Streaming verify one-pass signatures

This commit is contained in:
Daniel Huigens 2018-05-25 19:24:33 +02:00
parent ead3ddd706
commit ade2627bca
19 changed files with 296 additions and 185 deletions

View File

@ -16,6 +16,7 @@ import Rusha from 'rusha';
import { SHA256 } from 'asmcrypto.js/src/hash/sha256/exports';
import sha1 from 'hash.js/lib/hash/sha/1';
import sha224 from 'hash.js/lib/hash/sha/224';
import sha256 from 'hash.js/lib/hash/sha/256';
import sha384 from 'hash.js/lib/hash/sha/384';
import sha512 from 'hash.js/lib/hash/sha/512';
import { ripemd160 } from 'hash.js/lib/hash/ripemd';
@ -64,7 +65,7 @@ if (nodeCrypto) { // Use Node native crypto for all hash functions
return util.hex_to_Uint8Array(rusha.digest(data));
},*/
sha224: hashjs_hash(sha224),
sha256: SHA256.bytes,
sha256: hashjs_hash(sha256),
sha384: hashjs_hash(sha384),
// TODO, benchmark this vs asmCrypto's SHA512
sha512: hashjs_hash(sha512),

View File

@ -128,14 +128,13 @@ eme.decode = function(EM) {
* Create a EMSA-PKCS1-v1_5 padded message
* @see {@link https://tools.ietf.org/html/rfc4880#section-13.1.3|RFC 4880 13.1.3}
* @param {Integer} algo Hash algorithm type used
* @param {String} M message to be encoded
* @param {Uint8Array} hashed message to be encoded
* @param {Integer} emLen intended length in octets of the encoded message
* @returns {String} encoded message
*/
emsa.encode = function(algo, M, emLen) {
emsa.encode = async function(algo, hashed, emLen) {
let i;
// Apply the hash function to the message M to produce a hash value H
const H = util.Uint8Array_to_str(hash.digest(algo, util.str_to_Uint8Array(M)));
const H = util.Uint8Array_to_str(hashed);
if (H.length !== hash.getHashByteLength(algo)) {
throw new Error('Invalid hash length');
}

View File

@ -18,14 +18,12 @@
/**
* @fileoverview A Digital signature algorithm implementation
* @requires bn.js
* @requires crypto/hash
* @requires crypto/random
* @requires util
* @module crypto/public_key/dsa
*/
import BN from 'bn.js';
import hash from '../hash';
import random from '../random';
import util from '../../util';
@ -42,7 +40,7 @@ export default {
/**
* DSA Sign function
* @param {Integer} hash_algo
* @param {String} m
* @param {Uint8Array} hashed
* @param {BN} g
* @param {BN} p
* @param {BN} q
@ -50,7 +48,7 @@ export default {
* @returns {{ r: BN, s: BN }}
* @async
*/
sign: async function(hash_algo, m, g, p, q, x) {
sign: async function(hash_algo, hashed, g, p, q, x) {
let k;
let r;
let s;
@ -65,8 +63,7 @@ export default {
// truncated) hash function result is treated as a number and used
// directly in the DSA signature algorithm.
const h = new BN(
util.getLeftNBits(
hash.digest(hash_algo, m), q.bitLength()))
util.getLeftNBits(hashed, q.bitLength()))
.toRed(redq);
// FIPS-186-4, section 4.6:
// The values of r and s shall be checked to determine if r = 0 or s = 0.
@ -96,7 +93,7 @@ export default {
* @param {Integer} hash_algo
* @param {BN} r
* @param {BN} s
* @param {String} m
* @param {Uint8Array} hashed
* @param {BN} g
* @param {BN} p
* @param {BN} q
@ -104,7 +101,7 @@ export default {
* @returns BN
* @async
*/
verify: async function(hash_algo, r, s, m, g, p, q, y) {
verify: async function(hash_algo, r, s, hashed, g, p, q, y) {
if (zero.ucmp(r) >= 0 || r.ucmp(q) >= 0 ||
zero.ucmp(s) >= 0 || s.ucmp(q) >= 0) {
util.print_debug("invalid DSA Signature");
@ -113,8 +110,7 @@ export default {
const redp = new BN.red(p);
const redq = new BN.red(q);
const h = new BN(
util.getLeftNBits(
hash.digest(hash_algo, m), q.bitLength()));
util.getLeftNBits(hashed, q.bitLength()));
const w = s.toRed(redq).redInvm(); // s**-1 mod q
if (zero.cmp(w) === 0) {
util.print_debug("invalid DSA Signature");

View File

@ -33,10 +33,10 @@ import Curve from './curves';
* s: Uint8Array}} Signature of the message
* @async
*/
async function sign(oid, hash_algo, m, d) {
async function sign(oid, hash_algo, m, d, hashed) {
const curve = new Curve(oid);
const key = curve.keyFromPrivate(d);
const signature = await key.sign(m, hash_algo);
const signature = await key.sign(m, hash_algo, hashed);
return { r: signature.r.toArrayLike(Uint8Array),
s: signature.s.toArrayLike(Uint8Array) };
}
@ -52,10 +52,10 @@ async function sign(oid, hash_algo, m, d) {
* @returns {Boolean}
* @async
*/
async function verify(oid, hash_algo, signature, m, Q) {
async function verify(oid, hash_algo, signature, m, Q, hashed) {
const curve = new Curve(oid);
const key = curve.keyFromPublic(Q);
return key.verify(m, signature, hash_algo);
return key.verify(m, signature, hash_algo, hashed);
}
export default { sign, verify };

View File

@ -33,10 +33,10 @@ import Curve from './curves';
* S: Uint8Array}} Signature of the message
* @async
*/
async function sign(oid, hash_algo, m, d) {
async function sign(oid, hash_algo, m, d, hashed) {
const curve = new Curve(oid);
const key = curve.keyFromSecret(d);
const signature = await key.sign(m, hash_algo);
const signature = await key.sign(m, hash_algo, hashed);
// EdDSA signature params are returned in little-endian format
return { R: new Uint8Array(signature.Rencoded()),
S: new Uint8Array(signature.Sencoded()) };
@ -53,10 +53,10 @@ async function sign(oid, hash_algo, m, d) {
* @returns {Boolean}
* @async
*/
async function verify(oid, hash_algo, signature, m, Q) {
async function verify(oid, hash_algo, signature, m, Q, hashed) {
const curve = new Curve(oid);
const key = curve.keyFromPublic(Q);
return key.verify(m, signature, hash_algo);
return key.verify(m, signature, hash_algo, hashed);
}
export default { sign, verify };

View File

@ -19,7 +19,7 @@
* @fileoverview Wrapper for a KeyPair of an Elliptic Curve
* @requires bn.js
* @requires crypto/public_key/elliptic/curves
* @requires crypto/hash
* @requires stream
* @requires util
* @requires enums
* @requires asn1.js
@ -28,7 +28,7 @@
import BN from 'bn.js';
import { webCurves } from './curves';
import hash from '../../hash';
import stream from '../../../stream';
import util from '../../../util';
import enums from '../../../enums';
@ -44,37 +44,43 @@ function KeyPair(curve, options) {
this.keyPair = this.curve.curve.keyPair(options);
}
KeyPair.prototype.sign = async function (message, hash_algo) {
if (this.curve.web && util.getWebCrypto()) {
// If browser doesn't support a curve, we'll catch it
try {
// need to await to make sure browser succeeds
const signature = await webSign(this.curve, hash_algo, message, this.keyPair);
return signature;
} catch (err) {
util.print_debug("Browser did not support signing: " + err.message);
KeyPair.prototype.sign = async function (message, hash_algo, hashed) {
if (!message.locked) {
message = await stream.readToEnd(message);
if (this.curve.web && util.getWebCrypto()) {
// If browser doesn't support a curve, we'll catch it
try {
// need to await to make sure browser succeeds
const signature = await webSign(this.curve, hash_algo, message, this.keyPair);
return signature;
} catch (err) {
util.print_debug("Browser did not support signing: " + err.message);
}
} else if (this.curve.node && util.getNodeCrypto()) {
return nodeSign(this.curve, hash_algo, message, this.keyPair);
}
} else if (this.curve.node && util.getNodeCrypto()) {
return nodeSign(this.curve, hash_algo, message, this.keyPair);
}
const digest = (typeof hash_algo === 'undefined') ? message : hash.digest(hash_algo, message);
const digest = (typeof hash_algo === 'undefined') ? message : hashed;
return this.keyPair.sign(digest);
};
KeyPair.prototype.verify = async function (message, signature, hash_algo) {
if (this.curve.web && util.getWebCrypto()) {
// If browser doesn't support a curve, we'll catch it
try {
// need to await to make sure browser succeeds
const result = await webVerify(this.curve, hash_algo, signature, message, this.keyPair.getPublic());
return result;
} catch (err) {
util.print_debug("Browser did not support signing: " + err.message);
KeyPair.prototype.verify = async function (message, signature, hash_algo, hashed) {
if (!message.locked) {
message = await stream.readToEnd(message);
if (this.curve.web && util.getWebCrypto()) {
// If browser doesn't support a curve, we'll catch it
try {
// need to await to make sure browser succeeds
const result = await webVerify(this.curve, hash_algo, signature, message, this.keyPair.getPublic());
return result;
} catch (err) {
util.print_debug("Browser did not support signing: " + err.message);
}
} else if (this.curve.node && util.getNodeCrypto()) {
return nodeVerify(this.curve, hash_algo, signature, message, this.keyPair.getPublic());
}
} else if (this.curve.node && util.getNodeCrypto()) {
return nodeVerify(this.curve, hash_algo, signature, message, this.keyPair.getPublic());
}
const digest = (typeof hash_algo === 'undefined') ? message : hash.digest(hash_algo, message);
const digest = (typeof hash_algo === 'undefined') ? message : hashed;
return this.keyPair.verify(digest, signature);
};

View File

@ -4,7 +4,6 @@
* @requires crypto/public_key
* @requires crypto/pkcs1
* @requires enums
* @requires stream
* @requires util
* @module crypto/signature
*/
@ -13,7 +12,6 @@ import BN from 'bn.js';
import publicKey from './public_key';
import pkcs1 from './pkcs1';
import enums from '../enums';
import stream from '../stream';
import util from '../util';
export default {
@ -30,8 +28,7 @@ export default {
* @returns {Boolean} True if signature is valid
* @async
*/
verify: async function(algo, hash_algo, msg_MPIs, pub_MPIs, data) {
data = await stream.readToEnd(data);
verify: async function(algo, hash_algo, msg_MPIs, pub_MPIs, data, hashed) {
switch (algo) {
case enums.publicKey.rsa_encrypt_sign:
case enums.publicKey.rsa_encrypt:
@ -40,7 +37,7 @@ export default {
const n = pub_MPIs[0].toBN();
const e = pub_MPIs[1].toBN();
const EM = await publicKey.rsa.verify(m, n, e);
const EM2 = pkcs1.emsa.encode(hash_algo, util.Uint8Array_to_str(data), n.byteLength());
const EM2 = await pkcs1.emsa.encode(hash_algo, hashed, n.byteLength());
return util.Uint8Array_to_hex(EM) === EM2;
}
case enums.publicKey.dsa: {
@ -50,13 +47,13 @@ export default {
const q = pub_MPIs[1].toBN();
const g = pub_MPIs[2].toBN();
const y = pub_MPIs[3].toBN();
return publicKey.dsa.verify(hash_algo, r, s, data, g, p, q, y);
return publicKey.dsa.verify(hash_algo, r, s, hashed, g, p, q, y);
}
case enums.publicKey.ecdsa: {
const oid = pub_MPIs[0];
const signature = { r: msg_MPIs[0].toUint8Array(), s: msg_MPIs[1].toUint8Array() };
const Q = pub_MPIs[1].toUint8Array();
return publicKey.elliptic.ecdsa.verify(oid, hash_algo, signature, data, Q);
return publicKey.elliptic.ecdsa.verify(oid, hash_algo, signature, data, Q, hashed);
}
case enums.publicKey.eddsa: {
const oid = pub_MPIs[0];
@ -65,7 +62,7 @@ export default {
const signature = { R: Array.from(msg_MPIs[0].toUint8Array('le', 32)),
S: Array.from(msg_MPIs[1].toUint8Array('le', 32)) };
const Q = Array.from(pub_MPIs[1].toUint8Array('be', 33));
return publicKey.elliptic.eddsa.verify(oid, hash_algo, signature, data, Q);
return publicKey.elliptic.eddsa.verify(oid, hash_algo, signature, data, Q, hashed);
}
default:
throw new Error('Invalid signature algorithm.');
@ -84,8 +81,7 @@ export default {
* @returns {Uint8Array} Signature
* @async
*/
sign: async function(algo, hash_algo, key_params, data) {
data = await stream.readToEnd(data);
sign: async function(algo, hash_algo, key_params, data, hashed) {
switch (algo) {
case enums.publicKey.rsa_encrypt_sign:
case enums.publicKey.rsa_encrypt:
@ -93,8 +89,7 @@ export default {
const n = key_params[0].toBN();
const e = key_params[1].toBN();
const d = key_params[2].toBN();
data = util.Uint8Array_to_str(data);
const m = new BN(pkcs1.emsa.encode(hash_algo, data, n.byteLength()), 16);
const m = new BN(await pkcs1.emsa.encode(hash_algo, hashed, n.byteLength()), 16);
const signature = await publicKey.rsa.sign(m, n, e, d);
return util.Uint8Array_to_MPI(signature);
}
@ -103,7 +98,7 @@ export default {
const q = key_params[1].toBN();
const g = key_params[2].toBN();
const x = key_params[4].toBN();
const signature = await publicKey.dsa.sign(hash_algo, data, g, p, q, x);
const signature = await publicKey.dsa.sign(hash_algo, hashed, g, p, q, x);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.r),
util.Uint8Array_to_MPI(signature.s)
@ -115,7 +110,7 @@ export default {
case enums.publicKey.ecdsa: {
const oid = key_params[0];
const d = key_params[2].toUint8Array();
const signature = await publicKey.elliptic.ecdsa.sign(oid, hash_algo, data, d);
const signature = await publicKey.elliptic.ecdsa.sign(oid, hash_algo, data, d, hashed);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.r),
util.Uint8Array_to_MPI(signature.s)
@ -124,7 +119,7 @@ export default {
case enums.publicKey.eddsa: {
const oid = key_params[0];
const d = Array.from(key_params[2].toUint8Array('be', 32));
const signature = await publicKey.elliptic.eddsa.sign(oid, hash_algo, data, d);
const signature = await publicKey.elliptic.eddsa.sign(oid, hash_algo, data, d, hashed);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.R),
util.Uint8Array_to_MPI(signature.S)

View File

@ -21,6 +21,7 @@
* @requires config
* @requires crypto
* @requires enums
* @requires stream
* @requires util
* @requires packet
* @requires signature
@ -33,6 +34,7 @@ import type_keyid from './type/keyid';
import config from './config';
import crypto from './crypto';
import enums from './enums';
import stream from './stream';
import util from './util';
import packet from './packet';
import { Signature } from './signature';
@ -77,7 +79,7 @@ Message.prototype.getSigningKeyIds = function() {
// search for one pass signatures
const onePassSigList = msg.packets.filterByTag(enums.packet.onePassSignature);
onePassSigList.forEach(function(packet) {
keyIds.push(packet.signingKeyId);
keyIds.push(packet.issuerKeyId);
});
// if nothing found look for signature packets
if (!keyIds.length) {
@ -406,10 +408,10 @@ Message.prototype.sign = async function(privateKeys=[], signature=null, date=new
for (i = existingSigPacketlist.length - 1; i >= 0; i--) {
const signaturePacket = existingSigPacketlist[i];
const onePassSig = new packet.OnePassSignature();
onePassSig.type = signatureType;
onePassSig.signatureType = signatureType;
onePassSig.hashAlgorithm = signaturePacket.hashAlgorithm;
onePassSig.publicKeyAlgorithm = signaturePacket.publicKeyAlgorithm;
onePassSig.signingKeyId = signaturePacket.issuerKeyId;
onePassSig.issuerKeyId = signaturePacket.issuerKeyId;
if (!privateKeys.length && i === 0) {
onePassSig.flags = 1;
}
@ -427,10 +429,10 @@ Message.prototype.sign = async function(privateKeys=[], signature=null, date=new
privateKey.getKeyId().toHex());
}
const onePassSig = new packet.OnePassSignature();
onePassSig.type = signatureType;
onePassSig.signatureType = signatureType;
onePassSig.hashAlgorithm = await getPreferredHashAlgo(privateKey, signingKey.keyPacket, date, userId);
onePassSig.publicKeyAlgorithm = signingKey.keyPacket.algorithm;
onePassSig.signingKeyId = signingKey.getKeyId();
onePassSig.issuerKeyId = signingKey.getKeyId();
if (i === privateKeys.length - 1) {
onePassSig.flags = 1;
}
@ -527,12 +529,35 @@ export async function createSignaturePackets(literalDataPacket, privateKeys, sig
* @returns {Promise<Array<({keyid: module:type/keyid, valid: Boolean})>>} list of signer's keyid and validity of signature
* @async
*/
Message.prototype.verify = function(keys, date=new Date()) {
Message.prototype.verify = async function(keys, date=new Date()) {
const msg = this.unwrapCompressed();
const literalDataList = msg.packets.filterByTag(enums.packet.literal);
if (literalDataList.length !== 1) {
throw new Error('Can only verify message with one literal data packet.');
}
if (msg.packets.stream) {
let onePassSigList = msg.packets.filterByTag(enums.packet.onePassSignature);
onePassSigList = Array.from(onePassSigList).reverse();
if (onePassSigList.length) {
onePassSigList.forEach(onePassSig => {
onePassSig.signatureData = stream.fromAsync(() => new Promise(resolve => {
onePassSig.signatureDataResolve = resolve;
}));
onePassSig.hash(literalDataList[0]);
});
const reader = stream.getReader(msg.packets.stream);
for (let i = 0; ; i++) {
const { done, value } = await reader.read();
if (done) {
break;
}
onePassSigList[i].signatureDataResolve(value.signatureData);
value.hashed = onePassSigList[i].hashed;
value.hashedData = onePassSigList[i].hashedData;
msg.packets.push(value);
}
}
}
const signatureList = msg.packets.filterByTag(enums.packet.signature);
return createVerificationObjects(signatureList, literalDataList, keys, date);
};

View File

@ -455,11 +455,11 @@ export function verify({ message, publicKeys, asStream, signature=null, date=new
return Promise.resolve().then(async function() {
const result = {};
result.data = message instanceof CleartextMessage ? message.getText() : message.getLiteralData();
result.data = await convertStream(result.data, asStream);
result.signatures = signature ?
await message.verifyDetached(signature, publicKeys, date) :
await message.verify(publicKeys, date);
result.data = message instanceof CleartextMessage ? message.getText() : message.getLiteralData();
result.data = await convertStream(result.data, asStream);
return result;
}).catch(onError.bind(null, 'Error verifying cleartext signed message'));
}

View File

@ -149,12 +149,7 @@ function pako_zlib(constructor, options = {}) {
function bzip2(func) {
return function(data) {
return new ReadableStream({
async start(controller) {
controller.enqueue(func(await stream.readToEnd(data)));
controller.close();
}
});
return stream.fromAsync(async () => func(await stream.readToEnd(data)));
};
}

View File

@ -16,11 +16,13 @@
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
/**
* @requires packet/signature
* @requires type/keyid
* @requires enums
* @requires util
*/
*/
import Signature from './signature';
import type_keyid from '../type/keyid';
import enums from '../enums';
import util from '../util';
@ -50,7 +52,7 @@ function OnePassSignature() {
* Signature types are described in
* {@link https://tools.ietf.org/html/rfc4880#section-5.2.1|RFC4880 Section 5.2.1}.
*/
this.type = null;
this.signatureType = null;
/**
* A one-octet number describing the hash algorithm used.
* @see {@link https://tools.ietf.org/html/rfc4880#section-9.4|RFC4880 9.4}
@ -62,7 +64,7 @@ function OnePassSignature() {
*/
this.publicKeyAlgorithm = null;
/** An eight-octet number holding the Key ID of the signing key. */
this.signingKeyId = null;
this.issuerKeyId = null;
/**
* A one-octet number holding a flag showing whether the signature is nested.
* A zero value indicates that the next packet is another One-Pass Signature packet
@ -83,7 +85,7 @@ OnePassSignature.prototype.read = function (bytes) {
// A one-octet signature type. Signature types are described in
// Section 5.2.1.
this.type = enums.read(enums.signature, bytes[mypos++]);
this.signatureType = enums.read(enums.signature, bytes[mypos++]);
// A one-octet number describing the hash algorithm used.
this.hashAlgorithm = enums.read(enums.hash, bytes[mypos++]);
@ -92,8 +94,8 @@ OnePassSignature.prototype.read = function (bytes) {
this.publicKeyAlgorithm = enums.read(enums.publicKey, bytes[mypos++]);
// An eight-octet number holding the Key ID of the signing key.
this.signingKeyId = new type_keyid();
this.signingKeyId.read(bytes.subarray(mypos, mypos + 8));
this.issuerKeyId = new type_keyid();
this.issuerKeyId.read(bytes.subarray(mypos, mypos + 8));
mypos += 8;
// A one-octet number holding a flag showing whether the signature
@ -109,20 +111,33 @@ OnePassSignature.prototype.read = function (bytes) {
* @returns {Uint8Array} a Uint8Array representation of a one-pass signature packet
*/
OnePassSignature.prototype.write = function () {
const start = new Uint8Array([3, enums.write(enums.signature, this.type),
const start = new Uint8Array([3, enums.write(enums.signature, this.signatureType),
enums.write(enums.hash, this.hashAlgorithm),
enums.write(enums.publicKey, this.publicKeyAlgorithm)]);
const end = new Uint8Array([this.flags]);
return util.concatUint8Array([start, this.signingKeyId.write(), end]);
return util.concatUint8Array([start, this.issuerKeyId.write(), end]);
};
/**
* Fix custom types after cloning
*/
OnePassSignature.prototype.postCloneTypeFix = function() {
this.signingKeyId = type_keyid.fromClone(this.signingKeyId);
this.issuerKeyId = type_keyid.fromClone(this.issuerKeyId);
};
OnePassSignature.prototype.hash = function() {
const version = this.version;
this.version = 4;
try {
return Signature.prototype.hash.apply(this, arguments);
} finally {
this.version = version;
}
};
OnePassSignature.prototype.toHash = Signature.prototype.toHash;
OnePassSignature.prototype.toSign = Signature.prototype.toSign;
OnePassSignature.prototype.calculateTrailer = Signature.prototype.calculateTrailer;
export default OnePassSignature;

View File

@ -62,7 +62,7 @@ List.prototype.read = async function (bytes) {
});
// Wait until first few packets have been read
const reader = stream.getReader(stream.clone(this.stream));
const reader = stream.getReader(this.stream);
while (true) {
const { done, value } = await reader.read();
if (!done) {
@ -72,6 +72,7 @@ List.prototype.read = async function (bytes) {
break;
}
}
reader.releaseLock();
};
/**

View File

@ -21,6 +21,7 @@
* @requires type/mpi
* @requires crypto
* @requires enums
* @requires stream
* @requires util
*/
@ -29,6 +30,7 @@ import type_keyid from '../type/keyid.js';
import type_mpi from '../type/mpi.js';
import crypto from '../crypto';
import enums from '../enums';
import stream from '../stream';
import util from '../util';
/**
@ -124,7 +126,7 @@ Signature.prototype.read = function (bytes) {
// switch on version (3 and 4)
switch (this.version) {
case 3: {
case 3:
// One-octet length of following hashed material. MUST be 5.
if (bytes[i++] !== 5) {
util.print_debug("packet/signature.js\n" +
@ -132,7 +134,6 @@ Signature.prototype.read = function (bytes) {
'MUST be 5. @:' + (i - 1));
}
const sigpos = i;
// One-octet signature type.
this.signatureType = bytes[i++];
@ -140,9 +141,6 @@ Signature.prototype.read = function (bytes) {
this.created = util.readDate(bytes.subarray(i, i + 4));
i += 4;
// storing data appended to data which gets verified
this.signatureData = bytes.subarray(sigpos, i);
// Eight-octet Key ID of signer.
this.issuerKeyId.read(bytes.subarray(i, i + 8));
i += 8;
@ -153,7 +151,6 @@ Signature.prototype.read = function (bytes) {
// One-octet hash algorithm.
this.hashAlgorithm = bytes[i++];
break;
}
case 4: {
this.signatureType = bytes[i++];
this.publicKeyAlgorithm = bytes[i++];
@ -223,42 +220,31 @@ Signature.prototype.sign = async function (key, data) {
const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm);
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
const arr = [new Uint8Array([4, signatureType, publicKeyAlgorithm, hashAlgorithm])];
if (this.version === 4) {
const arr = [new Uint8Array([4, signatureType, publicKeyAlgorithm, hashAlgorithm])];
if (key.version === 5) {
// We could also generate this subpacket for version 4 keys, but for
// now we don't.
this.issuerKeyVersion = key.version;
this.issuerFingerprint = key.getFingerprintBytes();
if (key.version === 5) {
// We could also generate this subpacket for version 4 keys, but for
// now we don't.
this.issuerKeyVersion = key.version;
this.issuerFingerprint = key.getFingerprintBytes();
}
this.issuerKeyId = key.getKeyId();
// Add hashed subpackets
arr.push(this.write_all_sub_packets());
this.signatureData = util.concat(arr);
}
this.issuerKeyId = key.getKeyId();
// Add hashed subpackets
arr.push(this.write_all_sub_packets());
this.signatureData = util.concat(arr);
const trailer = this.calculateTrailer();
let toHash = null;
switch (this.version) {
case 3:
toHash = util.concat([this.toSign(signatureType, data), new Uint8Array([signatureType]), util.writeDate(this.created)]);
break;
case 4:
toHash = util.concat([this.toSign(signatureType, data), this.signatureData, trailer]);
break;
default: throw new Error('Version ' + this.version + ' of the signature is unsupported.');
}
const hash = crypto.hash.digest(hashAlgorithm, toHash);
const toHash = this.toHash(data);
const hash = await stream.readToEnd(this.hash(data, toHash));
this.signedHashValue = hash.subarray(0, 2);
this.signature = await crypto.signature.sign(
publicKeyAlgorithm, hashAlgorithm, key.params, toHash
publicKeyAlgorithm, hashAlgorithm, key.params, toHash, hash
);
return true;
};
@ -647,13 +633,37 @@ Signature.prototype.toSign = function (type, data) {
Signature.prototype.calculateTrailer = function () {
// calculating the trailer
// V3 signatures don't have a trailer
if (this.version === 3) {
return new Uint8Array(0);
let length = 0;
return stream.transform(stream.clone(this.signatureData), value => {
length += value.length;
}, () => {
const first = new Uint8Array([4, 0xFF]); //Version, ?
return util.concat([first, util.writeNumber(length, 4)]);
});
};
Signature.prototype.toHash = function(data) {
const signatureType = enums.write(enums.signature, this.signatureType);
const bytes = this.toSign(signatureType, data);
switch (this.version) {
case 3:
return util.concat([bytes, new Uint8Array([signatureType]), util.writeDate(this.created)]);
case 4:
return util.concat([bytes, this.signatureData, this.calculateTrailer()]);
default:
throw new Error('Version ' + this.version + ' of the signature is unsupported.');
}
const first = new Uint8Array([4, 0xFF]); //Version, ?
return util.concat([first, util.writeNumber(this.signatureData.length, 4)]);
};
Signature.prototype.hash = function(data, toHash) {
if (!this.hashed) {
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
this.hashed = crypto.hash.digest(hashAlgorithm, toHash || this.toHash(data));
}
return this.hashed;
};
@ -666,43 +676,46 @@ Signature.prototype.calculateTrailer = function () {
* @async
*/
Signature.prototype.verify = async function (key, data) {
const signatureType = enums.write(enums.signature, this.signatureType);
const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm);
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
const bytes = this.toSign(signatureType, data);
const trailer = this.calculateTrailer();
const toHash = this.toHash(data);
const hash = await stream.readToEnd(this.hash(data, toHash));
let mpicount = 0;
// Algorithm-Specific Fields for RSA signatures:
// - multiprecision number (MPI) of RSA signature value m**d mod n.
if (publicKeyAlgorithm > 0 && publicKeyAlgorithm < 4) {
mpicount = 1;
if (this.signedHashValue[0] !== hash[0] ||
this.signedHashValue[1] !== hash[1]) {
this.verified = false;
} else {
let mpicount = 0;
// Algorithm-Specific Fields for RSA signatures:
// - multiprecision number (MPI) of RSA signature value m**d mod n.
if (publicKeyAlgorithm > 0 && publicKeyAlgorithm < 4) {
mpicount = 1;
// Algorithm-Specific Fields for DSA, ECDSA, and EdDSA signatures:
// - MPI of DSA value r.
// - MPI of DSA value s.
} else if (publicKeyAlgorithm === enums.publicKey.dsa ||
publicKeyAlgorithm === enums.publicKey.ecdsa ||
publicKeyAlgorithm === enums.publicKey.eddsa) {
mpicount = 2;
// Algorithm-Specific Fields for DSA, ECDSA, and EdDSA signatures:
// - MPI of DSA value r.
// - MPI of DSA value s.
} else if (publicKeyAlgorithm === enums.publicKey.dsa ||
publicKeyAlgorithm === enums.publicKey.ecdsa ||
publicKeyAlgorithm === enums.publicKey.eddsa) {
mpicount = 2;
}
// EdDSA signature parameters are encoded in little-endian format
// https://tools.ietf.org/html/rfc8032#section-5.1.2
const endian = publicKeyAlgorithm === enums.publicKey.eddsa ? 'le' : 'be';
const mpi = [];
let i = 0;
for (let j = 0; j < mpicount; j++) {
mpi[j] = new type_mpi();
i += mpi[j].read(this.signature.subarray(i, this.signature.length), endian);
}
this.verified = await crypto.signature.verify(
publicKeyAlgorithm, hashAlgorithm, mpi, key.params,
toHash, hash
);
}
// EdDSA signature parameters are encoded in little-endian format
// https://tools.ietf.org/html/rfc8032#section-5.1.2
const endian = publicKeyAlgorithm === enums.publicKey.eddsa ? 'le' : 'be';
const mpi = [];
let i = 0;
for (let j = 0; j < mpicount; j++) {
mpi[j] = new type_mpi();
i += mpi[j].read(this.signature.subarray(i, this.signature.length), endian);
}
this.verified = await crypto.signature.verify(
publicKeyAlgorithm, hashAlgorithm, mpi, key.params,
util.concat([bytes, this.signatureData, trailer])
);
return this.verified;
};

View File

@ -56,7 +56,7 @@ function tee(input) {
teed[0].externalBuffer = teed[1].externalBuffer = input.externalBuffer;
return teed;
}
return [input, input];
return [subarray(input), subarray(input)];
}
function clone(input) {
@ -66,7 +66,7 @@ function clone(input) {
input.tee = teed[0].tee.bind(teed[0]);
return teed[1];
}
return input;
return subarray(input);
}
function subarray(input, begin=0, end=Infinity) {
@ -89,13 +89,14 @@ function subarray(input, begin=0, end=Infinity) {
}
});
}
return new ReadableStream({
pull: async controller => {
// TODO: Don't read entire stream into memory here.
controller.enqueue((await readToEnd(input)).subarray(begin, end));
controller.close();
}
});
// TODO: Don't read entire stream into memory here.
return fromAsync(async () => (await readToEnd(input)).subarray(begin, end));
}
if (util.isString(input)) {
return input.substr(begin, end);
}
if (input.externalBuffer) {
input = util.concat(input.externalBuffer.concat([input]));
}
return input.subarray(begin, end);
}
@ -107,6 +108,15 @@ async function readToEnd(input, join) {
return input;
}
function fromAsync(fn) {
return new ReadableStream({
pull: async controller => {
controller.enqueue(await fn());
controller.close();
}
});
}
/**
* Web / node stream conversion functions
@ -177,7 +187,7 @@ if (nodeStream) {
}
export default { concat, getReader, transform, clone, subarray, readToEnd, nodeToWeb, webToNode };
export default { concat, getReader, transform, clone, subarray, readToEnd, nodeToWeb, webToNode, fromAsync };
/*const readerAcquiredMap = new Map();
@ -189,7 +199,14 @@ ReadableStream.prototype.getReader = function() {
} else {
readerAcquiredMap.set(this, new Error('Reader for this ReadableStream already acquired here.'));
}
return _getReader.apply(this, arguments);
const _this = this;
const reader = _getReader.apply(this, arguments);
const _releaseLock = reader.releaseLock;
reader.releaseLock = function() {
readerAcquiredMap.delete(_this);
return _releaseLock.apply(this, arguments);
};
return reader;
};
const _tee = ReadableStream.prototype.tee;
@ -203,6 +220,7 @@ ReadableStream.prototype.tee = function() {
};*/
const doneReadingSet = new WeakSet();
function Reader(input) {
this.stream = input;
if (input.externalBuffer) {
@ -216,13 +234,17 @@ function Reader(input) {
}
let doneReading = false;
this._read = async () => {
if (doneReading) {
if (doneReading || doneReadingSet.has(input)) {
return { value: undefined, done: true };
}
doneReading = true;
return { value: input, done: false };
};
this._releaseLock = () => {};
this._releaseLock = () => {
if (doneReading) {
doneReadingSet.add(input);
}
};
}
Reader.prototype.read = async function() {

View File

@ -81,13 +81,17 @@ export default {
if (Object.prototype.isPrototypeOf(obj)) {
Object.entries(obj).forEach(([key, value]) => { // recursively search all children
if (util.isStream(value)) {
const reader = stream.getReader(value);
const { port1, port2 } = new MessageChannel();
port1.onmessage = async function() {
port1.postMessage(await reader.read());
};
obj[key] = port2;
collection.push(port2);
if (value.locked) {
obj[key] = null;
} else {
const reader = stream.getReader(value);
const { port1, port2 } = new MessageChannel();
port1.onmessage = async function() {
port1.postMessage(await reader.read());
};
obj[key] = port2;
collection.push(port2);
}
return;
}
util.collectTransferables(value, collection);

View File

@ -239,12 +239,12 @@ describe('API functional testing', function() {
//Originally we passed public and secret MPI separately, now they are joined. Is this what we want to do long term?
// RSA
return crypto.signature.sign(
1, 2, RSApubMPIs.concat(RSAsecMPIs), data
1, 2, RSApubMPIs.concat(RSAsecMPIs), data, crypto.hash.digest(2, data)
).then(RSAsignedData => {
const RSAsignedDataMPI = new openpgp.MPI();
RSAsignedDataMPI.read(RSAsignedData);
return crypto.signature.verify(
1, 2, [RSAsignedDataMPI], RSApubMPIs, data
1, 2, [RSAsignedDataMPI], RSApubMPIs, data, crypto.hash.digest(2, data)
).then(success => {
return expect(success).to.be.true;
});
@ -254,7 +254,7 @@ describe('API functional testing', function() {
it('DSA', function () {
// DSA
return crypto.signature.sign(
17, 2, DSApubMPIs.concat(DSAsecMPIs), data
17, 2, DSApubMPIs.concat(DSAsecMPIs), data, crypto.hash.digest(2, data)
).then(DSAsignedData => {
DSAsignedData = util.Uint8Array_to_str(DSAsignedData);
const DSAmsgMPIs = [];
@ -263,7 +263,7 @@ describe('API functional testing', function() {
DSAmsgMPIs[0].read(DSAsignedData.substring(0,34));
DSAmsgMPIs[1].read(DSAsignedData.substring(34,68));
return crypto.signature.verify(
17, 2, DSAmsgMPIs, DSApubMPIs, data
17, 2, DSAmsgMPIs, DSApubMPIs, data, crypto.hash.digest(2, data)
).then(success => {
return expect(success).to.be.true;
});

View File

@ -184,7 +184,8 @@ describe('Elliptic Curve Cryptography', function () {
it('Signature generation', function () {
const curve = new elliptic_curves.Curve('p256');
let key = curve.keyFromPrivate(key_data.p256.priv);
return key.sign(signature_data.message, 8).then(async signature => {
return key.sign(signature_data.message, 8).then(async ({ r, s }) => {
const signature = { r: new Uint8Array(r.toArray()), s: new Uint8Array(s.toArray()) };
key = curve.keyFromPublic(key_data.p256.pub);
await expect(
key.verify(signature_data.message, signature, 8)

View File

@ -705,6 +705,7 @@ describe("Packet", function() {
await msg[1].decrypt(msg[0].sessionKeyAlgorithm, msg[0].sessionKey);
const payload = msg[1].packets[0].packets;
await openpgp.stream.readToEnd(payload.stream, packets => packets.forEach(payload.push.bind(payload)));
await expect(payload[2].verify(
key[0], payload[1]

View File

@ -649,6 +649,43 @@ yYDnCgA=
});
});
it('Streaming verify signed message with trailing spaces from GPG', async function() {
const msg_armor =
`-----BEGIN PGP MESSAGE-----
Version: GnuPG v1
owGbwMvMyMT4oOW7S46CznTG01El3MUFicmpxbolqcUlUTev14K5Vgq8XGCGQmJe
ikJJYpKVAicvV16+QklRYmZOZl66AliWl0sBqBAkzQmmwKohBnAqdMxhYWRkYmBj
ZQIZy8DFKQCztusM8z+Vt/svG80IS/etn90utv/T16jquk69zPvp6t9F16ryrwpb
kfVlS5Xl38KnVYxWvIor0nao6WUczA4vvZX9TXPWnnW3tt1vbZoiqWUjYjjjhuKG
4DtmMTuL3TW6/zNzVfWp/Q11+71O8RGnXMsBvWM6mSqX75uLiPo6HRaUDHnvrfCP
yYDnCgA=
=15ki
-----END PGP MESSAGE-----`.split('');
const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t ';
const sMsg = await openpgp.message.readArmored(new ReadableStream({
async pull(controller) {
await new Promise(setTimeout);
controller.enqueue(msg_armor.shift());
if (!msg_armor.length) controller.close();
}
}));
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const keyids = sMsg.getSigningKeyIds();
expect(pubKey.getKeys(keyids[0])).to.not.be.empty;
return openpgp.verify({ publicKeys:[pubKey], message:sMsg }).then(async function(cleartextSig) {
expect(cleartextSig).to.exist;
expect(openpgp.util.nativeEOL(openpgp.util.Uint8Array_to_str(await openpgp.stream.readToEnd(cleartextSig.data)))).to.equal(plaintext);
expect(cleartextSig.signatures).to.have.length(1);
expect(cleartextSig.signatures[0].valid).to.be.true;
expect(cleartextSig.signatures[0].signature.packets.length).to.equal(1);
});
});
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures', async function() {
const plaintext = 'short message\nnext line\n한국어/조선말';
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];