mirror of https://gitee.com/openkylin/nodejs.git
294 lines
8.8 KiB
JavaScript
294 lines
8.8 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
if (common.hasFipsCrypto)
|
|
common.skip('not supported in FIPS mode');
|
|
|
|
const crypto = require('crypto');
|
|
const assert = require('assert');
|
|
|
|
common.expectWarning({
|
|
Warning: [
|
|
['Use Cipheriv for counter mode of aes-256-gcm']
|
|
],
|
|
DeprecationWarning: [
|
|
['crypto.createCipher is deprecated.', 'DEP0106']
|
|
]
|
|
});
|
|
|
|
function testCipher1(key) {
|
|
// Test encryption and decryption
|
|
const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
|
|
const cipher = crypto.createCipher('aes192', key);
|
|
|
|
// Encrypt plaintext which is in utf8 format
|
|
// to a ciphertext which will be in hex
|
|
let ciph = cipher.update(plaintext, 'utf8', 'hex');
|
|
// Only use binary or hex, not base64.
|
|
ciph += cipher.final('hex');
|
|
|
|
const decipher = crypto.createDecipher('aes192', key);
|
|
let txt = decipher.update(ciph, 'hex', 'utf8');
|
|
txt += decipher.final('utf8');
|
|
|
|
assert.strictEqual(txt, plaintext);
|
|
|
|
// Streaming cipher interface
|
|
// NB: In real life, it's not guaranteed that you can get all of it
|
|
// in a single read() like this. But in this case, we know it's
|
|
// quite small, so there's no harm.
|
|
const cStream = crypto.createCipher('aes192', key);
|
|
cStream.end(plaintext);
|
|
ciph = cStream.read();
|
|
|
|
const dStream = crypto.createDecipher('aes192', key);
|
|
dStream.end(ciph);
|
|
txt = dStream.read().toString('utf8');
|
|
|
|
assert.strictEqual(txt, plaintext);
|
|
}
|
|
|
|
|
|
function testCipher2(key) {
|
|
// Encryption and decryption with Base64.
|
|
// Reported in https://github.com/joyent/node/issues/738
|
|
const plaintext =
|
|
'32|RmVZZkFUVmpRRkp0TmJaUm56ZU9qcnJkaXNNWVNpTTU*|iXmckfRWZBGWWELw' +
|
|
'eCBsThSsfUHLeRe0KCsK8ooHgxie0zOINpXxfZi/oNG7uq9JWFVCk70gfzQH8ZUJ' +
|
|
'jAfaFg**';
|
|
const cipher = crypto.createCipher('aes256', key);
|
|
|
|
// Encrypt plaintext which is in utf8 format to a ciphertext which will be in
|
|
// Base64.
|
|
let ciph = cipher.update(plaintext, 'utf8', 'base64');
|
|
ciph += cipher.final('base64');
|
|
|
|
const decipher = crypto.createDecipher('aes256', key);
|
|
let txt = decipher.update(ciph, 'base64', 'utf8');
|
|
txt += decipher.final('utf8');
|
|
|
|
assert.strictEqual(txt, plaintext);
|
|
}
|
|
|
|
testCipher1('MySecretKey123');
|
|
testCipher1(Buffer.from('MySecretKey123'));
|
|
|
|
testCipher2('0123456789abcdef');
|
|
testCipher2(Buffer.from('0123456789abcdef'));
|
|
|
|
{
|
|
const Cipher = crypto.Cipher;
|
|
const instance = crypto.Cipher('aes-256-cbc', 'secret');
|
|
assert(instance instanceof Cipher, 'Cipher is expected to return a new ' +
|
|
'instance when called without `new`');
|
|
|
|
assert.throws(
|
|
() => crypto.createCipher(null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "cipher" argument must be of type string. ' +
|
|
'Received null'
|
|
});
|
|
|
|
assert.throws(
|
|
() => crypto.createCipher('aes-256-cbc', null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "password" argument must be of type string or an instance' +
|
|
' of Buffer, TypedArray, or DataView. Received null'
|
|
});
|
|
|
|
assert.throws(
|
|
() => crypto.createCipher('aes-256-cbc', 'secret').update(null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "data" argument must be of type string or an instance' +
|
|
' of Buffer, TypedArray, or DataView. Received null'
|
|
});
|
|
|
|
assert.throws(
|
|
() => crypto.createCipher('aes-256-cbc', 'secret').setAAD(null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "buffer" argument must be an instance' +
|
|
' of Buffer, TypedArray, or DataView. Received null'
|
|
});
|
|
}
|
|
|
|
{
|
|
const Decipher = crypto.Decipher;
|
|
const instance = crypto.Decipher('aes-256-cbc', 'secret');
|
|
assert(instance instanceof Decipher, 'Decipher is expected to return a new ' +
|
|
'instance when called without `new`');
|
|
|
|
assert.throws(
|
|
() => crypto.createDecipher(null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "cipher" argument must be of type string. ' +
|
|
'Received null'
|
|
});
|
|
|
|
assert.throws(
|
|
() => crypto.createDecipher('aes-256-cbc', 'secret').setAuthTag(null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "buffer" argument must be an instance of Buffer, ' +
|
|
'TypedArray, or DataView. Received null'
|
|
});
|
|
|
|
assert.throws(
|
|
() => crypto.createDecipher('aes-256-cbc', null),
|
|
{
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
message: 'The "password" argument must be of type string or an ' +
|
|
'instance of Buffer, TypedArray, or DataView. Received null'
|
|
});
|
|
}
|
|
|
|
// Base64 padding regression test, see
|
|
// https://github.com/nodejs/node-v0.x-archive/issues/4837.
|
|
{
|
|
const c = crypto.createCipher('aes-256-cbc', 'secret');
|
|
const s = c.update('test', 'utf8', 'base64') + c.final('base64');
|
|
assert.strictEqual(s, '375oxUQCIocvxmC5At+rvA==');
|
|
}
|
|
|
|
// Calling Cipher.final() or Decipher.final() twice should error but
|
|
// not assert. See https://github.com/nodejs/node-v0.x-archive/issues/4886.
|
|
{
|
|
const c = crypto.createCipher('aes-256-cbc', 'secret');
|
|
try { c.final('xxx'); } catch { /* Ignore. */ }
|
|
try { c.final('xxx'); } catch { /* Ignore. */ }
|
|
try { c.final('xxx'); } catch { /* Ignore. */ }
|
|
const d = crypto.createDecipher('aes-256-cbc', 'secret');
|
|
try { d.final('xxx'); } catch { /* Ignore. */ }
|
|
try { d.final('xxx'); } catch { /* Ignore. */ }
|
|
try { d.final('xxx'); } catch { /* Ignore. */ }
|
|
}
|
|
|
|
// Regression test for https://github.com/nodejs/node-v0.x-archive/issues/5482:
|
|
// string to Cipher#update() should not assert.
|
|
{
|
|
const c = crypto.createCipher('aes192', '0123456789abcdef');
|
|
c.update('update');
|
|
c.final();
|
|
}
|
|
|
|
// https://github.com/nodejs/node-v0.x-archive/issues/5655 regression tests,
|
|
// 'utf-8' and 'utf8' are identical.
|
|
{
|
|
let c = crypto.createCipher('aes192', '0123456789abcdef');
|
|
c.update('update', ''); // Defaults to "utf8".
|
|
c.final('utf-8'); // Should not throw.
|
|
|
|
c = crypto.createCipher('aes192', '0123456789abcdef');
|
|
c.update('update', 'utf8');
|
|
c.final('utf-8'); // Should not throw.
|
|
|
|
c = crypto.createCipher('aes192', '0123456789abcdef');
|
|
c.update('update', 'utf-8');
|
|
c.final('utf8'); // Should not throw.
|
|
}
|
|
|
|
// Regression tests for https://github.com/nodejs/node/issues/8236.
|
|
{
|
|
const key = '0123456789abcdef';
|
|
const plaintext = 'Top secret!!!';
|
|
const c = crypto.createCipher('aes192', key);
|
|
let ciph = c.update(plaintext, 'utf16le', 'base64');
|
|
ciph += c.final('base64');
|
|
|
|
let decipher = crypto.createDecipher('aes192', key);
|
|
|
|
let txt;
|
|
txt = decipher.update(ciph, 'base64', 'ucs2');
|
|
txt += decipher.final('ucs2');
|
|
assert.strictEqual(txt, plaintext);
|
|
|
|
decipher = crypto.createDecipher('aes192', key);
|
|
txt = decipher.update(ciph, 'base64', 'ucs-2');
|
|
txt += decipher.final('ucs-2');
|
|
assert.strictEqual(txt, plaintext);
|
|
|
|
decipher = crypto.createDecipher('aes192', key);
|
|
txt = decipher.update(ciph, 'base64', 'utf-16le');
|
|
txt += decipher.final('utf-16le');
|
|
assert.strictEqual(txt, plaintext);
|
|
}
|
|
|
|
// setAutoPadding/setAuthTag/setAAD should return `this`
|
|
{
|
|
const key = '0123456789';
|
|
const tagbuf = Buffer.from('auth_tag');
|
|
const aadbuf = Buffer.from('aadbuf');
|
|
const decipher = crypto.createDecipher('aes-256-gcm', key);
|
|
assert.strictEqual(decipher.setAutoPadding(), decipher);
|
|
assert.strictEqual(decipher.setAuthTag(tagbuf), decipher);
|
|
assert.strictEqual(decipher.setAAD(aadbuf), decipher);
|
|
}
|
|
|
|
// Error throwing in setAAD/setAuthTag/getAuthTag/setAutoPadding
|
|
{
|
|
const key = '0123456789';
|
|
const aadbuf = Buffer.from('aadbuf');
|
|
const data = Buffer.from('test-crypto-cipher-decipher');
|
|
|
|
const cipher = crypto.createCipher('aes-256-gcm', key);
|
|
cipher.setAAD(aadbuf);
|
|
cipher.setAutoPadding();
|
|
|
|
assert.throws(
|
|
() => cipher.getAuthTag(),
|
|
{
|
|
code: 'ERR_CRYPTO_INVALID_STATE',
|
|
name: 'Error',
|
|
message: 'Invalid state for operation getAuthTag'
|
|
}
|
|
);
|
|
|
|
const encrypted = Buffer.concat([cipher.update(data), cipher.final()]);
|
|
|
|
const decipher = crypto.createDecipher('aes-256-gcm', key);
|
|
decipher.setAAD(aadbuf);
|
|
decipher.setAuthTag(cipher.getAuthTag());
|
|
decipher.setAutoPadding();
|
|
decipher.update(encrypted);
|
|
decipher.final();
|
|
|
|
assert.throws(
|
|
() => decipher.setAAD(aadbuf),
|
|
{
|
|
code: 'ERR_CRYPTO_INVALID_STATE',
|
|
name: 'Error',
|
|
message: 'Invalid state for operation setAAD'
|
|
});
|
|
|
|
assert.throws(
|
|
() => decipher.setAuthTag(cipher.getAuthTag()),
|
|
{
|
|
code: 'ERR_CRYPTO_INVALID_STATE',
|
|
name: 'Error',
|
|
message: 'Invalid state for operation setAuthTag'
|
|
});
|
|
|
|
assert.throws(
|
|
() => decipher.setAutoPadding(),
|
|
{
|
|
code: 'ERR_CRYPTO_INVALID_STATE',
|
|
name: 'Error',
|
|
message: 'Invalid state for operation setAutoPadding'
|
|
}
|
|
);
|
|
}
|