Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code

Side by Side Diff: lib/rsa.js

Issue 29375915: Issue 4878 - Start using ESLint for adblockpluscore (Closed)
Patch Set: Addressed Sebastian's initial feedback Created Feb. 21, 2017, 6:12 a.m.
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * This file is part of Adblock Plus <https://adblockplus.org/>, 2 * This file is part of Adblock Plus <https://adblockplus.org/>,
3 * Copyright (C) 2006-2016 Eyeo GmbH 3 * Copyright (C) 2006-2016 Eyeo GmbH
4 * 4 *
5 * Adblock Plus is free software: you can redistribute it and/or modify 5 * Adblock Plus is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 3 as 6 * it under the terms of the GNU General Public License version 3 as
7 * published by the Free Software Foundation. 7 * published by the Free Software Foundation.
8 * 8 *
9 * Adblock Plus is distributed in the hope that it will be useful, 9 * Adblock Plus is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details. 12 * GNU General Public License for more details.
13 * 13 *
14 * You should have received a copy of the GNU General Public License 14 * You should have received a copy of the GNU General Public License
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>.
16 */ 16 */
17 17
18 "use strict";
19
18 /** 20 /**
19 * This is a specialized RSA library meant only to verify SHA1-based signatures. 21 * This is a specialized RSA library meant only to verify SHA1-based signatures.
20 */ 22 */
21 23
22 let {BigInteger} = require("jsbn"); 24 let {BigInteger} = require("jsbn");
23 let Rusha = require("rusha"); 25 let Rusha = require("rusha");
24 26
25 let rusha = new Rusha(); 27 let rusha = new Rusha();
26 28
27 // Define ASN.1 templates for the data structures used 29 // Define ASN.1 templates for the data structures used
28 function seq() 30 function seq(...args)
29 { 31 {
30 return {type: 0x30, children: Array.prototype.slice.call(arguments)}; 32 return {type: 0x30, children: args};
31 } 33 }
32 function obj(id) 34 function obj(id)
33 { 35 {
34 return {type: 0x06, content: id}; 36 return {type: 0x06, content: id};
35 } 37 }
36 function bitStr(contents) 38 function bitStr(contents)
37 { 39 {
38 return {type: 0x03, encapsulates: contents}; 40 return {type: 0x03, encapsulates: contents};
39 } 41 }
40 function intResult(id) 42 function intResult(id)
41 { 43 {
42 return {type: 0x02, out: id}; 44 return {type: 0x02, out: id};
43 } 45 }
44 function octetResult(id) 46 function octetResult(id)
45 { 47 {
46 return {type: 0x04, out: id}; 48 return {type: 0x04, out: id};
47 } 49 }
48 50
49 // See http://www.cryptopp.com/wiki/Keys_and_Formats#RSA_PublicKey 51 // See http://www.cryptopp.com/wiki/Keys_and_Formats#RSA_PublicKey
50 // 2A 86 48 86 F7 0D 01 01 01 means 1.2.840.113549.1.1.1 52 // 2A 86 48 86 F7 0D 01 01 01 means 1.2.840.113549.1.1.1
51 var publicKeyTemplate = seq(seq(obj("\x2A\x86\x48\x86\xF7\x0D\x01\x01\x01"), {}) , bitStr(seq(intResult("n"), intResult("e")))); 53 let publicKeyTemplate = seq(
54 seq(obj("\x2A\x86\x48\x86\xF7\x0D\x01\x01\x01"), {}),
55 bitStr(seq(intResult("n"), intResult("e")))
56 );
52 57
53 // See http://tools.ietf.org/html/rfc3447#section-9.2 step 2 58 // See http://tools.ietf.org/html/rfc3447#section-9.2 step 2
54 // 2B 0E 03 02 1A means 1.3.14.3.2.26 59 // 2B 0E 03 02 1A means 1.3.14.3.2.26
55 var signatureTemplate = seq(seq(obj("\x2B\x0E\x03\x02\x1A"), {}), octetResult("s ha1")); 60 let signatureTemplate = seq(
61 seq(obj("\x2B\x0E\x03\x02\x1A"), {}),
62 octetResult("sha1")
63 );
56 64
57 /** 65 /**
58 * Reads ASN.1 data matching the template passed in. This will throw an 66 * Reads ASN.1 data matching the template passed in. This will throw an
59 * exception if the data format doesn't match the template. On success an 67 * exception if the data format doesn't match the template. On success an
60 * object containing result properties is returned. 68 * object containing result properties is returned.
61 * 69 * @see http://luca.ntop.org/Teaching/Appunti/asn1.html for info on the format.
62 * See http://luca.ntop.org/Teaching/Appunti/asn1.html for info on the format. 70 * @param {string} data
71 * @param {Object} templ
72 * @returns {Object}
63 */ 73 */
64 function readASN1(data, templ) 74 function readASN1(data, templ)
65 { 75 {
66 var pos = 0; 76 let pos = 0;
67 function next() 77 function next()
68 { 78 {
69 return data.charCodeAt(pos++); 79 return data.charCodeAt(pos++);
70 } 80 }
71 81
72 function readLength() 82 function readLength()
73 { 83 {
74 var len = next(); 84 let len = next();
75 if (len & 0x80) 85 if (len & 0x80)
76 { 86 {
77 var cnt = len & 0x7F; 87 let cnt = len & 0x7F;
78 if (cnt > 2 || cnt == 0) 88 if (cnt > 2 || cnt == 0)
79 throw "Unsupported length"; 89 throw "Unsupported length";
80 90
81 len = 0; 91 len = 0;
82 for (var i = 0; i < cnt; i++) 92 for (let i = 0; i < cnt; i++)
83 len += next() << (cnt - 1 - i) * 8; 93 len += next() << (cnt - 1 - i) * 8;
84 return len; 94 return len;
85 } 95 }
86 else 96 return len;
87 return len;
88 } 97 }
89 98
90 function readNode(curTempl) 99 function readNode(curTempl)
91 { 100 {
92 var type = next(); 101 let type = next();
93 var len = readLength(); 102 let len = readLength();
94 if ("type" in curTempl && curTempl.type != type) 103 if ("type" in curTempl && curTempl.type != type)
95 throw "Unexpected type"; 104 throw "Unexpected type";
96 if ("content" in curTempl && curTempl.content != data.substr(pos, len)) 105 if ("content" in curTempl && curTempl.content != data.substr(pos, len))
97 throw "Unexpected content"; 106 throw "Unexpected content";
98 if ("out" in curTempl) 107 if ("out" in curTempl)
99 out[curTempl.out] = new BigInteger(data.substr(pos, len), 256); 108 out[curTempl.out] = new BigInteger(data.substr(pos, len), 256);
100 if ("children" in curTempl) 109 if ("children" in curTempl)
101 { 110 {
102 var i, end; 111 let i;
112 let end;
Sebastian Noack 2017/02/21 09:19:31 These variables aren't used outside of the loop, s
kzar 2017/02/21 10:37:02 They are used outside of the loop.
103 for (i = 0, end = pos + len; pos < end; i++) 113 for (i = 0, end = pos + len; pos < end; i++)
104 { 114 {
105 if (i >= curTempl.children.length) 115 if (i >= curTempl.children.length)
106 throw "Too many children"; 116 throw "Too many children";
107 readNode(curTempl.children[i]); 117 readNode(curTempl.children[i]);
108 } 118 }
109 if (i < curTempl.children.length) 119 if (i < curTempl.children.length)
110 throw "Too few children"; 120 throw "Too few children";
111 if (pos > end) 121 if (pos > end)
112 throw "Children too large"; 122 throw "Children too large";
113 } 123 }
114 else if ("encapsulates" in curTempl) 124 else if ("encapsulates" in curTempl)
115 { 125 {
116 if (next() != 0) 126 if (next() != 0)
117 throw "Encapsulation expected"; 127 throw "Encapsulation expected";
118 readNode(curTempl.encapsulates); 128 readNode(curTempl.encapsulates);
119 } 129 }
120 else 130 else
121 pos += len; 131 pos += len;
122 } 132 }
123 133
124 var out = {}; 134 let out = {};
125 readNode(templ); 135 readNode(templ);
126 if (pos != data.length) 136 if (pos != data.length)
127 throw "Too much data"; 137 throw "Too much data";
128 return out; 138 return out;
129 } 139 }
130 140
131 /** 141 /**
132 * Reads a BER-encoded RSA public key. On success returns an object with the 142 * Reads a BER-encoded RSA public key. On success returns an object with the
133 * properties n and e (the components of the key), otherwise null. 143 * properties n and e (the components of the key), otherwise null.
144 * @param {string} key
145 * @return {Object|null}
134 */ 146 */
135 function readPublicKey(key) 147 function readPublicKey(key)
136 { 148 {
137 try 149 try
138 { 150 {
139 return readASN1(atob(key), publicKeyTemplate); 151 return readASN1(atob(key), publicKeyTemplate);
140 } 152 }
141 catch (e) 153 catch (e)
142 { 154 {
143 console.log("Invalid RSA public key: " + e); 155 console.warn("Invalid RSA public key: " + e);
144 return null; 156 return null;
145 } 157 }
146 } 158 }
147 159
148 /** 160 /**
149 * Checks whether the signature is valid for the given public key and data. 161 * Checks whether the signature is valid for the given public key and data.
162 * @param {string} key
163 * @param {string} signature
164 * @param {string} data
165 * @return {boolean}
150 */ 166 */
151 function verifySignature(key, signature, data) 167 function verifySignature(key, signature, data)
152 { 168 {
153 var keyData = readPublicKey(key); 169 let keyData = readPublicKey(key);
154 if (!keyData) 170 if (!keyData)
155 return false; 171 return false;
156 172
157 // We need the exponent as regular number 173 // We need the exponent as regular number
158 keyData.e = parseInt(keyData.e.toString(16), 16); 174 keyData.e = parseInt(keyData.e.toString(16), 16);
159 175
160 // Decrypt signature data using RSA algorithm 176 // Decrypt signature data using RSA algorithm
161 var sigInt = new BigInteger(atob(signature), 256); 177 let sigInt = new BigInteger(atob(signature), 256);
162 var digest = sigInt.modPowInt(keyData.e, keyData.n).toString(256); 178 let digest = sigInt.modPowInt(keyData.e, keyData.n).toString(256);
163 179
164 try 180 try
165 { 181 {
166 var pos = 0; 182 let pos = 0;
167 function next() 183 let next = () => digest.charCodeAt(pos++);
168 {
169 return digest.charCodeAt(pos++);
170 }
171 184
172 // Skip padding, see http://tools.ietf.org/html/rfc3447#section-9.2 step 5 185 // Skip padding, see http://tools.ietf.org/html/rfc3447#section-9.2 step 5
173 if (next() != 1) 186 if (next() != 1)
174 throw "Wrong padding in signature digest"; 187 throw "Wrong padding in signature digest";
175 while (next() == 255) {} 188 while (next() == 255)
189 {
190 // Empty
Sebastian Noack 2017/02/21 09:19:31 I start to wonder what's the point of the no-empty
kzar 2017/02/21 10:37:01 Done. https://codereview.adblockplus.org/29376719/
191 }
176 if (digest.charCodeAt(pos - 1) != 0) 192 if (digest.charCodeAt(pos - 1) != 0)
177 throw "Wrong padding in signature digest"; 193 throw "Wrong padding in signature digest";
178 194
179 // Rest is an ASN.1 structure, get the SHA1 hash from it and compare to 195 // Rest is an ASN.1 structure, get the SHA1 hash from it and compare to
180 // the real one 196 // the real one
181 var sha1 = readASN1(digest.substr(pos), signatureTemplate).sha1; 197 let {sha1} = readASN1(digest.substr(pos), signatureTemplate);
182 var expected = new BigInteger(rusha.digest(data), 16); 198 let expected = new BigInteger(rusha.digest(data), 16);
183 return (sha1.compareTo(expected) == 0); 199 return (sha1.compareTo(expected) == 0);
184 } 200 }
185 catch (e) 201 catch (e)
186 { 202 {
187 console.log("Invalid encrypted signature: " + e); 203 console.warn("Invalid encrypted signature: " + e);
188 return false; 204 return false;
189 } 205 }
190 } 206 }
191 exports.verifySignature = verifySignature; 207 exports.verifySignature = verifySignature;
OLDNEW

Powered by Google App Engine
This is Rietveld