You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					277 lines
				
				8.2 KiB
			
		
		
			
		
	
	
					277 lines
				
				8.2 KiB
			| 
											2 years ago
										 | /** | ||
|  |  * Partial implementation of PKCS#1 v2.2: RSA-OEAP | ||
|  |  * | ||
|  |  * Modified but based on the following MIT and BSD licensed code: | ||
|  |  * | ||
|  |  * https://github.com/kjur/jsjws/blob/master/rsa.js:
 | ||
|  |  * | ||
|  |  * The 'jsjws'(JSON Web Signature JavaScript Library) License | ||
|  |  * | ||
|  |  * Copyright (c) 2012 Kenji Urushima | ||
|  |  * | ||
|  |  * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
|  |  * of this software and associated documentation files (the "Software"), to deal | ||
|  |  * in the Software without restriction, including without limitation the rights | ||
|  |  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
|  |  * copies of the Software, and to permit persons to whom the Software is | ||
|  |  * furnished to do so, subject to the following conditions: | ||
|  |  * | ||
|  |  * The above copyright notice and this permission notice shall be included in | ||
|  |  * all copies or substantial portions of the Software. | ||
|  |  * | ||
|  |  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
|  |  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
|  |  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||
|  |  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
|  |  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
|  |  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
|  |  * THE SOFTWARE. | ||
|  |  * | ||
|  |  * http://webrsa.cvs.sourceforge.net/viewvc/webrsa/Client/RSAES-OAEP.js?content-type=text%2Fplain:
 | ||
|  |  * | ||
|  |  * RSAES-OAEP.js | ||
|  |  * $Id: RSAES-OAEP.js,v 1.1.1.1 2003/03/19 15:37:20 ellispritchard Exp $ | ||
|  |  * JavaScript Implementation of PKCS #1 v2.1 RSA CRYPTOGRAPHY STANDARD (RSA Laboratories, June 14, 2002) | ||
|  |  * Copyright (C) Ellis Pritchard, Guardian Unlimited 2003. | ||
|  |  * Contact: ellis@nukinetics.com | ||
|  |  * Distributed under the BSD License. | ||
|  |  * | ||
|  |  * Official documentation: http://www.rsa.com/rsalabs/node.asp?id=2125
 | ||
|  |  * | ||
|  |  * @author Evan Jones (http://evanjones.ca/)
 | ||
|  |  * @author Dave Longley | ||
|  |  * | ||
|  |  * Copyright (c) 2013-2014 Digital Bazaar, Inc. | ||
|  |  */ | ||
|  | var forge = require('./forge'); | ||
|  | require('./util'); | ||
|  | require('./random'); | ||
|  | require('./sha1'); | ||
|  | 
 | ||
|  | // shortcut for PKCS#1 API
 | ||
|  | var pkcs1 = module.exports = forge.pkcs1 = forge.pkcs1 || {}; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Encode the given RSAES-OAEP message (M) using key, with optional label (L) | ||
|  |  * and seed. | ||
|  |  * | ||
|  |  * This method does not perform RSA encryption, it only encodes the message | ||
|  |  * using RSAES-OAEP. | ||
|  |  * | ||
|  |  * @param key the RSA key to use. | ||
|  |  * @param message the message to encode. | ||
|  |  * @param options the options to use: | ||
|  |  *          label an optional label to use. | ||
|  |  *          seed the seed to use. | ||
|  |  *          md the message digest object to use, undefined for SHA-1. | ||
|  |  *          mgf1 optional mgf1 parameters: | ||
|  |  *            md the message digest object to use for MGF1. | ||
|  |  * | ||
|  |  * @return the encoded message bytes. | ||
|  |  */ | ||
|  | pkcs1.encode_rsa_oaep = function(key, message, options) { | ||
|  |   // parse arguments
 | ||
|  |   var label; | ||
|  |   var seed; | ||
|  |   var md; | ||
|  |   var mgf1Md; | ||
|  |   // legacy args (label, seed, md)
 | ||
|  |   if(typeof options === 'string') { | ||
|  |     label = options; | ||
|  |     seed = arguments[3] || undefined; | ||
|  |     md = arguments[4] || undefined; | ||
|  |   } else if(options) { | ||
|  |     label = options.label || undefined; | ||
|  |     seed = options.seed || undefined; | ||
|  |     md = options.md || undefined; | ||
|  |     if(options.mgf1 && options.mgf1.md) { | ||
|  |       mgf1Md = options.mgf1.md; | ||
|  |     } | ||
|  |   } | ||
|  | 
 | ||
|  |   // default OAEP to SHA-1 message digest
 | ||
|  |   if(!md) { | ||
|  |     md = forge.md.sha1.create(); | ||
|  |   } else { | ||
|  |     md.start(); | ||
|  |   } | ||
|  | 
 | ||
|  |   // default MGF-1 to same as OAEP
 | ||
|  |   if(!mgf1Md) { | ||
|  |     mgf1Md = md; | ||
|  |   } | ||
|  | 
 | ||
|  |   // compute length in bytes and check output
 | ||
|  |   var keyLength = Math.ceil(key.n.bitLength() / 8); | ||
|  |   var maxLength = keyLength - 2 * md.digestLength - 2; | ||
|  |   if(message.length > maxLength) { | ||
|  |     var error = new Error('RSAES-OAEP input message length is too long.'); | ||
|  |     error.length = message.length; | ||
|  |     error.maxLength = maxLength; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   if(!label) { | ||
|  |     label = ''; | ||
|  |   } | ||
|  |   md.update(label, 'raw'); | ||
|  |   var lHash = md.digest(); | ||
|  | 
 | ||
|  |   var PS = ''; | ||
|  |   var PS_length = maxLength - message.length; | ||
|  |   for(var i = 0; i < PS_length; i++) { | ||
|  |     PS += '\x00'; | ||
|  |   } | ||
|  | 
 | ||
|  |   var DB = lHash.getBytes() + PS + '\x01' + message; | ||
|  | 
 | ||
|  |   if(!seed) { | ||
|  |     seed = forge.random.getBytes(md.digestLength); | ||
|  |   } else if(seed.length !== md.digestLength) { | ||
|  |     var error = new Error('Invalid RSAES-OAEP seed. The seed length must ' + | ||
|  |       'match the digest length.'); | ||
|  |     error.seedLength = seed.length; | ||
|  |     error.digestLength = md.digestLength; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   var dbMask = rsa_mgf1(seed, keyLength - md.digestLength - 1, mgf1Md); | ||
|  |   var maskedDB = forge.util.xorBytes(DB, dbMask, DB.length); | ||
|  | 
 | ||
|  |   var seedMask = rsa_mgf1(maskedDB, md.digestLength, mgf1Md); | ||
|  |   var maskedSeed = forge.util.xorBytes(seed, seedMask, seed.length); | ||
|  | 
 | ||
|  |   // return encoded message
 | ||
|  |   return '\x00' + maskedSeed + maskedDB; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Decode the given RSAES-OAEP encoded message (EM) using key, with optional | ||
|  |  * label (L). | ||
|  |  * | ||
|  |  * This method does not perform RSA decryption, it only decodes the message | ||
|  |  * using RSAES-OAEP. | ||
|  |  * | ||
|  |  * @param key the RSA key to use. | ||
|  |  * @param em the encoded message to decode. | ||
|  |  * @param options the options to use: | ||
|  |  *          label an optional label to use. | ||
|  |  *          md the message digest object to use for OAEP, undefined for SHA-1. | ||
|  |  *          mgf1 optional mgf1 parameters: | ||
|  |  *            md the message digest object to use for MGF1. | ||
|  |  * | ||
|  |  * @return the decoded message bytes. | ||
|  |  */ | ||
|  | pkcs1.decode_rsa_oaep = function(key, em, options) { | ||
|  |   // parse args
 | ||
|  |   var label; | ||
|  |   var md; | ||
|  |   var mgf1Md; | ||
|  |   // legacy args
 | ||
|  |   if(typeof options === 'string') { | ||
|  |     label = options; | ||
|  |     md = arguments[3] || undefined; | ||
|  |   } else if(options) { | ||
|  |     label = options.label || undefined; | ||
|  |     md = options.md || undefined; | ||
|  |     if(options.mgf1 && options.mgf1.md) { | ||
|  |       mgf1Md = options.mgf1.md; | ||
|  |     } | ||
|  |   } | ||
|  | 
 | ||
|  |   // compute length in bytes
 | ||
|  |   var keyLength = Math.ceil(key.n.bitLength() / 8); | ||
|  | 
 | ||
|  |   if(em.length !== keyLength) { | ||
|  |     var error = new Error('RSAES-OAEP encoded message length is invalid.'); | ||
|  |     error.length = em.length; | ||
|  |     error.expectedLength = keyLength; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // default OAEP to SHA-1 message digest
 | ||
|  |   if(md === undefined) { | ||
|  |     md = forge.md.sha1.create(); | ||
|  |   } else { | ||
|  |     md.start(); | ||
|  |   } | ||
|  | 
 | ||
|  |   // default MGF-1 to same as OAEP
 | ||
|  |   if(!mgf1Md) { | ||
|  |     mgf1Md = md; | ||
|  |   } | ||
|  | 
 | ||
|  |   if(keyLength < 2 * md.digestLength + 2) { | ||
|  |     throw new Error('RSAES-OAEP key is too short for the hash function.'); | ||
|  |   } | ||
|  | 
 | ||
|  |   if(!label) { | ||
|  |     label = ''; | ||
|  |   } | ||
|  |   md.update(label, 'raw'); | ||
|  |   var lHash = md.digest().getBytes(); | ||
|  | 
 | ||
|  |   // split the message into its parts
 | ||
|  |   var y = em.charAt(0); | ||
|  |   var maskedSeed = em.substring(1, md.digestLength + 1); | ||
|  |   var maskedDB = em.substring(1 + md.digestLength); | ||
|  | 
 | ||
|  |   var seedMask = rsa_mgf1(maskedDB, md.digestLength, mgf1Md); | ||
|  |   var seed = forge.util.xorBytes(maskedSeed, seedMask, maskedSeed.length); | ||
|  | 
 | ||
|  |   var dbMask = rsa_mgf1(seed, keyLength - md.digestLength - 1, mgf1Md); | ||
|  |   var db = forge.util.xorBytes(maskedDB, dbMask, maskedDB.length); | ||
|  | 
 | ||
|  |   var lHashPrime = db.substring(0, md.digestLength); | ||
|  | 
 | ||
|  |   // constant time check that all values match what is expected
 | ||
|  |   var error = (y !== '\x00'); | ||
|  | 
 | ||
|  |   // constant time check lHash vs lHashPrime
 | ||
|  |   for(var i = 0; i < md.digestLength; ++i) { | ||
|  |     error |= (lHash.charAt(i) !== lHashPrime.charAt(i)); | ||
|  |   } | ||
|  | 
 | ||
|  |   // "constant time" find the 0x1 byte separating the padding (zeros) from the
 | ||
|  |   // message
 | ||
|  |   // TODO: It must be possible to do this in a better/smarter way?
 | ||
|  |   var in_ps = 1; | ||
|  |   var index = md.digestLength; | ||
|  |   for(var j = md.digestLength; j < db.length; j++) { | ||
|  |     var code = db.charCodeAt(j); | ||
|  | 
 | ||
|  |     var is_0 = (code & 0x1) ^ 0x1; | ||
|  | 
 | ||
|  |     // non-zero if not 0 or 1 in the ps section
 | ||
|  |     var error_mask = in_ps ? 0xfffe : 0x0000; | ||
|  |     error |= (code & error_mask); | ||
|  | 
 | ||
|  |     // latch in_ps to zero after we find 0x1
 | ||
|  |     in_ps = in_ps & is_0; | ||
|  |     index += in_ps; | ||
|  |   } | ||
|  | 
 | ||
|  |   if(error || db.charCodeAt(index) !== 0x1) { | ||
|  |     throw new Error('Invalid RSAES-OAEP padding.'); | ||
|  |   } | ||
|  | 
 | ||
|  |   return db.substring(index + 1); | ||
|  | }; | ||
|  | 
 | ||
|  | function rsa_mgf1(seed, maskLength, hash) { | ||
|  |   // default to SHA-1 message digest
 | ||
|  |   if(!hash) { | ||
|  |     hash = forge.md.sha1.create(); | ||
|  |   } | ||
|  |   var t = ''; | ||
|  |   var count = Math.ceil(maskLength / hash.digestLength); | ||
|  |   for(var i = 0; i < count; ++i) { | ||
|  |     var c = String.fromCharCode( | ||
|  |       (i >> 24) & 0xFF, (i >> 16) & 0xFF, (i >> 8) & 0xFF, i & 0xFF); | ||
|  |     hash.start(); | ||
|  |     hash.update(seed + c); | ||
|  |     t += hash.digest().getBytes(); | ||
|  |   } | ||
|  |   return t.substring(0, maskLength); | ||
|  | } |