Prettier all the things
This commit is contained in:
parent
e4a0c7f193
commit
355e22bcd6
10 changed files with 518 additions and 192 deletions
|
@ -1,5 +1,4 @@
|
|||
Generate a ssh keypair using the webcrypto API
|
||||
==
|
||||
# Generate a ssh keypair using the webcrypto API
|
||||
|
||||
See the live demo at https://js-keygen.surge.sh
|
||||
|
||||
|
@ -11,8 +10,6 @@ There is no way to generate a ssh keypair on the chrome book, but we have access
|
|||
* I had to learn about ASN.1 to encode the private key for OpenSSH
|
||||
* I had to lean about the open SSH public format to encode the public key for OpenSSH
|
||||
|
||||
|
||||
The end result is a usable single page app that will locally generate a keypair you can save to local drive. Allowing you to do that straight from chrome on a chrome book.
|
||||
|
||||
Everywhere else, you should have access to ssh-keygen which is the recommended way to generate keypair for SSH.
|
||||
|
||||
|
|
30
base64url.js
30
base64url.js
|
@ -3,26 +3,26 @@
|
|||
|
||||
function base64urlEncode(arg) {
|
||||
var s = window.btoa(arg); // Regular base64 encoder
|
||||
s = s.split('=')[0]; // Remove any trailing '='s
|
||||
s = s.replace(/\+/g, '-'); // 62nd char of encoding
|
||||
s = s.replace(/\//g, '_'); // 63rd char of encoding
|
||||
s = s.split("=")[0]; // Remove any trailing '='s
|
||||
s = s.replace(/\+/g, "-"); // 62nd char of encoding
|
||||
s = s.replace(/\//g, "_"); // 63rd char of encoding
|
||||
return s;
|
||||
}
|
||||
|
||||
function base64urlDecode(s) {
|
||||
s = s.replace(/-/g, '+'); // 62nd char of encoding
|
||||
s = s.replace(/_/g, '/'); // 63rd char of encoding
|
||||
s = s.replace(/-/g, "+"); // 62nd char of encoding
|
||||
s = s.replace(/_/g, "/"); // 63rd char of encoding
|
||||
switch (s.length % 4) { // Pad with trailing '='s
|
||||
case 0: // No pad chars in this case
|
||||
break;
|
||||
case 2: // Two pad chars
|
||||
s += "==";
|
||||
break;
|
||||
case 3: // One pad char
|
||||
s += "=";
|
||||
break;
|
||||
default:
|
||||
throw "Illegal base64url string!";
|
||||
case 0: // No pad chars in this case
|
||||
break;
|
||||
case 2: // Two pad chars
|
||||
s += "==";
|
||||
break;
|
||||
case 3: // One pad char
|
||||
s += "=";
|
||||
break;
|
||||
default:
|
||||
throw "Illegal base64url string!";
|
||||
}
|
||||
return window.atob(s); // Standard base64 decoder
|
||||
}
|
||||
|
|
107
index.html
107
index.html
|
@ -1,5 +1,6 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<title>js-keygen</title>
|
||||
<script src="base64url.js"></script>
|
||||
|
@ -9,51 +10,77 @@
|
|||
<link rel="stylesheet" href="js-keygen.css">
|
||||
<link rel="icon" type="image/png" href="key.png">
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div id="content">
|
||||
<h1>js-keygen</h1>
|
||||
<h1>js-keygen</h1>
|
||||
|
||||
Generate a keypair to be used with openSSH, this replicate ssh-keygen function in javascript in the browser, using the webcrypto api and a bit of glue.<br>
|
||||
For an in-depth explanation on how this work, see the <a href="http://blog.roumanoff.com/2015/09/using-webcrypto-api-to-generate-keypair.html">blog post</a>.<br>
|
||||
Usually you would want to save the private key to the machine initiating the ssh connection, and you want to copy the public key to the system receiving the connection.<br>
|
||||
No data is being sent to the server, everything happens within the context of this web page.<br>
|
||||
<a href="https://twitter.com/share" class="twitter-share-button" data-via="pkr2">Tweet</a>
|
||||
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script><hr>
|
||||
<div><label for="name">Name:</label><input id="name" type="text" value="webcrypto"></div>
|
||||
<div><label for="alg">Algorithm:</label><select id="alg" disabled>
|
||||
<option value="RSASSA-PKCS1-v1_5" selected>RSASSA-PKCS1-v1_5</option>
|
||||
<option value="RSA-PSS">RSA-PSS</option>
|
||||
<option value="ECDSA">ECDSA</option>
|
||||
</select>
|
||||
<label for="size">Size:</label><select id="size" disabled>
|
||||
<option value="1024" selected>1024</option>
|
||||
<option value="2048">2048</option>
|
||||
<option value="4096">4096</option>
|
||||
</select>
|
||||
</div>
|
||||
<div><label for="hash">Hash:</label><select id="hash" disabled>
|
||||
<option value="SHA-1" selected>SHA-1</option>
|
||||
<option value="SHA-256">SHA-256</option>
|
||||
<option value="SHA-384">SHA-384</option>
|
||||
<option value="SHA-512">SHA-512</option>
|
||||
</select></div>
|
||||
<label for="generate"></label><button id="generate">Generate</button>
|
||||
<br>
|
||||
|
||||
<div id="result" style="display:none;">
|
||||
Generate a keypair to be used with openSSH, this replicate ssh-keygen function in javascript in the browser, using the webcrypto
|
||||
api and a bit of glue.
|
||||
<br> For an in-depth explanation on how this work, see the
|
||||
<a href="http://blog.roumanoff.com/2015/09/using-webcrypto-api-to-generate-keypair.html">blog post</a>.
|
||||
<br> Usually you would want to save the private key to the machine initiating the ssh connection, and you want to copy the
|
||||
public key to the system receiving the connection.
|
||||
<br> No data is being sent to the server, everything happens within the context of this web page.
|
||||
<br>
|
||||
<a href="https://twitter.com/share" class="twitter-share-button" data-via="pkr2">Tweet</a>
|
||||
<script>!function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0], p = /^http:/.test(d.location) ? 'http' : 'https'; if (!d.getElementById(id)) { js = d.createElement(s); js.id = id; js.src = p + '://platform.twitter.com/widgets.js'; fjs.parentNode.insertBefore(js, fjs); } }(document, 'script', 'twitter-wjs');</script>
|
||||
<hr>
|
||||
<a id="private" style="display: none;" href="" download="id_rsa">id_rsa</a>
|
||||
<a id="public" style="display: none;" href="" download="id_rsa.pub">id_rsa.pub</a>
|
||||
Private Key <button id="copyPrivate">Copy</button> or <button id="savePrivate">Save</button><br>
|
||||
<textarea id="privateKey" style="height: 150px;" spellcheck="false"></textarea>
|
||||
<div>
|
||||
<label for="name">Name:</label>
|
||||
<input id="name" type="text" value="webcrypto">
|
||||
</div>
|
||||
<div>
|
||||
<label for="alg">Algorithm:</label>
|
||||
<select id="alg" disabled>
|
||||
<option value="RSASSA-PKCS1-v1_5" selected>RSASSA-PKCS1-v1_5</option>
|
||||
<option value="RSA-PSS">RSA-PSS</option>
|
||||
<option value="ECDSA">ECDSA</option>
|
||||
</select>
|
||||
<label for="size">Size:</label>
|
||||
<select id="size" disabled>
|
||||
<option value="1024" selected>1024</option>
|
||||
<option value="2048">2048</option>
|
||||
<option value="4096">4096</option>
|
||||
</select>
|
||||
</div>
|
||||
<div>
|
||||
<label for="hash">Hash:</label>
|
||||
<select id="hash" disabled>
|
||||
<option value="SHA-1" selected>SHA-1</option>
|
||||
<option value="SHA-256">SHA-256</option>
|
||||
<option value="SHA-384">SHA-384</option>
|
||||
<option value="SHA-512">SHA-512</option>
|
||||
</select>
|
||||
</div>
|
||||
<label for="generate"></label>
|
||||
<button id="generate">Generate</button>
|
||||
<br>
|
||||
|
||||
<hr>
|
||||
Public Key <button id="copyPublic">Copy</button> or <button id="savePublic">Save</button><br>
|
||||
<textarea id="publicKey" spellcheck="false"></textarea>
|
||||
<div id="result" style="display:none;">
|
||||
<hr>
|
||||
<a id="private" style="display: none;" href="" download="id_rsa">id_rsa</a>
|
||||
<a id="public" style="display: none;" href="" download="id_rsa.pub">id_rsa.pub</a>
|
||||
Private Key
|
||||
<button id="copyPrivate">Copy</button> or
|
||||
<button id="savePrivate">Save</button>
|
||||
<br>
|
||||
<textarea id="privateKey" style="height: 150px;" spellcheck="false"></textarea>
|
||||
|
||||
<hr> Public Key
|
||||
<button id="copyPublic">Copy</button> or
|
||||
<button id="savePublic">Save</button>
|
||||
<br>
|
||||
<textarea id="publicKey" spellcheck="false"></textarea>
|
||||
</div>
|
||||
<hr> Made with
|
||||
<span style="color:magenta;">♥</span> by
|
||||
<a href="http://blog.roumanoff.com">Patrick Roumanoff</a>
|
||||
<a href="https://github.com/PatrickRoumanoff/js-keygen">
|
||||
<img style="position: absolute; top: 0; right: 0; border: 0;" src="https://camo.githubusercontent.com/365986a132ccd6a44c23a9169022c0b5c890c387/68747470733a2f2f73332e616d617a6f6e6177732e636f6d2f6769746875622f726962626f6e732f666f726b6d655f72696768745f7265645f6161303030302e706e67"
|
||||
alt="Fork me on GitHub" data-canonical-src="https://s3.amazonaws.com/github/ribbons/forkme_right_red_aa0000.png">
|
||||
</a>
|
||||
</div>
|
||||
<hr>
|
||||
Made with <span style="color:magenta;">♥</span> by <a href="http://blog.roumanoff.com">Patrick Roumanoff</a>
|
||||
<a href="https://github.com/PatrickRoumanoff/js-keygen"><img style="position: absolute; top: 0; right: 0; border: 0;" src="https://camo.githubusercontent.com/365986a132ccd6a44c23a9169022c0b5c890c387/68747470733a2f2f73332e616d617a6f6e6177732e636f6d2f6769746875622f726962626f6e732f666f726b6d655f72696768745f7265645f6161303030302e706e67" alt="Fork me on GitHub" data-canonical-src="https://s3.amazonaws.com/github/ribbons/forkme_right_red_aa0000.png"></a>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -2,16 +2,16 @@
|
|||
var console, generateKeyPair;
|
||||
|
||||
function copy(id) {
|
||||
return function () {
|
||||
return function() {
|
||||
var ta = document.querySelector(id);
|
||||
ta.focus();
|
||||
ta.select();
|
||||
try {
|
||||
var successful = document.execCommand('copy');
|
||||
var msg = successful ? 'successful' : 'unsuccessful';
|
||||
console.log('Copy key command was ' + msg);
|
||||
var successful = document.execCommand("copy");
|
||||
var msg = successful ? "successful" : "unsuccessful";
|
||||
console.log("Copy key command was " + msg);
|
||||
} catch (err) {
|
||||
console.log('Oops, unable to copy');
|
||||
console.log("Oops, unable to copy");
|
||||
}
|
||||
window.getSelection().removeAllRanges();
|
||||
ta.blur();
|
||||
|
@ -22,31 +22,33 @@ function buildHref(data) {
|
|||
return "data:application/octet-stream;charset=utf-8;base64," + window.btoa(data);
|
||||
}
|
||||
|
||||
document.addEventListener("DOMContentLoaded", function (event) {
|
||||
document.querySelector('#savePrivate').addEventListener('click', function (event) {
|
||||
document.querySelector('a#private').click();
|
||||
document.addEventListener("DOMContentLoaded", function(event) {
|
||||
document.querySelector("#savePrivate").addEventListener("click", function(event) {
|
||||
document.querySelector("a#private").click();
|
||||
});
|
||||
document.querySelector('#copyPrivate').addEventListener('click', copy('#privateKey'));
|
||||
document.querySelector('#savePublic').addEventListener('click', function (event) {
|
||||
document.querySelector('a#public').click();
|
||||
document.querySelector("#copyPrivate").addEventListener("click", copy("#privateKey"));
|
||||
document.querySelector("#savePublic").addEventListener("click", function(event) {
|
||||
document.querySelector("a#public").click();
|
||||
});
|
||||
document.querySelector('#copyPublic').addEventListener('click', copy('#publicKey'));
|
||||
document.querySelector("#copyPublic").addEventListener("click", copy("#publicKey"));
|
||||
|
||||
document.querySelector('#generate').addEventListener('click', function (event) {
|
||||
var name = document.querySelector('#name').value || "name";
|
||||
document.querySelector('a#private').setAttribute("download", name + "_rsa");
|
||||
document.querySelector('a#public').setAttribute("download", name + "_rsa.pub");
|
||||
document.querySelector("#generate").addEventListener("click", function(event) {
|
||||
var name = document.querySelector("#name").value || "name";
|
||||
document.querySelector("a#private").setAttribute("download", name + "_rsa");
|
||||
document.querySelector("a#public").setAttribute("download", name + "_rsa.pub");
|
||||
|
||||
var alg = document.querySelector('#alg').value || "RSASSA-PKCS1-v1_5";
|
||||
var size = parseInt(document.querySelector('#size').value || "2048", 10);
|
||||
generateKeyPair(alg, size, name).then(function (keys) {
|
||||
document.querySelector('#private').setAttribute("href", buildHref(keys[0]));
|
||||
document.querySelector('#public').setAttribute("href", buildHref(keys[1]));
|
||||
document.querySelector('#privateKey').textContent = keys[0];
|
||||
document.querySelector('#publicKey').textContent = keys[1];
|
||||
document.querySelector('#result').style.display = "block";
|
||||
}).catch(function (err) {
|
||||
console.error(err);
|
||||
});
|
||||
var alg = document.querySelector("#alg").value || "RSASSA-PKCS1-v1_5";
|
||||
var size = parseInt(document.querySelector("#size").value || "2048", 10);
|
||||
generateKeyPair(alg, size, name)
|
||||
.then(function(keys) {
|
||||
document.querySelector("#private").setAttribute("href", buildHref(keys[0]));
|
||||
document.querySelector("#public").setAttribute("href", buildHref(keys[1]));
|
||||
document.querySelector("#privateKey").textContent = keys[0];
|
||||
document.querySelector("#publicKey").textContent = keys[1];
|
||||
document.querySelector("#result").style.display = "block";
|
||||
})
|
||||
.catch(function(err) {
|
||||
console.error(err);
|
||||
});
|
||||
});
|
||||
});
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
body {
|
||||
background-color: #cccccc;
|
||||
background-color: #cccccc;
|
||||
font: 16px Arial, Tahoma, Helvetica, FreeSans, sans-serif;
|
||||
}
|
||||
|
||||
button#generate {
|
||||
background-color: rgb(60,200,30);
|
||||
background-color: rgb(60, 200, 30);
|
||||
padding: 10px;
|
||||
margin-top: 5px;
|
||||
color: white;
|
||||
|
@ -29,7 +29,7 @@ label {
|
|||
display: inline-block;
|
||||
width: 80px;
|
||||
}
|
||||
select{
|
||||
select {
|
||||
width: 200px;
|
||||
}
|
||||
input {
|
||||
|
|
47
js-keygen.js
47
js-keygen.js
|
@ -4,7 +4,9 @@ var extractable = true;
|
|||
var encodePrivateKey, encodePublicKey;
|
||||
|
||||
function wrap(text, len) {
|
||||
var length = len || 72, i, result = "";
|
||||
var length = len || 72,
|
||||
i,
|
||||
result = "";
|
||||
for (i = 0; i < text.length; i += length) {
|
||||
result += text.slice(i, i + length) + "\n";
|
||||
}
|
||||
|
@ -16,7 +18,8 @@ function rsaPrivateKey(key) {
|
|||
}
|
||||
|
||||
function arrayBufferToBase64(buffer) {
|
||||
var binary = '', i;
|
||||
var binary = "",
|
||||
i;
|
||||
var bytes = new Uint8Array(buffer);
|
||||
var len = bytes.byteLength;
|
||||
for (i = 0; i < len; i += 1) {
|
||||
|
@ -26,28 +29,28 @@ function arrayBufferToBase64(buffer) {
|
|||
}
|
||||
|
||||
function generateKeyPair(alg, size, name) {
|
||||
return window.crypto.subtle.generateKey({
|
||||
name: "RSASSA-PKCS1-v1_5",
|
||||
modulusLength: 2048, //can be 1024, 2048, or 4096
|
||||
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
||||
hash: {name: "SHA-1"} //can be "SHA-1", "SHA-256", "SHA-384", or "SHA-512"
|
||||
},
|
||||
extractable,
|
||||
["sign", "verify"]
|
||||
).then(function (key) {
|
||||
return window.crypto.subtle
|
||||
.generateKey(
|
||||
{
|
||||
name: "RSASSA-PKCS1-v1_5",
|
||||
modulusLength: 2048, //can be 1024, 2048, or 4096
|
||||
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
||||
hash: { name: "SHA-1" }, //can be "SHA-1", "SHA-256", "SHA-384", or "SHA-512"
|
||||
},
|
||||
extractable,
|
||||
["sign", "verify"]
|
||||
)
|
||||
.then(function(key) {
|
||||
var privateKey = window.crypto.subtle
|
||||
.exportKey("jwk", key.privateKey)
|
||||
.then(encodePrivateKey)
|
||||
.then(wrap)
|
||||
.then(rsaPrivateKey);
|
||||
|
||||
var privateKey = window.crypto.subtle.exportKey(
|
||||
"jwk",
|
||||
key.privateKey
|
||||
).then(encodePrivateKey).then(wrap).then(rsaPrivateKey);
|
||||
|
||||
var publicKey = window.crypto.subtle.exportKey(
|
||||
"jwk",
|
||||
key.publicKey
|
||||
).then(function (jwk) {
|
||||
var publicKey = window.crypto.subtle.exportKey("jwk", key.publicKey).then(function(jwk) {
|
||||
return encodePublicKey(jwk, name);
|
||||
});
|
||||
|
||||
return Promise.all([privateKey, publicKey]);
|
||||
});
|
||||
return Promise.all([privateKey, publicKey]);
|
||||
});
|
||||
}
|
||||
|
|
|
@ -2,12 +2,11 @@
|
|||
"name": "js-keypair",
|
||||
"version": "1.0.0",
|
||||
"description": "Generate a key pair using the webcrypto API",
|
||||
"main": "keypair.js",
|
||||
"dependencies": {
|
||||
},
|
||||
"main": "js-keygen.js",
|
||||
"dependencies": {},
|
||||
"devDependencies": {},
|
||||
"scripts": {
|
||||
"test": "echo \"Error: no test specified\" && exit 1"
|
||||
"test": "echo \"To run test open test/index.html in your browser\""
|
||||
},
|
||||
"author": "patrick@roumanoff.com",
|
||||
"license": "Apache 2.0"
|
||||
|
|
33
ssh-util.js
33
ssh-util.js
|
@ -7,7 +7,7 @@ function arrayToString(a) {
|
|||
}
|
||||
|
||||
function stringToArray(s) {
|
||||
return s.split('').map(function (c) {
|
||||
return s.split("").map(function(c) {
|
||||
return c.charCodeAt();
|
||||
});
|
||||
}
|
||||
|
@ -21,13 +21,18 @@ function pemToArray(pem) {
|
|||
}
|
||||
|
||||
function arrayToPem(a) {
|
||||
return window.btoa(a.map(function (c) {
|
||||
return String.fromCharCode(c);
|
||||
}).join(''));
|
||||
return window.btoa(
|
||||
a
|
||||
.map(function(c) {
|
||||
return String.fromCharCode(c);
|
||||
})
|
||||
.join("")
|
||||
);
|
||||
}
|
||||
|
||||
function arrayToLen(a) {
|
||||
var result = 0, i;
|
||||
var result = 0,
|
||||
i;
|
||||
for (i = 0; i < a.length; i += 1) {
|
||||
result = result * 256 + a[i];
|
||||
}
|
||||
|
@ -37,13 +42,14 @@ function arrayToLen(a) {
|
|||
function integerToOctet(n) {
|
||||
var result = [];
|
||||
for (true; n > 0; n = n >> 8) {
|
||||
result.push(n & 0xFF);
|
||||
result.push(n & 0xff);
|
||||
}
|
||||
return result.reverse();
|
||||
}
|
||||
|
||||
function lenToArray(n) {
|
||||
var oct = integerToOctet(n), i;
|
||||
var oct = integerToOctet(n),
|
||||
i;
|
||||
for (i = oct.length; i < 4; i += 1) {
|
||||
oct.unshift(0);
|
||||
}
|
||||
|
@ -54,23 +60,24 @@ function decodePublicKey(s) {
|
|||
var split = s.split(" ");
|
||||
var prefix = split[0];
|
||||
if (prefix !== "ssh-rsa") {
|
||||
throw ("Unknown prefix:" + prefix);
|
||||
throw "Unknown prefix:" + prefix;
|
||||
}
|
||||
var buffer = pemToArray(split[1]);
|
||||
var nameLen = arrayToLen(buffer.splice(0, 4));
|
||||
var type = arrayToString(buffer.splice(0, nameLen));
|
||||
if (type !== "ssh-rsa") {
|
||||
throw ("Unknown key type:" + type);
|
||||
throw "Unknown key type:" + type;
|
||||
}
|
||||
var exponentLen = arrayToLen(buffer.splice(0, 4));
|
||||
var exponent = buffer.splice(0, exponentLen);
|
||||
var keyLen = arrayToLen(buffer.splice(0, 4));
|
||||
var key = buffer.splice(0, keyLen);
|
||||
return {type: type, exponent: exponent, key: key, name: split[2]};
|
||||
return { type: type, exponent: exponent, key: key, name: split[2] };
|
||||
}
|
||||
|
||||
function checkHighestBit(v) {
|
||||
if (v[0] >> 7 === 1) { // add leading zero if first bit is set
|
||||
if (v[0] >> 7 === 1) {
|
||||
// add leading zero if first bit is set
|
||||
v.unshift(0);
|
||||
}
|
||||
return v;
|
||||
|
@ -81,7 +88,7 @@ function jwkToInternal(jwk) {
|
|||
type: "ssh-rsa",
|
||||
exponent: checkHighestBit(stringToArray(base64urlDecode(jwk.e))),
|
||||
name: "name",
|
||||
key: checkHighestBit(stringToArray(base64urlDecode(jwk.n)))
|
||||
key: checkHighestBit(stringToArray(base64urlDecode(jwk.n))),
|
||||
};
|
||||
}
|
||||
|
||||
|
@ -109,7 +116,7 @@ function asnEncodeLen(n) {
|
|||
|
||||
function encodePrivateKey(jwk) {
|
||||
var order = ["n", "e", "d", "p", "q", "dp", "dq", "qi"];
|
||||
var list = order.map(function (prop) {
|
||||
var list = order.map(function(prop) {
|
||||
var v = checkHighestBit(stringToArray(base64urlDecode(jwk[prop])));
|
||||
var len = asnEncodeLen(v.length);
|
||||
return [0x02].concat(len, v); // int tag is 0x02
|
||||
|
|
|
@ -1,17 +1,22 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>QUnit Example</title>
|
||||
<link rel="stylesheet" href="qunit/qunit.css">
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div id="qunit"></div>
|
||||
<div id="qunit-fixture"><div id="generate"></div></div>
|
||||
<div id="qunit-fixture">
|
||||
<div id="generate"></div>
|
||||
</div>
|
||||
<script src="qunit/qunit.js"></script>
|
||||
<script src="../base64url.js"></script>
|
||||
<script src="../ssh-util.js"></script>
|
||||
<script src="../js-keygen.js"></script>
|
||||
<script src="tests.js"></script>
|
||||
</body>
|
||||
|
||||
</html>
|
396
test/tests.js
396
test/tests.js
|
@ -1,27 +1,304 @@
|
|||
var public_ssh = ["ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwi36YMW0eDS3NXSAM/Gcs0txeLOcZE0LQmGPYmHX09Fm1FC9AdzvDWQIfwVylqNy8G6X8+pE0TMuWav4rQjtWRls3j43LdrXkfaTZV2PNJH0ki2zaCND3cz46hBR1bSwi3O4LoN0ZHXoC4ZXoMBXKtYEOg+9jS+pE3vu2QSPruiRROTOYYvrjWx0Bwi8DJc90TmNVeqvPjewPAm4qaTdmh96jIgJQq+vAdhDHu90i31Kl3JUF94x6pzFmg8ZyXOv0Py2GtK9c5To3C33FXI8yTm/sf2Bp7fwd3MEGNcdVNqa7Tt0z2u5Jcmsws93SZuj4iVjbR6xqme9EmIa3BTB7 name",
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuew50MaphQgiuM6H7zxMspNojI2Ujf77MuWlAjmw1JxcTkfE7JKzV+9fqmESJNtnZSr3+I2dxQhJ72jttrz+2dFt9ol91muTPWzKrA8XXIBH2o7sEJ+QB8/q7S03d+Zgw6tlo+qdXLOWcKqL5MJhYwzTFEdGTSMF00cBFadcpDq1xFPygGTHRa7m3pK723nGz7TMGWmtBK2bHx+Zlp7geLK/7hl+NRG1lTyIbtdkP2T4Y81Z0bhz9kNHroUei3MFD6HvN93qMJWl3/LZZzTb++1BedNeybGKqbtsB3xp0v3c6bQy49wR3RwrAwL03AKbCwTawAufSeoXyRI+rtgZ/ name",
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpNNtjZeldPuJ5ZgcjO4i6eSJb6kiuf1sULOoWaW9acwSxAfqrmN6Hn7VGg3GK3kSKJUmBKMsF2u+ECajVBec+OTMlbL7oZrYNl2neUYsI7O0G/8lpozZjADYu8CaMqVSAeTa3ORga9Ht/qgCpqXIyEcTsFSbZ45hhaZF0fXQ0GHDCkV/ylBduQHxheCe1SPBSWIO2BwqSlGx/Q76lkL/BnGdcx7xVi3h2yNbEGxqzFuPK75VADZfWria4x09rTqvu41GWIyqzFcbB7BxNImVNh6WVk/qKTcXbfWwH8ck9Cd5bX9g36QaImZ6tW8i/bl3o75bGgP2hSWpsNx8CMVn9 name"];
|
||||
var public_ssh_decoded = [{
|
||||
type: "ssh-rsa",
|
||||
exponent: [1,0,1],
|
||||
name: "name",
|
||||
key: [0,176,139,126,152,49,109,30,13,45,205,93,32,12,252,103,44,210,220,94,44,231,25,19,66,208,152,99,216,152,117,244,244,89,181,20,47,64,119,59,195,89,2,31,193,92,165,168,220,188,27,165,252,250,145,52,76,203,150,106,254,43,66,59,86,70,91,55,143,141,203,118,181,228,125,164,217,87,99,205,36,125,36,139,108,218,8,208,247,115,62,58,132,20,117,109,44,34,220,238,11,160,221,25,29,122,2,225,149,232,48,21,202,181,129,14,131,239,99,75,234,68,222,251,182,65,35,235,186,36,81,57,51,152,98,250,227,91,29,1,194,47,3,37,207,116,78,99,85,122,171,207,141,236,15,2,110,42,105,55,102,135,222,163,34,2,80,171,235,192,118,16,199,187,221,34,223,82,165,220,149,5,247,140,122,167,49,102,131,198,114,92,235,244,63,45,134,180,175,92,229,58,55,11,125,197,92,143,50,78,111,236,127,96,105,237,252,29,220,193,6,53,199,85,54,166,187,78,221,51,218,238,73,114,107,48,179,221,210,102,232,248,137,88,219,71,172,106,153,239,68,152,134,183,5,48,123]
|
||||
}];
|
||||
var public_ssh = [
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwi36YMW0eDS3NXSAM/Gcs0txeLOcZE0LQmGPYmHX09Fm1FC9AdzvDWQIfwVylqNy8G6X8+pE0TMuWav4rQjtWRls3j43LdrXkfaTZV2PNJH0ki2zaCND3cz46hBR1bSwi3O4LoN0ZHXoC4ZXoMBXKtYEOg+9jS+pE3vu2QSPruiRROTOYYvrjWx0Bwi8DJc90TmNVeqvPjewPAm4qaTdmh96jIgJQq+vAdhDHu90i31Kl3JUF94x6pzFmg8ZyXOv0Py2GtK9c5To3C33FXI8yTm/sf2Bp7fwd3MEGNcdVNqa7Tt0z2u5Jcmsws93SZuj4iVjbR6xqme9EmIa3BTB7 name",
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuew50MaphQgiuM6H7zxMspNojI2Ujf77MuWlAjmw1JxcTkfE7JKzV+9fqmESJNtnZSr3+I2dxQhJ72jttrz+2dFt9ol91muTPWzKrA8XXIBH2o7sEJ+QB8/q7S03d+Zgw6tlo+qdXLOWcKqL5MJhYwzTFEdGTSMF00cBFadcpDq1xFPygGTHRa7m3pK723nGz7TMGWmtBK2bHx+Zlp7geLK/7hl+NRG1lTyIbtdkP2T4Y81Z0bhz9kNHroUei3MFD6HvN93qMJWl3/LZZzTb++1BedNeybGKqbtsB3xp0v3c6bQy49wR3RwrAwL03AKbCwTawAufSeoXyRI+rtgZ/ name",
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpNNtjZeldPuJ5ZgcjO4i6eSJb6kiuf1sULOoWaW9acwSxAfqrmN6Hn7VGg3GK3kSKJUmBKMsF2u+ECajVBec+OTMlbL7oZrYNl2neUYsI7O0G/8lpozZjADYu8CaMqVSAeTa3ORga9Ht/qgCpqXIyEcTsFSbZ45hhaZF0fXQ0GHDCkV/ylBduQHxheCe1SPBSWIO2BwqSlGx/Q76lkL/BnGdcx7xVi3h2yNbEGxqzFuPK75VADZfWria4x09rTqvu41GWIyqzFcbB7BxNImVNh6WVk/qKTcXbfWwH8ck9Cd5bX9g36QaImZ6tW8i/bl3o75bGgP2hSWpsNx8CMVn9 name",
|
||||
];
|
||||
var public_ssh_decoded = [
|
||||
{
|
||||
type: "ssh-rsa",
|
||||
exponent: [1, 0, 1],
|
||||
name: "name",
|
||||
key: [
|
||||
0,
|
||||
176,
|
||||
139,
|
||||
126,
|
||||
152,
|
||||
49,
|
||||
109,
|
||||
30,
|
||||
13,
|
||||
45,
|
||||
205,
|
||||
93,
|
||||
32,
|
||||
12,
|
||||
252,
|
||||
103,
|
||||
44,
|
||||
210,
|
||||
220,
|
||||
94,
|
||||
44,
|
||||
231,
|
||||
25,
|
||||
19,
|
||||
66,
|
||||
208,
|
||||
152,
|
||||
99,
|
||||
216,
|
||||
152,
|
||||
117,
|
||||
244,
|
||||
244,
|
||||
89,
|
||||
181,
|
||||
20,
|
||||
47,
|
||||
64,
|
||||
119,
|
||||
59,
|
||||
195,
|
||||
89,
|
||||
2,
|
||||
31,
|
||||
193,
|
||||
92,
|
||||
165,
|
||||
168,
|
||||
220,
|
||||
188,
|
||||
27,
|
||||
165,
|
||||
252,
|
||||
250,
|
||||
145,
|
||||
52,
|
||||
76,
|
||||
203,
|
||||
150,
|
||||
106,
|
||||
254,
|
||||
43,
|
||||
66,
|
||||
59,
|
||||
86,
|
||||
70,
|
||||
91,
|
||||
55,
|
||||
143,
|
||||
141,
|
||||
203,
|
||||
118,
|
||||
181,
|
||||
228,
|
||||
125,
|
||||
164,
|
||||
217,
|
||||
87,
|
||||
99,
|
||||
205,
|
||||
36,
|
||||
125,
|
||||
36,
|
||||
139,
|
||||
108,
|
||||
218,
|
||||
8,
|
||||
208,
|
||||
247,
|
||||
115,
|
||||
62,
|
||||
58,
|
||||
132,
|
||||
20,
|
||||
117,
|
||||
109,
|
||||
44,
|
||||
34,
|
||||
220,
|
||||
238,
|
||||
11,
|
||||
160,
|
||||
221,
|
||||
25,
|
||||
29,
|
||||
122,
|
||||
2,
|
||||
225,
|
||||
149,
|
||||
232,
|
||||
48,
|
||||
21,
|
||||
202,
|
||||
181,
|
||||
129,
|
||||
14,
|
||||
131,
|
||||
239,
|
||||
99,
|
||||
75,
|
||||
234,
|
||||
68,
|
||||
222,
|
||||
251,
|
||||
182,
|
||||
65,
|
||||
35,
|
||||
235,
|
||||
186,
|
||||
36,
|
||||
81,
|
||||
57,
|
||||
51,
|
||||
152,
|
||||
98,
|
||||
250,
|
||||
227,
|
||||
91,
|
||||
29,
|
||||
1,
|
||||
194,
|
||||
47,
|
||||
3,
|
||||
37,
|
||||
207,
|
||||
116,
|
||||
78,
|
||||
99,
|
||||
85,
|
||||
122,
|
||||
171,
|
||||
207,
|
||||
141,
|
||||
236,
|
||||
15,
|
||||
2,
|
||||
110,
|
||||
42,
|
||||
105,
|
||||
55,
|
||||
102,
|
||||
135,
|
||||
222,
|
||||
163,
|
||||
34,
|
||||
2,
|
||||
80,
|
||||
171,
|
||||
235,
|
||||
192,
|
||||
118,
|
||||
16,
|
||||
199,
|
||||
187,
|
||||
221,
|
||||
34,
|
||||
223,
|
||||
82,
|
||||
165,
|
||||
220,
|
||||
149,
|
||||
5,
|
||||
247,
|
||||
140,
|
||||
122,
|
||||
167,
|
||||
49,
|
||||
102,
|
||||
131,
|
||||
198,
|
||||
114,
|
||||
92,
|
||||
235,
|
||||
244,
|
||||
63,
|
||||
45,
|
||||
134,
|
||||
180,
|
||||
175,
|
||||
92,
|
||||
229,
|
||||
58,
|
||||
55,
|
||||
11,
|
||||
125,
|
||||
197,
|
||||
92,
|
||||
143,
|
||||
50,
|
||||
78,
|
||||
111,
|
||||
236,
|
||||
127,
|
||||
96,
|
||||
105,
|
||||
237,
|
||||
252,
|
||||
29,
|
||||
220,
|
||||
193,
|
||||
6,
|
||||
53,
|
||||
199,
|
||||
85,
|
||||
54,
|
||||
166,
|
||||
187,
|
||||
78,
|
||||
221,
|
||||
51,
|
||||
218,
|
||||
238,
|
||||
73,
|
||||
114,
|
||||
107,
|
||||
48,
|
||||
179,
|
||||
221,
|
||||
210,
|
||||
102,
|
||||
232,
|
||||
248,
|
||||
137,
|
||||
88,
|
||||
219,
|
||||
71,
|
||||
172,
|
||||
106,
|
||||
153,
|
||||
239,
|
||||
68,
|
||||
152,
|
||||
134,
|
||||
183,
|
||||
5,
|
||||
48,
|
||||
123,
|
||||
],
|
||||
},
|
||||
];
|
||||
|
||||
var jwk_public = {"alg":"RS1","e":"AQAB","ext":true,"key_ops":["verify"],"kty":"RSA","n":"3PWJ6uDsFPgQo67of3IYw0Svyq95SNh9GS-2gorv68GxWIYYeAShaG_UtTf8mvf6u-VIUr54Re2FoLc78ICR3nRhFH5D1_fNaP9hkMAHBqaJ8ATiq4d7-PfeXTCi0yY0qfWkGjuPtOC3IK7WmnEkiA5qUVpy0oHFPiqoAyNynWJRDFJka00JEpM1QFyF1Tz3PEGp0XlFnClY48iJG9UqXlDgaysnG3ro2sDm8ftva0IjX1Sp7Z9FyWQci-yOYfST00wKHQd7z5-Eo3cTd5M0BhcVXeR0gprdK1TTDLZLznFJQ36HYwrUFEXvTyme6vkZfNPRb0z8KPq5Gs7dujE_cw"};
|
||||
var jwk_public = {
|
||||
alg: "RS1",
|
||||
e: "AQAB",
|
||||
ext: true,
|
||||
key_ops: ["verify"],
|
||||
kty: "RSA",
|
||||
n:
|
||||
"3PWJ6uDsFPgQo67of3IYw0Svyq95SNh9GS-2gorv68GxWIYYeAShaG_UtTf8mvf6u-VIUr54Re2FoLc78ICR3nRhFH5D1_fNaP9hkMAHBqaJ8ATiq4d7-PfeXTCi0yY0qfWkGjuPtOC3IK7WmnEkiA5qUVpy0oHFPiqoAyNynWJRDFJka00JEpM1QFyF1Tz3PEGp0XlFnClY48iJG9UqXlDgaysnG3ro2sDm8ftva0IjX1Sp7Z9FyWQci-yOYfST00wKHQd7z5-Eo3cTd5M0BhcVXeR0gprdK1TTDLZLznFJQ36HYwrUFEXvTyme6vkZfNPRb0z8KPq5Gs7dujE_cw",
|
||||
};
|
||||
|
||||
var jwk_private = {
|
||||
"kty":"RSA",
|
||||
"kid":"juliet@capulet.lit",
|
||||
"use":"enc",
|
||||
"n":"t6Q8PWSi1dkJj9hTP8hNYFlvadM7DflW9mWepOJhJ66w7nyoK1gPNqFMSQRyO125Gp-TEkodhWr0iujjHVx7BcV0llS4w5ACGgPrcAd6ZcSR0-Iqom-QFcNP8Sjg086MwoqQU_LYywlAGZ21WSdS_PERyGFiNnj3QQlO8Yns5jCtLCRwLHL0Pb1fEv45AuRIuUfVcPySBWYnDyGxvjYGDSM-AqWS9zIQ2ZilgT-GqUmipg0XOC0Cc20rgLe2ymLHjpHciCKVAbY5-L32-lSeZO-Os6U15_aXrk9Gw8cPUaX1_I8sLGuSiVdt3C_Fn2PZ3Z8i744FPFGGcG1qs2Wz-Q",
|
||||
"e":"AQAB",
|
||||
"d":"GRtbIQmhOZtyszfgKdg4u_N-R_mZGU_9k7JQ_jn1DnfTuMdSNprTeaSTyWfSNkuaAwnOEbIQVy1IQbWVV25NY3ybc_IhUJtfri7bAXYEReWaCl3hdlPKXy9UvqPYGR0kIXTQRqns-dVJ7jahlI7LyckrpTmrM8dWBo4_PMaenNnPiQgO0xnuToxutRZJfJvG4Ox4ka3GORQd9CsCZ2vsUDmsXOfUENOyMqADC6p1M3h33tsurY15k9qMSpG9OX_IJAXmxzAh_tWiZOwk2K4yxH9tS3Lq1yX8C1EWmeRDkK2ahecG85-oLKQt5VEpWHKmjOi_gJSdSgqcN96X52esAQ",
|
||||
"p":"2rnSOV4hKSN8sS4CgcQHFbs08XboFDqKum3sc4h3GRxrTmQdl1ZK9uw-PIHfQP0FkxXVrx-WE-ZEbrqivH_2iCLUS7wAl6XvARt1KkIaUxPPSYB9yk31s0Q8UK96E3_OrADAYtAJs-M3JxCLfNgqh56HDnETTQhH3rCT5T3yJws",
|
||||
"q":"1u_RiFDP7LBYh3N4GXLT9OpSKYP0uQZyiaZwBtOCBNJgQxaj10RWjsZu0c6Iedis4S7B_coSKB0Kj9PaPaBzg-IySRvvcQuPamQu66riMhjVtG6TlV8CLCYKrYl52ziqK0E_ym2QnkwsUX7eYTB7LbAHRK9GqocDE5B0f808I4s",
|
||||
"dp":"KkMTWqBUefVwZ2_Dbj1pPQqyHSHjj90L5x_MOzqYAJMcLMZtbUtwKqvVDq3tbEo3ZIcohbDtt6SbfmWzggabpQxNxuBpoOOf_a_HgMXK_lhqigI4y_kqS1wY52IwjUn5rgRrJ-yYo1h41KR-vz2pYhEAeYrhttWtxVqLCRViD6c",
|
||||
"dq":"AvfS0-gRxvn0bwJoMSnFxYcK1WnuEjQFluMGfwGitQBWtfZ1Er7t1xDkbN9GQTB9yqpDoYaN06H7CFtrkxhJIBQaj6nkF5KKS3TQtQ5qCzkOkmxIe3KRbBymXxkb5qwUpX5ELD5xFc6FeiafWYY63TmmEAu_lRFCOJ3xDea-ots",
|
||||
"qi":"lSQi-w9CpyUReMErP1RsBLk7wNtOvs5EQpPqmuMvqW57NBUczScEoPwmUqqabu9V0-Py4dQ57_bapoKRu1R90bvuFnU63SHWEFglZQvJDMeAvmj4sm-Fp0oYu_neotgQ0hzbI5gry7ajdYy9-2lNx_76aBZoOUu9HCJ-UsfSOI8"
|
||||
kty: "RSA",
|
||||
kid: "juliet@capulet.lit",
|
||||
use: "enc",
|
||||
n:
|
||||
"t6Q8PWSi1dkJj9hTP8hNYFlvadM7DflW9mWepOJhJ66w7nyoK1gPNqFMSQRyO125Gp-TEkodhWr0iujjHVx7BcV0llS4w5ACGgPrcAd6ZcSR0-Iqom-QFcNP8Sjg086MwoqQU_LYywlAGZ21WSdS_PERyGFiNnj3QQlO8Yns5jCtLCRwLHL0Pb1fEv45AuRIuUfVcPySBWYnDyGxvjYGDSM-AqWS9zIQ2ZilgT-GqUmipg0XOC0Cc20rgLe2ymLHjpHciCKVAbY5-L32-lSeZO-Os6U15_aXrk9Gw8cPUaX1_I8sLGuSiVdt3C_Fn2PZ3Z8i744FPFGGcG1qs2Wz-Q",
|
||||
e: "AQAB",
|
||||
d:
|
||||
"GRtbIQmhOZtyszfgKdg4u_N-R_mZGU_9k7JQ_jn1DnfTuMdSNprTeaSTyWfSNkuaAwnOEbIQVy1IQbWVV25NY3ybc_IhUJtfri7bAXYEReWaCl3hdlPKXy9UvqPYGR0kIXTQRqns-dVJ7jahlI7LyckrpTmrM8dWBo4_PMaenNnPiQgO0xnuToxutRZJfJvG4Ox4ka3GORQd9CsCZ2vsUDmsXOfUENOyMqADC6p1M3h33tsurY15k9qMSpG9OX_IJAXmxzAh_tWiZOwk2K4yxH9tS3Lq1yX8C1EWmeRDkK2ahecG85-oLKQt5VEpWHKmjOi_gJSdSgqcN96X52esAQ",
|
||||
p:
|
||||
"2rnSOV4hKSN8sS4CgcQHFbs08XboFDqKum3sc4h3GRxrTmQdl1ZK9uw-PIHfQP0FkxXVrx-WE-ZEbrqivH_2iCLUS7wAl6XvARt1KkIaUxPPSYB9yk31s0Q8UK96E3_OrADAYtAJs-M3JxCLfNgqh56HDnETTQhH3rCT5T3yJws",
|
||||
q:
|
||||
"1u_RiFDP7LBYh3N4GXLT9OpSKYP0uQZyiaZwBtOCBNJgQxaj10RWjsZu0c6Iedis4S7B_coSKB0Kj9PaPaBzg-IySRvvcQuPamQu66riMhjVtG6TlV8CLCYKrYl52ziqK0E_ym2QnkwsUX7eYTB7LbAHRK9GqocDE5B0f808I4s",
|
||||
dp:
|
||||
"KkMTWqBUefVwZ2_Dbj1pPQqyHSHjj90L5x_MOzqYAJMcLMZtbUtwKqvVDq3tbEo3ZIcohbDtt6SbfmWzggabpQxNxuBpoOOf_a_HgMXK_lhqigI4y_kqS1wY52IwjUn5rgRrJ-yYo1h41KR-vz2pYhEAeYrhttWtxVqLCRViD6c",
|
||||
dq:
|
||||
"AvfS0-gRxvn0bwJoMSnFxYcK1WnuEjQFluMGfwGitQBWtfZ1Er7t1xDkbN9GQTB9yqpDoYaN06H7CFtrkxhJIBQaj6nkF5KKS3TQtQ5qCzkOkmxIe3KRbBymXxkb5qwUpX5ELD5xFc6FeiafWYY63TmmEAu_lRFCOJ3xDea-ots",
|
||||
qi:
|
||||
"lSQi-w9CpyUReMErP1RsBLk7wNtOvs5EQpPqmuMvqW57NBUczScEoPwmUqqabu9V0-Py4dQ57_bapoKRu1R90bvuFnU63SHWEFglZQvJDMeAvmj4sm-Fp0oYu_neotgQ0hzbI5gry7ajdYy9-2lNx_76aBZoOUu9HCJ-UsfSOI8",
|
||||
};
|
||||
|
||||
var tags = {
|
||||
|
@ -39,83 +316,92 @@ var tags = {
|
|||
};
|
||||
|
||||
QUnit.test("array to PEM", function(assert) {
|
||||
var a = [1,2,3];
|
||||
var a = [1, 2, 3];
|
||||
var p = arrayToPem(a);
|
||||
var a2 = pemToArray(p);
|
||||
assert.deepEqual(a2, a, "can you count?");
|
||||
});
|
||||
|
||||
QUnit.test("array to String", function(assert) {
|
||||
var a = "ssh-rsa".split('').map(function (c) {return c.charCodeAt();});
|
||||
assert.equal(arrayToString(pemToArray(arrayToPem(a))), "ssh-rsa");
|
||||
var a = "ssh-rsa".split("").map(function(c) {
|
||||
return c.charCodeAt();
|
||||
});
|
||||
assert.equal(arrayToString(pemToArray(arrayToPem(a))), "ssh-rsa");
|
||||
});
|
||||
|
||||
QUnit.test("lenToArray", function(assert) {
|
||||
var a = 66051;
|
||||
assert.deepEqual(lenToArray(a), [0, 1, 2, 3]);
|
||||
var a = 66051;
|
||||
assert.deepEqual(lenToArray(a), [0, 1, 2, 3]);
|
||||
});
|
||||
|
||||
QUnit.test("arrayToLen", function(assert) {
|
||||
var a = [0, 1, 2, 3];
|
||||
assert.deepEqual(arrayToLen(a), 66051);
|
||||
var a = [0, 1, 2, 3];
|
||||
assert.deepEqual(arrayToLen(a), 66051);
|
||||
});
|
||||
|
||||
public_ssh.forEach(function (public, index) {
|
||||
public_ssh.forEach(function(public, index) {
|
||||
QUnit.test("decoding ssh public key " + index, function(assert) {
|
||||
var key = decodePublicKey(public);
|
||||
assert.equal(key.type, "ssh-rsa", "type");
|
||||
assert.equal(key.name, "name", "name");
|
||||
if(index===0) {
|
||||
if (index === 0) {
|
||||
assert.deepEqual(key.key, public_ssh_decoded[0].key, "key");
|
||||
}
|
||||
})
|
||||
});
|
||||
});
|
||||
|
||||
QUnit.test("Encoding ssh public key", function (assert) {
|
||||
QUnit.test("Encoding ssh public key", function(assert) {
|
||||
var result = encodePublicKey(jwk_public, "name");
|
||||
assert.equal(result, "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc9Ynq4OwU+BCjruh/chjDRK/Kr3lI2H0ZL7aCiu/rwbFYhhh4BKFob9S1N/ya9/q75UhSvnhF7YWgtzvwgJHedGEUfkPX981o/2GQwAcGponwBOKrh3v4995dMKLTJjSp9aQaO4+04LcgrtaacSSIDmpRWnLSgcU+KqgDI3KdYlEMUmRrTQkSkzVAXIXVPPc8QanReUWcKVjjyIkb1SpeUOBrKycbeujawObx+29rQiNfVKntn0XJZByL7I5h9JPTTAodB3vPn4SjdxN3kzQGFxVd5HSCmt0rVNMMtkvOcUlDfodjCtQURe9PKZ7q+Rl809FvTPwo+rkazt26MT9z name");
|
||||
assert.equal(
|
||||
result,
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc9Ynq4OwU+BCjruh/chjDRK/Kr3lI2H0ZL7aCiu/rwbFYhhh4BKFob9S1N/ya9/q75UhSvnhF7YWgtzvwgJHedGEUfkPX981o/2GQwAcGponwBOKrh3v4995dMKLTJjSp9aQaO4+04LcgrtaacSSIDmpRWnLSgcU+KqgDI3KdYlEMUmRrTQkSkzVAXIXVPPc8QanReUWcKVjjyIkb1SpeUOBrKycbeujawObx+29rQiNfVKntn0XJZByL7I5h9JPTTAodB3vPn4SjdxN3kzQGFxVd5HSCmt0rVNMMtkvOcUlDfodjCtQURe9PKZ7q+Rl809FvTPwo+rkazt26MT9z name"
|
||||
);
|
||||
});
|
||||
|
||||
QUnit.test("base64url", function (assert){
|
||||
QUnit.test("base64url", function(assert) {
|
||||
var result = stringToArray(base64urlDecode(jwk_public.n));
|
||||
assert.equal(result.length, 256);
|
||||
|
||||
});
|
||||
|
||||
QUnit.test("high bit", function (assert) {
|
||||
QUnit.test("high bit", function(assert) {
|
||||
assert.deepEqual(checkHighestBit([0x80]), [0x00, 0x80]);
|
||||
assert.deepEqual(checkHighestBit([0x0F]), [0x0F]);
|
||||
assert.deepEqual(checkHighestBit([0x0f]), [0x0f]);
|
||||
});
|
||||
|
||||
QUnit.test("jwk", function (assert){
|
||||
QUnit.test("jwk", function(assert) {
|
||||
var sshkey = encodePublicKey(jwk_public, "name");
|
||||
assert.deepEqual(stringToArray(base64urlDecode(jwk_public.e)), [1,0,1]);
|
||||
assert.equal(sshkey, "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc9Ynq4OwU+BCjruh/chjDRK/Kr3lI2H0ZL7aCiu/rwbFYhhh4BKFob9S1N/ya9/q75UhSvnhF7YWgtzvwgJHedGEUfkPX981o/2GQwAcGponwBOKrh3v4995dMKLTJjSp9aQaO4+04LcgrtaacSSIDmpRWnLSgcU+KqgDI3KdYlEMUmRrTQkSkzVAXIXVPPc8QanReUWcKVjjyIkb1SpeUOBrKycbeujawObx+29rQiNfVKntn0XJZByL7I5h9JPTTAodB3vPn4SjdxN3kzQGFxVd5HSCmt0rVNMMtkvOcUlDfodjCtQURe9PKZ7q+Rl809FvTPwo+rkazt26MT9z name")
|
||||
assert.deepEqual(stringToArray(base64urlDecode(jwk_public.e)), [1, 0, 1]);
|
||||
assert.equal(
|
||||
sshkey,
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc9Ynq4OwU+BCjruh/chjDRK/Kr3lI2H0ZL7aCiu/rwbFYhhh4BKFob9S1N/ya9/q75UhSvnhF7YWgtzvwgJHedGEUfkPX981o/2GQwAcGponwBOKrh3v4995dMKLTJjSp9aQaO4+04LcgrtaacSSIDmpRWnLSgcU+KqgDI3KdYlEMUmRrTQkSkzVAXIXVPPc8QanReUWcKVjjyIkb1SpeUOBrKycbeujawObx+29rQiNfVKntn0XJZByL7I5h9JPTTAodB3vPn4SjdxN3kzQGFxVd5HSCmt0rVNMMtkvOcUlDfodjCtQURe9PKZ7q+Rl809FvTPwo+rkazt26MT9z name"
|
||||
);
|
||||
});
|
||||
|
||||
[{len:0x01, octet:[0x01]},
|
||||
{len:0x104, octet:[0x01, 0x04]},
|
||||
{len:0xFF32, octet:[0xFF,0x32]},
|
||||
{len:0x1000000, octet:[1,0,0,0]},
|
||||
{len:0x7FFFFFFF, octet:[0x7F,0xFF,0xFF,0xFF]}, //biggest one
|
||||
].forEach(function (t) {
|
||||
QUnit.test("Integer to Octet:" + t.len, function (assert) {
|
||||
[
|
||||
{ len: 0x01, octet: [0x01] },
|
||||
{ len: 0x104, octet: [0x01, 0x04] },
|
||||
{ len: 0xff32, octet: [0xff, 0x32] },
|
||||
{ len: 0x1000000, octet: [1, 0, 0, 0] },
|
||||
{ len: 0x7fffffff, octet: [0x7f, 0xff, 0xff, 0xff] }, //biggest one
|
||||
].forEach(function(t) {
|
||||
QUnit.test("Integer to Octet:" + t.len, function(assert) {
|
||||
assert.deepEqual(integerToOctet(t.len), t.octet, t.len);
|
||||
});
|
||||
});
|
||||
|
||||
[{len: 0x34 , asn: [0x34]},
|
||||
{len: 256 , asn: [0x80 + 2, 0x01, 0x00]},
|
||||
{len: 0x134 , asn: [0x80 + 2, 0x01, 0x34]},
|
||||
{len: 0x12345 , asn: [0x80 + 3, 0x01, 0x23, 0x45]},
|
||||
{len: 0x123456 , asn: [0x80 + 3, 0x12, 0x34, 0x56]},
|
||||
].forEach(function (t) {
|
||||
QUnit.test("ASN.1 Len Writing:" + t.len, function (assert) {
|
||||
[
|
||||
{ len: 0x34, asn: [0x34] },
|
||||
{ len: 256, asn: [0x80 + 2, 0x01, 0x00] },
|
||||
{ len: 0x134, asn: [0x80 + 2, 0x01, 0x34] },
|
||||
{ len: 0x12345, asn: [0x80 + 3, 0x01, 0x23, 0x45] },
|
||||
{ len: 0x123456, asn: [0x80 + 3, 0x12, 0x34, 0x56] },
|
||||
].forEach(function(t) {
|
||||
QUnit.test("ASN.1 Len Writing:" + t.len, function(assert) {
|
||||
assert.deepEqual(asnEncodeLen(t.len), t.asn, t.len);
|
||||
});
|
||||
});
|
||||
|
||||
QUnit.test("encodePrivateKey", function (assert) {
|
||||
QUnit.test("encodePrivateKey", function(assert) {
|
||||
var encoded = encodePrivateKey(jwk_private);
|
||||
console.log(encoded);
|
||||
assert.ok(true);
|
||||
|
|
Loading…
Reference in a new issue