| var AuthCipher = require('./authCipher') |
| var Buffer = require('safe-buffer').Buffer |
| var MODES = require('./modes') |
| var StreamCipher = require('./streamCipher') |
| var Transform = require('cipher-base') |
| var aes = require('./aes') |
| var ebtk = require('evp_bytestokey') |
| var inherits = require('inherits') |
| |
| function Decipher (mode, key, iv) { |
| Transform.call(this) |
| |
| this._cache = new Splitter() |
| this._last = void 0 |
| this._cipher = new aes.AES(key) |
| this._prev = Buffer.from(iv) |
| this._mode = mode |
| this._autopadding = true |
| } |
| |
| inherits(Decipher, Transform) |
| |
| Decipher.prototype._update = function (data) { |
| this._cache.add(data) |
| var chunk |
| var thing |
| var out = [] |
| while ((chunk = this._cache.get(this._autopadding))) { |
| thing = this._mode.decrypt(this, chunk) |
| out.push(thing) |
| } |
| return Buffer.concat(out) |
| } |
| |
| Decipher.prototype._final = function () { |
| var chunk = this._cache.flush() |
| if (this._autopadding) { |
| return unpad(this._mode.decrypt(this, chunk)) |
| } else if (chunk) { |
| throw new Error('data not multiple of block length') |
| } |
| } |
| |
| Decipher.prototype.setAutoPadding = function (setTo) { |
| this._autopadding = !!setTo |
| return this |
| } |
| |
| function Splitter () { |
| this.cache = Buffer.allocUnsafe(0) |
| } |
| |
| Splitter.prototype.add = function (data) { |
| this.cache = Buffer.concat([this.cache, data]) |
| } |
| |
| Splitter.prototype.get = function (autoPadding) { |
| var out |
| if (autoPadding) { |
| if (this.cache.length > 16) { |
| out = this.cache.slice(0, 16) |
| this.cache = this.cache.slice(16) |
| return out |
| } |
| } else { |
| if (this.cache.length >= 16) { |
| out = this.cache.slice(0, 16) |
| this.cache = this.cache.slice(16) |
| return out |
| } |
| } |
| |
| return null |
| } |
| |
| Splitter.prototype.flush = function () { |
| if (this.cache.length) return this.cache |
| } |
| |
| function unpad (last) { |
| var padded = last[15] |
| if (padded < 1 || padded > 16) { |
| throw new Error('unable to decrypt data') |
| } |
| var i = -1 |
| while (++i < padded) { |
| if (last[(i + (16 - padded))] !== padded) { |
| throw new Error('unable to decrypt data') |
| } |
| } |
| if (padded === 16) return |
| |
| return last.slice(0, 16 - padded) |
| } |
| |
| function createDecipheriv (suite, password, iv) { |
| var config = MODES[suite.toLowerCase()] |
| if (!config) throw new TypeError('invalid suite type') |
| |
| if (typeof iv === 'string') iv = Buffer.from(iv) |
| if (config.mode !== 'GCM' && iv.length !== config.iv) throw new TypeError('invalid iv length ' + iv.length) |
| |
| if (typeof password === 'string') password = Buffer.from(password) |
| if (password.length !== config.key / 8) throw new TypeError('invalid key length ' + password.length) |
| |
| if (config.type === 'stream') { |
| return new StreamCipher(config.module, password, iv, true) |
| } else if (config.type === 'auth') { |
| return new AuthCipher(config.module, password, iv, true) |
| } |
| |
| return new Decipher(config.module, password, iv) |
| } |
| |
| function createDecipher (suite, password) { |
| var config = MODES[suite.toLowerCase()] |
| if (!config) throw new TypeError('invalid suite type') |
| |
| var keys = ebtk(password, false, config.key, config.iv) |
| return createDecipheriv(suite, keys.key, keys.iv) |
| } |
| |
| exports.createDecipher = createDecipher |
| exports.createDecipheriv = createDecipheriv |