LeeThanh's picture
Upload 3012 files
5641073
raw
history blame contribute delete
No virus
55.5 kB
/// <reference types="node" />
declare module "node-forge" {
type Byte = number;
type Bytes = string;
type Hex = string;
type Base64 = string;
type Utf8 = string;
type OID = string;
type Encoding = "raw" | "utf8";
namespace jsbn {
interface RandomGenerator {
nextBytes(bytes: number[]): void;
}
class BigInteger {
static ZERO: BigInteger;
static ONE: BigInteger;
constructor(a: null);
constructor(a: number, c: RandomGenerator);
constructor(a: number, b: number, c: RandomGenerator);
constructor(a: string, b?: number);
constructor(a: number[], b?: number);
constructor(a: BigInteger);
data: number[];
t: number;
s: number;
am(i: number, x: number, w: BigInteger, j: number, c: number, n: number): number;
toString(b?: number): string;
bitLength(): number;
negate(): BigInteger;
abs(): BigInteger;
compareTo(a: BigInteger): number;
bitLength(): number;
mod(a: BigInteger): BigInteger;
modPowInt(e: number, m: BigInteger): BigInteger;
clone(): BigInteger;
intValue(): number;
byteValue(): number;
shortValue(): number;
signum(): number;
toByteArray(): number[];
equals(a: BigInteger): boolean;
min(a: BigInteger): BigInteger;
max(a: BigInteger): BigInteger;
and(a: BigInteger): BigInteger;
or(a: BigInteger): BigInteger;
xor(a: BigInteger): BigInteger;
andNot(a: BigInteger): BigInteger;
not(): BigInteger;
shiftLeft(n: number): BigInteger;
shiftRight(n: number): BigInteger;
getLowestSetBit(): number;
bitCount(): number;
testBit(n: number): boolean;
clearBit(n: number): BigInteger;
flipBit(n: number): BigInteger;
add(a: BigInteger): BigInteger;
subtract(a: BigInteger): BigInteger;
multiply(a: BigInteger): BigInteger;
squareTo(a: BigInteger): BigInteger;
divide(a: BigInteger): BigInteger;
remainder(a: BigInteger): BigInteger;
divideAndRemainder(a: BigInteger): BigInteger[]; // Array of 2 items
pow(e: number): BigInteger;
modPow(e: BigInteger, m: BigInteger): BigInteger;
gcd(a: BigInteger): BigInteger;
modInverse(m: BigInteger): BigInteger;
isProbablePrime(t: number): boolean;
}
}
namespace rc2 {
type pad_function = (blockSize: number, buffer: util.ByteBuffer, decrypt: boolean) => boolean;
interface cipher {
start(iv: util.ByteBuffer | string | null, output?: util.ByteBuffer): void;
update(input: util.ByteBuffer): void;
finish(pad?: pad_function): boolean;
output: util.ByteBuffer;
}
function expandKey(key: string | util.ByteBuffer, effKeyBits?: number): util.ByteBuffer;
function startEncrypting(
key: string | util.ByteBuffer,
iv: util.ByteBuffer | Byte[] | Bytes,
output: util.ByteBuffer | null,
): rc2.cipher;
function createEncryptionCipher(key: string | util.ByteBuffer, bits?: number): rc2.cipher;
function startDecrypting(
key: string | util.ByteBuffer,
iv: util.ByteBuffer | Byte[] | Bytes,
output: util.ByteBuffer | null,
): rc2.cipher;
function createDecryptionCipher(key: string | util.ByteBuffer, bits?: number): rc2.cipher;
}
namespace kem {
namespace rsa {
interface kem {
/**
* Generates a secret key and its encapsulation.
*
* @param publicKey the RSA public key to encrypt with.
* @param keyLength the length, in bytes, of the secret key to generate.
*/
encrypt(publicKey: pki.rsa.PublicKey, keyLength: number): EncryptResult;
/**
* Decrypts an encapsulated secret key.
*
* @param privateKey the RSA private key to decrypt with.
* @param encapsulation the ciphertext for generating the secret key, as a binary-encoded
* string of bytes.
* @param keyLength the length, in bytes, of the secret key to generate.
*
* @return the secret key as a binary-encoded string of bytes.
*/
decrypt(privateKey: pki.rsa.PrivateKey, encapsulation: string, keyLength: number): string;
}
interface random {
getBytesSync(count: number): Bytes;
}
interface Options {
/**
* A custom crypto-secure pseudo-random number generator to use.
*/
prng?: random | undefined;
}
/**
* Creates an RSA KEM API object for generating a secret asymmetric key.
*
* The symmetric key may be generated via a call to 'encrypt', which will
* produce a ciphertext to be transmitted to the recipient and a key to be
* kept secret. The ciphertext is a parameter to be passed to 'decrypt' which
* will produce the same secret key for the recipient to use to decrypt a
* message that was encrypted with the secret key.
*
* @param kdf the KDF API to use (eg: `new forge.kem.kdf1()`).
* @param options the options to use.
*/
function create(kdf: KDF, options?: Options): kem;
}
interface EncryptResult {
/**
* The ciphertext for generating the secret key, as a binary-encoded string of bytes.
*/
encapsulation: string;
/**
* The secret key to use for encrypting a message.
*/
key: string;
}
interface KDF {
/**
* Generate a key of the specified length.
*
* @param x the binary-encoded byte string to generate a key from.
* @param length the number of bytes to generate (the size of the key).
*
* @return the key as a binary-encoded string.
*/
generate(x: string, length: number): string;
}
/**
* Creates a key derivation API object that implements KDF1 per ISO 18033-2.
*
* @param md the hash API to use.
* @param digestLength a digest length that must be positive and less than or equal to `md.digestLength`.
*
* @return a KDF1 API object.
*/
class kdf1 implements KDF {
constructor(md: md.MessageDigest, digestLength?: number);
/**
* Generate a key of the specified length.
*
* @param x the binary-encoded byte string to generate a key from.
* @param length the number of bytes to generate (the size of the key).
*
* @return the key as a binary-encoded string.
*/
generate(x: string, length: number): string;
}
/**
* Creates a key derivation API object that implements KDF2 per ISO 18033-2.
*
* @param md the hash API to use.
* @param digestLength a digest length that must be positive and less than or equal to `md.digestLength`.
*
* @return a KDF2 API object.
*/
class kdf2 implements KDF {
constructor(md: md.MessageDigest, digestLength?: number);
/**
* Generate a key of the specified length.
*
* @param x the binary-encoded byte string to generate a key from.
* @param length the number of bytes to generate (the size of the key).
*
* @return the key as a binary-encoded string.
*/
generate(x: string, length: number): string;
}
}
namespace pem {
interface EncodeOptions {
maxline?: number | undefined;
}
interface ObjectPEM {
type: string;
body: Bytes;
procType?: any;
contentDomain?: any;
dekInfo?: any;
headers?: any[] | undefined;
}
function encode(msg: ObjectPEM, options?: EncodeOptions): string;
function decode(str: string): ObjectPEM[];
}
namespace pki {
type PEM = string;
type PublicKey = rsa.PublicKey | ed25519.Key;
type PrivateKey = rsa.PrivateKey | ed25519.Key;
type EncryptionOptions = {
algorithm?: "aes128" | "aes192" | "aes256" | "3des" | undefined;
count?: number | undefined;
saltSize?: number | undefined;
prfAlgorithm?: "sha1" | "sha224" | "sha256" | "sha384" | "sha512" | undefined;
legacy?: boolean | undefined;
};
interface ByteBufferFingerprintOptions {
/**
* @description The type of fingerprint. If not specified, defaults to 'RSAPublicKey'
*/
type?: "SubjectPublicKeyInfo" | "RSAPublicKey" | undefined;
/**
* @description the delimiter to use between bytes for `hex` encoded output
*/
delimiter?: string | undefined;
/**
* @description if not specified defaults to `md.md5`
*/
md?: md.MessageDigest | undefined;
}
interface HexFingerprintOptions extends ByteBufferFingerprintOptions {
/**
* @description if not specified, the function will return `ByteStringBuffer`
*/
encoding: "hex";
}
interface BinaryFingerprintOptions extends ByteBufferFingerprintOptions {
/**
* @description if not specified, the function will return `ByteStringBuffer`
*/
encoding: "binary";
}
interface KeyPair {
publicKey: PublicKey;
privateKey: PrivateKey;
}
interface oids {
[key: string]: string;
}
var oids: oids;
namespace rsa {
type EncryptionScheme = "RSAES-PKCS1-V1_5" | "RSA-OAEP" | "RAW" | "NONE" | null;
type SignatureScheme = "RSASSA-PKCS1-V1_5" | pss.PSS | "NONE" | null;
interface PublicKey {
n: jsbn.BigInteger;
e: jsbn.BigInteger;
encrypt(data: Bytes, scheme?: EncryptionScheme, schemeOptions?: any): Bytes;
verify(digest: Bytes, signature: Bytes, scheme?: SignatureScheme): boolean;
}
interface PrivateKey {
n: jsbn.BigInteger;
e: jsbn.BigInteger;
d: jsbn.BigInteger;
p: jsbn.BigInteger;
q: jsbn.BigInteger;
dP: jsbn.BigInteger;
dQ: jsbn.BigInteger;
qInv: jsbn.BigInteger;
decrypt(data: Bytes, scheme?: EncryptionScheme, schemeOptions?: any): Bytes;
sign(md: md.MessageDigest | Bytes, scheme?: SignatureScheme): Bytes;
}
interface KeyPair {
publicKey: PublicKey;
privateKey: PrivateKey;
}
interface GenerateKeyPairOptions {
bits?: number | undefined;
e?: number | undefined;
workerScript?: string | undefined;
workers?: number | undefined;
workLoad?: number | undefined;
prng?: any;
algorithm?: string | undefined;
}
function setPublicKey(n: jsbn.BigInteger, e: jsbn.BigInteger): PublicKey;
function setPrivateKey(
n: jsbn.BigInteger,
e: jsbn.BigInteger,
d: jsbn.BigInteger,
p: jsbn.BigInteger,
q: jsbn.BigInteger,
dP: jsbn.BigInteger,
dQ: jsbn.BigInteger,
qInv: jsbn.BigInteger,
): PrivateKey;
function generateKeyPair(
bits?: number,
e?: number,
callback?: (err: Error, keypair: KeyPair) => void,
): KeyPair;
function generateKeyPair(
options?: GenerateKeyPairOptions,
callback?: (err: Error, keypair: KeyPair) => void,
): KeyPair;
}
namespace ed25519 {
type NativeBuffer = Buffer | Uint8Array;
type Key = NativeBuffer;
type ToNativeBufferParameters =
| {
md: md.MessageDigest;
}
| {
message: NativeBuffer | util.ByteBuffer;
}
| {
message: string;
encoding: "binary" | "utf8";
};
// `string`s will be converted by toNativeBuffer with `encoding: 'binary'`
type BinaryBuffer = NativeBuffer | util.ByteBuffer | string;
namespace constants {
const PUBLIC_KEY_BYTE_LENGTH = 32;
const PRIVATE_KEY_BYTE_LENGTH = 64;
const SEED_BYTE_LENGTH = 32;
const SIGN_BYTE_LENGTH = 64;
const HASH_BYTE_LENGTH = 64;
}
// generateKeyPair does not currently accept `util.ByteBuffer` as the seed.
function generateKeyPair(options?: { seed?: NativeBuffer | string | undefined }): {
publicKey: NativeBuffer;
privateKey: NativeBuffer;
};
function privateKeyFromAsn1(obj: asn1.Asn1): { privateKeyBytes: NativeBuffer };
function publicKeyFromAsn1(obj: asn1.Asn1): NativeBuffer;
function publicKeyFromPrivateKey(options: { privateKey: BinaryBuffer }): NativeBuffer;
function sign(
options: ToNativeBufferParameters & {
privateKey: BinaryBuffer;
},
): NativeBuffer;
function verify(
options: ToNativeBufferParameters & {
signature: BinaryBuffer;
publicKey: BinaryBuffer;
},
): boolean;
}
interface CertificateFieldOptions {
name?: string | undefined;
type?: string | undefined;
shortName?: string | undefined;
}
interface CertificateField extends CertificateFieldOptions {
valueConstructed?: boolean | undefined;
valueTagClass?: asn1.Class | undefined;
value?: any[] | string | undefined;
extensions?: any[] | undefined;
}
interface Certificate {
version: number;
serialNumber: string;
signatureOid: string;
signature: any;
siginfo: {
algorithmOid: string;
parameters: any;
};
validity: {
notBefore: Date;
notAfter: Date;
};
issuer: {
getField(sn: string | CertificateFieldOptions): any;
addField(attr: CertificateField): void;
attributes: CertificateField[];
hash: any;
};
subject: {
getField(sn: string | CertificateFieldOptions): any;
addField(attr: CertificateField): void;
attributes: CertificateField[];
hash: any;
};
extensions: any[];
privateKey: PrivateKey;
publicKey: PublicKey;
md: md.MessageDigest;
signatureParameters: any;
tbsCertificate: asn1.Asn1;
/**
* Sets the subject of this certificate.
*
* @param attrs the array of subject attributes to use.
* @param uniqueId an optional a unique ID to use.
*/
setSubject(attrs: CertificateField[], uniqueId?: string): void;
/**
* Sets the issuer of this certificate.
*
* @param attrs the array of subject attributes to use.
* @param uniqueId an optional a unique ID to use.
*/
setIssuer(attrs: CertificateField[], uniqueId?: string): void;
/**
* Sets the extensions of this certificate.
*
* @param exts the array of extensions to use.
*/
setExtensions(exts: any[]): void;
/**
* Gets an extension by its name or id.
*
* @param options the name to use or an object with:
* name the name to use.
* id the id to use.
*
* @return the extension or null if not found.
*/
getExtension(options: string | { name: string } | { id: number }): {} | undefined;
/**
* Signs this certificate using the given private key.
*
* @param key the private key to sign with.
* @param md the message digest object to use (defaults to forge.md.sha1).
*/
sign(key: pki.PrivateKey, md?: md.MessageDigest): void;
/**
* Attempts verify the signature on the passed certificate using this
* certificate's public key.
*
* @param child the certificate to verify.
*
* @return true if verified, false if not.
*/
verify(child: Certificate): boolean;
/**
* Returns true if this certificate's issuer matches the passed
* certificate's subject. Note that no signature check is performed.
*
* @param parent the certificate to check.
*
* @return true if this certificate's issuer matches the passed certificate's
* subject.
*/
isIssuer(parent: Certificate): boolean;
/**
* Returns true if this certificate's subject matches the issuer of the
* given certificate). Note that not signature check is performed.
*
* @param child the certificate to check.
*
* @return true if this certificate's subject matches the passed
* certificate's issuer.
*/
issued(child: Certificate): boolean;
/**
* Generates the subjectKeyIdentifier for this certificate as byte buffer.
*
* @return the subjectKeyIdentifier for this certificate as byte buffer.
*/
generateSubjectKeyIdentifier(): util.ByteStringBuffer;
/**
* Verifies the subjectKeyIdentifier extension value for this certificate
* against its public key. If no extension is found, false will be
* returned.
*
* @return true if verified, false if not.
*/
verifySubjectKeyIdentifier(): boolean;
}
interface CertificateRequest extends Certificate {
/**
* Gets an issuer or subject attribute from its name, type, or short name.
*
* @param opts a short name string or an object with:
* shortName the short name for the attribute.
* name the name for the attribute.
* type the type for the attribute.
*
* @return the attribute.
*/
getAttribute(opts: string | GetAttributeOpts): Attribute | null;
}
/**
* Attribute members to search on; any one hit will return the attribute
*/
interface GetAttributeOpts {
/**
* OID
*/
type?: string | undefined;
/**
* Long name
*/
name?: string | undefined;
/**
* Short name
*/
shortName?: string | undefined;
}
interface Attribute {
/**
* e.g. challengePassword
*/
name: string;
/**
* Short name, if available (e.g. 'CN' for 'commonName')
*/
shortName?: string | undefined;
/**
* OID, e.g. '1.2.840.113549.1.9.7'
*/
type: string;
/**
* Attribute value
*/
value: any;
/**
* Attribute value data type
*/
valueTagClass: number;
/**
* Extensions
*/
extensions?: any[] | undefined;
}
interface CAStore {
addCertificate(cert: Certificate | string): void;
hasCertificate(cert: Certificate | string): boolean;
removeCertificate(cert: Certificate | string): Certificate | null;
listAllCertificates(): pki.Certificate[];
getIssuer(subject: Certificate): Certificate | null;
getBySubject(subject: string): Certificate | null;
}
function certificateFromAsn1(obj: asn1.Asn1, computeHash?: boolean): Certificate;
function certificationRequestFromAsn1(obj: asn1.Asn1, computeHash?: boolean): Certificate;
function certificateToAsn1(cert: Certificate): asn1.Asn1;
function certificationRequestToAsn1(cert: Certificate): asn1.Asn1;
function decryptRsaPrivateKey(pem: PEM, passphrase?: string): rsa.PrivateKey;
function createCertificate(): Certificate;
function certificationRequestToPem(cert: Certificate, maxline?: number): PEM;
function certificationRequestFromPem(pem: PEM, computeHash?: boolean, strict?: boolean): Certificate;
function createCertificationRequest(): CertificateRequest;
function certificateToPem(cert: Certificate, maxline?: number): PEM;
function certificateFromPem(pem: PEM, computeHash?: boolean, strict?: boolean): Certificate;
function createCaStore(certs?: ReadonlyArray<Certificate | pki.PEM>): CAStore;
function verifyCertificateChain(
caStore: CAStore,
chain: Certificate[],
options?:
| ((verified: boolean | string, depth: number, certs: Certificate[]) => boolean)
| {
verify?:
| ((verified: boolean | string, depth: number, certs: Certificate[]) => boolean)
| undefined;
validityCheckDate?: Date | null | undefined;
},
): boolean;
function pemToDer(pem: PEM): util.ByteStringBuffer;
function privateKeyToPem(key: PrivateKey, maxline?: number): PEM;
function privateKeyInfoToPem(key: asn1.Asn1, maxline?: number): PEM;
function publicKeyToPem(key: PublicKey, maxline?: number): PEM;
function publicKeyToRSAPublicKeyPem(key: PublicKey, maxline?: number): PEM;
function publicKeyFromPem(pem: PEM): rsa.PublicKey;
function privateKeyFromPem(pem: PEM): rsa.PrivateKey;
function decryptPrivateKeyInfo(obj: asn1.Asn1, password: string): asn1.Asn1;
function encryptPrivateKeyInfo(obj: asn1.Asn1, password: string, options?: EncryptionOptions): asn1.Asn1;
function encryptedPrivateKeyFromPem(pem: PEM): asn1.Asn1;
function encryptedPrivateKeyToPem(obj: asn1.Asn1): PEM;
function decryptRsaPrivateKey(pem: PEM, password: string): rsa.PrivateKey;
function encryptRsaPrivateKey(privateKey: PrivateKey, password: string, options?: EncryptionOptions): PEM;
function privateKeyFromAsn1(privateKey: asn1.Asn1): rsa.PrivateKey;
function privateKeyToAsn1(privateKey: PrivateKey): asn1.Asn1;
function publicKeyFromAsn1(publicKey: asn1.Asn1): rsa.PublicKey;
function publicKeyToAsn1(publicKey: PublicKey): asn1.Asn1;
function publicKeyToRSAPublicKey(publicKey: PublicKey): any;
const setRsaPublicKey: typeof pki.rsa.setPublicKey;
const setRsaPrivateKey: typeof pki.rsa.setPrivateKey;
function wrapRsaPrivateKey(privateKey: asn1.Asn1): asn1.Asn1;
function getPublicKeyFingerprint(
publicKey: PublicKey,
options?: ByteBufferFingerprintOptions,
): util.ByteStringBuffer;
function getPublicKeyFingerprint(publicKey: PublicKey, options: HexFingerprintOptions): Hex;
function getPublicKeyFingerprint(publicKey: PublicKey, options: BinaryFingerprintOptions): Bytes;
}
namespace random {
function getBytes(count: number, callback?: (err: Error | null, bytes: Bytes) => any): void;
function getBytesSync(count: number): Bytes;
type CB = (_: any, seed: string) => void;
interface Random {
seedFileSync: (needed: number) => string;
seedFile: (needed: number, cb: CB) => void;
}
function createInstance(): Random;
}
namespace ssh {
interface FingerprintOptions {
/**
* @description the delimiter to use between bytes for `hex` encoded output
*/
delimiter?: string | undefined;
/**
* @description if not specified, the function will return `ByteStringBuffer`
*/
encoding?: "hex" | "binary" | undefined;
/**
* @description if not specified defaults to `md.md5`
*/
md?: md.MessageDigest | undefined;
}
/**
* @description Encodes a private RSA key as an OpenSSH file
*/
function privateKeyToOpenSSH(privateKey: pki.PrivateKey, passphrase?: string): string;
/**
* @description Encodes (and optionally encrypts) a private RSA key as a Putty PPK file
*/
function privateKeyToPutty(privateKey: pki.PrivateKey, passphrase?: string, comment?: string): string;
/**
* @description Encodes a public RSA key as an OpenSSH file
*/
function publicKeyToOpenSSH(publicKey: pki.PublicKey, comment?: string): string | pki.PEM;
/**
* @description Gets the SSH fingerprint for the given public key
*/
function getPublicKeyFingerprint(
publicKey: pki.PublicKey,
options?: FingerprintOptions,
): util.ByteStringBuffer | Hex | string;
}
namespace asn1 {
enum Class {
UNIVERSAL = 0x00,
APPLICATION = 0x40,
CONTEXT_SPECIFIC = 0x80,
PRIVATE = 0xc0,
}
enum Type {
NONE = 0,
BOOLEAN = 1,
INTEGER = 2,
BITSTRING = 3,
OCTETSTRING = 4,
NULL = 5,
OID = 6,
ODESC = 7,
EXTERNAL = 8,
REAL = 9,
ENUMERATED = 10,
EMBEDDED = 11,
UTF8 = 12,
ROID = 13,
SEQUENCE = 16,
SET = 17,
PRINTABLESTRING = 19,
IA5STRING = 22,
UTCTIME = 23,
GENERALIZEDTIME = 24,
BMPSTRING = 30,
}
interface Asn1 {
tagClass: Class;
type: Type;
constructed: boolean;
composed: boolean;
value: Bytes | Asn1[];
}
function create(tagClass: Class, type: Type, constructed: boolean, value: Bytes | Asn1[]): Asn1;
function fromDer(bytes: Bytes | util.ByteBuffer, strict?: boolean): Asn1;
function toDer(obj: Asn1): util.ByteBuffer;
/**
* Converts an OID dot-separated string to a byte buffer. The byte buffer
* contains only the DER-encoded value, not any tag or length bytes.
*
* @param oid the OID dot-separated string.
*
* @return the byte buffer.
*/
function oidToDer(oid: OID): util.ByteBuffer;
/**
* Converts a DER-encoded byte buffer to an OID dot-separated string. The
* byte buffer should contain only the DER-encoded value, not any tag or
* length bytes.
*
* @param bytes the byte buffer.
*
* @return the OID dot-separated string.
*/
function derToOid(bytes: Bytes | util.ByteBuffer): OID;
function integerToDer(int: number): util.ByteBuffer;
function derToInteger(bytes: Bytes | util.ByteBuffer): number;
function dateToUtcTime(date: Date | string): Bytes;
function utcTimeToDate(bytes: Bytes): Date;
function dateToGeneralizedTime(date: Date | string): Bytes;
function generalizedTimeToDate(bytes: Bytes): Date;
}
namespace util {
function isArray(x: any): boolean;
function isArrayBuffer(x: any): boolean;
function isArrayBufferView(x: any): boolean;
interface ArrayBufferView {
buffer: ArrayBuffer;
byteLength: number;
}
type ByteBuffer = ByteStringBuffer;
class ByteStringBuffer {
constructor(bytes?: Bytes | ArrayBuffer | ArrayBufferView | ByteStringBuffer);
data: string;
read: number;
length(): number;
isEmpty(): boolean;
putByte(byte: Byte): ByteStringBuffer;
fillWithByte(byte: Byte, n: number): ByteStringBuffer;
putBytes(bytes: Bytes): ByteStringBuffer;
putString(str: string): ByteStringBuffer;
putInt16(int: number): ByteStringBuffer;
putInt24(int: number): ByteStringBuffer;
putInt32(int: number): ByteStringBuffer;
putInt16Le(int: number): ByteStringBuffer;
putInt24Le(int: number): ByteStringBuffer;
putInt32Le(int: number): ByteStringBuffer;
putInt(int: number, numOfBits: number): ByteStringBuffer;
putSignedInt(int: number, numOfBits: number): ByteStringBuffer;
putBuffer(buffer: ByteStringBuffer): ByteStringBuffer;
getByte(): number;
getInt16(): number;
getInt24(): number;
getInt32(): number;
getInt16Le(): number;
getInt24Le(): number;
getInt32Le(): number;
getInt(numOfBits: number): number;
getSignedInt(numOfBits: number): number;
getBytes(count?: number): Bytes;
bytes(count?: number): Bytes;
at(index: number): Byte;
setAt(index: number, byte: number): ByteStringBuffer;
last(): Byte;
copy(): ByteStringBuffer;
compact(): ByteStringBuffer;
clear(): ByteStringBuffer;
truncate(): ByteStringBuffer;
toHex(): Hex;
toString(): string;
}
function fillString(char: string, count: number): string;
function xorBytes(bytes1: string, bytes2: string, count: number): string;
function hexToBytes(hex: Hex): Bytes;
function bytesToHex(bytes: Bytes): Hex;
function int32ToBytes(int: number): Bytes;
function encode64(bytes: Bytes, maxline?: number): Base64;
function decode64(encoded: Base64): Bytes;
function encodeUtf8(str: string): Utf8;
function decodeUtf8(encoded: Utf8): string;
function createBuffer(): ByteBuffer;
function createBuffer(
input: Bytes | ArrayBuffer | ArrayBufferView | ByteStringBuffer,
encoding?: Encoding,
): ByteBuffer;
namespace binary {
namespace raw {
function encode(x: Uint8Array): Bytes;
function decode(str: Bytes, output?: Uint8Array, offset?: number): Uint8Array;
}
namespace hex {
function encode(bytes: Bytes | ArrayBuffer | ArrayBufferView | ByteStringBuffer): Hex;
function decode(hex: Hex, output?: Uint8Array, offset?: number): Uint8Array;
}
namespace base64 {
function encode(input: Uint8Array, maxline?: number): Base64;
function decode(input: Base64, output?: Uint8Array, offset?: number): Uint8Array;
}
}
namespace text {
namespace utf8 {
function encode(str: string, output?: Uint8Array, offset?: number): Uint8Array;
function decode(bytes: Uint8Array): Utf8;
}
namespace utf16 {
function encode(str: string, output?: Uint8Array, offset?: number): Uint8Array;
function decode(bytes: Uint8Array): string;
}
}
}
namespace pkcs12 {
interface BagsFilter {
localKeyId?: string | undefined;
localKeyIdHex?: string | undefined;
friendlyName?: string | undefined;
bagType?: string | undefined;
}
interface Bag {
type: string;
attributes: any;
key?: pki.PrivateKey | undefined;
cert?: pki.Certificate | undefined;
asn1: asn1.Asn1;
}
interface Pkcs12Pfx {
version: string;
safeContents: Array<{
encrypted: boolean;
safeBags: Bag[];
}>;
getBags: (filter: BagsFilter) => {
[key: string]: Bag[] | undefined;
localKeyId?: Bag[] | undefined;
friendlyName?: Bag[] | undefined;
};
getBagsByFriendlyName: (fiendlyName: string, bagType: string) => Bag[];
getBagsByLocalKeyId: (localKeyId: string, bagType: string) => Bag[];
}
function pkcs12FromAsn1(obj: any, strict?: boolean, password?: string): Pkcs12Pfx;
function pkcs12FromAsn1(obj: any, password?: string): Pkcs12Pfx;
function toPkcs12Asn1(
key: pki.PrivateKey | null,
cert: pki.Certificate | pki.Certificate[],
password: string | null,
options?: {
algorithm?: "aes128" | "aes192" | "aes256" | "3des" | undefined;
count?: number | undefined;
saltSize?: number | undefined;
useMac?: boolean | undefined;
localKeyId?: Hex | undefined;
friendlyName?: string | undefined;
generateLocalKeyId?: boolean | undefined;
},
): asn1.Asn1;
function generateKey(
password: string | null | undefined,
salt: util.ByteBuffer,
id: Byte,
iter: number,
n: number,
md?: md.MessageDigest,
): util.ByteBuffer;
}
namespace pkcs7 {
interface PkcsSignedData {
content?: string | util.ByteBuffer | undefined;
contentInfo?: { value: any[] } | undefined;
certificates: pki.Certificate[];
addCertificate(certificate: pki.Certificate | string): void;
addSigner(options: {
key: pki.rsa.PrivateKey | string;
certificate: pki.Certificate | string;
digestAlgorithm: string;
authenticatedAttributes?: Array<{ type: string; value?: string | undefined }> | undefined;
}): void;
sign(options?: { detached?: boolean | undefined }): void;
toAsn1(): asn1.Asn1;
}
function createSignedData(): PkcsSignedData;
interface Recipient {
version: number;
issuer: pki.CertificateField[];
serialNumber: Hex;
encryptedContent: {
algorithm: OID;
parameter: Bytes;
content: Bytes;
};
}
interface PkcsEnvelopedData {
content?: string | util.ByteBuffer | undefined;
recipients: Recipient[];
/**
* Add (another) entity to list of recipients.
*
* @param certificate The certificate of the entity to add.
*/
addRecipient(certificate: pki.Certificate): void;
/**
* Encrypt enveloped content.
*
* This function supports two optional arguments, cipher and key, which
* can be used to influence symmetric encryption. Unless cipher is
* provided, the cipher specified in encryptedContent.algorithm is used
* (defaults to AES-256-CBC). If no key is provided, encryptedContent.key
* is (re-)used. If that one's not set, a random key will be generated
* automatically.
*
* @param [key] The key to be used for symmetric encryption.
* @param [cipher] The OID of the symmetric cipher to use.
*/
encrypt(key?: util.ByteBuffer, cipher?: OID): void;
/**
* Find recipient by X.509 certificate's issuer and serialNumber.
*
* @param cert the certificate with the issuer to look for.
*
* @return the recipient object, or `null` if no match.
*/
findRecipient(cert: pki.Certificate): Recipient | null;
/**
* Decrypt enveloped content
*
* @param recipient The recipient object related to the private key
* @param privKey The (RSA) private key object
*/
decrypt(recipient: Recipient, privKey: pki.rsa.PrivateKey): void;
toAsn1(): asn1.Asn1;
}
function createEnvelopedData(): PkcsEnvelopedData;
/** When a PKCS#7 object has been created by reading from a message, the raw captured object is joined */
type Captured<T> = T & {
rawCapture: any;
};
/**
* Converts a PKCS#7 message to PEM format.
*
* @param msg The PKCS#7 message object
* @param maxline The maximum characters per line, defaults to 64.
*
* @return The PEM-formatted PKCS#7 message.
*/
function messageToPem(msg: PkcsSignedData, maxline?: number): string;
/**
* Converts a PKCS#7 message from PEM format.
*
* @param pem the PEM-formatted PKCS#7 message.
*
* @return the PKCS#7 message.
*/
function messageFromPem(pem: pki.PEM): Captured<PkcsEnvelopedData | PkcsSignedData>;
/**
* Converts a PKCS#7 message from an ASN.1 object.
*
* @param asn the ASN.1 representation of a ContentInfo.
*
* @return the PKCS#7 message.
*/
function messageFromAsn1(asn: asn1.Asn1): Captured<PkcsEnvelopedData | PkcsSignedData>;
}
namespace pkcs5 {
function pbkdf2(password: string, salt: string, iterations: number, keySize: number): string;
function pbkdf2(
password: string,
salt: string,
iterations: number,
keySize: number,
messageDigest: md.MessageDigest | md.Algorithm,
): string;
function pbkdf2(
password: string,
salt: string,
iterations: number,
keySize: number,
callback: (err: Error | null, dk: string | null) => any,
): void;
function pbkdf2(
password: string,
salt: string,
iterations: number,
keySize: number,
messageDigest?: md.MessageDigest | md.Algorithm,
callback?: (err: Error | null, dk: string) => any,
): void;
}
const md: {
sha1: {
create(): md.sha1.MessageDigest;
};
sha256: {
create(): md.sha256.MessageDigest;
};
sha512: {
create<TAlg extends md.sha512.AlgorithmSelection = md.sha512.AlgorithmSelection.Sha512>(
/** @default 'SHA-512' */
algorithm?: TAlg,
): TAlg extends md.sha512.AlgorithmSelection.Sha384 ? md.sha512.Sha384MessageDigest
: TAlg extends md.sha512.AlgorithmSelection.Sha512224 ? md.sha512.Sha512224MessageDigest
: TAlg extends md.sha512.AlgorithmSelection.Sha512256 ? md.sha512.Sha512256MessageDigest
: TAlg extends md.sha512.AlgorithmSelection.Sha512 ? md.sha512.Sha512MessageDigest
: never;
sha224: {
create(): md.sha512.Sha512224MessageDigest;
};
sha256: {
create(): md.sha512.Sha512256MessageDigest;
};
sha384: {
create(): md.sha512.Sha384MessageDigest;
};
};
sha384: typeof md.sha512.sha384;
"sha512/224": typeof md.sha512.sha224;
"sha512/256": typeof md.sha512.sha256;
md5: {
create(): md.md5.MessageDigest;
};
algorithms: {
md5: typeof md.md5;
sha1: typeof md.sha1;
sha256: typeof md.sha256;
sha384: typeof md.sha384;
sha512: typeof md.sha512;
"sha512/224": (typeof md)["sha512/224"];
"sha512/256": (typeof md)["sha512/256"];
};
};
const md5: typeof md.md5;
const sha1: typeof md.sha1;
const sha256: typeof md.sha256;
const sha384: typeof md.sha384;
const sha512: typeof md.sha512;
namespace md {
type Algorithm = md5.Algorithm | sha1.Algorithm | sha256.Algorithm | sha512.Algorithm;
interface MessageDigest {
readonly algorithm: Algorithm;
readonly blockLength: number;
readonly digestLength: number;
messageLength: number;
fullMessageLength: number[] | null;
readonly messageLengthSize: number;
update(msg: string, encoding?: Encoding): this;
digest(): util.ByteStringBuffer;
}
namespace md5 {
type Algorithm = "md5";
interface MessageDigest extends md.MessageDigest {
readonly algorithm: Algorithm;
readonly blockLength: 64;
readonly digestLength: 16;
readonly messageLengthSize: 8;
}
}
namespace sha1 {
type Algorithm = "sha1";
interface MessageDigest extends md.MessageDigest {
readonly algorithm: Algorithm;
readonly blockLength: 64;
readonly digestLength: 20;
readonly messageLengthSize: 8;
}
}
namespace sha256 {
type Algorithm = "sha256";
interface MessageDigest extends md.MessageDigest {
readonly algorithm: Algorithm;
readonly blockLength: 64;
readonly digestLength: 32;
readonly messageLengthSize: 8;
}
}
namespace sha512 {
type Algorithm = Algorithm.Sha384 | Algorithm.Sha512 | Algorithm.Sha512224 | Algorithm.Sha512256;
namespace Algorithm {
type Sha384 = "sha384";
type Sha512 = "sha512";
type Sha512224 = "sha512/224";
type Sha512256 = "sha512/256";
}
type AlgorithmSelection =
| AlgorithmSelection.Sha384
| AlgorithmSelection.Sha512
| AlgorithmSelection.Sha512224
| AlgorithmSelection.Sha512256;
namespace AlgorithmSelection {
type Sha384 = "SHA-384";
type Sha512 = "SHA-512";
type Sha512224 = "SHA-512/224";
type Sha512256 = "SHA-512/256";
}
interface MessageDigest extends md.MessageDigest {
readonly algorithm: Algorithm;
readonly blockLength: 128;
readonly messageLengthSize: 16;
}
interface Sha512224MessageDigest extends MessageDigest {
readonly algorithm: Algorithm.Sha512224;
readonly digestLength: 28;
}
interface Sha512256MessageDigest extends MessageDigest {
readonly algorithm: Algorithm.Sha512256;
readonly digestLength: 32;
}
interface Sha384MessageDigest extends MessageDigest {
readonly algorithm: Algorithm.Sha384;
readonly digestLength: 48;
}
interface Sha512MessageDigest extends MessageDigest {
readonly algorithm: Algorithm.Sha512;
readonly digestLength: 64;
}
}
}
namespace hmac {
type Algorithm = md.Algorithm;
interface HMAC {
digest(): util.ByteBuffer;
getMac(): util.ByteBuffer;
start(md: Algorithm | md.MessageDigest, key: string | util.ByteBuffer | null): void;
update(bytes: string): void;
}
function create(): HMAC;
}
namespace cipher {
type Algorithm =
| "AES-ECB"
| "AES-CBC"
| "AES-CFB"
| "AES-OFB"
| "AES-CTR"
| "AES-GCM"
| "3DES-ECB"
| "3DES-CBC"
| "DES-ECB"
| "DES-CBC";
function createCipher(algorithm: Algorithm, payload: util.ByteBuffer | Bytes): BlockCipher;
function createDecipher(algorithm: Algorithm, payload: util.ByteBuffer | Bytes): BlockCipher;
interface StartOptions {
iv?: util.ByteBuffer | Byte[] | Bytes | undefined;
tag?: util.ByteStringBuffer | undefined;
tagLength?: number | undefined;
additionalData?: string | undefined;
}
interface BlockCipher {
start: (options?: StartOptions) => void;
update: (payload: util.ByteBuffer) => void;
finish: () => boolean;
output: util.ByteStringBuffer;
mode: Mode;
}
interface Mode {
tag: util.ByteStringBuffer;
}
}
namespace pss {
type PSS = any;
function create(any: any): PSS;
}
namespace mgf {
namespace mgf1 {
function create(any: any): any;
}
}
namespace tls {
interface ProtocolVersion {
major: Byte;
minor: Byte;
}
const Versions: ProtocolVersion[];
const SupportedVersions: ProtocolVersion[];
const Version: ProtocolVersion;
const MaxFragment: number;
enum ConnectionEnd {
server = 0,
client = 1,
}
enum PRFAlgorithm {
tls_prf_sha256 = 0,
}
enum BulkCipherAlgorithm {
rc4 = 0,
des3 = 1,
aes = 2,
}
enum CipherType {
stream = 0,
block = 1,
aead = 2,
}
enum MACAlgorithm {
hmac_md5 = 0,
hmac_sha1 = 1,
hmac_sha256 = 2,
hmac_sha384 = 3,
hmac_sha512 = 4,
}
enum CompressionMethod {
none = 0,
deflate = 1,
}
enum ContentType {
change_cipher_spec = 20,
alert = 21,
handshake = 22,
application_data = 23,
heartbeat = 24,
}
enum HandshakeType {
hello_request = 0,
client_hello = 1,
server_hello = 2,
certificate = 11,
server_key_exchange = 12,
certificate_request = 13,
server_hello_done = 14,
certificate_verify = 15,
client_key_exchange = 16,
finished = 20,
}
namespace Alert {
enum Level {
warning = 1,
fatal = 2,
}
enum Description {
close_notify = 0,
unexpected_message = 10,
bad_record_mac = 20,
decryption_failed = 21,
record_overflow = 22,
decompression_failure = 30,
handshake_failure = 40,
bad_certificate = 42,
unsupported_certificate = 43,
certificate_revoked = 44,
certificate_expired = 45,
certificate_unknown = 46,
illegal_parameter = 47,
unknown_ca = 48,
access_denied = 49,
decode_error = 50,
decrypt_error = 51,
export_restriction = 60,
protocol_version = 70,
insufficient_security = 71,
internal_error = 80,
user_canceled = 90,
no_renegotiation = 100,
}
}
enum HeartbeatMessageType {
heartbeat_request = 1,
heartbeat_response = 2,
}
interface CipherSuite {
id: [Byte, Byte];
name: string;
}
const CipherSuites: { [name: string]: CipherSuite };
interface CertificateRequest {
certificate_types: util.ByteBuffer;
certificate_authorities: util.ByteBuffer;
}
type ConnectionState = any;
interface Connection {
version: ProtocolVersion;
entity: ConnectionEnd;
sessionId: Bytes | null;
caStore: pki.CAStore;
sessionCache: SessionCache | null;
cipherSuites: CipherSuite[];
connected(conn: Connection): void;
virtualHost: string | null;
verifyClient: boolean;
verify(conn: Connection, verified: Verified, depth: number, certs: pki.Certificate[]): Verified;
getCertificate:
| ((conn: Connection, hint: CertificateRequest | string[]) => pki.PEM | readonly pki.PEM[])
| null;
getPrivateKey: ((conn: Connection, certificate: pki.Certificate) => pki.PEM) | null;
getSignature:
| ((conn: Connection, bytes: Bytes, callback: (conn: Connection, bytes: Bytes) => void) => void)
| null;
input: util.ByteBuffer;
tlsData: util.ByteBuffer;
data: util.ByteBuffer;
tlsDataReady(conn: Connection): void;
dataReady(conn: Connection): void;
heartbeatReceived: ((conn: Connection, payload: util.ByteBuffer) => void) | undefined;
closed(conn: Connection): void;
error(conn: Connection, error: TLSError): void;
deflate: ((inBytes: Bytes) => Bytes) | null;
inflate: ((inBytes: Bytes) => Bytes) | null;
reset(clearFail?: boolean): void;
record: Record | null;
session: Session | null;
peerCertificate: pki.Certificate | null;
state: { pending: ConnectionState | null; current: ConnectionState };
expect: number;
fragmented: Record | null;
records: Record[];
open: boolean;
handshakes: number;
handshaking: boolean;
isConnected: boolean;
fail: boolean;
handshake(sessionId?: Bytes | null): void;
process(data: Bytes): number;
prepare(data: Bytes): boolean;
prepareHeartbeatRequest(payload: Bytes | util.ByteBuffer, payloadLength?: number): boolean;
close(clearFail?: boolean): Connection;
}
interface Record {
type: ContentType;
version: ProtocolVersion;
length: number;
fragment: util.ByteBuffer;
ready?: boolean | undefined;
}
interface Session {
version: ProtocolVersion | null;
extensions: { [_: string]: object };
cipherSuite: CipherSuite | null;
compressionMethod: CompressionMethod | null;
serverCertificate: pki.Certificate | null;
clientCertificate: pki.Certificate | null;
md5: md.MessageDigest;
sha1: md.MessageDigest;
}
interface SessionCache {
cache: { [key: string]: Session };
capacity: number;
order: [Hex];
getSession(sessionId: Bytes): Session;
setSession(sessionId: Bytes, session: Session): void;
}
function createSessionCache(cache?: SessionCache | { [key: string]: Session }, capacity?: number): SessionCache;
interface Alert {
level: Alert.Level;
description: Alert.Description;
}
interface TLSError extends Error {
message: string;
send: boolean;
origin: "server" | "client";
alert: Alert;
}
type Verified = true | { message?: string | undefined; alert?: Alert.Description | undefined };
function createConnection(options: {
server?: boolean | undefined;
sessionId?: Bytes | null | undefined;
caStore?: pki.CAStore | readonly pki.Certificate[] | undefined;
sessionCache?: SessionCache | { [key: string]: Session } | undefined;
cipherSuites?: CipherSuite[] | undefined;
connected(conn: Connection): void;
virtualHost?: string | undefined;
verifyClient?: boolean | undefined;
verify?(conn: Connection, verified: Verified, depth: number, certs: pki.Certificate[]): Verified;
getCertificate?(conn: Connection, hint: CertificateRequest | string[]): pki.PEM | readonly pki.PEM[];
getPrivateKey?(conn: Connection, certificate: pki.Certificate): pki.PEM;
getSignature?(conn: Connection, bytes: Bytes, callback: (conn: Connection, bytes: Bytes) => void): void;
tlsDataReady(conn: Connection): void;
dataReady(conn: Connection): void;
heartbeatReceived?(conn: Connection, payload: util.ByteBuffer): void;
closed(conn: Connection): void;
error(conn: Connection, error: TLSError): void;
deflate?(inBytes: Bytes): Bytes;
inflate?(inBytes: Bytes): Bytes;
}): Connection;
function prf_tls1(secret: string, label: string, seed: string, length: number): util.ByteBuffer;
function hmac_sha1(
key: string | readonly Byte[] | util.ByteBuffer,
seqNum: [number, number],
record: Record,
): Bytes;
}
}