node-opcua-secure-channel
Advanced tools
Comparing version 2.129.0 to 2.130.0
@@ -1,3 +0,1 @@ | ||
/// <reference types="node" /> | ||
/// <reference types="node" /> | ||
import { EventEmitter } from "events"; | ||
@@ -4,0 +2,0 @@ import { Certificate, PrivateKey } from "node-opcua-crypto"; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.durationToString = exports.absoluteDurationToString = void 0; | ||
exports.absoluteDurationToString = absoluteDurationToString; | ||
exports.durationToString = durationToString; | ||
const secondsInAMinute = 60; | ||
@@ -30,3 +31,2 @@ const secondsInAnHour = secondsInAMinute * 60; | ||
} | ||
exports.absoluteDurationToString = absoluteDurationToString; | ||
function durationToString(durationInMilliseconds) { | ||
@@ -38,3 +38,2 @@ if (durationInMilliseconds < 0) { | ||
} | ||
exports.durationToString = durationToString; | ||
//# sourceMappingURL=duration_to_string.js.map |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
import { CommonInterface } from "node-opcua-factory"; | ||
@@ -3,0 +2,0 @@ import { CloseSecureChannelRequest, MessageSecurityMode, RequestHeader, ResponseHeader } from "node-opcua-service-secure-channel"; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.getThumbprint = exports.extractFirstCertificateInChain = void 0; | ||
exports.extractFirstCertificateInChain = extractFirstCertificateInChain; | ||
exports.getThumbprint = getThumbprint; | ||
/** | ||
@@ -15,3 +16,2 @@ * @module node-opcua-secure-channel | ||
} | ||
exports.extractFirstCertificateInChain = extractFirstCertificateInChain; | ||
function getThumbprint(certificateChain) { | ||
@@ -23,3 +23,2 @@ if (!certificateChain) { | ||
} | ||
exports.getThumbprint = getThumbprint; | ||
//# sourceMappingURL=common.js.map |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
import { BinaryStream } from "node-opcua-binary-stream"; | ||
@@ -3,0 +2,0 @@ import { PrivateKey } from "node-opcua-crypto"; |
/** | ||
* @module node-opcua-secure-channel | ||
*/ | ||
/// <reference types="node" /> | ||
import { StatusCode } from "node-opcua-basic-types"; | ||
@@ -6,0 +5,0 @@ import { BaseUAObject } from "node-opcua-factory"; |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
/** | ||
@@ -3,0 +2,0 @@ * convert the messageChunk header to a string |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.messageHeaderToString = void 0; | ||
exports.messageHeaderToString = messageHeaderToString; | ||
/** | ||
@@ -40,3 +40,2 @@ * @module node-opcua-secure-channel | ||
} | ||
exports.messageHeaderToString = messageHeaderToString; | ||
//# sourceMappingURL=message_header_to_string.js.map |
@@ -1,3 +0,1 @@ | ||
/// <reference types="node" /> | ||
/// <reference types="node" /> | ||
/** | ||
@@ -4,0 +2,0 @@ * @module node-opcua-secure-channel |
@@ -15,3 +15,4 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.SecureMessageChunkManager = exports.chooseSecurityHeader = void 0; | ||
exports.SecureMessageChunkManager = void 0; | ||
exports.chooseSecurityHeader = chooseSecurityHeader; | ||
/** | ||
@@ -29,3 +30,2 @@ * @module node-opcua-secure-channel | ||
} | ||
exports.chooseSecurityHeader = chooseSecurityHeader; | ||
class SecureMessageChunkManager extends events_1.EventEmitter { | ||
@@ -32,0 +32,0 @@ constructor(mode, msgType, channelId, options, securityHeader, sequenceNumberGenerator) { |
/** | ||
* @module node-opcua-secure-channel | ||
*/ | ||
/// <reference types="node" /> | ||
import { MessageSecurityMode, SignatureData } from "node-opcua-service-secure-channel"; | ||
@@ -6,0 +5,0 @@ import { Certificate, DerivedKeys, Nonce, PrivateKey, PublicKey, Signature } from "node-opcua-crypto"; |
@@ -9,3 +9,14 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.getOptionsForSymmetricSignAndEncrypt = exports.verifySignature = exports.computeSignature = exports.getCryptoFactory = exports.computeDerivedKeys = exports.RSAPKCS1V15_Encrypt = exports.asymmetricVerifyChunk = exports.RSAPKCS1V15_Decrypt = exports.coerceSecurityPolicy = exports.toURI = exports.fromURI = exports.SecurityPolicy = void 0; | ||
exports.SecurityPolicy = void 0; | ||
exports.fromURI = fromURI; | ||
exports.toURI = toURI; | ||
exports.coerceSecurityPolicy = coerceSecurityPolicy; | ||
exports.RSAPKCS1V15_Decrypt = RSAPKCS1V15_Decrypt; | ||
exports.asymmetricVerifyChunk = asymmetricVerifyChunk; | ||
exports.RSAPKCS1V15_Encrypt = RSAPKCS1V15_Encrypt; | ||
exports.computeDerivedKeys = computeDerivedKeys; | ||
exports.getCryptoFactory = getCryptoFactory; | ||
exports.computeSignature = computeSignature; | ||
exports.verifySignature = verifySignature; | ||
exports.getOptionsForSymmetricSignAndEncrypt = getOptionsForSymmetricSignAndEncrypt; | ||
const crypto_1 = require("crypto"); | ||
@@ -132,3 +143,2 @@ const crypto_2 = require("crypto"); | ||
} | ||
exports.fromURI = fromURI; | ||
function toURI(value) { | ||
@@ -149,3 +159,2 @@ if (typeof value === "string") { | ||
} | ||
exports.toURI = toURI; | ||
function coerceSecurityPolicy(value) { | ||
@@ -177,3 +186,2 @@ if (value === undefined || value === null) { | ||
} | ||
exports.coerceSecurityPolicy = coerceSecurityPolicy; | ||
// -------------------- | ||
@@ -190,3 +198,2 @@ function RSAPKCS1V15_Decrypt(buffer, privateKey) { | ||
} | ||
exports.RSAPKCS1V15_Decrypt = RSAPKCS1V15_Decrypt; | ||
function RSAOAEP_Decrypt(buffer, privateKey) { | ||
@@ -213,3 +220,2 @@ const blockSize = (0, node_opcua_crypto_1.rsaLengthPrivateKey)(privateKey); | ||
} | ||
exports.asymmetricVerifyChunk = asymmetricVerifyChunk; | ||
function RSA_PKCS1V15_SHA1_Verify(buffer, signature, certificate) { | ||
@@ -263,3 +269,2 @@ (0, node_opcua_assert_1.assert)(certificate instanceof Buffer); | ||
} | ||
exports.RSAPKCS1V15_Encrypt = RSAPKCS1V15_Encrypt; | ||
function RSAOAEP_Encrypt(buffer, publicKey) { | ||
@@ -361,3 +366,2 @@ const keyLength = (0, node_opcua_crypto_1.rsaLengthPublicKey)(publicKey); | ||
} | ||
exports.computeDerivedKeys = computeDerivedKeys; | ||
const factoryBasic128Rsa15 = { | ||
@@ -493,3 +497,2 @@ derivedEncryptionKeyLength: 16, | ||
} | ||
exports.getCryptoFactory = getCryptoFactory; | ||
function computeSignature(senderCertificate, senderNonce, receiverPrivateKey, securityPolicy) { | ||
@@ -520,3 +523,2 @@ if (!senderNonce || !senderCertificate || senderCertificate.length === 0 || !receiverPrivateKey) { | ||
} | ||
exports.computeSignature = computeSignature; | ||
function verifySignature(receiverCertificate, receiverNonce, signature, senderCertificate, securityPolicy) { | ||
@@ -547,3 +549,2 @@ if (securityPolicy === SecurityPolicy.None) { | ||
} | ||
exports.verifySignature = verifySignature; | ||
function getOptionsForSymmetricSignAndEncrypt(securityMode, derivedKeys) { | ||
@@ -567,3 +568,2 @@ (0, node_opcua_assert_1.assert)(securityMode !== node_opcua_service_secure_channel_1.MessageSecurityMode.None && securityMode !== node_opcua_service_secure_channel_1.MessageSecurityMode.Invalid); | ||
} | ||
exports.getOptionsForSymmetricSignAndEncrypt = getOptionsForSymmetricSignAndEncrypt; | ||
//# sourceMappingURL=security_policy.js.map |
@@ -1,3 +0,1 @@ | ||
/// <reference types="node" /> | ||
/// <reference types="node" /> | ||
import { EventEmitter } from "events"; | ||
@@ -121,3 +119,3 @@ import { Certificate, PublicKeyLength, PrivateKey } from "node-opcua-crypto"; | ||
securityPolicy: SecurityPolicy; | ||
get status(): "open" | "closed" | "new" | "connecting" | "closing"; | ||
get status(): "new" | "connecting" | "open" | "closing" | "closed"; | ||
constructor(options: ServerSecureChannelLayerOptions); | ||
@@ -124,0 +122,0 @@ getTransportSettings(): { |
@@ -6,3 +6,12 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.traceClientResponseMessage = exports.traceClientConnectionClosed = exports.traceClientRequestMessage = exports.traceClientResponseContent = exports.traceClientRequestContent = exports.traceResponseMessage = exports.traceRequestMessage = exports._dump_client_transaction_statistics = exports._dump_transaction_statistics = exports.dumpSecurityHeader = exports.doTraceStatistics = exports.doTraceClientResponseContent = exports.doTraceClientRequestContent = exports.doTraceClientMessage = exports.doPerfMonitoring = exports.doTraceResponse = exports.doTraceRequest = exports.doTraceServerMessage = void 0; | ||
exports.dumpSecurityHeader = exports.doTraceStatistics = exports.doTraceClientResponseContent = exports.doTraceClientRequestContent = exports.doTraceClientMessage = exports.doPerfMonitoring = exports.doTraceResponse = exports.doTraceRequest = exports.doTraceServerMessage = void 0; | ||
exports._dump_transaction_statistics = _dump_transaction_statistics; | ||
exports._dump_client_transaction_statistics = _dump_client_transaction_statistics; | ||
exports.traceRequestMessage = traceRequestMessage; | ||
exports.traceResponseMessage = traceResponseMessage; | ||
exports.traceClientRequestContent = traceClientRequestContent; | ||
exports.traceClientResponseContent = traceClientResponseContent; | ||
exports.traceClientRequestMessage = traceClientRequestMessage; | ||
exports.traceClientConnectionClosed = traceClientConnectionClosed; | ||
exports.traceClientResponseMessage = traceClientResponseMessage; | ||
/* eslint-disable max-statements */ | ||
@@ -47,3 +56,2 @@ /* eslint-disable complexity */ | ||
} | ||
exports._dump_transaction_statistics = _dump_transaction_statistics; | ||
function _dump_client_transaction_statistics(stats) { | ||
@@ -66,3 +74,2 @@ function w(str) { | ||
} | ||
exports._dump_client_transaction_statistics = _dump_client_transaction_statistics; | ||
const nameLength = "TranslateBrowsePathsToNodeIdsResponse".length + 2; | ||
@@ -215,3 +222,2 @@ function __get_extraInfo(req) { | ||
} | ||
exports.traceRequestMessage = traceRequestMessage; | ||
// istanbul ignore next | ||
@@ -231,3 +237,2 @@ function traceResponseMessage(response, tokenId, channelId, instance) { | ||
} | ||
exports.traceResponseMessage = traceResponseMessage; | ||
function traceClientRequestContent(request, channelId, securityToken) { | ||
@@ -239,3 +244,2 @@ traceLog(chalk_1.default.yellow.bold("------------------------------------- Client Sending a request "), request.constructor.name, "h=", request.requestHeader.requestHandle, " channel id ", channelId, " securityToken=", securityToken ? securityToken.tokenId : "x"); | ||
} | ||
exports.traceClientRequestContent = traceClientRequestContent; | ||
function traceClientResponseContent(response, channelId) { | ||
@@ -246,3 +250,2 @@ if (exports.doTraceClientResponseContent) { | ||
} | ||
exports.traceClientResponseContent = traceClientResponseContent; | ||
// istanbul ignore next | ||
@@ -256,3 +259,2 @@ // istanbul ignore next | ||
} | ||
exports.traceClientRequestMessage = traceClientRequestMessage; | ||
function traceClientConnectionClosed(err, channelId, instance) { | ||
@@ -264,3 +266,2 @@ const extra = err?.message ? chalk_1.default.red(err.message) : chalk_1.default.green("<expected>"); | ||
} | ||
exports.traceClientConnectionClosed = traceClientConnectionClosed; | ||
function additionalInfo(response) { | ||
@@ -288,3 +289,2 @@ if (response instanceof node_opcua_types_1.BrowseNextResponse || response instanceof node_opcua_types_1.BrowseResponse) { | ||
} | ||
exports.traceClientResponseMessage = traceClientResponseMessage; | ||
//# sourceMappingURL=utils.js.map |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.testRSAPKCS1V15_EncryptDecrypt = void 0; | ||
exports.testRSAPKCS1V15_EncryptDecrypt = testRSAPKCS1V15_EncryptDecrypt; | ||
const crypto_1 = require("crypto"); | ||
@@ -58,3 +58,2 @@ const node_opcua_crypto_1 = require("node-opcua-crypto"); | ||
} | ||
exports.testRSAPKCS1V15_EncryptDecrypt = testRSAPKCS1V15_EncryptDecrypt; | ||
//# sourceMappingURL=verify_pcks1.js.map |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
/** | ||
@@ -3,0 +2,0 @@ * @method decompose_message_body_in_chunks |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.decompose_message_body_in_chunks = void 0; | ||
exports.decompose_message_body_in_chunks = decompose_message_body_in_chunks; | ||
const node_opcua_assert_1 = require("node-opcua-assert"); | ||
@@ -50,3 +50,2 @@ const source_1 = require("../source"); | ||
} | ||
exports.decompose_message_body_in_chunks = decompose_message_body_in_chunks; | ||
//# sourceMappingURL=decompose_message_body_in_chunks.js.map |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
import { EventEmitter } from "events"; | ||
@@ -3,0 +2,0 @@ import { GetEndpointsResponse } from "node-opcua-service-endpoints"; |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
import "should"; | ||
@@ -3,0 +2,0 @@ export declare const makeMessageChunkSignatureForTest: (chunk: Buffer) => Buffer; |
@@ -6,3 +6,4 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.verifyMessageChunkSignatureForTest = exports.construct_verifyMessageChunkSignatureForTest = exports.makeMessageChunkSignatureForTest = void 0; | ||
exports.verifyMessageChunkSignatureForTest = exports.makeMessageChunkSignatureForTest = void 0; | ||
exports.construct_verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest; | ||
const fs_1 = __importDefault(require("fs")); | ||
@@ -40,4 +41,3 @@ require("should"); | ||
} | ||
exports.construct_verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest; | ||
exports.verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest(); | ||
//# sourceMappingURL=signature_helpers.js.map |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
/** | ||
@@ -3,0 +2,0 @@ * |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.verify_single_chunk_message = exports.verify_multi_chunk_message = void 0; | ||
exports.verify_multi_chunk_message = verify_multi_chunk_message; | ||
exports.verify_single_chunk_message = verify_single_chunk_message; | ||
// tslint:disable:no-console | ||
@@ -45,7 +46,5 @@ const node_opcua_packet_analyzer_1 = require("node-opcua-packet-analyzer"); | ||
} | ||
exports.verify_multi_chunk_message = verify_multi_chunk_message; | ||
function verify_single_chunk_message(packet) { | ||
verify_multi_chunk_message([packet]); | ||
} | ||
exports.verify_single_chunk_message = verify_single_chunk_message; | ||
//# sourceMappingURL=verify_message_chunk.js.map |
{ | ||
"name": "node-opcua-secure-channel", | ||
"version": "2.129.0", | ||
"version": "2.130.0", | ||
"description": "pure nodejs OPCUA SDK - module secure-channel", | ||
@@ -21,3 +21,3 @@ "main": "./dist/source/index.js", | ||
"node-opcua-chunkmanager": "2.129.0", | ||
"node-opcua-common": "2.129.0", | ||
"node-opcua-common": "2.130.0", | ||
"node-opcua-crypto": "4.9.2", | ||
@@ -60,3 +60,3 @@ "node-opcua-debug": "2.128.0", | ||
"homepage": "http://node-opcua.github.io/", | ||
"gitHead": "8a1754350fb95a764e278d37a289f0c48ccb8c9d", | ||
"gitHead": "94bf9012b03dbd4325cd122ce04edfa5466875bc", | ||
"files": [ | ||
@@ -63,0 +63,0 @@ "dist", |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
871880
12101
+ Addednode-opcua-common@2.130.0(transitive)
- Removednode-opcua-common@2.129.0(transitive)
Updatednode-opcua-common@2.130.0