mirror of
https://github.com/actions/setup-python.git
synced 2024-11-24 01:19:08 +00:00
373 lines
8.8 KiB
JavaScript
373 lines
8.8 KiB
JavaScript
// Copyright 2015 Joyent, Inc.
|
|
|
|
module.exports = {
|
|
read: read,
|
|
readPkcs1: readPkcs1,
|
|
write: write,
|
|
writePkcs1: writePkcs1
|
|
};
|
|
|
|
var assert = require('assert-plus');
|
|
var asn1 = require('asn1');
|
|
var Buffer = require('safer-buffer').Buffer;
|
|
var algs = require('../algs');
|
|
var utils = require('../utils');
|
|
|
|
var Key = require('../key');
|
|
var PrivateKey = require('../private-key');
|
|
var pem = require('./pem');
|
|
|
|
var pkcs8 = require('./pkcs8');
|
|
var readECDSACurve = pkcs8.readECDSACurve;
|
|
|
|
function read(buf, options) {
|
|
return (pem.read(buf, options, 'pkcs1'));
|
|
}
|
|
|
|
function write(key, options) {
|
|
return (pem.write(key, options, 'pkcs1'));
|
|
}
|
|
|
|
/* Helper to read in a single mpint */
|
|
function readMPInt(der, nm) {
|
|
assert.strictEqual(der.peek(), asn1.Ber.Integer,
|
|
nm + ' is not an Integer');
|
|
return (utils.mpNormalize(der.readString(asn1.Ber.Integer, true)));
|
|
}
|
|
|
|
function readPkcs1(alg, type, der) {
|
|
switch (alg) {
|
|
case 'RSA':
|
|
if (type === 'public')
|
|
return (readPkcs1RSAPublic(der));
|
|
else if (type === 'private')
|
|
return (readPkcs1RSAPrivate(der));
|
|
throw (new Error('Unknown key type: ' + type));
|
|
case 'DSA':
|
|
if (type === 'public')
|
|
return (readPkcs1DSAPublic(der));
|
|
else if (type === 'private')
|
|
return (readPkcs1DSAPrivate(der));
|
|
throw (new Error('Unknown key type: ' + type));
|
|
case 'EC':
|
|
case 'ECDSA':
|
|
if (type === 'private')
|
|
return (readPkcs1ECDSAPrivate(der));
|
|
else if (type === 'public')
|
|
return (readPkcs1ECDSAPublic(der));
|
|
throw (new Error('Unknown key type: ' + type));
|
|
case 'EDDSA':
|
|
case 'EdDSA':
|
|
if (type === 'private')
|
|
return (readPkcs1EdDSAPrivate(der));
|
|
throw (new Error(type + ' keys not supported with EdDSA'));
|
|
default:
|
|
throw (new Error('Unknown key algo: ' + alg));
|
|
}
|
|
}
|
|
|
|
function readPkcs1RSAPublic(der) {
|
|
// modulus and exponent
|
|
var n = readMPInt(der, 'modulus');
|
|
var e = readMPInt(der, 'exponent');
|
|
|
|
// now, make the key
|
|
var key = {
|
|
type: 'rsa',
|
|
parts: [
|
|
{ name: 'e', data: e },
|
|
{ name: 'n', data: n }
|
|
]
|
|
};
|
|
|
|
return (new Key(key));
|
|
}
|
|
|
|
function readPkcs1RSAPrivate(der) {
|
|
var version = readMPInt(der, 'version');
|
|
assert.strictEqual(version[0], 0);
|
|
|
|
// modulus then public exponent
|
|
var n = readMPInt(der, 'modulus');
|
|
var e = readMPInt(der, 'public exponent');
|
|
var d = readMPInt(der, 'private exponent');
|
|
var p = readMPInt(der, 'prime1');
|
|
var q = readMPInt(der, 'prime2');
|
|
var dmodp = readMPInt(der, 'exponent1');
|
|
var dmodq = readMPInt(der, 'exponent2');
|
|
var iqmp = readMPInt(der, 'iqmp');
|
|
|
|
// now, make the key
|
|
var key = {
|
|
type: 'rsa',
|
|
parts: [
|
|
{ name: 'n', data: n },
|
|
{ name: 'e', data: e },
|
|
{ name: 'd', data: d },
|
|
{ name: 'iqmp', data: iqmp },
|
|
{ name: 'p', data: p },
|
|
{ name: 'q', data: q },
|
|
{ name: 'dmodp', data: dmodp },
|
|
{ name: 'dmodq', data: dmodq }
|
|
]
|
|
};
|
|
|
|
return (new PrivateKey(key));
|
|
}
|
|
|
|
function readPkcs1DSAPrivate(der) {
|
|
var version = readMPInt(der, 'version');
|
|
assert.strictEqual(version.readUInt8(0), 0);
|
|
|
|
var p = readMPInt(der, 'p');
|
|
var q = readMPInt(der, 'q');
|
|
var g = readMPInt(der, 'g');
|
|
var y = readMPInt(der, 'y');
|
|
var x = readMPInt(der, 'x');
|
|
|
|
// now, make the key
|
|
var key = {
|
|
type: 'dsa',
|
|
parts: [
|
|
{ name: 'p', data: p },
|
|
{ name: 'q', data: q },
|
|
{ name: 'g', data: g },
|
|
{ name: 'y', data: y },
|
|
{ name: 'x', data: x }
|
|
]
|
|
};
|
|
|
|
return (new PrivateKey(key));
|
|
}
|
|
|
|
function readPkcs1EdDSAPrivate(der) {
|
|
var version = readMPInt(der, 'version');
|
|
assert.strictEqual(version.readUInt8(0), 1);
|
|
|
|
// private key
|
|
var k = der.readString(asn1.Ber.OctetString, true);
|
|
|
|
der.readSequence(0xa0);
|
|
var oid = der.readOID();
|
|
assert.strictEqual(oid, '1.3.101.112', 'the ed25519 curve identifier');
|
|
|
|
der.readSequence(0xa1);
|
|
var A = utils.readBitString(der);
|
|
|
|
var key = {
|
|
type: 'ed25519',
|
|
parts: [
|
|
{ name: 'A', data: utils.zeroPadToLength(A, 32) },
|
|
{ name: 'k', data: k }
|
|
]
|
|
};
|
|
|
|
return (new PrivateKey(key));
|
|
}
|
|
|
|
function readPkcs1DSAPublic(der) {
|
|
var y = readMPInt(der, 'y');
|
|
var p = readMPInt(der, 'p');
|
|
var q = readMPInt(der, 'q');
|
|
var g = readMPInt(der, 'g');
|
|
|
|
var key = {
|
|
type: 'dsa',
|
|
parts: [
|
|
{ name: 'y', data: y },
|
|
{ name: 'p', data: p },
|
|
{ name: 'q', data: q },
|
|
{ name: 'g', data: g }
|
|
]
|
|
};
|
|
|
|
return (new Key(key));
|
|
}
|
|
|
|
function readPkcs1ECDSAPublic(der) {
|
|
der.readSequence();
|
|
|
|
var oid = der.readOID();
|
|
assert.strictEqual(oid, '1.2.840.10045.2.1', 'must be ecPublicKey');
|
|
|
|
var curveOid = der.readOID();
|
|
|
|
var curve;
|
|
var curves = Object.keys(algs.curves);
|
|
for (var j = 0; j < curves.length; ++j) {
|
|
var c = curves[j];
|
|
var cd = algs.curves[c];
|
|
if (cd.pkcs8oid === curveOid) {
|
|
curve = c;
|
|
break;
|
|
}
|
|
}
|
|
assert.string(curve, 'a known ECDSA named curve');
|
|
|
|
var Q = der.readString(asn1.Ber.BitString, true);
|
|
Q = utils.ecNormalize(Q);
|
|
|
|
var key = {
|
|
type: 'ecdsa',
|
|
parts: [
|
|
{ name: 'curve', data: Buffer.from(curve) },
|
|
{ name: 'Q', data: Q }
|
|
]
|
|
};
|
|
|
|
return (new Key(key));
|
|
}
|
|
|
|
function readPkcs1ECDSAPrivate(der) {
|
|
var version = readMPInt(der, 'version');
|
|
assert.strictEqual(version.readUInt8(0), 1);
|
|
|
|
// private key
|
|
var d = der.readString(asn1.Ber.OctetString, true);
|
|
|
|
der.readSequence(0xa0);
|
|
var curve = readECDSACurve(der);
|
|
assert.string(curve, 'a known elliptic curve');
|
|
|
|
der.readSequence(0xa1);
|
|
var Q = der.readString(asn1.Ber.BitString, true);
|
|
Q = utils.ecNormalize(Q);
|
|
|
|
var key = {
|
|
type: 'ecdsa',
|
|
parts: [
|
|
{ name: 'curve', data: Buffer.from(curve) },
|
|
{ name: 'Q', data: Q },
|
|
{ name: 'd', data: d }
|
|
]
|
|
};
|
|
|
|
return (new PrivateKey(key));
|
|
}
|
|
|
|
function writePkcs1(der, key) {
|
|
der.startSequence();
|
|
|
|
switch (key.type) {
|
|
case 'rsa':
|
|
if (PrivateKey.isPrivateKey(key))
|
|
writePkcs1RSAPrivate(der, key);
|
|
else
|
|
writePkcs1RSAPublic(der, key);
|
|
break;
|
|
case 'dsa':
|
|
if (PrivateKey.isPrivateKey(key))
|
|
writePkcs1DSAPrivate(der, key);
|
|
else
|
|
writePkcs1DSAPublic(der, key);
|
|
break;
|
|
case 'ecdsa':
|
|
if (PrivateKey.isPrivateKey(key))
|
|
writePkcs1ECDSAPrivate(der, key);
|
|
else
|
|
writePkcs1ECDSAPublic(der, key);
|
|
break;
|
|
case 'ed25519':
|
|
if (PrivateKey.isPrivateKey(key))
|
|
writePkcs1EdDSAPrivate(der, key);
|
|
else
|
|
writePkcs1EdDSAPublic(der, key);
|
|
break;
|
|
default:
|
|
throw (new Error('Unknown key algo: ' + key.type));
|
|
}
|
|
|
|
der.endSequence();
|
|
}
|
|
|
|
function writePkcs1RSAPublic(der, key) {
|
|
der.writeBuffer(key.part.n.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.e.data, asn1.Ber.Integer);
|
|
}
|
|
|
|
function writePkcs1RSAPrivate(der, key) {
|
|
var ver = Buffer.from([0]);
|
|
der.writeBuffer(ver, asn1.Ber.Integer);
|
|
|
|
der.writeBuffer(key.part.n.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.e.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.d.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.p.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.q.data, asn1.Ber.Integer);
|
|
if (!key.part.dmodp || !key.part.dmodq)
|
|
utils.addRSAMissing(key);
|
|
der.writeBuffer(key.part.dmodp.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.dmodq.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.iqmp.data, asn1.Ber.Integer);
|
|
}
|
|
|
|
function writePkcs1DSAPrivate(der, key) {
|
|
var ver = Buffer.from([0]);
|
|
der.writeBuffer(ver, asn1.Ber.Integer);
|
|
|
|
der.writeBuffer(key.part.p.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.q.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.g.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.y.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.x.data, asn1.Ber.Integer);
|
|
}
|
|
|
|
function writePkcs1DSAPublic(der, key) {
|
|
der.writeBuffer(key.part.y.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.p.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.q.data, asn1.Ber.Integer);
|
|
der.writeBuffer(key.part.g.data, asn1.Ber.Integer);
|
|
}
|
|
|
|
function writePkcs1ECDSAPublic(der, key) {
|
|
der.startSequence();
|
|
|
|
der.writeOID('1.2.840.10045.2.1'); /* ecPublicKey */
|
|
var curve = key.part.curve.data.toString();
|
|
var curveOid = algs.curves[curve].pkcs8oid;
|
|
assert.string(curveOid, 'a known ECDSA named curve');
|
|
der.writeOID(curveOid);
|
|
|
|
der.endSequence();
|
|
|
|
var Q = utils.ecNormalize(key.part.Q.data, true);
|
|
der.writeBuffer(Q, asn1.Ber.BitString);
|
|
}
|
|
|
|
function writePkcs1ECDSAPrivate(der, key) {
|
|
var ver = Buffer.from([1]);
|
|
der.writeBuffer(ver, asn1.Ber.Integer);
|
|
|
|
der.writeBuffer(key.part.d.data, asn1.Ber.OctetString);
|
|
|
|
der.startSequence(0xa0);
|
|
var curve = key.part.curve.data.toString();
|
|
var curveOid = algs.curves[curve].pkcs8oid;
|
|
assert.string(curveOid, 'a known ECDSA named curve');
|
|
der.writeOID(curveOid);
|
|
der.endSequence();
|
|
|
|
der.startSequence(0xa1);
|
|
var Q = utils.ecNormalize(key.part.Q.data, true);
|
|
der.writeBuffer(Q, asn1.Ber.BitString);
|
|
der.endSequence();
|
|
}
|
|
|
|
function writePkcs1EdDSAPrivate(der, key) {
|
|
var ver = Buffer.from([1]);
|
|
der.writeBuffer(ver, asn1.Ber.Integer);
|
|
|
|
der.writeBuffer(key.part.k.data, asn1.Ber.OctetString);
|
|
|
|
der.startSequence(0xa0);
|
|
der.writeOID('1.3.101.112');
|
|
der.endSequence();
|
|
|
|
der.startSequence(0xa1);
|
|
utils.writeBitString(der, key.part.A.data);
|
|
der.endSequence();
|
|
}
|
|
|
|
function writePkcs1EdDSAPublic(der, key) {
|
|
throw (new Error('Public keys are not supported for EdDSA PKCS#1'));
|
|
}
|