decrypt.js 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. var SEA = require('./root');
  2. var shim = require('./shim');
  3. var S = require('./settings');
  4. var aeskey = require('./aeskey');
  5. var parse = require('./parse');
  6. SEA.decrypt = SEA.decrypt || (async (data, pair, cb, opt) => { try {
  7. opt = opt || {};
  8. var key = (pair||opt).epriv || pair;
  9. if(!key){
  10. pair = await SEA.I(null, {what: data, how: 'decrypt', why: opt.why});
  11. key = pair.epriv || pair;
  12. }
  13. const json = parse(data)
  14. var buf; try{buf = shim.Buffer.from(json.s, opt.encode || 'base64') // NEW DEFAULT!
  15. }catch(e){buf = shim.Buffer.from(json.s, 'utf8')} // AUTO BACKWARD OLD UTF8 DATA!
  16. var bufiv; try{bufiv = shim.Buffer.from(json.iv, opt.encode || 'base64') // NEW DEFAULT!
  17. }catch(e){bufiv = shim.Buffer.from(json.iv, 'utf8')} // AUTO BACKWARD OLD UTF8 DATA!
  18. var bufct; try{bufct = shim.Buffer.from(json.ct, opt.encode || 'base64') // NEW DEFAULT!
  19. }catch(e){bufct = shim.Buffer.from(json.ct, 'utf8')} // AUTO BACKWARD OLD UTF8 DATA!
  20. const ct = await aeskey(key, buf, opt)
  21. .then((aes) => (/*shim.ossl ||*/ shim.subtle).decrypt({ // Keeping aesKey scope as private as possible...
  22. name: opt.name || 'AES-GCM', iv: new Uint8Array(bufiv)
  23. }, aes, new Uint8Array(bufct)))
  24. const r = parse(new shim.TextDecoder('utf8').decode(ct))
  25. if(cb){ try{ cb(r) }catch(e){console.log(e)} }
  26. return r;
  27. } catch(e) {
  28. SEA.err = e;
  29. if(SEA.throw){ throw e }
  30. if(cb){ cb() }
  31. return;
  32. }});
  33. module.exports = SEA.decrypt;