Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

node-opcua-secure-channel

Package Overview
Dependencies
Maintainers
1
Versions
239
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

node-opcua-secure-channel - npm Package Compare versions

Comparing version 2.129.0 to 2.130.0

2

dist/source/client/client_secure_channel_layer.d.ts

@@ -1,3 +0,1 @@

/// <reference types="node" />
/// <reference types="node" />
import { EventEmitter } from "events";

@@ -4,0 +2,0 @@ import { Certificate, PrivateKey } from "node-opcua-crypto";

5

dist/source/client/duration_to_string.js
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.durationToString = exports.absoluteDurationToString = void 0;
exports.absoluteDurationToString = absoluteDurationToString;
exports.durationToString = durationToString;
const secondsInAMinute = 60;

@@ -30,3 +31,2 @@ const secondsInAnHour = secondsInAMinute * 60;

}
exports.absoluteDurationToString = absoluteDurationToString;
function durationToString(durationInMilliseconds) {

@@ -38,3 +38,2 @@ if (durationInMilliseconds < 0) {

}
exports.durationToString = durationToString;
//# sourceMappingURL=duration_to_string.js.map

@@ -1,2 +0,1 @@

/// <reference types="node" />
import { CommonInterface } from "node-opcua-factory";

@@ -3,0 +2,0 @@ import { CloseSecureChannelRequest, MessageSecurityMode, RequestHeader, ResponseHeader } from "node-opcua-service-secure-channel";

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.getThumbprint = exports.extractFirstCertificateInChain = void 0;
exports.extractFirstCertificateInChain = extractFirstCertificateInChain;
exports.getThumbprint = getThumbprint;
/**

@@ -15,3 +16,2 @@ * @module node-opcua-secure-channel

}
exports.extractFirstCertificateInChain = extractFirstCertificateInChain;
function getThumbprint(certificateChain) {

@@ -23,3 +23,2 @@ if (!certificateChain) {

}
exports.getThumbprint = getThumbprint;
//# sourceMappingURL=common.js.map

@@ -1,2 +0,1 @@

/// <reference types="node" />
import { BinaryStream } from "node-opcua-binary-stream";

@@ -3,0 +2,0 @@ import { PrivateKey } from "node-opcua-crypto";

/**
* @module node-opcua-secure-channel
*/
/// <reference types="node" />
import { StatusCode } from "node-opcua-basic-types";

@@ -6,0 +5,0 @@ import { BaseUAObject } from "node-opcua-factory";

@@ -1,2 +0,1 @@

/// <reference types="node" />
/**

@@ -3,0 +2,0 @@ * convert the messageChunk header to a string

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.messageHeaderToString = void 0;
exports.messageHeaderToString = messageHeaderToString;
/**

@@ -40,3 +40,2 @@ * @module node-opcua-secure-channel

}
exports.messageHeaderToString = messageHeaderToString;
//# sourceMappingURL=message_header_to_string.js.map

@@ -1,3 +0,1 @@

/// <reference types="node" />
/// <reference types="node" />
/**

@@ -4,0 +2,0 @@ * @module node-opcua-secure-channel

@@ -15,3 +15,4 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.SecureMessageChunkManager = exports.chooseSecurityHeader = void 0;
exports.SecureMessageChunkManager = void 0;
exports.chooseSecurityHeader = chooseSecurityHeader;
/**

@@ -29,3 +30,2 @@ * @module node-opcua-secure-channel

}
exports.chooseSecurityHeader = chooseSecurityHeader;
class SecureMessageChunkManager extends events_1.EventEmitter {

@@ -32,0 +32,0 @@ constructor(mode, msgType, channelId, options, securityHeader, sequenceNumberGenerator) {

/**
* @module node-opcua-secure-channel
*/
/// <reference types="node" />
import { MessageSecurityMode, SignatureData } from "node-opcua-service-secure-channel";

@@ -6,0 +5,0 @@ import { Certificate, DerivedKeys, Nonce, PrivateKey, PublicKey, Signature } from "node-opcua-crypto";

@@ -9,3 +9,14 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.getOptionsForSymmetricSignAndEncrypt = exports.verifySignature = exports.computeSignature = exports.getCryptoFactory = exports.computeDerivedKeys = exports.RSAPKCS1V15_Encrypt = exports.asymmetricVerifyChunk = exports.RSAPKCS1V15_Decrypt = exports.coerceSecurityPolicy = exports.toURI = exports.fromURI = exports.SecurityPolicy = void 0;
exports.SecurityPolicy = void 0;
exports.fromURI = fromURI;
exports.toURI = toURI;
exports.coerceSecurityPolicy = coerceSecurityPolicy;
exports.RSAPKCS1V15_Decrypt = RSAPKCS1V15_Decrypt;
exports.asymmetricVerifyChunk = asymmetricVerifyChunk;
exports.RSAPKCS1V15_Encrypt = RSAPKCS1V15_Encrypt;
exports.computeDerivedKeys = computeDerivedKeys;
exports.getCryptoFactory = getCryptoFactory;
exports.computeSignature = computeSignature;
exports.verifySignature = verifySignature;
exports.getOptionsForSymmetricSignAndEncrypt = getOptionsForSymmetricSignAndEncrypt;
const crypto_1 = require("crypto");

@@ -132,3 +143,2 @@ const crypto_2 = require("crypto");

}
exports.fromURI = fromURI;
function toURI(value) {

@@ -149,3 +159,2 @@ if (typeof value === "string") {

}
exports.toURI = toURI;
function coerceSecurityPolicy(value) {

@@ -177,3 +186,2 @@ if (value === undefined || value === null) {

}
exports.coerceSecurityPolicy = coerceSecurityPolicy;
// --------------------

@@ -190,3 +198,2 @@ function RSAPKCS1V15_Decrypt(buffer, privateKey) {

}
exports.RSAPKCS1V15_Decrypt = RSAPKCS1V15_Decrypt;
function RSAOAEP_Decrypt(buffer, privateKey) {

@@ -213,3 +220,2 @@ const blockSize = (0, node_opcua_crypto_1.rsaLengthPrivateKey)(privateKey);

}
exports.asymmetricVerifyChunk = asymmetricVerifyChunk;
function RSA_PKCS1V15_SHA1_Verify(buffer, signature, certificate) {

@@ -263,3 +269,2 @@ (0, node_opcua_assert_1.assert)(certificate instanceof Buffer);

}
exports.RSAPKCS1V15_Encrypt = RSAPKCS1V15_Encrypt;
function RSAOAEP_Encrypt(buffer, publicKey) {

@@ -361,3 +366,2 @@ const keyLength = (0, node_opcua_crypto_1.rsaLengthPublicKey)(publicKey);

}
exports.computeDerivedKeys = computeDerivedKeys;
const factoryBasic128Rsa15 = {

@@ -493,3 +497,2 @@ derivedEncryptionKeyLength: 16,

}
exports.getCryptoFactory = getCryptoFactory;
function computeSignature(senderCertificate, senderNonce, receiverPrivateKey, securityPolicy) {

@@ -520,3 +523,2 @@ if (!senderNonce || !senderCertificate || senderCertificate.length === 0 || !receiverPrivateKey) {

}
exports.computeSignature = computeSignature;
function verifySignature(receiverCertificate, receiverNonce, signature, senderCertificate, securityPolicy) {

@@ -547,3 +549,2 @@ if (securityPolicy === SecurityPolicy.None) {

}
exports.verifySignature = verifySignature;
function getOptionsForSymmetricSignAndEncrypt(securityMode, derivedKeys) {

@@ -567,3 +568,2 @@ (0, node_opcua_assert_1.assert)(securityMode !== node_opcua_service_secure_channel_1.MessageSecurityMode.None && securityMode !== node_opcua_service_secure_channel_1.MessageSecurityMode.Invalid);

}
exports.getOptionsForSymmetricSignAndEncrypt = getOptionsForSymmetricSignAndEncrypt;
//# sourceMappingURL=security_policy.js.map

@@ -1,3 +0,1 @@

/// <reference types="node" />
/// <reference types="node" />
import { EventEmitter } from "events";

@@ -121,3 +119,3 @@ import { Certificate, PublicKeyLength, PrivateKey } from "node-opcua-crypto";

securityPolicy: SecurityPolicy;
get status(): "open" | "closed" | "new" | "connecting" | "closing";
get status(): "new" | "connecting" | "open" | "closing" | "closed";
constructor(options: ServerSecureChannelLayerOptions);

@@ -124,0 +122,0 @@ getTransportSettings(): {

@@ -6,3 +6,12 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.traceClientResponseMessage = exports.traceClientConnectionClosed = exports.traceClientRequestMessage = exports.traceClientResponseContent = exports.traceClientRequestContent = exports.traceResponseMessage = exports.traceRequestMessage = exports._dump_client_transaction_statistics = exports._dump_transaction_statistics = exports.dumpSecurityHeader = exports.doTraceStatistics = exports.doTraceClientResponseContent = exports.doTraceClientRequestContent = exports.doTraceClientMessage = exports.doPerfMonitoring = exports.doTraceResponse = exports.doTraceRequest = exports.doTraceServerMessage = void 0;
exports.dumpSecurityHeader = exports.doTraceStatistics = exports.doTraceClientResponseContent = exports.doTraceClientRequestContent = exports.doTraceClientMessage = exports.doPerfMonitoring = exports.doTraceResponse = exports.doTraceRequest = exports.doTraceServerMessage = void 0;
exports._dump_transaction_statistics = _dump_transaction_statistics;
exports._dump_client_transaction_statistics = _dump_client_transaction_statistics;
exports.traceRequestMessage = traceRequestMessage;
exports.traceResponseMessage = traceResponseMessage;
exports.traceClientRequestContent = traceClientRequestContent;
exports.traceClientResponseContent = traceClientResponseContent;
exports.traceClientRequestMessage = traceClientRequestMessage;
exports.traceClientConnectionClosed = traceClientConnectionClosed;
exports.traceClientResponseMessage = traceClientResponseMessage;
/* eslint-disable max-statements */

@@ -47,3 +56,2 @@ /* eslint-disable complexity */

}
exports._dump_transaction_statistics = _dump_transaction_statistics;
function _dump_client_transaction_statistics(stats) {

@@ -66,3 +74,2 @@ function w(str) {

}
exports._dump_client_transaction_statistics = _dump_client_transaction_statistics;
const nameLength = "TranslateBrowsePathsToNodeIdsResponse".length + 2;

@@ -215,3 +222,2 @@ function __get_extraInfo(req) {

}
exports.traceRequestMessage = traceRequestMessage;
// istanbul ignore next

@@ -231,3 +237,2 @@ function traceResponseMessage(response, tokenId, channelId, instance) {

}
exports.traceResponseMessage = traceResponseMessage;
function traceClientRequestContent(request, channelId, securityToken) {

@@ -239,3 +244,2 @@ traceLog(chalk_1.default.yellow.bold("------------------------------------- Client Sending a request "), request.constructor.name, "h=", request.requestHeader.requestHandle, " channel id ", channelId, " securityToken=", securityToken ? securityToken.tokenId : "x");

}
exports.traceClientRequestContent = traceClientRequestContent;
function traceClientResponseContent(response, channelId) {

@@ -246,3 +250,2 @@ if (exports.doTraceClientResponseContent) {

}
exports.traceClientResponseContent = traceClientResponseContent;
// istanbul ignore next

@@ -256,3 +259,2 @@ // istanbul ignore next

}
exports.traceClientRequestMessage = traceClientRequestMessage;
function traceClientConnectionClosed(err, channelId, instance) {

@@ -264,3 +266,2 @@ const extra = err?.message ? chalk_1.default.red(err.message) : chalk_1.default.green("<expected>");

}
exports.traceClientConnectionClosed = traceClientConnectionClosed;
function additionalInfo(response) {

@@ -288,3 +289,2 @@ if (response instanceof node_opcua_types_1.BrowseNextResponse || response instanceof node_opcua_types_1.BrowseResponse) {

}
exports.traceClientResponseMessage = traceClientResponseMessage;
//# sourceMappingURL=utils.js.map
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.testRSAPKCS1V15_EncryptDecrypt = void 0;
exports.testRSAPKCS1V15_EncryptDecrypt = testRSAPKCS1V15_EncryptDecrypt;
const crypto_1 = require("crypto");

@@ -58,3 +58,2 @@ const node_opcua_crypto_1 = require("node-opcua-crypto");

}
exports.testRSAPKCS1V15_EncryptDecrypt = testRSAPKCS1V15_EncryptDecrypt;
//# sourceMappingURL=verify_pcks1.js.map

@@ -1,2 +0,1 @@

/// <reference types="node" />
/**

@@ -3,0 +2,0 @@ * @method decompose_message_body_in_chunks

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.decompose_message_body_in_chunks = void 0;
exports.decompose_message_body_in_chunks = decompose_message_body_in_chunks;
const node_opcua_assert_1 = require("node-opcua-assert");

@@ -50,3 +50,2 @@ const source_1 = require("../source");

}
exports.decompose_message_body_in_chunks = decompose_message_body_in_chunks;
//# sourceMappingURL=decompose_message_body_in_chunks.js.map

@@ -1,2 +0,1 @@

/// <reference types="node" />
import { EventEmitter } from "events";

@@ -3,0 +2,0 @@ import { GetEndpointsResponse } from "node-opcua-service-endpoints";

@@ -1,2 +0,1 @@

/// <reference types="node" />
import "should";

@@ -3,0 +2,0 @@ export declare const makeMessageChunkSignatureForTest: (chunk: Buffer) => Buffer;

@@ -6,3 +6,4 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.verifyMessageChunkSignatureForTest = exports.construct_verifyMessageChunkSignatureForTest = exports.makeMessageChunkSignatureForTest = void 0;
exports.verifyMessageChunkSignatureForTest = exports.makeMessageChunkSignatureForTest = void 0;
exports.construct_verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest;
const fs_1 = __importDefault(require("fs"));

@@ -40,4 +41,3 @@ require("should");

}
exports.construct_verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest;
exports.verifyMessageChunkSignatureForTest = construct_verifyMessageChunkSignatureForTest();
//# sourceMappingURL=signature_helpers.js.map

@@ -1,2 +0,1 @@

/// <reference types="node" />
/**

@@ -3,0 +2,0 @@ *

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.verify_single_chunk_message = exports.verify_multi_chunk_message = void 0;
exports.verify_multi_chunk_message = verify_multi_chunk_message;
exports.verify_single_chunk_message = verify_single_chunk_message;
// tslint:disable:no-console

@@ -45,7 +46,5 @@ const node_opcua_packet_analyzer_1 = require("node-opcua-packet-analyzer");

}
exports.verify_multi_chunk_message = verify_multi_chunk_message;
function verify_single_chunk_message(packet) {
verify_multi_chunk_message([packet]);
}
exports.verify_single_chunk_message = verify_single_chunk_message;
//# sourceMappingURL=verify_message_chunk.js.map
{
"name": "node-opcua-secure-channel",
"version": "2.129.0",
"version": "2.130.0",
"description": "pure nodejs OPCUA SDK - module secure-channel",

@@ -21,3 +21,3 @@ "main": "./dist/source/index.js",

"node-opcua-chunkmanager": "2.129.0",
"node-opcua-common": "2.129.0",
"node-opcua-common": "2.130.0",
"node-opcua-crypto": "4.9.2",

@@ -60,3 +60,3 @@ "node-opcua-debug": "2.128.0",

"homepage": "http://node-opcua.github.io/",
"gitHead": "8a1754350fb95a764e278d37a289f0c48ccb8c9d",
"gitHead": "94bf9012b03dbd4325cd122ce04edfa5466875bc",
"files": [

@@ -63,0 +63,0 @@ "dist",

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc