You've already forked matrix-js-sdk
mirror of
https://github.com/matrix-org/matrix-js-sdk.git
synced 2025-11-25 05:23:13 +03:00
* Move `SecretEncryptedPayload` in `src/utils/@types` * Move `encryptAES` to a dedicated file. Moved in a utils folder. * Move `deriveKeys` to a dedicated file in order to share it * Move `decryptAES` to a dedicated file. Moved in a utils folder. * Move `calculateKeyCheck` to a dedicated file. Moved in a utils folder. * Remove AES functions in `aes.ts` and export new ones for backward compatibility * Update import to use new functions * Add `src/utils` entrypoint in `README.md` * - Rename `SecretEncryptedPayload` to `AESEncryptedSecretStoragePayload`. - Move into `src/@types` * Move `calculateKeyCheck` into `secret-storage.ts`. * Move `deriveKeys` into `src/utils/internal` folder. * - Rename `encryptAES` on `encryptAESSecretStorageItem` - Change named export by default export * - Rename `decryptAES` on `decryptAESSecretStorageItem` - Change named export by default export * Update documentation * Update `decryptAESSecretStorageItem` doc * Add lnk to spec for `calculateKeyCheck` * Fix downstream tests
74 lines
2.7 KiB
TypeScript
74 lines
2.7 KiB
TypeScript
/*
|
|
* Copyright 2024 The Matrix.org Foundation C.I.C.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
import { decodeBase64, encodeBase64 } from "../base64.ts";
|
|
import { deriveKeys } from "./internal/deriveKeys.ts";
|
|
import { AESEncryptedSecretStoragePayload } from "../@types/AESEncryptedSecretStoragePayload.ts";
|
|
|
|
/**
|
|
* Encrypt a string as a secret storage item, using AES-CTR.
|
|
*
|
|
* @param data - the plaintext to encrypt
|
|
* @param key - the encryption key to use as an input to the HKDF function which is used to derive the AES key for
|
|
* encryption. Obviously, the same key must be provided when decrypting.
|
|
* @param name - the name of the secret. Used as an input to the HKDF operation which is used to derive the AES key,
|
|
* so again the same value must be provided when decrypting.
|
|
* @param ivStr - the base64-encoded initialization vector to use. If not supplied, a random one will be generated.
|
|
*
|
|
* @returns The encrypted result, including the ciphertext itself, the initialization vector (as supplied in `ivStr`,
|
|
* or generated), and an HMAC on the ciphertext — all base64-encoded.
|
|
*/
|
|
export default async function encryptAESSecretStorageItem(
|
|
data: string,
|
|
key: Uint8Array,
|
|
name: string,
|
|
ivStr?: string,
|
|
): Promise<AESEncryptedSecretStoragePayload> {
|
|
let iv: Uint8Array;
|
|
if (ivStr) {
|
|
iv = decodeBase64(ivStr);
|
|
} else {
|
|
iv = new Uint8Array(16);
|
|
globalThis.crypto.getRandomValues(iv);
|
|
|
|
// clear bit 63 of the IV to stop us hitting the 64-bit counter boundary
|
|
// (which would mean we wouldn't be able to decrypt on Android). The loss
|
|
// of a single bit of iv is a price we have to pay.
|
|
iv[8] &= 0x7f;
|
|
}
|
|
|
|
const [aesKey, hmacKey] = await deriveKeys(key, name);
|
|
const encodedData = new TextEncoder().encode(data);
|
|
|
|
const ciphertext = await globalThis.crypto.subtle.encrypt(
|
|
{
|
|
name: "AES-CTR",
|
|
counter: iv,
|
|
length: 64,
|
|
},
|
|
aesKey,
|
|
encodedData,
|
|
);
|
|
|
|
const hmac = await globalThis.crypto.subtle.sign({ name: "HMAC" }, hmacKey, ciphertext);
|
|
|
|
return {
|
|
iv: encodeBase64(iv),
|
|
ciphertext: encodeBase64(ciphertext),
|
|
mac: encodeBase64(hmac),
|
|
};
|
|
}
|