222 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			222 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| 'use strict';
 | |
| 
 | |
| var X509 = module.exports;
 | |
| var Enc = require('@root/encoding');
 | |
| var ASN1 = require('@root/asn1/parser');
 | |
| 
 | |
| // 1.2.840.10045.3.1.7
 | |
| // prime256v1 (ANSI X9.62 named elliptic curve)
 | |
| var OBJ_ID_EC = '06 08 2A8648CE3D030107'.replace(/\s+/g, '').toLowerCase();
 | |
| // 1.3.132.0.34
 | |
| // secp384r1 (SECG (Certicom) named elliptic curve)
 | |
| var OBJ_ID_EC_384 = '06 05 2B81040022'.replace(/\s+/g, '').toLowerCase();
 | |
| 
 | |
| X509.parsePkcs1 = function parseRsaPkcs1(asn1, jwk) {
 | |
| 	if (!jwk) {
 | |
| 		jwk = {};
 | |
| 	}
 | |
| 
 | |
| 	// might be a buffer
 | |
| 	if (!Array.isArray(asn1)) {
 | |
| 		asn1 = ASN1.parse({ der: asn1, verbose: true, json: false });
 | |
| 	}
 | |
| 
 | |
| 	if (
 | |
| 		!asn1.children.every(function(el) {
 | |
| 			return 0x02 === el.type;
 | |
| 		})
 | |
| 	) {
 | |
| 		throw new Error(
 | |
| 			'not an RSA PKCS#1 public or private key (not all ints)'
 | |
| 		);
 | |
| 	}
 | |
| 
 | |
| 	if (2 === asn1.children.length) {
 | |
| 		jwk.n = Enc.bufToUrlBase64(asn1.children[0].value);
 | |
| 		jwk.e = Enc.bufToUrlBase64(asn1.children[1].value);
 | |
| 		jwk.kty = 'RSA';
 | |
| 	} else if (asn1.children.length >= 9) {
 | |
| 		// the standard allows for "otherPrimeInfos", hence at least 9
 | |
| 
 | |
| 		jwk.n = Enc.bufToUrlBase64(asn1.children[1].value);
 | |
| 		jwk.e = Enc.bufToUrlBase64(asn1.children[2].value);
 | |
| 		jwk.d = Enc.bufToUrlBase64(asn1.children[3].value);
 | |
| 		jwk.p = Enc.bufToUrlBase64(asn1.children[4].value);
 | |
| 		jwk.q = Enc.bufToUrlBase64(asn1.children[5].value);
 | |
| 		jwk.dp = Enc.bufToUrlBase64(asn1.children[6].value);
 | |
| 		jwk.dq = Enc.bufToUrlBase64(asn1.children[7].value);
 | |
| 		jwk.qi = Enc.bufToUrlBase64(asn1.children[8].value);
 | |
| 		jwk.kty = 'RSA';
 | |
| 	} else {
 | |
| 		throw new Error(
 | |
| 			'not an RSA PKCS#1 public or private key (wrong number of ints)'
 | |
| 		);
 | |
| 	}
 | |
| 
 | |
| 	return jwk;
 | |
| };
 | |
| 
 | |
| X509.parseSec1 = function parseEcOnlyPrivkey(u8, jwk) {
 | |
| 	var index = 7;
 | |
| 	var len = 32;
 | |
| 	var olen = OBJ_ID_EC.length / 2;
 | |
| 
 | |
| 	if ('P-384' === jwk.crv) {
 | |
| 		olen = OBJ_ID_EC_384.length / 2;
 | |
| 		index = 8;
 | |
| 		len = 48;
 | |
| 	}
 | |
| 	if (len !== u8[index - 1]) {
 | |
| 		throw new Error('Unexpected bitlength ' + len);
 | |
| 	}
 | |
| 
 | |
| 	// private part is d
 | |
| 	var d = u8.slice(index, index + len);
 | |
| 	// compression bit index
 | |
| 	var ci = index + len + 2 + olen + 2 + 3;
 | |
| 	var c = u8[ci];
 | |
| 	var x, y;
 | |
| 
 | |
| 	if (0x04 === c) {
 | |
| 		y = u8.slice(ci + 1 + len, ci + 1 + len + len);
 | |
| 	} else if (0x02 !== c) {
 | |
| 		throw new Error('not a supported EC private key');
 | |
| 	}
 | |
| 	x = u8.slice(ci + 1, ci + 1 + len);
 | |
| 
 | |
| 	return {
 | |
| 		kty: jwk.kty || 'EC',
 | |
| 		crv: jwk.crv || 'P-256',
 | |
| 		d: Enc.bufToUrlBase64(d),
 | |
| 		//, dh: Enc.bufToHex(d)
 | |
| 		x: Enc.bufToUrlBase64(x),
 | |
| 		//, xh: Enc.bufToHex(x)
 | |
| 		y: Enc.bufToUrlBase64(y)
 | |
| 		//, yh: Enc.bufToHex(y)
 | |
| 	};
 | |
| };
 | |
| 
 | |
| X509.parsePkcs8 = function(u8, jwk) {
 | |
| 	try {
 | |
| 		return X509.parseRsaPkcs8(u8, jwk);
 | |
| 	} catch (e) {
 | |
| 		return X509.parseEcPkcs8(u8, jwk);
 | |
| 	}
 | |
| };
 | |
| 
 | |
| X509.parseEcPkcs8 = function parseEcPkcs8(u8, jwk) {
 | |
| 	var index = 24 + OBJ_ID_EC.length / 2;
 | |
| 	var len = 32;
 | |
| 	if ('P-384' === jwk.crv) {
 | |
| 		index = 24 + OBJ_ID_EC_384.length / 2 + 2;
 | |
| 		len = 48;
 | |
| 	}
 | |
| 
 | |
| 	if (0x04 !== u8[index]) {
 | |
| 		throw new Error('privkey not found');
 | |
| 	}
 | |
| 	var d = u8.slice(index + 2, index + 2 + len);
 | |
| 	var ci = index + 2 + len + 5;
 | |
| 	var xi = ci + 1;
 | |
| 	var x = u8.slice(xi, xi + len);
 | |
| 	var yi = xi + len;
 | |
| 	var y;
 | |
| 	if (0x04 === u8[ci]) {
 | |
| 		y = u8.slice(yi, yi + len);
 | |
| 	} else if (0x02 !== u8[ci]) {
 | |
| 		throw new Error('invalid compression bit (expected 0x04 or 0x02)');
 | |
| 	}
 | |
| 
 | |
| 	return {
 | |
| 		kty: jwk.kty || 'EC',
 | |
| 		crv: jwk.crv || 'P-256',
 | |
| 		d: Enc.bufToUrlBase64(d),
 | |
| 		//, dh: Enc.bufToHex(d)
 | |
| 		x: Enc.bufToUrlBase64(x),
 | |
| 		//, xh: Enc.bufToHex(x)
 | |
| 		y: Enc.bufToUrlBase64(y)
 | |
| 		//, yh: Enc.bufToHex(y)
 | |
| 	};
 | |
| };
 | |
| 
 | |
| X509.parseRsaPkcs8 = function parseRsaPkcs8(asn1, jwk) {
 | |
| 	if (!jwk) {
 | |
| 		jwk = {};
 | |
| 	}
 | |
| 
 | |
| 	// might be a buffer
 | |
| 	if (!Array.isArray(asn1)) {
 | |
| 		asn1 = ASN1.parse({ der: asn1, verbose: true, json: false });
 | |
| 	}
 | |
| 	if (
 | |
| 		2 === asn1.children.length &&
 | |
| 		0x03 === asn1.children[1].type // && 2 === asn1.children[1].children.length
 | |
| 	) {
 | |
| 		asn1 = asn1.children[1].children[0];
 | |
| 		jwk.n = Enc.bufToUrlBase64(asn1.children[0].value);
 | |
| 		jwk.e = Enc.bufToUrlBase64(asn1.children[1].value);
 | |
| 		jwk.kty = 'RSA';
 | |
| 	} else if (
 | |
| 		3 === asn1.children.length &&
 | |
| 		0x04 === asn1.children[2].type &&
 | |
| 		0x30 === asn1.children[2].children[0].type &&
 | |
| 		0x02 === asn1.children[2].children[0].children[0].type
 | |
| 	) {
 | |
| 		asn1 = asn1.children[2].children[0];
 | |
| 		jwk.n = Enc.bufToUrlBase64(asn1.children[1].value);
 | |
| 		jwk.e = Enc.bufToUrlBase64(asn1.children[2].value);
 | |
| 		jwk.d = Enc.bufToUrlBase64(asn1.children[3].value);
 | |
| 		jwk.p = Enc.bufToUrlBase64(asn1.children[4].value);
 | |
| 		jwk.q = Enc.bufToUrlBase64(asn1.children[5].value);
 | |
| 		jwk.dp = Enc.bufToUrlBase64(asn1.children[6].value);
 | |
| 		jwk.dq = Enc.bufToUrlBase64(asn1.children[7].value);
 | |
| 		jwk.qi = Enc.bufToUrlBase64(asn1.children[8].value);
 | |
| 		jwk.kty = 'RSA';
 | |
| 	} else {
 | |
| 		throw new Error(
 | |
| 			'not an RSA PKCS#8 public or private key (wrong format)'
 | |
| 		);
 | |
| 	}
 | |
| 	return jwk;
 | |
| };
 | |
| 
 | |
| X509.parseSpki = function(buf, jwk) {
 | |
| 	try {
 | |
| 		return X509.parseRsaPkcs8(buf, jwk);
 | |
| 	} catch (e) {
 | |
| 		return X509.parseEcSpki(buf, jwk);
 | |
| 	}
 | |
| };
 | |
| 
 | |
| X509.parseEcSpki = function(u8, jwk) {
 | |
| 	var ci = 16 + OBJ_ID_EC.length / 2;
 | |
| 	var len = 32;
 | |
| 
 | |
| 	if ('P-384' === jwk.crv) {
 | |
| 		ci = 16 + OBJ_ID_EC_384.length / 2;
 | |
| 		len = 48;
 | |
| 	}
 | |
| 
 | |
| 	var c = u8[ci];
 | |
| 	var xi = ci + 1;
 | |
| 	var x = u8.slice(xi, xi + len);
 | |
| 	var yi = xi + len;
 | |
| 	var y;
 | |
| 	if (0x04 === c) {
 | |
| 		y = u8.slice(yi, yi + len);
 | |
| 	} else if (0x02 !== c) {
 | |
| 		throw new Error('not a supported EC private key');
 | |
| 	}
 | |
| 
 | |
| 	return {
 | |
| 		kty: jwk.kty || 'EC',
 | |
| 		crv: jwk.crv || 'P-256',
 | |
| 		x: Enc.bufToUrlBase64(x),
 | |
| 		//, xh: Enc.bufToHex(x)
 | |
| 		y: Enc.bufToUrlBase64(y)
 | |
| 		//, yh: Enc.bufToHex(y)
 | |
| 	};
 | |
| };
 | |
| 
 | |
| X509.parsePkix = X509.parseSpki;
 |