mirror of
https://github.com/node-ebics/node-ebics-client.git
synced 2024-11-22 06:02:09 +00:00
Add sign, _emsaPSS and _modPowe methods in Key.js file
This commit is contained in:
parent
7e6e2ff142
commit
5ace213723
47
lib/Key.js
47
lib/Key.js
@ -2,8 +2,10 @@
|
|||||||
|
|
||||||
const crypto = require('crypto');
|
const crypto = require('crypto');
|
||||||
|
|
||||||
const NodeRSA = require("node-rsa");
|
|
||||||
const BN = require('bn.js');
|
const BN = require('bn.js');
|
||||||
|
const NodeRSA = require("node-rsa");
|
||||||
|
|
||||||
|
const MGF1 = require('./MGF1');
|
||||||
|
|
||||||
module.exports = class Key {
|
module.exports = class Key {
|
||||||
constructor(encodedKey, passphrase = null) {
|
constructor(encodedKey, passphrase = null) {
|
||||||
@ -20,8 +22,8 @@ module.exports = class Key {
|
|||||||
return crypto.createHash('sha256').update(str).digest('base64').trim();
|
return crypto.createHash('sha256').update(str).digest('base64').trim();
|
||||||
};
|
};
|
||||||
|
|
||||||
publicEncrypt(str) {
|
publicEncrypt(buf) {
|
||||||
return this.key.encrypt(str);
|
return crypto.publicEncrypt({ 'key': this.toPem(), padding: crypto.constants.RSA_PKCS1_PADDING }, buf);
|
||||||
}
|
}
|
||||||
|
|
||||||
n() {
|
n() {
|
||||||
@ -35,4 +37,43 @@ module.exports = class Key {
|
|||||||
toPem() {
|
toPem() {
|
||||||
return this.key.isPrivate() ? this.key.exportKey("pkcs1-private-pem") : this.key.exportKey("pkcs8-public-pem");
|
return this.key.isPrivate() ? this.key.exportKey("pkcs1-private-pem") : this.key.exportKey("pkcs8-public-pem");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sign(msg, salt = crypto.randomBytes(32)) {
|
||||||
|
const base = new BN(this._emsaPSS(msg, salt));
|
||||||
|
const power = new BN(this.key.keyPair.d.toBuffer());
|
||||||
|
const mod = new BN(this.key.keyPair.n.toBuffer());
|
||||||
|
|
||||||
|
return (this._modPow(base, power, mod)).toBuffer().toString('base64');
|
||||||
|
}
|
||||||
|
|
||||||
|
_emsaPSS(msg, salt) {
|
||||||
|
const eightNullBytes = Buffer.from("\x00".repeat(8));
|
||||||
|
const digestedMsg = crypto.createHash('sha256').update(msg).digest();
|
||||||
|
const mTickHash = crypto.createHash('sha256').update(Buffer.concat([eightNullBytes, digestedMsg, salt]), 'binary').digest();
|
||||||
|
|
||||||
|
const ps = Buffer.from("\x00".repeat(190));
|
||||||
|
const db = Buffer.concat([ps, Buffer.from("\x01"), salt]);
|
||||||
|
|
||||||
|
const dbMask = MGF1.generate(mTickHash, db.length);
|
||||||
|
const maskedDb = MGF1.xor(db, dbMask); // so far so good
|
||||||
|
|
||||||
|
let maskedDbMsb = (new MGF1)._rjust(new BN(maskedDb.slice(0, 1), 2).toString(2), 8, "0");
|
||||||
|
maskedDbMsb = "0" + maskedDbMsb.substr(1);
|
||||||
|
|
||||||
|
maskedDb[0] = (new BN(maskedDbMsb, 2).toBuffer())[0];
|
||||||
|
|
||||||
|
return Buffer.concat([maskedDb, mTickHash, Buffer.from('BC', 'hex')]);
|
||||||
|
}
|
||||||
|
|
||||||
|
_modPow(base, power, mod) {
|
||||||
|
let result = new BN(1);
|
||||||
|
|
||||||
|
while( power > 0 ) {
|
||||||
|
result = power.and(new BN(1)) == 1 ? (result.mul(base)).mod(mod) : result;
|
||||||
|
base = (base.mul(base)).mod(mod);
|
||||||
|
power = power.shrn(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
Loading…
Reference in New Issue
Block a user