Updated pre-built library.
This commit is contained in:
parent
d11fbaa1df
commit
05ead7e8cd
|
@ -1072,6 +1072,11 @@ function openpgp_packet_encryptedintegrityprotecteddata() {
|
|||
}
|
||||
|
||||
function toString() {
|
||||
var data = '';
|
||||
if(openpgp.config.debug)
|
||||
data = ' data: Bytes ['
|
||||
+ util.hexstrdump(this.encryptedData) + ']';
|
||||
|
||||
return '5.13. Sym. Encrypted Integrity Protected Data Packet (Tag 18)\n'
|
||||
+ ' length: '
|
||||
+ this.packetLength
|
||||
|
@ -1079,8 +1084,7 @@ function openpgp_packet_encryptedintegrityprotecteddata() {
|
|||
+ ' version: '
|
||||
+ this.version
|
||||
+ '\n'
|
||||
+ ' data: Bytes ['
|
||||
+ util.hexstrdump(this.encryptedData) + ']';
|
||||
+ data;
|
||||
}
|
||||
|
||||
this.write_packet = write_packet;
|
||||
|
@ -9035,7 +9039,8 @@ function openpgp_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext,
|
|||
util.print_debug("resync:"+resync);
|
||||
var iblock = new Array(block_size);
|
||||
var ablock = new Array(block_size);
|
||||
var i, n, text = '';
|
||||
var i, n = '';
|
||||
var text = [];
|
||||
|
||||
// initialisation vector
|
||||
for(i=0; i < block_size; i++) iblock[i] = 0;
|
||||
|
@ -9057,7 +9062,7 @@ function openpgp_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext,
|
|||
|| iblock[block_size-1]!=(ablock[1]^ciphertext.charCodeAt(block_size+1)))
|
||||
{
|
||||
util.print_eror("error duding decryption. Symmectric encrypted data not valid.");
|
||||
return text;
|
||||
return text.join('');
|
||||
}
|
||||
|
||||
/* RFC4880: Tag 18 and Resync:
|
||||
|
@ -9076,7 +9081,7 @@ function openpgp_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext,
|
|||
for(i = 0; i<block_size && i+n < ciphertext.length; i++)
|
||||
{
|
||||
iblock[i] = ciphertext.charCodeAt(n+i);
|
||||
text += String.fromCharCode(ablock[i]^iblock[i]);
|
||||
text.push(String.fromCharCode(ablock[i]^iblock[i]));
|
||||
}
|
||||
}
|
||||
} else {
|
||||
|
@ -9087,13 +9092,13 @@ function openpgp_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext,
|
|||
for(i = 0; i<block_size && i+n < ciphertext.length; i++)
|
||||
{
|
||||
iblock[i] = ciphertext.charCodeAt(n+i);
|
||||
text += String.fromCharCode(ablock[i]^iblock[i]);
|
||||
text.push(String.fromCharCode(ablock[i]^iblock[i]));
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
return text;
|
||||
return text.join('');
|
||||
}
|
||||
|
||||
|
||||
|
@ -9117,7 +9122,7 @@ function normal_cfb_encrypt(blockcipherencryptfn, block_size, key, plaintext, iv
|
|||
function normal_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext, iv) {
|
||||
var blockp ="";
|
||||
var pos = 0;
|
||||
var plaintext = "";
|
||||
var plaintext = [];
|
||||
var offset = 0;
|
||||
if (iv == null)
|
||||
for (var i = 0; i < block_size; i++) blockp += String.fromCharCode(0);
|
||||
|
@ -9127,12 +9132,12 @@ function normal_cfb_decrypt(blockcipherencryptfn, block_size, key, ciphertext, i
|
|||
var decblock = blockcipherencryptfn(blockp, key);
|
||||
blockp = ciphertext.substring((pos*(block_size))+offset,(pos*(block_size))+(block_size)+offset);
|
||||
for (var i=0; i < blockp.length; i++) {
|
||||
plaintext += String.fromCharCode(blockp.charCodeAt(i) ^ decblock[i]);
|
||||
plaintext.push(String.fromCharCode(blockp.charCodeAt(i) ^ decblock[i]));
|
||||
}
|
||||
pos++;
|
||||
}
|
||||
|
||||
return plaintext;
|
||||
return plaintext.join('');
|
||||
}
|
||||
// GPG4Browsers - An OpenPGP implementation in javascript
|
||||
// Copyright (C) 2011 Recurity Labs GmbH
|
||||
|
@ -9288,7 +9293,7 @@ function openpgp_crypto_getPrefixRandom(algo) {
|
|||
* @return [String] plaintext data
|
||||
*/
|
||||
function openpgp_crypto_symmetricDecrypt(algo, key, data, openpgp_cfb) {
|
||||
util.print_debug("openpgp_crypto_symmetricDecrypt:\nalgo:"+algo+"\nencrypteddata:"+util.hexstrdump(data));
|
||||
util.print_debug_hexstr_dump("openpgp_crypto_symmetricDecrypt:\nalgo:"+algo+"\nencrypteddata:",data);
|
||||
var n = 0;
|
||||
if (!openpgp_cfb)
|
||||
n = 2;
|
||||
|
@ -9324,7 +9329,7 @@ function openpgp_crypto_symmetricDecrypt(algo, key, data, openpgp_cfb) {
|
|||
* @return [String] plain text data of the prefixed data
|
||||
*/
|
||||
function openpgp_crypto_MDCSystemBytes(algo, key, data) {
|
||||
util.print_debug("openpgp_crypto_symmetricDecrypt:\nencrypteddata:"+util.hexstrdump(data));
|
||||
util.print_debug_hexstr_dump("openpgp_crypto_symmetricDecrypt:\nencrypteddata:",data);
|
||||
switch(algo) {
|
||||
case 0: // Plaintext or unencrypted data
|
||||
return data;
|
||||
|
@ -10995,7 +11000,7 @@ function openpgp_msg_message() {
|
|||
var packet;
|
||||
var position = 0;
|
||||
var len = decrypted.length;
|
||||
util.print_debug("openpgp.msg.messge decrypt:\n"+util.hexstrdump(decrypted));
|
||||
util.print_debug_hexstr_dump("openpgp.msg.messge decrypt:\n",decrypted);
|
||||
|
||||
while (position != decrypted.length && (packet = openpgp_packet.read_packet(decrypted, position, len)) != null) {
|
||||
if (packet.tagType == 8) {
|
||||
|
@ -11005,7 +11010,7 @@ function openpgp_msg_message() {
|
|||
util.print_debug(packet.toString());
|
||||
position += packet.headerLength+packet.packetLength;
|
||||
if (position > 38)
|
||||
util.print_debug("openpgp.msg.messge decrypt:\n"+util.hexstrdump(decrypted.substring(position)));
|
||||
util.print_debug_hexstr_dump("openpgp.msg.messge decrypt:\n",decrypted.substring(position));
|
||||
len = decrypted.length - position;
|
||||
if (packet.tagType == 11) {
|
||||
this.text = packet.data;
|
||||
|
@ -11088,7 +11093,8 @@ function openpgp_msg_message() {
|
|||
this.decrypt = decrypt;
|
||||
this.verifySignature = verifySignature;
|
||||
this.toString = toString;
|
||||
}// GPG4Browsers - An OpenPGP implementation in javascript
|
||||
}
|
||||
// GPG4Browsers - An OpenPGP implementation in javascript
|
||||
// Copyright (C) 2011 Recurity Labs GmbH
|
||||
//
|
||||
// This library is free software; you can redistribute it and/or
|
||||
|
|
18
resources/openpgp.min.js
vendored
18
resources/openpgp.min.js
vendored
|
@ -32,8 +32,8 @@ this.preferredCompressionAlgorithms+"\nKey Server Preferences :"+thi
|
|||
this.reasonForRevocationFlag+"\n Reason :"+this.reasonForRevocationString+"\nMPI:\n",c=0;c<this.MPIs.length;c++)a+=this.MPIs[c].toString();return a}}
|
||||
function openpgp_packet_encryptedintegrityprotecteddata(){this.tagType=18;this.hash=this.decrytpedData=this.encryptedData=this.packetLength=this.version=null;this.write_packet=function(a,b,c){var d=openpgp_crypto_getPrefixRandom(a),e=d+d.charAt(d.length-2)+d.charAt(d.length-1),c=c+String.fromCharCode(211),c=c+String.fromCharCode(20);util.print_debug_hexstr_dump("data to be hashed:",e+c);c+=str_sha1(e+c);util.print_debug_hexstr_dump("hash:",c.substring(c.length-20,c.length));a=openpgp_crypto_symmetricEncrypt(d,
|
||||
a,b,c,!1).substring(0,e.length+c.length);b=openpgp_packet.write_packet_header(18,a.length+1)+String.fromCharCode(1);this.encryptedData=a;return b+a};this.read_packet=function(a,b,c){this.packetLength=c;this.version=a[b].charCodeAt();if(1!=this.version)return util.print_error("openpgp.packet.encryptedintegrityprotecteddata.js\nunknown encrypted integrity protected data packet version: "+this.version+" , @ "+b+"hex:"+util.hexstrdump(a)),null;this.encryptedData=a.substring(b+1,b+1+c);util.print_debug("openpgp.packet.encryptedintegrityprotecteddata.js\n"+
|
||||
this.toString());return this};this.toString=function(){return"5.13. Sym. Encrypted Integrity Protected Data Packet (Tag 18)\n length: "+this.packetLength+"\n version: "+this.version+"\n data: Bytes ["+util.hexstrdump(this.encryptedData)+"]"};this.decrypt=function(a,b){this.decryptedData=openpgp_crypto_symmetricDecrypt(a,b,this.encryptedData,!1);this.hash=str_sha1(openpgp_crypto_MDCSystemBytes(a,b,this.encryptedData)+this.decryptedData.substring(0,this.decryptedData.length-20));util.print_debug_hexstr_dump("calc hash = ",
|
||||
this.hash);if(this.hash==this.decryptedData.substring(this.decryptedData.length-20,this.decryptedData.length))return this.decryptedData;util.print_error("Decryption stopped: discovered a modification of encrypted data.");return null}}
|
||||
this.toString());return this};this.toString=function(){var a="";openpgp.config.debug&&(a=" data: Bytes ["+util.hexstrdump(this.encryptedData)+"]");return"5.13. Sym. Encrypted Integrity Protected Data Packet (Tag 18)\n length: "+this.packetLength+"\n version: "+this.version+"\n"+a};this.decrypt=function(a,b){this.decryptedData=openpgp_crypto_symmetricDecrypt(a,b,this.encryptedData,!1);this.hash=str_sha1(openpgp_crypto_MDCSystemBytes(a,b,this.encryptedData)+this.decryptedData.substring(0,
|
||||
this.decryptedData.length-20));util.print_debug_hexstr_dump("calc hash = ",this.hash);if(this.hash==this.decryptedData.substring(this.decryptedData.length-20,this.decryptedData.length))return this.decryptedData;util.print_error("Decryption stopped: discovered a modification of encrypted data.");return null}}
|
||||
function openpgp_packet_modificationdetectioncode(){this.tagType=19;this.hash=null;this.read_packet=function(a,b,c){this.packetLength=c;if(20!=c)return util.print_error("openpgp.packet.modificationdetectioncode.js\ninvalid length for a modification detection code packet!"+c),null;this.hash=a.substring(b,b+20);return this};this.toString=function(){return"5.14 Modification detection code packet\n bytes ("+this.hash.length+"): ["+util.hexstrdump(this.hash)+"]"}}
|
||||
function openpgp_packet_userid(){this.tagType=13;this.certificationSignatures=[];this.certificationRevocationSignatures=[];this.revocationSignatures=[];this.parentNode=null;this.hasCertificationRevocationSignature=function(a){for(var b=0;b<this.certificationRevocationSignatures.length;b++)if(3==this.certificationRevocationSignatures[b].version&&this.certificationRevocationSignatures[b].keyId==a||4==this.certificationRevocationSignatures[b].version&&this.certificationRevocationSignatures[b].issuerKeyId==
|
||||
a)return this.certificationRevocationSignatures[b];return null};this.verifyCertificationSignatures=function(a){result=[];for(var b=0;b<this.certificationSignatures.length;b++)if(4==this.certificationSignatures[b].version)if(null!=this.certificationSignatures[b].signatureExpirationTime&&null!=this.certificationSignatures[b].signatureExpirationTime&&0!=this.certificationSignatures[b].signatureExpirationTime&&!this.certificationSignatures[b].signatureNeverExpires&&new Date(this.certificationSignatures[b].creationTime.getTime()+
|
||||
|
@ -345,16 +345,16 @@ BigInteger.prototype.multiply=bnMultiply;BigInteger.prototype.divide=bnDivide;Bi
|
|||
function openpgp_cfb_encrypt(a,b,c,d,e,f){var g=Array(d),h=Array(d),a=a+a.charAt(d-2)+a.charAt(d-1);util.print_debug("prefixrandom:"+util.hexstrdump(a));for(var k="",l=0;l<d;l++)g[l]=0;h=b(g,e);for(l=0;l<d;l++)k+=String.fromCharCode(h[l]^a.charCodeAt(l));for(l=0;l<d;l++)g[l]=k.charCodeAt(l);h=b(g,e);k+=String.fromCharCode(h[0]^a.charCodeAt(d));k+=String.fromCharCode(h[1]^a.charCodeAt(d+1));if(f)for(l=0;l<d;l++)g[l]=k.charCodeAt(l+2);else for(l=0;l<d;l++)g[l]=k.charCodeAt(l);h=b(g,e);if(f){for(l=0;l<
|
||||
d;l++)k+=String.fromCharCode(h[l]^c.charCodeAt(l));for(n=d+2;n<c.length;n+=d){for(l=0;l<d;l++)g[l]=k.charCodeAt(n+l);h=b(g,e);for(l=0;l<d;l++)k+=String.fromCharCode(h[l]^c.charCodeAt(n-2+l))}}else{c=" "+c;for(l=2;l<d;l++)k+=String.fromCharCode(h[l]^c.charCodeAt(l));a=k.substring(0,2*d).split("");k=k.substring(d);for(n=d;n<c.length;n+=d){for(l=0;l<d;l++)g[l]=k.charCodeAt(l);k="";h=b(g,e);for(l=0;l<d;l++)a.push(String.fromCharCode(h[l]^c.charCodeAt(n+l))),k+=String.fromCharCode(h[l]^c.charCodeAt(n+
|
||||
l))}k=a.join("")}return k}function openpgp_cfb_mdc(a,b,c,d){var e=Array(b),f=Array(b),g;for(g=0;g<b;g++)e[g]=0;e=a(e,c);for(g=0;g<b;g++)f[g]=d.charCodeAt(g),e[g]^=f[g];f=a(f,c);return util.bin2str(e)+String.fromCharCode(f[0]^d.charCodeAt(b))+String.fromCharCode(f[1]^d.charCodeAt(b+1))}
|
||||
function openpgp_cfb_decrypt(a,b,c,d,e){util.print_debug("resync:"+e);var f=Array(b),g=Array(b),h,k="";for(h=0;h<b;h++)f[h]=0;f=a(f,c);for(h=0;h<b;h++)g[h]=d.charCodeAt(h),f[h]^=g[h];g=a(g,c);util.print_debug("openpgp_cfb_decrypt:\niblock:"+util.hexidump(f)+"\nablock:"+util.hexidump(g)+"\n");util.print_debug((g[0]^d.charCodeAt(b)).toString(16)+(g[1]^d.charCodeAt(b+1)).toString(16));if(f[b-2]!=(g[0]^d.charCodeAt(b))||f[b-1]!=(g[1]^d.charCodeAt(b+1)))return util.print_eror("error duding decryption. Symmectric encrypted data not valid."),
|
||||
k;if(e){for(h=0;h<b;h++)f[h]=d.charCodeAt(h+2);e=b+2}else{for(h=0;h<b;h++)f[h]=d.charCodeAt(h);e=b}for(;e<d.length;e+=b){g=a(f,c);for(h=0;h<b&&h+e<d.length;h++)f[h]=d.charCodeAt(e+h),k+=String.fromCharCode(g[h]^f[h])}return k}function normal_cfb_encrypt(a,b,c,d,e){var f=0,g="";for(""[h]=e.substring(0,b);d.length>b*f;){blocka=d.substring(f*b,f*b+b);a("",c);for(var h=0;h<blocka.size;h++)""[h]=blocka^enblock();g+="";f++}return g}
|
||||
function normal_cfb_decrypt(a,b,c,d,e){var f="",g=0,h="";if(null==e)for(e=0;e<b;e++)f+=String.fromCharCode(0);else f=e.substring(0,b);for(;d.length>b*g;){for(var k=a(f,c),f=d.substring(g*b+0,g*b+b+0),e=0;e<f.length;e++)h+=String.fromCharCode(f.charCodeAt(e)^k[e]);g++}return h}
|
||||
function openpgp_cfb_decrypt(a,b,c,d,e){util.print_debug("resync:"+e);var f=Array(b),g=Array(b),h,k="",l=[];for(h=0;h<b;h++)f[h]=0;f=a(f,c);for(h=0;h<b;h++)g[h]=d.charCodeAt(h),f[h]^=g[h];g=a(g,c);util.print_debug("openpgp_cfb_decrypt:\niblock:"+util.hexidump(f)+"\nablock:"+util.hexidump(g)+"\n");util.print_debug((g[0]^d.charCodeAt(b)).toString(16)+(g[1]^d.charCodeAt(b+1)).toString(16));if(f[b-2]!=(g[0]^d.charCodeAt(b))||f[b-1]!=(g[1]^d.charCodeAt(b+1)))return util.print_eror("error duding decryption. Symmectric encrypted data not valid."),
|
||||
l.join("");if(e){for(h=0;h<b;h++)f[h]=d.charCodeAt(h+2);k=b+2}else{for(h=0;h<b;h++)f[h]=d.charCodeAt(h);k=b}for(;k<d.length;k+=b){g=a(f,c);for(h=0;h<b&&h+k<d.length;h++)f[h]=d.charCodeAt(k+h),l.push(String.fromCharCode(g[h]^f[h]))}return l.join("")}function normal_cfb_encrypt(a,b,c,d,e){var f=0,g="";for(""[h]=e.substring(0,b);d.length>b*f;){blocka=d.substring(f*b,f*b+b);a("",c);for(var h=0;h<blocka.size;h++)""[h]=blocka^enblock();g+="";f++}return g}
|
||||
function normal_cfb_decrypt(a,b,c,d,e){var f="",g=0,h=[];if(null==e)for(e=0;e<b;e++)f+=String.fromCharCode(0);else f=e.substring(0,b);for(;d.length>b*g;){for(var k=a(f,c),f=d.substring(g*b+0,g*b+b+0),e=0;e<f.length;e++)h.push(String.fromCharCode(f.charCodeAt(e)^k[e]));g++}return h.join("")}
|
||||
function openpgp_crypto_asymetricEncrypt(a,b,c){switch(a){case 1:case 2:case 3:var a=new RSA,d=b[0].toBigInteger(),b=b[1].toBigInteger(),c=c.toBigInteger();return a.encrypt(c,b,d).toMPI();case 16:var a=new Elgamal,d=b[0].toBigInteger(),e=b[1].toBigInteger(),b=b[2].toBigInteger(),c=c.toBigInteger();return a.encrypt(c,e,d,b);default:return null}}
|
||||
function openpgp_crypto_asymetricDecrypt(a,b,c,d){switch(a){case 1:case 2:case 3:var a=new RSA,e=c[0].toBigInteger(),b=c[1].toBigInteger(),f=c[2].toBigInteger(),c=c[3].toBigInteger(),d=d[0].toBigInteger();return a.decrypt(d,e,b,f,c);case 16:return a=new Elgamal,c=c[0].toBigInteger(),e=d[0].toBigInteger(),d=d[1].toBigInteger(),b=b[0].toBigInteger(),a.decrypt(e,d,b,c);default:return null}}
|
||||
function openpgp_crypto_symmetricEncrypt(a,b,c,d,e){switch(b){case 0:return d;case 2:return openpgp_cfb_encrypt(a,desede,d,8,c,e).substring(0,d.length+10);case 3:return openpgp_cfb_encrypt(a,cast5_encrypt,d,8,c,e).substring(0,d.length+10);case 4:return openpgp_cfb_encrypt(a,BFencrypt,d,8,c,e).substring(0,d.length+10);case 7:case 8:case 9:return openpgp_cfb_encrypt(a,AESencrypt,d,16,keyExpansion(c),e).substring(0,d.length+18);case 10:return openpgp_cfb_encrypt(a,TFencrypt,d,16,c,e).substring(0,d.length+
|
||||
18);case 1:return util.print_error("IDEA Algorithm not implemented"),null;default:return null}}function openpgp_crypto_getPrefixRandom(a){switch(a){case 2:case 3:case 4:return openpgp_crypto_getRandomBytes(8);case 7:case 8:case 9:case 10:return openpgp_crypto_getRandomBytes(16);default:return null}}
|
||||
function openpgp_crypto_symmetricDecrypt(a,b,c,d){util.print_debug("openpgp_crypto_symmetricDecrypt:\nalgo:"+a+"\nencrypteddata:"+util.hexstrdump(c));var e=0;d||(e=2);switch(a){case 0:return c;case 2:return openpgp_cfb_decrypt(desede,8,b,c,d).substring(e,c.length+e-10);case 3:return openpgp_cfb_decrypt(cast5_encrypt,8,b,c,d).substring(e,c.length+e-10);case 4:return openpgp_cfb_decrypt(BFencrypt,8,b,c,d).substring(e,c.length+e-10);case 7:case 8:case 9:return openpgp_cfb_decrypt(AESencrypt,16,keyExpansion(b),
|
||||
function openpgp_crypto_symmetricDecrypt(a,b,c,d){util.print_debug_hexstr_dump("openpgp_crypto_symmetricDecrypt:\nalgo:"+a+"\nencrypteddata:",c);var e=0;d||(e=2);switch(a){case 0:return c;case 2:return openpgp_cfb_decrypt(desede,8,b,c,d).substring(e,c.length+e-10);case 3:return openpgp_cfb_decrypt(cast5_encrypt,8,b,c,d).substring(e,c.length+e-10);case 4:return openpgp_cfb_decrypt(BFencrypt,8,b,c,d).substring(e,c.length+e-10);case 7:case 8:case 9:return openpgp_cfb_decrypt(AESencrypt,16,keyExpansion(b),
|
||||
c,d).substring(e,c.length+e-18);case 10:return openpgp_cfb_decrypt(TFencrypt,16,b,c,d).substring(e,c.length+e-18);case 1:util.print_error(""+(1==a?"IDEA Algorithm not implemented":"Twofish Algorithm not implemented"))}return null}
|
||||
function openpgp_crypto_MDCSystemBytes(a,b,c){util.print_debug("openpgp_crypto_symmetricDecrypt:\nencrypteddata:"+util.hexstrdump(c));switch(a){case 0:return c;case 2:return openpgp_cfb_mdc(desede,8,b,c,openpgp_cfb);case 3:return openpgp_cfb_mdc(cast5_encrypt,8,b,c);case 4:return openpgp_cfb_mdc(BFencrypt,8,b,c);case 7:case 8:case 9:return openpgp_cfb_mdc(AESencrypt,16,keyExpansion(b),c);case 10:return openpgp_cfb_mdc(TFencrypt,16,b,c);case 1:util.print_error(""+(1==a?"IDEA Algorithm not implemented":
|
||||
function openpgp_crypto_MDCSystemBytes(a,b,c){util.print_debug_hexstr_dump("openpgp_crypto_symmetricDecrypt:\nencrypteddata:",c);switch(a){case 0:return c;case 2:return openpgp_cfb_mdc(desede,8,b,c,openpgp_cfb);case 3:return openpgp_cfb_mdc(cast5_encrypt,8,b,c);case 4:return openpgp_cfb_mdc(BFencrypt,8,b,c);case 7:case 8:case 9:return openpgp_cfb_mdc(AESencrypt,16,keyExpansion(b),c);case 10:return openpgp_cfb_mdc(TFencrypt,16,b,c);case 1:util.print_error(""+(1==a?"IDEA Algorithm not implemented":
|
||||
"Twofish Algorithm not implemented"))}return null}function openpgp_crypto_generateSessionKey(a){switch(a){case 2:case 8:return openpgp_crypto_getRandomBytes(24);case 3:case 4:case 7:return util.print_debug("length = 16:\n"+util.hexstrdump(openpgp_crypto_getRandomBytes(16))),openpgp_crypto_getRandomBytes(16);case 9:case 10:return openpgp_crypto_getRandomBytes(32)}return null}
|
||||
function openpgp_crypto_verifySignature(a,b,c,d,e){var f=openpgp_crypto_hashData(b,e);switch(a){case 1:case 2:case 3:e=new RSA;a=d[0].toBigInteger();d=d[1].toBigInteger();c=c[0].toBigInteger();d=e.verify(c,d,a);b=openpgp_encoding_emsa_pkcs1_decode(b,d.toMPI().substring(2));return-1==b?(util.print_error("PKCS1 padding in message or key incorrect. Aborting..."),!1):b==f;case 16:return util.print_error("signing with Elgamal is not defined in the OpenPGP standard."),null;case 17:var a=new DSA,f=c[0].toBigInteger(),
|
||||
c=c[1].toBigInteger(),g=d[0].toBigInteger(),h=d[1].toBigInteger(),k=d[2].toBigInteger(),d=d[3].toBigInteger(),d=a.verify(b,f,c,e,g,h,k,d);return 0==d.compareTo(f);default:return null}}
|
||||
|
@ -417,8 +417,8 @@ var crc_table=[0,8801531,25875725,17603062,60024545,51751450,35206124,44007191,1
|
|||
1382365165,1399434779,1408230112,1366334967,1375129868,1358579962,1350304769,1430452783,1438955220,1422405410,1414423513,1456544974,1448562741,1465633219,1474135352];
|
||||
function createcrc24(a){for(var b=11994318,c=0;16<a.length-c;)b=b<<8^crc_table[(b>>16^a.charCodeAt(c))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+1))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+2))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+3))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+4))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+5))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+6))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+7))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+8))&255],b=b<<8^crc_table[(b>>
|
||||
16^a.charCodeAt(c+9))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+10))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+11))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+12))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+13))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+14))&255],b=b<<8^crc_table[(b>>16^a.charCodeAt(c+15))&255],c+=16;for(var d=c;d<a.length;d++)b=b<<8^crc_table[(b>>16^a.charCodeAt(c++))&255];return b&16777215}
|
||||
function openpgp_msg_message(){this.text="";this.decrypt=function(a,b){if(null==a||null==b||""==b)return null;var c=b.decrypt(this,a.keymaterial);if(null==c)return null;var d,e=0,f=c.length;for(util.print_debug("openpgp.msg.messge decrypt:\n"+util.hexstrdump(c));e!=c.length&&null!=(d=openpgp_packet.read_packet(c,e,f));){if(8==d.tagType)this.text=d.decompress(),c=d.decompress();util.print_debug(d.toString());e+=d.headerLength+d.packetLength;38<e&&util.print_debug("openpgp.msg.messge decrypt:\n"+util.hexstrdump(c.substring(e)));
|
||||
f=c.length-e;if(11==d.tagType)this.text=d.data,util.print_info("message successfully decrypted");if(19!=d.tagType&&2==d.tagType&&3>d.signatureType){var g=openpgp.keyring.getPublicKeysForKeyId(d.issuerKeyId);0==g.length?util.print_warning("Unable to verify signature of issuer: "+util.hexstrdump(d.issuerKeyId)+". Public key not found in keyring."):d.verify(this.text.replace(/\r\n/g,"\n").replace(/\n/g,"\r\n"),g[0])&&g[0].obj.validate()?util.print_info("Found Good Signature from "+g[0].obj.userIds[0].text+
|
||||
function openpgp_msg_message(){this.text="";this.decrypt=function(a,b){if(null==a||null==b||""==b)return null;var c=b.decrypt(this,a.keymaterial);if(null==c)return null;var d,e=0,f=c.length;for(util.print_debug_hexstr_dump("openpgp.msg.messge decrypt:\n",c);e!=c.length&&null!=(d=openpgp_packet.read_packet(c,e,f));){if(8==d.tagType)this.text=d.decompress(),c=d.decompress();util.print_debug(d.toString());e+=d.headerLength+d.packetLength;38<e&&util.print_debug_hexstr_dump("openpgp.msg.messge decrypt:\n",
|
||||
c.substring(e));f=c.length-e;if(11==d.tagType)this.text=d.data,util.print_info("message successfully decrypted");if(19!=d.tagType&&2==d.tagType&&3>d.signatureType){var g=openpgp.keyring.getPublicKeysForKeyId(d.issuerKeyId);0==g.length?util.print_warning("Unable to verify signature of issuer: "+util.hexstrdump(d.issuerKeyId)+". Public key not found in keyring."):d.verify(this.text.replace(/\r\n/g,"\n").replace(/\n/g,"\r\n"),g[0])&&g[0].obj.validate()?util.print_info("Found Good Signature from "+g[0].obj.userIds[0].text+
|
||||
" (0x"+util.hexstrdump(g[0].obj.getKeyId()).substring(8)+")"):util.print_error("Signature verification failed: Bad Signature from "+g[0].obj.userIds[0].text+" (0x"+util.hexstrdump(g[0].obj.getKeyId()).substring(8)+")")}}if(""==this.text)this.text=c;return this.text};this.verifySignature=function(){var a=!1;if(2==this.type){var b;if(4==this.signature.version)b=openpgp.keyring.getPublicKeysForKeyId(this.signature.issuerKeyId);else if(3==this.signature.version)b=openpgp.keyring.getPublicKeysForKeyId(this.signature.keyId);
|
||||
else return util.print_error("unknown signature type on message!"),!1;if(0==b.length)util.print_warning("Unable to verify signature of issuer: "+util.hexstrdump(this.signature.issuerKeyId)+". Public key not found in keyring.");else for(var c=0;c<b.length;c++){var d=this.text.replace(/\r\n/g,"\n").replace(/\n/g,"\r\n");this.signature.verify(d.substring(0,d.length-2),b[c])?(util.print_info("Found Good Signature from "+b[c].obj.userIds[c].text+" (0x"+util.hexstrdump(b[c].obj.getKeyId()).substring(8)+
|
||||
")"),a=!0):util.print_error("Signature verification failed: Bad Signature from "+b[c].obj.userIds[0].text+" (0x"+util.hexstrdump(b[0].obj.getKeyId()).substring(8)+")")}}return a};this.toString=function(){var a="Session Keys:\n";if(null!=this.sessionKeys)for(var b=0;b<this.sessionKeys.length;b++)a+=this.sessionKeys[b].toString();a+="\n\n EncryptedData:\n";null!=this.encryptedData&&(a+=this.encryptedData.toString());a+="\n\n Signature:\n";null!=this.signature&&(a+=this.signature.toString());a+="\n\n Text:\n";
|
||||
|
|
Loading…
Reference in New Issue
Block a user