Skip to content

Commit fc34f5c

Browse files
tniessenMylesBorins
authored andcommitted
crypto: allow passing null as IV unless required
Backport-PR-URL: #19347 PR-URL: #18644 Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: James M Snell <[email protected]>
1 parent 161869e commit fc34f5c

File tree

3 files changed

+51
-12
lines changed

3 files changed

+51
-12
lines changed

doc/api/crypto.md

+14-2
Original file line numberDiff line numberDiff line change
@@ -1219,6 +1219,11 @@ Adversaries][] for details.
12191219
### crypto.createCipheriv(algorithm, key, iv[, options])
12201220
<!-- YAML
12211221
added: v0.1.94
1222+
changes:
1223+
- version: REPLACEME
1224+
pr-url: https://github.com/nodejs/node/pull/18644
1225+
description: The `iv` parameter may now be `null` for ciphers which do not
1226+
need an initialization vector.
12221227
-->
12231228
- `algorithm` {string}
12241229
- `key` {string | Buffer | TypedArray | DataView}
@@ -1234,7 +1239,8 @@ available cipher algorithms.
12341239

12351240
The `key` is the raw key used by the `algorithm` and `iv` is an
12361241
[initialization vector][]. Both arguments must be `'utf8'` encoded strings,
1237-
[Buffers][`Buffer`], `TypedArray`, or `DataView`s.
1242+
[Buffers][`Buffer`], `TypedArray`, or `DataView`s. If the cipher does not need
1243+
an initialization vector, `iv` may be `null`.
12381244

12391245
### crypto.createCredentials(details)
12401246
<!-- YAML
@@ -1280,6 +1286,11 @@ to create the `Decipher` object.
12801286
### crypto.createDecipheriv(algorithm, key, iv[, options])
12811287
<!-- YAML
12821288
added: v0.1.94
1289+
changes:
1290+
- version: REPLACEME
1291+
pr-url: https://github.com/nodejs/node/pull/18644
1292+
description: The `iv` parameter may now be `null` for ciphers which do not
1293+
need an initialization vector.
12831294
-->
12841295
- `algorithm` {string}
12851296
- `key` {string | Buffer | TypedArray | DataView}
@@ -1296,7 +1307,8 @@ available cipher algorithms.
12961307

12971308
The `key` is the raw key used by the `algorithm` and `iv` is an
12981309
[initialization vector][]. Both arguments must be `'utf8'` encoded strings,
1299-
[Buffers][`Buffer`], `TypedArray`, or `DataView`s.
1310+
[Buffers][`Buffer`], `TypedArray`, or `DataView`s. If the cipher does not need
1311+
an initialization vector, `iv` may be `null`.
13001312

13011313
### crypto.createDiffieHellman(prime[, primeEncoding][, generator][, generatorEncoding])
13021314
<!-- YAML

src/node_crypto.cc

+30-9
Original file line numberDiff line numberDiff line change
@@ -3516,8 +3516,17 @@ void CipherBase::InitIv(const char* cipher_type,
35163516
const int expected_iv_len = EVP_CIPHER_iv_length(cipher);
35173517
const int mode = EVP_CIPHER_mode(cipher);
35183518
const bool is_gcm_mode = (EVP_CIPH_GCM_MODE == mode);
3519+
const bool has_iv = iv_len >= 0;
35193520

3520-
if (is_gcm_mode == false && iv_len != expected_iv_len) {
3521+
// Throw if no IV was passed and the cipher requires an IV
3522+
if (!has_iv && expected_iv_len != 0) {
3523+
char msg[128];
3524+
snprintf(msg, sizeof(msg), "Missing IV for cipher %s", cipher_type);
3525+
return env()->ThrowError(msg);
3526+
}
3527+
3528+
// Throw if an IV was passed which does not match the cipher's fixed IV length
3529+
if (is_gcm_mode == false && has_iv && iv_len != expected_iv_len) {
35213530
return env()->ThrowError("Invalid IV length");
35223531
}
35233532

@@ -3529,11 +3538,13 @@ void CipherBase::InitIv(const char* cipher_type,
35293538
const bool encrypt = (kind_ == kCipher);
35303539
EVP_CipherInit_ex(ctx_, cipher, nullptr, nullptr, nullptr, encrypt);
35313540

3532-
if (is_gcm_mode &&
3533-
!EVP_CIPHER_CTX_ctrl(ctx_, EVP_CTRL_GCM_SET_IVLEN, iv_len, nullptr)) {
3534-
EVP_CIPHER_CTX_free(ctx_);
3535-
ctx_ = nullptr;
3536-
return env()->ThrowError("Invalid IV length");
3541+
if (is_gcm_mode) {
3542+
CHECK(has_iv);
3543+
if (!EVP_CIPHER_CTX_ctrl(ctx_, EVP_CTRL_GCM_SET_IVLEN, iv_len, nullptr)) {
3544+
EVP_CIPHER_CTX_free(ctx_);
3545+
ctx_ = nullptr;
3546+
return env()->ThrowError("Invalid IV length");
3547+
}
35373548
}
35383549

35393550
if (!EVP_CIPHER_CTX_set_key_length(ctx_, key_len)) {
@@ -3562,13 +3573,23 @@ void CipherBase::InitIv(const FunctionCallbackInfo<Value>& args) {
35623573

35633574
THROW_AND_RETURN_IF_NOT_STRING(args[0], "Cipher type");
35643575
THROW_AND_RETURN_IF_NOT_BUFFER(args[1], "Key");
3565-
THROW_AND_RETURN_IF_NOT_BUFFER(args[2], "IV");
3576+
3577+
if (!args[2]->IsNull() && !Buffer::HasInstance(args[2])) {
3578+
return env->ThrowTypeError("IV must be a buffer");
3579+
}
35663580

35673581
const node::Utf8Value cipher_type(env->isolate(), args[0]);
35683582
ssize_t key_len = Buffer::Length(args[1]);
35693583
const char* key_buf = Buffer::Data(args[1]);
3570-
ssize_t iv_len = Buffer::Length(args[2]);
3571-
const char* iv_buf = Buffer::Data(args[2]);
3584+
ssize_t iv_len;
3585+
const char* iv_buf;
3586+
if (args[2]->IsNull()) {
3587+
iv_buf = nullptr;
3588+
iv_len = -1;
3589+
} else {
3590+
iv_buf = Buffer::Data(args[2]);
3591+
iv_len = Buffer::Length(args[2]);
3592+
}
35723593
cipher->InitIv(*cipher_type, key_buf, key_len, iv_buf, iv_len);
35733594
}
35743595

test/parallel/test-crypto-cipheriv-decipheriv.js

+7-1
Original file line numberDiff line numberDiff line change
@@ -89,8 +89,9 @@ if (!common.hasFipsCrypto) {
8989
Buffer.from('A6A6A6A6A6A6A6A6', 'hex'));
9090
}
9191

92-
// Zero-sized IV should be accepted in ECB mode.
92+
// Zero-sized IV or null should be accepted in ECB mode.
9393
crypto.createCipheriv('aes-128-ecb', Buffer.alloc(16), Buffer.alloc(0));
94+
crypto.createCipheriv('aes-128-ecb', Buffer.alloc(16), null);
9495

9596
const errMessage = /Invalid IV length/;
9697

@@ -114,6 +115,11 @@ for (let n = 0; n < 256; n += 1) {
114115
errMessage);
115116
}
116117

118+
// And so should null be.
119+
assert.throws(() => {
120+
crypto.createCipheriv('aes-128-cbc', Buffer.alloc(16), null);
121+
}, /Missing IV for cipher aes-128-cbc/);
122+
117123
// Zero-sized IV should be rejected in GCM mode.
118124
assert.throws(
119125
() => crypto.createCipheriv('aes-128-gcm', Buffer.alloc(16),

0 commit comments

Comments
 (0)