node-opcua-crypto 4.10.0 → 4.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/README.md +9 -4
  2. package/dist/{chunk-GNEWUC7X.mjs → chunk-AXAFLVME.mjs} +9 -15
  3. package/dist/chunk-AXAFLVME.mjs.map +1 -0
  4. package/dist/{chunk-46EEAYVO.mjs → chunk-LHUQUHQQ.mjs} +845 -829
  5. package/dist/chunk-LHUQUHQQ.mjs.map +1 -0
  6. package/dist/chunk-RQA4DO2Z.mjs +1 -0
  7. package/dist/index.d.mts +2 -3
  8. package/dist/index.d.ts +2 -3
  9. package/dist/index.js +658 -701
  10. package/dist/index.js.map +1 -1
  11. package/dist/index.mjs +9 -56
  12. package/dist/source/index.d.mts +1 -5
  13. package/dist/source/index.d.ts +1 -5
  14. package/dist/source/index.js +622 -658
  15. package/dist/source/index.js.map +1 -1
  16. package/dist/source/index.mjs +9 -54
  17. package/dist/source/index_web.d.mts +224 -234
  18. package/dist/source/index_web.d.ts +224 -234
  19. package/dist/source/index_web.js +650 -657
  20. package/dist/source/index_web.js.map +1 -1
  21. package/dist/source/index_web.mjs +9 -51
  22. package/dist/source_nodejs/index.d.mts +1 -2
  23. package/dist/source_nodejs/index.d.ts +1 -2
  24. package/dist/source_nodejs/index.js +46 -50
  25. package/dist/source_nodejs/index.js.map +1 -1
  26. package/dist/source_nodejs/index.mjs +3 -5
  27. package/package.json +9 -4
  28. package/dist/chunk-46EEAYVO.mjs.map +0 -1
  29. package/dist/chunk-GNEWUC7X.mjs.map +0 -1
  30. package/dist/chunk-VI4S2NM5.mjs +0 -38
  31. package/dist/chunk-VI4S2NM5.mjs.map +0 -1
  32. package/dist/index_web.d.mts +0 -5
  33. package/dist/index_web.d.ts +0 -5
  34. package/dist/index_web.js +0 -6414
  35. package/dist/index_web.js.map +0 -1
  36. package/dist/index_web.mjs +0 -195
  37. package/index.mjs +0 -1
  38. package/index_web.ts +0 -1
  39. package/web.d.ts +0 -1
  40. package/web.mjs +0 -1
  41. /package/dist/{index_web.mjs.map → chunk-RQA4DO2Z.mjs.map} +0 -0
@@ -4,28 +4,8 @@ import {
4
4
  RSA_PKCS1_OAEP_PADDING,
5
5
  RSA_PKCS1_PADDING,
6
6
  Subject,
7
- TagType,
8
7
  _coercePrivateKey,
9
- _findBlockAtIndex,
10
- _getBlock,
11
- _readAlgorithmIdentifier,
12
- _readBitString,
13
- _readBooleanValue,
14
- _readDirectoryName,
15
- _readECCAlgorithmIdentifier,
16
- _readExtension,
17
- _readIntegerAsByteString,
18
- _readIntegerValue,
19
- _readListOfInteger,
20
- _readLongIntegerValue,
21
- _readObjectIdentifier,
22
- _readOctetString,
23
- _readSignatureValue,
24
- _readSignatureValueBin,
25
- _readStruct,
26
- _readTime,
27
- _readValue,
28
- _readVersionValue,
8
+ asn1,
29
9
  certificateMatchesPrivateKey,
30
10
  coerceCertificate,
31
11
  coerceCertificatePem,
@@ -34,7 +14,6 @@ import {
34
14
  coercePublicKeyPem,
35
15
  coerceRsaPublicKeyPem,
36
16
  combine_der,
37
- compactDirectoryName,
38
17
  computeDerivedKeys,
39
18
  computePaddingFooter,
40
19
  convertPEMtoDER,
@@ -44,6 +23,7 @@ import {
44
23
  decryptBufferWithDerivedKeys,
45
24
  derToPrivateKey,
46
25
  encryptBufferWithDerivedKeys,
26
+ exploreAsn1,
47
27
  exploreCertificate,
48
28
  exploreCertificateInfo,
49
29
  exploreCertificateRevocationList,
@@ -51,7 +31,6 @@ import {
51
31
  explorePrivateKey,
52
32
  extractPublicKeyFromCertificate,
53
33
  extractPublicKeyFromCertificateSync,
54
- formatBuffer2DigitHexWithColum,
55
34
  generateKeyPair,
56
35
  generatePrivateKey,
57
36
  hexDump,
@@ -60,9 +39,9 @@ import {
60
39
  makeMessageChunkSignature,
61
40
  makeMessageChunkSignatureWithDerivedKeys,
62
41
  makePrivateKeyFromPem,
42
+ makePrivateKeyThumbPrint,
63
43
  makePseudoRandomBuffer,
64
44
  makeSHA1Thumbprint,
65
- parseBitString,
66
45
  pemToPrivateKey,
67
46
  privateDecrypt,
68
47
  privateDecrypt_long,
@@ -73,8 +52,8 @@ import {
73
52
  publicEncrypt_native,
74
53
  publicKeyAndPrivateKeyMatches,
75
54
  readCertificationRequestInfo,
55
+ readExtension,
76
56
  readNameForCrl,
77
- readTag,
78
57
  readTbsCertificate,
79
58
  reduceLength,
80
59
  removePadding,
@@ -92,35 +71,15 @@ import {
92
71
  verifyChunkSignature,
93
72
  verifyChunkSignatureWithDerivedKeys,
94
73
  verifyMessageChunkSignature
95
- } from "../chunk-46EEAYVO.mjs";
74
+ } from "../chunk-LHUQUHQQ.mjs";
96
75
  export {
97
76
  CertificatePurpose,
98
77
  PaddingAlgorithm,
99
78
  RSA_PKCS1_OAEP_PADDING,
100
79
  RSA_PKCS1_PADDING,
101
80
  Subject,
102
- TagType,
103
81
  _coercePrivateKey,
104
- _findBlockAtIndex,
105
- _getBlock,
106
- _readAlgorithmIdentifier,
107
- _readBitString,
108
- _readBooleanValue,
109
- _readDirectoryName,
110
- _readECCAlgorithmIdentifier,
111
- _readExtension,
112
- _readIntegerAsByteString,
113
- _readIntegerValue,
114
- _readListOfInteger,
115
- _readLongIntegerValue,
116
- _readObjectIdentifier,
117
- _readOctetString,
118
- _readSignatureValue,
119
- _readSignatureValueBin,
120
- _readStruct,
121
- _readTime,
122
- _readValue,
123
- _readVersionValue,
82
+ asn1,
124
83
  certificateMatchesPrivateKey,
125
84
  coerceCertificate,
126
85
  coerceCertificatePem,
@@ -129,7 +88,6 @@ export {
129
88
  coercePublicKeyPem,
130
89
  coerceRsaPublicKeyPem,
131
90
  combine_der,
132
- compactDirectoryName,
133
91
  computeDerivedKeys,
134
92
  computePaddingFooter,
135
93
  convertPEMtoDER,
@@ -139,6 +97,7 @@ export {
139
97
  decryptBufferWithDerivedKeys,
140
98
  derToPrivateKey,
141
99
  encryptBufferWithDerivedKeys,
100
+ exploreAsn1,
142
101
  exploreCertificate,
143
102
  exploreCertificateInfo,
144
103
  exploreCertificateRevocationList,
@@ -146,7 +105,6 @@ export {
146
105
  explorePrivateKey,
147
106
  extractPublicKeyFromCertificate,
148
107
  extractPublicKeyFromCertificateSync,
149
- formatBuffer2DigitHexWithColum,
150
108
  generateKeyPair,
151
109
  generatePrivateKey,
152
110
  hexDump,
@@ -155,9 +113,9 @@ export {
155
113
  makeMessageChunkSignature,
156
114
  makeMessageChunkSignatureWithDerivedKeys,
157
115
  makePrivateKeyFromPem,
116
+ makePrivateKeyThumbPrint,
158
117
  makePseudoRandomBuffer,
159
118
  makeSHA1Thumbprint,
160
- parseBitString,
161
119
  pemToPrivateKey,
162
120
  privateDecrypt,
163
121
  privateDecrypt_long,
@@ -168,8 +126,8 @@ export {
168
126
  publicEncrypt_native,
169
127
  publicKeyAndPrivateKeyMatches,
170
128
  readCertificationRequestInfo,
129
+ readExtension,
171
130
  readNameForCrl,
172
- readTag,
173
131
  readTbsCertificate,
174
132
  reduceLength,
175
133
  removePadding,
@@ -9,7 +9,6 @@ declare function readCertificate(filename: string): Certificate;
9
9
  * read a DER or PEM certificate from file
10
10
  */
11
11
  declare function readPublicKey(filename: string): PublicKey;
12
- declare function makePrivateKeyThumbPrint(privateKey: PrivateKey): Buffer;
13
12
  /**
14
13
  * read a DER or PEM certificate from file
15
14
  */
@@ -43,4 +42,4 @@ declare function generatePrivateKeyFile(privateKeyFilename: string, modulusLengt
43
42
  */
44
43
  declare function generatePrivateKeyFileAlternate(privateKeyFilename: string, modulusLength: 2048 | 3072 | 4096): Promise<void>;
45
44
 
46
- export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, makePrivateKeyThumbPrint, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
45
+ export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
@@ -9,7 +9,6 @@ declare function readCertificate(filename: string): Certificate;
9
9
  * read a DER or PEM certificate from file
10
10
  */
11
11
  declare function readPublicKey(filename: string): PublicKey;
12
- declare function makePrivateKeyThumbPrint(privateKey: PrivateKey): Buffer;
13
12
  /**
14
13
  * read a DER or PEM certificate from file
15
14
  */
@@ -43,4 +42,4 @@ declare function generatePrivateKeyFile(privateKeyFilename: string, modulusLengt
43
42
  */
44
43
  declare function generatePrivateKeyFileAlternate(privateKeyFilename: string, modulusLength: 2048 | 3072 | 4096): Promise<void>;
45
44
 
46
- export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, makePrivateKeyThumbPrint, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
45
+ export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
@@ -33,7 +33,6 @@ __export(source_nodejs_exports, {
33
33
  generatePrivateKeyFile: () => generatePrivateKeyFile,
34
34
  generatePrivateKeyFileAlternate: () => generatePrivateKeyFileAlternate,
35
35
  getCertificateStore: () => getCertificateStore,
36
- makePrivateKeyThumbPrint: () => makePrivateKeyThumbPrint,
37
36
  readCertificate: () => readCertificate,
38
37
  readCertificatePEM: () => readCertificatePEM,
39
38
  readCertificateRevocationList: () => readCertificateRevocationList,
@@ -49,14 +48,14 @@ __export(source_nodejs_exports, {
49
48
  module.exports = __toCommonJS(source_nodejs_exports);
50
49
 
51
50
  // source_nodejs/read.ts
52
- var import_assert4 = __toESM(require("assert"));
53
- var import_fs = __toESM(require("fs"));
54
- var import_path = __toESM(require("path"));
51
+ var import_assert5 = __toESM(require("assert"));
52
+ var import_node_fs = __toESM(require("fs"));
53
+ var import_node_path = __toESM(require("path"));
55
54
  var import_crypto = require("crypto");
56
55
 
57
56
  // source/crypto_utils.ts
58
57
  var import_constants = __toESM(require("constants"));
59
- var import_assert3 = __toESM(require("assert"));
58
+ var import_assert4 = __toESM(require("assert"));
60
59
  var import_hexy = __toESM(require("hexy"));
61
60
 
62
61
  // source/buffer_utils.ts
@@ -65,7 +64,7 @@ var createFastUninitializedBuffer = Buffer.allocUnsafe ? Buffer.allocUnsafe : (s
65
64
  };
66
65
 
67
66
  // source/crypto_explore_certificate.ts
68
- var import_assert2 = __toESM(require("assert"));
67
+ var import_assert3 = __toESM(require("assert"));
69
68
 
70
69
  // source/asn1.ts
71
70
  var import_assert = __toESM(require("assert"));
@@ -89,6 +88,9 @@ function readTag(buf, pos) {
89
88
  return { start, tag, position: pos, length };
90
89
  }
91
90
 
91
+ // source/directory_name.ts
92
+ var import_assert2 = __toESM(require("assert"));
93
+
92
94
  // source/crypto_explore_certificate.ts
93
95
  function split_der(certificateChain) {
94
96
  const certificate_chain = [];
@@ -107,10 +109,10 @@ function combine_der(certificates) {
107
109
  let sum = 0;
108
110
  b.forEach((block) => {
109
111
  const block_info = readTag(block, 0);
110
- (0, import_assert2.default)(block_info.position + block_info.length === block.length);
112
+ (0, import_assert3.default)(block_info.position + block_info.length === block.length);
111
113
  sum += block.length;
112
114
  });
113
- (0, import_assert2.default)(sum === cert.length);
115
+ (0, import_assert3.default)(sum === cert.length);
114
116
  }
115
117
  return Buffer.concat(certificates);
116
118
  }
@@ -132,14 +134,14 @@ function removeTrailingLF(str) {
132
134
  return tmp;
133
135
  }
134
136
  function toPem(raw_key, pem) {
135
- (0, import_assert3.default)(raw_key, "expecting a key");
136
- (0, import_assert3.default)(typeof pem === "string");
137
+ (0, import_assert4.default)(raw_key, "expecting a key");
138
+ (0, import_assert4.default)(typeof pem === "string");
137
139
  let pemType = identifyPemType(raw_key);
138
140
  if (pemType) {
139
141
  return raw_key instanceof Buffer ? removeTrailingLF(raw_key.toString("utf8")) : removeTrailingLF(raw_key);
140
142
  } else {
141
143
  pemType = pem;
142
- (0, import_assert3.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
144
+ (0, import_assert4.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
143
145
  let b = raw_key.toString("base64");
144
146
  let str = "-----BEGIN " + pemType + "-----\n";
145
147
  while (b.length) {
@@ -166,18 +168,18 @@ function convertPEMtoDER(raw_key) {
166
168
  }
167
169
  var RSA_PKCS1_OAEP_PADDING = import_constants.default.RSA_PKCS1_OAEP_PADDING;
168
170
  var RSA_PKCS1_PADDING = import_constants.default.RSA_PKCS1_PADDING;
169
- (0, import_assert3.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
170
- (0, import_assert3.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
171
+ (0, import_assert4.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
172
+ (0, import_assert4.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
171
173
 
172
174
  // source_nodejs/read.ts
173
175
  var import_sshpk = __toESM(require("sshpk"));
174
176
  function _readPemFile(filename) {
175
- (0, import_assert4.default)(typeof filename === "string");
176
- return removeTrailingLF(import_fs.default.readFileSync(filename, "utf-8"));
177
+ (0, import_assert5.default)(typeof filename === "string");
178
+ return removeTrailingLF(import_node_fs.default.readFileSync(filename, "utf-8"));
177
179
  }
178
180
  function _readPemOrDerFileAsDER(filename) {
179
181
  if (filename.match(/.*\.der/)) {
180
- return import_fs.default.readFileSync(filename);
182
+ return import_node_fs.default.readFileSync(filename);
181
183
  }
182
184
  const raw_key = _readPemFile(filename);
183
185
  return convertPEMtoDER(raw_key);
@@ -187,7 +189,7 @@ function readCertificate(filename) {
187
189
  }
188
190
  function readPublicKey(filename) {
189
191
  if (filename.match(/.*\.der/)) {
190
- const der = import_fs.default.readFileSync(filename);
192
+ const der = import_node_fs.default.readFileSync(filename);
191
193
  return (0, import_crypto.createPublicKey)(der);
192
194
  } else {
193
195
  const raw_key = _readPemFile(filename);
@@ -198,7 +200,7 @@ function myCreatePrivateKey(rawKey) {
198
200
  if (!import_crypto.createPrivateKey || process.env.NO_CREATE_PRIVATEKEY) {
199
201
  if (rawKey instanceof Buffer) {
200
202
  const pemKey = toPem(rawKey, "PRIVATE KEY");
201
- (0, import_assert4.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
203
+ (0, import_assert5.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
202
204
  return { hidden: pemKey };
203
205
  }
204
206
  return { hidden: ensureTrailingLF(rawKey) };
@@ -209,15 +211,12 @@ function myCreatePrivateKey(rawKey) {
209
211
  process.env.OPENSSL_CONF = backup;
210
212
  return { hidden: retValue };
211
213
  }
212
- function makePrivateKeyThumbPrint(privateKey) {
213
- return Buffer.alloc(0);
214
- }
215
214
  function ensureTrailingLF(str) {
216
215
  return str.match(/\n$/) ? str : str + "\n";
217
216
  }
218
217
  function readPrivateKey(filename) {
219
218
  if (filename.match(/.*\.der/)) {
220
- const der = import_fs.default.readFileSync(filename);
219
+ const der = import_node_fs.default.readFileSync(filename);
221
220
  return myCreatePrivateKey(der);
222
221
  } else {
223
222
  const raw_key = _readPemFile(filename);
@@ -241,7 +240,7 @@ function setCertificateStore(store) {
241
240
  }
242
241
  function getCertificateStore() {
243
242
  if (!_g_certificate_store) {
244
- _g_certificate_store = import_path.default.join(__dirname, "../../certificates/");
243
+ _g_certificate_store = import_node_path.default.join(__dirname, "../../certificates/");
245
244
  }
246
245
  return _g_certificate_store;
247
246
  }
@@ -249,30 +248,29 @@ function readPrivateRsaKey(filename) {
249
248
  if (!import_crypto.createPrivateKey) {
250
249
  throw new Error("createPrivateKey is not supported in this environment");
251
250
  }
252
- if (filename.substring(0, 1) !== "." && !import_fs.default.existsSync(filename)) {
253
- filename = import_path.default.join(getCertificateStore(), filename);
251
+ if (filename.substring(0, 1) !== "." && !import_node_fs.default.existsSync(filename)) {
252
+ filename = import_node_path.default.join(getCertificateStore(), filename);
254
253
  }
255
- const content = import_fs.default.readFileSync(filename, "utf8");
254
+ const content = import_node_fs.default.readFileSync(filename, "utf8");
256
255
  const sshKey = import_sshpk.default.parsePrivateKey(content, "auto");
257
256
  const key = sshKey.toString("pkcs1");
258
257
  const hidden = (0, import_crypto.createPrivateKey)({ format: "pem", type: "pkcs1", key });
259
258
  return { hidden };
260
259
  }
261
260
  function readPublicRsaKey(filename) {
262
- if (filename.substring(0, 1) !== "." && !import_fs.default.existsSync(filename)) {
263
- filename = import_path.default.join(getCertificateStore(), filename);
261
+ if (filename.substring(0, 1) !== "." && !import_node_fs.default.existsSync(filename)) {
262
+ filename = import_node_path.default.join(getCertificateStore(), filename);
264
263
  }
265
- const content = import_fs.default.readFileSync(filename, "utf-8");
264
+ const content = import_node_fs.default.readFileSync(filename, "utf-8");
266
265
  const sshKey = import_sshpk.default.parseKey(content, "ssh");
267
266
  const key = sshKey.toString("pkcs1");
268
267
  return (0, import_crypto.createPublicKey)({ format: "pem", type: "pkcs1", key });
269
268
  }
270
269
 
271
270
  // source_nodejs/read_certificate_revocation_list.ts
272
- var import_fs2 = __toESM(require("fs"));
273
- var import_util = require("util");
271
+ var import_node_fs2 = __toESM(require("fs"));
274
272
  async function readCertificateRevocationList(filename) {
275
- const crl = await (0, import_util.promisify)(import_fs2.default.readFile)(filename);
273
+ const crl = await import_node_fs2.default.promises.readFile(filename);
276
274
  if (crl[0] === 48 && crl[1] === 130) {
277
275
  return crl;
278
276
  }
@@ -281,10 +279,9 @@ async function readCertificateRevocationList(filename) {
281
279
  }
282
280
 
283
281
  // source_nodejs/read_certificate_signing_request.ts
284
- var import_fs3 = __toESM(require("fs"));
285
- var import_util2 = require("util");
282
+ var import_node_fs3 = __toESM(require("fs"));
286
283
  async function readCertificateSigningRequest(filename) {
287
- const csr = await (0, import_util2.promisify)(import_fs3.default.readFile)(filename);
284
+ const csr = await import_node_fs3.default.promises.readFile(filename);
288
285
  if (csr[0] === 48 && csr[1] === 130) {
289
286
  return csr;
290
287
  }
@@ -293,25 +290,25 @@ async function readCertificateSigningRequest(filename) {
293
290
  }
294
291
 
295
292
  // source_nodejs/generate_private_key_filename.ts
296
- var import_fs4 = __toESM(require("fs"));
293
+ var import_node_fs4 = __toESM(require("fs"));
294
+
295
+ // source/explore_private_key.ts
296
+ var doDebug = !!process.env.DEBUG;
297
297
 
298
298
  // source/common.ts
299
299
  var import_crypto2 = __toESM(require("crypto"));
300
300
  var KeyObjectOrig = import_crypto2.default.KeyObject;
301
301
  var { createPrivateKey: createPrivateKeyFromNodeJSCrypto } = import_crypto2.default;
302
302
 
303
- // source/derived_keys.ts
303
+ // source/crypto_utils2.ts
304
304
  var import_assert6 = __toESM(require("assert"));
305
+ var import_jsrsasign2 = __toESM(require("jsrsasign"));
305
306
 
306
- // source/explore_certificate.ts
307
- var import_assert5 = __toESM(require("assert"));
307
+ // source/derived_keys.ts
308
+ var import_assert8 = __toESM(require("assert"));
308
309
 
309
- // source/crypto_utils2.ts
310
+ // source/explore_certificate.ts
310
311
  var import_assert7 = __toESM(require("assert"));
311
- var import_jsrsasign2 = __toESM(require("jsrsasign"));
312
-
313
- // source/explore_private_key.ts
314
- var doDebug = !!process.env.DEBUG;
315
312
 
316
313
  // source/x509/_crypto.ts
317
314
  var x509 = __toESM(require("@peculiar/x509"));
@@ -358,6 +355,9 @@ async function privateKeyToPEM(privateKey) {
358
355
  return { privPem, privDer };
359
356
  }
360
357
 
358
+ // source/x509/coerce_private_key.ts
359
+ var crypto2 = getCrypto();
360
+
361
361
  // source/x509/_get_attributes.ts
362
362
  var keyUsageApplication = x5092.KeyUsageFlags.keyEncipherment | x5092.KeyUsageFlags.nonRepudiation | x5092.KeyUsageFlags.dataEncipherment | x5092.KeyUsageFlags.keyCertSign | x5092.KeyUsageFlags.digitalSignature;
363
363
  var keyUsageCA = x5092.KeyUsageFlags.keyCertSign | x5092.KeyUsageFlags.cRLSign;
@@ -4063,15 +4063,12 @@ var AsnSchemaStorage = class {
4063
4063
  // ../../node_modules/@peculiar/asn1-schema/build/es2015/storage.js
4064
4064
  var schemaStorage = new AsnSchemaStorage();
4065
4065
 
4066
- // source/x509/coerce_private_key.ts
4067
- var crypto2 = getCrypto();
4068
-
4069
4066
  // source_nodejs/generate_private_key_filename.ts
4070
4067
  var import_jsrsasign3 = __toESM(require("jsrsasign"));
4071
4068
  async function generatePrivateKeyFile(privateKeyFilename, modulusLength) {
4072
4069
  const keys = await generateKeyPair(modulusLength);
4073
4070
  const privateKeyPem = await privateKeyToPEM(keys.privateKey);
4074
- await import_fs4.default.promises.writeFile(privateKeyFilename, privateKeyPem.privPem, "utf-8");
4071
+ await import_node_fs4.default.promises.writeFile(privateKeyFilename, privateKeyPem.privPem, "utf-8");
4075
4072
  privateKeyPem.privPem = "";
4076
4073
  privateKeyPem.privDer = new Uint8Array(0);
4077
4074
  }
@@ -4080,14 +4077,13 @@ async function generatePrivateKeyFileAlternate(privateKeyFilename, modulusLength
4080
4077
  const prv = kp.prvKeyObj;
4081
4078
  const pub = kp.pubKeyObj;
4082
4079
  const prvpem = import_jsrsasign3.default.KEYUTIL.getPEM(prv, "PKCS8PRV");
4083
- await import_fs4.default.promises.writeFile(privateKeyFilename, prvpem, "utf-8");
4080
+ await import_node_fs4.default.promises.writeFile(privateKeyFilename, prvpem, "utf-8");
4084
4081
  }
4085
4082
  // Annotate the CommonJS export names for ESM import in node:
4086
4083
  0 && (module.exports = {
4087
4084
  generatePrivateKeyFile,
4088
4085
  generatePrivateKeyFileAlternate,
4089
4086
  getCertificateStore,
4090
- makePrivateKeyThumbPrint,
4091
4087
  readCertificate,
4092
4088
  readCertificatePEM,
4093
4089
  readCertificateRevocationList,