Add asmCrypto, native node crypto calls for faster AES

This commit is contained in:
Bart Butler 2015-04-21 16:58:11 -07:00 committed by Tankred Hase
parent 11038dd946
commit 88a7534b8a
6 changed files with 81 additions and 8 deletions

View File

@ -22,7 +22,7 @@ module.exports = function(grunt) {
browserifyOptions: {
standalone: 'openpgp'
},
external: [ 'crypto', 'node-localstorage', 'node-fetch' ]
external: [ 'crypto', 'node-localstorage', 'node-fetch', 'buffer' ]
}
},
openpgp_debug: {
@ -34,7 +34,7 @@ module.exports = function(grunt) {
debug: true,
standalone: 'openpgp'
},
external: [ 'crypto', 'node-localstorage', 'node-fetch' ]
external: [ 'crypto', 'node-localstorage', 'node-fetch', 'buffer' ]
}
},
worker: {

View File

@ -41,6 +41,7 @@ module.exports = {
ignore_mdc_error: false,
rsa_blinding: true,
useWebCrypto: true,
useNative: false, // Node crypto library for AES
show_version: true,
show_comment: true,

View File

@ -2,6 +2,10 @@
* @see module:crypto/crypto
* @module crypto
*/
// asmCrypto global object
require('./asmcrypto-aes-cfb');
module.exports = {
/** @see module:crypto/cipher */
cipher: require('./cipher'),
@ -16,7 +20,7 @@ module.exports = {
/** @see module:crypto/random */
random: require('./random.js'),
/** @see module:crypto/pkcs1 */
pkcs1: require('./pkcs1.js')
pkcs1: require('./pkcs1.js'),
};
var crypto = require('./crypto.js');

View File

@ -28,6 +28,7 @@
* @requires crypto
* @requires util
* @requires enums
* @requires config
* @module packet/sym_encrypted_integrity_protected
*/
@ -35,6 +36,7 @@ module.exports = SymEncryptedIntegrityProtected;
var util = require('../util.js'),
crypto = require('../crypto'),
config = require('../config'),
enums = require('../enums.js');
/**
@ -91,9 +93,29 @@ SymEncryptedIntegrityProtected.prototype.encrypt = function (sessionKeyAlgorithm
tohash = util.concatUint8Array([tohash, hash]);
this.encrypted = crypto.cfb.encrypt(prefixrandom,
sessionKeyAlgorithm, tohash, key, false).subarray(0,
prefix.length + tohash.length);
// AES optimizations. Native code for node, asmCrypto is about 50% faster than the default, but does not support resync.
if(sessionKeyAlgorithm.substr(0,3) === 'aes') {
var blockSize = crypto.cipher[sessionKeyAlgorithm].blockSize;
// Node crypto library. Not clear that it is faster than asmCrypto
if(typeof module !== 'undefined' && module.exports && config.useNative) {
var nodeCrypto = require('crypto');
var Buffer = require('buffer').Buffer;
var cipherObj = new nodeCrypto.createCipheriv('aes-' + sessionKeyAlgorithm.substr(3,3) + '-cfb',
new Buffer(key), new Buffer(new Uint8Array(blockSize)));
this.encrypted = new Uint8Array(cipherObj.update(new Buffer(util.concatUint8Array([prefix, tohash]))));
//var cipherObj = new nodeCrypto.createCipheriv('aes-' + sessionKeyAlgorithm.substr(3,3) + '-cfb',
// util.Uint8Array2str(key), util.Uint8Array2str(new Uint8Array(blockSize)));
//this.encrypted = new Uint8Array(cipherObj.update(util.Uint8Array2str(util.concatUint8Array([prefix, tohash]))));
}
else {
this.encrypted = asmCrypto.AES_CFB.encrypt(util.concatUint8Array([prefix, tohash]), key);
}
}
else {
this.encrypted = crypto.cfb.encrypt(prefixrandom,
sessionKeyAlgorithm, tohash, key, false).subarray(0,
prefix.length + tohash.length);
}
};
/**
@ -106,8 +128,29 @@ SymEncryptedIntegrityProtected.prototype.encrypt = function (sessionKeyAlgorithm
* @return {String} The decrypted data of this packet
*/
SymEncryptedIntegrityProtected.prototype.decrypt = function (sessionKeyAlgorithm, key) {
var decrypted = crypto.cfb.decrypt(
var decrypted;
// AES optimizations. Native code for node, asmCrypto is about 50% faster than the default, but does not support resync.
if(sessionKeyAlgorithm.substr(0,3) === 'aes') {
var blockSize = crypto.cipher[sessionKeyAlgorithm].blockSize;
// Node crypto library. Not clear that it is faster than asmCrypto
if(typeof module !== 'undefined' && module.exports && config.useNative) {
var nodeCrypto = require('crypto');
var Buffer = require('buffer').Buffer;
var decipherObj = new nodeCrypto.createDecipheriv('aes-' + sessionKeyAlgorithm.substr(3,3) + '-cfb',
new Buffer(key), new Buffer(new Uint8Array(blockSize)));
decrypted = new Uint8Array(decipherObj.update(new Buffer(this.encrypted)));
}
else {
decrypted = asmCrypto.AES_CFB.decrypt(this.encrypted, key);
}
// Remove random prefix
decrypted = decrypted.subarray(blockSize + 2, decrypted.length);
}
else {
decrypted = crypto.cfb.decrypt(
sessionKeyAlgorithm, key, this.encrypted, false);
}
// there must be a modification detection code packet as the
// last packet and everything gets hashed except the hash itself

View File

@ -180,7 +180,6 @@ S2K.prototype.produce_key = function (passphrase, numBytes) {
var arr = [],
rlength = 0,
prefix = '';
prefix = new Uint8Array(numBytes);
for(var i = 0; i<numBytes; i++) {

View File

@ -268,6 +268,25 @@ describe('API functional testing', function() {
});
}
function testAESCFB(plaintext) {
symmAlgos.forEach(function(algo) {
if(algo.substr(0,3) === 'aes') {
var symmKey = openpgp.crypto.generateSessionKey(algo);
var rndm = openpgp.crypto.getPrefixRandom(algo);
var symmencData = openpgp.crypto.cfb.encrypt(rndm, algo, util.str2Uint8Array(plaintext), symmKey, false);
var symmencData2 = asmCrypto.AES_CFB.encrypt(util.str2Uint8Array(plaintext), key);
var decrypted = asmCrypto.AES_CFB.decrypt(symmencData, key);
decrypted = decrypted.subarray(openpgp.crypto.cipher[algo].blockSize + 2, decrypted.length);
expect(symmencData).to.equal(symmencData2);
var text = util.Uint8Array2str(decrypted);
expect(text).to.equal(plaintext);
}
});
}
it("Symmetric with OpenPGP CFB resync", function () {
testCFB("hello", true);
testCFB("1234567", true);
@ -282,6 +301,13 @@ describe('API functional testing', function() {
testCFB("12345678901234567890123456789012345678901234567890", false);
});
it("asmCrypto AES without OpenPGP CFB resync", function () {
testCFB("hello");
testCFB("1234567");
testCFB("foobarfoobar1234567890");
testCFB("12345678901234567890123456789012345678901234567890");
});
it('Asymmetric using RSA with eme_pkcs1 padding', function (done) {
var symmKey = util.Uint8Array2str(openpgp.crypto.generateSessionKey('aes256'));
var RSAUnencryptedData = new openpgp.MPI();