mirror of
https://github.com/therootcompany/x509.js.git
synced 2025-03-13 12:00:53 +00:00
468 lines
11 KiB
JavaScript
468 lines
11 KiB
JavaScript
;(function () {
|
|
'use strict';
|
|
var X509 = window.X509 = {};
|
|
var ASN1 = window.ASN1;
|
|
var Enc = window.Encoding;
|
|
|
|
|
|
// 1.2.840.10045.3.1.7
|
|
// prime256v1 (ANSI X9.62 named elliptic curve)
|
|
var OBJ_ID_EC = '06 08 2A8648CE3D030107'.replace(/\s+/g, '').toLowerCase();
|
|
// 1.3.132.0.34
|
|
// secp384r1 (SECG (Certicom) named elliptic curve)
|
|
var OBJ_ID_EC_384 = '06 05 2B81040022'.replace(/\s+/g, '').toLowerCase();
|
|
|
|
X509.parsePkcs1 = function parseRsaPkcs1(asn1, jwk) {
|
|
if (!jwk) {
|
|
jwk = {};
|
|
}
|
|
|
|
// might be a buffer
|
|
if (asn1.byteLength) {
|
|
asn1 = ASN1.parse({ der: asn1, verbose: true, json: false });
|
|
}
|
|
|
|
if (
|
|
!asn1.children.every(function(el) {
|
|
return 0x02 === el.type;
|
|
})
|
|
) {
|
|
throw new Error(
|
|
'not an RSA PKCS#1 public or private key (not all ints)'
|
|
);
|
|
}
|
|
|
|
if (2 === asn1.children.length) {
|
|
jwk.n = Enc.bufToUrlBase64(asn1.children[0].value);
|
|
jwk.e = Enc.bufToUrlBase64(asn1.children[1].value);
|
|
jwk.kty = 'RSA';
|
|
} else if (asn1.children.length >= 9) {
|
|
// the standard allows for "otherPrimeInfos", hence at least 9
|
|
|
|
jwk.n = Enc.bufToUrlBase64(asn1.children[1].value);
|
|
jwk.e = Enc.bufToUrlBase64(asn1.children[2].value);
|
|
jwk.d = Enc.bufToUrlBase64(asn1.children[3].value);
|
|
jwk.p = Enc.bufToUrlBase64(asn1.children[4].value);
|
|
jwk.q = Enc.bufToUrlBase64(asn1.children[5].value);
|
|
jwk.dp = Enc.bufToUrlBase64(asn1.children[6].value);
|
|
jwk.dq = Enc.bufToUrlBase64(asn1.children[7].value);
|
|
jwk.qi = Enc.bufToUrlBase64(asn1.children[8].value);
|
|
jwk.kty = 'RSA';
|
|
} else {
|
|
throw new Error(
|
|
'not an RSA PKCS#1 public or private key (wrong number of ints)'
|
|
);
|
|
}
|
|
|
|
return jwk;
|
|
};
|
|
|
|
X509.parseSec1 = function parseEcOnlyPrivkey(u8, jwk) {
|
|
var index = 7;
|
|
var len = 32;
|
|
var olen = OBJ_ID_EC.length / 2;
|
|
|
|
if ('P-384' === jwk.crv) {
|
|
olen = OBJ_ID_EC_384.length / 2;
|
|
index = 8;
|
|
len = 48;
|
|
}
|
|
if (len !== u8[index - 1]) {
|
|
throw new Error('Unexpected bitlength ' + len);
|
|
}
|
|
|
|
// private part is d
|
|
var d = u8.slice(index, index + len);
|
|
// compression bit index
|
|
var ci = index + len + 2 + olen + 2 + 3;
|
|
var c = u8[ci];
|
|
var x, y;
|
|
|
|
if (0x04 === c) {
|
|
y = u8.slice(ci + 1 + len, ci + 1 + len + len);
|
|
} else if (0x02 !== c) {
|
|
throw new Error('not a supported EC private key');
|
|
}
|
|
x = u8.slice(ci + 1, ci + 1 + len);
|
|
|
|
return {
|
|
kty: jwk.kty || 'EC',
|
|
crv: jwk.crv || 'P-256',
|
|
d: Enc.bufToUrlBase64(d),
|
|
//, dh: Enc.bufToHex(d)
|
|
x: Enc.bufToUrlBase64(x),
|
|
//, xh: Enc.bufToHex(x)
|
|
y: Enc.bufToUrlBase64(y)
|
|
//, yh: Enc.bufToHex(y)
|
|
};
|
|
};
|
|
|
|
X509.parsePkcs8 = function(u8, jwk) {
|
|
try {
|
|
return X509.parseRsaPkcs8(u8, jwk);
|
|
} catch (e) {
|
|
return X509.parseEcPkcs8(u8, jwk);
|
|
}
|
|
};
|
|
|
|
X509.parseEcPkcs8 = function parseEcPkcs8(u8, jwk) {
|
|
var index = 24 + OBJ_ID_EC.length / 2;
|
|
var len = 32;
|
|
if ('P-384' === jwk.crv) {
|
|
index = 24 + OBJ_ID_EC_384.length / 2 + 2;
|
|
len = 48;
|
|
}
|
|
|
|
if (0x04 !== u8[index]) {
|
|
throw new Error('privkey not found');
|
|
}
|
|
var d = u8.slice(index + 2, index + 2 + len);
|
|
var ci = index + 2 + len + 5;
|
|
var xi = ci + 1;
|
|
var x = u8.slice(xi, xi + len);
|
|
var yi = xi + len;
|
|
var y;
|
|
if (0x04 === u8[ci]) {
|
|
y = u8.slice(yi, yi + len);
|
|
} else if (0x02 !== u8[ci]) {
|
|
throw new Error('invalid compression bit (expected 0x04 or 0x02)');
|
|
}
|
|
|
|
return {
|
|
kty: jwk.kty || 'EC',
|
|
crv: jwk.crv || 'P-256',
|
|
d: Enc.bufToUrlBase64(d),
|
|
//, dh: Enc.bufToHex(d)
|
|
x: Enc.bufToUrlBase64(x),
|
|
//, xh: Enc.bufToHex(x)
|
|
y: Enc.bufToUrlBase64(y)
|
|
//, yh: Enc.bufToHex(y)
|
|
};
|
|
};
|
|
|
|
X509.parseRsaPkcs8 = function parseRsaPkcs8(asn1, jwk) {
|
|
if (!jwk) {
|
|
jwk = {};
|
|
}
|
|
|
|
// might be a buffer
|
|
if (asn1.byteLength) {
|
|
asn1 = ASN1.parse({ der: asn1, verbose: true, json: false });
|
|
}
|
|
if (
|
|
2 === asn1.children.length &&
|
|
0x03 === asn1.children[1].type // && 2 === asn1.children[1].children.length
|
|
) {
|
|
asn1 = asn1.children[1].children[0];
|
|
jwk.n = Enc.bufToUrlBase64(asn1.children[0].value);
|
|
jwk.e = Enc.bufToUrlBase64(asn1.children[1].value);
|
|
jwk.kty = 'RSA';
|
|
} else if (
|
|
3 === asn1.children.length &&
|
|
0x04 === asn1.children[2].type &&
|
|
0x30 === asn1.children[2].children[0].type &&
|
|
0x02 === asn1.children[2].children[0].children[0].type
|
|
) {
|
|
asn1 = asn1.children[2].children[0];
|
|
jwk.n = Enc.bufToUrlBase64(asn1.children[1].value);
|
|
jwk.e = Enc.bufToUrlBase64(asn1.children[2].value);
|
|
jwk.d = Enc.bufToUrlBase64(asn1.children[3].value);
|
|
jwk.p = Enc.bufToUrlBase64(asn1.children[4].value);
|
|
jwk.q = Enc.bufToUrlBase64(asn1.children[5].value);
|
|
jwk.dp = Enc.bufToUrlBase64(asn1.children[6].value);
|
|
jwk.dq = Enc.bufToUrlBase64(asn1.children[7].value);
|
|
jwk.qi = Enc.bufToUrlBase64(asn1.children[8].value);
|
|
jwk.kty = 'RSA';
|
|
} else {
|
|
throw new Error(
|
|
'not an RSA PKCS#8 public or private key (wrong format)'
|
|
);
|
|
}
|
|
|
|
return jwk;
|
|
};
|
|
|
|
X509.parseSpki = function(buf, jwk) {
|
|
try {
|
|
return X509.parseRsaPkcs8(buf, jwk);
|
|
} catch (e) {
|
|
return X509.parseEcSpki(buf, jwk);
|
|
}
|
|
};
|
|
|
|
X509.parseEcSpki = function(u8, jwk) {
|
|
var ci = 16 + OBJ_ID_EC.length / 2;
|
|
var len = 32;
|
|
|
|
if ('P-384' === jwk.crv) {
|
|
ci = 16 + OBJ_ID_EC_384.length / 2;
|
|
len = 48;
|
|
}
|
|
|
|
var c = u8[ci];
|
|
var xi = ci + 1;
|
|
var x = u8.slice(xi, xi + len);
|
|
var yi = xi + len;
|
|
var y;
|
|
if (0x04 === c) {
|
|
y = u8.slice(yi, yi + len);
|
|
} else if (0x02 !== c) {
|
|
throw new Error('not a supported EC private key');
|
|
}
|
|
|
|
return {
|
|
kty: jwk.kty || 'EC',
|
|
crv: jwk.crv || 'P-256',
|
|
x: Enc.bufToUrlBase64(x),
|
|
//, xh: Enc.bufToHex(x)
|
|
y: Enc.bufToUrlBase64(y)
|
|
//, yh: Enc.bufToHex(y)
|
|
};
|
|
};
|
|
|
|
X509.parsePkix = X509.parseSpki;
|
|
|
|
// TODO look for ECDSA as well
|
|
X509._parseRsa = function(asn1) {
|
|
// accepting der for compatability with other usages
|
|
|
|
if (asn1.byteLength) {
|
|
asn1 = ASN1.parse({ der: asn1, verbose: true, json: false });
|
|
}
|
|
|
|
var meta = { kty: 'RSA', format: 'pkcs1', public: true };
|
|
//meta.asn1 = ASN1.parse(u8);
|
|
|
|
if (
|
|
asn1.children.every(function(el) {
|
|
return 0x02 === el.type;
|
|
})
|
|
) {
|
|
if (2 === asn1.children.length) {
|
|
// rsa pkcs1 public
|
|
//return meta;
|
|
} else if (asn1.children.length >= 9) {
|
|
// the standard allows for "otherPrimeInfos", hence at least 9
|
|
meta.public = false;
|
|
// rsa pkcs1 private
|
|
//return meta;
|
|
} else {
|
|
throw new Error(
|
|
'not an RSA PKCS#1 public or private key (wrong number of ints)'
|
|
);
|
|
}
|
|
} else {
|
|
meta.format = 'pkcs8';
|
|
}
|
|
|
|
var jwk = { kty: 'RSA', n: null, e: null };
|
|
if ('pkcs1' === meta.format) {
|
|
return X509.parsePkcs1(asn1, jwk);
|
|
} else {
|
|
return X509.parsePkcs8(asn1, jwk);
|
|
}
|
|
};
|
|
|
|
|
|
// 1.2.840.10045.3.1.7
|
|
// prime256v1 (ANSI X9.62 named elliptic curve)
|
|
var OBJ_ID_EC = '06 08 2A8648CE3D030107'.replace(/\s+/g, '').toLowerCase();
|
|
// 1.3.132.0.34
|
|
// secp384r1 (SECG (Certicom) named elliptic curve)
|
|
var OBJ_ID_EC_384 = '06 05 2B81040022'.replace(/\s+/g, '').toLowerCase();
|
|
// 1.2.840.10045.2.1
|
|
// ecPublicKey (ANSI X9.62 public key type)
|
|
var OBJ_ID_EC_PUB = '06 07 2A8648CE3D0201'.replace(/\s+/g, '').toLowerCase();
|
|
|
|
var Asn1 = ASN1.Any;
|
|
var UInt = ASN1.UInt;
|
|
var BitStr = ASN1.BitStr;
|
|
|
|
X509.packPkcs1 = function(jwk) {
|
|
var n = UInt(Enc.base64ToHex(jwk.n));
|
|
var e = UInt(Enc.base64ToHex(jwk.e));
|
|
|
|
if (!jwk.d) {
|
|
return Enc.hexToBuf(Asn1('30', n, e));
|
|
}
|
|
|
|
return Enc.hexToBuf(
|
|
Asn1(
|
|
'30',
|
|
UInt('00'),
|
|
n,
|
|
e,
|
|
UInt(Enc.base64ToHex(jwk.d)),
|
|
UInt(Enc.base64ToHex(jwk.p)),
|
|
UInt(Enc.base64ToHex(jwk.q)),
|
|
UInt(Enc.base64ToHex(jwk.dp)),
|
|
UInt(Enc.base64ToHex(jwk.dq)),
|
|
UInt(Enc.base64ToHex(jwk.qi))
|
|
)
|
|
);
|
|
};
|
|
|
|
X509.packSec1 = function(jwk) {
|
|
var d = Enc.base64ToHex(jwk.d);
|
|
var x = Enc.base64ToHex(jwk.x);
|
|
var y = Enc.base64ToHex(jwk.y);
|
|
var objId = 'P-256' === jwk.crv ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
|
|
return Enc.hexToBuf(
|
|
Asn1(
|
|
'30',
|
|
UInt('01'),
|
|
Asn1('04', d),
|
|
Asn1('A0', objId),
|
|
Asn1('A1', BitStr('04' + x + y))
|
|
)
|
|
);
|
|
};
|
|
/**
|
|
* take a private jwk and creates a der from it
|
|
* @param {*} jwk
|
|
*/
|
|
X509.packPkcs8 = function(jwk) {
|
|
if (/RSA/.test(jwk.kty)) {
|
|
return X509.packPkcs8Rsa(jwk);
|
|
}
|
|
|
|
return X509.packPkcs8Ec(jwk);
|
|
};
|
|
X509.packPkcs8Ec = function(jwk) {
|
|
var d = Enc.base64ToHex(jwk.d);
|
|
var x = Enc.base64ToHex(jwk.x);
|
|
var y = Enc.base64ToHex(jwk.y);
|
|
var objId = 'P-256' === jwk.crv ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
return Enc.hexToBuf(
|
|
Asn1(
|
|
'30',
|
|
UInt('00'),
|
|
Asn1('30', OBJ_ID_EC_PUB, objId),
|
|
Asn1(
|
|
'04',
|
|
Asn1(
|
|
'30',
|
|
UInt('01'),
|
|
Asn1('04', d),
|
|
Asn1('A1', BitStr('04' + x + y))
|
|
)
|
|
)
|
|
)
|
|
);
|
|
};
|
|
|
|
X509.packPkcs8Rsa = function(jwk) {
|
|
if (!jwk.d) {
|
|
// Public RSA
|
|
return Enc.hexToBuf(
|
|
Asn1(
|
|
'30',
|
|
Asn1('30', Asn1('06', '2a864886f70d010101'), Asn1('05')),
|
|
BitStr(
|
|
Asn1(
|
|
'30',
|
|
UInt(Enc.base64ToHex(jwk.n)),
|
|
UInt(Enc.base64ToHex(jwk.e))
|
|
)
|
|
)
|
|
)
|
|
);
|
|
}
|
|
|
|
// Private RSA
|
|
return Enc.hexToBuf(
|
|
Asn1(
|
|
'30',
|
|
UInt('00'),
|
|
Asn1('30', Asn1('06', '2a864886f70d010101'), Asn1('05')),
|
|
Asn1(
|
|
'04',
|
|
Asn1(
|
|
'30',
|
|
UInt('00'),
|
|
UInt(Enc.base64ToHex(jwk.n)),
|
|
UInt(Enc.base64ToHex(jwk.e)),
|
|
UInt(Enc.base64ToHex(jwk.d)),
|
|
UInt(Enc.base64ToHex(jwk.p)),
|
|
UInt(Enc.base64ToHex(jwk.q)),
|
|
UInt(Enc.base64ToHex(jwk.dp)),
|
|
UInt(Enc.base64ToHex(jwk.dq)),
|
|
UInt(Enc.base64ToHex(jwk.qi))
|
|
)
|
|
)
|
|
)
|
|
);
|
|
};
|
|
X509.packSpkiEc = function(jwk) {
|
|
var x = Enc.base64ToHex(jwk.x);
|
|
var y = Enc.base64ToHex(jwk.y);
|
|
var objId = 'P-256' === jwk.crv ? OBJ_ID_EC : OBJ_ID_EC_384;
|
|
return Enc.hexToBuf(
|
|
Asn1('30', Asn1('30', OBJ_ID_EC_PUB, objId), BitStr('04' + x + y))
|
|
);
|
|
};
|
|
X509.packSpki = function(jwk) {
|
|
if (/RSA/i.test(jwk.kty)) {
|
|
return X509.packPkcs8Rsa(jwk);
|
|
}
|
|
return X509.packSpkiEc(jwk);
|
|
};
|
|
X509.packPkix = X509.packSpki;
|
|
|
|
X509.packCsrRsaPublicKey = function(jwk) {
|
|
// Sequence the key
|
|
var n = UInt(Enc.base64ToHex(jwk.n));
|
|
var e = UInt(Enc.base64ToHex(jwk.e));
|
|
var asn1pub = Asn1('30', n, e);
|
|
|
|
// Add the CSR pub key header
|
|
return Asn1(
|
|
'30',
|
|
Asn1('30', Asn1('06', '2a864886f70d010101'), Asn1('05')),
|
|
BitStr(asn1pub)
|
|
);
|
|
};
|
|
|
|
X509.packCsrEcPublicKey = function(jwk) {
|
|
var ecOid = X509._oids[jwk.crv];
|
|
if (!ecOid) {
|
|
throw new Error(
|
|
"Unsupported namedCurve '" +
|
|
jwk.crv +
|
|
"'. Supported types are " +
|
|
Object.keys(X509._oids)
|
|
);
|
|
}
|
|
var cmp = '04'; // 04 == x+y, 02 == x-only
|
|
var hxy = '';
|
|
// Placeholder. I'm not even sure if compression should be supported.
|
|
if (!jwk.y) {
|
|
cmp = '02';
|
|
}
|
|
hxy += Enc.base64ToHex(jwk.x);
|
|
if (jwk.y) {
|
|
hxy += Enc.base64ToHex(jwk.y);
|
|
}
|
|
|
|
// 1.2.840.10045.2.1 ecPublicKey
|
|
return Asn1(
|
|
'30',
|
|
Asn1('30', Asn1('06', '2a8648ce3d0201'), Asn1('06', ecOid)),
|
|
BitStr(cmp + hxy)
|
|
);
|
|
};
|
|
|
|
X509._oids = {
|
|
// 1.2.840.10045.3.1.7 prime256v1
|
|
// (ANSI X9.62 named elliptic curve) (06 08 - 2A 86 48 CE 3D 03 01 07)
|
|
'P-256': '2a8648ce3d030107',
|
|
// 1.3.132.0.34 P-384 (06 05 - 2B 81 04 00 22)
|
|
// (SEC 2 recommended EC domain secp256r1)
|
|
'P-384': '2b81040022'
|
|
// 1.3.132.0.35 P-521 (06 05 - 2B 81 04 00 23)
|
|
// (SEC 2 alternate P-521)
|
|
//, 'P-521': '2B 81 04 00 23'
|
|
};
|
|
}());
|