508 lines
15 KiB
JavaScript
508 lines
15 KiB
JavaScript
'use strict';
|
|
|
|
var ASN1;
|
|
var EC = module.exports;
|
|
var Hex = {};
|
|
var PEM = {};
|
|
|
|
// 1.2.840.10045.3.1.7
|
|
// prime256v1 (ANSI X9.62 named elliptic curve)
|
|
var OBJ_ID_EC = '06 08 2A8648CE3D030107'.replace(/\s+/g, '').toLowerCase();
|
|
// 1.3.132.0.34
|
|
// secp384r1 (SECG (Certicom) named elliptic curve)
|
|
var OBJ_ID_EC_384 = '06 05 2B81040022'.replace(/\s+/g, '').toLowerCase();
|
|
|
|
// 1.2.840.10045.2.1
|
|
// ecPublicKey (ANSI X9.62 public key type)
|
|
var OBJ_ID_EC_PUB = '06 07 2A8648CE3D0201'.replace(/\s+/g, '').toLowerCase();
|
|
|
|
// 19 e c d s a - s h a 2 - n i s t p 2 5 6
|
|
var SSH_EC_P256 = '00000013 65 63 64 73 61 2d 73 68 61 32 2d 6e 69 73 74 70 32 35 36'
|
|
.replace(/\s+/g, '').toLowerCase();
|
|
|
|
// 19 e c d s a - s h a 2 - n i s t p 3 8 4
|
|
var SSH_EC_P384 = '00000013 65 63 64 73 61 2d 73 68 61 32 2d 6e 69 73 74 70 33 38 34'
|
|
.replace(/\s+/g, '').toLowerCase();
|
|
|
|
// The one good thing that came from the b***kchain hysteria: good EC documentation
|
|
// https://davidederosa.com/basic-blockchain-programming/elliptic-curve-keys/
|
|
|
|
PEM._toUrlSafeBase64 = function (u8) {
|
|
//console.log('Len:', u8.byteLength);
|
|
return Buffer.from(u8).toString('base64')
|
|
.replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
|
|
};
|
|
|
|
PEM.parseBlock = function pemToDer(pem) {
|
|
var typ;
|
|
var pub;
|
|
var crv;
|
|
var der = Buffer.from(pem.split(/\n/).filter(function (line, i) {
|
|
if (0 === i) {
|
|
if (/ PUBLIC /.test(line)) {
|
|
pub = true;
|
|
} else if (/ PRIVATE /.test(line)) {
|
|
pub = false;
|
|
}
|
|
if (/ EC/.test(line)) {
|
|
typ = 'EC';
|
|
}
|
|
}
|
|
return !/---/.test(line);
|
|
}).join(''), 'base64');
|
|
|
|
if (!typ || 'EC' === typ) {
|
|
var hex = toHex(der);
|
|
if (-1 !== hex.indexOf(OBJ_ID_EC)) {
|
|
typ = 'EC';
|
|
crv = 'P-256';
|
|
} else if (-1 !== hex.indexOf(OBJ_ID_EC_384)) {
|
|
typ = 'EC';
|
|
crv = 'P-384';
|
|
} else {
|
|
// TODO support P-384 as well (but probably nothing else)
|
|
console.warn("unsupported ec curve");
|
|
}
|
|
}
|
|
|
|
return { kty: typ, pub: pub, der: der, crv: crv };
|
|
};
|
|
|
|
PEM.packBlock = function (opts) {
|
|
// TODO allow for headers?
|
|
return '-----BEGIN ' + opts.type + '-----\n'
|
|
+ toBase64(opts.bytes).match(/.{1,64}/g).join('\n') + '\n'
|
|
+ '-----END ' + opts.type + '-----'
|
|
;
|
|
};
|
|
|
|
function toHex(ab) {
|
|
var hex = [];
|
|
var u8 = new Uint8Array(ab);
|
|
var size = u8.byteLength;
|
|
var i;
|
|
var h;
|
|
for (i = 0; i < size; i += 1) {
|
|
h = u8[i].toString(16);
|
|
if (2 === h.length) {
|
|
hex.push(h);
|
|
} else {
|
|
hex.push('0' + h);
|
|
}
|
|
}
|
|
return hex.join('').replace(/\s+/g, '').toLowerCase();
|
|
}
|
|
Hex.fromAB = toHex;
|
|
|
|
Hex.fromInt = function numToHex(d) {
|
|
d = d.toString(16);
|
|
if (d.length % 2) {
|
|
return '0' + d;
|
|
}
|
|
return d;
|
|
};
|
|
Hex.toUint8 = function (hex) {
|
|
var buf = Buffer.from(hex, 'hex');
|
|
var ab = buf.buffer;
|
|
return new Uint8Array(ab.slice(buf.offset, buf.offset + buf.byteLength));
|
|
};
|
|
|
|
function toBase64(u8) {
|
|
return Buffer.from(u8).toString('base64');
|
|
}
|
|
|
|
function urlBase64ToBase64(ub64) {
|
|
var r = ub64 % 4;
|
|
if (2 === r) {
|
|
ub64 += '==';
|
|
} else if (3 === r) {
|
|
ub64 += '=';
|
|
}
|
|
return ub64.replace(/-/g, '+').replace(/_/g, '/');
|
|
}
|
|
function base64ToUint8(b64) {
|
|
var buf = Buffer.from(b64, 'base64');
|
|
return new Uint8Array(buf.buffer.slice(buf.byteOffset, buf.byteOffset + buf.byteLength));
|
|
}
|
|
|
|
EC.parseSec1 = function parseEcOnlyPrivkey(u8, jwk) {
|
|
var index = 7;
|
|
var len = 32;
|
|
var olen = OBJ_ID_EC.length/2;
|
|
|
|
if ("P-384" === jwk.crv) {
|
|
olen = OBJ_ID_EC_384.length/2;
|
|
index = 8;
|
|
len = 48;
|
|
}
|
|
if (len !== u8[index - 1]) {
|
|
throw new Error("Unexpected bitlength " + len);
|
|
}
|
|
|
|
// private part is d
|
|
var d = u8.slice(index, index + len);
|
|
// compression bit index
|
|
var ci = index + len + 2 + olen + 2 + 3;
|
|
var c = u8[ci];
|
|
var x, y;
|
|
|
|
if (0x04 === c) {
|
|
y = u8.slice(ci + 1 + len, ci + 1 + len + len);
|
|
} else if (0x02 !== c) {
|
|
throw new Error("not a supported EC private key");
|
|
}
|
|
x = u8.slice(ci + 1, ci + 1 + len);
|
|
|
|
return {
|
|
kty: jwk.kty
|
|
, crv: jwk.crv
|
|
, d: PEM._toUrlSafeBase64(d)
|
|
//, dh: toHex(d)
|
|
, x: PEM._toUrlSafeBase64(x)
|
|
//, xh: toHex(x)
|
|
, y: PEM._toUrlSafeBase64(y)
|
|
//, yh: toHex(y)
|
|
};
|
|
};
|
|
|
|
EC.parsePkcs8 = function parseEcPkcs8(u8, jwk) {
|
|
var index = 24 + (OBJ_ID_EC.length/2);
|
|
var len = 32;
|
|
if ("P-384" === jwk.crv) {
|
|
index = 24 + (OBJ_ID_EC_384.length/2) + 2;
|
|
len = 48;
|
|
}
|
|
|
|
//console.log(index, u8.slice(index));
|
|
if (0x04 !== u8[index]) {
|
|
//console.log(jwk);
|
|
throw new Error("privkey not found");
|
|
}
|
|
var d = u8.slice(index+2, index+2+len);
|
|
var ci = index+2+len+5;
|
|
var xi = ci+1;
|
|
var x = u8.slice(xi, xi + len);
|
|
var yi = xi+len;
|
|
var y;
|
|
if (0x04 === u8[ci]) {
|
|
y = u8.slice(yi, yi + len);
|
|
} else if (0x02 !== u8[ci]) {
|
|
throw new Error("invalid compression bit (expected 0x04 or 0x02)");
|
|
}
|
|
|
|
return {
|
|
kty: jwk.kty
|
|
, crv: jwk.crv
|
|
, d: PEM._toUrlSafeBase64(d)
|
|
//, dh: toHex(d)
|
|
, x: PEM._toUrlSafeBase64(x)
|
|
//, xh: toHex(x)
|
|
, y: PEM._toUrlSafeBase64(y)
|
|
//, yh: toHex(y)
|
|
};
|
|
};
|
|
|
|
EC.parseSpki = function parsePem(u8, jwk) {
|
|
var ci = 16 + OBJ_ID_EC.length/2;
|
|
var len = 32;
|
|
|
|
if ("P-384" === jwk.crv) {
|
|
ci = 16 + OBJ_ID_EC_384.length/2;
|
|
len = 48;
|
|
}
|
|
|
|
var c = u8[ci];
|
|
var xi = ci + 1;
|
|
var x = u8.slice(xi, xi + len);
|
|
var yi = xi + len;
|
|
var y;
|
|
if (0x04 === c) {
|
|
y = u8.slice(yi, yi + len);
|
|
} else if (0x02 !== c) {
|
|
throw new Error("not a supported EC private key");
|
|
}
|
|
|
|
return {
|
|
kty: jwk.kty
|
|
, crv: jwk.crv
|
|
, x: PEM._toUrlSafeBase64(x)
|
|
//, xh: toHex(x)
|
|
, y: PEM._toUrlSafeBase64(y)
|
|
//, yh: toHex(y)
|
|
};
|
|
};
|
|
EC.parsePkix = EC.parseSpki;
|
|
|
|
EC.parseSsh = function (pem) {
|
|
var jwk = { kty: 'EC', crv: null, x: null, y: null };
|
|
var b64 = pem.split(/\s+/g)[1];
|
|
var buf = Buffer.from(b64, 'base64');
|
|
var hex = buf.toString('hex');
|
|
var index = 40;
|
|
var len;
|
|
if (0 === hex.indexOf(SSH_EC_P256)) {
|
|
jwk.crv = 'P-256';
|
|
len = 32;
|
|
} else if (0 === hex.indexOf(SSH_EC_P384)) {
|
|
jwk.crv = 'P-384';
|
|
len = 48;
|
|
}
|
|
var x = buf.slice(index, index + len);
|
|
var y = buf.slice(index + len, index + len + len);
|
|
jwk.x = PEM._toUrlSafeBase64(x);
|
|
jwk.y = PEM._toUrlSafeBase64(y);
|
|
return jwk;
|
|
};
|
|
|
|
/*global Promise*/
|
|
EC.parse = function parseEc(opts) {
|
|
return Promise.resolve().then(function () {
|
|
if (!opts || !opts.pem || 'string' !== typeof opts.pem) {
|
|
throw new Error("must pass { pem: pem } as a string");
|
|
}
|
|
if (0 === opts.pem.indexOf('ecdsa-sha2-')) {
|
|
return EC.parseSsh(opts.pem);
|
|
}
|
|
var pem = opts.pem;
|
|
var u8 = PEM.parseBlock(pem).der;
|
|
var hex = toHex(u8);
|
|
var jwk = { kty: 'EC', crv: null, x: null, y: null };
|
|
|
|
//console.log();
|
|
if (-1 !== hex.indexOf(OBJ_ID_EC)) {
|
|
jwk.crv = "P-256";
|
|
|
|
// PKCS8
|
|
if (0x02 === u8[3] && 0x30 === u8[6] && 0x06 === u8[8]) {
|
|
//console.log("PKCS8", u8[3].toString(16), u8[6].toString(16), u8[8].toString(16));
|
|
jwk = EC.parsePkcs8(u8, jwk);
|
|
// EC-only
|
|
} else if (0x02 === u8[2] && 0x04 === u8[5] && 0xA0 === u8[39]) {
|
|
//console.log("EC---", u8[2].toString(16), u8[5].toString(16), u8[39].toString(16));
|
|
jwk = EC.parseSec1(u8, jwk);
|
|
// SPKI/PKIK (Public)
|
|
} else if (0x30 === u8[2] && 0x06 === u8[4] && 0x06 === u8[13]) {
|
|
//console.log("SPKI-", u8[2].toString(16), u8[4].toString(16), u8[13].toString(16));
|
|
jwk = EC.parseSpki(u8, jwk);
|
|
// Error
|
|
} else {
|
|
//console.log("PKCS8", u8[3].toString(16), u8[6].toString(16), u8[8].toString(16));
|
|
//console.log("EC---", u8[2].toString(16), u8[5].toString(16), u8[39].toString(16));
|
|
//console.log("SPKI-", u8[2].toString(16), u8[4].toString(16), u8[13].toString(16));
|
|
throw new Error("unrecognized key format");
|
|
}
|
|
} else if (-1 !== hex.indexOf(OBJ_ID_EC_384)) {
|
|
jwk.crv = "P-384";
|
|
|
|
// PKCS8
|
|
if (0x02 === u8[3] && 0x30 === u8[6] && 0x06 === u8[8]) {
|
|
//console.log("PKCS8", u8[3].toString(16), u8[6].toString(16), u8[8].toString(16));
|
|
jwk = EC.parsePkcs8(u8, jwk);
|
|
// EC-only
|
|
} else if (0x02 === u8[3] && 0x04 === u8[6] && 0xA0 === u8[56]) {
|
|
//console.log("EC---", u8[3].toString(16), u8[6].toString(16), u8[56].toString(16));
|
|
jwk = EC.parseSec1(u8, jwk);
|
|
// SPKI/PKIK (Public)
|
|
} else if (0x30 === u8[2] && 0x06 === u8[4] && 0x06 === u8[13]) {
|
|
//console.log("SPKI-", u8[2].toString(16), u8[4].toString(16), u8[13].toString(16));
|
|
jwk = EC.parseSpki(u8, jwk);
|
|
// Error
|
|
} else {
|
|
//console.log("PKCS8", u8[3].toString(16), u8[6].toString(16), u8[8].toString(16));
|
|
//console.log("EC---", u8[3].toString(16), u8[6].toString(16), u8[56].toString(16));
|
|
//console.log("SPKI-", u8[2].toString(16), u8[4].toString(16), u8[13].toString(16));
|
|
throw new Error("unrecognized key format");
|
|
}
|
|
} else {
|
|
throw new Error("Supported key types are P-256 and P-384");
|
|
}
|
|
if (opts.public) {
|
|
if (true !== opts.public) {
|
|
throw new Error("options.public must be either `true` or `false` not ("
|
|
+ typeof opts.public + ") '" + opts.public + "'");
|
|
}
|
|
delete jwk.d;
|
|
}
|
|
return jwk;
|
|
});
|
|
};
|
|
EC.toJwk = EC.import = EC.parse;
|
|
|
|
EC.pack = function (opts) {
|
|
return Promise.resolve().then(function () {
|
|
if (!opts || !opts.jwk || 'object' !== typeof opts.jwk) {
|
|
throw new Error("must pass { jwk: jwk }");
|
|
}
|
|
var jwk = JSON.parse(JSON.stringify(opts.jwk));
|
|
var format = opts.format;
|
|
if (opts.public || -1 !== [ 'spki', 'pkix', 'ssh', 'rfc4716' ].indexOf(format)) {
|
|
jwk.d = null;
|
|
}
|
|
if ('EC' !== jwk.kty) {
|
|
throw new Error("options.jwk.kty must be 'EC' for EC keys");
|
|
}
|
|
if (!jwk.d) {
|
|
if (!format || -1 !== [ 'spki', 'pkix' ].indexOf(format)) {
|
|
format = 'spki';
|
|
} else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) {
|
|
format = 'ssh';
|
|
} else {
|
|
throw new Error("options.format must be 'spki' or 'ssh' for public EC keys, not ("
|
|
+ typeof format + ") " + format);
|
|
}
|
|
} else {
|
|
if (!format || 'sec1' === format) {
|
|
format = 'sec1';
|
|
} else if ('pkcs8' !== format) {
|
|
throw new Error("options.format must be 'sec1' or 'pkcs8' for private EC keys");
|
|
}
|
|
}
|
|
if (-1 === [ 'P-256', 'P-384' ].indexOf(jwk.crv)) {
|
|
throw new Error("options.jwk.crv must be either P-256 or P-384 for EC keys");
|
|
}
|
|
if (!jwk.y) {
|
|
throw new Error("options.jwk.y must be a urlsafe base64-encoded either P-256 or P-384");
|
|
}
|
|
|
|
if ('sec1' === format) {
|
|
return PEM.packBlock({ type: "EC PRIVATE KEY", bytes: EC.packSec1(jwk) });
|
|
} else if ('pkcs8' === format) {
|
|
return PEM.packBlock({ type: "EC PRIVATE KEY", bytes: EC.packPkcs8(jwk) });
|
|
} else if (-1 !== [ 'spki', 'pkix' ].indexOf(format)) {
|
|
return PEM.packBlock({ type: "PUBLIC KEY", bytes: EC.packSpki(jwk) });
|
|
} else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) {
|
|
return EC.packSsh(jwk);
|
|
} else {
|
|
throw new Error("Sanity Error: reached unreachable code block with format: " + format);
|
|
}
|
|
});
|
|
};
|
|
|
|
EC.packSec1 = function (jwk) {
|
|
var d = toHex(base64ToUint8(urlBase64ToBase64(jwk.d)));
|
|
var x = toHex(base64ToUint8(urlBase64ToBase64(jwk.x)));
|
|
var y = toHex(base64ToUint8(urlBase64ToBase64(jwk.y)));
|
|
var objId = ('P-256' === jwk.crv) ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
return Hex.toUint8(
|
|
ASN1('30'
|
|
, ASN1.UInt('01')
|
|
, ASN1('04', d)
|
|
, ASN1('A0', objId)
|
|
, ASN1('A1', ASN1.BitStr('04' + x + y)))
|
|
);
|
|
};
|
|
EC.packPkcs8 = function (jwk) {
|
|
var d = toHex(base64ToUint8(urlBase64ToBase64(jwk.d)));
|
|
var x = toHex(base64ToUint8(urlBase64ToBase64(jwk.x)));
|
|
var y = toHex(base64ToUint8(urlBase64ToBase64(jwk.y)));
|
|
var objId = ('P-256' === jwk.crv) ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
return Hex.toUint8(
|
|
ASN1('30'
|
|
, ASN1.UInt('00')
|
|
, ASN1('30'
|
|
, OBJ_ID_EC_PUB
|
|
, objId
|
|
)
|
|
, ASN1('04'
|
|
, ASN1('30'
|
|
, ASN1.UInt('01')
|
|
, ASN1('04', d)
|
|
, ASN1('A1', ASN1.BitStr('04' + x + y)))))
|
|
);
|
|
};
|
|
EC.packSpki = function (jwk) {
|
|
var x = toHex(base64ToUint8(urlBase64ToBase64(jwk.x)));
|
|
var y = toHex(base64ToUint8(urlBase64ToBase64(jwk.y)));
|
|
var objId = ('P-256' === jwk.crv) ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
return Hex.toUint8(
|
|
ASN1('30'
|
|
, ASN1('30'
|
|
, OBJ_ID_EC_PUB
|
|
, objId
|
|
)
|
|
, ASN1.BitStr('04' + x + y))
|
|
);
|
|
};
|
|
EC.packPkix = EC.packSpki;
|
|
EC.packSsh = function (jwk) {
|
|
// Custom SSH format
|
|
var typ = 'ecdsa-sha2-nistp256';
|
|
var a = '32 35 36';
|
|
var b = '41';
|
|
var comment = jwk.crv + '@localhost';
|
|
if ('P-256' !== jwk.crv) {
|
|
typ = 'ecdsa-sha2-nistp384';
|
|
a = '33 38 34';
|
|
b = '61';
|
|
}
|
|
var x = toHex(base64ToUint8(urlBase64ToBase64(jwk.x)));
|
|
var y = toHex(base64ToUint8(urlBase64ToBase64(jwk.y)));
|
|
var ssh = Hex.toUint8(
|
|
('00 00 00 13 65 63 64 73 61 2d 73 68 61 32 2d 6e 69 73 74 70'
|
|
+ a + '00 00 00 08 6e 69 73 74 70' + a + '00 00 00' + b
|
|
+ '04' + x + y).replace(/\s+/g, '').toLowerCase()
|
|
);
|
|
|
|
return typ + ' ' + toBase64(ssh) + ' ' + comment;
|
|
};
|
|
|
|
//
|
|
// A dumbed-down, minimal ASN.1 packer
|
|
//
|
|
|
|
// Almost every ASN.1 type that's important for CSR
|
|
// can be represented generically with only a few rules.
|
|
ASN1 = function ASN1(/*type, hexstrings...*/) {
|
|
var args = Array.prototype.slice.call(arguments);
|
|
var typ = args.shift();
|
|
var str = args.join('').replace(/\s+/g, '').toLowerCase();
|
|
var len = (str.length/2);
|
|
var lenlen = 0;
|
|
var hex = typ;
|
|
|
|
// We can't have an odd number of hex chars
|
|
if (len !== Math.round(len)) {
|
|
throw new Error("invalid hex");
|
|
}
|
|
|
|
// The first byte of any ASN.1 sequence is the type (Sequence, Integer, etc)
|
|
// The second byte is either the size of the value, or the size of its size
|
|
|
|
// 1. If the second byte is < 0x80 (128) it is considered the size
|
|
// 2. If it is > 0x80 then it describes the number of bytes of the size
|
|
// ex: 0x82 means the next 2 bytes describe the size of the value
|
|
// 3. The special case of exactly 0x80 is "indefinite" length (to end-of-file)
|
|
|
|
if (len > 127) {
|
|
lenlen += 1;
|
|
while (len > 255) {
|
|
lenlen += 1;
|
|
len = len >> 8;
|
|
}
|
|
}
|
|
|
|
if (lenlen) { hex += Hex.fromInt(0x80 + lenlen); }
|
|
return hex + Hex.fromInt(str.length/2) + str;
|
|
};
|
|
|
|
// The Integer type has some special rules
|
|
ASN1.UInt = function UINT() {
|
|
var str = Array.prototype.slice.call(arguments).join('');
|
|
var first = parseInt(str.slice(0, 2), 16);
|
|
|
|
// If the first byte is 0x80 or greater, the number is considered negative
|
|
// Therefore we add a '00' prefix if the 0x80 bit is set
|
|
if (0x80 & first) { str = '00' + str; }
|
|
|
|
return ASN1('02', str);
|
|
};
|
|
|
|
// The Bit String type also has a special rule
|
|
ASN1.BitStr = function BITSTR() {
|
|
var str = Array.prototype.slice.call(arguments).join('');
|
|
// '00' is a mask of how many bits of the next byte to ignore
|
|
return ASN1('03', '00' + str);
|
|
};
|
|
|
|
EC.toPem = EC.export = EC.pack;
|