| /** | |
| * Partial implementation of PKCS#1 v2.2: RSA-OEAP | |
| * | |
| * Modified but based on the following MIT and BSD licensed code: | |
| * | |
| * https://github.com/kjur/jsjws/blob/master/rsa.js: | |
| * | |
| * The 'jsjws'(JSON Web Signature JavaScript Library) License | |
| * | |
| * Copyright (c) 2012 Kenji Urushima | |
| * | |
| * Permission is hereby granted, free of charge, to any person obtaining a copy | |
| * of this software and associated documentation files (the "Software"), to deal | |
| * in the Software without restriction, including without limitation the rights | |
| * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| * copies of the Software, and to permit persons to whom the Software is | |
| * furnished to do so, subject to the following conditions: | |
| * | |
| * The above copyright notice and this permission notice shall be included in | |
| * all copies or substantial portions of the Software. | |
| * | |
| * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
| * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
| * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | |
| * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
| * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | |
| * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | |
| * THE SOFTWARE. | |
| * | |
| * http://webrsa.cvs.sourceforge.net/viewvc/webrsa/Client/RSAES-OAEP.js?content-type=text%2Fplain: | |
| * | |
| * RSAES-OAEP.js | |
| * $Id: RSAES-OAEP.js,v 1.1.1.1 2003/03/19 15:37:20 ellispritchard Exp $ | |
| * JavaScript Implementation of PKCS #1 v2.1 RSA CRYPTOGRAPHY STANDARD (RSA Laboratories, June 14, 2002) | |
| * Copyright (C) Ellis Pritchard, Guardian Unlimited 2003. | |
| * Contact: ellis@nukinetics.com | |
| * Distributed under the BSD License. | |
| * | |
| * Official documentation: http://www.rsa.com/rsalabs/node.asp?id=2125 | |
| * | |
| * @author Evan Jones (http://evanjones.ca/) | |
| * @author Dave Longley | |
| * | |
| * Copyright (c) 2013-2014 Digital Bazaar, Inc. | |
| */ | |
| (function() { | |
| /* ########## Begin module implementation ########## */ | |
| function initModule(forge) { | |
| // shortcut for PKCS#1 API | |
| var pkcs1 = forge.pkcs1 = forge.pkcs1 || {}; | |
| /** | |
| * Encode the given RSAES-OAEP message (M) using key, with optional label (L) | |
| * and seed. | |
| * | |
| * This method does not perform RSA encryption, it only encodes the message | |
| * using RSAES-OAEP. | |
| * | |
| * @param key the RSA key to use. | |
| * @param message the message to encode. | |
| * @param options the options to use: | |
| * label an optional label to use. | |
| * seed the seed to use. | |
| * md the message digest object to use, undefined for SHA-1. | |
| * mgf1 optional mgf1 parameters: | |
| * md the message digest object to use for MGF1. | |
| * | |
| * @return the encoded message bytes. | |
| */ | |
| pkcs1.encode_rsa_oaep = function(key, message, options) { | |
| // parse arguments | |
| var label; | |
| var seed; | |
| var md; | |
| var mgf1Md; | |
| // legacy args (label, seed, md) | |
| if(typeof options === 'string') { | |
| label = options; | |
| seed = arguments[3] || undefined; | |
| md = arguments[4] || undefined; | |
| } else if(options) { | |
| label = options.label || undefined; | |
| seed = options.seed || undefined; | |
| md = options.md || undefined; | |
| if(options.mgf1 && options.mgf1.md) { | |
| mgf1Md = options.mgf1.md; | |
| } | |
| } | |
| // default OAEP to SHA-1 message digest | |
| if(!md) { | |
| md = forge.md.sha1.create(); | |
| } else { | |
| md.start(); | |
| } | |
| // default MGF-1 to same as OAEP | |
| if(!mgf1Md) { | |
| mgf1Md = md; | |
| } | |
| // compute length in bytes and check output | |
| var keyLength = Math.ceil(key.n.bitLength() / 8); | |
| var maxLength = keyLength - 2 * md.digestLength - 2; | |
| if(message.length > maxLength) { | |
| var error = new Error('RSAES-OAEP input message length is too long.'); | |
| error.length = message.length; | |
| error.maxLength = maxLength; | |
| throw error; | |
| } | |
| if(!label) { | |
| label = ''; | |
| } | |
| md.update(label, 'raw'); | |
| var lHash = md.digest(); | |
| var PS = ''; | |
| var PS_length = maxLength - message.length; | |
| for (var i = 0; i < PS_length; i++) { | |
| PS += '\x00'; | |
| } | |
| var DB = lHash.getBytes() + PS + '\x01' + message; | |
| if(!seed) { | |
| seed = forge.random.getBytes(md.digestLength); | |
| } else if(seed.length !== md.digestLength) { | |
| var error = new Error('Invalid RSAES-OAEP seed. The seed length must ' + | |
| 'match the digest length.') | |
| error.seedLength = seed.length; | |
| error.digestLength = md.digestLength; | |
| throw error; | |
| } | |
| var dbMask = rsa_mgf1(seed, keyLength - md.digestLength - 1, mgf1Md); | |
| var maskedDB = forge.util.xorBytes(DB, dbMask, DB.length); | |
| var seedMask = rsa_mgf1(maskedDB, md.digestLength, mgf1Md); | |
| var maskedSeed = forge.util.xorBytes(seed, seedMask, seed.length); | |
| // return encoded message | |
| return '\x00' + maskedSeed + maskedDB; | |
| }; | |
| /** | |
| * Decode the given RSAES-OAEP encoded message (EM) using key, with optional | |
| * label (L). | |
| * | |
| * This method does not perform RSA decryption, it only decodes the message | |
| * using RSAES-OAEP. | |
| * | |
| * @param key the RSA key to use. | |
| * @param em the encoded message to decode. | |
| * @param options the options to use: | |
| * label an optional label to use. | |
| * md the message digest object to use for OAEP, undefined for SHA-1. | |
| * mgf1 optional mgf1 parameters: | |
| * md the message digest object to use for MGF1. | |
| * | |
| * @return the decoded message bytes. | |
| */ | |
| pkcs1.decode_rsa_oaep = function(key, em, options) { | |
| // parse args | |
| var label; | |
| var md; | |
| var mgf1Md; | |
| // legacy args | |
| if(typeof options === 'string') { | |
| label = options; | |
| md = arguments[3] || undefined; | |
| } else if(options) { | |
| label = options.label || undefined; | |
| md = options.md || undefined; | |
| if(options.mgf1 && options.mgf1.md) { | |
| mgf1Md = options.mgf1.md; | |
| } | |
| } | |
| // compute length in bytes | |
| var keyLength = Math.ceil(key.n.bitLength() / 8); | |
| if(em.length !== keyLength) { | |
| var error = new Error('RSAES-OAEP encoded message length is invalid.'); | |
| error.length = em.length; | |
| error.expectedLength = keyLength; | |
| throw error; | |
| } | |
| // default OAEP to SHA-1 message digest | |
| if(md === undefined) { | |
| md = forge.md.sha1.create(); | |
| } else { | |
| md.start(); | |
| } | |
| // default MGF-1 to same as OAEP | |
| if(!mgf1Md) { | |
| mgf1Md = md; | |
| } | |
| if(keyLength < 2 * md.digestLength + 2) { | |
| throw new Error('RSAES-OAEP key is too short for the hash function.'); | |
| } | |
| if(!label) { | |
| label = ''; | |
| } | |
| md.update(label, 'raw'); | |
| var lHash = md.digest().getBytes(); | |
| // split the message into its parts | |
| var y = em.charAt(0); | |
| var maskedSeed = em.substring(1, md.digestLength + 1); | |
| var maskedDB = em.substring(1 + md.digestLength); | |
| var seedMask = rsa_mgf1(maskedDB, md.digestLength, mgf1Md); | |
| var seed = forge.util.xorBytes(maskedSeed, seedMask, maskedSeed.length); | |
| var dbMask = rsa_mgf1(seed, keyLength - md.digestLength - 1, mgf1Md); | |
| var db = forge.util.xorBytes(maskedDB, dbMask, maskedDB.length); | |
| var lHashPrime = db.substring(0, md.digestLength); | |
| // constant time check that all values match what is expected | |
| var error = (y !== '\x00'); | |
| // constant time check lHash vs lHashPrime | |
| for(var i = 0; i < md.digestLength; ++i) { | |
| error |= (lHash.charAt(i) !== lHashPrime.charAt(i)); | |
| } | |
| // "constant time" find the 0x1 byte separating the padding (zeros) from the | |
| // message | |
| // TODO: It must be possible to do this in a better/smarter way? | |
| var in_ps = 1; | |
| var index = md.digestLength; | |
| for(var j = md.digestLength; j < db.length; j++) { | |
| var code = db.charCodeAt(j); | |
| var is_0 = (code & 0x1) ^ 0x1; | |
| // non-zero if not 0 or 1 in the ps section | |
| var error_mask = in_ps ? 0xfffe : 0x0000; | |
| error |= (code & error_mask); | |
| // latch in_ps to zero after we find 0x1 | |
| in_ps = in_ps & is_0; | |
| index += in_ps; | |
| } | |
| if(error || db.charCodeAt(index) !== 0x1) { | |
| throw new Error('Invalid RSAES-OAEP padding.'); | |
| } | |
| return db.substring(index + 1); | |
| }; | |
| function rsa_mgf1(seed, maskLength, hash) { | |
| // default to SHA-1 message digest | |
| if(!hash) { | |
| hash = forge.md.sha1.create(); | |
| } | |
| var t = ''; | |
| var count = Math.ceil(maskLength / hash.digestLength); | |
| for(var i = 0; i < count; ++i) { | |
| var c = String.fromCharCode( | |
| (i >> 24) & 0xFF, (i >> 16) & 0xFF, (i >> 8) & 0xFF, i & 0xFF); | |
| hash.start(); | |
| hash.update(seed + c); | |
| t += hash.digest().getBytes(); | |
| } | |
| return t.substring(0, maskLength); | |
| } | |
| } // end module implementation | |
| /* ########## Begin module wrapper ########## */ | |
| var name = 'pkcs1'; | |
| if(typeof define !== 'function') { | |
| // NodeJS -> AMD | |
| if(typeof module === 'object' && module.exports) { | |
| var nodeJS = true; | |
| define = function(ids, factory) { | |
| factory(require, module); | |
| }; | |
| } else { | |
| // <script> | |
| if(typeof forge === 'undefined') { | |
| forge = {}; | |
| } | |
| return initModule(forge); | |
| } | |
| } | |
| // AMD | |
| var deps; | |
| var defineFunc = function(require, module) { | |
| module.exports = function(forge) { | |
| var mods = deps.map(function(dep) { | |
| return require(dep); | |
| }).concat(initModule); | |
| // handle circular dependencies | |
| forge = forge || {}; | |
| forge.defined = forge.defined || {}; | |
| if(forge.defined[name]) { | |
| return forge[name]; | |
| } | |
| forge.defined[name] = true; | |
| for(var i = 0; i < mods.length; ++i) { | |
| mods[i](forge); | |
| } | |
| return forge[name]; | |
| }; | |
| }; | |
| var tmpDefine = define; | |
| define = function(ids, factory) { | |
| deps = (typeof ids === 'string') ? factory.slice(2) : ids.slice(2); | |
| if(nodeJS) { | |
| delete define; | |
| return tmpDefine.apply(null, Array.prototype.slice.call(arguments, 0)); | |
| } | |
| define = tmpDefine; | |
| return define.apply(null, Array.prototype.slice.call(arguments, 0)); | |
| }; | |
| define(['require', 'module', './util', './random', './sha1'], function() { | |
| defineFunc.apply(null, Array.prototype.slice.call(arguments, 0)); | |
| }); | |
| })(); |