summaryrefslogtreecommitdiff
path: root/ext/node/crypto
diff options
context:
space:
mode:
authorBartek Iwańczuk <biwanczuk@gmail.com>2023-04-24 12:22:21 +0200
committerGitHub <noreply@github.com>2023-04-24 12:22:21 +0200
commit1f0360c07382dbd86066d1aa8aa4bae34aff18c5 (patch)
treecc82d00aea829f0b3d3949f40df9696b099ee662 /ext/node/crypto
parent28e2c7204fe02304a8fc3339d7758eec0f64f723 (diff)
refactor(ext/node): reorganize ops (#18799)
Move all op related code of "ext/node" to "ext/node/ops" module. These files were unnecessarily scattered around the extension.
Diffstat (limited to 'ext/node/crypto')
-rw-r--r--ext/node/crypto/cipher.rs204
-rw-r--r--ext/node/crypto/dh.rs288
-rw-r--r--ext/node/crypto/digest.rs117
-rw-r--r--ext/node/crypto/mod.rs903
-rw-r--r--ext/node/crypto/primes.rs330
-rw-r--r--ext/node/crypto/x509.rs319
6 files changed, 0 insertions, 2161 deletions
diff --git a/ext/node/crypto/cipher.rs b/ext/node/crypto/cipher.rs
deleted file mode 100644
index 4f3f7f20d..000000000
--- a/ext/node/crypto/cipher.rs
+++ /dev/null
@@ -1,204 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-
-use aes::cipher::block_padding::Pkcs7;
-use aes::cipher::BlockDecryptMut;
-use aes::cipher::BlockEncryptMut;
-use aes::cipher::KeyIvInit;
-use deno_core::error::type_error;
-use deno_core::error::AnyError;
-use deno_core::Resource;
-use digest::KeyInit;
-
-use std::borrow::Cow;
-use std::cell::RefCell;
-use std::rc::Rc;
-
-enum Cipher {
- Aes128Cbc(Box<cbc::Encryptor<aes::Aes128>>),
- Aes128Ecb(Box<ecb::Encryptor<aes::Aes128>>),
- // TODO(kt3k): add more algorithms Aes192Cbc, Aes256Cbc, Aes128GCM, etc.
-}
-
-enum Decipher {
- Aes128Cbc(Box<cbc::Decryptor<aes::Aes128>>),
- Aes128Ecb(Box<ecb::Decryptor<aes::Aes128>>),
- // TODO(kt3k): add more algorithms Aes192Cbc, Aes256Cbc, Aes128GCM, etc.
-}
-
-pub struct CipherContext {
- cipher: Rc<RefCell<Cipher>>,
-}
-
-pub struct DecipherContext {
- decipher: Rc<RefCell<Decipher>>,
-}
-
-impl CipherContext {
- pub fn new(algorithm: &str, key: &[u8], iv: &[u8]) -> Result<Self, AnyError> {
- Ok(Self {
- cipher: Rc::new(RefCell::new(Cipher::new(algorithm, key, iv)?)),
- })
- }
-
- pub fn encrypt(&self, input: &[u8], output: &mut [u8]) {
- self.cipher.borrow_mut().encrypt(input, output);
- }
-
- pub fn r#final(
- self,
- input: &[u8],
- output: &mut [u8],
- ) -> Result<(), AnyError> {
- Rc::try_unwrap(self.cipher)
- .map_err(|_| type_error("Cipher context is already in use"))?
- .into_inner()
- .r#final(input, output)
- }
-}
-
-impl DecipherContext {
- pub fn new(algorithm: &str, key: &[u8], iv: &[u8]) -> Result<Self, AnyError> {
- Ok(Self {
- decipher: Rc::new(RefCell::new(Decipher::new(algorithm, key, iv)?)),
- })
- }
-
- pub fn decrypt(&self, input: &[u8], output: &mut [u8]) {
- self.decipher.borrow_mut().decrypt(input, output);
- }
-
- pub fn r#final(
- self,
- input: &[u8],
- output: &mut [u8],
- ) -> Result<(), AnyError> {
- Rc::try_unwrap(self.decipher)
- .map_err(|_| type_error("Decipher context is already in use"))?
- .into_inner()
- .r#final(input, output)
- }
-}
-
-impl Resource for CipherContext {
- fn name(&self) -> Cow<str> {
- "cryptoCipher".into()
- }
-}
-
-impl Resource for DecipherContext {
- fn name(&self) -> Cow<str> {
- "cryptoDecipher".into()
- }
-}
-
-impl Cipher {
- fn new(
- algorithm_name: &str,
- key: &[u8],
- iv: &[u8],
- ) -> Result<Self, AnyError> {
- use Cipher::*;
- Ok(match algorithm_name {
- "aes-128-cbc" => {
- Aes128Cbc(Box::new(cbc::Encryptor::new(key.into(), iv.into())))
- }
- "aes-128-ecb" => Aes128Ecb(Box::new(ecb::Encryptor::new(key.into()))),
- _ => return Err(type_error(format!("Unknown cipher {algorithm_name}"))),
- })
- }
-
- /// encrypt encrypts the data in the middle of the input.
- fn encrypt(&mut self, input: &[u8], output: &mut [u8]) {
- use Cipher::*;
- match self {
- Aes128Cbc(encryptor) => {
- assert!(input.len() % 16 == 0);
- for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) {
- encryptor.encrypt_block_b2b_mut(input.into(), output.into());
- }
- }
- Aes128Ecb(encryptor) => {
- assert!(input.len() % 16 == 0);
- for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) {
- encryptor.encrypt_block_b2b_mut(input.into(), output.into());
- }
- }
- }
- }
-
- /// r#final encrypts the last block of the input data.
- fn r#final(self, input: &[u8], output: &mut [u8]) -> Result<(), AnyError> {
- assert!(input.len() < 16);
- use Cipher::*;
- match self {
- Aes128Cbc(encryptor) => {
- let _ = (*encryptor)
- .encrypt_padded_b2b_mut::<Pkcs7>(input, output)
- .map_err(|_| type_error("Cannot pad the input data"))?;
- Ok(())
- }
- Aes128Ecb(encryptor) => {
- let _ = (*encryptor)
- .encrypt_padded_b2b_mut::<Pkcs7>(input, output)
- .map_err(|_| type_error("Cannot pad the input data"))?;
- Ok(())
- }
- }
- }
-}
-
-impl Decipher {
- fn new(
- algorithm_name: &str,
- key: &[u8],
- iv: &[u8],
- ) -> Result<Self, AnyError> {
- use Decipher::*;
- Ok(match algorithm_name {
- "aes-128-cbc" => {
- Aes128Cbc(Box::new(cbc::Decryptor::new(key.into(), iv.into())))
- }
- "aes-128-ecb" => Aes128Ecb(Box::new(ecb::Decryptor::new(key.into()))),
- _ => return Err(type_error(format!("Unknown cipher {algorithm_name}"))),
- })
- }
-
- /// decrypt decrypts the data in the middle of the input.
- fn decrypt(&mut self, input: &[u8], output: &mut [u8]) {
- use Decipher::*;
- match self {
- Aes128Cbc(decryptor) => {
- assert!(input.len() % 16 == 0);
- for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) {
- decryptor.decrypt_block_b2b_mut(input.into(), output.into());
- }
- }
- Aes128Ecb(decryptor) => {
- assert!(input.len() % 16 == 0);
- for (input, output) in input.chunks(16).zip(output.chunks_mut(16)) {
- decryptor.decrypt_block_b2b_mut(input.into(), output.into());
- }
- }
- }
- }
-
- /// r#final decrypts the last block of the input data.
- fn r#final(self, input: &[u8], output: &mut [u8]) -> Result<(), AnyError> {
- assert!(input.len() == 16);
- use Decipher::*;
- match self {
- Aes128Cbc(decryptor) => {
- let _ = (*decryptor)
- .decrypt_padded_b2b_mut::<Pkcs7>(input, output)
- .map_err(|_| type_error("Cannot unpad the input data"))?;
- Ok(())
- }
- Aes128Ecb(decryptor) => {
- let _ = (*decryptor)
- .decrypt_padded_b2b_mut::<Pkcs7>(input, output)
- .map_err(|_| type_error("Cannot unpad the input data"))?;
- Ok(())
- }
- }
- }
-}
diff --git a/ext/node/crypto/dh.rs b/ext/node/crypto/dh.rs
deleted file mode 100644
index 4da9a01bf..000000000
--- a/ext/node/crypto/dh.rs
+++ /dev/null
@@ -1,288 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-
-use super::primes::Prime;
-use num_bigint_dig::BigUint;
-use num_bigint_dig::RandBigInt;
-use num_traits::FromPrimitive;
-
-pub struct PublicKey(BigUint);
-
-impl PublicKey {
- pub fn into_vec(self) -> Vec<u8> {
- self.0.to_bytes_be()
- }
-}
-
-pub struct PrivateKey(BigUint);
-
-impl PrivateKey {
- pub fn new(exponent_size: usize) -> Self {
- let mut rng = rand::thread_rng();
- let exponent = rng.gen_biguint(exponent_size);
- Self(exponent)
- }
-
- /// Diffie-Hellman modular exponentiation.
- /// s = g^x mod p
- pub fn compute_public_key(
- &self,
- generator: &BigUint,
- modulus: &BigUint,
- ) -> PublicKey {
- let public_key = generator.modpow(&self.0, modulus);
- PublicKey(public_key)
- }
-
- pub fn into_vec(self) -> Vec<u8> {
- self.0.to_bytes_be()
- }
-}
-
-/// Classic DH
-pub struct DiffieHellman {
- pub private_key: PrivateKey,
- pub public_key: PublicKey,
-}
-
-impl DiffieHellman {
- pub fn group<G>() -> Self
- where
- G: DiffieHellmanGroup,
- {
- let private_key = PrivateKey::new(G::EXPONENT_SIZE / 8);
-
- let generator = BigUint::from_usize(G::GENERATOR).unwrap();
- let modulus = BigUint::from_slice(G::MODULUS);
-
- let public_key = private_key.compute_public_key(&generator, &modulus);
-
- Self {
- private_key,
- public_key,
- }
- }
-
- pub fn new(prime: Prime, generator: usize) -> Self {
- let private_key = PrivateKey::new(32);
-
- let generator = BigUint::from_usize(generator).unwrap();
- let public_key = private_key.compute_public_key(&generator, &prime);
-
- Self {
- private_key,
- public_key,
- }
- }
-}
-
-/// Well-known modp groups
-//
-/// More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
-/// https://www.rfc-editor.org/rfc/rfc3526
-///
-/// Insecure groups `modp1` and `modp2` from https://www.rfc-editor.org/rfc/rfc2409.txt
-/// are deprecated in Node.js. We don't support them.
-pub trait DiffieHellmanGroup {
- const GENERATOR: usize;
- const MODULUS: &'static [u32];
- /// Size of the exponent in bits
- const EXPONENT_SIZE: usize;
-}
-
-/// 1536-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-2
-pub struct Modp1536;
-impl DiffieHellmanGroup for Modp1536 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 192;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA237327, 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
-
-/// 2048-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-3
-pub struct Modp2048;
-impl DiffieHellmanGroup for Modp2048 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 256;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B,
- 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9,
- 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510,
- 0x15728E5A, 0x8AACAA68, 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
-
-/// 3072-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-4
-pub struct Modp3072;
-impl DiffieHellmanGroup for Modp3072 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 384;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B,
- 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9,
- 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510,
- 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64,
- 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7,
- 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B,
- 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C,
- 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31,
- 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA93AD2CA, 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
-
-/// 4096-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-5
-pub struct Modp4096;
-impl DiffieHellmanGroup for Modp4096 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 512;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B,
- 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9,
- 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510,
- 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64,
- 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7,
- 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B,
- 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C,
- 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31,
- 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7,
- 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA,
- 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6,
- 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED,
- 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9,
- 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34063199,
- 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
-
-/// 6144-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-6
-pub struct Modp6144;
-impl DiffieHellmanGroup for Modp6144 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 768;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B,
- 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9,
- 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510,
- 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64,
- 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7,
- 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B,
- 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C,
- 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31,
- 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7,
- 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA,
- 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6,
- 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED,
- 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9,
- 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34028492,
- 0x36C3FAB4, 0xD27C7026, 0xC1D4DCB2, 0x602646DE, 0xC9751E76, 0x3DBA37BD,
- 0xF8FF9406, 0xAD9E530E, 0xE5DB382F, 0x413001AE, 0xB06A53ED, 0x9027D831,
- 0x179727B0, 0x865A8918, 0xDA3EDBEB, 0xCF9B14ED, 0x44CE6CBA, 0xCED4BB1B,
- 0xDB7F1447, 0xE6CC254B, 0x33205151, 0x2BD7AF42, 0x6FB8F401, 0x378CD2BF,
- 0x5983CA01, 0xC64B92EC, 0xF032EA15, 0xD1721D03, 0xF482D7CE, 0x6E74FEF6,
- 0xD55E702F, 0x46980C82, 0xB5A84031, 0x900B1C9E, 0x59E7C97F, 0xBEC7E8F3,
- 0x23A97A7E, 0x36CC88BE, 0x0F1D45B7, 0xFF585AC5, 0x4BD407B2, 0x2B4154AA,
- 0xCC8F6D7E, 0xBF48E1D8, 0x14CC5ED2, 0x0F8037E0, 0xA79715EE, 0xF29BE328,
- 0x06A1D58B, 0xB7C5DA76, 0xF550AA3D, 0x8A1FBFF0, 0xEB19CCB1, 0xA313D55C,
- 0xDA56C9EC, 0x2EF29632, 0x387FE8D7, 0x6E3C0468, 0x043E8F66, 0x3F4860EE,
- 0x12BF2D5B, 0x0B7474D6, 0xE694F91E, 0x6DCC4024, 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
-
-/// 8192-bit MODP Group
-/// https://www.rfc-editor.org/rfc/rfc3526#section-7
-pub struct Modp8192;
-impl DiffieHellmanGroup for Modp8192 {
- const GENERATOR: usize = 2;
- const EXPONENT_SIZE: usize = 1024;
-
- const MODULUS: &'static [u32] = &[
- 0xFFFFFFFF, 0xFFFFFFFF, 0xC90FDAA2, 0x2168C234, 0xC4C6628B, 0x80DC1CD1,
- 0x29024E08, 0x8A67CC74, 0x020BBEA6, 0x3B139B22, 0x514A0879, 0x8E3404DD,
- 0xEF9519B3, 0xCD3A431B, 0x302B0A6D, 0xF25F1437, 0x4FE1356D, 0x6D51C245,
- 0xE485B576, 0x625E7EC6, 0xF44C42E9, 0xA637ED6B, 0x0BFF5CB6, 0xF406B7ED,
- 0xEE386BFB, 0x5A899FA5, 0xAE9F2411, 0x7C4B1FE6, 0x49286651, 0xECE45B3D,
- 0xC2007CB8, 0xA163BF05, 0x98DA4836, 0x1C55D39A, 0x69163FA8, 0xFD24CF5F,
- 0x83655D23, 0xDCA3AD96, 0x1C62F356, 0x208552BB, 0x9ED52907, 0x7096966D,
- 0x670C354E, 0x4ABC9804, 0xF1746C08, 0xCA18217C, 0x32905E46, 0x2E36CE3B,
- 0xE39E772C, 0x180E8603, 0x9B2783A2, 0xEC07A28F, 0xB5C55DF0, 0x6F4C52C9,
- 0xDE2BCBF6, 0x95581718, 0x3995497C, 0xEA956AE5, 0x15D22618, 0x98FA0510,
- 0x15728E5A, 0x8AAAC42D, 0xAD33170D, 0x04507A33, 0xA85521AB, 0xDF1CBA64,
- 0xECFB8504, 0x58DBEF0A, 0x8AEA7157, 0x5D060C7D, 0xB3970F85, 0xA6E1E4C7,
- 0xABF5AE8C, 0xDB0933D7, 0x1E8C94E0, 0x4A25619D, 0xCEE3D226, 0x1AD2EE6B,
- 0xF12FFA06, 0xD98A0864, 0xD8760273, 0x3EC86A64, 0x521F2B18, 0x177B200C,
- 0xBBE11757, 0x7A615D6C, 0x770988C0, 0xBAD946E2, 0x08E24FA0, 0x74E5AB31,
- 0x43DB5BFC, 0xE0FD108E, 0x4B82D120, 0xA9210801, 0x1A723C12, 0xA787E6D7,
- 0x88719A10, 0xBDBA5B26, 0x99C32718, 0x6AF4E23C, 0x1A946834, 0xB6150BDA,
- 0x2583E9CA, 0x2AD44CE8, 0xDBBBC2DB, 0x04DE8EF9, 0x2E8EFC14, 0x1FBECAA6,
- 0x287C5947, 0x4E6BC05D, 0x99B2964F, 0xA090C3A2, 0x233BA186, 0x515BE7ED,
- 0x1F612970, 0xCEE2D7AF, 0xB81BDD76, 0x2170481C, 0xD0069127, 0xD5B05AA9,
- 0x93B4EA98, 0x8D8FDDC1, 0x86FFB7DC, 0x90A6C08F, 0x4DF435C9, 0x34028492,
- 0x36C3FAB4, 0xD27C7026, 0xC1D4DCB2, 0x602646DE, 0xC9751E76, 0x3DBA37BD,
- 0xF8FF9406, 0xAD9E530E, 0xE5DB382F, 0x413001AE, 0xB06A53ED, 0x9027D831,
- 0x179727B0, 0x865A8918, 0xDA3EDBEB, 0xCF9B14ED, 0x44CE6CBA, 0xCED4BB1B,
- 0xDB7F1447, 0xE6CC254B, 0x33205151, 0x2BD7AF42, 0x6FB8F401, 0x378CD2BF,
- 0x5983CA01, 0xC64B92EC, 0xF032EA15, 0xD1721D03, 0xF482D7CE, 0x6E74FEF6,
- 0xD55E702F, 0x46980C82, 0xB5A84031, 0x900B1C9E, 0x59E7C97F, 0xBEC7E8F3,
- 0x23A97A7E, 0x36CC88BE, 0x0F1D45B7, 0xFF585AC5, 0x4BD407B2, 0x2B4154AA,
- 0xCC8F6D7E, 0xBF48E1D8, 0x14CC5ED2, 0x0F8037E0, 0xA79715EE, 0xF29BE328,
- 0x06A1D58B, 0xB7C5DA76, 0xF550AA3D, 0x8A1FBFF0, 0xEB19CCB1, 0xA313D55C,
- 0xDA56C9EC, 0x2EF29632, 0x387FE8D7, 0x6E3C0468, 0x043E8F66, 0x3F4860EE,
- 0x12BF2D5B, 0x0B7474D6, 0xE694F91E, 0x6DBE1159, 0x74A3926F, 0x12FEE5E4,
- 0x38777CB6, 0xA932DF8C, 0xD8BEC4D0, 0x73B931BA, 0x3BC832B6, 0x8D9DD300,
- 0x741FA7BF, 0x8AFC47ED, 0x2576F693, 0x6BA42466, 0x3AAB639C, 0x5AE4F568,
- 0x3423B474, 0x2BF1C978, 0x238F16CB, 0xE39D652D, 0xE3FDB8BE, 0xFC848AD9,
- 0x22222E04, 0xA4037C07, 0x13EB57A8, 0x1A23F0C7, 0x3473FC64, 0x6CEA306B,
- 0x4BCBC886, 0x2F8385DD, 0xFA9D4B7F, 0xA2C087E8, 0x79683303, 0xED5BDD3A,
- 0x062B3CF5, 0xB3A278A6, 0x6D2A13F8, 0x3F44F82D, 0xDF310EE0, 0x74AB6A36,
- 0x4597E899, 0xA0255DC1, 0x64F31CC5, 0x0846851D, 0xF9AB4819, 0x5DED7EA1,
- 0xB1D510BD, 0x7EE74D73, 0xFAF36BC3, 0x1ECFA268, 0x359046F4, 0xEB879F92,
- 0x4009438B, 0x481C6CD7, 0x889A002E, 0xD5EE382B, 0xC9190DA6, 0xFC026E47,
- 0x9558E447, 0x5677E9AA, 0x9E3050E2, 0x765694DF, 0xC81F56E8, 0x80B96E71,
- 0x60C980DD, 0x98EDD3DF, 0xFFFFFFFF, 0xFFFFFFFF,
- ];
-}
diff --git a/ext/node/crypto/digest.rs b/ext/node/crypto/digest.rs
deleted file mode 100644
index 4fab58a43..000000000
--- a/ext/node/crypto/digest.rs
+++ /dev/null
@@ -1,117 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-use deno_core::error::type_error;
-use deno_core::error::AnyError;
-use deno_core::Resource;
-use digest::Digest;
-use digest::DynDigest;
-use std::borrow::Cow;
-use std::cell::RefCell;
-use std::rc::Rc;
-
-pub enum Hash {
- Md4(Box<md4::Md4>),
- Md5(Box<md5::Md5>),
- Ripemd160(Box<ripemd::Ripemd160>),
- Sha1(Box<sha1::Sha1>),
- Sha224(Box<sha2::Sha224>),
- Sha256(Box<sha2::Sha256>),
- Sha384(Box<sha2::Sha384>),
- Sha512(Box<sha2::Sha512>),
-}
-
-pub struct Context {
- pub hash: Rc<RefCell<Hash>>,
-}
-
-impl Context {
- pub fn new(algorithm: &str) -> Result<Self, AnyError> {
- Ok(Self {
- hash: Rc::new(RefCell::new(Hash::new(algorithm)?)),
- })
- }
-
- pub fn update(&self, data: &[u8]) {
- self.hash.borrow_mut().update(data);
- }
-
- pub fn digest(self) -> Result<Box<[u8]>, AnyError> {
- let hash = Rc::try_unwrap(self.hash)
- .map_err(|_| type_error("Hash context is already in use"))?;
-
- let hash = hash.into_inner();
- Ok(hash.digest_and_drop())
- }
-}
-
-impl Clone for Context {
- fn clone(&self) -> Self {
- Self {
- hash: Rc::new(RefCell::new(self.hash.borrow().clone())),
- }
- }
-}
-
-impl Resource for Context {
- fn name(&self) -> Cow<str> {
- "cryptoDigest".into()
- }
-}
-
-use Hash::*;
-
-impl Hash {
- pub fn new(algorithm_name: &str) -> Result<Self, AnyError> {
- Ok(match algorithm_name {
- "md4" => Md4(Default::default()),
- "md5" => Md5(Default::default()),
- "ripemd160" => Ripemd160(Default::default()),
- "sha1" => Sha1(Default::default()),
- "sha224" => Sha224(Default::default()),
- "sha256" => Sha256(Default::default()),
- "sha384" => Sha384(Default::default()),
- "sha512" => Sha512(Default::default()),
- _ => return Err(type_error("unsupported algorithm")),
- })
- }
-
- pub fn update(&mut self, data: &[u8]) {
- match self {
- Md4(context) => Digest::update(&mut **context, data),
- Md5(context) => Digest::update(&mut **context, data),
- Ripemd160(context) => Digest::update(&mut **context, data),
- Sha1(context) => Digest::update(&mut **context, data),
- Sha224(context) => Digest::update(&mut **context, data),
- Sha256(context) => Digest::update(&mut **context, data),
- Sha384(context) => Digest::update(&mut **context, data),
- Sha512(context) => Digest::update(&mut **context, data),
- };
- }
-
- pub fn digest_and_drop(self) -> Box<[u8]> {
- match self {
- Md4(context) => context.finalize(),
- Md5(context) => context.finalize(),
- Ripemd160(context) => context.finalize(),
- Sha1(context) => context.finalize(),
- Sha224(context) => context.finalize(),
- Sha256(context) => context.finalize(),
- Sha384(context) => context.finalize(),
- Sha512(context) => context.finalize(),
- }
- }
-}
-
-impl Clone for Hash {
- fn clone(&self) -> Self {
- match self {
- Md4(_) => Md4(Default::default()),
- Md5(_) => Md5(Default::default()),
- Ripemd160(_) => Ripemd160(Default::default()),
- Sha1(_) => Sha1(Default::default()),
- Sha224(_) => Sha224(Default::default()),
- Sha256(_) => Sha256(Default::default()),
- Sha384(_) => Sha384(Default::default()),
- Sha512(_) => Sha512(Default::default()),
- }
- }
-}
diff --git a/ext/node/crypto/mod.rs b/ext/node/crypto/mod.rs
deleted file mode 100644
index d224b40f7..000000000
--- a/ext/node/crypto/mod.rs
+++ /dev/null
@@ -1,903 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-use deno_core::error::generic_error;
-use deno_core::error::type_error;
-use deno_core::error::AnyError;
-use deno_core::op;
-use deno_core::serde_v8;
-use deno_core::OpState;
-use deno_core::ResourceId;
-use deno_core::StringOrBuffer;
-use deno_core::ZeroCopyBuf;
-use hkdf::Hkdf;
-use num_bigint::BigInt;
-use num_traits::FromPrimitive;
-use rand::distributions::Distribution;
-use rand::distributions::Uniform;
-use rand::thread_rng;
-use rand::Rng;
-use std::future::Future;
-use std::rc::Rc;
-
-use rsa::padding::PaddingScheme;
-use rsa::pkcs8::DecodePrivateKey;
-use rsa::pkcs8::DecodePublicKey;
-use rsa::PublicKey;
-use rsa::RsaPrivateKey;
-use rsa::RsaPublicKey;
-
-mod cipher;
-mod dh;
-mod digest;
-mod primes;
-pub mod x509;
-
-#[op]
-pub fn op_node_check_prime(num: serde_v8::BigInt, checks: usize) -> bool {
- primes::is_probably_prime(&num, checks)
-}
-
-#[op]
-pub fn op_node_check_prime_bytes(
- bytes: &[u8],
- checks: usize,
-) -> Result<bool, AnyError> {
- let candidate = BigInt::from_bytes_be(num_bigint::Sign::Plus, bytes);
- Ok(primes::is_probably_prime(&candidate, checks))
-}
-
-#[op]
-pub async fn op_node_check_prime_async(
- num: serde_v8::BigInt,
- checks: usize,
-) -> Result<bool, AnyError> {
- // TODO(@littledivy): use rayon for CPU-bound tasks
- Ok(
- tokio::task::spawn_blocking(move || {
- primes::is_probably_prime(&num, checks)
- })
- .await?,
- )
-}
-
-#[op]
-pub fn op_node_check_prime_bytes_async(
- bytes: &[u8],
- checks: usize,
-) -> Result<impl Future<Output = Result<bool, AnyError>> + 'static, AnyError> {
- let candidate = BigInt::from_bytes_be(num_bigint::Sign::Plus, bytes);
- // TODO(@littledivy): use rayon for CPU-bound tasks
- Ok(async move {
- Ok(
- tokio::task::spawn_blocking(move || {
- primes::is_probably_prime(&candidate, checks)
- })
- .await?,
- )
- })
-}
-
-#[op(fast)]
-pub fn op_node_create_hash(state: &mut OpState, algorithm: &str) -> u32 {
- state
- .resource_table
- .add(match digest::Context::new(algorithm) {
- Ok(context) => context,
- Err(_) => return 0,
- })
-}
-
-#[op(fast)]
-pub fn op_node_hash_update(state: &mut OpState, rid: u32, data: &[u8]) -> bool {
- let context = match state.resource_table.get::<digest::Context>(rid) {
- Ok(context) => context,
- _ => return false,
- };
- context.update(data);
- true
-}
-
-#[op(fast)]
-pub fn op_node_hash_update_str(
- state: &mut OpState,
- rid: u32,
- data: &str,
-) -> bool {
- let context = match state.resource_table.get::<digest::Context>(rid) {
- Ok(context) => context,
- _ => return false,
- };
- context.update(data.as_bytes());
- true
-}
-
-#[op]
-pub fn op_node_hash_digest(
- state: &mut OpState,
- rid: ResourceId,
-) -> Result<ZeroCopyBuf, AnyError> {
- let context = state.resource_table.take::<digest::Context>(rid)?;
- let context = Rc::try_unwrap(context)
- .map_err(|_| type_error("Hash context is already in use"))?;
- Ok(context.digest()?.into())
-}
-
-#[op]
-pub fn op_node_hash_digest_hex(
- state: &mut OpState,
- rid: ResourceId,
-) -> Result<String, AnyError> {
- let context = state.resource_table.take::<digest::Context>(rid)?;
- let context = Rc::try_unwrap(context)
- .map_err(|_| type_error("Hash context is already in use"))?;
- let digest = context.digest()?;
- Ok(hex::encode(digest))
-}
-
-#[op]
-pub fn op_node_hash_clone(
- state: &mut OpState,
- rid: ResourceId,
-) -> Result<ResourceId, AnyError> {
- let context = state.resource_table.get::<digest::Context>(rid)?;
- Ok(state.resource_table.add(context.as_ref().clone()))
-}
-
-#[op]
-pub fn op_node_private_encrypt(
- key: StringOrBuffer,
- msg: StringOrBuffer,
- padding: u32,
-) -> Result<ZeroCopyBuf, AnyError> {
- let key = RsaPrivateKey::from_pkcs8_pem((&key).try_into()?)?;
-
- let mut rng = rand::thread_rng();
- match padding {
- 1 => Ok(
- key
- .encrypt(&mut rng, PaddingScheme::new_pkcs1v15_encrypt(), &msg)?
- .into(),
- ),
- 4 => Ok(
- key
- .encrypt(&mut rng, PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)?
- .into(),
- ),
- _ => Err(type_error("Unknown padding")),
- }
-}
-
-#[op]
-pub fn op_node_private_decrypt(
- key: StringOrBuffer,
- msg: StringOrBuffer,
- padding: u32,
-) -> Result<ZeroCopyBuf, AnyError> {
- let key = RsaPrivateKey::from_pkcs8_pem((&key).try_into()?)?;
-
- match padding {
- 1 => Ok(
- key
- .decrypt(PaddingScheme::new_pkcs1v15_encrypt(), &msg)?
- .into(),
- ),
- 4 => Ok(
- key
- .decrypt(PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)?
- .into(),
- ),
- _ => Err(type_error("Unknown padding")),
- }
-}
-
-#[op]
-pub fn op_node_public_encrypt(
- key: StringOrBuffer,
- msg: StringOrBuffer,
- padding: u32,
-) -> Result<ZeroCopyBuf, AnyError> {
- let key = RsaPublicKey::from_public_key_pem((&key).try_into()?)?;
-
- let mut rng = rand::thread_rng();
- match padding {
- 1 => Ok(
- key
- .encrypt(&mut rng, PaddingScheme::new_pkcs1v15_encrypt(), &msg)?
- .into(),
- ),
- 4 => Ok(
- key
- .encrypt(&mut rng, PaddingScheme::new_oaep::<sha1::Sha1>(), &msg)?
- .into(),
- ),
- _ => Err(type_error("Unknown padding")),
- }
-}
-
-#[op(fast)]
-pub fn op_node_create_cipheriv(
- state: &mut OpState,
- algorithm: &str,
- key: &[u8],
- iv: &[u8],
-) -> u32 {
- state.resource_table.add(
- match cipher::CipherContext::new(algorithm, key, iv) {
- Ok(context) => context,
- Err(_) => return 0,
- },
- )
-}
-
-#[op(fast)]
-pub fn op_node_cipheriv_encrypt(
- state: &mut OpState,
- rid: u32,
- input: &[u8],
- output: &mut [u8],
-) -> bool {
- let context = match state.resource_table.get::<cipher::CipherContext>(rid) {
- Ok(context) => context,
- Err(_) => return false,
- };
- context.encrypt(input, output);
- true
-}
-
-#[op]
-pub fn op_node_cipheriv_final(
- state: &mut OpState,
- rid: u32,
- input: &[u8],
- output: &mut [u8],
-) -> Result<(), AnyError> {
- let context = state.resource_table.take::<cipher::CipherContext>(rid)?;
- let context = Rc::try_unwrap(context)
- .map_err(|_| type_error("Cipher context is already in use"))?;
- context.r#final(input, output)
-}
-
-#[op(fast)]
-pub fn op_node_create_decipheriv(
- state: &mut OpState,
- algorithm: &str,
- key: &[u8],
- iv: &[u8],
-) -> u32 {
- state.resource_table.add(
- match cipher::DecipherContext::new(algorithm, key, iv) {
- Ok(context) => context,
- Err(_) => return 0,
- },
- )
-}
-
-#[op(fast)]
-pub fn op_node_decipheriv_decrypt(
- state: &mut OpState,
- rid: u32,
- input: &[u8],
- output: &mut [u8],
-) -> bool {
- let context = match state.resource_table.get::<cipher::DecipherContext>(rid) {
- Ok(context) => context,
- Err(_) => return false,
- };
- context.decrypt(input, output);
- true
-}
-
-#[op]
-pub fn op_node_decipheriv_final(
- state: &mut OpState,
- rid: u32,
- input: &[u8],
- output: &mut [u8],
-) -> Result<(), AnyError> {
- let context = state.resource_table.take::<cipher::DecipherContext>(rid)?;
- let context = Rc::try_unwrap(context)
- .map_err(|_| type_error("Cipher context is already in use"))?;
- context.r#final(input, output)
-}
-
-#[op]
-pub fn op_node_sign(
- digest: &[u8],
- digest_type: &str,
- key: StringOrBuffer,
- key_type: &str,
- key_format: &str,
-) -> Result<ZeroCopyBuf, AnyError> {
- match key_type {
- "rsa" => {
- use rsa::pkcs1v15::SigningKey;
- use signature::hazmat::PrehashSigner;
- let key = match key_format {
- "pem" => RsaPrivateKey::from_pkcs8_pem((&key).try_into()?)
- .map_err(|_| type_error("Invalid RSA private key"))?,
- // TODO(kt3k): Support der and jwk formats
- _ => {
- return Err(type_error(format!(
- "Unsupported key format: {}",
- key_format
- )))
- }
- };
- Ok(
- match digest_type {
- "sha224" => {
- let signing_key = SigningKey::<sha2::Sha224>::new_with_prefix(key);
- signing_key.sign_prehash(digest)?.to_vec()
- }
- "sha256" => {
- let signing_key = SigningKey::<sha2::Sha256>::new_with_prefix(key);
- signing_key.sign_prehash(digest)?.to_vec()
- }
- "sha384" => {
- let signing_key = SigningKey::<sha2::Sha384>::new_with_prefix(key);
- signing_key.sign_prehash(digest)?.to_vec()
- }
- "sha512" => {
- let signing_key = SigningKey::<sha2::Sha512>::new_with_prefix(key);
- signing_key.sign_prehash(digest)?.to_vec()
- }
- _ => {
- return Err(type_error(format!(
- "Unknown digest algorithm: {}",
- digest_type
- )))
- }
- }
- .into(),
- )
- }
- _ => Err(type_error(format!(
- "Signing with {} keys is not supported yet",
- key_type
- ))),
- }
-}
-
-#[op]
-fn op_node_verify(
- digest: &[u8],
- digest_type: &str,
- key: StringOrBuffer,
- key_type: &str,
- key_format: &str,
- signature: &[u8],
-) -> Result<bool, AnyError> {
- match key_type {
- "rsa" => {
- use rsa::pkcs1v15::VerifyingKey;
- use signature::hazmat::PrehashVerifier;
- let key = match key_format {
- "pem" => RsaPublicKey::from_public_key_pem((&key).try_into()?)
- .map_err(|_| type_error("Invalid RSA public key"))?,
- // TODO(kt3k): Support der and jwk formats
- _ => {
- return Err(type_error(format!(
- "Unsupported key format: {}",
- key_format
- )))
- }
- };
- Ok(match digest_type {
- "sha224" => VerifyingKey::<sha2::Sha224>::new_with_prefix(key)
- .verify_prehash(digest, &signature.to_vec().try_into()?)
- .is_ok(),
- "sha256" => VerifyingKey::<sha2::Sha256>::new_with_prefix(key)
- .verify_prehash(digest, &signature.to_vec().try_into()?)
- .is_ok(),
- "sha384" => VerifyingKey::<sha2::Sha384>::new_with_prefix(key)
- .verify_prehash(digest, &signature.to_vec().try_into()?)
- .is_ok(),
- "sha512" => VerifyingKey::<sha2::Sha512>::new_with_prefix(key)
- .verify_prehash(digest, &signature.to_vec().try_into()?)
- .is_ok(),
- _ => {
- return Err(type_error(format!(
- "Unknown digest algorithm: {}",
- digest_type
- )))
- }
- })
- }
- _ => Err(type_error(format!(
- "Verifying with {} keys is not supported yet",
- key_type
- ))),
- }
-}
-
-fn pbkdf2_sync(
- password: &[u8],
- salt: &[u8],
- iterations: u32,
- digest: &str,
- derived_key: &mut [u8],
-) -> Result<(), AnyError> {
- macro_rules! pbkdf2_hmac {
- ($digest:ty) => {{
- pbkdf2::pbkdf2_hmac::<$digest>(password, salt, iterations, derived_key)
- }};
- }
-
- match digest {
- "md4" => pbkdf2_hmac!(md4::Md4),
- "md5" => pbkdf2_hmac!(md5::Md5),
- "ripemd160" => pbkdf2_hmac!(ripemd::Ripemd160),
- "sha1" => pbkdf2_hmac!(sha1::Sha1),
- "sha224" => pbkdf2_hmac!(sha2::Sha224),
- "sha256" => pbkdf2_hmac!(sha2::Sha256),
- "sha384" => pbkdf2_hmac!(sha2::Sha384),
- "sha512" => pbkdf2_hmac!(sha2::Sha512),
- _ => return Err(type_error("Unknown digest")),
- }
-
- Ok(())
-}
-
-#[op]
-pub fn op_node_pbkdf2(
- password: StringOrBuffer,
- salt: StringOrBuffer,
- iterations: u32,
- digest: &str,
- derived_key: &mut [u8],
-) -> bool {
- pbkdf2_sync(&password, &salt, iterations, digest, derived_key).is_ok()
-}
-
-#[op]
-pub async fn op_node_pbkdf2_async(
- password: StringOrBuffer,
- salt: StringOrBuffer,
- iterations: u32,
- digest: String,
- keylen: usize,
-) -> Result<ZeroCopyBuf, AnyError> {
- tokio::task::spawn_blocking(move || {
- let mut derived_key = vec![0; keylen];
- pbkdf2_sync(&password, &salt, iterations, &digest, &mut derived_key)
- .map(|_| derived_key.into())
- })
- .await?
-}
-
-#[op]
-pub fn op_node_generate_secret(buf: &mut [u8]) {
- rand::thread_rng().fill(buf);
-}
-
-#[op]
-pub async fn op_node_generate_secret_async(len: i32) -> ZeroCopyBuf {
- tokio::task::spawn_blocking(move || {
- let mut buf = vec![0u8; len as usize];
- rand::thread_rng().fill(&mut buf[..]);
- buf.into()
- })
- .await
- .unwrap()
-}
-
-fn hkdf_sync(
- hash: &str,
- ikm: &[u8],
- salt: &[u8],
- info: &[u8],
- okm: &mut [u8],
-) -> Result<(), AnyError> {
- macro_rules! hkdf {
- ($hash:ty) => {{
- let hk = Hkdf::<$hash>::new(Some(salt), ikm);
- hk.expand(info, okm)
- .map_err(|_| type_error("HKDF-Expand failed"))?;
- }};
- }
-
- match hash {
- "md4" => hkdf!(md4::Md4),
- "md5" => hkdf!(md5::Md5),
- "ripemd160" => hkdf!(ripemd::Ripemd160),
- "sha1" => hkdf!(sha1::Sha1),
- "sha224" => hkdf!(sha2::Sha224),
- "sha256" => hkdf!(sha2::Sha256),
- "sha384" => hkdf!(sha2::Sha384),
- "sha512" => hkdf!(sha2::Sha512),
- _ => return Err(type_error("Unknown digest")),
- }
-
- Ok(())
-}
-
-#[op]
-pub fn op_node_hkdf(
- hash: &str,
- ikm: &[u8],
- salt: &[u8],
- info: &[u8],
- okm: &mut [u8],
-) -> Result<(), AnyError> {
- hkdf_sync(hash, ikm, salt, info, okm)
-}
-
-#[op]
-pub async fn op_node_hkdf_async(
- hash: String,
- ikm: ZeroCopyBuf,
- salt: ZeroCopyBuf,
- info: ZeroCopyBuf,
- okm_len: usize,
-) -> Result<ZeroCopyBuf, AnyError> {
- tokio::task::spawn_blocking(move || {
- let mut okm = vec![0u8; okm_len];
- hkdf_sync(&hash, &ikm, &salt, &info, &mut okm)?;
- Ok(okm.into())
- })
- .await?
-}
-
-use rsa::pkcs1::EncodeRsaPrivateKey;
-use rsa::pkcs1::EncodeRsaPublicKey;
-
-use self::primes::Prime;
-
-fn generate_rsa(
- modulus_length: usize,
- public_exponent: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- let mut rng = rand::thread_rng();
- let private_key = RsaPrivateKey::new_with_exp(
- &mut rng,
- modulus_length,
- &rsa::BigUint::from_usize(public_exponent).unwrap(),
- )?;
- let public_key = private_key.to_public_key();
- let private_key_der = private_key.to_pkcs1_der()?.as_bytes().to_vec();
- let public_key_der = public_key.to_pkcs1_der()?.to_vec();
-
- Ok((private_key_der.into(), public_key_der.into()))
-}
-
-#[op]
-pub fn op_node_generate_rsa(
- modulus_length: usize,
- public_exponent: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- generate_rsa(modulus_length, public_exponent)
-}
-
-#[op]
-pub async fn op_node_generate_rsa_async(
- modulus_length: usize,
- public_exponent: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(move || {
- generate_rsa(modulus_length, public_exponent)
- })
- .await?
-}
-
-fn dsa_generate(
- modulus_length: usize,
- divisor_length: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- let mut rng = rand::thread_rng();
- use dsa::pkcs8::EncodePrivateKey;
- use dsa::pkcs8::EncodePublicKey;
- use dsa::Components;
- use dsa::KeySize;
- use dsa::SigningKey;
-
- let key_size = match (modulus_length, divisor_length) {
- #[allow(deprecated)]
- (1024, 160) => KeySize::DSA_1024_160,
- (2048, 224) => KeySize::DSA_2048_224,
- (2048, 256) => KeySize::DSA_2048_256,
- (3072, 256) => KeySize::DSA_3072_256,
- _ => return Err(type_error("Invalid modulus_length or divisor_length")),
- };
- let components = Components::generate(&mut rng, key_size);
- let signing_key = SigningKey::generate(&mut rng, components);
- let verifying_key = signing_key.verifying_key();
-
- Ok((
- signing_key
- .to_pkcs8_der()
- .map_err(|_| type_error("Not valid pkcs8"))?
- .as_bytes()
- .to_vec()
- .into(),
- verifying_key
- .to_public_key_der()
- .map_err(|_| type_error("Not valid spki"))?
- .to_vec()
- .into(),
- ))
-}
-
-#[op]
-pub fn op_node_dsa_generate(
- modulus_length: usize,
- divisor_length: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- dsa_generate(modulus_length, divisor_length)
-}
-
-#[op]
-pub async fn op_node_dsa_generate_async(
- modulus_length: usize,
- divisor_length: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(move || {
- dsa_generate(modulus_length, divisor_length)
- })
- .await?
-}
-
-fn ec_generate(
- named_curve: &str,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- use ring::signature::EcdsaKeyPair;
- use ring::signature::KeyPair;
-
- let curve = match named_curve {
- "P-256" => &ring::signature::ECDSA_P256_SHA256_FIXED_SIGNING,
- "P-384" => &ring::signature::ECDSA_P384_SHA384_FIXED_SIGNING,
- _ => return Err(type_error("Unsupported named curve")),
- };
-
- let rng = ring::rand::SystemRandom::new();
-
- let pkcs8 = EcdsaKeyPair::generate_pkcs8(curve, &rng)
- .map_err(|_| type_error("Failed to generate EC key"))?;
-
- let public_key = EcdsaKeyPair::from_pkcs8(curve, pkcs8.as_ref())
- .map_err(|_| type_error("Failed to generate EC key"))?
- .public_key()
- .as_ref()
- .to_vec();
- Ok((pkcs8.as_ref().to_vec().into(), public_key.into()))
-}
-
-#[op]
-pub fn op_node_ec_generate(
- named_curve: &str,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- ec_generate(named_curve)
-}
-
-#[op]
-pub async fn op_node_ec_generate_async(
- named_curve: String,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(move || ec_generate(&named_curve)).await?
-}
-
-fn ed25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- use ring::signature::Ed25519KeyPair;
- use ring::signature::KeyPair;
-
- let mut rng = thread_rng();
- let mut seed = vec![0u8; 32];
- rng.fill(seed.as_mut_slice());
-
- let pair = Ed25519KeyPair::from_seed_unchecked(&seed)
- .map_err(|_| type_error("Failed to generate Ed25519 key"))?;
-
- let public_key = pair.public_key().as_ref().to_vec();
- Ok((seed.into(), public_key.into()))
-}
-
-#[op]
-pub fn op_node_ed25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError>
-{
- ed25519_generate()
-}
-
-#[op]
-pub async fn op_node_ed25519_generate_async(
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(ed25519_generate).await?
-}
-
-fn x25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- // u-coordinate of the base point.
- const X25519_BASEPOINT_BYTES: [u8; 32] = [
- 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
- 0, 0, 0, 0, 0, 0, 0,
- ];
-
- let mut pkey = [0; 32];
-
- let mut rng = thread_rng();
- rng.fill(pkey.as_mut_slice());
-
- let pkey_copy = pkey.to_vec();
- // https://www.rfc-editor.org/rfc/rfc7748#section-6.1
- // pubkey = x25519(a, 9) which is constant-time Montgomery ladder.
- // https://eprint.iacr.org/2014/140.pdf page 4
- // https://eprint.iacr.org/2017/212.pdf algorithm 8
- // pubkey is in LE order.
- let pubkey = x25519_dalek::x25519(pkey, X25519_BASEPOINT_BYTES);
-
- Ok((pkey_copy.into(), pubkey.to_vec().into()))
-}
-
-#[op]
-pub fn op_node_x25519_generate() -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError>
-{
- x25519_generate()
-}
-
-#[op]
-pub async fn op_node_x25519_generate_async(
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(x25519_generate).await?
-}
-
-fn dh_generate_group(
- group_name: &str,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- let dh = match group_name {
- "modp5" => dh::DiffieHellman::group::<dh::Modp1536>(),
- "modp14" => dh::DiffieHellman::group::<dh::Modp2048>(),
- "modp15" => dh::DiffieHellman::group::<dh::Modp3072>(),
- "modp16" => dh::DiffieHellman::group::<dh::Modp4096>(),
- "modp17" => dh::DiffieHellman::group::<dh::Modp6144>(),
- "modp18" => dh::DiffieHellman::group::<dh::Modp8192>(),
- _ => return Err(type_error("Unsupported group name")),
- };
-
- Ok((
- dh.private_key.into_vec().into(),
- dh.public_key.into_vec().into(),
- ))
-}
-
-#[op]
-pub fn op_node_dh_generate_group(
- group_name: &str,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- dh_generate_group(group_name)
-}
-
-#[op]
-pub async fn op_node_dh_generate_group_async(
- group_name: String,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(move || dh_generate_group(&group_name)).await?
-}
-
-fn dh_generate(
- prime: Option<&[u8]>,
- prime_len: usize,
- generator: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- let prime = prime
- .map(|p| p.into())
- .unwrap_or_else(|| Prime::generate(prime_len));
- let dh = dh::DiffieHellman::new(prime, generator);
-
- Ok((
- dh.private_key.into_vec().into(),
- dh.public_key.into_vec().into(),
- ))
-}
-
-#[op]
-pub fn op_node_dh_generate(
- prime: Option<&[u8]>,
- prime_len: usize,
- generator: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- dh_generate(prime, prime_len, generator)
-}
-
-#[op]
-pub async fn op_node_dh_generate_async(
- prime: Option<ZeroCopyBuf>,
- prime_len: usize,
- generator: usize,
-) -> Result<(ZeroCopyBuf, ZeroCopyBuf), AnyError> {
- tokio::task::spawn_blocking(move || {
- dh_generate(prime.as_deref(), prime_len, generator)
- })
- .await?
-}
-
-#[op]
-pub fn op_node_random_int(min: i32, max: i32) -> Result<i32, AnyError> {
- let mut rng = rand::thread_rng();
- // Uniform distribution is required to avoid Modulo Bias
- // https://en.wikipedia.org/wiki/Fisher–Yates_shuffle#Modulo_bias
- let dist = Uniform::from(min..max);
-
- Ok(dist.sample(&mut rng))
-}
-
-#[allow(clippy::too_many_arguments)]
-fn scrypt(
- password: StringOrBuffer,
- salt: StringOrBuffer,
- keylen: u32,
- cost: u32,
- block_size: u32,
- parallelization: u32,
- _maxmem: u32,
- output_buffer: &mut [u8],
-) -> Result<(), AnyError> {
- // Construct Params
- let params = scrypt::Params::new(
- cost as u8,
- block_size,
- parallelization,
- keylen as usize,
- )
- .unwrap();
-
- // Call into scrypt
- let res = scrypt::scrypt(&password, &salt, &params, output_buffer);
- if res.is_ok() {
- Ok(())
- } else {
- // TODO(lev): key derivation failed, so what?
- Err(generic_error("scrypt key derivation failed"))
- }
-}
-
-#[op]
-pub fn op_node_scrypt_sync(
- password: StringOrBuffer,
- salt: StringOrBuffer,
- keylen: u32,
- cost: u32,
- block_size: u32,
- parallelization: u32,
- maxmem: u32,
- output_buffer: &mut [u8],
-) -> Result<(), AnyError> {
- scrypt(
- password,
- salt,
- keylen,
- cost,
- block_size,
- parallelization,
- maxmem,
- output_buffer,
- )
-}
-
-#[op]
-pub async fn op_node_scrypt_async(
- password: StringOrBuffer,
- salt: StringOrBuffer,
- keylen: u32,
- cost: u32,
- block_size: u32,
- parallelization: u32,
- maxmem: u32,
-) -> Result<ZeroCopyBuf, AnyError> {
- tokio::task::spawn_blocking(move || {
- let mut output_buffer = vec![0u8; keylen as usize];
- let res = scrypt(
- password,
- salt,
- keylen,
- cost,
- block_size,
- parallelization,
- maxmem,
- &mut output_buffer,
- );
-
- if res.is_ok() {
- Ok(output_buffer.into())
- } else {
- // TODO(lev): rethrow the error?
- Err(generic_error("scrypt failure"))
- }
- })
- .await?
-}
diff --git a/ext/node/crypto/primes.rs b/ext/node/crypto/primes.rs
deleted file mode 100644
index d03398f02..000000000
--- a/ext/node/crypto/primes.rs
+++ /dev/null
@@ -1,330 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-
-use num_bigint::BigInt;
-use num_bigint_dig::RandPrime;
-use num_integer::Integer;
-use num_traits::One;
-use num_traits::Zero;
-use rand::Rng;
-use std::ops::Deref;
-
-pub struct Prime(num_bigint_dig::BigUint);
-
-impl Prime {
- pub fn generate(n: usize) -> Self {
- let mut rng = rand::thread_rng();
- Self(rng.gen_prime(n))
- }
-}
-
-impl From<&[u8]> for Prime {
- fn from(value: &[u8]) -> Self {
- Self(num_bigint_dig::BigUint::from_bytes_be(value))
- }
-}
-
-impl Deref for Prime {
- type Target = num_bigint_dig::BigUint;
-
- fn deref(&self) -> &Self::Target {
- &self.0
- }
-}
-
-struct Witness {
- pow: BigInt,
- wit: BigInt,
-}
-
-/// Modified version of bigpowmod() from http://nickle.org/examples/miller-rabin.5c
-/// Computes core of Miller-Rabin test as suggested by
-/// Cormen/Leiserson/Rivest.
-fn witnessexp(b: &BigInt, e: &BigInt, m: &BigInt) -> Witness {
- if *e == BigInt::zero() {
- return Witness {
- pow: BigInt::zero(),
- wit: BigInt::one(),
- };
- }
- if *e == BigInt::one() {
- return Witness {
- pow: b % m,
- wit: BigInt::zero(),
- };
- }
- let ehalf = e / BigInt::from(2);
- let mut tmp = witnessexp(b, &ehalf, m);
- if tmp.wit != BigInt::zero() {
- return tmp;
- }
- let t: BigInt = BigInt::pow(&tmp.pow, 2) % m;
- if t == BigInt::one()
- && tmp.pow != BigInt::one()
- && &tmp.pow + BigInt::one() != *m
- {
- tmp.wit = tmp.pow;
- tmp.pow = t;
- return tmp;
- }
- if e % BigInt::from(2) == BigInt::zero() {
- tmp.pow = t;
- } else {
- tmp.pow = (t * b) % m;
- }
- tmp
-}
-
-pub(crate) fn is_probably_prime(n: &BigInt, count: usize) -> bool {
- if *n == BigInt::from(1) {
- return false;
- }
-
- if *n == BigInt::from(2) {
- return true;
- }
-
- if n.is_even() {
- return false;
- }
-
- for p in SMALL_PRIMES.into_iter() {
- let p = BigInt::from(p);
- if *n == p {
- return true;
- }
-
- if n % p == BigInt::zero() {
- return false;
- }
- }
-
- let mut rng = rand::thread_rng();
- for _ in 0..count {
- let a = rng.gen_range(BigInt::one()..n.clone());
- let we = witnessexp(&a, &(n - BigInt::one()), n);
- if we.wit != BigInt::zero() || we.pow != BigInt::one() {
- return false;
- }
- }
-
- true
-}
-
-static SMALL_PRIMES: [u32; 2047] = [
- 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73,
- 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, 139, 149, 151, 157,
- 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, 229, 233, 239,
- 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, 317, 331,
- 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, 421,
- 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509,
- 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613,
- 617, 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709,
- 719, 727, 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821,
- 823, 827, 829, 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919,
- 929, 937, 941, 947, 953, 967, 971, 977, 983, 991, 997, 1009, 1013, 1019,
- 1021, 1031, 1033, 1039, 1049, 1051, 1061, 1063, 1069, 1087, 1091, 1093, 1097,
- 1103, 1109, 1117, 1123, 1129, 1151, 1153, 1163, 1171, 1181, 1187, 1193, 1201,
- 1213, 1217, 1223, 1229, 1231, 1237, 1249, 1259, 1277, 1279, 1283, 1289, 1291,
- 1297, 1301, 1303, 1307, 1319, 1321, 1327, 1361, 1367, 1373, 1381, 1399, 1409,
- 1423, 1427, 1429, 1433, 1439, 1447, 1451, 1453, 1459, 1471, 1481, 1483, 1487,
- 1489, 1493, 1499, 1511, 1523, 1531, 1543, 1549, 1553, 1559, 1567, 1571, 1579,
- 1583, 1597, 1601, 1607, 1609, 1613, 1619, 1621, 1627, 1637, 1657, 1663, 1667,
- 1669, 1693, 1697, 1699, 1709, 1721, 1723, 1733, 1741, 1747, 1753, 1759, 1777,
- 1783, 1787, 1789, 1801, 1811, 1823, 1831, 1847, 1861, 1867, 1871, 1873, 1877,
- 1879, 1889, 1901, 1907, 1913, 1931, 1933, 1949, 1951, 1973, 1979, 1987, 1993,
- 1997, 1999, 2003, 2011, 2017, 2027, 2029, 2039, 2053, 2063, 2069, 2081, 2083,
- 2087, 2089, 2099, 2111, 2113, 2129, 2131, 2137, 2141, 2143, 2153, 2161, 2179,
- 2203, 2207, 2213, 2221, 2237, 2239, 2243, 2251, 2267, 2269, 2273, 2281, 2287,
- 2293, 2297, 2309, 2311, 2333, 2339, 2341, 2347, 2351, 2357, 2371, 2377, 2381,
- 2383, 2389, 2393, 2399, 2411, 2417, 2423, 2437, 2441, 2447, 2459, 2467, 2473,
- 2477, 2503, 2521, 2531, 2539, 2543, 2549, 2551, 2557, 2579, 2591, 2593, 2609,
- 2617, 2621, 2633, 2647, 2657, 2659, 2663, 2671, 2677, 2683, 2687, 2689, 2693,
- 2699, 2707, 2711, 2713, 2719, 2729, 2731, 2741, 2749, 2753, 2767, 2777, 2789,
- 2791, 2797, 2801, 2803, 2819, 2833, 2837, 2843, 2851, 2857, 2861, 2879, 2887,
- 2897, 2903, 2909, 2917, 2927, 2939, 2953, 2957, 2963, 2969, 2971, 2999, 3001,
- 3011, 3019, 3023, 3037, 3041, 3049, 3061, 3067, 3079, 3083, 3089, 3109, 3119,
- 3121, 3137, 3163, 3167, 3169, 3181, 3187, 3191, 3203, 3209, 3217, 3221, 3229,
- 3251, 3253, 3257, 3259, 3271, 3299, 3301, 3307, 3313, 3319, 3323, 3329, 3331,
- 3343, 3347, 3359, 3361, 3371, 3373, 3389, 3391, 3407, 3413, 3433, 3449, 3457,
- 3461, 3463, 3467, 3469, 3491, 3499, 3511, 3517, 3527, 3529, 3533, 3539, 3541,
- 3547, 3557, 3559, 3571, 3581, 3583, 3593, 3607, 3613, 3617, 3623, 3631, 3637,
- 3643, 3659, 3671, 3673, 3677, 3691, 3697, 3701, 3709, 3719, 3727, 3733, 3739,
- 3761, 3767, 3769, 3779, 3793, 3797, 3803, 3821, 3823, 3833, 3847, 3851, 3853,
- 3863, 3877, 3881, 3889, 3907, 3911, 3917, 3919, 3923, 3929, 3931, 3943, 3947,
- 3967, 3989, 4001, 4003, 4007, 4013, 4019, 4021, 4027, 4049, 4051, 4057, 4073,
- 4079, 4091, 4093, 4099, 4111, 4127, 4129, 4133, 4139, 4153, 4157, 4159, 4177,
- 4201, 4211, 4217, 4219, 4229, 4231, 4241, 4243, 4253, 4259, 4261, 4271, 4273,
- 4283, 4289, 4297, 4327, 4337, 4339, 4349, 4357, 4363, 4373, 4391, 4397, 4409,
- 4421, 4423, 4441, 4447, 4451, 4457, 4463, 4481, 4483, 4493, 4507, 4513, 4517,
- 4519, 4523, 4547, 4549, 4561, 4567, 4583, 4591, 4597, 4603, 4621, 4637, 4639,
- 4643, 4649, 4651, 4657, 4663, 4673, 4679, 4691, 4703, 4721, 4723, 4729, 4733,
- 4751, 4759, 4783, 4787, 4789, 4793, 4799, 4801, 4813, 4817, 4831, 4861, 4871,
- 4877, 4889, 4903, 4909, 4919, 4931, 4933, 4937, 4943, 4951, 4957, 4967, 4969,
- 4973, 4987, 4993, 4999, 5003, 5009, 5011, 5021, 5023, 5039, 5051, 5059, 5077,
- 5081, 5087, 5099, 5101, 5107, 5113, 5119, 5147, 5153, 5167, 5171, 5179, 5189,
- 5197, 5209, 5227, 5231, 5233, 5237, 5261, 5273, 5279, 5281, 5297, 5303, 5309,
- 5323, 5333, 5347, 5351, 5381, 5387, 5393, 5399, 5407, 5413, 5417, 5419, 5431,
- 5437, 5441, 5443, 5449, 5471, 5477, 5479, 5483, 5501, 5503, 5507, 5519, 5521,
- 5527, 5531, 5557, 5563, 5569, 5573, 5581, 5591, 5623, 5639, 5641, 5647, 5651,
- 5653, 5657, 5659, 5669, 5683, 5689, 5693, 5701, 5711, 5717, 5737, 5741, 5743,
- 5749, 5779, 5783, 5791, 5801, 5807, 5813, 5821, 5827, 5839, 5843, 5849, 5851,
- 5857, 5861, 5867, 5869, 5879, 5881, 5897, 5903, 5923, 5927, 5939, 5953, 5981,
- 5987, 6007, 6011, 6029, 6037, 6043, 6047, 6053, 6067, 6073, 6079, 6089, 6091,
- 6101, 6113, 6121, 6131, 6133, 6143, 6151, 6163, 6173, 6197, 6199, 6203, 6211,
- 6217, 6221, 6229, 6247, 6257, 6263, 6269, 6271, 6277, 6287, 6299, 6301, 6311,
- 6317, 6323, 6329, 6337, 6343, 6353, 6359, 6361, 6367, 6373, 6379, 6389, 6397,
- 6421, 6427, 6449, 6451, 6469, 6473, 6481, 6491, 6521, 6529, 6547, 6551, 6553,
- 6563, 6569, 6571, 6577, 6581, 6599, 6607, 6619, 6637, 6653, 6659, 6661, 6673,
- 6679, 6689, 6691, 6701, 6703, 6709, 6719, 6733, 6737, 6761, 6763, 6779, 6781,
- 6791, 6793, 6803, 6823, 6827, 6829, 6833, 6841, 6857, 6863, 6869, 6871, 6883,
- 6899, 6907, 6911, 6917, 6947, 6949, 6959, 6961, 6967, 6971, 6977, 6983, 6991,
- 6997, 7001, 7013, 7019, 7027, 7039, 7043, 7057, 7069, 7079, 7103, 7109, 7121,
- 7127, 7129, 7151, 7159, 7177, 7187, 7193, 7207, 7211, 7213, 7219, 7229, 7237,
- 7243, 7247, 7253, 7283, 7297, 7307, 7309, 7321, 7331, 7333, 7349, 7351, 7369,
- 7393, 7411, 7417, 7433, 7451, 7457, 7459, 7477, 7481, 7487, 7489, 7499, 7507,
- 7517, 7523, 7529, 7537, 7541, 7547, 7549, 7559, 7561, 7573, 7577, 7583, 7589,
- 7591, 7603, 7607, 7621, 7639, 7643, 7649, 7669, 7673, 7681, 7687, 7691, 7699,
- 7703, 7717, 7723, 7727, 7741, 7753, 7757, 7759, 7789, 7793, 7817, 7823, 7829,
- 7841, 7853, 7867, 7873, 7877, 7879, 7883, 7901, 7907, 7919, 7927, 7933, 7937,
- 7949, 7951, 7963, 7993, 8009, 8011, 8017, 8039, 8053, 8059, 8069, 8081, 8087,
- 8089, 8093, 8101, 8111, 8117, 8123, 8147, 8161, 8167, 8171, 8179, 8191, 8209,
- 8219, 8221, 8231, 8233, 8237, 8243, 8263, 8269, 8273, 8287, 8291, 8293, 8297,
- 8311, 8317, 8329, 8353, 8363, 8369, 8377, 8387, 8389, 8419, 8423, 8429, 8431,
- 8443, 8447, 8461, 8467, 8501, 8513, 8521, 8527, 8537, 8539, 8543, 8563, 8573,
- 8581, 8597, 8599, 8609, 8623, 8627, 8629, 8641, 8647, 8663, 8669, 8677, 8681,
- 8689, 8693, 8699, 8707, 8713, 8719, 8731, 8737, 8741, 8747, 8753, 8761, 8779,
- 8783, 8803, 8807, 8819, 8821, 8831, 8837, 8839, 8849, 8861, 8863, 8867, 8887,
- 8893, 8923, 8929, 8933, 8941, 8951, 8963, 8969, 8971, 8999, 9001, 9007, 9011,
- 9013, 9029, 9041, 9043, 9049, 9059, 9067, 9091, 9103, 9109, 9127, 9133, 9137,
- 9151, 9157, 9161, 9173, 9181, 9187, 9199, 9203, 9209, 9221, 9227, 9239, 9241,
- 9257, 9277, 9281, 9283, 9293, 9311, 9319, 9323, 9337, 9341, 9343, 9349, 9371,
- 9377, 9391, 9397, 9403, 9413, 9419, 9421, 9431, 9433, 9437, 9439, 9461, 9463,
- 9467, 9473, 9479, 9491, 9497, 9511, 9521, 9533, 9539, 9547, 9551, 9587, 9601,
- 9613, 9619, 9623, 9629, 9631, 9643, 9649, 9661, 9677, 9679, 9689, 9697, 9719,
- 9721, 9733, 9739, 9743, 9749, 9767, 9769, 9781, 9787, 9791, 9803, 9811, 9817,
- 9829, 9833, 9839, 9851, 9857, 9859, 9871, 9883, 9887, 9901, 9907, 9923, 9929,
- 9931, 9941, 9949, 9967, 9973, 10007, 10009, 10037, 10039, 10061, 10067,
- 10069, 10079, 10091, 10093, 10099, 10103, 10111, 10133, 10139, 10141, 10151,
- 10159, 10163, 10169, 10177, 10181, 10193, 10211, 10223, 10243, 10247, 10253,
- 10259, 10267, 10271, 10273, 10289, 10301, 10303, 10313, 10321, 10331, 10333,
- 10337, 10343, 10357, 10369, 10391, 10399, 10427, 10429, 10433, 10453, 10457,
- 10459, 10463, 10477, 10487, 10499, 10501, 10513, 10529, 10531, 10559, 10567,
- 10589, 10597, 10601, 10607, 10613, 10627, 10631, 10639, 10651, 10657, 10663,
- 10667, 10687, 10691, 10709, 10711, 10723, 10729, 10733, 10739, 10753, 10771,
- 10781, 10789, 10799, 10831, 10837, 10847, 10853, 10859, 10861, 10867, 10883,
- 10889, 10891, 10903, 10909, 10937, 10939, 10949, 10957, 10973, 10979, 10987,
- 10993, 11003, 11027, 11047, 11057, 11059, 11069, 11071, 11083, 11087, 11093,
- 11113, 11117, 11119, 11131, 11149, 11159, 11161, 11171, 11173, 11177, 11197,
- 11213, 11239, 11243, 11251, 11257, 11261, 11273, 11279, 11287, 11299, 11311,
- 11317, 11321, 11329, 11351, 11353, 11369, 11383, 11393, 11399, 11411, 11423,
- 11437, 11443, 11447, 11467, 11471, 11483, 11489, 11491, 11497, 11503, 11519,
- 11527, 11549, 11551, 11579, 11587, 11593, 11597, 11617, 11621, 11633, 11657,
- 11677, 11681, 11689, 11699, 11701, 11717, 11719, 11731, 11743, 11777, 11779,
- 11783, 11789, 11801, 11807, 11813, 11821, 11827, 11831, 11833, 11839, 11863,
- 11867, 11887, 11897, 11903, 11909, 11923, 11927, 11933, 11939, 11941, 11953,
- 11959, 11969, 11971, 11981, 11987, 12007, 12011, 12037, 12041, 12043, 12049,
- 12071, 12073, 12097, 12101, 12107, 12109, 12113, 12119, 12143, 12149, 12157,
- 12161, 12163, 12197, 12203, 12211, 12227, 12239, 12241, 12251, 12253, 12263,
- 12269, 12277, 12281, 12289, 12301, 12323, 12329, 12343, 12347, 12373, 12377,
- 12379, 12391, 12401, 12409, 12413, 12421, 12433, 12437, 12451, 12457, 12473,
- 12479, 12487, 12491, 12497, 12503, 12511, 12517, 12527, 12539, 12541, 12547,
- 12553, 12569, 12577, 12583, 12589, 12601, 12611, 12613, 12619, 12637, 12641,
- 12647, 12653, 12659, 12671, 12689, 12697, 12703, 12713, 12721, 12739, 12743,
- 12757, 12763, 12781, 12791, 12799, 12809, 12821, 12823, 12829, 12841, 12853,
- 12889, 12893, 12899, 12907, 12911, 12917, 12919, 12923, 12941, 12953, 12959,
- 12967, 12973, 12979, 12983, 13001, 13003, 13007, 13009, 13033, 13037, 13043,
- 13049, 13063, 13093, 13099, 13103, 13109, 13121, 13127, 13147, 13151, 13159,
- 13163, 13171, 13177, 13183, 13187, 13217, 13219, 13229, 13241, 13249, 13259,
- 13267, 13291, 13297, 13309, 13313, 13327, 13331, 13337, 13339, 13367, 13381,
- 13397, 13399, 13411, 13417, 13421, 13441, 13451, 13457, 13463, 13469, 13477,
- 13487, 13499, 13513, 13523, 13537, 13553, 13567, 13577, 13591, 13597, 13613,
- 13619, 13627, 13633, 13649, 13669, 13679, 13681, 13687, 13691, 13693, 13697,
- 13709, 13711, 13721, 13723, 13729, 13751, 13757, 13759, 13763, 13781, 13789,
- 13799, 13807, 13829, 13831, 13841, 13859, 13873, 13877, 13879, 13883, 13901,
- 13903, 13907, 13913, 13921, 13931, 13933, 13963, 13967, 13997, 13999, 14009,
- 14011, 14029, 14033, 14051, 14057, 14071, 14081, 14083, 14087, 14107, 14143,
- 14149, 14153, 14159, 14173, 14177, 14197, 14207, 14221, 14243, 14249, 14251,
- 14281, 14293, 14303, 14321, 14323, 14327, 14341, 14347, 14369, 14387, 14389,
- 14401, 14407, 14411, 14419, 14423, 14431, 14437, 14447, 14449, 14461, 14479,
- 14489, 14503, 14519, 14533, 14537, 14543, 14549, 14551, 14557, 14561, 14563,
- 14591, 14593, 14621, 14627, 14629, 14633, 14639, 14653, 14657, 14669, 14683,
- 14699, 14713, 14717, 14723, 14731, 14737, 14741, 14747, 14753, 14759, 14767,
- 14771, 14779, 14783, 14797, 14813, 14821, 14827, 14831, 14843, 14851, 14867,
- 14869, 14879, 14887, 14891, 14897, 14923, 14929, 14939, 14947, 14951, 14957,
- 14969, 14983, 15013, 15017, 15031, 15053, 15061, 15073, 15077, 15083, 15091,
- 15101, 15107, 15121, 15131, 15137, 15139, 15149, 15161, 15173, 15187, 15193,
- 15199, 15217, 15227, 15233, 15241, 15259, 15263, 15269, 15271, 15277, 15287,
- 15289, 15299, 15307, 15313, 15319, 15329, 15331, 15349, 15359, 15361, 15373,
- 15377, 15383, 15391, 15401, 15413, 15427, 15439, 15443, 15451, 15461, 15467,
- 15473, 15493, 15497, 15511, 15527, 15541, 15551, 15559, 15569, 15581, 15583,
- 15601, 15607, 15619, 15629, 15641, 15643, 15647, 15649, 15661, 15667, 15671,
- 15679, 15683, 15727, 15731, 15733, 15737, 15739, 15749, 15761, 15767, 15773,
- 15787, 15791, 15797, 15803, 15809, 15817, 15823, 15859, 15877, 15881, 15887,
- 15889, 15901, 15907, 15913, 15919, 15923, 15937, 15959, 15971, 15973, 15991,
- 16001, 16007, 16033, 16057, 16061, 16063, 16067, 16069, 16073, 16087, 16091,
- 16097, 16103, 16111, 16127, 16139, 16141, 16183, 16187, 16189, 16193, 16217,
- 16223, 16229, 16231, 16249, 16253, 16267, 16273, 16301, 16319, 16333, 16339,
- 16349, 16361, 16363, 16369, 16381, 16411, 16417, 16421, 16427, 16433, 16447,
- 16451, 16453, 16477, 16481, 16487, 16493, 16519, 16529, 16547, 16553, 16561,
- 16567, 16573, 16603, 16607, 16619, 16631, 16633, 16649, 16651, 16657, 16661,
- 16673, 16691, 16693, 16699, 16703, 16729, 16741, 16747, 16759, 16763, 16787,
- 16811, 16823, 16829, 16831, 16843, 16871, 16879, 16883, 16889, 16901, 16903,
- 16921, 16927, 16931, 16937, 16943, 16963, 16979, 16981, 16987, 16993, 17011,
- 17021, 17027, 17029, 17033, 17041, 17047, 17053, 17077, 17093, 17099, 17107,
- 17117, 17123, 17137, 17159, 17167, 17183, 17189, 17191, 17203, 17207, 17209,
- 17231, 17239, 17257, 17291, 17293, 17299, 17317, 17321, 17327, 17333, 17341,
- 17351, 17359, 17377, 17383, 17387, 17389, 17393, 17401, 17417, 17419, 17431,
- 17443, 17449, 17467, 17471, 17477, 17483, 17489, 17491, 17497, 17509, 17519,
- 17539, 17551, 17569, 17573, 17579, 17581, 17597, 17599, 17609, 17623, 17627,
- 17657, 17659, 17669, 17681, 17683, 17707, 17713, 17729, 17737, 17747, 17749,
- 17761, 17783, 17789, 17791, 17807, 17827, 17837, 17839, 17851, 17863,
-];
-
-#[cfg(test)]
-mod tests {
- use super::*;
- use num_bigint::BigInt;
-
- #[test]
- fn test_prime() {
- for &p in SMALL_PRIMES.iter() {
- assert!(is_probably_prime(&BigInt::from(p), 16));
- }
-
- assert!(is_probably_prime(&BigInt::from(0x7FFF_FFFF), 16));
- }
-
- #[test]
- fn test_composite() {
- assert!(!is_probably_prime(&BigInt::from(0x7FFF_FFFE), 16));
- assert!(!is_probably_prime(
- &BigInt::from(0xFFFF_FFFF_FFFF_FFFF_u64),
- 16
- ));
- assert!(!is_probably_prime(&BigInt::parse_bytes(b"12345678901234567890123456789012345678901234567890123456789012345678901234567890", 10).unwrap(), 16));
- }
-
- #[test]
- fn oeis_a014233() {
- // https://oeis.org/A014233
- //
- // Smallest odd number for which Miller-Rabin primality test
- // on bases <= n-th prime does not reveal compositeness.
- let a014233: [BigInt; 10] = [
- 2047u64.into(),
- 1373653u64.into(),
- 25326001u64.into(),
- 3215031751u64.into(),
- 2152302898747u64.into(),
- 3474749660383u64.into(),
- 341550071728321u64.into(),
- 3825123056546413051u64.into(),
- BigInt::parse_bytes(b"318665857834031151167461", 10).unwrap(),
- BigInt::parse_bytes(b"3317044064679887385961981", 10).unwrap(),
- ];
-
- for p in a014233 {
- assert!(!is_probably_prime(&p, 16), "{} should be composite", p);
- }
- }
-}
diff --git a/ext/node/crypto/x509.rs b/ext/node/crypto/x509.rs
deleted file mode 100644
index 402c58b72..000000000
--- a/ext/node/crypto/x509.rs
+++ /dev/null
@@ -1,319 +0,0 @@
-// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
-
-use deno_core::error::bad_resource_id;
-use deno_core::error::AnyError;
-use deno_core::op;
-use deno_core::OpState;
-use deno_core::Resource;
-
-use std::borrow::Cow;
-
-use x509_parser::der_parser::asn1_rs::Any;
-use x509_parser::der_parser::asn1_rs::Tag;
-use x509_parser::der_parser::oid::Oid;
-use x509_parser::extensions;
-use x509_parser::pem;
-use x509_parser::prelude::*;
-
-use digest::Digest;
-
-struct Certificate {
- _buf: Vec<u8>,
- pem: Option<pem::Pem>,
- cert: X509Certificate<'static>,
-}
-
-impl Certificate {
- fn fingerprint<D: Digest>(&self) -> Option<String> {
- self.pem.as_ref().map(|pem| {
- let mut hasher = D::new();
- hasher.update(&pem.contents);
- let bytes = hasher.finalize();
- // OpenSSL returns colon separated upper case hex values.
- let mut hex = String::with_capacity(bytes.len() * 2);
- for byte in bytes {
- hex.push_str(&format!("{:02X}:", byte));
- }
- hex.pop();
- hex
- })
- }
-}
-
-impl std::ops::Deref for Certificate {
- type Target = X509Certificate<'static>;
-
- fn deref(&self) -> &Self::Target {
- &self.cert
- }
-}
-
-impl Resource for Certificate {
- fn name(&self) -> Cow<str> {
- "x509Certificate".into()
- }
-}
-
-#[op]
-pub fn op_node_x509_parse(
- state: &mut OpState,
- buf: &[u8],
-) -> Result<u32, AnyError> {
- let pem = match pem::parse_x509_pem(buf) {
- Ok((_, pem)) => Some(pem),
- Err(_) => None,
- };
-
- let cert = pem
- .as_ref()
- .map(|pem| pem.parse_x509())
- .unwrap_or_else(|| X509Certificate::from_der(buf).map(|(_, cert)| cert))?;
-
- let cert = Certificate {
- _buf: buf.to_vec(),
- // SAFETY: Extending the lifetime of the certificate. Backing buffer is
- // owned by the resource.
- cert: unsafe { std::mem::transmute(cert) },
- pem,
- };
- let rid = state.resource_table.add(cert);
- Ok(rid)
-}
-
-#[op]
-pub fn op_node_x509_ca(
- state: &mut OpState,
- rid: u32,
-) -> Result<bool, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.is_ca())
-}
-
-#[op]
-pub fn op_node_x509_check_email(
- state: &mut OpState,
- rid: u32,
- email: &str,
-) -> Result<bool, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
-
- let subject = cert.subject();
- if subject
- .iter_email()
- .any(|e| e.as_str().unwrap_or("") == email)
- {
- return Ok(true);
- }
-
- let subject_alt = cert
- .extensions()
- .iter()
- .find(|e| e.oid == x509_parser::oid_registry::OID_X509_EXT_SUBJECT_ALT_NAME)
- .and_then(|e| match e.parsed_extension() {
- extensions::ParsedExtension::SubjectAlternativeName(s) => Some(s),
- _ => None,
- });
-
- if let Some(subject_alt) = subject_alt {
- for name in &subject_alt.general_names {
- dbg!(name);
- if let extensions::GeneralName::RFC822Name(n) = name {
- if *n == email {
- return Ok(true);
- }
- }
- }
- }
-
- Ok(false)
-}
-
-#[op]
-pub fn op_node_x509_fingerprint(
- state: &mut OpState,
- rid: u32,
-) -> Result<Option<String>, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.fingerprint::<sha1::Sha1>())
-}
-
-#[op]
-pub fn op_node_x509_fingerprint256(
- state: &mut OpState,
- rid: u32,
-) -> Result<Option<String>, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.fingerprint::<sha2::Sha256>())
-}
-
-#[op]
-pub fn op_node_x509_fingerprint512(
- state: &mut OpState,
- rid: u32,
-) -> Result<Option<String>, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.fingerprint::<sha2::Sha512>())
-}
-
-#[op]
-pub fn op_node_x509_get_issuer(
- state: &mut OpState,
- rid: u32,
-) -> Result<String, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(x509name_to_string(cert.issuer(), oid_registry())?)
-}
-
-#[op]
-pub fn op_node_x509_get_subject(
- state: &mut OpState,
- rid: u32,
-) -> Result<String, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(x509name_to_string(cert.subject(), oid_registry())?)
-}
-
-// Attempt to convert attribute to string. If type is not a string, return value is the hex
-// encoding of the attribute value
-fn attribute_value_to_string(
- attr: &Any,
- _attr_type: &Oid,
-) -> Result<String, X509Error> {
- // TODO: replace this with helper function, when it is added to asn1-rs
- match attr.tag() {
- Tag::NumericString
- | Tag::BmpString
- | Tag::VisibleString
- | Tag::PrintableString
- | Tag::GeneralString
- | Tag::ObjectDescriptor
- | Tag::GraphicString
- | Tag::T61String
- | Tag::VideotexString
- | Tag::Utf8String
- | Tag::Ia5String => {
- let s = core::str::from_utf8(attr.data)
- .map_err(|_| X509Error::InvalidAttributes)?;
- Ok(s.to_owned())
- }
- _ => {
- // type is not a string, get slice and convert it to base64
- Ok(data_encoding::HEXUPPER.encode(attr.as_bytes()))
- }
- }
-}
-
-fn x509name_to_string(
- name: &X509Name,
- oid_registry: &oid_registry::OidRegistry,
-) -> Result<String, x509_parser::error::X509Error> {
- // Lifted from https://github.com/rusticata/x509-parser/blob/4d618c2ed6b1fc102df16797545895f7c67ee0fe/src/x509.rs#L543-L566
- // since it's a private function (Copyright 2017 Pierre Chifflier)
- name.iter_rdn().fold(Ok(String::new()), |acc, rdn| {
- acc.and_then(|mut _vec| {
- rdn
- .iter()
- .fold(Ok(String::new()), |acc2, attr| {
- acc2.and_then(|mut _vec2| {
- let val_str =
- attribute_value_to_string(attr.attr_value(), attr.attr_type())?;
- // look ABBREV, and if not found, use shortname
- let abbrev = match oid2abbrev(attr.attr_type(), oid_registry) {
- Ok(s) => String::from(s),
- _ => format!("{:?}", attr.attr_type()),
- };
- let rdn = format!("{}={}", abbrev, val_str);
- match _vec2.len() {
- 0 => Ok(rdn),
- _ => Ok(_vec2 + " + " + rdn.as_str()),
- }
- })
- })
- .map(|v| match _vec.len() {
- 0 => v,
- _ => _vec + "\n" + v.as_str(),
- })
- })
- })
-}
-
-#[op]
-pub fn op_node_x509_get_valid_from(
- state: &mut OpState,
- rid: u32,
-) -> Result<String, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.validity().not_before.to_string())
-}
-
-#[op]
-pub fn op_node_x509_get_valid_to(
- state: &mut OpState,
- rid: u32,
-) -> Result<String, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- Ok(cert.validity().not_after.to_string())
-}
-
-#[op]
-pub fn op_node_x509_get_serial_number(
- state: &mut OpState,
- rid: u32,
-) -> Result<String, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
- let mut s = cert.serial.to_str_radix(16);
- s.make_ascii_uppercase();
- Ok(s)
-}
-
-#[op]
-pub fn op_node_x509_key_usage(
- state: &mut OpState,
- rid: u32,
-) -> Result<u16, AnyError> {
- let cert = state
- .resource_table
- .get::<Certificate>(rid)
- .map_err(|_| bad_resource_id())?;
-
- let key_usage = cert
- .extensions()
- .iter()
- .find(|e| e.oid == x509_parser::oid_registry::OID_X509_EXT_KEY_USAGE)
- .and_then(|e| match e.parsed_extension() {
- extensions::ParsedExtension::KeyUsage(k) => Some(k),
- _ => None,
- });
-
- Ok(key_usage.map(|k| k.flags).unwrap_or(0))
-}