123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194 |
- // Copyright 2018 Joyent, Inc.
- module.exports = {
- read: read,
- write: write
- };
- var assert = require('assert-plus');
- var Buffer = require('safer-buffer').Buffer;
- var rfc4253 = require('./rfc4253');
- var Key = require('../key');
- var SSHBuffer = require('../ssh-buffer');
- var crypto = require('crypto');
- var PrivateKey = require('../private-key');
- var errors = require('../errors');
- // https://tartarus.org/~simon/putty-prerel-snapshots/htmldoc/AppendixC.html
- function read(buf, options) {
- var lines = buf.toString('ascii').split(/[\r\n]+/);
- var found = false;
- var parts;
- var si = 0;
- var formatVersion;
- while (si < lines.length) {
- parts = splitHeader(lines[si++]);
- if (parts) {
- formatVersion = {
- 'putty-user-key-file-2': 2,
- 'putty-user-key-file-3': 3
- }[parts[0].toLowerCase()];
- if (formatVersion) {
- found = true;
- break;
- }
- }
- }
- if (!found) {
- throw (new Error('No PuTTY format first line found'));
- }
- var alg = parts[1];
- parts = splitHeader(lines[si++]);
- assert.equal(parts[0].toLowerCase(), 'encryption');
- var encryption = parts[1];
- parts = splitHeader(lines[si++]);
- assert.equal(parts[0].toLowerCase(), 'comment');
- var comment = parts[1];
- parts = splitHeader(lines[si++]);
- assert.equal(parts[0].toLowerCase(), 'public-lines');
- var publicLines = parseInt(parts[1], 10);
- if (!isFinite(publicLines) || publicLines < 0 ||
- publicLines > lines.length) {
- throw (new Error('Invalid public-lines count'));
- }
- var publicBuf = Buffer.from(
- lines.slice(si, si + publicLines).join(''), 'base64');
- var keyType = rfc4253.algToKeyType(alg);
- var key = rfc4253.read(publicBuf);
- if (key.type !== keyType) {
- throw (new Error('Outer key algorithm mismatch'));
- }
- si += publicLines;
- if (lines[si]) {
- parts = splitHeader(lines[si++]);
- assert.equal(parts[0].toLowerCase(), 'private-lines');
- var privateLines = parseInt(parts[1], 10);
- if (!isFinite(privateLines) || privateLines < 0 ||
- privateLines > lines.length) {
- throw (new Error('Invalid private-lines count'));
- }
- var privateBuf = Buffer.from(
- lines.slice(si, si + privateLines).join(''), 'base64');
- if (encryption !== 'none' && formatVersion === 3) {
- throw new Error('Encrypted keys arenot supported for' +
- ' PuTTY format version 3');
- }
- if (encryption === 'aes256-cbc') {
- if (!options.passphrase) {
- throw (new errors.KeyEncryptedError(
- options.filename, 'PEM'));
- }
- var iv = Buffer.alloc(16, 0);
- var decipher = crypto.createDecipheriv(
- 'aes-256-cbc',
- derivePPK2EncryptionKey(options.passphrase),
- iv);
- decipher.setAutoPadding(false);
- privateBuf = Buffer.concat([
- decipher.update(privateBuf), decipher.final()]);
- }
- key = new PrivateKey(key);
- if (key.type !== keyType) {
- throw (new Error('Outer key algorithm mismatch'));
- }
- var sshbuf = new SSHBuffer({buffer: privateBuf});
- var privateKeyParts;
- if (alg === 'ssh-dss') {
- privateKeyParts = [ {
- name: 'x',
- data: sshbuf.readBuffer()
- }];
- } else if (alg === 'ssh-rsa') {
- privateKeyParts = [
- { name: 'd', data: sshbuf.readBuffer() },
- { name: 'p', data: sshbuf.readBuffer() },
- { name: 'q', data: sshbuf.readBuffer() },
- { name: 'iqmp', data: sshbuf.readBuffer() }
- ];
- } else if (alg.match(/^ecdsa-sha2-nistp/)) {
- privateKeyParts = [ {
- name: 'd', data: sshbuf.readBuffer()
- } ];
- } else if (alg === 'ssh-ed25519') {
- privateKeyParts = [ {
- name: 'k', data: sshbuf.readBuffer()
- } ];
- } else {
- throw new Error('Unsupported PPK key type: ' + alg);
- }
- key = new PrivateKey({
- type: key.type,
- parts: key.parts.concat(privateKeyParts)
- });
- }
- key.comment = comment;
- return (key);
- }
- function derivePPK2EncryptionKey(passphrase) {
- var hash1 = crypto.createHash('sha1').update(Buffer.concat([
- Buffer.from([0, 0, 0, 0]),
- Buffer.from(passphrase)
- ])).digest();
- var hash2 = crypto.createHash('sha1').update(Buffer.concat([
- Buffer.from([0, 0, 0, 1]),
- Buffer.from(passphrase)
- ])).digest();
- return (Buffer.concat([hash1, hash2]).slice(0, 32));
- }
- function splitHeader(line) {
- var idx = line.indexOf(':');
- if (idx === -1)
- return (null);
- var header = line.slice(0, idx);
- ++idx;
- while (line[idx] === ' ')
- ++idx;
- var rest = line.slice(idx);
- return ([header, rest]);
- }
- function write(key, options) {
- assert.object(key);
- if (!Key.isKey(key))
- throw (new Error('Must be a public key'));
- var alg = rfc4253.keyTypeToAlg(key);
- var buf = rfc4253.write(key);
- var comment = key.comment || '';
- var b64 = buf.toString('base64');
- var lines = wrap(b64, 64);
- lines.unshift('Public-Lines: ' + lines.length);
- lines.unshift('Comment: ' + comment);
- lines.unshift('Encryption: none');
- lines.unshift('PuTTY-User-Key-File-2: ' + alg);
- return (Buffer.from(lines.join('\n') + '\n'));
- }
- function wrap(txt, len) {
- var lines = [];
- var pos = 0;
- while (pos < txt.length) {
- lines.push(txt.slice(pos, pos + 64));
- pos += 64;
- }
- return (lines);
- }
|