You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					1024 lines
				
				30 KiB
			
		
		
			
		
	
	
					1024 lines
				
				30 KiB
			| 
								 
											2 years ago
										 
									 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Password-based encryption functions.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @author Dave Longley
							 | 
						||
| 
								 | 
							
								 * @author Stefan Siegl <stesie@brokenpipe.de>
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Copyright (c) 2010-2013 Digital Bazaar, Inc.
							 | 
						||
| 
								 | 
							
								 * Copyright (c) 2012 Stefan Siegl <stesie@brokenpipe.de>
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * An EncryptedPrivateKeyInfo:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * EncryptedPrivateKeyInfo ::= SEQUENCE {
							 | 
						||
| 
								 | 
							
								 *   encryptionAlgorithm  EncryptionAlgorithmIdentifier,
							 | 
						||
| 
								 | 
							
								 *   encryptedData        EncryptedData }
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * EncryptedData ::= OCTET STRING
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var forge = require('./forge');
							 | 
						||
| 
								 | 
							
								require('./aes');
							 | 
						||
| 
								 | 
							
								require('./asn1');
							 | 
						||
| 
								 | 
							
								require('./des');
							 | 
						||
| 
								 | 
							
								require('./md');
							 | 
						||
| 
								 | 
							
								require('./oids');
							 | 
						||
| 
								 | 
							
								require('./pbkdf2');
							 | 
						||
| 
								 | 
							
								require('./pem');
							 | 
						||
| 
								 | 
							
								require('./random');
							 | 
						||
| 
								 | 
							
								require('./rc2');
							 | 
						||
| 
								 | 
							
								require('./rsa');
							 | 
						||
| 
								 | 
							
								require('./util');
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								if(typeof BigInteger === 'undefined') {
							 | 
						||
| 
								 | 
							
								  var BigInteger = forge.jsbn.BigInteger;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// shortcut for asn.1 API
							 | 
						||
| 
								 | 
							
								var asn1 = forge.asn1;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/* Password-based encryption implementation. */
							 | 
						||
| 
								 | 
							
								var pki = forge.pki = forge.pki || {};
							 | 
						||
| 
								 | 
							
								module.exports = pki.pbe = forge.pbe = forge.pbe || {};
							 | 
						||
| 
								 | 
							
								var oids = pki.oids;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// validator for an EncryptedPrivateKeyInfo structure
							 | 
						||
| 
								 | 
							
								// Note: Currently only works w/algorithm params
							 | 
						||
| 
								 | 
							
								var encryptedPrivateKeyValidator = {
							 | 
						||
| 
								 | 
							
								  name: 'EncryptedPrivateKeyInfo',
							 | 
						||
| 
								 | 
							
								  tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								  type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								  constructed: true,
							 | 
						||
| 
								 | 
							
								  value: [{
							 | 
						||
| 
								 | 
							
								    name: 'EncryptedPrivateKeyInfo.encryptionAlgorithm',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								    constructed: true,
							 | 
						||
| 
								 | 
							
								    value: [{
							 | 
						||
| 
								 | 
							
								      name: 'AlgorithmIdentifier.algorithm',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.OID,
							 | 
						||
| 
								 | 
							
								      constructed: false,
							 | 
						||
| 
								 | 
							
								      capture: 'encryptionOid'
							 | 
						||
| 
								 | 
							
								    }, {
							 | 
						||
| 
								 | 
							
								      name: 'AlgorithmIdentifier.parameters',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								      constructed: true,
							 | 
						||
| 
								 | 
							
								      captureAsn1: 'encryptionParams'
							 | 
						||
| 
								 | 
							
								    }]
							 | 
						||
| 
								 | 
							
								  }, {
							 | 
						||
| 
								 | 
							
								    // encryptedData
							 | 
						||
| 
								 | 
							
								    name: 'EncryptedPrivateKeyInfo.encryptedData',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.OCTETSTRING,
							 | 
						||
| 
								 | 
							
								    constructed: false,
							 | 
						||
| 
								 | 
							
								    capture: 'encryptedData'
							 | 
						||
| 
								 | 
							
								  }]
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// validator for a PBES2Algorithms structure
							 | 
						||
| 
								 | 
							
								// Note: Currently only works w/PBKDF2 + AES encryption schemes
							 | 
						||
| 
								 | 
							
								var PBES2AlgorithmsValidator = {
							 | 
						||
| 
								 | 
							
								  name: 'PBES2Algorithms',
							 | 
						||
| 
								 | 
							
								  tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								  type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								  constructed: true,
							 | 
						||
| 
								 | 
							
								  value: [{
							 | 
						||
| 
								 | 
							
								    name: 'PBES2Algorithms.keyDerivationFunc',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								    constructed: true,
							 | 
						||
| 
								 | 
							
								    value: [{
							 | 
						||
| 
								 | 
							
								      name: 'PBES2Algorithms.keyDerivationFunc.oid',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.OID,
							 | 
						||
| 
								 | 
							
								      constructed: false,
							 | 
						||
| 
								 | 
							
								      capture: 'kdfOid'
							 | 
						||
| 
								 | 
							
								    }, {
							 | 
						||
| 
								 | 
							
								      name: 'PBES2Algorithms.params',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								      constructed: true,
							 | 
						||
| 
								 | 
							
								      value: [{
							 | 
						||
| 
								 | 
							
								        name: 'PBES2Algorithms.params.salt',
							 | 
						||
| 
								 | 
							
								        tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								        type: asn1.Type.OCTETSTRING,
							 | 
						||
| 
								 | 
							
								        constructed: false,
							 | 
						||
| 
								 | 
							
								        capture: 'kdfSalt'
							 | 
						||
| 
								 | 
							
								      }, {
							 | 
						||
| 
								 | 
							
								        name: 'PBES2Algorithms.params.iterationCount',
							 | 
						||
| 
								 | 
							
								        tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								        type: asn1.Type.INTEGER,
							 | 
						||
| 
								 | 
							
								        constructed: false,
							 | 
						||
| 
								 | 
							
								        capture: 'kdfIterationCount'
							 | 
						||
| 
								 | 
							
								      }, {
							 | 
						||
| 
								 | 
							
								        name: 'PBES2Algorithms.params.keyLength',
							 | 
						||
| 
								 | 
							
								        tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								        type: asn1.Type.INTEGER,
							 | 
						||
| 
								 | 
							
								        constructed: false,
							 | 
						||
| 
								 | 
							
								        optional: true,
							 | 
						||
| 
								 | 
							
								        capture: 'keyLength'
							 | 
						||
| 
								 | 
							
								      }, {
							 | 
						||
| 
								 | 
							
								        // prf
							 | 
						||
| 
								 | 
							
								        name: 'PBES2Algorithms.params.prf',
							 | 
						||
| 
								 | 
							
								        tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								        type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								        constructed: true,
							 | 
						||
| 
								 | 
							
								        optional: true,
							 | 
						||
| 
								 | 
							
								        value: [{
							 | 
						||
| 
								 | 
							
								          name: 'PBES2Algorithms.params.prf.algorithm',
							 | 
						||
| 
								 | 
							
								          tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								          type: asn1.Type.OID,
							 | 
						||
| 
								 | 
							
								          constructed: false,
							 | 
						||
| 
								 | 
							
								          capture: 'prfOid'
							 | 
						||
| 
								 | 
							
								        }]
							 | 
						||
| 
								 | 
							
								      }]
							 | 
						||
| 
								 | 
							
								    }]
							 | 
						||
| 
								 | 
							
								  }, {
							 | 
						||
| 
								 | 
							
								    name: 'PBES2Algorithms.encryptionScheme',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								    constructed: true,
							 | 
						||
| 
								 | 
							
								    value: [{
							 | 
						||
| 
								 | 
							
								      name: 'PBES2Algorithms.encryptionScheme.oid',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.OID,
							 | 
						||
| 
								 | 
							
								      constructed: false,
							 | 
						||
| 
								 | 
							
								      capture: 'encOid'
							 | 
						||
| 
								 | 
							
								    }, {
							 | 
						||
| 
								 | 
							
								      name: 'PBES2Algorithms.encryptionScheme.iv',
							 | 
						||
| 
								 | 
							
								      tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								      type: asn1.Type.OCTETSTRING,
							 | 
						||
| 
								 | 
							
								      constructed: false,
							 | 
						||
| 
								 | 
							
								      capture: 'encIv'
							 | 
						||
| 
								 | 
							
								    }]
							 | 
						||
| 
								 | 
							
								  }]
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								var pkcs12PbeParamsValidator = {
							 | 
						||
| 
								 | 
							
								  name: 'pkcs-12PbeParams',
							 | 
						||
| 
								 | 
							
								  tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								  type: asn1.Type.SEQUENCE,
							 | 
						||
| 
								 | 
							
								  constructed: true,
							 | 
						||
| 
								 | 
							
								  value: [{
							 | 
						||
| 
								 | 
							
								    name: 'pkcs-12PbeParams.salt',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.OCTETSTRING,
							 | 
						||
| 
								 | 
							
								    constructed: false,
							 | 
						||
| 
								 | 
							
								    capture: 'salt'
							 | 
						||
| 
								 | 
							
								  }, {
							 | 
						||
| 
								 | 
							
								    name: 'pkcs-12PbeParams.iterations',
							 | 
						||
| 
								 | 
							
								    tagClass: asn1.Class.UNIVERSAL,
							 | 
						||
| 
								 | 
							
								    type: asn1.Type.INTEGER,
							 | 
						||
| 
								 | 
							
								    constructed: false,
							 | 
						||
| 
								 | 
							
								    capture: 'iterations'
							 | 
						||
| 
								 | 
							
								  }]
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Encrypts a ASN.1 PrivateKeyInfo object, producing an EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * PBES2Algorithms ALGORITHM-IDENTIFIER ::=
							 | 
						||
| 
								 | 
							
								 *   { {PBES2-params IDENTIFIED BY id-PBES2}, ...}
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13}
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * PBES2-params ::= SEQUENCE {
							 | 
						||
| 
								 | 
							
								 *   keyDerivationFunc AlgorithmIdentifier {{PBES2-KDFs}},
							 | 
						||
| 
								 | 
							
								 *   encryptionScheme AlgorithmIdentifier {{PBES2-Encs}}
							 | 
						||
| 
								 | 
							
								 * }
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * PBES2-KDFs ALGORITHM-IDENTIFIER ::=
							 | 
						||
| 
								 | 
							
								 *   { {PBKDF2-params IDENTIFIED BY id-PBKDF2}, ... }
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * PBES2-Encs ALGORITHM-IDENTIFIER ::= { ... }
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * PBKDF2-params ::= SEQUENCE {
							 | 
						||
| 
								 | 
							
								 *   salt CHOICE {
							 | 
						||
| 
								 | 
							
								 *     specified OCTET STRING,
							 | 
						||
| 
								 | 
							
								 *     otherSource AlgorithmIdentifier {{PBKDF2-SaltSources}}
							 | 
						||
| 
								 | 
							
								 *   },
							 | 
						||
| 
								 | 
							
								 *   iterationCount INTEGER (1..MAX),
							 | 
						||
| 
								 | 
							
								 *   keyLength INTEGER (1..MAX) OPTIONAL,
							 | 
						||
| 
								 | 
							
								 *   prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1
							 | 
						||
| 
								 | 
							
								 * }
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param obj the ASN.1 PrivateKeyInfo object.
							 | 
						||
| 
								 | 
							
								 * @param password the password to encrypt with.
							 | 
						||
| 
								 | 
							
								 * @param options:
							 | 
						||
| 
								 | 
							
								 *          algorithm the encryption algorithm to use
							 | 
						||
| 
								 | 
							
								 *            ('aes128', 'aes192', 'aes256', '3des'), defaults to 'aes128'.
							 | 
						||
| 
								 | 
							
								 *          count the iteration count to use.
							 | 
						||
| 
								 | 
							
								 *          saltSize the salt size to use.
							 | 
						||
| 
								 | 
							
								 *          prfAlgorithm the PRF message digest algorithm to use
							 | 
						||
| 
								 | 
							
								 *            ('sha1', 'sha224', 'sha256', 'sha384', 'sha512')
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ASN.1 EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.encryptPrivateKeyInfo = function(obj, password, options) {
							 | 
						||
| 
								 | 
							
								  // set default options
							 | 
						||
| 
								 | 
							
								  options = options || {};
							 | 
						||
| 
								 | 
							
								  options.saltSize = options.saltSize || 8;
							 | 
						||
| 
								 | 
							
								  options.count = options.count || 2048;
							 | 
						||
| 
								 | 
							
								  options.algorithm = options.algorithm || 'aes128';
							 | 
						||
| 
								 | 
							
								  options.prfAlgorithm = options.prfAlgorithm || 'sha1';
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // generate PBE params
							 | 
						||
| 
								 | 
							
								  var salt = forge.random.getBytesSync(options.saltSize);
							 | 
						||
| 
								 | 
							
								  var count = options.count;
							 | 
						||
| 
								 | 
							
								  var countBytes = asn1.integerToDer(count);
							 | 
						||
| 
								 | 
							
								  var dkLen;
							 | 
						||
| 
								 | 
							
								  var encryptionAlgorithm;
							 | 
						||
| 
								 | 
							
								  var encryptedData;
							 | 
						||
| 
								 | 
							
								  if(options.algorithm.indexOf('aes') === 0 || options.algorithm === 'des') {
							 | 
						||
| 
								 | 
							
								    // do PBES2
							 | 
						||
| 
								 | 
							
								    var ivLen, encOid, cipherFn;
							 | 
						||
| 
								 | 
							
								    switch(options.algorithm) {
							 | 
						||
| 
								 | 
							
								    case 'aes128':
							 | 
						||
| 
								 | 
							
								      dkLen = 16;
							 | 
						||
| 
								 | 
							
								      ivLen = 16;
							 | 
						||
| 
								 | 
							
								      encOid = oids['aes128-CBC'];
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'aes192':
							 | 
						||
| 
								 | 
							
								      dkLen = 24;
							 | 
						||
| 
								 | 
							
								      ivLen = 16;
							 | 
						||
| 
								 | 
							
								      encOid = oids['aes192-CBC'];
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'aes256':
							 | 
						||
| 
								 | 
							
								      dkLen = 32;
							 | 
						||
| 
								 | 
							
								      ivLen = 16;
							 | 
						||
| 
								 | 
							
								      encOid = oids['aes256-CBC'];
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'des':
							 | 
						||
| 
								 | 
							
								      dkLen = 8;
							 | 
						||
| 
								 | 
							
								      ivLen = 8;
							 | 
						||
| 
								 | 
							
								      encOid = oids['desCBC'];
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.des.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    default:
							 | 
						||
| 
								 | 
							
								      var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.');
							 | 
						||
| 
								 | 
							
								      error.algorithm = options.algorithm;
							 | 
						||
| 
								 | 
							
								      throw error;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get PRF message digest
							 | 
						||
| 
								 | 
							
								    var prfAlgorithm = 'hmacWith' + options.prfAlgorithm.toUpperCase();
							 | 
						||
| 
								 | 
							
								    var md = prfAlgorithmToMessageDigest(prfAlgorithm);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // encrypt private key using pbe SHA-1 and AES/DES
							 | 
						||
| 
								 | 
							
								    var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md);
							 | 
						||
| 
								 | 
							
								    var iv = forge.random.getBytesSync(ivLen);
							 | 
						||
| 
								 | 
							
								    var cipher = cipherFn(dk);
							 | 
						||
| 
								 | 
							
								    cipher.start(iv);
							 | 
						||
| 
								 | 
							
								    cipher.update(asn1.toDer(obj));
							 | 
						||
| 
								 | 
							
								    cipher.finish();
							 | 
						||
| 
								 | 
							
								    encryptedData = cipher.output.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get PBKDF2-params
							 | 
						||
| 
								 | 
							
								    var params = createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    encryptionAlgorithm = asn1.create(
							 | 
						||
| 
								 | 
							
								      asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
							 | 
						||
| 
								 | 
							
								        asn1.oidToDer(oids['pkcs5PBES2']).getBytes()),
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								        // keyDerivationFunc
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								          asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
							 | 
						||
| 
								 | 
							
								            asn1.oidToDer(oids['pkcs5PBKDF2']).getBytes()),
							 | 
						||
| 
								 | 
							
								          // PBKDF2-params
							 | 
						||
| 
								 | 
							
								          params
							 | 
						||
| 
								 | 
							
								        ]),
							 | 
						||
| 
								 | 
							
								        // encryptionScheme
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								          asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
							 | 
						||
| 
								 | 
							
								            asn1.oidToDer(encOid).getBytes()),
							 | 
						||
| 
								 | 
							
								          // iv
							 | 
						||
| 
								 | 
							
								          asn1.create(
							 | 
						||
| 
								 | 
							
								            asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, iv)
							 | 
						||
| 
								 | 
							
								        ])
							 | 
						||
| 
								 | 
							
								      ])
							 | 
						||
| 
								 | 
							
								    ]);
							 | 
						||
| 
								 | 
							
								  } else if(options.algorithm === '3des') {
							 | 
						||
| 
								 | 
							
								    // Do PKCS12 PBE
							 | 
						||
| 
								 | 
							
								    dkLen = 24;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    var saltBytes = new forge.util.ByteBuffer(salt);
							 | 
						||
| 
								 | 
							
								    var dk = pki.pbe.generatePkcs12Key(password, saltBytes, 1, count, dkLen);
							 | 
						||
| 
								 | 
							
								    var iv = pki.pbe.generatePkcs12Key(password, saltBytes, 2, count, dkLen);
							 | 
						||
| 
								 | 
							
								    var cipher = forge.des.createEncryptionCipher(dk);
							 | 
						||
| 
								 | 
							
								    cipher.start(iv);
							 | 
						||
| 
								 | 
							
								    cipher.update(asn1.toDer(obj));
							 | 
						||
| 
								 | 
							
								    cipher.finish();
							 | 
						||
| 
								 | 
							
								    encryptedData = cipher.output.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    encryptionAlgorithm = asn1.create(
							 | 
						||
| 
								 | 
							
								      asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
							 | 
						||
| 
								 | 
							
								        asn1.oidToDer(oids['pbeWithSHAAnd3-KeyTripleDES-CBC']).getBytes()),
							 | 
						||
| 
								 | 
							
								      // pkcs-12PbeParams
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								        // salt
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt),
							 | 
						||
| 
								 | 
							
								        // iteration count
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
							 | 
						||
| 
								 | 
							
								          countBytes.getBytes())
							 | 
						||
| 
								 | 
							
								      ])
							 | 
						||
| 
								 | 
							
								    ]);
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.');
							 | 
						||
| 
								 | 
							
								    error.algorithm = options.algorithm;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // EncryptedPrivateKeyInfo
							 | 
						||
| 
								 | 
							
								  var rval = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								    // encryptionAlgorithm
							 | 
						||
| 
								 | 
							
								    encryptionAlgorithm,
							 | 
						||
| 
								 | 
							
								    // encryptedData
							 | 
						||
| 
								 | 
							
								    asn1.create(
							 | 
						||
| 
								 | 
							
								      asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, encryptedData)
							 | 
						||
| 
								 | 
							
								  ]);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Decrypts a ASN.1 PrivateKeyInfo object.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param obj the ASN.1 EncryptedPrivateKeyInfo object.
							 | 
						||
| 
								 | 
							
								 * @param password the password to decrypt with.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ASN.1 PrivateKeyInfo on success, null on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.decryptPrivateKeyInfo = function(obj, password) {
							 | 
						||
| 
								 | 
							
								  var rval = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get PBE params
							 | 
						||
| 
								 | 
							
								  var capture = {};
							 | 
						||
| 
								 | 
							
								  var errors = [];
							 | 
						||
| 
								 | 
							
								  if(!asn1.validate(obj, encryptedPrivateKeyValidator, capture, errors)) {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read encrypted private key. ' +
							 | 
						||
| 
								 | 
							
								      'ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
							 | 
						||
| 
								 | 
							
								    error.errors = errors;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get cipher
							 | 
						||
| 
								 | 
							
								  var oid = asn1.derToOid(capture.encryptionOid);
							 | 
						||
| 
								 | 
							
								  var cipher = pki.pbe.getCipher(oid, capture.encryptionParams, password);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get encrypted data
							 | 
						||
| 
								 | 
							
								  var encrypted = forge.util.createBuffer(capture.encryptedData);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  cipher.update(encrypted);
							 | 
						||
| 
								 | 
							
								  if(cipher.finish()) {
							 | 
						||
| 
								 | 
							
								    rval = asn1.fromDer(cipher.output);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Converts a EncryptedPrivateKeyInfo to PEM format.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param epki the EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 * @param maxline the maximum characters per line, defaults to 64.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the PEM-formatted encrypted private key.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.encryptedPrivateKeyToPem = function(epki, maxline) {
							 | 
						||
| 
								 | 
							
								  // convert to DER, then PEM-encode
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    type: 'ENCRYPTED PRIVATE KEY',
							 | 
						||
| 
								 | 
							
								    body: asn1.toDer(epki).getBytes()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  return forge.pem.encode(msg, {maxline: maxline});
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Converts a PEM-encoded EncryptedPrivateKeyInfo to ASN.1 format. Decryption
							 | 
						||
| 
								 | 
							
								 * is not performed.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param pem the EncryptedPrivateKeyInfo in PEM-format.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ASN.1 EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.encryptedPrivateKeyFromPem = function(pem) {
							 | 
						||
| 
								 | 
							
								  var msg = forge.pem.decode(pem)[0];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(msg.type !== 'ENCRYPTED PRIVATE KEY') {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Could not convert encrypted private key from PEM; ' +
							 | 
						||
| 
								 | 
							
								      'PEM header type is "ENCRYPTED PRIVATE KEY".');
							 | 
						||
| 
								 | 
							
								    error.headerType = msg.type;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  if(msg.procType && msg.procType.type === 'ENCRYPTED') {
							 | 
						||
| 
								 | 
							
								    throw new Error('Could not convert encrypted private key from PEM; ' +
							 | 
						||
| 
								 | 
							
								      'PEM is encrypted.');
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // convert DER to ASN.1 object
							 | 
						||
| 
								 | 
							
								  return asn1.fromDer(msg.body);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Encrypts an RSA private key. By default, the key will be wrapped in
							 | 
						||
| 
								 | 
							
								 * a PrivateKeyInfo and encrypted to produce a PKCS#8 EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 * This is the standard, preferred way to encrypt a private key.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * To produce a non-standard PEM-encrypted private key that uses encapsulated
							 | 
						||
| 
								 | 
							
								 * headers to indicate the encryption algorithm (old-style non-PKCS#8 OpenSSL
							 | 
						||
| 
								 | 
							
								 * private key encryption), set the 'legacy' option to true. Note: Using this
							 | 
						||
| 
								 | 
							
								 * option will cause the iteration count to be forced to 1.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: The 'des' algorithm is supported, but it is not considered to be
							 | 
						||
| 
								 | 
							
								 * secure because it only uses a single 56-bit key. If possible, it is highly
							 | 
						||
| 
								 | 
							
								 * recommended that a different algorithm be used.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param rsaKey the RSA key to encrypt.
							 | 
						||
| 
								 | 
							
								 * @param password the password to use.
							 | 
						||
| 
								 | 
							
								 * @param options:
							 | 
						||
| 
								 | 
							
								 *          algorithm: the encryption algorithm to use
							 | 
						||
| 
								 | 
							
								 *            ('aes128', 'aes192', 'aes256', '3des', 'des').
							 | 
						||
| 
								 | 
							
								 *          count: the iteration count to use.
							 | 
						||
| 
								 | 
							
								 *          saltSize: the salt size to use.
							 | 
						||
| 
								 | 
							
								 *          legacy: output an old non-PKCS#8 PEM-encrypted+encapsulated
							 | 
						||
| 
								 | 
							
								 *            headers (DEK-Info) private key.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the PEM-encoded ASN.1 EncryptedPrivateKeyInfo.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.encryptRsaPrivateKey = function(rsaKey, password, options) {
							 | 
						||
| 
								 | 
							
								  // standard PKCS#8
							 | 
						||
| 
								 | 
							
								  options = options || {};
							 | 
						||
| 
								 | 
							
								  if(!options.legacy) {
							 | 
						||
| 
								 | 
							
								    // encrypt PrivateKeyInfo
							 | 
						||
| 
								 | 
							
								    var rval = pki.wrapRsaPrivateKey(pki.privateKeyToAsn1(rsaKey));
							 | 
						||
| 
								 | 
							
								    rval = pki.encryptPrivateKeyInfo(rval, password, options);
							 | 
						||
| 
								 | 
							
								    return pki.encryptedPrivateKeyToPem(rval);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // legacy non-PKCS#8
							 | 
						||
| 
								 | 
							
								  var algorithm;
							 | 
						||
| 
								 | 
							
								  var iv;
							 | 
						||
| 
								 | 
							
								  var dkLen;
							 | 
						||
| 
								 | 
							
								  var cipherFn;
							 | 
						||
| 
								 | 
							
								  switch(options.algorithm) {
							 | 
						||
| 
								 | 
							
								  case 'aes128':
							 | 
						||
| 
								 | 
							
								    algorithm = 'AES-128-CBC';
							 | 
						||
| 
								 | 
							
								    dkLen = 16;
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(16);
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'aes192':
							 | 
						||
| 
								 | 
							
								    algorithm = 'AES-192-CBC';
							 | 
						||
| 
								 | 
							
								    dkLen = 24;
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(16);
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'aes256':
							 | 
						||
| 
								 | 
							
								    algorithm = 'AES-256-CBC';
							 | 
						||
| 
								 | 
							
								    dkLen = 32;
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(16);
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case '3des':
							 | 
						||
| 
								 | 
							
								    algorithm = 'DES-EDE3-CBC';
							 | 
						||
| 
								 | 
							
								    dkLen = 24;
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(8);
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.des.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'des':
							 | 
						||
| 
								 | 
							
								    algorithm = 'DES-CBC';
							 | 
						||
| 
								 | 
							
								    dkLen = 8;
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(8);
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.des.createEncryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    var error = new Error('Could not encrypt RSA private key; unsupported ' +
							 | 
						||
| 
								 | 
							
								      'encryption algorithm "' + options.algorithm + '".');
							 | 
						||
| 
								 | 
							
								    error.algorithm = options.algorithm;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // encrypt private key using OpenSSL legacy key derivation
							 | 
						||
| 
								 | 
							
								  var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen);
							 | 
						||
| 
								 | 
							
								  var cipher = cipherFn(dk);
							 | 
						||
| 
								 | 
							
								  cipher.start(iv);
							 | 
						||
| 
								 | 
							
								  cipher.update(asn1.toDer(pki.privateKeyToAsn1(rsaKey)));
							 | 
						||
| 
								 | 
							
								  cipher.finish();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    type: 'RSA PRIVATE KEY',
							 | 
						||
| 
								 | 
							
								    procType: {
							 | 
						||
| 
								 | 
							
								      version: '4',
							 | 
						||
| 
								 | 
							
								      type: 'ENCRYPTED'
							 | 
						||
| 
								 | 
							
								    },
							 | 
						||
| 
								 | 
							
								    dekInfo: {
							 | 
						||
| 
								 | 
							
								      algorithm: algorithm,
							 | 
						||
| 
								 | 
							
								      parameters: forge.util.bytesToHex(iv).toUpperCase()
							 | 
						||
| 
								 | 
							
								    },
							 | 
						||
| 
								 | 
							
								    body: cipher.output.getBytes()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  return forge.pem.encode(msg);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Decrypts an RSA private key.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param pem the PEM-formatted EncryptedPrivateKeyInfo to decrypt.
							 | 
						||
| 
								 | 
							
								 * @param password the password to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the RSA key on success, null on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.decryptRsaPrivateKey = function(pem, password) {
							 | 
						||
| 
								 | 
							
								  var rval = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var msg = forge.pem.decode(pem)[0];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(msg.type !== 'ENCRYPTED PRIVATE KEY' &&
							 | 
						||
| 
								 | 
							
								    msg.type !== 'PRIVATE KEY' &&
							 | 
						||
| 
								 | 
							
								    msg.type !== 'RSA PRIVATE KEY') {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Could not convert private key from PEM; PEM header type ' +
							 | 
						||
| 
								 | 
							
								      'is not "ENCRYPTED PRIVATE KEY", "PRIVATE KEY", or "RSA PRIVATE KEY".');
							 | 
						||
| 
								 | 
							
								    error.headerType = error;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(msg.procType && msg.procType.type === 'ENCRYPTED') {
							 | 
						||
| 
								 | 
							
								    var dkLen;
							 | 
						||
| 
								 | 
							
								    var cipherFn;
							 | 
						||
| 
								 | 
							
								    switch(msg.dekInfo.algorithm) {
							 | 
						||
| 
								 | 
							
								    case 'DES-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 8;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.des.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'DES-EDE3-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 24;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.des.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'AES-128-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 16;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'AES-192-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 24;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'AES-256-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 32;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'RC2-40-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 5;
							 | 
						||
| 
								 | 
							
								      cipherFn = function(key) {
							 | 
						||
| 
								 | 
							
								        return forge.rc2.createDecryptionCipher(key, 40);
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'RC2-64-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 8;
							 | 
						||
| 
								 | 
							
								      cipherFn = function(key) {
							 | 
						||
| 
								 | 
							
								        return forge.rc2.createDecryptionCipher(key, 64);
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case 'RC2-128-CBC':
							 | 
						||
| 
								 | 
							
								      dkLen = 16;
							 | 
						||
| 
								 | 
							
								      cipherFn = function(key) {
							 | 
						||
| 
								 | 
							
								        return forge.rc2.createDecryptionCipher(key, 128);
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    default:
							 | 
						||
| 
								 | 
							
								      var error = new Error('Could not decrypt private key; unsupported ' +
							 | 
						||
| 
								 | 
							
								        'encryption algorithm "' + msg.dekInfo.algorithm + '".');
							 | 
						||
| 
								 | 
							
								      error.algorithm = msg.dekInfo.algorithm;
							 | 
						||
| 
								 | 
							
								      throw error;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // use OpenSSL legacy key derivation
							 | 
						||
| 
								 | 
							
								    var iv = forge.util.hexToBytes(msg.dekInfo.parameters);
							 | 
						||
| 
								 | 
							
								    var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen);
							 | 
						||
| 
								 | 
							
								    var cipher = cipherFn(dk);
							 | 
						||
| 
								 | 
							
								    cipher.start(iv);
							 | 
						||
| 
								 | 
							
								    cipher.update(forge.util.createBuffer(msg.body));
							 | 
						||
| 
								 | 
							
								    if(cipher.finish()) {
							 | 
						||
| 
								 | 
							
								      rval = cipher.output.getBytes();
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      return rval;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    rval = msg.body;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(msg.type === 'ENCRYPTED PRIVATE KEY') {
							 | 
						||
| 
								 | 
							
								    rval = pki.decryptPrivateKeyInfo(asn1.fromDer(rval), password);
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // decryption already performed above
							 | 
						||
| 
								 | 
							
								    rval = asn1.fromDer(rval);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(rval !== null) {
							 | 
						||
| 
								 | 
							
								    rval = pki.privateKeyFromAsn1(rval);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Derives a PKCS#12 key.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param password the password to derive the key material from, null or
							 | 
						||
| 
								 | 
							
								 *          undefined for none.
							 | 
						||
| 
								 | 
							
								 * @param salt the salt, as a ByteBuffer, to use.
							 | 
						||
| 
								 | 
							
								 * @param id the PKCS#12 ID byte (1 = key material, 2 = IV, 3 = MAC).
							 | 
						||
| 
								 | 
							
								 * @param iter the iteration count.
							 | 
						||
| 
								 | 
							
								 * @param n the number of bytes to derive from the password.
							 | 
						||
| 
								 | 
							
								 * @param md the message digest to use, defaults to SHA-1.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return a ByteBuffer with the bytes derived from the password.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.pbe.generatePkcs12Key = function(password, salt, id, iter, n, md) {
							 | 
						||
| 
								 | 
							
								  var j, l;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(typeof md === 'undefined' || md === null) {
							 | 
						||
| 
								 | 
							
								    if(!('sha1' in forge.md)) {
							 | 
						||
| 
								 | 
							
								      throw new Error('"sha1" hash algorithm unavailable.');
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    md = forge.md.sha1.create();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var u = md.digestLength;
							 | 
						||
| 
								 | 
							
								  var v = md.blockLength;
							 | 
						||
| 
								 | 
							
								  var result = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* Convert password to Unicode byte buffer + trailing 0-byte. */
							 | 
						||
| 
								 | 
							
								  var passBuf = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								  if(password !== null && password !== undefined) {
							 | 
						||
| 
								 | 
							
								    for(l = 0; l < password.length; l++) {
							 | 
						||
| 
								 | 
							
								      passBuf.putInt16(password.charCodeAt(l));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    passBuf.putInt16(0);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* Length of salt and password in BYTES. */
							 | 
						||
| 
								 | 
							
								  var p = passBuf.length();
							 | 
						||
| 
								 | 
							
								  var s = salt.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 1. Construct a string, D (the "diversifier"), by concatenating
							 | 
						||
| 
								 | 
							
								        v copies of ID. */
							 | 
						||
| 
								 | 
							
								  var D = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								  D.fillWithByte(id, v);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 2. Concatenate copies of the salt together to create a string S of length
							 | 
						||
| 
								 | 
							
								        v * ceil(s / v) bytes (the final copy of the salt may be trunacted
							 | 
						||
| 
								 | 
							
								        to create S).
							 | 
						||
| 
								 | 
							
								        Note that if the salt is the empty string, then so is S. */
							 | 
						||
| 
								 | 
							
								  var Slen = v * Math.ceil(s / v);
							 | 
						||
| 
								 | 
							
								  var S = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								  for(l = 0; l < Slen; l++) {
							 | 
						||
| 
								 | 
							
								    S.putByte(salt.at(l % s));
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 3. Concatenate copies of the password together to create a string P of
							 | 
						||
| 
								 | 
							
								        length v * ceil(p / v) bytes (the final copy of the password may be
							 | 
						||
| 
								 | 
							
								        truncated to create P).
							 | 
						||
| 
								 | 
							
								        Note that if the password is the empty string, then so is P. */
							 | 
						||
| 
								 | 
							
								  var Plen = v * Math.ceil(p / v);
							 | 
						||
| 
								 | 
							
								  var P = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								  for(l = 0; l < Plen; l++) {
							 | 
						||
| 
								 | 
							
								    P.putByte(passBuf.at(l % p));
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 4. Set I=S||P to be the concatenation of S and P. */
							 | 
						||
| 
								 | 
							
								  var I = S;
							 | 
						||
| 
								 | 
							
								  I.putBuffer(P);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 5. Set c=ceil(n / u). */
							 | 
						||
| 
								 | 
							
								  var c = Math.ceil(n / u);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* 6. For i=1, 2, ..., c, do the following: */
							 | 
						||
| 
								 | 
							
								  for(var i = 1; i <= c; i++) {
							 | 
						||
| 
								 | 
							
								    /* a) Set Ai=H^r(D||I). (l.e. the rth hash of D||I, H(H(H(...H(D||I)))) */
							 | 
						||
| 
								 | 
							
								    var buf = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								    buf.putBytes(D.bytes());
							 | 
						||
| 
								 | 
							
								    buf.putBytes(I.bytes());
							 | 
						||
| 
								 | 
							
								    for(var round = 0; round < iter; round++) {
							 | 
						||
| 
								 | 
							
								      md.start();
							 | 
						||
| 
								 | 
							
								      md.update(buf.getBytes());
							 | 
						||
| 
								 | 
							
								      buf = md.digest();
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    /* b) Concatenate copies of Ai to create a string B of length v bytes (the
							 | 
						||
| 
								 | 
							
								          final copy of Ai may be truncated to create B). */
							 | 
						||
| 
								 | 
							
								    var B = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								    for(l = 0; l < v; l++) {
							 | 
						||
| 
								 | 
							
								      B.putByte(buf.at(l % u));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    /* c) Treating I as a concatenation I0, I1, ..., Ik-1 of v-byte blocks,
							 | 
						||
| 
								 | 
							
								          where k=ceil(s / v) + ceil(p / v), modify I by setting
							 | 
						||
| 
								 | 
							
								          Ij=(Ij+B+1) mod 2v for each j.  */
							 | 
						||
| 
								 | 
							
								    var k = Math.ceil(s / v) + Math.ceil(p / v);
							 | 
						||
| 
								 | 
							
								    var Inew = new forge.util.ByteBuffer();
							 | 
						||
| 
								 | 
							
								    for(j = 0; j < k; j++) {
							 | 
						||
| 
								 | 
							
								      var chunk = new forge.util.ByteBuffer(I.getBytes(v));
							 | 
						||
| 
								 | 
							
								      var x = 0x1ff;
							 | 
						||
| 
								 | 
							
								      for(l = B.length() - 1; l >= 0; l--) {
							 | 
						||
| 
								 | 
							
								        x = x >> 8;
							 | 
						||
| 
								 | 
							
								        x += B.at(l) + chunk.at(l);
							 | 
						||
| 
								 | 
							
								        chunk.setAt(l, x & 0xff);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								      Inew.putBuffer(chunk);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    I = Inew;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    /* Add Ai to A. */
							 | 
						||
| 
								 | 
							
								    result.putBuffer(buf);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  result.truncate(result.length() - n);
							 | 
						||
| 
								 | 
							
								  return result;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Get new Forge cipher object instance.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param oid the OID (in string notation).
							 | 
						||
| 
								 | 
							
								 * @param params the ASN.1 params object.
							 | 
						||
| 
								 | 
							
								 * @param password the password to decrypt with.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return new cipher object instance.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.pbe.getCipher = function(oid, params, password) {
							 | 
						||
| 
								 | 
							
								  switch(oid) {
							 | 
						||
| 
								 | 
							
								  case pki.oids['pkcs5PBES2']:
							 | 
						||
| 
								 | 
							
								    return pki.pbe.getCipherForPBES2(oid, params, password);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']:
							 | 
						||
| 
								 | 
							
								  case pki.oids['pbewithSHAAnd40BitRC2-CBC']:
							 | 
						||
| 
								 | 
							
								    return pki.pbe.getCipherForPKCS12PBE(oid, params, password);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read encrypted PBE data block. Unsupported OID.');
							 | 
						||
| 
								 | 
							
								    error.oid = oid;
							 | 
						||
| 
								 | 
							
								    error.supportedOids = [
							 | 
						||
| 
								 | 
							
								      'pkcs5PBES2',
							 | 
						||
| 
								 | 
							
								      'pbeWithSHAAnd3-KeyTripleDES-CBC',
							 | 
						||
| 
								 | 
							
								      'pbewithSHAAnd40BitRC2-CBC'
							 | 
						||
| 
								 | 
							
								    ];
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Get new Forge cipher object instance according to PBES2 params block.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The returned cipher instance is already started using the IV
							 | 
						||
| 
								 | 
							
								 * from PBES2 parameter block.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param oid the PKCS#5 PBKDF2 OID (in string notation).
							 | 
						||
| 
								 | 
							
								 * @param params the ASN.1 PBES2-params object.
							 | 
						||
| 
								 | 
							
								 * @param password the password to decrypt with.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return new cipher object instance.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.pbe.getCipherForPBES2 = function(oid, params, password) {
							 | 
						||
| 
								 | 
							
								  // get PBE params
							 | 
						||
| 
								 | 
							
								  var capture = {};
							 | 
						||
| 
								 | 
							
								  var errors = [];
							 | 
						||
| 
								 | 
							
								  if(!asn1.validate(params, PBES2AlgorithmsValidator, capture, errors)) {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read password-based-encryption algorithm ' +
							 | 
						||
| 
								 | 
							
								      'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
							 | 
						||
| 
								 | 
							
								    error.errors = errors;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // check oids
							 | 
						||
| 
								 | 
							
								  oid = asn1.derToOid(capture.kdfOid);
							 | 
						||
| 
								 | 
							
								  if(oid !== pki.oids['pkcs5PBKDF2']) {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read encrypted private key. ' +
							 | 
						||
| 
								 | 
							
								      'Unsupported key derivation function OID.');
							 | 
						||
| 
								 | 
							
								    error.oid = oid;
							 | 
						||
| 
								 | 
							
								    error.supportedOids = ['pkcs5PBKDF2'];
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  oid = asn1.derToOid(capture.encOid);
							 | 
						||
| 
								 | 
							
								  if(oid !== pki.oids['aes128-CBC'] &&
							 | 
						||
| 
								 | 
							
								    oid !== pki.oids['aes192-CBC'] &&
							 | 
						||
| 
								 | 
							
								    oid !== pki.oids['aes256-CBC'] &&
							 | 
						||
| 
								 | 
							
								    oid !== pki.oids['des-EDE3-CBC'] &&
							 | 
						||
| 
								 | 
							
								    oid !== pki.oids['desCBC']) {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read encrypted private key. ' +
							 | 
						||
| 
								 | 
							
								      'Unsupported encryption scheme OID.');
							 | 
						||
| 
								 | 
							
								    error.oid = oid;
							 | 
						||
| 
								 | 
							
								    error.supportedOids = [
							 | 
						||
| 
								 | 
							
								      'aes128-CBC', 'aes192-CBC', 'aes256-CBC', 'des-EDE3-CBC', 'desCBC'];
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // set PBE params
							 | 
						||
| 
								 | 
							
								  var salt = capture.kdfSalt;
							 | 
						||
| 
								 | 
							
								  var count = forge.util.createBuffer(capture.kdfIterationCount);
							 | 
						||
| 
								 | 
							
								  count = count.getInt(count.length() << 3);
							 | 
						||
| 
								 | 
							
								  var dkLen;
							 | 
						||
| 
								 | 
							
								  var cipherFn;
							 | 
						||
| 
								 | 
							
								  switch(pki.oids[oid]) {
							 | 
						||
| 
								 | 
							
								  case 'aes128-CBC':
							 | 
						||
| 
								 | 
							
								    dkLen = 16;
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'aes192-CBC':
							 | 
						||
| 
								 | 
							
								    dkLen = 24;
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'aes256-CBC':
							 | 
						||
| 
								 | 
							
								    dkLen = 32;
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.aes.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'des-EDE3-CBC':
							 | 
						||
| 
								 | 
							
								    dkLen = 24;
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.des.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 'desCBC':
							 | 
						||
| 
								 | 
							
								    dkLen = 8;
							 | 
						||
| 
								 | 
							
								    cipherFn = forge.des.createDecryptionCipher;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get PRF message digest
							 | 
						||
| 
								 | 
							
								  var md = prfOidToMessageDigest(capture.prfOid);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // decrypt private key using pbe with chosen PRF and AES/DES
							 | 
						||
| 
								 | 
							
								  var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md);
							 | 
						||
| 
								 | 
							
								  var iv = capture.encIv;
							 | 
						||
| 
								 | 
							
								  var cipher = cipherFn(dk);
							 | 
						||
| 
								 | 
							
								  cipher.start(iv);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return cipher;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Get new Forge cipher object instance for PKCS#12 PBE.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The returned cipher instance is already started using the key & IV
							 | 
						||
| 
								 | 
							
								 * derived from the provided password and PKCS#12 PBE salt.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param oid The PKCS#12 PBE OID (in string notation).
							 | 
						||
| 
								 | 
							
								 * @param params The ASN.1 PKCS#12 PBE-params object.
							 | 
						||
| 
								 | 
							
								 * @param password The password to decrypt with.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the new cipher object instance.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.pbe.getCipherForPKCS12PBE = function(oid, params, password) {
							 | 
						||
| 
								 | 
							
								  // get PBE params
							 | 
						||
| 
								 | 
							
								  var capture = {};
							 | 
						||
| 
								 | 
							
								  var errors = [];
							 | 
						||
| 
								 | 
							
								  if(!asn1.validate(params, pkcs12PbeParamsValidator, capture, errors)) {
							 | 
						||
| 
								 | 
							
								    var error = new Error('Cannot read password-based-encryption algorithm ' +
							 | 
						||
| 
								 | 
							
								      'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.');
							 | 
						||
| 
								 | 
							
								    error.errors = errors;
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var salt = forge.util.createBuffer(capture.salt);
							 | 
						||
| 
								 | 
							
								  var count = forge.util.createBuffer(capture.iterations);
							 | 
						||
| 
								 | 
							
								  count = count.getInt(count.length() << 3);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var dkLen, dIvLen, cipherFn;
							 | 
						||
| 
								 | 
							
								  switch(oid) {
							 | 
						||
| 
								 | 
							
								    case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']:
							 | 
						||
| 
								 | 
							
								      dkLen = 24;
							 | 
						||
| 
								 | 
							
								      dIvLen = 8;
							 | 
						||
| 
								 | 
							
								      cipherFn = forge.des.startDecrypting;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    case pki.oids['pbewithSHAAnd40BitRC2-CBC']:
							 | 
						||
| 
								 | 
							
								      dkLen = 5;
							 | 
						||
| 
								 | 
							
								      dIvLen = 8;
							 | 
						||
| 
								 | 
							
								      cipherFn = function(key, iv) {
							 | 
						||
| 
								 | 
							
								        var cipher = forge.rc2.createDecryptionCipher(key, 40);
							 | 
						||
| 
								 | 
							
								        cipher.start(iv, null);
							 | 
						||
| 
								 | 
							
								        return cipher;
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    default:
							 | 
						||
| 
								 | 
							
								      var error = new Error('Cannot read PKCS #12 PBE data block. Unsupported OID.');
							 | 
						||
| 
								 | 
							
								      error.oid = oid;
							 | 
						||
| 
								 | 
							
								      throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get PRF message digest
							 | 
						||
| 
								 | 
							
								  var md = prfOidToMessageDigest(capture.prfOid);
							 | 
						||
| 
								 | 
							
								  var key = pki.pbe.generatePkcs12Key(password, salt, 1, count, dkLen, md);
							 | 
						||
| 
								 | 
							
								  md.start();
							 | 
						||
| 
								 | 
							
								  var iv = pki.pbe.generatePkcs12Key(password, salt, 2, count, dIvLen, md);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return cipherFn(key, iv);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * OpenSSL's legacy key derivation function.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * See: http://www.openssl.org/docs/crypto/EVP_BytesToKey.html
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param password the password to derive the key from.
							 | 
						||
| 
								 | 
							
								 * @param salt the salt to use, null for none.
							 | 
						||
| 
								 | 
							
								 * @param dkLen the number of bytes needed for the derived key.
							 | 
						||
| 
								 | 
							
								 * @param [options] the options to use:
							 | 
						||
| 
								 | 
							
								 *          [md] an optional message digest object to use.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								pki.pbe.opensslDeriveBytes = function(password, salt, dkLen, md) {
							 | 
						||
| 
								 | 
							
								  if(typeof md === 'undefined' || md === null) {
							 | 
						||
| 
								 | 
							
								    if(!('md5' in forge.md)) {
							 | 
						||
| 
								 | 
							
								      throw new Error('"md5" hash algorithm unavailable.');
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    md = forge.md.md5.create();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  if(salt === null) {
							 | 
						||
| 
								 | 
							
								    salt = '';
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  var digests = [hash(md, password + salt)];
							 | 
						||
| 
								 | 
							
								  for(var length = 16, i = 1; length < dkLen; ++i, length += 16) {
							 | 
						||
| 
								 | 
							
								    digests.push(hash(md, digests[i - 1] + password + salt));
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return digests.join('').substr(0, dkLen);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								function hash(md, bytes) {
							 | 
						||
| 
								 | 
							
								  return md.start().update(bytes).digest().getBytes();
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								function prfOidToMessageDigest(prfOid) {
							 | 
						||
| 
								 | 
							
								  // get PRF algorithm, default to SHA-1
							 | 
						||
| 
								 | 
							
								  var prfAlgorithm;
							 | 
						||
| 
								 | 
							
								  if(!prfOid) {
							 | 
						||
| 
								 | 
							
								    prfAlgorithm = 'hmacWithSHA1';
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    prfAlgorithm = pki.oids[asn1.derToOid(prfOid)];
							 | 
						||
| 
								 | 
							
								    if(!prfAlgorithm) {
							 | 
						||
| 
								 | 
							
								      var error = new Error('Unsupported PRF OID.');
							 | 
						||
| 
								 | 
							
								      error.oid = prfOid;
							 | 
						||
| 
								 | 
							
								      error.supported = [
							 | 
						||
| 
								 | 
							
								        'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384',
							 | 
						||
| 
								 | 
							
								        'hmacWithSHA512'];
							 | 
						||
| 
								 | 
							
								      throw error;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return prfAlgorithmToMessageDigest(prfAlgorithm);
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								function prfAlgorithmToMessageDigest(prfAlgorithm) {
							 | 
						||
| 
								 | 
							
								  var factory = forge.md;
							 | 
						||
| 
								 | 
							
								  switch(prfAlgorithm) {
							 | 
						||
| 
								 | 
							
								  case 'hmacWithSHA224':
							 | 
						||
| 
								 | 
							
								    factory = forge.md.sha512;
							 | 
						||
| 
								 | 
							
								  case 'hmacWithSHA1':
							 | 
						||
| 
								 | 
							
								  case 'hmacWithSHA256':
							 | 
						||
| 
								 | 
							
								  case 'hmacWithSHA384':
							 | 
						||
| 
								 | 
							
								  case 'hmacWithSHA512':
							 | 
						||
| 
								 | 
							
								    prfAlgorithm = prfAlgorithm.substr(8).toLowerCase();
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    var error = new Error('Unsupported PRF algorithm.');
							 | 
						||
| 
								 | 
							
								    error.algorithm = prfAlgorithm;
							 | 
						||
| 
								 | 
							
								    error.supported = [
							 | 
						||
| 
								 | 
							
								      'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384',
							 | 
						||
| 
								 | 
							
								      'hmacWithSHA512'];
							 | 
						||
| 
								 | 
							
								    throw error;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  if(!factory || !(prfAlgorithm in factory)) {
							 | 
						||
| 
								 | 
							
								    throw new Error('Unknown hash algorithm: ' + prfAlgorithm);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return factory[prfAlgorithm].create();
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								function createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm) {
							 | 
						||
| 
								 | 
							
								  var params = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								    // salt
							 | 
						||
| 
								 | 
							
								    asn1.create(
							 | 
						||
| 
								 | 
							
								      asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt),
							 | 
						||
| 
								 | 
							
								    // iteration count
							 | 
						||
| 
								 | 
							
								    asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
							 | 
						||
| 
								 | 
							
								      countBytes.getBytes())
							 | 
						||
| 
								 | 
							
								  ]);
							 | 
						||
| 
								 | 
							
								  // when PRF algorithm is not SHA-1 default, add key length and PRF algorithm
							 | 
						||
| 
								 | 
							
								  if(prfAlgorithm !== 'hmacWithSHA1') {
							 | 
						||
| 
								 | 
							
								    params.value.push(
							 | 
						||
| 
								 | 
							
								      // key length
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
							 | 
						||
| 
								 | 
							
								        forge.util.hexToBytes(dkLen.toString(16))),
							 | 
						||
| 
								 | 
							
								      // AlgorithmIdentifier
							 | 
						||
| 
								 | 
							
								      asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
							 | 
						||
| 
								 | 
							
								        // algorithm
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
							 | 
						||
| 
								 | 
							
								          asn1.oidToDer(pki.oids[prfAlgorithm]).getBytes()),
							 | 
						||
| 
								 | 
							
								        // parameters (null)
							 | 
						||
| 
								 | 
							
								        asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
							 | 
						||
| 
								 | 
							
								      ]));
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return params;
							 | 
						||
| 
								 | 
							
								}
							 |