@opentdf/sdk 0.11.0 → 0.12.0-beta.112
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +17 -16
- package/dist/cjs/src/opentdf.js +21 -5
- package/dist/cjs/src/platform.js +23 -10
- package/dist/cjs/src/version.js +1 -1
- package/dist/cjs/tdf3/src/crypto/core/ec.js +88 -0
- package/dist/cjs/tdf3/src/crypto/core/key-format.js +359 -0
- package/dist/cjs/tdf3/src/crypto/core/keys.js +85 -0
- package/dist/cjs/tdf3/src/crypto/core/rsa.js +120 -0
- package/dist/cjs/tdf3/src/crypto/core/signing.js +178 -0
- package/dist/cjs/tdf3/src/crypto/core/symmetric.js +205 -0
- package/dist/cjs/tdf3/src/crypto/index.js +69 -1051
- package/dist/types/src/opentdf.d.ts +2 -0
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/src/version.d.ts +1 -1
- package/dist/types/tdf3/src/crypto/core/ec.d.ts +11 -0
- package/dist/types/tdf3/src/crypto/core/ec.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/key-format.d.ts +41 -0
- package/dist/types/tdf3/src/crypto/core/key-format.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/keys.d.ts +27 -0
- package/dist/types/tdf3/src/crypto/core/keys.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/rsa.d.ts +35 -0
- package/dist/types/tdf3/src/crypto/core/rsa.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/signing.d.ts +10 -0
- package/dist/types/tdf3/src/crypto/core/signing.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/symmetric.d.ts +68 -0
- package/dist/types/tdf3/src/crypto/core/symmetric.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/index.d.ts +11 -164
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
- package/dist/web/src/opentdf.js +21 -5
- package/dist/web/src/platform.js +23 -10
- package/dist/web/src/version.js +1 -1
- package/dist/web/tdf3/src/crypto/core/ec.js +84 -0
- package/dist/web/tdf3/src/crypto/core/key-format.js +348 -0
- package/dist/web/tdf3/src/crypto/core/keys.js +78 -0
- package/dist/web/tdf3/src/crypto/core/rsa.js +112 -0
- package/dist/web/tdf3/src/crypto/core/signing.js +174 -0
- package/dist/web/tdf3/src/crypto/core/symmetric.js +192 -0
- package/dist/web/tdf3/src/crypto/index.js +13 -994
- package/package.json +1 -1
- package/src/opentdf.ts +22 -4
- package/src/platform.ts +23 -9
- package/src/version.ts +1 -1
- package/tdf3/src/crypto/core/ec.ts +118 -0
- package/tdf3/src/crypto/core/key-format.ts +420 -0
- package/tdf3/src/crypto/core/keys.ts +86 -0
- package/tdf3/src/crypto/core/rsa.ts +144 -0
- package/tdf3/src/crypto/core/signing.ts +214 -0
- package/tdf3/src/crypto/core/symmetric.ts +265 -0
- package/tdf3/src/crypto/index.ts +71 -1239
package/dist/web/src/platform.js
CHANGED
|
@@ -91,15 +91,28 @@ function createAuthInterceptor(authProvider) {
|
|
|
91
91
|
const url = new URL(req.url);
|
|
92
92
|
const pathOnly = url.pathname;
|
|
93
93
|
// Signs only the path of the url in the request
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
94
|
+
let token;
|
|
95
|
+
try {
|
|
96
|
+
token = await authProvider.withCreds({
|
|
97
|
+
url: pathOnly,
|
|
98
|
+
method: 'POST',
|
|
99
|
+
// Start with any headers Connect already has
|
|
100
|
+
headers: {
|
|
101
|
+
...Object.fromEntries(req.header.entries()),
|
|
102
|
+
'Content-Type': 'application/json',
|
|
103
|
+
},
|
|
104
|
+
});
|
|
105
|
+
}
|
|
106
|
+
catch (err) {
|
|
107
|
+
const msg = err instanceof Error ? err.message : String(err);
|
|
108
|
+
if (msg.includes('public key') || msg.includes('updateClientPublicKey')) {
|
|
109
|
+
throw new Error('PlatformClient: DPoP key binding is not complete. ' +
|
|
110
|
+
'If you are using OpenTDF with PlatformClient, create OpenTDF first and ' +
|
|
111
|
+
'`await client.ready` before constructing PlatformClient. ' +
|
|
112
|
+
`Original error: ${msg}`);
|
|
113
|
+
}
|
|
114
|
+
throw err;
|
|
115
|
+
}
|
|
103
116
|
Object.entries(token.headers).forEach(([key, value]) => {
|
|
104
117
|
req.header.set(key, value);
|
|
105
118
|
});
|
|
@@ -107,4 +120,4 @@ function createAuthInterceptor(authProvider) {
|
|
|
107
120
|
};
|
|
108
121
|
return authInterceptor;
|
|
109
122
|
}
|
|
110
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
123
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/web/src/version.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* Exposes the released version number of the `@opentdf/sdk` package
|
|
3
3
|
*/
|
|
4
|
-
export const version = '0.
|
|
4
|
+
export const version = '0.12.0'; // x-release-please-version
|
|
5
5
|
/**
|
|
6
6
|
* A string name used to label requests as coming from this library client.
|
|
7
7
|
*/
|
|
@@ -0,0 +1,84 @@
|
|
|
1
|
+
import { ConfigurationError } from '../../../../src/errors.js';
|
|
2
|
+
import { unwrapKey, wrapPrivateKey, wrapPublicKey, wrapSymmetricKey } from './keys.js';
|
|
3
|
+
/**
|
|
4
|
+
* Map ECCurve to Web Crypto named curve.
|
|
5
|
+
*/
|
|
6
|
+
function curveToNamedCurve(curve) {
|
|
7
|
+
switch (curve) {
|
|
8
|
+
case 'P-256':
|
|
9
|
+
return 'P-256';
|
|
10
|
+
case 'P-384':
|
|
11
|
+
return 'P-384';
|
|
12
|
+
case 'P-521':
|
|
13
|
+
return 'P-521';
|
|
14
|
+
default:
|
|
15
|
+
throw new ConfigurationError(`Unsupported curve: ${curve}`);
|
|
16
|
+
}
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Generate an EC key pair for ECDH key agreement.
|
|
20
|
+
*/
|
|
21
|
+
export async function generateECKeyPair(curve = 'P-256') {
|
|
22
|
+
const namedCurve = curveToNamedCurve(curve);
|
|
23
|
+
// Generate key pair for ECDH key agreement
|
|
24
|
+
const keyPair = await crypto.subtle.generateKey({ name: 'ECDH', namedCurve }, true, [
|
|
25
|
+
'deriveBits',
|
|
26
|
+
]);
|
|
27
|
+
// Map to KeyAlgorithm literal type
|
|
28
|
+
let algorithm;
|
|
29
|
+
switch (namedCurve) {
|
|
30
|
+
case 'P-256':
|
|
31
|
+
algorithm = 'ec:secp256r1';
|
|
32
|
+
break;
|
|
33
|
+
case 'P-384':
|
|
34
|
+
algorithm = 'ec:secp384r1';
|
|
35
|
+
break;
|
|
36
|
+
case 'P-521':
|
|
37
|
+
algorithm = 'ec:secp521r1';
|
|
38
|
+
break;
|
|
39
|
+
default:
|
|
40
|
+
throw new ConfigurationError(`Unsupported curve: ${namedCurve}`);
|
|
41
|
+
}
|
|
42
|
+
return {
|
|
43
|
+
publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
|
|
44
|
+
privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
|
|
45
|
+
};
|
|
46
|
+
}
|
|
47
|
+
/**
|
|
48
|
+
* Perform ECDH key agreement followed by HKDF key derivation.
|
|
49
|
+
* Returns opaque symmetric key for symmetric encryption.
|
|
50
|
+
*/
|
|
51
|
+
export async function deriveKeyFromECDH(privateKey, publicKey, hkdfParams) {
|
|
52
|
+
// Unwrap the internal CryptoKeys
|
|
53
|
+
const privateKeyCrypto = unwrapKey(privateKey);
|
|
54
|
+
const publicKeyCrypto = unwrapKey(publicKey);
|
|
55
|
+
// Get curve from key metadata
|
|
56
|
+
const curve = publicKey.curve;
|
|
57
|
+
if (!curve) {
|
|
58
|
+
throw new ConfigurationError('EC curve not found on public key');
|
|
59
|
+
}
|
|
60
|
+
// Determine bits based on curve
|
|
61
|
+
const curveBits = {
|
|
62
|
+
'P-256': 256,
|
|
63
|
+
'P-384': 384,
|
|
64
|
+
// P-521 derives 528 bits (66 bytes)
|
|
65
|
+
'P-521': 528,
|
|
66
|
+
};
|
|
67
|
+
const bits = curveBits[curve];
|
|
68
|
+
// Perform ECDH to get shared secret
|
|
69
|
+
const sharedSecret = await crypto.subtle.deriveBits({ name: 'ECDH', public: publicKeyCrypto }, privateKeyCrypto, bits);
|
|
70
|
+
// Import shared secret as HKDF key material
|
|
71
|
+
const hkdfKey = await crypto.subtle.importKey('raw', sharedSecret, 'HKDF', false, ['deriveKey']);
|
|
72
|
+
// Derive the final key using HKDF
|
|
73
|
+
const keyLength = hkdfParams.keyLength ?? 256;
|
|
74
|
+
const derivedKey = await crypto.subtle.deriveKey({
|
|
75
|
+
name: 'HKDF',
|
|
76
|
+
hash: hkdfParams.hash,
|
|
77
|
+
salt: hkdfParams.salt,
|
|
78
|
+
info: hkdfParams.info ?? new Uint8Array(0),
|
|
79
|
+
}, hkdfKey, { name: 'AES-GCM', length: keyLength }, true, ['encrypt', 'decrypt']);
|
|
80
|
+
// Export the derived key as raw bytes and wrap as SymmetricKey
|
|
81
|
+
const keyBytes = await crypto.subtle.exportKey('raw', derivedKey);
|
|
82
|
+
return wrapSymmetricKey(new Uint8Array(keyBytes));
|
|
83
|
+
}
|
|
84
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,348 @@
|
|
|
1
|
+
import { MIN_ASYMMETRIC_KEY_SIZE_BITS, } from '../declarations.js';
|
|
2
|
+
import { ConfigurationError } from '../../../../src/errors.js';
|
|
3
|
+
import { formatAsPem, removePemFormatting } from '../crypto-utils.js';
|
|
4
|
+
import { encodeArrayBuffer as hexEncode } from '../../../../src/encodings/hex.js';
|
|
5
|
+
import { decodeArrayBuffer as base64Decode } from '../../../../src/encodings/base64.js';
|
|
6
|
+
import { exportSPKI, importX509 } from 'jose';
|
|
7
|
+
import { guessAlgorithmName, guessCurveName, toJwsAlg, } from '../../../../src/crypto/pemPublicToCrypto.js';
|
|
8
|
+
import { unwrapKey, wrapPrivateKey, wrapPublicKey } from './keys.js';
|
|
9
|
+
import { rsaOaepSha1 } from './rsa.js';
|
|
10
|
+
/**
|
|
11
|
+
* Extract PEM public key from X.509 certificate or return PEM key as-is.
|
|
12
|
+
*/
|
|
13
|
+
export async function extractPublicKeyPem(certOrPem, jwaAlgorithm) {
|
|
14
|
+
// If it's a certificate, extract the public key
|
|
15
|
+
if (certOrPem.includes('-----BEGIN CERTIFICATE-----')) {
|
|
16
|
+
let alg = jwaAlgorithm;
|
|
17
|
+
if (!alg) {
|
|
18
|
+
// Auto-detect algorithm from certificate OIDs
|
|
19
|
+
const certBody = certOrPem.replace(/-----(BEGIN|END) CERTIFICATE-----|\s/g, '');
|
|
20
|
+
const certBytes = base64Decode(certBody);
|
|
21
|
+
const hex = hexEncode(certBytes);
|
|
22
|
+
alg = toJwsAlg(hex);
|
|
23
|
+
}
|
|
24
|
+
const cert = await importX509(certOrPem, alg, { extractable: true });
|
|
25
|
+
return exportSPKI(cert);
|
|
26
|
+
}
|
|
27
|
+
// If it's already a PEM public key, return as-is
|
|
28
|
+
if (certOrPem.includes('-----BEGIN PUBLIC KEY-----')) {
|
|
29
|
+
return certOrPem;
|
|
30
|
+
}
|
|
31
|
+
throw new ConfigurationError('Input must be a PEM-encoded certificate or public key');
|
|
32
|
+
}
|
|
33
|
+
const SUPPORTED_EC_CURVES = ['P-256', 'P-384', 'P-521'];
|
|
34
|
+
/**
|
|
35
|
+
* Decode base64url string and return byte length.
|
|
36
|
+
* Uses the existing base64 decoder which handles both standard and URL-safe encoding.
|
|
37
|
+
*/
|
|
38
|
+
function base64urlByteLength(base64url) {
|
|
39
|
+
// Add padding if needed (base64url omits padding)
|
|
40
|
+
const padding = (4 - (base64url.length % 4)) % 4;
|
|
41
|
+
const padded = base64url + '='.repeat(padding);
|
|
42
|
+
return base64Decode(padded).byteLength;
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Extract EC curve from a public key by parsing ASN.1 OIDs.
|
|
46
|
+
* Reuses the existing guessCurveName function that checks for curve OIDs.
|
|
47
|
+
*/
|
|
48
|
+
function extractEcCurveFromPublicKey(keyData) {
|
|
49
|
+
// Convert to hex for OID parsing
|
|
50
|
+
const hexKey = hexEncode(keyData);
|
|
51
|
+
// Use existing OID parser (returns 'P-256', 'P-384', or 'P-521')
|
|
52
|
+
const curveName = guessCurveName(hexKey);
|
|
53
|
+
return curveName;
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* Extract RSA modulus bit length by importing key and exporting as JWK.
|
|
57
|
+
* Uses Web Crypto's built-in ASN.1 parsing for robustness.
|
|
58
|
+
*/
|
|
59
|
+
async function extractRsaModulusBitLength(keyData) {
|
|
60
|
+
const key = await crypto.subtle.importKey('spki', keyData, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, ['encrypt']);
|
|
61
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
62
|
+
if (!jwk.n) {
|
|
63
|
+
throw new ConfigurationError('Invalid RSA key: missing modulus');
|
|
64
|
+
}
|
|
65
|
+
// JWK 'n' is base64url-encoded modulus
|
|
66
|
+
// Decode and count bytes, multiply by 8 for bits
|
|
67
|
+
return base64urlByteLength(jwk.n) * 8;
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Import and validate a PEM public key, returning algorithm info.
|
|
71
|
+
* Uses JWK export for robust key parameter detection.
|
|
72
|
+
*/
|
|
73
|
+
export async function parsePublicKeyPem(pem) {
|
|
74
|
+
// First extract public key if it's a certificate
|
|
75
|
+
let publicKeyPem = pem;
|
|
76
|
+
if (pem.includes('-----BEGIN CERTIFICATE-----')) {
|
|
77
|
+
publicKeyPem = await extractPublicKeyPem(pem);
|
|
78
|
+
}
|
|
79
|
+
if (!publicKeyPem.includes('-----BEGIN PUBLIC KEY-----')) {
|
|
80
|
+
throw new ConfigurationError('Input must be a PEM-encoded public key or certificate');
|
|
81
|
+
}
|
|
82
|
+
const keyData = base64Decode(removePemFormatting(publicKeyPem));
|
|
83
|
+
// Try RSA first - use JWK export to get modulus size
|
|
84
|
+
try {
|
|
85
|
+
const modulusBits = await extractRsaModulusBitLength(keyData);
|
|
86
|
+
let algorithm;
|
|
87
|
+
if (modulusBits < MIN_ASYMMETRIC_KEY_SIZE_BITS) {
|
|
88
|
+
throw new ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
|
|
89
|
+
}
|
|
90
|
+
else if (modulusBits <= 2048) {
|
|
91
|
+
algorithm = 'rsa:2048';
|
|
92
|
+
}
|
|
93
|
+
else if (modulusBits <= 4096) {
|
|
94
|
+
algorithm = 'rsa:4096';
|
|
95
|
+
}
|
|
96
|
+
else {
|
|
97
|
+
throw new ConfigurationError(`Unsupported RSA key size: ${modulusBits} bits`);
|
|
98
|
+
}
|
|
99
|
+
return { algorithm, pem: publicKeyPem };
|
|
100
|
+
}
|
|
101
|
+
catch (e) {
|
|
102
|
+
// If it's our own ConfigurationError, rethrow
|
|
103
|
+
if (e instanceof ConfigurationError) {
|
|
104
|
+
throw e;
|
|
105
|
+
}
|
|
106
|
+
// Not an RSA key, try EC next
|
|
107
|
+
}
|
|
108
|
+
// Try EC - parse curve from OID
|
|
109
|
+
try {
|
|
110
|
+
const detectedCurve = extractEcCurveFromPublicKey(keyData);
|
|
111
|
+
const curveMap = {
|
|
112
|
+
'P-256': 'ec:secp256r1',
|
|
113
|
+
'P-384': 'ec:secp384r1',
|
|
114
|
+
'P-521': 'ec:secp521r1',
|
|
115
|
+
};
|
|
116
|
+
return { algorithm: curveMap[detectedCurve], pem: publicKeyPem };
|
|
117
|
+
}
|
|
118
|
+
catch {
|
|
119
|
+
// Not a valid EC key
|
|
120
|
+
}
|
|
121
|
+
throw new ConfigurationError('Unable to determine public key algorithm - unsupported key type');
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Convert a JWK (JSON Web Key) to PEM format.
|
|
125
|
+
*/
|
|
126
|
+
export async function jwkToPublicKeyPem(jwk) {
|
|
127
|
+
let key;
|
|
128
|
+
if (jwk.kty === 'RSA') {
|
|
129
|
+
// RSA key
|
|
130
|
+
key = await crypto.subtle.importKey('jwk', jwk, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, [
|
|
131
|
+
'encrypt',
|
|
132
|
+
]);
|
|
133
|
+
}
|
|
134
|
+
else if (jwk.kty === 'EC') {
|
|
135
|
+
// EC key
|
|
136
|
+
const crv = jwk.crv;
|
|
137
|
+
if (!crv || !['P-256', 'P-384', 'P-521'].includes(crv)) {
|
|
138
|
+
throw new ConfigurationError(`Unsupported EC curve: ${crv}`);
|
|
139
|
+
}
|
|
140
|
+
key = await crypto.subtle.importKey('jwk', jwk, { name: 'ECDH', namedCurve: crv }, true, []);
|
|
141
|
+
}
|
|
142
|
+
else {
|
|
143
|
+
throw new ConfigurationError(`Unsupported JWK key type: ${jwk.kty}`);
|
|
144
|
+
}
|
|
145
|
+
const spkiBuffer = await crypto.subtle.exportKey('spki', key);
|
|
146
|
+
return formatAsPem(spkiBuffer, 'PUBLIC KEY');
|
|
147
|
+
}
|
|
148
|
+
/**
|
|
149
|
+
* Convert a PEM public key to JWK format.
|
|
150
|
+
* Returns only public key components (no private key data).
|
|
151
|
+
*/
|
|
152
|
+
export async function publicKeyPemToJwk(publicKeyPem) {
|
|
153
|
+
const keyDataBase64 = removePemFormatting(publicKeyPem);
|
|
154
|
+
const keyBuffer = base64Decode(keyDataBase64);
|
|
155
|
+
const hex = hexEncode(keyBuffer);
|
|
156
|
+
// Detect key type using OID
|
|
157
|
+
const algorithmName = guessAlgorithmName(hex);
|
|
158
|
+
if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
|
|
159
|
+
// EC key - detect curve from OID
|
|
160
|
+
const namedCurve = guessCurveName(hex);
|
|
161
|
+
const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'ECDSA', namedCurve }, true, ['verify']);
|
|
162
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
163
|
+
// Return only public key components
|
|
164
|
+
const { kty, crv, x, y } = jwk;
|
|
165
|
+
return { kty, crv, x, y };
|
|
166
|
+
}
|
|
167
|
+
else {
|
|
168
|
+
// RSA key
|
|
169
|
+
const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['verify']);
|
|
170
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
171
|
+
// Return only public key components
|
|
172
|
+
const { kty, e, n } = jwk;
|
|
173
|
+
return { kty, e, n };
|
|
174
|
+
}
|
|
175
|
+
}
|
|
176
|
+
/**
|
|
177
|
+
* Import a PEM public key as an opaque key.
|
|
178
|
+
*/
|
|
179
|
+
export async function importPublicKey(pem, options) {
|
|
180
|
+
const { usage = 'encrypt', extractable = true, algorithmHint } = options;
|
|
181
|
+
// Detect algorithm from PEM; also normalises certificates → plain SPKI PEM.
|
|
182
|
+
const keyInfo = await parsePublicKeyPem(pem);
|
|
183
|
+
const algorithm = algorithmHint || keyInfo.algorithm;
|
|
184
|
+
// Use keyInfo.pem (normalised SPKI) not the original pem, which may be a certificate.
|
|
185
|
+
// Passing raw X.509 DER bytes to crypto.subtle.importKey('spki') would throw DataError.
|
|
186
|
+
const keyData = removePemFormatting(keyInfo.pem);
|
|
187
|
+
const keyBuffer = base64Decode(keyData);
|
|
188
|
+
// Determine Web Crypto algorithm and usages based on key type and usage
|
|
189
|
+
let cryptoAlgorithm;
|
|
190
|
+
let keyUsages;
|
|
191
|
+
if (algorithm.startsWith('rsa:')) {
|
|
192
|
+
if (usage === 'encrypt') {
|
|
193
|
+
cryptoAlgorithm = rsaOaepSha1();
|
|
194
|
+
keyUsages = ['encrypt'];
|
|
195
|
+
}
|
|
196
|
+
else if (usage === 'sign') {
|
|
197
|
+
cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
|
|
198
|
+
keyUsages = ['verify'];
|
|
199
|
+
}
|
|
200
|
+
else {
|
|
201
|
+
throw new ConfigurationError('RSA keys only support usage: encrypt or sign');
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
else if (algorithm.startsWith('ec:')) {
|
|
205
|
+
const curve = algorithm.split(':')[1];
|
|
206
|
+
const namedCurve = curve === 'secp256r1'
|
|
207
|
+
? 'P-256'
|
|
208
|
+
: curve === 'secp384r1'
|
|
209
|
+
? 'P-384'
|
|
210
|
+
: curve === 'secp521r1'
|
|
211
|
+
? 'P-521'
|
|
212
|
+
: (() => {
|
|
213
|
+
throw new ConfigurationError(`Unsupported EC curve: ${curve}`);
|
|
214
|
+
})();
|
|
215
|
+
if (usage === 'derive') {
|
|
216
|
+
cryptoAlgorithm = { name: 'ECDH', namedCurve };
|
|
217
|
+
keyUsages = [];
|
|
218
|
+
}
|
|
219
|
+
else if (usage === 'sign') {
|
|
220
|
+
cryptoAlgorithm = { name: 'ECDSA', namedCurve };
|
|
221
|
+
keyUsages = ['verify'];
|
|
222
|
+
}
|
|
223
|
+
else {
|
|
224
|
+
throw new ConfigurationError('EC keys only support usage: derive or sign');
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
else {
|
|
228
|
+
throw new ConfigurationError(`Unsupported algorithm: ${algorithm}`);
|
|
229
|
+
}
|
|
230
|
+
// Import as CryptoKey
|
|
231
|
+
const cryptoKey = await crypto.subtle.importKey('spki', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
|
|
232
|
+
return wrapPublicKey(cryptoKey, algorithm);
|
|
233
|
+
}
|
|
234
|
+
/**
|
|
235
|
+
* Import a PEM private key as an opaque key.
|
|
236
|
+
*/
|
|
237
|
+
export async function importPrivateKey(pem, options) {
|
|
238
|
+
const { usage = 'encrypt', extractable = true, algorithmHint } = options;
|
|
239
|
+
// Detect algorithm from PEM structure (similar to public key detection)
|
|
240
|
+
// For now, use algorithmHint if provided, otherwise detect from key structure
|
|
241
|
+
let algorithm;
|
|
242
|
+
const keyData = removePemFormatting(pem);
|
|
243
|
+
const keyBuffer = base64Decode(keyData);
|
|
244
|
+
if (algorithmHint) {
|
|
245
|
+
algorithm = algorithmHint;
|
|
246
|
+
}
|
|
247
|
+
else {
|
|
248
|
+
// PKCS#8 PrivateKeyInfo embeds the same AlgorithmIdentifier OIDs as SPKI,
|
|
249
|
+
// so guessAlgorithmName / guessCurveName work on private key bytes too.
|
|
250
|
+
const hex = hexEncode(keyBuffer);
|
|
251
|
+
const algorithmName = guessAlgorithmName(hex); // throws on unrecognised OID
|
|
252
|
+
if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
|
|
253
|
+
const namedCurve = guessCurveName(hex);
|
|
254
|
+
const curveMap = {
|
|
255
|
+
'P-256': 'ec:secp256r1',
|
|
256
|
+
'P-384': 'ec:secp384r1',
|
|
257
|
+
'P-521': 'ec:secp521r1',
|
|
258
|
+
};
|
|
259
|
+
const mapped = curveMap[namedCurve];
|
|
260
|
+
if (!mapped)
|
|
261
|
+
throw new ConfigurationError(`Unsupported EC curve in private key: ${namedCurve}`);
|
|
262
|
+
algorithm = mapped;
|
|
263
|
+
}
|
|
264
|
+
else {
|
|
265
|
+
// RSA — determine key size by importing and reading modulus length from JWK
|
|
266
|
+
const tempKey = await crypto.subtle.importKey('pkcs8', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['sign']);
|
|
267
|
+
const jwk = await crypto.subtle.exportKey('jwk', tempKey);
|
|
268
|
+
if (!jwk.n) {
|
|
269
|
+
throw new ConfigurationError('Invalid RSA private key: missing modulus');
|
|
270
|
+
}
|
|
271
|
+
const modulusBits = base64urlByteLength(jwk.n) * 8;
|
|
272
|
+
if (modulusBits < MIN_ASYMMETRIC_KEY_SIZE_BITS) {
|
|
273
|
+
throw new ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
|
|
274
|
+
}
|
|
275
|
+
algorithm = modulusBits <= 2048 ? 'rsa:2048' : 'rsa:4096';
|
|
276
|
+
}
|
|
277
|
+
}
|
|
278
|
+
// Determine Web Crypto algorithm and usages
|
|
279
|
+
let cryptoAlgorithm;
|
|
280
|
+
let keyUsages;
|
|
281
|
+
if (algorithm.startsWith('rsa:')) {
|
|
282
|
+
if (usage === 'encrypt') {
|
|
283
|
+
cryptoAlgorithm = rsaOaepSha1();
|
|
284
|
+
keyUsages = ['decrypt'];
|
|
285
|
+
}
|
|
286
|
+
else if (usage === 'sign') {
|
|
287
|
+
cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
|
|
288
|
+
keyUsages = ['sign'];
|
|
289
|
+
}
|
|
290
|
+
else {
|
|
291
|
+
throw new ConfigurationError('RSA keys only support usage: encrypt or sign');
|
|
292
|
+
}
|
|
293
|
+
}
|
|
294
|
+
else if (algorithm.startsWith('ec:')) {
|
|
295
|
+
const curve = algorithm.split(':')[1];
|
|
296
|
+
const namedCurve = curve === 'secp256r1'
|
|
297
|
+
? 'P-256'
|
|
298
|
+
: curve === 'secp384r1'
|
|
299
|
+
? 'P-384'
|
|
300
|
+
: curve === 'secp521r1'
|
|
301
|
+
? 'P-521'
|
|
302
|
+
: (() => {
|
|
303
|
+
throw new ConfigurationError(`Unsupported EC curve: ${curve}`);
|
|
304
|
+
})();
|
|
305
|
+
if (usage === 'derive') {
|
|
306
|
+
cryptoAlgorithm = { name: 'ECDH', namedCurve };
|
|
307
|
+
keyUsages = ['deriveBits'];
|
|
308
|
+
}
|
|
309
|
+
else if (usage === 'sign') {
|
|
310
|
+
cryptoAlgorithm = { name: 'ECDSA', namedCurve };
|
|
311
|
+
keyUsages = ['sign'];
|
|
312
|
+
}
|
|
313
|
+
else {
|
|
314
|
+
throw new ConfigurationError('EC keys only support usage: derive or sign');
|
|
315
|
+
}
|
|
316
|
+
}
|
|
317
|
+
else {
|
|
318
|
+
throw new ConfigurationError(`Unsupported algorithm: ${algorithm}`);
|
|
319
|
+
}
|
|
320
|
+
// Import as CryptoKey
|
|
321
|
+
const cryptoKey = await crypto.subtle.importKey('pkcs8', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
|
|
322
|
+
return wrapPrivateKey(cryptoKey, algorithm);
|
|
323
|
+
}
|
|
324
|
+
/**
|
|
325
|
+
* Export an opaque public key to PEM format.
|
|
326
|
+
*/
|
|
327
|
+
export async function exportPublicKeyPem(key) {
|
|
328
|
+
const cryptoKey = unwrapKey(key);
|
|
329
|
+
const keyBuffer = await crypto.subtle.exportKey('spki', cryptoKey);
|
|
330
|
+
return formatAsPem(keyBuffer, 'PUBLIC KEY');
|
|
331
|
+
}
|
|
332
|
+
/**
|
|
333
|
+
* Export an opaque private key to PEM format.
|
|
334
|
+
* ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
|
|
335
|
+
*/
|
|
336
|
+
export async function exportPrivateKeyPem(key) {
|
|
337
|
+
const cryptoKey = unwrapKey(key);
|
|
338
|
+
const keyBuffer = await crypto.subtle.exportKey('pkcs8', cryptoKey);
|
|
339
|
+
return formatAsPem(keyBuffer, 'PRIVATE KEY');
|
|
340
|
+
}
|
|
341
|
+
/**
|
|
342
|
+
* Export an opaque public key to JWK format.
|
|
343
|
+
*/
|
|
344
|
+
export async function exportPublicKeyJwk(key) {
|
|
345
|
+
const cryptoKey = unwrapKey(key);
|
|
346
|
+
return await crypto.subtle.exportKey('jwk', cryptoKey);
|
|
347
|
+
}
|
|
348
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-format.js","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/key-format.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,4BAA4B,GAI7B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,WAAW,EAAE,mBAAmB,EAAE,MAAM,oBAAoB,CAAC;AACtE,OAAO,EAAE,iBAAiB,IAAI,SAAS,EAAE,MAAM,kCAAkC,CAAC;AAClF,OAAO,EAAE,iBAAiB,IAAI,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACxF,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,MAAM,CAAC;AAC9C,OAAO,EACL,kBAAkB,EAClB,cAAc,EACd,QAAQ,GACT,MAAM,6CAA6C,CAAC;AACrD,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,aAAa,EAAE,MAAM,WAAW,CAAC;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAC;AAEvC;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CACvC,SAAiB,EACjB,YAAqB;IAErB,gDAAgD;IAChD,IAAI,SAAS,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QACtD,IAAI,GAAG,GAAG,YAAY,CAAC;QACvB,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,8CAA8C;YAC9C,MAAM,QAAQ,GAAG,SAAS,CAAC,OAAO,CAAC,uCAAuC,EAAE,EAAE,CAAC,CAAC;YAChF,MAAM,SAAS,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;YACzC,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;YACjC,GAAG,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC;QACtB,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,UAAU,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACrE,OAAO,UAAU,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED,iDAAiD;IACjD,IAAI,SAAS,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACrD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,MAAM,IAAI,kBAAkB,CAAC,uDAAuD,CAAC,CAAC;AACxF,CAAC;AAED,MAAM,mBAAmB,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAU,CAAC;AAGjE;;;GAGG;AACH,SAAS,mBAAmB,CAAC,SAAiB;IAC5C,kDAAkD;IAClD,MAAM,OAAO,GAAG,CAAC,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,SAAS,GAAG,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IAC/C,OAAO,YAAY,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC;AACzC,CAAC;AAED;;;GAGG;AACH,SAAS,2BAA2B,CAAC,OAAoB;IACvD,iCAAiC;IACjC,MAAM,MAAM,GAAG,SAAS,CAAC,OAAO,CAAC,CAAC;IAClC,iEAAiE;IACjE,MAAM,SAAS,GAAG,cAAc,CAAC,MAAM,CAAC,CAAC;IACzC,OAAO,SAA6B,CAAC;AACvC,CAAC;AAED;;;GAGG;AACH,KAAK,UAAU,0BAA0B,CAAC,OAAoB;IAC5D,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,OAAO,EACP,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EACrC,IAAI,EACJ,CAAC,SAAS,CAAC,CACZ,CAAC;IACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACtD,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,kBAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IACD,uCAAuC;IACvC,iDAAiD;IACjD,OAAO,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;AACxC,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,GAAW;IACjD,iDAAiD;IACjD,IAAI,YAAY,GAAG,GAAG,CAAC;IACvB,IAAI,GAAG,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QAChD,YAAY,GAAG,MAAM,mBAAmB,CAAC,GAAG,CAAC,CAAC;IAChD,CAAC;IAED,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACzD,MAAM,IAAI,kBAAkB,CAAC,uDAAuD,CAAC,CAAC;IACxF,CAAC;IAED,MAAM,OAAO,GAAG,YAAY,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC,CAAC;IAEhE,qDAAqD;IACrD,IAAI,CAAC;QACH,MAAM,WAAW,GAAG,MAAM,0BAA0B,CAAC,OAAO,CAAC,CAAC;QAC9D,IAAI,SAAqC,CAAC;QAC1C,IAAI,WAAW,GAAG,4BAA4B,EAAE,CAAC;YAC/C,MAAM,IAAI,kBAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,4BAA4B,OAAO,CAChG,CAAC;QACJ,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,6BAA6B,WAAW,OAAO,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,8CAA8C;QAC9C,IAAI,CAAC,YAAY,kBAAkB,EAAE,CAAC;YACpC,MAAM,CAAC,CAAC;QACV,CAAC;QACD,8BAA8B;IAChC,CAAC;IAED,gCAAgC;IAChC,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAC;QAC3D,MAAM,QAAQ,GAAG;YACf,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;SACf,CAAC;QACX,OAAO,EAAE,SAAS,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IACnE,CAAC;IAAC,MAAM,CAAC;QACP,qBAAqB;IACvB,CAAC;IAED,MAAM,IAAI,kBAAkB,CAAC,iEAAiE,CAAC,CAAC;AAClG,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,GAAe;IACrD,IAAI,GAAc,CAAC;IAEnB,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,EAAE,CAAC;QACtB,UAAU;QACV,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EAAE,IAAI,EAAE;YAC3F,SAAS;SACV,CAAC,CAAC;IACL,CAAC;SAAM,IAAI,GAAG,CAAC,GAAG,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS;QACT,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,CAAC;QACpB,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACvD,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,GAAG,EAAE,CAAC,CAAC;QAC/D,CAAC;QACD,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC/F,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,6BAA6B,GAAG,CAAC,GAAG,EAAE,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9D,OAAO,WAAW,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;AAC/C,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,YAAoB;IAC1D,MAAM,aAAa,GAAG,mBAAmB,CAAC,YAAY,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,YAAY,CAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAEjC,4BAA4B;IAC5B,MAAM,aAAa,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IAE9C,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;QAC1D,iCAAiC;QACjC,MAAM,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC;QACvC,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,EAC7B,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC/B,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,UAAU;QACV,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,GAAW,EAAE,OAAmB;IACpE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,4EAA4E;IAC5E,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAC7C,MAAM,SAAS,GAAG,aAAa,IAAI,OAAO,CAAC,SAAS,CAAC;IACrD,sFAAsF;IACtF,wFAAwF;IACxF,MAAM,OAAO,GAAG,mBAAmB,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,CAAC;IAExC,wEAAwE;IACxE,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,EAAE,CAAC;QACjB,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,MAAM,EACN,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,aAAa,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC7C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,GAAW,EAAE,OAAmB;IACrE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,wEAAwE;IACxE,8EAA8E;IAC9E,IAAI,SAAuB,CAAC;IAE5B,MAAM,OAAO,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,CAAC;IAExC,IAAI,aAAa,EAAE,CAAC;QAClB,SAAS,GAAG,aAAa,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,0EAA0E;QAC1E,wEAAwE;QACxE,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;QACjC,MAAM,aAAa,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,CAAC,6BAA6B;QAC5E,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;YAC1D,MAAM,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,QAAQ,GAAiC;gBAC7C,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;aACxB,CAAC;YACF,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAC;YACpC,IAAI,CAAC,MAAM;gBACT,MAAM,IAAI,kBAAkB,CAAC,wCAAwC,UAAU,EAAE,CAAC,CAAC;YACrF,SAAS,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,4EAA4E;YAC5E,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC3C,OAAO,EACP,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;YAC1D,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,kBAAkB,CAAC,0CAA0C,CAAC,CAAC;YAC3E,CAAC;YACD,MAAM,WAAW,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;YACnD,IAAI,WAAW,GAAG,4BAA4B,EAAE,CAAC;gBAC/C,MAAM,IAAI,kBAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,4BAA4B,OAAO,CAChG,CAAC;YACJ,CAAC;YACD,SAAS,GAAG,WAAW,IAAI,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU,CAAC;QAC5D,CAAC;IACH,CAAC;IAED,4CAA4C;IAC5C,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,CAAC,YAAY,CAAC,CAAC;QAC7B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,OAAO,EACP,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,cAAc,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC9C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IACnE,OAAO,WAAW,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;AAC9C,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CAAC,GAAe;IACvD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;IACpE,OAAO,WAAW,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;AAC/C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,OAAO,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;AACzD,CAAC"}
|
|
@@ -0,0 +1,78 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Wrap a CryptoKey as an opaque PublicKey.
|
|
3
|
+
* @internal
|
|
4
|
+
*/
|
|
5
|
+
export function wrapPublicKey(key, algorithm) {
|
|
6
|
+
const result = {
|
|
7
|
+
_brand: 'PublicKey',
|
|
8
|
+
algorithm,
|
|
9
|
+
_internal: key,
|
|
10
|
+
};
|
|
11
|
+
if (algorithm.startsWith('rsa:')) {
|
|
12
|
+
result.modulusBits = parseInt(algorithm.split(':')[1], 10);
|
|
13
|
+
}
|
|
14
|
+
else if (algorithm.startsWith('ec:')) {
|
|
15
|
+
const curvePart = algorithm.split(':')[1];
|
|
16
|
+
result.curve =
|
|
17
|
+
curvePart === 'secp256r1'
|
|
18
|
+
? 'P-256'
|
|
19
|
+
: curvePart === 'secp384r1'
|
|
20
|
+
? 'P-384'
|
|
21
|
+
: curvePart === 'secp521r1'
|
|
22
|
+
? 'P-521'
|
|
23
|
+
: undefined;
|
|
24
|
+
}
|
|
25
|
+
return result;
|
|
26
|
+
}
|
|
27
|
+
/**
|
|
28
|
+
* Wrap a CryptoKey as an opaque PrivateKey.
|
|
29
|
+
* @internal
|
|
30
|
+
*/
|
|
31
|
+
export function wrapPrivateKey(key, algorithm) {
|
|
32
|
+
const result = {
|
|
33
|
+
_brand: 'PrivateKey',
|
|
34
|
+
algorithm,
|
|
35
|
+
_internal: key,
|
|
36
|
+
};
|
|
37
|
+
if (algorithm.startsWith('rsa:')) {
|
|
38
|
+
result.modulusBits = parseInt(algorithm.split(':')[1], 10);
|
|
39
|
+
}
|
|
40
|
+
else if (algorithm.startsWith('ec:')) {
|
|
41
|
+
const curvePart = algorithm.split(':')[1];
|
|
42
|
+
result.curve =
|
|
43
|
+
curvePart === 'secp256r1'
|
|
44
|
+
? 'P-256'
|
|
45
|
+
: curvePart === 'secp384r1'
|
|
46
|
+
? 'P-384'
|
|
47
|
+
: curvePart === 'secp521r1'
|
|
48
|
+
? 'P-521'
|
|
49
|
+
: undefined;
|
|
50
|
+
}
|
|
51
|
+
return result;
|
|
52
|
+
}
|
|
53
|
+
/**
|
|
54
|
+
* Unwrap an opaque key to get the internal CryptoKey.
|
|
55
|
+
* @internal
|
|
56
|
+
*/
|
|
57
|
+
export function unwrapKey(key) {
|
|
58
|
+
return key._internal;
|
|
59
|
+
}
|
|
60
|
+
/**
|
|
61
|
+
* Wrap raw key bytes as an opaque SymmetricKey.
|
|
62
|
+
* @internal
|
|
63
|
+
*/
|
|
64
|
+
export function wrapSymmetricKey(keyBytes) {
|
|
65
|
+
return {
|
|
66
|
+
_brand: 'SymmetricKey',
|
|
67
|
+
length: keyBytes.length * 8, // bits
|
|
68
|
+
_internal: keyBytes,
|
|
69
|
+
};
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* Unwrap an opaque SymmetricKey to get raw bytes.
|
|
73
|
+
* @internal
|
|
74
|
+
*/
|
|
75
|
+
export function unwrapSymmetricKey(key) {
|
|
76
|
+
return key._internal;
|
|
77
|
+
}
|
|
78
|
+
//# sourceMappingURL=data:application/json;base64,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
|