项目作者: PeculiarVentures

项目描述 :
A pure Typescript/Javascript implementation of XAdES based on XMLDSIGjs. (Keywords: WebCrypto, XMLDSIG, XADES, eIDAS, Trust List, X.509, CRL, OCSP)
高级语言: TypeScript
项目地址: git://github.com/PeculiarVentures/xadesjs.git
创建时间: 2016-03-23T04:43:21Z
项目社区:https://github.com/PeculiarVentures/xadesjs

开源协议:MIT License

下载


XAdESjs

license
CircleCI
Coverage Status
npm version

NPM

XAdES is short for “XML Advanced Electronic Signatures”, it is a superset of XMLDSIG. This library aims to provide an implementation of XAdES in Typescript/Javascript that is built on XMLDSIGjs.

Since it is based on XMLDSIGjs and that library uses Web Crypto for cryptographic operations it can be used both in browsers and in Node.js (when used with a polyfill like webcrypto, node-webcrypto-ossl or node-webcrypto-p11).

There are seven different profiles of XAdES, they are:

  • Basic Electronic Signature (XAdES-BES)
  • XAdES with Timestamp (XAdES-T)
  • XAdES with Complete Validation Data (XAdES-C)
  • XAdES with Extended Validation Data (XAdES-X)
  • XAdES with Extended Long Term Validation Data (XAdES-X-L)
  • XAdES with Archiving Validation Data (XAdES-A)
  • XAdES with Explicit policy electronic signatures (XAdES-EPES)

They differ slightly based on what is included in the signature:

Provides Digital Signature Includes Cryptographic Timestamp Includes Revocation References Includes Revocation Data Allows Secure Timestamp Countersignature
XAdES-BES Yes No No No No
XAdES-EPES Yes No No No No
XAdES-T Yes Yes No No No
XAdES-C Yes Yes Yes No No
XAdES-X Yes Yes Yes No No
XAdES-X-L Yes Yes Yes Yes No
XAdES-A Yes Yes Yes Yes Yes
  • Only XAdES-BES (in BOLD) is fully supported by XAdESjs. For the other variants can be created, decoded and verified but the caller must do the construction and policy to ensure compliant messages on their own.

INSTALLING

  1. npm install xadesjs

The npm module has a dist folder with the following files:

Name Size Description
index.js 105 Kb UMD module with external modules. Has comments
xades.js 803 Kb UMD bundle module. Has comments
xades.min.js 296 Kb minified UMD bundle module

There is also a lib folder with an ES2015 JS file which you can use with rollup bundler.

COMPATABILITY

CRYPTOGRAPHIC ALGORITHM SUPPORT

Name SHA1 SHA2-256 SHA2-384 SHA2-512
RSASSA-PKCS1-v1_5 X X X X
RSA-PSS X X X X
ECDSA X X X X
HMAC X X X X

CANONICALIZATION ALGORITHM SUPPORT

  • XmlDsigC14NTransform
  • XmlDsigC14NWithCommentsTransform
  • XmlDsigExcC14NTransform
  • XmlDsigExcC14NWithCommentsTransform
  • XmlDsigEnvelopedSignatureTransform
  • XmlDsigBase64Transform

PLATFORM SUPPORT

XAdESjs works with any browser that suppports Web Crypto. Since node does not have Web Crypto you will need a polyfill on this platform, for this reason the npm package includes webcrypto; browsers do not need this dependency and in those cases though it will be installed it will be ignored.

If you need to use a Hardware Security Module we have also created a polyfill for Web Crypto that supports PKCS #11. Our polyfill for this is node-webcrypto-p11.

To use node-webcrypto-ossl you need to specify you want to use it, that looks like this:

  1. var xadesjs = require("./built/xades.js");
  2. var { Crypto } = require("@peculiar/webcrypto");
  3. xadesjs.Application.setEngine("NodeJS", new Crypto());

The node-webcrypto-p11 polyfill will work the same way. The only difference is that you have to specify the details about your PKCS #11 device when you instansiate it:

  1. var xadesjs = require("./built/xades.js");
  2. var WebCrypto = require("node-webcrypto-p11").WebCrypto;
  3. xadesjs.Application.setEngine("PKCS11", new WebCrypto({
  4. library: "/path/to/pkcs11.so",
  5. name: "Name of PKCS11 lib",
  6. slot: 0,
  7. sessionFlags: 2 | 4, // RW_SESSION | SERIAL_SESSION
  8. pin: "token pin"
  9. }));

WARNING

Using XMLDSIG is a bit like running with scissors, that said it is needed for interoperability with a number of systems, for this reason, we have done this implementation.

Usage

Sign

  1. SignedXml.Sign(algorithm: Algorithm, key: CryptoKey, data: Document, options?: OptionsXAdES): PromiseLike<Signature>;

Parameters

Name Description
algorithm Signing Algorithm
key Signing Key
data XML document which must be signed
options Additional options

Options

  1. interface OptionsXAdES {
  2. /**
  3. * Public key for KeyInfo block
  4. */
  5. keyValue?: CryptoKey;
  6. /**
  7. * List of X509 Certificates
  8. */
  9. x509?: string[];
  10. /**
  11. * List of Reference
  12. * Default is Reference with hash alg SHA-256 and exc-c14n transform
  13. */
  14. references?: OptionsSignReference[];
  15. // Signed signature properties
  16. signingCertificate?: string;
  17. signingTime?: OptionsSigningTime;
  18. policy?: OptionsPolicyId;
  19. productionPlace?: OptionsProductionPlace;
  20. signerRole?: OptionsSignerRole;
  21. }
  22. interface OptionsSignReference {
  23. /**
  24. * Id of Reference
  25. */
  26. id?: string;
  27. uri?: string;
  28. /**
  29. * Hash algorithm
  30. */
  31. hash: AlgorithmIdentifier;
  32. /**
  33. * List of transforms
  34. */
  35. transforms?: OptionsSignTransform[];
  36. }
  37. type OptionsSignTransform = "enveloped" | "c14n" | "exc-c14n" | "c14n-com" | "exc-c14n-com" | "base64";
  38. interface OptionsSigningTime {
  39. value?: Date;
  40. format?: string;
  41. }
  42. interface OptionsSignerRole {
  43. claimed?: string[];
  44. certified?: string[];
  45. }
  46. interface OptionsProductionPlace {
  47. city?: string;
  48. state?: string;
  49. code?: string;
  50. country?: string;
  51. }
  52. interface OptionsPolicyId {
  53. }

Verify

  1. Verify(key?: CryptoKey): PromiseLike<boolean>;

Parameters

Name Description
key Verifying Key. Optional. If key not set it looks for keys in KeyInfo element of Signature.

EXAMPLES

Create XAdES-BES Signature

In Node

  1. var xadesjs = require("xadesjs");
  2. var { Crypto } = require("@peculiar/webcrypto");
  3. xadesjs.Application.setEngine("NodeJS", new Crypto());
  4. // Generate RSA key pair
  5. var privateKey, publicKey;
  6. xadesjs.Application.crypto.subtle.generateKey(
  7. {
  8. name: "RSASSA-PKCS1-v1_5",
  9. modulusLength: 1024, //can be 1024, 2048, or 4096,
  10. publicExponent: new Uint8Array([1, 0, 1]),
  11. hash: { name: "SHA-1" }, //can be "SHA-1", "SHA-256", "SHA-384", or "SHA-512"
  12. },
  13. false, //whether the key is extractable (i.e. can be used in exportKey)
  14. ["sign", "verify"] //can be any combination of "sign" and "verify"
  15. )
  16. .then(function (keyPair) {
  17. // Push ganerated keys to global variable
  18. privateKey = keyPair.privateKey;
  19. publicKey = keyPair.publicKey;
  20. // Call sign function
  21. var xmlString = '<player bats="left" id="10012" throws="right">\n\t<!-- Here\'s a comment -->\n\t<name>Alfonso Soriano</name>\n\t<position>2B</position>\n\t<team>New York Yankees</team>\n</player>';
  22. return SignXml(xmlString, keyPair, { name: "RSASSA-PKCS1-v1_5", hash: { name: "SHA-1" } });
  23. })
  24. .then(function (signedDocument) {
  25. console.log("Signed document:\n\n", signedDocument);
  26. })
  27. .catch(function (e) {
  28. console.error(e);
  29. });
  30. function SignXml(xmlString, keys, algorithm) {
  31. return Promise.resolve()
  32. .then(() => {
  33. var xmlDoc = xadesjs.Parse(xmlString);
  34. var signedXml = new xadesjs.SignedXml();
  35. return signedXml.Sign( // Signing document
  36. algorithm, // algorithm
  37. keys.privateKey, // key
  38. xmlDoc, // document
  39. { // options
  40. keyValue: keys.publicKey,
  41. references: [
  42. { hash: "SHA-256", transforms: ["enveloped"] }
  43. ],
  44. productionPlace: {
  45. country: "Country",
  46. state: "State",
  47. city: "City",
  48. code: "Code",
  49. },
  50. signingCertificate: "MIIGgTCCBGmgAwIBAgIUeaHFHm5f58zYv20JfspVJ3hossYwDQYJKoZIhvcNAQEFBQAwgZIxCzAJBgNVBAYTAk5MMSAwHgYDVQQKExdRdW9WYWRpcyBUcnVzdGxpbmsgQi5WLjEoMCYGA1UECxMfSXNzdWluZyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTE3MDUGA1UEAxMuUXVvVmFkaXMgRVUgSXNzdWluZyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBHMjAeFw0xMzEwMzAxMjI3MTFaFw0xNjEwMzAxMjI3MTFaMHoxCzAJBgNVBAYTAkJFMRAwDgYDVQQIEwdCcnVzc2VsMRIwEAYDVQQHEwlFdHRlcmJlZWsxHDAaBgNVBAoTE0V1cm9wZWFuIENvbW1pc3Npb24xFDASBgNVBAsTC0luZm9ybWF0aWNzMREwDwYDVQQDDAhFQ19ESUdJVDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJgkkqvJmZaknQC7c6H6LEr3dGtQ5IfOB3HAZZxOZbb8tdM1KMTO3sAifJC5HNFeIWd0727uZj+V5kBrUv36zEs+VxiN1yJBmcJznX4J2TCyPfLk2NRELGu65VwrK2Whp8cLLANc+6pQn/5wKh23ehZm21mLXcicZ8whksUGb/h8p6NDe1cElD6veNc9CwwK2QT0G0mQiEYchqjJkqyY8HEak8t+CbIC4Rrhyxh3HI1fCK0WKS9JjbPQFbvGmfpBZuLPYZYzP4UXIqfBVYctyodcSAnSfmy6tySMqpVSRhjRn4KP0EfHlq7Ec+H3nwuqxd0M4vTJlZm+XwYJBzEFzFsCAwEAAaOCAeQwggHgMFgGA1UdIARRME8wCAYGBACLMAECMEMGCisGAQQBvlgBgxAwNTAzBggrBgEFBQcCARYnaHR0cDovL3d3dy5xdW92YWRpc2dsb2JhbC5ubC9kb2N1bWVudGVuMCQGCCsGAQUFBwEDBBgwFjAKBggrBgEFBQcLAjAIBgYEAI5GAQEwdAYIKwYBBQUHAQEEaDBmMCoGCCsGAQUFBzABhh5odHRwOi8vb2NzcC5xdW92YWRpc2dsb2JhbC5jb20wOAYIKwYBBQUHMAKGLGh0dHA6Ly90cnVzdC5xdW92YWRpc2dsb2JhbC5jb20vcXZldWNhZzIuY3J0MEYGCiqGSIb3LwEBCQEEODA2AgEBhjFodHRwOi8vdHNhMDEucXVvdmFkaXNnbG9iYWwuY29tL1RTUy9IdHRwVHNwU2VydmVyMBMGCiqGSIb3LwEBCQIEBTADAgEBMA4GA1UdDwEB/wQEAwIGQDAfBgNVHSMEGDAWgBTg+A751LXyf0kjtsN5x6M1H4Z6iDA7BgNVHR8ENDAyMDCgLqAshipodHRwOi8vY3JsLnF1b3ZhZGlzZ2xvYmFsLmNvbS9xdmV1Y2FnMi5jcmwwHQYDVR0OBBYEFDc3hgIFJTDamDEeQczI7Lot4uaVMA0GCSqGSIb3DQEBBQUAA4ICAQAZ8EZ48RgPimWY6s4LjZf0M2MfVJmNh06Jzmf6fzwYtDtQLKzIDk8ZtosqYpNNBoZIFICMZguGRAP3kuxWvwANmrb5HqyCzXThZVPJTmKEzZNhsDtKu1almYBszqX1UV7IgZp+jBZ7FyXzXrXyF1tzXQxHGobDV3AEE8vdzEZtwDGpZJPnEPCBzifdY+lrrL2rDBjbv0VeildgOP1SIlL7dh1O9f0T6T4ioS6uSdMt6b/OWjqHadsSpKry0A6pqfOqJWAhDiueqgVB7vus6o6sSmfG4SW9EWW+BEZ510HjlQU/JL3PPmf+Xs8s00sm77LJ/T/1hMUuGp6TtDsJe+pPBpCYvpm6xu9GL20CsArFWUeQ2MSnE1jsrb00UniCKslcM63pU7I0VcnWMJQSNY28OmnFESPK6s6zqoN0ZMLhwCVnahi6pouBwTb10M9/Anla9xOT42qxiLr14S2lHy18aLiBSQ4zJKNLqKvIrkjewSfW+00VLBYbPTmtrHpZUWiCGiRS2SviuEmPVbdWvsBUaq7OMLIfBD4nin1FlmYnaG9TVmWkwVYDsFmQepwPDqjPs4efAxzkgUFHWn0gQFbqxRocKrCsOvCDHOHORA97UWcThmgvr0Jl7ipvP4Px//tRp08blfy4GMzYls5WF8f6JaMrNGmpfPasd9NbpBNp7A=="
  51. })
  52. })
  53. .then(signature => signature.toString());
  54. }

In the browser

  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4. <meta charset="utf-8" />
  5. <title>XADESJS Signature Sample</title>
  6. </head>
  7. <body>
  8. <pre id="signature"><code></code></pre>
  9. <script src="https://cdnjs.cloudflare.com/ajax/libs/babel-polyfill/7.7.0/polyfill.min.js"></script>
  10. <script src="https://cdnjs.cloudflare.com/ajax/libs/asmCrypto/2.3.2/asmcrypto.all.es5.min.js"></script>
  11. <script src="https://cdn.rawgit.com/indutny/elliptic/master/dist/elliptic.min.js"></script>
  12. <script src="https://unpkg.com/webcrypto-liner@1.1.2/build/webcrypto-liner.shim.min.js"></script>
  13. <script src="https://unpkg.com/xadesjs@2.0.16/build/xades.js"></script>
  14. <script type="text/javascript">
  15. // Generate RSA key pair
  16. var privateKey, publicKey;
  17. window.crypto.subtle.generateKey(
  18. {
  19. name: "ECDSA",
  20. namedCurve: "P-256"
  21. },
  22. false, //whether the key is extractable (i.e. can be used in exportKey)
  23. ["sign", "verify"] //can be any combination of "sign" and "verify"
  24. )
  25. .then(function (keyPair) {
  26. // Push ganerated keys to global variable
  27. privateKey = keyPair.privateKey;
  28. publicKey = keyPair.publicKey;
  29. // Call sign function
  30. var xmlString = '<player bats="left" id="10012" throws="right">\n\t<!-- Here\'s a comment -->\n\t<name>Alfonso Soriano</name>\n\t<position>2B</position>\n\t<team>New York Yankees</team>\n</player>';
  31. return SignXml(xmlString, keyPair, { name: "ECDSA", hash: { name: "SHA-1" } });
  32. })
  33. .then(function (signedDocument) {
  34. document.getElementById("signature").textContent = signedDocument;
  35. console.log("Signed document:\n\n", signedDocument);
  36. })
  37. .catch(function (e) {
  38. console.error(e);
  39. });
  40. function SignXml(xmlString, keys, algorithm) {
  41. var signedXml;
  42. return Promise.resolve()
  43. .then(() => {
  44. var xmlDoc = XAdES.Parse(xmlString);
  45. signedXml = new XAdES.SignedXml();
  46. return signedXml.Sign( // Signing document
  47. algorithm, // algorithm
  48. keys.privateKey, // key
  49. xmlDoc, // document
  50. { // options
  51. keyValue: keys.publicKey,
  52. references: [
  53. { hash: "SHA-256", transforms: ["enveloped"] }
  54. ],
  55. productionPlace: {
  56. country: "Country",
  57. state: "State",
  58. city: "City",
  59. code: "Code",
  60. },
  61. signerRole: {
  62. claimed: ["Some role"]
  63. }
  64. })
  65. })
  66. .then(() => signedXml.toString());
  67. }
  68. </script>
  69. </body>
  70. </html>

Check XAdES-BES Signature

In Node

  1. var XAdES = require("xadesjs");
  2. var { Crypto } = require("@peculiar/webcrypto");
  3. XAdES.Application.setEngine("NodeJS", new Crypto());
  4. var fs = require("fs");
  5. var xmlString = fs.readFileSync("some.xml","utf8");
  6. var signedDocument = XAdES.Parse(xmlString, "application/xml");
  7. var xmlSignature = signedDocument.getElementsByTagNameNS("http://www.w3.org/2000/09/xmldsig#", "Signature");
  8. var signedXml = new xadesjs.SignedXml(signedDocument);
  9. signedXml.LoadXml(xmlSignature[0]);
  10. signedXml.Verify()
  11. .then(res => {
  12. console.log((res ? "Valid" : "Invalid") + " signature");
  13. })
  14. .catch(function (e) {
  15. console.error(e);
  16. });

In the browser

  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4. <meta charset="utf-8" />
  5. <title>XADESJS Signature Sample</title>
  6. </head>
  7. <body>
  8. <pre id="signature"><code></code></pre>
  9. <script src="https://cdnjs.cloudflare.com/ajax/libs/babel-polyfill/7.7.0/polyfill.min.js"></script>
  10. <script src="https://cdnjs.cloudflare.com/ajax/libs/asmCrypto/2.3.2/asmcrypto.all.es5.min.js"></script>
  11. <script src="https://cdn.rawgit.com/indutny/elliptic/master/dist/elliptic.min.js"></script>
  12. <script src="https://unpkg.com/webcrypto-liner@1.1.2/build/webcrypto-liner.shim.min.js"></script>
  13. <script src="https://unpkg.com/xadesjs@2.0.16/build/xades.js"></script>
  14. <script type="text/javascript">
  15. "use strict";
  16. fetch("https://cdn.rawgit.com/PeculiarVentures/xadesjs/master/test/static/valid_signature.xml")
  17. .then(response => response.text())
  18. .then(body => {
  19. var xmlString = body;
  20. var signedDocument = XAdES.Parse(xmlString);
  21. var xmlSignature = signedDocument.getElementsByTagNameNS("http://www.w3.org/2000/09/xmldsig#", "Signature");
  22. var signedXml = new xadesjs.SignedXml(signedDocument);
  23. signedXml.LoadXml(xmlSignature[0]);
  24. signedXml.Verify()
  25. .then(function (signedDocument) {
  26. alert((res ? "Valid" : "Invalid") + " signature");
  27. })
  28. .catch(function (e) {
  29. alert(e.message);
  30. });
  31. })
  32. </script>
  33. </body>
  34. </html>

XAdES-EPES signature

  1. const fs = require("fs");
  2. var { Crypto } = require("@peculiar/webcrypto");
  3. const xadesjs = require("xadesjs");
  4. const { XMLSerializer } = require("xmldom");
  5. const crypto = new Crypto();
  6. xadesjs.Application.setEngine("NodeJS", );
  7. function preparePem(pem) {
  8. return pem
  9. // remove BEGIN/END
  10. .replace(/-----(BEGIN|END)[\w\d\s]+-----/g, "")
  11. // remove \r, \n
  12. .replace(/[\r\n]/g, "");
  13. }
  14. function pem2der(pem) {
  15. pem = preparePem(pem);
  16. // convert base64 to ArrayBuffer
  17. return new Uint8Array(Buffer.from(pem, "base64")).buffer;
  18. }
  19. async function main() {
  20. const hash = "SHA-256"
  21. const alg = {
  22. name: "RSASSA-PKCS1-v1_5",
  23. hash,
  24. }
  25. // Read cert
  26. const certPem = fs.readFileSync("cert.pem", { encoding: "utf8" });
  27. const certDer = pem2der(certPem);
  28. // Read key
  29. const keyPem = fs.readFileSync("key.pem", { encoding: "utf8" });
  30. const keyDer = pem2der(keyPem);
  31. const key = await crypto.subtle.importKey("pkcs8", keyDer, alg, false, ["sign"]);
  32. // XAdES-EPES
  33. var xmlString = `<Test><Document attr="Hello"></Document></Test>`;
  34. var xml = xadesjs.Parse(xmlString);
  35. var xadesXml = new xadesjs.SignedXml();
  36. const x509 = preparePem(certPem);
  37. const signature = await xadesXml.Sign( // Signing document
  38. alg, // algorithm
  39. key, // key
  40. xml, // document
  41. { // options
  42. references: [
  43. { hash, transforms: ["c14n", "enveloped"] }
  44. ],
  45. policy: {
  46. hash,
  47. identifier: {
  48. qualifier: "OIDAsURI",
  49. value: "quilifier.uri",
  50. },
  51. qualifiers: [
  52. {
  53. noticeRef: {
  54. organization: "PeculiarVentures",
  55. noticeNumbers: [1, 2, 3, 4, 5]
  56. }
  57. }
  58. ]
  59. },
  60. productionPlace: {
  61. country: "Russia",
  62. state: "Marij El",
  63. city: "Yoshkar-Ola",
  64. code: "424000",
  65. },
  66. signingCertificate: x509
  67. });
  68. // append signature
  69. xml.documentElement.appendChild(signature.GetXml());
  70. // serialize XML
  71. const oSerializer = new XMLSerializer();
  72. const sXML = oSerializer.serializeToString(xml);
  73. console.log(sXML.toString())
  74. }
  75. main()
  76. .catch((err) => {
  77. console.error(err);
  78. });

TESTING

In NodeJS:

  1. npm test

THANKS AND ACKNOWLEDGEMENT

This project takes inspiration (style, approach, design and code) from both the Mono System.Security.Cryptography.Xml implementation as well as xml-crypto.