UNPKG

react-native-quick-crypto

Version:

A fast implementation of Node's `crypto` module written in C/C++ JSI

144 lines (130 loc) 4 kB
import { NativeQuickCrypto } from './NativeQuickCrypto/NativeQuickCrypto'; import { Buffer } from '@craftzdog/react-native-buffer'; import { type BinaryLike, binaryLikeToArrayBuffer, lazyDOMException, bufferLikeToArrayBuffer, normalizeHashName, HashContext, } from './Utils'; import type { CryptoKey, HashAlgorithm, SubtleAlgorithm } from './keys'; import { promisify } from 'util'; const WRONG_PASS = 'Password must be a string, a Buffer, a typed array or a DataView'; const WRONG_SALT = 'Salt must be a string, a Buffer, a typed array or a DataView'; type Password = BinaryLike; type Salt = BinaryLike; type Pbkdf2Callback = (err: Error | null, derivedKey?: Buffer) => void; function sanitizeInput(input: BinaryLike, errorMsg: string): ArrayBuffer { try { return binaryLikeToArrayBuffer(input); // eslint-disable-next-line @typescript-eslint/no-unused-vars } catch (_e: unknown) { throw new Error(errorMsg); } } const nativePbkdf2 = NativeQuickCrypto.pbkdf2; export function pbkdf2( password: Password, salt: Salt, iterations: number, keylen: number, digest: string, callback: Pbkdf2Callback, ): void { if (callback === undefined || typeof callback !== 'function') { throw new Error('No callback provided to pbkdf2'); } const sanitizedPassword = sanitizeInput(password, WRONG_PASS); const sanitizedSalt = sanitizeInput(salt, WRONG_SALT); const normalizedDigest = normalizeHashName(digest, HashContext.Node); nativePbkdf2 .pbkdf2( sanitizedPassword, sanitizedSalt, iterations, keylen, normalizedDigest, ) .then( (res: ArrayBuffer) => { callback!(null, Buffer.from(res)); }, (e: Error) => { callback!(e); }, ); } export function pbkdf2Sync( password: Password, salt: Salt, iterations: number, keylen: number, digest?: string, ): Buffer { const sanitizedPassword = sanitizeInput(password, WRONG_PASS); const sanitizedSalt = sanitizeInput(salt, WRONG_SALT); const algo = digest ? normalizeHashName(digest, HashContext.Node) : 'sha1'; const result: ArrayBuffer = nativePbkdf2.pbkdf2Sync( sanitizedPassword, sanitizedSalt, iterations, keylen, algo, ); return Buffer.from(result); } // We need this because the typescript overload signatures in pbkdf2() above do // not play nice with promisify() below. const pbkdf2WithDigest = ( password: Password, salt: Salt, iterations: number, keylen: number, digest: HashAlgorithm, callback: Pbkdf2Callback, ) => pbkdf2(password, salt, iterations, keylen, digest, callback); const pbkdf2Promise = promisify(pbkdf2WithDigest); export async function pbkdf2DeriveBits( algorithm: SubtleAlgorithm, baseKey: CryptoKey, length: number, ): Promise<ArrayBuffer> { const { iterations, hash, salt } = algorithm; const normalizedHash = normalizeHashName(hash); if (!normalizedHash) { throw lazyDOMException('hash cannot be blank', 'OperationError'); } if (!iterations || iterations === 0) { throw lazyDOMException('iterations cannot be zero', 'OperationError'); } if (!salt) { throw lazyDOMException(WRONG_SALT, 'OperationError'); } const raw = baseKey.keyObject.export(); if (length === 0) throw lazyDOMException('length cannot be zero', 'OperationError'); if (length === null) throw lazyDOMException('length cannot be null', 'OperationError'); if (length % 8) { throw lazyDOMException('length must be a multiple of 8', 'OperationError'); } const sanitizedPassword = sanitizeInput(raw, WRONG_PASS); const sanitizedSalt = sanitizeInput(salt, WRONG_SALT); const result: Buffer | undefined = await pbkdf2Promise( sanitizedPassword, sanitizedSalt, iterations, length / 8, normalizedHash as HashAlgorithm, ); if (!result) { throw lazyDOMException( 'received bad result from pbkdf2()', 'OperationError', ); } return bufferLikeToArrayBuffer(result); }