| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194 | 
							- // Copyright 2018 Joyent, Inc.
 
- module.exports = {
 
- 	read: read,
 
- 	write: write
 
- };
 
- var assert = require('assert-plus');
 
- var Buffer = require('safer-buffer').Buffer;
 
- var rfc4253 = require('./rfc4253');
 
- var Key = require('../key');
 
- var SSHBuffer = require('../ssh-buffer');
 
- var crypto = require('crypto');
 
- var PrivateKey = require('../private-key');
 
- var errors = require('../errors');
 
- // https://tartarus.org/~simon/putty-prerel-snapshots/htmldoc/AppendixC.html
 
- function read(buf, options) {
 
- 	var lines = buf.toString('ascii').split(/[\r\n]+/);
 
- 	var found = false;
 
- 	var parts;
 
- 	var si = 0;
 
- 	var formatVersion;
 
- 	while (si < lines.length) {
 
- 		parts = splitHeader(lines[si++]);
 
- 		if (parts) {
 
- 			formatVersion = {
 
- 				'putty-user-key-file-2': 2,
 
- 				'putty-user-key-file-3': 3
 
- 			}[parts[0].toLowerCase()];
 
- 			if (formatVersion) {
 
- 				found = true;
 
- 				break;
 
- 			}
 
- 		}
 
- 	}
 
- 	if (!found) {
 
- 		throw (new Error('No PuTTY format first line found'));
 
- 	}
 
- 	var alg = parts[1];
 
- 	parts = splitHeader(lines[si++]);
 
- 	assert.equal(parts[0].toLowerCase(), 'encryption');
 
- 	var encryption = parts[1];
 
- 	parts = splitHeader(lines[si++]);
 
- 	assert.equal(parts[0].toLowerCase(), 'comment');
 
- 	var comment = parts[1];
 
- 	parts = splitHeader(lines[si++]);
 
- 	assert.equal(parts[0].toLowerCase(), 'public-lines');
 
- 	var publicLines = parseInt(parts[1], 10);
 
- 	if (!isFinite(publicLines) || publicLines < 0 ||
 
- 	    publicLines > lines.length) {
 
- 		throw (new Error('Invalid public-lines count'));
 
- 	}
 
- 	var publicBuf = Buffer.from(
 
- 	    lines.slice(si, si + publicLines).join(''), 'base64');
 
- 	var keyType = rfc4253.algToKeyType(alg);
 
- 	var key = rfc4253.read(publicBuf);
 
- 	if (key.type !== keyType) {
 
- 		throw (new Error('Outer key algorithm mismatch'));
 
- 	}
 
- 	si += publicLines;
 
- 	if (lines[si]) {
 
- 		parts = splitHeader(lines[si++]);
 
- 		assert.equal(parts[0].toLowerCase(), 'private-lines');
 
- 		var privateLines = parseInt(parts[1], 10);
 
- 		if (!isFinite(privateLines) || privateLines < 0 ||
 
- 		    privateLines > lines.length) {
 
- 			throw (new Error('Invalid private-lines count'));
 
- 		}
 
- 		var privateBuf = Buffer.from(
 
- 			lines.slice(si, si + privateLines).join(''), 'base64');
 
- 		if (encryption !== 'none' && formatVersion === 3) {
 
- 			throw new Error('Encrypted keys arenot supported for' +
 
- 			' PuTTY format version 3');
 
- 		}
 
- 		if (encryption === 'aes256-cbc') {
 
- 			if (!options.passphrase) {
 
- 				throw (new errors.KeyEncryptedError(
 
- 					options.filename, 'PEM'));
 
- 			}
 
- 			var iv = Buffer.alloc(16, 0);
 
- 			var decipher = crypto.createDecipheriv(
 
- 				'aes-256-cbc',
 
- 				derivePPK2EncryptionKey(options.passphrase),
 
- 				iv);
 
- 			decipher.setAutoPadding(false);
 
- 			privateBuf = Buffer.concat([
 
- 				decipher.update(privateBuf), decipher.final()]);
 
- 		}
 
- 		key = new PrivateKey(key);
 
- 		if (key.type !== keyType) {
 
- 			throw (new Error('Outer key algorithm mismatch'));
 
- 		}
 
- 		var sshbuf = new SSHBuffer({buffer: privateBuf});
 
- 		var privateKeyParts;
 
- 		if (alg === 'ssh-dss') {
 
- 			privateKeyParts = [ {
 
- 				name: 'x',
 
- 				data: sshbuf.readBuffer()
 
- 			}];
 
- 		} else if (alg === 'ssh-rsa') {
 
- 			privateKeyParts = [
 
- 				{ name: 'd', data: sshbuf.readBuffer() },
 
- 				{ name: 'p', data: sshbuf.readBuffer() },
 
- 				{ name: 'q', data: sshbuf.readBuffer() },
 
- 				{ name: 'iqmp', data: sshbuf.readBuffer() }
 
- 			];
 
- 		} else if (alg.match(/^ecdsa-sha2-nistp/)) {
 
- 			privateKeyParts = [ {
 
- 				name: 'd', data: sshbuf.readBuffer()
 
- 			} ];
 
- 		} else if (alg === 'ssh-ed25519') {
 
- 			privateKeyParts = [ {
 
- 				name: 'k', data: sshbuf.readBuffer()
 
- 			} ];
 
- 		} else {
 
- 			throw new Error('Unsupported PPK key type: ' + alg);
 
- 		}
 
- 		key = new PrivateKey({
 
- 			type: key.type,
 
- 			parts: key.parts.concat(privateKeyParts)
 
- 		});
 
- 	}
 
- 	key.comment = comment;
 
- 	return (key);
 
- }
 
- function derivePPK2EncryptionKey(passphrase) {
 
- 	var hash1 = crypto.createHash('sha1').update(Buffer.concat([
 
- 		Buffer.from([0, 0, 0, 0]),
 
- 		Buffer.from(passphrase)
 
- 	])).digest();
 
- 	var hash2 = crypto.createHash('sha1').update(Buffer.concat([
 
- 		Buffer.from([0, 0, 0, 1]),
 
- 		Buffer.from(passphrase)
 
- 	])).digest();
 
- 	return (Buffer.concat([hash1, hash2]).slice(0, 32));
 
- }
 
- function splitHeader(line) {
 
- 	var idx = line.indexOf(':');
 
- 	if (idx === -1)
 
- 		return (null);
 
- 	var header = line.slice(0, idx);
 
- 	++idx;
 
- 	while (line[idx] === ' ')
 
- 		++idx;
 
- 	var rest = line.slice(idx);
 
- 	return ([header, rest]);
 
- }
 
- function write(key, options) {
 
- 	assert.object(key);
 
- 	if (!Key.isKey(key))
 
- 		throw (new Error('Must be a public key'));
 
- 	var alg = rfc4253.keyTypeToAlg(key);
 
- 	var buf = rfc4253.write(key);
 
- 	var comment = key.comment || '';
 
- 	var b64 = buf.toString('base64');
 
- 	var lines = wrap(b64, 64);
 
- 	lines.unshift('Public-Lines: ' + lines.length);
 
- 	lines.unshift('Comment: ' + comment);
 
- 	lines.unshift('Encryption: none');
 
- 	lines.unshift('PuTTY-User-Key-File-2: ' + alg);
 
- 	return (Buffer.from(lines.join('\n') + '\n'));
 
- }
 
- function wrap(txt, len) {
 
- 	var lines = [];
 
- 	var pos = 0;
 
- 	while (pos < txt.length) {
 
- 		lines.push(txt.slice(pos, pos + 64));
 
- 		pos += 64;
 
- 	}
 
- 	return (lines);
 
- }
 
 
  |