Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
attrTypes: { v: pkcs11.CKA_ATTR_TYPES, t: TYPE_BUFFER },
/* CKA_TRUSTED is new for v2.11 */
trusted: { v: pkcs11.CKA_TRUSTED, t: TYPE_BOOL },
/* CKA_CERTIFICATE_CATEGORY ...
* CKA_CHECK_VALUE are new for v2.20 */
certCategory: { v: pkcs11.CKA_CERTIFICATE_CATEGORY, t: TYPE_NUMBER },
javaDomain: { v: pkcs11.CKA_JAVA_MIDP_SECURITY_DOMAIN, t: TYPE_NUMBER },
url: { v: pkcs11.CKA_URL, t: TYPE_STRING },
ski: { v: pkcs11.CKA_HASH_OF_SUBJECT_PUBLIC_KEY, t: TYPE_BUFFER },
aki: { v: pkcs11.CKA_HASH_OF_ISSUER_PUBLIC_KEY, t: TYPE_BUFFER },
// digestName: { v: pkcs11.CKA_NAME_HASH_ALGORITHM, t: TYPE_NUMBER },
checkValue: { v: pkcs11.CKA_CHECK_VALUE, t: TYPE_BUFFER },
keyType: { v: pkcs11.CKA_KEY_TYPE, t: TYPE_NUMBER },
subject: { v: pkcs11.CKA_SUBJECT, t: TYPE_BUFFER },
id: { v: pkcs11.CKA_ID, t: TYPE_BUFFER },
sensitive: { v: pkcs11.CKA_SENSITIVE, t: TYPE_BOOL },
encrypt: { v: pkcs11.CKA_ENCRYPT, t: TYPE_BOOL },
decrypt: { v: pkcs11.CKA_DECRYPT, t: TYPE_BOOL },
wrap: { v: pkcs11.CKA_WRAP, t: TYPE_BOOL },
unwrap: { v: pkcs11.CKA_UNWRAP, t: TYPE_BOOL },
sign: { v: pkcs11.CKA_SIGN, t: TYPE_BOOL },
signRecover: { v: pkcs11.CKA_SIGN_RECOVER, t: TYPE_BOOL },
verify: { v: pkcs11.CKA_VERIFY, t: TYPE_BOOL },
verifyRecover: { v: pkcs11.CKA_VERIFY_RECOVER, t: TYPE_BOOL },
derive: { v: pkcs11.CKA_DERIVE, t: TYPE_BOOL },
startDate: { v: pkcs11.CKA_START_DATE, t: TYPE_DATE },
endDate: { v: pkcs11.CKA_END_DATE, t: TYPE_DATE },
modulus: { v: pkcs11.CKA_MODULUS, t: TYPE_BUFFER },
modulusBits: { v: pkcs11.CKA_MODULUS_BITS, t: TYPE_NUMBER },
_pkcs11FindObjects(pkcs11, pkcs11Session, pkcs11Template) {
pkcs11.C_FindObjectsInit(pkcs11Session, pkcs11Template);
const objs = [];
let obj = pkcs11.C_FindObjects(pkcs11Session);
while (obj) {
const objectTemplate = [
{type: pkcs11js.CKA_CLASS},
{type: pkcs11js.CKA_KEY_TYPE},
{type: pkcs11js.CKA_PRIVATE},
{type: pkcs11js.CKA_TOKEN},
{type: pkcs11js.CKA_ID}
];
logger.debug(__func() + 'obj: ' + util.inspect(obj, {depth: null}));
logger.debug(__func() + 'attr: ' +
util.inspect(this._pkcs11GetAttributeValue(pkcs11, pkcs11Session, obj, objectTemplate)));
objs.push(obj);
obj = pkcs11.C_FindObjects(pkcs11Session);
}
pkcs11.C_FindObjectsFinal(pkcs11Session);
return objs;
}
_pkcs11GenerateKey(pkcs11, pkcs11Session, pkcs11Token) {
const ski = this._ski();
const secretKeyTemplate = [
{type: pkcs11js.CKA_ID, value: ski},
{type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_SECRET_KEY},
{type: pkcs11js.CKA_KEY_TYPE, value: pkcs11js.CKK_AES},
{type: pkcs11js.CKA_VALUE_LEN, value: this._keySize / 8},
{type: pkcs11js.CKA_ENCRYPT, value: true},
{type: pkcs11js.CKA_DECRYPT, value: true},
/*
* If user is logged in:
* - key will be private
* - key will be non-ephemeral by user request
* If user is not logged in:
* - key will be public
* - key will be ephermal regardless of user request
*
* Note that public and private here means publically and privately
* accessible, respectively, and has nothing to do with public and
* private key pair.
*/
{type: pkcs11js.CKA_PRIVATE, value: this._pkcs11Login},
value: { v: pkcs11.CKA_VALUE, t: TYPE_BUFFER },
objectId: { v: pkcs11.CKA_OBJECT_ID, t: TYPE_BUFFER },
certType: { v: pkcs11.CKA_CERTIFICATE_TYPE, t: TYPE_NUMBER },
issuer: { v: pkcs11.CKA_ISSUER, t: TYPE_BUFFER },
serial: { v: pkcs11.CKA_SERIAL_NUMBER, t: TYPE_BUFFER },
issuerAC: { v: pkcs11.CKA_AC_ISSUER, t: TYPE_BUFFER },
owner: { v: pkcs11.CKA_OWNER, t: TYPE_BUFFER },
attrTypes: { v: pkcs11.CKA_ATTR_TYPES, t: TYPE_BUFFER },
trusted: { v: pkcs11.CKA_TRUSTED, t: TYPE_BOOL },
certCategory: { v: pkcs11.CKA_CERTIFICATE_CATEGORY, t: TYPE_NUMBER },
javaDomain: { v: pkcs11.CKA_JAVA_MIDP_SECURITY_DOMAIN, t: TYPE_NUMBER },
url: { v: pkcs11.CKA_URL, t: TYPE_STRING },
ski: { v: pkcs11.CKA_HASH_OF_SUBJECT_PUBLIC_KEY, t: TYPE_BUFFER },
aki: { v: pkcs11.CKA_HASH_OF_ISSUER_PUBLIC_KEY, t: TYPE_BUFFER },
checkValue: { v: pkcs11.CKA_CHECK_VALUE, t: TYPE_BUFFER },
keyType: { v: pkcs11.CKA_KEY_TYPE, t: TYPE_NUMBER },
subject: { v: pkcs11.CKA_SUBJECT, t: TYPE_BUFFER },
id: { v: pkcs11.CKA_ID, t: TYPE_BUFFER },
sensitive: { v: pkcs11.CKA_SENSITIVE, t: TYPE_BOOL },
encrypt: { v: pkcs11.CKA_ENCRYPT, t: TYPE_BOOL },
decrypt: { v: pkcs11.CKA_DECRYPT, t: TYPE_BOOL },
wrap: { v: pkcs11.CKA_WRAP, t: TYPE_BOOL },
unwrap: { v: pkcs11.CKA_UNWRAP, t: TYPE_BOOL },
sign: { v: pkcs11.CKA_SIGN, t: TYPE_BOOL },
signRecover: { v: pkcs11.CKA_SIGN_RECOVER, t: TYPE_BOOL },
verify: { v: pkcs11.CKA_VERIFY, t: TYPE_BOOL },
verifyRecover: { v: pkcs11.CKA_VERIFY_RECOVER, t: TYPE_BOOL },
derive: { v: pkcs11.CKA_DERIVE, t: TYPE_BOOL },
startDate: { v: pkcs11.CKA_START_DATE, t: TYPE_DATE },
endDate: { v: pkcs11.CKA_END_DATE, t: TYPE_DATE },
modulus: { v: pkcs11.CKA_MODULUS, t: TYPE_BUFFER },
modulusBits: { v: pkcs11.CKA_MODULUS_BITS, t: TYPE_NUMBER },