mirror of
https://github.com/denoland/deno.git
synced 2025-03-03 17:34:47 -05:00
parent
ee7fd0a212
commit
c4029f6af2
9 changed files with 377 additions and 22 deletions
1
Cargo.lock
generated
1
Cargo.lock
generated
|
@ -1437,6 +1437,7 @@ dependencies = [
|
||||||
"brotli",
|
"brotli",
|
||||||
"bytes",
|
"bytes",
|
||||||
"cbc",
|
"cbc",
|
||||||
|
"const-oid",
|
||||||
"data-encoding",
|
"data-encoding",
|
||||||
"deno_core",
|
"deno_core",
|
||||||
"deno_fetch",
|
"deno_fetch",
|
||||||
|
|
|
@ -2,6 +2,7 @@
|
||||||
|
|
||||||
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
||||||
import {
|
import {
|
||||||
|
createPrivateKey,
|
||||||
createSecretKey,
|
createSecretKey,
|
||||||
generateKeyPair,
|
generateKeyPair,
|
||||||
generateKeyPairSync,
|
generateKeyPairSync,
|
||||||
|
@ -202,3 +203,28 @@ for (const primeLength of [1024, 2048, 4096]) {
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const rsaPrivateKey = Deno.readTextFileSync(
|
||||||
|
new URL("../testdata/rsa_private.pem", import.meta.url),
|
||||||
|
);
|
||||||
|
|
||||||
|
Deno.test("createPrivateKey rsa", function () {
|
||||||
|
const key = createPrivateKey(rsaPrivateKey);
|
||||||
|
assertEquals(key.type, "private");
|
||||||
|
assertEquals(key.asymmetricKeyType, "rsa");
|
||||||
|
assertEquals(key.asymmetricKeyDetails?.modulusLength, 2048);
|
||||||
|
assertEquals(key.asymmetricKeyDetails?.publicExponent, 65537n);
|
||||||
|
});
|
||||||
|
|
||||||
|
// openssl ecparam -name secp256r1 -genkey -noout -out a.pem
|
||||||
|
// openssl pkcs8 -topk8 -nocrypt -in a.pem -out b.pem
|
||||||
|
const ecPrivateKey = Deno.readTextFileSync(
|
||||||
|
new URL("./ec_private_secp256r1.pem", import.meta.url),
|
||||||
|
);
|
||||||
|
|
||||||
|
Deno.test("createPrivateKey ec", function () {
|
||||||
|
const key = createPrivateKey(ecPrivateKey);
|
||||||
|
assertEquals(key.type, "private");
|
||||||
|
assertEquals(key.asymmetricKeyType, "ec");
|
||||||
|
assertEquals(key.asymmetricKeyDetails?.namedCurve, "p256");
|
||||||
|
});
|
||||||
|
|
5
cli/tests/unit_node/crypto/ec_private_secp256r1.pem
Normal file
5
cli/tests/unit_node/crypto/ec_private_secp256r1.pem
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbT/dwqGGyRs19qy8
|
||||||
|
XPyAZVluvTE9N6hIbyVuFyZobrahRANCAATeWMJqmunAZ6o2lumC79MklBB3Z7ZF
|
||||||
|
ToryVl8HXevci1d/R+OZ6FjYnoICxw3rMXiKMDtUTAFi2ikL20O4+62M
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -19,6 +19,7 @@ aes.workspace = true
|
||||||
brotli.workspace = true
|
brotli.workspace = true
|
||||||
bytes.workspace = true
|
bytes.workspace = true
|
||||||
cbc.workspace = true
|
cbc.workspace = true
|
||||||
|
const-oid = "0.9.5"
|
||||||
data-encoding.workspace = true
|
data-encoding.workspace = true
|
||||||
deno_core.workspace = true
|
deno_core.workspace = true
|
||||||
deno_fetch.workspace = true
|
deno_fetch.workspace = true
|
||||||
|
|
|
@ -274,6 +274,7 @@ deno_core::extension!(deno_node,
|
||||||
ops::require::op_require_package_imports_resolve<P>,
|
ops::require::op_require_package_imports_resolve<P>,
|
||||||
ops::require::op_require_break_on_next_statement,
|
ops::require::op_require_break_on_next_statement,
|
||||||
ops::util::op_node_guess_handle_type,
|
ops::util::op_node_guess_handle_type,
|
||||||
|
ops::crypto::op_node_create_private_key,
|
||||||
],
|
],
|
||||||
esm_entry_point = "ext:deno_node/02_init.js",
|
esm_entry_point = "ext:deno_node/02_init.js",
|
||||||
esm = [
|
esm = [
|
||||||
|
|
|
@ -3,6 +3,7 @@ use deno_core::error::generic_error;
|
||||||
use deno_core::error::type_error;
|
use deno_core::error::type_error;
|
||||||
use deno_core::error::AnyError;
|
use deno_core::error::AnyError;
|
||||||
use deno_core::op2;
|
use deno_core::op2;
|
||||||
|
use deno_core::serde_v8::BigInt as V8BigInt;
|
||||||
use deno_core::unsync::spawn_blocking;
|
use deno_core::unsync::spawn_blocking;
|
||||||
use deno_core::JsBuffer;
|
use deno_core::JsBuffer;
|
||||||
use deno_core::OpState;
|
use deno_core::OpState;
|
||||||
|
@ -13,10 +14,16 @@ use hkdf::Hkdf;
|
||||||
use num_bigint::BigInt;
|
use num_bigint::BigInt;
|
||||||
use num_bigint_dig::BigUint;
|
use num_bigint_dig::BigUint;
|
||||||
use num_traits::FromPrimitive;
|
use num_traits::FromPrimitive;
|
||||||
|
use once_cell::sync::Lazy;
|
||||||
use rand::distributions::Distribution;
|
use rand::distributions::Distribution;
|
||||||
use rand::distributions::Uniform;
|
use rand::distributions::Uniform;
|
||||||
use rand::thread_rng;
|
use rand::thread_rng;
|
||||||
use rand::Rng;
|
use rand::Rng;
|
||||||
|
use rsa::pkcs8;
|
||||||
|
use rsa::pkcs8::der::asn1;
|
||||||
|
use rsa::pkcs8::der::Decode;
|
||||||
|
use rsa::pkcs8::der::Encode;
|
||||||
|
use rsa::pkcs8::der::Reader;
|
||||||
use std::future::Future;
|
use std::future::Future;
|
||||||
use std::rc::Rc;
|
use std::rc::Rc;
|
||||||
|
|
||||||
|
@ -1173,3 +1180,270 @@ pub async fn op_node_gen_prime_async(
|
||||||
) -> Result<ToJsBuffer, AnyError> {
|
) -> Result<ToJsBuffer, AnyError> {
|
||||||
Ok(spawn_blocking(move || gen_prime(size)).await?)
|
Ok(spawn_blocking(move || gen_prime(size)).await?)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(serde::Serialize)]
|
||||||
|
#[serde(tag = "type")]
|
||||||
|
pub enum AsymmetricKeyDetails {
|
||||||
|
#[serde(rename = "rsa")]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
Rsa {
|
||||||
|
modulus_length: usize,
|
||||||
|
public_exponent: V8BigInt,
|
||||||
|
},
|
||||||
|
#[serde(rename = "rsa-pss")]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
RsaPss {
|
||||||
|
modulus_length: usize,
|
||||||
|
public_exponent: V8BigInt,
|
||||||
|
hash_algorithm: String,
|
||||||
|
salt_length: u32,
|
||||||
|
},
|
||||||
|
#[serde(rename = "ec")]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
Ec { named_curve: String },
|
||||||
|
}
|
||||||
|
|
||||||
|
// https://oidref.com/
|
||||||
|
const ID_SHA1_OID: rsa::pkcs8::ObjectIdentifier =
|
||||||
|
rsa::pkcs8::ObjectIdentifier::new_unwrap("1.3.14.3.2.26");
|
||||||
|
const ID_SHA256_OID: rsa::pkcs8::ObjectIdentifier =
|
||||||
|
rsa::pkcs8::ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.2.1");
|
||||||
|
const ID_SHA384_OID: rsa::pkcs8::ObjectIdentifier =
|
||||||
|
rsa::pkcs8::ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.2.2");
|
||||||
|
const ID_SHA512_OID: rsa::pkcs8::ObjectIdentifier =
|
||||||
|
rsa::pkcs8::ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.2.3");
|
||||||
|
const ID_MFG1: rsa::pkcs8::ObjectIdentifier =
|
||||||
|
rsa::pkcs8::ObjectIdentifier::new_unwrap("1.2.840.113549.1.1.8");
|
||||||
|
pub const ID_SECP256R1_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.2.840.10045.3.1.7");
|
||||||
|
pub const ID_SECP384R1_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.3.132.0.34");
|
||||||
|
pub const ID_SECP521R1_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.3.132.0.35");
|
||||||
|
|
||||||
|
// Default HashAlgorithm for RSASSA-PSS-params (sha1)
|
||||||
|
//
|
||||||
|
// sha1 HashAlgorithm ::= {
|
||||||
|
// algorithm id-sha1,
|
||||||
|
// parameters SHA1Parameters : NULL
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// SHA1Parameters ::= NULL
|
||||||
|
static SHA1_HASH_ALGORITHM: Lazy<rsa::pkcs8::AlgorithmIdentifierRef<'static>> =
|
||||||
|
Lazy::new(|| rsa::pkcs8::AlgorithmIdentifierRef {
|
||||||
|
// id-sha1
|
||||||
|
oid: ID_SHA1_OID,
|
||||||
|
// NULL
|
||||||
|
parameters: Some(asn1::AnyRef::from(asn1::Null)),
|
||||||
|
});
|
||||||
|
|
||||||
|
// TODO(@littledivy): `pkcs8` should provide AlgorithmIdentifier to Any conversion.
|
||||||
|
static ENCODED_SHA1_HASH_ALGORITHM: Lazy<Vec<u8>> =
|
||||||
|
Lazy::new(|| SHA1_HASH_ALGORITHM.to_der().unwrap());
|
||||||
|
|
||||||
|
// Default MaskGenAlgrithm for RSASSA-PSS-params (mgf1SHA1)
|
||||||
|
//
|
||||||
|
// mgf1SHA1 MaskGenAlgorithm ::= {
|
||||||
|
// algorithm id-mgf1,
|
||||||
|
// parameters HashAlgorithm : sha1
|
||||||
|
// }
|
||||||
|
static MGF1_SHA1_MASK_ALGORITHM: Lazy<
|
||||||
|
rsa::pkcs8::AlgorithmIdentifierRef<'static>,
|
||||||
|
> = Lazy::new(|| rsa::pkcs8::AlgorithmIdentifierRef {
|
||||||
|
// id-mgf1
|
||||||
|
oid: ID_MFG1,
|
||||||
|
// sha1
|
||||||
|
parameters: Some(
|
||||||
|
asn1::AnyRef::from_der(&ENCODED_SHA1_HASH_ALGORITHM).unwrap(),
|
||||||
|
),
|
||||||
|
});
|
||||||
|
|
||||||
|
pub const RSA_ENCRYPTION_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.2.840.113549.1.1.1");
|
||||||
|
pub const RSASSA_PSS_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.2.840.113549.1.1.10");
|
||||||
|
pub const EC_OID: const_oid::ObjectIdentifier =
|
||||||
|
const_oid::ObjectIdentifier::new_unwrap("1.2.840.10045.2.1");
|
||||||
|
|
||||||
|
// The parameters field associated with OID id-RSASSA-PSS
|
||||||
|
// Defined in RFC 3447, section A.2.3
|
||||||
|
//
|
||||||
|
// RSASSA-PSS-params ::= SEQUENCE {
|
||||||
|
// hashAlgorithm [0] HashAlgorithm DEFAULT sha1,
|
||||||
|
// maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1,
|
||||||
|
// saltLength [2] INTEGER DEFAULT 20,
|
||||||
|
// trailerField [3] TrailerField DEFAULT trailerFieldBC
|
||||||
|
// }
|
||||||
|
pub struct PssPrivateKeyParameters<'a> {
|
||||||
|
pub hash_algorithm: rsa::pkcs8::AlgorithmIdentifierRef<'a>,
|
||||||
|
pub mask_gen_algorithm: rsa::pkcs8::AlgorithmIdentifierRef<'a>,
|
||||||
|
pub salt_length: u32,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Context-specific tag number for hashAlgorithm.
|
||||||
|
const HASH_ALGORITHM_TAG: rsa::pkcs8::der::TagNumber =
|
||||||
|
rsa::pkcs8::der::TagNumber::new(0);
|
||||||
|
|
||||||
|
// Context-specific tag number for maskGenAlgorithm.
|
||||||
|
const MASK_GEN_ALGORITHM_TAG: rsa::pkcs8::der::TagNumber =
|
||||||
|
rsa::pkcs8::der::TagNumber::new(1);
|
||||||
|
|
||||||
|
// Context-specific tag number for saltLength.
|
||||||
|
const SALT_LENGTH_TAG: rsa::pkcs8::der::TagNumber =
|
||||||
|
rsa::pkcs8::der::TagNumber::new(2);
|
||||||
|
|
||||||
|
impl<'a> TryFrom<rsa::pkcs8::der::asn1::AnyRef<'a>>
|
||||||
|
for PssPrivateKeyParameters<'a>
|
||||||
|
{
|
||||||
|
type Error = rsa::pkcs8::der::Error;
|
||||||
|
|
||||||
|
fn try_from(
|
||||||
|
any: rsa::pkcs8::der::asn1::AnyRef<'a>,
|
||||||
|
) -> rsa::pkcs8::der::Result<PssPrivateKeyParameters> {
|
||||||
|
any.sequence(|decoder| {
|
||||||
|
let hash_algorithm = decoder
|
||||||
|
.context_specific::<rsa::pkcs8::AlgorithmIdentifierRef>(
|
||||||
|
HASH_ALGORITHM_TAG,
|
||||||
|
pkcs8::der::TagMode::Explicit,
|
||||||
|
)?
|
||||||
|
.map(TryInto::try_into)
|
||||||
|
.transpose()?
|
||||||
|
.unwrap_or(*SHA1_HASH_ALGORITHM);
|
||||||
|
|
||||||
|
let mask_gen_algorithm = decoder
|
||||||
|
.context_specific::<rsa::pkcs8::AlgorithmIdentifierRef>(
|
||||||
|
MASK_GEN_ALGORITHM_TAG,
|
||||||
|
pkcs8::der::TagMode::Explicit,
|
||||||
|
)?
|
||||||
|
.map(TryInto::try_into)
|
||||||
|
.transpose()?
|
||||||
|
.unwrap_or(*MGF1_SHA1_MASK_ALGORITHM);
|
||||||
|
|
||||||
|
let salt_length = decoder
|
||||||
|
.context_specific::<u32>(
|
||||||
|
SALT_LENGTH_TAG,
|
||||||
|
pkcs8::der::TagMode::Explicit,
|
||||||
|
)?
|
||||||
|
.map(TryInto::try_into)
|
||||||
|
.transpose()?
|
||||||
|
.unwrap_or(20);
|
||||||
|
|
||||||
|
Ok(Self {
|
||||||
|
hash_algorithm,
|
||||||
|
mask_gen_algorithm,
|
||||||
|
salt_length,
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn parse_private_key(
|
||||||
|
key: &[u8],
|
||||||
|
format: &str,
|
||||||
|
type_: &str,
|
||||||
|
) -> Result<pkcs8::SecretDocument, AnyError> {
|
||||||
|
use rsa::pkcs1::DecodeRsaPrivateKey;
|
||||||
|
|
||||||
|
match format {
|
||||||
|
"pem" => {
|
||||||
|
let (label, doc) =
|
||||||
|
pkcs8::SecretDocument::from_pem(std::str::from_utf8(key).unwrap())?;
|
||||||
|
if label != "PRIVATE KEY" {
|
||||||
|
return Err(type_error("Invalid PEM label"));
|
||||||
|
}
|
||||||
|
Ok(doc)
|
||||||
|
}
|
||||||
|
"der" => {
|
||||||
|
match type_ {
|
||||||
|
"pkcs8" => pkcs8::SecretDocument::from_pkcs8_der(key)
|
||||||
|
.map_err(|_| type_error("Invalid PKCS8 private key")),
|
||||||
|
"pkcs1" => pkcs8::SecretDocument::from_pkcs1_der(key)
|
||||||
|
.map_err(|_| type_error("Invalid PKCS1 private key")),
|
||||||
|
// TODO(@littledivy): sec1 type
|
||||||
|
_ => Err(type_error(format!("Unsupported key type: {}", type_))),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
_ => Err(type_error(format!("Unsupported key format: {}", format))),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[op2]
|
||||||
|
#[serde]
|
||||||
|
pub fn op_node_create_private_key(
|
||||||
|
#[buffer] key: &[u8],
|
||||||
|
#[string] format: &str,
|
||||||
|
#[string] type_: &str,
|
||||||
|
) -> Result<AsymmetricKeyDetails, AnyError> {
|
||||||
|
use rsa::pkcs1::der::Decode;
|
||||||
|
|
||||||
|
let doc = parse_private_key(key, format, type_)?;
|
||||||
|
let pk_info = pkcs8::PrivateKeyInfo::try_from(doc.as_bytes())?;
|
||||||
|
|
||||||
|
let alg = pk_info.algorithm.oid;
|
||||||
|
|
||||||
|
match alg {
|
||||||
|
RSA_ENCRYPTION_OID => {
|
||||||
|
let private_key =
|
||||||
|
rsa::pkcs1::RsaPrivateKey::from_der(pk_info.private_key)?;
|
||||||
|
let modulus_length = private_key.modulus.as_bytes().len() * 8;
|
||||||
|
|
||||||
|
Ok(AsymmetricKeyDetails::Rsa {
|
||||||
|
modulus_length,
|
||||||
|
public_exponent: BigInt::from_bytes_be(
|
||||||
|
num_bigint::Sign::Plus,
|
||||||
|
private_key.public_exponent.as_bytes(),
|
||||||
|
)
|
||||||
|
.into(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
RSASSA_PSS_OID => {
|
||||||
|
let params = PssPrivateKeyParameters::try_from(
|
||||||
|
pk_info
|
||||||
|
.algorithm
|
||||||
|
.parameters
|
||||||
|
.ok_or_else(|| type_error("Malformed parameters".to_string()))?,
|
||||||
|
)
|
||||||
|
.map_err(|_| type_error("Malformed parameters".to_string()))?;
|
||||||
|
|
||||||
|
let hash_alg = params.hash_algorithm;
|
||||||
|
let hash_algorithm = match hash_alg.oid {
|
||||||
|
ID_SHA1_OID => "sha1",
|
||||||
|
ID_SHA256_OID => "sha256",
|
||||||
|
ID_SHA384_OID => "sha384",
|
||||||
|
ID_SHA512_OID => "sha512",
|
||||||
|
_ => return Err(type_error("Unsupported hash algorithm")),
|
||||||
|
};
|
||||||
|
|
||||||
|
let private_key =
|
||||||
|
rsa::pkcs1::RsaPrivateKey::from_der(pk_info.private_key)?;
|
||||||
|
let modulus_length = private_key.modulus.as_bytes().len() * 8;
|
||||||
|
Ok(AsymmetricKeyDetails::RsaPss {
|
||||||
|
modulus_length,
|
||||||
|
public_exponent: BigInt::from_bytes_be(
|
||||||
|
num_bigint::Sign::Plus,
|
||||||
|
private_key.public_exponent.as_bytes(),
|
||||||
|
)
|
||||||
|
.into(),
|
||||||
|
hash_algorithm: hash_algorithm.to_string(),
|
||||||
|
salt_length: params.salt_length,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
EC_OID => {
|
||||||
|
let named_curve = pk_info
|
||||||
|
.algorithm
|
||||||
|
.parameters_oid()
|
||||||
|
.map_err(|_| type_error("malformed parameters"))?;
|
||||||
|
let named_curve = match named_curve {
|
||||||
|
ID_SECP256R1_OID => "p256",
|
||||||
|
ID_SECP384R1_OID => "p384",
|
||||||
|
ID_SECP521R1_OID => "p521",
|
||||||
|
_ => return Err(type_error("Unsupported named curve")),
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(AsymmetricKeyDetails::Ec {
|
||||||
|
named_curve: named_curve.to_string(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
_ => Err(type_error("Unsupported algorithm")),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -28,7 +28,7 @@ import {
|
||||||
isArrayBufferView,
|
isArrayBufferView,
|
||||||
} from "ext:deno_node/internal/util/types.ts";
|
} from "ext:deno_node/internal/util/types.ts";
|
||||||
|
|
||||||
function isStringOrBuffer(val) {
|
export function isStringOrBuffer(val) {
|
||||||
return typeof val === "string" ||
|
return typeof val === "string" ||
|
||||||
isArrayBufferView(val) ||
|
isArrayBufferView(val) ||
|
||||||
isAnyArrayBuffer(val);
|
isAnyArrayBuffer(val);
|
||||||
|
@ -456,7 +456,7 @@ export function publicEncrypt(
|
||||||
return ops.op_node_public_encrypt(data, buffer, padding);
|
return ops.op_node_public_encrypt(data, buffer, padding);
|
||||||
}
|
}
|
||||||
|
|
||||||
function prepareKey(key) {
|
export function prepareKey(key) {
|
||||||
// TODO(@littledivy): handle these cases
|
// TODO(@littledivy): handle these cases
|
||||||
// - node KeyObject
|
// - node KeyObject
|
||||||
// - web CryptoKey
|
// - web CryptoKey
|
||||||
|
@ -485,5 +485,6 @@ export default {
|
||||||
publicEncrypt,
|
publicEncrypt,
|
||||||
Cipheriv,
|
Cipheriv,
|
||||||
Decipheriv,
|
Decipheriv,
|
||||||
|
prepareKey,
|
||||||
getCipherInfo,
|
getCipherInfo,
|
||||||
};
|
};
|
||||||
|
|
|
@ -8,6 +8,7 @@ import {
|
||||||
kHandle,
|
kHandle,
|
||||||
kKeyObject,
|
kKeyObject,
|
||||||
} from "ext:deno_node/internal/crypto/constants.ts";
|
} from "ext:deno_node/internal/crypto/constants.ts";
|
||||||
|
import { isStringOrBuffer } from "ext:deno_node/internal/crypto/cipher.ts";
|
||||||
import {
|
import {
|
||||||
ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE,
|
ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE,
|
||||||
ERR_INVALID_ARG_TYPE,
|
ERR_INVALID_ARG_TYPE,
|
||||||
|
@ -16,7 +17,6 @@ import {
|
||||||
import { notImplemented } from "ext:deno_node/_utils.ts";
|
import { notImplemented } from "ext:deno_node/_utils.ts";
|
||||||
import type {
|
import type {
|
||||||
KeyFormat,
|
KeyFormat,
|
||||||
KeyType,
|
|
||||||
PrivateKeyInput,
|
PrivateKeyInput,
|
||||||
PublicKeyInput,
|
PublicKeyInput,
|
||||||
} from "ext:deno_node/internal/crypto/types.ts";
|
} from "ext:deno_node/internal/crypto/types.ts";
|
||||||
|
@ -39,6 +39,9 @@ import {
|
||||||
forgivingBase64UrlEncode as encodeToBase64Url,
|
forgivingBase64UrlEncode as encodeToBase64Url,
|
||||||
} from "ext:deno_web/00_infra.js";
|
} from "ext:deno_web/00_infra.js";
|
||||||
|
|
||||||
|
const { core } = globalThis.__bootstrap;
|
||||||
|
const { ops } = core;
|
||||||
|
|
||||||
export const getArrayBufferOrView = hideStackFrames(
|
export const getArrayBufferOrView = hideStackFrames(
|
||||||
(
|
(
|
||||||
buffer,
|
buffer,
|
||||||
|
@ -168,18 +171,6 @@ export class KeyObject {
|
||||||
return this[kKeyType];
|
return this[kKeyType];
|
||||||
}
|
}
|
||||||
|
|
||||||
get asymmetricKeyDetails(): AsymmetricKeyDetails | undefined {
|
|
||||||
notImplemented("crypto.KeyObject.prototype.asymmetricKeyDetails");
|
|
||||||
|
|
||||||
return undefined;
|
|
||||||
}
|
|
||||||
|
|
||||||
get asymmetricKeyType(): KeyType | undefined {
|
|
||||||
notImplemented("crypto.KeyObject.prototype.asymmetricKeyType");
|
|
||||||
|
|
||||||
return undefined;
|
|
||||||
}
|
|
||||||
|
|
||||||
get symmetricKeySize(): number | undefined {
|
get symmetricKeySize(): number | undefined {
|
||||||
notImplemented("crypto.KeyObject.prototype.symmetricKeySize");
|
notImplemented("crypto.KeyObject.prototype.symmetricKeySize");
|
||||||
|
|
||||||
|
@ -219,10 +210,33 @@ export interface JsonWebKeyInput {
|
||||||
format: "jwk";
|
format: "jwk";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function prepareAsymmetricKey(key) {
|
||||||
|
if (isStringOrBuffer(key)) {
|
||||||
|
return { format: "pem", data: getArrayBufferOrView(key, "key") };
|
||||||
|
} else if (typeof key == "object") {
|
||||||
|
const { key: data, encoding, format, type } = key;
|
||||||
|
if (!isStringOrBuffer(data)) {
|
||||||
|
throw new TypeError("Invalid key type");
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
data: getArrayBufferOrView(data, "key", encoding),
|
||||||
|
format: format ?? "pem",
|
||||||
|
encoding,
|
||||||
|
type,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
throw new TypeError("Invalid key type");
|
||||||
|
}
|
||||||
|
|
||||||
export function createPrivateKey(
|
export function createPrivateKey(
|
||||||
_key: PrivateKeyInput | string | Buffer | JsonWebKeyInput,
|
key: PrivateKeyInput | string | Buffer | JsonWebKeyInput,
|
||||||
): KeyObject {
|
): PrivateKeyObject {
|
||||||
notImplemented("crypto.createPrivateKey");
|
const { data, format, type } = prepareAsymmetricKey(key);
|
||||||
|
const details = ops.op_node_create_private_key(data, format, type);
|
||||||
|
const handle = setOwnedKey(copyBuffer(data));
|
||||||
|
return new PrivateKeyObject(handle, details);
|
||||||
}
|
}
|
||||||
|
|
||||||
export function createPublicKey(
|
export function createPublicKey(
|
||||||
|
@ -316,6 +330,35 @@ export class SecretKeyObject extends KeyObject {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const kAsymmetricKeyType = Symbol("kAsymmetricKeyType");
|
||||||
|
const kAsymmetricKeyDetails = Symbol("kAsymmetricKeyDetails");
|
||||||
|
|
||||||
|
class AsymmetricKeyObject extends KeyObject {
|
||||||
|
constructor(type: KeyObjectType, handle: unknown, details: unknown) {
|
||||||
|
super(type, handle);
|
||||||
|
this[kAsymmetricKeyType] = details.type;
|
||||||
|
this[kAsymmetricKeyDetails] = { ...details };
|
||||||
|
}
|
||||||
|
|
||||||
|
get asymmetricKeyType() {
|
||||||
|
return this[kAsymmetricKeyType];
|
||||||
|
}
|
||||||
|
|
||||||
|
get asymmetricKeyDetails() {
|
||||||
|
return this[kAsymmetricKeyDetails];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
class PrivateKeyObject extends AsymmetricKeyObject {
|
||||||
|
constructor(handle: unknown, details: unknown) {
|
||||||
|
super("private", handle, details);
|
||||||
|
}
|
||||||
|
|
||||||
|
export(_options: unknown) {
|
||||||
|
notImplemented("crypto.PrivateKeyObject.prototype.export");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
export function setOwnedKey(key: Uint8Array): unknown {
|
export function setOwnedKey(key: Uint8Array): unknown {
|
||||||
const handle = {};
|
const handle = {};
|
||||||
KEY_STORE.set(handle, key);
|
KEY_STORE.set(handle, key);
|
||||||
|
|
|
@ -19,7 +19,10 @@ import type {
|
||||||
PrivateKeyInput,
|
PrivateKeyInput,
|
||||||
PublicKeyInput,
|
PublicKeyInput,
|
||||||
} from "ext:deno_node/internal/crypto/types.ts";
|
} from "ext:deno_node/internal/crypto/types.ts";
|
||||||
import { KeyObject } from "ext:deno_node/internal/crypto/keys.ts";
|
import {
|
||||||
|
getKeyMaterial,
|
||||||
|
KeyObject,
|
||||||
|
} from "ext:deno_node/internal/crypto/keys.ts";
|
||||||
import { createHash, Hash } from "ext:deno_node/internal/crypto/hash.ts";
|
import { createHash, Hash } from "ext:deno_node/internal/crypto/hash.ts";
|
||||||
import { KeyFormat, KeyType } from "ext:deno_node/internal/crypto/types.ts";
|
import { KeyFormat, KeyType } from "ext:deno_node/internal/crypto/types.ts";
|
||||||
import { isArrayBufferView } from "ext:deno_node/internal/util/types.ts";
|
import { isArrayBufferView } from "ext:deno_node/internal/util/types.ts";
|
||||||
|
@ -87,9 +90,9 @@ export class SignImpl extends Writable {
|
||||||
keyType = "rsa";
|
keyType = "rsa";
|
||||||
keyFormat = "pem";
|
keyFormat = "pem";
|
||||||
} else {
|
} else {
|
||||||
// TODO(kt3k): Add support for the case when privateKey is a KeyObject,
|
keyData = getKeyMaterial(privateKey);
|
||||||
// CryptoKey, etc
|
keyType = "rsa";
|
||||||
notImplemented("crypto.Sign.prototype.sign with non BinaryLike input");
|
keyFormat = "pem";
|
||||||
}
|
}
|
||||||
const ret = Buffer.from(ops.op_node_sign(
|
const ret = Buffer.from(ops.op_node_sign(
|
||||||
this.hash.digest(),
|
this.hash.digest(),
|
||||||
|
|
Loading…
Add table
Reference in a new issue