node-opcua-crypto 4.11.0 → 4.12.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-UH5AT3JE.mjs → chunk-AXAFLVME.mjs} +2 -2
- package/dist/{chunk-2RCYFHGG.mjs → chunk-LHUQUHQQ.mjs} +183 -178
- package/dist/chunk-LHUQUHQQ.mjs.map +1 -0
- package/dist/chunk-RQA4DO2Z.mjs +1 -0
- package/dist/chunk-RQA4DO2Z.mjs.map +1 -0
- package/dist/index.d.mts +1 -2
- package/dist/index.d.ts +1 -2
- package/dist/index.js +175 -170
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +6 -7
- package/dist/source/index.d.mts +1 -15
- package/dist/source/index.d.ts +1 -15
- package/dist/source/index.js +172 -167
- package/dist/source/index.js.map +1 -1
- package/dist/source/index.mjs +5 -6
- package/dist/source/index_web.d.mts +518 -4
- package/dist/source/index_web.d.ts +518 -4
- package/dist/source/index_web.js +183 -173
- package/dist/source/index_web.js.map +1 -1
- package/dist/source/index_web.mjs +5 -3
- package/dist/source_nodejs/index.js +18 -15
- package/dist/source_nodejs/index.js.map +1 -1
- package/dist/source_nodejs/index.mjs +3 -3
- package/package.json +2 -2
- package/dist/chunk-2RCYFHGG.mjs.map +0 -1
- package/dist/chunk-C7PROBPE.mjs +0 -14
- package/dist/chunk-C7PROBPE.mjs.map +0 -1
- package/dist/index_web-C5Oeu9mq.d.mts +0 -503
- package/dist/index_web-D1qc4UN2.d.ts +0 -503
- /package/dist/{chunk-UH5AT3JE.mjs.map → chunk-AXAFLVME.mjs.map} +0 -0
|
@@ -5,7 +5,7 @@ import {
|
|
|
5
5
|
RSA_PKCS1_PADDING,
|
|
6
6
|
Subject,
|
|
7
7
|
_coercePrivateKey,
|
|
8
|
-
|
|
8
|
+
asn1,
|
|
9
9
|
certificateMatchesPrivateKey,
|
|
10
10
|
coerceCertificate,
|
|
11
11
|
coerceCertificatePem,
|
|
@@ -52,6 +52,7 @@ import {
|
|
|
52
52
|
publicEncrypt_native,
|
|
53
53
|
publicKeyAndPrivateKeyMatches,
|
|
54
54
|
readCertificationRequestInfo,
|
|
55
|
+
readExtension,
|
|
55
56
|
readNameForCrl,
|
|
56
57
|
readTbsCertificate,
|
|
57
58
|
reduceLength,
|
|
@@ -70,7 +71,7 @@ import {
|
|
|
70
71
|
verifyChunkSignature,
|
|
71
72
|
verifyChunkSignatureWithDerivedKeys,
|
|
72
73
|
verifyMessageChunkSignature
|
|
73
|
-
} from "../chunk-
|
|
74
|
+
} from "../chunk-LHUQUHQQ.mjs";
|
|
74
75
|
export {
|
|
75
76
|
CertificatePurpose,
|
|
76
77
|
PaddingAlgorithm,
|
|
@@ -78,7 +79,7 @@ export {
|
|
|
78
79
|
RSA_PKCS1_PADDING,
|
|
79
80
|
Subject,
|
|
80
81
|
_coercePrivateKey,
|
|
81
|
-
|
|
82
|
+
asn1,
|
|
82
83
|
certificateMatchesPrivateKey,
|
|
83
84
|
coerceCertificate,
|
|
84
85
|
coerceCertificatePem,
|
|
@@ -125,6 +126,7 @@ export {
|
|
|
125
126
|
publicEncrypt_native,
|
|
126
127
|
publicKeyAndPrivateKeyMatches,
|
|
127
128
|
readCertificationRequestInfo,
|
|
129
|
+
readExtension,
|
|
128
130
|
readNameForCrl,
|
|
129
131
|
readTbsCertificate,
|
|
130
132
|
reduceLength,
|
|
@@ -48,14 +48,14 @@ __export(source_nodejs_exports, {
|
|
|
48
48
|
module.exports = __toCommonJS(source_nodejs_exports);
|
|
49
49
|
|
|
50
50
|
// source_nodejs/read.ts
|
|
51
|
-
var
|
|
51
|
+
var import_assert5 = __toESM(require("assert"));
|
|
52
52
|
var import_node_fs = __toESM(require("fs"));
|
|
53
53
|
var import_node_path = __toESM(require("path"));
|
|
54
54
|
var import_crypto = require("crypto");
|
|
55
55
|
|
|
56
56
|
// source/crypto_utils.ts
|
|
57
57
|
var import_constants = __toESM(require("constants"));
|
|
58
|
-
var
|
|
58
|
+
var import_assert4 = __toESM(require("assert"));
|
|
59
59
|
var import_hexy = __toESM(require("hexy"));
|
|
60
60
|
|
|
61
61
|
// source/buffer_utils.ts
|
|
@@ -64,7 +64,7 @@ var createFastUninitializedBuffer = Buffer.allocUnsafe ? Buffer.allocUnsafe : (s
|
|
|
64
64
|
};
|
|
65
65
|
|
|
66
66
|
// source/crypto_explore_certificate.ts
|
|
67
|
-
var
|
|
67
|
+
var import_assert3 = __toESM(require("assert"));
|
|
68
68
|
|
|
69
69
|
// source/asn1.ts
|
|
70
70
|
var import_assert = __toESM(require("assert"));
|
|
@@ -88,6 +88,9 @@ function readTag(buf, pos) {
|
|
|
88
88
|
return { start, tag, position: pos, length };
|
|
89
89
|
}
|
|
90
90
|
|
|
91
|
+
// source/directory_name.ts
|
|
92
|
+
var import_assert2 = __toESM(require("assert"));
|
|
93
|
+
|
|
91
94
|
// source/crypto_explore_certificate.ts
|
|
92
95
|
function split_der(certificateChain) {
|
|
93
96
|
const certificate_chain = [];
|
|
@@ -106,10 +109,10 @@ function combine_der(certificates) {
|
|
|
106
109
|
let sum = 0;
|
|
107
110
|
b.forEach((block) => {
|
|
108
111
|
const block_info = readTag(block, 0);
|
|
109
|
-
(0,
|
|
112
|
+
(0, import_assert3.default)(block_info.position + block_info.length === block.length);
|
|
110
113
|
sum += block.length;
|
|
111
114
|
});
|
|
112
|
-
(0,
|
|
115
|
+
(0, import_assert3.default)(sum === cert.length);
|
|
113
116
|
}
|
|
114
117
|
return Buffer.concat(certificates);
|
|
115
118
|
}
|
|
@@ -131,14 +134,14 @@ function removeTrailingLF(str) {
|
|
|
131
134
|
return tmp;
|
|
132
135
|
}
|
|
133
136
|
function toPem(raw_key, pem) {
|
|
134
|
-
(0,
|
|
135
|
-
(0,
|
|
137
|
+
(0, import_assert4.default)(raw_key, "expecting a key");
|
|
138
|
+
(0, import_assert4.default)(typeof pem === "string");
|
|
136
139
|
let pemType = identifyPemType(raw_key);
|
|
137
140
|
if (pemType) {
|
|
138
141
|
return raw_key instanceof Buffer ? removeTrailingLF(raw_key.toString("utf8")) : removeTrailingLF(raw_key);
|
|
139
142
|
} else {
|
|
140
143
|
pemType = pem;
|
|
141
|
-
(0,
|
|
144
|
+
(0, import_assert4.default)(["CERTIFICATE REQUEST", "CERTIFICATE", "RSA PRIVATE KEY", "PUBLIC KEY", "X509 CRL"].indexOf(pemType) >= 0);
|
|
142
145
|
let b = raw_key.toString("base64");
|
|
143
146
|
let str = "-----BEGIN " + pemType + "-----\n";
|
|
144
147
|
while (b.length) {
|
|
@@ -165,13 +168,13 @@ function convertPEMtoDER(raw_key) {
|
|
|
165
168
|
}
|
|
166
169
|
var RSA_PKCS1_OAEP_PADDING = import_constants.default.RSA_PKCS1_OAEP_PADDING;
|
|
167
170
|
var RSA_PKCS1_PADDING = import_constants.default.RSA_PKCS1_PADDING;
|
|
168
|
-
(0,
|
|
169
|
-
(0,
|
|
171
|
+
(0, import_assert4.default)(4 /* RSA_PKCS1_OAEP_PADDING */ === import_constants.default.RSA_PKCS1_OAEP_PADDING);
|
|
172
|
+
(0, import_assert4.default)(1 /* RSA_PKCS1_PADDING */ === import_constants.default.RSA_PKCS1_PADDING);
|
|
170
173
|
|
|
171
174
|
// source_nodejs/read.ts
|
|
172
175
|
var import_sshpk = __toESM(require("sshpk"));
|
|
173
176
|
function _readPemFile(filename) {
|
|
174
|
-
(0,
|
|
177
|
+
(0, import_assert5.default)(typeof filename === "string");
|
|
175
178
|
return removeTrailingLF(import_node_fs.default.readFileSync(filename, "utf-8"));
|
|
176
179
|
}
|
|
177
180
|
function _readPemOrDerFileAsDER(filename) {
|
|
@@ -197,7 +200,7 @@ function myCreatePrivateKey(rawKey) {
|
|
|
197
200
|
if (!import_crypto.createPrivateKey || process.env.NO_CREATE_PRIVATEKEY) {
|
|
198
201
|
if (rawKey instanceof Buffer) {
|
|
199
202
|
const pemKey = toPem(rawKey, "PRIVATE KEY");
|
|
200
|
-
(0,
|
|
203
|
+
(0, import_assert5.default)(["RSA PRIVATE KEY", "PRIVATE KEY"].indexOf(identifyPemType(pemKey)) >= 0);
|
|
201
204
|
return { hidden: pemKey };
|
|
202
205
|
}
|
|
203
206
|
return { hidden: ensureTrailingLF(rawKey) };
|
|
@@ -298,14 +301,14 @@ var KeyObjectOrig = import_crypto2.default.KeyObject;
|
|
|
298
301
|
var { createPrivateKey: createPrivateKeyFromNodeJSCrypto } = import_crypto2.default;
|
|
299
302
|
|
|
300
303
|
// source/crypto_utils2.ts
|
|
301
|
-
var
|
|
304
|
+
var import_assert6 = __toESM(require("assert"));
|
|
302
305
|
var import_jsrsasign2 = __toESM(require("jsrsasign"));
|
|
303
306
|
|
|
304
307
|
// source/derived_keys.ts
|
|
305
|
-
var
|
|
308
|
+
var import_assert8 = __toESM(require("assert"));
|
|
306
309
|
|
|
307
310
|
// source/explore_certificate.ts
|
|
308
|
-
var
|
|
311
|
+
var import_assert7 = __toESM(require("assert"));
|
|
309
312
|
|
|
310
313
|
// source/x509/_crypto.ts
|
|
311
314
|
var x509 = __toESM(require("@peculiar/x509"));
|