2017-01-03 21:16:48 +00:00
|
|
|
// Copyright Joyent, Inc. and other Node contributors.
|
|
|
|
//
|
|
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
// copy of this software and associated documentation files (the
|
|
|
|
// "Software"), to deal in the Software without restriction, including
|
|
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
|
|
// following conditions:
|
|
|
|
//
|
|
|
|
// The above copyright notice and this permission notice shall be included
|
|
|
|
// in all copies or substantial portions of the Software.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
|
2012-10-22 17:37:20 +00:00
|
|
|
// Note: In 0.8 and before, crypto functions all defaulted to using
|
|
|
|
// binary-encoded strings rather than buffers.
|
|
|
|
|
2014-11-22 15:59:48 +00:00
|
|
|
'use strict';
|
|
|
|
|
2016-03-08 23:31:31 +00:00
|
|
|
const internalUtil = require('internal/util');
|
2017-01-16 09:19:32 +00:00
|
|
|
internalUtil.assertCrypto();
|
2016-03-08 23:31:31 +00:00
|
|
|
|
2012-10-22 17:37:20 +00:00
|
|
|
exports.DEFAULT_ENCODING = 'buffer';
|
2010-05-04 20:49:00 +00:00
|
|
|
|
2016-05-02 17:27:12 +00:00
|
|
|
const constants = process.binding('constants').crypto;
|
2016-03-08 23:31:31 +00:00
|
|
|
const binding = process.binding('crypto');
|
|
|
|
const randomBytes = binding.randomBytes;
|
|
|
|
const getCiphers = binding.getCiphers;
|
|
|
|
const getHashes = binding.getHashes;
|
|
|
|
const getCurves = binding.getCurves;
|
|
|
|
const getFipsCrypto = binding.getFipsCrypto;
|
|
|
|
const setFipsCrypto = binding.setFipsCrypto;
|
2016-08-24 02:49:22 +00:00
|
|
|
const timingSafeEqual = binding.timingSafeEqual;
|
2010-05-04 20:49:00 +00:00
|
|
|
|
2015-05-29 17:35:43 +00:00
|
|
|
const Buffer = require('buffer').Buffer;
|
2015-01-21 16:36:59 +00:00
|
|
|
const stream = require('stream');
|
|
|
|
const util = require('util');
|
2017-03-22 06:34:55 +00:00
|
|
|
const { isUint8Array } = process.binding('util');
|
2015-08-26 21:41:28 +00:00
|
|
|
const LazyTransform = require('internal/streams/lazy_transform');
|
2012-10-29 18:31:59 +00:00
|
|
|
|
2015-01-21 16:36:59 +00:00
|
|
|
const DH_GENERATOR = 2;
|
2014-02-18 01:57:08 +00:00
|
|
|
|
2016-05-02 17:27:12 +00:00
|
|
|
Object.defineProperty(exports, 'constants', {
|
|
|
|
configurable: false,
|
|
|
|
enumerable: true,
|
|
|
|
value: constants
|
|
|
|
});
|
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
// This is here because many functions accepted binary strings without
|
|
|
|
// any explicit encoding in older versions of node, and we don't want
|
|
|
|
// to break them unnecessarily.
|
|
|
|
function toBuf(str, encoding) {
|
2015-01-29 01:05:53 +00:00
|
|
|
if (typeof str === 'string') {
|
2016-03-02 11:43:39 +00:00
|
|
|
if (encoding === 'buffer' || !encoding)
|
|
|
|
encoding = 'utf8';
|
2016-01-25 23:00:06 +00:00
|
|
|
return Buffer.from(str, encoding);
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
return str;
|
|
|
|
}
|
2014-03-06 23:27:01 +00:00
|
|
|
exports._toBuf = toBuf;
|
2012-10-23 17:35:15 +00:00
|
|
|
|
|
|
|
|
2015-01-21 16:36:59 +00:00
|
|
|
const assert = require('assert');
|
|
|
|
const StringDecoder = require('string_decoder').StringDecoder;
|
2010-05-04 20:49:00 +00:00
|
|
|
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createHash = exports.Hash = Hash;
|
2012-10-29 18:31:59 +00:00
|
|
|
function Hash(algorithm, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Hash))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Hash(algorithm, options);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.Hash(algorithm);
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-10 22:44:47 +00:00
|
|
|
}
|
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Hash, LazyTransform);
|
2012-10-29 18:31:59 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Hash.prototype._transform = function _transform(chunk, encoding, callback) {
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.update(chunk, encoding);
|
2012-10-29 18:31:59 +00:00
|
|
|
callback();
|
|
|
|
};
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Hash.prototype._flush = function _flush(callback) {
|
2015-01-26 20:39:52 +00:00
|
|
|
this.push(this._handle.digest());
|
2012-10-29 18:31:59 +00:00
|
|
|
callback();
|
|
|
|
};
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Hash.prototype.update = function update(data, encoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.update(data, encoding);
|
2012-10-10 22:44:47 +00:00
|
|
|
return this;
|
|
|
|
};
|
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Hash.prototype.digest = function digest(outputEncoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
outputEncoding = outputEncoding || exports.DEFAULT_ENCODING;
|
2017-04-02 13:00:32 +00:00
|
|
|
// Explicit conversion for backward compatibility.
|
|
|
|
return this._handle.digest(`${outputEncoding}`);
|
2010-10-07 03:05:23 +00:00
|
|
|
};
|
2010-04-12 20:25:16 +00:00
|
|
|
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createHmac = exports.Hmac = Hmac;
|
|
|
|
|
2012-10-29 22:21:25 +00:00
|
|
|
function Hmac(hmac, key, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Hmac))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Hmac(hmac, key, options);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.Hmac();
|
|
|
|
this._handle.init(hmac, toBuf(key));
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
}
|
2010-05-03 22:37:49 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Hmac, LazyTransform);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
Hmac.prototype.update = Hash.prototype.update;
|
|
|
|
Hmac.prototype.digest = Hash.prototype.digest;
|
2012-10-29 22:21:25 +00:00
|
|
|
Hmac.prototype._flush = Hash.prototype._flush;
|
|
|
|
Hmac.prototype._transform = Hash.prototype._transform;
|
2012-10-10 22:44:47 +00:00
|
|
|
|
|
|
|
|
|
|
|
function getDecoder(decoder, encoding) {
|
2016-08-27 16:41:46 +00:00
|
|
|
encoding = internalUtil.normalizeEncoding(encoding);
|
2012-10-10 22:44:47 +00:00
|
|
|
decoder = decoder || new StringDecoder(encoding);
|
|
|
|
assert(decoder.encoding === encoding, 'Cannot change encoding');
|
|
|
|
return decoder;
|
|
|
|
}
|
|
|
|
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createCipher = exports.Cipher = Cipher;
|
2012-10-29 23:36:20 +00:00
|
|
|
function Cipher(cipher, password, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Cipher))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Cipher(cipher, password, options);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.CipherBase(true);
|
2012-10-13 00:36:18 +00:00
|
|
|
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.init(cipher, toBuf(password));
|
2012-10-10 22:44:47 +00:00
|
|
|
this._decoder = null;
|
2012-10-29 23:36:20 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
}
|
2010-05-03 22:37:49 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Cipher, LazyTransform);
|
2012-10-29 23:36:20 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype._transform = function _transform(chunk, encoding, callback) {
|
2014-04-30 22:57:16 +00:00
|
|
|
this.push(this._handle.update(chunk, encoding));
|
2012-10-29 23:36:20 +00:00
|
|
|
callback();
|
|
|
|
};
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype._flush = function _flush(callback) {
|
2013-04-18 23:01:14 +00:00
|
|
|
try {
|
2014-04-30 22:57:16 +00:00
|
|
|
this.push(this._handle.final());
|
2013-04-18 23:01:14 +00:00
|
|
|
} catch (e) {
|
|
|
|
callback(e);
|
|
|
|
return;
|
|
|
|
}
|
2012-10-29 23:36:20 +00:00
|
|
|
callback();
|
|
|
|
};
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.update = function update(data, inputEncoding, outputEncoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
inputEncoding = inputEncoding || exports.DEFAULT_ENCODING;
|
|
|
|
outputEncoding = outputEncoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2014-04-30 22:57:16 +00:00
|
|
|
var ret = this._handle.update(data, inputEncoding);
|
2012-10-10 22:44:47 +00:00
|
|
|
|
|
|
|
if (outputEncoding && outputEncoding !== 'buffer') {
|
|
|
|
this._decoder = getDecoder(this._decoder, outputEncoding);
|
|
|
|
ret = this._decoder.write(ret);
|
|
|
|
}
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
return ret;
|
2010-10-07 03:05:23 +00:00
|
|
|
};
|
2010-05-03 22:37:49 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.final = function final(outputEncoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
outputEncoding = outputEncoding || exports.DEFAULT_ENCODING;
|
2014-04-30 22:57:16 +00:00
|
|
|
var ret = this._handle.final();
|
2012-10-10 22:44:47 +00:00
|
|
|
|
|
|
|
if (outputEncoding && outputEncoding !== 'buffer') {
|
|
|
|
this._decoder = getDecoder(this._decoder, outputEncoding);
|
2013-02-23 22:43:52 +00:00
|
|
|
ret = this._decoder.end(ret);
|
2012-10-10 22:44:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
};
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.setAutoPadding = function setAutoPadding(ap) {
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.setAutoPadding(ap);
|
2012-10-10 22:44:47 +00:00
|
|
|
return this;
|
2010-10-07 03:05:23 +00:00
|
|
|
};
|
2010-05-03 22:37:49 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.getAuthTag = function getAuthTag() {
|
2014-11-11 18:38:02 +00:00
|
|
|
return this._handle.getAuthTag();
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.setAuthTag = function setAuthTag(tagbuf) {
|
2014-11-11 18:38:02 +00:00
|
|
|
this._handle.setAuthTag(tagbuf);
|
2016-11-01 12:24:31 +00:00
|
|
|
return this;
|
2014-11-11 18:38:02 +00:00
|
|
|
};
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Cipher.prototype.setAAD = function setAAD(aadbuf) {
|
2014-11-11 18:38:02 +00:00
|
|
|
this._handle.setAAD(aadbuf);
|
2016-11-01 12:24:31 +00:00
|
|
|
return this;
|
2014-11-11 18:38:02 +00:00
|
|
|
};
|
2012-10-10 22:44:47 +00:00
|
|
|
|
|
|
|
exports.createCipheriv = exports.Cipheriv = Cipheriv;
|
2012-10-29 23:36:20 +00:00
|
|
|
function Cipheriv(cipher, key, iv, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Cipheriv))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Cipheriv(cipher, key, iv, options);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.CipherBase(true);
|
|
|
|
this._handle.initiv(cipher, toBuf(key), toBuf(iv));
|
2012-10-10 22:44:47 +00:00
|
|
|
this._decoder = null;
|
2012-10-29 23:36:20 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-10 22:44:47 +00:00
|
|
|
}
|
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Cipheriv, LazyTransform);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-29 23:36:20 +00:00
|
|
|
Cipheriv.prototype._transform = Cipher.prototype._transform;
|
|
|
|
Cipheriv.prototype._flush = Cipher.prototype._flush;
|
2012-10-10 22:44:47 +00:00
|
|
|
Cipheriv.prototype.update = Cipher.prototype.update;
|
|
|
|
Cipheriv.prototype.final = Cipher.prototype.final;
|
|
|
|
Cipheriv.prototype.setAutoPadding = Cipher.prototype.setAutoPadding;
|
2014-11-11 18:38:02 +00:00
|
|
|
Cipheriv.prototype.getAuthTag = Cipher.prototype.getAuthTag;
|
|
|
|
Cipheriv.prototype.setAuthTag = Cipher.prototype.setAuthTag;
|
|
|
|
Cipheriv.prototype.setAAD = Cipher.prototype.setAAD;
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createDecipher = exports.Decipher = Decipher;
|
2012-10-29 23:36:20 +00:00
|
|
|
function Decipher(cipher, password, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Decipher))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Decipher(cipher, password, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.CipherBase(false);
|
|
|
|
this._handle.init(cipher, toBuf(password));
|
2012-10-10 22:44:47 +00:00
|
|
|
this._decoder = null;
|
2012-10-29 23:36:20 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
}
|
2010-05-03 22:37:49 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Decipher, LazyTransform);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-29 23:36:20 +00:00
|
|
|
Decipher.prototype._transform = Cipher.prototype._transform;
|
|
|
|
Decipher.prototype._flush = Cipher.prototype._flush;
|
2012-10-10 22:44:47 +00:00
|
|
|
Decipher.prototype.update = Cipher.prototype.update;
|
|
|
|
Decipher.prototype.final = Cipher.prototype.final;
|
|
|
|
Decipher.prototype.finaltol = Cipher.prototype.final;
|
|
|
|
Decipher.prototype.setAutoPadding = Cipher.prototype.setAutoPadding;
|
2014-11-11 18:38:02 +00:00
|
|
|
Decipher.prototype.getAuthTag = Cipher.prototype.getAuthTag;
|
|
|
|
Decipher.prototype.setAuthTag = Cipher.prototype.setAuthTag;
|
|
|
|
Decipher.prototype.setAAD = Cipher.prototype.setAAD;
|
2010-11-29 07:20:59 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createDecipheriv = exports.Decipheriv = Decipheriv;
|
2012-10-29 23:36:20 +00:00
|
|
|
function Decipheriv(cipher, key, iv, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Decipheriv))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Decipheriv(cipher, key, iv, options);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.CipherBase(false);
|
|
|
|
this._handle.initiv(cipher, toBuf(key), toBuf(iv));
|
2012-10-10 22:44:47 +00:00
|
|
|
this._decoder = null;
|
2012-10-29 23:36:20 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
LazyTransform.call(this, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
}
|
2010-04-12 20:25:16 +00:00
|
|
|
|
2013-03-15 08:59:30 +00:00
|
|
|
util.inherits(Decipheriv, LazyTransform);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-29 23:36:20 +00:00
|
|
|
Decipheriv.prototype._transform = Cipher.prototype._transform;
|
|
|
|
Decipheriv.prototype._flush = Cipher.prototype._flush;
|
2012-10-10 22:44:47 +00:00
|
|
|
Decipheriv.prototype.update = Cipher.prototype.update;
|
|
|
|
Decipheriv.prototype.final = Cipher.prototype.final;
|
|
|
|
Decipheriv.prototype.finaltol = Cipher.prototype.final;
|
|
|
|
Decipheriv.prototype.setAutoPadding = Cipher.prototype.setAutoPadding;
|
2014-11-11 18:38:02 +00:00
|
|
|
Decipheriv.prototype.getAuthTag = Cipher.prototype.getAuthTag;
|
|
|
|
Decipheriv.prototype.setAuthTag = Cipher.prototype.setAuthTag;
|
|
|
|
Decipheriv.prototype.setAAD = Cipher.prototype.setAAD;
|
2012-10-10 22:44:47 +00:00
|
|
|
|
|
|
|
|
|
|
|
exports.createSign = exports.Sign = Sign;
|
2012-10-30 17:18:55 +00:00
|
|
|
function Sign(algorithm, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Sign))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Sign(algorithm, options);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.Sign();
|
|
|
|
this._handle.init(algorithm);
|
2012-10-30 17:18:55 +00:00
|
|
|
|
|
|
|
stream.Writable.call(this, options);
|
2012-10-13 00:36:18 +00:00
|
|
|
}
|
2011-01-19 01:00:38 +00:00
|
|
|
|
2012-10-30 17:18:55 +00:00
|
|
|
util.inherits(Sign, stream.Writable);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Sign.prototype._write = function _write(chunk, encoding, callback) {
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.update(chunk, encoding);
|
2012-10-30 17:18:55 +00:00
|
|
|
callback();
|
|
|
|
};
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-30 17:18:55 +00:00
|
|
|
Sign.prototype.update = Hash.prototype.update;
|
2012-10-13 00:36:18 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Sign.prototype.sign = function sign(options, encoding) {
|
2013-10-04 11:59:38 +00:00
|
|
|
if (!options)
|
|
|
|
throw new Error('No key provided to sign');
|
|
|
|
|
|
|
|
var key = options.key || options;
|
|
|
|
var passphrase = options.passphrase || null;
|
2017-03-05 23:41:26 +00:00
|
|
|
|
|
|
|
// Options specific to RSA
|
|
|
|
var rsaPadding = constants.RSA_PKCS1_PADDING;
|
|
|
|
if (options.hasOwnProperty('padding')) {
|
|
|
|
if (options.padding === options.padding >> 0) {
|
|
|
|
rsaPadding = options.padding;
|
|
|
|
} else {
|
|
|
|
throw new TypeError('padding must be an integer');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var pssSaltLength = constants.RSA_PSS_SALTLEN_AUTO;
|
|
|
|
if (options.hasOwnProperty('saltLength')) {
|
|
|
|
if (options.saltLength === options.saltLength >> 0) {
|
|
|
|
pssSaltLength = options.saltLength;
|
|
|
|
} else {
|
|
|
|
throw new TypeError('saltLength must be an integer');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var ret = this._handle.sign(toBuf(key), null, passphrase, rsaPadding,
|
|
|
|
pssSaltLength);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2013-10-04 11:59:38 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
ret = ret.toString(encoding);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
return ret;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
exports.createVerify = exports.Verify = Verify;
|
2012-10-30 17:18:55 +00:00
|
|
|
function Verify(algorithm, options) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof Verify))
|
2013-03-29 16:39:51 +00:00
|
|
|
return new Verify(algorithm, options);
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2015-04-28 17:46:14 +00:00
|
|
|
this._handle = new binding.Verify();
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.init(algorithm);
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-30 17:18:55 +00:00
|
|
|
stream.Writable.call(this, options);
|
|
|
|
}
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2012-10-30 17:18:55 +00:00
|
|
|
util.inherits(Verify, stream.Writable);
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-30 17:18:55 +00:00
|
|
|
Verify.prototype._write = Sign.prototype._write;
|
|
|
|
Verify.prototype.update = Sign.prototype.update;
|
2012-10-13 00:36:18 +00:00
|
|
|
|
2017-03-05 23:41:26 +00:00
|
|
|
Verify.prototype.verify = function verify(options, signature, sigEncoding) {
|
|
|
|
var key = options.key || options;
|
2012-10-22 17:37:20 +00:00
|
|
|
sigEncoding = sigEncoding || exports.DEFAULT_ENCODING;
|
2017-03-05 23:41:26 +00:00
|
|
|
|
|
|
|
// Options specific to RSA
|
|
|
|
var rsaPadding = constants.RSA_PKCS1_PADDING;
|
|
|
|
if (options.hasOwnProperty('padding')) {
|
|
|
|
if (options.padding === options.padding >> 0) {
|
|
|
|
rsaPadding = options.padding;
|
|
|
|
} else {
|
|
|
|
throw new TypeError('padding must be an integer');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var pssSaltLength = constants.RSA_PSS_SALTLEN_AUTO;
|
|
|
|
if (options.hasOwnProperty('saltLength')) {
|
|
|
|
if (options.saltLength === options.saltLength >> 0) {
|
|
|
|
pssSaltLength = options.saltLength;
|
|
|
|
} else {
|
|
|
|
throw new TypeError('saltLength must be an integer');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._handle.verify(toBuf(key), toBuf(signature, sigEncoding), null,
|
|
|
|
rsaPadding, pssSaltLength);
|
2012-10-10 22:44:47 +00:00
|
|
|
};
|
|
|
|
|
2015-01-27 19:58:14 +00:00
|
|
|
function rsaPublic(method, defaultPadding) {
|
|
|
|
return function(options, buffer) {
|
|
|
|
var key = options.key || options;
|
|
|
|
var padding = options.padding || defaultPadding;
|
2015-01-27 19:58:22 +00:00
|
|
|
var passphrase = options.passphrase || null;
|
|
|
|
return method(toBuf(key), buffer, padding, passphrase);
|
2015-01-27 19:58:14 +00:00
|
|
|
};
|
|
|
|
}
|
2014-05-05 14:35:28 +00:00
|
|
|
|
2015-01-27 19:58:14 +00:00
|
|
|
function rsaPrivate(method, defaultPadding) {
|
|
|
|
return function(options, buffer) {
|
|
|
|
var key = options.key || options;
|
|
|
|
var passphrase = options.passphrase || null;
|
|
|
|
var padding = options.padding || defaultPadding;
|
|
|
|
return method(toBuf(key), buffer, padding, passphrase);
|
|
|
|
};
|
|
|
|
}
|
2014-05-05 14:35:28 +00:00
|
|
|
|
2015-01-27 19:58:14 +00:00
|
|
|
exports.publicEncrypt = rsaPublic(binding.publicEncrypt,
|
|
|
|
constants.RSA_PKCS1_OAEP_PADDING);
|
|
|
|
exports.publicDecrypt = rsaPublic(binding.publicDecrypt,
|
|
|
|
constants.RSA_PKCS1_PADDING);
|
|
|
|
exports.privateEncrypt = rsaPrivate(binding.privateEncrypt,
|
|
|
|
constants.RSA_PKCS1_PADDING);
|
|
|
|
exports.privateDecrypt = rsaPrivate(binding.privateDecrypt,
|
|
|
|
constants.RSA_PKCS1_OAEP_PADDING);
|
2012-10-23 17:35:15 +00:00
|
|
|
|
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
exports.createDiffieHellman = exports.DiffieHellman = DiffieHellman;
|
|
|
|
|
2014-02-18 01:57:08 +00:00
|
|
|
function DiffieHellman(sizeOrKey, keyEncoding, generator, genEncoding) {
|
2012-10-10 22:44:47 +00:00
|
|
|
if (!(this instanceof DiffieHellman))
|
2014-02-18 01:57:08 +00:00
|
|
|
return new DiffieHellman(sizeOrKey, keyEncoding, generator, genEncoding);
|
|
|
|
|
2017-03-22 06:34:55 +00:00
|
|
|
if (typeof sizeOrKey !== 'number' &&
|
|
|
|
typeof sizeOrKey !== 'string' &&
|
|
|
|
!isUint8Array(sizeOrKey)) {
|
|
|
|
throw new TypeError('First argument should be number, string, ' +
|
|
|
|
'Uint8Array or Buffer');
|
|
|
|
}
|
2014-10-08 22:38:46 +00:00
|
|
|
|
2014-02-18 01:57:08 +00:00
|
|
|
if (keyEncoding) {
|
|
|
|
if (typeof keyEncoding !== 'string' ||
|
|
|
|
(!Buffer.isEncoding(keyEncoding) && keyEncoding !== 'buffer')) {
|
|
|
|
genEncoding = generator;
|
|
|
|
generator = keyEncoding;
|
|
|
|
keyEncoding = false;
|
|
|
|
}
|
2011-01-19 01:00:38 +00:00
|
|
|
}
|
2014-02-18 01:57:08 +00:00
|
|
|
|
|
|
|
keyEncoding = keyEncoding || exports.DEFAULT_ENCODING;
|
|
|
|
genEncoding = genEncoding || exports.DEFAULT_ENCODING;
|
|
|
|
|
|
|
|
if (typeof sizeOrKey !== 'number')
|
|
|
|
sizeOrKey = toBuf(sizeOrKey, keyEncoding);
|
|
|
|
|
|
|
|
if (!generator)
|
|
|
|
generator = DH_GENERATOR;
|
|
|
|
else if (typeof generator !== 'number')
|
|
|
|
generator = toBuf(generator, genEncoding);
|
|
|
|
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.DiffieHellman(sizeOrKey, generator);
|
2014-02-18 01:57:08 +00:00
|
|
|
Object.defineProperty(this, 'verifyError', {
|
|
|
|
enumerable: true,
|
2014-04-30 22:57:16 +00:00
|
|
|
value: this._handle.verifyError,
|
2014-02-18 01:57:08 +00:00
|
|
|
writable: false
|
|
|
|
});
|
2012-10-10 22:44:47 +00:00
|
|
|
}
|
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
|
|
|
exports.DiffieHellmanGroup =
|
|
|
|
exports.createDiffieHellmanGroup =
|
|
|
|
exports.getDiffieHellman = DiffieHellmanGroup;
|
|
|
|
|
|
|
|
function DiffieHellmanGroup(name) {
|
|
|
|
if (!(this instanceof DiffieHellmanGroup))
|
|
|
|
return new DiffieHellmanGroup(name);
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle = new binding.DiffieHellmanGroup(name);
|
2014-02-18 01:57:08 +00:00
|
|
|
Object.defineProperty(this, 'verifyError', {
|
|
|
|
enumerable: true,
|
2014-04-30 22:57:16 +00:00
|
|
|
value: this._handle.verifyError,
|
2014-02-18 01:57:08 +00:00
|
|
|
writable: false
|
|
|
|
});
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
DiffieHellmanGroup.prototype.generateKeys =
|
|
|
|
DiffieHellman.prototype.generateKeys =
|
|
|
|
dhGenerateKeys;
|
|
|
|
|
|
|
|
function dhGenerateKeys(encoding) {
|
2014-04-30 22:57:16 +00:00
|
|
|
var keys = this._handle.generateKeys();
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
|
|
|
if (encoding && encoding !== 'buffer')
|
2012-10-10 22:44:47 +00:00
|
|
|
keys = keys.toString(encoding);
|
|
|
|
return keys;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
DiffieHellmanGroup.prototype.computeSecret =
|
|
|
|
DiffieHellman.prototype.computeSecret =
|
|
|
|
dhComputeSecret;
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
function dhComputeSecret(key, inEnc, outEnc) {
|
2012-10-22 17:37:20 +00:00
|
|
|
inEnc = inEnc || exports.DEFAULT_ENCODING;
|
|
|
|
outEnc = outEnc || exports.DEFAULT_ENCODING;
|
2014-04-30 22:57:16 +00:00
|
|
|
var ret = this._handle.computeSecret(toBuf(key, inEnc));
|
2012-10-23 17:35:15 +00:00
|
|
|
if (outEnc && outEnc !== 'buffer')
|
2012-10-10 22:44:47 +00:00
|
|
|
ret = ret.toString(outEnc);
|
|
|
|
return ret;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
DiffieHellmanGroup.prototype.getPrime =
|
|
|
|
DiffieHellman.prototype.getPrime =
|
|
|
|
dhGetPrime;
|
|
|
|
|
|
|
|
function dhGetPrime(encoding) {
|
2014-04-30 22:57:16 +00:00
|
|
|
var prime = this._handle.getPrime();
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
prime = prime.toString(encoding);
|
|
|
|
return prime;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
DiffieHellmanGroup.prototype.getGenerator =
|
|
|
|
DiffieHellman.prototype.getGenerator =
|
|
|
|
dhGetGenerator;
|
|
|
|
|
|
|
|
function dhGetGenerator(encoding) {
|
2014-04-30 22:57:16 +00:00
|
|
|
var generator = this._handle.getGenerator();
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
generator = generator.toString(encoding);
|
|
|
|
return generator;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
DiffieHellmanGroup.prototype.getPublicKey =
|
|
|
|
DiffieHellman.prototype.getPublicKey =
|
|
|
|
dhGetPublicKey;
|
2011-01-19 01:00:38 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
function dhGetPublicKey(encoding) {
|
2014-04-30 22:57:16 +00:00
|
|
|
var key = this._handle.getPublicKey();
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
key = key.toString(encoding);
|
|
|
|
return key;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
DiffieHellmanGroup.prototype.getPrivateKey =
|
|
|
|
DiffieHellman.prototype.getPrivateKey =
|
|
|
|
dhGetPrivateKey;
|
|
|
|
|
|
|
|
function dhGetPrivateKey(encoding) {
|
2014-04-30 22:57:16 +00:00
|
|
|
var key = this._handle.getPrivateKey();
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2012-10-10 22:44:47 +00:00
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
key = key.toString(encoding);
|
|
|
|
return key;
|
2012-10-23 17:35:15 +00:00
|
|
|
}
|
|
|
|
|
2011-08-11 09:40:55 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
DiffieHellman.prototype.setPublicKey = function setPublicKey(key, encoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.setPublicKey(toBuf(key, encoding));
|
2012-10-10 22:44:47 +00:00
|
|
|
return this;
|
|
|
|
};
|
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
DiffieHellman.prototype.setPrivateKey = function setPrivateKey(key, encoding) {
|
2012-10-22 17:37:20 +00:00
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
2014-04-30 22:57:16 +00:00
|
|
|
this._handle.setPrivateKey(toBuf(key, encoding));
|
2012-10-10 22:44:47 +00:00
|
|
|
return this;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2014-08-27 14:01:01 +00:00
|
|
|
function ECDH(curve) {
|
2015-01-29 01:05:53 +00:00
|
|
|
if (typeof curve !== 'string')
|
2015-10-14 21:10:25 +00:00
|
|
|
throw new TypeError('"curve" argument should be a string');
|
2014-08-27 14:01:01 +00:00
|
|
|
|
|
|
|
this._handle = new binding.ECDH(curve);
|
|
|
|
}
|
|
|
|
|
|
|
|
exports.createECDH = function createECDH(curve) {
|
|
|
|
return new ECDH(curve);
|
|
|
|
};
|
|
|
|
|
|
|
|
ECDH.prototype.computeSecret = DiffieHellman.prototype.computeSecret;
|
|
|
|
ECDH.prototype.setPrivateKey = DiffieHellman.prototype.setPrivateKey;
|
|
|
|
ECDH.prototype.setPublicKey = DiffieHellman.prototype.setPublicKey;
|
|
|
|
ECDH.prototype.getPrivateKey = DiffieHellman.prototype.getPrivateKey;
|
|
|
|
|
|
|
|
ECDH.prototype.generateKeys = function generateKeys(encoding, format) {
|
|
|
|
this._handle.generateKeys();
|
|
|
|
|
|
|
|
return this.getPublicKey(encoding, format);
|
|
|
|
};
|
|
|
|
|
|
|
|
ECDH.prototype.getPublicKey = function getPublicKey(encoding, format) {
|
|
|
|
var f;
|
|
|
|
if (format) {
|
|
|
|
if (typeof format === 'number')
|
|
|
|
f = format;
|
|
|
|
if (format === 'compressed')
|
|
|
|
f = constants.POINT_CONVERSION_COMPRESSED;
|
|
|
|
else if (format === 'hybrid')
|
|
|
|
f = constants.POINT_CONVERSION_HYBRID;
|
|
|
|
// Default
|
|
|
|
else if (format === 'uncompressed')
|
|
|
|
f = constants.POINT_CONVERSION_UNCOMPRESSED;
|
|
|
|
else
|
2015-03-24 14:15:57 +00:00
|
|
|
throw new TypeError('Bad format: ' + format);
|
2014-08-27 14:01:01 +00:00
|
|
|
} else {
|
|
|
|
f = constants.POINT_CONVERSION_UNCOMPRESSED;
|
|
|
|
}
|
|
|
|
var key = this._handle.getPublicKey(f);
|
|
|
|
encoding = encoding || exports.DEFAULT_ENCODING;
|
|
|
|
if (encoding && encoding !== 'buffer')
|
|
|
|
key = key.toString(encoding);
|
|
|
|
return key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2013-11-21 10:29:07 +00:00
|
|
|
exports.pbkdf2 = function(password,
|
|
|
|
salt,
|
|
|
|
iterations,
|
|
|
|
keylen,
|
|
|
|
digest,
|
|
|
|
callback) {
|
2015-01-29 01:05:53 +00:00
|
|
|
if (typeof digest === 'function') {
|
2013-11-21 10:29:07 +00:00
|
|
|
callback = digest;
|
|
|
|
digest = undefined;
|
|
|
|
}
|
|
|
|
|
2015-01-29 01:05:53 +00:00
|
|
|
if (typeof callback !== 'function')
|
2012-10-23 17:29:06 +00:00
|
|
|
throw new Error('No callback provided to pbkdf2');
|
|
|
|
|
2013-11-21 10:29:07 +00:00
|
|
|
return pbkdf2(password, salt, iterations, keylen, digest, callback);
|
2012-10-23 17:29:06 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2013-11-21 10:29:07 +00:00
|
|
|
exports.pbkdf2Sync = function(password, salt, iterations, keylen, digest) {
|
|
|
|
return pbkdf2(password, salt, iterations, keylen, digest);
|
2012-10-23 17:29:06 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2013-11-21 10:29:07 +00:00
|
|
|
function pbkdf2(password, salt, iterations, keylen, digest, callback) {
|
2017-02-10 22:48:39 +00:00
|
|
|
|
|
|
|
if (digest === undefined) {
|
|
|
|
throw new TypeError(
|
|
|
|
'The "digest" argument is required and must not be undefined');
|
|
|
|
}
|
|
|
|
|
2012-10-23 17:35:15 +00:00
|
|
|
password = toBuf(password);
|
|
|
|
salt = toBuf(salt);
|
2012-10-22 17:37:20 +00:00
|
|
|
|
|
|
|
if (exports.DEFAULT_ENCODING === 'buffer')
|
2013-11-21 10:29:07 +00:00
|
|
|
return binding.PBKDF2(password, salt, iterations, keylen, digest, callback);
|
2012-10-22 17:37:20 +00:00
|
|
|
|
|
|
|
// at this point, we need to handle encodings.
|
|
|
|
var encoding = exports.DEFAULT_ENCODING;
|
|
|
|
if (callback) {
|
2014-11-22 15:59:48 +00:00
|
|
|
var next = function(er, ret) {
|
2012-10-22 17:37:20 +00:00
|
|
|
if (ret)
|
|
|
|
ret = ret.toString(encoding);
|
|
|
|
callback(er, ret);
|
2014-11-22 15:59:48 +00:00
|
|
|
};
|
2013-11-21 10:29:07 +00:00
|
|
|
binding.PBKDF2(password, salt, iterations, keylen, digest, next);
|
2012-10-22 17:37:20 +00:00
|
|
|
} else {
|
2013-11-21 10:29:07 +00:00
|
|
|
var ret = binding.PBKDF2(password, salt, iterations, keylen, digest);
|
2012-10-22 17:37:20 +00:00
|
|
|
return ret.toString(encoding);
|
|
|
|
}
|
2012-10-23 17:29:06 +00:00
|
|
|
}
|
2012-10-13 00:36:18 +00:00
|
|
|
|
2012-10-10 22:44:47 +00:00
|
|
|
|
2013-10-10 20:24:53 +00:00
|
|
|
exports.Certificate = Certificate;
|
|
|
|
|
|
|
|
function Certificate() {
|
|
|
|
if (!(this instanceof Certificate))
|
|
|
|
return new Certificate();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Certificate.prototype.verifySpkac = function verifySpkac(object) {
|
2016-02-23 12:43:32 +00:00
|
|
|
return binding.certVerifySpkac(object);
|
2013-10-10 20:24:53 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Certificate.prototype.exportPublicKey =
|
|
|
|
function exportPublicKey(object, encoding) {
|
|
|
|
return binding.certExportPublicKey(toBuf(object, encoding));
|
|
|
|
};
|
2013-10-10 20:24:53 +00:00
|
|
|
|
|
|
|
|
2016-10-09 17:00:13 +00:00
|
|
|
Certificate.prototype.exportChallenge =
|
|
|
|
function exportChallenge(object, encoding) {
|
|
|
|
return binding.certExportChallenge(toBuf(object, encoding));
|
|
|
|
};
|
2013-10-10 20:24:53 +00:00
|
|
|
|
2011-09-22 18:33:58 +00:00
|
|
|
|
2013-12-14 11:28:07 +00:00
|
|
|
exports.setEngine = function setEngine(id, flags) {
|
2015-01-29 01:05:53 +00:00
|
|
|
if (typeof id !== 'string')
|
2015-10-14 21:10:25 +00:00
|
|
|
throw new TypeError('"id" argument should be a string');
|
2013-12-14 11:28:07 +00:00
|
|
|
|
2015-01-29 01:05:53 +00:00
|
|
|
if (flags && typeof flags !== 'number')
|
2015-10-14 21:10:25 +00:00
|
|
|
throw new TypeError('"flags" argument should be a number, if present');
|
2013-12-14 11:28:07 +00:00
|
|
|
flags = flags >>> 0;
|
|
|
|
|
|
|
|
// Use provided engine for everything by default
|
|
|
|
if (flags === 0)
|
|
|
|
flags = constants.ENGINE_METHOD_ALL;
|
|
|
|
|
|
|
|
return binding.setEngine(id, flags);
|
|
|
|
};
|
|
|
|
|
2015-01-22 02:30:27 +00:00
|
|
|
exports.randomBytes = exports.pseudoRandomBytes = randomBytes;
|
2012-10-12 23:26:14 +00:00
|
|
|
|
2015-01-22 02:30:27 +00:00
|
|
|
exports.rng = exports.prng = randomBytes;
|
2012-10-13 00:49:53 +00:00
|
|
|
|
2017-01-08 04:12:08 +00:00
|
|
|
exports.getCiphers = internalUtil.cachedResult(
|
|
|
|
() => internalUtil.filterDuplicateStrings(getCiphers())
|
|
|
|
);
|
2015-06-08 16:26:16 +00:00
|
|
|
|
2017-01-08 04:12:08 +00:00
|
|
|
exports.getHashes = internalUtil.cachedResult(
|
|
|
|
() => internalUtil.filterDuplicateStrings(getHashes())
|
|
|
|
);
|
2012-10-13 00:44:11 +00:00
|
|
|
|
2017-01-08 04:12:08 +00:00
|
|
|
exports.getCurves = internalUtil.cachedResult(
|
|
|
|
() => internalUtil.filterDuplicateStrings(getCurves())
|
|
|
|
);
|
2013-03-18 23:16:55 +00:00
|
|
|
|
2016-01-22 23:10:09 +00:00
|
|
|
Object.defineProperty(exports, 'fips', {
|
|
|
|
get: getFipsCrypto,
|
|
|
|
set: setFipsCrypto
|
|
|
|
});
|
2013-03-18 23:16:55 +00:00
|
|
|
|
2016-08-24 02:49:22 +00:00
|
|
|
exports.timingSafeEqual = timingSafeEqual;
|
|
|
|
|
2014-03-06 23:27:01 +00:00
|
|
|
// Legacy API
|
2016-05-15 05:29:19 +00:00
|
|
|
Object.defineProperty(exports, 'createCredentials', {
|
|
|
|
configurable: true,
|
|
|
|
enumerable: true,
|
|
|
|
get: internalUtil.deprecate(function() {
|
2015-06-13 16:44:39 +00:00
|
|
|
return require('tls').createSecureContext;
|
|
|
|
}, 'crypto.createCredentials is deprecated. ' +
|
2016-12-04 20:47:01 +00:00
|
|
|
'Use tls.createSecureContext instead.', 'DEP0010')
|
2016-05-15 05:29:19 +00:00
|
|
|
});
|
2014-03-06 23:27:01 +00:00
|
|
|
|
2016-05-15 05:29:19 +00:00
|
|
|
Object.defineProperty(exports, 'Credentials', {
|
|
|
|
configurable: true,
|
|
|
|
enumerable: true,
|
|
|
|
get: internalUtil.deprecate(function() {
|
|
|
|
return require('tls').SecureContext;
|
|
|
|
}, 'crypto.Credentials is deprecated. ' +
|
2016-12-04 20:47:01 +00:00
|
|
|
'Use tls.SecureContext instead.', 'DEP0011')
|
2016-05-15 05:29:19 +00:00
|
|
|
});
|