| 
									
										
										
										
											2018-11-21 16:47:41 -07:00
										 |  |  | 'use strict'; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | var RSA = module.exports; | 
					
						
							| 
									
										
										
										
											2018-11-22 00:39:43 -07:00
										 |  |  | var SSH = require('./ssh.js'); | 
					
						
							| 
									
										
										
										
											2018-11-22 02:09:02 -07:00
										 |  |  | var PEM = require('./pem.js'); | 
					
						
							|  |  |  | var x509 = require('./x509.js'); | 
					
						
							|  |  |  | var ASN1 = require('./asn1.js'); | 
					
						
							| 
									
										
										
										
											2018-11-22 00:39:43 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-22 01:46:20 -07:00
										 |  |  | /*global Promise*/ | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  | RSA.importSync = function (opts) { | 
					
						
							|  |  |  |   if (!opts || !opts.pem || 'string' !== typeof opts.pem) { | 
					
						
							|  |  |  |     throw new Error("must pass { pem: pem } as a string"); | 
					
						
							|  |  |  |   } | 
					
						
							| 
									
										
										
										
											2018-11-22 04:05:00 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   var jwk = { kty: 'RSA', n: null, e: null }; | 
					
						
							|  |  |  |   if (0 === opts.pem.indexOf('ssh-rsa ')) { | 
					
						
							|  |  |  |     return SSH.parse(opts.pem, jwk); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  |   var pem = opts.pem; | 
					
						
							|  |  |  |   var block = PEM.parseBlock(pem); | 
					
						
							|  |  |  |   //var hex = toHex(u8);
 | 
					
						
							|  |  |  |   var asn1 = ASN1.parse(block.der); | 
					
						
							| 
									
										
										
										
											2018-11-22 02:09:02 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   var meta = x509.guess(block.der, asn1); | 
					
						
							| 
									
										
										
										
											2018-11-22 01:46:20 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   if ('pkcs1' === meta.format) { | 
					
						
							|  |  |  |     jwk = x509.parsePkcs1(block.der, asn1, jwk); | 
					
						
							|  |  |  |   } else { | 
					
						
							|  |  |  |     jwk = x509.parsePkcs8(block.der, asn1, jwk); | 
					
						
							|  |  |  |   } | 
					
						
							| 
									
										
										
										
											2018-11-22 01:46:20 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   if (opts.public) { | 
					
						
							|  |  |  |     jwk = RSA.nueter(jwk); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  |   return jwk; | 
					
						
							|  |  |  | }; | 
					
						
							|  |  |  | RSA.parse = function parseRsa(opts) { | 
					
						
							|  |  |  |   // wrapped in a promise for API compatibility
 | 
					
						
							|  |  |  |   // with the forthcoming browser version
 | 
					
						
							|  |  |  |   // (and potential future native node capability)
 | 
					
						
							|  |  |  |   return Promise.resolve().then(function () { | 
					
						
							|  |  |  |     return RSA.importSync(opts); | 
					
						
							| 
									
										
										
										
											2018-11-22 01:46:20 -07:00
										 |  |  |   }); | 
					
						
							|  |  |  | }; | 
					
						
							|  |  |  | RSA.toJwk = RSA.import = RSA.parse; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-22 00:39:43 -07:00
										 |  |  | /* | 
					
						
							|  |  |  | RSAPrivateKey ::= SEQUENCE { | 
					
						
							|  |  |  |   version           Version, | 
					
						
							|  |  |  |   modulus           INTEGER,  -- n | 
					
						
							|  |  |  |   publicExponent    INTEGER,  -- e | 
					
						
							|  |  |  |   privateExponent   INTEGER,  -- d | 
					
						
							|  |  |  |   prime1            INTEGER,  -- p | 
					
						
							|  |  |  |   prime2            INTEGER,  -- q | 
					
						
							|  |  |  |   exponent1         INTEGER,  -- d mod (p-1) | 
					
						
							|  |  |  |   exponent2         INTEGER,  -- d mod (q-1) | 
					
						
							|  |  |  |   coefficient       INTEGER,  -- (inverse of q) mod p | 
					
						
							|  |  |  |   otherPrimeInfos   OtherPrimeInfos OPTIONAL | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  | RSA.exportSync = function (opts) { | 
					
						
							|  |  |  |   if (!opts || !opts.jwk || 'object' !== typeof opts.jwk) { | 
					
						
							|  |  |  |     throw new Error("must pass { jwk: jwk }"); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  |   var jwk = JSON.parse(JSON.stringify(opts.jwk)); | 
					
						
							|  |  |  |   var format = opts.format; | 
					
						
							|  |  |  |   var pub = opts.public; | 
					
						
							|  |  |  |   if (pub || -1 !== [ 'spki', 'pkix', 'ssh', 'rfc4716' ].indexOf(format)) { | 
					
						
							|  |  |  |     jwk = RSA.nueter(jwk); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  |   if ('RSA' !== jwk.kty) { | 
					
						
							|  |  |  |     throw new Error("options.jwk.kty must be 'RSA' for RSA keys"); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  |   if (!jwk.p) { | 
					
						
							|  |  |  |     // TODO test for n and e
 | 
					
						
							|  |  |  |     pub = true; | 
					
						
							|  |  |  |     if (!format || 'pkcs1' === format) { | 
					
						
							|  |  |  |       format = 'pkcs1'; | 
					
						
							|  |  |  |     } else if (-1 !== [ 'spki', 'pkix' ].indexOf(format)) { | 
					
						
							|  |  |  |       format = 'spki'; | 
					
						
							|  |  |  |     } else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) { | 
					
						
							|  |  |  |       format = 'ssh'; | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  |     } else { | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |       throw new Error("options.format must be 'spki', 'pkcs1', or 'ssh' for public RSA keys, not (" | 
					
						
							|  |  |  |         + typeof format + ") " + format); | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   } else { | 
					
						
							|  |  |  |     // TODO test for all necessary keys (d, p, q ...)
 | 
					
						
							|  |  |  |     if (!format || 'pkcs1' === format) { | 
					
						
							|  |  |  |       format = 'pkcs1'; | 
					
						
							|  |  |  |     } else if ('pkcs8' !== format) { | 
					
						
							|  |  |  |       throw new Error("options.format must be 'pkcs1' or 'pkcs8' for private RSA keys"); | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |   } | 
					
						
							| 
									
										
										
										
											2018-11-22 02:09:02 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   if ('pkcs1' === format) { | 
					
						
							|  |  |  |     if (jwk.d) { | 
					
						
							|  |  |  |       return PEM.packBlock({ type: "RSA PRIVATE KEY", bytes: x509.packPkcs1(jwk) }); | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  |     } else { | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |       return PEM.packBlock({ type: "RSA PUBLIC KEY", bytes: x509.packPkcs1(jwk) }); | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2018-11-23 12:18:13 -07:00
										 |  |  |   } else if ('pkcs8' === format) { | 
					
						
							|  |  |  |     return PEM.packBlock({ type: "PRIVATE KEY", bytes: x509.packPkcs8(jwk) }); | 
					
						
							|  |  |  |   } else if (-1 !== [ 'spki', 'pkix' ].indexOf(format)) { | 
					
						
							|  |  |  |     return PEM.packBlock({ type: "PUBLIC KEY", bytes: x509.packSpki(jwk) }); | 
					
						
							|  |  |  |   } else if (-1 !== [ 'ssh', 'rfc4716' ].indexOf(format)) { | 
					
						
							|  |  |  |     return SSH.pack({ jwk: jwk, comment: opts.comment }); | 
					
						
							|  |  |  |   } else { | 
					
						
							|  |  |  |     throw new Error("Sanity Error: reached unreachable code block with format: " + format); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | }; | 
					
						
							|  |  |  | RSA.pack = function (opts) { | 
					
						
							|  |  |  |   // wrapped in a promise for API compatibility
 | 
					
						
							|  |  |  |   // with the forthcoming browser version
 | 
					
						
							|  |  |  |   // (and potential future native node capability)
 | 
					
						
							|  |  |  |   return Promise.resolve().then(function () { | 
					
						
							|  |  |  |     return RSA.exportSync(opts); | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  |   }); | 
					
						
							| 
									
										
										
										
											2018-11-22 01:46:20 -07:00
										 |  |  | }; | 
					
						
							| 
									
										
										
										
											2018-11-22 04:32:33 -07:00
										 |  |  | RSA.toPem = RSA.export = RSA.pack; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // snip the _private_ parts... hAHAHAHA!
 | 
					
						
							|  |  |  | RSA.nueter = function (jwk) { | 
					
						
							|  |  |  |   // (snip rather than new object to keep potential extra data)
 | 
					
						
							|  |  |  |   // otherwise we could just do this:
 | 
					
						
							|  |  |  |   // return { kty: jwk.kty, n: jwk.n, e: jwk.e };
 | 
					
						
							|  |  |  |   [ 'p', 'q', 'd', 'dp', 'dq', 'qi' ].forEach(function (key) { | 
					
						
							|  |  |  |     if (key in jwk) { jwk[key] = undefined; } | 
					
						
							|  |  |  |     return jwk; | 
					
						
							|  |  |  |   }); | 
					
						
							| 
									
										
										
										
											2018-11-22 02:09:02 -07:00
										 |  |  |   return jwk; | 
					
						
							| 
									
										
										
										
											2018-11-22 00:39:43 -07:00
										 |  |  | }; |