|
|
import crypto from 'crypto' |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
const CIPHER_ALGORITHM = `aes-256-gcm`, |
|
|
CIPHER_KEY_LENGTH = 32, |
|
|
CIPHER_IV_LENGTH = 16, |
|
|
CIPHER_TAG_LENGTH = 16, |
|
|
CIPHER_SALT_LENGTH = 64 |
|
|
|
|
|
const PBKDF2_ITERATIONS = 100_000 |
|
|
|
|
|
export function encryptWithSecret(secret: Buffer, data: string): string { |
|
|
const iv = crypto.randomBytes(CIPHER_IV_LENGTH) |
|
|
const salt = crypto.randomBytes(CIPHER_SALT_LENGTH) |
|
|
|
|
|
|
|
|
const key = crypto.pbkdf2Sync( |
|
|
secret, |
|
|
salt, |
|
|
PBKDF2_ITERATIONS, |
|
|
CIPHER_KEY_LENGTH, |
|
|
`sha512` |
|
|
) |
|
|
|
|
|
const cipher = crypto.createCipheriv(CIPHER_ALGORITHM, key, iv) |
|
|
const encrypted = Buffer.concat([cipher.update(data, `utf8`), cipher.final()]) |
|
|
|
|
|
|
|
|
const tag = cipher.getAuthTag() |
|
|
|
|
|
return Buffer.concat([ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
salt, |
|
|
iv, |
|
|
tag, |
|
|
encrypted, |
|
|
]).toString(`hex`) |
|
|
} |
|
|
|
|
|
export function decryptWithSecret( |
|
|
secret: Buffer, |
|
|
encryptedData: string |
|
|
): string { |
|
|
const buffer = Buffer.from(encryptedData, `hex`) |
|
|
|
|
|
const salt = buffer.slice(0, CIPHER_SALT_LENGTH) |
|
|
const iv = buffer.slice( |
|
|
CIPHER_SALT_LENGTH, |
|
|
CIPHER_SALT_LENGTH + CIPHER_IV_LENGTH |
|
|
) |
|
|
const tag = buffer.slice( |
|
|
CIPHER_SALT_LENGTH + CIPHER_IV_LENGTH, |
|
|
CIPHER_SALT_LENGTH + CIPHER_IV_LENGTH + CIPHER_TAG_LENGTH |
|
|
) |
|
|
const encrypted = buffer.slice( |
|
|
CIPHER_SALT_LENGTH + CIPHER_IV_LENGTH + CIPHER_TAG_LENGTH |
|
|
) |
|
|
|
|
|
|
|
|
const key = crypto.pbkdf2Sync( |
|
|
secret, |
|
|
salt, |
|
|
PBKDF2_ITERATIONS, |
|
|
CIPHER_KEY_LENGTH, |
|
|
`sha512` |
|
|
) |
|
|
|
|
|
const decipher = crypto.createDecipheriv(CIPHER_ALGORITHM, key, iv) |
|
|
decipher.setAuthTag(tag) |
|
|
|
|
|
return decipher.update(encrypted) + decipher.final(`utf8`) |
|
|
} |
|
|
|