mirror of
https://github.com/kmc7468/arkvault.git
synced 2025-12-14 22:08:45 +00:00
클라이언트 승인 대기 페이지 구현
This commit is contained in:
@@ -10,7 +10,7 @@ interface KeyExportState {
|
|||||||
signKeyBase64: string;
|
signKeyBase64: string;
|
||||||
verifyKeyBase64: string;
|
verifyKeyBase64: string;
|
||||||
|
|
||||||
mekDraft: ArrayBuffer;
|
masterKeyWrapped: ArrayBuffer;
|
||||||
}
|
}
|
||||||
|
|
||||||
const useAutoNull = <T>(value: T | null) => {
|
const useAutoNull = <T>(value: T | null) => {
|
||||||
|
|||||||
@@ -1,26 +1,36 @@
|
|||||||
import { Dexie, type EntityTable } from "dexie";
|
import { Dexie, type EntityTable } from "dexie";
|
||||||
|
|
||||||
type RSAKeyUsage = "encrypt" | "decrypt" | "sign" | "verify";
|
type ClientKeyUsage = "encrypt" | "decrypt" | "sign" | "verify";
|
||||||
|
|
||||||
interface RSAKey {
|
interface ClientKey {
|
||||||
usage: RSAKeyUsage;
|
usage: ClientKeyUsage;
|
||||||
|
key: CryptoKey;
|
||||||
|
}
|
||||||
|
|
||||||
|
type MasterKeyState = "active" | "retired";
|
||||||
|
|
||||||
|
interface MasterKey {
|
||||||
|
version: number;
|
||||||
|
state: MasterKeyState;
|
||||||
key: CryptoKey;
|
key: CryptoKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
const keyStore = new Dexie("keyStore") as Dexie & {
|
const keyStore = new Dexie("keyStore") as Dexie & {
|
||||||
rsaKey: EntityTable<RSAKey, "usage">;
|
clientKey: EntityTable<ClientKey, "usage">;
|
||||||
|
masterKey: EntityTable<MasterKey, "version">;
|
||||||
};
|
};
|
||||||
|
|
||||||
keyStore.version(1).stores({
|
keyStore.version(1).stores({
|
||||||
rsaKey: "usage",
|
clientKey: "usage",
|
||||||
|
masterKey: "version",
|
||||||
});
|
});
|
||||||
|
|
||||||
export const getRSAKey = async (usage: RSAKeyUsage) => {
|
export const getClientKey = async (usage: ClientKeyUsage) => {
|
||||||
const key = await keyStore.rsaKey.get(usage);
|
const key = await keyStore.clientKey.get(usage);
|
||||||
return key?.key ?? null;
|
return key?.key ?? null;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const storeRSAKey = async (key: CryptoKey, usage: RSAKeyUsage) => {
|
export const storeClientKey = async (key: CryptoKey, usage: ClientKeyUsage) => {
|
||||||
switch (usage) {
|
switch (usage) {
|
||||||
case "encrypt":
|
case "encrypt":
|
||||||
case "verify":
|
case "verify":
|
||||||
@@ -39,5 +49,16 @@ export const storeRSAKey = async (key: CryptoKey, usage: RSAKeyUsage) => {
|
|||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
await keyStore.rsaKey.put({ usage, key });
|
await keyStore.clientKey.put({ usage, key });
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getMasterKeys = async () => {
|
||||||
|
return await keyStore.masterKey.toArray();
|
||||||
|
};
|
||||||
|
|
||||||
|
export const storeMasterKeys = async (keys: MasterKey[]) => {
|
||||||
|
if (keys.some(({ key }) => key.extractable)) {
|
||||||
|
throw new Error("Master keys must be non-extractable");
|
||||||
|
}
|
||||||
|
await keyStore.masterKey.bulkPut(keys);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ export const generateRSAKeyPair = async (purpose: RSAKeyPurpose) => {
|
|||||||
hash: "SHA-256",
|
hash: "SHA-256",
|
||||||
} satisfies RsaHashedKeyGenParams,
|
} satisfies RsaHashedKeyGenParams,
|
||||||
true,
|
true,
|
||||||
purpose === "encryption" ? ["encrypt", "decrypt"] : ["sign", "verify"],
|
purpose === "encryption" ? ["encrypt", "decrypt", "wrapKey", "unwrapKey"] : ["sign", "verify"],
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -101,6 +101,33 @@ export const exportAESKey = async (key: CryptoKey) => {
|
|||||||
return await window.crypto.subtle.exportKey("raw", key);
|
return await window.crypto.subtle.exportKey("raw", key);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const wrapAESKeyUsingRSA = async (aesKey: CryptoKey, rsaPublicKey: CryptoKey) => {
|
||||||
|
return await window.crypto.subtle.wrapKey("raw", aesKey, rsaPublicKey, {
|
||||||
|
name: "RSA-OAEP",
|
||||||
|
} satisfies RsaOaepParams);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const unwrapAESKeyUsingRSA = async (wrappedKey: BufferSource, rsaPrivateKey: CryptoKey) => {
|
||||||
|
return await window.crypto.subtle.unwrapKey(
|
||||||
|
"raw",
|
||||||
|
wrappedKey,
|
||||||
|
rsaPrivateKey,
|
||||||
|
{
|
||||||
|
name: "RSA-OAEP",
|
||||||
|
} satisfies RsaOaepParams,
|
||||||
|
{
|
||||||
|
name: "AES-GCM",
|
||||||
|
length: 256,
|
||||||
|
} satisfies AesKeyGenParams,
|
||||||
|
true,
|
||||||
|
["encrypt", "decrypt"],
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const digestSHA256 = async (data: BufferSource) => {
|
||||||
|
return await window.crypto.subtle.digest("SHA-256", data);
|
||||||
|
};
|
||||||
|
|
||||||
export const signRequest = async <T>(data: T, privateKey: CryptoKey) => {
|
export const signRequest = async <T>(data: T, privateKey: CryptoKey) => {
|
||||||
const dataBuffer = new TextEncoder().encode(JSON.stringify(data));
|
const dataBuffer = new TextEncoder().encode(JSON.stringify(data));
|
||||||
const signature = await signRSAMessage(dataBuffer, privateKey);
|
const signature = await signRSAMessage(dataBuffer, privateKey);
|
||||||
|
|||||||
@@ -7,5 +7,11 @@ export interface ClientKeys {
|
|||||||
verifyKey: CryptoKey;
|
verifyKey: CryptoKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export interface MasterKey {
|
||||||
|
state: "active" | "retired" | "dead";
|
||||||
|
masterKey: CryptoKey;
|
||||||
|
}
|
||||||
|
|
||||||
export const clientKeyStore = writable<ClientKeys | null>(null);
|
export const clientKeyStore = writable<ClientKeys | null>(null);
|
||||||
export const mekStore = writable<Map<number, CryptoKey>>(new Map());
|
|
||||||
|
export const masterKeyStore = writable<Map<number, MasterKey> | null>(null);
|
||||||
|
|||||||
64
src/routes/(fullscreen)/client/pending/+page.svelte
Normal file
64
src/routes/(fullscreen)/client/pending/+page.svelte
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
<script lang="ts">
|
||||||
|
import { goto } from "$app/navigation";
|
||||||
|
import { TitleDiv } from "$lib/components/divs";
|
||||||
|
import { clientKeyStore, masterKeyStore } from "$lib/stores";
|
||||||
|
import { generateEncryptKeyFingerprint, requestMasterKeyDownload } from "./service";
|
||||||
|
|
||||||
|
import IconFingerprint from "~icons/material-symbols/fingerprint";
|
||||||
|
|
||||||
|
let { data } = $props();
|
||||||
|
|
||||||
|
let fingerprint = $derived(
|
||||||
|
$clientKeyStore ? generateEncryptKeyFingerprint($clientKeyStore.encryptKey) : undefined,
|
||||||
|
);
|
||||||
|
|
||||||
|
$effect(() => {
|
||||||
|
if ($masterKeyStore) {
|
||||||
|
goto(data.redirectPath);
|
||||||
|
} else if ($clientKeyStore) {
|
||||||
|
requestMasterKeyDownload($clientKeyStore.decryptKey).then(async (ok) => {
|
||||||
|
if (ok) {
|
||||||
|
return await goto(data.redirectPath);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
});
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<svetle:head>
|
||||||
|
<title>승인을 기다리고 있어요.</title>
|
||||||
|
</svetle:head>
|
||||||
|
|
||||||
|
<div class="flex h-full flex-col">
|
||||||
|
<TitleDiv>
|
||||||
|
<div class="flex flex-col gap-y-2">
|
||||||
|
<h1 class="text-3xl font-bold">승인을 기다리고 있어요.</h1>
|
||||||
|
<p>
|
||||||
|
회원님의 다른 디바이스에서 이 디바이스의 데이터 접근을 승인해야 서비스를 이용할 수 있어요.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div class="my-4 flex flex-col gap-y-2">
|
||||||
|
<div>
|
||||||
|
<IconFingerprint class="mx-auto text-7xl" />
|
||||||
|
<p class="text-center text-xl font-bold text-primary-500">암호 키 지문</p>
|
||||||
|
</div>
|
||||||
|
<div class="rounded-2xl bg-gray-100 p-4">
|
||||||
|
<p class="text-center text-2xl font-medium text-gray-800">
|
||||||
|
{#if !fingerprint}
|
||||||
|
지문 생성하는 중...
|
||||||
|
{:else}
|
||||||
|
{#await fingerprint}
|
||||||
|
지문 생성하는 중...
|
||||||
|
{:then fingerprint}
|
||||||
|
{fingerprint}
|
||||||
|
{/await}
|
||||||
|
{/if}
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<p class="text-center">
|
||||||
|
암호 키 지문은 디바이스마다 다르게 생성돼요. <br />
|
||||||
|
지문이 일치하는지 확인 후 승인해 주세요.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
</TitleDiv>
|
||||||
|
</div>
|
||||||
6
src/routes/(fullscreen)/client/pending/+page.ts
Normal file
6
src/routes/(fullscreen)/client/pending/+page.ts
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
import type { PageLoad } from "./$types";
|
||||||
|
|
||||||
|
export const load: PageLoad = async ({ url }) => {
|
||||||
|
const redirectPath = url.searchParams.get("redirect") || "/";
|
||||||
|
return { redirectPath };
|
||||||
|
};
|
||||||
53
src/routes/(fullscreen)/client/pending/service.ts
Normal file
53
src/routes/(fullscreen)/client/pending/service.ts
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
import { callAPI } from "$lib/hooks";
|
||||||
|
import { storeMasterKeys } from "$lib/indexedDB";
|
||||||
|
import {
|
||||||
|
decodeFromBase64,
|
||||||
|
exportRSAKey,
|
||||||
|
makeAESKeyNonextractable,
|
||||||
|
unwrapAESKeyUsingRSA,
|
||||||
|
digestSHA256,
|
||||||
|
} from "$lib/modules/crypto";
|
||||||
|
import { masterKeyStore } from "$lib/stores";
|
||||||
|
|
||||||
|
export const generateEncryptKeyFingerprint = async (encryptKey: CryptoKey) => {
|
||||||
|
const { key } = await exportRSAKey(encryptKey);
|
||||||
|
const digest = await digestSHA256(key);
|
||||||
|
return Array.from(new Uint8Array(digest))
|
||||||
|
.map((byte) => byte.toString(16).padStart(2, "0"))
|
||||||
|
.join("")
|
||||||
|
.toUpperCase()
|
||||||
|
.match(/.{1,4}/g)!
|
||||||
|
.join(" ");
|
||||||
|
};
|
||||||
|
|
||||||
|
export const requestMasterKeyDownload = async (decryptKey: CryptoKey) => {
|
||||||
|
const res = await callAPI("/api/mek/list", { method: "GET" });
|
||||||
|
if (!res.ok) return false;
|
||||||
|
|
||||||
|
const data = await res.json();
|
||||||
|
const { meks: masterKeysWrapped } = data as {
|
||||||
|
meks: {
|
||||||
|
version: number;
|
||||||
|
state: "active" | "retired";
|
||||||
|
mek: string;
|
||||||
|
}[];
|
||||||
|
};
|
||||||
|
const masterKeys = await Promise.all(
|
||||||
|
masterKeysWrapped.map(async ({ version, state, mek: masterKeyWrapped }) => ({
|
||||||
|
version,
|
||||||
|
state,
|
||||||
|
masterKey: await makeAESKeyNonextractable(
|
||||||
|
await unwrapAESKeyUsingRSA(decodeFromBase64(masterKeyWrapped), decryptKey),
|
||||||
|
),
|
||||||
|
})),
|
||||||
|
);
|
||||||
|
|
||||||
|
await storeMasterKeys(
|
||||||
|
masterKeys.map(({ version, state, masterKey }) => ({ version, state, key: masterKey })),
|
||||||
|
);
|
||||||
|
masterKeyStore.set(
|
||||||
|
new Map(masterKeys.map(({ version, state, masterKey }) => [version, { state, masterKey }])),
|
||||||
|
);
|
||||||
|
|
||||||
|
return true;
|
||||||
|
};
|
||||||
@@ -11,7 +11,7 @@
|
|||||||
requestClientRegistration,
|
requestClientRegistration,
|
||||||
storeClientKeys,
|
storeClientKeys,
|
||||||
requestTokenUpgrade,
|
requestTokenUpgrade,
|
||||||
requestInitialMekRegistration,
|
requestInitialMasterKeyRegistration,
|
||||||
} from "./service";
|
} from "./service";
|
||||||
|
|
||||||
import IconKey from "~icons/material-symbols/key";
|
import IconKey from "~icons/material-symbols/key";
|
||||||
@@ -72,11 +72,7 @@
|
|||||||
throw new Error("Failed to upgrade token");
|
throw new Error("Failed to upgrade token");
|
||||||
|
|
||||||
if (
|
if (
|
||||||
!(await requestInitialMekRegistration(
|
!(await requestInitialMasterKeyRegistration(data.masterKeyWrapped, $clientKeyStore.signKey))
|
||||||
data.mekDraft,
|
|
||||||
$clientKeyStore.encryptKey,
|
|
||||||
$clientKeyStore.signKey,
|
|
||||||
))
|
|
||||||
)
|
)
|
||||||
throw new Error("Failed to register initial MEK");
|
throw new Error("Failed to register initial MEK");
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
import { callAPI } from "$lib/hooks";
|
import { callAPI } from "$lib/hooks";
|
||||||
import { storeRSAKey } from "$lib/indexedDB";
|
import { storeClientKey } from "$lib/indexedDB";
|
||||||
import { encodeToBase64, encryptRSAPlaintext, signRequest } from "$lib/modules/crypto";
|
import { encodeToBase64, signRequest } from "$lib/modules/crypto";
|
||||||
import type { ClientKeys } from "$lib/stores";
|
import type { ClientKeys } from "$lib/stores";
|
||||||
|
|
||||||
export { requestTokenUpgrade } from "$lib/services/auth";
|
export { requestTokenUpgrade } from "$lib/services/auth";
|
||||||
@@ -35,18 +35,16 @@ export const exportClientKeys = (
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const storeClientKeys = async (clientKeys: ClientKeys) => {
|
export const storeClientKeys = async (clientKeys: ClientKeys) => {
|
||||||
await storeRSAKey(clientKeys.encryptKey, "encrypt");
|
await storeClientKey(clientKeys.encryptKey, "encrypt");
|
||||||
await storeRSAKey(clientKeys.decryptKey, "decrypt");
|
await storeClientKey(clientKeys.decryptKey, "decrypt");
|
||||||
await storeRSAKey(clientKeys.signKey, "sign");
|
await storeClientKey(clientKeys.signKey, "sign");
|
||||||
await storeRSAKey(clientKeys.verifyKey, "verify");
|
await storeClientKey(clientKeys.verifyKey, "verify");
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestInitialMekRegistration = async (
|
export const requestInitialMasterKeyRegistration = async (
|
||||||
mekDraft: ArrayBuffer,
|
masterKeyWrapped: ArrayBuffer,
|
||||||
encryptKey: CryptoKey,
|
|
||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
const mekDraftEncrypted = await encryptRSAPlaintext(mekDraft, encryptKey);
|
|
||||||
const res = await callAPI("/api/mek/register/initial", {
|
const res = await callAPI("/api/mek/register/initial", {
|
||||||
method: "POST",
|
method: "POST",
|
||||||
headers: {
|
headers: {
|
||||||
@@ -54,7 +52,7 @@ export const requestInitialMekRegistration = async (
|
|||||||
},
|
},
|
||||||
body: await signRequest(
|
body: await signRequest(
|
||||||
{
|
{
|
||||||
mek: encodeToBase64(mekDraftEncrypted),
|
mek: encodeToBase64(masterKeyWrapped),
|
||||||
},
|
},
|
||||||
signKey,
|
signKey,
|
||||||
),
|
),
|
||||||
|
|||||||
@@ -5,7 +5,7 @@
|
|||||||
import { gotoStateful } from "$lib/hooks";
|
import { gotoStateful } from "$lib/hooks";
|
||||||
import { clientKeyStore } from "$lib/stores";
|
import { clientKeyStore } from "$lib/stores";
|
||||||
import Order from "./Order.svelte";
|
import Order from "./Order.svelte";
|
||||||
import { generateClientKeys, generateMekDraft } from "./service";
|
import { generateClientKeys, generateInitialMasterKey } from "./service";
|
||||||
|
|
||||||
import IconKey from "~icons/material-symbols/key";
|
import IconKey from "~icons/material-symbols/key";
|
||||||
|
|
||||||
@@ -34,13 +34,13 @@
|
|||||||
const generate = async () => {
|
const generate = async () => {
|
||||||
// TODO: Loading indicator
|
// TODO: Loading indicator
|
||||||
|
|
||||||
const clientKeys = await generateClientKeys();
|
const { encryptKey, ...clientKeys } = await generateClientKeys();
|
||||||
const { mekDraft } = await generateMekDraft();
|
const { masterKeyWrapped } = await generateInitialMasterKey(encryptKey);
|
||||||
|
|
||||||
await gotoStateful("/key/export", {
|
await gotoStateful("/key/export", {
|
||||||
...clientKeys,
|
...clientKeys,
|
||||||
redirectPath: data.redirectPath,
|
redirectPath: data.redirectPath,
|
||||||
mekDraft,
|
masterKeyWrapped,
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -4,9 +4,9 @@ import {
|
|||||||
exportRSAKeyToBase64,
|
exportRSAKeyToBase64,
|
||||||
generateAESKey,
|
generateAESKey,
|
||||||
makeAESKeyNonextractable,
|
makeAESKeyNonextractable,
|
||||||
exportAESKey,
|
wrapAESKeyUsingRSA,
|
||||||
} from "$lib/modules/crypto";
|
} from "$lib/modules/crypto";
|
||||||
import { clientKeyStore, mekStore } from "$lib/stores";
|
import { clientKeyStore } from "$lib/stores";
|
||||||
|
|
||||||
export const generateClientKeys = async () => {
|
export const generateClientKeys = async () => {
|
||||||
const encKeyPair = await generateRSAKeyPair("encryption");
|
const encKeyPair = await generateRSAKeyPair("encryption");
|
||||||
@@ -20,6 +20,7 @@ export const generateClientKeys = async () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
return {
|
return {
|
||||||
|
encryptKey: encKeyPair.publicKey,
|
||||||
encryptKeyBase64: await exportRSAKeyToBase64(encKeyPair.publicKey),
|
encryptKeyBase64: await exportRSAKeyToBase64(encKeyPair.publicKey),
|
||||||
decryptKeyBase64: await exportRSAKeyToBase64(encKeyPair.privateKey),
|
decryptKeyBase64: await exportRSAKeyToBase64(encKeyPair.privateKey),
|
||||||
signKeyBase64: await exportRSAKeyToBase64(sigKeyPair.privateKey),
|
signKeyBase64: await exportRSAKeyToBase64(sigKeyPair.privateKey),
|
||||||
@@ -27,16 +28,10 @@ export const generateClientKeys = async () => {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
export const generateMekDraft = async () => {
|
export const generateInitialMasterKey = async (encryptKey: CryptoKey) => {
|
||||||
const mek = await generateAESKey();
|
const masterKey = await generateAESKey();
|
||||||
const mekSecured = await makeAESKeyNonextractable(mek);
|
|
||||||
|
|
||||||
mekStore.update((meks) => {
|
|
||||||
meks.set(0, mekSecured);
|
|
||||||
return meks;
|
|
||||||
});
|
|
||||||
|
|
||||||
return {
|
return {
|
||||||
mekDraft: await exportAESKey(mek),
|
masterKey: await makeAESKeyNonextractable(masterKey),
|
||||||
|
masterKeyWrapped: await wrapAESKeyUsingRSA(masterKey, encryptKey),
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -2,18 +2,24 @@
|
|||||||
import { onMount } from "svelte";
|
import { onMount } from "svelte";
|
||||||
import { goto } from "$app/navigation";
|
import { goto } from "$app/navigation";
|
||||||
import "../app.css";
|
import "../app.css";
|
||||||
import { prepareClientKeyStore } from "./services";
|
import { prepareClientKeyStore, prepareMasterKeyStore } from "./services";
|
||||||
|
|
||||||
let { children } = $props();
|
let { children } = $props();
|
||||||
|
|
||||||
onMount(() => {
|
onMount(async () => {
|
||||||
prepareClientKeyStore().then(async (ok) => {
|
const redirect = async (url: string) => {
|
||||||
if (!ok && !["/auth", "/key"].some((path) => location.pathname.startsWith(path))) {
|
const whitelist = ["/auth", "/key", "/client/pending"];
|
||||||
await goto(
|
if (!whitelist.some((path) => location.pathname.startsWith(path))) {
|
||||||
"/key/generate?redirect=" + encodeURIComponent(location.pathname + location.search),
|
await goto(`${url}?redirect=${encodeURIComponent(location.pathname + location.search)}`);
|
||||||
);
|
|
||||||
}
|
}
|
||||||
});
|
};
|
||||||
|
|
||||||
|
if (!(await prepareClientKeyStore())) {
|
||||||
|
return await redirect("/key/generate");
|
||||||
|
}
|
||||||
|
if (!(await prepareMasterKeyStore())) {
|
||||||
|
return await redirect("/client/pending");
|
||||||
|
}
|
||||||
});
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|||||||
@@ -1,11 +1,11 @@
|
|||||||
import { getRSAKey } from "$lib/indexedDB";
|
import { getClientKey, getMasterKeys } from "$lib/indexedDB";
|
||||||
import { clientKeyStore } from "$lib/stores";
|
import { clientKeyStore, masterKeyStore } from "$lib/stores";
|
||||||
|
|
||||||
export const prepareClientKeyStore = async () => {
|
export const prepareClientKeyStore = async () => {
|
||||||
const encryptKey = await getRSAKey("encrypt");
|
const encryptKey = await getClientKey("encrypt");
|
||||||
const decryptKey = await getRSAKey("decrypt");
|
const decryptKey = await getClientKey("decrypt");
|
||||||
const signKey = await getRSAKey("sign");
|
const signKey = await getClientKey("sign");
|
||||||
const verifyKey = await getRSAKey("verify");
|
const verifyKey = await getClientKey("verify");
|
||||||
if (encryptKey && decryptKey && signKey && verifyKey) {
|
if (encryptKey && decryptKey && signKey && verifyKey) {
|
||||||
clientKeyStore.set({ encryptKey, decryptKey, signKey, verifyKey });
|
clientKeyStore.set({ encryptKey, decryptKey, signKey, verifyKey });
|
||||||
return true;
|
return true;
|
||||||
@@ -13,3 +13,15 @@ export const prepareClientKeyStore = async () => {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const prepareMasterKeyStore = async () => {
|
||||||
|
const masterKeys = await getMasterKeys();
|
||||||
|
if (masterKeys.length > 0) {
|
||||||
|
masterKeyStore.set(
|
||||||
|
new Map(masterKeys.map(({ version, state, key }) => [version, { state, masterKey: key }])),
|
||||||
|
);
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|||||||
Reference in New Issue
Block a user