summaryrefslogtreecommitdiff
path: root/ext/node/polyfills/internal/crypto/_randomBytes.ts
diff options
context:
space:
mode:
authorBartek IwaƄczuk <biwanczuk@gmail.com>2023-02-14 17:38:45 +0100
committerGitHub <noreply@github.com>2023-02-14 17:38:45 +0100
commitd47147fb6ad229b1c039aff9d0959b6e281f4df5 (patch)
tree6e9e790f2b9bc71b5f0c9c7e64b95cae31579d58 /ext/node/polyfills/internal/crypto/_randomBytes.ts
parent1d00bbe47e2ca14e2d2151518e02b2324461a065 (diff)
feat(ext/node): embed std/node into the snapshot (#17724)
This commit moves "deno_std/node" in "ext/node" crate. The code is transpiled and snapshotted during the build process. During the first pass a minimal amount of work was done to create the snapshot, a lot of code in "ext/node" depends on presence of "Deno" global. This code will be gradually fixed in the follow up PRs to migrate it to import relevant APIs from "internal:" modules. Currently the code from snapshot is not used in any way, and all Node/npm compatibility still uses code from "https://deno.land/std/node" (or from the location specified by "DENO_NODE_COMPAT_URL"). This will also be handled in a follow up PRs. --------- Co-authored-by: crowlkats <crowlkats@toaxl.com> Co-authored-by: Divy Srivastava <dj.srivastava23@gmail.com> Co-authored-by: Yoshiya Hinosawa <stibium121@gmail.com>
Diffstat (limited to 'ext/node/polyfills/internal/crypto/_randomBytes.ts')
-rw-r--r--ext/node/polyfills/internal/crypto/_randomBytes.ts70
1 files changed, 70 insertions, 0 deletions
diff --git a/ext/node/polyfills/internal/crypto/_randomBytes.ts b/ext/node/polyfills/internal/crypto/_randomBytes.ts
new file mode 100644
index 000000000..41678fcf1
--- /dev/null
+++ b/ext/node/polyfills/internal/crypto/_randomBytes.ts
@@ -0,0 +1,70 @@
+// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
+import { Buffer } from "internal:deno_node/polyfills/buffer.ts";
+
+export const MAX_RANDOM_VALUES = 65536;
+export const MAX_SIZE = 4294967295;
+
+function generateRandomBytes(size: number) {
+ if (size > MAX_SIZE) {
+ throw new RangeError(
+ `The value of "size" is out of range. It must be >= 0 && <= ${MAX_SIZE}. Received ${size}`,
+ );
+ }
+
+ const bytes = Buffer.allocUnsafe(size);
+
+ //Work around for getRandomValues max generation
+ if (size > MAX_RANDOM_VALUES) {
+ for (let generated = 0; generated < size; generated += MAX_RANDOM_VALUES) {
+ globalThis.crypto.getRandomValues(
+ bytes.slice(generated, generated + MAX_RANDOM_VALUES),
+ );
+ }
+ } else {
+ globalThis.crypto.getRandomValues(bytes);
+ }
+
+ return bytes;
+}
+
+/**
+ * @param size Buffer length, must be equal or greater than zero
+ */
+export default function randomBytes(size: number): Buffer;
+export default function randomBytes(
+ size: number,
+ cb?: (err: Error | null, buf?: Buffer) => void,
+): void;
+export default function randomBytes(
+ size: number,
+ cb?: (err: Error | null, buf?: Buffer) => void,
+): Buffer | void {
+ if (typeof cb === "function") {
+ let err: Error | null = null, bytes: Buffer;
+ try {
+ bytes = generateRandomBytes(size);
+ } catch (e) {
+ //NodeJS nonsense
+ //If the size is out of range it will throw sync, otherwise throw async
+ if (
+ e instanceof RangeError &&
+ e.message.includes('The value of "size" is out of range')
+ ) {
+ throw e;
+ } else if (e instanceof Error) {
+ err = e;
+ } else {
+ err = new Error("[non-error thrown]");
+ }
+ }
+ setTimeout(() => {
+ if (err) {
+ cb(err);
+ } else {
+ cb(null, bytes);
+ }
+ }, 0);
+ } else {
+ return generateRandomBytes(size);
+ }
+}