x509.js 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. // Copyright 2017 Joyent, Inc.
  2. module.exports = {
  3. read: read,
  4. verify: verify,
  5. sign: sign,
  6. signAsync: signAsync,
  7. write: write
  8. };
  9. var assert = require('assert-plus');
  10. var asn1 = require('asn1');
  11. var Buffer = require('safer-buffer').Buffer;
  12. var algs = require('../algs');
  13. var utils = require('../utils');
  14. var Key = require('../key');
  15. var PrivateKey = require('../private-key');
  16. var pem = require('./pem');
  17. var Identity = require('../identity');
  18. var Signature = require('../signature');
  19. var Certificate = require('../certificate');
  20. var pkcs8 = require('./pkcs8');
  21. /*
  22. * This file is based on RFC5280 (X.509).
  23. */
  24. /* Helper to read in a single mpint */
  25. function readMPInt(der, nm) {
  26. assert.strictEqual(der.peek(), asn1.Ber.Integer,
  27. nm + ' is not an Integer');
  28. return (utils.mpNormalize(der.readString(asn1.Ber.Integer, true)));
  29. }
  30. function verify(cert, key) {
  31. var sig = cert.signatures.x509;
  32. assert.object(sig, 'x509 signature');
  33. var algParts = sig.algo.split('-');
  34. if (algParts[0] !== key.type)
  35. return (false);
  36. var blob = sig.cache;
  37. if (blob === undefined) {
  38. var der = new asn1.BerWriter();
  39. writeTBSCert(cert, der);
  40. blob = der.buffer;
  41. }
  42. var verifier = key.createVerify(algParts[1]);
  43. verifier.write(blob);
  44. return (verifier.verify(sig.signature));
  45. }
  46. function Local(i) {
  47. return (asn1.Ber.Context | asn1.Ber.Constructor | i);
  48. }
  49. function Context(i) {
  50. return (asn1.Ber.Context | i);
  51. }
  52. var SIGN_ALGS = {
  53. 'rsa-md5': '1.2.840.113549.1.1.4',
  54. 'rsa-sha1': '1.2.840.113549.1.1.5',
  55. 'rsa-sha256': '1.2.840.113549.1.1.11',
  56. 'rsa-sha384': '1.2.840.113549.1.1.12',
  57. 'rsa-sha512': '1.2.840.113549.1.1.13',
  58. 'dsa-sha1': '1.2.840.10040.4.3',
  59. 'dsa-sha256': '2.16.840.1.101.3.4.3.2',
  60. 'ecdsa-sha1': '1.2.840.10045.4.1',
  61. 'ecdsa-sha256': '1.2.840.10045.4.3.2',
  62. 'ecdsa-sha384': '1.2.840.10045.4.3.3',
  63. 'ecdsa-sha512': '1.2.840.10045.4.3.4',
  64. 'ed25519-sha512': '1.3.101.112'
  65. };
  66. Object.keys(SIGN_ALGS).forEach(function (k) {
  67. SIGN_ALGS[SIGN_ALGS[k]] = k;
  68. });
  69. SIGN_ALGS['1.3.14.3.2.3'] = 'rsa-md5';
  70. SIGN_ALGS['1.3.14.3.2.29'] = 'rsa-sha1';
  71. var EXTS = {
  72. 'issuerKeyId': '2.5.29.35',
  73. 'altName': '2.5.29.17',
  74. 'basicConstraints': '2.5.29.19',
  75. 'keyUsage': '2.5.29.15',
  76. 'extKeyUsage': '2.5.29.37'
  77. };
  78. function read(buf, options) {
  79. if (typeof (buf) === 'string') {
  80. buf = Buffer.from(buf, 'binary');
  81. }
  82. assert.buffer(buf, 'buf');
  83. var der = new asn1.BerReader(buf);
  84. der.readSequence();
  85. if (Math.abs(der.length - der.remain) > 1) {
  86. throw (new Error('DER sequence does not contain whole byte ' +
  87. 'stream'));
  88. }
  89. var tbsStart = der.offset;
  90. der.readSequence();
  91. var sigOffset = der.offset + der.length;
  92. var tbsEnd = sigOffset;
  93. if (der.peek() === Local(0)) {
  94. der.readSequence(Local(0));
  95. var version = der.readInt();
  96. assert.ok(version <= 3,
  97. 'only x.509 versions up to v3 supported');
  98. }
  99. var cert = {};
  100. cert.signatures = {};
  101. var sig = (cert.signatures.x509 = {});
  102. sig.extras = {};
  103. cert.serial = readMPInt(der, 'serial');
  104. der.readSequence();
  105. var after = der.offset + der.length;
  106. var certAlgOid = der.readOID();
  107. var certAlg = SIGN_ALGS[certAlgOid];
  108. if (certAlg === undefined)
  109. throw (new Error('unknown signature algorithm ' + certAlgOid));
  110. der._offset = after;
  111. cert.issuer = Identity.parseAsn1(der);
  112. der.readSequence();
  113. cert.validFrom = readDate(der);
  114. cert.validUntil = readDate(der);
  115. cert.subjects = [Identity.parseAsn1(der)];
  116. der.readSequence();
  117. after = der.offset + der.length;
  118. cert.subjectKey = pkcs8.readPkcs8(undefined, 'public', der);
  119. der._offset = after;
  120. /* issuerUniqueID */
  121. if (der.peek() === Local(1)) {
  122. der.readSequence(Local(1));
  123. sig.extras.issuerUniqueID =
  124. buf.slice(der.offset, der.offset + der.length);
  125. der._offset += der.length;
  126. }
  127. /* subjectUniqueID */
  128. if (der.peek() === Local(2)) {
  129. der.readSequence(Local(2));
  130. sig.extras.subjectUniqueID =
  131. buf.slice(der.offset, der.offset + der.length);
  132. der._offset += der.length;
  133. }
  134. /* extensions */
  135. if (der.peek() === Local(3)) {
  136. der.readSequence(Local(3));
  137. var extEnd = der.offset + der.length;
  138. der.readSequence();
  139. while (der.offset < extEnd)
  140. readExtension(cert, buf, der);
  141. assert.strictEqual(der.offset, extEnd);
  142. }
  143. assert.strictEqual(der.offset, sigOffset);
  144. der.readSequence();
  145. after = der.offset + der.length;
  146. var sigAlgOid = der.readOID();
  147. var sigAlg = SIGN_ALGS[sigAlgOid];
  148. if (sigAlg === undefined)
  149. throw (new Error('unknown signature algorithm ' + sigAlgOid));
  150. der._offset = after;
  151. var sigData = der.readString(asn1.Ber.BitString, true);
  152. if (sigData[0] === 0)
  153. sigData = sigData.slice(1);
  154. var algParts = sigAlg.split('-');
  155. sig.signature = Signature.parse(sigData, algParts[0], 'asn1');
  156. sig.signature.hashAlgorithm = algParts[1];
  157. sig.algo = sigAlg;
  158. sig.cache = buf.slice(tbsStart, tbsEnd);
  159. return (new Certificate(cert));
  160. }
  161. function readDate(der) {
  162. if (der.peek() === asn1.Ber.UTCTime) {
  163. return (utcTimeToDate(der.readString(asn1.Ber.UTCTime)));
  164. } else if (der.peek() === asn1.Ber.GeneralizedTime) {
  165. return (gTimeToDate(der.readString(asn1.Ber.GeneralizedTime)));
  166. } else {
  167. throw (new Error('Unsupported date format'));
  168. }
  169. }
  170. /* RFC5280, section 4.2.1.6 (GeneralName type) */
  171. var ALTNAME = {
  172. OtherName: Local(0),
  173. RFC822Name: Context(1),
  174. DNSName: Context(2),
  175. X400Address: Local(3),
  176. DirectoryName: Local(4),
  177. EDIPartyName: Local(5),
  178. URI: Context(6),
  179. IPAddress: Context(7),
  180. OID: Context(8)
  181. };
  182. /* RFC5280, section 4.2.1.12 (KeyPurposeId) */
  183. var EXTPURPOSE = {
  184. 'serverAuth': '1.3.6.1.5.5.7.3.1',
  185. 'clientAuth': '1.3.6.1.5.5.7.3.2',
  186. 'codeSigning': '1.3.6.1.5.5.7.3.3',
  187. /* See https://github.com/joyent/oid-docs/blob/master/root.md */
  188. 'joyentDocker': '1.3.6.1.4.1.38678.1.4.1',
  189. 'joyentCmon': '1.3.6.1.4.1.38678.1.4.2'
  190. };
  191. var EXTPURPOSE_REV = {};
  192. Object.keys(EXTPURPOSE).forEach(function (k) {
  193. EXTPURPOSE_REV[EXTPURPOSE[k]] = k;
  194. });
  195. var KEYUSEBITS = [
  196. 'signature', 'identity', 'keyEncryption',
  197. 'encryption', 'keyAgreement', 'ca', 'crl'
  198. ];
  199. function readExtension(cert, buf, der) {
  200. der.readSequence();
  201. var after = der.offset + der.length;
  202. var extId = der.readOID();
  203. var id;
  204. var sig = cert.signatures.x509;
  205. if (!sig.extras.exts)
  206. sig.extras.exts = [];
  207. var critical;
  208. if (der.peek() === asn1.Ber.Boolean)
  209. critical = der.readBoolean();
  210. switch (extId) {
  211. case (EXTS.basicConstraints):
  212. der.readSequence(asn1.Ber.OctetString);
  213. der.readSequence();
  214. var bcEnd = der.offset + der.length;
  215. var ca = false;
  216. if (der.peek() === asn1.Ber.Boolean)
  217. ca = der.readBoolean();
  218. if (cert.purposes === undefined)
  219. cert.purposes = [];
  220. if (ca === true)
  221. cert.purposes.push('ca');
  222. var bc = { oid: extId, critical: critical };
  223. if (der.offset < bcEnd && der.peek() === asn1.Ber.Integer)
  224. bc.pathLen = der.readInt();
  225. sig.extras.exts.push(bc);
  226. break;
  227. case (EXTS.extKeyUsage):
  228. der.readSequence(asn1.Ber.OctetString);
  229. der.readSequence();
  230. if (cert.purposes === undefined)
  231. cert.purposes = [];
  232. var ekEnd = der.offset + der.length;
  233. while (der.offset < ekEnd) {
  234. var oid = der.readOID();
  235. cert.purposes.push(EXTPURPOSE_REV[oid] || oid);
  236. }
  237. /*
  238. * This is a bit of a hack: in the case where we have a cert
  239. * that's only allowed to do serverAuth or clientAuth (and not
  240. * the other), we want to make sure all our Subjects are of
  241. * the right type. But we already parsed our Subjects and
  242. * decided if they were hosts or users earlier (since it appears
  243. * first in the cert).
  244. *
  245. * So we go through and mutate them into the right kind here if
  246. * it doesn't match. This might not be hugely beneficial, as it
  247. * seems that single-purpose certs are not often seen in the
  248. * wild.
  249. */
  250. if (cert.purposes.indexOf('serverAuth') !== -1 &&
  251. cert.purposes.indexOf('clientAuth') === -1) {
  252. cert.subjects.forEach(function (ide) {
  253. if (ide.type !== 'host') {
  254. ide.type = 'host';
  255. ide.hostname = ide.uid ||
  256. ide.email ||
  257. ide.components[0].value;
  258. }
  259. });
  260. } else if (cert.purposes.indexOf('clientAuth') !== -1 &&
  261. cert.purposes.indexOf('serverAuth') === -1) {
  262. cert.subjects.forEach(function (ide) {
  263. if (ide.type !== 'user') {
  264. ide.type = 'user';
  265. ide.uid = ide.hostname ||
  266. ide.email ||
  267. ide.components[0].value;
  268. }
  269. });
  270. }
  271. sig.extras.exts.push({ oid: extId, critical: critical });
  272. break;
  273. case (EXTS.keyUsage):
  274. der.readSequence(asn1.Ber.OctetString);
  275. var bits = der.readString(asn1.Ber.BitString, true);
  276. var setBits = readBitField(bits, KEYUSEBITS);
  277. setBits.forEach(function (bit) {
  278. if (cert.purposes === undefined)
  279. cert.purposes = [];
  280. if (cert.purposes.indexOf(bit) === -1)
  281. cert.purposes.push(bit);
  282. });
  283. sig.extras.exts.push({ oid: extId, critical: critical,
  284. bits: bits });
  285. break;
  286. case (EXTS.altName):
  287. der.readSequence(asn1.Ber.OctetString);
  288. der.readSequence();
  289. var aeEnd = der.offset + der.length;
  290. while (der.offset < aeEnd) {
  291. switch (der.peek()) {
  292. case ALTNAME.OtherName:
  293. case ALTNAME.EDIPartyName:
  294. der.readSequence();
  295. der._offset += der.length;
  296. break;
  297. case ALTNAME.OID:
  298. der.readOID(ALTNAME.OID);
  299. break;
  300. case ALTNAME.RFC822Name:
  301. /* RFC822 specifies email addresses */
  302. var email = der.readString(ALTNAME.RFC822Name);
  303. id = Identity.forEmail(email);
  304. if (!cert.subjects[0].equals(id))
  305. cert.subjects.push(id);
  306. break;
  307. case ALTNAME.DirectoryName:
  308. der.readSequence(ALTNAME.DirectoryName);
  309. id = Identity.parseAsn1(der);
  310. if (!cert.subjects[0].equals(id))
  311. cert.subjects.push(id);
  312. break;
  313. case ALTNAME.DNSName:
  314. var host = der.readString(
  315. ALTNAME.DNSName);
  316. id = Identity.forHost(host);
  317. if (!cert.subjects[0].equals(id))
  318. cert.subjects.push(id);
  319. break;
  320. default:
  321. der.readString(der.peek());
  322. break;
  323. }
  324. }
  325. sig.extras.exts.push({ oid: extId, critical: critical });
  326. break;
  327. default:
  328. sig.extras.exts.push({
  329. oid: extId,
  330. critical: critical,
  331. data: der.readString(asn1.Ber.OctetString, true)
  332. });
  333. break;
  334. }
  335. der._offset = after;
  336. }
  337. var UTCTIME_RE =
  338. /^([0-9]{2})([0-9]{2})([0-9]{2})([0-9]{2})([0-9]{2})([0-9]{2})?Z$/;
  339. function utcTimeToDate(t) {
  340. var m = t.match(UTCTIME_RE);
  341. assert.ok(m, 'timestamps must be in UTC');
  342. var d = new Date();
  343. var thisYear = d.getUTCFullYear();
  344. var century = Math.floor(thisYear / 100) * 100;
  345. var year = parseInt(m[1], 10);
  346. if (thisYear % 100 < 50 && year >= 60)
  347. year += (century - 1);
  348. else
  349. year += century;
  350. d.setUTCFullYear(year, parseInt(m[2], 10) - 1, parseInt(m[3], 10));
  351. d.setUTCHours(parseInt(m[4], 10), parseInt(m[5], 10));
  352. if (m[6] && m[6].length > 0)
  353. d.setUTCSeconds(parseInt(m[6], 10));
  354. return (d);
  355. }
  356. var GTIME_RE =
  357. /^([0-9]{4})([0-9]{2})([0-9]{2})([0-9]{2})([0-9]{2})([0-9]{2})?Z$/;
  358. function gTimeToDate(t) {
  359. var m = t.match(GTIME_RE);
  360. assert.ok(m);
  361. var d = new Date();
  362. d.setUTCFullYear(parseInt(m[1], 10), parseInt(m[2], 10) - 1,
  363. parseInt(m[3], 10));
  364. d.setUTCHours(parseInt(m[4], 10), parseInt(m[5], 10));
  365. if (m[6] && m[6].length > 0)
  366. d.setUTCSeconds(parseInt(m[6], 10));
  367. return (d);
  368. }
  369. function zeroPad(n) {
  370. var s = '' + n;
  371. while (s.length < 2)
  372. s = '0' + s;
  373. return (s);
  374. }
  375. function dateToUTCTime(d) {
  376. var s = '';
  377. s += zeroPad(d.getUTCFullYear() % 100);
  378. s += zeroPad(d.getUTCMonth() + 1);
  379. s += zeroPad(d.getUTCDate());
  380. s += zeroPad(d.getUTCHours());
  381. s += zeroPad(d.getUTCMinutes());
  382. s += zeroPad(d.getUTCSeconds());
  383. s += 'Z';
  384. return (s);
  385. }
  386. function sign(cert, key) {
  387. if (cert.signatures.x509 === undefined)
  388. cert.signatures.x509 = {};
  389. var sig = cert.signatures.x509;
  390. sig.algo = key.type + '-' + key.defaultHashAlgorithm();
  391. if (SIGN_ALGS[sig.algo] === undefined)
  392. return (false);
  393. var der = new asn1.BerWriter();
  394. writeTBSCert(cert, der);
  395. var blob = der.buffer;
  396. sig.cache = blob;
  397. var signer = key.createSign();
  398. signer.write(blob);
  399. cert.signatures.x509.signature = signer.sign();
  400. return (true);
  401. }
  402. function signAsync(cert, signer, done) {
  403. if (cert.signatures.x509 === undefined)
  404. cert.signatures.x509 = {};
  405. var sig = cert.signatures.x509;
  406. var der = new asn1.BerWriter();
  407. writeTBSCert(cert, der);
  408. var blob = der.buffer;
  409. sig.cache = blob;
  410. signer(blob, function (err, signature) {
  411. if (err) {
  412. done(err);
  413. return;
  414. }
  415. sig.algo = signature.type + '-' + signature.hashAlgorithm;
  416. if (SIGN_ALGS[sig.algo] === undefined) {
  417. done(new Error('Invalid signing algorithm "' +
  418. sig.algo + '"'));
  419. return;
  420. }
  421. sig.signature = signature;
  422. done();
  423. });
  424. }
  425. function write(cert, options) {
  426. var sig = cert.signatures.x509;
  427. assert.object(sig, 'x509 signature');
  428. var der = new asn1.BerWriter();
  429. der.startSequence();
  430. if (sig.cache) {
  431. der._ensure(sig.cache.length);
  432. sig.cache.copy(der._buf, der._offset);
  433. der._offset += sig.cache.length;
  434. } else {
  435. writeTBSCert(cert, der);
  436. }
  437. der.startSequence();
  438. der.writeOID(SIGN_ALGS[sig.algo]);
  439. if (sig.algo.match(/^rsa-/))
  440. der.writeNull();
  441. der.endSequence();
  442. var sigData = sig.signature.toBuffer('asn1');
  443. var data = Buffer.alloc(sigData.length + 1);
  444. data[0] = 0;
  445. sigData.copy(data, 1);
  446. der.writeBuffer(data, asn1.Ber.BitString);
  447. der.endSequence();
  448. return (der.buffer);
  449. }
  450. function writeTBSCert(cert, der) {
  451. var sig = cert.signatures.x509;
  452. assert.object(sig, 'x509 signature');
  453. der.startSequence();
  454. der.startSequence(Local(0));
  455. der.writeInt(2);
  456. der.endSequence();
  457. der.writeBuffer(utils.mpNormalize(cert.serial), asn1.Ber.Integer);
  458. der.startSequence();
  459. der.writeOID(SIGN_ALGS[sig.algo]);
  460. if (sig.algo.match(/^rsa-/))
  461. der.writeNull();
  462. der.endSequence();
  463. cert.issuer.toAsn1(der);
  464. der.startSequence();
  465. der.writeString(dateToUTCTime(cert.validFrom), asn1.Ber.UTCTime);
  466. der.writeString(dateToUTCTime(cert.validUntil), asn1.Ber.UTCTime);
  467. der.endSequence();
  468. var subject = cert.subjects[0];
  469. var altNames = cert.subjects.slice(1);
  470. subject.toAsn1(der);
  471. pkcs8.writePkcs8(der, cert.subjectKey);
  472. if (sig.extras && sig.extras.issuerUniqueID) {
  473. der.writeBuffer(sig.extras.issuerUniqueID, Local(1));
  474. }
  475. if (sig.extras && sig.extras.subjectUniqueID) {
  476. der.writeBuffer(sig.extras.subjectUniqueID, Local(2));
  477. }
  478. if (altNames.length > 0 || subject.type === 'host' ||
  479. (cert.purposes !== undefined && cert.purposes.length > 0) ||
  480. (sig.extras && sig.extras.exts)) {
  481. der.startSequence(Local(3));
  482. der.startSequence();
  483. var exts = [];
  484. if (cert.purposes !== undefined && cert.purposes.length > 0) {
  485. exts.push({
  486. oid: EXTS.basicConstraints,
  487. critical: true
  488. });
  489. exts.push({
  490. oid: EXTS.keyUsage,
  491. critical: true
  492. });
  493. exts.push({
  494. oid: EXTS.extKeyUsage,
  495. critical: true
  496. });
  497. }
  498. exts.push({ oid: EXTS.altName });
  499. if (sig.extras && sig.extras.exts)
  500. exts = sig.extras.exts;
  501. for (var i = 0; i < exts.length; ++i) {
  502. der.startSequence();
  503. der.writeOID(exts[i].oid);
  504. if (exts[i].critical !== undefined)
  505. der.writeBoolean(exts[i].critical);
  506. if (exts[i].oid === EXTS.altName) {
  507. der.startSequence(asn1.Ber.OctetString);
  508. der.startSequence();
  509. if (subject.type === 'host') {
  510. der.writeString(subject.hostname,
  511. Context(2));
  512. }
  513. for (var j = 0; j < altNames.length; ++j) {
  514. if (altNames[j].type === 'host') {
  515. der.writeString(
  516. altNames[j].hostname,
  517. ALTNAME.DNSName);
  518. } else if (altNames[j].type ===
  519. 'email') {
  520. der.writeString(
  521. altNames[j].email,
  522. ALTNAME.RFC822Name);
  523. } else {
  524. /*
  525. * Encode anything else as a
  526. * DN style name for now.
  527. */
  528. der.startSequence(
  529. ALTNAME.DirectoryName);
  530. altNames[j].toAsn1(der);
  531. der.endSequence();
  532. }
  533. }
  534. der.endSequence();
  535. der.endSequence();
  536. } else if (exts[i].oid === EXTS.basicConstraints) {
  537. der.startSequence(asn1.Ber.OctetString);
  538. der.startSequence();
  539. var ca = (cert.purposes.indexOf('ca') !== -1);
  540. var pathLen = exts[i].pathLen;
  541. der.writeBoolean(ca);
  542. if (pathLen !== undefined)
  543. der.writeInt(pathLen);
  544. der.endSequence();
  545. der.endSequence();
  546. } else if (exts[i].oid === EXTS.extKeyUsage) {
  547. der.startSequence(asn1.Ber.OctetString);
  548. der.startSequence();
  549. cert.purposes.forEach(function (purpose) {
  550. if (purpose === 'ca')
  551. return;
  552. if (KEYUSEBITS.indexOf(purpose) !== -1)
  553. return;
  554. var oid = purpose;
  555. if (EXTPURPOSE[purpose] !== undefined)
  556. oid = EXTPURPOSE[purpose];
  557. der.writeOID(oid);
  558. });
  559. der.endSequence();
  560. der.endSequence();
  561. } else if (exts[i].oid === EXTS.keyUsage) {
  562. der.startSequence(asn1.Ber.OctetString);
  563. /*
  564. * If we parsed this certificate from a byte
  565. * stream (i.e. we didn't generate it in sshpk)
  566. * then we'll have a ".bits" property on the
  567. * ext with the original raw byte contents.
  568. *
  569. * If we have this, use it here instead of
  570. * regenerating it. This guarantees we output
  571. * the same data we parsed, so signatures still
  572. * validate.
  573. */
  574. if (exts[i].bits !== undefined) {
  575. der.writeBuffer(exts[i].bits,
  576. asn1.Ber.BitString);
  577. } else {
  578. var bits = writeBitField(cert.purposes,
  579. KEYUSEBITS);
  580. der.writeBuffer(bits,
  581. asn1.Ber.BitString);
  582. }
  583. der.endSequence();
  584. } else {
  585. der.writeBuffer(exts[i].data,
  586. asn1.Ber.OctetString);
  587. }
  588. der.endSequence();
  589. }
  590. der.endSequence();
  591. der.endSequence();
  592. }
  593. der.endSequence();
  594. }
  595. /*
  596. * Reads an ASN.1 BER bitfield out of the Buffer produced by doing
  597. * `BerReader#readString(asn1.Ber.BitString)`. That function gives us the raw
  598. * contents of the BitString tag, which is a count of unused bits followed by
  599. * the bits as a right-padded byte string.
  600. *
  601. * `bits` is the Buffer, `bitIndex` should contain an array of string names
  602. * for the bits in the string, ordered starting with bit #0 in the ASN.1 spec.
  603. *
  604. * Returns an array of Strings, the names of the bits that were set to 1.
  605. */
  606. function readBitField(bits, bitIndex) {
  607. var bitLen = 8 * (bits.length - 1) - bits[0];
  608. var setBits = {};
  609. for (var i = 0; i < bitLen; ++i) {
  610. var byteN = 1 + Math.floor(i / 8);
  611. var bit = 7 - (i % 8);
  612. var mask = 1 << bit;
  613. var bitVal = ((bits[byteN] & mask) !== 0);
  614. var name = bitIndex[i];
  615. if (bitVal && typeof (name) === 'string') {
  616. setBits[name] = true;
  617. }
  618. }
  619. return (Object.keys(setBits));
  620. }
  621. /*
  622. * `setBits` is an array of strings, containing the names for each bit that
  623. * sould be set to 1. `bitIndex` is same as in `readBitField()`.
  624. *
  625. * Returns a Buffer, ready to be written out with `BerWriter#writeString()`.
  626. */
  627. function writeBitField(setBits, bitIndex) {
  628. var bitLen = bitIndex.length;
  629. var blen = Math.ceil(bitLen / 8);
  630. var unused = blen * 8 - bitLen;
  631. var bits = Buffer.alloc(1 + blen); // zero-filled
  632. bits[0] = unused;
  633. for (var i = 0; i < bitLen; ++i) {
  634. var byteN = 1 + Math.floor(i / 8);
  635. var bit = 7 - (i % 8);
  636. var mask = 1 << bit;
  637. var name = bitIndex[i];
  638. if (name === undefined)
  639. continue;
  640. var bitVal = (setBits.indexOf(name) !== -1);
  641. if (bitVal) {
  642. bits[byteN] |= mask;
  643. }
  644. }
  645. return (bits);
  646. }