Compare commits
70 Commits
Author | SHA1 | Date | |
---|---|---|---|
7a97b360be | |||
92463a6ec2 | |||
be782fbdfa | |||
e822c625c5 | |||
fd6a46e88a | |||
2e7134dd8a | |||
4d11f99d88 | |||
0b5850cf6a | |||
ef8f61b3c3 | |||
3db8b49929 | |||
7580d700bf | |||
70bfcd04bf | |||
0a7734c6da | |||
c3ceffd2e2 | |||
ff05912dfe | |||
e26d479cf0 | |||
3f7339a491 | |||
718c3eb42f | |||
|
d824611283 | ||
aae4ad4e3f | |||
023b0b7948 | |||
3d6b6e7f5e | |||
f34332b5a6 | |||
c145c8afc1 | |||
|
5e1b014940 | ||
81f5961d8e | |||
ab5e7bea1b | |||
b3f02b480e | |||
8cee5a1b4e | |||
0dc03f86e5 | |||
f0adccbc31 | |||
|
7776aaa785 | ||
|
ec4118a988 | ||
|
248f0d4ab1 | ||
|
93096c6ebd | ||
|
09593f3778 | ||
|
c761a7f99f | ||
|
e205e912c1 | ||
|
f24c88c61e | ||
|
3ccad1b1e0 | ||
|
4fe1f4b358 | ||
|
f3d8bb85c1 | ||
|
982c13948a | ||
|
c728f25bc8 | ||
|
2c6db04ab6 | ||
|
7bfc0f6368 | ||
|
d4328083f3 | ||
|
98f887a59a | ||
|
efed0c23d9 | ||
|
7890710819 | ||
|
3817e800c2 | ||
|
17d9f3ecfb | ||
|
2aa55633d8 | ||
|
e634f9a662 | ||
|
0085fcdf0f | ||
|
37d96b61e7 | ||
|
fdd30294d8 | ||
|
5de4362c6c | ||
|
a7124fc656 | ||
|
324bf5f6d5 | ||
|
7e6a2ddba2 | ||
|
67d28867e7 | ||
|
38014bcf07 | ||
|
f9d4c28952 | ||
|
4de65e1053 | ||
|
3cda5ffaf8 | ||
|
ce365e9248 | ||
|
d84d8ce94c | ||
|
c24a7ab922 | ||
|
2541ca8a9f |
388
LICENSE
388
LICENSE
@ -1,21 +1,375 @@
|
|||||||
The MIT License (MIT)
|
Copyright 2016-2018 AJ ONeal
|
||||||
|
|
||||||
Copyright (c) 2016 Daplie, Inc
|
Mozilla Public License Version 2.0
|
||||||
|
==================================
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
1. Definitions
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
--------------
|
||||||
in the Software without restriction, including without limitation the rights
|
|
||||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
copies of the Software, and to permit persons to whom the Software is
|
|
||||||
furnished to do so, subject to the following conditions:
|
|
||||||
|
|
||||||
The above copyright notice and this permission notice shall be included in all
|
1.1. "Contributor"
|
||||||
copies or substantial portions of the Software.
|
means each individual or legal entity that creates, contributes to
|
||||||
|
the creation of, or owns Covered Software.
|
||||||
|
|
||||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
1.2. "Contributor Version"
|
||||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
means the combination of the Contributions of others (if any) used
|
||||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
by a Contributor and that particular Contributor's Contribution.
|
||||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
||||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
1.3. "Contribution"
|
||||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
means Covered Software of a particular Contributor.
|
||||||
SOFTWARE.
|
|
||||||
|
1.4. "Covered Software"
|
||||||
|
means Source Code Form to which the initial Contributor has attached
|
||||||
|
the notice in Exhibit A, the Executable Form of such Source Code
|
||||||
|
Form, and Modifications of such Source Code Form, in each case
|
||||||
|
including portions thereof.
|
||||||
|
|
||||||
|
1.5. "Incompatible With Secondary Licenses"
|
||||||
|
means
|
||||||
|
|
||||||
|
(a) that the initial Contributor has attached the notice described
|
||||||
|
in Exhibit B to the Covered Software; or
|
||||||
|
|
||||||
|
(b) that the Covered Software was made available under the terms of
|
||||||
|
version 1.1 or earlier of the License, but not also under the
|
||||||
|
terms of a Secondary License.
|
||||||
|
|
||||||
|
1.6. "Executable Form"
|
||||||
|
means any form of the work other than Source Code Form.
|
||||||
|
|
||||||
|
1.7. "Larger Work"
|
||||||
|
means a work that combines Covered Software with other material, in
|
||||||
|
a separate file or files, that is not Covered Software.
|
||||||
|
|
||||||
|
1.8. "License"
|
||||||
|
means this document.
|
||||||
|
|
||||||
|
1.9. "Licensable"
|
||||||
|
means having the right to grant, to the maximum extent possible,
|
||||||
|
whether at the time of the initial grant or subsequently, any and
|
||||||
|
all of the rights conveyed by this License.
|
||||||
|
|
||||||
|
1.10. "Modifications"
|
||||||
|
means any of the following:
|
||||||
|
|
||||||
|
(a) any file in Source Code Form that results from an addition to,
|
||||||
|
deletion from, or modification of the contents of Covered
|
||||||
|
Software; or
|
||||||
|
|
||||||
|
(b) any new file in Source Code Form that contains any Covered
|
||||||
|
Software.
|
||||||
|
|
||||||
|
1.11. "Patent Claims" of a Contributor
|
||||||
|
means any patent claim(s), including without limitation, method,
|
||||||
|
process, and apparatus claims, in any patent Licensable by such
|
||||||
|
Contributor that would be infringed, but for the grant of the
|
||||||
|
License, by the making, using, selling, offering for sale, having
|
||||||
|
made, import, or transfer of either its Contributions or its
|
||||||
|
Contributor Version.
|
||||||
|
|
||||||
|
1.12. "Secondary License"
|
||||||
|
means either the GNU General Public License, Version 2.0, the GNU
|
||||||
|
Lesser General Public License, Version 2.1, the GNU Affero General
|
||||||
|
Public License, Version 3.0, or any later versions of those
|
||||||
|
licenses.
|
||||||
|
|
||||||
|
1.13. "Source Code Form"
|
||||||
|
means the form of the work preferred for making modifications.
|
||||||
|
|
||||||
|
1.14. "You" (or "Your")
|
||||||
|
means an individual or a legal entity exercising rights under this
|
||||||
|
License. For legal entities, "You" includes any entity that
|
||||||
|
controls, is controlled by, or is under common control with You. For
|
||||||
|
purposes of this definition, "control" means (a) the power, direct
|
||||||
|
or indirect, to cause the direction or management of such entity,
|
||||||
|
whether by contract or otherwise, or (b) ownership of more than
|
||||||
|
fifty percent (50%) of the outstanding shares or beneficial
|
||||||
|
ownership of such entity.
|
||||||
|
|
||||||
|
2. License Grants and Conditions
|
||||||
|
--------------------------------
|
||||||
|
|
||||||
|
2.1. Grants
|
||||||
|
|
||||||
|
Each Contributor hereby grants You a world-wide, royalty-free,
|
||||||
|
non-exclusive license:
|
||||||
|
|
||||||
|
(a) under intellectual property rights (other than patent or trademark)
|
||||||
|
Licensable by such Contributor to use, reproduce, make available,
|
||||||
|
modify, display, perform, distribute, and otherwise exploit its
|
||||||
|
Contributions, either on an unmodified basis, with Modifications, or
|
||||||
|
as part of a Larger Work; and
|
||||||
|
|
||||||
|
(b) under Patent Claims of such Contributor to make, use, sell, offer
|
||||||
|
for sale, have made, import, and otherwise transfer either its
|
||||||
|
Contributions or its Contributor Version.
|
||||||
|
|
||||||
|
2.2. Effective Date
|
||||||
|
|
||||||
|
The licenses granted in Section 2.1 with respect to any Contribution
|
||||||
|
become effective for each Contribution on the date the Contributor first
|
||||||
|
distributes such Contribution.
|
||||||
|
|
||||||
|
2.3. Limitations on Grant Scope
|
||||||
|
|
||||||
|
The licenses granted in this Section 2 are the only rights granted under
|
||||||
|
this License. No additional rights or licenses will be implied from the
|
||||||
|
distribution or licensing of Covered Software under this License.
|
||||||
|
Notwithstanding Section 2.1(b) above, no patent license is granted by a
|
||||||
|
Contributor:
|
||||||
|
|
||||||
|
(a) for any code that a Contributor has removed from Covered Software;
|
||||||
|
or
|
||||||
|
|
||||||
|
(b) for infringements caused by: (i) Your and any other third party's
|
||||||
|
modifications of Covered Software, or (ii) the combination of its
|
||||||
|
Contributions with other software (except as part of its Contributor
|
||||||
|
Version); or
|
||||||
|
|
||||||
|
(c) under Patent Claims infringed by Covered Software in the absence of
|
||||||
|
its Contributions.
|
||||||
|
|
||||||
|
This License does not grant any rights in the trademarks, service marks,
|
||||||
|
or logos of any Contributor (except as may be necessary to comply with
|
||||||
|
the notice requirements in Section 3.4).
|
||||||
|
|
||||||
|
2.4. Subsequent Licenses
|
||||||
|
|
||||||
|
No Contributor makes additional grants as a result of Your choice to
|
||||||
|
distribute the Covered Software under a subsequent version of this
|
||||||
|
License (see Section 10.2) or under the terms of a Secondary License (if
|
||||||
|
permitted under the terms of Section 3.3).
|
||||||
|
|
||||||
|
2.5. Representation
|
||||||
|
|
||||||
|
Each Contributor represents that the Contributor believes its
|
||||||
|
Contributions are its original creation(s) or it has sufficient rights
|
||||||
|
to grant the rights to its Contributions conveyed by this License.
|
||||||
|
|
||||||
|
2.6. Fair Use
|
||||||
|
|
||||||
|
This License is not intended to limit any rights You have under
|
||||||
|
applicable copyright doctrines of fair use, fair dealing, or other
|
||||||
|
equivalents.
|
||||||
|
|
||||||
|
2.7. Conditions
|
||||||
|
|
||||||
|
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
|
||||||
|
in Section 2.1.
|
||||||
|
|
||||||
|
3. Responsibilities
|
||||||
|
-------------------
|
||||||
|
|
||||||
|
3.1. Distribution of Source Form
|
||||||
|
|
||||||
|
All distribution of Covered Software in Source Code Form, including any
|
||||||
|
Modifications that You create or to which You contribute, must be under
|
||||||
|
the terms of this License. You must inform recipients that the Source
|
||||||
|
Code Form of the Covered Software is governed by the terms of this
|
||||||
|
License, and how they can obtain a copy of this License. You may not
|
||||||
|
attempt to alter or restrict the recipients' rights in the Source Code
|
||||||
|
Form.
|
||||||
|
|
||||||
|
3.2. Distribution of Executable Form
|
||||||
|
|
||||||
|
If You distribute Covered Software in Executable Form then:
|
||||||
|
|
||||||
|
(a) such Covered Software must also be made available in Source Code
|
||||||
|
Form, as described in Section 3.1, and You must inform recipients of
|
||||||
|
the Executable Form how they can obtain a copy of such Source Code
|
||||||
|
Form by reasonable means in a timely manner, at a charge no more
|
||||||
|
than the cost of distribution to the recipient; and
|
||||||
|
|
||||||
|
(b) You may distribute such Executable Form under the terms of this
|
||||||
|
License, or sublicense it under different terms, provided that the
|
||||||
|
license for the Executable Form does not attempt to limit or alter
|
||||||
|
the recipients' rights in the Source Code Form under this License.
|
||||||
|
|
||||||
|
3.3. Distribution of a Larger Work
|
||||||
|
|
||||||
|
You may create and distribute a Larger Work under terms of Your choice,
|
||||||
|
provided that You also comply with the requirements of this License for
|
||||||
|
the Covered Software. If the Larger Work is a combination of Covered
|
||||||
|
Software with a work governed by one or more Secondary Licenses, and the
|
||||||
|
Covered Software is not Incompatible With Secondary Licenses, this
|
||||||
|
License permits You to additionally distribute such Covered Software
|
||||||
|
under the terms of such Secondary License(s), so that the recipient of
|
||||||
|
the Larger Work may, at their option, further distribute the Covered
|
||||||
|
Software under the terms of either this License or such Secondary
|
||||||
|
License(s).
|
||||||
|
|
||||||
|
3.4. Notices
|
||||||
|
|
||||||
|
You may not remove or alter the substance of any license notices
|
||||||
|
(including copyright notices, patent notices, disclaimers of warranty,
|
||||||
|
or limitations of liability) contained within the Source Code Form of
|
||||||
|
the Covered Software, except that You may alter any license notices to
|
||||||
|
the extent required to remedy known factual inaccuracies.
|
||||||
|
|
||||||
|
3.5. Application of Additional Terms
|
||||||
|
|
||||||
|
You may choose to offer, and to charge a fee for, warranty, support,
|
||||||
|
indemnity or liability obligations to one or more recipients of Covered
|
||||||
|
Software. However, You may do so only on Your own behalf, and not on
|
||||||
|
behalf of any Contributor. You must make it absolutely clear that any
|
||||||
|
such warranty, support, indemnity, or liability obligation is offered by
|
||||||
|
You alone, and You hereby agree to indemnify every Contributor for any
|
||||||
|
liability incurred by such Contributor as a result of warranty, support,
|
||||||
|
indemnity or liability terms You offer. You may include additional
|
||||||
|
disclaimers of warranty and limitations of liability specific to any
|
||||||
|
jurisdiction.
|
||||||
|
|
||||||
|
4. Inability to Comply Due to Statute or Regulation
|
||||||
|
---------------------------------------------------
|
||||||
|
|
||||||
|
If it is impossible for You to comply with any of the terms of this
|
||||||
|
License with respect to some or all of the Covered Software due to
|
||||||
|
statute, judicial order, or regulation then You must: (a) comply with
|
||||||
|
the terms of this License to the maximum extent possible; and (b)
|
||||||
|
describe the limitations and the code they affect. Such description must
|
||||||
|
be placed in a text file included with all distributions of the Covered
|
||||||
|
Software under this License. Except to the extent prohibited by statute
|
||||||
|
or regulation, such description must be sufficiently detailed for a
|
||||||
|
recipient of ordinary skill to be able to understand it.
|
||||||
|
|
||||||
|
5. Termination
|
||||||
|
--------------
|
||||||
|
|
||||||
|
5.1. The rights granted under this License will terminate automatically
|
||||||
|
if You fail to comply with any of its terms. However, if You become
|
||||||
|
compliant, then the rights granted under this License from a particular
|
||||||
|
Contributor are reinstated (a) provisionally, unless and until such
|
||||||
|
Contributor explicitly and finally terminates Your grants, and (b) on an
|
||||||
|
ongoing basis, if such Contributor fails to notify You of the
|
||||||
|
non-compliance by some reasonable means prior to 60 days after You have
|
||||||
|
come back into compliance. Moreover, Your grants from a particular
|
||||||
|
Contributor are reinstated on an ongoing basis if such Contributor
|
||||||
|
notifies You of the non-compliance by some reasonable means, this is the
|
||||||
|
first time You have received notice of non-compliance with this License
|
||||||
|
from such Contributor, and You become compliant prior to 30 days after
|
||||||
|
Your receipt of the notice.
|
||||||
|
|
||||||
|
5.2. If You initiate litigation against any entity by asserting a patent
|
||||||
|
infringement claim (excluding declaratory judgment actions,
|
||||||
|
counter-claims, and cross-claims) alleging that a Contributor Version
|
||||||
|
directly or indirectly infringes any patent, then the rights granted to
|
||||||
|
You by any and all Contributors for the Covered Software under Section
|
||||||
|
2.1 of this License shall terminate.
|
||||||
|
|
||||||
|
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
|
||||||
|
end user license agreements (excluding distributors and resellers) which
|
||||||
|
have been validly granted by You or Your distributors under this License
|
||||||
|
prior to termination shall survive termination.
|
||||||
|
|
||||||
|
************************************************************************
|
||||||
|
* *
|
||||||
|
* 6. Disclaimer of Warranty *
|
||||||
|
* ------------------------- *
|
||||||
|
* *
|
||||||
|
* Covered Software is provided under this License on an "as is" *
|
||||||
|
* basis, without warranty of any kind, either expressed, implied, or *
|
||||||
|
* statutory, including, without limitation, warranties that the *
|
||||||
|
* Covered Software is free of defects, merchantable, fit for a *
|
||||||
|
* particular purpose or non-infringing. The entire risk as to the *
|
||||||
|
* quality and performance of the Covered Software is with You. *
|
||||||
|
* Should any Covered Software prove defective in any respect, You *
|
||||||
|
* (not any Contributor) assume the cost of any necessary servicing, *
|
||||||
|
* repair, or correction. This disclaimer of warranty constitutes an *
|
||||||
|
* essential part of this License. No use of any Covered Software is *
|
||||||
|
* authorized under this License except under this disclaimer. *
|
||||||
|
* *
|
||||||
|
************************************************************************
|
||||||
|
|
||||||
|
************************************************************************
|
||||||
|
* *
|
||||||
|
* 7. Limitation of Liability *
|
||||||
|
* -------------------------- *
|
||||||
|
* *
|
||||||
|
* Under no circumstances and under no legal theory, whether tort *
|
||||||
|
* (including negligence), contract, or otherwise, shall any *
|
||||||
|
* Contributor, or anyone who distributes Covered Software as *
|
||||||
|
* permitted above, be liable to You for any direct, indirect, *
|
||||||
|
* special, incidental, or consequential damages of any character *
|
||||||
|
* including, without limitation, damages for lost profits, loss of *
|
||||||
|
* goodwill, work stoppage, computer failure or malfunction, or any *
|
||||||
|
* and all other commercial damages or losses, even if such party *
|
||||||
|
* shall have been informed of the possibility of such damages. This *
|
||||||
|
* limitation of liability shall not apply to liability for death or *
|
||||||
|
* personal injury resulting from such party's negligence to the *
|
||||||
|
* extent applicable law prohibits such limitation. Some *
|
||||||
|
* jurisdictions do not allow the exclusion or limitation of *
|
||||||
|
* incidental or consequential damages, so this exclusion and *
|
||||||
|
* limitation may not apply to You. *
|
||||||
|
* *
|
||||||
|
************************************************************************
|
||||||
|
|
||||||
|
8. Litigation
|
||||||
|
-------------
|
||||||
|
|
||||||
|
Any litigation relating to this License may be brought only in the
|
||||||
|
courts of a jurisdiction where the defendant maintains its principal
|
||||||
|
place of business and such litigation shall be governed by laws of that
|
||||||
|
jurisdiction, without reference to its conflict-of-law provisions.
|
||||||
|
Nothing in this Section shall prevent a party's ability to bring
|
||||||
|
cross-claims or counter-claims.
|
||||||
|
|
||||||
|
9. Miscellaneous
|
||||||
|
----------------
|
||||||
|
|
||||||
|
This License represents the complete agreement concerning the subject
|
||||||
|
matter hereof. If any provision of this License is held to be
|
||||||
|
unenforceable, such provision shall be reformed only to the extent
|
||||||
|
necessary to make it enforceable. Any law or regulation which provides
|
||||||
|
that the language of a contract shall be construed against the drafter
|
||||||
|
shall not be used to construe this License against a Contributor.
|
||||||
|
|
||||||
|
10. Versions of the License
|
||||||
|
---------------------------
|
||||||
|
|
||||||
|
10.1. New Versions
|
||||||
|
|
||||||
|
Mozilla Foundation is the license steward. Except as provided in Section
|
||||||
|
10.3, no one other than the license steward has the right to modify or
|
||||||
|
publish new versions of this License. Each version will be given a
|
||||||
|
distinguishing version number.
|
||||||
|
|
||||||
|
10.2. Effect of New Versions
|
||||||
|
|
||||||
|
You may distribute the Covered Software under the terms of the version
|
||||||
|
of the License under which You originally received the Covered Software,
|
||||||
|
or under the terms of any subsequent version published by the license
|
||||||
|
steward.
|
||||||
|
|
||||||
|
10.3. Modified Versions
|
||||||
|
|
||||||
|
If you create software not governed by this License, and you want to
|
||||||
|
create a new license for such software, you may create and use a
|
||||||
|
modified version of this License if you rename the license and remove
|
||||||
|
any references to the name of the license steward (except to note that
|
||||||
|
such modified license differs from this License).
|
||||||
|
|
||||||
|
10.4. Distributing Source Code Form that is Incompatible With Secondary
|
||||||
|
Licenses
|
||||||
|
|
||||||
|
If You choose to distribute Source Code Form that is Incompatible With
|
||||||
|
Secondary Licenses under the terms of this version of the License, the
|
||||||
|
notice described in Exhibit B of this License must be attached.
|
||||||
|
|
||||||
|
Exhibit A - Source Code Form License Notice
|
||||||
|
-------------------------------------------
|
||||||
|
|
||||||
|
This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
|
||||||
|
If it is not possible or desirable to put the notice in a particular
|
||||||
|
file, then You may include the notice in a location (such as a LICENSE
|
||||||
|
file in a relevant directory) where a recipient would be likely to look
|
||||||
|
for such a notice.
|
||||||
|
|
||||||
|
You may add additional accurate notices of copyright ownership.
|
||||||
|
|
||||||
|
Exhibit B - "Incompatible With Secondary Licenses" Notice
|
||||||
|
---------------------------------------------------------
|
||||||
|
|
||||||
|
This Source Code Form is "Incompatible With Secondary Licenses", as
|
||||||
|
defined by the Mozilla Public License, v. 2.0.
|
||||||
|
247
README.md
247
README.md
@ -1,11 +1,46 @@
|
|||||||
# rsa-compat.js
|
# [rsa-compat.js](https://git.coolaj86.com/coolaj86/rsa-compat.js)
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
| A [Root](https://therootcompany.com) Project.
|
||||||
|
|
||||||
JavaScript RSA utils that work on Windows, Mac, and Linux with or without C compiler
|
JavaScript RSA utils that work on Windows, Mac, and Linux with or without C compiler
|
||||||
|
|
||||||
In order to provide a module that "just works" everywhere, we mix and match methods
|
This was built for the [ACME.js](https://git.coolaj86.com/coolaj86/acme.js) and
|
||||||
from `node.js` core, `ursa`, `forge`, and others.
|
[Greenlock.js](https://git.coolaj86.com/coolaj86/greenlock.js) **Let's Encrypt** clients
|
||||||
|
and is particularly suitable for building **certbot**-like clients.
|
||||||
|
|
||||||
(in the future we'd like to provide the same API to the browser)
|
(if you're looking for similar tools in the browser, consider [Bluecrypt](https://www.npmjs.com/search?q=bluecrypt))
|
||||||
|
|
||||||
|
# Install
|
||||||
|
|
||||||
|
node.js
|
||||||
|
|
||||||
|
```bash
|
||||||
|
npm install --save rsa-compat
|
||||||
|
```
|
||||||
|
|
||||||
|
If you need compatibility with older versions of node, you may need to `npm install --save ursa-optional node-forge`.
|
||||||
|
|
||||||
|
### CLI
|
||||||
|
|
||||||
|
```bash
|
||||||
|
npm install --global rsa-compat
|
||||||
|
```
|
||||||
|
|
||||||
|
# Usage
|
||||||
|
|
||||||
|
CLI
|
||||||
|
---
|
||||||
|
|
||||||
|
You can generate keypairs on Windows, Mac, and Linux using rsa-keygen-js:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# generates a new keypair in the current directory
|
||||||
|
rsa-keypiar-js
|
||||||
|
```
|
||||||
|
|
||||||
Examples
|
Examples
|
||||||
--------
|
--------
|
||||||
@ -15,11 +50,9 @@ Generate an RSA Keypair:
|
|||||||
```javascript
|
```javascript
|
||||||
var RSA = require('rsa-compat').RSA;
|
var RSA = require('rsa-compat').RSA;
|
||||||
|
|
||||||
var bitlen = 1024;
|
var options = { bitlen: 2048, exp: 65537, public: true, pem: true, internal: true };
|
||||||
var exp = 65537;
|
|
||||||
var options = { public: true, pem: true, internal: true };
|
|
||||||
|
|
||||||
RSA.generateKeypair(bitlen, exp, options, function (err, keypair) {
|
RSA.generateKeypair(options, function (err, keypair) {
|
||||||
console.log(keypair);
|
console.log(keypair);
|
||||||
});
|
});
|
||||||
```
|
```
|
||||||
@ -47,43 +80,41 @@ Here's what the object might look like:
|
|||||||
, n: '/*base64 modulus n = pq*/'
|
, n: '/*base64 modulus n = pq*/'
|
||||||
, e: '/*base64 exponent (usually 65537)*/'
|
, e: '/*base64 exponent (usually 65537)*/'
|
||||||
}
|
}
|
||||||
|
|
||||||
, _ursa: '/*undefined or intermediate ursa object*/'
|
|
||||||
, _ursaPublic: '/*undefined or intermediate ursa object*/'
|
|
||||||
, _forge: '/*undefined or intermediate forge object*/'
|
|
||||||
, _forgePublic: '/*undefined or intermediate forge object*/'
|
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
NOTE: this object is JSON safe as _ursa and _forge will be ignored
|
|
||||||
|
|
||||||
See http://crypto.stackexchange.com/questions/6593/what-data-is-saved-in-rsa-private-key to learn a little more about the meaning of the specific fields in the JWK.
|
See http://crypto.stackexchange.com/questions/6593/what-data-is-saved-in-rsa-private-key to learn a little more about the meaning of the specific fields in the JWK.
|
||||||
|
|
||||||
API
|
# API Summary
|
||||||
---
|
|
||||||
|
|
||||||
* `RSA.generateKeypair(bitlen, exp, options, cb)`
|
* `RSA.generateKeypair(options, cb)`
|
||||||
|
* (deprecated `RSA.generateKeypair(bitlen, exp, options, cb)`)
|
||||||
|
* `RSA.import(options)`
|
||||||
|
* (deprecated `RSA.import(keypair, options)`)
|
||||||
* `RSA.exportPrivatePem(keypair)`
|
* `RSA.exportPrivatePem(keypair)`
|
||||||
* `RSA.exportPublicPem(keypair)`
|
* `RSA.exportPublicPem(keypair)`
|
||||||
* `RSA.exportPrivateJwk(keypair)`
|
* `RSA.exportPrivateJwk(keypair)`
|
||||||
* `RSA.exportPublicJwk(keypair)`
|
* `RSA.exportPublicJwk(keypair)`
|
||||||
|
* `RSA.signJws(keypair, header, protect, payload)`
|
||||||
|
* (deprecated `RSA.signJws(keypair, payload, nonce)`)
|
||||||
|
* `RSA.generateCsrPem(keypair, names)`
|
||||||
|
* `RSA.generateCsrDerWeb64(keypair, names)`
|
||||||
|
* `RSA.thumbprint(keypair)`
|
||||||
|
|
||||||
`keypair` can be any object with any of these keys `publicKeyPem, privateKeyPem, publicKeyJwk, privateKeyJwk`
|
`keypair` can be any object with any of these keys `publicKeyPem, privateKeyPem, publicKeyJwk, privateKeyJwk`
|
||||||
|
|
||||||
### RSA.generateKeypair(bitlen, exp, options, cb)
|
### RSA.generateKeypair(options, cb)
|
||||||
|
|
||||||
Create a private keypair and export it as PEM, JWK, and/or internal formats
|
Create a private keypair and export it as PEM, JWK, and/or internal formats
|
||||||
|
|
||||||
```javascript
|
```javascript
|
||||||
RSA.generateKeypair(null, null, null, function (keypair) { /*...*/ });
|
RSA.generateKeypair(null, function (keypair) { /*...*/ });
|
||||||
|
|
||||||
RSA.generateKeypair(1024, 65537, { pem: false, public: false, internal: false }, function (keypair) { /*...*/ });
|
RSA.generateKeypair({
|
||||||
|
bitlen: 2048, exp: 65537, pem: false, public: false, internal: false
|
||||||
|
}, function (keypair) { /*...*/ });
|
||||||
```
|
```
|
||||||
|
|
||||||
`bitlen`: *1024* (default), 2048, or 4096
|
|
||||||
|
|
||||||
`exp`: *65537* (default)
|
|
||||||
|
|
||||||
`options`:
|
`options`:
|
||||||
```javascript
|
```javascript
|
||||||
{ public: false // export public keys
|
{ public: false // export public keys
|
||||||
@ -94,3 +125,169 @@ RSA.generateKeypair(1024, 65537, { pem: false, public: false, internal: false },
|
|||||||
, fingerprint: false // NOT IMPLEMENTED (RSA key fingerprint)
|
, fingerprint: false // NOT IMPLEMENTED (RSA key fingerprint)
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### RSA.import(options)
|
||||||
|
|
||||||
|
Imports keypair as JWKs and internal values `_ursa` and `_forge`.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
var keypair = RSA.import({ type: 'RSA', privateKeyPem: '...' });
|
||||||
|
|
||||||
|
console.log(keypair);
|
||||||
|
```
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{ privateKeyPem: ..., privateKeyJwk: ..., _ursa: ..., _forge: ... }
|
||||||
|
```
|
||||||
|
|
||||||
|
### RSA.export*(keypair)
|
||||||
|
|
||||||
|
You put in an object like `{ privateKeyPem: '...' }` or `{ publicKeyJwk: {} }`
|
||||||
|
and you get back the keys in the format you requested.
|
||||||
|
|
||||||
|
Note:
|
||||||
|
|
||||||
|
* Private keys **can** be used to export both private and public keys
|
||||||
|
* Public keys can **NOT** be used to generate private keys
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
var keypair = { privateKeyPem: '...' };
|
||||||
|
|
||||||
|
keypair.publicKeyJwk = RSA.exportPublicJwk(keypair);
|
||||||
|
|
||||||
|
console.log(keypair);
|
||||||
|
```
|
||||||
|
|
||||||
|
### RSA.signJws(keypair, payload, nonce)
|
||||||
|
|
||||||
|
Generates a signature in JWS format (necessary for **certbot**/**letsencrypt**).
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
var message = "Hello, World!"
|
||||||
|
var nonce = crypto.randomBytes(16).toString('hex');
|
||||||
|
var jws = RSA.signJws(keypair, message, nonce);
|
||||||
|
|
||||||
|
console.log(jws);
|
||||||
|
```
|
||||||
|
|
||||||
|
The result looks like this:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{ "header": {
|
||||||
|
"alg": "RS256",
|
||||||
|
"jwk": {
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
|
"e": "AQAB"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"protected": "eyJub25jZSI6IjhlZjU2MjRmNWVjOWQzZWYifQ",
|
||||||
|
"payload": "JLzF1NBNCV3kfbJ5sFaFyX94fJuL2H-IzaoBN-ciiHk",
|
||||||
|
"signature": "Wb2al5SDyh5gjmkV79MK9m3sfNBBPjntSKor-34BBoGwr6n8qEnBmqB1Y4zbo-5rmvsoPmJsnRlP_hRiUY86zSAQyfbisTGrGBl0IQ7ditpkfYVm0rBWJ8WnYNqYNp8K3qcD7NW72tsy-XoWEjNlz4lWJeRdEG2Nt4CJgnREH4Y"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### RSA.thumbprint(keypair)
|
||||||
|
|
||||||
|
Generates a JWK thumbprint.
|
||||||
|
|
||||||
|
`RSA.thumbprint(keypair)`:
|
||||||
|
```javascript
|
||||||
|
var thumb = RSA.thumbprint(keypair);
|
||||||
|
|
||||||
|
console.log(thumb);
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
// kK4OXp5CT1FEkHi6WkegldmeTJecSTyJN-DxZ91nQ30
|
||||||
|
```
|
||||||
|
|
||||||
|
### RSA.generateCsr*(keypair, names)
|
||||||
|
|
||||||
|
You can generate the CSR in human-readable or binary / base64 formats:
|
||||||
|
|
||||||
|
`RSA.generateCsrPem(keypair, names)`:
|
||||||
|
```javascript
|
||||||
|
var pem = RSA.generateCsrPem(keypair, [ 'example.com', 'www.example.com' ]);
|
||||||
|
|
||||||
|
console.log(pem);
|
||||||
|
```
|
||||||
|
|
||||||
|
web-safe base64 for **certbot**/**letsencrypt**:
|
||||||
|
|
||||||
|
`RSA.generateCsrDerWeb64(keypair, names)`:
|
||||||
|
```javascript
|
||||||
|
var web64 = RSA.generateCsrDerWeb64(keypair, [ 'example.com', 'www.example.com' ]);
|
||||||
|
|
||||||
|
console.log(web64);
|
||||||
|
```
|
||||||
|
|
||||||
|
# Old Node Versions
|
||||||
|
|
||||||
|
In recent versions of node >= v10.12 native RSA key generation is fairly quick for 2048-bit keys
|
||||||
|
(though it may still be too slow for some applications with 4096-bit keys).
|
||||||
|
|
||||||
|
In old versions, however, and especially on ARM and/or MIPS procesors, RSA key generation can be
|
||||||
|
very, very slow.
|
||||||
|
|
||||||
|
In old node versions `ursa` can provide faster key generation, but it must be compiled.
|
||||||
|
`ursa` will not compile for new node versions, but they already include the same openssl bindings anyawy.
|
||||||
|
|
||||||
|
|
||||||
|
```bash
|
||||||
|
npm install --save ursa
|
||||||
|
```
|
||||||
|
|
||||||
|
Also, if you need **Node < v6** support:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
npm install --save buffer-v6-polyfill
|
||||||
|
```
|
||||||
|
|
||||||
|
## Security and Compatibility
|
||||||
|
|
||||||
|
**TL;DR**: Use the default values 2048 and 65537 unless you have a really, really good reason to do otherwise.
|
||||||
|
|
||||||
|
Various platforms *require* these values.
|
||||||
|
|
||||||
|
Most security experts agree that 4096-bit is no more "secure" than 2048-bit -
|
||||||
|
a fundamental vulnerability in the RSA algorithm which causes 2048 to be broken
|
||||||
|
will most likely also cause 4096 to be broken
|
||||||
|
(i.e. if someone can prove mathematically prove P=NP or a way to predict prime numbers).
|
||||||
|
Also, many platforms
|
||||||
|
only support 2048 bit keys due to the insecurity of 1024-bit keys (which are not 1/2 secure
|
||||||
|
but rather 1/(2^1028) less secure) and the excess computational
|
||||||
|
cost of 4096-bit keys (it's not a 2x increase, it's more like a 2^2048 increase).
|
||||||
|
|
||||||
|
As to why 65537 is even optional as a prime exponent or why it matters... no idea,
|
||||||
|
but it does matter.
|
||||||
|
|
||||||
|
# ChangeLog:
|
||||||
|
|
||||||
|
* v2.0
|
||||||
|
* remove ursa and node-forge deps
|
||||||
|
* mark for node v10.11+
|
||||||
|
* v1.9
|
||||||
|
* consistently handle key generation across node crypto, ursa, and forge
|
||||||
|
* move all other operations to rasha.js and rsa-csr.js
|
||||||
|
* bugfix non-standard JWKs output (which *mostly* worked)
|
||||||
|
* move dependencies to optional
|
||||||
|
* v1.4.0
|
||||||
|
* remove ursa as dependency (just causes confusion), but note in docs
|
||||||
|
* drop node < v6 support
|
||||||
|
|
||||||
|
# Legal
|
||||||
|
|
||||||
|
rsa-compat.js directly includes code from
|
||||||
|
[Rasha.js](https://git.coolaj86.com/coolaj86/rasha.js)
|
||||||
|
and
|
||||||
|
[RSA-CSR.js](https://git.coolaj86.com/coolaj86/rsa-csr.js)
|
||||||
|
(also [Root](https://therootcompany.com) projects),
|
||||||
|
retrofitted for rsa-compat.
|
||||||
|
|
||||||
|
[rsa-compat.js](https://git.coolaj86.com/coolaj86/rsa-compat.js) |
|
||||||
|
MPL-2.0 |
|
||||||
|
[Terms of Use](https://therootcompany.com/legal/#terms) |
|
||||||
|
[Privacy Policy](https://therootcompany.com/legal/#privacy)
|
||||||
|
35
bin/rsa-keygen.js
Executable file
35
bin/rsa-keygen.js
Executable file
@ -0,0 +1,35 @@
|
|||||||
|
#!/usr/bin/env node
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var RSA = require('../').RSA;
|
||||||
|
var path = require('path');
|
||||||
|
var fs = require('fs');
|
||||||
|
|
||||||
|
var bitlen = 2048;
|
||||||
|
var exp = 65537;
|
||||||
|
var opts = { public: true, pem: true };
|
||||||
|
var cwd = process.cwd();
|
||||||
|
var privkeyPath = path.join(cwd, 'privkey.pem');
|
||||||
|
var pubkeyPath = path.join(cwd, 'pubkey.pem');
|
||||||
|
|
||||||
|
if (fs.existsSync(privkeyPath)) {
|
||||||
|
console.error(privkeyPath, "already exists");
|
||||||
|
process.exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
RSA.generateKeypair(bitlen, exp, opts, function (err, keypair) {
|
||||||
|
console.info('');
|
||||||
|
console.info('');
|
||||||
|
|
||||||
|
fs.writeFileSync(privkeyPath, keypair.privateKeyPem, 'ascii');
|
||||||
|
console.info(privkeyPath + ':');
|
||||||
|
console.info('');
|
||||||
|
console.info(keypair.privateKeyPem);
|
||||||
|
|
||||||
|
console.info('');
|
||||||
|
|
||||||
|
fs.writeFileSync(pubkeyPath, keypair.publicKeyPem, 'ascii');
|
||||||
|
console.info(pubkeyPath + ':');
|
||||||
|
console.info('');
|
||||||
|
console.info(keypair.publicKeyPem);
|
||||||
|
});
|
11
fixtures/csr.pem
Normal file
11
fixtures/csr.pem
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBjzCB+QIBADAWMRQwEgYDVQQDEwtleGFtcGxlLmNvbTCBnzANBgkqhkiG9w0B
|
||||||
|
AQEFAAOBjQAwgYkCgYEAwm5tN860BqucnK0sTx+E2wQjzCemNG8FcYr8qnTrvknX
|
||||||
|
Q5HPHIwurMhkXe1ytSQoGu11zv27hfQahwNSC6Sl+Rj7ZQ9RL8bF6FRhtislhY4u
|
||||||
|
SglbPGfvB+ij1fUmC8ExjrAdCdMq+fNl2SibYUyEbGQtoRQYNJ+w3OdNNk0EGD0C
|
||||||
|
AwEAAaA6MDgGCSqGSIb3DQEJDjErMCkwJwYDVR0RBCAwHoILZXhhbXBsZS5jb22C
|
||||||
|
D3d3dy5leGFtcGxlLmNvbTANBgkqhkiG9w0BAQsFAAOBgQCv1nj7zL0vnP11GEDb
|
||||||
|
TWlXPyT2XaFH9lYOm8By3BKrtk6rhGojlLppmNGaCEBqztebCY2T5LT6mi5lz0xc
|
||||||
|
YHJ9YC4w1yKz94//gmEMYJ+7fuILexnaeZudp9GjR3OeRWIWr/+3H0U3XnZpazGP
|
||||||
|
/qK4BCIl9HOOJbF5tyTd/CeeBg==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
1
fixtures/csr.urlbase64
Normal file
1
fixtures/csr.urlbase64
Normal file
@ -0,0 +1 @@
|
|||||||
|
MIIBjzCB-QIBADAWMRQwEgYDVQQDEwtleGFtcGxlLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwm5tN860BqucnK0sTx-E2wQjzCemNG8FcYr8qnTrvknXQ5HPHIwurMhkXe1ytSQoGu11zv27hfQahwNSC6Sl-Rj7ZQ9RL8bF6FRhtislhY4uSglbPGfvB-ij1fUmC8ExjrAdCdMq-fNl2SibYUyEbGQtoRQYNJ-w3OdNNk0EGD0CAwEAAaA6MDgGCSqGSIb3DQEJDjErMCkwJwYDVR0RBCAwHoILZXhhbXBsZS5jb22CD3d3dy5leGFtcGxlLmNvbTANBgkqhkiG9w0BAQsFAAOBgQCv1nj7zL0vnP11GEDbTWlXPyT2XaFH9lYOm8By3BKrtk6rhGojlLppmNGaCEBqztebCY2T5LT6mi5lz0xcYHJ9YC4w1yKz94__gmEMYJ-7fuILexnaeZudp9GjR3OeRWIWr_-3H0U3XnZpazGP_qK4BCIl9HOOJbF5tyTd_CeeBg
|
11
fixtures/privkey.jwk.json
Normal file
11
fixtures/privkey.jwk.json
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
{
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "wm5tN860BqucnK0sTx-E2wQjzCemNG8FcYr8qnTrvknXQ5HPHIwurMhkXe1ytSQoGu11zv27hfQahwNSC6Sl-Rj7ZQ9RL8bF6FRhtislhY4uSglbPGfvB-ij1fUmC8ExjrAdCdMq-fNl2SibYUyEbGQtoRQYNJ-w3OdNNk0EGD0",
|
||||||
|
"e": "AQAB",
|
||||||
|
"d": "HT8DCrv69G3n9uFNovE4yMEMqW7lX0m75eJkMze3Jj5xNOa_4qlrc-4IuuA2uuyfY72IVQRxqqqXOuvS8ZForZZk-kWSd6z45hrpbNAAHH2Rf7XwnwHY8VJrOQF3UtbktTWqHX36ITZb9Hmf18hWsIeEp8Ng7Ru9h7hNuVxKMjk",
|
||||||
|
"p": "42M69lUC-EIzYmcsZYkbf7kGhqvcwHk_h7N8TEOa7IYRP_DQL49LrSNuMHxOK9CxJ0RwajsY5o6WYBfoRC0B5w",
|
||||||
|
"q": "2uWWAmzLitMx9reZDnSQwhw1qGIQ55quEBwmBBQIe46O4SeFT0V8TED-bkVeOYQVCFHCS6GTRBoipMZtTPEYOw",
|
||||||
|
"dp": "u7Ec6lghq2p5n7AqJWWXHUZM7LzP6tAqcIjnAMyNBM9lTbIpJhjSDohAXCU_IUuR7ye-4vEFDMqFtawGPMAp4Q",
|
||||||
|
"dq": "XLhDAmPzE6rBzy-VtXnKl247jEd9wZzTfh9uOuwBa9TG0Lhcz2cvb11YaH0ZnGNGRW_cTQzzxDUN1531TlIRYQ",
|
||||||
|
"qi": "jZqnPoQJ8bCGy8hxTf7IW37cIDvwJRWxfg1S6XmbcKWzab7kxsZAbkrSEanGMMLc6ZdOrVjmCd6nnJRm9U9kjg"
|
||||||
|
}
|
15
fixtures/privkey.pkcs1.pem
Normal file
15
fixtures/privkey.pkcs1.pem
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIICXQIBAAKBgQDCbm03zrQGq5ycrSxPH4TbBCPMJ6Y0bwVxivyqdOu+SddDkc8c
|
||||||
|
jC6syGRd7XK1JCga7XXO/buF9BqHA1ILpKX5GPtlD1EvxsXoVGG2KyWFji5KCVs8
|
||||||
|
Z+8H6KPV9SYLwTGOsB0J0yr582XZKJthTIRsZC2hFBg0n7Dc5002TQQYPQIDAQAB
|
||||||
|
AoGAHT8DCrv69G3n9uFNovE4yMEMqW7lX0m75eJkMze3Jj5xNOa/4qlrc+4IuuA2
|
||||||
|
uuyfY72IVQRxqqqXOuvS8ZForZZk+kWSd6z45hrpbNAAHH2Rf7XwnwHY8VJrOQF3
|
||||||
|
UtbktTWqHX36ITZb9Hmf18hWsIeEp8Ng7Ru9h7hNuVxKMjkCQQDjYzr2VQL4QjNi
|
||||||
|
ZyxliRt/uQaGq9zAeT+Hs3xMQ5rshhE/8NAvj0utI24wfE4r0LEnRHBqOxjmjpZg
|
||||||
|
F+hELQHnAkEA2uWWAmzLitMx9reZDnSQwhw1qGIQ55quEBwmBBQIe46O4SeFT0V8
|
||||||
|
TED+bkVeOYQVCFHCS6GTRBoipMZtTPEYOwJBALuxHOpYIatqeZ+wKiVllx1GTOy8
|
||||||
|
z+rQKnCI5wDMjQTPZU2yKSYY0g6IQFwlPyFLke8nvuLxBQzKhbWsBjzAKeECQFy4
|
||||||
|
QwJj8xOqwc8vlbV5ypduO4xHfcGc034fbjrsAWvUxtC4XM9nL29dWGh9GZxjRkVv
|
||||||
|
3E0M88Q1Dded9U5SEWECQQCNmqc+hAnxsIbLyHFN/shbftwgO/AlFbF+DVLpeZtw
|
||||||
|
pbNpvuTGxkBuStIRqcYwwtzpl06tWOYJ3qeclGb1T2SO
|
||||||
|
-----END RSA PRIVATE KEY-----
|
16
fixtures/privkey.pkcs8.pem
Normal file
16
fixtures/privkey.pkcs8.pem
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMJubTfOtAarnJyt
|
||||||
|
LE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocD
|
||||||
|
UgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdko
|
||||||
|
m2FMhGxkLaEUGDSfsNznTTZNBBg9AgMBAAECgYAdPwMKu/r0bef24U2i8TjIwQyp
|
||||||
|
buVfSbvl4mQzN7cmPnE05r/iqWtz7gi64Da67J9jvYhVBHGqqpc669LxkWitlmT6
|
||||||
|
RZJ3rPjmGuls0AAcfZF/tfCfAdjxUms5AXdS1uS1NaodffohNlv0eZ/XyFawh4Sn
|
||||||
|
w2DtG72HuE25XEoyOQJBAONjOvZVAvhCM2JnLGWJG3+5Boar3MB5P4ezfExDmuyG
|
||||||
|
ET/w0C+PS60jbjB8TivQsSdEcGo7GOaOlmAX6EQtAecCQQDa5ZYCbMuK0zH2t5kO
|
||||||
|
dJDCHDWoYhDnmq4QHCYEFAh7jo7hJ4VPRXxMQP5uRV45hBUIUcJLoZNEGiKkxm1M
|
||||||
|
8Rg7AkEAu7Ec6lghq2p5n7AqJWWXHUZM7LzP6tAqcIjnAMyNBM9lTbIpJhjSDohA
|
||||||
|
XCU/IUuR7ye+4vEFDMqFtawGPMAp4QJAXLhDAmPzE6rBzy+VtXnKl247jEd9wZzT
|
||||||
|
fh9uOuwBa9TG0Lhcz2cvb11YaH0ZnGNGRW/cTQzzxDUN1531TlIRYQJBAI2apz6E
|
||||||
|
CfGwhsvIcU3+yFt+3CA78CUVsX4NUul5m3Cls2m+5MbGQG5K0hGpxjDC3OmXTq1Y
|
||||||
|
5gnep5yUZvVPZI4=
|
||||||
|
-----END PRIVATE KEY-----
|
13
fixtures/signed.jwk.json
Normal file
13
fixtures/signed.jwk.json
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
{
|
||||||
|
"header": {
|
||||||
|
"alg": "RS256",
|
||||||
|
"jwk": {
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK_Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY-2UPUS_GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
|
"e": "AQAB"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"protected": "eyJub25jZSI6IjhlZjU2MjRmNWVjOWQzZWYifQ",
|
||||||
|
"payload": "JLzF1NBNCV3kfbJ5sFaFyX94fJuL2H-IzaoBN-ciiHk",
|
||||||
|
"signature": "Wb2al5SDyh5gjmkV79MK9m3sfNBBPjntSKor-34BBoGwr6n8qEnBmqB1Y4zbo-5rmvsoPmJsnRlP_hRiUY86zSAQyfbisTGrGBl0IQ7ditpkfYVm0rBWJ8WnYNqYNp8K3qcD7NW72tsy-XoWEjNlz4lWJeRdEG2Nt4CJgnREH4Y"
|
||||||
|
}
|
7
index.js
Normal file
7
index.js
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
module.exports.RSA = require('./lib/rsa.js');
|
57
lib/generate-privkey-forge.js
Normal file
57
lib/generate-privkey-forge.js
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var Keypairs = require('keypairs');
|
||||||
|
|
||||||
|
module.exports = function (bitlen, exp) {
|
||||||
|
var k = require('node-forge').pki.rsa
|
||||||
|
.generateKeyPair({ bits: bitlen || 2048, e: exp || 0x10001 }).privateKey;
|
||||||
|
var jwk = {
|
||||||
|
kty: "RSA"
|
||||||
|
, n: _toUrlBase64(k.n)
|
||||||
|
, e: _toUrlBase64(k.e)
|
||||||
|
, d: _toUrlBase64(k.d)
|
||||||
|
, p: _toUrlBase64(k.p)
|
||||||
|
, q: _toUrlBase64(k.q)
|
||||||
|
, dp: _toUrlBase64(k.dP)
|
||||||
|
, dq: _toUrlBase64(k.dQ)
|
||||||
|
, qi: _toUrlBase64(k.qInv)
|
||||||
|
};
|
||||||
|
return {
|
||||||
|
publicKeyPem: Keypairs._exportSync({ jwk: jwk, public: true })
|
||||||
|
, privateKeyPem: Keypairs._exportSync({ jwk: jwk })
|
||||||
|
, privateKeyJwk: jwk
|
||||||
|
, publicKeyJwk: {
|
||||||
|
kty: jwk.kty
|
||||||
|
, n: jwk.n
|
||||||
|
, e: jwk.e
|
||||||
|
}
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
function _toUrlBase64(fbn) {
|
||||||
|
var hex = fbn.toRadix(16);
|
||||||
|
if (hex.length % 2) {
|
||||||
|
// Invalid hex string
|
||||||
|
hex = '0' + hex;
|
||||||
|
}
|
||||||
|
while ('00' === hex.slice(0, 2)) {
|
||||||
|
hex = hex.slice(2);
|
||||||
|
}
|
||||||
|
return Buffer.from(hex, 'hex').toString('base64')
|
||||||
|
.replace(/\+/g, "-")
|
||||||
|
.replace(/\//g, "_")
|
||||||
|
.replace(/=/g,"")
|
||||||
|
;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
var keypair = module.exports(2048, 0x10001);
|
||||||
|
console.info(keypair.privateKeyPem);
|
||||||
|
console.warn(keypair.publicKeyPem);
|
||||||
|
//console.info(keypair.privateKeyJwk);
|
||||||
|
//console.warn(keypair.publicKeyJwk);
|
||||||
|
}
|
39
lib/generate-privkey-node.js
Normal file
39
lib/generate-privkey-node.js
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var Keypairs = require('keypairs');
|
||||||
|
|
||||||
|
module.exports = function (bitlen, exp) {
|
||||||
|
var keypair = require('crypto').generateKeyPairSync(
|
||||||
|
'rsa'
|
||||||
|
, { modulusLength: bitlen
|
||||||
|
, publicExponent: exp
|
||||||
|
, privateKeyEncoding: {
|
||||||
|
type: 'pkcs1'
|
||||||
|
, format: 'pem'
|
||||||
|
}
|
||||||
|
, publicKeyEncoding: {
|
||||||
|
type: 'pkcs1'
|
||||||
|
, format: 'pem'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
);
|
||||||
|
var result = {
|
||||||
|
publicKeyPem: keypair.publicKey.trim()
|
||||||
|
, privateKeyPem: keypair.privateKey.trim()
|
||||||
|
};
|
||||||
|
result.publicKeyJwk = Keypairs._importSync({ pem: result.publicKeyPem, public: true });
|
||||||
|
result.privateKeyJwk = Keypairs._importSync({ pem: result.privateKeyPem });
|
||||||
|
return result;
|
||||||
|
};
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
var keypair = module.exports(2048, 0x10001);
|
||||||
|
console.info(keypair.privateKeyPem);
|
||||||
|
console.warn(keypair.publicKeyPem);
|
||||||
|
//console.info(keypair.privateKeyJwk);
|
||||||
|
//console.warn(keypair.publicKeyJwk);
|
||||||
|
}
|
32
lib/generate-privkey-ursa.js
Normal file
32
lib/generate-privkey-ursa.js
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var Keypairs = require('keypairs');
|
||||||
|
|
||||||
|
module.exports = function (bitlen, exp) {
|
||||||
|
var ursa;
|
||||||
|
try {
|
||||||
|
ursa = require('ursa');
|
||||||
|
} catch(e) {
|
||||||
|
ursa = require('ursa-optional');
|
||||||
|
}
|
||||||
|
var keypair = ursa.generatePrivateKey(bitlen, exp);
|
||||||
|
var result = {
|
||||||
|
publicKeyPem: keypair.toPublicPem().toString('ascii').trim()
|
||||||
|
, privateKeyPem: keypair.toPrivatePem().toString('ascii').trim()
|
||||||
|
};
|
||||||
|
result.publicKeyJwk = Keypairs._importSync({ pem: result.publicKeyPem, public: true });
|
||||||
|
result.privateKeyJwk = Keypairs._importSync({ pem: result.privateKeyPem });
|
||||||
|
return result;
|
||||||
|
};
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
var keypair = module.exports(2048, 0x10001);
|
||||||
|
console.info(keypair.privateKeyPem);
|
||||||
|
console.warn(keypair.publicKeyPem);
|
||||||
|
//console.info(keypair.privateKeyJwk);
|
||||||
|
//console.warn(keypair.publicKeyJwk);
|
||||||
|
}
|
66
lib/generate-privkey.js
Normal file
66
lib/generate-privkey.js
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var oldver = false;
|
||||||
|
|
||||||
|
module.exports = function (bitlen, exp) {
|
||||||
|
bitlen = parseInt(bitlen, 10) || 2048;
|
||||||
|
exp = parseInt(exp, 10) || 65537;
|
||||||
|
|
||||||
|
try {
|
||||||
|
return require('./generate-privkey-node.js')(bitlen, exp);
|
||||||
|
} catch(e) {
|
||||||
|
if (!/generateKeyPairSync is not a function/.test(e.message)) {
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
return require('./generate-privkey-ursa.js')(bitlen, exp);
|
||||||
|
} catch(e) {
|
||||||
|
if (e.code !== 'MODULE_NOT_FOUND') {
|
||||||
|
console.error("[rsa-compat] Unexpected error when using 'ursa':");
|
||||||
|
console.error(e);
|
||||||
|
}
|
||||||
|
if (!oldver) {
|
||||||
|
oldver = true;
|
||||||
|
console.warn("[WARN] rsa-compat: Your version of node does not have crypto.generateKeyPair()");
|
||||||
|
console.warn("[WARN] rsa-compat: Please update to node >= v10.12 or 'npm install ursa'");
|
||||||
|
console.warn("[WARN] rsa-compat: Using node-forge as a fallback, but it may be unacceptably slow.");
|
||||||
|
if (/arm|mips/i.test(require('os').arch)) {
|
||||||
|
console.warn("================================================================");
|
||||||
|
console.warn(" WARNING");
|
||||||
|
console.warn("================================================================");
|
||||||
|
console.warn("");
|
||||||
|
console.warn("WARNING: You are generating an RSA key using pure JavaScript on");
|
||||||
|
console.warn(" a VERY SLOW cpu. This could take DOZENS of minutes!");
|
||||||
|
console.warn("");
|
||||||
|
console.warn(" We recommend installing node >= v10.12, or 'gcc' and 'ursa'");
|
||||||
|
console.warn("");
|
||||||
|
console.warn("EXAMPLE:");
|
||||||
|
console.warn("");
|
||||||
|
console.warn(" sudo apt-get install build-essential && npm install ursa");
|
||||||
|
console.warn("");
|
||||||
|
console.warn("================================================================");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
return require('./generate-privkey-forge.js')(bitlen, exp);
|
||||||
|
} catch(e) {
|
||||||
|
console.error("[ERROR] rsa-compat: could not generate a private key.");
|
||||||
|
console.error("None of crypto.generateKeyPair, ursa, nor node-forge are present");
|
||||||
|
console.error("");
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
var keypair = module.exports(2048, 0x10001);
|
||||||
|
console.info(keypair.privateKeyPem);
|
||||||
|
console.warn(keypair.publicKeyPem);
|
||||||
|
//console.info(keypair.privateKeyJwk);
|
||||||
|
//console.warn(keypair.publicKeyJwk);
|
||||||
|
}
|
@ -1,76 +0,0 @@
|
|||||||
// Copyright 2014 ISRG. All rights reserved
|
|
||||||
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
||||||
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
||||||
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
||||||
'use strict';
|
|
||||||
|
|
||||||
var utils = {
|
|
||||||
|
|
||||||
fromStandardB64: function(x) {
|
|
||||||
return x.replace(/[+]/g, "-").replace(/\//g, "_").replace(/=/g,"");
|
|
||||||
},
|
|
||||||
|
|
||||||
toStandardB64: function(x) {
|
|
||||||
var b64 = x.replace(/-/g, "+").replace(/_/g, "/").replace(/=/g, "");
|
|
||||||
|
|
||||||
switch (b64.length % 4) {
|
|
||||||
case 2: b64 += "=="; break;
|
|
||||||
case 3: b64 += "="; break;
|
|
||||||
}
|
|
||||||
|
|
||||||
return b64;
|
|
||||||
},
|
|
||||||
|
|
||||||
b64enc: function(buffer) {
|
|
||||||
return utils.fromStandardB64(buffer.toString("base64"));
|
|
||||||
},
|
|
||||||
|
|
||||||
b64dec: function(str) {
|
|
||||||
return new Buffer(utils.toStandardB64(str), "base64");
|
|
||||||
},
|
|
||||||
|
|
||||||
isB64String: function(x) {
|
|
||||||
return ("string" === typeof x) && !x.match(/[^a-zA-Z0-9_-]/);
|
|
||||||
},
|
|
||||||
|
|
||||||
fieldsPresent: function(fields, object) {
|
|
||||||
for (var i in fields) {
|
|
||||||
if (!(fields[i] in object)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
},
|
|
||||||
|
|
||||||
validSignature: function(sig) {
|
|
||||||
return (("object" === typeof sig) &&
|
|
||||||
("alg" in sig) && ("string" === typeof sig.alg) &&
|
|
||||||
("nonce" in sig) && utils.isB64String(sig.nonce) &&
|
|
||||||
("sig" in sig) && utils.isB64String(sig.sig) &&
|
|
||||||
("jwk" in sig) && utils.validJWK(sig.jwk));
|
|
||||||
},
|
|
||||||
|
|
||||||
validJWK: function(jwk) {
|
|
||||||
return (("object" === typeof jwk) && ("kty" in jwk) && (
|
|
||||||
((jwk.kty === "RSA")
|
|
||||||
&& ("n" in jwk) && utils.isB64String(jwk.n)
|
|
||||||
&& ("e" in jwk) && utils.isB64String(jwk.e)) ||
|
|
||||||
((jwk.kty === "EC")
|
|
||||||
&& ("crv" in jwk)
|
|
||||||
&& ("x" in jwk) && utils.isB64String(jwk.x)
|
|
||||||
&& ("y" in jwk) && utils.isB64String(jwk.y))
|
|
||||||
) && !("d" in jwk));
|
|
||||||
},
|
|
||||||
|
|
||||||
// A simple, non-standard fingerprint for a JWK,
|
|
||||||
// just so that we don't have to store objects
|
|
||||||
keyFingerprint: function(jwk) {
|
|
||||||
switch (jwk.kty) {
|
|
||||||
case "RSA": return jwk.n;
|
|
||||||
case "EC": return jwk.crv + jwk.x + jwk.y;
|
|
||||||
}
|
|
||||||
throw "Unrecognized key type";
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
module.exports = utils;
|
|
42
lib/node.js
42
lib/node.js
@ -1,42 +0,0 @@
|
|||||||
/*!
|
|
||||||
* rsa-compat
|
|
||||||
* Copyright(c) 2016 AJ ONeal <aj@daplie.com> https://daplie.com
|
|
||||||
* Apache-2.0 OR MIT (and hence also MPL 2.0)
|
|
||||||
*/
|
|
||||||
'use strict';
|
|
||||||
|
|
||||||
var cryptoc = module.exports;
|
|
||||||
var rsaExtra = require('./rsa-extra');
|
|
||||||
var rsaForge = require('./rsa-forge');
|
|
||||||
var rsaUrsa;
|
|
||||||
|
|
||||||
try {
|
|
||||||
rsaUrsa = require('./rsa-ursa');
|
|
||||||
} catch(e) {
|
|
||||||
rsaUrsa = {};
|
|
||||||
// things will run a little slower on keygen, but it'll work on windows
|
|
||||||
// (but don't try this on raspberry pi - 20+ MINUTES key generation)
|
|
||||||
}
|
|
||||||
|
|
||||||
// order of crypto precdence is
|
|
||||||
// * native
|
|
||||||
// * ursa
|
|
||||||
// * forge extra (the new one aimed to be less-forgey)
|
|
||||||
// * forge (fallback)
|
|
||||||
Object.keys(rsaUrsa).forEach(function (key) {
|
|
||||||
if (!cryptoc[key]) {
|
|
||||||
cryptoc[key] = rsaUrsa[key];
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
Object.keys(rsaForge).forEach(function (key) {
|
|
||||||
if (!cryptoc[key]) {
|
|
||||||
cryptoc[key] = rsaForge[key];
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
Object.keys(rsaExtra).forEach(function (key) {
|
|
||||||
if (!cryptoc[key]) {
|
|
||||||
cryptoc[key] = rsaExtra[key];
|
|
||||||
}
|
|
||||||
});
|
|
214
lib/rsa-csr/README.md
Normal file
214
lib/rsa-csr/README.md
Normal file
@ -0,0 +1,214 @@
|
|||||||
|
[RSA-CSR.js](https://git.coolaj86.com/coolaj86/rsa-csr.js)
|
||||||
|
==========
|
||||||
|
|
||||||
|
Sponsored by [Root](https://therootcompany.com),
|
||||||
|
built for [ACME.js](https://git.coolaj86.com/coolaj86/acme.js)
|
||||||
|
and [Greenlock.js](https://git.coolaj86.com/coolaj86/greenlock-express.js)
|
||||||
|
|
||||||
|
A focused, **zero-dependency** library that can do exactly one thing really, really well:
|
||||||
|
* Generate a Certificate Signing Requests (CSR), and sign it!
|
||||||
|
|
||||||
|
| < 300 lines of code | 1.7k gzipped | 4.7k minified | 8.5k with comments |
|
||||||
|
|
||||||
|
Need JWK-to-PEM? Try [Rasha.js](https://git.coolaj86.com/coolaj86/rasha.js)
|
||||||
|
|
||||||
|
Need to generate an EC CSR? Try [ECSDA-CSR.js](https://git.coolaj86.com/coolaj86/ecdsa-csr.js)
|
||||||
|
|
||||||
|
Features
|
||||||
|
========
|
||||||
|
|
||||||
|
* [x] Universal CSR support (RSA signing) that Just Works™
|
||||||
|
* Common Name (CN) Subject
|
||||||
|
* Subject Alternative Names (SANs / altnames)
|
||||||
|
* 2048, 3072, and 4096 bit JWK RSA
|
||||||
|
* RSASSA PKCS1 v1.5
|
||||||
|
* [x] Zero Dependencies
|
||||||
|
* (no ASN1.js, PKI.js, forge, jrsasign - not even elliptic.js!)
|
||||||
|
* [x] Quality
|
||||||
|
* Focused
|
||||||
|
* Lightweight
|
||||||
|
* Well-Commented, Well-Documented
|
||||||
|
* Secure
|
||||||
|
* [x] Vanilla Node.js
|
||||||
|
* no school like the old school
|
||||||
|
* easy to read and understand
|
||||||
|
|
||||||
|
Usage
|
||||||
|
-----
|
||||||
|
|
||||||
|
Given an array of domains it uses the first for the Common Name (CN),
|
||||||
|
also known as Subject, and all of them as the Subject Alternative Names (SANs or altnames).
|
||||||
|
|
||||||
|
```js
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var rsacsr = require('rsa-csr');
|
||||||
|
var key = {
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "m2tt...-CNw",
|
||||||
|
"e": "AQAB",
|
||||||
|
"d": "Cpfo...HMQQ",
|
||||||
|
"p": "ynG-...sTCE",
|
||||||
|
"q": "xIkA...1Q1c",
|
||||||
|
"dp": "tzDG...B1QE",
|
||||||
|
"dq": "kh5d...aL48",
|
||||||
|
"qi": "AlHW...HhFU"
|
||||||
|
};
|
||||||
|
var domains = [ 'example.com', 'www.example.com' ];
|
||||||
|
|
||||||
|
return rsacsr({ key: key, domains: domains }).then(function (csr) {
|
||||||
|
console.log('CSR PEM:');
|
||||||
|
console.log(csr);
|
||||||
|
});
|
||||||
|
```
|
||||||
|
|
||||||
|
The output will look something like this (but much longer):
|
||||||
|
|
||||||
|
```
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIClTCCAX0CAQAwFjEUMBIGA1UEAwwLZXhhbXBsZS5jb20wggEiMA0GCSqGSIb3
|
||||||
|
DQEBAQUAA4IBDwAwggEKAoIBAQCba21UHE+VbDTpmYYFZUOV+OQ8AngOCdjROsPC
|
||||||
|
0KiEfMvEaEM3NQl58u6QL7G7QsEr.....3pIpUUkx5WbwJY6xDrCyFKG8ktpnee6
|
||||||
|
WjpTOBnpgHUI1/5ydnf0v29L9N+ALIJGKQxhub3iqB6EhCl93iiQtf4e7M/lzX7l
|
||||||
|
c1xqsSwVZ3RQVY9bRP9NdGuW4hVvscy5ypqRtXPXQpxMnYwfi9qW5Uo=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
|
```
|
||||||
|
|
||||||
|
#### PEM-to-JWK
|
||||||
|
|
||||||
|
If you need to convert a PEM to JWK first, do so:
|
||||||
|
|
||||||
|
```js
|
||||||
|
var Rasha = require('rasha');
|
||||||
|
|
||||||
|
Rasha.import({ pem: "-----BEGIN RSA PRIVATE KEY-----\nMIIEpAI..." }).then(function (jwk) {
|
||||||
|
console.log(jwk);
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
#### CLI
|
||||||
|
|
||||||
|
You're probably better off using OpenSSL for most commandline tasks,
|
||||||
|
but the `rsa-csr` and `rasha` CLIs are useful for testing and debugging.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
npm install -g rsa-csr
|
||||||
|
npm install -g rasha
|
||||||
|
|
||||||
|
rasha ./privkey.pem > ./privkey.jwk.json
|
||||||
|
rsa-csr ./privkey.jwk.json example.com,www.example.com > csr.pem
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
* `key` should be a JWK
|
||||||
|
* Need PEM support? Use [Rasha.js](https://git.coolaj86.com/coolaj86/rasha.js).
|
||||||
|
* (supports PEM, DER, PKCS#1 and PKCS#8)
|
||||||
|
* `domains` must be a list of strings representing domain names
|
||||||
|
* correctly handles utf-8
|
||||||
|
* you may also use punycoded, if needed
|
||||||
|
* `subject` will be `domains[0]` by default
|
||||||
|
* you shouldn't use this unless you need to
|
||||||
|
* you may need to if you need utf-8 for domains, but punycode for the subject
|
||||||
|
|
||||||
|
### Testing
|
||||||
|
|
||||||
|
You can double check that the CSR you get out is actually valid:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Generate a key, if needed
|
||||||
|
openssl genrsa -out ./privkey-rsa.pkcs1.pem $keysize
|
||||||
|
|
||||||
|
# Convert to JWK
|
||||||
|
rasha ./privkey-rsa.pkcs1.pem > ./privkey-rsa.jwk.json
|
||||||
|
|
||||||
|
# Create a CSR with your domains
|
||||||
|
npx rsa-csr ./privkey-rsa.jwk.json example.com,www.example.com > csr.pem
|
||||||
|
|
||||||
|
# Verify
|
||||||
|
openssl req -text -noout -verify -in csr.pem
|
||||||
|
```
|
||||||
|
|
||||||
|
New to Crypto?
|
||||||
|
--------------
|
||||||
|
|
||||||
|
Just a heads up in case you have no idea what you're doing:
|
||||||
|
|
||||||
|
First of all, [don't panic](https://coolaj86.com/articles/dont-panic.html).
|
||||||
|
|
||||||
|
Next:
|
||||||
|
|
||||||
|
* RSA stands for... well, that doesn't matter, actually.
|
||||||
|
* DSA stands for _Digital Signing Algorithm_.
|
||||||
|
* RSA a separate standard from EC/ECDSA, but both are *asymmetric*
|
||||||
|
* Private keys are actually keypairs (they contain the public key)
|
||||||
|
|
||||||
|
In many cases the terms get used (and misused) interchangably,
|
||||||
|
which can be confusing. You'll survive, I promise.
|
||||||
|
|
||||||
|
* PEM is just a Base64-encoded DER (think JSON as hex or base64)
|
||||||
|
* DER is an binary _object notation_ for ASN.1 (think actual stringified JSON or XML)
|
||||||
|
* ASN.1 is _object notation_ standard (think JSON, the standard)
|
||||||
|
* X.509 is a suite of schemas (think XLST or json-schema.org)
|
||||||
|
* PKCS#8, PKIK, SPKI are all X.509 schemas (think defining `firstName` vs `first_name` vs `firstname`)
|
||||||
|
|
||||||
|
Now forget about all that and just know this:
|
||||||
|
|
||||||
|
**This library solves your problem if** you need RSA _something-or-other_ and CSR _something-or-other_
|
||||||
|
in order to deal with SSL certificates in an internal organization.
|
||||||
|
|
||||||
|
If that's not what you're doing, you may want HTTPS and SSL through
|
||||||
|
[Greenlock.js](https://git.coolaj86.com/coolaj86/greenlock-express.js),
|
||||||
|
or you may be looking for something else entirely.
|
||||||
|
|
||||||
|
Goals vs Non-Goals
|
||||||
|
-----
|
||||||
|
|
||||||
|
This was built for use by [ACME.js](https://git.coolaj86.com/coolaj86/acme.js)
|
||||||
|
and [Greenlock.js](https://git.coolaj86.com/coolaj86/greenlock-express.js).
|
||||||
|
|
||||||
|
Rather than trying to make a generic implementation that works with everything under the sun,
|
||||||
|
this library is intentionally focused on around the use case of generating certificates for
|
||||||
|
ACME services (such as Let's Encrypt).
|
||||||
|
|
||||||
|
That said, [please tell me](https://git.coolaj86.com/coolaj86/rsa-csr.js/issues/new) if it doesn't
|
||||||
|
do what you need, it may make sense to add it (or otherwise, perhaps to help you create a fork).
|
||||||
|
|
||||||
|
The primary goal of this project is for this code to do exactly (and all of)
|
||||||
|
what it needs to do - No more, no less.
|
||||||
|
|
||||||
|
* Support RSA JWKs
|
||||||
|
* 2048-bit
|
||||||
|
* 3072-bit
|
||||||
|
* 4096-bit
|
||||||
|
* Support PEM and DER via Rasha.js
|
||||||
|
* PKCS#1 (traditional)
|
||||||
|
* PKCS#8
|
||||||
|
* RSASSA-PKCS1-v1_5
|
||||||
|
* Vanilla node.js (ECMAScript 5.1)
|
||||||
|
* No babel
|
||||||
|
* No dependencies
|
||||||
|
|
||||||
|
However, there are a few areas where I'd be willing to stretch:
|
||||||
|
|
||||||
|
* Type definition files for altscript languages
|
||||||
|
|
||||||
|
It is not a goal of this project to support any RSA profiles
|
||||||
|
except those that are universally supported by browsers and
|
||||||
|
are sufficiently secure (overkill is overkill).
|
||||||
|
|
||||||
|
> A little copying is better than a little dependency. - [Go Proverbs](https://go-proverbs.github.io) by Rob Pike
|
||||||
|
|
||||||
|
This code is considered small and focused enough that,
|
||||||
|
rather than making it a dependency in other small projects,
|
||||||
|
I personally just copy over the code.
|
||||||
|
|
||||||
|
Hence, all of these projects are MPL-2.0 licensed.
|
||||||
|
|
||||||
|
Legal
|
||||||
|
-----
|
||||||
|
|
||||||
|
[RSA-CSR.js](https://git.coolaj86.com/coolaj86/rsa-csr.js) |
|
||||||
|
MPL-2.0 |
|
||||||
|
[Terms of Use](https://therootcompany.com/legal/#terms) |
|
||||||
|
[Privacy Policy](https://therootcompany.com/legal/#privacy)
|
27
lib/rsa-csr/bin/rsa-csr.js
Executable file
27
lib/rsa-csr/bin/rsa-csr.js
Executable file
@ -0,0 +1,27 @@
|
|||||||
|
#!/usr/bin/env node
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var fs = require('fs');
|
||||||
|
var rsacsr = require('../index.js');
|
||||||
|
|
||||||
|
var keyname = process.argv[2];
|
||||||
|
var domains = process.argv[3].split(/,/);
|
||||||
|
|
||||||
|
var key = fs.readFileSync(keyname, 'ascii');
|
||||||
|
|
||||||
|
try {
|
||||||
|
key = JSON.parse(key);
|
||||||
|
} catch(e) {
|
||||||
|
// ignore
|
||||||
|
}
|
||||||
|
|
||||||
|
var csr = rsacsr.sync({ key: key, domains: domains });
|
||||||
|
console.log(csr);
|
||||||
|
/*
|
||||||
|
.then(function (csr) {
|
||||||
|
// Using error so that we can redirect stdout to file
|
||||||
|
//console.error("CN=" + domains[0]);
|
||||||
|
//console.error("subjectAltName=" + domains.join(','));
|
||||||
|
console.log(csr);
|
||||||
|
});
|
||||||
|
*/
|
16
lib/rsa-csr/fixtures/example.com-www.csr.pem
Normal file
16
lib/rsa-csr/fixtures/example.com-www.csr.pem
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIClTCCAX0CAQAwFjEUMBIGA1UEAwwLZXhhbXBsZS5jb20wggEiMA0GCSqGSIb3
|
||||||
|
DQEBAQUAA4IBDwAwggEKAoIBAQCba21UHE+VbDTpmYYFZUOV+OQ8AngOCdjROsPC
|
||||||
|
0KiEfMvEaEM3NQl58u6QL7G7QsErKViiNPm9OTFo6HF5JijfWzK7haHFuRMEsgI4
|
||||||
|
VwIYyhvqlJDfw/wt0AiVvSmoMfEQn1p1aiaO4V/RJSE3Vw/uz2bxiT22uSkSqOyS
|
||||||
|
hyfYE6dMHnuoBkzr4jvSifT+INmbv6Nyo4+AAMCZtYeHLrsFeSTjLL9jMPjI4ZkV
|
||||||
|
dlw2n3Xn9NbltF3/8Ao8dQfElqw+LIQWqU0oFHYNIP4ttfl5ObMKHaKSvBMyNruZ
|
||||||
|
R0El/ZsrcHLkAHRCLj07KRQJ81l5CUTPtQ02P1Eamz/nT4I3AgMBAAGgOjA4Bgkq
|
||||||
|
hkiG9w0BCQ4xKzApMCcGA1UdEQQgMB6CC2V4YW1wbGUuY29tgg93d3cuZXhhbXBs
|
||||||
|
ZS5jb20wDQYJKoZIhvcNAQELBQADggEBAGOFydCZPtRqnEidrB3vkpPp1GmQVqrl
|
||||||
|
XhqVM3X7UppsD3QDtJfgoSuBuVy3X/mPvy/Ly8WqEwJ7Ur+h76e7rgeFLvN5fQIr
|
||||||
|
frlpfCXrKaxxl6vxqKJ8s3Mn2LT8VmSVNig34NCtn99/SHNAlr3aU9L3b1+R25VI
|
||||||
|
FwFbOz/i92gOchT7Xat3fOiQ02k9GrHT33pIpUUkx5WbwJY6xDrCyFKG8ktpnee6
|
||||||
|
WjpTOBnpgHUI1/5ydnf0v29L9N+ALIJGKQxhub3iqB6EhCl93iiQtf4e7M/lzX7l
|
||||||
|
c1xqsSwVZ3RQVY9bRP9NdGuW4hVvscy5ypqRtXPXQpxMnYwfi9qW5Uo=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
11
lib/rsa-csr/fixtures/privkey-rsa-2048.jwk.json
Normal file
11
lib/rsa-csr/fixtures/privkey-rsa-2048.jwk.json
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
{
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "m2ttVBxPlWw06ZmGBWVDlfjkPAJ4DgnY0TrDwtCohHzLxGhDNzUJefLukC-xu0LBKylYojT5vTkxaOhxeSYo31syu4WhxbkTBLICOFcCGMob6pSQ38P8LdAIlb0pqDHxEJ9adWomjuFf0SUhN1cP7s9m8Yk9trkpEqjskocn2BOnTB57qAZM6-I70on0_iDZm7-jcqOPgADAmbWHhy67BXkk4yy_YzD4yOGZFXZcNp915_TW5bRd__AKPHUHxJasPiyEFqlNKBR2DSD-LbX5eTmzCh2ikrwTMja7mUdBJf2bK3By5AB0Qi49OykUCfNZeQlEz7UNNj9RGps_50-CNw",
|
||||||
|
"e": "AQAB",
|
||||||
|
"d": "Cpfo7Mm9Nu8YMC_xrZ54W9mKHPkCG9rZ93Ds9PNp-RXUgb-ljTbFPZWsYxGNKLllFz8LNosr1pT2ZDMrwNk0Af1iWNvD6gkyXaiQdCyiDPSBsJyNv2LJZon-e85X74nv53UlIkmo9SYxdLz2JaJ-iIWEe8Qh-7llLktrTJV_xr98_tbhgSppz_IeOymq3SEZaQHM8pTU7w7XvCj2pb9r8fN0M0XcgWZIaf3LGEfkhF_WtX67XJ0C6-LbkT51jtlLRNGX6haGdscXS0OWWjKOJzKGuV-NbthEn5rmRtVnjRZ3yaxQ0ud8vC-NONn7yvGUlOur1IdDzJ_YfHPt9sHMQQ",
|
||||||
|
"p": "ynG-t9HwKCN3MWRYFdnFzi9-02Qcy3p8B5pu3ary2E70hYn2pHlUG2a9BNE8c5xHQ3Hx43WoWf6s0zOunPV1G28LkU_UYEbAtPv_PxSmzpQp9n9XnYvBLBF8Y3z7gxgLn1vVFNARrQdRtj87qY3aw7E9S4DsGcAarIuOT2TsTCE",
|
||||||
|
"q": "xIkAjgUzB1zaUzJtW2Zgvp9cYYr1DmpH30ePZl3c_8397_DZDDo46fnFYjs6uPa03HpmKUnbjwr14QHlfXlntJBEuXxcqLjkdKdJ4ob7xueLTK4suo9V8LSrkLChVxlZQwnFD2E5ll0sVeeDeMJHQw38ahSrBFEVnxjpnPh1Q1c",
|
||||||
|
"dp": "tzDGjECFOU0ehqtuqhcuT63a7h8hj19-7MJqoFwY9HQ-ALkfXyYLXeBSGxHbyiIYuodZg6LsfMNgUJ3r3Eyhc_nAVfYPEC_2IdAG4WYmq7iXYF9LQV09qEsKbFykm7QekE3hO7wswo5k-q2tp3ieBYdVGAXJoGOdv5VpaZ7B1QE",
|
||||||
|
"dq": "kh5dyDk7YCz7sUFbpsmuAeuPjoH2ghooh2u3xN7iUVmAg-ToKjwbVnG5-7eXiC779rQVwnrD_0yh1AFJ8wjRPqDIR7ObXGHikIxT1VSQWqiJm6AfZzDsL0LUD4YS3iPdhob7-NxLKWzqao_u4lhnDQaX9PKa12HFlny6K1daL48",
|
||||||
|
"qi": "AlHWbx1gp6Z9pbw_1hlS7HuXAgWoX7IjbTUelldf4gkriDWLOrj3QCZcO4ZvZvEwJhVlsny9LO8IkbwGJEL6cXraK08ByVS2mwQyflgTgGNnpzixyEUL_mrQLx6y145FHcxfeqNInMhep-0Mxn1D5nlhmIOgRApS0t9VoXtHhFU"
|
||||||
|
}
|
27
lib/rsa-csr/fixtures/privkey-rsa-2048.pkcs1.pem
Normal file
27
lib/rsa-csr/fixtures/privkey-rsa-2048.pkcs1.pem
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEpAIBAAKCAQEAm2ttVBxPlWw06ZmGBWVDlfjkPAJ4DgnY0TrDwtCohHzLxGhD
|
||||||
|
NzUJefLukC+xu0LBKylYojT5vTkxaOhxeSYo31syu4WhxbkTBLICOFcCGMob6pSQ
|
||||||
|
38P8LdAIlb0pqDHxEJ9adWomjuFf0SUhN1cP7s9m8Yk9trkpEqjskocn2BOnTB57
|
||||||
|
qAZM6+I70on0/iDZm7+jcqOPgADAmbWHhy67BXkk4yy/YzD4yOGZFXZcNp915/TW
|
||||||
|
5bRd//AKPHUHxJasPiyEFqlNKBR2DSD+LbX5eTmzCh2ikrwTMja7mUdBJf2bK3By
|
||||||
|
5AB0Qi49OykUCfNZeQlEz7UNNj9RGps/50+CNwIDAQABAoIBAAqX6OzJvTbvGDAv
|
||||||
|
8a2eeFvZihz5Ahva2fdw7PTzafkV1IG/pY02xT2VrGMRjSi5ZRc/CzaLK9aU9mQz
|
||||||
|
K8DZNAH9Yljbw+oJMl2okHQsogz0gbCcjb9iyWaJ/nvOV++J7+d1JSJJqPUmMXS8
|
||||||
|
9iWifoiFhHvEIfu5ZS5La0yVf8a/fP7W4YEqac/yHjspqt0hGWkBzPKU1O8O17wo
|
||||||
|
9qW/a/HzdDNF3IFmSGn9yxhH5IRf1rV+u1ydAuvi25E+dY7ZS0TRl+oWhnbHF0tD
|
||||||
|
lloyjicyhrlfjW7YRJ+a5kbVZ40Wd8msUNLnfLwvjTjZ+8rxlJTrq9SHQ8yf2Hxz
|
||||||
|
7fbBzEECgYEAynG+t9HwKCN3MWRYFdnFzi9+02Qcy3p8B5pu3ary2E70hYn2pHlU
|
||||||
|
G2a9BNE8c5xHQ3Hx43WoWf6s0zOunPV1G28LkU/UYEbAtPv/PxSmzpQp9n9XnYvB
|
||||||
|
LBF8Y3z7gxgLn1vVFNARrQdRtj87qY3aw7E9S4DsGcAarIuOT2TsTCECgYEAxIkA
|
||||||
|
jgUzB1zaUzJtW2Zgvp9cYYr1DmpH30ePZl3c/8397/DZDDo46fnFYjs6uPa03Hpm
|
||||||
|
KUnbjwr14QHlfXlntJBEuXxcqLjkdKdJ4ob7xueLTK4suo9V8LSrkLChVxlZQwnF
|
||||||
|
D2E5ll0sVeeDeMJHQw38ahSrBFEVnxjpnPh1Q1cCgYEAtzDGjECFOU0ehqtuqhcu
|
||||||
|
T63a7h8hj19+7MJqoFwY9HQ+ALkfXyYLXeBSGxHbyiIYuodZg6LsfMNgUJ3r3Eyh
|
||||||
|
c/nAVfYPEC/2IdAG4WYmq7iXYF9LQV09qEsKbFykm7QekE3hO7wswo5k+q2tp3ie
|
||||||
|
BYdVGAXJoGOdv5VpaZ7B1QECgYEAkh5dyDk7YCz7sUFbpsmuAeuPjoH2ghooh2u3
|
||||||
|
xN7iUVmAg+ToKjwbVnG5+7eXiC779rQVwnrD/0yh1AFJ8wjRPqDIR7ObXGHikIxT
|
||||||
|
1VSQWqiJm6AfZzDsL0LUD4YS3iPdhob7+NxLKWzqao/u4lhnDQaX9PKa12HFlny6
|
||||||
|
K1daL48CgYACUdZvHWCnpn2lvD/WGVLse5cCBahfsiNtNR6WV1/iCSuINYs6uPdA
|
||||||
|
Jlw7hm9m8TAmFWWyfL0s7wiRvAYkQvpxetorTwHJVLabBDJ+WBOAY2enOLHIRQv+
|
||||||
|
atAvHrLXjkUdzF96o0icyF6n7QzGfUPmeWGYg6BEClLS31Whe0eEVQ==
|
||||||
|
-----END RSA PRIVATE KEY-----
|
17
lib/rsa-csr/fixtures/whatever.net-www-api.csr.pem
Normal file
17
lib/rsa-csr/fixtures/whatever.net-www-api.csr.pem
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIICqjCCAZICAQAwFzEVMBMGA1UEAwwMd2hhdGV2ZXIubmV0MIIBIjANBgkqhkiG
|
||||||
|
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm2ttVBxPlWw06ZmGBWVDlfjkPAJ4DgnY0TrD
|
||||||
|
wtCohHzLxGhDNzUJefLukC+xu0LBKylYojT5vTkxaOhxeSYo31syu4WhxbkTBLIC
|
||||||
|
OFcCGMob6pSQ38P8LdAIlb0pqDHxEJ9adWomjuFf0SUhN1cP7s9m8Yk9trkpEqjs
|
||||||
|
kocn2BOnTB57qAZM6+I70on0/iDZm7+jcqOPgADAmbWHhy67BXkk4yy/YzD4yOGZ
|
||||||
|
FXZcNp915/TW5bRd//AKPHUHxJasPiyEFqlNKBR2DSD+LbX5eTmzCh2ikrwTMja7
|
||||||
|
mUdBJf2bK3By5AB0Qi49OykUCfNZeQlEz7UNNj9RGps/50+CNwIDAQABoE4wTAYJ
|
||||||
|
KoZIhvcNAQkOMT8wPTA7BgNVHREENDAyggx3aGF0ZXZlci5uZXSCEHd3dy53aGF0
|
||||||
|
ZXZlci5uZXSCEGFwaS53aGF0ZXZlci5uZXQwDQYJKoZIhvcNAQELBQADggEBAB21
|
||||||
|
KZYjarfd8nUAbwhH8dWZOo4rFcdYFo3xcXPQ11b1Wa79dtG67cgD/dplKFis5qD3
|
||||||
|
6h4m818w9ESBA3Q1ZUy6HgDPMhCjg2fmCnSsZ5epo47wzvelYonfOX5DAwxgfYsa
|
||||||
|
335olrXJ0qsTiNmaS7RxDT53vfMOp41NyEAkFmpIAkaHgW/+xFPUSCBXIUWbaCG+
|
||||||
|
pK3FVNmK3VCVCAP6UvVKYQUWSC6FRG/Q8MHoecdo+bbMlr2s2GPxq9TKInwe8JqT
|
||||||
|
E9pD7QMsN7uWpMaXNKCje4+Q88Br4URNcGAiYoy4/6hcF2Ki1saTYVIk/DG1P4hX
|
||||||
|
G5f0ezDLtsC22xe6jHI=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
2
lib/rsa-csr/index.js
Normal file
2
lib/rsa-csr/index.js
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
'use strict';
|
||||||
|
module.exports = require('./lib/csr.js');
|
72
lib/rsa-csr/lib/asn1.js
Normal file
72
lib/rsa-csr/lib/asn1.js
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
//
|
||||||
|
// A dumbed-down, minimal ASN.1 parser / packer combo
|
||||||
|
//
|
||||||
|
// Note: generally I like to write congruent code
|
||||||
|
// (i.e. output can be used as input and vice-versa)
|
||||||
|
// However, this seemed to be more readable and easier
|
||||||
|
// to use written as-is, asymmetrically.
|
||||||
|
// (I also generally prefer to export objects rather
|
||||||
|
// functions but, yet again, asthetics one in this case)
|
||||||
|
|
||||||
|
var Enc = require('./encoding.js');
|
||||||
|
|
||||||
|
//
|
||||||
|
// Packer
|
||||||
|
//
|
||||||
|
|
||||||
|
// Almost every ASN.1 type that's important for CSR
|
||||||
|
// can be represented generically with only a few rules.
|
||||||
|
var ASN1 = module.exports = function ASN1(/*type, hexstrings...*/) {
|
||||||
|
var args = Array.prototype.slice.call(arguments);
|
||||||
|
var typ = args.shift();
|
||||||
|
var str = args.join('').replace(/\s+/g, '').toLowerCase();
|
||||||
|
var len = (str.length/2);
|
||||||
|
var lenlen = 0;
|
||||||
|
var hex = typ;
|
||||||
|
|
||||||
|
// We can't have an odd number of hex chars
|
||||||
|
if (len !== Math.round(len)) {
|
||||||
|
console.error(arguments);
|
||||||
|
throw new Error("invalid hex");
|
||||||
|
}
|
||||||
|
|
||||||
|
// The first byte of any ASN.1 sequence is the type (Sequence, Integer, etc)
|
||||||
|
// The second byte is either the size of the value, or the size of its size
|
||||||
|
|
||||||
|
// 1. If the second byte is < 0x80 (128) it is considered the size
|
||||||
|
// 2. If it is > 0x80 then it describes the number of bytes of the size
|
||||||
|
// ex: 0x82 means the next 2 bytes describe the size of the value
|
||||||
|
// 3. The special case of exactly 0x80 is "indefinite" length (to end-of-file)
|
||||||
|
|
||||||
|
if (len > 127) {
|
||||||
|
lenlen += 1;
|
||||||
|
while (len > 255) {
|
||||||
|
lenlen += 1;
|
||||||
|
len = len >> 8;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (lenlen) { hex += Enc.numToHex(0x80 + lenlen); }
|
||||||
|
return hex + Enc.numToHex(str.length/2) + str;
|
||||||
|
};
|
||||||
|
|
||||||
|
// The Integer type has some special rules
|
||||||
|
ASN1.UInt = function UINT() {
|
||||||
|
var str = Array.prototype.slice.call(arguments).join('');
|
||||||
|
var first = parseInt(str.slice(0, 2), 16);
|
||||||
|
|
||||||
|
// If the first byte is 0x80 or greater, the number is considered negative
|
||||||
|
// Therefore we add a '00' prefix if the 0x80 bit is set
|
||||||
|
if (0x80 & first) { str = '00' + str; }
|
||||||
|
|
||||||
|
return ASN1('02', str);
|
||||||
|
};
|
||||||
|
|
||||||
|
// The Bit String type also has a special rule
|
||||||
|
ASN1.BitStr = function BITSTR() {
|
||||||
|
var str = Array.prototype.slice.call(arguments).join('');
|
||||||
|
// '00' is a mask of how many bits of the next byte to ignore
|
||||||
|
return ASN1('03', '00' + str);
|
||||||
|
};
|
152
lib/rsa-csr/lib/csr.js
Normal file
152
lib/rsa-csr/lib/csr.js
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var crypto = require('crypto');
|
||||||
|
var ASN1 = require('./asn1.js');
|
||||||
|
var Enc = require('./encoding.js');
|
||||||
|
var PEM = require('./pem.js');
|
||||||
|
var X509 = require('./x509.js');
|
||||||
|
var RSA = {};
|
||||||
|
|
||||||
|
/*global Promise*/
|
||||||
|
var CSR = module.exports = function rsacsr(opts) {
|
||||||
|
// We're using a Promise here to be compatible with the browser version
|
||||||
|
// which will probably use the webcrypto API for some of the conversions
|
||||||
|
opts = CSR._prepare(opts);
|
||||||
|
|
||||||
|
return CSR.create(opts).then(function (bytes) {
|
||||||
|
return CSR._encode(opts, bytes);
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
CSR._prepare = function (opts) {
|
||||||
|
var Rasha;
|
||||||
|
opts = JSON.parse(JSON.stringify(opts));
|
||||||
|
var pem, jwk;
|
||||||
|
|
||||||
|
// We do a bit of extra error checking for user convenience
|
||||||
|
if (!opts) { throw new Error("You must pass options with key and domains to rsacsr"); }
|
||||||
|
if (!Array.isArray(opts.domains) || 0 === opts.domains.length) {
|
||||||
|
new Error("You must pass options.domains as a non-empty array");
|
||||||
|
}
|
||||||
|
|
||||||
|
// I need to check that 例.中国 is a valid domain name
|
||||||
|
if (!opts.domains.every(function (d) {
|
||||||
|
// allow punycode? xn--
|
||||||
|
if ('string' === typeof d /*&& /\./.test(d) && !/--/.test(d)*/) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
})) {
|
||||||
|
throw new Error("You must pass options.domains as strings");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (opts.pem) {
|
||||||
|
pem = opts.pem;
|
||||||
|
} else if (opts.jwk) {
|
||||||
|
jwk = opts.jwk;
|
||||||
|
} else {
|
||||||
|
if (!opts.key) {
|
||||||
|
throw new Error("You must pass options.key as a JSON web key");
|
||||||
|
} else if (opts.key.kty) {
|
||||||
|
jwk = opts.key;
|
||||||
|
} else {
|
||||||
|
pem = opts.key;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pem) {
|
||||||
|
try {
|
||||||
|
Rasha = require('rasha');
|
||||||
|
} catch(e) {
|
||||||
|
throw new Error("Rasha.js is an optional dependency for PEM-to-JWK.\n"
|
||||||
|
+ "Install it if you'd like to use it:\n"
|
||||||
|
+ "\tnpm install --save rasha\n"
|
||||||
|
+ "Otherwise supply a jwk as the private key."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
jwk = Rasha.importSync({ pem: pem });
|
||||||
|
}
|
||||||
|
|
||||||
|
opts.jwk = jwk;
|
||||||
|
return opts;
|
||||||
|
};
|
||||||
|
CSR.sync = function (opts) {
|
||||||
|
opts = CSR._prepare(opts);
|
||||||
|
var bytes = CSR.createSync(opts);
|
||||||
|
return CSR._encode(opts, bytes);
|
||||||
|
};
|
||||||
|
CSR._encode = function (opts, bytes) {
|
||||||
|
if ('der' === (opts.encoding||'').toLowerCase()) {
|
||||||
|
return bytes;
|
||||||
|
}
|
||||||
|
return PEM.packBlock({
|
||||||
|
type: "CERTIFICATE REQUEST"
|
||||||
|
, bytes: bytes /* { jwk: jwk, domains: opts.domains } */
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
CSR.createSync = function createCsr(opts) {
|
||||||
|
var hex = CSR.request(opts.jwk, opts.domains);
|
||||||
|
var csr = CSR.signSync(opts.jwk, hex);
|
||||||
|
return Enc.hexToBuf(csr);
|
||||||
|
};
|
||||||
|
CSR.create = function createCsr(opts) {
|
||||||
|
var hex = CSR.request(opts.jwk, opts.domains);
|
||||||
|
return CSR.sign(opts.jwk, hex).then(function (csr) {
|
||||||
|
return Enc.hexToBuf(csr);
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
CSR.request = function createCsrBodyEc(jwk, domains) {
|
||||||
|
var asn1pub = X509.packCsrPublicKey(jwk);
|
||||||
|
return X509.packCsr(asn1pub, domains);
|
||||||
|
};
|
||||||
|
|
||||||
|
CSR.signSync = function csrEcSig(jwk, request) {
|
||||||
|
var keypem = PEM.packBlock({ type: "RSA PRIVATE KEY", bytes: X509.packPkcs1(jwk) });
|
||||||
|
var sig = RSA.signSync(keypem, Enc.hexToBuf(request));
|
||||||
|
return CSR.toDer({ request: request, signature: sig });
|
||||||
|
};
|
||||||
|
CSR.sign = function csrEcSig(jwk, request) {
|
||||||
|
var keypem = PEM.packBlock({ type: "RSA PRIVATE KEY", bytes: X509.packPkcs1(jwk) });
|
||||||
|
return RSA.sign(keypem, Enc.hexToBuf(request)).then(function (sig) {
|
||||||
|
return CSR.toDer({ request: request, signature: sig });
|
||||||
|
});
|
||||||
|
};
|
||||||
|
CSR.toDer = function encode(opts) {
|
||||||
|
var sty = ASN1('30'
|
||||||
|
// 1.2.840.113549.1.1.11 sha256WithRSAEncryption (PKCS #1)
|
||||||
|
, ASN1('06', '2a864886f70d01010b')
|
||||||
|
, ASN1('05')
|
||||||
|
);
|
||||||
|
return ASN1('30'
|
||||||
|
// The Full CSR Request Body
|
||||||
|
, opts.request
|
||||||
|
// The Signature Type
|
||||||
|
, sty
|
||||||
|
// The Signature
|
||||||
|
, ASN1.BitStr(Enc.bufToHex(opts.signature))
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
//
|
||||||
|
// RSA
|
||||||
|
//
|
||||||
|
|
||||||
|
// Took some tips from https://gist.github.com/codermapuche/da4f96cdb6d5ff53b7ebc156ec46a10a
|
||||||
|
RSA.signSync = function signRsaSync(keypem, ab) {
|
||||||
|
// Signer is a stream
|
||||||
|
var sign = crypto.createSign('SHA256');
|
||||||
|
sign.write(ab);
|
||||||
|
sign.end();
|
||||||
|
|
||||||
|
// The signature is ASN1 encoded, as it turns out
|
||||||
|
var sig = sign.sign(keypem);
|
||||||
|
|
||||||
|
// Convert to a JavaScript ArrayBuffer just because
|
||||||
|
return sig.buffer.slice(sig.byteOffset, sig.byteOffset + sig.byteLength);
|
||||||
|
};
|
||||||
|
RSA.sign = function signRsa(keypem, ab) {
|
||||||
|
return Promise.resolve().then(function () {
|
||||||
|
return RSA.signSync(keypem, ab);
|
||||||
|
});
|
||||||
|
};
|
34
lib/rsa-csr/lib/encoding.js
Normal file
34
lib/rsa-csr/lib/encoding.js
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var Enc = module.exports;
|
||||||
|
|
||||||
|
Enc.base64ToHex = function base64ToHex(b64) {
|
||||||
|
return Buffer.from(b64, 'base64').toString('hex').toLowerCase();
|
||||||
|
};
|
||||||
|
|
||||||
|
Enc.bufToBase64 = function bufToBase64(u8) {
|
||||||
|
// we want to maintain api compatability with browser APIs,
|
||||||
|
// so we assume that this could be a Uint8Array
|
||||||
|
return Buffer.from(u8).toString('base64');
|
||||||
|
};
|
||||||
|
|
||||||
|
Enc.bufToHex = function toHex(u8) {
|
||||||
|
return Buffer.from(u8).toString('hex').toLowerCase();
|
||||||
|
};
|
||||||
|
|
||||||
|
Enc.hexToBuf = function (hex) {
|
||||||
|
return Buffer.from(hex, 'hex');
|
||||||
|
};
|
||||||
|
|
||||||
|
Enc.numToHex = function numToHex(d) {
|
||||||
|
d = d.toString(16);
|
||||||
|
if (d.length % 2) {
|
||||||
|
return '0' + d;
|
||||||
|
}
|
||||||
|
return d;
|
||||||
|
};
|
||||||
|
|
||||||
|
Enc.utf8ToHex = function utf8ToHex(str) {
|
||||||
|
// node can properly handle utf-8 strings
|
||||||
|
return Buffer.from(str).toString('hex').toLowerCase();
|
||||||
|
};
|
12
lib/rsa-csr/lib/pem.js
Normal file
12
lib/rsa-csr/lib/pem.js
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var Enc = require('./encoding.js');
|
||||||
|
var PEM = module.exports;
|
||||||
|
|
||||||
|
PEM.packBlock = function (opts) {
|
||||||
|
// TODO allow for headers?
|
||||||
|
return '-----BEGIN ' + opts.type + '-----\n'
|
||||||
|
+ Enc.bufToBase64(opts.bytes).match(/.{1,64}/g).join('\n') + '\n'
|
||||||
|
+ '-----END ' + opts.type + '-----'
|
||||||
|
;
|
||||||
|
};
|
111
lib/rsa-csr/lib/telemetry.js
Normal file
111
lib/rsa-csr/lib/telemetry.js
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
// We believe in a proactive approach to sustainable open source.
|
||||||
|
// As part of that we make it easy for you to opt-in to following our progress
|
||||||
|
// and we also stay up-to-date on telemetry such as operating system and node
|
||||||
|
// version so that we can focus our efforts where they'll have the greatest impact.
|
||||||
|
//
|
||||||
|
// Want to learn more about our Terms, Privacy Policy, and Mission?
|
||||||
|
// Check out https://therootcompany.com/legal/
|
||||||
|
|
||||||
|
var os = require('os');
|
||||||
|
var crypto = require('crypto');
|
||||||
|
var https = require('https');
|
||||||
|
var pkg = require('../package.json');
|
||||||
|
|
||||||
|
// to help focus our efforts in the right places
|
||||||
|
var data = {
|
||||||
|
package: pkg.name
|
||||||
|
, version: pkg.version
|
||||||
|
, node: process.version
|
||||||
|
, arch: process.arch || os.arch()
|
||||||
|
, platform: process.platform || os.platform()
|
||||||
|
, release: os.release()
|
||||||
|
};
|
||||||
|
|
||||||
|
function addCommunityMember(opts) {
|
||||||
|
setTimeout(function () {
|
||||||
|
var req = https.request({
|
||||||
|
hostname: 'api.therootcompany.com'
|
||||||
|
, port: 443
|
||||||
|
, path: '/api/therootcompany.com/public/community'
|
||||||
|
, method: 'POST'
|
||||||
|
, headers: { 'Content-Type': 'application/json' }
|
||||||
|
}, function (resp) {
|
||||||
|
// let the data flow, so we can ignore it
|
||||||
|
resp.on('data', function () {});
|
||||||
|
//resp.on('data', function (chunk) { console.log(chunk.toString()); });
|
||||||
|
resp.on('error', function () { /*ignore*/ });
|
||||||
|
//resp.on('error', function (err) { console.error(err); });
|
||||||
|
});
|
||||||
|
var obj = JSON.parse(JSON.stringify(data));
|
||||||
|
obj.action = 'updates';
|
||||||
|
try {
|
||||||
|
obj.ppid = ppid(obj.action);
|
||||||
|
} catch(e) {
|
||||||
|
// ignore
|
||||||
|
//console.error(e);
|
||||||
|
}
|
||||||
|
obj.name = opts.name || undefined;
|
||||||
|
obj.address = opts.email;
|
||||||
|
obj.community = 'node.js@therootcompany.com';
|
||||||
|
|
||||||
|
req.write(JSON.stringify(obj, 2, null));
|
||||||
|
req.end();
|
||||||
|
req.on('error', function () { /*ignore*/ });
|
||||||
|
//req.on('error', function (err) { console.error(err); });
|
||||||
|
}, 50);
|
||||||
|
}
|
||||||
|
|
||||||
|
function ping(action) {
|
||||||
|
setTimeout(function () {
|
||||||
|
var req = https.request({
|
||||||
|
hostname: 'api.therootcompany.com'
|
||||||
|
, port: 443
|
||||||
|
, path: '/api/therootcompany.com/public/ping'
|
||||||
|
, method: 'POST'
|
||||||
|
, headers: { 'Content-Type': 'application/json' }
|
||||||
|
}, function (resp) {
|
||||||
|
// let the data flow, so we can ignore it
|
||||||
|
resp.on('data', function () { });
|
||||||
|
//resp.on('data', function (chunk) { console.log(chunk.toString()); });
|
||||||
|
resp.on('error', function () { /*ignore*/ });
|
||||||
|
//resp.on('error', function (err) { console.error(err); });
|
||||||
|
});
|
||||||
|
var obj = JSON.parse(JSON.stringify(data));
|
||||||
|
obj.action = action;
|
||||||
|
try {
|
||||||
|
obj.ppid = ppid(obj.action);
|
||||||
|
} catch(e) {
|
||||||
|
// ignore
|
||||||
|
//console.error(e);
|
||||||
|
}
|
||||||
|
|
||||||
|
req.write(JSON.stringify(obj, 2, null));
|
||||||
|
req.end();
|
||||||
|
req.on('error', function (/*e*/) { /*console.error('req.error', e);*/ });
|
||||||
|
}, 50);
|
||||||
|
}
|
||||||
|
|
||||||
|
// to help identify unique installs without getting
|
||||||
|
// the personally identifiable info that we don't want
|
||||||
|
function ppid(action) {
|
||||||
|
var parts = [ action, data.package, data.version, data.node, data.arch, data.platform, data.release ];
|
||||||
|
var ifaces = os.networkInterfaces();
|
||||||
|
Object.keys(ifaces).forEach(function (ifname) {
|
||||||
|
if (/^en/.test(ifname) || /^eth/.test(ifname) || /^wl/.test(ifname)) {
|
||||||
|
if (ifaces[ifname] && ifaces[ifname].length) {
|
||||||
|
parts.push(ifaces[ifname][0].mac);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
return crypto.createHash('sha1').update(parts.join(',')).digest('base64');
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports.ping = ping;
|
||||||
|
module.exports.joinCommunity = addCommunityMember;
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
ping('install');
|
||||||
|
//addCommunityMember({ name: "AJ ONeal", email: 'coolaj86@gmail.com' });
|
||||||
|
}
|
66
lib/rsa-csr/lib/x509.js
Normal file
66
lib/rsa-csr/lib/x509.js
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var ASN1 = require('./asn1.js');
|
||||||
|
var Enc = require('./encoding.js');
|
||||||
|
|
||||||
|
var X509 = module.exports;
|
||||||
|
|
||||||
|
X509.packCsr = function (asn1pubkey, domains) {
|
||||||
|
return ASN1('30'
|
||||||
|
// Version (0)
|
||||||
|
, ASN1.UInt('00')
|
||||||
|
|
||||||
|
// 2.5.4.3 commonName (X.520 DN component)
|
||||||
|
, ASN1('30', ASN1('31', ASN1('30', ASN1('06', '550403'), ASN1('0c', Enc.utf8ToHex(domains[0])))))
|
||||||
|
|
||||||
|
// Public Key (RSA or EC)
|
||||||
|
, asn1pubkey
|
||||||
|
|
||||||
|
// Request Body
|
||||||
|
, ASN1('a0'
|
||||||
|
, ASN1('30'
|
||||||
|
// 1.2.840.113549.1.9.14 extensionRequest (PKCS #9 via CRMF)
|
||||||
|
, ASN1('06', '2a864886f70d01090e')
|
||||||
|
, ASN1('31'
|
||||||
|
, ASN1('30'
|
||||||
|
, ASN1('30'
|
||||||
|
// 2.5.29.17 subjectAltName (X.509 extension)
|
||||||
|
, ASN1('06', '551d11')
|
||||||
|
, ASN1('04'
|
||||||
|
, ASN1('30', domains.map(function (d) {
|
||||||
|
return ASN1('82', Enc.utf8ToHex(d));
|
||||||
|
}).join(''))))))))
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
X509.packPkcs1 = function (jwk) {
|
||||||
|
var n = ASN1.UInt(Enc.base64ToHex(jwk.n));
|
||||||
|
var e = ASN1.UInt(Enc.base64ToHex(jwk.e));
|
||||||
|
|
||||||
|
if (!jwk.d) {
|
||||||
|
return Enc.hexToBuf(ASN1('30', n, e));
|
||||||
|
}
|
||||||
|
|
||||||
|
return Enc.hexToBuf(ASN1('30'
|
||||||
|
, ASN1.UInt('00')
|
||||||
|
, n
|
||||||
|
, e
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.d))
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.p))
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.q))
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.dp))
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.dq))
|
||||||
|
, ASN1.UInt(Enc.base64ToHex(jwk.qi))
|
||||||
|
));
|
||||||
|
};
|
||||||
|
|
||||||
|
X509.packCsrPublicKey = function (jwk) {
|
||||||
|
// Sequence the key
|
||||||
|
var n = ASN1.UInt(Enc.base64ToHex(jwk.n));
|
||||||
|
var e = ASN1.UInt(Enc.base64ToHex(jwk.e));
|
||||||
|
var asn1pub = ASN1('30', n, e);
|
||||||
|
//var asn1pub = X509.packPkcs1({ kty: jwk.kty, n: jwk.n, e: jwk.e });
|
||||||
|
|
||||||
|
// Add the CSR pub key header
|
||||||
|
return ASN1('30', ASN1('30', ASN1('06', '2a864886f70d010101'), ASN1('05')), ASN1.BitStr(asn1pub));
|
||||||
|
};
|
34
lib/rsa-csr/package.json
Normal file
34
lib/rsa-csr/package.json
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
{
|
||||||
|
"name": "rsa-csr",
|
||||||
|
"version": "1.0.7",
|
||||||
|
"description": "💯 A focused, zero-dependency library to generate a Certificate Signing Request (CSR) and sign it!",
|
||||||
|
"homepage": "https://git.coolaj86.com/coolaj86/rsa-csr.js",
|
||||||
|
"main": "index.js",
|
||||||
|
"bin": {
|
||||||
|
"rsa-csr": "bin/rsa-csr.js"
|
||||||
|
},
|
||||||
|
"files": [
|
||||||
|
"bin",
|
||||||
|
"fixtures",
|
||||||
|
"lib"
|
||||||
|
],
|
||||||
|
"directories": {
|
||||||
|
"lib": "lib"
|
||||||
|
},
|
||||||
|
"scripts": {
|
||||||
|
"postinstall": "node lib/telemetry.js event:install",
|
||||||
|
"test": "bash test.sh"
|
||||||
|
},
|
||||||
|
"repository": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "https://git.coolaj86.com/coolaj86/rsa-csr.js"
|
||||||
|
},
|
||||||
|
"keywords": [
|
||||||
|
"zero-dependency",
|
||||||
|
"CSR",
|
||||||
|
"RSA",
|
||||||
|
"x509"
|
||||||
|
],
|
||||||
|
"author": "AJ ONeal <coolaj86@gmail.com> (https://coolaj86.com/)",
|
||||||
|
"license": "MPL-2.0"
|
||||||
|
}
|
156
lib/rsa-extra.js
156
lib/rsa-extra.js
@ -1,156 +0,0 @@
|
|||||||
'use strict';
|
|
||||||
|
|
||||||
//var crypto = require('crypto');
|
|
||||||
var forge = require('node-forge');
|
|
||||||
|
|
||||||
function binstrToB64(binstr) {
|
|
||||||
return new Buffer(binstr, 'binary').toString('base64');
|
|
||||||
}
|
|
||||||
function b64ToBinstr(b64) {
|
|
||||||
return new Buffer(b64, 'b64').toString('binary');
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
importPemPrivateKey: function(pem) {
|
|
||||||
var key = forge.pki.privateKeyFromPem(pem);
|
|
||||||
return {
|
|
||||||
privateKey: exportPrivateKey(key),
|
|
||||||
publicKey: exportPublicKey(key)
|
|
||||||
};
|
|
||||||
},
|
|
||||||
|
|
||||||
importPemCertificate: function(pem) {
|
|
||||||
return forge.pki.certificateFromPem(pem);
|
|
||||||
},
|
|
||||||
|
|
||||||
privateKeyToPem: function(privateKey) {
|
|
||||||
var priv = importPrivateKey(privateKey);
|
|
||||||
return forge.pki.privateKeyToPem(priv);
|
|
||||||
},
|
|
||||||
|
|
||||||
certificateToPem: function(certificate) {
|
|
||||||
var derCert = base64ToBytes(certificate);
|
|
||||||
var cert = forge.pki.certificateFromAsn1(forge.asn1.fromDer(derCert));
|
|
||||||
return forge.pki.certificateToPem(cert);
|
|
||||||
},
|
|
||||||
*/
|
|
||||||
|
|
||||||
var extrac = module.exports = {
|
|
||||||
//
|
|
||||||
// internals
|
|
||||||
//
|
|
||||||
_forgeToPrivateJwk: function (keypair) {
|
|
||||||
var k = keypair._forge;
|
|
||||||
|
|
||||||
return {
|
|
||||||
kty: "RSA"
|
|
||||||
, n: binstrToB64(k.n.toByteArray())
|
|
||||||
, e: binstrToB64(k.e.toByteArray())
|
|
||||||
, d: binstrToB64(k.d.toByteArray())
|
|
||||||
, p: binstrToB64(k.p.toByteArray())
|
|
||||||
, q: binstrToB64(k.q.toByteArray())
|
|
||||||
, dp: binstrToB64(k.dP.toByteArray())
|
|
||||||
, dq: binstrToB64(k.dQ.toByteArray())
|
|
||||||
, qi: binstrToB64(k.qInv.toByteArray())
|
|
||||||
};
|
|
||||||
}
|
|
||||||
, _forgeToPublicJwk: function (keypair) {
|
|
||||||
var k = keypair._forge || keypair._forgePublic;
|
|
||||||
return {
|
|
||||||
kty: "RSA"
|
|
||||||
, n: binstrToB64(k.n.toByteArray())
|
|
||||||
, e: binstrToB64(k.e.toByteArray())
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Import Forge
|
|
||||||
//
|
|
||||||
, _forgeImportJwk: require('./rsa-forge')._forgeImportJwk
|
|
||||||
, _forgeImportPublicJwk: require('./rsa-forge')._forgeImportPublicJwk
|
|
||||||
, _forgeImportPem: function (keypair) {
|
|
||||||
keypair._forge = keypair._forge || forge.pki.privateKeyFromPem(keypair.privateKeyPem);
|
|
||||||
}
|
|
||||||
, _forgeImportPublicPem: function (keypair) {
|
|
||||||
keypair._forgePublic = keypair._forgePublic || forge.pki.publicKeyFromPem(keypair.publicKeyPem);
|
|
||||||
}
|
|
||||||
, importForge: function (keypair) {
|
|
||||||
extrac._forgeImportJwk(keypair);
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
extrac._forgeImportPem(keypair);
|
|
||||||
}
|
|
||||||
if (keypair.publicKeyPem) {
|
|
||||||
extrac._forgeImportPublicPem(keypair);
|
|
||||||
}
|
|
||||||
return keypair;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Export JWK
|
|
||||||
//
|
|
||||||
, exportPrivateJwk: function (keypair) {
|
|
||||||
var hasUrsaPrivate = keypair._ursa && true;
|
|
||||||
var hasPrivatePem = keypair.privateKeyPem && true;
|
|
||||||
var hasForgePrivate = keypair._forge && keypair._forge && true;
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk) {
|
|
||||||
return keypair.privateKeyJwk;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!hasForgePrivate) {
|
|
||||||
if (hasUrsaPrivate && !hasPrivatePem) {
|
|
||||||
keypair.privateKeyPem = keypair._ursa.toPrivatePem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
extrac._forgeImportPem(keypair);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._forge && keypair._forge) {
|
|
||||||
return extrac._forgeToPrivateJwk(keypair);
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of privateKeyPem, _ursa, _forge, or privateKeyJwk found. No way to export private key Jwk");
|
|
||||||
}
|
|
||||||
, exportPublicJwk: function (keypair) {
|
|
||||||
var hasUrsaPublic = (keypair._ursa || keypair._ursaPublic) && true;
|
|
||||||
var hasPublicPem = (keypair.privateKeyPem || keypair.publicKeyPem) && true;
|
|
||||||
var hasForgePublic = keypair._forge && true;
|
|
||||||
|
|
||||||
if (keypair.publicKeyJwk) {
|
|
||||||
return keypair.publicKeyJwk;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk) {
|
|
||||||
return {
|
|
||||||
kty: 'RSA'
|
|
||||||
, n: keypair.privateKeyJwk.n
|
|
||||||
, e: keypair.privateKeyJwk.e
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!hasForgePublic) {
|
|
||||||
if (hasUrsaPublic && !hasPublicPem) {
|
|
||||||
keypair.publicKeyPem = (keypair._ursa || keypair._ursaPublic).toPublicPem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.publicKeyPem) {
|
|
||||||
extrac._forgeImportPublicPem(keypair);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._forge && keypair._forge) {
|
|
||||||
return extrac._forgeToPublicJwk(keypair);
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of publicKeyPem privateKeyPem, _ursa, _forge, publicKeyJwk, or privateKeyJwk found. No way to export private key Jwk");
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
};
|
|
154
lib/rsa-forge.js
154
lib/rsa-forge.js
@ -1,154 +0,0 @@
|
|||||||
'use strict';
|
|
||||||
|
|
||||||
var forge = require('node-forge');
|
|
||||||
|
|
||||||
function notToJson() {
|
|
||||||
return undefined;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
function importPrivateKey(privateKey) {
|
|
||||||
return forge.pki.rsa.setPrivateKey(
|
|
||||||
base64ToBn(privateKey.n)
|
|
||||||
, base64ToBn(privateKey.e)
|
|
||||||
, base64ToBn(privateKey.d)
|
|
||||||
, base64ToBn(privateKey.p)
|
|
||||||
, base64ToBn(privateKey.q)
|
|
||||||
, base64ToBn(privateKey.dp)
|
|
||||||
, base64ToBn(privateKey.dq)
|
|
||||||
, base64ToBn(privateKey.qi)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function importPublicKey(publicKey) {
|
|
||||||
return forge.pki.rsa.setPublicKey(
|
|
||||||
base64ToBn(publicKey.n),
|
|
||||||
base64ToBn(publicKey.e));
|
|
||||||
}
|
|
||||||
*/
|
|
||||||
|
|
||||||
var forgec = module.exports = {
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// to components
|
|
||||||
//
|
|
||||||
_toStandardBase64: function (str) {
|
|
||||||
var b64 = str.replace(/-/g, "+").replace(/_/g, "/").replace(/=/g, "");
|
|
||||||
|
|
||||||
switch (b64.length % 4) {
|
|
||||||
case 2: b64 += "=="; break;
|
|
||||||
case 3: b64 += "="; break;
|
|
||||||
}
|
|
||||||
|
|
||||||
return b64;
|
|
||||||
}
|
|
||||||
, _base64ToBin: function (base64) {
|
|
||||||
var std64 = forgec._toStandardBase64(base64);
|
|
||||||
var hex = new Buffer(std64, 'base64').toString("hex");
|
|
||||||
|
|
||||||
return new forge.jsbn.BigInteger(hex, 16);
|
|
||||||
}
|
|
||||||
, _privateJwkToComponents: function (jwk) {
|
|
||||||
var components = [];
|
|
||||||
|
|
||||||
// [ 'n', 'e', 'd', 'p', 'q', 'dP', 'dQ', 'qInv' ]
|
|
||||||
[ 'n', 'e', 'd', 'p', 'q', 'dp', 'dq', 'qi' ].forEach(function (key) {
|
|
||||||
components.push(forgec._base64ToBin(jwk[key]));
|
|
||||||
});
|
|
||||||
|
|
||||||
return components;
|
|
||||||
}
|
|
||||||
, _publicJwkToComponents: function (jwk) {
|
|
||||||
var components = [];
|
|
||||||
[ 'n', 'e' ].forEach(function (key) {
|
|
||||||
components.push(new Buffer(jwk[key], 'base64'));
|
|
||||||
});
|
|
||||||
|
|
||||||
return components;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Generate New Keypair
|
|
||||||
//
|
|
||||||
, generateKeypair: function (bitlen, exp, options, cb) {
|
|
||||||
var fkeypair = forge.pki.rsa.generateKeyPair({ bits: bitlen || 1024, e: exp || 0x10001 });
|
|
||||||
|
|
||||||
fkeypair.toJSON = notToJson;
|
|
||||||
|
|
||||||
cb(null, {
|
|
||||||
_forge: fkeypair.privateKey
|
|
||||||
, _forgePublic: fkeypair.publicKey
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Import (no-op)
|
|
||||||
//
|
|
||||||
, _forgeImportJwk: function (keypair) {
|
|
||||||
keypair._forge = keypair._forge || forge.pki.rsa.setPrivateKey.apply(
|
|
||||||
forge.pki.rsa
|
|
||||||
, forgec._privateJwkToComponents(keypair.privateKeyJwk)
|
|
||||||
);
|
|
||||||
keypair._forge.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
, _forgeImportPublicJwk: function (keypair) {
|
|
||||||
keypair._forgePublic = keypair._forgePublic || forge.pki.rsa.setPublicKey.apply(
|
|
||||||
forge.pki.rsa
|
|
||||||
, forgec._publicJwkToComponents(keypair.publicKeyJwk)
|
|
||||||
);
|
|
||||||
keypair._forgePublic.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
, import: function (keypair) {
|
|
||||||
// no-op since this must be done anyway in extra
|
|
||||||
return keypair;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Export Public / Private PEMs
|
|
||||||
//
|
|
||||||
, exportPrivatePem: function (keypair) {
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
return keypair.privateKeyPem;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk && !(keypair._forge && keypair._forge)) {
|
|
||||||
forgec._forgeImportJwk(keypair);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._forge && keypair._forge) {
|
|
||||||
return forge.pki.privateKeyToPem(keypair._forge);
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of privateKeyPem, _forge, or privateKeyJwk found. No way to export private key PEM");
|
|
||||||
}
|
|
||||||
, exportPublicPem: function (keypair) {
|
|
||||||
if (keypair.publicKeyPem) {
|
|
||||||
return keypair.publicKeyPem;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((keypair.privateKeyJwk || keypair.publicKeyJwk)
|
|
||||||
&& !(keypair._forge && (keypair._forge || keypair._forgePublic))
|
|
||||||
) {
|
|
||||||
forgec._forgeImportPublicJwk(keypair);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._forge) {
|
|
||||||
return forge.pki.publicKeyToPem(keypair._forgePublic || keypair._forge);
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of publicKeyPem, _forge, publicKeyJwk, privateKeyPem, or privateKeyJwk found. No way to export public key PEM");
|
|
||||||
}
|
|
||||||
//, exportPrivateKeyJwk: NOT IMPLEMENTED HERE
|
|
||||||
//, exportPublicKeyJwk: NOT IMPLEMENTED HERE
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
};
|
|
167
lib/rsa-ursa.js
167
lib/rsa-ursa.js
@ -1,167 +0,0 @@
|
|||||||
'use strict';
|
|
||||||
|
|
||||||
var ursa = require('ursa');
|
|
||||||
|
|
||||||
function notToJson() {
|
|
||||||
return undefined;
|
|
||||||
}
|
|
||||||
|
|
||||||
var ursac = module.exports = {
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// to components
|
|
||||||
//
|
|
||||||
_privateJwkToComponents: function (jwk) {
|
|
||||||
var components = [];
|
|
||||||
|
|
||||||
[ 'n', 'e', 'p', 'q', 'dp', 'dq', 'qi', 'd' ].forEach(function (key) {
|
|
||||||
components.push(new Buffer(jwk[key], 'base64'));
|
|
||||||
});
|
|
||||||
|
|
||||||
return components;
|
|
||||||
}
|
|
||||||
, _publicJwkToComponents: function (jwk) {
|
|
||||||
var components = [];
|
|
||||||
[ 'n', 'e' ].forEach(function (key) {
|
|
||||||
components.push(new Buffer(jwk[key], 'base64'));
|
|
||||||
});
|
|
||||||
|
|
||||||
return components;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Generate New Keypair
|
|
||||||
//
|
|
||||||
, generateKeypair: function (bitlen, exp, options, cb) {
|
|
||||||
var keypair = ursa.generatePrivateKey(bitlen || 2048, exp || 65537);
|
|
||||||
|
|
||||||
keypair.toJSON = notToJson;
|
|
||||||
|
|
||||||
cb(null, {
|
|
||||||
_ursa: keypair
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Import
|
|
||||||
//
|
|
||||||
, _ursaImportPem: function (keypair) {
|
|
||||||
if (keypair._ursa) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
keypair._ursa = ursa.createPrivateKey(keypair.privateKeyPem);
|
|
||||||
keypair._ursa.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
else if (keypair.publicKeyPem) {
|
|
||||||
ursac._ursaImportPublicPem(keypair);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
, _ursaImportPublicPem: function (keypair) {
|
|
||||||
if (keypair._ursa || keypair._ursaPublic) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.publicKeyPem) {
|
|
||||||
keypair._ursaPublic = ursa.createPublicKey(keypair.publicKeyPem);
|
|
||||||
keypair._ursaPublic.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
, _ursaImportJwk: function (keypair) {
|
|
||||||
if (keypair._ursa) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk) {
|
|
||||||
keypair._ursa = ursa.createPrivateKeyFromComponents.apply(
|
|
||||||
ursa
|
|
||||||
, ursac._privateJwkToComponents(keypair.privateKeyJwk)
|
|
||||||
);
|
|
||||||
keypair._ursa.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
else if (keypair.publicKeyJwk) {
|
|
||||||
ursac._ursaImportPublicJwk(keypair);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
, _ursaImportPublicJwk: function (keypair) {
|
|
||||||
if (keypair._ursa || keypair._ursaPublic) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
keypair._ursaPublic = ursa.createPublicKeyFromComponents.apply(
|
|
||||||
ursa
|
|
||||||
, ursac._publicJwkToComponents(keypair.publicKeyJwk)
|
|
||||||
);
|
|
||||||
keypair._ursaPublic.toJSON = notToJson;
|
|
||||||
}
|
|
||||||
, import: function (keypair) {
|
|
||||||
ursac._ursaImportJwk(keypair);
|
|
||||||
ursac._ursaImportPem(keypair);
|
|
||||||
|
|
||||||
return keypair;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//
|
|
||||||
// Export Public / Private PEMs
|
|
||||||
//
|
|
||||||
, exportPrivatePem: function (keypair) {
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
return keypair.privateKeyPem;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._ursa) {
|
|
||||||
return keypair._ursa.toPrivatePem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk) {
|
|
||||||
ursac._ursaImportJwk(keypair);
|
|
||||||
|
|
||||||
return keypair._ursa.toPrivatePem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of privateKeyPem, _ursa, or privateKeyJwk found. No way to export private key PEM");
|
|
||||||
}
|
|
||||||
, exportPublicPem: function (keypair) {
|
|
||||||
if (keypair.publicKeyPem) {
|
|
||||||
return keypair.publicKeyPem;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair._ursa || keypair._ursaPublic) {
|
|
||||||
return (keypair._ursa || keypair._ursaPublic).toPublicPem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.publicKeyJwk) {
|
|
||||||
ursac._ursaImportPublicJwk(keypair);
|
|
||||||
|
|
||||||
return keypair._ursa.toPublicPem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyJwk) {
|
|
||||||
ursac._ursaImportJwk(keypair);
|
|
||||||
|
|
||||||
return keypair._ursa.toPublicPem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.privateKeyPem) {
|
|
||||||
ursac._ursaImportPem(keypair);
|
|
||||||
|
|
||||||
return keypair._ursa.toPublicPem().toString('ascii');
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error("None of publicKeyPem, _ursa, publicKeyJwk, privateKeyPem, or privateKeyJwk found. No way to export public key PEM");
|
|
||||||
}
|
|
||||||
//, exportPrivateKeyJwk: NOT IMPLEMENTED HERE
|
|
||||||
//, exportPublicKeyJwk: NOT IMPLEMENTED HERE
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
};
|
|
213
lib/rsa.js
Normal file
213
lib/rsa.js
Normal file
@ -0,0 +1,213 @@
|
|||||||
|
// Copyright 2016-2018 AJ ONeal. All rights reserved
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var RSA = module.exports;
|
||||||
|
RSA.utils = {};
|
||||||
|
|
||||||
|
try {
|
||||||
|
require('buffer-v6-polyfill');
|
||||||
|
} catch(e) {
|
||||||
|
/* ignore */
|
||||||
|
}
|
||||||
|
|
||||||
|
var Keypairs = require('keypairs');
|
||||||
|
var RSACSR = require('./rsa-csr');
|
||||||
|
var NOBJ = {};
|
||||||
|
var DEFAULT_BITLEN = 2048;
|
||||||
|
var DEFAULT_EXPONENT = 0x10001;
|
||||||
|
|
||||||
|
RSA.generateKeypair = function (options, cb, extra1, extra2) {
|
||||||
|
var length;
|
||||||
|
var exponent;
|
||||||
|
if ('function' === typeof extra2) {
|
||||||
|
length = options || DEFAULT_BITLEN;
|
||||||
|
exponent = cb || DEFAULT_EXPONENT;
|
||||||
|
options = extra1 || NOBJ;
|
||||||
|
cb = extra2;
|
||||||
|
} else {
|
||||||
|
if (!options) { options = NOBJ; }
|
||||||
|
length = options.bitlen || DEFAULT_BITLEN;
|
||||||
|
exponent = options.exp || DEFAULT_EXPONENT;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
var keypair = require('./generate-privkey.js')(length, exponent);
|
||||||
|
keypair.thumbprint = RSA.thumbprint(keypair);
|
||||||
|
cb(null, keypair);
|
||||||
|
} catch(e) {
|
||||||
|
cb(e);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.import = function (options) {
|
||||||
|
options = JSON.parse(JSON.stringify(options));
|
||||||
|
|
||||||
|
// Private Keys
|
||||||
|
if (options.privateKeyPem) {
|
||||||
|
if (!options.privateKeyJwk) {
|
||||||
|
options.privateKeyJwk = Keypairs._importSync({ pem: options.privateKeyPem });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (options.privateKeyJwk) {
|
||||||
|
if (!options.privateKeyPem) {
|
||||||
|
options.privateKeyPem = Keypairs._exportSync({
|
||||||
|
jwk: options.privateKeyJwk
|
||||||
|
, format: options.format || 'pkcs1'
|
||||||
|
, encoding: options.encoding || 'pem'
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Public Keys
|
||||||
|
if (options.publicKeyPem || options.privateKeyPem) {
|
||||||
|
if (!options.publicKeyJwk) {
|
||||||
|
options.publicKeyJwk = Keypairs._importSync({
|
||||||
|
pem: options.publicKeyPem || options.privateKeyPem
|
||||||
|
, public: true
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (options.publicKeyJwk || options.privateKeyJwk) {
|
||||||
|
if (!options.publicKeyPem) {
|
||||||
|
options.publicKeyPem = Keypairs._exportSync({
|
||||||
|
jwk: options.publicKeyJwk || options.privateKeyJwk
|
||||||
|
, format: options.format || 'pkcs1'
|
||||||
|
, encoding: options.encoding || 'pem'
|
||||||
|
, public: true
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (!options.publicKeyPem) {
|
||||||
|
throw new Error("Error: no keys were present to import");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Consistent CRLF
|
||||||
|
if (options.privateKeyPem) {
|
||||||
|
options.privateKeyPem = options.privateKeyPem
|
||||||
|
.trim().replace(/[\r\n]+/g, '\r\n') + '\r\n';
|
||||||
|
}
|
||||||
|
options.publicKeyPem = options.publicKeyPem
|
||||||
|
.trim().replace(/[\r\n]+/g, '\r\n') + '\r\n';
|
||||||
|
|
||||||
|
// Thumbprint
|
||||||
|
if (!options.thumbprint) {
|
||||||
|
options.thumbprint = RSA._thumbprint(options);
|
||||||
|
}
|
||||||
|
|
||||||
|
return options;
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.exportPrivatePem = function (keypair) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
return keypair.privateKeyPem;
|
||||||
|
};
|
||||||
|
RSA.exportPublicPem = function (keypair) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
return keypair.publicKeyPem;
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.exportPrivateJwk = function (keypair) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
return keypair.privateKeyJwk;
|
||||||
|
};
|
||||||
|
RSA.exportPublicJwk = function (keypair) {
|
||||||
|
if (!keypair.publicKeyJwk) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
}
|
||||||
|
return keypair.publicKeyJwk;
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.signJws = RSA.generateJws = RSA.generateSignatureJws = RSA.generateSignatureJwk =
|
||||||
|
function (keypair, header, protect, payload) {
|
||||||
|
// old (keypair, payload, nonce)
|
||||||
|
var nonce;
|
||||||
|
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
keypair.publicKeyJwk = RSA.exportPublicJwk(keypair);
|
||||||
|
|
||||||
|
if ('string' === typeof protect || ('undefined' === typeof protect && 'undefined' === typeof payload)) {
|
||||||
|
console.warn("deprecation notice: new signature for signJws(keypair, header, protect, payload)");
|
||||||
|
// old API
|
||||||
|
payload = header;
|
||||||
|
nonce = protect;
|
||||||
|
protect = undefined;
|
||||||
|
header = {
|
||||||
|
alg: "RS256"
|
||||||
|
, jwk: keypair.publicKeyJwk
|
||||||
|
};
|
||||||
|
protect = { nonce: nonce };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Compute JWS signature
|
||||||
|
var protectedHeader = "";
|
||||||
|
if (protect) {
|
||||||
|
protectedHeader = JSON.stringify(protect); // { alg: prot.alg, nonce: prot.nonce, url: prot.url });
|
||||||
|
}
|
||||||
|
var protected64 = RSA.utils.toWebsafeBase64(Buffer.from(protectedHeader).toString('base64'));
|
||||||
|
var payload64 = RSA.utils.toWebsafeBase64(payload.toString('base64'));
|
||||||
|
var raw = protected64 + "." + payload64;
|
||||||
|
var pem = RSA.exportPrivatePem(keypair);
|
||||||
|
var signer = require('crypto').createSign("RSA-SHA256");
|
||||||
|
signer.update(raw);
|
||||||
|
|
||||||
|
return {
|
||||||
|
header: header
|
||||||
|
, protected: protected64
|
||||||
|
, payload: payload64
|
||||||
|
, signature: signer.sign(pem, 'base64')
|
||||||
|
.replace(/\+/g, '-')
|
||||||
|
.replace(/\//g, '_')
|
||||||
|
.replace(/=/g, '')
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.generateCsrPem = function (keypair, domains) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
return RSACSR.sync({ jwk: keypair.privateKeyJwk, domains: domains });
|
||||||
|
};
|
||||||
|
RSA.generateCsrDer = function (keypair, domains) {
|
||||||
|
keypair = RSA.import(keypair);
|
||||||
|
return RSACSR.sync({
|
||||||
|
jwk: keypair.privateKeyJwk
|
||||||
|
, domains: domains
|
||||||
|
, encoding: 'der'
|
||||||
|
});
|
||||||
|
};
|
||||||
|
RSA.generateCsrDerWeb64 =RSA.generateCsrWeb64 = function (keypair, names) {
|
||||||
|
var buf = RSA.generateCsrDer(keypair, names);
|
||||||
|
var b64 = buf.toString('base64');
|
||||||
|
return RSA.utils.toWebsafeBase64(b64);
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA._thumbprintInput = function (n, e) {
|
||||||
|
// #L147 const rsaThumbprintTemplate = `{"e":"%s","kty":"RSA","n":"%s"}`
|
||||||
|
return Buffer.from('{"e":"'+ e + '","kty":"RSA","n":"'+ n +'"}', 'ascii');
|
||||||
|
};
|
||||||
|
RSA._thumbprint = function (keypair) {
|
||||||
|
var publicKeyJwk = keypair.publicKeyJwk;
|
||||||
|
|
||||||
|
if (!publicKeyJwk.e || !publicKeyJwk.n) {
|
||||||
|
throw new Error("You must provide an RSA jwk with 'e' and 'n' (the public components)");
|
||||||
|
}
|
||||||
|
|
||||||
|
var input = RSA._thumbprintInput(publicKeyJwk.n, publicKeyJwk.e);
|
||||||
|
var base64Digest = require('crypto').createHash('sha256').update(input).digest('base64');
|
||||||
|
|
||||||
|
return RSA.utils.toWebsafeBase64(base64Digest);
|
||||||
|
};
|
||||||
|
RSA.thumbprint = function (keypair) {
|
||||||
|
if (!keypair.publicKeyJwk) {
|
||||||
|
keypair.publicKeyJwk = RSA.exportPublicJwk(keypair);
|
||||||
|
}
|
||||||
|
return RSA._thumbprint(keypair);
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.utils.toWebsafeBase64 = function (b64) {
|
||||||
|
return b64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g,"");
|
||||||
|
};
|
||||||
|
|
||||||
|
RSA.exportPrivateKey = RSA.exportPrivatePem;
|
||||||
|
RSA.exportPublicKey = RSA.exportPublicPem;
|
111
lib/telemetry.js
Normal file
111
lib/telemetry.js
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
// We believe in a proactive approach to sustainable open source.
|
||||||
|
// As part of that we make it easy for you to opt-in to following our progress
|
||||||
|
// and we also stay up-to-date on telemetry such as operating system and node
|
||||||
|
// version so that we can focus our efforts where they'll have the greatest impact.
|
||||||
|
//
|
||||||
|
// Want to learn more about our Terms, Privacy Policy, and Mission?
|
||||||
|
// Check out https://therootcompany.com/legal/
|
||||||
|
|
||||||
|
var os = require('os');
|
||||||
|
var crypto = require('crypto');
|
||||||
|
var https = require('https');
|
||||||
|
var pkg = require('../package.json');
|
||||||
|
|
||||||
|
// to help focus our efforts in the right places
|
||||||
|
var data = {
|
||||||
|
package: pkg.name
|
||||||
|
, version: pkg.version
|
||||||
|
, node: process.version
|
||||||
|
, arch: process.arch || os.arch()
|
||||||
|
, platform: process.platform || os.platform()
|
||||||
|
, release: os.release()
|
||||||
|
};
|
||||||
|
|
||||||
|
function addCommunityMember(opts) {
|
||||||
|
setTimeout(function () {
|
||||||
|
var req = https.request({
|
||||||
|
hostname: 'api.therootcompany.com'
|
||||||
|
, port: 443
|
||||||
|
, path: '/api/therootcompany.com/public/community'
|
||||||
|
, method: 'POST'
|
||||||
|
, headers: { 'Content-Type': 'application/json' }
|
||||||
|
}, function (resp) {
|
||||||
|
// let the data flow, so we can ignore it
|
||||||
|
resp.on('data', function () {});
|
||||||
|
//resp.on('data', function (chunk) { console.log(chunk.toString()); });
|
||||||
|
resp.on('error', function () { /*ignore*/ });
|
||||||
|
//resp.on('error', function (err) { console.error(err); });
|
||||||
|
});
|
||||||
|
var obj = JSON.parse(JSON.stringify(data));
|
||||||
|
obj.action = 'updates';
|
||||||
|
try {
|
||||||
|
obj.ppid = ppid(obj.action);
|
||||||
|
} catch(e) {
|
||||||
|
// ignore
|
||||||
|
//console.error(e);
|
||||||
|
}
|
||||||
|
obj.name = opts.name || undefined;
|
||||||
|
obj.address = opts.email;
|
||||||
|
obj.community = 'node.js@therootcompany.com';
|
||||||
|
|
||||||
|
req.write(JSON.stringify(obj, 2, null));
|
||||||
|
req.end();
|
||||||
|
req.on('error', function () { /*ignore*/ });
|
||||||
|
//req.on('error', function (err) { console.error(err); });
|
||||||
|
}, 50);
|
||||||
|
}
|
||||||
|
|
||||||
|
function ping(action) {
|
||||||
|
setTimeout(function () {
|
||||||
|
var req = https.request({
|
||||||
|
hostname: 'api.therootcompany.com'
|
||||||
|
, port: 443
|
||||||
|
, path: '/api/therootcompany.com/public/ping'
|
||||||
|
, method: 'POST'
|
||||||
|
, headers: { 'Content-Type': 'application/json' }
|
||||||
|
}, function (resp) {
|
||||||
|
// let the data flow, so we can ignore it
|
||||||
|
resp.on('data', function () { });
|
||||||
|
//resp.on('data', function (chunk) { console.log(chunk.toString()); });
|
||||||
|
resp.on('error', function () { /*ignore*/ });
|
||||||
|
//resp.on('error', function (err) { console.error(err); });
|
||||||
|
});
|
||||||
|
var obj = JSON.parse(JSON.stringify(data));
|
||||||
|
obj.action = action;
|
||||||
|
try {
|
||||||
|
obj.ppid = ppid(obj.action);
|
||||||
|
} catch(e) {
|
||||||
|
// ignore
|
||||||
|
//console.error(e);
|
||||||
|
}
|
||||||
|
|
||||||
|
req.write(JSON.stringify(obj, 2, null));
|
||||||
|
req.end();
|
||||||
|
req.on('error', function (/*e*/) { /*console.error('req.error', e);*/ });
|
||||||
|
}, 50);
|
||||||
|
}
|
||||||
|
|
||||||
|
// to help identify unique installs without getting
|
||||||
|
// the personally identifiable info that we don't want
|
||||||
|
function ppid(action) {
|
||||||
|
var parts = [ action, data.package, data.version, data.node, data.arch, data.platform, data.release ];
|
||||||
|
var ifaces = os.networkInterfaces();
|
||||||
|
Object.keys(ifaces).forEach(function (ifname) {
|
||||||
|
if (/^en/.test(ifname) || /^eth/.test(ifname) || /^wl/.test(ifname)) {
|
||||||
|
if (ifaces[ifname] && ifaces[ifname].length) {
|
||||||
|
parts.push(ifaces[ifname][0].mac);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
return crypto.createHash('sha1').update(parts.join(',')).digest('base64');
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports.ping = ping;
|
||||||
|
module.exports.joinCommunity = addCommunityMember;
|
||||||
|
|
||||||
|
if (require.main === module) {
|
||||||
|
ping('install');
|
||||||
|
//addCommunityMember({ name: "AJ ONeal", email: 'coolaj86@gmail.com' });
|
||||||
|
}
|
174
node.js
174
node.js
@ -1,174 +0,0 @@
|
|||||||
/*!
|
|
||||||
* rsa-compat
|
|
||||||
* Copyright(c) 2016 AJ ONeal <aj@daplie.com> https://daplie.com
|
|
||||||
* Apache-2.0 OR MIT (and hence also MPL 2.0)
|
|
||||||
*/
|
|
||||||
'use strict';
|
|
||||||
var RSA = {};
|
|
||||||
var NOBJ = {};
|
|
||||||
|
|
||||||
function create(deps) {
|
|
||||||
var crypto = require('crypto');
|
|
||||||
|
|
||||||
deps = deps || {};
|
|
||||||
deps.NOBJ = {};
|
|
||||||
deps.RSA = RSA;
|
|
||||||
|
|
||||||
try {
|
|
||||||
RSA._URSA = require('ursa');
|
|
||||||
} catch(e) {
|
|
||||||
// ignore
|
|
||||||
}
|
|
||||||
|
|
||||||
RSA.utils = require('./lib/key-utils.js');
|
|
||||||
RSA.utils.toWebsafeBase64 = function (b64) {
|
|
||||||
return b64.replace(/[+]/g, "-").replace(/\//g, "_").replace(/=/g,"");
|
|
||||||
};
|
|
||||||
|
|
||||||
RSA.utils._bytesToBuffer = function (bytes) {
|
|
||||||
var forge = require("node-forge");
|
|
||||||
return new Buffer(forge.util.bytesToHex(bytes), "hex");
|
|
||||||
};
|
|
||||||
RSA._internal = require('./lib/node');//.create(deps);
|
|
||||||
|
|
||||||
RSA.thumbprint = function (jwk) {
|
|
||||||
jwk = jwk.privateKeyJwk || jwk.publicKeyJwk || jwk;
|
|
||||||
if (!jwk.e || !jwk.n) {
|
|
||||||
throw new Error("You must provide an RSA jwk with 'e' and 'n' (the public components)");
|
|
||||||
}
|
|
||||||
var input = RSA.utils._bytesToBuffer('{"e":"'+ jwk.e + '","kty":"RSA","n":"'+ jwk.n +'"}');
|
|
||||||
var base64Digest = crypto.createHash('sha256').update(input).digest('base64');
|
|
||||||
|
|
||||||
return RSA.utils.toWebsafeBase64(base64Digest);
|
|
||||||
};
|
|
||||||
|
|
||||||
RSA.generateKeypair = function (length, exponent, options, cb) {
|
|
||||||
var keypair = {
|
|
||||||
privateKeyPem: undefined
|
|
||||||
, publicKeyPem: undefined
|
|
||||||
, privateKeyJwk: undefined
|
|
||||||
, publicKeyJwk: undefined
|
|
||||||
, _ursa: undefined
|
|
||||||
, _forge: undefined
|
|
||||||
};
|
|
||||||
|
|
||||||
options = options || NOBJ;
|
|
||||||
|
|
||||||
RSA._internal.generateKeypair(length, exponent, options, function (err, keys) {
|
|
||||||
if (false !== options.jwk || options.thumbprint) {
|
|
||||||
keypair.privateKeyJwk = RSA._internal.exportPrivateJwk(keys);
|
|
||||||
if (options.public) {
|
|
||||||
keypair.publicKeyJwk = RSA._internal.exportPublicJwk(keys);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (options.pem) {
|
|
||||||
keypair.privateKeyPem = RSA._internal.exportPrivatePem(keys);
|
|
||||||
if (options.public) {
|
|
||||||
keypair.publicKeyPem = RSA._internal.exportPublicPem(keys);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (options.thumprint) {
|
|
||||||
keypair.thumbprint = RSA.thumbprint(keypair.privateKeyJwk /*|| keypair.publicKeyJwk*/);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (options.internal) {
|
|
||||||
//keypair._ursa = undefined;
|
|
||||||
//keypair._forge = undefined;
|
|
||||||
keypair._ursa = keys._ursa;
|
|
||||||
keypair._forge = keys._forge;
|
|
||||||
}
|
|
||||||
|
|
||||||
cb(null, keypair);
|
|
||||||
return;
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
RSA.import = function (keypair/*, options*/) {
|
|
||||||
//options = options || NOBJ; // ignore
|
|
||||||
if (keypair.privateKeyJwk || keypair.privateKeyPem || keypair._ursa || (keypair._forge && keypair._forge)) {
|
|
||||||
keypair.privateKeyJwk = RSA._internal.exportPrivateJwk(keypair, { internal: true });
|
|
||||||
//keypair.privateKeyPem = RSA._internal.exportPrivatePem(keypair, { internal: true });
|
|
||||||
return keypair;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (keypair.publicKeyJwk || keypair.publicKeyPem || keypair._ursaPublic || (keypair._forge && keypair._forgePublic)) {
|
|
||||||
keypair.publicKeyJwk = RSA._internal.exportPublicJwk(keypair, { internal: true });
|
|
||||||
//keypair.publicKeyPem = RSA._internal.exportPublicPem(keypair, { internal: true });
|
|
||||||
return keypair;
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new Error('found neither private nor public keypair in any supported format');
|
|
||||||
};
|
|
||||||
|
|
||||||
RSA._ursaGenerateSig = function (keypair, sha256Buf) {
|
|
||||||
var sig = keypair._ursa.sign('sha256', sha256Buf);
|
|
||||||
var sig64 = RSA.utils.toWebsafeBase64(sig.toString('base64'));
|
|
||||||
|
|
||||||
return sig64;
|
|
||||||
};
|
|
||||||
RSA._forgeGenerateSig = function (keypair, sha256Buf) {
|
|
||||||
var forge = require('node-forge');
|
|
||||||
var bufF = forge.util.createBuffer(sha256Buf.toString('binary'), 'binary');
|
|
||||||
var md = {
|
|
||||||
algorithm: 'sha256'
|
|
||||||
, blockLength: 64
|
|
||||||
, digestLength: 20
|
|
||||||
, digest: function () {
|
|
||||||
return bufF;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
var sigF = keypair._forge.sign(md);
|
|
||||||
var sig64 = RSA.utils.toWebsafeBase64(
|
|
||||||
new Buffer(forge.util.bytesToHex(sigF), "hex").toString('base64')
|
|
||||||
);
|
|
||||||
|
|
||||||
return sig64;
|
|
||||||
};
|
|
||||||
RSA.generateSignatureJwk = function (keypair, payload, nonce) {
|
|
||||||
keypair = RSA._internal.import(keypair);
|
|
||||||
keypair = RSA._internal.importForge(keypair);
|
|
||||||
keypair.publicKeyJwk = RSA.exportPublicJwk(keypair);
|
|
||||||
|
|
||||||
// Compute JWS signature
|
|
||||||
var protectedHeader = "";
|
|
||||||
if (nonce) {
|
|
||||||
protectedHeader = JSON.stringify({nonce: nonce});
|
|
||||||
}
|
|
||||||
var protected64 = RSA.utils.toWebsafeBase64(new Buffer(protectedHeader).toString('base64'));
|
|
||||||
var payload64 = RSA.utils.toWebsafeBase64(payload.toString('base64'));
|
|
||||||
var raw = protected64 + "." + payload64;
|
|
||||||
var sha256Buf = crypto.createHash('sha256').update(raw).digest();
|
|
||||||
var sig64;
|
|
||||||
|
|
||||||
if (RSA._URSA) {
|
|
||||||
sig64 = RSA._ursaGenerateSig(keypair, sha256Buf);
|
|
||||||
} else {
|
|
||||||
sig64 = RSA._forgeGenerateSig(keypair, sha256Buf);
|
|
||||||
}
|
|
||||||
|
|
||||||
return {
|
|
||||||
header: {
|
|
||||||
alg: "RS256"
|
|
||||||
, jwk: keypair.publicKeyJwk
|
|
||||||
}
|
|
||||||
, protected: protected64
|
|
||||||
, payload: payload64
|
|
||||||
, signature: sig64
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
RSA.exportPrivateKey = RSA._internal.exportPrivatePem;
|
|
||||||
RSA.exportPublicKey = RSA._internal.exportPublicPem;
|
|
||||||
RSA.exportPrivatePem = RSA._internal.exportPrivatePem;
|
|
||||||
RSA.exportPublicPem = RSA._internal.exportPublicPem;
|
|
||||||
|
|
||||||
RSA.exportPrivateJwk = RSA._internal.exportPrivateJwk;
|
|
||||||
RSA.exportPublicJwk = RSA._internal.exportPublicJwk;
|
|
||||||
|
|
||||||
return RSA;
|
|
||||||
}
|
|
||||||
|
|
||||||
module.exports.RSA = create(/*require('./lib/node')*/);
|
|
||||||
//module.exports.RSA.create = create;
|
|
27
package-lock.json
generated
Normal file
27
package-lock.json
generated
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
{
|
||||||
|
"name": "rsa-compat",
|
||||||
|
"version": "2.0.3",
|
||||||
|
"lockfileVersion": 1,
|
||||||
|
"requires": true,
|
||||||
|
"dependencies": {
|
||||||
|
"eckles": {
|
||||||
|
"version": "1.4.1",
|
||||||
|
"resolved": "https://registry.npmjs.org/eckles/-/eckles-1.4.1.tgz",
|
||||||
|
"integrity": "sha512-auWyk/k8oSkVHaD4RxkPadKsLUcIwKgr/h8F7UZEueFDBO7BsE4y+H6IMUDbfqKIFPg/9MxV6KcBdJCmVVcxSA=="
|
||||||
|
},
|
||||||
|
"keypairs": {
|
||||||
|
"version": "1.2.14",
|
||||||
|
"resolved": "https://registry.npmjs.org/keypairs/-/keypairs-1.2.14.tgz",
|
||||||
|
"integrity": "sha512-ZoZfZMygyB0QcjSlz7Rh6wT2CJasYEHBPETtmHZEfxuJd7bnsOG5AdtPZqHZBT+hoHvuWCp/4y8VmvTvH0Y9uA==",
|
||||||
|
"requires": {
|
||||||
|
"eckles": "^1.4.1",
|
||||||
|
"rasha": "^1.2.4"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"rasha": {
|
||||||
|
"version": "1.2.4",
|
||||||
|
"resolved": "https://registry.npmjs.org/rasha/-/rasha-1.2.4.tgz",
|
||||||
|
"integrity": "sha512-GsIwKv+hYSumJyK9wkTDaERLwvWaGYh1WuI7JMTBISfYt13TkKFU/HFzlY4n72p8VfXZRUYm0AqaYhkZVxOC3Q=="
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
37
package.json
37
package.json
@ -1,44 +1,47 @@
|
|||||||
{
|
{
|
||||||
"name": "rsa-compat",
|
"name": "rsa-compat",
|
||||||
"version": "1.1.0",
|
"version": "2.0.8",
|
||||||
|
"engines": {
|
||||||
|
"node": ">=10.12"
|
||||||
|
},
|
||||||
"description": "RSA utils that work on Windows, Mac, and Linux with or without C compiler",
|
"description": "RSA utils that work on Windows, Mac, and Linux with or without C compiler",
|
||||||
"main": "node.js",
|
"main": "index.js",
|
||||||
|
"bin": {
|
||||||
|
"rsa-keygen-js": "bin/rsa-keygen.js"
|
||||||
|
},
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"test": "node tests"
|
"test": "bash test.sh"
|
||||||
},
|
},
|
||||||
"repository": {
|
"repository": {
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "git+https://github.com/Daplie/rsa-compat.js.git"
|
"url": "https://git.coolaj86.com/coolaj86/rsa-compat.js.git"
|
||||||
},
|
},
|
||||||
"keywords": [
|
"keywords": [
|
||||||
"RSA",
|
"RSA",
|
||||||
"ursa",
|
"ursa",
|
||||||
"forge",
|
"forge",
|
||||||
"certificate",
|
"certificate",
|
||||||
|
"csr",
|
||||||
"tls",
|
"tls",
|
||||||
"ssl",
|
"ssl",
|
||||||
"javascript",
|
|
||||||
"js",
|
|
||||||
"node",
|
|
||||||
"node.js",
|
|
||||||
"windows",
|
"windows",
|
||||||
"mac",
|
"mac",
|
||||||
"linux",
|
"linux",
|
||||||
"macOS",
|
|
||||||
"win",
|
|
||||||
"key",
|
"key",
|
||||||
"jwk"
|
"jwk"
|
||||||
],
|
],
|
||||||
"author": "AJ ONeal <coolaj86@gmail.com> (https://coolaj86.com/)",
|
"author": "AJ ONeal <coolaj86@gmail.com> (https://coolaj86.com/)",
|
||||||
"license": "(MIT OR Apache-2.0)",
|
"license": "MPL-2.0",
|
||||||
"bugs": {
|
"bugs": {
|
||||||
"url": "https://github.com/Daplie/rsa-compat.js/issues"
|
"url": "https://git.coolaj86.com/coolaj86/rsa-compat.js/issues"
|
||||||
|
},
|
||||||
|
"homepage": "https://git.coolaj86.com/coolaj86/rsa-compat.js#readme",
|
||||||
|
"trulyOptionalDependencies": {
|
||||||
|
"buffer-v6-polyfill": "^1.0.3",
|
||||||
|
"node-forge": "^0.7.6",
|
||||||
|
"ursa-optional": "^0.9.10"
|
||||||
},
|
},
|
||||||
"homepage": "https://github.com/Daplie/rsa-compat.js#readme",
|
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"node-forge": "^0.6.41"
|
"keypairs": "^1.2.14"
|
||||||
},
|
|
||||||
"optionalDependencies": {
|
|
||||||
"ursa": "^0.9.4"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
8
test.sh
Normal file
8
test.sh
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
|
||||||
|
node tests/generate-csr.js
|
||||||
|
node tests/generate-key.js
|
||||||
|
node tests/generate-key-new.js
|
||||||
|
node tests/generate-sig.js
|
||||||
|
node tests/reciprocate.js
|
26
tests/generate-csr.js
Normal file
26
tests/generate-csr.js
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var RSA = require('../').RSA;
|
||||||
|
|
||||||
|
var keypair = {
|
||||||
|
privateKeyJwk: {
|
||||||
|
"kty": "RSA",
|
||||||
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
|
"e": "AQAB",
|
||||||
|
"d": "HT8DCrv69G3n9uFNovE4yMEMqW7lX0m75eJkMze3Jj5xNOa/4qlrc+4IuuA2uuyfY72IVQRxqqqXOuvS8ZForZZk+kWSd6z45hrpbNAAHH2Rf7XwnwHY8VJrOQF3UtbktTWqHX36ITZb9Hmf18hWsIeEp8Ng7Ru9h7hNuVxKMjk=",
|
||||||
|
"p": "AONjOvZVAvhCM2JnLGWJG3+5Boar3MB5P4ezfExDmuyGET/w0C+PS60jbjB8TivQsSdEcGo7GOaOlmAX6EQtAec=",
|
||||||
|
"q": "ANrllgJsy4rTMfa3mQ50kMIcNahiEOearhAcJgQUCHuOjuEnhU9FfExA/m5FXjmEFQhRwkuhk0QaIqTGbUzxGDs=",
|
||||||
|
"dp": "ALuxHOpYIatqeZ+wKiVllx1GTOy8z+rQKnCI5wDMjQTPZU2yKSYY0g6IQFwlPyFLke8nvuLxBQzKhbWsBjzAKeE=",
|
||||||
|
"dq": "XLhDAmPzE6rBzy+VtXnKl247jEd9wZzTfh9uOuwBa9TG0Lhcz2cvb11YaH0ZnGNGRW/cTQzzxDUN1531TlIRYQ==",
|
||||||
|
"qi": "AI2apz6ECfGwhsvIcU3+yFt+3CA78CUVsX4NUul5m3Cls2m+5MbGQG5K0hGpxjDC3OmXTq1Y5gnep5yUZvVPZI4="
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
var csrPem = RSA.generateCsrPem(keypair, ['example.com', 'www.example.com']);
|
||||||
|
var csr64 = RSA.generateCsrDerWeb64(keypair, ['example.com', 'www.example.com']);
|
||||||
|
console.log('');
|
||||||
|
console.log('DEBUG csrPem');
|
||||||
|
console.log(csrPem);
|
||||||
|
console.log('');
|
||||||
|
console.log('DEBUG csr64');
|
||||||
|
console.log(csr64);
|
33
tests/generate-key-new.js
Normal file
33
tests/generate-key-new.js
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var RSA = require('../').RSA;
|
||||||
|
|
||||||
|
RSA.generateKeypair(null, function (err, keys) {
|
||||||
|
if (!keys || !keys.privateKeyJwk) {
|
||||||
|
throw new Error("Expected privateKeyJwk, but it is missing");
|
||||||
|
}
|
||||||
|
|
||||||
|
var options = {
|
||||||
|
public: true // export public keys
|
||||||
|
, pem: true // export pems
|
||||||
|
, jwk: false // export jwks
|
||||||
|
, internal: true // preserve internal intermediate formats (_ursa, _forge)
|
||||||
|
//, thumbprint: true // JWK sha256 thumbprint
|
||||||
|
, bitlen: 2048
|
||||||
|
, exp: 65537
|
||||||
|
};
|
||||||
|
RSA.generateKeypair(options, function (err, keys) {
|
||||||
|
if (
|
||||||
|
(keys.publicKeyJwk && !keys.thumbprint)
|
||||||
|
|| !keys.privateKeyPem
|
||||||
|
|| !keys.publicKeyPem
|
||||||
|
//|| !keys.thumbprint
|
||||||
|
) {
|
||||||
|
console.error(Object.keys(keys));
|
||||||
|
throw new Error("Missing expected keys");
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log('All is well!');
|
||||||
|
});
|
||||||
|
|
||||||
|
});
|
@ -7,18 +7,6 @@ RSA.generateKeypair(null, null, null, function (err, keys) {
|
|||||||
throw new Error("Expected privateKeyJwk, but it is missing");
|
throw new Error("Expected privateKeyJwk, but it is missing");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (
|
|
||||||
keys.publicKeyJwk
|
|
||||||
|| keys.privateKeyPem
|
|
||||||
|| keys.publicKeyPem
|
|
||||||
|| keys.thumbprint
|
|
||||||
|| keys._ursa
|
|
||||||
|| keys._forge
|
|
||||||
) {
|
|
||||||
console.error(Object.keys(keys));
|
|
||||||
throw new Error("Got unexpected keys");
|
|
||||||
}
|
|
||||||
|
|
||||||
var options = {
|
var options = {
|
||||||
public: true // export public keys
|
public: true // export public keys
|
||||||
, pem: true // export pems
|
, pem: true // export pems
|
||||||
@ -32,7 +20,6 @@ RSA.generateKeypair(null, null, null, function (err, keys) {
|
|||||||
|| !keys.privateKeyPem
|
|| !keys.privateKeyPem
|
||||||
|| !keys.publicKeyPem
|
|| !keys.publicKeyPem
|
||||||
//|| !keys.thumbprint
|
//|| !keys.thumbprint
|
||||||
|| !(keys._ursa || keys._forge)
|
|
||||||
) {
|
) {
|
||||||
console.error(Object.keys(keys));
|
console.error(Object.keys(keys));
|
||||||
throw new Error("Missing expected keys");
|
throw new Error("Missing expected keys");
|
||||||
|
@ -5,14 +5,14 @@ var RSA = require('../').RSA;
|
|||||||
var keypair = {
|
var keypair = {
|
||||||
privateKeyJwk: {
|
privateKeyJwk: {
|
||||||
"kty": "RSA",
|
"kty": "RSA",
|
||||||
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK_Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY-2UPUS_GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
"e": "AQAB",
|
"e": "AQAB",
|
||||||
"d": "HT8DCrv69G3n9uFNovE4yMEMqW7lX0m75eJkMze3Jj5xNOa/4qlrc+4IuuA2uuyfY72IVQRxqqqXOuvS8ZForZZk+kWSd6z45hrpbNAAHH2Rf7XwnwHY8VJrOQF3UtbktTWqHX36ITZb9Hmf18hWsIeEp8Ng7Ru9h7hNuVxKMjk=",
|
"d": "HT8DCrv69G3n9uFNovE4yMEMqW7lX0m75eJkMze3Jj5xNOa_4qlrc-4IuuA2uuyfY72IVQRxqqqXOuvS8ZForZZk-kWSd6z45hrpbNAAHH2Rf7XwnwHY8VJrOQF3UtbktTWqHX36ITZb9Hmf18hWsIeEp8Ng7Ru9h7hNuVxKMjk=",
|
||||||
"p": "AONjOvZVAvhCM2JnLGWJG3+5Boar3MB5P4ezfExDmuyGET/w0C+PS60jbjB8TivQsSdEcGo7GOaOlmAX6EQtAec=",
|
"p": "AONjOvZVAvhCM2JnLGWJG3-5Boar3MB5P4ezfExDmuyGET_w0C-PS60jbjB8TivQsSdEcGo7GOaOlmAX6EQtAec=",
|
||||||
"q": "ANrllgJsy4rTMfa3mQ50kMIcNahiEOearhAcJgQUCHuOjuEnhU9FfExA/m5FXjmEFQhRwkuhk0QaIqTGbUzxGDs=",
|
"q": "ANrllgJsy4rTMfa3mQ50kMIcNahiEOearhAcJgQUCHuOjuEnhU9FfExA_m5FXjmEFQhRwkuhk0QaIqTGbUzxGDs=",
|
||||||
"dp": "ALuxHOpYIatqeZ+wKiVllx1GTOy8z+rQKnCI5wDMjQTPZU2yKSYY0g6IQFwlPyFLke8nvuLxBQzKhbWsBjzAKeE=",
|
"dp": "ALuxHOpYIatqeZ-wKiVllx1GTOy8z-rQKnCI5wDMjQTPZU2yKSYY0g6IQFwlPyFLke8nvuLxBQzKhbWsBjzAKeE=",
|
||||||
"dq": "XLhDAmPzE6rBzy+VtXnKl247jEd9wZzTfh9uOuwBa9TG0Lhcz2cvb11YaH0ZnGNGRW/cTQzzxDUN1531TlIRYQ==",
|
"dq": "XLhDAmPzE6rBzy-VtXnKl247jEd9wZzTfh9uOuwBa9TG0Lhcz2cvb11YaH0ZnGNGRW_cTQzzxDUN1531TlIRYQ==",
|
||||||
"qi": "AI2apz6ECfGwhsvIcU3+yFt+3CA78CUVsX4NUul5m3Cls2m+5MbGQG5K0hGpxjDC3OmXTq1Y5gnep5yUZvVPZI4="
|
"qi": "AI2apz6ECfGwhsvIcU3-yFt-3CA78CUVsX4NUul5m3Cls2m-5MbGQG5K0hGpxjDC3OmXTq1Y5gnep5yUZvVPZI4="
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ var ursaResult = {
|
|||||||
"alg": "RS256",
|
"alg": "RS256",
|
||||||
"jwk": {
|
"jwk": {
|
||||||
"kty": "RSA",
|
"kty": "RSA",
|
||||||
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK_Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY-2UPUS_GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
"e": "AQAB"
|
"e": "AQAB"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -35,7 +35,7 @@ var forgeResult = {
|
|||||||
"alg": "RS256",
|
"alg": "RS256",
|
||||||
"jwk": {
|
"jwk": {
|
||||||
"kty": "RSA",
|
"kty": "RSA",
|
||||||
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK_Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY-2UPUS_GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
|
||||||
"e": "AQAB"
|
"e": "AQAB"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -45,9 +45,9 @@ var forgeResult = {
|
|||||||
};
|
};
|
||||||
*/
|
*/
|
||||||
|
|
||||||
var jws = RSA.generateSignatureJwk(
|
var jws = RSA.signJws(
|
||||||
keypair
|
keypair
|
||||||
, new Buffer('24bcc5d4d04d095de47db279b05685c97f787c9b8bd87f88cdaa0137e7228879', 'hex')
|
, Buffer.from('24bcc5d4d04d095de47db279b05685c97f787c9b8bd87f88cdaa0137e7228879', 'hex')
|
||||||
, '8ef5624f5ec9d3ef'
|
, '8ef5624f5ec9d3ef'
|
||||||
);
|
);
|
||||||
|
|
||||||
|
1
tests/privkey.jwk
Normal file
1
tests/privkey.jwk
Normal file
@ -0,0 +1 @@
|
|||||||
|
{"kty":"RSA","n":"sdk_fKUwpygZjNuAt7804KFBZoeBXtJ5cMZyRDRCmPNZRjOqXSdMTY7We7W103Ivs97hz--quMg-R8smv3F1-4Quyfm5vXFQWPxYdrsfJzPkyku4lY8uWbZ8N0X1CM61NgQHOAwe8eHOM0zd-MECxrBASBzLuiq6Df-GpsridFivMYlFj7UTXm92ReFyOXZUZacXneCVWyUMIU6Faj8h2UVpaCCNsopT0fRoqoBIJ-qeXhDpbvfLfhbb25p79msutxN7mpGW9a3wL1LyoCTpMLqIlZSWKKDVCNyoTS9RH7lch-j8_DtL9VfNTPv1rw-n-N-LQDQH6z5j7ZanXiek0Q","e":"AQAB","d":"pQuaej8Gpql1BJ4TlvHvzWJ4wgCQk4G5x2myUw84mp6Cw75gpLA6hGNBMm8QPRjjogX-Ay1EftT9zzx9Sf6uYepqTW_d6ivFR79vDUhcAdKLyRx6QPkuJ31NSzI10qWZz3XviRjegtRtunfkKtxbii24ifOHMM5D-Yef2xu_Cf5RRZVSipZdLRlgttSW2t-lXCaFN1-F8ITPCEqaQGoHn5fk9eEhl2sd3r8BCN1xp_KTAyqxBt9inDr__YlYynXS9Y35Wu4Ofn9CszwiCrZxezWO6Mn0-T-woDYj3jsO7aRvWPOIcMSaL7KqbM1BIWKPJqtSXqc8uVs4ZcVEnB4pXQ","p":"6sx1OM-3ise7cQCOffWLxbB8xNfpQSpyC0_ZzNF-FNSpCfFiJ6GjhBhgddppdyLD8jR34ZO4sTM6ny575ez6XOVrSUHi4Cavnv7DH8PxWT3_IVGKYKbqQt63KdIKpxxC3EoG66VPCQvjJ-TgkjNhqPLFKDW9ihvHVQlsDrVcLss","q":"wehZNfic8h69BUp8ynQIqSaao--N4fKm_fOH8kvmsZQlns0Asiy2jTYnfZy0jN380x_A8Q2Bx15N5byokRzn3NzC3dni_Z87h-c0Upss7G4iIPDngUwAN0EnraXbzVAv1jWC7wdsYJgSOLxJ0QVcLN-yPPs12ESf3hTQS2XNS1M","dp":"OWt0w0bw8Mx1h2YGcsFIxDir2ouerGQP7bpCXjdhKQD0sczJHz4FOfmoJUobfpoO5z1zj8PLZ_JKRMFeZVU1yOAGA61MKVrsmepdl3gYnqVtrh09xPMs2NuUWXLXThS4OR0VYi1UDbdNfuUXEknkeSedlX7G8m5mqeIa_eHWQE8","dq":"P7zGBi2QOS3NZ_3SAyIc7qzXy-ckNg7ywSrZltVIITrXGtm7ztVPtB8G4A0wc9VME4GuhA2yiPwAkvFuXzSnKjwOeanzKPa8NLHUywpiu9x_r2BAWInI0GDEUBnipBwlfT3dqgBAqYeTBb8ubFxcrgthpRXV3x6_hdpFlWMDFi0","qi":"FnwWA6Flj9jp2vy_RL1WEDTSr2xCdVm3guNuUhwXIav5-tXm5kDca-4fJEGUiSYzh_MLApUT9U-97zV5Qfws-OAq6pDu1-34hU-w1xpKh1OKvKEOfvYGX1mdzu3FIaaB7RQSr_TW3AyOl29HP--lOcrsYmIK5xnuqc13MQ6Nss4"}
|
27
tests/privkey.pem
Normal file
27
tests/privkey.pem
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEowIBAAKCAQEAsdk/fKUwpygZjNuAt7804KFBZoeBXtJ5cMZyRDRCmPNZRjOq
|
||||||
|
XSdMTY7We7W103Ivs97hz++quMg+R8smv3F1+4Quyfm5vXFQWPxYdrsfJzPkyku4
|
||||||
|
lY8uWbZ8N0X1CM61NgQHOAwe8eHOM0zd+MECxrBASBzLuiq6Df+GpsridFivMYlF
|
||||||
|
j7UTXm92ReFyOXZUZacXneCVWyUMIU6Faj8h2UVpaCCNsopT0fRoqoBIJ+qeXhDp
|
||||||
|
bvfLfhbb25p79msutxN7mpGW9a3wL1LyoCTpMLqIlZSWKKDVCNyoTS9RH7lch+j8
|
||||||
|
/DtL9VfNTPv1rw+n+N+LQDQH6z5j7ZanXiek0QIDAQABAoIBAQClC5p6PwamqXUE
|
||||||
|
nhOW8e/NYnjCAJCTgbnHabJTDzianoLDvmCksDqEY0EybxA9GOOiBf4DLUR+1P3P
|
||||||
|
PH1J/q5h6mpNb93qK8VHv28NSFwB0ovJHHpA+S4nfU1LMjXSpZnPde+JGN6C1G26
|
||||||
|
d+Qq3FuKLbiJ84cwzkP5h5/bG78J/lFFlVKKll0tGWC21Jba36VcJoU3X4XwhM8I
|
||||||
|
SppAagefl+T14SGXax3evwEI3XGn8pMDKrEG32KcOv/9iVjKddL1jfla7g5+f0Kz
|
||||||
|
PCIKtnF7NY7oyfT5P7CgNiPeOw7tpG9Y84hwxJovsqpszUEhYo8mq1Jepzy5Wzhl
|
||||||
|
xUScHildAoGBAOrMdTjPt4rHu3EAjn31i8WwfMTX6UEqcgtP2czRfhTUqQnxYieh
|
||||||
|
o4QYYHXaaXciw/I0d+GTuLEzOp8ue+Xs+lzla0lB4uAmr57+wx/D8Vk9/yFRimCm
|
||||||
|
6kLetynSCqccQtxKBuulTwkL4yfk4JIzYajyxSg1vYobx1UJbA61XC7LAoGBAMHo
|
||||||
|
WTX4nPIevQVKfMp0CKkmmqPvjeHypv3zh/JL5rGUJZ7NALIsto02J32ctIzd/NMf
|
||||||
|
wPENgcdeTeW8qJEc59zcwt3Z4v2fO4fnNFKbLOxuIiDw54FMADdBJ62l281QL9Y1
|
||||||
|
gu8HbGCYEji8SdEFXCzfsjz7NdhEn94U0EtlzUtTAoGAOWt0w0bw8Mx1h2YGcsFI
|
||||||
|
xDir2ouerGQP7bpCXjdhKQD0sczJHz4FOfmoJUobfpoO5z1zj8PLZ/JKRMFeZVU1
|
||||||
|
yOAGA61MKVrsmepdl3gYnqVtrh09xPMs2NuUWXLXThS4OR0VYi1UDbdNfuUXEknk
|
||||||
|
eSedlX7G8m5mqeIa/eHWQE8CgYA/vMYGLZA5Lc1n/dIDIhzurNfL5yQ2DvLBKtmW
|
||||||
|
1UghOtca2bvO1U+0HwbgDTBz1UwTga6EDbKI/ACS8W5fNKcqPA55qfMo9rw0sdTL
|
||||||
|
CmK73H+vYEBYicjQYMRQGeKkHCV9Pd2qAECph5MFvy5sXFyuC2GlFdXfHr+F2kWV
|
||||||
|
YwMWLQKBgBZ8FgOhZY/Y6dr8v0S9VhA00q9sQnVZt4LjblIcFyGr+frV5uZA3Gvu
|
||||||
|
HyRBlIkmM4fzCwKVE/VPve81eUH8LPjgKuqQ7tft+IVPsNcaSodTiryhDn72Bl9Z
|
||||||
|
nc7txSGmge0UEq/01twMjpdvRz/vpTnK7GJiCucZ7qnNdzEOjbLO
|
||||||
|
-----END RSA PRIVATE KEY-----
|
86
tests/reciprocate.js
Normal file
86
tests/reciprocate.js
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
'use strict';
|
||||||
|
|
||||||
|
var RSA = require('../').RSA;
|
||||||
|
var fs = require('fs');
|
||||||
|
var path = require('path');
|
||||||
|
|
||||||
|
var privkeyPemRef = fs.readFileSync(path.join(__dirname, 'privkey.pem'), 'ascii');
|
||||||
|
var privkeyJwkRef = JSON.parse(fs.readFileSync(path.join(__dirname, 'privkey.jwk'), 'ascii'));
|
||||||
|
|
||||||
|
var refs = {
|
||||||
|
privPem: RSA.exportPrivatePem({ privateKeyJwk: privkeyJwkRef })
|
||||||
|
, privJwk: RSA.exportPrivateJwk({ privateKeyPem: privkeyPemRef })
|
||||||
|
};
|
||||||
|
|
||||||
|
var hasUrsa;
|
||||||
|
var imported;
|
||||||
|
|
||||||
|
try {
|
||||||
|
hasUrsa = require('ursa') && true;
|
||||||
|
} catch(e) {
|
||||||
|
hasUrsa = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
//
|
||||||
|
//
|
||||||
|
// PEM tests
|
||||||
|
//
|
||||||
|
//
|
||||||
|
console.log('JWK -> PEM ?', privkeyPemRef === refs.privPem);
|
||||||
|
if (privkeyPemRef !== refs.privPem) {
|
||||||
|
// Watch out for tricky whitespaces (\n instead of \r\n, trailing \r\n, etc)
|
||||||
|
console.log('REF:');
|
||||||
|
console.log(JSON.stringify(privkeyPemRef));
|
||||||
|
console.log('GEN:');
|
||||||
|
console.log(JSON.stringify(refs.privPem));
|
||||||
|
throw new Error("Failed to validate importedJwk against referencePem");
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log('PEM -> _ -> PEM ?', privkeyPemRef === refs.privPem);
|
||||||
|
if (hasUrsa) {
|
||||||
|
imported = RSA.import({ privateKeyPem: privkeyPemRef });
|
||||||
|
refs.privPem2 = RSA.exportPrivatePem({ _ursa: imported._ursa });
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
imported = RSA.import({ privateKeyPem: privkeyPemRef });
|
||||||
|
refs.privPem2 = RSA.exportPrivatePem(imported);
|
||||||
|
}
|
||||||
|
if (privkeyPemRef !== refs.privPem2) {
|
||||||
|
console.log('REF:');
|
||||||
|
console.log(JSON.stringify(privkeyPemRef));
|
||||||
|
console.log('GEN:');
|
||||||
|
console.log(JSON.stringify(refs.privPem2));
|
||||||
|
throw new Error("Failed to validate importedPem against referencePem");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
//
|
||||||
|
//
|
||||||
|
// JWK tests
|
||||||
|
//
|
||||||
|
//
|
||||||
|
console.log('PEM -> JWK ?', privkeyJwkRef.n === refs.privJwk.n);
|
||||||
|
if (![ 'kty', 'n', 'e', 'p', 'q', 'dp', 'dq', 'qi', 'd' ].every(function (k) {
|
||||||
|
return privkeyJwkRef[k] === refs.privJwk[k];
|
||||||
|
})) {
|
||||||
|
console.log('REF:');
|
||||||
|
console.log(privkeyJwkRef);
|
||||||
|
console.log('GEN:');
|
||||||
|
console.log(refs.privJwk);
|
||||||
|
throw new Error("Failed to validate importedPem against referenceJwk");
|
||||||
|
}
|
||||||
|
|
||||||
|
imported = RSA.import({ privateKeyJwk: privkeyJwkRef });
|
||||||
|
refs.privJwk2 = RSA.exportPrivateJwk(imported);
|
||||||
|
console.log('JWK -> _ -> JWK ?', privkeyJwkRef.n === refs.privJwk2.n);
|
||||||
|
if (privkeyJwkRef.n !== refs.privJwk2.n) {
|
||||||
|
console.log('REF:');
|
||||||
|
console.log(privkeyJwkRef);
|
||||||
|
console.log('GEN:');
|
||||||
|
console.log(refs.privJwk2);
|
||||||
|
throw new Error("Failed to validate importedJwk against referenceJwk");
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log('');
|
Loading…
x
Reference in New Issue
Block a user