mirror of
https://github.com/TriliumNext/Notes.git
synced 2025-07-27 18:12:29 +08:00
120 lines
3.3 KiB
TypeScript
120 lines
3.3 KiB
TypeScript
"use strict";
|
|
|
|
import crypto from "crypto";
|
|
import log from "../log.js";
|
|
|
|
function arraysIdentical(a: any[] | Buffer, b: any[] | Buffer) {
|
|
let i = a.length;
|
|
if (i !== b.length) return false;
|
|
while (i--) {
|
|
if (a[i] !== b[i]) return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
function shaArray(content: crypto.BinaryLike) {
|
|
// we use this as a simple checksum and don't rely on its security, so SHA-1 is good enough
|
|
return crypto.createHash('sha1').update(content).digest();
|
|
}
|
|
|
|
function pad(data: Buffer): Buffer {
|
|
if (data.length > 16) {
|
|
data = data.slice(0, 16);
|
|
}
|
|
else if (data.length < 16) {
|
|
const zeros = Array(16 - data.length).fill(0);
|
|
|
|
data = Buffer.concat([data, Buffer.from(zeros)]);
|
|
}
|
|
|
|
return Buffer.from(data);
|
|
}
|
|
|
|
function encrypt(key: Buffer, plainText: Buffer | string) {
|
|
if (!key) {
|
|
throw new Error("No data key!");
|
|
}
|
|
|
|
const plainTextBuffer = Buffer.from(plainText);
|
|
|
|
const iv = crypto.randomBytes(16);
|
|
const cipher = crypto.createCipheriv('aes-128-cbc', pad(key), pad(iv));
|
|
|
|
const digest = shaArray(plainTextBuffer).slice(0, 4);
|
|
|
|
const digestWithPayload = Buffer.concat([digest, plainTextBuffer]);
|
|
|
|
const encryptedData = Buffer.concat([cipher.update(digestWithPayload), cipher.final()]);
|
|
|
|
const encryptedDataWithIv = Buffer.concat([iv, encryptedData]);
|
|
|
|
return encryptedDataWithIv.toString('base64');
|
|
}
|
|
|
|
function decrypt(key: Buffer, cipherText: string | Buffer): Buffer | false | null {
|
|
if (cipherText === null) {
|
|
return null;
|
|
}
|
|
|
|
if (!key) {
|
|
return Buffer.from("[protected]");
|
|
}
|
|
|
|
try {
|
|
const cipherTextBufferWithIv = Buffer.from(cipherText.toString(), 'base64');
|
|
|
|
// old encrypted data can have IV of length 13, see some details here: https://github.com/zadam/trilium/issues/3017
|
|
const ivLength = cipherTextBufferWithIv.length % 16 === 0 ? 16 : 13;
|
|
|
|
const iv = cipherTextBufferWithIv.slice(0, ivLength);
|
|
|
|
const cipherTextBuffer = cipherTextBufferWithIv.slice(ivLength);
|
|
|
|
const decipher = crypto.createDecipheriv('aes-128-cbc', pad(key), pad(iv));
|
|
|
|
const decryptedBytes = Buffer.concat([decipher.update(cipherTextBuffer), decipher.final()]);
|
|
|
|
const digest = decryptedBytes.slice(0, 4);
|
|
const payload = decryptedBytes.slice(4);
|
|
|
|
const computedDigest = shaArray(payload).slice(0, 4);
|
|
|
|
if (!arraysIdentical(digest, computedDigest)) {
|
|
return false;
|
|
}
|
|
|
|
return payload;
|
|
}
|
|
catch (e: any) {
|
|
// recovery from https://github.com/zadam/trilium/issues/510
|
|
if (e.message?.includes("WRONG_FINAL_BLOCK_LENGTH") || e.message?.includes("wrong final block length")) {
|
|
log.info("Caught WRONG_FINAL_BLOCK_LENGTH, returning cipherText instead");
|
|
|
|
return Buffer.from(cipherText);
|
|
}
|
|
else {
|
|
throw e;
|
|
}
|
|
}
|
|
}
|
|
|
|
function decryptString(dataKey: Buffer, cipherText: string) {
|
|
const buffer = decrypt(dataKey, cipherText);
|
|
|
|
if (buffer === null) {
|
|
return null;
|
|
} else if (buffer === false) {
|
|
log.error(`Could not decrypt string. Buffer: ${buffer}`);
|
|
|
|
throw new Error("Could not decrypt string.");
|
|
}
|
|
|
|
return buffer.toString('utf-8');
|
|
}
|
|
|
|
export = {
|
|
encrypt,
|
|
decrypt,
|
|
decryptString
|
|
};
|