Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
_pkcs11GenerateECKeyPair(pkcs11, pkcs11Session, pkcs11Token) {
// var ski = this._ski();
const privateKeyTemplate = [
// { type: pkcs11js.CKA_ID, value: ski },
{type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PRIVATE_KEY},
{type: pkcs11js.CKA_KEY_TYPE, value: pkcs11js.CKK_EC},
{type: pkcs11js.CKA_PRIVATE, value: this._pkcs11Login},
{type: pkcs11js.CKA_TOKEN, value: this._pkcs11Login && pkcs11Token},
{type: pkcs11js.CKA_SIGN, value: true},
{type: pkcs11js.CKA_DERIVE, value: true}
];
const publicKeyTemplate = [
// { type: pkcs11js.CKA_ID, value: ski },
{type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PUBLIC_KEY},
{type: pkcs11js.CKA_KEY_TYPE, value: pkcs11js.CKK_EC},
{type: pkcs11js.CKA_PRIVATE, value: false},
{type: pkcs11js.CKA_TOKEN, value: this._pkcs11Login && pkcs11Token},
{type: pkcs11js.CKA_VERIFY, value: true},
{
type: pkcs11js.CKA_EC_PARAMS,
value: Buffer.from(_pkcs11ParamsSizeToOid[this._keySize], 'hex')
}
];
/*
* Call PKCS11 API to generate the key pair.
// digestName: { v: pkcs11.CKA_NAME_HASH_ALGORITHM, t: TYPE_NUMBER },
checkValue: { v: pkcs11.CKA_CHECK_VALUE, t: TYPE_BUFFER },
keyType: { v: pkcs11.CKA_KEY_TYPE, t: TYPE_NUMBER },
subject: { v: pkcs11.CKA_SUBJECT, t: TYPE_BUFFER },
id: { v: pkcs11.CKA_ID, t: TYPE_BUFFER },
sensitive: { v: pkcs11.CKA_SENSITIVE, t: TYPE_BOOL },
encrypt: { v: pkcs11.CKA_ENCRYPT, t: TYPE_BOOL },
decrypt: { v: pkcs11.CKA_DECRYPT, t: TYPE_BOOL },
wrap: { v: pkcs11.CKA_WRAP, t: TYPE_BOOL },
unwrap: { v: pkcs11.CKA_UNWRAP, t: TYPE_BOOL },
sign: { v: pkcs11.CKA_SIGN, t: TYPE_BOOL },
signRecover: { v: pkcs11.CKA_SIGN_RECOVER, t: TYPE_BOOL },
verify: { v: pkcs11.CKA_VERIFY, t: TYPE_BOOL },
verifyRecover: { v: pkcs11.CKA_VERIFY_RECOVER, t: TYPE_BOOL },
derive: { v: pkcs11.CKA_DERIVE, t: TYPE_BOOL },
startDate: { v: pkcs11.CKA_START_DATE, t: TYPE_DATE },
endDate: { v: pkcs11.CKA_END_DATE, t: TYPE_DATE },
modulus: { v: pkcs11.CKA_MODULUS, t: TYPE_BUFFER },
modulusBits: { v: pkcs11.CKA_MODULUS_BITS, t: TYPE_NUMBER },
publicExponent: { v: pkcs11.CKA_PUBLIC_EXPONENT, t: TYPE_BUFFER },
privateExponent: { v: pkcs11.CKA_PRIVATE_EXPONENT, t: TYPE_BUFFER },
prime1: { v: pkcs11.CKA_PRIME_1, t: TYPE_BUFFER },
prime2: { v: pkcs11.CKA_PRIME_2, t: TYPE_BUFFER },
exp1: { v: pkcs11.CKA_EXPONENT_1, t: TYPE_BUFFER },
exp2: { v: pkcs11.CKA_EXPONENT_2, t: TYPE_BUFFER },
coefficient: { v: pkcs11.CKA_COEFFICIENT, t: TYPE_BUFFER },
prime: { v: pkcs11.CKA_PRIME, t: TYPE_BUFFER },
subprime: { v: pkcs11.CKA_SUBPRIME, t: TYPE_BUFFER },
base: { v: pkcs11.CKA_BASE, t: TYPE_BUFFER },
/* CKA_PRIME_BITS and CKA_SUB_PRIME_BITS are new for v2.11 */
it("#1", () => {
const privateTemplate = [
{ type: pkcs11.CKA_ID, value: new Buffer("1234567890") },
{ type: pkcs11.CKA_SIGN, value: true },
{ type: pkcs11.CKA_DERIVE, value: true },
];
const publicTemplate = [
{ type: pkcs11.CKA_ID, value: new Buffer("1234567890") },
{ type: pkcs11.CKA_EC_PARAMS, value: new Buffer("06082A8648CE3D030107", "hex") },
{ type: pkcs11.CKA_VERIFY, value: true },
{ type: pkcs11.CKA_DERIVE, value: true },
];
const keys = mod.C_GenerateKeyPair(session, { mechanism: pkcs11.CKM_ECDSA_KEY_PAIR_GEN, parameter: null }, publicTemplate, privateTemplate);
let attrs = mod.C_GetAttributeValue(session, keys.privateKey, [
{ type: pkcs11.CKA_TOKEN }
]);
});
});
it("#1", () => {
const privateTemplate = [
{ type: pkcs11.CKA_ID, value: new Buffer("1234567890") },
{ type: pkcs11.CKA_SIGN, value: true },
{ type: pkcs11.CKA_DERIVE, value: true },
];
const publicTemplate = [
{ type: pkcs11.CKA_ID, value: new Buffer("1234567890") },
{ type: pkcs11.CKA_EC_PARAMS, value: new Buffer("06082A8648CE3D030107", "hex") },
{ type: pkcs11.CKA_VERIFY, value: true },
{ type: pkcs11.CKA_DERIVE, value: true },
];
const keys = mod.C_GenerateKeyPair(session, { mechanism: pkcs11.CKM_ECDSA_KEY_PAIR_GEN, parameter: null }, publicTemplate, privateTemplate);
let attrs = mod.C_GetAttributeValue(session, keys.privateKey, [
{ type: pkcs11.CKA_TOKEN }
]);
});
});
ski: { v: pkcs11.CKA_HASH_OF_SUBJECT_PUBLIC_KEY, t: TYPE_BUFFER },
aki: { v: pkcs11.CKA_HASH_OF_ISSUER_PUBLIC_KEY, t: TYPE_BUFFER },
checkValue: { v: pkcs11.CKA_CHECK_VALUE, t: TYPE_BUFFER },
keyType: { v: pkcs11.CKA_KEY_TYPE, t: TYPE_NUMBER },
subject: { v: pkcs11.CKA_SUBJECT, t: TYPE_BUFFER },
id: { v: pkcs11.CKA_ID, t: TYPE_BUFFER },
sensitive: { v: pkcs11.CKA_SENSITIVE, t: TYPE_BOOL },
encrypt: { v: pkcs11.CKA_ENCRYPT, t: TYPE_BOOL },
decrypt: { v: pkcs11.CKA_DECRYPT, t: TYPE_BOOL },
wrap: { v: pkcs11.CKA_WRAP, t: TYPE_BOOL },
unwrap: { v: pkcs11.CKA_UNWRAP, t: TYPE_BOOL },
sign: { v: pkcs11.CKA_SIGN, t: TYPE_BOOL },
signRecover: { v: pkcs11.CKA_SIGN_RECOVER, t: TYPE_BOOL },
verify: { v: pkcs11.CKA_VERIFY, t: TYPE_BOOL },
verifyRecover: { v: pkcs11.CKA_VERIFY_RECOVER, t: TYPE_BOOL },
derive: { v: pkcs11.CKA_DERIVE, t: TYPE_BOOL },
startDate: { v: pkcs11.CKA_START_DATE, t: TYPE_DATE },
endDate: { v: pkcs11.CKA_END_DATE, t: TYPE_DATE },
modulus: { v: pkcs11.CKA_MODULUS, t: TYPE_BUFFER },
modulusBits: { v: pkcs11.CKA_MODULUS_BITS, t: TYPE_NUMBER },
publicExponent: { v: pkcs11.CKA_PUBLIC_EXPONENT, t: TYPE_BUFFER },
privateExponent: { v: pkcs11.CKA_PRIVATE_EXPONENT, t: TYPE_BUFFER },
prime1: { v: pkcs11.CKA_PRIME_1, t: TYPE_BUFFER },
prime2: { v: pkcs11.CKA_PRIME_2, t: TYPE_BUFFER },
exp1: { v: pkcs11.CKA_EXPONENT_1, t: TYPE_BUFFER },
exp2: { v: pkcs11.CKA_EXPONENT_2, t: TYPE_BUFFER },
coefficient: { v: pkcs11.CKA_COEFFICIENT, t: TYPE_BUFFER },
prime: { v: pkcs11.CKA_PRIME, t: TYPE_BUFFER },
subprime: { v: pkcs11.CKA_SUBPRIME, t: TYPE_BUFFER },
base: { v: pkcs11.CKA_BASE, t: TYPE_BUFFER },
primeBits: { v: pkcs11.CKA_PRIME_BITS, t: TYPE_NUMBER },
subprimeBits: { v: pkcs11.CKA_SUBPRIME_BITS, t: TYPE_NUMBER },