From 0e088aec28b4b59600df9ab48651847e5af7834a Mon Sep 17 00:00:00 2001 From: larabr Date: Tue, 8 Jun 2021 18:12:48 +0200 Subject: [PATCH] Fix various signature verification issues (#1302) - Throw on signature parsing (e.g. in `openpgp.readSignature`) if the creation time subpacket is missing - `SignaturePacket.verify` now directly checks for signature creation and expiration times. This makes it easier to thoroughly check the validity of signatures. Also: - `openpgp.revokeKey` now takes a `date` to check the provided revocation certificate - `openpgp.decryptSessionKeys` now takes a `date` to check the validity of the provided private keys - whenever a `date` is used internally, the function accepts a `date` param to allow passing the correct date - Add tests for all of the above - Like `openpgp.generateKey`, `openpgp.reformatKey` now also requires `options.userIDs` - Simplify calling `SubKey.isRevoked/update/getExpirationTime` by adding the `SubKey.mainKey` field to hold the reference of the corresponding `Key` Breaking changes in low-level functions: - Added/removed `date` params: - `Key.update(key, config)` -> `update(key, date, config)` - `Key.applyRevocationCertificate(revocationCertificate, config)` -> `applyRevocationCertificate(revocationCertificate, date, config)` - `Key.signAllUsers(privateKeys, config)` -> `signAllUsers(privateKeys, date, config)` - `Key.verifyAllUsers(keys, config)` -> `verifyAllUsers(keys, date, config)` - `new SignaturePacket(date)` -> `new SignaturePacket()` - `SignaturePacket.sign(key, data, detached)` -> `sign(key, data, date, detached)` - `Message.sign(primaryKey, privateKeys, config)` -> `sign(primaryKey, privateKeys, date, config)` - `Message.decrypt(privateKeys, passwords, sessionKeys, config)` -> `decrypt(privateKeys, passwords, sessionKeys, date, config)` - `Message.decryptSessionKeys(privateKeys, passwords, config)` -> `decryptSessionKeys(privateKeys, passwords, date, config)` - Removed `primaryKey` params: - `SubKey.isRevoked(primaryKey, signature, key, date, config)` -> `isRevoked(signature, key, date, config)` - `SubKey.update(subKey, primaryKey, date, config)` -> `update(subKey, date, config)` - `SubKey.getExpirationTime(primaryKey, date, config)` -> `getExpirationTime(date, config)` --- openpgp.d.ts | 22 +- src/key/factory.js | 6 +- src/key/helper.js | 70 ++--- src/key/key.js | 85 +++--- src/key/private_key.js | 8 +- src/key/subkey.js | 50 +-- src/key/user.js | 34 +-- src/message.js | 57 ++-- src/openpgp.js | 17 +- src/packet/signature.js | 195 ++++++------ test/general/ecc_secp256k1.js | 2 +- test/general/key.js | 183 +++++------ test/general/openpgp.js | 254 +++++++++++---- test/general/packet.js | 6 +- test/general/signature.js | 559 +++++++++++++++------------------- test/general/x25519.js | 55 ++-- 16 files changed, 828 insertions(+), 775 deletions(-) diff --git a/openpgp.d.ts b/openpgp.d.ts index 13957841..a2a82e87 100644 --- a/openpgp.d.ts +++ b/openpgp.d.ts @@ -24,7 +24,6 @@ export function encryptKey(options: { privateKey: PrivateKey; passphrase?: strin export function reformatKey(options: { privateKey: PrivateKey; userIDs?: UserID|UserID[]; passphrase?: string; keyExpirationTime?: number; config?: PartialConfig }): Promise; export abstract class Key { - private primaryKey: PublicKeyPacket | SecretKeyPacket; private keyPacket: PublicKeyPacket | SecretKeyPacket; public subKeys: SubKey[]; public users: User[]; @@ -38,12 +37,12 @@ export abstract class Key { public isPrivate(): boolean; public isPublic(): boolean; public toPublic(): PublicKey; - public update(sourceKey: PublicKey, config?: Config): Promise; + public update(sourceKey: PublicKey, date?: Date, config?: Config): Promise; public signPrimaryUser(privateKeys: PrivateKey[], date?: Date, userID?: UserID, config?: Config): Promise - public signAllUsers(privateKeys: PrivateKey[], config?: Config): Promise + public signAllUsers(privateKeys: PrivateKey[], date?: Date, config?: Config): Promise public verifyPrimaryKey(date?: Date, userID?: UserID, config?: Config): Promise; // throws on error public verifyPrimaryUser(publicKeys: PublicKey[], date?: Date, userIDs?: UserID, config?: Config): Promise<{ keyID: KeyID, valid: boolean | null }[]>; - public verifyAllUsers(publicKeys: PublicKey[], config?: Config): Promise<{ userID: string, keyID: KeyID, valid: boolean | null }[]>; + public verifyAllUsers(publicKeys: PublicKey[], date?: Date, config?: Config): Promise<{ userID: string, keyID: KeyID, valid: boolean | null }[]>; public isRevoked(signature: SignaturePacket, key?: AnyKeyPacket, date?: Date, config?: Config): Promise; public getRevocationCertificate(date?: Date, config?: Config): Promise | string | undefined>; public getEncryptionKey(keyID?: KeyID, date?: Date | null, userID?: UserID, config?: Config): Promise; @@ -68,16 +67,17 @@ export class PrivateKey extends PublicKey { public isDecrypted(): boolean; public addSubkey(options: SubKeyOptions): Promise; public getDecryptionKeys(keyID?: KeyID, date?: Date | null, userID?: UserID, config?: Config): Promise - public update(sourceKey: PublicKey, config?: Config): Promise; + public update(sourceKey: PublicKey, date?: Date, config?: Config): Promise; public getKeys(keyID?: KeyID): (PrivateKey | SubKey)[]; } export class SubKey { - constructor(subKeyPacket: SecretSubkeyPacket | PublicSubkeyPacket); + constructor(subKeyPacket: SecretSubkeyPacket | PublicSubkeyPacket, mainKey: PublicKey); private keyPacket: SecretSubkeyPacket | PublicSubkeyPacket; + private mainKey: PublicKey; public bindingSignatures: SignaturePacket[]; public revocationSignatures: SignaturePacket[]; - public verify(primaryKey: PublicKeyPacket | SecretKeyPacket, date?: Date, config?: Config): Promise; + public verify(date?: Date, config?: Config): Promise; public isDecrypted(): boolean; public getFingerprint(): string; public getCreationTime(): Date; @@ -230,7 +230,7 @@ export class Message> { /** Decrypt the message @param decryptionKeys array of private keys with decrypted secret data */ - public decrypt(decryptionKeys?: PrivateKey[], passwords?: string[], sessionKeys?: SessionKey[], config?: Config): Promise>>; + public decrypt(decryptionKeys?: PrivateKey[], passwords?: string[], sessionKeys?: SessionKey[], date?: Date, config?: Config): Promise>>; /** Encrypt the message @param encryptionKeys array of public keys, used to encrypt the message @@ -444,7 +444,7 @@ export class SignaturePacket extends BasePacket { public signatureData: null | Uint8Array; public unhashedSubpackets: null | Uint8Array; public signedHashValue: null | Uint8Array; - public created: Date; + public created: Date | null; public signatureExpirationTime: null | number; public signatureNeverExpires: boolean; public exportable: null | boolean; @@ -480,8 +480,8 @@ export class SignaturePacket extends BasePacket { public preferredAEADAlgorithms: enums.aead[] | null; public verified: null | boolean; public revoked: null | boolean; - public sign(key: AnySecretKeyPacket, data: Uint8Array, detached?: boolean): Promise; - public verify(key: AnyKeyPacket, signatureType: enums.signature, data: Uint8Array, detached?: boolean, config?: Config): Promise; // throws on error + public sign(key: AnySecretKeyPacket, data: Uint8Array, date?: Date, detached?: boolean): Promise; + public verify(key: AnyKeyPacket, signatureType: enums.signature, data: Uint8Array, date?: Date, detached?: boolean, config?: Config): Promise; // throws on error public isExpired(date?: Date): boolean; public getExpirationTime(): Date | typeof Infinity; } diff --git a/src/key/factory.js b/src/key/factory.js index fab001a2..3c71ec47 100644 --- a/src/key/factory.js +++ b/src/key/factory.js @@ -94,7 +94,7 @@ export async function reformat(options, config) { throw new Error('Cannot reformat a public key'); } - if (privateKey.primaryKey.isDummy()) { + if (privateKey.keyPacket.isDummy()) { throw new Error('Cannot reformat a gnu-dummy primary key'); } @@ -162,7 +162,7 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options, conf const dataToSign = {}; dataToSign.userID = userIDPacket; dataToSign.key = secretKeyPacket; - const signaturePacket = new SignaturePacket(options.date); + const signaturePacket = new SignaturePacket(); signaturePacket.signatureType = enums.signature.certGeneric; signaturePacket.publicKeyAlgorithm = secretKeyPacket.algorithm; signaturePacket.hashAlgorithm = await helper.getPreferredHashAlgo(null, secretKeyPacket, undefined, undefined, config); @@ -205,7 +205,7 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options, conf signaturePacket.keyExpirationTime = options.keyExpirationTime; signaturePacket.keyNeverExpires = false; } - await signaturePacket.sign(secretKeyPacket, dataToSign); + await signaturePacket.sign(secretKeyPacket, dataToSign, options.date); return { userIDPacket, signaturePacket }; })).then(list => { diff --git a/src/key/helper.js b/src/key/helper.js index 8e57e186..5d62f4d5 100644 --- a/src/key/helper.js +++ b/src/key/helper.js @@ -37,45 +37,42 @@ export async function generateSecretKey(options, config) { /** * Returns the valid and non-expired signature that has the latest creation date, while ignoring signatures created in the future. * @param {Array} signatures - List of signatures + * @param {PublicKeyPacket|PublicSubkeyPacket} publicKey - Public key packet to verify the signature * @param {Date} date - Use the given date instead of the current time * @param {Object} config - full configuration * @returns {Promise} The latest valid signature. * @async */ -export async function getLatestValidSignature(signatures, primaryKey, signatureType, dataToVerify, date = new Date(), config) { - let signature; +export async function getLatestValidSignature(signatures, publicKey, signatureType, dataToVerify, date = new Date(), config) { + let latestValid; let exception; for (let i = signatures.length - 1; i >= 0; i--) { try { if ( - (!signature || signatures[i].created >= signature.created) && - // check binding signature is not expired (ie, check for V4 expiration time) - !signatures[i].isExpired(date) + (!latestValid || signatures[i].created >= latestValid.created) ) { - // check binding signature is verified - signatures[i].verified || await signatures[i].verify(primaryKey, signatureType, dataToVerify, undefined, config); - signature = signatures[i]; + await signatures[i].verify(publicKey, signatureType, dataToVerify, date, undefined, config); + latestValid = signatures[i]; } } catch (e) { exception = e; } } - if (!signature) { + if (!latestValid) { throw util.wrapError( - `Could not find valid ${enums.read(enums.signature, signatureType)} signature in key ${primaryKey.getKeyID().toHex()}` + `Could not find valid ${enums.read(enums.signature, signatureType)} signature in key ${publicKey.getKeyID().toHex()}` .replace('certGeneric ', 'self-') .replace(/([a-z])([A-Z])/g, (_, $1, $2) => $1 + ' ' + $2.toLowerCase()) , exception); } - return signature; + return latestValid; } export function isDataExpired(keyPacket, signature, date = new Date()) { const normDate = util.normalizeDate(date); if (normDate !== null) { - const expirationTime = getExpirationTime(keyPacket, signature); - return !(keyPacket.created <= normDate && normDate <= expirationTime) || - (signature && signature.isExpired(date)); + const expirationTime = getKeyExpirationTime(keyPacket, signature); + return !(keyPacket.created <= normDate && normDate <= expirationTime); } return false; } @@ -91,7 +88,7 @@ export async function createBindingSignature(subkey, primaryKey, options, config const dataToSign = {}; dataToSign.key = primaryKey; dataToSign.bind = subkey; - const subkeySignaturePacket = new SignaturePacket(options.date); + const subkeySignaturePacket = new SignaturePacket(); subkeySignaturePacket.signatureType = enums.signature.subkeyBinding; subkeySignaturePacket.publicKeyAlgorithm = primaryKey.algorithm; subkeySignaturePacket.hashAlgorithm = await getPreferredHashAlgo(null, subkey, undefined, undefined, config); @@ -107,7 +104,7 @@ export async function createBindingSignature(subkey, primaryKey, options, config subkeySignaturePacket.keyExpirationTime = options.keyExpirationTime; subkeySignaturePacket.keyNeverExpires = false; } - await subkeySignaturePacket.sign(primaryKey, dataToSign); + await subkeySignaturePacket.sign(primaryKey, dataToSign, options.date); return subkeySignaturePacket; } @@ -189,6 +186,7 @@ export async function getPreferredAlgo(type, keys = [], date = new Date(), userI /** * Create signature packet * @param {Object} dataToSign - Contains packets to be signed + * @param {PrivateKey} privateKey - key to get preferences from * @param {SecretKeyPacket| * SecretSubkeyPacket} signingKeyPacket secret key packet for signing * @param {Object} [signatureProperties] - Properties to write on the signature packet before signing @@ -205,11 +203,11 @@ export async function createSignaturePacket(dataToSign, privateKey, signingKeyPa if (!signingKeyPacket.isDecrypted()) { throw new Error('Private key is not decrypted.'); } - const signaturePacket = new SignaturePacket(date); + const signaturePacket = new SignaturePacket(); Object.assign(signaturePacket, signatureProperties); signaturePacket.publicKeyAlgorithm = signingKeyPacket.algorithm; signaturePacket.hashAlgorithm = await getPreferredHashAlgo(privateKey, signingKeyPacket, date, userID, config); - await signaturePacket.sign(signingKeyPacket, dataToSign, detached); + await signaturePacket.sign(signingKeyPacket, dataToSign, date, detached); return signaturePacket; } @@ -218,16 +216,17 @@ export async function createSignaturePacket(dataToSign, privateKey, signingKeyPa * @param {Object} source * @param {Object} dest * @param {String} attr - * @param {Function} checkFn - optional, signature only merged if true + * @param {Date} [date] - date to use for signature expiration check, instead of the current time + * @param {(SignaturePacket) => Boolean} [checkFn] - signature only merged if true */ -export async function mergeSignatures(source, dest, attr, checkFn) { +export async function mergeSignatures(source, dest, attr, date = new Date(), checkFn) { source = source[attr]; if (source) { if (!dest[attr].length) { dest[attr] = source; } else { await Promise.all(source.map(async function(sourceSig) { - if (!sourceSig.isExpired() && (!checkFn || await checkFn(sourceSig)) && + if (!sourceSig.isExpired(date) && (!checkFn || await checkFn(sourceSig)) && !dest[attr].some(function(destSig) { return util.equalsUint8Array(destSig.writeParams(), sourceSig.writeParams()); })) { @@ -256,7 +255,6 @@ export async function mergeSignatures(source, dest, attr, checkFn) { */ export async function isDataRevoked(primaryKey, signatureType, dataToVerify, revocations, signature, key, date = new Date(), config) { key = key || primaryKey; - const normDate = util.normalizeDate(date); const revocationKeyIDs = []; await Promise.all(revocations.map(async function(revocationSignature) { try { @@ -269,10 +267,11 @@ export async function isDataRevoked(primaryKey, signatureType, dataToVerify, rev // third-party revocation signatures here. (It could also be revoking a // third-party key certification, which should only affect // `verifyAllCertifications`.) - (!signature || revocationSignature.issuerKeyID.equals(signature.issuerKeyID)) && - !(config.revocationsExpire && revocationSignature.isExpired(normDate)) + !signature || revocationSignature.issuerKeyID.equals(signature.issuerKeyID) ) { - revocationSignature.verified || await revocationSignature.verify(key, signatureType, dataToVerify, undefined, config); + await revocationSignature.verify( + key, signatureType, dataToVerify, config.revocationsExpire ? date : null, false, config + ); // TODO get an identifier of the revoked object instead revocationKeyIDs.push(revocationSignature.issuerKeyID); @@ -288,7 +287,14 @@ export async function isDataRevoked(primaryKey, signatureType, dataToVerify, rev return revocationKeyIDs.length > 0; } -export function getExpirationTime(keyPacket, signature) { +/** + * Returns key expiration time based on the given certification signature. + * The expiration time of the signature is ignored. + * @param {PublicSubkeyPacket|PublicKeyPacket} keyPacket - key to check + * @param {SignaturePacket} signature - signature to process + * @returns {Date|Infinity} expiration time or infinity if the key does not expire + */ +export function getKeyExpirationTime(keyPacket, signature) { let expirationTime; // check V4 expiration time if (signature.keyNeverExpires === false) { @@ -355,10 +361,6 @@ export function sanitizeKeyOptions(options, subkeyDefaults = {}) { } export function isValidSigningKeyPacket(keyPacket, signature) { - if (!signature.verified || signature.revoked !== false) { // Sanity check - throw new Error('Signature not verified'); - } - const keyAlgo = enums.write(enums.publicKey, keyPacket.algorithm); return keyAlgo !== enums.publicKey.rsaEncrypt && keyAlgo !== enums.publicKey.elgamal && @@ -368,10 +370,6 @@ export function isValidSigningKeyPacket(keyPacket, signature) { } export function isValidEncryptionKeyPacket(keyPacket, signature) { - if (!signature.verified || signature.revoked !== false) { // Sanity check - throw new Error('Signature not verified'); - } - const keyAlgo = enums.write(enums.publicKey, keyPacket.algorithm); return keyAlgo !== enums.publicKey.dsa && keyAlgo !== enums.publicKey.rsaSign && @@ -383,10 +381,6 @@ export function isValidEncryptionKeyPacket(keyPacket, signature) { } export function isValidDecryptionKeyPacket(signature, config) { - if (!signature.verified) { // Sanity check - throw new Error('Signature not verified'); - } - if (config.allowInsecureDecryptionWithSigningKeys) { // This is only relevant for RSA keys, all other signing algorithms cannot decrypt return true; diff --git a/src/key/key.js b/src/key/key.js index ddaf0a8d..29828f0f 100644 --- a/src/key/key.js +++ b/src/key/key.js @@ -42,10 +42,6 @@ const allowedRevocationPackets = /*#__PURE__*/ util.constructAllowedPackets([Sig * @borrows PublicKeyPacket#getCreationTime as Key#getCreationTime */ class Key { - get primaryKey() { - return this.keyPacket; - } - /** * Transforms packetlist to structured key data * @param {PacketList} packetlist - The packets that form a key @@ -80,7 +76,7 @@ class Key { case enums.packet.publicSubkey: case enums.packet.secretSubkey: user = null; - subKey = new SubKey(packet); + subKey = new SubKey(packet, this); this.subKeys.push(subKey); break; case enums.packet.signature: @@ -227,10 +223,10 @@ class Key { /** * Returns last created key or key by given keyID that is available for signing and verification - * @param {module:type/keyid~KeyID} keyID, optional - * @param {Date} [date] - Use the given date for verification instead of the current time - * @param {Object} userID, optional user ID - * @param {Object} [config] - Full configuration, defaults to openpgp.config + * @param {module:type/keyid~KeyID} [keyID] - key ID of a specific key to retrieve + * @param {Date} [date] - use the fiven date date to to check key validity instead of the current date + * @param {Object} [userID] - filter keys for the given user ID + * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} signing key * @throws if no valid signing key was found * @async @@ -243,7 +239,7 @@ class Key { for (const subKey of subKeys) { if (!keyID || subKey.getKeyID().equals(keyID)) { try { - await subKey.verify(primaryKey, date, config); + await subKey.verify(date, config); const dataToVerify = { key: primaryKey, bind: subKey.keyPacket }; const bindingSignature = await helper.getLatestValidSignature( subKey.bindingSignatures, primaryKey, enums.signature.subkeyBinding, dataToVerify, date, config @@ -281,10 +277,10 @@ class Key { /** * Returns last created key or key by given keyID that is available for encryption or decryption - * @param {module:type/keyid~KeyID} keyID, optional - * @param {Date} date, optional - * @param {String} userID, optional - * @param {Object} [config] - Full configuration, defaults to openpgp.config + * @param {module:type/keyid~KeyID} [keyID] - key ID of a specific key to retrieve + * @param {Date} [date] - use the fiven date date to to check key validity instead of the current date + * @param {Object} [userID] - filter keys for the given user ID + * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} encryption key * @throws if no valid encryption key was found * @async @@ -298,7 +294,7 @@ class Key { for (const subKey of subKeys) { if (!keyID || subKey.getKeyID().equals(keyID)) { try { - await subKey.verify(primaryKey, date, config); + await subKey.verify(date, config); const dataToVerify = { key: primaryKey, bind: subKey.keyPacket }; const bindingSignature = await helper.getLatestValidSignature(subKey.bindingSignatures, primaryKey, enums.signature.subkeyBinding, dataToVerify, date, config); if (helper.isValidEncryptionKeyPacket(subKey.keyPacket, bindingSignature)) { @@ -332,7 +328,7 @@ class Key { * SecretSubkeyPacket| * PublicKeyPacket| * SecretKeyPacket} key, optional The key to verify the signature - * @param {Date} date - Use the given date instead of the current time + * @param {Date} [date] - Use the given date for verification, instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} True if the certificate is revoked. * @async @@ -360,7 +356,7 @@ class Key { } // check for valid, unrevoked, unexpired self signature const { selfCertification } = await this.getPrimaryUser(date, userID, config); - // check for expiration time + // check for expiration time in binding signatures if (helper.isDataExpired(primaryKey, selfCertification, date)) { throw new Error('Primary key is expired'); } @@ -371,17 +367,17 @@ class Key { * When `capabilities` is null, defaults to returning the expiry date of the primary key. * Returns null if `capabilities` is passed and the key does not have the specified capabilities or is revoked or invalid. * Returns Infinity if the key doesn't expire. - * @param {encrypt|sign|encrypt_sign} capabilities, optional - * @param {module:type/keyid~KeyID} keyID, optional - * @param {Object} userID, optional user ID - * @param {Object} [config] - Full configuration, defaults to openpgp.config + * @param {encrypt|sign|encrypt_sign} [capabilities] - capabilities to look up + * @param {module:type/keyid~KeyID} [keyID] - key ID of the specific key to check + * @param {Object} [userID] - User ID to consider instead of the primary user + * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} * @async */ async getExpirationTime(capabilities, keyID, userID, config = defaultConfig) { const primaryUser = await this.getPrimaryUser(null, userID, config); const selfCert = primaryUser.selfCertification; - const keyExpiry = helper.getExpirationTime(this.keyPacket, selfCert); + const keyExpiry = helper.getKeyExpirationTime(this.keyPacket, selfCert); const sigExpiry = selfCert.getExpirationTime(); let expiry = keyExpiry < sigExpiry ? keyExpiry : sigExpiry; if (capabilities === 'encrypt' || capabilities === 'encrypt_sign') { @@ -389,7 +385,7 @@ class Key { await this.getEncryptionKey(keyID, expiry, userID, { ...config, rejectPublicKeyAlgorithms: new Set(), minRSABits: 0 }).catch(() => {}) || await this.getEncryptionKey(keyID, null, userID, { ...config, rejectPublicKeyAlgorithms: new Set(), minRSABits: 0 }).catch(() => {}); if (!encryptKey) return null; - const encryptExpiry = await encryptKey.getExpirationTime(this.keyPacket, undefined, config); + const encryptExpiry = await encryptKey.getExpirationTime(null, config); if (encryptExpiry < expiry) expiry = encryptExpiry; } if (capabilities === 'sign' || capabilities === 'encrypt_sign') { @@ -397,7 +393,7 @@ class Key { await this.getSigningKey(keyID, expiry, userID, { ...config, rejectPublicKeyAlgorithms: new Set(), minRSABits: 0 }).catch(() => {}) || await this.getSigningKey(keyID, null, userID, { ...config, rejectPublicKeyAlgorithms: new Set(), minRSABits: 0 }).catch(() => {}); if (!signKey) return null; - const signExpiry = await signKey.getExpirationTime(this.keyPacket, undefined, config); + const signExpiry = await signKey.getExpirationTime(null, config); if (signExpiry < expiry) expiry = signExpiry; } return expiry; @@ -467,11 +463,12 @@ class Key { * If the source key is a private key and the destination key is public, * a private key is returned. * @param {Key} sourceKey - Source key to merge + * @param {Date} [date] - Date to verify validity of signatures and keys * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} updated key * @async */ - async update(sourceKey, config = defaultConfig) { + async update(sourceKey, date = new Date(), config = defaultConfig) { if (!this.hasSameFingerprintAs(sourceKey)) { throw new Error('Primary key fingerprints must be equal to update the key'); } @@ -495,11 +492,11 @@ class Key { // hence we don't need to convert the destination key type const updatedKey = this.clone(); // revocation signatures - await helper.mergeSignatures(sourceKey, updatedKey, 'revocationSignatures', srcRevSig => { - return helper.isDataRevoked(updatedKey.keyPacket, enums.signature.keyRevocation, updatedKey, [srcRevSig], null, sourceKey.keyPacket, undefined, config); + await helper.mergeSignatures(sourceKey, updatedKey, 'revocationSignatures', date, srcRevSig => { + return helper.isDataRevoked(updatedKey.keyPacket, enums.signature.keyRevocation, updatedKey, [srcRevSig], null, sourceKey.keyPacket, date, config); }); // direct signatures - await helper.mergeSignatures(sourceKey, updatedKey, 'directSignatures'); + await helper.mergeSignatures(sourceKey, updatedKey, 'directSignatures', date); // update users await Promise.all(sourceKey.users.map(async srcUser => { // multiple users with the same ID/attribute are not explicitly disallowed by the spec @@ -510,7 +507,7 @@ class Key { )); if (usersToUpdate.length > 0) { await Promise.all( - usersToUpdate.map(userToUpdate => userToUpdate.update(srcUser, updatedKey.keyPacket, config)) + usersToUpdate.map(userToUpdate => userToUpdate.update(srcUser, updatedKey.keyPacket, date, config)) ); } else { updatedKey.users.push(srcUser); @@ -524,7 +521,7 @@ class Key { )); if (subkeysToUpdate.length > 0) { await Promise.all( - subkeysToUpdate.map(subkeyToUpdate => subkeyToUpdate.update(srcSubkey, updatedKey.keyPacket, config)) + subkeysToUpdate.map(subkeyToUpdate => subkeyToUpdate.update(srcSubkey, date, config)) ); } else { updatedKey.subKeys.push(srcSubkey); @@ -555,11 +552,12 @@ class Key { * This adds the first signature packet in the armored text to the key, * if it is a valid revocation signature. * @param {String} revocationCertificate - armored revocation certificate + * @param {Date} [date] - Date to verify the certificate * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} Revoked key. * @async */ - async applyRevocationCertificate(revocationCertificate, config = defaultConfig) { + async applyRevocationCertificate(revocationCertificate, date = new Date(), config = defaultConfig) { const input = await unarmor(revocationCertificate, config); const packetlist = await PacketList.fromBinary(input.data, allowedRevocationPackets, config); const revocationSignature = packetlist.findPacket(enums.packet.signature); @@ -569,11 +567,8 @@ class Key { if (!revocationSignature.issuerKeyID.equals(this.getKeyID())) { throw new Error('Revocation signature does not match key'); } - if (revocationSignature.isExpired()) { - throw new Error('Revocation signature is expired'); - } try { - await revocationSignature.verify(this.keyPacket, enums.signature.keyRevocation, { key: this.keyPacket }, undefined, config); + await revocationSignature.verify(this.keyPacket, enums.signature.keyRevocation, { key: this.keyPacket }, date, undefined, config); } catch (e) { throw util.wrapError('Could not verify revocation signature', e); } @@ -593,7 +588,7 @@ class Key { */ async signPrimaryUser(privateKeys, date, userID, config = defaultConfig) { const { index, user } = await this.getPrimaryUser(date, userID, config); - const userSign = await user.sign(this.keyPacket, privateKeys, config); + const userSign = await user.sign(this.keyPacket, privateKeys, date, config); const key = this.clone(); key.users[index] = userSign; return key; @@ -602,15 +597,16 @@ class Key { /** * Signs all users of key * @param {Array} privateKeys - decrypted private keys for signing + * @param {Date} [date] - Use the given date for signing, instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} Key with new certificate signature. * @async */ - async signAllUsers(privateKeys, config = defaultConfig) { + async signAllUsers(privateKeys, date = new Date(), config = defaultConfig) { const that = this; const key = this.clone(); key.users = await Promise.all(this.users.map(function(user) { - return user.sign(that.keyPacket, privateKeys, config); + return user.sign(that.keyPacket, privateKeys, date, config); })); return key; } @@ -629,11 +625,11 @@ class Key { * }>>} List of signer's keyID and validity of signature * @async */ - async verifyPrimaryUser(keys, date, userID, config = defaultConfig) { + async verifyPrimaryUser(keys, date = new Date(), userID, config = defaultConfig) { const primaryKey = this.keyPacket; const { user } = await this.getPrimaryUser(date, userID, config); - const results = keys ? await user.verifyAllCertifications(primaryKey, keys, undefined, config) : - [{ keyID: primaryKey.getKeyID(), valid: await user.verify(primaryKey, undefined, config).catch(() => false) }]; + const results = keys ? await user.verifyAllCertifications(primaryKey, keys, date, config) : + [{ keyID: primaryKey.getKeyID(), valid: await user.verify(primaryKey, date, config).catch(() => false) }]; return results; } @@ -642,6 +638,7 @@ class Key { * - if no arguments are given, verifies the self certificates; * - otherwise, verifies all certificates signed with given keys. * @param {Array} keys - array of keys to verify certificate signatures + * @param {Date} [date] - Use the given date for verification instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise>} List of userID, signer's keyID and validity of signature * @async */ - async verifyAllUsers(keys, config = defaultConfig) { + async verifyAllUsers(keys, date = new Date(), config = defaultConfig) { const results = []; const primaryKey = this.keyPacket; await Promise.all(this.users.map(async function(user) { - const signatures = keys ? await user.verifyAllCertifications(primaryKey, keys, undefined, config) : - [{ keyID: primaryKey.getKeyID(), valid: await user.verify(primaryKey, undefined, config).catch(() => false) }]; + const signatures = keys ? await user.verifyAllCertifications(primaryKey, keys, date, config) : + [{ keyID: primaryKey.getKeyID(), valid: await user.verify(primaryKey, date, config).catch(() => false) }]; signatures.forEach(signature => { results.push({ userID: user.userID.userID, diff --git a/src/key/private_key.js b/src/key/private_key.js index 239a8468..d242dbc3 100644 --- a/src/key/private_key.js +++ b/src/key/private_key.js @@ -136,8 +136,8 @@ class PrivateKey extends PublicKey { } let signingKeyPacket; - if (!this.primaryKey.isDummy()) { - signingKeyPacket = this.primaryKey; + if (!this.keyPacket.isDummy()) { + signingKeyPacket = this.keyPacket; } else { /** * It is enough to validate any signing keys @@ -196,7 +196,7 @@ class PrivateKey extends PublicKey { throw new Error('Need private key for revoking'); } const dataToSign = { key: this.keyPacket }; - const key = await this.clone(); + const key = this.clone(); key.revocationSignatures.push(await helper.createSignaturePacket(dataToSign, null, this.keyPacket, { signatureType: enums.signature.keyRevocation, reasonForRevocationFlag: enums.write(enums.reasonForRevocation, reasonForRevocationFlag), @@ -227,7 +227,7 @@ class PrivateKey extends PublicKey { if (options.rsaBits < config.minRSABits) { throw new Error(`rsaBits should be at least ${config.minRSABits}, got: ${options.rsaBits}`); } - const secretKeyPacket = this.primaryKey; + const secretKeyPacket = this.keyPacket; if (secretKeyPacket.isDummy()) { throw new Error("Cannot add subkey to gnu-dummy primary key"); } diff --git a/src/key/subkey.js b/src/key/subkey.js index 6907fa2d..b6f1d9c0 100644 --- a/src/key/subkey.js +++ b/src/key/subkey.js @@ -18,10 +18,15 @@ import defaultConfig from '../config'; * @borrows PublicSubkeyPacket#isDecrypted as SubKey#isDecrypted */ class SubKey { - constructor(subKeyPacket) { + /** + * @param {SecretSubkeyPacket|PublicSubkeyPacket} subKeyPacket - subkey packet to hold in the Subkey + * @param {Key} mainKey - reference to main Key object, containing the primary key packet corresponding to the subkey + */ + constructor(subKeyPacket, mainKey) { this.keyPacket = subKeyPacket; this.bindingSignatures = []; this.revocationSignatures = []; + this.mainKey = mainKey; } /** @@ -38,19 +43,18 @@ class SubKey { /** * Checks if a binding signature of a subkey is revoked - * @param {SecretKeyPacket| - * PublicKeyPacket} primaryKey The primary key packet * @param {SignaturePacket} signature - The binding signature to verify * @param {PublicSubkeyPacket| * SecretSubkeyPacket| * PublicKeyPacket| * SecretKeyPacket} key, optional The key to verify the signature - * @param {Date} date - Use the given date instead of the current time + * @param {Date} [date] - Use the given date for verification instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} True if the binding signature is revoked. * @async */ - async isRevoked(primaryKey, signature, key, date = new Date(), config = defaultConfig) { + async isRevoked(signature, key, date = new Date(), config = defaultConfig) { + const primaryKey = this.mainKey.keyPacket; return helper.isDataRevoked( primaryKey, enums.signature.subkeyRevocation, { key: primaryKey, @@ -62,20 +66,19 @@ class SubKey { /** * Verify subkey. Checks for revocation signatures, expiration time * and valid binding signature. - * @param {SecretKeyPacket| - * PublicKeyPacket} primaryKey The primary key packet * @param {Date} date - Use the given date instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} * @throws {Error} if the subkey is invalid. * @async */ - async verify(primaryKey, date = new Date(), config = defaultConfig) { + async verify(date = new Date(), config = defaultConfig) { + const primaryKey = this.mainKey.keyPacket; const dataToVerify = { key: primaryKey, bind: this.keyPacket }; // check subkey binding signatures const bindingSignature = await helper.getLatestValidSignature(this.bindingSignatures, primaryKey, enums.signature.subkeyBinding, dataToVerify, date, config); // check binding signature is not revoked - if (bindingSignature.revoked || await this.isRevoked(primaryKey, bindingSignature, null, date, config)) { + if (bindingSignature.revoked || await this.isRevoked(bindingSignature, null, date, config)) { throw new Error('Subkey is revoked'); } // check for expiration time @@ -86,16 +89,15 @@ class SubKey { } /** - * Returns the expiration time of the subkey or Infinity if key does not expire + * Returns the expiration time of the subkey or Infinity if key does not expire. * Returns null if the subkey is invalid. - * @param {SecretKeyPacket| - * PublicKeyPacket} primaryKey The primary key packet * @param {Date} date - Use the given date instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} * @async */ - async getExpirationTime(primaryKey, date = new Date(), config = defaultConfig) { + async getExpirationTime(date = new Date(), config = defaultConfig) { + const primaryKey = this.mainKey.keyPacket; const dataToVerify = { key: primaryKey, bind: this.keyPacket }; let bindingSignature; try { @@ -103,7 +105,7 @@ class SubKey { } catch (e) { return null; } - const keyExpiry = helper.getExpirationTime(this.keyPacket, bindingSignature); + const keyExpiry = helper.getKeyExpirationTime(this.keyPacket, bindingSignature); const sigExpiry = bindingSignature.getExpirationTime(); return keyExpiry < sigExpiry ? keyExpiry : sigExpiry; } @@ -111,13 +113,13 @@ class SubKey { /** * Update subkey with new components from specified subkey * @param {SubKey} subKey - Source subkey to merge - * @param {SecretKeyPacket| - SecretSubkeyPacket} primaryKey primary key used for validation + * @param {Date} [date] - Date to verify validity of signatures * @param {Object} [config] - Full configuration, defaults to openpgp.config * @throws {Error} if update failed * @async */ - async update(subKey, primaryKey, config = defaultConfig) { + async update(subKey, date = new Date(), config = defaultConfig) { + const primaryKey = this.mainKey.keyPacket; if (!this.hasSameFingerprintAs(subKey)) { throw new Error('SubKey update method: fingerprints of subkeys not equal'); } @@ -129,7 +131,7 @@ class SubKey { // update missing binding signatures const that = this; const dataToVerify = { key: primaryKey, bind: that.keyPacket }; - await helper.mergeSignatures(subKey, this, 'bindingSignatures', async function(srcBindSig) { + await helper.mergeSignatures(subKey, this, 'bindingSignatures', date, async function(srcBindSig) { for (let i = 0; i < that.bindingSignatures.length; i++) { if (that.bindingSignatures[i].issuerKeyID.equals(srcBindSig.issuerKeyID)) { if (srcBindSig.created > that.bindingSignatures[i].created) { @@ -139,15 +141,15 @@ class SubKey { } } try { - srcBindSig.verified || await srcBindSig.verify(primaryKey, enums.signature.subkeyBinding, dataToVerify, undefined, config); + await srcBindSig.verify(primaryKey, enums.signature.subkeyBinding, dataToVerify, date, undefined, config); return true; } catch (e) { return false; } }); // revocation signatures - await helper.mergeSignatures(subKey, this, 'revocationSignatures', function(srcRevSig) { - return helper.isDataRevoked(primaryKey, enums.signature.subkeyRevocation, dataToVerify, [srcRevSig], undefined, undefined, undefined, config); + await helper.mergeSignatures(subKey, this, 'revocationSignatures', date, function(srcRevSig) { + return helper.isDataRevoked(primaryKey, enums.signature.subkeyRevocation, dataToVerify, [srcRevSig], undefined, undefined, date, config); }); } @@ -172,13 +174,13 @@ class SubKey { config = defaultConfig ) { const dataToSign = { key: primaryKey, bind: this.keyPacket }; - const subKey = new SubKey(this.keyPacket); + const subKey = new SubKey(this.keyPacket, this.mainKey); subKey.revocationSignatures.push(await helper.createSignaturePacket(dataToSign, null, primaryKey, { signatureType: enums.signature.subkeyRevocation, reasonForRevocationFlag: enums.write(enums.reasonForRevocation, reasonForRevocationFlag), reasonForRevocationString - }, date, undefined, undefined, config)); - await subKey.update(this, primaryKey); + }, date, undefined, false, config)); + await subKey.update(this); return subKey; } diff --git a/src/key/user.js b/src/key/user.js index ff9f91ae..1690537b 100644 --- a/src/key/user.js +++ b/src/key/user.js @@ -38,11 +38,12 @@ class User { * @param {SecretKeyPacket| * PublicKeyPacket} primaryKey The primary key packet * @param {Array} privateKeys - Decrypted private keys for signing + * @param {Date} date - Date to overwrite creation date of the signature * @param {Object} config - Full configuration * @returns {Promise} New user with new certificate signatures. * @async */ - async sign(primaryKey, privateKeys, config) { + async sign(primaryKey, privateKeys, date, config) { const dataToSign = { userID: this.userID, userAttribute: this.userAttribute, @@ -56,14 +57,14 @@ class User { if (privateKey.hasSameFingerprintAs(primaryKey)) { throw new Error('Not implemented for self signing'); } - const signingKey = await privateKey.getSigningKey(undefined, undefined, undefined, config); + const signingKey = await privateKey.getSigningKey(undefined, date, undefined, config); return createSignaturePacket(dataToSign, privateKey, signingKey.keyPacket, { // Most OpenPGP implementations use generic certification (0x10) signatureType: enums.signature.certGeneric, keyFlags: [enums.keyFlags.certifyKeys | enums.keyFlags.signData] - }, undefined, undefined, undefined, config); + }, date, undefined, undefined, config); })); - await user.update(this, primaryKey); + await user.update(this, primaryKey, date, config); return user; } @@ -114,18 +115,15 @@ class User { if (!key.getKeyIDs().some(id => id.equals(keyID))) { return null; } - const signingKey = await key.getSigningKey(keyID, date, undefined, config); + const signingKey = await key.getSigningKey(keyID, certificate.created, undefined, config); if (certificate.revoked || await that.isRevoked(primaryKey, certificate, signingKey.keyPacket, date, config)) { throw new Error('User certificate is revoked'); } try { - certificate.verified || await certificate.verify(signingKey.keyPacket, enums.signature.certGeneric, dataToVerify, undefined, config); + await certificate.verify(signingKey.keyPacket, enums.signature.certGeneric, dataToVerify, date, undefined, config); } catch (e) { throw util.wrapError('User certificate is invalid', e); } - if (certificate.isExpired(date)) { - throw new Error('User certificate is expired'); - } return true; })); return results.find(result => result !== null) || null; @@ -185,13 +183,10 @@ class User { throw new Error('Self-certification is revoked'); } try { - selfCertification.verified || await selfCertification.verify(primaryKey, enums.signature.certGeneric, dataToVerify, undefined, config); + await selfCertification.verify(primaryKey, enums.signature.certGeneric, dataToVerify, date, undefined, config); } catch (e) { throw util.wrapError('Self-certification is invalid', e); } - if (selfCertification.isExpired(date)) { - throw new Error('Self-certification is expired'); - } return true; } catch (e) { exception = e; @@ -205,30 +200,31 @@ class User { * @param {User} user - Source user to merge * @param {SecretKeyPacket| * SecretSubkeyPacket} primaryKey primary key used for validation + * @param {Date} date - Date to verify the validity of signatures * @param {Object} config - Full configuration * @returns {Promise} * @async */ - async update(user, primaryKey, config) { + async update(user, primaryKey, date, config) { const dataToVerify = { userID: this.userID, userAttribute: this.userAttribute, key: primaryKey }; // self signatures - await mergeSignatures(user, this, 'selfCertifications', async function(srcSelfSig) { + await mergeSignatures(user, this, 'selfCertifications', date, async function(srcSelfSig) { try { - srcSelfSig.verified || await srcSelfSig.verify(primaryKey, enums.signature.certGeneric, dataToVerify, undefined, config); + await srcSelfSig.verify(primaryKey, enums.signature.certGeneric, dataToVerify, date, false, config); return true; } catch (e) { return false; } }); // other signatures - await mergeSignatures(user, this, 'otherCertifications'); + await mergeSignatures(user, this, 'otherCertifications', date); // revocation signatures - await mergeSignatures(user, this, 'revocationSignatures', function(srcRevSig) { - return isDataRevoked(primaryKey, enums.signature.certRevocation, dataToVerify, [srcRevSig], undefined, undefined, undefined, config); + await mergeSignatures(user, this, 'revocationSignatures', date, function(srcRevSig) { + return isDataRevoked(primaryKey, enums.signature.certRevocation, dataToVerify, [srcRevSig], undefined, undefined, date, config); }); } } diff --git a/src/message.js b/src/message.js index 60cc4e0d..8620c945 100644 --- a/src/message.js +++ b/src/message.js @@ -107,12 +107,13 @@ export class Message { * @param {Array} [decryptionKeys] - Private keys with decrypted secret data * @param {Array} [passwords] - Passwords used to decrypt * @param {Array} [sessionKeys] - Session keys in the form: { data:Uint8Array, algorithm:String, [aeadAlgorithm:String] } + * @param {Date} [date] - Use the given date for key verification instead of the current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise} New message with decrypted content. * @async */ - async decrypt(decryptionKeys, passwords, sessionKeys, config = defaultConfig) { - const keyObjs = sessionKeys || await this.decryptSessionKeys(decryptionKeys, passwords, config); + async decrypt(decryptionKeys, passwords, sessionKeys, date = new Date(), config = defaultConfig) { + const keyObjs = sessionKeys || await this.decryptSessionKeys(decryptionKeys, passwords, date, config); const symEncryptedPacketlist = this.packets.filterByTag( enums.packet.symmetricallyEncryptedData, @@ -157,6 +158,7 @@ export class Message { * Decrypt encrypted session keys either with private keys or passwords. * @param {Array} [decryptionKeys] - Private keys with decrypted secret data * @param {Array} [passwords] - Passwords used to decrypt + * @param {Date} [date] - Use the given date for key verification, instead of current time * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise>} array of object with potential sessionKey, algorithm pairs * @async */ - async decryptSessionKeys(decryptionKeys, passwords, config = defaultConfig) { + async decryptSessionKeys(decryptionKeys, passwords, date = new Date(), config = defaultConfig) { let keyPackets = []; let exception; @@ -203,7 +205,7 @@ export class Message { enums.symmetric.cast5 // Golang OpenPGP fallback ]; try { - const primaryUser = await decryptionKey.getPrimaryUser(undefined, undefined, config); // TODO: Pass userID from somewhere. + const primaryUser = await decryptionKey.getPrimaryUser(date, undefined, config); // TODO: Pass userID from somewhere. if (primaryUser.selfCertification.preferredSymmetricAlgorithms) { algos = algos.concat(primaryUser.selfCertification.preferredSymmetricAlgorithms); } @@ -697,8 +699,7 @@ export async function createSignaturePackets(literalDataPacket, signingKeys, sig * @param {SignaturePacket} signature - Signature packet * @param {Array} literalDataList - Array of literal data packets * @param {Array} verificationKeys - Array of public keys to verify signatures - * @param {Date} date - Verify the signature against the given date, - * i.e. check signature creation time < date < expiration time + * @param {Date} [date] - Check signature validity with respect to the given date * @param {Boolean} [detached] - Whether to verify detached signature packets * @param {Object} [config] - Full configuration, defaults to openpgp.config * @returns {Promise<{ @@ -711,49 +712,41 @@ export async function createSignaturePackets(literalDataPacket, signingKeys, sig */ async function createVerificationObject(signature, literalDataList, verificationKeys, date = new Date(), detached = false, config = defaultConfig) { let primaryKey; - let signingKey; - let keyError; + let unverifiedSigningKey; for (const key of verificationKeys) { const issuerKeys = key.getKeys(signature.issuerKeyID); if (issuerKeys.length > 0) { primaryKey = key; + unverifiedSigningKey = issuerKeys[0]; break; } } - if (!primaryKey) { - keyError = new Error(`Could not find signing key with key ID ${signature.issuerKeyID.toHex()}`); - } else { - try { - signingKey = await primaryKey.getSigningKey(signature.issuerKeyID, null, undefined, config); - } catch (e) { - keyError = e; - } - } - const signaturePacket = signature.correspondingSig || signature; + + const isOnePassSignature = signature instanceof OnePassSignaturePacket; + const signaturePacketPromise = isOnePassSignature ? signature.correspondingSig : signature; + const verifiedSig = { keyID: signature.issuerKeyID, verified: (async () => { - if (keyError) { - throw keyError; + if (!unverifiedSigningKey) { + throw new Error(`Could not find signing key with key ID ${signature.issuerKeyID.toHex()}`); } - await signature.verify(signingKey.keyPacket, signature.signatureType, literalDataList[0], detached, config); - const sig = await signaturePacket; - if (sig.isExpired(date) || !( - sig.created >= signingKey.getCreationTime() && - sig.created < await (signingKey === primaryKey ? - signingKey.getExpirationTime(undefined, undefined, undefined, config) : - signingKey.getExpirationTime(primaryKey, date, undefined, config) - ) - )) { - throw new Error('Signature is expired'); + + await signature.verify(unverifiedSigningKey.keyPacket, signature.signatureType, literalDataList[0], date, detached, config); + const signaturePacket = await signaturePacketPromise; + if (unverifiedSigningKey.getCreationTime() > signaturePacket.created) { + throw new Error('Key is newer than the signature'); } + // We pass the signature creation time to check whether the key was expired at the time of signing. + // We check this after signature verification because for streamed one-pass signatures, the creation time is not available before + await primaryKey.getSigningKey(unverifiedSigningKey.getKeyID(), signaturePacket.created, undefined, config); return true; })(), signature: (async () => { - const sig = await signaturePacket; + const signaturePacket = await signaturePacketPromise; const packetlist = new PacketList(); - sig && packetlist.push(sig); + signaturePacket && packetlist.push(signaturePacket); return new Signature(packetlist); })() }; diff --git a/src/openpgp.js b/src/openpgp.js index 0367698a..d78ad39c 100644 --- a/src/openpgp.js +++ b/src/openpgp.js @@ -93,6 +93,9 @@ export function generateKey({ userIDs = [], passphrase = "", type = "ecc", rsaBi export function reformatKey({ privateKey, userIDs = [], passphrase = "", keyExpirationTime = 0, date, config }) { config = { ...defaultConfig, ...config }; userIDs = toArray(userIDs); + if (userIDs.length === 0) { + throw new Error('UserIDs are required for key reformat'); + } const options = { privateKey, userIDs, passphrase, keyExpirationTime, date }; return reformat(options, config).then(async key => { @@ -119,6 +122,7 @@ export function reformatKey({ privateKey, userIDs = [], passphrase = "", keyExpi * @param {Object} [options.reasonForRevocation] - Object indicating the reason for revocation * @param {module:enums.reasonForRevocation} [options.reasonForRevocation.flag=[noReason]{@link module:enums.reasonForRevocation}] - Flag indicating the reason for revocation * @param {String} [options.reasonForRevocation.string=""] - String explaining the reason for revocation + * @param {Date} [options.date] - Use the given date instead of the current time to verify validity of revocation certificate (if provided), or as creation time of the revocation signature * @param {Object} [options.config] - Custom configuration settings to overwrite those in [config]{@link module:config} * @returns {Promise} The revoked key object in the form: * `{ privateKey:PrivateKey, privateKeyArmored:String, publicKey:PublicKey, publicKeyArmored:String }` @@ -126,13 +130,13 @@ export function reformatKey({ privateKey, userIDs = [], passphrase = "", keyExpi * @async * @static */ -export function revokeKey({ key, revocationCertificate, reasonForRevocation, config }) { +export function revokeKey({ key, revocationCertificate, reasonForRevocation, date = new Date(), config }) { config = { ...defaultConfig, ...config }; return Promise.resolve().then(() => { if (revocationCertificate) { - return key.applyRevocationCertificate(revocationCertificate, config); + return key.applyRevocationCertificate(revocationCertificate, date, config); } else { - return key.revoke(reasonForRevocation, undefined, config); + return key.revoke(reasonForRevocation, date, config); } }).then(async key => { if (key.isPrivate()) { @@ -309,7 +313,7 @@ export function decrypt({ message, decryptionKeys, passwords, sessionKeys, verif config = { ...defaultConfig, ...config }; checkMessage(message); verificationKeys = toArray(verificationKeys); decryptionKeys = toArray(decryptionKeys); passwords = toArray(passwords); sessionKeys = toArray(sessionKeys); - return message.decrypt(decryptionKeys, passwords, sessionKeys, config).then(async function(decrypted) { + return message.decrypt(decryptionKeys, passwords, sessionKeys, date, config).then(async function(decrypted) { if (!verificationKeys) { verificationKeys = []; } @@ -515,6 +519,7 @@ export function encryptSessionKey({ data, algorithm, aeadAlgorithm, encryptionKe * @param {Message} options.message - A message object containing the encrypted session key packets * @param {PrivateKey|PrivateKey[]} [options.decryptionKeys] - Private keys with decrypted secret key data * @param {String|String[]} [options.passwords] - Passwords to decrypt the session key + * @param {Date} [options.date] - Date to use for key verification instead of the current time * @param {Object} [options.config] - Custom configuration settings to overwrite those in [config]{@link module:config} * @returns {Promise} Array of decrypted session key, algorithm pairs in the form: * { data:Uint8Array, algorithm:String } @@ -522,13 +527,13 @@ export function encryptSessionKey({ data, algorithm, aeadAlgorithm, encryptionKe * @async * @static */ -export function decryptSessionKeys({ message, decryptionKeys, passwords, config }) { +export function decryptSessionKeys({ message, decryptionKeys, passwords, date = new Date(), config }) { config = { ...defaultConfig, ...config }; checkMessage(message); decryptionKeys = toArray(decryptionKeys); passwords = toArray(passwords); return Promise.resolve().then(async function() { - return message.decryptSessionKeys(decryptionKeys, passwords, config); + return message.decryptSessionKeys(decryptionKeys, passwords, date, config); }).catch(onError.bind(null, 'Error decrypting session keys')); } diff --git a/src/packet/signature.js b/src/packet/signature.js index bb679202..e83aae79 100644 --- a/src/packet/signature.js +++ b/src/packet/signature.js @@ -23,6 +23,18 @@ import enums from '../enums'; import util from '../util'; import defaultConfig from '../config'; +// Symbol to store cryptographic validity of the signature, to avoid recomputing multiple times on verification. +const verified = Symbol('verified'); + +// GPG puts the Issuer and Signature subpackets in the unhashed area. +// Tampering with those invalidates the signature, so we still trust them and parse them. +// All other unhashed subpackets are ignored. +const allowedUnhashedSubpackets = new Set([ + enums.signatureSubpacket.issuer, + enums.signatureSubpacket.issuerFingerprint, + enums.signatureSubpacket.embeddedSignature +]); + /** * Implementation of the Signature Packet (Tag 2) * @@ -36,11 +48,8 @@ class SignaturePacket { return enums.packet.signature; } - /** - * @param {Date} date - The creation date of the signature - */ - constructor(date = new Date()) { - this.version = 4; // This is set to 5 below if we sign with a V5 key. + constructor() { + this.version = null; this.signatureType = null; this.hashAlgorithm = null; this.publicKeyAlgorithm = null; @@ -49,7 +58,7 @@ class SignaturePacket { this.unhashedSubpackets = []; this.signedHashValue = null; - this.created = util.normalizeDate(date); + this.created = null; this.signatureExpirationTime = null; this.signatureNeverExpires = true; this.exportable = null; @@ -85,8 +94,8 @@ class SignaturePacket { this.issuerFingerprint = null; this.preferredAEADAlgorithms = null; - this.verified = null; this.revoked = null; + this[verified] = null; } /** @@ -108,6 +117,9 @@ class SignaturePacket { // hashed subpackets i += this.readSubPackets(bytes.subarray(i, bytes.length), true); + if (!this.created) { + throw new Error('Missing signature creation time subpacket.'); + } // A V4 signature hashes the packet body // starting from its first field, the version number, through the end @@ -152,20 +164,24 @@ class SignaturePacket { * Signs provided data. This needs to be done prior to serialization. * @param {SecretKeyPacket} key - Private key used to sign the message. * @param {Object} data - Contains packets to be signed. + * @param {Date} [date] - The signature creation time. * @param {Boolean} [detached] - Whether to create a detached signature * @throws {Error} if signing failed * @async */ - async sign(key, data, detached = false) { + async sign(key, data, date = new Date(), detached = false) { const signatureType = enums.write(enums.signature, this.signatureType); const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm); const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm); if (key.version === 5) { this.version = 5; + } else { + this.version = 4; } const arr = [new Uint8Array([this.version, signatureType, publicKeyAlgorithm, hashAlgorithm])]; + this.created = util.normalizeDate(date); this.issuerKeyVersion = key.version; this.issuerFingerprint = key.getFingerprintBytes(); this.issuerKeyID = key.getKeyID(); @@ -191,7 +207,7 @@ class SignaturePacket { // getLatestValidSignature(this.revocationSignatures, key, data)` later. // Note that this only holds up if the key and data passed to verify are the // same as the ones passed to sign. - this.verified = true; + this[verified] = true; } } @@ -203,9 +219,10 @@ class SignaturePacket { const sub = enums.signatureSubpacket; const arr = []; let bytes; - if (this.created !== null) { - arr.push(writeSubPacket(sub.signatureCreationTime, util.writeDate(this.created))); + if (this.created === null) { + throw new Error('Missing signature creation time'); } + arr.push(writeSubPacket(sub.signatureCreationTime, util.writeDate(this.created))); if (this.signatureExpirationTime !== null) { arr.push(writeSubPacket(sub.signatureExpirationTime, util.writeNumber(this.signatureExpirationTime, 4))); } @@ -331,30 +348,14 @@ class SignaturePacket { } // V4 signature sub packets - - readSubPacket(bytes, trusted = true) { + readSubPacket(bytes, hashed = true) { let mypos = 0; - const readArray = (prop, bytes) => { - this[prop] = []; - - for (let i = 0; i < bytes.length; i++) { - this[prop].push(bytes[i]); - } - }; - // The leftmost bit denotes a "critical" packet const critical = bytes[mypos] & 0x80; const type = bytes[mypos] & 0x7F; - // GPG puts the Issuer and Signature subpackets in the unhashed area. - // Tampering with those invalidates the signature, so we can trust them. - // Ignore all other unhashed subpackets. - if (!trusted && ![ - enums.signatureSubpacket.issuer, - enums.signatureSubpacket.issuerFingerprint, - enums.signatureSubpacket.embeddedSignature - ].includes(type)) { + if (!hashed && !allowedUnhashedSubpackets.has(type)) { this.unhashedSubpackets.push(bytes.subarray(mypos, bytes.length)); return; } @@ -363,11 +364,11 @@ class SignaturePacket { // subpacket type switch (type) { - case 2: + case enums.signatureSubpacket.signatureCreationTime: // Signature Creation Time this.created = util.readDate(bytes.subarray(mypos, bytes.length)); break; - case 3: { + case enums.signatureSubpacket.signatureExpirationTime: { // Signature Expiration Time in seconds const seconds = util.readNumber(bytes.subarray(mypos, bytes.length)); @@ -376,24 +377,24 @@ class SignaturePacket { break; } - case 4: + case enums.signatureSubpacket.exportableCertification: // Exportable Certification this.exportable = bytes[mypos++] === 1; break; - case 5: + case enums.signatureSubpacket.trustSignature: // Trust Signature this.trustLevel = bytes[mypos++]; this.trustAmount = bytes[mypos++]; break; - case 6: + case enums.signatureSubpacket.regularExpression: // Regular Expression this.regularExpression = bytes[mypos]; break; - case 7: + case enums.signatureSubpacket.revocable: // Revocable this.revocable = bytes[mypos++] === 1; break; - case 9: { + case enums.signatureSubpacket.keyExpirationTime: { // Key Expiration Time in seconds const seconds = util.readNumber(bytes.subarray(mypos, bytes.length)); @@ -402,11 +403,11 @@ class SignaturePacket { break; } - case 11: + case enums.signatureSubpacket.preferredSymmetricAlgorithms: // Preferred Symmetric Algorithms - readArray('preferredSymmetricAlgorithms', bytes.subarray(mypos, bytes.length)); + this.preferredSymmetricAlgorithms = [...bytes.subarray(mypos, bytes.length)]; break; - case 12: + case enums.signatureSubpacket.revocationKey: // Revocation Key // (1 octet of class, 1 octet of public-key algorithm ID, 20 // octets of @@ -416,12 +417,12 @@ class SignaturePacket { this.revocationKeyFingerprint = bytes.subarray(mypos, mypos + 20); break; - case 16: + case enums.signatureSubpacket.issuer: // Issuer this.issuerKeyID.read(bytes.subarray(mypos, bytes.length)); break; - case 20: { + case enums.signatureSubpacket.notationData: { // Notation Data const humanReadable = !!(bytes[mypos] & 0x80); @@ -442,48 +443,48 @@ class SignaturePacket { } break; } - case 21: + case enums.signatureSubpacket.preferredHashAlgorithms: // Preferred Hash Algorithms - readArray('preferredHashAlgorithms', bytes.subarray(mypos, bytes.length)); + this.preferredHashAlgorithms = [...bytes.subarray(mypos, bytes.length)]; break; - case 22: + case enums.signatureSubpacket.preferredCompressionAlgorithms: // Preferred Compression Algorithms - readArray('preferredCompressionAlgorithms', bytes.subarray(mypos, bytes.length)); + this.preferredCompressionAlgorithms = [...bytes.subarray(mypos, bytes.length)]; break; - case 23: + case enums.signatureSubpacket.keyServerPreferences: // Key Server Preferences - readArray('keyServerPreferences', bytes.subarray(mypos, bytes.length)); + this.keyServerPreferences = [...bytes.subarray(mypos, bytes.length)]; break; - case 24: + case enums.signatureSubpacket.preferredKeyServer: // Preferred Key Server this.preferredKeyServer = util.uint8ArrayToString(bytes.subarray(mypos, bytes.length)); break; - case 25: + case enums.signatureSubpacket.primaryUserID: // Primary User ID this.isPrimaryUserID = bytes[mypos++] !== 0; break; - case 26: + case enums.signatureSubpacket.policyURI: // Policy URI this.policyURI = util.uint8ArrayToString(bytes.subarray(mypos, bytes.length)); break; - case 27: + case enums.signatureSubpacket.keyFlags: // Key Flags - readArray('keyFlags', bytes.subarray(mypos, bytes.length)); + this.keyFlags = [...bytes.subarray(mypos, bytes.length)]; break; - case 28: + case enums.signatureSubpacket.signersUserID: // Signer's User ID this.signersUserID = util.uint8ArrayToString(bytes.subarray(mypos, bytes.length)); break; - case 29: + case enums.signatureSubpacket.reasonForRevocation: // Reason for Revocation this.reasonForRevocationFlag = bytes[mypos++]; this.reasonForRevocationString = util.uint8ArrayToString(bytes.subarray(mypos, bytes.length)); break; - case 30: + case enums.signatureSubpacket.features: // Features - readArray('features', bytes.subarray(mypos, bytes.length)); + this.features = [...bytes.subarray(mypos, bytes.length)]; break; - case 31: { + case enums.signatureSubpacket.signatureTarget: { // Signature Target // (1 octet public-key algorithm, 1 octet hash algorithm, N octets hash) this.signatureTargetPublicKeyAlgorithm = bytes[mypos++]; @@ -494,12 +495,12 @@ class SignaturePacket { this.signatureTargetHash = util.uint8ArrayToString(bytes.subarray(mypos, mypos + len)); break; } - case 32: + case enums.signatureSubpacket.embeddedSignature: // Embedded Signature this.embeddedSignature = new SignaturePacket(); this.embeddedSignature.read(bytes.subarray(mypos, bytes.length)); break; - case 33: + case enums.signatureSubpacket.issuerFingerprint: // Issuer Fingerprint this.issuerKeyVersion = bytes[mypos++]; this.issuerFingerprint = bytes.subarray(mypos, bytes.length); @@ -509,12 +510,12 @@ class SignaturePacket { this.issuerKeyID.read(this.issuerFingerprint.subarray(-8)); } break; - case 34: + case enums.signatureSubpacket.preferredAEADAlgorithms: // Preferred AEAD Algorithms - readArray.call(this, 'preferredAEADAlgorithms', bytes.subarray(mypos, bytes.length)); + this.preferredAEADAlgorithms = [...bytes.subarray(mypos, bytes.length)]; break; default: { - const err = new Error("Unknown signature subpacket type " + type + " @:" + mypos); + const err = new Error(`Unknown signature subpacket type ${type}`); if (critical) { throw err; } else { @@ -654,41 +655,59 @@ class SignaturePacket { * SecretSubkeyPacket|SecretKeyPacket} key - the public key to verify the signature * @param {module:enums.signature} signatureType - Expected signature type * @param {String|Object} data - Data which on the signature applies + * @param {Date} [date] - Use the given date instead of the current time to check for signature validity and expiration * @param {Boolean} [detached] - Whether to verify a detached signature * @param {Object} [config] - Full configuration, defaults to openpgp.config * @throws {Error} if signature validation failed * @async */ - async verify(key, signatureType, data, detached = false, config = defaultConfig) { + async verify(key, signatureType, data, date = new Date(), detached = false, config = defaultConfig) { const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm); const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm); - + if (!this.issuerKeyID.equals(key.getKeyID())) { + throw new Error('Signature was not issued by the given public key'); + } if (publicKeyAlgorithm !== enums.write(enums.publicKey, key.algorithm)) { throw new Error('Public key algorithm used to sign signature does not match issuer key algorithm.'); } - let toHash; - let hash; - if (this.hashed) { - hash = await this.hashed; - } else { - toHash = this.toHash(signatureType, data, detached); - hash = await this.hash(signatureType, data, toHash); - } - hash = await stream.readToEnd(hash); - if (this.signedHashValue[0] !== hash[0] || - this.signedHashValue[1] !== hash[1]) { - throw new Error('Message digest did not match'); + const isMessageSignature = signatureType === enums.signature.binary || signatureType === enums.signature.text; + // Cryptographic validity is cached after one successful verification. + // However, for message signatures, we always re-verify, since the passed `data` can change + const skipVerify = this[verified] && !isMessageSignature; + if (!skipVerify) { + let toHash; + let hash; + if (this.hashed) { + hash = await this.hashed; + } else { + toHash = this.toHash(signatureType, data, detached); + hash = await this.hash(signatureType, data, toHash); + } + hash = await stream.readToEnd(hash); + if (this.signedHashValue[0] !== hash[0] || + this.signedHashValue[1] !== hash[1]) { + throw new Error('Signed digest did not match'); + } + + this.params = await this.params; + + this[verified] = await crypto.signature.verify( + publicKeyAlgorithm, hashAlgorithm, this.params, key.publicParams, + toHash, hash + ); + + if (!this[verified]) { + throw new Error('Signature verification failed'); + } } - this.params = await this.params; - - const verified = await crypto.signature.verify( - publicKeyAlgorithm, hashAlgorithm, this.params, key.publicParams, - toHash, hash - ); - if (!verified) { - throw new Error('Signature verification failed'); + const normDate = util.normalizeDate(date); + if (normDate && this.created > normDate) { + throw new Error('Signature creation time is in the future'); + } + if (normDate && normDate > this.getExpirationTime()) { + throw new Error('Signature is expired'); } if (config.rejectHashAlgorithms.has(hashAlgorithm)) { throw new Error('Insecure hash algorithm: ' + enums.read(enums.hash, hashAlgorithm).toUpperCase()); @@ -705,7 +724,6 @@ class SignaturePacket { if (this.revocationKeyClass !== null) { throw new Error('This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.'); } - this.verified = true; } /** @@ -716,18 +734,17 @@ class SignaturePacket { isExpired(date = new Date()) { const normDate = util.normalizeDate(date); if (normDate !== null) { - const expirationTime = this.getExpirationTime(); - return !(this.created <= normDate && normDate <= expirationTime); + return !(this.created <= normDate && normDate <= this.getExpirationTime()); } return false; } /** * Returns the expiration time of the signature or Infinity if signature does not expire - * @returns {Date} Expiration time. + * @returns {Date | Infinity} Expiration time. */ getExpirationTime() { - return !this.signatureNeverExpires ? new Date(this.created.getTime() + this.signatureExpirationTime * 1000) : Infinity; + return this.signatureNeverExpires ? Infinity : new Date(this.created.getTime() + this.signatureExpirationTime * 1000); } } diff --git a/test/general/ecc_secp256k1.js b/test/general/ecc_secp256k1.js index 0b0e7358..4c004275 100644 --- a/test/general/ecc_secp256k1.js +++ b/test/general/ecc_secp256k1.js @@ -231,7 +231,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve return openpgp.generateKey(options).then(function (key) { expect(key).to.exist; expect(key.key).to.exist; - expect(key.key.primaryKey).to.exist; + expect(key.key.keyPacket).to.exist; expect(key.privateKeyArmored).to.exist; expect(key.publicKeyArmored).to.exist; }); diff --git a/test/general/key.js b/test/general/key.js index 4bc5802a..9718c43a 100644 --- a/test/general/key.js +++ b/test/general/key.js @@ -2415,7 +2415,7 @@ function versionSpecificTests() { const actual_delta = (new Date(expiration) - new Date()) / 1000; expect(Math.abs(actual_delta - expect_delta)).to.be.below(60); - const subKeyExpiration = await key.subKeys[0].getExpirationTime(key.primaryKey); + const subKeyExpiration = await key.subKeys[0].getExpirationTime(); expect(subKeyExpiration).to.exist; const actual_subKeyDelta = (new Date(subKeyExpiration) - new Date()) / 1000; @@ -2693,7 +2693,7 @@ function versionSpecificTests() { // ssb cv25519 2019-03-20 [E] // E4557C2B02FFBF4B04F87401EC336AF7133D0F85BE7FD09BAEFD9CAEB8C93965 const key = await openpgp.readKey({ armoredKey: v5_sample_key }); - expect(await key.primaryKey.getFingerprint()).to.equal('19347bc9872464025f99df3ec2e0000ed9884892e1f7b3ea4c94009159569b54'); + expect(await key.keyPacket.getFingerprint()).to.equal('19347bc9872464025f99df3ec2e0000ed9884892e1f7b3ea4c94009159569b54'); expect(await key.subKeys[0].getFingerprint()).to.equal('e4557c2b02ffbf4b04f87401ec336af7133d0f85be7fd09baefd9caeb8c93965'); await key.verifyPrimaryKey(); }); @@ -2816,9 +2816,7 @@ module.exports = () => describe('Key', function() { expect(pubKey.subKeys).to.exist; expect(pubKey.subKeys).to.have.length(2); - await expect(pubKey.subKeys[0].verify( - pubKey.primaryKey - )).to.be.rejectedWith('Subkey is revoked'); + await expect(pubKey.subKeys[0].verify()).to.be.rejectedWith('Subkey is revoked'); }); it('Verify status of key with non-self revocation signature', async function() { @@ -2842,19 +2840,24 @@ module.exports = () => describe('Key', function() { expect(signatures[1].valid).to.be.false; const { user } = await pubKey.getPrimaryUser(); - await expect(user.verifyCertificate(pubKey.primaryKey, user.otherCertifications[0], [certifyingKey], undefined, openpgp.config)).to.be.rejectedWith('User certificate is revoked'); + await expect(user.verifyCertificate(pubKey.keyPacket, user.otherCertifications[0], [certifyingKey], undefined, openpgp.config)).to.be.rejectedWith('User certificate is revoked'); } finally { openpgp.config.rejectPublicKeyAlgorithms = rejectPublicKeyAlgorithms; } }); + it('Verify primary key with authorized revocation key in a direct-key signature', async function() { + const pubKey = await openpgp.readKey({ armoredKey: key_with_authorized_revocation_key_in_separate_sig }); + await pubKey.verifyPrimaryKey(); + }); + it('Verify certificate of key with future creation date', async function() { const pubKey = await openpgp.readKey({ armoredKey: key_created_2030 }); const user = pubKey.users[0]; - await user.verifyCertificate(pubKey.primaryKey, user.selfCertifications[0], [pubKey], pubKey.primaryKey.created, openpgp.config); - const verifyAllResult = await user.verifyAllCertifications(pubKey.primaryKey, [pubKey], pubKey.primaryKey.created); + await user.verifyCertificate(pubKey.keyPacket, user.selfCertifications[0], [pubKey], pubKey.keyPacket.created, openpgp.config); + const verifyAllResult = await user.verifyAllCertifications(pubKey.keyPacket, [pubKey], pubKey.keyPacket.created); expect(verifyAllResult[0].valid).to.be.true; - await user.verify(pubKey.primaryKey, pubKey.primaryKey.created); + await user.verify(pubKey.keyPacket, pubKey.keyPacket.created); }); it('Evaluate key flags to find valid encryption key packet', async function() { @@ -2908,29 +2911,38 @@ module.exports = () => describe('Key', function() { const [, pubKey] = await openpgp.readKeys({ armoredKeys: twoKeys }); expect(pubKey).to.exist; expect(pubKey).to.be.an.instanceof(openpgp.PublicKey); - const expirationTime = await pubKey.subKeys[0].getExpirationTime(pubKey.primaryKey); + const expirationTime = await pubKey.subKeys[0].getExpirationTime(); expect(expirationTime.toISOString()).to.be.equal('2018-11-26T10:58:29.000Z'); }); it('Method getExpirationTime V4 Key with capabilities', async function() { - const pubKey = await openpgp.readKey({ armoredKey: priv_key_2000_2008 }); - expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.PublicKey); - pubKey.users[0].selfCertifications[0].keyFlags = [1]; - const expirationTime = await pubKey.getExpirationTime(); - expect(expirationTime).to.equal(Infinity); - const encryptExpirationTime = await pubKey.getExpirationTime('encrypt_sign'); - expect(encryptExpirationTime.toISOString()).to.equal('2008-02-12T17:12:08.000Z'); + const { minRSABits } = openpgp.config; + try { + openpgp.config.minRSABits = 1024; + const privKey = await openpgp.readKey({ armoredKey: priv_key_2000_2008 }); + privKey.users[0].selfCertifications[0].keyFlags = [1]; + const expirationTime = await privKey.getExpirationTime(); + expect(expirationTime).to.equal(Infinity); + const encryptExpirationTime = await privKey.getExpirationTime('encrypt_sign'); + expect(encryptExpirationTime.toISOString()).to.equal('2008-02-12T17:12:08.000Z'); + } finally { + openpgp.config.minRSABits = minRSABits; + } + }); it('Method getExpirationTime V4 Key with capabilities - capable primary key', async function() { - const pubKey = await openpgp.readKey({ armoredKey: priv_key_2000_2008 }); - expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.PublicKey); - const expirationTime = await pubKey.getExpirationTime(); - expect(expirationTime).to.equal(Infinity); - const encryptExpirationTime = await pubKey.getExpirationTime('encrypt_sign'); - expect(encryptExpirationTime).to.equal(Infinity); + const { minRSABits } = openpgp.config; + try { + openpgp.config.minRSABits = 1024; + const privKey = await openpgp.readKey({ armoredKey: priv_key_2000_2008 }); + const expirationTime = await privKey.getExpirationTime(); + expect(expirationTime).to.equal(Infinity); + const encryptExpirationTime = await privKey.getExpirationTime('encrypt_sign'); + expect(encryptExpirationTime).to.equal(Infinity); + } finally { + openpgp.config.minRSABits = minRSABits; + } }); it("decryptKey() - throw if key parameters don't correspond", async function() { @@ -2985,7 +2997,7 @@ module.exports = () => describe('Key', function() { it('makeDummy() - the converted key can be parsed', async function() { const { key } = await openpgp.generateKey({ userIDs: { name: 'dummy', email: 'dummy@alice.com' } }); - key.primaryKey.makeDummy(); + key.keyPacket.makeDummy(); const parsedKeys = await openpgp.readKey({ armoredKey: key.armor() }); expect(parsedKeys).to.not.be.empty; }); @@ -2993,7 +3005,7 @@ module.exports = () => describe('Key', function() { it('makeDummy() - the converted key can be encrypted and decrypted', async function() { const { key } = await openpgp.generateKey({ userIDs: { name: 'dummy', email: 'dummy@alice.com' } }); const passphrase = 'passphrase'; - key.primaryKey.makeDummy(); + key.keyPacket.makeDummy(); expect(key.isDecrypted()).to.be.true; const encryptedKey = await openpgp.encryptKey({ privateKey: key, passphrase }); expect(encryptedKey.isDecrypted()).to.be.false; @@ -3006,9 +3018,9 @@ module.exports = () => describe('Key', function() { privateKey: await openpgp.readKey({ armoredKey: priv_key_rsa }), passphrase: 'hello world' }); - expect(key.primaryKey.isDummy()).to.be.false; - key.primaryKey.makeDummy(); - expect(key.primaryKey.isDummy()).to.be.true; + expect(key.keyPacket.isDummy()).to.be.false; + key.keyPacket.makeDummy(); + expect(key.keyPacket.isDummy()).to.be.true; await key.validate(); await expect(openpgp.reformatKey({ privateKey: key, userIDs: { name: 'test', email: 'a@b.com' } })).to.be.rejectedWith(/Cannot reformat a gnu-dummy primary key/); }); @@ -3018,27 +3030,27 @@ module.exports = () => describe('Key', function() { privateKey: await openpgp.readKey({ armoredKey: priv_key_rsa }), passphrase: 'hello world' }); - expect(key.primaryKey.isDummy()).to.be.false; - key.primaryKey.makeDummy(); - expect(key.primaryKey.isDummy()).to.be.true; + expect(key.keyPacket.isDummy()).to.be.false; + key.keyPacket.makeDummy(); + expect(key.keyPacket.isDummy()).to.be.true; await expect(openpgp.sign({ message: await openpgp.createMessage({ text: 'test' }), signingKeys: [key], config: { minRSABits: 1024 } })).to.be.fulfilled; }); it('makeDummy() - should work for encrypted keys', async function() { const passphrase = 'hello world'; const key = await openpgp.readKey({ armoredKey: priv_key_rsa }); - expect(key.primaryKey.isDummy()).to.be.false; - expect(key.primaryKey.makeDummy()).to.not.throw; - expect(key.primaryKey.isDummy()).to.be.true; + expect(key.keyPacket.isDummy()).to.be.false; + expect(key.keyPacket.makeDummy()).to.not.throw; + expect(key.keyPacket.isDummy()).to.be.true; // dummy primary key should always be marked as not decrypted const decryptedKey = await openpgp.decryptKey({ privateKey: key, passphrase }); - expect(decryptedKey.primaryKey.isDummy()).to.be.true; - expect(decryptedKey.primaryKey.isEncrypted === null); - expect(decryptedKey.primaryKey.isDecrypted()).to.be.false; + expect(decryptedKey.keyPacket.isDummy()).to.be.true; + expect(decryptedKey.keyPacket.isEncrypted === null); + expect(decryptedKey.keyPacket.isDecrypted()).to.be.false; const encryptedKey = await openpgp.encryptKey({ privateKey: decryptedKey, passphrase }); - expect(encryptedKey.primaryKey.isDummy()).to.be.true; - expect(encryptedKey.primaryKey.isEncrypted === null); - expect(encryptedKey.primaryKey.isDecrypted()).to.be.false; + expect(encryptedKey.keyPacket.isDummy()).to.be.true; + expect(encryptedKey.keyPacket.isEncrypted === null); + expect(encryptedKey.keyPacket.isDecrypted()).to.be.false; // confirm that the converted keys can be parsed await openpgp.readKey({ armoredKey: encryptedKey.armor() }); await openpgp.readKey({ armoredKey: decryptedKey.armor() }); @@ -3061,8 +3073,8 @@ module.exports = () => describe('Key', function() { const signingKeyPacket = key.subKeys[0].keyPacket; const privateParams = signingKeyPacket.privateParams; await key.clearPrivateParams(); - key.primaryKey.isEncrypted = false; - key.primaryKey.privateParams = privateParams; + key.keyPacket.isEncrypted = false; + key.keyPacket.privateParams = privateParams; key.subKeys[0].keyPacket.isEncrypted = false; key.subKeys[0].keyPacket.privateParams = privateParams; await expect(key.validate()).to.be.rejectedWith('Key is invalid'); @@ -3079,8 +3091,8 @@ module.exports = () => describe('Key', function() { privateParams[name] = value; }); await key.clearPrivateParams(); - key.primaryKey.isEncrypted = false; - key.primaryKey.privateParams = privateParams; + key.keyPacket.isEncrypted = false; + key.keyPacket.privateParams = privateParams; key.subKeys[0].keyPacket.isEncrypted = false; key.subKeys[0].keyPacket.privateParams = privateParams; await expect(key.validate()).to.be.rejectedWith('Key is invalid'); @@ -3162,11 +3174,11 @@ module.exports = () => describe('Key', function() { updated.verifyPrimaryKey().then(async result => { await expect(source.verifyPrimaryKey()).to.eventually.equal(result); }), - updated.users[0].verify(updated.primaryKey).then(async result => { - await expect(source.users[0].verify(source.primaryKey)).to.eventually.equal(result); + updated.users[0].verify(updated.keyPacket).then(async result => { + await expect(source.users[0].verify(source.keyPacket)).to.eventually.equal(result); }), - updated.subKeys[0].verify(updated.primaryKey).then(async result => { - await expect(source.subKeys[0].verify(source.primaryKey)).to.eventually.deep.equal(result); + updated.subKeys[0].verify().then(async result => { + await expect(source.subKeys[0].verify()).to.eventually.deep.equal(result); }) ]); }); @@ -3182,17 +3194,11 @@ module.exports = () => describe('Key', function() { const updated = await dest.update(source); expect(updated.isPrivate()).to.be.true; - const { selfCertification: destCertification } = await updated.getPrimaryUser(); - const { selfCertification: sourceCertification } = await source.getPrimaryUser(); - destCertification.verified = null; - sourceCertification.verified = null; - await updated.verifyPrimaryKey().then(async () => expect(destCertification.verified).to.be.true); - await source.verifyPrimaryKey().then(async () => expect(sourceCertification.verified).to.be.true); + await updated.verifyPrimaryKey(); + await source.verifyPrimaryKey(); - destCertification.verified = null; - sourceCertification.verified = null; - await updated.users[0].verify(updated.primaryKey).then(async () => expect(destCertification.verified).to.be.true); - await source.users[0].verify(source.primaryKey).then(async () => expect(sourceCertification.verified).to.be.true); + await updated.users[0].verify(updated.keyPacket); + await source.users[0].verify(source.keyPacket); }); it('update() - merge private key into public key - mismatch throws error', async function() { @@ -3209,11 +3215,14 @@ module.exports = () => describe('Key', function() { const source = await openpgp.readKey({ armoredKey: pgp_desktop_pub }); const dest = await openpgp.readKey({ armoredKey: pgp_desktop_priv }); expect(source.subKeys[0].bindingSignatures[0]).to.exist; - await source.subKeys[0].verify(source.primaryKey); + await source.subKeys[0].verify(); expect(dest.subKeys[0].bindingSignatures[0]).to.not.exist; const updated = await dest.update(source); expect(updated.subKeys[0].bindingSignatures[0]).to.exist; - await updated.subKeys[0].verify(source.primaryKey); + // the source primary key should still verify the subkey + updated.subKeys[0].mainKey = source; + await updated.subKeys[0].verify(); + updated.subKeys[0].mainKey = updated; }); it('update() - merge multiple subkey binding signatures', async function() { @@ -3221,12 +3230,12 @@ module.exports = () => describe('Key', function() { const dest = await openpgp.readKey({ armoredKey: multipleBindingSignatures }); // remove last subkey binding signature of destination subkey dest.subKeys[0].bindingSignatures.length = 1; - expect((await source.subKeys[0].getExpirationTime(source.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); - expect((await dest.subKeys[0].getExpirationTime(dest.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); + expect((await source.subKeys[0].getExpirationTime()).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); + expect((await dest.subKeys[0].getExpirationTime()).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); return dest.update(source).then(async updated => { expect(updated.subKeys[0].bindingSignatures.length).to.equal(1); // destination key gets new expiration date from source key which has newer subkey binding signature - expect((await updated.subKeys[0].getExpirationTime(updated.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); + expect((await updated.subKeys[0].getExpirationTime()).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); }); }); @@ -3258,7 +3267,7 @@ module.exports = () => describe('Key', function() { }); const subKey = pubKey.subKeys[0]; - await subKey.revoke(privKey.primaryKey, { + await subKey.revoke(privKey.keyPacket, { flag: openpgp.enums.reasonForRevocation.keySuperseded }).then(async revKey => { expect(revKey.revocationSignatures).to.exist.and.have.length(1); @@ -3266,8 +3275,8 @@ module.exports = () => describe('Key', function() { expect(revKey.revocationSignatures[0].reasonForRevocationFlag).to.equal(openpgp.enums.reasonForRevocation.keySuperseded); expect(revKey.revocationSignatures[0].reasonForRevocationString).to.equal(''); - await subKey.verify(pubKey.primaryKey); - await expect(revKey.verify(pubKey.primaryKey)).to.be.rejectedWith('Subkey is revoked'); + await subKey.verify(); + await expect(revKey.verify()).to.be.rejectedWith('Subkey is revoked'); }); }); @@ -3491,27 +3500,27 @@ VYGdb3eNlV8CfoEC it('Selects the most recent subkey binding signature', async function() { const key = await openpgp.readKey({ armoredKey: multipleBindingSignatures }); - expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); + expect((await key.subKeys[0].getExpirationTime()).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); }); it('Selects the most recent non-expired subkey binding signature', async function() { const key = await openpgp.readKey({ armoredKey: multipleBindingSignatures }); key.subKeys[0].bindingSignatures[1].signatureNeverExpires = false; key.subKeys[0].bindingSignatures[1].signatureExpirationTime = 0; - expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); + expect((await key.subKeys[0].getExpirationTime()).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); }); it('Selects the most recent valid subkey binding signature', async function() { const key = await openpgp.readKey({ armoredKey: multipleBindingSignatures }); key.subKeys[0].bindingSignatures[1].signatureData[0]++; - expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); + expect((await key.subKeys[0].getExpirationTime()).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); }); it('Handles a key with no valid subkey binding signatures gracefully', async function() { const key = await openpgp.readKey({ armoredKey: multipleBindingSignatures }); key.subKeys[0].bindingSignatures[0].signatureData[0]++; key.subKeys[0].bindingSignatures[1].signatureData[0]++; - expect(await key.subKeys[0].getExpirationTime(key.primaryKey)).to.be.null; + expect(await key.subKeys[0].getExpirationTime()).to.be.null; }); it('Reject encryption with revoked primary user', async function() { @@ -3590,11 +3599,11 @@ VYGdb3eNlV8CfoEC expect(subKey).to.exist; expect(newPrivateKey.subKeys.length).to.be.equal(total + 1); const subkeyN = subKey.keyPacket.publicParams.n; - const pkN = privateKey.primaryKey.publicParams.n; + const pkN = privateKey.keyPacket.publicParams.n; expect(subkeyN.length).to.be.equal(pkN.length); expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign'); expect(subKey.getAlgorithmInfo().bits).to.be.equal(privateKey.getAlgorithmInfo().bits); - await subKey.verify(newPrivateKey.primaryKey); + await subKey.verify(); }); it('Add a new default subkey to an rsaSign key', async function() { @@ -3654,7 +3663,7 @@ VYGdb3eNlV8CfoEC const subKey = importedPrivateKey.subKeys[total]; expect(subKey).to.exist; expect(importedPrivateKey.subKeys.length).to.be.equal(total + 1); - await subKey.verify(importedPrivateKey.primaryKey); + await subKey.verify(); }); it('create and add a new ec subkey to a ec key', async function() { @@ -3677,10 +3686,10 @@ VYGdb3eNlV8CfoEC expect(subKey2).to.exist; expect(newPrivateKey.subKeys.length).to.be.equal(total + 1); const subkeyOid = subKey2.keyPacket.publicParams.oid; - const pkOid = privateKey.primaryKey.publicParams.oid; + const pkOid = privateKey.keyPacket.publicParams.oid; expect(subkeyOid.getName()).to.be.equal(pkOid.getName()); expect(subKey2.getAlgorithmInfo().algorithm).to.be.equal('eddsa'); - await subKey2.verify(privateKey.primaryKey); + await subKey2.verify(); }); it('create and add a new ecdsa subkey to a eddsa key', async function() { @@ -3698,7 +3707,7 @@ VYGdb3eNlV8CfoEC expect(newPrivateKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa'); expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('ecdsa'); - await subKey.verify(privateKey.primaryKey); + await subKey.verify(); }); it('create and add a new ecc subkey to a rsa key', async function() { @@ -3716,7 +3725,7 @@ VYGdb3eNlV8CfoEC expect(subKey).to.exist; expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('ecdh'); expect(subKey.getAlgorithmInfo().curve).to.be.equal(openpgp.enums.curve.curve25519); - await subKey.verify(privateKey.primaryKey); + await subKey.verify(); }); it('create and add a new rsa subkey to a ecc key', async function() { @@ -3732,7 +3741,7 @@ VYGdb3eNlV8CfoEC expect(newPrivateKey.subKeys.length).to.be.equal(total + 1); expect(subKey.getAlgorithmInfo().bits).to.be.equal(4096); expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign'); - await subKey.verify(privateKey.primaryKey); + await subKey.verify(); }); it('create and add a new rsa subkey to a dsa key', async function() { @@ -3745,7 +3754,7 @@ VYGdb3eNlV8CfoEC expect(subKey).to.exist; expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign'); expect(subKey.getAlgorithmInfo().bits).to.be.equal(2048); - await subKey.verify(privateKey.primaryKey); + await subKey.verify(); }); it('sign/verify data with the new subkey correctly using curve25519', async function() { @@ -3759,10 +3768,10 @@ VYGdb3eNlV8CfoEC newPrivateKey = await openpgp.readKey({ armoredKey: armoredKey }); const subKey = newPrivateKey.subKeys[total]; const subkeyOid = subKey.keyPacket.publicParams.oid; - const pkOid = newPrivateKey.primaryKey.publicParams.oid; + const pkOid = newPrivateKey.keyPacket.publicParams.oid; expect(subkeyOid.getName()).to.be.equal(pkOid.getName()); expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa'); - await subKey.verify(newPrivateKey.primaryKey); + await subKey.verify(); expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey); const signed = await openpgp.sign({ message: await openpgp.createMessage({ text: 'the data to signed' }), signingKeys: newPrivateKey, armor:false }); const message = await openpgp.readMessage({ binaryMessage: signed }); @@ -3784,7 +3793,7 @@ VYGdb3eNlV8CfoEC newPrivateKey = await openpgp.readKey({ armoredKey: armoredKey }); const subKey = newPrivateKey.subKeys[total]; const publicKey = newPrivateKey.toPublic(); - await subKey.verify(newPrivateKey.primaryKey); + await subKey.verify(); expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey); const encrypted = await openpgp.encrypt({ message: await openpgp.createMessage({ text: vData }), encryptionKeys: publicKey, armor:false }); expect(encrypted).to.be.exist; @@ -3810,7 +3819,7 @@ VYGdb3eNlV8CfoEC newPrivateKey = await openpgp.readKey({ armoredKey: armoredKey }); const subKey = newPrivateKey.subKeys[total]; expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign'); - await subKey.verify(newPrivateKey.primaryKey); + await subKey.verify(); expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey); const signed = await openpgp.sign({ message: await openpgp.createMessage({ text: 'the data to signed' }), signingKeys: newPrivateKey, armor:false }); const message = await openpgp.readMessage({ binaryMessage: signed }); @@ -3849,12 +3858,12 @@ VYGdb3eNlV8CfoEC it('Subkey.verify returns the latest valid signature', async function () { const { key: encryptionKey } = await openpgp.generateKey({ userIDs: { name: "purple" } }); - const encryptionKeySignature = await encryptionKey.getSubkeys()[0].verify(encryptionKey); + const encryptionKeySignature = await encryptionKey.getSubkeys()[0].verify(); expect(encryptionKeySignature instanceof openpgp.SignaturePacket).to.be.true; expect(encryptionKeySignature.keyFlags[0] & openpgp.enums.keyFlags.encryptCommunication).to.be.equals(openpgp.enums.keyFlags.encryptCommunication); expect(encryptionKeySignature.keyFlags[0] & openpgp.enums.keyFlags.encryptStorage).to.be.equals(openpgp.enums.keyFlags.encryptStorage); const { key: signingKey } = await openpgp.generateKey({ userIDs: { name: "purple" }, subkeys: [{ sign: true }] }); - const signingKeySignature = await signingKey.getSubkeys()[0].verify(signingKey); + const signingKeySignature = await signingKey.getSubkeys()[0].verify(); expect(signingKeySignature instanceof openpgp.SignaturePacket).to.be.true; expect(signingKeySignature.keyFlags[0] & openpgp.enums.keyFlags.signData).to.be.equals(openpgp.enums.keyFlags.signData); }); diff --git a/test/general/openpgp.js b/test/general/openpgp.js index 1459c5b3..48a45e2e 100644 --- a/test/general/openpgp.js +++ b/test/general/openpgp.js @@ -736,6 +736,51 @@ AP9fcXZg/Eo55YB/B5XKLkuzDFwJaTlncrD5jcUgtVXFCg== =q2yi -----END PGP PRIVATE KEY BLOCK-----`; +const armoredDummyPrivateKey1 = `-----BEGIN PGP PRIVATE KEY BLOCK----- +Version: GnuPG v1.4.11 (GNU/Linux) + +lQGqBFERnrMRBADmM0hIfkI3yosjgbWo9v0Lnr3CCE+8KsMszgVS+hBu0XfGraKm +ivcA2aaJimHqVYOP7gEnwFAxHBBpeTJcu5wzCFyJwEYqVeS3nnaIhBPplSF14Duf +i6bB9RV7KxVAg6aunmM2tAutqC+a0y2rDaf7jkJoZ9gWJe2zI+vraD6fiwCgxvHo +3IgULB9RqIqpLoMgXfcjC+cD/1jeJlKRm+n71ryYwT/ECKsspFz7S36z6q3XyS8Q +QfrsUz2p1fbFicvJwIOJ8B20J/N2/nit4P0gBUTUxv3QEa7XCM/56/xrGkyBzscW +AzBoy/AK9K7GN6z13RozuAS60F1xO7MQc6Yi2VU3eASDQEKiyL/Ubf/s/rkZ+sGj +yJizBACtwCbQzA+z9XBZNUat5NPgcZz5Qeh1nwF9Nxnr6pyBv7tkrLh/3gxRGHqG +063dMbUk8pmUcJzBUyRsNiIPDoEUsLjY5zmZZmp/waAhpREsnK29WLCbqLdpUors +c1JJBsObkA1IM8TZY8YUmvsMEvBLCCanuKpclZZXqeRAeOHJ0v4DZQJHTlUBtBZU +ZXN0MiA8dGVzdDJAdGVzdC5jb20+iGIEExECACIFAlERnrMCGwMGCwkIBwMCBhUI +AgkKCwQWAgMBAh4BAheAAAoJEBEnlAPLFp74xc0AoLNZINHe0ytOsNtMCuLvc3Vd +vePUAJ9KX3L5IBqHarsa+aJHX7r796SokZ0BWARREZ6zEAQA2WkxmNbfeMzGUocN +3JEVe0o6rxGt5eGrTSmWisduDP3MURabhUXnf4T8oaeYcbJjkLLxMrJmNq55ln1e +4bSG5mDkh/ryKsV81m3F0DbqO/z/891nRSP5fondFVral4wsMOzBNgs4vVk7V/F2 +0MPjR90CIhnVDKPAQbQA+3PjUR8AAwUEALn922AEE+0d7xSMMFpR7ic3Me5QEGnp +cT4ft6oc0UK5kAnvKoksZUc0hpBHjX1w3LTz847/5hRDuuDvwvGMWK8IfsjOF9T7 +rK8QtJuBEyJxjoScA/YZP5vX4y0U1reUEa0EdwmVrnZzatMAe2FhlaR9PlHkOcm5 +DZwkcExL0dbI/gMDArxZ+5N7kH4zYLtr9glJS/pJ7F0YJqJpNwCbqD8+8DqHD8Uv +MgQ/rtBxBJJOaF+1AjCd123hLgzIkkfdTh8loV9hDXMKeJgmiEkEGBECAAkFAlER +nrMCGwwACgkQESeUA8sWnvhBswCfdXjznvHCc73/6/MhWcv3dbeTT/wAoLyiZg8+ +iY3UT9QkV9d0sMgyLkug +=GQsY +-----END PGP PRIVATE KEY BLOCK-----`; + +const armoredPublicKey1 = `-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.11 (GNU/Linux) + +mQGiBFERlw4RBAD6Bmcf2w1dtUmtCLkdxeqZLArk3vYoQAjdibxA3gXVyur7fsWb +ro0jVbBHqOCtC6jDxE2l52NP9+tTlWeVMaqqNvUE47LSaPq2DGI8Wx1Rj6bF3mTs +obYEwhGbGh/MhJnME9AHODarvk8AZbzo0+k1EwrBWF6dTUBPfqO7rGU2ewCg80WV +x5pt3evj8rRK3jQ8SMKTNRsD/1PhTdxdZTdXARAFzcW1VaaruWW0Rr1+XHKKwDCz +i7HE76SO9qjnQfZCZG75CdQxI0h8GFeN3zsDqmhob2iSz2aJ1krtjM+iZ1FBFd57 +OqCV6wmk5IT0RBN12ZzMS19YvzN/ONXHrmTZlKExd9Mh9RKLeVNw+bf6JsKQEzcY +JzFkBACX9X+hDYchO/2hiTwx4iOO9Fhsuh7eIWumB3gt+aUpm1jrSbas/QLTymmk +uZuQVXI4NtnlvzlNgWv4L5s5RU5WqNGG7WSaKNdcrvJZRC2dgbUJt04J5CKrWp6R +aIYal/81Ut1778lU01PEt563TcQnUBlnjU5OR25KhfSeN5CZY7QUVGVzdCA8dGVz +dEB0ZXN0LmNvbT6IYgQTEQIAIgUCURGXDgIbAwYLCQgHAwIGFQgCCQoLBBYCAwEC +HgECF4AACgkQikDlZK/UvLSspgCfcNaOpTg1W2ucR1JwBbBGvaERfuMAnRgt3/rs +EplqEakMckCtikEnpxYe +=b2Ln +-----END PGP PUBLIC KEY BLOCK-----`; + function withCompression(tests) { const compressionTypes = Object.keys(openpgp.enums.compression).map(k => openpgp.enums.compression[k]); @@ -1058,14 +1103,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); expect(key.isDecrypted()).to.be.true; expect(locked.isDecrypted()).to.be.false; - expect(locked.primaryKey.isDummy()).to.be.true; + expect(locked.keyPacket.isDummy()).to.be.true; const unlocked = await openpgp.decryptKey({ privateKey: locked, passphrase: passphrase }); expect(key.isDecrypted()).to.be.true; expect(unlocked.isDecrypted()).to.be.true; - expect(unlocked.primaryKey.isDummy()).to.be.true; + expect(unlocked.keyPacket.isDummy()).to.be.true; }); }); @@ -1246,6 +1291,60 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { stream.readToEnd(streamedData) ).to.be.eventually.rejectedWith(/Could not find signing key/); }); + + it('Supports decrypting with GnuPG dummy key', async function() { + const { rejectMessageHashAlgorithms } = openpgp.config; + Object.assign(openpgp.config, { rejectMessageHashAlgorithms: new Set([openpgp.enums.hash.md5, openpgp.enums.hash.ripemd]) }); + try { + const armoredMessage = `-----BEGIN PGP MESSAGE----- +Version: GnuPG v1.4.11 (GNU/Linux) + +hQEOA1N4OCSSjECBEAP/diDJCQn4e88193PgqhbfAkohk9RQ0v0MPnXpJbCRTHKO +8r9nxiAr/TQv4ZOingXdAp2JZEoE9pXxZ3r1UWew04czxmgJ8FP1ztZYWVFAWFVi +Tj930TBD7L1fY/MD4fK6xjEG7z5GT8k4tn4mLm/PpWMbarIglfMopTy1M/py2cID +/2Sj7Ikh3UFiG+zm4sViYc5roNbMy8ixeoKixxi99Mx8INa2cxNfqbabjblFyc0Z +BwmbIc+ZiY2meRNI5y/tk0gRD7hT84IXGGl6/mH00bsX/kkWdKGeTvz8s5G8RDHa +Za4HgLbXItkX/QarvRS9kvkD01ujHfj+1ZvgmOBttNfP0p8BQLIICqvg1eYD9aPB ++GtOZ2F3+k5VyBL5yIn/s65SBjNO8Fqs3aL0x+p7s1cfUzx8J8a8nWpqq/qIQIqg +ZJH6MZRKuQwscwH6NWgsSVwcnVCAXnYOpbHxFQ+j7RbF/+uiuqU+DFH/Rd5pik8b +0Dqnp0yfefrkjQ0nuvubgB6Rv89mHpnvuJfFJRInpg4lrHwLvRwdpN2HDozFHcKK +aOU= +=4iGt +-----END PGP MESSAGE-----`; + const passphrase = 'abcd'; + // exercises the GnuPG s2k type 1001 extension: + // the secrets on the primary key have been stripped. + const dummyKey = await openpgp.readKey({ armoredKey: armoredDummyPrivateKey1 }); + const publicKey = await openpgp.readKey({ armoredKey: armoredPublicKey1 }); + const message = await openpgp.readMessage({ armoredMessage }); + const primaryKeyPacket = dummyKey.keyPacket.write(); + expect(dummyKey.isDecrypted()).to.be.false; + const decryptedDummyKey = await openpgp.decryptKey({ privateKey: dummyKey, passphrase }); + expect(decryptedDummyKey.isDecrypted()).to.be.true; + // decrypting with a secret subkey works + const msg = await openpgp.decrypt({ + message, decryptionKeys: decryptedDummyKey, verificationKeys: publicKey, config: { rejectPublicKeyAlgorithms: new Set() } + }); + expect(msg.signatures).to.exist; + expect(msg.signatures).to.have.length(1); + expect(msg.signatures[0].valid).to.be.true; + expect(msg.signatures[0].signature.packets.length).to.equal(1); + // secret key operations involving the primary key should fail + await expect(openpgp.sign({ + message: await openpgp.createMessage({ text: 'test' }), signingKeys: decryptedDummyKey, config: { rejectPublicKeyAlgorithms: new Set() } + })).to.eventually.be.rejectedWith(/Cannot sign with a gnu-dummy key/); + await expect( + openpgp.reformatKey({ userIDs: { name: 'test' }, privateKey: decryptedDummyKey }) + ).to.eventually.be.rejectedWith(/Cannot reformat a gnu-dummy primary key/); + + const encryptedDummyKey = await openpgp.encryptKey({ privateKey: decryptedDummyKey, passphrase }); + expect(encryptedDummyKey.isDecrypted()).to.be.false; + const primaryKeyPacket2 = encryptedDummyKey.keyPacket.write(); + expect(primaryKeyPacket).to.deep.equal(primaryKeyPacket2); + } finally { + Object.assign(openpgp.config, { rejectMessageHashAlgorithms }); + } + }); }); describe('verify - unit tests', function() { @@ -1262,6 +1361,86 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { describe('message', function() { verifyTests(false); + + it('verify should succeed with valid signature (expectSigned=true, with streaming)', async function () { + const publicKey = await openpgp.readKey({ armoredKey: pub_key }); + const privateKey = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key }), + passphrase + }); + + const signed = await openpgp.sign({ + message: await openpgp.createMessage({ text: plaintext }), + signingKeys: privateKey + }); + const { data: streamedData, signatures } = await openpgp.verify({ + message: await openpgp.readMessage({ armoredMessage: stream.toStream(signed) }), + verificationKeys: publicKey, + expectSigned: true + }); + const data = await stream.readToEnd(streamedData); + expect(data).to.equal(plaintext); + expect(await signatures[0].verified).to.be.true; + }); + + it('verify should throw on missing signature (expectSigned=true, with streaming)', async function () { + + const publicKey = await openpgp.readKey({ armoredKey: pub_key }); + + await expect(openpgp.verify({ + message: await openpgp.createMessage({ text: stream.toStream(plaintext) }), + verificationKeys: publicKey, + expectSigned: true + })).to.be.eventually.rejectedWith(/Message is not signed/); + }); + + it('verify should throw on invalid signature (expectSigned=true, with streaming)', async function () { + const wrongPublicKey = (await openpgp.readKey({ armoredKey: priv_key_2000_2008 })).toPublic(); + const privateKey = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key }), + passphrase + }); + + const signed = await openpgp.sign({ + message: await openpgp.createMessage({ text: plaintext }), + signingKeys: privateKey + }); + const { data: streamedData } = await openpgp.verify({ + message: await openpgp.readMessage({ armoredMessage: stream.toStream(signed) }), + verificationKeys: wrongPublicKey, + expectSigned: true + }); + await expect( + stream.readToEnd(streamedData) + ).to.be.eventually.rejectedWith(/Could not find signing key/); + }); + + it('verify should fail if the signature is re-used with a different message', async function () { + const privateKey = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key }), + passphrase + }); + + const message = await openpgp.createMessage({ text: 'a message' }); + const armoredSignature = await openpgp.sign({ + message, + signingKeys: privateKey, + detached: true + }); + const { signatures } = await openpgp.verify({ + message, + signature: await openpgp.readSignature({ armoredSignature }), + verificationKeys: privateKey.toPublic() + }); + expect(await signatures[0].verified).to.be.true; + // pass a different message + await expect(openpgp.verify({ + message: await openpgp.createMessage({ text: 'a different message' }), + signature: await openpgp.readSignature({ armoredSignature }), + verificationKeys: privateKey.toPublic(), + expectSigned: true + })).to.be.rejectedWith(/digest did not match/); + }); }); describe('cleartext message', function() { @@ -1324,67 +1503,17 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { expectSigned: true })).to.be.eventually.rejectedWith(/Could not find signing key/); }); - - it('verify should succeed with valid signature (expectSigned=true, with streaming)', async function () { - if (useCleartext) this.skip(); // eslint-disable-line no-invalid-this - - const publicKey = await openpgp.readKey({ armoredKey: pub_key }); - const privateKey = await openpgp.decryptKey({ - privateKey: await openpgp.readKey({ armoredKey: priv_key }), - passphrase - }); - - const signed = await openpgp.sign({ - message: await createMessage({ text }), - signingKeys: privateKey - }); - const { data: streamedData, signatures } = await openpgp.verify({ - message: await readMessage({ armoredMessage: stream.toStream(signed) }), - verificationKeys: publicKey, - expectSigned: true - }); - const data = await stream.readToEnd(streamedData); - expect(data).to.equal(text); - expect(await signatures[0].verified).to.be.true; - }); - - it('verify should throw on missing signature (expectSigned=true, with streaming)', async function () { - if (useCleartext) this.skip(); // eslint-disable-line no-invalid-this - - const publicKey = await openpgp.readKey({ armoredKey: pub_key }); - - await expect(openpgp.verify({ - message: await createMessage({ text: stream.toStream(text) }), - verificationKeys: publicKey, - expectSigned: true - })).to.be.eventually.rejectedWith(/Message is not signed/); - }); - - it('verify should throw on invalid signature (expectSigned=true, with streaming)', async function () { - if (useCleartext) this.skip(); // eslint-disable-line no-invalid-this - - const wrongPublicKey = (await openpgp.readKey({ armoredKey: priv_key_2000_2008 })).toPublic(); - const privateKey = await openpgp.decryptKey({ - privateKey: await openpgp.readKey({ armoredKey: priv_key }), - passphrase - }); - - const signed = await openpgp.sign({ - message: await createMessage({ text }), - signingKeys: privateKey - }); - const { data: streamedData } = await openpgp.verify({ - message: await readMessage({ armoredMessage: stream.toStream(signed) }), - verificationKeys: wrongPublicKey, - expectSigned: true - }); - await expect( - stream.readToEnd(streamedData) - ).to.be.eventually.rejectedWith(/Could not find signing key/); - }); } }); + describe('sign - unit tests', function() { + it('Supports signing with GnuPG dummy key', async function() { + const dummyKey = await openpgp.readKey({ armoredKey: gnuDummyKeySigningSubkey }); + const sig = await openpgp.sign({ message: await openpgp.createMessage({ text: 'test' }), privateKeys: dummyKey, date: new Date('2018-12-17T03:24:00') }); + expect(sig).to.match(/-----END PGP MESSAGE-----\n$/); + }); + }); + describe('encrypt, decrypt, sign, verify - integration tests', function() { let privateKey_2000_2008; let publicKey_2000_2008; @@ -3043,7 +3172,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKey: await openpgp.readKey({ armoredKey: priv_key_de }), passphrase }); - return privKeyDE.subKeys[0].revoke(privKeyDE.primaryKey).then(async function(revSubKey) { + return privKeyDE.subKeys[0].revoke(privKeyDE.keyPacket).then(async function(revSubKey) { pubKeyDE.subKeys[0] = revSubKey; return openpgp.encrypt({ message: await openpgp.createMessage({ text: plaintext }), @@ -3068,7 +3197,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { encryptionKeys: pubKeyDE, config: { rejectPublicKeyAlgorithms: new Set() } }); - privKeyDE.subKeys[0] = await privKeyDE.subKeys[0].revoke(privKeyDE.primaryKey); + privKeyDE.subKeys[0] = await privKeyDE.subKeys[0].revoke(privKeyDE.keyPacket); const decOpt = { message: await openpgp.readMessage({ armoredMessage: encrypted }), decryptionKeys: privKeyDE, @@ -3441,5 +3570,4 @@ bsZgJWVlAa5eil6J9ePX2xbo1vVAkLQdzE9+1jL+l7PRIZuVBQ== }); }); }); - }); diff --git a/test/general/packet.js b/test/general/packet.js index 10bf6741..f5f356f4 100644 --- a/test/general/packet.js +++ b/test/general/packet.js @@ -706,15 +706,13 @@ module.exports = () => describe("Packet", function() { it('Secret key reading with signature verification.', async function() { const packets = await openpgp.PacketList.fromBinary((await openpgp.unarmor(armored_key)).data, allAllowedPackets); const [keyPacket, userIDPacket, keySigPacket, subkeyPacket, subkeySigPacket] = packets; - expect(keySigPacket.verified).to.be.null; - expect(subkeySigPacket.verified).to.be.null; await keySigPacket.verify( keyPacket, openpgp.enums.signature.certGeneric, { userID: userIDPacket, key: keyPacket } - ).then(async () => expect(keySigPacket.verified).to.be.true); + ); await subkeySigPacket.verify( keyPacket, openpgp.enums.signature.keyBinding, { key: keyPacket, bind: subkeyPacket } - ).then(async () => expect(subkeySigPacket.verified).to.be.true); + ); }); it('Reading a signed, encrypted message.', async function() { diff --git a/test/general/signature.js b/test/general/signature.js index b174b3fa..f24e0045 100644 --- a/test/general/signature.js +++ b/test/general/signature.js @@ -41,34 +41,6 @@ module.exports = () => describe("Signature", function() { '=LSrW', '-----END PGP PRIVATE KEY BLOCK-----'].join("\n"); - const priv_key_arm1_stripped = - ['-----BEGIN PGP PRIVATE KEY BLOCK-----', - 'Version: GnuPG v1.4.11 (GNU/Linux)', - '', - 'lQGqBFERnrMRBADmM0hIfkI3yosjgbWo9v0Lnr3CCE+8KsMszgVS+hBu0XfGraKm', - 'ivcA2aaJimHqVYOP7gEnwFAxHBBpeTJcu5wzCFyJwEYqVeS3nnaIhBPplSF14Duf', - 'i6bB9RV7KxVAg6aunmM2tAutqC+a0y2rDaf7jkJoZ9gWJe2zI+vraD6fiwCgxvHo', - '3IgULB9RqIqpLoMgXfcjC+cD/1jeJlKRm+n71ryYwT/ECKsspFz7S36z6q3XyS8Q', - 'QfrsUz2p1fbFicvJwIOJ8B20J/N2/nit4P0gBUTUxv3QEa7XCM/56/xrGkyBzscW', - 'AzBoy/AK9K7GN6z13RozuAS60F1xO7MQc6Yi2VU3eASDQEKiyL/Ubf/s/rkZ+sGj', - 'yJizBACtwCbQzA+z9XBZNUat5NPgcZz5Qeh1nwF9Nxnr6pyBv7tkrLh/3gxRGHqG', - '063dMbUk8pmUcJzBUyRsNiIPDoEUsLjY5zmZZmp/waAhpREsnK29WLCbqLdpUors', - 'c1JJBsObkA1IM8TZY8YUmvsMEvBLCCanuKpclZZXqeRAeOHJ0v4DZQJHTlUBtBZU', - 'ZXN0MiA8dGVzdDJAdGVzdC5jb20+iGIEExECACIFAlERnrMCGwMGCwkIBwMCBhUI', - 'AgkKCwQWAgMBAh4BAheAAAoJEBEnlAPLFp74xc0AoLNZINHe0ytOsNtMCuLvc3Vd', - 'vePUAJ9KX3L5IBqHarsa+aJHX7r796SokZ0BWARREZ6zEAQA2WkxmNbfeMzGUocN', - '3JEVe0o6rxGt5eGrTSmWisduDP3MURabhUXnf4T8oaeYcbJjkLLxMrJmNq55ln1e', - '4bSG5mDkh/ryKsV81m3F0DbqO/z/891nRSP5fondFVral4wsMOzBNgs4vVk7V/F2', - '0MPjR90CIhnVDKPAQbQA+3PjUR8AAwUEALn922AEE+0d7xSMMFpR7ic3Me5QEGnp', - 'cT4ft6oc0UK5kAnvKoksZUc0hpBHjX1w3LTz847/5hRDuuDvwvGMWK8IfsjOF9T7', - 'rK8QtJuBEyJxjoScA/YZP5vX4y0U1reUEa0EdwmVrnZzatMAe2FhlaR9PlHkOcm5', - 'DZwkcExL0dbI/gMDArxZ+5N7kH4zYLtr9glJS/pJ7F0YJqJpNwCbqD8+8DqHD8Uv', - 'MgQ/rtBxBJJOaF+1AjCd123hLgzIkkfdTh8loV9hDXMKeJgmiEkEGBECAAkFAlER', - 'nrMCGwwACgkQESeUA8sWnvhBswCfdXjznvHCc73/6/MhWcv3dbeTT/wAoLyiZg8+', - 'iY3UT9QkV9d0sMgyLkug', - '=GQsY', - '-----END PGP PRIVATE KEY BLOCK-----'].join("\n"); - const pub_key_arm1 = ['-----BEGIN PGP PUBLIC KEY BLOCK-----', 'Version: GnuPG v1.4.11 (GNU/Linux)', @@ -254,61 +226,6 @@ module.exports = () => describe("Signature", function() { '=ok+o', '-----END PGP PUBLIC KEY BLOCK-----'].join('\n'); - const pub_expired = - ['-----BEGIN PGP PUBLIC KEY BLOCK-----', - 'Comment: GPGTools - https://gpgtools.org', - '', - 'mQINBFpcwc8BEAC3ywtlTJ1inmifeTrC85b2j+WRySworAUKobk/jmswSoLt720R', - '1J211Uu7IW7UBReoEhfNq+M0CAaoTxT7XPvd2O8lyn/RMAlnmFC0x3pyGrRYyRFd', - 'ZuGaWsFdHT/hCOeXOHv7sV/UWjL4wfeSlGqGWzHy4QH718HOQciZ7UHcS5J9B09W', - 't4TWcY+rTwl2GoFWLBHYCZZLnsQhvJqUTEHc63j+WV5M6oPNDNzqXa545ktss4Bq', - 'L7efeMtAThDlMg4vmodNkHYu0g+RqsGb1kwBkCznrNpYNETqgalhn5fZ6uV2RaDR', - 'WwFOm7ujGwQCzLSHcoDh4zqtWKkImMBEnwTFo0GTgXTTz0T565l5uqUvZ9UkJLXc', - 'IKWpfzHPUPOCstTaVNcCiTw+nwu4BvvOVgOWridKirpxks9uvihnzcAyR5ey212q', - 'HkFW1464qss4b9b4W399/KbOQ8Ngr1kUUeAoK13x7QKTmTwjE1Qt66370nFjk9Go', - 'k0Z0Of90oxQXx2/8g4gufpoMloTNdK/pMzPd+KfePpiVKoxmFTWOqmYgiX/4YcKi', - 'nQsJf++D9xsmAN6v9Ay1RqKmxiJgcuDvqcZ+FJdGatlpKfyEEsDRjAtMXSgw3BpH', - 'xsfPViEsVblmSQBPvuloKbp8kNPsJe3MW0fLSWjSuNDppx+OJX6xq1MNkQARAQAB', - 'tBlzdW5ueSA8c3VubnlAc3Vubnkuc3Vubnk+iQJUBBMBCgA+AhsDBQsJCAcDBRUK', - 'CQgLBRYCAwEAAh4BAheAFiEE8XCJ+2Ua4cHedSGW7IB7EDeBZnQFAlpeFK8FCQAC', - 'pGAACgkQ7IB7EDeBZnToTg//eVOfzHdKvKCTanqbBNDkChtwfHABR01HvowwIdwz', - 'IXeGkAJcV2GaCFtcClYcWFPZq4PQerQc1SB62S8RkuiaWbgVET6adRqq1MVNMvrl', - '/RGJaW7JL0pG8J8cJ1l5Jq9WCdtH0TqfRG/4DkkD7Cgay4oMhPU5w4inoYbeysyH', - 'FKmFIJfbRfoWd2vM3HYi8+2c7UqDtG9R8Xe5X/skYAflAiym/TYF4+H9+siIdk3D', - '5U3WLcwrI45ZsJatK2E4mFy9ne98kYM27QB4TeIuZ+8jQWECqpc3nyQ6UjRYOpAw', - '3jdYYAECmOKjxZJy6tVksLfZin07d4Ya/vgWz27uF3vjkxYywmuvonDyzIkwayTR', - 'NZUbMXnC3yN+e8jtw/HMdQT8LYOxrW/192Y6RBJM1hCWQIaYJxDms9z4JoyYHX5c', - 'tYgEcyMDfwGcsTFLnM+JYJqkOHUfKc3JHtiZmN8QO1TBEUgx18psEBiva3ilTMUG', - 'Zr39gHRp/7fUSj3Vm+bpMOUs0vRdnd3/IGFUgZnTB5nUCCvbs4qLzi2cW9rqDliQ', - 'PyIQKcvCFXFzXsZ31DHnT4OMP9hxpAdGaRhcNySf/Stq3n6tgJSi0IxGqrdCH93y', - 'Ko9b9nRNvHHPoWnuGkAKsxDLm7V4LEGEJLTbYk1R+/M6ijaBnD9rIp3cV9RXtzcc', - 'fuW5Ag0EWlzBzwEQAMML14fV1LUhO5xb0ZRj+ouBSofOY9Zbyjq4JN8qNXjrJJGR', - 'GGWvdWUvUDTBynIm1vhIuArNvqEUdvXjSO/xISz6yXZXX/NrbD8MiCRRqYza2ONw', - '256XvxEt9H4gWnpa+cPkjzzG5tlMceMoE8UWiHC+ua3cadXdlMzxXbGBKrWWZkHv', - 'kPcXV08wuGDPDNiS6syBSfk6l9qz4sZfgt8zAiNkM32JsCu2GkuYwCMXnc28XJOY', - 'zqBIDcz7VUee41C0L5v7puSKwxvuZBVDJNVxDs/ufUFePEOhqpkTkJDroGh+3Qy0', - 'ePzL8KrRtt/Lla6Qz6MckR7myXdJeVFQyza5gjhEi/i3afI3zELdFwHn14AEGxp3', - 'FfmCM2w6Aiyy4JdBQ2ggC7rIOuElMkX7Am6lINQiIwNkYZVIL5UF7avlja4zp/Qm', - '3gyLNCANrZ+HsdQuSzOYRsyGgIM2FLqKBHKqF5VmWsHN2GdFHwnrWp7DwtPqHoat', - 'kVotP0adzOAMC3McbRibkHXOtNXNYCz7yNCn6i9IY5KGj4y3uj7curs1LkYARPg8', - 'hFrnKOFOBE/pCPUlJeaZAjJiQ6FIKrKNADlNwTVZ5puo/gCE/WxzjOA06prG62Un', - '+d5HUUmlZzjPQ44kfmUvMXyfqIiRboAtvdnZc81UlrXNmiewUY4PM3HYmmoHABEB', - 'AAGJAjwEGAEKACYWIQTxcIn7ZRrhwd51IZbsgHsQN4FmdAUCWlzBzwIbDAUJB4Yf', - 'gAAKCRDsgHsQN4FmdFQND/9/Xu0S6H7IVNPWQL7kXgh3VxAwMaS8RTueTPmTP+5A', - 'HCld/20eTsHxWhZcISyDxkKgAnm7hMlY0S4yObFlKc7FRT32W9Ep2PEMc8Qe0Z2v', - 'gqOEGWtb2iZZkLmNRFAj2PUHtOODufVqEPLx22DL+Wy3MnOU7IrxLjmMFUd91hkN', - 'JmLNlolKxRkgH8NfPrpstMUzFDcbTsqIthI3yJlUh0gQaS7zElvWBGfCG2MQFZ4q', - '1xd9rXDaFmIf6+X9k7MNRrSv/uQ7cwW/36/sXdWV4tA/lZxjh+WRkhxu3vSCyP2v', - 'kemT/cHBIcLdG7+4aTAML6Roqy/mNk1k9oO+g9yfty5RmVvROlrL7EIu4D0inC74', - '5XZ36mUR2U0jLN0IaSAmQp+Dxh87S1SxhoA6qi0mYroSSngR68y880nq5xIgBjQr', - 'uoCHfcE/toiLkT8Zyjv7AMXsfuRFsW5VGkRuOceMgK+UPijEK/yAzbGTrj8hCrMM', - 'K/M0OXg9T1W2kzILkVjpj2PyY5MQjoWQEzFRbDrjdXHBuSvyf+SI02QvG2KdOuvv', - 'G6TOw3dj+jf1VgJBkNpt6NCIfXYQczuv8HSzqwtstQoHsIpdz7FjKaXR1fqr+Ikl', - '1Ze66O/1dHY4rt0l0IoMxHL93P3plUiy7wflxuSwLthPybAu7I4QGPC8qP0vm2Cm', - '2g==', - '=X7/F', - '-----END PGP PUBLIC KEY BLOCK-----'].join('\n'); - const pub_latin1_msg = `-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBFS6eEEBEAC56tAm82tgg5BJE0dA4c5UNUDQ7SKLIsleh7TrwsKocEp1b34E @@ -663,171 +580,56 @@ Blk+CJ7ytHy6En8542bB/yC+Z9/zWbVuhg== =jmT1 -----END PGP PUBLIC KEY BLOCK-----`; - const msg_sig_expired = [ - '-----BEGIN PGP MESSAGE-----', - 'Comment: GPGTools - https://gpgtools.org', - '', - 'owEBWwKk/ZANAwAKAeyAexA3gWZ0AawUYgloZWxsby50eHRaX2WpaGVsbG+JAjME', - 'AAEKAB0WIQTxcIn7ZRrhwd51IZbsgHsQN4FmdAUCWl9lqQAKCRDsgHsQN4FmdCln', - 'D/44x1bcrOXg+DbRStSrC75wFa+cvPEmaTZyqN6d7qlQCMxOcPlq6lbZ74QWfEq7', - 'i1ZYHp4AU8jALw0QqBQQE5FvABleQKpVfY22s83Bqy+P0DB9ntpD+t+oZrxGCLmL', - 'MbZJNFnGro48gHt+/OQKLuftiVwE2opHfgogVKNL74FmYA0hMItdzpn4OPNFkP8t', - 'Iq/m0hkXlTAKqBPITVLv1FN16v+Sm1iC317eP/HOTYqVZdJN3svVF8ZBfg29a8p6', - '6nl67fZhXgrt0OB6KSNIZEwMTWjFAqi365mtTssqAA0un94+cQ/WvAC5QcMM8g5S', - 'i3G7vny9AsXor+GDU1z7UDWs3wBV4mVRdj7bBIS6PK+6oe012aNpRObcI2bU2BT/', - 'H/7uHZWfwEmpfvH9RVZgoeETA3vSx7MDrNyDt3gwv2hxOHEd7nnVQ3EKG33173o1', - '/5/oEmn2USujKGhHJ2Zo3aWNRuUWZlvBaYw+PwB2R0UiuJbi0KofNYPssNdpw4sg', - 'Qs7Nb2/Ilo1zn5bDh+WDrUrn6zHKAfBytBPpwPFWPZ8W10HUlC5vMZSKH5/UZhj5', - 'kLlUC1zKjFPpRhO27ImTJuImil4lR2/CFjB1duG3JGJQaYIq8RFJOjvTVY29wl0i', - 'pFy6y1Ofv2lLHB9K7N7dvvee2nvpUMkLEL52oFQ6Jc7sdg==', - '=Q4tk', - '-----END PGP MESSAGE-----' - ].join('\n'); + const keyExpiredBindingSig = `-----BEGIN PGP PUBLIC KEY BLOCK----- - const flowcrypt_stripped_key = [ - '-----BEGIN PGP PRIVATE KEY BLOCK-----', - '', - 'lQIVBFttsQgBEADZT3v1LUGqP/hhUWmjfHVh6MErZAqsmbUIgsUKCDpQ4hrRpot2', - 'V3ZIMbbEGSjbUvyT/2quAtLRHx9/FK1MA3q0qVrUGmiXx78IiAuQ7sZOTjYXBDnq', - 'lJBL3Ux416nIWMwQnYYWL+kvSOfi2C0oMTeAO+5fiLmnbTp8cmGdW8Ry9Z3NJ8Oi', - 'HvjLyCbwYzMFEKS9qXN3wjO+4BIh4SB+MFOypeTshAI4NOEMU1x/ksXDK9G+M8J3', - 'AO5g0Ex9pGrRII/7xFLTLqZh4CaOxTx4y1Mq8qjJSZvulRgL6BSL01ylk4xDMeGG', - '0S1ZitFKfIil90ZxEgI/kERN2UxeeEaK2d+wWhIOdhNZaNd+aueVQFJqxAtXOWld', - 'S7wrTgtvR62b9pO67HNNNlSG731Xnk07rVd2f/cTcOn0bFECZu2KXtaYB9vaW8qD', - 'nfuDHyFuYkc0azMTiMRLHnL+4Pyg/fDasRVG41VaBD09VlZRok3z5eQykoKPwmNS', - 'qLrBXa16K4cNw1wJ4TOpZK5E0T1iU4Fgr9OM1GsAZ5W/kTyzw75HAhjUtffwnWcp', - 'pSj8PqrViCNMRoo2sTKEX7Lo5nEpfjT4mQiWVVfLz+ye5aXyUS55ei9yijwVjzIE', - 'DCMo6kKF/MlWG0s17bL7P+kDTkMEOFeBKC0S/bnf/fB7Ij8cmHtsceRBcwARAQAB', - '/wBlAEdOVQG0KFRlc3QgdXNlciAoT2ZmaWNlKSA8dGVzdC51c2VyQGdtYWlsLmNv', - 'bT6JAlQEEwEIAD4WIQQALxvRgRjAtlVylG8gqXzIYKYwkwUCW22xCAIbAwUJAeEz', - 'gAULCQgHAwUVCgkICwUWAwIBAAIeAQIXgAAKCRAgqXzIYKYwk0CYEACX9usCr/Bk', - 'npdkQ9kSpLezL3gxI2yYpK2PPqqmgAAKsyapK7R7bLxAxtrWeSau0UorrUGV9LuA', - '8yCr0wWjqZyQISUmN8UJeeFmyee3IQRmZBJIRXUqHK4a1idAngAxOJMWHJ3170xF', - 'w1uRDsxtyMAX9wD32iFfNFsOY6nCB8W49oTEif3pHWjBV4Z4vkp5MOfc9a7EepTx', - 'MMh6VNrvJ9EE1GH6FdVBSqpL0ZZUlJCJohP41tBqTf9QvoPdna1HYPdFgqfbdml0', - 'l92X0AM4qpcTmo9aoX9ymg4fpWFPmPMzlX+JzXo/pJeOcce8Xnm3czTfttnMxl9T', - 'QJW1Tr6FM4QOAgcNVQ7CQNsFNKVB1A1xzWXLCmgCUnsnMmOTEmat9mxgZ85Vqqlq', - 'zgyLDA0h4wU6tYTzwQVNPGO9AnWIN50ebB22Y/RDPxaYSc7xP7oUcPDouKDV1u2C', - 'OmvWIEa2Dqp8yEsw4+QWUj3qVoQsdRXmy0UtJhH5ssgkd0h3iS6jMcI6ZOxMshOF', - 'tXApRYe7pDdw5EdwrEUnWrq/TyZriy92xX1MGf/pjGxAz0KcKhD3tPa1Ff1pc0zJ', - 'dVB3PyzCnPrwahNfs71IqAetf/3g3+kATCJ0Z8rYEc4g+M0vwvzfQdo31ODJUjnq', - 'Ida89U0iQ6Li3Jiq1Wwk6CpxpzQvTKjwJZ0HRgRbbbEIARAAxuEJM5xU976PBMeI', - 'HVcJosrcFzYlDG8vUKH/2vMEfBu5HfkVQ701wrpn5gyiRyjUkTompLS16RZQlDoo', - 'wXKNQmGt5C/cw/fm0DFF1ZvDxtyG/oD1eJ9/+JB/QTKppYCNKOb9E+Gx8t0ax7tN', - 'NKCpoQyQDoeVHLm8yf+BqDL3sSPp77V4+BoW3JOFjyuCZ8VM5ZlGeu0YtD1cKezD', - '/a16MSUKjS+06eC0YjAddOLjQM1TUxIEJ6oRkiRoADFRFmJHxrTN5SF0VR8wKiGP', - 'r2mNDX8k5iG76PZvJEMYPSZFH6wX/4WCNgNOQzrqC2QQ2SERMkfwmR9peVnJswXL', - '7yeDy7SUR7JWOKV6YmsyySoUWcqs5PNE5XxxFi862Qzge8ccXPflVBI8YZZnHtyx', - 'f/AYwnWVlbpGPRlx8BJ3+K8v3Lt3ezIwyW11Tgm2nYZQuV3aM/JhRs4RaqIp3G0D', - 'ZtJLP6u8HHLSAk08RftpLT1onM2REZiMiw4o5w+eAsEMTOVgWo4s0W6d3ZCg+1v6', - 'K8J9UM8JgdvqrfZuFsBUNAyFCqNycHY89R1usis4WWKJUoBh/jHL+4inCeiu/9pq', - 'U9wg9e0/FMFsltZGJHDH/9ohgTZdlvrB9dFDKXEKpFnydG0WPsC6ko9bWsIg7dJ2', - '/OQECKetHE+s/cojEK4jpL9+wgsAEQEAAf4HAwLk886lftqoTMezJul7DJPduWMa', - 'ZjAkyjh5DJH2Sljwcrq473s0388hNoHNSwZBuDnEFxbsxivGPaiIm/VN84FYFvgr', - 'IRqIKOMEjaoj166rhadR3rOeCs6LJFTwBSMD+dO7zPo3eqAJBziQg7PqQ16DNLfu', - 'i3V2ZOvND+EbGYzAcpTToE3Cc6EhN2zB/+aIUAEvWRX2AkIozLNNmcfNHL11VI3X', - 'Rr3Z0eN9rkyOucVK9fwAR/3nDc7cLqFYgmU79DxHgHop7uWPtwP0/AAjzrhjNlXz', - '7+rO2baiBbBu+MDaJi8TiRPbz1D28972wzJidIYUzQMsKrZKfqooQGXtamkvTRuR', - 'gTQgfspa671qwhni8WDDz9VQ0LlBothpAEBqlAtFe/nrUaEfLn5Im9ZI9lJ6SHoK', - 'e4vAHqimmxg1SWfZNhpnghaqTE7KjrmgMM674NDhThvUxw1MZSe+3uq6v5nYN60O', - 'rfSRYjuZpgO3cIJdDvGXv0vnuF2p9Z83pz3FS3dx33Weiss30pBt5pCvZKT8SAQp', - 'ityaxxYtDDb1t0fKmd59DByNfLaHl9pOPIs6adYL8ojFA2Qhd4walTl2+nkuWz9A', - 'tAUX9bKMG5SZe8DguQFtg/unM8HLcgWjycDrWg1EtJZAIHlZ0X4NMQiMjm0NjkC0', - 'qifHfRoM2UL427t5nsFPTq23wDt9LjrKIfC/7GtOGaxU4HEjOokyNUnxI0aNR99o', - 'mIHQyTJHttl9giYeMB/DPIFZfQkQMcnRTytGFddsMKQ99gu+SPPrTvvS31VOrvhw', - '8Y56n8kQJVLcBwi7FXsYgsbi6MbhUDWk9hGq+cBvYHlSpfyVRKDTgeHQjojsN03j', - 'm0QOXFpwzTd/q38rZuTGw/w/96SjECSF9IeSJxA842OCx+pj1VxxR9MW7b7dEz4R', - 'IBZ4Zd23GMy81LydtyqY2wkJtdjpKxs/LSE1Eym68s8f0uKQTHVaRD0frVyH6L2d', - 'nI7aOggpEJc/kwX6q52VuVKG/1gC4taPePU3ieF4Mt602zIPoqmoIzLcoKYev4MA', - 'DOhCYQcrFUoRT3o9aHN2MoGQvuRuaXWtDMD/SH9a57GEQ4czOjxDAfsxCtZb2j4h', - 'yVdPLBYbYGBCe0KUYPc4lBOYN+ccLykdgg8cjHRHEyogyp50NBXP2oNJtuJSYock', - 'YNeKWuhUD3PVrGQDAGGgoR9NEqj/RmzT/w5/1F1CfGG1udfs7XJ+/ON1diDPK6GF', - '7/+3RLryVDJOFTlh2qqDKDdqtPftVpWj70WloMlOEYh3XG6Naiu8RZ4gW9NDMDdu', - 'W1jy1jwT9PXqTOjeOFRZWsdXbMunpc/naP+1JLBhhBbmICEmkjQvQcpQ0RRz+hTf', - 'lVax2xmOd/nXKEhUXgtyayoU6ucBXYko+uutk25IyfWmAbnTGX6OOCZpGEBLaaTL', - 'UAQLID60QT4Ae4VYGbQGxVCr/jF4t8TJjtYW4AN25HlWxpq8ua2SGJpPqPtZFgr/', - 'b8Bn9VeelappW6ylJ8xHA9SiM6/AhrKySOPLnN39mE0odr/cBTK3vrzNmME7S4Tf', - 'TZXCaGXIu15EvXErTYeMxoVasBWKX7/qjsQVVyj6BaSD8Hrk9gklr4nzC7HGCyu5', - 'KOnlD3sJTaiARY16nZSQ5dqz8uMmRz4fqyMxt8owVLVAZLQznnp09phpFewIB74Q', - '2vIbmm4XZIwsBNiQB0JRei7KWg9mbQgzD21t31VdEMlu/tX4xrFTlmfdiCimc4I/', - 'pUQMaX+1lRU5f7NZZS7LDA1kiQI8BBgBCAAmFiEEAC8b0YEYwLZVcpRvIKl8yGCm', - 'MJMFAlttsQgCGwwFCQHhM4AACgkQIKl8yGCmMJNh6hAArmdLMGeBb8TmKGd8dQat', - 'vZ7GEo0rTTF0bQ9j8zChRYy4lDDJUAnTV8ahtTAvNvsO0FLDWcfA796xa9Z9Z8pt', - 'YCBaAE6crsOHaZjUfvjUSr9S6hWMdzovYOw6tGWL5LITqr0BoL5nu2lLBxuxxcaO', - 'uM6BRdTsraxHTIlb0FBKyDJbkfchmjbHDSx5jDmzSBE8Z0BOgOZAB+Jj4t+j6orl', - 'Zexs9A/vzj4bJALCvC/Fj0nFGzt5b1o0PlOSxvnRVtxiW90wwntTYg1TmVmBYA1L', - 'q2k5CxW7kQ9Q+LaN9Mww6nJBJAswEVkcpzTdopp6zb/xoItwF+xfWKWhOlfbM+Uu', - 'WfnJPZJ8OYK1xpOZcSLUy4PAmIJKh9vMcczZK0w3aEDS4mUdkqGuBZ65BQK8pjJK', - 'CuHm3LjT1rXydNFIv5hF3SgcTLHZQe+cHb4lRP/IfipWmbBqr+4Pj/Mnz/TQR9gD', - 'SQdUVPO3MJQPAe74/iy0s9m7aZUSzWzSMNrF8XDop8nMy9nrJT8tXwsO7JyKRkmc', - 'TP7GnuqFfaZvsQPnowrTA1THly0CPgl6IrCSz+2tJTp8qbD+VMQL4bmgnUv5QpC1', - 'iV31rdJFwON58YJEES4xfgWEnTUtLYr4VRDbLSBInEpvydm1c/92UwflE3VNF4W3', - 'd35XgNkPLwvPJlk8lhP6ZamdB0YEW22xHgEQANR2RVdIzQ7T5avWMne5dayZLC5z', - '84GUQByULHtwbRsdtOz6hSvosb1kZKxebdxgwVTOgQXh1wQS/BN53XHA6raPoLoc', - 'qAN0Is/AkDQiLlMwRdvlYAY5RE6EzsK4yhLffCSrdov0qmmCZEZ4YsFdOKRCl1+4', - 'OE3ONBpU4N/48yXKba3+IQ8yKy8sRvxYf73SB6r/S9qIh94RvM/TSWZfT/VMDi47', - 'GE2Hdh2s499MR9U8WCFWijq2/lTS44qgwI+pD9Y+tGE9mLgpo+gLfmklSL0pPHzW', - 'oB4pFrQuaMB38Gl6UlxXKuXva2mJXOqyrtI9awOnsq8nwFTS62EHxLYlrT8Zw2ZP', - 'ou7xjayO2IISCGawtXC8cRtbkHBdrKOT0eGofBHALZVZiiRFCing1yw1ETJEev54', - 'OF/27riQGaIq5ftdA1jVTLDkSucaiNkGM5rG86X6FgOMcYnr2NDFesIp1lrhDyuj', - 'VSAeagfcYhIBwBeMXIvcyYQV6uGORSOLZvmM5aXORAZBU/zz+ZWxoWZu67C9/zGf', - '6jpedpRZ0ZlDk4a6vdy+zqyXVgFpZssRY8aQeZOJP/D9UAT/Cpffm6yw7SU1kY+b', - 'x6ZUH/sP1uwAzp1H11nHbg8RvoWjfq0aNPdcoeGcHq8w3XI5ygHWYOf0FsI51kCo', - 'vgaelhsFnh6xa0D3ABEBAAH+BwMCfVtrVpU1RSjHycjdFwHo+IOYCV7GbYQhM5sU', - 'zmIB8jqAbvpPxT61hLDOq5wpmBLMMdPIjcku2yUNnFBFM7GInKexOiotjAcnkRNo', - '96rY9e1r+tnV7ZFXenaqwE/TP2i051AnXAUB3BY2dnua9Xs11r0Q9awB9lh/9jpK', - '0piXJTtLRz2JD9stKF5NDVEWeOewOoUOO/bhHmCSnxd08gIZA+CPUSHMuvdqkKye', - 'VgSzKO17F3jFN6eHilO+0OLiM7ryfIGJgrUrqv8wGet5KLGE7WkvFp3nCZJIQ17R', - 'z1LlVvpWEiuziSwSiY/kHxYODhiV38K/00/UzVD+RwzEOsfo6Aygpw7Hx6ersvzE', - 'WocNKfMKjl3o5KNOHjNeh5s8gXclYDJ6CcAQhAL0dw8/8Ym0wWZxRs3cOj65JLIR', - 'vMNaMp3kk7UzoFdOrKECQ0dbGQQFdsg21jdBVQN2rma1+8IL4BIgc+VolnIT0Pq8', - 'XAAeOjD0z4rgosZ/wZx4lVQuhW9Aut9QoR/ectc9sB3vR6mSVTJejZpzf8X0Hrii', - 'uYsIaHmT4fAl0ij4eShI1eVsWldMYxNfzPpOPLfU2VHwDx8ibD3WMRU2pEmleGV9', - 'tboMKq3raqar1syVXaDT0toiBHIAbToL3q0hWvWYWwHUiGnd4a4XgmvUgRxgtnTo', - '6xEqKoWToYAAdn6496acd84T39bN4l+3aN7P+u+vTqljucfgUmqBdKltzk5GePFP', - 'XptDV3keIcKoP6Pzzju9MWWIYTu7y8SR1NHeKLoGpece3weoD0D/jk+WYTiBH14k', - 't7hCnfvsvw1cartYn5AWYBJ7t45dQ8ZfYl2sEFHmFYfKoK8capU1ueTYHrez5MIK', - 'Uc0gm1yDPGZN6Uf67orr2e3uT8WEEo8unjmtN5KDij7EoujVsJ+A3aSZjCgsHr2o', - '93iyrJp/7yNMEFBjefmMcE0hrXLxz9S7MDDyzy76NS2/8hZ59wfD5EK2yvm0fe2n', - 'DGB+coGb05RUAgMwra3SJdhS7jd3vz8ymrgiu6L9qchwE55aiZW/bQJeKXkJxuIB', - '9WFRd+WrHOHPwv9Bop1nvRrVHZLXqoC0BoalUcyntHxKYeyucNYCTOW0DnBMI+kL', - 'CmXfroMjzGD13xTvFYeHxVOWHZqTdU0DU42DPXDDrRuNnbZgSVNNGxQDysaeIS9f', - '3+8cWfdMQk1rAxzJeqqnXtakxCyO8BzJMxobuJ89iE+WC8kho3nl/MSe8LnBU2/3', - '7yTjl7ChG37y4vlnrTGMtMiaZNDpP6u3JY9/L1kHAOGJ0vFXmwnvDf2orAc2wh9r', - 'QJolJqUQ3z4c/ACD69AuuNWk+USC386IDxdHkRH+c8exN9zPG35qGkmWoH9T+lZk', - 'CNC/LrvBJKuYAwl+XyVb2gEITERT3jr9TO3rkE/1fdRVemeK5gPLW13b7cKtwnq6', - 'q/Un8XNxP6KeTW51A91dL71l60TMW/owYtMeOJ1140bG2KrQWeuojnNvk4V6nxlZ', - 'uwg+a87IyedsWKX8gRtpUcAqV3yt2l4XGyAag7e50EZnkDIm5TPGgds1jLItAYcb', - 'CmUl4iVP5QxkFdgKQXr3AsV5kWAi/WegDfaj/7FBu5ffosF8YdyhohOY5amxYC2y', - 'dw3VdkfgZohyHZs76T7sheQwtIzVNEYhK/9H/tr4OK13qRHlS7FcdZ+cw+t/Sj9b', - 'tRaBi2+IFTBtJg2th50pYieZx58Lrly5o70K/WgnqQyJEEgKxqb77a3MC73AFku6', - 'j5Krk4atOku6d4kEcgQYAQgAJhYhBAAvG9GBGMC2VXKUbyCpfMhgpjCTBQJbbbEe', - 'AhsCBQkB4TOAAkAJECCpfMhgpjCTwXQgBBkBCAAdFiEE2ANmjqFLjSRek7Ly7paV', - 'EPkPkswFAlttsR4ACgkQ7paVEPkPkswAyw/9FeHay1S7acuJWpnOrn/dncExOpTu', - 'vUv7KT7dphPFooftGGC1wH2gd49Cw/p5REfyD7kHrdNxW8Gm1j5/WVDdsGHf2Bnr', - 'ZDJPUQ0U1GFRXgHM6gJuVvWP9nQCpsnWxbQ/p5ior3H+RIKI1dlCUzD2NKdHVKDw', - '8OmX6AL3hM8CpHrv79bSKPh6Mz3eS8XSLLV4nU9p2bkxllKaAzNutP8cL/y1mRNC', - 'TrQt6j/5k4kWuj+rKDGaFIPA28tNPZLyy5Mp23dXk7dCfTZAcWKdSUraUE1Vke3M', - '0AhwU6J10GDL8eqPx4g1ihakZVC9mf/BxqjEpYJQZVju1s4dhIWFHij9GWycp7M7', - 'X3Y35BCzpslTxS/OKlEV+U/kb8MnXhRcmh9ItMOZfHo2/YqGVKPL9/ETPmORNNP9', - 'QR+N0a6nAGH9fc9FZybYw4c3hiCtD985e3QIYJpT0QQej4IdqjH1IpoRgSHnBnWw', - 'tHMUOvKK33WCOybCECR/8Gn1ocCLQPQszMLRBbMqnAA29amIOJZXVsMF5LYytqUd', - '2+ctEx3wciaYZmIgl3VzEBcjNKLWJ60x9UIM0lhOKtbJ5bAp+VYHEV04t8yEcnWd', - 'l1SwMqbFg/Jot9DqXFaj/o6iYAwQyqGUvWJr99Qf/3HjS3zCEnGJsIaQZhKi0K/a', - 'ImPTfGFlLuzMh+mYpw/+P+1qKBbrPIF269epUq+npApAU72IpbwwuJ06n4FwVstW', - 'd0n3SxOEiiuQIcpVgEtFbbEizVsq86obhJf5fCsJlQghDxkslIntBBwz8jrWbDUw', - 'iec0+fsI3OfPeMcqdqP2+Swzka/3JWKoHm6K6+7O4G5c8XB2Dt93pZVD9/CDkc4M', - 'lSgmP00xfsO090OMGAVI/+v7+A4NMzCnJF9tWLF2ykfZhMRLfPvyr9880yWZOBRf', - 'iuotS7oP+LIPfoq2txWNXfjDHvnQDTIHLhoM2HMdzI5qMkLax1bcgGT2uuogA+JI', - 'bQ+9gO7VoqHi1qWb7MPzyaTk4Wxl9oP9qYo28m4xrgJ+bPz/cCgeY8Li4L8ds9cb', - 'Q69OJhPncMYjrWx7dtB5AP9zdYaYjHejuSgI9s0J9Zum8QrCI/HdPZLIVIuuHywd', - 'b77w5v0a+vXw7qCBXpEPEsRbExn6FjC2bGunbdAw5S+MTZSkTpCJUHoxKIxFiOUe', - '7F6lEBizbbSpIIRZMcwqB9gMxtRE2JrNntSVpHiBXKMSRXh/416hG7Gwf2hxppPw', - 'hBr9NrB2VFHtdaWf2YqBGb7c1xusmEuGLcGUqFGCXo/g/lOSPijea91puCf9bgKy', - '0P7n+O0V3W1QpkI4ne5TE2vBFUFo9K5IFe4qBI1JPjbLTfOI2lojx8P12+lqWug=', - '=NbaL', - '-----END PGP PRIVATE KEY BLOCK-----' - ].join("\n"); +xsDNBF2lnPIBDAC5cL9PQoQLTMuhjbYvb4Ncuuo0bfmgPRFywX53jPhoFf4Zg6mv +/seOXpgecTdOcVttfzC8ycIKrt3aQTiwOG/ctaR4Bk/t6ayNFfdUNxHWk4WCKzdz +/56fW2O0F23qIRd8UUJp5IIlN4RDdRCtdhVQIAuzvp2oVy/LaS2kxQoKvph/5pQ/ +5whqsyroEWDJoSV0yOb25B/iwk/pLUFoyhDG9bj0kIzDxrEqW+7Ba8nocQlecMF3 +X5KMN5kp2zraLv9dlBBpWW43XktjcCZgMy20SouraVma8Je/ECwUWYUiAZxLIlMv +9CurEOtxUw6N3RdOtLmYZS9uEnn5y1UkF88o8Nku890uk6BrewFzJyLAx5wRZ4F0 +qV/yq36UWQ0JB/AUGhHVPdFf6pl6eaxBwT5GXvbBUibtf8YI2og5RsgTWtXfU7eb +SGXrl5ZMpbA6mbfhd0R8aPxWfmDWiIOhBufhMCvUHh1sApMKVZnvIff9/0Dca3wb +vLIwa3T4CyshfT0AEQEAAc0hQm9iIEJhYmJhZ2UgPGJvYkBvcGVucGdwLmV4YW1w +bGU+wsEABBMBCgATBYJeO2eVAgsJAxUICgKbAQIeAQAhCRD7/MgqAV5zMBYhBNGm +bhojsYLJmA94jPv8yCoBXnMwKWUMAJ3FKZfJ2mXvh+GFqgymvK4NoKkDRPB0CbUN +aDdG7ZOizQrWXo7Da2MYIZ6eZUDqBKLdhZ5gZfVnisDfu/yeCgpENaKib1MPHpA8 +nZQjnPejbBDomNqY8HRzr5jvXNlwywBpjWGtegCKUY9xbSynjbfzIlMrWL4S+Rfl ++bOOQKRyYJWXmECmVyqY8cz2VUYmETjNcwC8VCDUxQnhtcCJ7Aej22hfYwVEPb/J +BsJBPq8WECCiGfJ9Y2y6TF+62KzG9Kfs5hqUeHhQy8V4TSi479ewwL7DH86XmIIK +chSANBS+7iyMtctjNZfmF9zYdGJFvjI/mbBR/lK66E515Inuf75XnL8hqlXuwqvG +ni+i03Aet1DzULZEIio4uIU6ioc1lGO9h7K2Xn4S7QQH1QoISNMWqXibUR0RCGjw +FsEDTt2QwJl8XXxoJCooM7BCcCQo+rMNVUHDjIwrdoQjPld3YZsUQQRcqH6bLuln +cfn5ufl8zTGWKydoj/iTz8KcjZ7w187AzQRdpZzyAQwA1jC/XGxjK6ddgrRfW9j+ +s/U00++EvIsgTs2kr3Rg0GP7FLWV0YNtR1mpl55/bEl7yAxCDTkOgPUMXcaKlnQh +6zrlt6H53mF6Bvs3inOHQvOsGtU0dqvb1vkTF0juLiJgPlM7pWv+pNQ6IA39vKoQ +sTMBv4v5vYNXP9GgKbg8inUNT17BxzZYHfw5+q63ectgDm2on1e8CIRCZ76oBVwz +dkVxoy3gjh1eENlk2D4P0uJNZzF1Q8GV67yLANGMCDICE/OkWn6daipYDzW4iJQt +YPUWP4hWhjdm+CK+hg6IQUEn2Vtvi16D2blRP8BpUNNa4fNuylWVuJV76rIHvsLZ +1pbM3LHpRgE8s6jivS3Rz3WRs0TmWCNnvHPqWizQ3VTy+r3UQVJ5AmhJDrZdZq9i +aUIuZ01PoE1+CHiJwuxPtWvVAxf2POcm1M/F1fK1J0e+lKlQuyonTXqXR22Y41wr +fP2aPk3nPSTW2DUAf3vRMZg57ZpRxLEhEMxcM4/LMR+PABEBAAHCwrIEGAEKAAkF +gl8sAVYCmwIB3QkQ+/zIKgFeczDA+qAEGQEKAAwFgl47Z5UFgwB4TOAAIQkQfC+q +Tfk8N7IWIQQd3OFfCSF87i87N2B8L6pN+Tw3st58C/0exp0X2U4LqicSHEOSqHZj +jiysdqIELHGyo5DSPv92UFPp36aqjF9OFgtNNwSa56fmAVCD4+hor/fKARRIeIjF +qdIC5Y/9a4B10NQFJa5lsvB38x/d39LI2kEoglZnqWgdJskROo3vNQF4KlIcm6FH +dn4WI8UkC5oUUcrpZVMSKoacIaxLwqnXT42nIVgYYuqrd/ZagZZjG5WlrTOd5+NI +zi/l0fWProcPHGLjmAh4Thu8i7omtVw1nQaMnq9I77ffg3cPDgXknYrLL+q8xXh/ +0mEJyIhnmPwllWCSZuLv9DrD5pOexFfdlwXhf6cLzNpW6QhXD/Tf5KrqIPr9aOv8 +9xaEEXWh0vEby2kIsI2++ft+vfdIyxYw/wKqx0awTSnuBV1rG3z1dswX4BfoY66x +Bz3KOVqlz9+mG/FTRQwrgPvR+qgLCHbuotxoGN7fzW+PI75hQG5JQAqhsC9sHjQH +UrI21/VUNwzfw3v5pYsWuFb5bdQ3ASJetICQiMy7IW8WIQTRpm4aI7GCyZgPeIz7 +/MgqAV5zMG6/C/wLpPl/9e6Hf5wmXIUwpZNQbNZvpiCcyx9sXsHXaycOQVxn3McZ +nYOUP9/mobl1tIeDQyTNbkxWjU0zzJl8XQsDZerb5098pg+x7oGIL7M1vn5s5JMl +owROourqF88JEtOBxLMxlAM7X4hB48xKQ3Hu9hS1GdnqLKki4MqRGl4l5FUwyGOM +GjyS3TzkfiDJNwQxybQiC9n57ij20ieNyLfuWCMLcNNnZUgZtnF6wCctoq/0ZIWu +a7nvuA/XC2WW9YjEJJiWdy5109pqac+qWiY11HWy/nms4gpMdxVpT0RhrKGWq4o0 +M5q3ZElOoeN70UO3OSbU5EVrG7gB1GuwF9mTHUVlV0veSTw0axkta3FGT//XfSpD +lRrCkyLzwq0M+UUHQAuYpAfobDlDdnxxOD2jm5GyTzak3GSVFfjW09QFVO6HlGp5 +01/jtzkUiS6nwoHHkfnyn0beZuR8X6KlcrzLB0VFgQFLmkSM9cSOgYhD0PTu9aHb +hW1Hj9AO8lzggBQ= +=Nt+N +-----END PGP PUBLIC KEY BLOCK-----`; const signature_with_critical_notation = `-----BEGIN PGP MESSAGE----- @@ -848,6 +650,24 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== -----END PGP SIGNATURE----- `; + it('Throws when reading a signature missing the creation time', async function () { + const armoredSignature = `-----BEGIN PGP SIGNATURE----- + +wsDtBAABCAAXFiEE0aZuGiOxgsmYD3iM+/zIKgFeczAACgkQ+/zIKgFeczDjiwv+ +LFUWJohCYtauaVDHBDHWF+tojls+ducY6uuU6iUTBb1969okh2sjUmvPwIjrVXuk +cfPl616xRqVWolEU9T5sG6MjRlAaG31Oo/FVAVFXZn30ldEtuDss12+/IhES3Wfx +M1jGdJZ1ZMZJpRsNBJXBegEBFKbPleEd66seuuFfvoIUbgsdj7IT/ZlEMlixelWW +igXPVY1C05oPbkC8oo0lVSxwdq6gDvm8a52k3GCtXJELrYGH29C+eDqmyLP1zJOt +NBoZBAqMd9XYVrJtuip436D9pdo5pbg4zCE6uPf2zzx4taK7jGkk6nn7LqVDxvQm +3dAXUnIxw4V9eL3V8SFAKwmouUmHPRbjfnQ70hxYQxDXUcIwu1aYn13QS1s/F/jf +DVRZWaAhNdL9BfHfhEsRVsmjMhe0zwRpaepvXnERbnA/lAUHEmEvgfPFz/2GsAo/ +kCNcH9WI6idSzFjuYegECf+ZA1xOCjS9oLTGbSeT7jNfC8dH5+E92qlBLq4Ctt7k +=lMU7 +-----END PGP SIGNATURE-----`; + + await expect(openpgp.readSignature({ armoredSignature })).to.be.rejectedWith(/Missing signature creation time/); + }); + it('Testing signature checking on CAST5-enciphered message', async function() { const publicKey = await openpgp.readKey({ armoredKey: pub_key_arm1 }); const privateKey = await openpgp.decryptKey({ @@ -865,50 +685,180 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== expect(decrypted.signatures[0].signature.packets.length).to.equal(1); }); - it('Supports decrypting with GnuPG dummy key', async function() { - const { rejectMessageHashAlgorithms } = openpgp.config; - Object.assign(openpgp.config, { rejectMessageHashAlgorithms: new Set([openpgp.enums.hash.md5, openpgp.enums.hash.ripemd]) }); - try { - const passphrase = 'abcd'; - // exercises the GnuPG s2k type 1001 extension: - // the secrets on the primary key have been stripped. - const dummyKey = await openpgp.readKey({ armoredKey: priv_key_arm1_stripped }); - const publicKey = await openpgp.readKey({ armoredKey: pub_key_arm1 }); - const message = await openpgp.readMessage({ armoredMessage: msg_arm1 }); - const primaryKeyPacket = dummyKey.primaryKey.write(); - expect(dummyKey.isDecrypted()).to.be.false; - const decryptedDummyKey = await openpgp.decryptKey({ privateKey: dummyKey, passphrase }); - expect(decryptedDummyKey.isDecrypted()).to.be.true; - // decrypting with a secret subkey works - const msg = await openpgp.decrypt({ message, decryptionKeys: decryptedDummyKey, verificationKeys: publicKey, config: { rejectPublicKeyAlgorithms: new Set() } }); - expect(msg.signatures).to.exist; - expect(msg.signatures).to.have.length(1); - expect(msg.signatures[0].valid).to.be.true; - expect(msg.signatures[0].signature.packets.length).to.equal(1); - // secret key operations involving the primary key should fail - await expect(openpgp.sign({ - message: await openpgp.createMessage({ text: 'test' }), signingKeys: decryptedDummyKey, config: { rejectPublicKeyAlgorithms: new Set() } - })).to.eventually.be.rejectedWith(/Cannot sign with a gnu-dummy key/); - await expect( - openpgp.reformatKey({ userIDs: { name: 'test' }, privateKey: decryptedDummyKey }) - ).to.eventually.be.rejectedWith(/Cannot reformat a gnu-dummy primary key/); + it('Signing fails if primary key is expired', async function() { + const armoredExpiredKey = `-----BEGIN PGP PRIVATE KEY BLOCK----- - const encryptedDummyKey = await openpgp.encryptKey({ privateKey: decryptedDummyKey, passphrase }); - expect(encryptedDummyKey.isDecrypted()).to.be.false; - const primaryKeyPacket2 = encryptedDummyKey.primaryKey.write(); - expect(primaryKeyPacket).to.deep.equal(primaryKeyPacket2); - } finally { - Object.assign(openpgp.config, { rejectMessageHashAlgorithms }); - } +xVgEYKKPDRYJKwYBBAHaRw8BAQdAwJcSQMkHVnZPesPJP1JaB9ptV+wG8Io1 +vxRKvXQe0wMAAP0fdn6gvpVwFUE4bIRcn9hx6eDxSxUu+tg/t959Oo+iahF1 +zRB0ZXN0IDx0ZXN0QGEuaXQ+wpIEEBYKACMFAmCijw0FCQAAAAEECwkHCAMV +CAoEFgACAQIZAQIbAwIeAQAhCRD16pevybCusRYhBHjm9svlAjmgVWL4wvXq +l6/JsK6xGUQBAPzxKS2Qs+vWGpxPT2N2T+PLHIgCOxVJVngj4fzREFH1AP9t +wP+fn3eSsik+vFGy93REmlD1xdu7nW/sHuxY4roqBcddBGCijw0SCisGAQQB +l1UBBQEBB0Cl1lr+aHfy6V4ePmZUULK6VKTCTPTMaPpR2TzKNIJQBQMBCAcA +AP9DZWRqQLCIkF38Q0UC/YXLCDdBEQdnlwpHgA0W1bSWmA3uwn4EGBYIAA8F +AmCijw0FCQAAAAECGwwAIQkQ9eqXr8mwrrEWIQR45vbL5QI5oFVi+ML16pev +ybCusYE4AQCYbXw8ZWoMevbOM7lAttkwyrG3V/nTW6BVo7/M9Pr9swEA0mDI +DQmhI0SZoTKy4EGhS0bNJ+g2+dJ8Y22fKzLWXwo= +=qiIN +-----END PGP PRIVATE KEY BLOCK-----`; + const key = await openpgp.readKey({ armoredKey: armoredExpiredKey }); + await expect(openpgp.sign({ + signingKeys: key, + message: await openpgp.createMessage({ text: 'Hello World' }) + })).to.be.rejectedWith(/key is expired/); }); - it('Supports signing with GnuPG dummy key', async function() { - const dummyKey = await openpgp.decryptKey({ - privateKey: await openpgp.readKey({ armoredKey: flowcrypt_stripped_key }), - passphrase: 'FlowCrypt' + it('Signing fails if the signing date is before the key creation date', async function() { + const key = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }), + passphrase: 'hello world' }); - const sig = await openpgp.sign({ message: await openpgp.createMessage({ text: 'test' }), signingKeys: dummyKey, date: new Date('2018-12-17T03:24:00') }); - expect(sig).to.match(/-----END PGP MESSAGE-----\n$/); + await expect(openpgp.sign({ + signingKeys: key, + date: new Date(key.keyPacket.created - 3600), + message: await openpgp.createMessage({ text: 'Hello World' }) + })).to.be.rejectedWith(/Signature creation time is in the future/); + }); + + it('Verification fails if primary key binding signature is expired', async function() { + const armoredSignature = `-----BEGIN PGP SIGNATURE----- + +wsDzBAABCgAGBYJfLAFsACEJEHwvqk35PDeyFiEEHdzhXwkhfO4vOzdgfC+qTfk8 +N7KiqwwAts4QGB7v9bABCC2qkTxJhmStC0wQMcHRcjL/qAiVnmasQWmvE9KVsdm3 +AaXd8mIx4a37/RRvr9dYrY2eE4uw72cMqPxNja2tvVXkHQvk1oEUqfkvbXs4ypKI +NyeTWjXNOTZEbg0hbm3nMy+Wv7zgB1CEvAsEboLDJlhGqPcD+X8a6CJGrBGUBUrv +KVmZr3U6vEzClz3DBLpoddCQseJRhT4YM1nKmBlZ5quh2LFgTSpajv5OsZheqt9y +EZAPbqmLhDmWRQwGzkWHKceKS7nZ/ox2WK6OS7Ob8ZGZkM64iPo6/EGj5Yc19vQN +AGiIaPEGszBBWlOpHTPhNm0LB0nMWqqaT87oNYwP8CQuuxDb6rKJ2lffCmZH27Lb +UbQZcH8J+0UhpeaiadPZxH5ATJAcenmVtVVMLVOFnm+eIlxzov9ntpgGYt8hLdXB +ITEG9mMgp3TGS9ZzSifMZ8UGtHdp9QdBg8NEVPFzDOMGxpc/Bftav7RRRuPiAER+ +7A5CBid5 +=aQkm +-----END PGP SIGNATURE-----`; + const key = await openpgp.readKey({ armoredKey: keyExpiredBindingSig }); + const signature = await openpgp.readSignature({ armoredSignature }); + const { signatures: [sigInfo] } = await openpgp.verify({ + verificationKeys: key, + message: await openpgp.createMessage({ text: 'Hello World :)' }), + signature + }); + await expect(sigInfo.verified).to.be.rejectedWith(/Signature is expired/); + }); + + it('Verification fails if signing key was already expired at the time of signing (one-pass signature, streamed)', async function() { + const armoredMessage = `-----BEGIN PGP MESSAGE----- + +xA0DAQgB4IT3RGwgLJcByxR1AGCc8BxIZWxsbyBXb3JsZCA6KcKzBAEBCAAG +BQJgnPAcACEJEOCE90RsICyXFiEE19Gx3sbKlGcANEXF4IT3RGwgLJdssAP+ +KpyVi30z5iMckULAQ3Q34IB29Gxa1/99ABSld6iIVGRCfmZZlS5UGcxJJGoL +vZ1RAL4YQx/GLV1dBcKWFwzb5G2/ip4coDMCDGTAwnwjcPwjHpfMQ9gX59mG +AkLaG/AkATpuH+DMkYDmKbDLGgD+N4yuxXBJmBfC2IBe4J1S2Gg= +=zvNP +-----END PGP MESSAGE-----`; + const key = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }), + passphrase: 'hello world' + }); + const { key: expiredKey } = await openpgp.reformatKey({ + privateKey: key, + userIDs: key.users.map(user => user.userID), + keyExpirationTime: 1, + date: key.keyPacket.created + }); + await stream.loadStreamsPonyfill(); + const { signatures: [sigInfo] } = await openpgp.verify({ + verificationKeys: expiredKey, + message: await openpgp.readMessage({ armoredMessage: stream.toStream(armoredMessage) }), + config: { minRSABits: 1024 } + + }); + await expect(sigInfo.verified).to.be.rejectedWith(/Primary key is expired/); + }); + + it('Verification fails if signing key was already expired at the time of signing (standard signature)', async function() { + const armoredMessage = `-----BEGIN PGP MESSAGE----- + +wrMEAQEIAAYFAmCc8BwAIQkQ4IT3RGwgLJcWIQTX0bHexsqUZwA0RcXghPdE +bCAsl2ywA/4qnJWLfTPmIxyRQsBDdDfggHb0bFrX/30AFKV3qIhUZEJ+ZlmV +LlQZzEkkagu9nVEAvhhDH8YtXV0FwpYXDNvkbb+KnhygMwIMZMDCfCNw/CMe +l8xD2Bfn2YYCQtob8CQBOm4f4MyRgOYpsMsaAP43jK7FcEmYF8LYgF7gnVLY +aMsUdQBgnPAcSGVsbG8gV29ybGQgOik= +=s9xh +-----END PGP MESSAGE-----`; + const key = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }), + passphrase: 'hello world' + }); + const { key: expiredKey } = await openpgp.reformatKey({ + privateKey: key, + userIDs: key.users.map(user => user.userID), + keyExpirationTime: 1, + date: key.keyPacket.created + }); + await stream.loadStreamsPonyfill(); + const { signatures: [sigInfo] } = await openpgp.verify({ + verificationKeys: expiredKey, + message: await openpgp.readMessage({ armoredMessage: stream.toStream(armoredMessage) }), + config: { minRSABits: 1024 } + }); + await expect(sigInfo.verified).to.be.rejectedWith(/Primary key is expired/); + }); + + it('Verification succeeds if an expired signing key was valid at the time of signing (with streaming)', async function() { + const armoredMessage = `-----BEGIN PGP MESSAGE----- + +xA0DAQgB4IT3RGwgLJcByxF1AGCdJvJoZWxsbyB3b3JsZMKzBAEBCAAGBQJS +YS9OACEJEOCE90RsICyXFiEE19Gx3sbKlGcANEXF4IT3RGwgLJcPBQP/csZd +9AhZQ3+dPkwlqlsXqYMlVEagYDavlUDI2CEJ2cn1rqHBuMlRkmYs7UqODku4 +FhJ6WvghiEKx8vqghDuaUXmcKuXhYe+PomD4XBmpbURBXCdPnojTINUj7GPK +eSvSZutLuKKbidSYMLhWROPlwKc2GU2ws6PrLZAyCAel/lU= +=xDib +-----END PGP MESSAGE-----`; + const key = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }), + passphrase: 'hello world' + }); + const { key: expiredKey } = await openpgp.reformatKey({ + privateKey: key, + userIDs: key.users.map(user => user.userID), + keyExpirationTime: 1, + date: key.keyPacket.created + }); + await stream.loadStreamsPonyfill(); + const { signatures: [sigInfo] } = await openpgp.verify({ + verificationKeys: expiredKey, + message: await openpgp.readMessage({ armoredMessage: stream.toStream(armoredMessage) }), + config: { minRSABits: 1024 } + }); + expect(await sigInfo.verified).to.be.true; + }); + + it('Verification succeeds if an expired signing key was valid at the time of signing (without streaming)', async function() { + const armoredMessage = `-----BEGIN PGP MESSAGE----- + +xA0DAQgB4IT3RGwgLJcByxF1AGCdJvJoZWxsbyB3b3JsZMKzBAEBCAAGBQJS +YS9OACEJEOCE90RsICyXFiEE19Gx3sbKlGcANEXF4IT3RGwgLJcPBQP/csZd +9AhZQ3+dPkwlqlsXqYMlVEagYDavlUDI2CEJ2cn1rqHBuMlRkmYs7UqODku4 +FhJ6WvghiEKx8vqghDuaUXmcKuXhYe+PomD4XBmpbURBXCdPnojTINUj7GPK +eSvSZutLuKKbidSYMLhWROPlwKc2GU2ws6PrLZAyCAel/lU= +=xDib +-----END PGP MESSAGE-----`; + const key = await openpgp.decryptKey({ + privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }), + passphrase: 'hello world' + }); + const { key: expiredKey } = await openpgp.reformatKey({ + privateKey: key, + userIDs: key.users.map(user => user.userID), + keyExpirationTime: 1, + date: key.keyPacket.created + }); + const { signatures: [sigInfo] } = await openpgp.verify({ + verificationKeys: expiredKey, + message: await openpgp.readMessage({ armoredMessage }), + config: { minRSABits: 1024 } + }); + expect(await sigInfo.verified).to.be.true; }); it('Supports non-human-readable notations', async function() { @@ -1493,46 +1443,21 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA }); }); - it('Verify test with expired verification public key', async function() { - const pubKey = await openpgp.readKey({ armoredKey: pub_expired }); - const message = await openpgp.readMessage({ armoredMessage: msg_sig_expired }); - return openpgp.verify({ verificationKeys:[pubKey], message:message }).then(function(verified) { - expect(verified).to.exist; - expect(verified.signatures).to.have.length(1); - expect(verified.signatures[0].valid).to.be.true; - expect(verified.signatures[0].signature.packets.length).to.equal(1); - }); - }); - - it('Verify test with expired verification public key and disable expiration checks using null date', async function() { - const pubKey = await openpgp.readKey({ armoredKey: pub_expired }); - const message = await openpgp.readMessage({ armoredMessage: msg_sig_expired }); - return openpgp.verify({ verificationKeys:[pubKey], message:message, date: null }).then(function(verified) { - expect(verified).to.exist; - expect(verified.signatures).to.have.length(1); - expect(verified.signatures[0].valid).to.be.true; - expect(verified.signatures[0].signature.packets.length).to.equal(1); - }); - }); - // TODO add test with multiple revocation signatures it('Verify primary key revocation signatures', async function() { const pubKey = await openpgp.readKey({ armoredKey: pub_revoked }); - const revSig = pubKey.revocationSignatures[0]; - revSig.verified = null; await pubKey.revocationSignatures[0].verify( - pubKey.primaryKey, openpgp.enums.signature.keyRevocation, { key: pubKey.primaryKey } - ).then(() => expect(revSig.verified).to.be.true); + pubKey.keyPacket, openpgp.enums.signature.keyRevocation, { key: pubKey.keyPacket } + ); }); // TODO add test with multiple revocation signatures it('Verify subkey revocation signatures', async function() { const pubKey = await openpgp.readKey({ armoredKey: pub_revoked }); const revSig = pubKey.subKeys[0].revocationSignatures[0]; - revSig.verified = null; await revSig.verify( - pubKey.primaryKey, openpgp.enums.signature.subkeyRevocation, { key: pubKey.primaryKey, bind: pubKey.subKeys[0].keyPacket } - ).then(() => expect(revSig.verified).to.be.true); + pubKey.keyPacket, openpgp.enums.signature.subkeyRevocation, { key: pubKey.keyPacket, bind: pubKey.subKeys[0].keyPacket } + ); }); it('Verify key expiration date', async function() { @@ -1698,7 +1623,7 @@ iTuGu4fEU1UligAXSrZmCdE= const key = await openpgp.readKey({ armoredKey: armoredKeyWithPhoto }); await Promise.all(key.users.map(async user => { - await user.verify(key.primaryKey); + await user.verify(key.keyPacket); })); }); diff --git a/test/general/x25519.js b/test/general/x25519.js index 80b5af79..311aa9d5 100644 --- a/test/general/x25519.js +++ b/test/general/x25519.js @@ -389,30 +389,27 @@ function omnibus() { expect(firstKey.privateKeyArmored).to.exist; expect(firstKey.publicKeyArmored).to.exist; expect(firstKey.key).to.exist; - expect(firstKey.key.primaryKey).to.exist; + expect(firstKey.key.keyPacket).to.exist; expect(firstKey.key.subKeys).to.have.length(1); expect(firstKey.key.subKeys[0].keyPacket).to.exist; const hi = firstKey.key; - const primaryKey = hi.primaryKey; + const primaryKey = hi.keyPacket; const subKey = hi.subKeys[0]; expect(hi.getAlgorithmInfo().curve).to.equal('ed25519'); expect(hi.getAlgorithmInfo().algorithm).to.equal('eddsa'); expect(subKey.getAlgorithmInfo().curve).to.equal('curve25519'); expect(subKey.getAlgorithmInfo().algorithm).to.equal('ecdh'); - // Self Certificate is valid + // Verify that self Certificate is valid const user = hi.users[0]; const certificate = user.selfCertifications[0]; - certificate.verified = null; await certificate.verify( primaryKey, openpgp.enums.signature.certGeneric, { userID: user.userID, key: primaryKey } - ).then(async () => expect(certificate.verified).to.be.true); - - certificate.verified = null; + ); await user.verifyCertificate( primaryKey, certificate, [hi.toPublic()], undefined, openpgp.config - ).then(async () => expect(certificate.verified).to.be.true); + ); const options = { userIDs: { name: "Bye", email: "bye@good.bye" }, @@ -425,27 +422,23 @@ function omnibus() { expect(bye.subKeys[0].getAlgorithmInfo().curve).to.equal('curve25519'); expect(bye.subKeys[0].getAlgorithmInfo().algorithm).to.equal('ecdh'); - // Self Certificate is valid + // Verify that self Certificate is valid const user = bye.users[0]; const certificate = user.selfCertifications[0]; - certificate.verified = null; await certificate.verify( - bye.primaryKey, openpgp.enums.signature.certGeneric, { userID: user.userID, key: bye.primaryKey } - ).then(async () => expect(certificate.verified).to.be.true); - certificate.verified = null; + bye.keyPacket, openpgp.enums.signature.certGeneric, { userID: user.userID, key: bye.keyPacket } + ); await user.verifyCertificate( - bye.primaryKey, user.selfCertifications[0], [bye.toPublic()], undefined, openpgp.config - ).then(async () => expect(certificate.verified).to.be.true); + bye.keyPacket, user.selfCertifications[0], [bye.toPublic()], undefined, openpgp.config + ); return Promise.all([ // Hi trusts Bye! bye.toPublic().signPrimaryUser([hi]).then(trustedBye => { const hiCertificate = trustedBye.users[0].otherCertifications[0]; - expect(hiCertificate.verified).to.be.true; - hiCertificate.verified = null; return hiCertificate.verify( - primaryKey, openpgp.enums.signature.certGeneric, { userID: user.userID, key: bye.toPublic().primaryKey } - ).then(async () => expect(hiCertificate.verified).to.be.true); + primaryKey, openpgp.enums.signature.certGeneric, { userID: user.userID, key: bye.toPublic().keyPacket } + ); }), // Signing message openpgp.sign( @@ -466,22 +459,18 @@ function omnibus() { ]); }), // Encrypting and signing - openpgp.encrypt( - { - message: await openpgp.createMessage({ text: 'Hi, Hi wrote this but only Bye can read it!' }), - encryptionKeys: [bye.toPublic()], - signingKeys: [hi] - } - ).then(async encrypted => { + openpgp.encrypt({ + message: await openpgp.createMessage({ text: 'Hi, Hi wrote this but only Bye can read it!' }), + encryptionKeys: [bye.toPublic()], + signingKeys: [hi] + }).then(async encrypted => { const msg = await openpgp.readMessage({ armoredMessage: encrypted }); // Decrypting and verifying - return openpgp.decrypt( - { - message: msg, - decryptionKeys: bye, - verificationKeys: [hi.toPublic()] - } - ).then(output => { + return openpgp.decrypt({ + message: msg, + decryptionKeys: bye, + verificationKeys: [hi.toPublic()] + }).then(output => { expect(output.data).to.equal('Hi, Hi wrote this but only Bye can read it!'); expect(output.signatures[0].valid).to.be.true; });