(digest, &signature.to_vec().try_into()?) - .is_ok(), - "sha256" => VerifyingKey::<sha2::Sha256>::new_with_prefix(key) - .verify_prehash(digest, &signature.to_vec().try_into()?) - .is_ok(), - "sha384" => VerifyingKey::<sha2::Sha384>::new_with_prefix(key) - .verify_prehash(digest, &signature.to_vec().try_into()?) - .is_ok(), - "sha512" => VerifyingKey::<sha2::Sha512>::new_with_prefix(key) - .verify_prehash(digest, &signature.to_vec().try_into()?) - .is_ok(), - _ => { - return Err(type_error(format!( - "Unknown digest algorithm: {}", - digest_type - ))) - } - }) - } - _ => Err(type_error(format!( - "Verifying with {} keys is not supported yet", - key_type - ))), - } -} - -fn pbkdf2_sync( - password: &[u8], - salt: &[u8], - iterations: u32, - digest: &str, - derived_key: &mut [u8], -) -> Result<(), AnyError> { - macro_rules! pbkdf2_hmac { - ($digest:ty) => {{ - pbkdf2::pbkdf2_hmac::<$digest>(password, salt, iterations, derived_key) - }}; - } - - match digest { - "md4" => pbkdf2_hmac!(md4::Md4), - "md5" => pbkdf2_hmac!(md5::Md5), - "ripemd160" => pbkdf2_hmac!(ripemd::Ripemd160), - "sha1" => pbkdf2_hmac!(sha1::Sha1), - "sha224" => pbkdf2_hmac!(sha2::Sha224), - "sha256" => pbkdf2_hmac!(sha2::Sha256), - "sha384" => pbkdf2_hmac!(sha2::Sha384), - "sha512" => pbkdf2_hmac!(sha2::Sha512), - _ => return Err(type_error("Unknown digest")), - } - - Ok(()) -} - -#[op] -pub fn op_node_pbkdf2( - password: StringOrBuffer, - salt: StringOrBuffer, - iterations: u32, - digest: &str, - derived_key: &mut [u8], -) -> bool { - pbkdf2_sync(&password, &salt, iterations, digest, derived_key).is_ok() -} - -#[op] -pub async fn op_node_pbkdf2_async( - password: StringOrBuffer, - salt: StringOrBuffer, - iterations: u32, - digest: String, - keylen: usize, -) -> Result<ZeroCopyBuf, AnyError> { - tokio::task::spawn_blocking(move || { - let mut derived_key = vec![0; keylen]; - pbkdf2_sync(&password, &salt, iterations, &digest, &mut derived_key) - .map(|_| derived_key.into()) - }) - .await? -} - -#[op] -pub fn op_node_generate_secret(buf: &mut [u8]) { - rand::thread_rng().fill(buf); -} - -#[op] -pub async fn op_node_generate_secret_async(len: i32) -> ZeroCopyBuf { - tokio::task::spawn_blocking(move || { - let mut buf = vec![0u8; len as usize]; - rand::thread_rng().fill(&mut buf[..]); - buf.into() - }) - .await - .unwrap() -} - -fn hkdf_sync( - hash: &str, - ikm: &[u8], - salt: &[u8], - info: &[u8], - okm: &mut [u8], -) -> Result<(), AnyError> { - macro_rules! hkdf { - ($hash:ty) => {{ - let hk = Hkdf::<$hash>::new(Some(salt), ikm); - hk.expand(info, okm) - .map_err(|_| type_error("HKDF-Expand failed"))?; - }}; - } - - match hash { - "md4" => hkdf!(md4::Md4), - "md5" => hkdf!(md5::Md5), - "ripemd160" => hkdf!(ripemd::Ripemd160), - "sha1" => hkdf!(sha1::Sha1), - "sha224" => hkdf!(sha2::Sha224), - "sha256" => hkdf!(sha2::Sha256), - "sha384" => hkdf!(sha2::Sha384), - "sha512" => hkdf!(sha2::Sha512), - _ => return Err(type_error("Unknown digest")), - } - - Ok(()) -} - -#[op] -pub fn op_node_hkdf( - hash: &str, - ikm: &[u8], - salt: &[u8], - info: &[u8], - okm: &mut [u8], -) -> Result<(), AnyError> { - hkdf_sync(hash, ikm, salt, info, okm) -} - -#[op] -pub async fn op_node_hkdf_async( - hash: String, - ikm: ZeroCopyBuf, - salt: ZeroCopyBuf, - info: ZeroCopyBuf, - okm_len: usize, -) -> Result<ZeroCopyBuf, AnyError> { - tokio::task::spawn_blocking(move || { - let mut okm = vec![0u8; okm_len]; - hkdf_sync(&hash, &ikm, &salt, &info, &mut okm)?; - Ok(okm.into()) - }) - .await? -} - -use rsa::pkcs1::EncodeRsaPrivateKey; -use rsa::pkcs1::EncodeRsaPublicKey; - -use self::primes::Prime; - -fn generate_rsa( - modulus_length: usize, - public_exponent: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - let mut rng = rand::thread_rng(); - let private_key = RsaPrivateKey::new_with_exp( - &mut rng, - modulus_length, - &rsa::BigUint::from_usize(public_exponent).unwrap(), - )?; - let public_key = private_key.to_public_key(); - let private_key_der = private_key.to_pkcs1_der()?.as_bytes().to_vec(); - let public_key_der = public_key.to_pkcs1_der()?.to_vec(); - - Ok((private_key_der.into(), public_key_der.into())) -} - -#[op] -pub fn op_node_generate_rsa( - modulus_length: usize, - public_exponent: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - generate_rsa(modulus_length, public_exponent) -} - -#[op] -pub async fn op_node_generate_rsa_async( - modulus_length: usize, - public_exponent: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(move || { - generate_rsa(modulus_length, public_exponent) - }) - .await? -} - -fn dsa_generate( - modulus_length: usize, - divisor_length: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - let mut rng = rand::thread_rng(); - use dsa::pkcs8::EncodePrivateKey; - use dsa::pkcs8::EncodePublicKey; - use dsa::Components; - use dsa::KeySize; - use dsa::SigningKey; - - let key_size = match (modulus_length, divisor_length) { - #[allow(deprecated)] - (1024, 160) => KeySize::DSA_1024_160, - (2048, 224) => KeySize::DSA_2048_224, - (2048, 256) => KeySize::DSA_2048_256, - (3072, 256) => KeySize::DSA_3072_256, - _ => return Err(type_error("Invalid modulus_length or divisor_length")), - }; - let components = Components::generate(&mut rng, key_size); - let signing_key = SigningKey::generate(&mut rng, components); - let verifying_key = signing_key.verifying_key(); - - Ok(( - signing_key - .to_pkcs8_der() - .map_err(|_| type_error("Not valid pkcs8"))? - .as_bytes() - .to_vec() - .into(), - verifying_key - .to_public_key_der() - .map_err(|_| type_error("Not valid spki"))? - .to_vec() - .into(), - )) -} - -#[op] -pub fn op_node_dsa_generate( - modulus_length: usize, - divisor_length: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - dsa_generate(modulus_length, divisor_length) -} - -#[op] -pub async fn op_node_dsa_generate_async( - modulus_length: usize, - divisor_length: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(move || { - dsa_generate(modulus_length, divisor_length) - }) - .await? -} - -fn ec_generate( - named_curve: &str, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - use ring::signature::EcdsaKeyPair; - use ring::signature::KeyPair; - - let curve = match named_curve { - "P-256" => &ring::signature::ECDSA_P256_SHA256_FIXED_SIGNING, - "P-384" => &ring::signature::ECDSA_P384_SHA384_FIXED_SIGNING, - _ => return Err(type_error("Unsupported named curve")), - }; - - let rng = ring::rand::SystemRandom::new(); - - let pkcs8 = EcdsaKeyPair::generate_pkcs8(curve, &rng) - .map_err(|_| type_error("Failed to generate EC key"))?; - - let public_key = EcdsaKeyPair::from_pkcs8(curve, pkcs8.as_ref()) - .map_err(|_| type_error("Failed to generate EC key"))? - .public_key() - .as_ref() - .to_vec(); - Ok((pkcs8.as_ref().to_vec().into(), public_key.into())) -} - -#[op] -pub fn op_node_ec_generate( - named_curve: &str, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - ec_generate(named_curve) -} - -#[op] -pub async fn op_node_ec_generate_async( - named_curve: String, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(move || ec_generate(&named_curve)).await? -} - -fn ed25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - use ring::signature::Ed25519KeyPair; - use ring::signature::KeyPair; - - let mut rng = thread_rng(); - let mut seed = vec![0u8; 32]; - rng.fill(seed.as_mut_slice()); - - let pair = Ed25519KeyPair::from_seed_unchecked(&seed) - .map_err(|_| type_error("Failed to generate Ed25519 key"))?; - - let public_key = pair.public_key().as_ref().to_vec(); - Ok((seed.into(), public_key.into())) -} - -#[op] -pub fn op_node_ed25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> -{ - ed25519_generate() -} - -#[op] -pub async fn op_node_ed25519_generate_async( -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(ed25519_generate).await? -} - -fn x25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - // u-coordinate of the base point. - const X25519_BASEPOINT_BYTES: [u8; 32] = [ - 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, - ]; - - let mut pkey = [0; 32]; - - let mut rng = thread_rng(); - rng.fill(pkey.as_mut_slice()); - - let pkey_copy = pkey.to_vec(); - // https://www.rfc-editor.org/rfc/rfc7748#section-6.1 - // pubkey = x25519(a, 9) which is constant-time Montgomery ladder. - // https://eprint.iacr.org/2014/140.pdf page 4 - // https://eprint.iacr.org/2017/212.pdf algorithm 8 - // pubkey is in LE order. - let pubkey = x25519_dalek::x25519(pkey, X25519_BASEPOINT_BYTES); - - Ok((pkey_copy.into(), pubkey.to_vec().into())) -} - -#[op] -pub fn op_node_x25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> -{ - x25519_generate() -} - -#[op] -pub async fn op_node_x25519_generate_async( -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(x25519_generate).await? -} - -fn dh_generate_group( - group_name: &str, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - let dh = match group_name { - "modp5" => dh::DiffieHellman::group::<dh::Modp1536>(), - "modp14" => dh::DiffieHellman::group::<dh::Modp2048>(), - "modp15" => dh::DiffieHellman::group::<dh::Modp3072>(), - "modp16" => dh::DiffieHellman::group::<dh::Modp4096>(), - "modp17" => dh::DiffieHellman::group::<dh::Modp6144>(), - "modp18" => dh::DiffieHellman::group::<dh::Modp8192>(), - _ => return Err(type_error("Unsupported group name")), - }; - - Ok(( - dh.private_key.into_vec().into(), - dh.public_key.into_vec().into(), - )) -} - -#[op] -pub fn op_node_dh_generate_group( - group_name: &str, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - dh_generate_group(group_name) -} - -#[op] -pub async fn op_node_dh_generate_group_async( - group_name: String, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(move || dh_generate_group(&group_name)).await? -} - -fn dh_generate( - prime: Option<&[u8]>, - prime_len: usize, - generator: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - let prime = prime - .map(|p| p.into()) - .unwrap_or_else(|| Prime::generate(prime_len)); - let dh = dh::DiffieHellman::new(prime, generator); - - Ok(( - dh.private_key.into_vec().into(), - dh.public_key.into_vec().into(), - )) -} - -#[op] -pub fn op_node_dh_generate( - prime: Option<&[u8]>, - prime_len: usize, - generator: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - dh_generate(prime, prime_len, generator) -} - -#[op] -pub async fn op_node_dh_generate_async( - prime: Option<ZeroCopyBuf>, - prime_len: usize, - generator: usize, -) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> { - tokio::task::spawn_blocking(move || { - dh_generate(prime.as_deref(), prime_len, generator) - }) - .await? -} - -#[op] -pub fn op_node_random_int(min: i32, max: i32) -> Result<i32, AnyError> { - let mut rng = rand::thread_rng(); - // Uniform distribution is required to avoid Modulo Bias - // https://en.wikipedia.org/wiki/Fisher–Yates_shuffle#Modulo_bias - let dist = Uniform::from(min..max); - - Ok(dist.sample(&mut rng)) -} - -#[allow(clippy::too_many_arguments)] -fn scrypt( - password: StringOrBuffer, - salt: StringOrBuffer, - keylen: u32, - cost: u32, - block_size: u32, - parallelization: u32, - _maxmem: u32, - output_buffer: &mut [u8], -) -> Result<(), AnyError> { - // Construct Params - let params = scrypt::Params::new( - cost as u8, - block_size, - parallelization, - keylen as usize, - ) - .unwrap(); - - // Call into scrypt - let res = scrypt::scrypt(&password, &salt, ¶ms, output_buffer); - if res.is_ok() { - Ok(()) - } else { - // TODO(lev): key derivation failed, so what? - Err(generic_error("scrypt key derivation failed")) - } -} - -#[op] -pub fn op_node_scrypt_sync( - password: StringOrBuffer, - salt: StringOrBuffer, - keylen: u32, - cost: u32, - block_size: u32, - parallelization: u32, - maxmem: u32, - output_buffer: &mut [u8], -) -> Result<(), AnyError> { - scrypt( - password, - salt, - keylen, - cost, - block_size, - parallelization, - maxmem, - output_buffer, - ) -} - -#[op] -pub async fn op_node_scrypt_async( - password: StringOrBuffer, - salt: StringOrBuffer, - keylen: u32, - cost: u32, - block_size: u32, - parallelization: u32, - maxmem: u32, -) -> Result<ZeroCopyBuf, AnyError> { - tokio::task::spawn_blocking(move || { - let mut output_buffer = vec![0u8; keylen as usize]; - let res = scrypt( - password, - salt, - keylen, - cost, - block_size, - parallelization, - maxmem, - &mut output_buffer, - ); - - if res.is_ok() { - Ok(output_buffer.into()) - } else { - // TODO(lev): rethrow the error? - Err(generic_error("scrypt failure")) - } - }) - .await? -} diff --git a/ext/node/crypto/primes.rs b/ext/node/crypto/primes.rs deleted file mode 100644 index d03398f02..000000000 --- a/ext/node/crypto/primes.rs +++ /dev/null @@ -1,330 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. - -use num_bigint::BigInt; -use num_bigint_dig::RandPrime; -use num_integer::Integer; -use num_traits::One; -use num_traits::Zero; -use rand::Rng; -use std::ops::Deref; - -pub struct Prime(num_bigint_dig::BigUint); - -impl Prime { - pub fn generate(n: usize) -> Self { - let mut rng = rand::thread_rng(); - Self(rng.gen_prime(n)) - } -} - -impl From<&[u8]> for Prime { - fn from(value: &[u8]) -> Self { - Self(num_bigint_dig::BigUint::from_bytes_be(value)) - } -} - -impl Deref for Prime { - type Target = num_bigint_dig::BigUint; - - fn deref(&self) -> &Self::Target { - &self.0 - } -} - -struct Witness { - pow: BigInt, - wit: BigInt, -} - -/// Modified version of bigpowmod() from http://nickle.org/examples/miller-rabin.5c -/// Computes core of Miller-Rabin test as suggested by -/// Cormen/Leiserson/Rivest. -fn witnessexp(b: &BigInt, e: &BigInt, m: &BigInt) -> Witness { - if *e == BigInt::zero() { - return Witness { - pow: BigInt::zero(), - wit: BigInt::one(), - }; - } - if *e == BigInt::one() { - return Witness { - pow: b % m, - wit: BigInt::zero(), - }; - } - let ehalf = e / BigInt::from(2); - let mut tmp = witnessexp(b, &ehalf, m); - if tmp.wit != BigInt::zero() { - return tmp; - } - let t: BigInt = BigInt::pow(&tmp.pow, 2) % m; - if t == BigInt::one() - && tmp.pow != BigInt::one() - && &tmp.pow + BigInt::one() != *m - { - tmp.wit = tmp.pow; - tmp.pow = t; - return tmp; - } - if e % BigInt::from(2) == BigInt::zero() { - tmp.pow = t; - } else { - tmp.pow = (t * b) % m; - } - tmp -} - -pub(crate) fn is_probably_prime(n: &BigInt, count: usize) -> bool { - if *n == BigInt::from(1) { - return false; - } - - if *n == BigInt::from(2) { - return true; - } - - if n.is_even() { - return false; - } - - for p in SMALL_PRIMES.into_iter() { - let p = BigInt::from(p); - if *n == p { - return true; - } - - if n % p == BigInt::zero() { - return false; - } - } - - let mut rng = rand::thread_rng(); - for _ in 0..count { - let a = rng.gen_range(BigInt::one()..n.clone()); - let we = witnessexp(&a, &(n - BigInt::one()), n); - if we.wit != BigInt::zero() || we.pow != BigInt::one() { - return false; - } - } - - true -} - -static SMALL_PRIMES: [u32; 2047] = [ - 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, - 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, 139, 149, 151, 157, - 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, 229, 233, 239, - 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, 317, 331, - 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, 421, - 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, - 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, - 617, 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, - 719, 727, 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, - 823, 827, 829, 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, - 929, 937, 941, 947, 953, 967, 971, 977, 983, 991, 997, 1009, 1013, 1019, - 1021, 1031, 1033, 1039, 1049, 1051, 1061, 1063, 1069, 1087, 1091, 1093, 1097, - 1103, 1109, 1117, 1123, 1129, 1151, 1153, 1163, 1171, 1181, 1187, 1193, 1201, - 1213, 1217, 1223, 1229, 1231, 1237, 1249, 1259, 1277, 1279, 1283, 1289, 1291, - 1297, 1301, 1303, 1307, 1319, 1321, 1327, 1361, 1367, 1373, 1381, 1399, 1409, - 1423, 1427, 1429, 1433, 1439, 1447, 1451, 1453, 1459, 1471, 1481, 1483, 1487, - 1489, 1493, 1499, 1511, 1523, 1531, 1543, 1549, 1553, 1559, 1567, 1571, 1579, - 1583, 1597, 1601, 1607, 1609, 1613, 1619, 1621, 1627, 1637, 1657, 1663, 1667, - 1669, 1693, 1697, 1699, 1709, 1721, 1723, 1733, 1741, 1747, 1753, 1759, 1777, - 1783, 1787, 1789, 1801, 1811, 1823, 1831, 1847, 1861, 1867, 1871, 1873, 1877, - 1879, 1889, 1901, 1907, 1913, 1931, 1933, 1949, 1951, 1973, 1979, 1987, 1993, - 1997, 1999, 2003, 2011, 2017, 2027, 2029, 2039, 2053, 2063, 2069, 2081, 2083, - 2087, 2089, 2099, 2111, 2113, 2129, 2131, 2137, 2141, 2143, 2153, 2161, 2179, - 2203, 2207, 2213, 2221, 2237, 2239, 2243, 2251, 2267, 2269, 2273, 2281, 2287, - 2293, 2297, 2309, 2311, 2333, 2339, 2341, 2347, 2351, 2357, 2371, 2377, 2381, - 2383, 2389, 2393, 2399, 2411, 2417, 2423, 2437, 2441, 2447, 2459, 2467, 2473, - 2477, 2503, 2521, 2531, 2539, 2543, 2549, 2551, 2557, 2579, 2591, 2593, 2609, - 2617, 2621, 2633, 2647, 2657, 2659, 2663, 2671, 2677, 2683, 2687, 2689, 2693, - 2699, 2707, 2711, 2713, 2719, 2729, 2731, 2741, 2749, 2753, 2767, 2777, 2789, - 2791, 2797, 2801, 2803, 2819, 2833, 2837, 2843, 2851, 2857, 2861, 2879, 2887, - 2897, 2903, 2909, 2917, 2927, 2939, 2953, 2957, 2963, 2969, 2971, 2999, 3001, - 3011, 3019, 3023, 3037, 3041, 3049, 3061, 3067, 3079, 3083, 3089, 3109, 3119, - 3121, 3137, 3163, 3167, 3169, 3181, 3187, 3191, 3203, 3209, 3217, 3221, 3229, - 3251, 3253, 3257, 3259, 3271, 3299, 3301, 3307, 3313, 3319, 3323, 3329, 3331, - 3343, 3347, 3359, 3361, 3371, 3373, 3389, 3391, 3407, 3413, 3433, 3449, 3457, - 3461, 3463, 3467, 3469, 3491, 3499, 3511, 3517, 3527, 3529, 3533, 3539, 3541, - 3547, 3557, 3559, 3571, 3581, 3583, 3593, 3607, 3613, 3617, 3623, 3631, 3637, - 3643, 3659, 3671, 3673, 3677, 3691, 3697, 3701, 3709, 3719, 3727, 3733, 3739, - 3761, 3767, 3769, 3779, 3793, 3797, 3803, 3821, 3823, 3833, 3847, 3851, 3853, - 3863, 3877, 3881, 3889, 3907, 3911, 3917, 3919, 3923, 3929, 3931, 3943, 3947, - 3967, 3989, 4001, 4003, 4007, 4013, 4019, 4021, 4027, 4049, 4051, 4057, 4073, - 4079, 4091, 4093, 4099, 4111, 4127, 4129, 4133, 4139, 4153, 4157, 4159, 4177, - 4201, 4211, 4217, 4219, 4229, 4231, 4241, 4243, 4253, 4259, 4261, 4271, 4273, - 4283, 4289, 4297, 4327, 4337, 4339, 4349, 4357, 4363, 4373, 4391, 4397, 4409, - 4421, 4423, 4441, 4447, 4451, 4457, 4463, 4481, 4483, 4493, 4507, 4513, 4517, - 4519, 4523, 4547, 4549, 4561, 4567, 4583, 4591, 4597, 4603, 4621, 4637, 4639, - 4643, 4649, 4651, 4657, 4663, 4673, 4679, 4691, 4703, 4721, 4723, 4729, 4733, - 4751, 4759, 4783, 4787, 4789, 4793, 4799, 4801, 4813, 4817, 4831, 4861, 4871, - 4877, 4889, 4903, 4909, 4919, 4931, 4933, 4937, 4943, 4951, 4957, 4967, 4969, - 4973, 4987, 4993, 4999, 5003, 5009, 5011, 5021, 5023, 5039, 5051, 5059, 5077, - 5081, 5087, 5099, 5101, 5107, 5113, 5119, 5147, 5153, 5167, 5171, 5179, 5189, - 5197, 5209, 5227, 5231, 5233, 5237, 5261, 5273, 5279, 5281, 5297, 5303, 5309, - 5323, 5333, 5347, 5351, 5381, 5387, 5393, 5399, 5407, 5413, 5417, 5419, 5431, - 5437, 5441, 5443, 5449, 5471, 5477, 5479, 5483, 5501, 5503, 5507, 5519, 5521, - 5527, 5531, 5557, 5563, 5569, 5573, 5581, 5591, 5623, 5639, 5641, 5647, 5651, - 5653, 5657, 5659, 5669, 5683, 5689, 5693, 5701, 5711, 5717, 5737, 5741, 5743, - 5749, 5779, 5783, 5791, 5801, 5807, 5813, 5821, 5827, 5839, 5843, 5849, 5851, - 5857, 5861, 5867, 5869, 5879, 5881, 5897, 5903, 5923, 5927, 5939, 5953, 5981, - 5987, 6007, 6011, 6029, 6037, 6043, 6047, 6053, 6067, 6073, 6079, 6089, 6091, - 6101, 6113, 6121, 6131, 6133, 6143, 6151, 6163, 6173, 6197, 6199, 6203, 6211, - 6217, 6221, 6229, 6247, 6257, 6263, 6269, 6271, 6277, 6287, 6299, 6301, 6311, - 6317, 6323, 6329, 6337, 6343, 6353, 6359, 6361, 6367, 6373, 6379, 6389, 6397, - 6421, 6427, 6449, 6451, 6469, 6473, 6481, 6491, 6521, 6529, 6547, 6551, 6553, - 6563, 6569, 6571, 6577, 6581, 6599, 6607, 6619, 6637, 6653, 6659, 6661, 6673, - 6679, 6689, 6691, 6701, 6703, 6709, 6719, 6733, 6737, 6761, 6763, 6779, 6781, - 6791, 6793, 6803, 6823, 6827, 6829, 6833, 6841, 6857, 6863, 6869, 6871, 6883, - 6899, 6907, 6911, 6917, 6947, 6949, 6959, 6961, 6967, 6971, 6977, 6983, 6991, - 6997, 7001, 7013, 7019, 7027, 7039, 7043, 7057, 7069, 7079, 7103, 7109, 7121, - 7127, 7129, 7151, 7159, 7177, 7187, 7193, 7207, 7211, 7213, 7219, 7229, 7237, - 7243, 7247, 7253, 7283, 7297, 7307, 7309, 7321, 7331, 7333, 7349, 7351, 7369, - 7393, 7411, 7417, 7433, 7451, 7457, 7459, 7477, 7481, 7487, 7489, 7499, 7507, - 7517, 7523, 7529, 7537, 7541, 7547, 7549, 7559, 7561, 7573, 7577, 7583, 7589, - 7591, 7603, 7607, 7621, 7639, 7643, 7649, 7669, 7673, 7681, 7687, 7691, 7699, - 7703, 7717, 7723, 7727, 7741, 7753, 7757, 7759, 7789, 7793, 7817, 7823, 7829, - 7841, 7853, 7867, 7873, 7877, 7879, 7883, 7901, 7907, 7919, 7927, 7933, 7937, - 7949, 7951, 7963, 7993, 8009, 8011, 8017, 8039, 8053, 8059, 8069, 8081, 8087, - 8089, 8093, 8101, 8111, 8117, 8123, 8147, 8161, 8167, 8171, 8179, 8191, 8209, - 8219, 8221, 8231, 8233, 8237, 8243, 8263, 8269, 8273, 8287, 8291, 8293, 8297, - 8311, 8317, 8329, 8353, 8363, 8369, 8377, 8387, 8389, 8419, 8423, 8429, 8431, - 8443, 8447, 8461, 8467, 8501, 8513, 8521, 8527, 8537, 8539, 8543, 8563, 8573, - 8581, 8597, 8599, 8609, 8623, 8627, 8629, 8641, 8647, 8663, 8669, 8677, 8681, - 8689, 8693, 8699, 8707, 8713, 8719, 8731, 8737, 8741, 8747, 8753, 8761, 8779, - 8783, 8803, 8807, 8819, 8821, 8831, 8837, 8839, 8849, 8861, 8863, 8867, 8887, - 8893, 8923, 8929, 8933, 8941, 8951, 8963, 8969, 8971, 8999, 9001, 9007, 9011, - 9013, 9029, 9041, 9043, 9049, 9059, 9067, 9091, 9103, 9109, 9127, 9133, 9137, - 9151, 9157, 9161, 9173, 9181, 9187, 9199, 9203, 9209, 9221, 9227, 9239, 9241, - 9257, 9277, 9281, 9283, 9293, 9311, 9319, 9323, 9337, 9341, 9343, 9349, 9371, - 9377, 9391, 9397, 9403, 9413, 9419, 9421, 9431, 9433, 9437, 9439, 9461, 9463, - 9467, 9473, 9479, 9491, 9497, 9511, 9521, 9533, 9539, 9547, 9551, 9587, 9601, - 9613, 9619, 9623, 9629, 9631, 9643, 9649, 9661, 9677, 9679, 9689, 9697, 9719, - 9721, 9733, 9739, 9743, 9749, 9767, 9769, 9781, 9787, 9791, 9803, 9811, 9817, - 9829, 9833, 9839, 9851, 9857, 9859, 9871, 9883, 9887, 9901, 9907, 9923, 9929, - 9931, 9941, 9949, 9967, 9973, 10007, 10009, 10037, 10039, 10061, 10067, - 10069, 10079, 10091, 10093, 10099, 10103, 10111, 10133, 10139, 10141, 10151, - 10159, 10163, 10169, 10177, 10181, 10193, 10211, 10223, 10243, 10247, 10253, - 10259, 10267, 10271, 10273, 10289, 10301, 10303, 10313, 10321, 10331, 10333, - 10337, 10343, 10357, 10369, 10391, 10399, 10427, 10429, 10433, 10453, 10457, - 10459, 10463, 10477, 10487, 10499, 10501, 10513, 10529, 10531, 10559, 10567, - 10589, 10597, 10601, 10607, 10613, 10627, 10631, 10639, 10651, 10657, 10663, - 10667, 10687, 10691, 10709, 10711, 10723, 10729, 10733, 10739, 10753, 10771, - 10781, 10789, 10799, 10831, 10837, 10847, 10853, 10859, 10861, 10867, 10883, - 10889, 10891, 10903, 10909, 10937, 10939, 10949, 10957, 10973, 10979, 10987, - 10993, 11003, 11027, 11047, 11057, 11059, 11069, 11071, 11083, 11087, 11093, - 11113, 11117, 11119, 11131, 11149, 11159, 11161, 11171, 11173, 11177, 11197, - 11213, 11239, 11243, 11251, 11257, 11261, 11273, 11279, 11287, 11299, 11311, - 11317, 11321, 11329, 11351, 11353, 11369, 11383, 11393, 11399, 11411, 11423, - 11437, 11443, 11447, 11467, 11471, 11483, 11489, 11491, 11497, 11503, 11519, - 11527, 11549, 11551, 11579, 11587, 11593, 11597, 11617, 11621, 11633, 11657, - 11677, 11681, 11689, 11699, 11701, 11717, 11719, 11731, 11743, 11777, 11779, - 11783, 11789, 11801, 11807, 11813, 11821, 11827, 11831, 11833, 11839, 11863, - 11867, 11887, 11897, 11903, 11909, 11923, 11927, 11933, 11939, 11941, 11953, - 11959, 11969, 11971, 11981, 11987, 12007, 12011, 12037, 12041, 12043, 12049, - 12071, 12073, 12097, 12101, 12107, 12109, 12113, 12119, 12143, 12149, 12157, - 12161, 12163, 12197, 12203, 12211, 12227, 12239, 12241, 12251, 12253, 12263, - 12269, 12277, 12281, 12289, 12301, 12323, 12329, 12343, 12347, 12373, 12377, - 12379, 12391, 12401, 12409, 12413, 12421, 12433, 12437, 12451, 12457, 12473, - 12479, 12487, 12491, 12497, 12503, 12511, 12517, 12527, 12539, 12541, 12547, - 12553, 12569, 12577, 12583, 12589, 12601, 12611, 12613, 12619, 12637, 12641, - 12647, 12653, 12659, 12671, 12689, 12697, 12703, 12713, 12721, 12739, 12743, - 12757, 12763, 12781, 12791, 12799, 12809, 12821, 12823, 12829, 12841, 12853, - 12889, 12893, 12899, 12907, 12911, 12917, 12919, 12923, 12941, 12953, 12959, - 12967, 12973, 12979, 12983, 13001, 13003, 13007, 13009, 13033, 13037, 13043, - 13049, 13063, 13093, 13099, 13103, 13109, 13121, 13127, 13147, 13151, 13159, - 13163, 13171, 13177, 13183, 13187, 13217, 13219, 13229, 13241, 13249, 13259, - 13267, 13291, 13297, 13309, 13313, 13327, 13331, 13337, 13339, 13367, 13381, - 13397, 13399, 13411, 13417, 13421, 13441, 13451, 13457, 13463, 13469, 13477, - 13487, 13499, 13513, 13523, 13537, 13553, 13567, 13577, 13591, 13597, 13613, - 13619, 13627, 13633, 13649, 13669, 13679, 13681, 13687, 13691, 13693, 13697, - 13709, 13711, 13721, 13723, 13729, 13751, 13757, 13759, 13763, 13781, 13789, - 13799, 13807, 13829, 13831, 13841, 13859, 13873, 13877, 13879, 13883, 13901, - 13903, 13907, 13913, 13921, 13931, 13933, 13963, 13967, 13997, 13999, 14009, - 14011, 14029, 14033, 14051, 14057, 14071, 14081, 14083, 14087, 14107, 14143, - 14149, 14153, 14159, 14173, 14177, 14197, 14207, 14221, 14243, 14249, 14251, - 14281, 14293, 14303, 14321, 14323, 14327, 14341, 14347, 14369, 14387, 14389, - 14401, 14407, 14411, 14419, 14423, 14431, 14437, 14447, 14449, 14461, 14479, - 14489, 14503, 14519, 14533, 14537, 14543, 14549, 14551, 14557, 14561, 14563, - 14591, 14593, 14621, 14627, 14629, 14633, 14639, 14653, 14657, 14669, 14683, - 14699, 14713, 14717, 14723, 14731, 14737, 14741, 14747, 14753, 14759, 14767, - 14771, 14779, 14783, 14797, 14813, 14821, 14827, 14831, 14843, 14851, 14867, - 14869, 14879, 14887, 14891, 14897, 14923, 14929, 14939, 14947, 14951, 14957, - 14969, 14983, 15013, 15017, 15031, 15053, 15061, 15073, 15077, 15083, 15091, - 15101, 15107, 15121, 15131, 15137, 15139, 15149, 15161, 15173, 15187, 15193, - 15199, 15217, 15227, 15233, 15241, 15259, 15263, 15269, 15271, 15277, 15287, - 15289, 15299, 15307, 15313, 15319, 15329, 15331, 15349, 15359, 15361, 15373, - 15377, 15383, 15391, 15401, 15413, 15427, 15439, 15443, 15451, 15461, 15467, - 15473, 15493, 15497, 15511, 15527, 15541, 15551, 15559, 15569, 15581, 15583, - 15601, 15607, 15619, 15629, 15641, 15643, 15647, 15649, 15661, 15667, 15671, - 15679, 15683, 15727, 15731, 15733, 15737, 15739, 15749, 15761, 15767, 15773, - 15787, 15791, 15797, 15803, 15809, 15817, 15823, 15859, 15877, 15881, 15887, - 15889, 15901, 15907, 15913, 15919, 15923, 15937, 15959, 15971, 15973, 15991, - 16001, 16007, 16033, 16057, 16061, 16063, 16067, 16069, 16073, 16087, 16091, - 16097, 16103, 16111, 16127, 16139, 16141, 16183, 16187, 16189, 16193, 16217, - 16223, 16229, 16231, 16249, 16253, 16267, 16273, 16301, 16319, 16333, 16339, - 16349, 16361, 16363, 16369, 16381, 16411, 16417, 16421, 16427, 16433, 16447, - 16451, 16453, 16477, 16481, 16487, 16493, 16519, 16529, 16547, 16553, 16561, - 16567, 16573, 16603, 16607, 16619, 16631, 16633, 16649, 16651, 16657, 16661, - 16673, 16691, 16693, 16699, 16703, 16729, 16741, 16747, 16759, 16763, 16787, - 16811, 16823, 16829, 16831, 16843, 16871, 16879, 16883, 16889, 16901, 16903, - 16921, 16927, 16931, 16937, 16943, 16963, 16979, 16981, 16987, 16993, 17011, - 17021, 17027, 17029, 17033, 17041, 17047, 17053, 17077, 17093, 17099, 17107, - 17117, 17123, 17137, 17159, 17167, 17183, 17189, 17191, 17203, 17207, 17209, - 17231, 17239, 17257, 17291, 17293, 17299, 17317, 17321, 17327, 17333, 17341, - 17351, 17359, 17377, 17383, 17387, 17389, 17393, 17401, 17417, 17419, 17431, - 17443, 17449, 17467, 17471, 17477, 17483, 17489, 17491, 17497, 17509, 17519, - 17539, 17551, 17569, 17573, 17579, 17581, 17597, 17599, 17609, 17623, 17627, - 17657, 17659, 17669, 17681, 17683, 17707, 17713, 17729, 17737, 17747, 17749, - 17761, 17783, 17789, 17791, 17807, 17827, 17837, 17839, 17851, 17863, -]; - -#[cfg(test)] -mod tests { - use super::*; - use num_bigint::BigInt; - - #[test] - fn test_prime() { - for &p in SMALL_PRIMES.iter() { - assert!(is_probably_prime(&BigInt::from(p), 16)); - } - - assert!(is_probably_prime(&BigInt::from(0x7FFF_FFFF), 16)); - } - - #[test] - fn test_composite() { - assert!(!is_probably_prime(&BigInt::from(0x7FFF_FFFE), 16)); - assert!(!is_probably_prime( - &BigInt::from(0xFFFF_FFFF_FFFF_FFFF_u64), - 16 - )); - assert!(!is_probably_prime(&BigInt::parse_bytes(b"12345678901234567890123456789012345678901234567890123456789012345678901234567890", 10).unwrap(), 16)); - } - - #[test] - fn oeis_a014233() { - // https://oeis.org/A014233 - // - // Smallest odd number for which Miller-Rabin primality test - // on bases <= n-th prime does not reveal compositeness. - let a014233: [BigInt; 10] = [ - 2047u64.into(), - 1373653u64.into(), - 25326001u64.into(), - 3215031751u64.into(), - 2152302898747u64.into(), - 3474749660383u64.into(), - 341550071728321u64.into(), - 3825123056546413051u64.into(), - BigInt::parse_bytes(b"318665857834031151167461", 10).unwrap(), - BigInt::parse_bytes(b"3317044064679887385961981", 10).unwrap(), - ]; - - for p in a014233 { - assert!(!is_probably_prime(&p, 16), "{} should be composite", p); - } - } -} diff --git a/ext/node/crypto/x509.rs b/ext/node/crypto/x509.rs deleted file mode 100644 index 402c58b72..000000000 --- a/ext/node/crypto/x509.rs +++ /dev/null @@ -1,319 +0,0 @@ -// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. - -use deno_core::error::bad_resource_id; -use deno_core::error::AnyError; -use deno_core::op; -use deno_core::OpState; -use deno_core::Resource; - -use std::borrow::Cow; - -use x509_parser::der_parser::asn1_rs::Any; -use x509_parser::der_parser::asn1_rs::Tag; -use x509_parser::der_parser::oid::Oid; -use x509_parser::extensions; -use x509_parser::pem; -use x509_parser::prelude::*; - -use digest::Digest; - -struct Certificate { - _buf: Vec<u8>, - pem: Option<pem::Pem>, - cert: X509Certificate<'static>, -} - -impl Certificate { - fn fingerprint<D: Digest>(&self) -> Option<String> { - self.pem.as_ref().map(|pem| { - let mut hasher = D::new(); - hasher.update(&pem.contents); - let bytes = hasher.finalize(); - // OpenSSL returns colon separated upper case hex values. - let mut hex = String::with_capacity(bytes.len() * 2); - for byte in bytes { - hex.push_str(&format!("{:02X}:", byte)); - } - hex.pop(); - hex - }) - } -} - -impl std::ops::Deref for Certificate { - type Target = X509Certificate<'static>; - - fn deref(&self) -> &Self::Target { - &self.cert - } -} - -impl Resource for Certificate { - fn name(&self) -> Cow<str> { - "x509Certificate".into() - } -} - -#[op] -pub fn op_node_x509_parse( - state: &mut OpState, - buf: &[u8], -) -> Result<u32, AnyError> { - let pem = match pem::parse_x509_pem(buf) { - Ok((_, pem)) => Some(pem), - Err(_) => None, - }; - - let cert = pem - .as_ref() - .map(|pem| pem.parse_x509()) - .unwrap_or_else(|| X509Certificate::from_der(buf).map(|(_, cert)| cert))?; - - let cert = Certificate { - _buf: buf.to_vec(), - // SAFETY: Extending the lifetime of the certificate. Backing buffer is - // owned by the resource. - cert: unsafe { std::mem::transmute(cert) }, - pem, - }; - let rid = state.resource_table.add(cert); - Ok(rid) -} - -#[op] -pub fn op_node_x509_ca( - state: &mut OpState, - rid: u32, -) -> Result<bool, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.is_ca()) -} - -#[op] -pub fn op_node_x509_check_email( - state: &mut OpState, - rid: u32, - email: &str, -) -> Result<bool, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - - let subject = cert.subject(); - if subject - .iter_email() - .any(|e| e.as_str().unwrap_or("") == email) - { - return Ok(true); - } - - let subject_alt = cert - .extensions() - .iter() - .find(|e| e.oid == x509_parser::oid_registry::OID_X509_EXT_SUBJECT_ALT_NAME) - .and_then(|e| match e.parsed_extension() { - extensions::ParsedExtension::SubjectAlternativeName(s) => Some(s), - _ => None, - }); - - if let Some(subject_alt) = subject_alt { - for name in &subject_alt.general_names { - dbg!(name); - if let extensions::GeneralName::RFC822Name(n) = name { - if *n == email { - return Ok(true); - } - } - } - } - - Ok(false) -} - -#[op] -pub fn op_node_x509_fingerprint( - state: &mut OpState, - rid: u32, -) -> Result<Option<String>, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.fingerprint::<sha1::Sha1>()) -} - -#[op] -pub fn op_node_x509_fingerprint256( - state: &mut OpState, - rid: u32, -) -> Result<Option<String>, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.fingerprint::<sha2::Sha256>()) -} - -#[op] -pub fn op_node_x509_fingerprint512( - state: &mut OpState, - rid: u32, -) -> Result<Option<String>, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.fingerprint::<sha2::Sha512>()) -} - -#[op] -pub fn op_node_x509_get_issuer( - state: &mut OpState, - rid: u32, -) -> Result<String, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(x509name_to_string(cert.issuer(), oid_registry())?) -} - -#[op] -pub fn op_node_x509_get_subject( - state: &mut OpState, - rid: u32, -) -> Result<String, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(x509name_to_string(cert.subject(), oid_registry())?) -} - -// Attempt to convert attribute to string. If type is not a string, return value is the hex -// encoding of the attribute value -fn attribute_value_to_string( - attr: &Any, - _attr_type: &Oid, -) -> Result<String, X509Error> { - // TODO: replace this with helper function, when it is added to asn1-rs - match attr.tag() { - Tag::NumericString - | Tag::BmpString - | Tag::VisibleString - | Tag::PrintableString - | Tag::GeneralString - | Tag::ObjectDescriptor - | Tag::GraphicString - | Tag::T61String - | Tag::VideotexString - | Tag::Utf8String - | Tag::Ia5String => { - let s = core::str::from_utf8(attr.data) - .map_err(|_| X509Error::InvalidAttributes)?; - Ok(s.to_owned()) - } - _ => { - // type is not a string, get slice and convert it to base64 - Ok(data_encoding::HEXUPPER.encode(attr.as_bytes())) - } - } -} - -fn x509name_to_string( - name: &X509Name, - oid_registry: &oid_registry::OidRegistry, -) -> Result<String, x509_parser::error::X509Error> { - // Lifted from https://github.com/rusticata/x509-parser/blob/4d618c2ed6b1fc102df16797545895f7c67ee0fe/src/x509.rs#L543-L566 - // since it's a private function (Copyright 2017 Pierre Chifflier) - name.iter_rdn().fold(Ok(String::new()), |acc, rdn| { - acc.and_then(|mut _vec| { - rdn - .iter() - .fold(Ok(String::new()), |acc2, attr| { - acc2.and_then(|mut _vec2| { - let val_str = - attribute_value_to_string(attr.attr_value(), attr.attr_type())?; - // look ABBREV, and if not found, use shortname - let abbrev = match oid2abbrev(attr.attr_type(), oid_registry) { - Ok(s) => String::from(s), - _ => format!("{:?}", attr.attr_type()), - }; - let rdn = format!("{}={}", abbrev, val_str); - match _vec2.len() { - 0 => Ok(rdn), - _ => Ok(_vec2 + " + " + rdn.as_str()), - } - }) - }) - .map(|v| match _vec.len() { - 0 => v, - _ => _vec + "\n" + v.as_str(), - }) - }) - }) -} - -#[op] -pub fn op_node_x509_get_valid_from( - state: &mut OpState, - rid: u32, -) -> Result<String, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.validity().not_before.to_string()) -} - -#[op] -pub fn op_node_x509_get_valid_to( - state: &mut OpState, - rid: u32, -) -> Result<String, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - Ok(cert.validity().not_after.to_string()) -} - -#[op] -pub fn op_node_x509_get_serial_number( - state: &mut OpState, - rid: u32, -) -> Result<String, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - let mut s = cert.serial.to_str_radix(16); - s.make_ascii_uppercase(); - Ok(s) -} - -#[op] -pub fn op_node_x509_key_usage( - state: &mut OpState, - rid: u32, -) -> Result<u16, AnyError> { - let cert = state - .resource_table - .get::<Certificate>(rid) - .map_err(|_| bad_resource_id())?; - - let key_usage = cert - .extensions() - .iter() - .find(|e| e.oid == x509_parser::oid_registry::OID_X509_EXT_KEY_USAGE) - .and_then(|e| match e.parsed_extension() { - extensions::ParsedExtension::KeyUsage(k) => Some(k), - _ => None, - }); - - Ok(key_usage.map(|k| k.flags).unwrap_or(0)) -} |
