auth/index.js

  1. /**
  2. * Authentication functions
  3. *
  4. * @namespace auth
  5. */
  6. const crypto = require('crypto')
  7. let subtle
  8. /* istanbul ignore next */
  9. if (typeof window !== 'undefined') {
  10. subtle = window.crypto.subtle
  11. } else {
  12. subtle = crypto.webcrypto.subtle
  13. }
  14. /**
  15. * Verify ISO 9798-2 2-Pass Unilateral Authentication
  16. *
  17. * @example
  18. * // setup multi-factor derived key
  19. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  20. * // challenger: create random challenge
  21. * const challenge = crypto.randomBytes(32)
  22. * const identity = Buffer.from('Challenger')
  23. * // responder: generate response
  24. * const response = await key.ISO97982PassUnilateralAuthSymmetric(challenge, identity)
  25. * // verifier: verify response
  26. * const authKey = await key.ISO9798SymmetricKey()
  27. * const valid = await mfkdf.auth.VerifyISO97982PassUnilateralAuthSymmetric(challenge, identity, response, authKey) // -> true
  28. *
  29. * @param {Buffer} challenge - The nonce value provided by the challenger
  30. * @param {Buffer} identity - The identity of the challenger
  31. * @param {Buffer} response - The response of the responder
  32. * @param {Buffer} key - The key used to authenticate
  33. * @returns {boolean} Whether the response is valid
  34. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  35. * @since 0.17.0
  36. * @memberOf auth
  37. * @async
  38. */
  39. async function VerifyISO97982PassUnilateralAuthSymmetric (challenge, identity, response, key) {
  40. const plaintext = Buffer.concat([challenge, identity])
  41. const iv = response.subarray(0, 16)
  42. const ct = response.subarray(16)
  43. const decipher = crypto.createDecipheriv('AES-256-CBC', key, iv)
  44. let decrypted
  45. try {
  46. decrypted = Buffer.concat([decipher.update(ct), decipher.final()])
  47. } catch (e) {
  48. return false
  49. }
  50. return (plaintext.toString('hex') === decrypted.toString('hex'))
  51. }
  52. module.exports.VerifyISO97982PassUnilateralAuthSymmetric = VerifyISO97982PassUnilateralAuthSymmetric
  53. /**
  54. * Verify ISO 9798-2 Public Key 2-Pass Unilateral Authentication
  55. *
  56. * @example
  57. * // setup multi-factor derived key
  58. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  59. *
  60. * // challenger: create random challenge
  61. * const challenge = crypto.randomBytes(32)
  62. * const identity = Buffer.from('Challenger')
  63. *
  64. * // responder: generate response
  65. * const response = await key.ISO97982PassUnilateralAuthAsymmetric(challenge, identity)
  66. *
  67. * // verifier: verify response
  68. * const authKey = await key.ISO9798AsymmetricKey()
  69. * const valid = await mfkdf.auth.VerifyISO97982PassUnilateralAuthAsymmetric(challenge, identity, response, authKey) // -> true
  70. *
  71. * @param {Buffer} challenge - The nonce value provided by the challenger
  72. * @param {Buffer} identity - The identity of the challenger
  73. * @param {Buffer} response - The response of the responder
  74. * @param {Buffer} key - The key used to authenticate
  75. * @returns {boolean} Whether the response is valid
  76. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  77. * @since 0.17.0
  78. * @memberOf auth
  79. * @async
  80. */
  81. async function VerifyISO97982PassUnilateralAuthAsymmetric (challenge, identity, response, key) {
  82. const plaintext = Buffer.concat([challenge, identity])
  83. const cryptoKey = await subtle.importKey('spki', key, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, false, ['verify'])
  84. return await subtle.verify({ name: 'RSASSA-PKCS1-v1_5' }, cryptoKey, response, plaintext)
  85. }
  86. module.exports.VerifyISO97982PassUnilateralAuthAsymmetric = VerifyISO97982PassUnilateralAuthAsymmetric
  87. /**
  88. * Verify ISO 9798-2 2-Pass Unilateral Authentication over CCF
  89. *
  90. * @example
  91. * // setup multi-factor derived key
  92. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  93. *
  94. * // challenger: create random challenge
  95. * const challenge = crypto.randomBytes(32)
  96. * const identity = Buffer.from('Challenger')
  97. *
  98. * // responder: generate response
  99. * const response = await key.ISO97982PassUnilateralAuthCCF(challenge, identity)
  100. *
  101. * // verifier: verify response
  102. * const authKey = await key.ISO9798CCFKey()
  103. * const valid = await mfkdf.auth.VerifyISO97982PassUnilateralAuthCCF(challenge, identity, response, authKey) // -> true
  104. *
  105. * @param {Buffer} challenge - The nonce value provided by the challenger
  106. * @param {Buffer} identity - The identity of the challenger
  107. * @param {Buffer} response - The response of the responder
  108. * @param {Buffer} key - The key used to authenticate
  109. * @returns {boolean} Whether the response is valid
  110. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  111. * @since 0.17.0
  112. * @memberOf auth
  113. * @async
  114. */
  115. async function VerifyISO97982PassUnilateralAuthCCF (challenge, identity, response, key) {
  116. const ct = Buffer.concat([challenge, identity, key])
  117. const hash = crypto.createHash('sha256').update(ct).digest()
  118. return (hash.toString('hex') === response.toString('hex'))
  119. }
  120. module.exports.VerifyISO97982PassUnilateralAuthCCF = VerifyISO97982PassUnilateralAuthCCF
  121. /**
  122. * Verify ISO 9798-2 1-Pass Unilateral Authentication
  123. *
  124. * @example
  125. * // setup multi-factor derived key
  126. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  127. * const identity = Buffer.from('Challenger')
  128. *
  129. * // responder: generate response
  130. * const response = await key.ISO97981PassUnilateralAuthSymmetric(identity)
  131. *
  132. * // verifier: verify response
  133. * const authKey = await key.ISO9798SymmetricKey()
  134. * const valid = await mfkdf.auth.VerifyISO97981PassUnilateralAuthSymmetric(identity, response, authKey) // -> true
  135. *
  136. * @param {Buffer} identity - The identity of the challenger
  137. * @param {Buffer} response - The response of the responder
  138. * @param {Buffer} key - The key used to authenticate
  139. * @param {number} [window=5] - The maximum time difference in seconds
  140. * @returns {boolean} Whether the response is valid
  141. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  142. * @since 0.17.0
  143. * @memberOf auth
  144. * @async
  145. */
  146. async function VerifyISO97981PassUnilateralAuthSymmetric (identity, response, key, window = 5) {
  147. const challenge = response.subarray(0, 4)
  148. const value = response.subarray(4)
  149. const actual = Math.floor(Date.now() / 1000)
  150. const observed = challenge.readUInt32BE(0)
  151. if (Math.abs(actual - observed) > window) return false
  152. return await VerifyISO97982PassUnilateralAuthSymmetric(challenge, identity, value, key)
  153. }
  154. module.exports.VerifyISO97981PassUnilateralAuthSymmetric = VerifyISO97981PassUnilateralAuthSymmetric
  155. /**
  156. * Verify ISO 9798-2 Public Key 1-Pass Unilateral Authentication
  157. *
  158. * @example
  159. * // setup multi-factor derived key
  160. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  161. * const identity = Buffer.from('Challenger')
  162. *
  163. * // responder: generate response
  164. * const response = await key.ISO97981PassUnilateralAuthAsymmetric(identity)
  165. *
  166. * // verifier: verify response
  167. * const authKey = await key.ISO9798AsymmetricKey()
  168. * const valid = await mfkdf.auth.VerifyISO97981PassUnilateralAuthAsymmetric(identity, response, authKey) // -> true
  169. *
  170. * @param {Buffer} identity - The identity of the challenger
  171. * @param {Buffer} response - The response of the responder
  172. * @param {Buffer} key - The key used to authenticate
  173. * @param {number} [window=5] - The maximum time difference in seconds
  174. * @returns {boolean} Whether the response is valid
  175. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  176. * @since 0.17.0
  177. * @memberOf auth
  178. * @async
  179. */
  180. async function VerifyISO97981PassUnilateralAuthAsymmetric (identity, response, key, window = 5) {
  181. const challenge = response.subarray(0, 4)
  182. const value = response.subarray(4)
  183. const actual = Math.floor(Date.now() / 1000)
  184. const observed = challenge.readUInt32BE(0)
  185. if (Math.abs(actual - observed) > window) return false
  186. return await VerifyISO97982PassUnilateralAuthAsymmetric(challenge, identity, value, key)
  187. }
  188. module.exports.VerifyISO97981PassUnilateralAuthAsymmetric = VerifyISO97981PassUnilateralAuthAsymmetric
  189. /**
  190. * Verify ISO 9798-2 1-Pass Unilateral Authentication over CCF
  191. *
  192. * @example
  193. * // setup multi-factor derived key
  194. * const key = await mfkdf.setup.key([ await mfkdf.setup.factors.password('password') ])
  195. * const identity = Buffer.from('Challenger')
  196. *
  197. * // responder: generate response
  198. * const response = await key.ISO97981PassUnilateralAuthCCF(identity)
  199. *
  200. * // verifier: verify response
  201. * const authKey = await key.ISO9798CCFKey()
  202. * const valid = await mfkdf.auth.VerifyISO97981PassUnilateralAuthCCF(identity, response, authKey) // -> true
  203. *
  204. * @param {Buffer} identity - The identity of the challenger
  205. * @param {Buffer} response - The response of the responder
  206. * @param {Buffer} key - The key used to authenticate
  207. * @param {number} [window=5] - The maximum time difference in seconds
  208. * @returns {boolean} Whether the response is valid
  209. * @author Vivek Nair (https://nair.me) <vivek@nair.me>
  210. * @since 0.17.0
  211. * @memberOf auth
  212. * @async
  213. */
  214. async function VerifyISO97981PassUnilateralAuthCCF (identity, response, key, window = 5) {
  215. const challenge = response.subarray(0, 4)
  216. const value = response.subarray(4)
  217. const actual = Math.floor(Date.now() / 1000)
  218. const observed = challenge.readUInt32BE(0)
  219. if (Math.abs(actual - observed) > window) return false
  220. return await VerifyISO97982PassUnilateralAuthCCF(challenge, identity, value, key)
  221. }
  222. module.exports.VerifyISO97981PassUnilateralAuthCCF = VerifyISO97981PassUnilateralAuthCCF