node-opcua-crypto 4.10.0 → 4.12.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +9 -4
- package/dist/{chunk-GNEWUC7X.mjs → chunk-AXAFLVME.mjs} +9 -15
- package/dist/chunk-AXAFLVME.mjs.map +1 -0
- package/dist/{chunk-46EEAYVO.mjs → chunk-LHUQUHQQ.mjs} +845 -829
- package/dist/chunk-LHUQUHQQ.mjs.map +1 -0
- package/dist/chunk-RQA4DO2Z.mjs +1 -0
- package/dist/index.d.mts +2 -3
- package/dist/index.d.ts +2 -3
- package/dist/index.js +658 -701
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +9 -56
- package/dist/source/index.d.mts +1 -5
- package/dist/source/index.d.ts +1 -5
- package/dist/source/index.js +622 -658
- package/dist/source/index.js.map +1 -1
- package/dist/source/index.mjs +9 -54
- package/dist/source/index_web.d.mts +224 -234
- package/dist/source/index_web.d.ts +224 -234
- package/dist/source/index_web.js +650 -657
- package/dist/source/index_web.js.map +1 -1
- package/dist/source/index_web.mjs +9 -51
- package/dist/source_nodejs/index.d.mts +1 -2
- package/dist/source_nodejs/index.d.ts +1 -2
- package/dist/source_nodejs/index.js +46 -50
- package/dist/source_nodejs/index.js.map +1 -1
- package/dist/source_nodejs/index.mjs +3 -5
- package/package.json +9 -4
- package/dist/chunk-46EEAYVO.mjs.map +0 -1
- package/dist/chunk-GNEWUC7X.mjs.map +0 -1
- package/dist/chunk-VI4S2NM5.mjs +0 -38
- package/dist/chunk-VI4S2NM5.mjs.map +0 -1
- package/dist/index_web.d.mts +0 -5
- package/dist/index_web.d.ts +0 -5
- package/dist/index_web.js +0 -6414
- package/dist/index_web.js.map +0 -1
- package/dist/index_web.mjs +0 -195
- package/index.mjs +0 -1
- package/index_web.ts +0 -1
- package/web.d.ts +0 -1
- package/web.mjs +0 -1
- /package/dist/{index_web.mjs.map → chunk-RQA4DO2Z.mjs.map} +0 -0
|
@@ -4,28 +4,8 @@ import {
|
|
|
4
4
|
RSA_PKCS1_OAEP_PADDING,
|
|
5
5
|
RSA_PKCS1_PADDING,
|
|
6
6
|
Subject,
|
|
7
|
-
TagType,
|
|
8
7
|
_coercePrivateKey,
|
|
9
|
-
|
|
10
|
-
_getBlock,
|
|
11
|
-
_readAlgorithmIdentifier,
|
|
12
|
-
_readBitString,
|
|
13
|
-
_readBooleanValue,
|
|
14
|
-
_readDirectoryName,
|
|
15
|
-
_readECCAlgorithmIdentifier,
|
|
16
|
-
_readExtension,
|
|
17
|
-
_readIntegerAsByteString,
|
|
18
|
-
_readIntegerValue,
|
|
19
|
-
_readListOfInteger,
|
|
20
|
-
_readLongIntegerValue,
|
|
21
|
-
_readObjectIdentifier,
|
|
22
|
-
_readOctetString,
|
|
23
|
-
_readSignatureValue,
|
|
24
|
-
_readSignatureValueBin,
|
|
25
|
-
_readStruct,
|
|
26
|
-
_readTime,
|
|
27
|
-
_readValue,
|
|
28
|
-
_readVersionValue,
|
|
8
|
+
asn1,
|
|
29
9
|
certificateMatchesPrivateKey,
|
|
30
10
|
coerceCertificate,
|
|
31
11
|
coerceCertificatePem,
|
|
@@ -34,7 +14,6 @@ import {
|
|
|
34
14
|
coercePublicKeyPem,
|
|
35
15
|
coerceRsaPublicKeyPem,
|
|
36
16
|
combine_der,
|
|
37
|
-
compactDirectoryName,
|
|
38
17
|
computeDerivedKeys,
|
|
39
18
|
computePaddingFooter,
|
|
40
19
|
convertPEMtoDER,
|
|
@@ -44,6 +23,7 @@ import {
|
|
|
44
23
|
decryptBufferWithDerivedKeys,
|
|
45
24
|
derToPrivateKey,
|
|
46
25
|
encryptBufferWithDerivedKeys,
|
|
26
|
+
exploreAsn1,
|
|
47
27
|
exploreCertificate,
|
|
48
28
|
exploreCertificateInfo,
|
|
49
29
|
exploreCertificateRevocationList,
|
|
@@ -51,7 +31,6 @@ import {
|
|
|
51
31
|
explorePrivateKey,
|
|
52
32
|
extractPublicKeyFromCertificate,
|
|
53
33
|
extractPublicKeyFromCertificateSync,
|
|
54
|
-
formatBuffer2DigitHexWithColum,
|
|
55
34
|
generateKeyPair,
|
|
56
35
|
generatePrivateKey,
|
|
57
36
|
hexDump,
|
|
@@ -60,9 +39,9 @@ import {
|
|
|
60
39
|
makeMessageChunkSignature,
|
|
61
40
|
makeMessageChunkSignatureWithDerivedKeys,
|
|
62
41
|
makePrivateKeyFromPem,
|
|
42
|
+
makePrivateKeyThumbPrint,
|
|
63
43
|
makePseudoRandomBuffer,
|
|
64
44
|
makeSHA1Thumbprint,
|
|
65
|
-
parseBitString,
|
|
66
45
|
pemToPrivateKey,
|
|
67
46
|
privateDecrypt,
|
|
68
47
|
privateDecrypt_long,
|
|
@@ -73,8 +52,8 @@ import {
|
|
|
73
52
|
publicEncrypt_native,
|
|
74
53
|
publicKeyAndPrivateKeyMatches,
|
|
75
54
|
readCertificationRequestInfo,
|
|
55
|
+
readExtension,
|
|
76
56
|
readNameForCrl,
|
|
77
|
-
readTag,
|
|
78
57
|
readTbsCertificate,
|
|
79
58
|
reduceLength,
|
|
80
59
|
removePadding,
|
|
@@ -92,35 +71,15 @@ import {
|
|
|
92
71
|
verifyChunkSignature,
|
|
93
72
|
verifyChunkSignatureWithDerivedKeys,
|
|
94
73
|
verifyMessageChunkSignature
|
|
95
|
-
} from "../chunk-
|
|
74
|
+
} from "../chunk-LHUQUHQQ.mjs";
|
|
96
75
|
export {
|
|
97
76
|
CertificatePurpose,
|
|
98
77
|
PaddingAlgorithm,
|
|
99
78
|
RSA_PKCS1_OAEP_PADDING,
|
|
100
79
|
RSA_PKCS1_PADDING,
|
|
101
80
|
Subject,
|
|
102
|
-
TagType,
|
|
103
81
|
_coercePrivateKey,
|
|
104
|
-
|
|
105
|
-
_getBlock,
|
|
106
|
-
_readAlgorithmIdentifier,
|
|
107
|
-
_readBitString,
|
|
108
|
-
_readBooleanValue,
|
|
109
|
-
_readDirectoryName,
|
|
110
|
-
_readECCAlgorithmIdentifier,
|
|
111
|
-
_readExtension,
|
|
112
|
-
_readIntegerAsByteString,
|
|
113
|
-
_readIntegerValue,
|
|
114
|
-
_readListOfInteger,
|
|
115
|
-
_readLongIntegerValue,
|
|
116
|
-
_readObjectIdentifier,
|
|
117
|
-
_readOctetString,
|
|
118
|
-
_readSignatureValue,
|
|
119
|
-
_readSignatureValueBin,
|
|
120
|
-
_readStruct,
|
|
121
|
-
_readTime,
|
|
122
|
-
_readValue,
|
|
123
|
-
_readVersionValue,
|
|
82
|
+
asn1,
|
|
124
83
|
certificateMatchesPrivateKey,
|
|
125
84
|
coerceCertificate,
|
|
126
85
|
coerceCertificatePem,
|
|
@@ -129,7 +88,6 @@ export {
|
|
|
129
88
|
coercePublicKeyPem,
|
|
130
89
|
coerceRsaPublicKeyPem,
|
|
131
90
|
combine_der,
|
|
132
|
-
compactDirectoryName,
|
|
133
91
|
computeDerivedKeys,
|
|
134
92
|
computePaddingFooter,
|
|
135
93
|
convertPEMtoDER,
|
|
@@ -139,6 +97,7 @@ export {
|
|
|
139
97
|
decryptBufferWithDerivedKeys,
|
|
140
98
|
derToPrivateKey,
|
|
141
99
|
encryptBufferWithDerivedKeys,
|
|
100
|
+
exploreAsn1,
|
|
142
101
|
exploreCertificate,
|
|
143
102
|
exploreCertificateInfo,
|
|
144
103
|
exploreCertificateRevocationList,
|
|
@@ -146,7 +105,6 @@ export {
|
|
|
146
105
|
explorePrivateKey,
|
|
147
106
|
extractPublicKeyFromCertificate,
|
|
148
107
|
extractPublicKeyFromCertificateSync,
|
|
149
|
-
formatBuffer2DigitHexWithColum,
|
|
150
108
|
generateKeyPair,
|
|
151
109
|
generatePrivateKey,
|
|
152
110
|
hexDump,
|
|
@@ -155,9 +113,9 @@ export {
|
|
|
155
113
|
makeMessageChunkSignature,
|
|
156
114
|
makeMessageChunkSignatureWithDerivedKeys,
|
|
157
115
|
makePrivateKeyFromPem,
|
|
116
|
+
makePrivateKeyThumbPrint,
|
|
158
117
|
makePseudoRandomBuffer,
|
|
159
118
|
makeSHA1Thumbprint,
|
|
160
|
-
parseBitString,
|
|
161
119
|
pemToPrivateKey,
|
|
162
120
|
privateDecrypt,
|
|
163
121
|
privateDecrypt_long,
|
|
@@ -168,8 +126,8 @@ export {
|
|
|
168
126
|
publicEncrypt_native,
|
|
169
127
|
publicKeyAndPrivateKeyMatches,
|
|
170
128
|
readCertificationRequestInfo,
|
|
129
|
+
readExtension,
|
|
171
130
|
readNameForCrl,
|
|
172
|
-
readTag,
|
|
173
131
|
readTbsCertificate,
|
|
174
132
|
reduceLength,
|
|
175
133
|
removePadding,
|
|
@@ -9,7 +9,6 @@ declare function readCertificate(filename: string): Certificate;
|
|
|
9
9
|
* read a DER or PEM certificate from file
|
|
10
10
|
*/
|
|
11
11
|
declare function readPublicKey(filename: string): PublicKey;
|
|
12
|
-
declare function makePrivateKeyThumbPrint(privateKey: PrivateKey): Buffer;
|
|
13
12
|
/**
|
|
14
13
|
* read a DER or PEM certificate from file
|
|
15
14
|
*/
|
|
@@ -43,4 +42,4 @@ declare function generatePrivateKeyFile(privateKeyFilename: string, modulusLengt
|
|
|
43
42
|
*/
|
|
44
43
|
declare function generatePrivateKeyFileAlternate(privateKeyFilename: string, modulusLength: 2048 | 3072 | 4096): Promise<void>;
|
|
45
44
|
|
|
46
|
-
export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore,
|
|
45
|
+
export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
|
|
@@ -9,7 +9,6 @@ declare function readCertificate(filename: string): Certificate;
|
|
|
9
9
|
* read a DER or PEM certificate from file
|
|
10
10
|
*/
|
|
11
11
|
declare function readPublicKey(filename: string): PublicKey;
|
|
12
|
-
declare function makePrivateKeyThumbPrint(privateKey: PrivateKey): Buffer;
|
|
13
12
|
/**
|
|
14
13
|
* read a DER or PEM certificate from file
|
|
15
14
|
*/
|
|
@@ -43,4 +42,4 @@ declare function generatePrivateKeyFile(privateKeyFilename: string, modulusLengt
|
|
|
43
42
|
*/
|
|
44
43
|
declare function generatePrivateKeyFileAlternate(privateKeyFilename: string, modulusLength: 2048 | 3072 | 4096): Promise<void>;
|
|
45
44
|
|
|
46
|
-
export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore,
|
|
45
|
+
export { type CertificateSigningRequest, generatePrivateKeyFile, generatePrivateKeyFileAlternate, getCertificateStore, readCertificate, readCertificatePEM, readCertificateRevocationList, readCertificateSigningRequest, readPrivateKey, readPrivateKeyPEM, readPrivateRsaKey, readPublicKey, readPublicKeyPEM, readPublicRsaKey, setCertificateStore };
|
|
@@ -33,7 +33,6 @@ __export(source_nodejs_exports, {
|
|
|
33
33
|
generatePrivateKeyFile: () => generatePrivateKeyFile,
|
|
34
34
|
generatePrivateKeyFileAlternate: () => generatePrivateKeyFileAlternate,
|
|
35
35
|
getCertificateStore: () => getCertificateStore,
|
|
36
|
-
makePrivateKeyThumbPrint: () => makePrivateKeyThumbPrint,
|
|
37
36
|
readCertificate: () => readCertificate,
|
|
38
37
|
readCertificatePEM: () => readCertificatePEM,
|
|
39
38
|
readCertificateRevocationList: () => readCertificateRevocationList,
|
|
@@ -49,14 +48,14 @@ __export(source_nodejs_exports, {
|
|
|
49
48
|
module.exports = __toCommonJS(source_nodejs_exports);
|
|
50
49
|
|
|
51
50
|
// source_nodejs/read.ts
|
|
52
|
-
var
|
|
53
|
-
var
|
|
54
|
-
var
|
|
51
|
+
var import_assert5 = __toESM(require("assert"));
|
|
52
|
+
var import_node_fs = __toESM(require("fs"));
|
|
53
|
+
var import_node_path = __toESM(require("path"));
|
|
55
54
|
var import_crypto = require("crypto");
|
|
56
55
|
|
|
57
56
|
// source/crypto_utils.ts
|
|
58
57
|
var import_constants = __toESM(require("constants"));
|
|
59
|
-
var
|
|
58
|
+
var import_assert4 = __toESM(require("assert"));
|
|
60
59
|
var import_hexy = __toESM(require("hexy"));
|
|
61
60
|
|
|
62
61
|
// source/buffer_utils.ts
|
|
@@ -65,7 +64,7 @@ var createFastUninitializedBuffer = Buffer.allocUnsafe ? Buffer.allocUnsafe : (s
|
|
|
65
64
|
};
|
|
66
65
|
|
|
67
66
|
// source/crypto_explore_certificate.ts
|
|
68
|
-
var
|
|
67
|
+
var import_assert3 = __toESM(require("assert"));
|
|
69
68
|
|
|
70
69
|
// source/asn1.ts
|
|
71
70
|
var import_assert = __toESM(require("assert"));
|
|
@@ -89,6 +88,9 @@ function readTag(buf, pos) {
|
|
|
89
88
|
return { start, tag, position: pos, length };
|
|
90
89
|
}
|
|
91
90
|
|
|
91
|
+
// source/directory_name.ts
|
|
92
|
+
var import_assert2 = __toESM(require("assert"));
|
|
93
|
+
|
|
92
94
|
// source/crypto_explore_certificate.ts
|
|
93
95
|
function split_der(certificateChain) {
|
|
94
96
|
const certificate_chain = [];
|
|
@@ -107,10 +109,10 @@ function combine_der(certificates) {
|
|
|
107
109
|
let sum = 0;
|
|
108
110
|
b.forEach((block) => {
|
|
109
111
|
const block_info = readTag(block, 0);
|
|
110
|
-
(0,
|
|
112
|
+
(0, import_assert3.default)(block_info.position + block_info.length === block.length);
|
|
111
113
|
sum += block.length;
|
|
112
114
|
});
|
|
113
|
-
(0,
|
|
115
|
+
(0, import_assert3.default)(sum === cert.length);
|
|
114
116
|
}
|
|
115
117
|
return Buffer.concat(certificates);
|
|
116
118
|
}
|
|
@@ -132,14 +134,14 @@ function removeTrailingLF(str) {
|
|
|
132
134
|
return tmp;
|
|
133
135
|
}
|
|
134
136
|
function toPem(raw_key, pem) {
|
|
135
|
-
(0,
|
|
136
|
-
(0,
|
|
137
|
+
(0, import_assert4.default)(raw_key, "expecting a key");
|
|
138
|
+
(0, import_assert4.default)(typeof pem === "string");
|
|
137
139
|
let pemType = identifyPemType(raw_key);
|
|
138
140
|
if (pemType) {
|
|
139
141
|
return raw_key instanceof Buffer ? removeTrailingLF(raw_key.toString("utf8")) : removeTrailingLF(raw_key);
|
|
140
142
|
} else {
|
|
141
143
|
pemType = pem;
|
|
142
|
-
(0,
|
|
144
|
+
(0, import_assert4.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
|
|
143
145
|
let b = raw_key.toString("base64");
|
|
144
146
|
let str = "-----BEGIN " + pemType + "-----\n";
|
|
145
147
|
while (b.length) {
|
|
@@ -166,18 +168,18 @@ function convertPEMtoDER(raw_key) {
|
|
|
166
168
|
}
|
|
167
169
|
var RSA_PKCS1_OAEP_PADDING = import_constants.default.RSA_PKCS1_OAEP_PADDING;
|
|
168
170
|
var RSA_PKCS1_PADDING = import_constants.default.RSA_PKCS1_PADDING;
|
|
169
|
-
(0,
|
|
170
|
-
(0,
|
|
171
|
+
(0, import_assert4.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
|
|
172
|
+
(0, import_assert4.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
|
|
171
173
|
|
|
172
174
|
// source_nodejs/read.ts
|
|
173
175
|
var import_sshpk = __toESM(require("sshpk"));
|
|
174
176
|
function _readPemFile(filename) {
|
|
175
|
-
(0,
|
|
176
|
-
return removeTrailingLF(
|
|
177
|
+
(0, import_assert5.default)(typeof filename === "string");
|
|
178
|
+
return removeTrailingLF(import_node_fs.default.readFileSync(filename, "utf-8"));
|
|
177
179
|
}
|
|
178
180
|
function _readPemOrDerFileAsDER(filename) {
|
|
179
181
|
if (filename.match(/.*\.der/)) {
|
|
180
|
-
return
|
|
182
|
+
return import_node_fs.default.readFileSync(filename);
|
|
181
183
|
}
|
|
182
184
|
const raw_key = _readPemFile(filename);
|
|
183
185
|
return convertPEMtoDER(raw_key);
|
|
@@ -187,7 +189,7 @@ function readCertificate(filename) {
|
|
|
187
189
|
}
|
|
188
190
|
function readPublicKey(filename) {
|
|
189
191
|
if (filename.match(/.*\.der/)) {
|
|
190
|
-
const der =
|
|
192
|
+
const der = import_node_fs.default.readFileSync(filename);
|
|
191
193
|
return (0, import_crypto.createPublicKey)(der);
|
|
192
194
|
} else {
|
|
193
195
|
const raw_key = _readPemFile(filename);
|
|
@@ -198,7 +200,7 @@ function myCreatePrivateKey(rawKey) {
|
|
|
198
200
|
if (!import_crypto.createPrivateKey || process.env.NO_CREATE_PRIVATEKEY) {
|
|
199
201
|
if (rawKey instanceof Buffer) {
|
|
200
202
|
const pemKey = toPem(rawKey, "PRIVATE KEY");
|
|
201
|
-
(0,
|
|
203
|
+
(0, import_assert5.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
|
|
202
204
|
return { hidden: pemKey };
|
|
203
205
|
}
|
|
204
206
|
return { hidden: ensureTrailingLF(rawKey) };
|
|
@@ -209,15 +211,12 @@ function myCreatePrivateKey(rawKey) {
|
|
|
209
211
|
process.env.OPENSSL_CONF = backup;
|
|
210
212
|
return { hidden: retValue };
|
|
211
213
|
}
|
|
212
|
-
function makePrivateKeyThumbPrint(privateKey) {
|
|
213
|
-
return Buffer.alloc(0);
|
|
214
|
-
}
|
|
215
214
|
function ensureTrailingLF(str) {
|
|
216
215
|
return str.match(/\n$/) ? str : str + "\n";
|
|
217
216
|
}
|
|
218
217
|
function readPrivateKey(filename) {
|
|
219
218
|
if (filename.match(/.*\.der/)) {
|
|
220
|
-
const der =
|
|
219
|
+
const der = import_node_fs.default.readFileSync(filename);
|
|
221
220
|
return myCreatePrivateKey(der);
|
|
222
221
|
} else {
|
|
223
222
|
const raw_key = _readPemFile(filename);
|
|
@@ -241,7 +240,7 @@ function setCertificateStore(store) {
|
|
|
241
240
|
}
|
|
242
241
|
function getCertificateStore() {
|
|
243
242
|
if (!_g_certificate_store) {
|
|
244
|
-
_g_certificate_store =
|
|
243
|
+
_g_certificate_store = import_node_path.default.join(__dirname, "../../certificates/");
|
|
245
244
|
}
|
|
246
245
|
return _g_certificate_store;
|
|
247
246
|
}
|
|
@@ -249,30 +248,29 @@ function readPrivateRsaKey(filename) {
|
|
|
249
248
|
if (!import_crypto.createPrivateKey) {
|
|
250
249
|
throw new Error("createPrivateKey is not supported in this environment");
|
|
251
250
|
}
|
|
252
|
-
if (filename.substring(0, 1) !== "." && !
|
|
253
|
-
filename =
|
|
251
|
+
if (filename.substring(0, 1) !== "." && !import_node_fs.default.existsSync(filename)) {
|
|
252
|
+
filename = import_node_path.default.join(getCertificateStore(), filename);
|
|
254
253
|
}
|
|
255
|
-
const content =
|
|
254
|
+
const content = import_node_fs.default.readFileSync(filename, "utf8");
|
|
256
255
|
const sshKey = import_sshpk.default.parsePrivateKey(content, "auto");
|
|
257
256
|
const key = sshKey.toString("pkcs1");
|
|
258
257
|
const hidden = (0, import_crypto.createPrivateKey)({ format: "pem", type: "pkcs1", key });
|
|
259
258
|
return { hidden };
|
|
260
259
|
}
|
|
261
260
|
function readPublicRsaKey(filename) {
|
|
262
|
-
if (filename.substring(0, 1) !== "." && !
|
|
263
|
-
filename =
|
|
261
|
+
if (filename.substring(0, 1) !== "." && !import_node_fs.default.existsSync(filename)) {
|
|
262
|
+
filename = import_node_path.default.join(getCertificateStore(), filename);
|
|
264
263
|
}
|
|
265
|
-
const content =
|
|
264
|
+
const content = import_node_fs.default.readFileSync(filename, "utf-8");
|
|
266
265
|
const sshKey = import_sshpk.default.parseKey(content, "ssh");
|
|
267
266
|
const key = sshKey.toString("pkcs1");
|
|
268
267
|
return (0, import_crypto.createPublicKey)({ format: "pem", type: "pkcs1", key });
|
|
269
268
|
}
|
|
270
269
|
|
|
271
270
|
// source_nodejs/read_certificate_revocation_list.ts
|
|
272
|
-
var
|
|
273
|
-
var import_util = require("util");
|
|
271
|
+
var import_node_fs2 = __toESM(require("fs"));
|
|
274
272
|
async function readCertificateRevocationList(filename) {
|
|
275
|
-
const crl = await
|
|
273
|
+
const crl = await import_node_fs2.default.promises.readFile(filename);
|
|
276
274
|
if (crl[0] === 48 && crl[1] === 130) {
|
|
277
275
|
return crl;
|
|
278
276
|
}
|
|
@@ -281,10 +279,9 @@ async function readCertificateRevocationList(filename) {
|
|
|
281
279
|
}
|
|
282
280
|
|
|
283
281
|
// source_nodejs/read_certificate_signing_request.ts
|
|
284
|
-
var
|
|
285
|
-
var import_util2 = require("util");
|
|
282
|
+
var import_node_fs3 = __toESM(require("fs"));
|
|
286
283
|
async function readCertificateSigningRequest(filename) {
|
|
287
|
-
const csr = await
|
|
284
|
+
const csr = await import_node_fs3.default.promises.readFile(filename);
|
|
288
285
|
if (csr[0] === 48 && csr[1] === 130) {
|
|
289
286
|
return csr;
|
|
290
287
|
}
|
|
@@ -293,25 +290,25 @@ async function readCertificateSigningRequest(filename) {
|
|
|
293
290
|
}
|
|
294
291
|
|
|
295
292
|
// source_nodejs/generate_private_key_filename.ts
|
|
296
|
-
var
|
|
293
|
+
var import_node_fs4 = __toESM(require("fs"));
|
|
294
|
+
|
|
295
|
+
// source/explore_private_key.ts
|
|
296
|
+
var doDebug = !!process.env.DEBUG;
|
|
297
297
|
|
|
298
298
|
// source/common.ts
|
|
299
299
|
var import_crypto2 = __toESM(require("crypto"));
|
|
300
300
|
var KeyObjectOrig = import_crypto2.default.KeyObject;
|
|
301
301
|
var { createPrivateKey: createPrivateKeyFromNodeJSCrypto } = import_crypto2.default;
|
|
302
302
|
|
|
303
|
-
// source/
|
|
303
|
+
// source/crypto_utils2.ts
|
|
304
304
|
var import_assert6 = __toESM(require("assert"));
|
|
305
|
+
var import_jsrsasign2 = __toESM(require("jsrsasign"));
|
|
305
306
|
|
|
306
|
-
// source/
|
|
307
|
-
var
|
|
307
|
+
// source/derived_keys.ts
|
|
308
|
+
var import_assert8 = __toESM(require("assert"));
|
|
308
309
|
|
|
309
|
-
// source/
|
|
310
|
+
// source/explore_certificate.ts
|
|
310
311
|
var import_assert7 = __toESM(require("assert"));
|
|
311
|
-
var import_jsrsasign2 = __toESM(require("jsrsasign"));
|
|
312
|
-
|
|
313
|
-
// source/explore_private_key.ts
|
|
314
|
-
var doDebug = !!process.env.DEBUG;
|
|
315
312
|
|
|
316
313
|
// source/x509/_crypto.ts
|
|
317
314
|
var x509 = __toESM(require("@peculiar/x509"));
|
|
@@ -358,6 +355,9 @@ async function privateKeyToPEM(privateKey) {
|
|
|
358
355
|
return { privPem, privDer };
|
|
359
356
|
}
|
|
360
357
|
|
|
358
|
+
// source/x509/coerce_private_key.ts
|
|
359
|
+
var crypto2 = getCrypto();
|
|
360
|
+
|
|
361
361
|
// source/x509/_get_attributes.ts
|
|
362
362
|
var keyUsageApplication = x5092.KeyUsageFlags.keyEncipherment | x5092.KeyUsageFlags.nonRepudiation | x5092.KeyUsageFlags.dataEncipherment | x5092.KeyUsageFlags.keyCertSign | x5092.KeyUsageFlags.digitalSignature;
|
|
363
363
|
var keyUsageCA = x5092.KeyUsageFlags.keyCertSign | x5092.KeyUsageFlags.cRLSign;
|
|
@@ -4063,15 +4063,12 @@ var AsnSchemaStorage = class {
|
|
|
4063
4063
|
// ../../node_modules/@peculiar/asn1-schema/build/es2015/storage.js
|
|
4064
4064
|
var schemaStorage = new AsnSchemaStorage();
|
|
4065
4065
|
|
|
4066
|
-
// source/x509/coerce_private_key.ts
|
|
4067
|
-
var crypto2 = getCrypto();
|
|
4068
|
-
|
|
4069
4066
|
// source_nodejs/generate_private_key_filename.ts
|
|
4070
4067
|
var import_jsrsasign3 = __toESM(require("jsrsasign"));
|
|
4071
4068
|
async function generatePrivateKeyFile(privateKeyFilename, modulusLength) {
|
|
4072
4069
|
const keys = await generateKeyPair(modulusLength);
|
|
4073
4070
|
const privateKeyPem = await privateKeyToPEM(keys.privateKey);
|
|
4074
|
-
await
|
|
4071
|
+
await import_node_fs4.default.promises.writeFile(privateKeyFilename, privateKeyPem.privPem, "utf-8");
|
|
4075
4072
|
privateKeyPem.privPem = "";
|
|
4076
4073
|
privateKeyPem.privDer = new Uint8Array(0);
|
|
4077
4074
|
}
|
|
@@ -4080,14 +4077,13 @@ async function generatePrivateKeyFileAlternate(privateKeyFilename, modulusLength
|
|
|
4080
4077
|
const prv = kp.prvKeyObj;
|
|
4081
4078
|
const pub = kp.pubKeyObj;
|
|
4082
4079
|
const prvpem = import_jsrsasign3.default.KEYUTIL.getPEM(prv, "PKCS8PRV");
|
|
4083
|
-
await
|
|
4080
|
+
await import_node_fs4.default.promises.writeFile(privateKeyFilename, prvpem, "utf-8");
|
|
4084
4081
|
}
|
|
4085
4082
|
// Annotate the CommonJS export names for ESM import in node:
|
|
4086
4083
|
0 && (module.exports = {
|
|
4087
4084
|
generatePrivateKeyFile,
|
|
4088
4085
|
generatePrivateKeyFileAlternate,
|
|
4089
4086
|
getCertificateStore,
|
|
4090
|
-
makePrivateKeyThumbPrint,
|
|
4091
4087
|
readCertificate,
|
|
4092
4088
|
readCertificatePEM,
|
|
4093
4089
|
readCertificateRevocationList,
|