You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							195 lines
						
					
					
						
							4.9 KiB
						
					
					
				
			
		
		
	
	
							195 lines
						
					
					
						
							4.9 KiB
						
					
					
				// Copyright 2018 Joyent, Inc.
 | 
						|
 | 
						|
module.exports = {
 | 
						|
	read: read,
 | 
						|
	write: write
 | 
						|
};
 | 
						|
 | 
						|
var assert = require('assert-plus');
 | 
						|
var Buffer = require('safer-buffer').Buffer;
 | 
						|
var rfc4253 = require('./rfc4253');
 | 
						|
var Key = require('../key');
 | 
						|
var SSHBuffer = require('../ssh-buffer');
 | 
						|
var crypto = require('crypto');
 | 
						|
var PrivateKey = require('../private-key');
 | 
						|
 | 
						|
var errors = require('../errors');
 | 
						|
 | 
						|
// https://tartarus.org/~simon/putty-prerel-snapshots/htmldoc/AppendixC.html
 | 
						|
function read(buf, options) {
 | 
						|
	var lines = buf.toString('ascii').split(/[\r\n]+/);
 | 
						|
	var found = false;
 | 
						|
	var parts;
 | 
						|
	var si = 0;
 | 
						|
	var formatVersion;
 | 
						|
	while (si < lines.length) {
 | 
						|
		parts = splitHeader(lines[si++]);
 | 
						|
		if (parts) {
 | 
						|
			formatVersion = {
 | 
						|
				'putty-user-key-file-2': 2,
 | 
						|
				'putty-user-key-file-3': 3
 | 
						|
			}[parts[0].toLowerCase()];
 | 
						|
			if (formatVersion) {
 | 
						|
				found = true;
 | 
						|
				break;
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if (!found) {
 | 
						|
		throw (new Error('No PuTTY format first line found'));
 | 
						|
	}
 | 
						|
	var alg = parts[1];
 | 
						|
 | 
						|
	parts = splitHeader(lines[si++]);
 | 
						|
	assert.equal(parts[0].toLowerCase(), 'encryption');
 | 
						|
	var encryption = parts[1];
 | 
						|
 | 
						|
	parts = splitHeader(lines[si++]);
 | 
						|
	assert.equal(parts[0].toLowerCase(), 'comment');
 | 
						|
	var comment = parts[1];
 | 
						|
 | 
						|
	parts = splitHeader(lines[si++]);
 | 
						|
	assert.equal(parts[0].toLowerCase(), 'public-lines');
 | 
						|
	var publicLines = parseInt(parts[1], 10);
 | 
						|
	if (!isFinite(publicLines) || publicLines < 0 ||
 | 
						|
	    publicLines > lines.length) {
 | 
						|
		throw (new Error('Invalid public-lines count'));
 | 
						|
	}
 | 
						|
 | 
						|
	var publicBuf = Buffer.from(
 | 
						|
	    lines.slice(si, si + publicLines).join(''), 'base64');
 | 
						|
	var keyType = rfc4253.algToKeyType(alg);
 | 
						|
	var key = rfc4253.read(publicBuf);
 | 
						|
	if (key.type !== keyType) {
 | 
						|
		throw (new Error('Outer key algorithm mismatch'));
 | 
						|
	}
 | 
						|
 | 
						|
	si += publicLines;
 | 
						|
	if (lines[si]) {
 | 
						|
		parts = splitHeader(lines[si++]);
 | 
						|
		assert.equal(parts[0].toLowerCase(), 'private-lines');
 | 
						|
		var privateLines = parseInt(parts[1], 10);
 | 
						|
		if (!isFinite(privateLines) || privateLines < 0 ||
 | 
						|
		    privateLines > lines.length) {
 | 
						|
			throw (new Error('Invalid private-lines count'));
 | 
						|
		}
 | 
						|
 | 
						|
		var privateBuf = Buffer.from(
 | 
						|
			lines.slice(si, si + privateLines).join(''), 'base64');
 | 
						|
 | 
						|
		if (encryption !== 'none' && formatVersion === 3) {
 | 
						|
			throw new Error('Encrypted keys arenot supported for' +
 | 
						|
			' PuTTY format version 3');
 | 
						|
		}
 | 
						|
 | 
						|
		if (encryption === 'aes256-cbc') {
 | 
						|
			if (!options.passphrase) {
 | 
						|
				throw (new errors.KeyEncryptedError(
 | 
						|
					options.filename, 'PEM'));
 | 
						|
			}
 | 
						|
 | 
						|
			var iv = Buffer.alloc(16, 0);
 | 
						|
			var decipher = crypto.createDecipheriv(
 | 
						|
				'aes-256-cbc',
 | 
						|
				derivePPK2EncryptionKey(options.passphrase),
 | 
						|
				iv);
 | 
						|
			decipher.setAutoPadding(false);
 | 
						|
			privateBuf = Buffer.concat([
 | 
						|
				decipher.update(privateBuf), decipher.final()]);
 | 
						|
		}
 | 
						|
 | 
						|
		key = new PrivateKey(key);
 | 
						|
		if (key.type !== keyType) {
 | 
						|
			throw (new Error('Outer key algorithm mismatch'));
 | 
						|
		}
 | 
						|
 | 
						|
		var sshbuf = new SSHBuffer({buffer: privateBuf});
 | 
						|
		var privateKeyParts;
 | 
						|
		if (alg === 'ssh-dss') {
 | 
						|
			privateKeyParts = [ {
 | 
						|
				name: 'x',
 | 
						|
				data: sshbuf.readBuffer()
 | 
						|
			}];
 | 
						|
		} else if (alg === 'ssh-rsa') {
 | 
						|
			privateKeyParts = [
 | 
						|
				{ name: 'd', data: sshbuf.readBuffer() },
 | 
						|
				{ name: 'p', data: sshbuf.readBuffer() },
 | 
						|
				{ name: 'q', data: sshbuf.readBuffer() },
 | 
						|
				{ name: 'iqmp', data: sshbuf.readBuffer() }
 | 
						|
			];
 | 
						|
		} else if (alg.match(/^ecdsa-sha2-nistp/)) {
 | 
						|
			privateKeyParts = [ {
 | 
						|
				name: 'd', data: sshbuf.readBuffer()
 | 
						|
			} ];
 | 
						|
		} else if (alg === 'ssh-ed25519') {
 | 
						|
			privateKeyParts = [ {
 | 
						|
				name: 'k', data: sshbuf.readBuffer()
 | 
						|
			} ];
 | 
						|
		} else {
 | 
						|
			throw new Error('Unsupported PPK key type: ' + alg);
 | 
						|
		}
 | 
						|
 | 
						|
		key = new PrivateKey({
 | 
						|
			type: key.type,
 | 
						|
			parts: key.parts.concat(privateKeyParts)
 | 
						|
		});
 | 
						|
	}
 | 
						|
 | 
						|
	key.comment = comment;
 | 
						|
	return (key);
 | 
						|
}
 | 
						|
 | 
						|
function derivePPK2EncryptionKey(passphrase) {
 | 
						|
	var hash1 = crypto.createHash('sha1').update(Buffer.concat([
 | 
						|
		Buffer.from([0, 0, 0, 0]),
 | 
						|
		Buffer.from(passphrase)
 | 
						|
	])).digest();
 | 
						|
	var hash2 = crypto.createHash('sha1').update(Buffer.concat([
 | 
						|
		Buffer.from([0, 0, 0, 1]),
 | 
						|
		Buffer.from(passphrase)
 | 
						|
	])).digest();
 | 
						|
	return (Buffer.concat([hash1, hash2]).slice(0, 32));
 | 
						|
}
 | 
						|
 | 
						|
function splitHeader(line) {
 | 
						|
	var idx = line.indexOf(':');
 | 
						|
	if (idx === -1)
 | 
						|
		return (null);
 | 
						|
	var header = line.slice(0, idx);
 | 
						|
	++idx;
 | 
						|
	while (line[idx] === ' ')
 | 
						|
		++idx;
 | 
						|
	var rest = line.slice(idx);
 | 
						|
	return ([header, rest]);
 | 
						|
}
 | 
						|
 | 
						|
function write(key, options) {
 | 
						|
	assert.object(key);
 | 
						|
	if (!Key.isKey(key))
 | 
						|
		throw (new Error('Must be a public key'));
 | 
						|
 | 
						|
	var alg = rfc4253.keyTypeToAlg(key);
 | 
						|
	var buf = rfc4253.write(key);
 | 
						|
	var comment = key.comment || '';
 | 
						|
 | 
						|
	var b64 = buf.toString('base64');
 | 
						|
	var lines = wrap(b64, 64);
 | 
						|
 | 
						|
	lines.unshift('Public-Lines: ' + lines.length);
 | 
						|
	lines.unshift('Comment: ' + comment);
 | 
						|
	lines.unshift('Encryption: none');
 | 
						|
	lines.unshift('PuTTY-User-Key-File-2: ' + alg);
 | 
						|
 | 
						|
	return (Buffer.from(lines.join('\n') + '\n'));
 | 
						|
}
 | 
						|
 | 
						|
function wrap(txt, len) {
 | 
						|
	var lines = [];
 | 
						|
	var pos = 0;
 | 
						|
	while (pos < txt.length) {
 | 
						|
		lines.push(txt.slice(pos, pos + 64));
 | 
						|
		pos += 64;
 | 
						|
	}
 | 
						|
	return (lines);
 | 
						|
}
 |