diff options
author | 2023-10-21 00:01:58 +0300 | |
---|---|---|
committer | 2023-10-20 14:01:58 -0700 | |
commit | 7166fe10b5dca0e3bfb948aca2672c934b384aab (patch) | |
tree | 52118f86c3bbb8645091f698ec8d84ae56b9edbc | |
parent | 2890ad53c4ca4408913ab0667a43a1493e3b3126 (diff) | |
download | bun-7166fe10b5dca0e3bfb948aca2672c934b384aab.tar.gz bun-7166fe10b5dca0e3bfb948aca2672c934b384aab.tar.zst bun-7166fe10b5dca0e3bfb948aca2672c934b384aab.zip |
Fixes IV calculation for AES-GCM mode (#6590)
* fix(crypto): fix the error in IV calculation for AES-GCM mode
* chore(crypto): add basic unit tests for Cipher & Decipher
-rw-r--r-- | src/js/node/crypto.js | 2 | ||||
-rw-r--r-- | test/js/bun/crypto/cipheriv-decipheriv.test.ts | 201 |
2 files changed, 202 insertions, 1 deletions
diff --git a/src/js/node/crypto.js b/src/js/node/crypto.js index ae7e24655..40d5d712c 100644 --- a/src/js/node/crypto.js +++ b/src/js/node/crypto.js @@ -2973,7 +2973,7 @@ var require_authCipher = __commonJS({ ghash.update(Buffer2.alloc(8, 0)); var ivBits = len * 8, tail = Buffer2.alloc(8); - tail.writeUIntBE(ivBits, 0, 8), ghash.update(tail), (self2._finID = ghash.state); + tail.writeUIntBE(ivBits, 2, 6), ghash.update(tail), (self2._finID = ghash.state); var out = Buffer2.from(self2._finID); return incr32(out), out; } diff --git a/test/js/bun/crypto/cipheriv-decipheriv.test.ts b/test/js/bun/crypto/cipheriv-decipheriv.test.ts new file mode 100644 index 000000000..0c220730c --- /dev/null +++ b/test/js/bun/crypto/cipheriv-decipheriv.test.ts @@ -0,0 +1,201 @@ +import { BinaryLike, DecipherGCM, CipherGCM, createCipheriv, createDecipheriv, randomBytes } from "crypto"; +import { it, expect } from "bun:test"; + +/** + * Perform a sample encryption and decryption + * @param algo Algorithm to use + * @param key Encryption key + * @param iv Initialization vector if applicable + */ +const sampleEncryptDecrypt = (algo: string, key: BinaryLike, iv: BinaryLike | null): boolean => { + const plaintext = "Out of the mountain of despair, a stone of hope."; + + const cipher = createCipheriv(algo, key, iv); + let ciph = cipher.update(plaintext, "utf8", "hex"); + ciph += cipher.final("hex"); + + const decipher = createDecipheriv(algo, key, iv); + let txt = decipher.update(ciph, "hex", "utf8"); + txt += decipher.final("utf8"); + + return plaintext === txt; +}; + +/** + * Perform a sample encryption and decryption + * @param algo Algorithm to use + * @param key Encryption key + * @param iv Initialization vector if applicable + */ +const sampleEncryptDecryptGCM = (algo: string, key: BinaryLike, iv: BinaryLike | null): boolean => { + const plaintext = "Out of the mountain of despair, a stone of hope."; + + const cipher = createCipheriv(algo, key, iv) as import("crypto").CipherGCM; + let ciph = cipher.update(plaintext, "utf8", "hex"); + ciph += cipher.final("hex"); + + const decipher = createDecipheriv(algo, key, iv) as import("crypto").DecipherGCM; + decipher.setAuthTag(cipher.getAuthTag()); + let txt = decipher.update(ciph, "hex", "utf8"); + txt += decipher.final("utf8"); + + return plaintext === txt; +}; + +it("should encrypt & decrypt using update & final interface", () => { + const plaintext = "Out of the mountain of despair, a stone of hope."; + + const key = randomBytes(32); + const iv = randomBytes(16); + + const cipher = createCipheriv("aes-256-cbc", key, iv); + let ciph = cipher.update(plaintext, "utf8", "hex"); + ciph += cipher.final("hex"); + + const decipher = createDecipheriv("aes-256-cbc", key, iv); + let txt = decipher.update(ciph, "hex", "utf8"); + txt += decipher.final("utf8"); + + expect(txt).toBe(plaintext); +}); + +it("should encrypt & decrypt using streaming interface", () => { + const plaintext = "Out of the mountain of despair, a stone of hope."; + + const key = randomBytes(32); + const iv = randomBytes(16); + + const cipher = createCipheriv("aes-256-cbc", key, iv); + cipher.end(plaintext); + let ciph = cipher.read(); + + const decipher = createDecipheriv("aes-256-cbc", key, iv); + decipher.end(ciph); + let txt = decipher.read().toString("utf8"); + + expect(txt).toBe(plaintext); +}); + +it("should fail when cipher is not defined", () => { + expect(() => createCipheriv(null as unknown as string, randomBytes(32), randomBytes(16))).toThrow(); +}); + +it("should fail when key is not defined", () => { + expect(() => createCipheriv("aes-256-cbc", null as unknown as BinaryLike, randomBytes(16))).toThrow(); +}); + +it("should fail when iv is not defined", () => { + expect(() => createCipheriv("aes-256-cbc", randomBytes(32), null as unknown as BinaryLike)).toThrow(); +}); + +it("should fail when key length is invalid", () => { + expect(() => createCipheriv("aes-128-cbc", randomBytes(15), randomBytes(16))).toThrow(); + expect(() => createCipheriv("aes-256-cbc", randomBytes(31), randomBytes(16))).toThrow(); + expect(() => createCipheriv("aes-192-cbc", randomBytes(23), randomBytes(12))).toThrow(); +}); + +it("should fail when iv length is invalid", () => { + expect(() => createCipheriv("aes-128-cbc", randomBytes(16), randomBytes(15))).toThrow(); + expect(() => createCipheriv("aes-256-cbc", randomBytes(16), randomBytes(31))).toThrow(); + expect(() => createCipheriv("aes-192-cbc", randomBytes(16), randomBytes(11))).toThrow(); +}); + +it("only zero-sized iv or null should be accepted in ECB mode", () => { + expect(sampleEncryptDecrypt("aes-128-ecb", randomBytes(16), Buffer.alloc(0))).toBe(true); + expect(sampleEncryptDecrypt("aes-128-ecb", randomBytes(16), null)).toBe(true); + expect(() => createCipheriv("aes-128-ecb", randomBytes(16), randomBytes(16))).toThrow(); +}); + +it("should allow only valid iv lengths in GCM mode", () => { + expect(sampleEncryptDecryptGCM("aes-256-gcm", randomBytes(32), randomBytes(1))).toBe(true); + expect(sampleEncryptDecryptGCM("aes-256-gcm", randomBytes(32), randomBytes(96))).toBe(true); +}); + +const referencePlaintext = "Out of the mountain of despair, a stone of hope."; + +const references = { + "aes-128-ecb": { + iv: "", + key: "cd44a845618733f41669b81ec91ba2f0", + ciphertext: + "6df4d1e637cca154462e2a7436312b03055cd08a3cc57edc0c1296940c4ec50348f2c25c667986d80a7e979a4c720ca00bff25383c2b2bc5e4c5aa82e785c165", + authTag: null, + }, + "aes-128-cbc": { + iv: "43a5e1e3b0a716aa8b9a1574b2ac86ad", + key: "c88964a004457c1f49b641f8a6bbf5d8", + ciphertext: + "92482a5a78b2a657c8c1f20d37457d652c8d0b0220d493bfaacb8835159d910d69df3b10be67589e85a0a9114ea3fd2fccff835f861a4297cc3bd6b4a65b4589", + authTag: null, + }, + aes128: { + iv: "ab0c635f3f86ac997fb556f9b7fe8e76", + key: "c91eb04c29d58b34669cf717e4acecbb", + ciphertext: + "72855bf0d5744eeb5772221df2ebd3c966f8712cdd207fbd265b9a45cc9d6df8cad41972650503a0dbfc672ff4093fec1238fd0ad960a4be15b2d599d1fc12ac", + authTag: null, + }, + "aes-128-cfb": { + iv: "608a3a6ba9c3aa0ba90be65fa5df03aa", + key: "ee235a102b6bca616a65d0ca74b238d7", + ciphertext: "8497dba3f7f3252e7f5f3cf2c49c5e16cd83da98a942532537a77283afb875ec5a865020ced4242615edb7ec2eaf7e6c", + authTag: null, + }, + "aes-128-cfb8": { + iv: "3021d44812302ae0312c9ef523f01bf5", + key: "20787258b5d2a166262ecc6e3e917a58", + ciphertext: "db4596b2f0d7a74bea91a1d715e1327ca149591f5bc64d19fde7138eacfa5dd0da503596dcc66bc771edcf14b6eb8f69", + authTag: null, + }, + "aes-128-cfb1": { + iv: "c91453a0182f1efeeb4525ed96b0aad3", + key: "26bfaea72f720475528cc5b2bfd5cf2e", + ciphertext: "5d3f5c646140be734f9283e67759f8b06340cc96a8bb21b591cfd43a48cc2941decdd9b4aea13b7c5c7a48d443c8d384", + authTag: null, + }, + "aes-128-ofb": { + iv: "ca6bf9503134e3a4bad0890a973d4189", + key: "f4687e40072a015e25d927e13b7318c4", + ciphertext: "281d5e352b1b093de2918c4db8e4065e2e911515ca7583ebb0206d0149bfac1e4ad15d120d708c543171bd908ce290a2", + authTag: null, + }, + "aes-128-ctr": { + iv: "a934743ec98c1c4d335bdba13c05a2f4", + key: "74d127cd01a0615761d94b69f82846eb", + ciphertext: "a61309b2bb64dc900961136daa502f607b36854f766f8db5fa4a0d5fd4c969209f942d0727ce11c0c7e48b11c840d9c4", + authTag: null, + }, + "aes-128-gcm": { + iv: "3941a463832c24e6d9dd3698652b6698", + key: "83d0dbb3e74480502f3532ae3462532f", + ciphertext: "85a0b803d532e2a810a2e4737136d33dece7f8b8d9ce32e1a875677b7889d90cd8082ba35e23ddb70e87d965feedf3f0", + authTag: "60c15ca251ffe5578b6cb06feb45f2b9", + }, +}; + +it("should encrypt & decrypt well-known values", () => { + Object.entries(references).forEach(([algo, params]) => { + const decipher = createDecipheriv( + algo, + Buffer.from(params.key, "hex"), + Buffer.from(params.iv, "hex"), + ) as DecipherGCM; + if (params.authTag) { + decipher.setAuthTag(Buffer.from(params.authTag, "hex")); + } + + let plaintext = decipher.update(params.ciphertext, "hex", "utf8"); + plaintext += decipher.final("utf8"); + + expect(plaintext).toBe(referencePlaintext); + + const cipher = createCipheriv(algo, Buffer.from(params.key, "hex"), Buffer.from(params.iv, "hex")) as CipherGCM; + let ciphertext = cipher.update(referencePlaintext, "utf8", "hex"); + ciphertext += cipher.final("hex"); + + expect(ciphertext).toBe(params.ciphertext); + if (params.authTag) { + expect(cipher.getAuthTag().toString("hex")).toBe(params.authTag); + } + }); +}); |