node-opcua-crypto 4.11.0 → 4.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -5,7 +5,7 @@ import {
5
5
  RSA_PKCS1_PADDING,
6
6
  Subject,
7
7
  _coercePrivateKey,
8
- _readExtension,
8
+ asn1,
9
9
  certificateMatchesPrivateKey,
10
10
  coerceCertificate,
11
11
  coerceCertificatePem,
@@ -52,6 +52,7 @@ import {
52
52
  publicEncrypt_native,
53
53
  publicKeyAndPrivateKeyMatches,
54
54
  readCertificationRequestInfo,
55
+ readExtension,
55
56
  readNameForCrl,
56
57
  readTbsCertificate,
57
58
  reduceLength,
@@ -70,7 +71,7 @@ import {
70
71
  verifyChunkSignature,
71
72
  verifyChunkSignatureWithDerivedKeys,
72
73
  verifyMessageChunkSignature
73
- } from "../chunk-2RCYFHGG.mjs";
74
+ } from "../chunk-LHUQUHQQ.mjs";
74
75
  export {
75
76
  CertificatePurpose,
76
77
  PaddingAlgorithm,
@@ -78,7 +79,7 @@ export {
78
79
  RSA_PKCS1_PADDING,
79
80
  Subject,
80
81
  _coercePrivateKey,
81
- _readExtension,
82
+ asn1,
82
83
  certificateMatchesPrivateKey,
83
84
  coerceCertificate,
84
85
  coerceCertificatePem,
@@ -125,6 +126,7 @@ export {
125
126
  publicEncrypt_native,
126
127
  publicKeyAndPrivateKeyMatches,
127
128
  readCertificationRequestInfo,
129
+ readExtension,
128
130
  readNameForCrl,
129
131
  readTbsCertificate,
130
132
  reduceLength,
@@ -48,14 +48,14 @@ __export(source_nodejs_exports, {
48
48
  module.exports = __toCommonJS(source_nodejs_exports);
49
49
 
50
50
  // source_nodejs/read.ts
51
- var import_assert4 = __toESM(require("assert"));
51
+ var import_assert5 = __toESM(require("assert"));
52
52
  var import_node_fs = __toESM(require("fs"));
53
53
  var import_node_path = __toESM(require("path"));
54
54
  var import_crypto = require("crypto");
55
55
 
56
56
  // source/crypto_utils.ts
57
57
  var import_constants = __toESM(require("constants"));
58
- var import_assert3 = __toESM(require("assert"));
58
+ var import_assert4 = __toESM(require("assert"));
59
59
  var import_hexy = __toESM(require("hexy"));
60
60
 
61
61
  // source/buffer_utils.ts
@@ -64,7 +64,7 @@ var createFastUninitializedBuffer = Buffer.allocUnsafe ? Buffer.allocUnsafe : (s
64
64
  };
65
65
 
66
66
  // source/crypto_explore_certificate.ts
67
- var import_assert2 = __toESM(require("assert"));
67
+ var import_assert3 = __toESM(require("assert"));
68
68
 
69
69
  // source/asn1.ts
70
70
  var import_assert = __toESM(require("assert"));
@@ -88,6 +88,9 @@ function readTag(buf, pos) {
88
88
  return { start, tag, position: pos, length };
89
89
  }
90
90
 
91
+ // source/directory_name.ts
92
+ var import_assert2 = __toESM(require("assert"));
93
+
91
94
  // source/crypto_explore_certificate.ts
92
95
  function split_der(certificateChain) {
93
96
  const certificate_chain = [];
@@ -106,10 +109,10 @@ function combine_der(certificates) {
106
109
  let sum = 0;
107
110
  b.forEach((block) => {
108
111
  const block_info = readTag(block, 0);
109
- (0, import_assert2.default)(block_info.position + block_info.length === block.length);
112
+ (0, import_assert3.default)(block_info.position + block_info.length === block.length);
110
113
  sum += block.length;
111
114
  });
112
- (0, import_assert2.default)(sum === cert.length);
115
+ (0, import_assert3.default)(sum === cert.length);
113
116
  }
114
117
  return Buffer.concat(certificates);
115
118
  }
@@ -131,14 +134,14 @@ function removeTrailingLF(str) {
131
134
  return tmp;
132
135
  }
133
136
  function toPem(raw_key, pem) {
134
- (0, import_assert3.default)(raw_key, "expecting a key");
135
- (0, import_assert3.default)(typeof pem === "string");
137
+ (0, import_assert4.default)(raw_key, "expecting a key");
138
+ (0, import_assert4.default)(typeof pem === "string");
136
139
  let pemType = identifyPemType(raw_key);
137
140
  if (pemType) {
138
141
  return raw_key instanceof Buffer ? removeTrailingLF(raw_key.toString("utf8")) : removeTrailingLF(raw_key);
139
142
  } else {
140
143
  pemType = pem;
141
- (0, import_assert3.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
144
+ (0, import_assert4.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
142
145
  let b = raw_key.toString("base64");
143
146
  let str = "-----BEGIN " + pemType + "-----\n";
144
147
  while (b.length) {
@@ -165,13 +168,13 @@ function convertPEMtoDER(raw_key) {
165
168
  }
166
169
  var RSA_PKCS1_OAEP_PADDING = import_constants.default.RSA_PKCS1_OAEP_PADDING;
167
170
  var RSA_PKCS1_PADDING = import_constants.default.RSA_PKCS1_PADDING;
168
- (0, import_assert3.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
169
- (0, import_assert3.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
171
+ (0, import_assert4.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
172
+ (0, import_assert4.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
170
173
 
171
174
  // source_nodejs/read.ts
172
175
  var import_sshpk = __toESM(require("sshpk"));
173
176
  function _readPemFile(filename) {
174
- (0, import_assert4.default)(typeof filename === "string");
177
+ (0, import_assert5.default)(typeof filename === "string");
175
178
  return removeTrailingLF(import_node_fs.default.readFileSync(filename, "utf-8"));
176
179
  }
177
180
  function _readPemOrDerFileAsDER(filename) {
@@ -197,7 +200,7 @@ function myCreatePrivateKey(rawKey) {
197
200
  if (!import_crypto.createPrivateKey || process.env.NO_CREATE_PRIVATEKEY) {
198
201
  if (rawKey instanceof Buffer) {
199
202
  const pemKey = toPem(rawKey, "PRIVATE KEY");
200
- (0, import_assert4.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
203
+ (0, import_assert5.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
201
204
  return { hidden: pemKey };
202
205
  }
203
206
  return { hidden: ensureTrailingLF(rawKey) };
@@ -298,14 +301,14 @@ var KeyObjectOrig = import_crypto2.default.KeyObject;
298
301
  var { createPrivateKey: createPrivateKeyFromNodeJSCrypto } = import_crypto2.default;
299
302
 
300
303
  // source/crypto_utils2.ts
301
- var import_assert5 = __toESM(require("assert"));
304
+ var import_assert6 = __toESM(require("assert"));
302
305
  var import_jsrsasign2 = __toESM(require("jsrsasign"));
303
306
 
304
307
  // source/derived_keys.ts
305
- var import_assert7 = __toESM(require("assert"));
308
+ var import_assert8 = __toESM(require("assert"));
306
309
 
307
310
  // source/explore_certificate.ts
308
- var import_assert6 = __toESM(require("assert"));
311
+ var import_assert7 = __toESM(require("assert"));
309
312
 
310
313
  // source/x509/_crypto.ts
311
314
  var x509 = __toESM(require("@peculiar/x509"));