node-opcua-crypto 4.2.0 → 4.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +1 -1
- package/README.md +1 -1
- package/dist/chunk-5NV4OKIV.mjs +1 -0
- package/dist/chunk-KPKFYTZJ.mjs +173 -0
- package/dist/chunk-QSSIRHMR.mjs +6243 -0
- package/dist/index.js +6521 -0
- package/dist/index.mjs +224 -0
- package/dist/source/index.js +6346 -0
- package/dist/source/index.mjs +192 -0
- package/dist/source/index_web.js +6346 -0
- package/dist/source/index_web.mjs +191 -0
- package/dist/source_nodejs/index.js +4170 -0
- package/dist/source_nodejs/index.mjs +37 -0
- package/dist-types/index.d.ts +2 -0
- package/dist-types/source/common.d.ts +21 -1
- package/dist-types/source/crypto_utils2.d.ts +2 -3
- package/dist-types/source/make_private_key_from_pem.d.ts +1 -1
- package/dist-types/source/x509/coerce_private_key.d.ts +5 -3
- package/dist-types/source/x509/create_key_pair.d.ts +6 -0
- package/dist-types/source/x509/create_self_signed_certificate.d.ts +4 -0
- package/dist-types/source_nodejs/read.d.ts +1 -0
- package/doc/.nojekyll +1 -0
- package/doc/assets/highlight.css +71 -0
- package/doc/assets/main.js +58 -0
- package/doc/assets/search.js +1 -0
- package/doc/assets/style.css +1379 -0
- package/doc/classes/Subject.html +76 -0
- package/doc/functions/combine_der.html +80 -0
- package/doc/functions/createPrivateKeyFromNodeJSCrypto.html +81 -0
- package/doc/functions/createSelfSignedCertificate.html +76 -0
- package/doc/functions/exploreCertificate.html +77 -0
- package/doc/functions/exploreCertificateInfo.html +80 -0
- package/doc/functions/explorePrivateKey.html +74 -0
- package/doc/functions/extractPublicKeyFromCertificate.html +92 -0
- package/doc/functions/generatePrivateKey.html +76 -0
- package/doc/functions/generatePrivateKeyFileAlternate.html +79 -0
- package/doc/functions/makeMessageChunkSignatureWithDerivedKeys.html +78 -0
- package/doc/functions/privateKeyToPEM.html +76 -0
- package/doc/functions/readCertificate.html +76 -0
- package/doc/functions/readPrivateKey.html +76 -0
- package/doc/functions/readPrivateKeyPEM.html +75 -0
- package/doc/functions/readPrivateRsaKey.html +74 -0
- package/doc/functions/readPublicKey.html +76 -0
- package/doc/functions/reduceLength.html +79 -0
- package/doc/functions/removePadding.html +77 -0
- package/doc/functions/rsaLengthPrivateKey.html +80 -0
- package/doc/functions/split_der.html +80 -0
- package/doc/functions/toPem2.html +80 -0
- package/doc/functions/verifyChunkSignature.html +82 -0
- package/doc/functions/verifyChunkSignatureWithDerivedKeys.html +78 -0
- package/doc/functions/verifyMessageChunkSignature.html +83 -0
- package/doc/index.html +128 -0
- package/doc/interfaces/CertificateInfo.html +135 -0
- package/doc/modules.html +96 -0
- package/node-opcua-crypto-4.2.0.tgz +0 -0
- package/package.json +84 -91
- package/dist-cjs/source/asn1.js +0 -304
- package/dist-cjs/source/asn1.js.map +0 -1
- package/dist-cjs/source/buffer_utils.js +0 -9
- package/dist-cjs/source/buffer_utils.js.map +0 -1
- package/dist-cjs/source/common.js +0 -11
- package/dist-cjs/source/common.js.map +0 -1
- package/dist-cjs/source/crypto_explore_certificate.js +0 -367
- package/dist-cjs/source/crypto_explore_certificate.js.map +0 -1
- package/dist-cjs/source/crypto_utils.js +0 -200
- package/dist-cjs/source/crypto_utils.js.map +0 -1
- package/dist-cjs/source/crypto_utils2.js +0 -71
- package/dist-cjs/source/crypto_utils2.js.map +0 -1
- package/dist-cjs/source/derived_keys.js +0 -133
- package/dist-cjs/source/derived_keys.js.map +0 -1
- package/dist-cjs/source/explore_certificate.js +0 -37
- package/dist-cjs/source/explore_certificate.js.map +0 -1
- package/dist-cjs/source/explore_certificate_revocation_list.js +0 -69
- package/dist-cjs/source/explore_certificate_revocation_list.js.map +0 -1
- package/dist-cjs/source/explore_certificate_signing_request.js +0 -45
- package/dist-cjs/source/explore_certificate_signing_request.js.map +0 -1
- package/dist-cjs/source/explore_private_key.js +0 -77
- package/dist-cjs/source/explore_private_key.js.map +0 -1
- package/dist-cjs/source/index.js +0 -38
- package/dist-cjs/source/index.js.map +0 -1
- package/dist-cjs/source/make_private_key_from_pem.js +0 -8
- package/dist-cjs/source/make_private_key_from_pem.js.map +0 -1
- package/dist-cjs/source/oid_map.js +0 -300
- package/dist-cjs/source/oid_map.js.map +0 -1
- package/dist-cjs/source/public_private_match.js +0 -32
- package/dist-cjs/source/public_private_match.js.map +0 -1
- package/dist-cjs/source/subject.js +0 -92
- package/dist-cjs/source/subject.js.map +0 -1
- package/dist-cjs/source/verify_certificate_signature.js +0 -117
- package/dist-cjs/source/verify_certificate_signature.js.map +0 -1
- package/dist-cjs/source/x509/_build_public_key.js +0 -69
- package/dist-cjs/source/x509/_build_public_key.js.map +0 -1
- package/dist-cjs/source/x509/_crypto.js +0 -52
- package/dist-cjs/source/x509/_crypto.js.map +0 -1
- package/dist-cjs/source/x509/_get_attributes.js +0 -39
- package/dist-cjs/source/x509/_get_attributes.js.map +0 -1
- package/dist-cjs/source/x509/coerce_private_key.js +0 -90
- package/dist-cjs/source/x509/coerce_private_key.js.map +0 -1
- package/dist-cjs/source/x509/create_certificate_signing_request.js +0 -92
- package/dist-cjs/source/x509/create_certificate_signing_request.js.map +0 -1
- package/dist-cjs/source/x509/create_key_pair.js +0 -123
- package/dist-cjs/source/x509/create_key_pair.js.map +0 -1
- package/dist-cjs/source/x509/create_self_signed_certificate.js +0 -103
- package/dist-cjs/source/x509/create_self_signed_certificate.js.map +0 -1
- package/dist-cjs/source_nodejs/generate_private_key_filename.js +0 -88
- package/dist-cjs/source_nodejs/generate_private_key_filename.js.map +0 -1
- package/dist-cjs/source_nodejs/index.js +0 -21
- package/dist-cjs/source_nodejs/index.js.map +0 -1
- package/dist-cjs/source_nodejs/read.js +0 -115
- package/dist-cjs/source_nodejs/read.js.map +0 -1
- package/dist-cjs/source_nodejs/read_certificate_revocation_list.js +0 -64
- package/dist-cjs/source_nodejs/read_certificate_revocation_list.js.map +0 -1
- package/dist-cjs/source_nodejs/read_certificate_signing_request.js +0 -64
- package/dist-cjs/source_nodejs/read_certificate_signing_request.js.map +0 -1
- package/dist-esm/source/asn1.js +0 -275
- package/dist-esm/source/asn1.js.map +0 -1
- package/dist-esm/source/buffer_utils.js +0 -6
- package/dist-esm/source/buffer_utils.js.map +0 -1
- package/dist-esm/source/common.js +0 -8
- package/dist-esm/source/common.js.map +0 -1
- package/dist-esm/source/crypto_explore_certificate.js +0 -356
- package/dist-esm/source/crypto_explore_certificate.js.map +0 -1
- package/dist-esm/source/crypto_utils.js +0 -179
- package/dist-esm/source/crypto_utils.js.map +0 -1
- package/dist-esm/source/crypto_utils2.js +0 -58
- package/dist-esm/source/crypto_utils2.js.map +0 -1
- package/dist-esm/source/derived_keys.js +0 -117
- package/dist-esm/source/derived_keys.js.map +0 -1
- package/dist-esm/source/explore_certificate.js +0 -29
- package/dist-esm/source/explore_certificate.js.map +0 -1
- package/dist-esm/source/explore_certificate_revocation_list.js +0 -64
- package/dist-esm/source/explore_certificate_revocation_list.js.map +0 -1
- package/dist-esm/source/explore_certificate_signing_request.js +0 -40
- package/dist-esm/source/explore_certificate_signing_request.js.map +0 -1
- package/dist-esm/source/explore_private_key.js +0 -73
- package/dist-esm/source/explore_private_key.js.map +0 -1
- package/dist-esm/source/index.js +0 -19
- package/dist-esm/source/index.js.map +0 -1
- package/dist-esm/source/make_private_key_from_pem.js +0 -4
- package/dist-esm/source/make_private_key_from_pem.js.map +0 -1
- package/dist-esm/source/oid_map.js +0 -297
- package/dist-esm/source/oid_map.js.map +0 -1
- package/dist-esm/source/public_private_match.js +0 -27
- package/dist-esm/source/public_private_match.js.map +0 -1
- package/dist-esm/source/subject.js +0 -89
- package/dist-esm/source/subject.js.map +0 -1
- package/dist-esm/source/verify_certificate_signature.js +0 -110
- package/dist-esm/source/verify_certificate_signature.js.map +0 -1
- package/dist-esm/source/x509/_build_public_key.js +0 -65
- package/dist-esm/source/x509/_build_public_key.js.map +0 -1
- package/dist-esm/source/x509/_crypto.js +0 -25
- package/dist-esm/source/x509/_crypto.js.map +0 -1
- package/dist-esm/source/x509/_get_attributes.js +0 -35
- package/dist-esm/source/x509/_get_attributes.js.map +0 -1
- package/dist-esm/source/x509/coerce_private_key.js +0 -85
- package/dist-esm/source/x509/coerce_private_key.js.map +0 -1
- package/dist-esm/source/x509/create_certificate_signing_request.js +0 -88
- package/dist-esm/source/x509/create_certificate_signing_request.js.map +0 -1
- package/dist-esm/source/x509/create_key_pair.js +0 -115
- package/dist-esm/source/x509/create_key_pair.js.map +0 -1
- package/dist-esm/source/x509/create_self_signed_certificate.js +0 -99
- package/dist-esm/source/x509/create_self_signed_certificate.js.map +0 -1
- package/dist-esm/source_nodejs/generate_private_key_filename.js +0 -80
- package/dist-esm/source_nodejs/generate_private_key_filename.js.map +0 -1
- package/dist-esm/source_nodejs/index.js +0 -5
- package/dist-esm/source_nodejs/index.js.map +0 -1
- package/dist-esm/source_nodejs/read.js +0 -99
- package/dist-esm/source_nodejs/read.js.map +0 -1
- package/dist-esm/source_nodejs/read_certificate_revocation_list.js +0 -57
- package/dist-esm/source_nodejs/read_certificate_revocation_list.js.map +0 -1
- package/dist-esm/source_nodejs/read_certificate_signing_request.js +0 -57
- package/dist-esm/source_nodejs/read_certificate_signing_request.js.map +0 -1
- package/index.d.ts +0 -2
- package/index.js +0 -4
- package/index_web.d.ts +0 -1
- package/index_web.js +0 -3
|
@@ -1,58 +0,0 @@
|
|
|
1
|
-
import assert from "assert";
|
|
2
|
-
import { KeyObject } from "crypto";
|
|
3
|
-
import { removeTrailingLF, toPem } from "./crypto_utils.js";
|
|
4
|
-
var jsrsasign = require("jsrsasign");
|
|
5
|
-
export function rsaLengthPrivateKey(key) {
|
|
6
|
-
var keyPem = typeof key.hidden === "string" ? key.hidden : key.hidden.export({ type: "pkcs1", format: "pem" }).toString();
|
|
7
|
-
var a = jsrsasign.KEYUTIL.getKey(keyPem);
|
|
8
|
-
return a.n.toString(16).length / 2;
|
|
9
|
-
}
|
|
10
|
-
export function toPem2(raw_key, pem) {
|
|
11
|
-
if (raw_key.hidden) {
|
|
12
|
-
return toPem2(raw_key.hidden, pem);
|
|
13
|
-
}
|
|
14
|
-
assert(raw_key, "expecting a key");
|
|
15
|
-
assert(typeof pem === "string");
|
|
16
|
-
if (raw_key instanceof KeyObject) {
|
|
17
|
-
if (pem === "RSA PRIVATE KEY") {
|
|
18
|
-
return removeTrailingLF(raw_key.export({ format: "pem", type: "pkcs1" }).toString());
|
|
19
|
-
}
|
|
20
|
-
else if (pem === "PRIVATE KEY") {
|
|
21
|
-
return removeTrailingLF(raw_key.export({ format: "pem", type: "pkcs8" }).toString());
|
|
22
|
-
}
|
|
23
|
-
else {
|
|
24
|
-
throw new Error("Unsupported case!");
|
|
25
|
-
}
|
|
26
|
-
}
|
|
27
|
-
return toPem(raw_key, pem);
|
|
28
|
-
}
|
|
29
|
-
export function coercePrivateKeyPem(privateKey) {
|
|
30
|
-
return toPem2(privateKey, "PRIVATE KEY");
|
|
31
|
-
}
|
|
32
|
-
export function coercePublicKeyPem(publicKey) {
|
|
33
|
-
if (publicKey instanceof KeyObject) {
|
|
34
|
-
return publicKey.export({ format: "pem", type: "spki" }).toString();
|
|
35
|
-
}
|
|
36
|
-
assert(typeof publicKey === "string");
|
|
37
|
-
return publicKey;
|
|
38
|
-
}
|
|
39
|
-
export function coerceRsaPublicKeyPem(publicKey) {
|
|
40
|
-
if (publicKey instanceof KeyObject) {
|
|
41
|
-
return publicKey.export({ format: "pem", type: "spki" }).toString();
|
|
42
|
-
}
|
|
43
|
-
assert(typeof publicKey === "string");
|
|
44
|
-
return publicKey;
|
|
45
|
-
}
|
|
46
|
-
export function rsaLengthPublicKey(key) {
|
|
47
|
-
key = coercePublicKeyPem(key);
|
|
48
|
-
assert(typeof key === "string");
|
|
49
|
-
var a = jsrsasign.KEYUTIL.getKey(key);
|
|
50
|
-
return a.n.toString(16).length / 2;
|
|
51
|
-
}
|
|
52
|
-
export function rsaLengthRsaPublicKey(key) {
|
|
53
|
-
key = coerceRsaPublicKeyPem(key);
|
|
54
|
-
assert(typeof key === "string");
|
|
55
|
-
var a = jsrsasign.KEYUTIL.getKey(key);
|
|
56
|
-
return a.n.toString(16).length / 2;
|
|
57
|
-
}
|
|
58
|
-
//# sourceMappingURL=crypto_utils2.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"crypto_utils2.js","sourceRoot":"","sources":["../../source/crypto_utils2.ts"],"names":[],"mappings":"AA2BA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAG5B,OAAO,EAAwD,SAAS,EAAE,MAAM,QAAQ,CAAC;AAGzF,OAAO,EAAE,gBAAgB,EAAE,KAAK,EAAE,MAAM,mBAAmB,CAAC;AAE5D,IAAM,SAAS,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;AAQvC,MAAM,UAAU,mBAAmB,CAAC,GAAe;IAC/C,IAAM,MAAM,GAAG,OAAO,GAAG,CAAC,MAAM,KAAK,QAAQ,CAAC,CAAC,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;IAI5H,IAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;IAC3C,OAAO,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC;AACvC,CAAC;AAaD,MAAM,UAAU,MAAM,CAAC,OAAiD,EAAE,GAAW;IACjF,IAAK,OAAsB,CAAC,MAAM,EAAE;QAChC,OAAO,MAAM,CAAE,OAAsB,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;KACtD;IACD,MAAM,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;IACnC,MAAM,CAAC,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC;IAEhC,IAAI,OAAO,YAAY,SAAS,EAAE;QAC9B,IAAI,GAAG,KAAK,iBAAiB,EAAE;YAC3B,OAAO,gBAAgB,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;SACxF;aAAM,IAAI,GAAG,KAAK,aAAa,EAAE;YAC9B,OAAO,gBAAgB,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;SACxF;aAAM;YACH,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;SACxC;KACJ;IACD,OAAO,KAAK,CAAC,OAA4B,EAAE,GAAG,CAAC,CAAC;AACpD,CAAC;AAED,MAAM,UAAU,mBAAmB,CAAC,UAAsB;IACtD,OAAO,MAAM,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;AAc7C,CAAC;AAED,MAAM,UAAU,kBAAkB,CAAC,SAAmC;IAClE,IAAI,SAAS,YAAY,SAAS,EAAE;QAChC,OAAO,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;KACvE;IACD,MAAM,CAAC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC;IACtC,OAAO,SAAS,CAAC;AACrB,CAAC;AACD,MAAM,UAAU,qBAAqB,CAAC,SAAmC;IACrE,IAAI,SAAS,YAAY,SAAS,EAAE;QAChC,OAAO,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;KACvE;IACD,MAAM,CAAC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC;IACtC,OAAO,SAAS,CAAC;AACrB,CAAC;AAED,MAAM,UAAU,kBAAkB,CAAC,GAA6B;IAC5D,GAAG,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IAC9B,MAAM,CAAC,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC;IAChC,IAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;IACxC,OAAO,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC;AACvC,CAAC;AACD,MAAM,UAAU,qBAAqB,CAAC,GAA6B;IAC/D,GAAG,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,CAAC,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC;IAChC,IAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;IACxC,OAAO,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC;AACvC,CAAC"}
|
|
@@ -1,117 +0,0 @@
|
|
|
1
|
-
import assert from "assert";
|
|
2
|
-
import { createCipheriv, createDecipheriv, createHmac } from "crypto";
|
|
3
|
-
import { createFastUninitializedBuffer } from "./buffer_utils.js";
|
|
4
|
-
import { verifyMessageChunkSignature } from "./crypto_utils.js";
|
|
5
|
-
import { exploreCertificateInfo } from "./explore_certificate.js";
|
|
6
|
-
function HMAC_HASH(sha1or256, secret, message) {
|
|
7
|
-
return createHmac(sha1or256, secret).update(message).digest();
|
|
8
|
-
}
|
|
9
|
-
function plus(buf1, buf2) {
|
|
10
|
-
return Buffer.concat([buf1, buf2]);
|
|
11
|
-
}
|
|
12
|
-
export function makePseudoRandomBuffer(secret, seed, minLength, sha1or256) {
|
|
13
|
-
assert(seed instanceof Buffer);
|
|
14
|
-
assert(sha1or256 === "SHA1" || sha1or256 === "SHA256");
|
|
15
|
-
var a = [];
|
|
16
|
-
a[0] = seed;
|
|
17
|
-
var index = 1;
|
|
18
|
-
var p_hash = createFastUninitializedBuffer(0);
|
|
19
|
-
while (p_hash.length <= minLength) {
|
|
20
|
-
a[index] = HMAC_HASH(sha1or256, secret, a[index - 1]);
|
|
21
|
-
p_hash = plus(p_hash, HMAC_HASH(sha1or256, secret, plus(a[index], seed)));
|
|
22
|
-
index += 1;
|
|
23
|
-
}
|
|
24
|
-
return p_hash.subarray(0, minLength);
|
|
25
|
-
}
|
|
26
|
-
export function computeDerivedKeys(secret, seed, options) {
|
|
27
|
-
assert(Number.isFinite(options.signatureLength));
|
|
28
|
-
assert(Number.isFinite(options.encryptingKeyLength));
|
|
29
|
-
assert(Number.isFinite(options.encryptingBlockSize));
|
|
30
|
-
assert(typeof options.algorithm === "string");
|
|
31
|
-
options.sha1or256 = options.sha1or256 || "SHA1";
|
|
32
|
-
assert(typeof options.sha1or256 === "string");
|
|
33
|
-
var offset1 = options.signingKeyLength;
|
|
34
|
-
var offset2 = offset1 + options.encryptingKeyLength;
|
|
35
|
-
var minLength = offset2 + options.encryptingBlockSize;
|
|
36
|
-
var buf = makePseudoRandomBuffer(secret, seed, minLength, options.sha1or256);
|
|
37
|
-
return {
|
|
38
|
-
signatureLength: options.signatureLength,
|
|
39
|
-
signingKeyLength: options.signingKeyLength,
|
|
40
|
-
encryptingKeyLength: options.encryptingKeyLength,
|
|
41
|
-
encryptingBlockSize: options.encryptingBlockSize,
|
|
42
|
-
algorithm: options.algorithm,
|
|
43
|
-
sha1or256: options.sha1or256,
|
|
44
|
-
signingKey: buf.subarray(0, offset1),
|
|
45
|
-
encryptingKey: buf.subarray(offset1, offset2),
|
|
46
|
-
initializationVector: buf.subarray(offset2, minLength),
|
|
47
|
-
};
|
|
48
|
-
}
|
|
49
|
-
export function reduceLength(buffer, byteToRemove) {
|
|
50
|
-
return buffer.subarray(0, buffer.length - byteToRemove);
|
|
51
|
-
}
|
|
52
|
-
export function removePadding(buffer) {
|
|
53
|
-
var nbPaddingBytes = buffer.readUInt8(buffer.length - 1) + 1;
|
|
54
|
-
return reduceLength(buffer, nbPaddingBytes);
|
|
55
|
-
}
|
|
56
|
-
export function verifyChunkSignature(chunk, options) {
|
|
57
|
-
assert(chunk instanceof Buffer);
|
|
58
|
-
var signatureLength = options.signatureLength || 0;
|
|
59
|
-
if (signatureLength === 0) {
|
|
60
|
-
var cert = exploreCertificateInfo(options.publicKey);
|
|
61
|
-
signatureLength = cert.publicKeyLength || 0;
|
|
62
|
-
}
|
|
63
|
-
var block_to_verify = chunk.subarray(0, chunk.length - signatureLength);
|
|
64
|
-
var signature = chunk.subarray(chunk.length - signatureLength);
|
|
65
|
-
return verifyMessageChunkSignature(block_to_verify, signature, options);
|
|
66
|
-
}
|
|
67
|
-
export function computePaddingFooter(buffer, derivedKeys) {
|
|
68
|
-
assert(Object.prototype.hasOwnProperty.call(derivedKeys, "encryptingBlockSize"));
|
|
69
|
-
var paddingSize = derivedKeys.encryptingBlockSize - ((buffer.length + 1) % derivedKeys.encryptingBlockSize);
|
|
70
|
-
var padding = createFastUninitializedBuffer(paddingSize + 1);
|
|
71
|
-
padding.fill(paddingSize);
|
|
72
|
-
return padding;
|
|
73
|
-
}
|
|
74
|
-
function derivedKeys_algorithm(derivedKeys) {
|
|
75
|
-
assert(Object.prototype.hasOwnProperty.call(derivedKeys, "algorithm"));
|
|
76
|
-
var algorithm = derivedKeys.algorithm || "aes-128-cbc";
|
|
77
|
-
assert(algorithm === "aes-128-cbc" || algorithm === "aes-256-cbc");
|
|
78
|
-
return algorithm;
|
|
79
|
-
}
|
|
80
|
-
export function encryptBufferWithDerivedKeys(buffer, derivedKeys) {
|
|
81
|
-
var algorithm = derivedKeys_algorithm(derivedKeys);
|
|
82
|
-
var key = derivedKeys.encryptingKey;
|
|
83
|
-
var initVector = derivedKeys.initializationVector;
|
|
84
|
-
var cipher = createCipheriv(algorithm, key, initVector);
|
|
85
|
-
cipher.setAutoPadding(false);
|
|
86
|
-
var encrypted_chunks = [];
|
|
87
|
-
encrypted_chunks.push(cipher.update(buffer));
|
|
88
|
-
encrypted_chunks.push(cipher.final());
|
|
89
|
-
return Buffer.concat(encrypted_chunks);
|
|
90
|
-
}
|
|
91
|
-
export function decryptBufferWithDerivedKeys(buffer, derivedKeys) {
|
|
92
|
-
var algorithm = derivedKeys_algorithm(derivedKeys);
|
|
93
|
-
var key = derivedKeys.encryptingKey;
|
|
94
|
-
var initVector = derivedKeys.initializationVector;
|
|
95
|
-
var cipher = createDecipheriv(algorithm, key, initVector);
|
|
96
|
-
cipher.setAutoPadding(false);
|
|
97
|
-
var decrypted_chunks = [];
|
|
98
|
-
decrypted_chunks.push(cipher.update(buffer));
|
|
99
|
-
decrypted_chunks.push(cipher.final());
|
|
100
|
-
return Buffer.concat(decrypted_chunks);
|
|
101
|
-
}
|
|
102
|
-
export function makeMessageChunkSignatureWithDerivedKeys(message, derivedKeys) {
|
|
103
|
-
assert(message instanceof Buffer);
|
|
104
|
-
assert(derivedKeys.signingKey instanceof Buffer);
|
|
105
|
-
assert(typeof derivedKeys.sha1or256 === "string");
|
|
106
|
-
assert(derivedKeys.sha1or256 === "SHA1" || derivedKeys.sha1or256 === "SHA256");
|
|
107
|
-
var signature = createHmac(derivedKeys.sha1or256, derivedKeys.signingKey).update(message).digest();
|
|
108
|
-
assert(signature.length === derivedKeys.signatureLength);
|
|
109
|
-
return signature;
|
|
110
|
-
}
|
|
111
|
-
export function verifyChunkSignatureWithDerivedKeys(chunk, derivedKeys) {
|
|
112
|
-
var message = chunk.subarray(0, chunk.length - derivedKeys.signatureLength);
|
|
113
|
-
var expectedSignature = chunk.subarray(chunk.length - derivedKeys.signatureLength);
|
|
114
|
-
var computedSignature = makeMessageChunkSignatureWithDerivedKeys(message, derivedKeys);
|
|
115
|
-
return computedSignature.toString("hex") === expectedSignature.toString("hex");
|
|
116
|
-
}
|
|
117
|
-
//# sourceMappingURL=derived_keys.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"derived_keys.js","sourceRoot":"","sources":["../../source/derived_keys.ts"],"names":[],"mappings":"AA0BA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AAEtE,OAAO,EAAE,6BAA6B,EAAE,MAAM,mBAAmB,CAAC;AAElE,OAAO,EAAE,2BAA2B,EAAsC,MAAM,mBAAmB,CAAC;AACpG,OAAO,EAAE,sBAAsB,EAAE,MAAM,0BAA0B,CAAC;AAElE,SAAS,SAAS,CAAC,SAA4B,EAAE,MAAc,EAAE,OAAe;IAC5E,OAAO,UAAU,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,CAAC;AAClE,CAAC;AAED,SAAS,IAAI,CAAC,IAAY,EAAE,IAAY;IACpC,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;AACvC,CAAC;AAiDD,MAAM,UAAU,sBAAsB,CAAC,MAAa,EAAE,IAAW,EAAE,SAAiB,EAAE,SAA4B;IAC9G,MAAM,CAAC,IAAI,YAAY,MAAM,CAAC,CAAC;IAC/B,MAAM,CAAC,SAAS,KAAK,MAAM,IAAI,SAAS,KAAK,QAAQ,CAAC,CAAC;IAEvD,IAAM,CAAC,GAAa,EAAE,CAAC;IACvB,CAAC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC;IACZ,IAAI,KAAK,GAAG,CAAC,CAAC;IACd,IAAI,MAAM,GAAG,6BAA6B,CAAC,CAAC,CAAC,CAAC;IAC9C,OAAO,MAAM,CAAC,MAAM,IAAI,SAAS,EAAE;QAE/B,CAAC,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,SAAS,EAAE,MAAM,EAAE,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,CAAC,CAAC;QACtD,MAAM,GAAG,IAAI,CAAC,MAAM,EAAE,SAAS,CAAC,SAAS,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC;QAC1E,KAAK,IAAI,CAAC,CAAC;KACd;IACD,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC;AACzC,CAAC;AA0BD,MAAM,UAAU,kBAAkB,CAAC,MAAa,EAAE,IAAW,EAAE,OAAkC;IAC7F,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;IACjD,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;IACrD,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;IACrD,MAAM,CAAC,OAAO,OAAO,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAC;IAC9C,OAAO,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,IAAI,MAAM,CAAC;IAChD,MAAM,CAAC,OAAO,OAAO,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAC;IAE9C,IAAM,OAAO,GAAG,OAAO,CAAC,gBAAgB,CAAC;IACzC,IAAM,OAAO,GAAG,OAAO,GAAG,OAAO,CAAC,mBAAmB,CAAC;IACtD,IAAM,SAAS,GAAG,OAAO,GAAG,OAAO,CAAC,mBAAmB,CAAC;IAExD,IAAM,GAAG,GAAG,sBAAsB,CAAC,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;IAK/E,OAAO;QACH,eAAe,EAAE,OAAO,CAAC,eAAe;QACxC,gBAAgB,EAAE,OAAO,CAAC,gBAAgB;QAC1C,mBAAmB,EAAE,OAAO,CAAC,mBAAmB;QAEhD,mBAAmB,EAAE,OAAO,CAAC,mBAAmB;QAChD,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,SAAS,EAAE,OAAO,CAAC,SAAS;QAE5B,UAAU,EAAE,GAAG,CAAC,QAAQ,CAAC,CAAC,EAAE,OAAO,CAAC;QACpC,aAAa,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAC;QAC7C,oBAAoB,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,EAAE,SAAS,CAAC;KACzD,CAAC;AACN,CAAC;AAQD,MAAM,UAAU,YAAY,CAAC,MAAc,EAAE,YAAoB;IAC7D,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,MAAM,GAAG,YAAY,CAAC,CAAC;AAC5D,CAAC;AAOD,MAAM,UAAU,aAAa,CAAC,MAAc;IACxC,IAAM,cAAc,GAAG,MAAM,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IAC/D,OAAO,YAAY,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;AAChD,CAAC;AAoBD,MAAM,UAAU,oBAAoB,CAAC,KAAa,EAAE,OAAoC;IACpF,MAAM,CAAC,KAAK,YAAY,MAAM,CAAC,CAAC;IAChC,IAAI,eAAe,GAAG,OAAO,CAAC,eAAe,IAAI,CAAC,CAAC;IACnD,IAAI,eAAe,KAAK,CAAC,EAAE;QAGvB,IAAM,IAAI,GAAG,sBAAsB,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;QACvD,eAAe,GAAG,IAAI,CAAC,eAAe,IAAI,CAAC,CAAC;KAC/C;IACD,IAAM,eAAe,GAAG,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,KAAK,CAAC,MAAM,GAAG,eAAe,CAAC,CAAC;IAC1E,IAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,MAAM,GAAG,eAAe,CAAC,CAAC;IACjE,OAAO,2BAA2B,CAAC,eAAe,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;AAC5E,CAAC;AA2BD,MAAM,UAAU,oBAAoB,CAAC,MAAc,EAAE,WAAwB;IACzE,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,EAAE,qBAAqB,CAAC,CAAC,CAAC;IACjF,IAAM,WAAW,GAAG,WAAW,CAAC,mBAAmB,GAAG,CAAC,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,WAAW,CAAC,mBAAmB,CAAC,CAAC;IAC9G,IAAM,OAAO,GAAG,6BAA6B,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC;IAC/D,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;IAC1B,OAAO,OAAO,CAAC;AACnB,CAAC;AAED,SAAS,qBAAqB,CAAC,WAAwB;IACnD,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,EAAE,WAAW,CAAC,CAAC,CAAC;IACvE,IAAM,SAAS,GAAG,WAAW,CAAC,SAAS,IAAI,aAAa,CAAC;IACzD,MAAM,CAAC,SAAS,KAAK,aAAa,IAAI,SAAS,KAAK,aAAa,CAAC,CAAC;IACnE,OAAO,SAAS,CAAC;AACrB,CAAC;AAED,MAAM,UAAU,4BAA4B,CAAC,MAAc,EAAE,WAAwB;IACjF,IAAM,SAAS,GAAG,qBAAqB,CAAC,WAAW,CAAC,CAAC;IACrD,IAAM,GAAG,GAAG,WAAW,CAAC,aAAa,CAAC;IACtC,IAAM,UAAU,GAAG,WAAW,CAAC,oBAAoB,CAAC;IACpD,IAAM,MAAM,GAAG,cAAc,CAAC,SAAS,EAAE,GAAG,EAAE,UAAU,CAAC,CAAC;IAE1D,MAAM,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;IAC7B,IAAM,gBAAgB,GAAa,EAAE,CAAC;IACtC,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;IAC7C,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC;IACtC,OAAO,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;AAC3C,CAAC;AAED,MAAM,UAAU,4BAA4B,CAAC,MAAc,EAAE,WAAwB;IACjF,IAAM,SAAS,GAAG,qBAAqB,CAAC,WAAW,CAAC,CAAC;IACrD,IAAM,GAAG,GAAG,WAAW,CAAC,aAAa,CAAC;IACtC,IAAM,UAAU,GAAG,WAAW,CAAC,oBAAoB,CAAC;IACpD,IAAM,MAAM,GAAG,gBAAgB,CAAC,SAAS,EAAE,GAAG,EAAE,UAAU,CAAC,CAAC;IAE5D,MAAM,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;IAE7B,IAAM,gBAAgB,GAAa,EAAE,CAAC;IACtC,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;IAC7C,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC;IAEtC,OAAO,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;AAC3C,CAAC;AAQD,MAAM,UAAU,wCAAwC,CAAC,OAAe,EAAE,WAAwB;IAC9F,MAAM,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC;IAClC,MAAM,CAAC,WAAW,CAAC,UAAU,YAAY,MAAM,CAAC,CAAC;IACjD,MAAM,CAAC,OAAO,WAAW,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAC;IAClD,MAAM,CAAC,WAAW,CAAC,SAAS,KAAK,MAAM,IAAI,WAAW,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAC;IAC/E,IAAM,SAAS,GAAG,UAAU,CAAC,WAAW,CAAC,SAAS,EAAE,WAAW,CAAC,UAAU,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,CAAC;IACrG,MAAM,CAAC,SAAS,CAAC,MAAM,KAAK,WAAW,CAAC,eAAe,CAAC,CAAC;IACzD,OAAO,SAAS,CAAC;AACrB,CAAC;AAQD,MAAM,UAAU,mCAAmC,CAAC,KAAa,EAAE,WAAwB;IACvF,IAAM,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,KAAK,CAAC,MAAM,GAAG,WAAW,CAAC,eAAe,CAAC,CAAC;IAC9E,IAAM,iBAAiB,GAAG,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,MAAM,GAAG,WAAW,CAAC,eAAe,CAAC,CAAC;IACrF,IAAM,iBAAiB,GAAG,wCAAwC,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;IACzF,OAAO,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;AACnF,CAAC"}
|
|
@@ -1,29 +0,0 @@
|
|
|
1
|
-
import assert from "assert";
|
|
2
|
-
import { exploreCertificate } from "./crypto_explore_certificate.js";
|
|
3
|
-
import { convertPEMtoDER } from "./crypto_utils.js";
|
|
4
|
-
export function coerceCertificate(certificate) {
|
|
5
|
-
if (typeof certificate === "string") {
|
|
6
|
-
certificate = convertPEMtoDER(certificate);
|
|
7
|
-
}
|
|
8
|
-
assert(certificate instanceof Buffer);
|
|
9
|
-
return certificate;
|
|
10
|
-
}
|
|
11
|
-
export function exploreCertificateInfo(certificate) {
|
|
12
|
-
certificate = coerceCertificate(certificate);
|
|
13
|
-
var certInfo = exploreCertificate(certificate);
|
|
14
|
-
var data = {
|
|
15
|
-
publicKeyLength: certInfo.tbsCertificate.subjectPublicKeyInfo.keyLength,
|
|
16
|
-
notBefore: certInfo.tbsCertificate.validity.notBefore,
|
|
17
|
-
notAfter: certInfo.tbsCertificate.validity.notAfter,
|
|
18
|
-
publicKey: certInfo.tbsCertificate.subjectPublicKeyInfo.subjectPublicKey,
|
|
19
|
-
subject: certInfo.tbsCertificate.subject,
|
|
20
|
-
};
|
|
21
|
-
if (!(data.publicKeyLength === 512 ||
|
|
22
|
-
data.publicKeyLength === 384 ||
|
|
23
|
-
data.publicKeyLength === 256 ||
|
|
24
|
-
data.publicKeyLength === 128)) {
|
|
25
|
-
throw new Error("Invalid public key length (expecting 128,256,384 or 512)" + data.publicKeyLength);
|
|
26
|
-
}
|
|
27
|
-
return data;
|
|
28
|
-
}
|
|
29
|
-
//# sourceMappingURL=explore_certificate.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"explore_certificate.js","sourceRoot":"","sources":["../../source/explore_certificate.ts"],"names":[],"mappings":"AAyBA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAG5B,OAAO,EAAE,kBAAkB,EAAoB,MAAM,iCAAiC,CAAC;AAEvF,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AAqBpD,MAAM,UAAU,iBAAiB,CAAC,WAAyC;IACvE,IAAI,OAAO,WAAW,KAAK,QAAQ,EAAE;QACjC,WAAW,GAAG,eAAe,CAAC,WAAW,CAAC,CAAC;KAC9C;IACD,MAAM,CAAC,WAAW,YAAY,MAAM,CAAC,CAAC;IACtC,OAAO,WAAW,CAAC;AACvB,CAAC;AAQD,MAAM,UAAU,sBAAsB,CAAC,WAAyC;IAC5E,WAAW,GAAG,iBAAiB,CAAC,WAAW,CAAC,CAAC;IAE7C,IAAM,QAAQ,GAAG,kBAAkB,CAAC,WAAW,CAAC,CAAC;IACjD,IAAM,IAAI,GAAoB;QAC1B,eAAe,EAAE,QAAQ,CAAC,cAAc,CAAC,oBAAoB,CAAC,SAAS;QACvE,SAAS,EAAE,QAAQ,CAAC,cAAc,CAAC,QAAQ,CAAC,SAAS;QACrD,QAAQ,EAAE,QAAQ,CAAC,cAAc,CAAC,QAAQ,CAAC,QAAQ;QACnD,SAAS,EAAE,QAAQ,CAAC,cAAc,CAAC,oBAAoB,CAAC,gBAAgB;QACxE,OAAO,EAAE,QAAQ,CAAC,cAAc,CAAC,OAAO;KAC3C,CAAC;IAEF,IACI,CAAC,CACG,IAAI,CAAC,eAAe,KAAK,GAAG;QAC5B,IAAI,CAAC,eAAe,KAAK,GAAG;QAC5B,IAAI,CAAC,eAAe,KAAK,GAAG;QAC5B,IAAI,CAAC,eAAe,KAAK,GAAG,CAC/B,EACH;QACE,MAAM,IAAI,KAAK,CAAC,0DAA0D,GAAG,IAAI,CAAC,eAAe,CAAC,CAAC;KACtG;IACD,OAAO,IAAI,CAAC;AAChB,CAAC"}
|
|
@@ -1,64 +0,0 @@
|
|
|
1
|
-
import { _readStruct, readTag, _readAlgorithmIdentifier, _readSignatureValueBin, _readTime, _readLongIntegerValue, formatBuffer2DigitHexWithColum, _getBlock, _readDirectoryName, _findBlockAtIndex, _readIntegerValue, TagType, } from "./asn1.js";
|
|
2
|
-
import { makeSHA1Thumbprint } from "./crypto_utils.js";
|
|
3
|
-
export function readNameForCrl(buffer, block) {
|
|
4
|
-
return _readDirectoryName(buffer, block);
|
|
5
|
-
}
|
|
6
|
-
function _readTbsCertList(buffer, blockInfo) {
|
|
7
|
-
var blocks = _readStruct(buffer, blockInfo);
|
|
8
|
-
var hasOptionalVersion = blocks[0].tag === TagType.INTEGER;
|
|
9
|
-
if (hasOptionalVersion) {
|
|
10
|
-
var version = _readIntegerValue(buffer, blocks[0]);
|
|
11
|
-
var signature = _readAlgorithmIdentifier(buffer, blocks[1]);
|
|
12
|
-
var issuer = readNameForCrl(buffer, blocks[2]);
|
|
13
|
-
var issuerFingerprint = formatBuffer2DigitHexWithColum(makeSHA1Thumbprint(_getBlock(buffer, blocks[2])));
|
|
14
|
-
var thisUpdate = _readTime(buffer, blocks[3]);
|
|
15
|
-
var nextUpdate = _readTime(buffer, blocks[4]);
|
|
16
|
-
var revokedCertificates = [];
|
|
17
|
-
if (blocks[5] && blocks[5].tag < 0x80) {
|
|
18
|
-
var list = _readStruct(buffer, blocks[5]);
|
|
19
|
-
for (var _i = 0, list_1 = list; _i < list_1.length; _i++) {
|
|
20
|
-
var r = list_1[_i];
|
|
21
|
-
var rr = _readStruct(buffer, r);
|
|
22
|
-
var userCertificate = formatBuffer2DigitHexWithColum(_readLongIntegerValue(buffer, rr[0]));
|
|
23
|
-
var revocationDate = _readTime(buffer, rr[1]);
|
|
24
|
-
revokedCertificates.push({
|
|
25
|
-
revocationDate: revocationDate,
|
|
26
|
-
userCertificate: userCertificate,
|
|
27
|
-
});
|
|
28
|
-
}
|
|
29
|
-
}
|
|
30
|
-
var ext0 = _findBlockAtIndex(blocks, 0);
|
|
31
|
-
return { issuer: issuer, issuerFingerprint: issuerFingerprint, thisUpdate: thisUpdate, nextUpdate: nextUpdate, signature: signature, revokedCertificates: revokedCertificates };
|
|
32
|
-
}
|
|
33
|
-
else {
|
|
34
|
-
var signature = _readAlgorithmIdentifier(buffer, blocks[0]);
|
|
35
|
-
var issuer = readNameForCrl(buffer, blocks[1]);
|
|
36
|
-
var issuerFingerprint = formatBuffer2DigitHexWithColum(makeSHA1Thumbprint(_getBlock(buffer, blocks[1])));
|
|
37
|
-
var thisUpdate = _readTime(buffer, blocks[2]);
|
|
38
|
-
var nextUpdate = _readTime(buffer, blocks[3]);
|
|
39
|
-
var revokedCertificates = [];
|
|
40
|
-
if (blocks[4] && blocks[4].tag < 0x80) {
|
|
41
|
-
var list = _readStruct(buffer, blocks[4]);
|
|
42
|
-
for (var _a = 0, list_2 = list; _a < list_2.length; _a++) {
|
|
43
|
-
var r = list_2[_a];
|
|
44
|
-
var rr = _readStruct(buffer, r);
|
|
45
|
-
var userCertificate = formatBuffer2DigitHexWithColum(_readLongIntegerValue(buffer, rr[0]));
|
|
46
|
-
var revocationDate = _readTime(buffer, rr[1]);
|
|
47
|
-
revokedCertificates.push({
|
|
48
|
-
revocationDate: revocationDate,
|
|
49
|
-
userCertificate: userCertificate,
|
|
50
|
-
});
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
return { issuer: issuer, issuerFingerprint: issuerFingerprint, thisUpdate: thisUpdate, nextUpdate: nextUpdate, signature: signature, revokedCertificates: revokedCertificates };
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
export function exploreCertificateRevocationList(crl) {
|
|
57
|
-
var blockInfo = readTag(crl, 0);
|
|
58
|
-
var blocks = _readStruct(crl, blockInfo);
|
|
59
|
-
var tbsCertList = _readTbsCertList(crl, blocks[0]);
|
|
60
|
-
var signatureAlgorithm = _readAlgorithmIdentifier(crl, blocks[1]);
|
|
61
|
-
var signatureValue = _readSignatureValueBin(crl, blocks[2]);
|
|
62
|
-
return { tbsCertList: tbsCertList, signatureAlgorithm: signatureAlgorithm, signatureValue: signatureValue };
|
|
63
|
-
}
|
|
64
|
-
//# sourceMappingURL=explore_certificate_revocation_list.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"explore_certificate_revocation_list.js","sourceRoot":"","sources":["../../source/explore_certificate_revocation_list.ts"],"names":[],"mappings":"AAuBA,OAAO,EACH,WAAW,EACX,OAAO,EAGP,wBAAwB,EAExB,sBAAsB,EAKtB,SAAS,EACT,qBAAqB,EACrB,8BAA8B,EAC9B,SAAS,EACT,kBAAkB,EAClB,iBAAiB,EACjB,iBAAiB,EACjB,OAAO,GACV,MAAM,WAAW,CAAC;AAEnB,OAAO,EAAE,kBAAkB,EAAmB,MAAM,mBAAmB,CAAC;AA2BxE,MAAM,UAAU,cAAc,CAAC,MAAc,EAAE,KAAgB;IAC3D,OAAO,kBAAkB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;AAC7C,CAAC;AAED,SAAS,gBAAgB,CAAC,MAAc,EAAE,SAAoB;IAC1D,IAAM,MAAM,GAAG,WAAW,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IAE9C,IAAM,kBAAkB,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,GAAG,KAAK,OAAO,CAAC,OAAO,CAAC;IAE7D,IAAI,kBAAkB,EAAE;QACpB,IAAM,OAAO,GAAG,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACrD,IAAM,SAAS,GAAG,wBAAwB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAC9D,IAAM,MAAM,GAAG,cAAc,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACjD,IAAM,iBAAiB,GAAG,8BAA8B,CAAC,kBAAkB,CAAC,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAE3G,IAAM,UAAU,GAAG,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAChD,IAAM,UAAU,GAAG,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAEhD,IAAM,mBAAmB,GAAyB,EAAE,CAAC;QAErD,IAAI,MAAM,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,CAAC,GAAG,GAAG,IAAI,EAAE;YACnC,IAAM,IAAI,GAAG,WAAW,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;YAC5C,KAAgB,UAAI,EAAJ,aAAI,EAAJ,kBAAI,EAAJ,IAAI,EAAE;gBAAjB,IAAM,CAAC,aAAA;gBAER,IAAM,EAAE,GAAG,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;gBAClC,IAAM,eAAe,GAAG,8BAA8B,CAAC,qBAAqB,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC7F,IAAM,cAAc,GAAG,SAAS,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;gBAChD,mBAAmB,CAAC,IAAI,CAAC;oBACrB,cAAc,gBAAA;oBACd,eAAe,iBAAA;iBAClB,CAAC,CAAC;aACN;SACJ;QAED,IAAM,IAAI,GAAG,iBAAiB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAC1C,OAAO,EAAE,MAAM,QAAA,EAAE,iBAAiB,mBAAA,EAAE,UAAU,YAAA,EAAE,UAAU,YAAA,EAAE,SAAS,WAAA,EAAE,mBAAmB,qBAAA,EAAiB,CAAC;KAC/G;SAAM;QACH,IAAM,SAAS,GAAG,wBAAwB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAC9D,IAAM,MAAM,GAAG,cAAc,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACjD,IAAM,iBAAiB,GAAG,8BAA8B,CAAC,kBAAkB,CAAC,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAE3G,IAAM,UAAU,GAAG,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAChD,IAAM,UAAU,GAAG,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAEhD,IAAM,mBAAmB,GAAyB,EAAE,CAAC;QAErD,IAAI,MAAM,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,CAAC,GAAG,GAAG,IAAI,EAAE;YACnC,IAAM,IAAI,GAAG,WAAW,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;YAC5C,KAAgB,UAAI,EAAJ,aAAI,EAAJ,kBAAI,EAAJ,IAAI,EAAE;gBAAjB,IAAM,CAAC,aAAA;gBAER,IAAM,EAAE,GAAG,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;gBAClC,IAAM,eAAe,GAAG,8BAA8B,CAAC,qBAAqB,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC7F,IAAM,cAAc,GAAG,SAAS,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;gBAChD,mBAAmB,CAAC,IAAI,CAAC;oBACrB,cAAc,gBAAA;oBACd,eAAe,iBAAA;iBAClB,CAAC,CAAC;aACN;SACJ;QACD,OAAO,EAAE,MAAM,QAAA,EAAE,iBAAiB,mBAAA,EAAE,UAAU,YAAA,EAAE,UAAU,YAAA,EAAE,SAAS,WAAA,EAAE,mBAAmB,qBAAA,EAAiB,CAAC;KAC/G;AACL,CAAC;AAGD,MAAM,UAAU,gCAAgC,CAAC,GAA8B;IAC3E,IAAM,SAAS,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;IAClC,IAAM,MAAM,GAAG,WAAW,CAAC,GAAG,EAAE,SAAS,CAAC,CAAC;IAC3C,IAAM,WAAW,GAAG,gBAAgB,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IACrD,IAAM,kBAAkB,GAAG,wBAAwB,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IACpE,IAAM,cAAc,GAAG,sBAAsB,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IAC9D,OAAO,EAAE,WAAW,aAAA,EAAE,kBAAkB,oBAAA,EAAE,cAAc,gBAAA,EAAE,CAAC;AAC/D,CAAC"}
|
|
@@ -1,40 +0,0 @@
|
|
|
1
|
-
import { readTag, _findBlockAtIndex, _getBlock, _readObjectIdentifier, _readStruct } from "./asn1.js";
|
|
2
|
-
import { _readExtension } from "./crypto_explore_certificate.js";
|
|
3
|
-
function _readExtensionRequest(buffer) {
|
|
4
|
-
var block = readTag(buffer, 0);
|
|
5
|
-
var inner_blocks = _readStruct(buffer, block);
|
|
6
|
-
var extensions = inner_blocks.map(function (block1) { return _readExtension(buffer, block1); });
|
|
7
|
-
var result = {};
|
|
8
|
-
for (var _i = 0, extensions_1 = extensions; _i < extensions_1.length; _i++) {
|
|
9
|
-
var e = extensions_1[_i];
|
|
10
|
-
result[e.identifier.name] = e.value;
|
|
11
|
-
}
|
|
12
|
-
var basicConstraints = result.basicConstraints, keyUsage = result.keyUsage, subjectAltName = result.subjectAltName;
|
|
13
|
-
return { basicConstraints: basicConstraints, keyUsage: keyUsage, subjectAltName: subjectAltName };
|
|
14
|
-
}
|
|
15
|
-
export function readCertificationRequestInfo(buffer, block) {
|
|
16
|
-
var blocks = _readStruct(buffer, block);
|
|
17
|
-
if (blocks.length === 4) {
|
|
18
|
-
var extensionRequestBlock = _findBlockAtIndex(blocks, 0);
|
|
19
|
-
if (!extensionRequestBlock) {
|
|
20
|
-
throw new Error("cannot find extensionRequest block");
|
|
21
|
-
}
|
|
22
|
-
var blocks1 = _readStruct(buffer, extensionRequestBlock);
|
|
23
|
-
var blocks2 = _readStruct(buffer, blocks1[0]);
|
|
24
|
-
var identifier = _readObjectIdentifier(buffer, blocks2[0]);
|
|
25
|
-
if (identifier.name !== "extensionRequest") {
|
|
26
|
-
throw new Error(" Cannot find extension Request in ASN1 block");
|
|
27
|
-
}
|
|
28
|
-
var buf = _getBlock(buffer, blocks2[1]);
|
|
29
|
-
var extensionRequest = _readExtensionRequest(buf);
|
|
30
|
-
return { extensionRequest: extensionRequest };
|
|
31
|
-
}
|
|
32
|
-
throw new Error("Invalid CSR or ");
|
|
33
|
-
}
|
|
34
|
-
export function exploreCertificateSigningRequest(crl) {
|
|
35
|
-
var blockInfo = readTag(crl, 0);
|
|
36
|
-
var blocks = _readStruct(crl, blockInfo);
|
|
37
|
-
var csrInfo = readCertificationRequestInfo(crl, blocks[0]);
|
|
38
|
-
return csrInfo;
|
|
39
|
-
}
|
|
40
|
-
//# sourceMappingURL=explore_certificate_signing_request.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"explore_certificate_signing_request.js","sourceRoot":"","sources":["../../source/explore_certificate_signing_request.ts"],"names":[],"mappings":"AAuBA,OAAO,EAAa,OAAO,EAAE,iBAAiB,EAAE,SAAS,EAAE,qBAAqB,EAAE,WAAW,EAAqB,MAAM,WAAW,CAAC;AAEpI,OAAO,EAAkC,cAAc,EAAE,MAAM,iCAAiC,CAAC;AAWjG,SAAS,qBAAqB,CAAC,MAAc;IACzC,IAAM,KAAK,GAAG,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAEjC,IAAM,YAAY,GAAG,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IAChD,IAAM,UAAU,GAAG,YAAY,CAAC,GAAG,CAAC,UAAC,MAAM,IAAK,OAAA,cAAc,CAAC,MAAM,EAAE,MAAM,CAAC,EAA9B,CAA8B,CAAC,CAAC;IAEhF,IAAM,MAAM,GAAQ,EAAE,CAAC;IACvB,KAAgB,UAAU,EAAV,yBAAU,EAAV,wBAAU,EAAV,IAAU,EAAE;QAAvB,IAAM,CAAC,mBAAA;QACR,MAAM,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC;KACvC;IACO,IAAA,gBAAgB,GAA+B,MAAM,iBAArC,EAAE,QAAQ,GAAqB,MAAM,SAA3B,EAAE,cAAc,GAAK,MAAM,eAAX,CAAY;IAC9D,OAAO,EAAE,gBAAgB,kBAAA,EAAE,QAAQ,UAAA,EAAE,cAAc,gBAAA,EAAE,CAAC;AAC1D,CAAC;AAED,MAAM,UAAU,4BAA4B,CAAC,MAAc,EAAE,KAAgB;IACzE,IAAM,MAAM,GAAG,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IAC1C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE;QACrB,IAAM,qBAAqB,GAAG,iBAAiB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAC3D,IAAI,CAAC,qBAAqB,EAAE;YACxB,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;SACzD;QACD,IAAM,OAAO,GAAG,WAAW,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QAC3D,IAAM,OAAO,GAAG,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;QAChD,IAAM,UAAU,GAAG,qBAAqB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;QAC7D,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,EAAE;YACxC,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;SACnE;QACD,IAAM,GAAG,GAAG,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;QAE1C,IAAM,gBAAgB,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAC;QAEpD,OAAO,EAAE,gBAAgB,kBAAA,EAAE,CAAC;KAC/B;IACD,MAAM,IAAI,KAAK,CAAC,iBAAiB,CAAC,CAAC;AACvC,CAAC;AAID,MAAM,UAAU,gCAAgC,CAAC,GAAW;IACxD,IAAM,SAAS,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;IAClC,IAAM,MAAM,GAAG,WAAW,CAAC,GAAG,EAAE,SAAS,CAAC,CAAC;IAC3C,IAAM,OAAO,GAAG,4BAA4B,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IAC7D,OAAO,OAAO,CAAC;AACnB,CAAC"}
|
|
@@ -1,73 +0,0 @@
|
|
|
1
|
-
import { readTag, TagType, _readStruct } from "./asn1.js";
|
|
2
|
-
import { convertPEMtoDER } from "./crypto_utils.js";
|
|
3
|
-
function f(buffer, b) {
|
|
4
|
-
return buffer.subarray(b.position + 1, b.position + b.length);
|
|
5
|
-
}
|
|
6
|
-
var doDebug = !!process.env.DEBUG;
|
|
7
|
-
export function explorePrivateKey(privateKey2) {
|
|
8
|
-
var privateKey1 = privateKey2.hidden;
|
|
9
|
-
var privateKey = typeof privateKey1 === "string" ? convertPEMtoDER(privateKey1) : privateKey1.export({ format: "der", type: "pkcs1" });
|
|
10
|
-
var block_info = readTag(privateKey, 0);
|
|
11
|
-
var blocks = _readStruct(privateKey, block_info);
|
|
12
|
-
if (blocks.length === 9) {
|
|
13
|
-
var version_1 = f(privateKey, blocks[0]);
|
|
14
|
-
var modulus_1 = f(privateKey, blocks[1]);
|
|
15
|
-
var publicExponent_1 = f(privateKey, blocks[2]);
|
|
16
|
-
var privateExponent_1 = f(privateKey, blocks[3]);
|
|
17
|
-
var prime1_1 = f(privateKey, blocks[4]);
|
|
18
|
-
var prime2_1 = f(privateKey, blocks[5]);
|
|
19
|
-
var exponent1_1 = f(privateKey, blocks[6]);
|
|
20
|
-
var exponent2_1 = f(privateKey, blocks[7]);
|
|
21
|
-
return {
|
|
22
|
-
version: version_1,
|
|
23
|
-
modulus: modulus_1,
|
|
24
|
-
publicExponent: publicExponent_1,
|
|
25
|
-
privateExponent: privateExponent_1,
|
|
26
|
-
prime1: prime1_1,
|
|
27
|
-
prime2: prime2_1,
|
|
28
|
-
exponent1: exponent1_1,
|
|
29
|
-
exponent2: exponent2_1,
|
|
30
|
-
};
|
|
31
|
-
}
|
|
32
|
-
if (doDebug) {
|
|
33
|
-
console.log("-------------------- private key:");
|
|
34
|
-
console.log(block_info);
|
|
35
|
-
console.log(blocks.map(function (b) { return ({
|
|
36
|
-
tag: TagType[b.tag] + " 0x" + b.tag.toString(16),
|
|
37
|
-
l: b.length,
|
|
38
|
-
p: b.position,
|
|
39
|
-
buff: privateKey.subarray(b.position, b.position + b.length).toString("hex"),
|
|
40
|
-
}); }));
|
|
41
|
-
}
|
|
42
|
-
var b = blocks[2];
|
|
43
|
-
var bb = privateKey.subarray(b.position, b.position + b.length);
|
|
44
|
-
var block_info1 = readTag(bb, 0);
|
|
45
|
-
var blocks1 = _readStruct(bb, block_info1);
|
|
46
|
-
if (doDebug) {
|
|
47
|
-
console.log(blocks1.map(function (b) { return ({
|
|
48
|
-
tag: TagType[b.tag] + " 0x" + b.tag.toString(16),
|
|
49
|
-
l: b.length,
|
|
50
|
-
p: b.position,
|
|
51
|
-
buff: bb.subarray(b.position, b.position + b.length).toString("hex"),
|
|
52
|
-
}); }));
|
|
53
|
-
}
|
|
54
|
-
var version = f(bb, blocks1[0]);
|
|
55
|
-
var modulus = f(bb, blocks1[1]);
|
|
56
|
-
var publicExponent = f(bb, blocks1[2]);
|
|
57
|
-
var privateExponent = f(bb, blocks1[3]);
|
|
58
|
-
var prime1 = f(bb, blocks1[4]);
|
|
59
|
-
var prime2 = f(bb, blocks1[5]);
|
|
60
|
-
var exponent1 = f(bb, blocks1[6]);
|
|
61
|
-
var exponent2 = f(bb, blocks1[7]);
|
|
62
|
-
return {
|
|
63
|
-
version: version,
|
|
64
|
-
modulus: modulus,
|
|
65
|
-
publicExponent: publicExponent,
|
|
66
|
-
privateExponent: privateExponent,
|
|
67
|
-
prime1: prime1,
|
|
68
|
-
prime2: prime2,
|
|
69
|
-
exponent1: exponent1,
|
|
70
|
-
exponent2: exponent2,
|
|
71
|
-
};
|
|
72
|
-
}
|
|
73
|
-
//# sourceMappingURL=explore_private_key.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"explore_private_key.js","sourceRoot":"","sources":["../../source/explore_private_key.ts"],"names":[],"mappings":"AAuBA,OAAO,EAAa,OAAO,EAAE,OAAO,EAA4B,WAAW,EAAE,MAAM,WAAW,CAAC;AAE/F,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AAepD,SAAS,CAAC,CAAC,MAAc,EAAE,CAAY;IACnC,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,EAAE,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;AAClE,CAAC;AACD,IAAM,OAAO,GAAG,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC;AAgBpC,MAAM,UAAU,iBAAiB,CAAC,WAAuB;IAErD,IAAM,WAAW,GAAG,WAAW,CAAE,MAAM,CAAC;IACxC,IAAM,UAAU,GAAG,OAAO,WAAW,KAAK,QAAQ,CAAC,CAAC,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC;IAEzI,IAAM,UAAU,GAAG,OAAO,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;IAC1C,IAAM,MAAM,GAAG,WAAW,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC;IAEnD,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE;QAErB,IAAM,SAAO,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACzC,IAAM,SAAO,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACzC,IAAM,gBAAc,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAChD,IAAM,iBAAe,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACjD,IAAM,QAAM,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACxC,IAAM,QAAM,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QACxC,IAAM,WAAS,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAC3C,IAAM,WAAS,GAAG,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;QAE3C,OAAO;YACH,OAAO,WAAA;YACP,OAAO,WAAA;YACP,cAAc,kBAAA;YACd,eAAe,mBAAA;YACf,MAAM,UAAA;YACN,MAAM,UAAA;YACN,SAAS,aAAA;YACT,SAAS,aAAA;SACZ,CAAC;KACL;IAED,IAAI,OAAO,EAAE;QAET,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;QACjD,OAAO,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;QAGxB,OAAO,CAAC,GAAG,CACP,MAAM,CAAC,GAAG,CAAC,UAAC,CAAC,IAAK,OAAA,CAAC;YACf,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,KAAK,GAAG,CAAC,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAChD,CAAC,EAAE,CAAC,CAAC,MAAM;YACX,CAAC,EAAE,CAAC,CAAC,QAAQ;YACb,IAAI,EAAE,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;SAC/E,CAAC,EALgB,CAKhB,CAAC,CACN,CAAC;KACL;IAED,IAAM,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;IACpB,IAAM,EAAE,GAAG,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;IAClE,IAAM,WAAW,GAAG,OAAO,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;IACnC,IAAM,OAAO,GAAG,WAAW,CAAC,EAAE,EAAE,WAAW,CAAC,CAAC;IAG7C,IAAI,OAAO,EAAE;QAET,OAAO,CAAC,GAAG,CACP,OAAO,CAAC,GAAG,CAAC,UAAC,CAAC,IAAK,OAAA,CAAC;YAChB,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,KAAK,GAAG,CAAC,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAChD,CAAC,EAAE,CAAC,CAAC,MAAM;YACX,CAAC,EAAE,CAAC,CAAC,QAAQ;YACb,IAAI,EAAE,EAAE,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;SACvE,CAAC,EALiB,CAKjB,CAAC,CACN,CAAC;KACL;IAED,IAAM,OAAO,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IAClC,IAAM,OAAO,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IAClC,IAAM,cAAc,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IACzC,IAAM,eAAe,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IAC1C,IAAM,MAAM,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IACjC,IAAM,MAAM,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IACjC,IAAM,SAAS,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IACpC,IAAM,SAAS,GAAG,CAAC,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;IAEpC,OAAO;QACH,OAAO,SAAA;QACP,OAAO,SAAA;QACP,cAAc,gBAAA;QACd,eAAe,iBAAA;QACf,MAAM,QAAA;QACN,MAAM,QAAA;QACN,SAAS,WAAA;QACT,SAAS,WAAA;KACZ,CAAC;AACN,CAAC"}
|
package/dist-esm/source/index.js
DELETED
|
@@ -1,19 +0,0 @@
|
|
|
1
|
-
export * from "./common.js";
|
|
2
|
-
export * from "./derived_keys.js";
|
|
3
|
-
export * from "./explore_certificate.js";
|
|
4
|
-
export * from "./crypto_utils.js";
|
|
5
|
-
export * from "./crypto_utils2.js";
|
|
6
|
-
export * from "./crypto_explore_certificate.js";
|
|
7
|
-
export * from "./verify_certificate_signature.js";
|
|
8
|
-
export * from "./explore_certificate_revocation_list.js";
|
|
9
|
-
export * from "./explore_certificate_signing_request.js";
|
|
10
|
-
export * from "./explore_private_key.js";
|
|
11
|
-
export { publicKeyAndPrivateKeyMatches, certificateMatchesPrivateKey } from "./public_private_match.js";
|
|
12
|
-
export * from "./x509/create_key_pair.js";
|
|
13
|
-
export * from "./x509/create_certificate_signing_request.js";
|
|
14
|
-
export * from "./x509/create_self_signed_certificate.js";
|
|
15
|
-
export * from "./x509/coerce_private_key.js";
|
|
16
|
-
export * from "./subject.js";
|
|
17
|
-
export * from "./asn1.js";
|
|
18
|
-
export * from "./make_private_key_from_pem.js";
|
|
19
|
-
//# sourceMappingURL=index.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../source/index.ts"],"names":[],"mappings":"AA0BA,cAAc,aAAa,CAAC;AAC5B,cAAc,mBAAmB,CAAC;AAClC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,oBAAoB,CAAC;AACnC,cAAc,iCAAiC,CAAC;AAChD,cAAc,mCAAmC,CAAC;AAClD,cAAc,0CAA0C,CAAC;AACzD,cAAc,0CAA0C,CAAC;AACzD,cAAc,0BAA0B,CAAC;AACzC,OAAO,EAAE,6BAA6B,EAAE,4BAA4B,EAAE,MAAM,2BAA2B,CAAC;AACxG,cAAc,2BAA2B,CAAC;AAC1C,cAAc,8CAA8C,CAAC;AAC7D,cAAc,0CAA0C,CAAC;AACzD,cAAc,8BAA8B,CAAC;AAC7C,cAAc,cAAc,CAAC;AAC7B,cAAc,WAAW,CAAC;AAC1B,cAAc,gCAAgC,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"make_private_key_from_pem.js","sourceRoot":"","sources":["../../source/make_private_key_from_pem.ts"],"names":[],"mappings":"AAGA,MAAM,UAAU,qBAAqB,CAAC,eAAuB;IACzD,OAAO,EAAE,MAAM,EAAE,eAAe,EAAE,CAAC;AACvC,CAAC"}
|