From 53504086b3417cf061ed215792e309c4bc4b175d Mon Sep 17 00:00:00 2001 From: Macide Celik Date: Sun, 27 Oct 2019 22:18:36 +0300 Subject: [PATCH] Delete AESEncrypt.mjs --- src/core/operations/AESEncrypt.mjs | 107 ----------------------------- 1 file changed, 107 deletions(-) delete mode 100644 src/core/operations/AESEncrypt.mjs diff --git a/src/core/operations/AESEncrypt.mjs b/src/core/operations/AESEncrypt.mjs deleted file mode 100644 index 7375e308..00000000 --- a/src/core/operations/AESEncrypt.mjs +++ /dev/null @@ -1,107 +0,0 @@ -/** - * @author n1474335 [n1474335@gmail.com] - * @copyright Crown Copyright 2016 - * @license Apache-2.0 - */ - -import Operation from "../Operation.mjs"; -import Utils from "../Utils.mjs"; -import forge from "node-forge/dist/forge.min.js"; -import OperationError from "../errors/OperationError.mjs"; - -/** - * AES Encrypt operation - */ -class AESEncrypt extends Operation { - - /** - * AESEncrypt constructor - */ - constructor() { - super(); - - this.name = "AES Encrypt"; - this.module = "Ciphers"; - this.description = "Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated.

Key: The following algorithms will be used based on the size of the key:You can generate a password-based key using one of the KDF operations.

IV: The Initialization Vector should be 16 bytes long. If not entered, it will default to 16 null bytes.

Padding: In CBC and ECB mode, PKCS#7 padding will be used."; - this.infoURL = "https://wikipedia.org/wiki/Advanced_Encryption_Standard"; - this.inputType = "string"; - this.outputType = "string"; - this.args = [ - { - "name": "Key", - "type": "toggleString", - "value": "", - "toggleValues": ["Hex", "UTF8", "Latin1", "Base64"] - }, - { - "name": "IV", - "type": "toggleString", - "value": "", - "toggleValues": ["Hex", "UTF8", "Latin1", "Base64"] - }, - { - "name": "Mode", - "type": "option", - "value": ["CBC", "CFB", "OFB", "CTR", "GCM", "ECB"] - }, - { - "name": "Input", - "type": "option", - "value": ["Raw", "Hex"] - }, - { - "name": "Output", - "type": "option", - "value": ["Hex", "Raw"] - } - ]; - } - - /** - * @param {string} input - * @param {Object[]} args - * @returns {string} - * - * @throws {OperationError} if invalid key length - */ - run(input, args) { - const key = Utils.convertToByteString(args[0].string, args[0].option), - iv = Utils.convertToByteString(args[1].string, args[1].option), - mode = args[2], - inputType = args[3], - outputType = args[4]; - - if ([16, 24, 32].indexOf(key.length) < 0) { - throw new OperationError(`Invalid key length: ${key.length} bytes - -The following algorithms will be used based on the size of the key: - 16 bytes = AES-128 - 24 bytes = AES-192 - 32 bytes = AES-256`); - } - - input = Utils.convertToByteString(input, inputType); - - const cipher = forge.cipher.createCipher("AES-" + mode, key); - cipher.start({iv: iv}); - cipher.update(forge.util.createBuffer(input)); - cipher.finish(); - - if (outputType === "Hex") { - if (mode === "GCM") { - return cipher.output.toHex() + "\n\n" + - "Tag: " + cipher.mode.tag.toHex(); - } - return cipher.output.toHex(); - } else { - if (mode === "GCM") { - return cipher.output.getBytes() + "\n\n" + - "Tag: " + cipher.mode.tag.getBytes(); - } - return cipher.output.getBytes(); - } - } - -} - -export default AESEncrypt;