mirror of
https://github.com/node-ebics/node-ebics-client.git
synced 2024-11-22 22:22:06 +00:00
94 lines
2.6 KiB
JavaScript
94 lines
2.6 KiB
JavaScript
|
'use strict';
|
||
|
|
||
|
const crypto = require('crypto');
|
||
|
|
||
|
const BN = require('bn.js');
|
||
|
|
||
|
const mgf1 = require('./MGF1');
|
||
|
|
||
|
const modPow = (base, power, mod) => {
|
||
|
let result = new BN(1);
|
||
|
|
||
|
while (power > 0) {
|
||
|
result = power.and(new BN(1)) == 1 ? (result.mul(base)).mod(mod) : result; // eslint-disable-line
|
||
|
base = (base.mul(base)).mod(mod);
|
||
|
power = power.shrn(1);
|
||
|
}
|
||
|
return result;
|
||
|
};
|
||
|
|
||
|
const emsaPSS = (msg, salt) => {
|
||
|
const eightNullBytes = Buffer.from('\x00'.repeat(8));
|
||
|
const digestedMsg = crypto.createHash('sha256').update(msg).digest();
|
||
|
const mTickHash = crypto.createHash('sha256').update(Buffer.concat([eightNullBytes, digestedMsg, salt]), 'binary').digest();
|
||
|
|
||
|
const ps = Buffer.from('\x00'.repeat(190));
|
||
|
const db = Buffer.concat([ps, Buffer.from('\x01'), salt]);
|
||
|
|
||
|
const dbMask = mgf1.generate(mTickHash, db.length);
|
||
|
const maskedDb = mgf1.xor(db, dbMask);
|
||
|
|
||
|
let maskedDbMsb = mgf1.rjust(new BN(maskedDb.slice(0, 1), 2).toString(2), 8, '0');
|
||
|
|
||
|
maskedDbMsb = `0${maskedDbMsb.substr(1)}`;
|
||
|
maskedDb[0] = (new BN(maskedDbMsb, 2).toBuffer())[0]; // eslint-disable-line
|
||
|
|
||
|
return Buffer.concat([maskedDb, mTickHash, Buffer.from('BC', 'hex')]);
|
||
|
};
|
||
|
|
||
|
|
||
|
module.exports = class Crypto {
|
||
|
static digestPublicKey(key) {
|
||
|
const str = [key.e('hex').replace(/^(0+)/g, ''), key.n('hex').replace(/^(0+)/g, '')].map(x => x.toLowerCase()).join(' ');
|
||
|
|
||
|
return crypto.createHash('sha256').update(str).digest('base64').trim();
|
||
|
}
|
||
|
|
||
|
static publicEncrypt(key, data) {
|
||
|
return crypto.publicEncrypt({
|
||
|
key: key.toPem(),
|
||
|
padding: crypto.constants.RSA_PKCS1_PADDING,
|
||
|
}, data);
|
||
|
}
|
||
|
|
||
|
static privateDecrypt(key, data) {
|
||
|
return crypto.privateDecrypt({
|
||
|
key: key.toPem(),
|
||
|
padding: crypto.constants.RSA_PKCS1_PADDING,
|
||
|
}, data);
|
||
|
}
|
||
|
|
||
|
static privateSign(key, data, outputEncoding = 'base64') {
|
||
|
const signer = crypto.createSign('SHA256');
|
||
|
|
||
|
return signer.update(data).sign(key.toPem(), outputEncoding);
|
||
|
}
|
||
|
|
||
|
static sign(key, msg, salt = crypto.randomBytes(32)) {
|
||
|
const base = new BN(emsaPSS(msg, salt));
|
||
|
const power = new BN(key.d());
|
||
|
const mod = new BN(key.n());
|
||
|
|
||
|
return (modPow(base, power, mod)).toBuffer().toString('base64');
|
||
|
}
|
||
|
|
||
|
static pad(d) {
|
||
|
const dLen = d.length;
|
||
|
const len = 16 * (Math.trunc(dLen / 16) + 1);
|
||
|
|
||
|
return Buffer.concat([d, Buffer.from(Buffer.from([0]).toString().repeat(len - dLen - 1)), Buffer.from([len - dLen])]);
|
||
|
}
|
||
|
|
||
|
static digestWithHash(data, algorith = 'sha256') {
|
||
|
return crypto.createHash(algorith).update(data).digest();
|
||
|
}
|
||
|
|
||
|
static nonce(outputEncoding = 'hex') {
|
||
|
return crypto.randomBytes(16).toString(outputEncoding);
|
||
|
}
|
||
|
|
||
|
static timestamp() {
|
||
|
return new Date().toISOString();
|
||
|
}
|
||
|
};
|