|
| 1 | +// This script is used to inspect and extract public keys from private keys. |
| 2 | + |
| 3 | +document.addEventListener('DOMContentLoaded', function () { |
| 4 | + const input = document.getElementById('keyInput'); |
| 5 | + const output = document.getElementById('keyOutput'); |
| 6 | + |
| 7 | + const inspectBtn = document.getElementById('inspect-key'); |
| 8 | + const pubKeyBtn = document.getElementById('extract-pubkey'); |
| 9 | + const resetBtn = document.getElementById('reset-btn'); |
| 10 | + const toPKCS8Btn = document.getElementById('convert-to-pkcs8'); |
| 11 | + const toRSA1Btn = document.getElementById('convert-to-rsa'); |
| 12 | + |
| 13 | + if (inspectBtn) inspectBtn.addEventListener('click', inspectPrivateKey); |
| 14 | + if (pubKeyBtn) pubKeyBtn.addEventListener('click', extractPublicKey); |
| 15 | + if (resetBtn) resetBtn.addEventListener('click', () => { |
| 16 | + input.value = ''; |
| 17 | + output.innerText = ''; |
| 18 | + }); |
| 19 | + if (toPKCS8Btn) toPKCS8Btn.addEventListener('click', () => convertFormat('pkcs8')); |
| 20 | + if (toRSA1Btn) toRSA1Btn.addEventListener('click', () => convertFormat('rsa1')); |
| 21 | + |
| 22 | + function getOutputFormat() { |
| 23 | + return document.querySelector('input[name="keyOutputFormat"]:checked')?.value || 'pem'; |
| 24 | + } |
| 25 | + |
| 26 | + function parsePrivateKey(raw) { |
| 27 | + try { |
| 28 | + const cleaned = raw.trim(); |
| 29 | + |
| 30 | + if (cleaned.includes('EC PRIVATE KEY')) { |
| 31 | + throw new Error('EC keys are not supported. Please use an RSA key.'); |
| 32 | + } |
| 33 | + |
| 34 | + if (cleaned.includes('PRIVATE KEY')) { |
| 35 | + const key = forge.pki.privateKeyFromPem(cleaned); |
| 36 | + if (!key || !key.n || !key.e) { |
| 37 | + throw new Error('Not a valid RSA private key.'); |
| 38 | + } |
| 39 | + return key; |
| 40 | + } |
| 41 | + |
| 42 | + const isHex = /^[0-9a-f\s]+$/i.test(cleaned); |
| 43 | + const derBytes = isHex |
| 44 | + ? forge.util.hexToBytes(cleaned.replace(/\s+/g, '')) |
| 45 | + : forge.util.decode64(cleaned); |
| 46 | + |
| 47 | + const asn1 = forge.asn1.fromDer(derBytes); |
| 48 | + const key = forge.pki.privateKeyFromAsn1(asn1); |
| 49 | + if (!key || !key.n || !key.e) { |
| 50 | + throw new Error('Not a valid RSA private key.'); |
| 51 | + } |
| 52 | + |
| 53 | + return key; |
| 54 | + } catch (e) { |
| 55 | + throw new Error('Unable to parse private key: ' + e.message); |
| 56 | + } |
| 57 | + } |
| 58 | + |
| 59 | + function inspectPrivateKey() { |
| 60 | + output.innerText = ''; |
| 61 | + try { |
| 62 | + const key = parsePrivateKey(input.value.trim()); |
| 63 | + |
| 64 | + const details = { |
| 65 | + type: 'RSA', |
| 66 | + bits: key.n.bitLength(), |
| 67 | + publicExponent: key.e.toString(10), |
| 68 | + }; |
| 69 | + |
| 70 | + output.innerText = JSON.stringify(details, null, 2); |
| 71 | + } catch (err) { |
| 72 | + output.innerText = '❌ Error: ' + err.message; |
| 73 | + } |
| 74 | + } |
| 75 | + |
| 76 | + function extractPublicKey() { |
| 77 | + output.innerText = ''; |
| 78 | + try { |
| 79 | + const privateKey = parsePrivateKey(input.value.trim()); |
| 80 | + |
| 81 | + if (!privateKey || !privateKey.n || !privateKey.e) { |
| 82 | + throw new Error('Invalid RSA private key — cannot extract public key.'); |
| 83 | + } |
| 84 | + |
| 85 | + const publicKey = forge.pki.setRsaPublicKey(privateKey.n, privateKey.e); |
| 86 | + const format = getOutputFormat(); |
| 87 | + let result; |
| 88 | + |
| 89 | + if (format === 'pem') { |
| 90 | + result = forge.pki.publicKeyToPem(publicKey); |
| 91 | + } else { |
| 92 | + let asn1; |
| 93 | + try { |
| 94 | + asn1 = forge.pki.publicKeyToAsn1(publicKey); |
| 95 | + } catch (err) { |
| 96 | + throw new Error('Failed to convert public key to ASN.1: ' + err.message); |
| 97 | + } |
| 98 | + |
| 99 | + if (!asn1) { |
| 100 | + throw new Error('publicKeyToAsn1() returned undefined.'); |
| 101 | + } |
| 102 | + |
| 103 | + const der = forge.asn1.toDer(asn1).getBytes(); |
| 104 | + |
| 105 | + if (format === 'base64') { |
| 106 | + result = forge.util.encode64(der).match(/.{1,64}/g).join('\n'); |
| 107 | + } else if (format === 'hex') { |
| 108 | + result = forge.util.bytesToHex(der).match(/.{1,2}/g).join(' '); |
| 109 | + } else { |
| 110 | + throw new Error('Unknown output format: ' + format); |
| 111 | + } |
| 112 | + } |
| 113 | + |
| 114 | + output.innerText = result; |
| 115 | + } catch (err) { |
| 116 | + output.innerText = '❌ Error: ' + err.message; |
| 117 | + } |
| 118 | + } |
| 119 | + |
| 120 | + |
| 121 | + function convertFormat(targetFormat) { |
| 122 | + output.innerText = ''; |
| 123 | + try { |
| 124 | + const privateKey = parsePrivateKey(input.value.trim()); |
| 125 | + |
| 126 | + if (!privateKey.n || !privateKey.e) { |
| 127 | + throw new Error('Invalid RSA private key structure.'); |
| 128 | + } |
| 129 | + |
| 130 | + let result; |
| 131 | + |
| 132 | + if (targetFormat === 'pkcs8') { |
| 133 | + const pkcs8 = forge.pki.privateKeyToAsn1(privateKey); |
| 134 | + const wrapped = forge.pki.wrapRsaPrivateKey(pkcs8); |
| 135 | + result = forge.pki.privateKeyInfoToPem(wrapped); |
| 136 | + } else if (targetFormat === 'rsa1') { |
| 137 | + result = forge.pki.privateKeyToPem(privateKey); |
| 138 | + } |
| 139 | + |
| 140 | + output.innerText = result; |
| 141 | + } catch (err) { |
| 142 | + output.innerText = '❌ Error: ' + err.message; |
| 143 | + } |
| 144 | + } |
| 145 | +}); |
0 commit comments