@super-protocol/sdk-js 3.12.1-beta.2 → 3.13.0-beta.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/certificates/binary-splitter.d.ts +26 -0
- package/dist/cjs/certificates/binary-splitter.js +269 -0
- package/dist/cjs/certificates/generator.d.ts +38 -0
- package/dist/cjs/certificates/generator.js +237 -0
- package/dist/cjs/certificates/helper.d.ts +5 -2
- package/dist/cjs/certificates/helper.js +19 -15
- package/dist/cjs/certificates/index.d.ts +1 -0
- package/dist/cjs/certificates/index.js +2 -1
- package/dist/cjs/certificates/serializer.d.ts +5 -0
- package/dist/cjs/certificates/serializer.js +98 -2
- package/dist/cjs/certificates/setup-crypto.d.ts +3 -0
- package/dist/cjs/certificates/setup-crypto.js +51 -0
- package/dist/cjs/certificates/types.d.ts +77 -0
- package/dist/cjs/connectors/BlockchainConnector.js +11 -8
- package/dist/cjs/connectors/BlockchainEventsListener.d.ts +4 -4
- package/dist/cjs/connectors/BlockchainEventsListener.js +9 -8
- package/dist/cjs/constants.d.ts +5 -1
- package/dist/cjs/constants.js +12 -5
- package/dist/cjs/index.d.ts +0 -2
- package/dist/cjs/index.js +3 -6
- package/dist/cjs/models/Offer.d.ts +1 -1
- package/dist/cjs/models/Offer.js +10 -3
- package/dist/cjs/models/Order.d.ts +1 -1
- package/dist/cjs/models/Order.js +21 -20
- package/dist/cjs/models/TeeOffer.d.ts +2 -2
- package/dist/cjs/models/TeeOffer.js +18 -3
- package/dist/cjs/proto/OrderReport.d.ts +206 -15
- package/dist/cjs/proto/OrderReport.js +169 -3
- package/dist/cjs/staticModels/ActiveOrders.d.ts +1 -1
- package/dist/cjs/staticModels/ActiveOrders.js +1 -1
- package/dist/cjs/staticModels/OfferResources.js +3 -4
- package/dist/cjs/staticModels/Offers.d.ts +3 -4
- package/dist/cjs/staticModels/Offers.js +16 -17
- package/dist/cjs/staticModels/OffersCommon.d.ts +18 -0
- package/dist/cjs/staticModels/OffersCommon.js +79 -0
- package/dist/cjs/staticModels/Orders.d.ts +6 -5
- package/dist/cjs/staticModels/Orders.js +96 -5
- package/dist/cjs/staticModels/SecretRequests.js +2 -3
- package/dist/cjs/staticModels/StaticModel.d.ts +14 -2
- package/dist/cjs/staticModels/StaticModel.js +90 -2
- package/dist/cjs/staticModels/SuperproToken.d.ts +26 -1
- package/dist/cjs/staticModels/SuperproToken.js +40 -1
- package/dist/cjs/staticModels/TeeOffers.d.ts +4 -4
- package/dist/cjs/staticModels/TeeOffers.js +17 -16
- package/dist/cjs/tee/OrderReportService.js +4 -2
- package/dist/cjs/tee/QuoteValidator.d.ts +3 -2
- package/dist/cjs/tee/QuoteValidator.js +5 -4
- package/dist/cjs/tee/TeeCertificateService.d.ts +1 -1
- package/dist/cjs/tee/TeeCertificateService.js +11 -14
- package/dist/cjs/tee/TeeSignatureVerifier.d.ts +6 -4
- package/dist/cjs/tee/TeeSignatureVerifier.js +60 -32
- package/dist/cjs/tee/types.d.ts +1 -1
- package/dist/cjs/types/Order.d.ts +28 -2
- package/dist/cjs/types/Order.js +23 -2
- package/dist/cjs/types/index.d.ts +0 -1
- package/dist/cjs/types/index.js +1 -2
- package/dist/cjs/utils/CryptoKeysTransformer.d.ts +4 -0
- package/dist/cjs/utils/CryptoKeysTransformer.js +50 -1
- package/dist/cjs/utils/TxManager.d.ts +2 -0
- package/dist/cjs/utils/TxManager.js +56 -25
- package/dist/cjs/utils/helper.d.ts +11 -3
- package/dist/cjs/utils/helper.js +56 -12
- package/dist/cjs/utils/helpers/getRawRpc.d.ts +2 -0
- package/dist/cjs/utils/helpers/getRawRpc.js +19 -0
- package/dist/cjs/utils/helpers/index.d.ts +1 -0
- package/dist/cjs/utils/helpers/index.js +2 -1
- package/dist/cjs/utils/types.d.ts +14 -0
- package/dist/cjs/utils/types.js +3 -0
- package/dist/mjs/certificates/binary-splitter.d.ts +26 -0
- package/dist/mjs/certificates/binary-splitter.js +265 -0
- package/dist/mjs/certificates/generator.d.ts +38 -0
- package/dist/mjs/certificates/generator.js +230 -0
- package/dist/mjs/certificates/helper.d.ts +5 -2
- package/dist/mjs/certificates/helper.js +19 -15
- package/dist/mjs/certificates/index.d.ts +1 -0
- package/dist/mjs/certificates/index.js +2 -1
- package/dist/mjs/certificates/serializer.d.ts +5 -0
- package/dist/mjs/certificates/serializer.js +94 -1
- package/dist/mjs/certificates/setup-crypto.d.ts +3 -0
- package/dist/mjs/certificates/setup-crypto.js +22 -0
- package/dist/mjs/certificates/types.d.ts +77 -0
- package/dist/mjs/connectors/BlockchainConnector.js +11 -8
- package/dist/mjs/connectors/BlockchainEventsListener.d.ts +4 -4
- package/dist/mjs/connectors/BlockchainEventsListener.js +9 -8
- package/dist/mjs/constants.d.ts +5 -1
- package/dist/mjs/constants.js +11 -4
- package/dist/mjs/index.d.ts +0 -2
- package/dist/mjs/index.js +1 -3
- package/dist/mjs/models/Offer.d.ts +1 -1
- package/dist/mjs/models/Offer.js +10 -3
- package/dist/mjs/models/Order.d.ts +1 -1
- package/dist/mjs/models/Order.js +22 -21
- package/dist/mjs/models/TeeOffer.d.ts +2 -2
- package/dist/mjs/models/TeeOffer.js +18 -3
- package/dist/mjs/proto/OrderReport.d.ts +206 -15
- package/dist/mjs/proto/OrderReport.js +168 -2
- package/dist/mjs/staticModels/ActiveOrders.d.ts +1 -1
- package/dist/mjs/staticModels/ActiveOrders.js +1 -1
- package/dist/mjs/staticModels/OfferResources.js +4 -5
- package/dist/mjs/staticModels/Offers.d.ts +3 -4
- package/dist/mjs/staticModels/Offers.js +16 -17
- package/dist/mjs/staticModels/OffersCommon.d.ts +18 -0
- package/dist/mjs/staticModels/OffersCommon.js +73 -0
- package/dist/mjs/staticModels/Orders.d.ts +6 -5
- package/dist/mjs/staticModels/Orders.js +98 -7
- package/dist/mjs/staticModels/SecretRequests.js +3 -4
- package/dist/mjs/staticModels/StaticModel.d.ts +14 -2
- package/dist/mjs/staticModels/StaticModel.js +90 -2
- package/dist/mjs/staticModels/SuperproToken.d.ts +26 -1
- package/dist/mjs/staticModels/SuperproToken.js +40 -1
- package/dist/mjs/staticModels/TeeOffers.d.ts +4 -4
- package/dist/mjs/staticModels/TeeOffers.js +17 -16
- package/dist/mjs/tee/OrderReportService.js +4 -2
- package/dist/mjs/tee/QuoteValidator.d.ts +3 -2
- package/dist/mjs/tee/QuoteValidator.js +5 -4
- package/dist/mjs/tee/TeeCertificateService.d.ts +1 -1
- package/dist/mjs/tee/TeeCertificateService.js +12 -15
- package/dist/mjs/tee/TeeSignatureVerifier.d.ts +6 -4
- package/dist/mjs/tee/TeeSignatureVerifier.js +59 -31
- package/dist/mjs/tee/types.d.ts +1 -1
- package/dist/mjs/types/Order.d.ts +28 -2
- package/dist/mjs/types/Order.js +21 -1
- package/dist/mjs/types/index.d.ts +0 -1
- package/dist/mjs/types/index.js +1 -2
- package/dist/mjs/utils/CryptoKeysTransformer.d.ts +4 -0
- package/dist/mjs/utils/CryptoKeysTransformer.js +50 -1
- package/dist/mjs/utils/TxManager.d.ts +2 -0
- package/dist/mjs/utils/TxManager.js +57 -26
- package/dist/mjs/utils/helper.d.ts +11 -3
- package/dist/mjs/utils/helper.js +54 -12
- package/dist/mjs/utils/helpers/getRawRpc.d.ts +2 -0
- package/dist/mjs/utils/helpers/getRawRpc.js +15 -0
- package/dist/mjs/utils/helpers/index.d.ts +1 -0
- package/dist/mjs/utils/helpers/index.js +2 -1
- package/dist/mjs/utils/types.d.ts +14 -0
- package/dist/mjs/utils/types.js +2 -0
- package/package.json +5 -3
- package/readme.md +11 -0
- package/dist/cjs/contracts/Campaign.d.ts +0 -1036
- package/dist/cjs/contracts/Campaign.js +0 -1347
- package/dist/cjs/staticModels/Campaign.d.ts +0 -59
- package/dist/cjs/staticModels/Campaign.js +0 -248
- package/dist/cjs/types/Campaign.d.ts +0 -57
- package/dist/cjs/types/Campaign.js +0 -11
- package/dist/mjs/contracts/Campaign.d.ts +0 -1036
- package/dist/mjs/contracts/Campaign.js +0 -1344
- package/dist/mjs/staticModels/Campaign.d.ts +0 -59
- package/dist/mjs/staticModels/Campaign.js +0 -243
- package/dist/mjs/types/Campaign.d.ts +0 -57
- package/dist/mjs/types/Campaign.js +0 -8
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { CertBinaryItem } from './types.js';
|
|
2
|
+
export declare enum CertificateNonOidParts {
|
|
3
|
+
SERIAL_NUMBER = "SERIAL_NUMBER",
|
|
4
|
+
SIGNATURE_ALGORITHM = "SIGNATURE_ALGORITHM",
|
|
5
|
+
ISSUER = "ISSUER",
|
|
6
|
+
NOT_BEFORE = "NOT_BEFORE",
|
|
7
|
+
NOT_AFTER = "NOT_AFTER",
|
|
8
|
+
SUBJECT = "SUBJECT",
|
|
9
|
+
SUBJECT_PUBLIC_KEY_INFO = "SUBJECT_PUBLIC_KEY_INFO",
|
|
10
|
+
SIGNATURE = "SIGNATURE"
|
|
11
|
+
}
|
|
12
|
+
export declare class CertificateBinarySplitter {
|
|
13
|
+
private parts;
|
|
14
|
+
private readonly certBinary;
|
|
15
|
+
private lastPosition;
|
|
16
|
+
constructor(certDer: ArrayBuffer);
|
|
17
|
+
split(nonOidParts: CertificateNonOidParts[], oids: string[]): Array<Uint8Array | CertBinaryItem>;
|
|
18
|
+
private processExtensions;
|
|
19
|
+
private getElementPositionInParent;
|
|
20
|
+
private addElement;
|
|
21
|
+
private addPublicKeyElement;
|
|
22
|
+
private addSignatureElement;
|
|
23
|
+
private getElementValueAndPosition;
|
|
24
|
+
private getValueHex;
|
|
25
|
+
private addPart;
|
|
26
|
+
}
|
|
@@ -0,0 +1,269 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.CertificateBinarySplitter = exports.CertificateNonOidParts = void 0;
|
|
4
|
+
const asn1js_1 = require("asn1js");
|
|
5
|
+
var CertificateNonOidParts;
|
|
6
|
+
(function (CertificateNonOidParts) {
|
|
7
|
+
CertificateNonOidParts["SERIAL_NUMBER"] = "SERIAL_NUMBER";
|
|
8
|
+
CertificateNonOidParts["SIGNATURE_ALGORITHM"] = "SIGNATURE_ALGORITHM";
|
|
9
|
+
CertificateNonOidParts["ISSUER"] = "ISSUER";
|
|
10
|
+
CertificateNonOidParts["NOT_BEFORE"] = "NOT_BEFORE";
|
|
11
|
+
CertificateNonOidParts["NOT_AFTER"] = "NOT_AFTER";
|
|
12
|
+
CertificateNonOidParts["SUBJECT"] = "SUBJECT";
|
|
13
|
+
CertificateNonOidParts["SUBJECT_PUBLIC_KEY_INFO"] = "SUBJECT_PUBLIC_KEY_INFO";
|
|
14
|
+
CertificateNonOidParts["SIGNATURE"] = "SIGNATURE";
|
|
15
|
+
})(CertificateNonOidParts || (exports.CertificateNonOidParts = CertificateNonOidParts = {}));
|
|
16
|
+
class CertificateBinarySplitter {
|
|
17
|
+
parts = [];
|
|
18
|
+
certBinary;
|
|
19
|
+
lastPosition = 0;
|
|
20
|
+
constructor(certDer) {
|
|
21
|
+
this.certBinary = new Uint8Array(certDer);
|
|
22
|
+
}
|
|
23
|
+
split(nonOidParts, oids) {
|
|
24
|
+
this.parts = [];
|
|
25
|
+
this.lastPosition = 0;
|
|
26
|
+
try {
|
|
27
|
+
const asn1 = (0, asn1js_1.fromBER)(this.certBinary);
|
|
28
|
+
if (asn1.offset === -1) {
|
|
29
|
+
throw new Error('Error parsing ASN.1 structure');
|
|
30
|
+
}
|
|
31
|
+
const certificate = asn1.result;
|
|
32
|
+
// certificate.valueBlock.value[0] = TBSCertificate
|
|
33
|
+
// certificate.valueBlock.value[1] = signatureAlgorithm
|
|
34
|
+
// certificate.valueBlock.value[2] = signature
|
|
35
|
+
const tbsCertificate = certificate.valueBlock.value[0];
|
|
36
|
+
const tbsStartPosition = this.getElementPositionInParent(tbsCertificate.toBER());
|
|
37
|
+
this.addPart(new Uint8Array(this.certBinary.slice(0, tbsStartPosition)));
|
|
38
|
+
this.lastPosition = tbsStartPosition;
|
|
39
|
+
const tbsValues = tbsCertificate.valueBlock.value;
|
|
40
|
+
let tbsIndex = 0;
|
|
41
|
+
// 1. Version [0] EXPLICIT (optional, default v1)
|
|
42
|
+
if (tbsValues[tbsIndex].idBlock.tagClass === 3 &&
|
|
43
|
+
tbsValues[tbsIndex].idBlock.tagNumber === 0) {
|
|
44
|
+
tbsIndex++; // skip version
|
|
45
|
+
}
|
|
46
|
+
// 2. Serial Number (mandatory)
|
|
47
|
+
const serialNumber = tbsValues[tbsIndex++];
|
|
48
|
+
if (serialNumber.idBlock.tagNumber !== 2) {
|
|
49
|
+
throw new Error('Expected serial number (INTEGER)');
|
|
50
|
+
}
|
|
51
|
+
if (nonOidParts.includes(CertificateNonOidParts.SERIAL_NUMBER)) {
|
|
52
|
+
this.addElement({
|
|
53
|
+
name: 'serialNumber',
|
|
54
|
+
element: serialNumber,
|
|
55
|
+
forcePushPrefix: true,
|
|
56
|
+
});
|
|
57
|
+
}
|
|
58
|
+
// 3. Signature Algorithm (mandatory)
|
|
59
|
+
const signatureAlgorithm = tbsValues[tbsIndex++];
|
|
60
|
+
if (nonOidParts.includes(CertificateNonOidParts.SIGNATURE_ALGORITHM)) {
|
|
61
|
+
this.addElement({ name: 'signatureAlgorithm', element: signatureAlgorithm });
|
|
62
|
+
}
|
|
63
|
+
// 4. Issuer (mandatory)
|
|
64
|
+
const issuer = tbsValues[tbsIndex++];
|
|
65
|
+
if (nonOidParts.includes(CertificateNonOidParts.ISSUER)) {
|
|
66
|
+
this.addElement({ name: 'issuer', element: issuer });
|
|
67
|
+
}
|
|
68
|
+
// 5. Validity (mandatory)
|
|
69
|
+
const validity = tbsValues[tbsIndex++];
|
|
70
|
+
const notBefore = validity.valueBlock.value[0];
|
|
71
|
+
const notAfter = validity.valueBlock.value[1];
|
|
72
|
+
if (nonOidParts.includes(CertificateNonOidParts.NOT_BEFORE)) {
|
|
73
|
+
this.addElement({ name: 'notBefore', element: notBefore });
|
|
74
|
+
}
|
|
75
|
+
if (nonOidParts.includes(CertificateNonOidParts.NOT_AFTER)) {
|
|
76
|
+
this.addElement({ name: 'notAfter', element: notAfter });
|
|
77
|
+
}
|
|
78
|
+
// 6. Subject
|
|
79
|
+
const subject = tbsValues[tbsIndex++];
|
|
80
|
+
if (nonOidParts.includes(CertificateNonOidParts.SUBJECT)) {
|
|
81
|
+
this.addElement({ name: 'subject', element: subject });
|
|
82
|
+
}
|
|
83
|
+
// 7.subjectPublicKeyInfo
|
|
84
|
+
const subjectPublicKeyInfo = tbsValues[tbsIndex++];
|
|
85
|
+
const publicKeyBitString = subjectPublicKeyInfo.valueBlock.value[1]; // BIT STRING with public key
|
|
86
|
+
if (nonOidParts.includes(CertificateNonOidParts.SUBJECT_PUBLIC_KEY_INFO)) {
|
|
87
|
+
this.addPublicKeyElement(publicKeyBitString);
|
|
88
|
+
}
|
|
89
|
+
// 8. issuerUniqueID [1] IMPLICIT (optional, only in v2+)
|
|
90
|
+
if (tbsIndex < tbsValues.length &&
|
|
91
|
+
tbsValues[tbsIndex].idBlock.tagClass === 3 &&
|
|
92
|
+
tbsValues[tbsIndex].idBlock.tagNumber === 1) {
|
|
93
|
+
tbsIndex++; // skip issuerUniqueID
|
|
94
|
+
}
|
|
95
|
+
// 9. subjectUniqueID [2] IMPLICIT (optional, only in v2+)
|
|
96
|
+
if (tbsIndex < tbsValues.length &&
|
|
97
|
+
tbsValues[tbsIndex].idBlock.tagClass === 3 &&
|
|
98
|
+
tbsValues[tbsIndex].idBlock.tagNumber === 2) {
|
|
99
|
+
tbsIndex++; // skip subjectUniqueID
|
|
100
|
+
}
|
|
101
|
+
// 10. Extensions
|
|
102
|
+
if (tbsIndex < tbsValues.length) {
|
|
103
|
+
const extensions = tbsValues[tbsIndex];
|
|
104
|
+
if (extensions.idBlock.tagClass === 3 && extensions.idBlock.tagNumber === 3) {
|
|
105
|
+
const extensionsSequence = extensions.valueBlock.value[0];
|
|
106
|
+
this.processExtensions(extensionsSequence, oids);
|
|
107
|
+
}
|
|
108
|
+
}
|
|
109
|
+
// 11. signature
|
|
110
|
+
if (nonOidParts.includes(CertificateNonOidParts.SIGNATURE)) {
|
|
111
|
+
const signatureAlgorithmId = certificate.valueBlock.value[1];
|
|
112
|
+
this.addElement({
|
|
113
|
+
element: signatureAlgorithmId,
|
|
114
|
+
forcePushPrefix: true,
|
|
115
|
+
forcePushHeader: true,
|
|
116
|
+
});
|
|
117
|
+
const signature = certificate.valueBlock.value[2];
|
|
118
|
+
this.addSignatureElement(signature);
|
|
119
|
+
}
|
|
120
|
+
// Add any remaining part after the last processed element
|
|
121
|
+
if (this.lastPosition < this.certBinary.length) {
|
|
122
|
+
this.addPart(new Uint8Array(this.certBinary.slice(this.lastPosition)));
|
|
123
|
+
}
|
|
124
|
+
return this.parts;
|
|
125
|
+
}
|
|
126
|
+
catch (error) {
|
|
127
|
+
throw new Error(`Failed to split certificate: ${error instanceof Error ? error.message : 'Unknown error'}`);
|
|
128
|
+
}
|
|
129
|
+
}
|
|
130
|
+
processExtensions(extensionsSequence, targetOids) {
|
|
131
|
+
for (const extension of extensionsSequence.valueBlock.value) {
|
|
132
|
+
const extValues = extension.valueBlock.value;
|
|
133
|
+
const oid = extValues[0].valueBlock.toString(); // OID as string
|
|
134
|
+
if (!targetOids.includes(oid)) {
|
|
135
|
+
continue;
|
|
136
|
+
}
|
|
137
|
+
// Find OCTET STRING with extension value
|
|
138
|
+
let octetString;
|
|
139
|
+
if (extValues.length === 3) {
|
|
140
|
+
// OID + critical + OCTET STRING
|
|
141
|
+
octetString = extValues[2];
|
|
142
|
+
}
|
|
143
|
+
else {
|
|
144
|
+
// OID + OCTET STRING
|
|
145
|
+
octetString = extValues[1];
|
|
146
|
+
}
|
|
147
|
+
this.addElement({ name: 'extension', element: octetString, oid });
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
getElementPositionInParent(element, parent) {
|
|
151
|
+
const elementBytes = new Uint8Array(element);
|
|
152
|
+
const parentToSearch = parent || this.certBinary;
|
|
153
|
+
const startPosition = parent ? 0 : this.lastPosition;
|
|
154
|
+
for (let i = startPosition; i <= parentToSearch.length - elementBytes.length; i++) {
|
|
155
|
+
let match = true;
|
|
156
|
+
for (let j = 0; j < elementBytes.length; j++) {
|
|
157
|
+
if (parentToSearch[i + j] !== elementBytes[j]) {
|
|
158
|
+
match = false;
|
|
159
|
+
break;
|
|
160
|
+
}
|
|
161
|
+
}
|
|
162
|
+
if (match) {
|
|
163
|
+
return i;
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
throw new Error('Some element not found in certificate binary');
|
|
167
|
+
}
|
|
168
|
+
addElement({ name, element, oid, forcePushPrefix, forcePushHeader, }) {
|
|
169
|
+
const { value, position } = this.getElementValueAndPosition({
|
|
170
|
+
element,
|
|
171
|
+
forcePushPrefix,
|
|
172
|
+
forcePushHeader,
|
|
173
|
+
});
|
|
174
|
+
name ? this.addPart({ name, value, oid }) : this.addPart(new Uint8Array(value));
|
|
175
|
+
this.lastPosition = position + value.byteLength;
|
|
176
|
+
}
|
|
177
|
+
addPublicKeyElement(element) {
|
|
178
|
+
const { value, position } = this.getElementValueAndPosition({ element });
|
|
179
|
+
// extract first byte 0x04 - uncompressed public key
|
|
180
|
+
this.addPart(new Uint8Array(value.slice(0, 1)));
|
|
181
|
+
this.addPart({ name: 'publicKey', value: value.slice(1) });
|
|
182
|
+
this.lastPosition = position + value.byteLength;
|
|
183
|
+
}
|
|
184
|
+
addSignatureElement(element) {
|
|
185
|
+
const { value, position } = this.getElementValueAndPosition({ element });
|
|
186
|
+
// Parse the signature as ASN.1 SEQUENCE containing R and S values
|
|
187
|
+
const signatureAsn1 = (0, asn1js_1.fromBER)(value);
|
|
188
|
+
const sequence = signatureAsn1.result;
|
|
189
|
+
const rElement = sequence.valueBlock.value[0];
|
|
190
|
+
const sElement = sequence.valueBlock.value[1];
|
|
191
|
+
const rBer = rElement.toBER();
|
|
192
|
+
const sBer = sElement.toBER();
|
|
193
|
+
// R value
|
|
194
|
+
const rPosition = this.getElementPositionInParent(rBer, value);
|
|
195
|
+
this.addPart(new Uint8Array(value.slice(0, rPosition)));
|
|
196
|
+
let rValue = this.getValueHex(rElement);
|
|
197
|
+
if (rValue.byteLength > 32) {
|
|
198
|
+
rValue = rValue.slice(rValue.byteLength - 32);
|
|
199
|
+
}
|
|
200
|
+
const rHeaderLength = rBer.byteLength - rValue.byteLength;
|
|
201
|
+
if (rHeaderLength > 0) {
|
|
202
|
+
this.addPart(new Uint8Array(value.slice(rPosition, rPosition + rHeaderLength)));
|
|
203
|
+
}
|
|
204
|
+
const rEndPos = rPosition + rBer.byteLength;
|
|
205
|
+
// S value
|
|
206
|
+
const sPosition = this.getElementPositionInParent(sBer, value);
|
|
207
|
+
if (sPosition > rEndPos) {
|
|
208
|
+
this.addPart(new Uint8Array(value.slice(rEndPos, sPosition)));
|
|
209
|
+
}
|
|
210
|
+
let sValue = this.getValueHex(sElement);
|
|
211
|
+
if (sValue.byteLength > 32) {
|
|
212
|
+
sValue = sValue.slice(sValue.byteLength - 32);
|
|
213
|
+
}
|
|
214
|
+
const sHeaderLength = sBer.byteLength - sValue.byteLength;
|
|
215
|
+
if (sHeaderLength > 0) {
|
|
216
|
+
this.addPart(new Uint8Array(value.slice(sPosition, sPosition + sHeaderLength)), true);
|
|
217
|
+
}
|
|
218
|
+
const fullSignature = Buffer.concat([Buffer.from(rValue), Buffer.from(sValue)]);
|
|
219
|
+
this.addPart({ name: 'signature', value: new Uint8Array(fullSignature) });
|
|
220
|
+
const sEndPos = sPosition + sBer.byteLength;
|
|
221
|
+
if (sEndPos < value.byteLength) {
|
|
222
|
+
this.addPart(new Uint8Array(value.slice(sEndPos)));
|
|
223
|
+
}
|
|
224
|
+
this.lastPosition = position + value.byteLength;
|
|
225
|
+
}
|
|
226
|
+
getElementValueAndPosition({ element, forcePushPrefix = false, forcePushHeader = false, }) {
|
|
227
|
+
const elementBer = element.toBER();
|
|
228
|
+
const elementValue = this.getValueHex(element);
|
|
229
|
+
const elementPosition = this.getElementPositionInParent(elementBer);
|
|
230
|
+
const valueOffsetInElement = elementBer.byteLength - elementValue.byteLength;
|
|
231
|
+
const valuePosition = elementPosition + valueOffsetInElement;
|
|
232
|
+
// Part before element
|
|
233
|
+
if (this.lastPosition < elementPosition) {
|
|
234
|
+
this.addPart(new Uint8Array(this.certBinary.slice(this.lastPosition, elementPosition)), forcePushPrefix);
|
|
235
|
+
}
|
|
236
|
+
// Element header
|
|
237
|
+
if (valueOffsetInElement > 0) {
|
|
238
|
+
this.addPart(new Uint8Array(this.certBinary.slice(elementPosition, valuePosition)), forcePushHeader);
|
|
239
|
+
}
|
|
240
|
+
return {
|
|
241
|
+
value: new Uint8Array(elementValue),
|
|
242
|
+
position: valuePosition,
|
|
243
|
+
};
|
|
244
|
+
}
|
|
245
|
+
getValueHex(element) {
|
|
246
|
+
if ('valueHex' in element.valueBlock) {
|
|
247
|
+
return element.valueBlock.valueHex;
|
|
248
|
+
}
|
|
249
|
+
if ('value' in element.valueBlock && Array.isArray(element.valueBlock.value)) {
|
|
250
|
+
const arrayBuffers = element.valueBlock.value.map((valueItem) => valueItem.toBER());
|
|
251
|
+
const concatenatedBuffer = arrayBuffers.reduce((acc, current) => Buffer.concat([acc, Buffer.from(current)]), Buffer.alloc(0));
|
|
252
|
+
return new Uint8Array(concatenatedBuffer).buffer;
|
|
253
|
+
}
|
|
254
|
+
throw new Error('Cannot extract valueHex from element');
|
|
255
|
+
}
|
|
256
|
+
addPart(part, forcePush = false) {
|
|
257
|
+
const lastPart = this.parts[this.parts.length - 1];
|
|
258
|
+
if (part instanceof Uint8Array && lastPart instanceof Uint8Array && !forcePush) {
|
|
259
|
+
const merged = new Uint8Array(lastPart.length + part.length);
|
|
260
|
+
merged.set(lastPart, 0);
|
|
261
|
+
merged.set(part, lastPart.length);
|
|
262
|
+
this.parts[this.parts.length - 1] = merged;
|
|
263
|
+
return;
|
|
264
|
+
}
|
|
265
|
+
this.parts.push(part);
|
|
266
|
+
}
|
|
267
|
+
}
|
|
268
|
+
exports.CertificateBinarySplitter = CertificateBinarySplitter;
|
|
269
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"binary-splitter.js","sourceRoot":"","sources":["../../../src/certificates/binary-splitter.ts"],"names":[],"mappings":";;;AAAA,mCAA8C;AAG9C,IAAY,sBASX;AATD,WAAY,sBAAsB;IAChC,yDAA+B,CAAA;IAC/B,qEAA2C,CAAA;IAC3C,2CAAiB,CAAA;IACjB,mDAAyB,CAAA;IACzB,iDAAuB,CAAA;IACvB,6CAAmB,CAAA;IACnB,6EAAmD,CAAA;IACnD,iDAAuB,CAAA;AACzB,CAAC,EATW,sBAAsB,sCAAtB,sBAAsB,QASjC;AAED,MAAa,yBAAyB;IAC5B,KAAK,GAAuC,EAAE,CAAC;IACtC,UAAU,CAAa;IAChC,YAAY,GAAG,CAAC,CAAC;IAEzB,YAAY,OAAoB;QAC9B,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;IAC5C,CAAC;IAED,KAAK,CAAC,WAAqC,EAAE,IAAc;QACzD,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;QAChB,IAAI,CAAC,YAAY,GAAG,CAAC,CAAC;QAEtB,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,IAAA,gBAAO,EAAC,IAAI,CAAC,UAAU,CAAC,CAAC;YACtC,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;gBACvB,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,WAAW,GAAG,IAAI,CAAC,MAAqB,CAAC;YAE/C,mDAAmD;YACnD,uDAAuD;YACvD,8CAA8C;YAE9C,MAAM,cAAc,GAAG,WAAW,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAgB,CAAC;YAEtE,MAAM,gBAAgB,GAAG,IAAI,CAAC,0BAA0B,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC,CAAC;YACjF,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,EAAE,gBAAgB,CAAC,CAAC,CAAC,CAAC;YACzE,IAAI,CAAC,YAAY,GAAG,gBAAgB,CAAC;YAErC,MAAM,SAAS,GAAG,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC;YAClD,IAAI,QAAQ,GAAG,CAAC,CAAC;YAEjB,iDAAiD;YACjD,IACE,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,QAAQ,KAAK,CAAC;gBAC1C,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,SAAS,KAAK,CAAC,EAC3C,CAAC;gBACD,QAAQ,EAAE,CAAC,CAAC,eAAe;YAC7B,CAAC;YAED,+BAA+B;YAC/B,MAAM,YAAY,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;YAC3C,IAAI,YAAY,CAAC,OAAO,CAAC,SAAS,KAAK,CAAC,EAAE,CAAC;gBACzC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;YACtD,CAAC;YAED,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,aAAa,CAAC,EAAE,CAAC;gBAC/D,IAAI,CAAC,UAAU,CAAC;oBACd,IAAI,EAAE,cAAc;oBACpB,OAAO,EAAE,YAAY;oBACrB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;YACL,CAAC;YAED,qCAAqC;YACrC,MAAM,kBAAkB,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;YACjD,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,mBAAmB,CAAC,EAAE,CAAC;gBACrE,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,oBAAoB,EAAE,OAAO,EAAE,kBAAkB,EAAE,CAAC,CAAC;YAC/E,CAAC;YAED,wBAAwB;YACxB,MAAM,MAAM,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;YACrC,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,MAAM,CAAC,EAAE,CAAC;gBACxD,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC;YACvD,CAAC;YAED,0BAA0B;YAC1B,MAAM,QAAQ,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAgB,CAAC;YACtD,MAAM,SAAS,GAAG,QAAQ,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAC/C,MAAM,QAAQ,GAAG,QAAQ,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE9C,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,UAAU,CAAC,EAAE,CAAC;gBAC5D,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,OAAO,EAAE,SAAS,EAAE,CAAC,CAAC;YAC7D,CAAC;YAED,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC3D,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,OAAO,EAAE,QAAQ,EAAE,CAAC,CAAC;YAC3D,CAAC;YAED,aAAa;YACb,MAAM,OAAO,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;YACtC,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,OAAO,CAAC,EAAE,CAAC;gBACzD,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,SAAS,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC,CAAC;YACzD,CAAC;YAED,yBAAyB;YACzB,MAAM,oBAAoB,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAgB,CAAC;YAClE,MAAM,kBAAkB,GAAG,oBAAoB,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,6BAA6B;YAClG,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,uBAAuB,CAAC,EAAE,CAAC;gBACzE,IAAI,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC;YAC/C,CAAC;YAED,yDAAyD;YACzD,IACE,QAAQ,GAAG,SAAS,CAAC,MAAM;gBAC3B,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,QAAQ,KAAK,CAAC;gBAC1C,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,SAAS,KAAK,CAAC,EAC3C,CAAC;gBACD,QAAQ,EAAE,CAAC,CAAC,sBAAsB;YACpC,CAAC;YAED,0DAA0D;YAC1D,IACE,QAAQ,GAAG,SAAS,CAAC,MAAM;gBAC3B,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,QAAQ,KAAK,CAAC;gBAC1C,SAAS,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,SAAS,KAAK,CAAC,EAC3C,CAAC;gBACD,QAAQ,EAAE,CAAC,CAAC,uBAAuB;YACrC,CAAC;YAED,iBAAiB;YACjB,IAAI,QAAQ,GAAG,SAAS,CAAC,MAAM,EAAE,CAAC;gBAChC,MAAM,UAAU,GAAG,SAAS,CAAC,QAAQ,CAAgB,CAAC;gBACtD,IAAI,UAAU,CAAC,OAAO,CAAC,QAAQ,KAAK,CAAC,IAAI,UAAU,CAAC,OAAO,CAAC,SAAS,KAAK,CAAC,EAAE,CAAC;oBAC5E,MAAM,kBAAkB,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAgB,CAAC;oBACzE,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC;gBACnD,CAAC;YACH,CAAC;YAED,gBAAgB;YAEhB,IAAI,WAAW,CAAC,QAAQ,CAAC,sBAAsB,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC3D,MAAM,oBAAoB,GAAG,WAAW,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAC7D,IAAI,CAAC,UAAU,CAAC;oBACd,OAAO,EAAE,oBAAoB;oBAC7B,eAAe,EAAE,IAAI;oBACrB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,MAAM,SAAS,GAAG,WAAW,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAClD,IAAI,CAAC,mBAAmB,CAAC,SAAS,CAAC,CAAC;YACtC,CAAC;YAED,0DAA0D;YAC1D,IAAI,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;gBAC/C,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzE,CAAC;YAED,OAAO,IAAI,CAAC,KAAK,CAAC;QACpB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,gCAAgC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe,EAAE,CAC3F,CAAC;QACJ,CAAC;IACH,CAAC;IAEO,iBAAiB,CAAC,kBAA+B,EAAE,UAAoB;QAC7E,KAAK,MAAM,SAAS,IAAI,kBAAkB,CAAC,UAAU,CAAC,KAAsB,EAAE,CAAC;YAC7E,MAAM,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC;YAC7C,MAAM,GAAG,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,QAAQ,EAAE,CAAC,CAAC,gBAAgB;YAEhE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC9B,SAAS;YACX,CAAC;YAED,yCAAyC;YACzC,IAAI,WAAW,CAAC;YAChB,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC3B,gCAAgC;gBAChC,WAAW,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC;YAC7B,CAAC;iBAAM,CAAC;gBACN,qBAAqB;gBACrB,WAAW,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC;YAC7B,CAAC;YAED,IAAI,CAAC,UAAU,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAEO,0BAA0B,CAAC,OAAoB,EAAE,MAAmB;QAC1E,MAAM,YAAY,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;QAC7C,MAAM,cAAc,GAAG,MAAM,IAAI,IAAI,CAAC,UAAU,CAAC;QACjD,MAAM,aAAa,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC;QAErD,KAAK,IAAI,CAAC,GAAG,aAAa,EAAE,CAAC,IAAI,cAAc,CAAC,MAAM,GAAG,YAAY,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YAClF,IAAI,KAAK,GAAG,IAAI,CAAC;YACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,YAAY,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC7C,IAAI,cAAc,CAAC,CAAC,GAAG,CAAC,CAAC,KAAK,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC9C,KAAK,GAAG,KAAK,CAAC;oBACd,MAAM;gBACR,CAAC;YACH,CAAC;YACD,IAAI,KAAK,EAAE,CAAC;gBACV,OAAO,CAAC,CAAC;YACX,CAAC;QACH,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;IAClE,CAAC;IAEO,UAAU,CAAC,EACjB,IAAI,EACJ,OAAO,EACP,GAAG,EACH,eAAe,EACf,eAAe,GAOhB;QACC,MAAM,EAAE,KAAK,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,0BAA0B,CAAC;YAC1D,OAAO;YACP,eAAe;YACf,eAAe;SAChB,CAAC,CAAC;QACH,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC;QAEhF,IAAI,CAAC,YAAY,GAAG,QAAQ,GAAG,KAAK,CAAC,UAAU,CAAC;IAClD,CAAC;IAEO,mBAAmB,CACzB,OAAiE;QAEjE,MAAM,EAAE,KAAK,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,0BAA0B,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC;QACzE,oDAAoD;QACpD,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;QAChD,IAAI,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,KAAK,EAAE,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;QAE3D,IAAI,CAAC,YAAY,GAAG,QAAQ,GAAG,KAAK,CAAC,UAAU,CAAC;IAClD,CAAC;IAEO,mBAAmB,CACzB,OAAiE;QAEjE,MAAM,EAAE,KAAK,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,0BAA0B,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC;QAEzE,kEAAkE;QAClE,MAAM,aAAa,GAAG,IAAA,gBAAO,EAAC,KAAK,CAAC,CAAC;QACrC,MAAM,QAAQ,GAAG,aAAa,CAAC,MAAqB,CAAC;QACrD,MAAM,QAAQ,GAAG,QAAQ,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAC9C,MAAM,QAAQ,GAAG,QAAQ,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAE9C,MAAM,IAAI,GAAG,QAAQ,CAAC,KAAK,EAAE,CAAC;QAC9B,MAAM,IAAI,GAAG,QAAQ,CAAC,KAAK,EAAE,CAAC;QAE9B,UAAU;QACV,MAAM,SAAS,GAAG,IAAI,CAAC,0BAA0B,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC;QAC/D,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC;QACxD,IAAI,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QACxC,IAAI,MAAM,CAAC,UAAU,GAAG,EAAE,EAAE,CAAC;YAC3B,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,UAAU,GAAG,EAAE,CAAC,CAAC;QAChD,CAAC;QACD,MAAM,aAAa,GAAG,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,UAAU,CAAC;QAC1D,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YACtB,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,SAAS,EAAE,SAAS,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QAClF,CAAC;QACD,MAAM,OAAO,GAAG,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC;QAE5C,UAAU;QACV,MAAM,SAAS,GAAG,IAAI,CAAC,0BAA0B,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC;QAC/D,IAAI,SAAS,GAAG,OAAO,EAAE,CAAC;YACxB,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,IAAI,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QACxC,IAAI,MAAM,CAAC,UAAU,GAAG,EAAE,EAAE,CAAC;YAC3B,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,UAAU,GAAG,EAAE,CAAC,CAAC;QAChD,CAAC;QACD,MAAM,aAAa,GAAG,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,UAAU,CAAC;QAC1D,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YACtB,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,SAAS,EAAE,SAAS,GAAG,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QACxF,CAAC;QAED,MAAM,aAAa,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;QAChF,IAAI,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,KAAK,EAAE,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;QAE1E,MAAM,OAAO,GAAG,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC;QAC5C,IAAI,OAAO,GAAG,KAAK,CAAC,UAAU,EAAE,CAAC;YAC/B,IAAI,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;QACrD,CAAC;QAED,IAAI,CAAC,YAAY,GAAG,QAAQ,GAAG,KAAK,CAAC,UAAU,CAAC;IAClD,CAAC;IAEO,0BAA0B,CAAC,EACjC,OAAO,EACP,eAAe,GAAG,KAAK,EACvB,eAAe,GAAG,KAAK,GAKxB;QACC,MAAM,UAAU,GAAG,OAAO,CAAC,KAAK,EAAE,CAAC;QACnC,MAAM,YAAY,GAAG,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC/C,MAAM,eAAe,GAAG,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,CAAC;QAEpE,MAAM,oBAAoB,GAAG,UAAU,CAAC,UAAU,GAAG,YAAY,CAAC,UAAU,CAAC;QAC7E,MAAM,aAAa,GAAG,eAAe,GAAG,oBAAoB,CAAC;QAE7D,sBAAsB;QACtB,IAAI,IAAI,CAAC,YAAY,GAAG,eAAe,EAAE,CAAC;YACxC,IAAI,CAAC,OAAO,CACV,IAAI,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC,EACzE,eAAe,CAChB,CAAC;QACJ,CAAC;QAED,iBAAiB;QACjB,IAAI,oBAAoB,GAAG,CAAC,EAAE,CAAC;YAC7B,IAAI,CAAC,OAAO,CACV,IAAI,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,eAAe,EAAE,aAAa,CAAC,CAAC,EACrE,eAAe,CAChB,CAAC;QACJ,CAAC;QAED,OAAO;YACL,KAAK,EAAE,IAAI,UAAU,CAAC,YAAY,CAAC;YACnC,QAAQ,EAAE,aAAa;SACxB,CAAC;IACJ,CAAC;IAEO,WAAW,CACjB,OAAiE;QAEjE,IAAI,UAAU,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACrC,OAAO,OAAO,CAAC,UAAU,CAAC,QAAuB,CAAC;QACpD,CAAC;QAED,IAAI,OAAO,IAAI,OAAO,CAAC,UAAU,IAAI,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;YAC7E,MAAM,YAAY,GAAG,OAAO,CAAC,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC,CAAC;YACpF,MAAM,kBAAkB,GAAG,YAAY,CAAC,MAAM,CAC5C,CAAC,GAAW,EAAE,OAAoB,EAAE,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,EACjF,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAChB,CAAC;YACF,OAAO,IAAI,UAAU,CAAC,kBAAkB,CAAC,CAAC,MAAM,CAAC;QACnD,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;IAC1D,CAAC;IAEO,OAAO,CAAC,IAAiC,EAAE,SAAS,GAAG,KAAK;QAClE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QACnD,IAAI,IAAI,YAAY,UAAU,IAAI,QAAQ,YAAY,UAAU,IAAI,CAAC,SAAS,EAAE,CAAC;YAC/E,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;YAC7D,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,QAAQ,CAAC,MAAM,CAAC,CAAC;YAClC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,MAAM,CAAC;YAC3C,OAAO;QACT,CAAC;QAED,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACxB,CAAC;CACF;AA3VD,8DA2VC"}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
import { GenerateCertParams, GenerateCsrParams, ParsedCert, ParsedCsr, SignatureAlgorithm } from './types.js';
|
|
2
|
+
export declare class CertificateGenerator {
|
|
3
|
+
/**
|
|
4
|
+
* Generates certificate based on the provided parameters.
|
|
5
|
+
* @param params - Parameters for generating the certificate.
|
|
6
|
+
* @returns The generated certificate in PEM format.
|
|
7
|
+
*/
|
|
8
|
+
static generateCert(params: GenerateCertParams): Promise<string>;
|
|
9
|
+
/**
|
|
10
|
+
* Generates a pair of cryptographic keys based on the specified signature algorithm.
|
|
11
|
+
* @param signatureAlgorithm - The algorithm to use for key generation.
|
|
12
|
+
* @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
|
|
13
|
+
*/
|
|
14
|
+
static generateKeys(signatureAlgorithm: SignatureAlgorithm): Promise<CryptoKeyPair>;
|
|
15
|
+
/**
|
|
16
|
+
* Generates a Certificate Signing Request (CSR) based on the provided parameters.
|
|
17
|
+
* @param params - Parameters for generating the CSR.
|
|
18
|
+
* @returns The generated CSR in PEM format.
|
|
19
|
+
*/
|
|
20
|
+
static generateCsr(params: GenerateCsrParams): Promise<string>;
|
|
21
|
+
/**
|
|
22
|
+
* Checks and parses a certificate in PEM format.
|
|
23
|
+
* @param certPem - The certificate in PEM format.
|
|
24
|
+
* @returns An object containing the parsed certificate details.
|
|
25
|
+
*/
|
|
26
|
+
static checkAndParseCert(certPem: string): Promise<ParsedCert>;
|
|
27
|
+
/**
|
|
28
|
+
* Checks and parses a Certificate Signing Request (CSR) in PEM format.
|
|
29
|
+
* @param csrPem - The CSR in PEM format.
|
|
30
|
+
* @returns An object containing the parsed CSR details.
|
|
31
|
+
*/
|
|
32
|
+
static checkAndParseCsr(csrPem: string): Promise<ParsedCsr>;
|
|
33
|
+
private static getCryptoKeys;
|
|
34
|
+
private static generateSerialNumber;
|
|
35
|
+
private static getPrincipalInfo;
|
|
36
|
+
private static getAlgorithm;
|
|
37
|
+
private static extractDnsNamesFromExtensions;
|
|
38
|
+
}
|
|
@@ -0,0 +1,237 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.CertificateGenerator = void 0;
|
|
7
|
+
const assert_1 = __importDefault(require("assert"));
|
|
8
|
+
const crypto_1 = require("crypto");
|
|
9
|
+
const node_forge_1 = __importDefault(require("node-forge"));
|
|
10
|
+
const x509_1 = require("@peculiar/x509");
|
|
11
|
+
const setup_crypto_js_1 = require("./setup-crypto.js");
|
|
12
|
+
const CryptoKeysTransformer_js_1 = require("../utils/CryptoKeysTransformer.js");
|
|
13
|
+
const helper_js_1 = require("../utils/helper.js");
|
|
14
|
+
const MAX_X509_SERIAL = BigInt('0x' + 'F'.repeat(40));
|
|
15
|
+
const principalAttributeMap = {
|
|
16
|
+
commonName: 'CN',
|
|
17
|
+
country: 'C',
|
|
18
|
+
localityName: 'L',
|
|
19
|
+
stateName: 'ST',
|
|
20
|
+
organization: 'O',
|
|
21
|
+
organizationalUnit: 'OU',
|
|
22
|
+
};
|
|
23
|
+
const notAllowedCertificateCustomExtensions = [...Object.values(node_forge_1.default.pki.oids)];
|
|
24
|
+
class CertificateGenerator {
|
|
25
|
+
/**
|
|
26
|
+
* Generates certificate based on the provided parameters.
|
|
27
|
+
* @param params - Parameters for generating the certificate.
|
|
28
|
+
* @returns The generated certificate in PEM format.
|
|
29
|
+
*/
|
|
30
|
+
static async generateCert(params) {
|
|
31
|
+
const ca = Boolean(params.ca);
|
|
32
|
+
const { publicKey, privateKey } = await CertificateGenerator.getCryptoKeys(params);
|
|
33
|
+
const signingAlgorithm = publicKey.algorithm;
|
|
34
|
+
const extensions = [new x509_1.BasicConstraintsExtension(ca, undefined, true)];
|
|
35
|
+
const extendedKeyUsageItems = [];
|
|
36
|
+
if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
|
|
37
|
+
const generalNames = params.dnsNames.map((dnsName) => ({
|
|
38
|
+
type: ((0, helper_js_1.isIpAddress)(dnsName) ? 'ip' : 'dns'),
|
|
39
|
+
value: dnsName,
|
|
40
|
+
}));
|
|
41
|
+
extensions.push(new x509_1.SubjectAlternativeNameExtension(generalNames));
|
|
42
|
+
extendedKeyUsageItems.push(...[x509_1.ExtendedKeyUsage.serverAuth, x509_1.ExtendedKeyUsage.clientAuth]);
|
|
43
|
+
}
|
|
44
|
+
if (params.ocspSigning) {
|
|
45
|
+
extendedKeyUsageItems.push(x509_1.ExtendedKeyUsage.ocspSigning);
|
|
46
|
+
}
|
|
47
|
+
if (extendedKeyUsageItems.length) {
|
|
48
|
+
extensions.push(new x509_1.ExtendedKeyUsageExtension(extendedKeyUsageItems, false));
|
|
49
|
+
}
|
|
50
|
+
let keyUsageFlags = x509_1.KeyUsageFlags.digitalSignature | x509_1.KeyUsageFlags.keyEncipherment;
|
|
51
|
+
if (params.ca) {
|
|
52
|
+
keyUsageFlags |= x509_1.KeyUsageFlags.keyCertSign;
|
|
53
|
+
}
|
|
54
|
+
extensions.push(new x509_1.KeyUsagesExtension(keyUsageFlags, true));
|
|
55
|
+
if (params.customExtensions?.length) {
|
|
56
|
+
const filteredExtensions = params.customExtensions.filter((ext) => !notAllowedCertificateCustomExtensions.includes(ext.oid));
|
|
57
|
+
for (const customExtension of filteredExtensions) {
|
|
58
|
+
if (!customExtension.oid || !customExtension.value) {
|
|
59
|
+
throw new Error('Custom extension OID and value are required');
|
|
60
|
+
}
|
|
61
|
+
extensions.push(new x509_1.Extension(customExtension.oid, false, customExtension.value));
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
const createCertificateParams = {
|
|
65
|
+
serialNumber: CertificateGenerator.generateSerialNumber(),
|
|
66
|
+
issuer: CertificateGenerator.getPrincipalInfo(params.issuer),
|
|
67
|
+
subject: CertificateGenerator.getPrincipalInfo(params.subject),
|
|
68
|
+
notBefore: new Date(),
|
|
69
|
+
notAfter: params.notAfter,
|
|
70
|
+
publicKey,
|
|
71
|
+
signingKey: privateKey,
|
|
72
|
+
signingAlgorithm,
|
|
73
|
+
extensions,
|
|
74
|
+
};
|
|
75
|
+
const cert = await x509_1.X509CertificateGenerator.create(createCertificateParams);
|
|
76
|
+
return cert.toString('pem');
|
|
77
|
+
}
|
|
78
|
+
/**
|
|
79
|
+
* Generates a pair of cryptographic keys based on the specified signature algorithm.
|
|
80
|
+
* @param signatureAlgorithm - The algorithm to use for key generation.
|
|
81
|
+
* @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
|
|
82
|
+
*/
|
|
83
|
+
static generateKeys(signatureAlgorithm) {
|
|
84
|
+
const algorithm = CertificateGenerator.getAlgorithm(signatureAlgorithm);
|
|
85
|
+
return setup_crypto_js_1.cryptoProvider.subtle.generateKey(algorithm, true, ['sign', 'verify']);
|
|
86
|
+
}
|
|
87
|
+
/**
|
|
88
|
+
* Generates a Certificate Signing Request (CSR) based on the provided parameters.
|
|
89
|
+
* @param params - Parameters for generating the CSR.
|
|
90
|
+
* @returns The generated CSR in PEM format.
|
|
91
|
+
*/
|
|
92
|
+
static async generateCsr(params) {
|
|
93
|
+
const keys = await CertificateGenerator.getCryptoKeys(params);
|
|
94
|
+
const signingAlgorithm = keys.publicKey.algorithm;
|
|
95
|
+
signingAlgorithm.hash = { name: 'SHA-256' };
|
|
96
|
+
const extensions = [];
|
|
97
|
+
if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
|
|
98
|
+
const generalNames = params.dnsNames.map((dnsName) => ({
|
|
99
|
+
type: ((0, helper_js_1.isIpAddress)(dnsName) ? 'ip' : 'dns'),
|
|
100
|
+
value: dnsName,
|
|
101
|
+
}));
|
|
102
|
+
extensions.push(new x509_1.SubjectAlternativeNameExtension(generalNames));
|
|
103
|
+
}
|
|
104
|
+
if (params.customExtensions?.length) {
|
|
105
|
+
for (const customExtension of params.customExtensions) {
|
|
106
|
+
if (!customExtension.oid || !customExtension.value) {
|
|
107
|
+
throw new Error(`Some custom extension missed OID or value`);
|
|
108
|
+
}
|
|
109
|
+
extensions.push(new x509_1.Extension(customExtension.oid, false, customExtension.value));
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
const createCsrParams = {
|
|
113
|
+
name: CertificateGenerator.getPrincipalInfo(params.subject),
|
|
114
|
+
keys,
|
|
115
|
+
signingAlgorithm,
|
|
116
|
+
extensions,
|
|
117
|
+
};
|
|
118
|
+
const csr = await x509_1.Pkcs10CertificateRequestGenerator.create(createCsrParams);
|
|
119
|
+
return csr.toString('pem');
|
|
120
|
+
}
|
|
121
|
+
/**
|
|
122
|
+
* Checks and parses a certificate in PEM format.
|
|
123
|
+
* @param certPem - The certificate in PEM format.
|
|
124
|
+
* @returns An object containing the parsed certificate details.
|
|
125
|
+
*/
|
|
126
|
+
static async checkAndParseCert(certPem) {
|
|
127
|
+
const cert = new x509_1.X509Certificate(certPem);
|
|
128
|
+
if (cert.issuer === cert.subject) {
|
|
129
|
+
const isValid = await cert.verify();
|
|
130
|
+
if (!isValid) {
|
|
131
|
+
throw new Error('Self-signed certificate signature verification failed');
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
const publicKey = await setup_crypto_js_1.cryptoProvider.subtle.importKey('spki', cert.publicKey.rawData, Object.assign(cert.signatureAlgorithm, cert.publicKey.algorithm), true, ['verify']);
|
|
135
|
+
return {
|
|
136
|
+
serialNumber: cert.serialNumber,
|
|
137
|
+
publicKey,
|
|
138
|
+
subject: cert.subject,
|
|
139
|
+
issuer: cert.issuer,
|
|
140
|
+
notBefore: cert.notBefore,
|
|
141
|
+
notAfter: cert.notAfter,
|
|
142
|
+
dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(cert.extensions),
|
|
143
|
+
extensions: cert.extensions
|
|
144
|
+
.filter((ext) => ext.type !== node_forge_1.default.pki.oids['subjectAltName'])
|
|
145
|
+
.map((ext) => ({
|
|
146
|
+
oid: ext.type,
|
|
147
|
+
value: Buffer.from(ext.value),
|
|
148
|
+
})),
|
|
149
|
+
};
|
|
150
|
+
}
|
|
151
|
+
/**
|
|
152
|
+
* Checks and parses a Certificate Signing Request (CSR) in PEM format.
|
|
153
|
+
* @param csrPem - The CSR in PEM format.
|
|
154
|
+
* @returns An object containing the parsed CSR details.
|
|
155
|
+
*/
|
|
156
|
+
static async checkAndParseCsr(csrPem) {
|
|
157
|
+
const csr = new x509_1.Pkcs10CertificateRequest(csrPem);
|
|
158
|
+
const isValid = await csr.verify();
|
|
159
|
+
if (!isValid) {
|
|
160
|
+
throw new Error('CSR signature verification failed');
|
|
161
|
+
}
|
|
162
|
+
const publicKey = await setup_crypto_js_1.cryptoProvider.subtle.importKey('spki', csr.publicKey.rawData, Object.assign(csr.signatureAlgorithm, csr.publicKey.algorithm), true, ['verify']);
|
|
163
|
+
const parsedCsr = {
|
|
164
|
+
subject: csr.subject,
|
|
165
|
+
publicKey,
|
|
166
|
+
dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(csr.extensions),
|
|
167
|
+
extensions: csr.extensions
|
|
168
|
+
.filter((ext) => ext.type !== node_forge_1.default.pki.oids['subjectAltName'])
|
|
169
|
+
.map((ext) => ({
|
|
170
|
+
oid: ext.type,
|
|
171
|
+
value: Buffer.from(ext.value),
|
|
172
|
+
})),
|
|
173
|
+
};
|
|
174
|
+
return parsedCsr;
|
|
175
|
+
}
|
|
176
|
+
static async getCryptoKeys({ privateKey, publicKey }) {
|
|
177
|
+
const [pubKey, privKey] = await Promise.all([
|
|
178
|
+
typeof publicKey === 'string'
|
|
179
|
+
? CryptoKeysTransformer_js_1.CryptoKeysTransformer.spkiPemToCryptoKey(publicKey)
|
|
180
|
+
: publicKey,
|
|
181
|
+
typeof privateKey === 'string'
|
|
182
|
+
? CryptoKeysTransformer_js_1.CryptoKeysTransformer.pkcs8PemToCryptoKey(privateKey)
|
|
183
|
+
: privateKey,
|
|
184
|
+
]);
|
|
185
|
+
assert_1.default.deepEqual(pubKey.algorithm, privKey.algorithm, 'Both keys must have same algorithm defined');
|
|
186
|
+
return { publicKey: pubKey, privateKey: privKey };
|
|
187
|
+
}
|
|
188
|
+
static generateSerialNumber() {
|
|
189
|
+
const uuid = (0, crypto_1.randomUUID)().replace(/-/g, '');
|
|
190
|
+
const serial = BigInt('0x' + uuid) % MAX_X509_SERIAL;
|
|
191
|
+
return serial.toString();
|
|
192
|
+
}
|
|
193
|
+
static getPrincipalInfo(principal) {
|
|
194
|
+
if (typeof principal === 'string') {
|
|
195
|
+
return principal;
|
|
196
|
+
}
|
|
197
|
+
if (!principal.commonName) {
|
|
198
|
+
throw new Error('Common name is required');
|
|
199
|
+
}
|
|
200
|
+
return Object.entries(principal)
|
|
201
|
+
.map(([key, value]) => `${principalAttributeMap[key] || key}=${value}`)
|
|
202
|
+
.join(',');
|
|
203
|
+
}
|
|
204
|
+
static getAlgorithm(signatureAlgorithm) {
|
|
205
|
+
switch (signatureAlgorithm) {
|
|
206
|
+
case 'RSASSA-PKCS1-SHA256':
|
|
207
|
+
return {
|
|
208
|
+
name: 'RSASSA-PKCS1-v1_5',
|
|
209
|
+
hash: 'SHA-256',
|
|
210
|
+
publicExponent: new Uint8Array([1, 0, 1]), // 65537
|
|
211
|
+
modulusLength: 2048,
|
|
212
|
+
};
|
|
213
|
+
case 'ECDSA-P-256-SHA256':
|
|
214
|
+
return {
|
|
215
|
+
name: 'ECDSA',
|
|
216
|
+
namedCurve: 'P-256',
|
|
217
|
+
};
|
|
218
|
+
case 'ECDSA-secp256k1-SHA256':
|
|
219
|
+
return {
|
|
220
|
+
name: 'ECDSA',
|
|
221
|
+
namedCurve: 'K-256',
|
|
222
|
+
};
|
|
223
|
+
default:
|
|
224
|
+
throw new Error(`Unsupported signature algorithm: ${signatureAlgorithm}`);
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
static extractDnsNamesFromExtensions(extensions) {
|
|
228
|
+
const subjectAltNameExt = extensions.find((ext) => ext.type === node_forge_1.default.pki.oids['subjectAltName']);
|
|
229
|
+
if (!subjectAltNameExt) {
|
|
230
|
+
return;
|
|
231
|
+
}
|
|
232
|
+
const dnsNames = subjectAltNameExt.names.items.map((item) => item.value);
|
|
233
|
+
return dnsNames;
|
|
234
|
+
}
|
|
235
|
+
}
|
|
236
|
+
exports.CertificateGenerator = CertificateGenerator;
|
|
237
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"generator.js","sourceRoot":"","sources":["../../../src/certificates/generator.ts"],"names":[],"mappings":";;;;;;AAAA,oDAA4B;AAC5B,mCAAoC;AACpC,4DAA+B;AAC/B,yCAgBwB;AAWxB,uDAAmD;AACnD,gFAA0E;AAC1E,kDAAiD;AAEjD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,GAAG,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;AAEtD,MAAM,qBAAqB,GAA2B;IACpD,UAAU,EAAE,IAAI;IAChB,OAAO,EAAE,GAAG;IACZ,YAAY,EAAE,GAAG;IACjB,SAAS,EAAE,IAAI;IACf,YAAY,EAAE,GAAG;IACjB,kBAAkB,EAAE,IAAI;CACzB,CAAC;AAEF,MAAM,qCAAqC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;AAEjF,MAAa,oBAAoB;IAC/B;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAA0B;QAClD,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,MAAM,EAAE,SAAS,EAAE,UAAU,EAAE,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnF,MAAM,gBAAgB,GAAG,SAAS,CAAC,SAAyB,CAAC;QAE7D,MAAM,UAAU,GAAgB,CAAC,IAAI,gCAAyB,CAAC,EAAE,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,qBAAqB,GAAuB,EAAE,CAAC;QAErD,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,IAAA,uBAAW,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,sCAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;YAEnE,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,uBAAgB,CAAC,UAAU,EAAE,uBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC;QAC5F,CAAC;QAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,qBAAqB,CAAC,IAAI,CAAC,uBAAgB,CAAC,WAAW,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,qBAAqB,CAAC,MAAM,EAAE,CAAC;YACjC,UAAU,CAAC,IAAI,CAAC,IAAI,gCAAyB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,aAAa,GAAG,oBAAa,CAAC,gBAAgB,GAAG,oBAAa,CAAC,eAAe,CAAC;QACnF,IAAI,MAAM,CAAC,EAAE,EAAE,CAAC;YACd,aAAa,IAAI,oBAAa,CAAC,WAAW,CAAC;QAC7C,CAAC;QACD,UAAU,CAAC,IAAI,CAAC,IAAI,yBAAkB,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC,CAAC;QAE7D,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,MAAM,kBAAkB,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CACvD,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,qCAAqC,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAClE,CAAC;YACF,KAAK,MAAM,eAAe,IAAI,kBAAkB,EAAE,CAAC;gBACjD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;gBACjE,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,gBAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,uBAAuB,GAAgC;YAC3D,YAAY,EAAE,oBAAoB,CAAC,oBAAoB,EAAE;YACzD,MAAM,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,MAAM,CAAC;YAC5D,OAAO,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC9D,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS;YACT,UAAU,EAAE,UAAU;YACtB,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,IAAI,GAAG,MAAM,+BAAwB,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,kBAAsC;QACxD,MAAM,SAAS,GAAG,oBAAoB,CAAC,YAAY,CAAC,kBAAkB,CAAC,CAAC;QACxE,OAAO,gCAAc,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChF,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,MAAyB;QAChD,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC9D,MAAM,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,SAAyB,CAAC;QAClE,gBAAgB,CAAC,IAAI,GAAG,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;QAE5C,MAAM,UAAU,GAAgB,EAAE,CAAC;QAEnC,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,IAAA,uBAAW,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,sCAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,KAAK,MAAM,eAAe,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBACtD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,gBAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,eAAe,GAAyC;YAC5D,IAAI,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC3D,IAAI;YACJ,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,wCAAiC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAE5E,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAAe;QAC5C,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,IAAI,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,EAAE,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;YACpC,IAAI,CAAC,OAAO,EAAE,CAAC;gBACb,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;YAC3E,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,gCAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,IAAI,CAAC,SAAS,CAAC,OAAO,EACtB,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAChE,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,OAAO;YACL,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,SAAS;YACT,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC;YAC7E,UAAU,EAAE,IAAI,CAAC,UAAU;iBACxB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,GAAG,GAAG,IAAI,+BAAwB,CAAC,MAAM,CAAC,CAAC;QAEjD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;QACnC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,gCAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,GAAG,CAAC,SAAS,CAAC,OAAO,EACrB,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,kBAAkB,EAAE,GAAG,CAAC,SAAS,CAAC,SAAS,CAAC,EAC9D,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,SAAS,GAAc;YAC3B,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,SAAS;YACT,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,GAAG,CAAC,UAAU,CAAC;YAC5E,UAAU,EAAE,GAAG,CAAC,UAAU;iBACvB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;QAEF,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,EAAE,UAAU,EAAE,SAAS,EAAmB;QAI3E,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC1C,OAAO,SAAS,KAAK,QAAQ;gBAC3B,CAAC,CAAC,gDAAqB,CAAC,kBAAkB,CAAC,SAAS,CAAC;gBACrD,CAAC,CAAC,SAAS;YACb,OAAO,UAAU,KAAK,QAAQ;gBAC5B,CAAC,CAAC,gDAAqB,CAAC,mBAAmB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,UAAU;SACf,CAAC,CAAC;QAEH,gBAAM,CAAC,SAAS,CACd,MAAM,CAAC,SAAS,EAChB,OAAO,CAAC,SAAS,EACjB,4CAA4C,CAC7C,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;IACpD,CAAC;IAEO,MAAM,CAAC,oBAAoB;QACjC,MAAM,IAAI,GAAG,IAAA,mBAAU,GAAE,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QAC5C,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;QACrD,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAEO,MAAM,CAAC,gBAAgB,CAAC,SAAwC;QACtE,IAAI,OAAO,SAAS,KAAK,QAAQ,EAAE,CAAC;YAClC,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QAC7C,CAAC;QAED,OAAO,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;aAC7B,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,GAAG,qBAAqB,CAAC,GAAG,CAAC,IAAI,GAAG,IAAI,KAAK,EAAE,CAAC;aACtE,IAAI,CAAC,GAAG,CAAC,CAAC;IACf,CAAC;IAEO,MAAM,CAAC,YAAY,CAAC,kBAA0B;QACpD,QAAQ,kBAAkB,EAAE,CAAC;YAC3B,KAAK,qBAAqB;gBACxB,OAAO;oBACL,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,QAAQ;oBACnD,aAAa,EAAE,IAAI;iBACpB,CAAC;YACJ,KAAK,oBAAoB;gBACvB,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ,KAAK,wBAAwB;gBAC3B,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ;gBACE,MAAM,IAAI,KAAK,CAAC,oCAAoC,kBAAkB,EAAE,CAAC,CAAC;QAC9E,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,6BAA6B,CAAC,UAAuB;QAClE,MAAM,iBAAiB,GAAG,UAAU,CAAC,IAAI,CACvC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CACR,CAAC;QACjD,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACzE,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF;AAjRD,oDAiRC"}
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
/// <reference types="node" />
|
|
2
2
|
import * as pkijs from 'pkijs';
|
|
3
|
-
import { ValidateCertChainResult } from './types.js';
|
|
3
|
+
import { AlgorithmObj, ValidateCertChainResult } from './types.js';
|
|
4
|
+
import './setup-crypto.js';
|
|
4
5
|
export declare class CertificatesHelper {
|
|
5
6
|
private static downloadedCertificateCache;
|
|
6
|
-
static derToPem(data: ArrayBuffer): string;
|
|
7
|
+
static derToPem(data: ArrayBuffer, type?: string): string;
|
|
7
8
|
static pemToDer(certPem: string): Uint8Array;
|
|
8
9
|
static splitPemCerts(certs: string): string[];
|
|
9
10
|
static getDomain(certPem: string): string | undefined;
|
|
@@ -16,6 +17,8 @@ export declare class CertificatesHelper {
|
|
|
16
17
|
static derChainToPem(certsDer: Uint8Array[]): string;
|
|
17
18
|
static downloadCertWithCache(url: string): Promise<Buffer>;
|
|
18
19
|
static sortCertsFromLeafToRoot(certsPem: string | string[]): pkijs.Certificate[];
|
|
20
|
+
static getCertPublicKeyAlgorithm(certPem: string): AlgorithmObj;
|
|
21
|
+
static getCsrPublicKeyAlgorithm(csrPem: string): AlgorithmObj;
|
|
19
22
|
static validateCertChain(certsPem: string | string[], caPem: string | string[], options?: {
|
|
20
23
|
offline?: boolean;
|
|
21
24
|
}): Promise<ValidateCertChainResult>;
|