]>
Commit | Line | Data |
---|---|---|
9f10b292 C |
1 | 'use strict' |
2 | ||
f0f5567b C |
3 | const config = require('config') |
4 | const crypto = require('crypto') | |
5 | const fs = require('fs') | |
6 | const openssl = require('openssl-wrapper') | |
7 | const path = require('path') | |
8 | const ursa = require('ursa') | |
9f10b292 | 9 | |
f0f5567b | 10 | const logger = require('./logger') |
9f10b292 | 11 | |
f0f5567b C |
12 | const certDir = path.join(__dirname, '..', '..', config.get('storage.certs')) |
13 | const algorithm = 'aes-256-ctr' | |
9f10b292 | 14 | |
f0f5567b | 15 | const peertubeCrypto = { |
9f10b292 C |
16 | checkSignature: checkSignature, |
17 | createCertsIfNotExist: createCertsIfNotExist, | |
18 | decrypt: decrypt, | |
19 | encrypt: encrypt, | |
20 | getCertDir: getCertDir, | |
21 | sign: sign | |
22 | } | |
23 | ||
bc503c2a C |
24 | function checkSignature (publicKey, rawData, hexSignature) { |
25 | const crt = ursa.createPublicKey(publicKey) | |
26 | const isValid = crt.hashAndVerify('sha256', new Buffer(rawData).toString('hex'), hexSignature, 'hex') | |
27 | return isValid | |
9f10b292 C |
28 | } |
29 | ||
30 | function createCertsIfNotExist (callback) { | |
31 | certsExist(function (exist) { | |
32 | if (exist === true) { | |
33 | return callback(null) | |
34 | } | |
35 | ||
36 | createCerts(function (err) { | |
37 | return callback(err) | |
dac0a531 | 38 | }) |
9f10b292 C |
39 | }) |
40 | } | |
dac0a531 | 41 | |
9f10b292 C |
42 | function decrypt (key, data, callback) { |
43 | fs.readFile(getCertDir() + 'peertube.key.pem', function (err, file) { | |
44 | if (err) return callback(err) | |
dac0a531 | 45 | |
bc503c2a C |
46 | const myPrivateKey = ursa.createPrivateKey(file) |
47 | const decryptedKey = myPrivateKey.decrypt(key, 'hex', 'utf8') | |
48 | const decryptedData = symetricDecrypt(data, decryptedKey) | |
dac0a531 | 49 | |
bc503c2a | 50 | return callback(null, decryptedData) |
9f10b292 C |
51 | }) |
52 | } | |
dac0a531 | 53 | |
bc503c2a C |
54 | function encrypt (publicKey, data, callback) { |
55 | const crt = ursa.createPublicKey(publicKey) | |
dac0a531 | 56 | |
9f10b292 C |
57 | symetricEncrypt(data, function (err, dataEncrypted) { |
58 | if (err) return callback(err) | |
dac0a531 | 59 | |
f0f5567b C |
60 | const key = crt.encrypt(dataEncrypted.password, 'utf8', 'hex') |
61 | const encrypted = { | |
9f10b292 C |
62 | data: dataEncrypted.crypted, |
63 | key: key | |
64 | } | |
dac0a531 | 65 | |
9f10b292 C |
66 | callback(null, encrypted) |
67 | }) | |
68 | } | |
dac0a531 | 69 | |
9f10b292 C |
70 | function getCertDir () { |
71 | return certDir | |
72 | } | |
dac0a531 | 73 | |
9f10b292 | 74 | function sign (data) { |
f0f5567b C |
75 | const myKey = ursa.createPrivateKey(fs.readFileSync(certDir + 'peertube.key.pem')) |
76 | const signature = myKey.hashAndSign('sha256', data, 'utf8', 'hex') | |
dac0a531 | 77 | |
9f10b292 C |
78 | return signature |
79 | } | |
dac0a531 | 80 | |
9f10b292 | 81 | // --------------------------------------------------------------------------- |
dac0a531 | 82 | |
9f10b292 | 83 | module.exports = peertubeCrypto |
dac0a531 | 84 | |
9f10b292 | 85 | // --------------------------------------------------------------------------- |
dac0a531 | 86 | |
9f10b292 C |
87 | function certsExist (callback) { |
88 | fs.exists(certDir + 'peertube.key.pem', function (exists) { | |
89 | return callback(exists) | |
90 | }) | |
91 | } | |
92 | ||
93 | function createCerts (callback) { | |
94 | certsExist(function (exist) { | |
95 | if (exist === true) { | |
f0f5567b | 96 | const string = 'Certs already exist.' |
9f10b292 C |
97 | logger.warning(string) |
98 | return callback(new Error(string)) | |
99 | } | |
100 | ||
101 | logger.info('Generating a RSA key...') | |
102 | openssl.exec('genrsa', { 'out': certDir + 'peertube.key.pem', '2048': false }, function (err) { | |
103 | if (err) { | |
104 | logger.error('Cannot create private key on this pod.') | |
105 | return callback(err) | |
dac0a531 | 106 | } |
9f10b292 | 107 | logger.info('RSA key generated.') |
dac0a531 | 108 | |
9f10b292 C |
109 | logger.info('Manage public key...') |
110 | openssl.exec('rsa', { 'in': certDir + 'peertube.key.pem', 'pubout': true, 'out': certDir + 'peertube.pub' }, function (err) { | |
dac0a531 | 111 | if (err) { |
9f10b292 | 112 | logger.error('Cannot create public key on this pod.') |
dac0a531 C |
113 | return callback(err) |
114 | } | |
dac0a531 | 115 | |
9f10b292 C |
116 | logger.info('Public key managed.') |
117 | return callback(null) | |
118 | }) | |
dac0a531 | 119 | }) |
9f10b292 C |
120 | }) |
121 | } | |
122 | ||
123 | function generatePassword (callback) { | |
124 | crypto.randomBytes(32, function (err, buf) { | |
125 | if (err) return callback(err) | |
126 | ||
127 | callback(null, buf.toString('utf8')) | |
128 | }) | |
129 | } | |
130 | ||
131 | function symetricDecrypt (text, password) { | |
f0f5567b C |
132 | const decipher = crypto.createDecipher(algorithm, password) |
133 | let dec = decipher.update(text, 'hex', 'utf8') | |
9f10b292 C |
134 | dec += decipher.final('utf8') |
135 | return dec | |
136 | } | |
137 | ||
138 | function symetricEncrypt (text, callback) { | |
139 | generatePassword(function (err, password) { | |
140 | if (err) return callback(err) | |
141 | ||
f0f5567b C |
142 | const cipher = crypto.createCipher(algorithm, password) |
143 | let crypted = cipher.update(text, 'utf8', 'hex') | |
9f10b292 C |
144 | crypted += cipher.final('hex') |
145 | callback(null, { crypted: crypted, password: password }) | |
146 | }) | |
147 | } |