diff options
Diffstat (limited to 'deps/npm/node_modules/sshpk/lib/formats')
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/auto.js | 3 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/dnssec.js | 15 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/openssh-cert.js | 11 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/pem.js | 9 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/pkcs1.js | 17 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/pkcs8.js | 20 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/rfc4253.js | 3 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/ssh-private.js | 13 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/ssh.js | 7 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/x509-pem.js | 5 | ||||
-rw-r--r-- | deps/npm/node_modules/sshpk/lib/formats/x509.js | 8 |
11 files changed, 56 insertions, 55 deletions
diff --git a/deps/npm/node_modules/sshpk/lib/formats/auto.js b/deps/npm/node_modules/sshpk/lib/formats/auto.js index 39865710aa..56e430d5a7 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/auto.js +++ b/deps/npm/node_modules/sshpk/lib/formats/auto.js @@ -6,6 +6,7 @@ module.exports = { }; var assert = require('assert-plus'); +var Buffer = require('safer-buffer').Buffer; var utils = require('../utils'); var Key = require('../key'); var PrivateKey = require('../private-key'); @@ -27,7 +28,7 @@ function read(buf, options) { return (ssh.read(buf, options)); if (findDNSSECHeader(buf)) return (dnssec.read(buf, options)); - buf = new Buffer(buf, 'binary'); + buf = Buffer.from(buf, 'binary'); } else { assert.buffer(buf); if (findPEMHeader(buf)) diff --git a/deps/npm/node_modules/sshpk/lib/formats/dnssec.js b/deps/npm/node_modules/sshpk/lib/formats/dnssec.js index 1eb4b5b413..a74ea9ce0d 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/dnssec.js +++ b/deps/npm/node_modules/sshpk/lib/formats/dnssec.js @@ -6,6 +6,7 @@ module.exports = { }; var assert = require('assert-plus'); +var Buffer = require('safer-buffer').Buffer; var Key = require('../key'); var PrivateKey = require('../private-key'); var utils = require('../utils'); @@ -66,7 +67,7 @@ function readRFC3110(keyString) { if (!supportedAlgosById[algorithm]) throw (new Error('Unsupported algorithm: ' + algorithm)); var base64key = elems.slice(6, elems.length).join(); - var keyBuffer = new Buffer(base64key, 'base64'); + var keyBuffer = Buffer.from(base64key, 'base64'); if (supportedAlgosById[algorithm].match(/^RSA-/)) { // join the rest of the body into a single base64-blob var publicExponentLen = keyBuffer.readUInt8(0); @@ -101,7 +102,7 @@ function readRFC3110(keyString) { curve: curve, size: size, parts: [ - {name: 'curve', data: new Buffer(curve) }, + {name: 'curve', data: Buffer.from(curve) }, {name: 'Q', data: utils.ecNormalize(keyBuffer) } ] }; @@ -112,7 +113,7 @@ function readRFC3110(keyString) { } function elementToBuf(e) { - return (new Buffer(e.split(' ')[1], 'base64')); + return (Buffer.from(e.split(' ')[1], 'base64')); } function readDNSSECRSAPrivateKey(elements) { @@ -161,7 +162,7 @@ function readDNSSECPrivateKey(alg, elements) { } if (supportedAlgosById[alg] === 'ECDSA-P384-SHA384' || supportedAlgosById[alg] === 'ECDSA-P256-SHA256') { - var d = new Buffer(elements[0].split(' ')[1], 'base64'); + var d = Buffer.from(elements[0].split(' ')[1], 'base64'); var curve = 'nistp384'; var size = 384; if (supportedAlgosById[alg] === 'ECDSA-P256-SHA256') { @@ -176,7 +177,7 @@ function readDNSSECPrivateKey(alg, elements) { curve: curve, size: size, parts: [ - {name: 'curve', data: new Buffer(curve) }, + {name: 'curve', data: Buffer.from(curve) }, {name: 'd', data: d }, {name: 'Q', data: Q } ] @@ -237,7 +238,7 @@ function writeRSA(key, options) { out += 'Created: ' + dnssecTimestamp(timestamp) + '\n'; out += 'Publish: ' + dnssecTimestamp(timestamp) + '\n'; out += 'Activate: ' + dnssecTimestamp(timestamp) + '\n'; - return (new Buffer(out, 'ascii')); + return (Buffer.from(out, 'ascii')); } function writeECDSA(key, options) { @@ -260,7 +261,7 @@ function writeECDSA(key, options) { out += 'Publish: ' + dnssecTimestamp(timestamp) + '\n'; out += 'Activate: ' + dnssecTimestamp(timestamp) + '\n'; - return (new Buffer(out, 'ascii')); + return (Buffer.from(out, 'ascii')); } function write(key, options) { diff --git a/deps/npm/node_modules/sshpk/lib/formats/openssh-cert.js b/deps/npm/node_modules/sshpk/lib/formats/openssh-cert.js index b68155e887..0b95e89049 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/openssh-cert.js +++ b/deps/npm/node_modules/sshpk/lib/formats/openssh-cert.js @@ -15,6 +15,7 @@ module.exports = { var assert = require('assert-plus'); var SSHBuffer = require('../ssh-buffer'); var crypto = require('crypto'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var Key = require('../key'); var PrivateKey = require('../private-key'); @@ -50,7 +51,7 @@ function read(buf, options) { var algo = parts[0]; var data = parts[1]; - data = new Buffer(data, 'base64'); + data = Buffer.from(data, 'base64'); return (fromBuffer(data, algo)); } @@ -164,7 +165,7 @@ function dateToInt64(date) { var i = Math.round(date.getTime() / 1000); var upper = Math.floor(i / 4294967296); var lower = Math.floor(i % 4294967296); - var buf = new Buffer(8); + var buf = Buffer.alloc(8); buf.writeUInt32BE(upper, 0); buf.writeUInt32BE(lower, 4); return (buf); @@ -278,15 +279,15 @@ function toBuffer(cert, noSig) { buf.writeInt64(dateToInt64(cert.validUntil)); if (sig.critical === undefined) - sig.critical = new Buffer(0); + sig.critical = Buffer.alloc(0); buf.writeBuffer(sig.critical); if (sig.exts === undefined) - sig.exts = new Buffer(0); + sig.exts = Buffer.alloc(0); buf.writeBuffer(sig.exts); /* reserved */ - buf.writeBuffer(new Buffer(0)); + buf.writeBuffer(Buffer.alloc(0)); sub = rfc4253.write(cert.issuerKey); buf.writeBuffer(sub); diff --git a/deps/npm/node_modules/sshpk/lib/formats/pem.js b/deps/npm/node_modules/sshpk/lib/formats/pem.js index 9196449b8d..859cfa13fc 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/pem.js +++ b/deps/npm/node_modules/sshpk/lib/formats/pem.js @@ -8,6 +8,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); var crypto = require('crypto'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var Key = require('../key'); @@ -67,7 +68,7 @@ function read(buf, options, forceType) { var parts = headers['proc-type'].split(','); if (parts[0] === '4' && parts[1] === 'ENCRYPTED') { if (typeof (options.passphrase) === 'string') { - options.passphrase = new Buffer( + options.passphrase = Buffer.from( options.passphrase, 'utf-8'); } if (!Buffer.isBuffer(options.passphrase)) { @@ -77,7 +78,7 @@ function read(buf, options, forceType) { parts = headers['dek-info'].split(','); assert.ok(parts.length === 2); cipher = parts[0].toLowerCase(); - iv = new Buffer(parts[1], 'hex'); + iv = Buffer.from(parts[1], 'hex'); key = utils.opensslKeyDeriv(cipher, iv, options.passphrase, 1).key; } @@ -86,7 +87,7 @@ function read(buf, options, forceType) { /* Chop off the first and last lines */ lines = lines.slice(0, -1).join(''); - buf = new Buffer(lines, 'base64'); + buf = Buffer.from(lines, 'base64'); if (cipher && key && iv) { var cipherStream = crypto.createDecipheriv(cipher, key, iv); @@ -174,7 +175,7 @@ function write(key, options, type) { var tmp = der.buffer.toString('base64'); var len = tmp.length + (tmp.length / 64) + 18 + 16 + header.length*2 + 10; - var buf = new Buffer(len); + var buf = Buffer.alloc(len); var o = 0; o += buf.write('-----BEGIN ' + header + '-----\n', o); for (var i = 0; i < tmp.length; ) { diff --git a/deps/npm/node_modules/sshpk/lib/formats/pkcs1.js b/deps/npm/node_modules/sshpk/lib/formats/pkcs1.js index 9d7246d41d..bc48550025 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/pkcs1.js +++ b/deps/npm/node_modules/sshpk/lib/formats/pkcs1.js @@ -9,6 +9,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); @@ -209,7 +210,7 @@ function readPkcs1ECDSAPublic(der) { var key = { type: 'ecdsa', parts: [ - { name: 'curve', data: new Buffer(curve) }, + { name: 'curve', data: Buffer.from(curve) }, { name: 'Q', data: Q } ] }; @@ -235,7 +236,7 @@ function readPkcs1ECDSAPrivate(der) { var key = { type: 'ecdsa', parts: [ - { name: 'curve', data: new Buffer(curve) }, + { name: 'curve', data: Buffer.from(curve) }, { name: 'Q', data: Q }, { name: 'd', data: d } ] @@ -285,8 +286,7 @@ function writePkcs1RSAPublic(der, key) { } function writePkcs1RSAPrivate(der, key) { - var ver = new Buffer(1); - ver[0] = 0; + var ver = Buffer.from([0]); der.writeBuffer(ver, asn1.Ber.Integer); der.writeBuffer(key.part.n.data, asn1.Ber.Integer); @@ -302,8 +302,7 @@ function writePkcs1RSAPrivate(der, key) { } function writePkcs1DSAPrivate(der, key) { - var ver = new Buffer(1); - ver[0] = 0; + var ver = Buffer.from([0]); der.writeBuffer(ver, asn1.Ber.Integer); der.writeBuffer(key.part.p.data, asn1.Ber.Integer); @@ -336,8 +335,7 @@ function writePkcs1ECDSAPublic(der, key) { } function writePkcs1ECDSAPrivate(der, key) { - var ver = new Buffer(1); - ver[0] = 1; + var ver = Buffer.from([1]); der.writeBuffer(ver, asn1.Ber.Integer); der.writeBuffer(key.part.d.data, asn1.Ber.OctetString); @@ -356,8 +354,7 @@ function writePkcs1ECDSAPrivate(der, key) { } function writePkcs1EdDSAPrivate(der, key) { - var ver = new Buffer(1); - ver[0] = 1; + var ver = Buffer.from([1]); der.writeBuffer(ver, asn1.Ber.Integer); der.writeBuffer(key.part.k.data, asn1.Ber.OctetString); diff --git a/deps/npm/node_modules/sshpk/lib/formats/pkcs8.js b/deps/npm/node_modules/sshpk/lib/formats/pkcs8.js index 0838b76962..aa27427c17 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/pkcs8.js +++ b/deps/npm/node_modules/sshpk/lib/formats/pkcs8.js @@ -12,6 +12,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var Key = require('../key'); @@ -307,7 +308,7 @@ function readPkcs8ECDSAPrivate(der) { var key = { type: 'ecdsa', parts: [ - { name: 'curve', data: new Buffer(curveName) }, + { name: 'curve', data: Buffer.from(curveName) }, { name: 'Q', data: Q }, { name: 'd', data: d } ] @@ -326,7 +327,7 @@ function readPkcs8ECDSAPublic(der) { var key = { type: 'ecdsa', parts: [ - { name: 'curve', data: new Buffer(curveName) }, + { name: 'curve', data: Buffer.from(curveName) }, { name: 'Q', data: Q } ] }; @@ -415,8 +416,7 @@ function writePkcs8(der, key) { der.startSequence(); if (PrivateKey.isPrivateKey(key)) { - var sillyInt = new Buffer(1); - sillyInt[0] = 0x0; + var sillyInt = Buffer.from([0]); der.writeBuffer(sillyInt, asn1.Ber.Integer); } @@ -464,8 +464,7 @@ function writePkcs8RSAPrivate(key, der) { der.startSequence(asn1.Ber.OctetString); der.startSequence(); - var version = new Buffer(1); - version[0] = 0; + var version = Buffer.from([0]); der.writeBuffer(version, asn1.Ber.Integer); der.writeBuffer(key.part.n.data, asn1.Ber.Integer); @@ -536,8 +535,7 @@ function writeECDSACurve(key, der) { // ECParameters sequence der.startSequence(); - var version = new Buffer(1); - version.writeUInt8(1, 0); + var version = Buffer.from([1]); der.writeBuffer(version, asn1.Ber.Integer); // FieldID sequence @@ -560,8 +558,7 @@ function writeECDSACurve(key, der) { der.writeBuffer(curve.n, asn1.Ber.Integer); var h = curve.h; if (!h) { - h = new Buffer(1); - h[0] = 1; + h = Buffer.from([1]); } der.writeBuffer(h, asn1.Ber.Integer); @@ -585,8 +582,7 @@ function writePkcs8ECDSAPrivate(key, der) { der.startSequence(asn1.Ber.OctetString); der.startSequence(); - var version = new Buffer(1); - version[0] = 1; + var version = Buffer.from([1]); der.writeBuffer(version, asn1.Ber.Integer); der.writeBuffer(key.part.d.data, asn1.Ber.OctetString); diff --git a/deps/npm/node_modules/sshpk/lib/formats/rfc4253.js b/deps/npm/node_modules/sshpk/lib/formats/rfc4253.js index 56b7682934..52fddcb6b6 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/rfc4253.js +++ b/deps/npm/node_modules/sshpk/lib/formats/rfc4253.js @@ -14,6 +14,7 @@ module.exports = { }; var assert = require('assert-plus'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var Key = require('../key'); @@ -54,7 +55,7 @@ function keyTypeToAlg(key) { function read(partial, type, buf, options) { if (typeof (buf) === 'string') - buf = new Buffer(buf); + buf = Buffer.from(buf); assert.buffer(buf, 'buf'); var key = {}; diff --git a/deps/npm/node_modules/sshpk/lib/formats/ssh-private.js b/deps/npm/node_modules/sshpk/lib/formats/ssh-private.js index 2fcf71990c..5e7eed887a 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/ssh-private.js +++ b/deps/npm/node_modules/sshpk/lib/formats/ssh-private.js @@ -8,6 +8,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var crypto = require('crypto'); @@ -70,7 +71,7 @@ function readSSHPrivate(type, buf, options) { } if (typeof (options.passphrase) === 'string') { - options.passphrase = new Buffer(options.passphrase, + options.passphrase = Buffer.from(options.passphrase, 'utf-8'); } if (!Buffer.isBuffer(options.passphrase)) { @@ -88,7 +89,7 @@ function readSSHPrivate(type, buf, options) { throw (new Error('bcrypt_pbkdf function returned ' + 'failure, parameters invalid')); } - out = new Buffer(out); + out = Buffer.from(out); var ckey = out.slice(0, cinf.keySize); var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize); var cipherStream = crypto.createDecipheriv(cinf.opensslName, @@ -142,13 +143,13 @@ function write(key, options) { var cipher = 'none'; var kdf = 'none'; - var kdfopts = new Buffer(0); + var kdfopts = Buffer.alloc(0); var cinf = { blockSize: 8 }; var passphrase; if (options !== undefined) { passphrase = options.passphrase; if (typeof (passphrase) === 'string') - passphrase = new Buffer(passphrase, 'utf-8'); + passphrase = Buffer.from(passphrase, 'utf-8'); if (passphrase !== undefined) { assert.buffer(passphrase, 'options.passphrase'); assert.optionalString(options.cipher, 'options.cipher'); @@ -199,7 +200,7 @@ function write(key, options) { throw (new Error('bcrypt_pbkdf function returned ' + 'failure, parameters invalid')); } - out = new Buffer(out); + out = Buffer.from(out); var ckey = out.slice(0, cinf.keySize); var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize); @@ -244,7 +245,7 @@ function write(key, options) { var tmp = buf.toString('base64'); var len = tmp.length + (tmp.length / 70) + 18 + 16 + header.length*2 + 10; - buf = new Buffer(len); + buf = Buffer.alloc(len); var o = 0; o += buf.write('-----BEGIN ' + header + '-----\n', o); for (var i = 0; i < tmp.length; ) { diff --git a/deps/npm/node_modules/sshpk/lib/formats/ssh.js b/deps/npm/node_modules/sshpk/lib/formats/ssh.js index 7f88ceb916..c8e9c93105 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/ssh.js +++ b/deps/npm/node_modules/sshpk/lib/formats/ssh.js @@ -6,6 +6,7 @@ module.exports = { }; var assert = require('assert-plus'); +var Buffer = require('safer-buffer').Buffer; var rfc4253 = require('./rfc4253'); var utils = require('../utils'); var Key = require('../key'); @@ -31,7 +32,7 @@ function read(buf, options) { assert.ok(m, 'key must match regex'); var type = rfc4253.algToKeyType(m[1]); - var kbuf = new Buffer(m[2], 'base64'); + var kbuf = Buffer.from(m[2], 'base64'); /* * This is a bit tricky. If we managed to parse the key and locate the @@ -50,7 +51,7 @@ function read(buf, options) { } catch (e) { m = trimmed.match(SSHKEY_RE2); assert.ok(m, 'key must match regex'); - kbuf = new Buffer(m[2], 'base64'); + kbuf = Buffer.from(m[2], 'base64'); key = rfc4253.readInternal(ret, 'public', kbuf); } } else { @@ -110,5 +111,5 @@ function write(key, options) { if (key.comment) parts.push(key.comment); - return (new Buffer(parts.join(' '))); + return (Buffer.from(parts.join(' '))); } diff --git a/deps/npm/node_modules/sshpk/lib/formats/x509-pem.js b/deps/npm/node_modules/sshpk/lib/formats/x509-pem.js index c59c7d5ff0..56d78eb583 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/x509-pem.js +++ b/deps/npm/node_modules/sshpk/lib/formats/x509-pem.js @@ -11,6 +11,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var Key = require('../key'); @@ -48,7 +49,7 @@ function read(buf, options) { /* Chop off the first and last lines */ lines = lines.slice(0, -1).join(''); - buf = new Buffer(lines, 'base64'); + buf = Buffer.from(lines, 'base64'); return (x509.read(buf, options)); } @@ -60,7 +61,7 @@ function write(cert, options) { var tmp = dbuf.toString('base64'); var len = tmp.length + (tmp.length / 64) + 18 + 16 + header.length*2 + 10; - var buf = new Buffer(len); + var buf = Buffer.alloc(len); var o = 0; o += buf.write('-----BEGIN ' + header + '-----\n', o); for (var i = 0; i < tmp.length; ) { diff --git a/deps/npm/node_modules/sshpk/lib/formats/x509.js b/deps/npm/node_modules/sshpk/lib/formats/x509.js index cad74b529b..219953c4e0 100644 --- a/deps/npm/node_modules/sshpk/lib/formats/x509.js +++ b/deps/npm/node_modules/sshpk/lib/formats/x509.js @@ -10,6 +10,7 @@ module.exports = { var assert = require('assert-plus'); var asn1 = require('asn1'); +var Buffer = require('safer-buffer').Buffer; var algs = require('../algs'); var utils = require('../utils'); var Key = require('../key'); @@ -89,7 +90,7 @@ var EXTS = { function read(buf, options) { if (typeof (buf) === 'string') { - buf = new Buffer(buf, 'binary'); + buf = Buffer.from(buf, 'binary'); } assert.buffer(buf, 'buf'); @@ -500,7 +501,7 @@ function write(cert, options) { der.endSequence(); var sigData = sig.signature.toBuffer('asn1'); - var data = new Buffer(sigData.length + 1); + var data = Buffer.alloc(sigData.length + 1); data[0] = 0; sigData.copy(data, 1); der.writeBuffer(data, asn1.Ber.BitString); @@ -710,8 +711,7 @@ function writeBitField(setBits, bitIndex) { var bitLen = bitIndex.length; var blen = Math.ceil(bitLen / 8); var unused = blen * 8 - bitLen; - var bits = new Buffer(1 + blen); - bits.fill(0); + var bits = Buffer.alloc(1 + blen); // zero-filled bits[0] = unused; for (var i = 0; i < bitLen; ++i) { var byteN = 1 + Math.floor(i / 8); |