mirror of
				https://gitea.com/actions/setup-python.git
				synced 2025-10-31 17:18:07 +07:00 
			
		
		
		
	
		
			
				
	
	
		
			247 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			247 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| // Copyright 2017 Joyent, Inc.
 | |
| 
 | |
| module.exports = PrivateKey;
 | |
| 
 | |
| var assert = require('assert-plus');
 | |
| var Buffer = require('safer-buffer').Buffer;
 | |
| var algs = require('./algs');
 | |
| var crypto = require('crypto');
 | |
| var Fingerprint = require('./fingerprint');
 | |
| var Signature = require('./signature');
 | |
| var errs = require('./errors');
 | |
| var util = require('util');
 | |
| var utils = require('./utils');
 | |
| var dhe = require('./dhe');
 | |
| var generateECDSA = dhe.generateECDSA;
 | |
| var generateED25519 = dhe.generateED25519;
 | |
| var edCompat = require('./ed-compat');
 | |
| var nacl = require('tweetnacl');
 | |
| 
 | |
| var Key = require('./key');
 | |
| 
 | |
| var InvalidAlgorithmError = errs.InvalidAlgorithmError;
 | |
| var KeyParseError = errs.KeyParseError;
 | |
| var KeyEncryptedError = errs.KeyEncryptedError;
 | |
| 
 | |
| var formats = {};
 | |
| formats['auto'] = require('./formats/auto');
 | |
| formats['pem'] = require('./formats/pem');
 | |
| formats['pkcs1'] = require('./formats/pkcs1');
 | |
| formats['pkcs8'] = require('./formats/pkcs8');
 | |
| formats['rfc4253'] = require('./formats/rfc4253');
 | |
| formats['ssh-private'] = require('./formats/ssh-private');
 | |
| formats['openssh'] = formats['ssh-private'];
 | |
| formats['ssh'] = formats['ssh-private'];
 | |
| formats['dnssec'] = require('./formats/dnssec');
 | |
| 
 | |
| function PrivateKey(opts) {
 | |
| 	assert.object(opts, 'options');
 | |
| 	Key.call(this, opts);
 | |
| 
 | |
| 	this._pubCache = undefined;
 | |
| }
 | |
| util.inherits(PrivateKey, Key);
 | |
| 
 | |
| PrivateKey.formats = formats;
 | |
| 
 | |
| PrivateKey.prototype.toBuffer = function (format, options) {
 | |
| 	if (format === undefined)
 | |
| 		format = 'pkcs1';
 | |
| 	assert.string(format, 'format');
 | |
| 	assert.object(formats[format], 'formats[format]');
 | |
| 	assert.optionalObject(options, 'options');
 | |
| 
 | |
| 	return (formats[format].write(this, options));
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.hash = function (algo, type) {
 | |
| 	return (this.toPublic().hash(algo, type));
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.fingerprint = function (algo, type) {
 | |
| 	return (this.toPublic().fingerprint(algo, type));
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.toPublic = function () {
 | |
| 	if (this._pubCache)
 | |
| 		return (this._pubCache);
 | |
| 
 | |
| 	var algInfo = algs.info[this.type];
 | |
| 	var pubParts = [];
 | |
| 	for (var i = 0; i < algInfo.parts.length; ++i) {
 | |
| 		var p = algInfo.parts[i];
 | |
| 		pubParts.push(this.part[p]);
 | |
| 	}
 | |
| 
 | |
| 	this._pubCache = new Key({
 | |
| 		type: this.type,
 | |
| 		source: this,
 | |
| 		parts: pubParts
 | |
| 	});
 | |
| 	if (this.comment)
 | |
| 		this._pubCache.comment = this.comment;
 | |
| 	return (this._pubCache);
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.derive = function (newType) {
 | |
| 	assert.string(newType, 'type');
 | |
| 	var priv, pub, pair;
 | |
| 
 | |
| 	if (this.type === 'ed25519' && newType === 'curve25519') {
 | |
| 		priv = this.part.k.data;
 | |
| 		if (priv[0] === 0x00)
 | |
| 			priv = priv.slice(1);
 | |
| 
 | |
| 		pair = nacl.box.keyPair.fromSecretKey(new Uint8Array(priv));
 | |
| 		pub = Buffer.from(pair.publicKey);
 | |
| 
 | |
| 		return (new PrivateKey({
 | |
| 			type: 'curve25519',
 | |
| 			parts: [
 | |
| 				{ name: 'A', data: utils.mpNormalize(pub) },
 | |
| 				{ name: 'k', data: utils.mpNormalize(priv) }
 | |
| 			]
 | |
| 		}));
 | |
| 	} else if (this.type === 'curve25519' && newType === 'ed25519') {
 | |
| 		priv = this.part.k.data;
 | |
| 		if (priv[0] === 0x00)
 | |
| 			priv = priv.slice(1);
 | |
| 
 | |
| 		pair = nacl.sign.keyPair.fromSeed(new Uint8Array(priv));
 | |
| 		pub = Buffer.from(pair.publicKey);
 | |
| 
 | |
| 		return (new PrivateKey({
 | |
| 			type: 'ed25519',
 | |
| 			parts: [
 | |
| 				{ name: 'A', data: utils.mpNormalize(pub) },
 | |
| 				{ name: 'k', data: utils.mpNormalize(priv) }
 | |
| 			]
 | |
| 		}));
 | |
| 	}
 | |
| 	throw (new Error('Key derivation not supported from ' + this.type +
 | |
| 	    ' to ' + newType));
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.createVerify = function (hashAlgo) {
 | |
| 	return (this.toPublic().createVerify(hashAlgo));
 | |
| };
 | |
| 
 | |
| PrivateKey.prototype.createSign = function (hashAlgo) {
 | |
| 	if (hashAlgo === undefined)
 | |
| 		hashAlgo = this.defaultHashAlgorithm();
 | |
| 	assert.string(hashAlgo, 'hash algorithm');
 | |
| 
 | |
| 	/* ED25519 is not supported by OpenSSL, use a javascript impl. */
 | |
| 	if (this.type === 'ed25519' && edCompat !== undefined)
 | |
| 		return (new edCompat.Signer(this, hashAlgo));
 | |
| 	if (this.type === 'curve25519')
 | |
| 		throw (new Error('Curve25519 keys are not suitable for ' +
 | |
| 		    'signing or verification'));
 | |
| 
 | |
| 	var v, nm, err;
 | |
| 	try {
 | |
| 		nm = hashAlgo.toUpperCase();
 | |
| 		v = crypto.createSign(nm);
 | |
| 	} catch (e) {
 | |
| 		err = e;
 | |
| 	}
 | |
| 	if (v === undefined || (err instanceof Error &&
 | |
| 	    err.message.match(/Unknown message digest/))) {
 | |
| 		nm = 'RSA-';
 | |
| 		nm += hashAlgo.toUpperCase();
 | |
| 		v = crypto.createSign(nm);
 | |
| 	}
 | |
| 	assert.ok(v, 'failed to create verifier');
 | |
| 	var oldSign = v.sign.bind(v);
 | |
| 	var key = this.toBuffer('pkcs1');
 | |
| 	var type = this.type;
 | |
| 	var curve = this.curve;
 | |
| 	v.sign = function () {
 | |
| 		var sig = oldSign(key);
 | |
| 		if (typeof (sig) === 'string')
 | |
| 			sig = Buffer.from(sig, 'binary');
 | |
| 		sig = Signature.parse(sig, type, 'asn1');
 | |
| 		sig.hashAlgorithm = hashAlgo;
 | |
| 		sig.curve = curve;
 | |
| 		return (sig);
 | |
| 	};
 | |
| 	return (v);
 | |
| };
 | |
| 
 | |
| PrivateKey.parse = function (data, format, options) {
 | |
| 	if (typeof (data) !== 'string')
 | |
| 		assert.buffer(data, 'data');
 | |
| 	if (format === undefined)
 | |
| 		format = 'auto';
 | |
| 	assert.string(format, 'format');
 | |
| 	if (typeof (options) === 'string')
 | |
| 		options = { filename: options };
 | |
| 	assert.optionalObject(options, 'options');
 | |
| 	if (options === undefined)
 | |
| 		options = {};
 | |
| 	assert.optionalString(options.filename, 'options.filename');
 | |
| 	if (options.filename === undefined)
 | |
| 		options.filename = '(unnamed)';
 | |
| 
 | |
| 	assert.object(formats[format], 'formats[format]');
 | |
| 
 | |
| 	try {
 | |
| 		var k = formats[format].read(data, options);
 | |
| 		assert.ok(k instanceof PrivateKey, 'key is not a private key');
 | |
| 		if (!k.comment)
 | |
| 			k.comment = options.filename;
 | |
| 		return (k);
 | |
| 	} catch (e) {
 | |
| 		if (e.name === 'KeyEncryptedError')
 | |
| 			throw (e);
 | |
| 		throw (new KeyParseError(options.filename, format, e));
 | |
| 	}
 | |
| };
 | |
| 
 | |
| PrivateKey.isPrivateKey = function (obj, ver) {
 | |
| 	return (utils.isCompatible(obj, PrivateKey, ver));
 | |
| };
 | |
| 
 | |
| PrivateKey.generate = function (type, options) {
 | |
| 	if (options === undefined)
 | |
| 		options = {};
 | |
| 	assert.object(options, 'options');
 | |
| 
 | |
| 	switch (type) {
 | |
| 	case 'ecdsa':
 | |
| 		if (options.curve === undefined)
 | |
| 			options.curve = 'nistp256';
 | |
| 		assert.string(options.curve, 'options.curve');
 | |
| 		return (generateECDSA(options.curve));
 | |
| 	case 'ed25519':
 | |
| 		return (generateED25519());
 | |
| 	default:
 | |
| 		throw (new Error('Key generation not supported with key ' +
 | |
| 		    'type "' + type + '"'));
 | |
| 	}
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * API versions for PrivateKey:
 | |
|  * [1,0] -- initial ver
 | |
|  * [1,1] -- added auto, pkcs[18], openssh/ssh-private formats
 | |
|  * [1,2] -- added defaultHashAlgorithm
 | |
|  * [1,3] -- added derive, ed, createDH
 | |
|  * [1,4] -- first tagged version
 | |
|  * [1,5] -- changed ed25519 part names and format
 | |
|  * [1,6] -- type arguments for hash() and fingerprint()
 | |
|  */
 | |
| PrivateKey.prototype._sshpkApiVersion = [1, 6];
 | |
| 
 | |
| PrivateKey._oldVersionDetect = function (obj) {
 | |
| 	assert.func(obj.toPublic);
 | |
| 	assert.func(obj.createSign);
 | |
| 	if (obj.derive)
 | |
| 		return ([1, 3]);
 | |
| 	if (obj.defaultHashAlgorithm)
 | |
| 		return ([1, 2]);
 | |
| 	if (obj.formats['auto'])
 | |
| 		return ([1, 1]);
 | |
| 	return ([1, 0]);
 | |
| };
 |