| // Copyright Joyent, Inc. and other Node contributors. |
| // |
| // Permission is hereby granted, free of charge, to any person obtaining a |
| // copy of this software and associated documentation files (the |
| // "Software"), to deal in the Software without restriction, including |
| // without limitation the rights to use, copy, modify, merge, publish, |
| // distribute, sublicense, and/or sell copies of the Software, and to permit |
| // persons to whom the Software is furnished to do so, subject to the |
| // following conditions: |
| // |
| // The above copyright notice and this permission notice shall be included |
| // in all copies or substantial portions of the Software. |
| // |
| // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
| // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
| // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN |
| // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, |
| // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR |
| // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE |
| // USE OR OTHER DEALINGS IN THE SOFTWARE. |
| |
| 'use strict'; |
| const common = require('../common'); |
| if (!common.hasCrypto) |
| common.skip('missing crypto'); |
| |
| const assert = require('assert'); |
| const crypto = require('crypto'); |
| const { hasOpenSSL3 } = require('../common/crypto'); |
| |
| // Input data. |
| const ODD_LENGTH_PLAIN = 'Hello node world!'; |
| const EVEN_LENGTH_PLAIN = 'Hello node world!AbC09876dDeFgHi'; |
| |
| const KEY_PLAIN = 'S3c.r.e.t.K.e.Y!'; |
| const IV_PLAIN = 'blahFizz2011Buzz'; |
| |
| const CIPHER_NAME = 'aes-128-cbc'; |
| |
| // Expected result data. |
| |
| // echo -n 'Hello node world!' | \ |
| // openssl enc -aes-128-cbc -e -K 5333632e722e652e742e4b2e652e5921 \ |
| // -iv 626c616846697a7a3230313142757a7a | xxd -p -c256 |
| const ODD_LENGTH_ENCRYPTED = |
| '7f57859550d4d2fdb9806da2a750461a9fe77253cd1cbd4b07beee4e070d561f'; |
| |
| // echo -n 'Hello node world!AbC09876dDeFgHi' | \ |
| // openssl enc -aes-128-cbc -e -K 5333632e722e652e742e4b2e652e5921 \ |
| // -iv 626c616846697a7a3230313142757a7a | xxd -p -c256 |
| const EVEN_LENGTH_ENCRYPTED = |
| '7f57859550d4d2fdb9806da2a750461ab46e71b3d78ebe2d9684dfc87f7575b988' + |
| '6119866912cb8c7bcaf76c5ebc2378'; |
| |
| // echo -n 'Hello node world!AbC09876dDeFgHi' | \ |
| // openssl enc -aes-128-cbc -e -K 5333632e722e652e742e4b2e652e5921 \ |
| // -iv 626c616846697a7a3230313142757a7a -nopad | xxd -p -c256 |
| const EVEN_LENGTH_ENCRYPTED_NOPAD = |
| '7f57859550d4d2fdb9806da2a750461ab46e71b3d78ebe2d9684dfc87f7575b9'; |
| |
| |
| // Helper wrappers. |
| function enc(plain, pad) { |
| const encrypt = crypto.createCipheriv(CIPHER_NAME, KEY_PLAIN, IV_PLAIN); |
| encrypt.setAutoPadding(pad); |
| let hex = encrypt.update(plain, 'ascii', 'hex'); |
| hex += encrypt.final('hex'); |
| return hex; |
| } |
| |
| function dec(encd, pad) { |
| const decrypt = crypto.createDecipheriv(CIPHER_NAME, KEY_PLAIN, IV_PLAIN); |
| decrypt.setAutoPadding(pad); |
| let plain = decrypt.update(encd, 'hex'); |
| plain += decrypt.final('latin1'); |
| return plain; |
| } |
| |
| // Test encryption |
| assert.strictEqual(enc(ODD_LENGTH_PLAIN, true), ODD_LENGTH_ENCRYPTED); |
| assert.strictEqual(enc(EVEN_LENGTH_PLAIN, true), EVEN_LENGTH_ENCRYPTED); |
| |
| assert.throws(function() { |
| // Input must have block length %. |
| enc(ODD_LENGTH_PLAIN, false); |
| }, hasOpenSSL3 ? { |
| message: /wrong[\s_]final[\s_]block[\s_]length/i, |
| code: /ERR_OSSL(_EVP)?_WRONG_FINAL_BLOCK_LENGTH/, |
| reason: /wrong[\s_]final[\s_]block[\s_]length/i, |
| } : { |
| message: /data[\s_]not[\s_]multiple[\s_]of[\s_]block[\s_]length/i, |
| code: /ERR_OSSL(_EVP)?_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH/, |
| reason: /data[\s_]not[\s_]multiple[\s_]of[\s_]block[\s_]length/i, |
| } |
| ); |
| |
| assert.strictEqual( |
| enc(EVEN_LENGTH_PLAIN, false), EVEN_LENGTH_ENCRYPTED_NOPAD |
| ); |
| |
| // Test decryption. |
| assert.strictEqual(dec(ODD_LENGTH_ENCRYPTED, true), ODD_LENGTH_PLAIN); |
| assert.strictEqual(dec(EVEN_LENGTH_ENCRYPTED, true), EVEN_LENGTH_PLAIN); |
| |
| // Returns including original padding. |
| assert.strictEqual(dec(ODD_LENGTH_ENCRYPTED, false).length, 32); |
| assert.strictEqual(dec(EVEN_LENGTH_ENCRYPTED, false).length, 48); |
| |
| assert.throws(function() { |
| // Must have at least 1 byte of padding (PKCS): |
| assert.strictEqual(dec(EVEN_LENGTH_ENCRYPTED_NOPAD, true), EVEN_LENGTH_PLAIN); |
| }, { |
| message: /bad[\s_]decrypt/i, |
| reason: /bad[\s_]decrypt/i, |
| code: /ERR_OSSL(_EVP)?_BAD_DECRYPT/, |
| }); |
| |
| // No-pad encrypted string should return the same: |
| assert.strictEqual( |
| dec(EVEN_LENGTH_ENCRYPTED_NOPAD, false), EVEN_LENGTH_PLAIN |
| ); |