|
|
@ -3,6 +3,7 @@ |
|
|
|
'use strict'; |
|
|
|
|
|
|
|
var RSA = exports.Rasha = {}; |
|
|
|
var x509 = exports.x509; |
|
|
|
if ('undefined' !== typeof module) { module.exports = RSA; } |
|
|
|
var Enc = {}; |
|
|
|
var textEncoder = new TextEncoder(); |
|
|
@ -106,6 +107,66 @@ RSA.thumbprint = function (opts) { |
|
|
|
}); |
|
|
|
}; |
|
|
|
|
|
|
|
RSA.export = function (opts) { |
|
|
|
if (!opts || !opts.jwk || 'object' !== typeof opts.jwk) { |
|
|
|
throw new Error("must pass { jwk: jwk }"); |
|
|
|
} |
|
|
|
var jwk = JSON.parse(JSON.stringify(opts.jwk)); |
|
|
|
var format = opts.format; |
|
|
|
var pub = opts.public; |
|
|
|
if (pub || -1 !== [ 'spki', 'pkix', 'ssh', 'rfc4716' ].indexOf(format)) { |
|
|
|
jwk = RSA.nueter(jwk); |
|
|
|
} |
|
|
|
if ('RSA' !== jwk.kty) { |
|
|
|
throw new Error("options.jwk.kty must be 'RSA' for RSA keys"); |
|
|
|
} |
|
|
|
if (!jwk.p) { |
|
|
|
// TODO test for n and e
|
|
|
|
pub = true; |
|
|
|
if (!format || 'pkcs1' === format) { |
|
|
|
format = 'pkcs1'; |
|
|
|
} else if (-1 !== [ 'spki', 'pkix' ].indexOf(format)) { |
|
|
|
format = 'spki'; |
|
|
|
} else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) { |
|
|
|
format = 'ssh'; |
|
|
|
} else { |
|
|
|
throw new Error("options.format must be 'spki', 'pkcs1', or 'ssh' for public RSA keys, not (" |
|
|
|
+ typeof format + ") " + format); |
|
|
|
} |
|
|
|
} else { |
|
|
|
// TODO test for all necessary keys (d, p, q ...)
|
|
|
|
if (!format || 'pkcs1' === format) { |
|
|
|
format = 'pkcs1'; |
|
|
|
} else if ('pkcs8' !== format) { |
|
|
|
throw new Error("options.format must be 'pkcs1' or 'pkcs8' for private RSA keys"); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
if ('pkcs1' === format) { |
|
|
|
if (jwk.d) { |
|
|
|
return PEM.packBlock({ type: "RSA PRIVATE KEY", bytes: x509.packPkcs1(jwk) }); |
|
|
|
} else { |
|
|
|
return PEM.packBlock({ type: "RSA PUBLIC KEY", bytes: x509.packPkcs1(jwk) }); |
|
|
|
} |
|
|
|
} else if ('pkcs8' === format) { |
|
|
|
return PEM.packBlock({ type: "PRIVATE KEY", bytes: x509.packPkcs8(jwk) }); |
|
|
|
} else if (-1 !== [ 'spki', 'pkix' ].indexOf(format)) { |
|
|
|
return PEM.packBlock({ type: "PUBLIC KEY", bytes: x509.packSpki(jwk) }); |
|
|
|
} else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) { |
|
|
|
return SSH.pack({ jwk: jwk, comment: opts.comment }); |
|
|
|
} else { |
|
|
|
throw new Error("Sanity Error: reached unreachable code block with format: " + format); |
|
|
|
} |
|
|
|
}; |
|
|
|
RSA.pack = function (opts) { |
|
|
|
// wrapped in a promise for API compatibility
|
|
|
|
// with the forthcoming browser version
|
|
|
|
// (and potential future native node capability)
|
|
|
|
return Promise.resolve().then(function () { |
|
|
|
return RSA.export(opts); |
|
|
|
}); |
|
|
|
}; |
|
|
|
|
|
|
|
Enc.bufToUrlBase64 = function (u8) { |
|
|
|
return Enc.bufToBase64(u8) |
|
|
|
.replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, ''); |
|
|
|