Return only one key in key.read[Armored], add readAll[Armored]

This commit is contained in:
Daniel Huigens 2020-02-26 22:32:22 +01:00
parent 3817cca3c6
commit 2bc24f354b
24 changed files with 543 additions and 603 deletions

View File

@ -197,19 +197,19 @@ const openpgp = require('openpgp'); // use as CommonJS, AMD, ES6 module or via w
-----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key
const passphrase = `yourPassphrase`; // what the private key is encrypted with
const { keys: [privateKey] } = await openpgp.key.readArmored(privateKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase);
const encrypted = await openpgp.encrypt({
message: openpgp.message.fromText('Hello, World!'), // input as Message object
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys, // for encryption
privateKeys: [privateKey] // for signing (optional)
message: openpgp.message.fromText('Hello, World!'), // input as Message object
publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for encryption
privateKeys: privateKey // for signing (optional)
});
console.log(encrypted); // '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----'
const { data: decrypted } = await openpgp.decrypt({
message: await openpgp.message.readArmored(encrypted), // parse armored message
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys, // for verification (optional)
privateKeys: [privateKey] // for decryption
message: await openpgp.message.readArmored(encrypted), // parse armored message
publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for verification (optional)
privateKeys: privateKey // for decryption
});
console.log(decrypted); // 'Hello, World!'
})();
@ -233,12 +233,10 @@ Encrypt with multiple public keys:
const passphrase = `yourPassphrase`; // what the private key is encrypted with
const message = 'Hello, World!';
const { keys: [privateKey] } = await openpgp.key.readArmored(privateKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase)
const publicKeys = await Promise.all(publicKeysArmored.map(async (key) => {
return (await openpgp.key.readArmored(key)).keys[0];
}));
const publicKeys = await Promise.all(publicKeysArmored.map(openpgp.key.readArmored));
const encrypted = await openpgp.encrypt({
message: openpgp.message.fromText(message), // input as Message object
@ -328,7 +326,7 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html).
-----END PGP PRIVATE KEY BLOCK-----`; // Encrypted private key
const passphrase = `yourPassphrase`; // Password that private key is encrypted with
const privateKey = (await openpgp.key.readArmored([privateKeyArmored])).keys[0];
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase);
const readableStream = new openpgp.stream.ReadableStream({
@ -339,16 +337,16 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html).
});
const encrypted = await openpgp.encrypt({
message: openpgp.message.fromText(readableStream), // input as Message object
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys, // for encryption
privateKeys: [privateKey] // for signing (optional)
message: openpgp.message.fromText(readableStream), // input as Message object
publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for encryption
privateKeys: privateKey // for signing (optional)
});
console.log(encrypted); // ReadableStream containing '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----'
const decrypted = await openpgp.decrypt({
message: await openpgp.message.readArmored(encrypted), // parse armored message
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys, // for verification (optional)
privateKeys: [privateKey] // for decryption
message: await openpgp.message.readArmored(encrypted), // parse armored message
publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for verification (optional)
privateKeys: privateKey // for decryption
});
const plaintext = await openpgp.stream.readToEnd(decrypted.data);
console.log(plaintext); // 'Hello, World!'
@ -397,7 +395,7 @@ Using a revocation certificate:
```js
(async () => {
const { publicKeyArmored: revokedKeyArmored } = await openpgp.revokeKey({
key: (await openpgp.key.readArmored(publicKeyArmored)).keys[0],
key: await openpgp.key.readArmored(publicKeyArmored),
revocationCertificate
});
console.log(revokedKeyArmored); // '-----BEGIN PGP PUBLIC KEY BLOCK ... '
@ -408,7 +406,7 @@ Using the private key:
```js
(async () => {
const { publicKeyArmored, publicKey } = await openpgp.revokeKey({
key: (await openpgp.key.readArmored(privateKeyArmored)).keys[0]
key: await openpgp.key.readArmored(privateKeyArmored)
});
})();
```
@ -422,7 +420,7 @@ Using the private key:
let publicKeyArmored = await hkp.lookup({
query: 'alice@example.com'
});
var { keys: [publicKey] } = await openpgp.key.readArmored(publicKeyArmored);
let publicKey = await openpgp.key.readArmored(publicKeyArmored);
})();
```
@ -452,18 +450,18 @@ Using the private key:
-----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key
const passphrase = `yourPassphrase`; // what the private key is encrypted with
const { keys: [privateKey] } = await openpgp.key.readArmored(privateKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase);
const cleartext = await openpgp.sign({
message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object
privateKeys: [privateKey] // for signing
privateKeys: privateKey // for signing
});
console.log(cleartext); // '-----BEGIN PGP SIGNED MESSAGE ... END PGP SIGNATURE-----'
const verified = await openpgp.verify({
message: await openpgp.cleartext.readArmored(cleartext), // parse armored message
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys // for verification
message: await openpgp.cleartext.readArmored(cleartext), // parse armored message
publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification
});
const { valid } = verified.signatures[0];
if (valid) {
@ -486,12 +484,12 @@ Using the private key:
-----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key
const passphrase = `yourPassphrase`; // what the private key is encrypted with
const { keys: [privateKey] } = await openpgp.key.readArmored(privateKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase);
const { signature: detachedSignature } = await openpgp.sign({
message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object
privateKeys: [privateKey], // for signing
privateKeys: privateKey , // for signing
detached: true
});
console.log(detachedSignature);
@ -499,7 +497,7 @@ Using the private key:
const verified = await openpgp.verify({
message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object
signature: await openpgp.signature.readArmored(detachedSignature), // parse detached signature
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys // for verification
publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification
});
const { valid } = verified.signatures[0];
if (valid) {
@ -529,18 +527,18 @@ Using the private key:
-----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key
const passphrase = `yourPassphrase`; // what the private key is encrypted with
const { keys: [privateKey] } = await openpgp.key.readArmored(privateKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt(passphrase);
const signatureArmored = await openpgp.sign({
message: openpgp.message.fromBinary(readableStream), // or .fromText(readableStream: ReadableStream<String>)
privateKeys: [privateKey] // for signing
message: openpgp.message.fromBinary(readableStream), // or .fromText(readableStream: ReadableStream<String>)
privateKeys: privateKey // for signing
});
console.log(signatureArmored); // ReadableStream containing '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----'
const verified = await openpgp.verify({
message: await openpgp.message.readArmored(signatureArmored), // parse armored signature
publicKeys: (await openpgp.key.readArmored(publicKeyArmored)).keys // for verification
message: await openpgp.message.readArmored(signatureArmored), // parse armored signature
publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification
});
await openpgp.stream.readToEnd(verified.data);

View File

@ -266,61 +266,67 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) {
}
/**
* Reads an unarmored OpenPGP key list and returns one or multiple key objects
* Reads an unarmored OpenPGP key and returns a key object
* @param {Uint8Array} data to be parsed
* @returns {Promise<{keys: Array<module:key.Key>,
* err: (Array<Error>|null)}>} result object with key and error arrays
* @returns {Promise<module:key.Key>} key object
* @async
* @static
*/
export async function read(data) {
const result = {};
result.keys = [];
const err = [];
try {
const packetlist = new packet.List();
await packetlist.read(data);
const keyIndex = packetlist.indexOfTag(enums.packet.publicKey, enums.packet.secretKey);
if (keyIndex.length === 0) {
throw new Error('No key packet found');
}
for (let i = 0; i < keyIndex.length; i++) {
const oneKeyList = packetlist.slice(keyIndex[i], keyIndex[i + 1]);
try {
const newKey = new Key(oneKeyList);
result.keys.push(newKey);
} catch (e) {
err.push(e);
}
}
} catch (e) {
err.push(e);
}
if (err.length) {
result.err = err;
}
return result;
const packetlist = new packet.List();
await packetlist.read(data);
return new Key(packetlist);
}
/**
* Reads an OpenPGP armored text and returns one or multiple key objects
* @param {String | ReadableStream<String>} armoredText text to be parsed
* @returns {Promise<{keys: Array<module:key.Key>,
* err: (Array<Error>|null)}>} result object with key and error arrays
* Reads an OpenPGP armored key and returns a key object
* @param {String | ReadableStream<String>} armoredKey text to be parsed
* @returns {Promise<module:key.Key>} key object
* @async
* @static
*/
export async function readArmored(armoredText) {
try {
const input = await armor.decode(armoredText);
if (!(input.type === enums.armor.public_key || input.type === enums.armor.private_key)) {
throw new Error('Armored text not of type key');
}
return read(input.data);
} catch (e) {
const result = { keys: [], err: [] };
result.err.push(e);
return result;
export async function readArmored(armoredKey) {
const input = await armor.decode(armoredKey);
if (!(input.type === enums.armor.public_key || input.type === enums.armor.private_key)) {
throw new Error('Armored text not of type key');
}
return read(input.data);
}
/**
* Reads an unarmored OpenPGP key block and returns a list of key objects
* @param {Uint8Array} data to be parsed
* @returns {Promise<Array<module:key.Key>>} key object
* @async
* @static
*/
export async function readAll(data) {
const keys = [];
const packetlist = new packet.List();
await packetlist.read(data);
const keyIndex = packetlist.indexOfTag(enums.packet.publicKey, enums.packet.secretKey);
if (keyIndex.length === 0) {
throw new Error('No key packet found');
}
for (let i = 0; i < keyIndex.length; i++) {
const oneKeyList = packetlist.slice(keyIndex[i], keyIndex[i + 1]);
const newKey = new Key(oneKeyList);
keys.push(newKey);
}
return keys;
}
/**
* Reads an OpenPGP armored key block and returns a list of key objects
* @param {String | ReadableStream<String>} armoredKey text to be parsed
* @returns {Promise<Array<module:key.Key>>} key objects
* @async
* @static
*/
export async function readAllArmored(armoredKey) {
const input = await armor.decode(armoredKey);
if (!(input.type === enums.armor.public_key || input.type === enums.armor.private_key)) {
throw new Error('Armored text not of type key');
}
return readAll(input.data);
}

View File

@ -4,9 +4,9 @@
*/
import {
readArmored,
read, readArmored,
readAll, readAllArmored,
generate,
read,
reformat
} from './factory';
@ -20,9 +20,9 @@ import {
import Key from './key.js';
export {
readArmored,
read, readArmored,
readAll, readAllArmored,
generate,
read,
reformat,
getPreferredAlgo,
isAeadSupported,

View File

@ -81,6 +81,9 @@ Key.prototype.packetlist2structure = function(packetlist) {
switch (packetlist[i].tag) {
case enums.packet.publicKey:
case enums.packet.secretKey:
if (this.keyPacket) {
throw new Error('Key block contains multiple keys');
}
this.keyPacket = packetlist[i];
primaryKeyId = this.getKeyId();
break;

View File

@ -22,7 +22,7 @@
* @module keyring/keyring
*/
import { readArmored } from '../key';
import { readAllArmored } from '../key';
import LocalStore from './localstore';
/**
@ -183,13 +183,12 @@ KeyArray.prototype.getForId = function (keyId, deep) {
/**
* Imports a key from an ascii armored message
* @param {String} armored message to read the keys/key from
* @returns {Promise<Array<Error>|null>} array of error objects or null
* @async
*/
KeyArray.prototype.importKey = async function (armored) {
const imported = await readArmored(armored);
for (let i = 0; i < imported.keys.length; i++) {
const key = imported.keys[i];
const imported = await readAllArmored(armored);
for (let i = 0; i < imported.length; i++) {
const key = imported[i];
// check if key already in key array
const keyidHex = key.getKeyId().toHex();
const keyFound = this.getForId(keyidHex);
@ -199,7 +198,6 @@ KeyArray.prototype.importKey = async function (armored) {
this.push(key);
}
}
return imported.err ? imported.err : null;
};
/**

View File

@ -20,14 +20,12 @@
* @requires web-stream-tools
* @requires config
* @requires key
* @requires util
* @module keyring/localstore
*/
import stream from 'web-stream-tools';
import config from '../config';
import { readArmored } from '../key';
import util from '../util';
/**
* The class that deals with storage of the keyring.
@ -77,11 +75,7 @@ async function loadKeys(storage, itemname) {
let key;
for (let i = 0; i < armoredKeys.length; i++) {
key = await readArmored(armoredKeys[i]);
if (!key.err) {
keys.push(key.keys[0]);
} else {
util.print_debug("Error reading armored key from keyring index: " + i);
}
keys.push(key);
}
}
return keys;

View File

@ -78,7 +78,7 @@ WKD.prototype.lookup = async function(options) {
if (options.rawBytes) {
return rawBytes;
}
return keyMod.read(rawBytes);
return keyMod.readAll(rawBytes);
};
export default WKD;

View File

@ -167,15 +167,11 @@ describe("ASCII armor", function() {
'-----END PGP PRIVATE KEY BLOCK-----'].join('\n');
// try with default config
const result_1 = await openpgp.key.readArmored(privKey);
expect(result_1.err).to.exist;
expect(result_1.err[0].message).to.match(/Ascii armor integrity check on message failed/);
await expect(openpgp.key.readArmored(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
// try opposite config
openpgp.config.checksum_required = !openpgp.config.checksum_required;
const result_2 = await openpgp.key.readArmored(privKey);
expect(result_2.err).to.exist;
expect(result_2.err[0].message).to.match(/Ascii armor integrity check on message failed/);
await expect(openpgp.key.readArmored(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
// back to default
openpgp.config.checksum_required = !openpgp.config.checksum_required;
@ -203,13 +199,11 @@ describe("ASCII armor", function() {
'-----END PGP PRIVATE KEY BLOCK-----'].join('\n');
// try with default config
const result_1 = await openpgp.key.readArmored(privKey);
expect(result_1.err).to.not.exist;
await openpgp.key.readArmored(privKey);
// try opposite config
openpgp.config.checksum_required = !openpgp.config.checksum_required;
const result_2 = await openpgp.key.readArmored(privKey);
expect(result_2.err).to.not.exist;
await openpgp.key.readArmored(privKey);
// back to default
openpgp.config.checksum_required = !openpgp.config.checksum_required;
@ -236,22 +230,18 @@ describe("ASCII armor", function() {
'-----END PGP PRIVATE KEY BLOCK-----'].join('\n');
// try with default config
const result_1 = await openpgp.key.readArmored(privKeyNoCheckSum);
if(openpgp.config.checksum_required) {
expect(result_1.err).to.exist;
expect(result_1.err[0].message).to.match(/Ascii armor integrity check on message failed/);
if (openpgp.config.checksum_required) {
await expect(openpgp.key.readArmored(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
} else {
expect(result_1.err).to.not.exist;
await openpgp.key.readArmored(privKeyNoCheckSum);
}
// try opposite config
openpgp.config.checksum_required = !openpgp.config.checksum_required;
const result_2 = await openpgp.key.readArmored(privKeyNoCheckSum);
if(openpgp.config.checksum_required) {
expect(result_2.err).to.exist;
expect(result_2.err[0].message).to.match(/Ascii armor integrity check on message failed/);
if (openpgp.config.checksum_required) {
await expect(openpgp.key.readArmored(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
} else {
expect(result_2.err).to.not.exist;
await openpgp.key.readArmored(privKeyNoCheckSum);
}
// back to default
@ -280,22 +270,18 @@ describe("ASCII armor", function() {
''].join('\n');
// try with default config
const result_1 = await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline);
if(openpgp.config.checksum_required) {
expect(result_1.err).to.exist;
expect(result_1.err[0].message).to.match(/Ascii armor integrity check on message failed/);
if (openpgp.config.checksum_required) {
await expect(openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
} else {
expect(result_1.err).to.not.exist;
await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline);
}
// try opposite config
openpgp.config.checksum_required = !openpgp.config.checksum_required;
const result_2 = await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline);
if(openpgp.config.checksum_required) {
expect(result_2.err).to.exist;
expect(result_2.err[0].message).to.match(/Ascii armor integrity check on message failed/);
if (openpgp.config.checksum_required) {
await expect(openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/);
} else {
expect(result_2.err).to.not.exist;
await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline);
}
// back to default
@ -325,8 +311,7 @@ describe("ASCII armor", function() {
''].join('\t \r\n');
const result = await openpgp.key.readArmored(privKey);
expect(result.err).to.not.exist;
expect(result.keys[0]).to.be.an.instanceof(openpgp.key.Key);
expect(result).to.be.an.instanceof(openpgp.key.Key);
});
it('Do not filter blank lines after header', async function () {

View File

@ -173,12 +173,9 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g=
return data[name].pub_key;
}
const pub = await openpgp.key.readArmored(data[name].pub);
expect(pub).to.exist;
expect(pub.err).to.not.exist;
expect(pub.keys).to.have.length(1);
expect(pub.keys[0].getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub.keys[0];
return data[name].pub_key;
expect(pub.getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub;
return pub;
}
async function load_priv_key(name) {
if (data[name].priv_key) {
@ -186,12 +183,10 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g=
}
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.err).to.not.exist;
expect(pk.keys).to.have.length(1);
expect(pk.keys[0].getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.keys[0].decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk.keys[0];
return data[name].priv_key;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk;
return pk;
}
it('Load public key', async function () {
await load_pub_key('romeo');

View File

@ -143,11 +143,9 @@ describe('Elliptic Curve Cryptography for secp256k1 curve @lightweight', functio
}
const pub = await openpgp.key.readArmored(data[name].pub);
expect(pub).to.exist;
expect(pub.err).to.not.exist;
expect(pub.keys).to.have.length(1);
expect(pub.keys[0].getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub.keys[0];
return data[name].pub_key;
expect(pub.getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub;
return pub;
}
async function load_priv_key(name) {
if (data[name].priv_key) {
@ -155,12 +153,10 @@ describe('Elliptic Curve Cryptography for secp256k1 curve @lightweight', functio
}
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.err).to.not.exist;
expect(pk.keys).to.have.length(1);
expect(pk.keys[0].getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.keys[0].decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk.keys[0];
return data[name].priv_key;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk;
return pk;
}
it('Load public key', async function () {
const romeoPublic = await load_pub_key('romeo');

View File

@ -1990,7 +1990,7 @@ function versionSpecificTests() {
if (openpgp.util.getWebCryptoAll()) { opt.numBits = 2048; } // webkit webcrypto accepts minimum 2048 bit keys
return openpgp.generateKey(opt).then(async function(key) {
testPref(key.key);
testPref((await openpgp.key.readArmored(key.publicKeyArmored)).keys[0]);
testPref(await openpgp.key.readArmored(key.publicKeyArmored));
});
});
@ -2033,7 +2033,7 @@ function versionSpecificTests() {
try {
const key = await openpgp.generateKey(opt);
testPref(key.key);
testPref((await openpgp.key.readArmored(key.publicKeyArmored)).keys[0]);
testPref(await openpgp.key.readArmored(key.publicKeyArmored));
} finally {
openpgp.config.encryption_cipher = encryption_cipherVal;
openpgp.config.prefer_hash_algorithm = prefer_hash_algorithmVal;
@ -2186,7 +2186,7 @@ function versionSpecificTests() {
const userId = 'test <a@b.com>';
const opt = {curve: 'curve25519', userIds: [userId], passphrase: '123', subkeys:[{}, {sign: true}]};
return openpgp.generateKey(opt).then(async function({ privateKeyArmored }) {
const { keys: [key] } = await openpgp.key.readArmored(privateKeyArmored);
const key = await openpgp.key.readArmored(privateKeyArmored);
expect(key.users.length).to.equal(1);
expect(key.users[0].userId.userid).to.equal(userId);
expect(key.users[0].selfCertifications[0].isPrimaryUserID).to.be.true;
@ -2205,7 +2205,7 @@ function versionSpecificTests() {
await key.decrypt('123');
return openpgp.reformatKey({ privateKey: key, userIds: [userId] });
}).then(async function({ privateKeyArmored }) {
const { keys: [key] } = await openpgp.key.readArmored(privateKeyArmored);
const key = await openpgp.key.readArmored(privateKeyArmored);
expect(key.users.length).to.equal(1);
expect(key.users[0].userId.userid).to.equal(userId);
expect(key.users[0].selfCertifications[0].isPrimaryUserID).to.be.true;
@ -2276,8 +2276,8 @@ function versionSpecificTests() {
});
it('Sign and verify key - primary user', async function() {
let publicKey = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(pub_sig_test);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
publicKey = await publicKey.signPrimaryUser([privateKey]);
const signatures = await publicKey.verifyPrimaryUser([privateKey]);
@ -2291,9 +2291,9 @@ function versionSpecificTests() {
});
it('Sign key and verify with wrong key - primary user', async function() {
let publicKey = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const wrongKey = (await openpgp.key.readArmored(wrong_key)).keys[0];
let publicKey = await openpgp.key.readArmored(pub_sig_test);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
const wrongKey = await openpgp.key.readArmored(wrong_key);
await privateKey.decrypt('hello world');
publicKey = await publicKey.signPrimaryUser([privateKey]);
const signatures = await publicKey.verifyPrimaryUser([wrongKey]);
@ -2307,8 +2307,8 @@ function versionSpecificTests() {
});
it('Sign and verify key - all users', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
publicKey = await publicKey.signAllUsers([privateKey]);
const signatures = await publicKey.verifyAllUsers([privateKey]);
@ -2330,9 +2330,9 @@ function versionSpecificTests() {
});
it('Sign key and verify with wrong key - all users', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const wrongKey = (await openpgp.key.readArmored(wrong_key)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
const wrongKey = await openpgp.key.readArmored(wrong_key);
await privateKey.decrypt('hello world');
publicKey = await publicKey.signAllUsers([privateKey]);
const signatures = await publicKey.verifyAllUsers([wrongKey]);
@ -2376,8 +2376,8 @@ function versionSpecificTests() {
it('Reformat key with no subkey with passphrase', async function() {
const userId = 'test1 <a@b.com>';
const keys = (await openpgp.key.readArmored(key_without_subkey)).keys;
const opt = {privateKey: keys[0], userIds: [userId], passphrase: "test"};
const key = await openpgp.key.readArmored(key_without_subkey);
const opt = {privateKey: key, userIds: [userId], passphrase: "test"};
return openpgp.reformatKey(opt).then(function(newKey) {
newKey = newKey.key;
expect(newKey.users.length).to.equal(1);
@ -2410,8 +2410,8 @@ function versionSpecificTests() {
it('Reformat key with no subkey without passphrase', async function() {
const userId = 'test1 <a@b.com>';
const keys = (await openpgp.key.readArmored(key_without_subkey)).keys;
const opt = {privateKey: keys[0], userIds: [userId]};
const key = await openpgp.key.readArmored(key_without_subkey);
const opt = {privateKey: key, userIds: [userId]};
return openpgp.reformatKey(opt).then(function(newKey) {
newKey = newKey.key;
expect(newKey.users.length).to.equal(1);
@ -2518,7 +2518,7 @@ function versionSpecificTests() {
// uid emma.goldman@example.net
// ssb cv25519 2019-03-20 [E]
// E4557C2B02FFBF4B04F87401EC336AF7133D0F85BE7FD09BAEFD9CAEB8C93965
const { keys: [key] } = await openpgp.key.readArmored(v5_sample_key);
const key = await openpgp.key.readArmored(v5_sample_key);
expect(key.primaryKey.getFingerprint()).to.equal('19347bc9872464025f99df3ec2e0000ed9884892e1f7b3ea4c94009159569b54');
expect(key.subKeys[0].getFingerprint()).to.equal('e4557c2b02ffbf4b04f87401ec336af7133d0f85be7fd09baefd9caeb8c93965');
await key.verifyPrimaryKey();
@ -2574,29 +2574,27 @@ describe('Key', function() {
it('Parsing armored text with RSA key and ECC subkey', async function() {
openpgp.config.tolerant = true;
const pubKeys = await openpgp.key.readArmored(rsa_ecc_pub);
const pubKeys = await openpgp.key.readAllArmored(rsa_ecc_pub);
expect(pubKeys).to.exist;
expect(pubKeys.err).to.not.exist;
expect(pubKeys.keys).to.have.length(1);
expect(pubKeys.keys[0].getKeyId().toHex()).to.equal('b8e4105cc9dedc77');
expect(pubKeys).to.have.length(1);
expect(pubKeys[0].getKeyId().toHex()).to.equal('b8e4105cc9dedc77');
});
it('Parsing armored text with two keys', async function() {
const pubKeys = await openpgp.key.readArmored(twoKeys);
const pubKeys = await openpgp.key.readAllArmored(twoKeys);
expect(pubKeys).to.exist;
expect(pubKeys.err).to.not.exist;
expect(pubKeys.keys).to.have.length(2);
expect(pubKeys.keys[0].getKeyId().toHex()).to.equal('4a63613a4d6e4094');
expect(pubKeys.keys[1].getKeyId().toHex()).to.equal('dbf223e870534df4');
expect(pubKeys).to.have.length(2);
expect(pubKeys[0].getKeyId().toHex()).to.equal('4a63613a4d6e4094');
expect(pubKeys[1].getKeyId().toHex()).to.equal('dbf223e870534df4');
});
it('Parsing armored key with an authorized revocation key in a User ID self-signature', async function() {
const { keys: [pubKey] } = await openpgp.key.readArmored(key_with_authorized_revocation_key);
const pubKey = await openpgp.key.readArmored(key_with_authorized_revocation_key);
await expect(pubKey.getPrimaryUser()).to.be.rejectedWith('This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.');
});
it('Parsing armored key with an authorized revocation key in a direct-key signature', async function() {
const { keys: [pubKey] } = await openpgp.key.readArmored(key_with_authorized_revocation_key_in_separate_sig);
const pubKey = await openpgp.key.readArmored(key_with_authorized_revocation_key_in_separate_sig);
const primaryUser = await pubKey.getPrimaryUser();
expect(primaryUser).to.exist;
});
@ -2617,12 +2615,11 @@ describe('Key', function() {
});
it('Testing key ID and fingerprint for V4 keys', async function() {
const pubKeysV4 = await openpgp.key.readArmored(twoKeys);
const pubKeysV4 = await openpgp.key.readAllArmored(twoKeys);
expect(pubKeysV4).to.exist;
expect(pubKeysV4.err).to.not.exist;
expect(pubKeysV4.keys).to.have.length(2);
expect(pubKeysV4).to.have.length(2);
const pubKeyV4 = pubKeysV4.keys[0];
const pubKeyV4 = pubKeysV4[0];
expect(pubKeyV4).to.exist;
expect(pubKeyV4.getKeyId().toHex()).to.equal('4a63613a4d6e4094');
@ -2630,20 +2627,14 @@ describe('Key', function() {
});
it('Create new key ID with fromId()', async function() {
const pubKeyV4 = (await openpgp.key.readArmored(twoKeys)).keys[0];
const [pubKeyV4] = await openpgp.key.readAllArmored(twoKeys);
const keyId = pubKeyV4.getKeyId();
const newKeyId = keyId.constructor.fromId(keyId.toHex());
expect(newKeyId.toHex()).to.equal(keyId.toHex());
});
it('Testing key method getSubkeys', async function() {
const pubKeys = await openpgp.key.readArmored(pub_sig_test);
expect(pubKeys).to.exist;
expect(pubKeys.err).to.not.exist;
expect(pubKeys.keys).to.have.length(1);
const pubKey = pubKeys.keys[0];
const pubKey = await openpgp.key.readArmored(pub_sig_test);
expect(pubKey).to.exist;
const packetlist = new openpgp.packet.List();
@ -2658,17 +2649,12 @@ describe('Key', function() {
});
it('Verify status of revoked primary key', async function() {
const pubKey = (await openpgp.key.readArmored(pub_revoked_subkeys)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_revoked_subkeys);
await expect(pubKey.verifyPrimaryKey()).to.be.rejectedWith('Primary key is revoked');
});
it('Verify status of revoked subkey', async function() {
const pubKeys = await openpgp.key.readArmored(pub_sig_test);
expect(pubKeys).to.exist;
expect(pubKeys.err).to.not.exist;
expect(pubKeys.keys).to.have.length(1);
const pubKey = pubKeys.keys[0];
const pubKey = await openpgp.key.readArmored(pub_sig_test);
expect(pubKey).to.exist;
expect(pubKey.subKeys).to.exist;
expect(pubKey.subKeys).to.have.length(2);
@ -2679,13 +2665,13 @@ describe('Key', function() {
});
it('Verify status of key with non-self revocation signature', async function() {
const { keys: [pubKey] } = await openpgp.key.readArmored(key_with_revoked_third_party_cert);
const pubKey = await openpgp.key.readArmored(key_with_revoked_third_party_cert);
const [selfCertification] = await pubKey.verifyPrimaryUser();
const publicSigningKey = await pubKey.getSigningKey();
expect(selfCertification.keyid.toHex()).to.equal(publicSigningKey.getKeyId().toHex());
expect(selfCertification.valid).to.be.true;
const { keys: [certifyingKey] } = await openpgp.key.readArmored(certifying_key);
const certifyingKey = await openpgp.key.readArmored(certifying_key);
const certifyingSigningKey = await certifyingKey.getSigningKey();
const signatures = await pubKey.verifyPrimaryUser([certifyingKey]);
expect(signatures.length).to.equal(2);
@ -2699,7 +2685,7 @@ describe('Key', function() {
});
it('Verify certificate of key with future creation date', async function() {
const { keys: [pubKey] } = await openpgp.key.readArmored(key_created_2030);
const pubKey = await openpgp.key.readArmored(key_created_2030);
const user = pubKey.users[0];
await user.verifyCertificate(pubKey.primaryKey, user.selfCertifications[0], [pubKey], pubKey.primaryKey.created);
const verifyAllResult = await user.verifyAllCertifications(pubKey.primaryKey, [pubKey], pubKey.primaryKey.created);
@ -2708,12 +2694,7 @@ describe('Key', function() {
});
it('Evaluate key flags to find valid encryption key packet', async function() {
const pubKeys = await openpgp.key.readArmored(pub_sig_test);
expect(pubKeys).to.exist;
expect(pubKeys.err).to.not.exist;
expect(pubKeys.keys).to.have.length(1);
const pubKey = pubKeys.keys[0];
const pubKey = await openpgp.key.readArmored(pub_sig_test);
// remove subkeys
pubKey.subKeys = [];
// primary key has only key flags for signing
@ -2722,7 +2703,7 @@ describe('Key', function() {
it('should not decrypt using a sign-only RSA key, unless explicitly configured', async function () {
const allowSigningKeyDecryption = openpgp.config.allow_insecure_decryption_with_signing_keys;
const { keys: [key] } = await openpgp.key.readArmored(rsaSignOnly);
const key = await openpgp.key.readArmored(rsaSignOnly);
try {
openpgp.config.allow_insecure_decryption_with_signing_keys = false;
await expect(openpgp.decrypt({
@ -2741,7 +2722,7 @@ describe('Key', function() {
});
it('Method getExpirationTime V4 Key', async function() {
const pubKey = (await openpgp.key.readArmored(twoKeys)).keys[1];
const [, pubKey] = await openpgp.key.readAllArmored(twoKeys);
expect(pubKey).to.exist;
expect(pubKey).to.be.an.instanceof(openpgp.key.Key);
const expirationTime = await pubKey.getExpirationTime();
@ -2749,7 +2730,7 @@ describe('Key', function() {
});
it('Method getExpirationTime expired V4 Key', async function() {
const pubKey = (await openpgp.key.readArmored(expiredKey)).keys[0];
const pubKey = await openpgp.key.readArmored(expiredKey);
expect(pubKey).to.exist;
expect(pubKey).to.be.an.instanceof(openpgp.key.Key);
const expirationTime = await pubKey.getExpirationTime();
@ -2757,7 +2738,7 @@ describe('Key', function() {
});
it('Method getExpirationTime V4 SubKey', async function() {
const pubKey = (await openpgp.key.readArmored(twoKeys)).keys[1];
const [, pubKey] = await openpgp.key.readAllArmored(twoKeys);
expect(pubKey).to.exist;
expect(pubKey).to.be.an.instanceof(openpgp.key.Key);
const expirationTime = await pubKey.subKeys[0].getExpirationTime(pubKey.primaryKey);
@ -2765,7 +2746,7 @@ describe('Key', function() {
});
it('Method getExpirationTime V4 Key with capabilities', async function() {
const pubKey = (await openpgp.key.readArmored(priv_key_2000_2008)).keys[0];
const pubKey = await openpgp.key.readArmored(priv_key_2000_2008);
expect(pubKey).to.exist;
expect(pubKey).to.be.an.instanceof(openpgp.key.Key);
pubKey.users[0].selfCertifications[0].keyFlags = [1];
@ -2776,7 +2757,7 @@ describe('Key', function() {
});
it('Method getExpirationTime V4 Key with capabilities - capable primary key', async function() {
const pubKey = (await openpgp.key.readArmored(priv_key_2000_2008)).keys[0];
const pubKey = await openpgp.key.readArmored(priv_key_2000_2008);
expect(pubKey).to.exist;
expect(pubKey).to.be.an.instanceof(openpgp.key.Key);
const expirationTime = await pubKey.getExpirationTime();
@ -2786,12 +2767,12 @@ describe('Key', function() {
});
it("decrypt() - throw if key parameters don't correspond", async function() {
const { keys: [key] } = await openpgp.key.readArmored(mismatchingKeyParams);
const key = await openpgp.key.readArmored(mismatchingKeyParams);
await expect(key.decrypt('userpass')).to.be.rejectedWith('Key is invalid');
});
it("decrypt(keyId) - throw if key parameters don't correspond", async function() {
const { keys: [key] } = await openpgp.key.readArmored(mismatchingKeyParams);
const key = await openpgp.key.readArmored(mismatchingKeyParams);
const subKeyId = key.subKeys[0].getKeyId()
await expect(key.decrypt('userpass', subKeyId)).to.be.rejectedWith('Key is invalid');
});
@ -2802,22 +2783,22 @@ describe('Key', function() {
});
it("validate() - throw if all-gnu-dummy key", async function() {
const { keys: [key] } = await openpgp.key.readArmored(gnuDummyKey);
const key = await openpgp.key.readArmored(gnuDummyKey);
await expect(key.validate()).to.be.rejectedWith('Cannot validate an all-gnu-dummy key');
});
it("validate() - gnu-dummy primary key with signing subkey", async function() {
const { keys: [key] } = await openpgp.key.readArmored(gnuDummyKeySigningSubkey);
const key = await openpgp.key.readArmored(gnuDummyKeySigningSubkey);
await expect(key.validate()).to.not.be.rejected;
});
it("validate() - gnu-dummy primary key with encryption subkey", async function() {
const { keys: [key] } = await openpgp.key.readArmored(dsaGnuDummyKeyWithElGamalSubkey);
const key = await openpgp.key.readArmored(dsaGnuDummyKeyWithElGamalSubkey);
await expect(key.validate()).to.not.be.rejected;
});
it("validate() - curve ed25519 (eddsa) cannot be used for ecdsa", async function() {
const { keys: [key] } = await openpgp.key.readArmored(eddsaKeyAsEcdsa);
const key = await openpgp.key.readArmored(eddsaKeyAsEcdsa);
await expect(key.validate()).to.be.rejectedWith('Key is invalid');
});
@ -2840,7 +2821,7 @@ describe('Key', function() {
});
it('makeDummy() - the converted key is valid but can no longer sign', async function() {
const { keys: [key] } = await openpgp.key.readArmored(priv_key_rsa);
const key = await openpgp.key.readArmored(priv_key_rsa);
await key.decrypt('hello world');
expect(key.primaryKey.isDummy()).to.be.false;
key.primaryKey.makeDummy();
@ -2850,7 +2831,7 @@ describe('Key', function() {
});
it('makeDummy() - subkeys of the converted key can still sign', async function() {
const { keys: [key] } = await openpgp.key.readArmored(priv_key_rsa);
const key = await openpgp.key.readArmored(priv_key_rsa);
await key.decrypt('hello world');
expect(key.primaryKey.isDummy()).to.be.false;
key.primaryKey.makeDummy();
@ -2859,14 +2840,14 @@ describe('Key', function() {
});
it('clearPrivateParams() - check that private key can no longer be used', async function() {
const { keys: [key] } = await openpgp.key.readArmored(priv_key_rsa);
const key = await openpgp.key.readArmored(priv_key_rsa);
await key.decrypt('hello world');
await key.clearPrivateParams();
await expect(key.validate()).to.be.rejectedWith('Key is not decrypted');
});
it('clearPrivateParams() - detect that private key parameters were removed', async function() {
const { keys: [key] } = await openpgp.key.readArmored(priv_key_rsa);
const key = await openpgp.key.readArmored(priv_key_rsa);
await key.decrypt('hello world');
const params = key.primaryKey.params;
await key.clearPrivateParams();
@ -2890,15 +2871,15 @@ describe('Key', function() {
});
it('update() - throw error if fingerprints not equal', async function() {
const keys = (await openpgp.key.readArmored(twoKeys)).keys;
const keys = await openpgp.key.readAllArmored(twoKeys);
await expect(keys[0].update.bind(
keys[0], keys[1]
)()).to.be.rejectedWith('Key update method: fingerprints of keys not equal');
});
it('update() - merge revocation signatures', async function() {
const source = (await openpgp.key.readArmored(pub_revoked_subkeys)).keys[0];
const dest = (await openpgp.key.readArmored(pub_revoked_subkeys)).keys[0];
const source = await openpgp.key.readArmored(pub_revoked_subkeys);
const dest = await openpgp.key.readArmored(pub_revoked_subkeys);
expect(source.revocationSignatures).to.exist;
dest.revocationSignatures = [];
return dest.update(source).then(() => {
@ -2907,8 +2888,8 @@ describe('Key', function() {
});
it('update() - merge user', async function() {
const source = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const dest = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const source = await openpgp.key.readArmored(pub_sig_test);
const dest = await openpgp.key.readArmored(pub_sig_test);
expect(source.users[1]).to.exist;
dest.users.pop();
return dest.update(source).then(() => {
@ -2918,8 +2899,8 @@ describe('Key', function() {
});
it('update() - merge user - other and certification revocation signatures', async function() {
const source = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const dest = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const source = await openpgp.key.readArmored(pub_sig_test);
const dest = await openpgp.key.readArmored(pub_sig_test);
expect(source.users[1].otherCertifications).to.exist;
expect(source.users[1].revocationSignatures).to.exist;
dest.users[1].otherCertifications = [];
@ -2933,8 +2914,8 @@ describe('Key', function() {
});
it('update() - merge subkey', async function() {
const source = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const dest = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const source = await openpgp.key.readArmored(pub_sig_test);
const dest = await openpgp.key.readArmored(pub_sig_test);
expect(source.subKeys[1]).to.exist;
dest.subKeys.pop();
return dest.update(source).then(() => {
@ -2946,8 +2927,8 @@ describe('Key', function() {
});
it('update() - merge subkey - revocation signature', async function() {
const source = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const dest = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const source = await openpgp.key.readArmored(pub_sig_test);
const dest = await openpgp.key.readArmored(pub_sig_test);
expect(source.subKeys[0].revocationSignatures).to.exist;
dest.subKeys[0].revocationSignatures = [];
return dest.update(source).then(() => {
@ -2957,8 +2938,8 @@ describe('Key', function() {
});
it('update() - merge private key into public key', async function() {
const source = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const dest = (await openpgp.key.readArmored(twoKeys)).keys[0];
const source = await openpgp.key.readArmored(priv_key_rsa);
const [dest] = await openpgp.key.readAllArmored(twoKeys);
expect(dest.isPublic()).to.be.true;
return dest.update(source).then(() => {
expect(dest.isPrivate()).to.be.true;
@ -2977,8 +2958,8 @@ describe('Key', function() {
});
it('update() - merge private key into public key - no subkeys', async function() {
const source = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const dest = (await openpgp.key.readArmored(twoKeys)).keys[0];
const source = await openpgp.key.readArmored(priv_key_rsa);
const [dest] = await openpgp.key.readAllArmored(twoKeys);
source.subKeys = [];
dest.subKeys = [];
expect(dest.isPublic()).to.be.true;
@ -2996,8 +2977,8 @@ describe('Key', function() {
});
it('update() - merge private key into public key - mismatch throws error', async function() {
const source = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const dest = (await openpgp.key.readArmored(twoKeys)).keys[0];
const source = await openpgp.key.readArmored(priv_key_rsa);
const [dest] = await openpgp.key.readAllArmored(twoKeys);
source.subKeys = [];
expect(dest.subKeys).to.exist;
expect(dest.isPublic()).to.be.true;
@ -3006,8 +2987,8 @@ describe('Key', function() {
});
it('update() - merge subkey binding signatures', async function() {
const source = (await openpgp.key.readArmored(pgp_desktop_pub)).keys[0];
const dest = (await openpgp.key.readArmored(pgp_desktop_priv)).keys[0];
const source = await openpgp.key.readArmored(pgp_desktop_pub);
const dest = await openpgp.key.readArmored(pgp_desktop_priv);
expect(source.subKeys[0].bindingSignatures[0]).to.exist;
await source.subKeys[0].verify(source.primaryKey);
expect(dest.subKeys[0].bindingSignatures[0]).to.not.exist;
@ -3017,8 +2998,8 @@ describe('Key', function() {
});
it('update() - merge multiple subkey binding signatures', async function() {
const source = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const dest = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const source = await openpgp.key.readArmored(multipleBindingSignatures);
const dest = await openpgp.key.readArmored(multipleBindingSignatures);
// remove last subkey binding signature of destination subkey
dest.subKeys[0].bindingSignatures.length = 1;
expect((await source.subKeys[0].getExpirationTime(source.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z');
@ -3031,7 +3012,7 @@ describe('Key', function() {
});
it('revoke() - primary key', async function() {
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
await privKey.revoke({
@ -3049,8 +3030,8 @@ describe('Key', function() {
});
it('revoke() - subkey', async function() {
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
const subKey = pubKey.subKeys[0];
@ -3068,15 +3049,15 @@ describe('Key', function() {
});
it('applyRevocationCertificate() should produce the same revoked key as GnuPG', async function() {
const pubKey = (await openpgp.key.readArmored(pub_key_arm4)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm4);
return pubKey.applyRevocationCertificate(revocation_certificate_arm4).then(async revKey => {
expect(revKey.armor()).to.equal((await openpgp.key.readArmored(revoked_key_arm4)).keys[0].armor());
expect(revKey.armor()).to.equal((await openpgp.key.readArmored(revoked_key_arm4)).armor());
});
});
it('getRevocationCertificate() should produce the same revocation certificate as GnuPG', async function() {
const revKey = (await openpgp.key.readArmored(revoked_key_arm4)).keys[0];
const revKey = await openpgp.key.readArmored(revoked_key_arm4);
const revocationCertificate = await revKey.getRevocationCertificate();
const input = await openpgp.armor.decode(revocation_certificate_arm4);
@ -3088,7 +3069,7 @@ describe('Key', function() {
});
it('getRevocationCertificate() should have an appropriate comment', async function() {
const revKey = (await openpgp.key.readArmored(revoked_key_arm4)).keys[0];
const revKey = await openpgp.key.readArmored(revoked_key_arm4);
const revocationCertificate = await revKey.getRevocationCertificate();
expect(revocationCertificate).to.match(/Comment: This is a revocation certificate/);
@ -3096,13 +3077,13 @@ describe('Key', function() {
});
it("getPreferredAlgo('symmetric') - one key - AES256", async function() {
const key1 = (await openpgp.key.readArmored(twoKeys)).keys[0];
const [key1] = await openpgp.key.readAllArmored(twoKeys);
const prefAlgo = await openpgp.key.getPreferredAlgo('symmetric', [key1]);
expect(prefAlgo).to.equal(openpgp.enums.symmetric.aes256);
});
it("getPreferredAlgo('symmetric') - two key - AES192", async function() {
const keys = (await openpgp.key.readArmored(twoKeys)).keys;
const keys = await openpgp.key.readAllArmored(twoKeys);
const key1 = keys[0];
const key2 = keys[1];
const primaryUser = await key2.getPrimaryUser();
@ -3112,7 +3093,7 @@ describe('Key', function() {
});
it("getPreferredAlgo('symmetric') - two key - one without pref", async function() {
const keys = (await openpgp.key.readArmored(twoKeys)).keys;
const keys = await openpgp.key.readAllArmored(twoKeys);
const key1 = keys[0];
const key2 = keys[1];
const primaryUser = await key2.getPrimaryUser();
@ -3122,7 +3103,7 @@ describe('Key', function() {
});
it("getPreferredAlgo('aead') - one key - OCB", async function() {
const key1 = (await openpgp.key.readArmored(twoKeys)).keys[0];
const [key1] = await openpgp.key.readAllArmored(twoKeys);
const primaryUser = await key1.getPrimaryUser();
primaryUser.selfCertification.features = [7]; // Monkey-patch AEAD feature flag
primaryUser.selfCertification.preferredAeadAlgorithms = [2,1];
@ -3133,7 +3114,7 @@ describe('Key', function() {
});
it("getPreferredAlgo('aead') - two key - one without pref", async function() {
const keys = (await openpgp.key.readArmored(twoKeys)).keys;
const keys = await openpgp.key.readAllArmored(twoKeys);
const key1 = keys[0];
const key2 = keys[1];
const primaryUser = await key1.getPrimaryUser();
@ -3148,7 +3129,7 @@ describe('Key', function() {
});
it("getPreferredAlgo('aead') - two key - one with no support", async function() {
const keys = (await openpgp.key.readArmored(twoKeys)).keys;
const keys = await openpgp.key.readAllArmored(twoKeys);
const key1 = keys[0];
const key2 = keys[1];
const primaryUser = await key1.getPrimaryUser();
@ -3161,13 +3142,13 @@ describe('Key', function() {
});
it('User attribute packet read & write', async function() {
const key = (await openpgp.key.readArmored(user_attr_key)).keys[0];
const key2 = (await openpgp.key.readArmored(key.armor())).keys[0];
const key = await openpgp.key.readArmored(user_attr_key);
const key2 = await openpgp.key.readArmored(key.armor());
expect(key.users[1].userAttribute).eql(key2.users[1].userAttribute);
});
it('getPrimaryUser()', async function() {
const key = (await openpgp.key.readArmored(pub_sig_test)).keys[0];
const key = await openpgp.key.readArmored(pub_sig_test);
const primUser = await key.getPrimaryUser();
expect(primUser).to.exist;
expect(primUser.user.userId.userid).to.equal('Signature Test <signature@test.com>');
@ -3190,13 +3171,13 @@ Vz/bMCJoAShgybW1r6kRWejybzIjFSLnx/YA/iLZeo5UNdlXRJco+15RbFiNSAbw
VYGdb3eNlV8CfoEC
=FYbP
-----END PGP PRIVATE KEY BLOCK-----`;
const key = (await openpgp.key.readArmored(keyWithoutUserID)).keys[0];
const key = await openpgp.key.readArmored(keyWithoutUserID);
await expect(key.getPrimaryUser()).to.be.rejectedWith('Could not find valid self-signature in key 3ce893915c44212f');
});
it('Generate session key - latest created user', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
// Set second user to prefer aes128. We should select this user by default, since it was created later.
publicKey.users[1].selfCertifications[0].preferredSymmetricAlgorithms = [openpgp.enums.symmetric.aes128];
@ -3205,8 +3186,8 @@ VYGdb3eNlV8CfoEC
});
it('Generate session key - primary user', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
// Set first user to primary. We should select this user by default.
publicKey.users[0].selfCertifications[0].isPrimaryUserID = true;
@ -3217,8 +3198,8 @@ VYGdb3eNlV8CfoEC
});
it('Generate session key - specific user', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
// Set first user to primary. We won't select this user, this is to test that.
publicKey.users[0].selfCertifications[0].isPrimaryUserID = true;
@ -3231,10 +3212,10 @@ VYGdb3eNlV8CfoEC
});
it('Sign - specific user', async function() {
let publicKey = (await openpgp.key.readArmored(multi_uid_key)).keys[0];
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
let publicKey = await openpgp.key.readArmored(multi_uid_key);
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const privateKeyClone = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKeyClone = await openpgp.key.readArmored(priv_key_rsa);
// Duplicate user
privateKey.users.push(privateKeyClone.users[0]);
// Set first user to primary. We won't select this user, this is to test that.
@ -3253,37 +3234,37 @@ VYGdb3eNlV8CfoEC
});
it('Find a valid subkey binding signature among many invalid ones', async function() {
const key = (await openpgp.key.readArmored(valid_binding_sig_among_many_expired_sigs_pub)).keys[0];
const key = await openpgp.key.readArmored(valid_binding_sig_among_many_expired_sigs_pub);
expect(await key.getEncryptionKey()).to.not.be.null;
});
it('Selects the most recent subkey binding signature', async function() {
const key = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const key = await openpgp.key.readArmored(multipleBindingSignatures);
expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z');
});
it('Selects the most recent non-expired subkey binding signature', async function() {
const key = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const key = await openpgp.key.readArmored(multipleBindingSignatures);
key.subKeys[0].bindingSignatures[1].signatureNeverExpires = false;
key.subKeys[0].bindingSignatures[1].signatureExpirationTime = 0;
expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z');
});
it('Selects the most recent valid subkey binding signature', async function() {
const key = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const key = await openpgp.key.readArmored(multipleBindingSignatures);
key.subKeys[0].bindingSignatures[1].signatureData[0]++;
expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z');
});
it('Handles a key with no valid subkey binding signatures gracefully', async function() {
const key = (await openpgp.key.readArmored(multipleBindingSignatures)).keys[0];
const key = await openpgp.key.readArmored(multipleBindingSignatures);
key.subKeys[0].bindingSignatures[0].signatureData[0]++;
key.subKeys[0].bindingSignatures[1].signatureData[0]++;
expect(await key.subKeys[0].getExpirationTime(key.primaryKey)).to.be.null;
});
it('Reject encryption with revoked primary user', async function() {
const key = (await openpgp.key.readArmored(pub_revoked_subkeys)).keys[0];
const key = await openpgp.key.readArmored(pub_revoked_subkeys);
return openpgp.encrypt({publicKeys: [key], message: openpgp.message.fromText('random data')}).then(() => {
throw new Error('encryptSessionKey should not encrypt with revoked public key');
}).catch(function(error) {
@ -3292,7 +3273,7 @@ VYGdb3eNlV8CfoEC
});
it('Reject encryption with revoked subkey', async function() {
const key = (await openpgp.key.readArmored(pub_revoked_subkeys)).keys[0];
const key = await openpgp.key.readArmored(pub_revoked_subkeys);
key.revocationSignatures = [];
key.users[0].revocationSignatures = [];
return openpgp.encrypt({publicKeys: [key], message: openpgp.message.fromText('random data'), date: new Date(1386842743000)}).then(() => {
@ -3303,7 +3284,7 @@ VYGdb3eNlV8CfoEC
});
it('Reject encryption with key revoked with appended revocation cert', async function() {
const key = (await openpgp.key.readArmored(pub_revoked_with_cert)).keys[0];
const key = await openpgp.key.readArmored(pub_revoked_with_cert);
return openpgp.encrypt({publicKeys: [key], message: openpgp.message.fromText('random data')}).then(() => {
throw new Error('encryptSessionKey should not encrypt with revoked public key');
}).catch(function(error) {
@ -3312,8 +3293,8 @@ VYGdb3eNlV8CfoEC
});
it('Merge key with another key with non-ID user attributes', async function() {
const key = (await openpgp.key.readArmored(mergeKey1)).keys[0];
const updateKey = (await openpgp.key.readArmored(mergeKey2)).keys[0];
const key = await openpgp.key.readArmored(mergeKey1);
const updateKey = await openpgp.key.readArmored(mergeKey2);
expect(key).to.exist;
expect(updateKey).to.exist;
expect(key.users).to.have.length(1);
@ -3328,7 +3309,7 @@ VYGdb3eNlV8CfoEC
it("Should throw when trying to encrypt a key that's already encrypted", async function() {
await expect((async function() {
let { privateKeyArmored } = await openpgp.generateKey({ userIds: [{ email: 'hello@user.com' }], passphrase: 'pass', numBits: openpgp.util.getWebCryptoAll() ? 2048 : 512 });
let { keys: [k] } = await openpgp.key.readArmored(privateKeyArmored);
let k = await openpgp.key.readArmored(privateKeyArmored);
await k.decrypt('pass');
await k.encrypt('pass');
await k.encrypt('pass');
@ -3344,12 +3325,12 @@ describe('addSubkey functionality testing', function(){
rsaOpt = { rsaBits: rsaBits };
}
it('create and add a new rsa subkey to stored rsa key', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
@ -3362,21 +3343,21 @@ describe('addSubkey functionality testing', function(){
});
it('should throw when trying to encrypt a subkey separately from key', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const opt = { rsaBits: rsaBits, passphrase: 'subkey passphrase'};
await expect(privateKey.addSubkey(opt)).to.be.rejectedWith('Subkey could not be encrypted here, please encrypt whole key');
});
it('encrypt and decrypt key with added subkey', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
newPrivateKey = (await openpgp.key.readArmored(newPrivateKey.armor())).keys[0];
newPrivateKey = await openpgp.key.readArmored(newPrivateKey.armor());
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
let importedPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
let importedPrivateKey = await openpgp.key.readArmored(armoredKey);
await importedPrivateKey.decrypt('12345678');
const subKey = importedPrivateKey.subKeys[total];
expect(subKey).to.exist;
@ -3394,7 +3375,7 @@ describe('addSubkey functionality testing', function(){
const subKey1 = newPrivateKey.subKeys[total];
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
await newPrivateKey.decrypt('12345678');
const subKey = newPrivateKey.subKeys[total];
expect(subKey.isDecrypted()).to.be.true;
@ -3409,13 +3390,13 @@ describe('addSubkey functionality testing', function(){
});
it('create and add a new ec subkey to a rsa key', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = {curve: 'curve25519'};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
@ -3432,7 +3413,7 @@ describe('addSubkey functionality testing', function(){
const opt2 = {sign: true};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const subkeyOid = subKey.keyPacket.params[0];
const pkOid = newPrivateKey.primaryKey.params[0];
@ -3457,7 +3438,7 @@ describe('addSubkey functionality testing', function(){
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey();
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
await subKey.verify(newPrivateKey.primaryKey);
@ -3475,13 +3456,13 @@ describe('addSubkey functionality testing', function(){
});
it('sign/verify data with the new subkey correctly using rsa', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = { sign: true, rsaBits: rsaBits };
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsa_encrypt_sign');
await subKey.verify(newPrivateKey.primaryKey);
@ -3496,12 +3477,12 @@ describe('addSubkey functionality testing', function(){
});
it('encrypt/decrypt data with the new subkey correctly using rsa', async function() {
const privateKey = (await openpgp.key.readArmored(priv_key_rsa)).keys[0];
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = (await openpgp.key.readArmored(armoredKey)).keys[0];
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
const vData = 'the data to encrypted!';

View File

@ -273,14 +273,14 @@ describe("Keyring", async function() {
const localstore2 = new openpgp.Keyring.localstore('my-custom-prefix-');
const localstore3 = new openpgp.Keyring.localstore();
await localstore3.storePublic([]);
const key = (await openpgp.key.readArmored(pubkey)).keys[0];
const key = await openpgp.key.readArmored(pubkey);
await localstore1.storePublic([key]);
expect((await localstore2.loadPublic())[0].getKeyId().equals(key.getKeyId())).to.be.true;
expect(await localstore3.loadPublic()).to.have.length(0);
});
it('emptying keyring and storing removes keys', async function() {
const key = (await openpgp.key.readArmored(pubkey)).keys[0];
const key = await openpgp.key.readArmored(pubkey);
const localstore = new openpgp.Keyring.localstore('remove-prefix-');

File diff suppressed because it is too large Load Diff

View File

@ -817,7 +817,7 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
=et/d
-----END PGP PUBLIC KEY BLOCK-----`;
const key = (await openpgp.key.readArmored(pubkey)).keys[0];
const key = await openpgp.key.readArmored(pubkey);
const { notations, rawNotations } = key.users[0].selfCertifications[0];

View File

@ -844,8 +844,8 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw==
const { reject_message_hash_algorithms } = openpgp.config;
Object.assign(openpgp.config, { reject_message_hash_algorithms: new Set([openpgp.enums.hash.md5, openpgp.enums.hash.ripemd]) });
try {
const priv_key = (await openpgp.key.readArmored(priv_key_arm1)).keys[0];
const pub_key = (await openpgp.key.readArmored(pub_key_arm1)).keys[0];
const priv_key = await openpgp.key.readArmored(priv_key_arm1);
const pub_key = await openpgp.key.readArmored(pub_key_arm1);
const msg = await openpgp.message.readArmored(msg_arm1);
await priv_key.decrypt("abcd");
const decrypted = await openpgp.decrypt({ privateKeys: priv_key, publicKeys:[pub_key], message:msg });
@ -863,9 +863,9 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw==
try {
// exercises the GnuPG s2k type 1001 extension:
// the secrets on the primary key have been stripped.
const priv_key_gnupg_ext = (await openpgp.key.readArmored(priv_key_arm1_stripped)).keys[0];
const priv_key_gnupg_ext_2 = (await openpgp.key.readArmored(priv_key_arm1_stripped)).keys[0];
const pub_key = (await openpgp.key.readArmored(pub_key_arm1)).keys[0];
const priv_key_gnupg_ext = await openpgp.key.readArmored(priv_key_arm1_stripped);
const priv_key_gnupg_ext_2 = await openpgp.key.readArmored(priv_key_arm1_stripped);
const pub_key = await openpgp.key.readArmored(pub_key_arm1);
const message = await openpgp.message.readArmored(msg_arm1);
const primaryKey_packet = priv_key_gnupg_ext.primaryKey.write();
expect(priv_key_gnupg_ext.isDecrypted()).to.be.false;
@ -890,7 +890,7 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw==
});
it('Supports signing with GnuPG stripped-key extension', async function() {
const priv_key_gnupg_ext = (await openpgp.key.readArmored(flowcrypt_stripped_key)).keys[0];
const priv_key_gnupg_ext = await openpgp.key.readArmored(flowcrypt_stripped_key);
await priv_key_gnupg_ext.decrypt('FlowCrypt');
const sig = await openpgp.sign({ message: openpgp.message.fromText('test'), privateKeys: [priv_key_gnupg_ext], date: new Date('2018-12-17T03:24:00') });
expect(sig).to.match(/-----END PGP MESSAGE-----\r\n$/);
@ -954,7 +954,7 @@ bwM=
'-----END PGP MESSAGE-----'].join('\n');
const sMsg = await openpgp.message.readArmored(signedArmor);
const pub_key = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pub_key = await openpgp.key.readArmored(pub_key_arm2);
const verified = await sMsg.verify([pub_key]);
openpgp.stream.pipe(sMsg.getLiteralData(), new openpgp.stream.WritableStream());
expect(verified).to.exist;
@ -985,8 +985,8 @@ bwM=
const plaintext = 'short message\nnext line\n한국어/조선말';
const esMsg = await openpgp.message.readArmored(msg_armor);
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await Promise.all(esMsg.getEncryptionKeyIds().map(keyId => privKey.decrypt('hello world', keyId)));
@ -1020,8 +1020,8 @@ bwM=
const plaintext = 'short message\nnext line\n한국어/조선말';
const sMsg = await openpgp.message.readArmored(msg_armor);
const pubKey2 = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey3 = (await openpgp.key.readArmored(pub_key_arm3)).keys[0];
const pubKey2 = await openpgp.key.readArmored(pub_key_arm2);
const pubKey3 = await openpgp.key.readArmored(pub_key_arm3);
const keyids = sMsg.getSigningKeyIds();
@ -1044,7 +1044,7 @@ bwM=
try {
openpgp.config.tolerant = false;
const sMsg = await openpgp.message.readArmored(signature_with_critical_notation);
const pub_key = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pub_key = await openpgp.key.readArmored(pub_key_arm2);
const verified = await sMsg.verify([pub_key]);
await verified[0].verified;
testFailed = false;
@ -1062,7 +1062,7 @@ bwM=
openpgp.config.known_notations.push('test@example.com');
try {
const sMsg = await openpgp.message.readArmored(signature_with_critical_notation);
const pub_key = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pub_key = await openpgp.key.readArmored(pub_key_arm2);
const verified = await sMsg.verify([pub_key]);
openpgp.stream.pipe(sMsg.getLiteralData(), new openpgp.stream.WritableStream());
expect(await verified[0].verified).to.be.true;
@ -1098,8 +1098,8 @@ bwM=
const plaintext = 'short message\nnext line\n한국어/조선말';
const csMsg = await openpgp.cleartext.readArmored(msg_armor);
const pubKey2 = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey3 = (await openpgp.key.readArmored(pub_key_arm3)).keys[0];
const pubKey2 = await openpgp.key.readArmored(pub_key_arm2);
const pubKey3 = await openpgp.key.readArmored(pub_key_arm3);
const keyids = csMsg.getSigningKeyIds();
@ -1138,7 +1138,7 @@ PAAeuQTUrcJdZeJ86eQ9cCUB216HCwSKOWTQRzL+hBWKXij4WD4=
=ZEFm
-----END PGP SIGNATURE-----`);
const pubKey = (await openpgp.key.readArmored(pub_latin1_msg)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_latin1_msg);
return message.verify([pubKey]).then(async verifiedSig => {
expect(await openpgp.stream.readToEnd(message.getLiteralData())).to.equal(latin1Binary);
@ -1176,7 +1176,7 @@ zmuVOdNuWQqxT9Sqa84=
const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t ';
const csMsg = await openpgp.cleartext.readArmored(msg_armor);
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const keyids = csMsg.getSigningKeyIds();
@ -1210,7 +1210,7 @@ yYDnCgA=
const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t ';
const sMsg = await openpgp.message.readArmored(msg_armor);
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const keyids = sMsg.getSigningKeyIds();
@ -1247,7 +1247,7 @@ yYDnCgA=
if (!msg_armor.length) controller.close();
}
}));
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const keyids = sMsg.getSigningKeyIds();
@ -1280,7 +1280,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t ';
const sMsg = await openpgp.message.readArmored(msg_armor);
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const keyids = sMsg.getSigningKeyIds();
@ -1313,7 +1313,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
if (!msg_armor.length) controller.close();
}
}));
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const keyids = sMsg.getSigningKeyIds();
@ -1359,8 +1359,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures', async function() {
const plaintext = 'short message\nnext line \n한국어/조선말';
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) {
@ -1379,8 +1379,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures -- escape armored message', async function() {
const plaintext = pub_key_arm2;
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) {
@ -1399,8 +1399,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures -- trailing spaces', async function() {
const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t ';
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) {
@ -1419,8 +1419,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - armored', async function() {
const plaintext = openpgp.util.str_to_Uint8Array('short message\nnext line \n한국어/조선말');
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromBinary(plaintext) }).then(async function(signed) {
@ -1439,8 +1439,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - not armored', async function() {
const plaintext = openpgp.util.str_to_Uint8Array('short message\nnext line \n한국어/조선말');
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromBinary(plaintext), armor:false }).then(async function(signed) {
@ -1459,8 +1459,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Should verify cleartext message correctly when using a detached cleartext signature and binary literal data', async function () {
const plaintext = 'short message\nnext line \n한국어/조선말';
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) {
const signature = await openpgp.signature.readArmored(signed);
@ -1476,8 +1476,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Should verify cleartext message correctly when using a detached binary signature and text literal data', async function () {
const plaintext = 'short message\nnext line \n한국어/조선말';
const plaintextArray = openpgp.util.encode_utf8(plaintext);
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message:openpgp.message.fromBinary(plaintextArray), detached: true}).then(async function(signed) {
const signature = await openpgp.signature.readArmored(signed);
@ -1492,8 +1492,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Should verify encrypted cleartext message correctly when encrypting binary literal data with a canonical text signature', async function () {
const plaintext = 'short message\nnext line \n한국어/조선말';
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await Promise.all([privKey.primaryKey.decrypt('hello world'), privKey.subKeys[0].keyPacket.decrypt('hello world')]);
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) {
const signature = await openpgp.signature.readArmored(signed);
@ -1510,7 +1510,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
});
it('Verify test with expired verification public key', async function() {
const pubKey = (await openpgp.key.readArmored(pub_expired)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_expired);
const message = await openpgp.message.readArmored(msg_sig_expired);
return openpgp.verify({ publicKeys:[pubKey], message:message }).then(function(verified) {
expect(verified).to.exist;
@ -1521,7 +1521,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
});
it('Verify test with expired verification public key and disable expiration checks using null date', async function() {
const pubKey = (await openpgp.key.readArmored(pub_expired)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_expired);
const message = await openpgp.message.readArmored(msg_sig_expired);
return openpgp.verify({ publicKeys:[pubKey], message:message, date: null }).then(function(verified) {
expect(verified).to.exist;
@ -1533,7 +1533,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
// TODO add test with multiple revocation signatures
it('Verify primary key revocation signatures', async function() {
const pubKey = (await openpgp.key.readArmored(pub_revoked)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_revoked);
await expect(pubKey.revocationSignatures[0].verify(
pubKey.primaryKey, openpgp.enums.signature.key_revocation, {key: pubKey.primaryKey}
)).to.eventually.be.true;
@ -1541,14 +1541,14 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
// TODO add test with multiple revocation signatures
it('Verify subkey revocation signatures', async function() {
const pubKey = (await openpgp.key.readArmored(pub_revoked)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_revoked);
await expect(pubKey.subKeys[0].revocationSignatures[0].verify(
pubKey.primaryKey, openpgp.enums.signature.subkey_revocation, {key: pubKey.primaryKey, bind: pubKey.subKeys[0].keyPacket}
)).to.eventually.be.true;
});
it('Verify key expiration date', async function() {
const pubKey = (await openpgp.key.readArmored(pub_revoked)).keys[0];
const pubKey = await openpgp.key.readArmored(pub_revoked);
expect(pubKey).to.exist;
expect(pubKey.users[0].selfCertifications[0].keyNeverExpires).to.be.false;
@ -1556,15 +1556,15 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
});
it('Write unhashed subpackets', async function() {
let pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
let pubKey = await openpgp.key.readArmored(pub_key_arm2);
expect(pubKey.users[0].selfCertifications).to.exist;
pubKey = (await openpgp.key.readArmored(pubKey.armor())).keys[0];
pubKey = await openpgp.key.readArmored(pubKey.armor());
expect(pubKey.users[0].selfCertifications).to.exist;
});
it('Write V4 signatures', async function() {
const pubKey = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const pubKey2 = (await openpgp.key.readArmored(pubKey.armor())).keys[0];
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const pubKey2 = await openpgp.key.readArmored(pubKey.armor());
expect(pubKey2).to.exist;
expect(pubKey.users[0].selfCertifications).to.eql(pubKey2.users[0].selfCertifications);
});
@ -1606,12 +1606,12 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
''].join('\r\n');
const publicKeyArmored = '-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nVersion: OpenPGP.js v.1.20131116\r\nComment: Whiteout Mail - https://whiteout.io\r\n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\r\nNvE45V/hS1PbZcfPVoUjE2qc1Ix1\r\n=7Wpe\r\n-----END PGP PUBLIC KEY BLOCK-----';
const publicKeys = (await openpgp.key.readArmored(publicKeyArmored)).keys;
const publicKey = await openpgp.key.readArmored(publicKeyArmored);
// Text
const msg = openpgp.message.fromText(content);
await msg.appendSignature(detachedSig);
return msg.verify(publicKeys).then(async result => {
return msg.verify([publicKey]).then(async result => {
openpgp.stream.pipe(msg.getLiteralData(), new openpgp.stream.WritableStream());
expect(await result[0].verified).to.be.true;
});
@ -1619,8 +1619,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Detached signature signing and verification', async function() {
const msg = openpgp.message.fromText('hello');
const pubKey2 = (await openpgp.key.readArmored(pub_key_arm2)).keys[0];
const privKey2 = (await openpgp.key.readArmored(priv_key_arm2)).keys[0];
const pubKey2 = await openpgp.key.readArmored(pub_key_arm2);
const privKey2 = await openpgp.key.readArmored(priv_key_arm2);
await privKey2.decrypt('hello world');
const opt = {numBits: 512, userIds: { name:'test', email:'a@b.com' }, passphrase: null};
@ -1675,8 +1675,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
'-----END PGP PUBLIC KEY BLOCK-----'
].join('\n');
const signedKey = (await openpgp.key.readArmored(signedArmor)).keys[0];
const signerKey = (await openpgp.key.readArmored(priv_key_arm1)).keys[0];
const signedKey = await openpgp.key.readArmored(signedArmor);
const signerKey = await openpgp.key.readArmored(priv_key_arm1);
return signedKey.verifyPrimaryUser([signerKey]).then(signatures => {
expect(signatures[0].valid).to.be.null;
expect(signatures[0].keyid.toHex()).to.equal(signedKey.getKeyId().toHex());
@ -1710,7 +1710,7 @@ iTuGu4fEU1UligAXSrZmCdE=
=VK6I
-----END PGP PUBLIC KEY BLOCK-----`;
const key = (await openpgp.key.readArmored(armoredKeyWithPhoto)).keys[0];
const key = await openpgp.key.readArmored(armoredKeyWithPhoto);
for (const user of key.users) {
await user.verify(key.primaryKey);
}

View File

@ -316,8 +316,8 @@ function tests() {
it('Encrypt and decrypt larger message roundtrip using curve x25519 (allow_unauthenticated_stream=true)', async function() {
let allow_unauthenticated_streamValue = openpgp.config.allow_unauthenticated_stream;
openpgp.config.allow_unauthenticated_stream = true;
const priv = (await openpgp.key.readArmored(xPriv)).keys[0];
const pub = (await openpgp.key.readArmored(xPub)).keys[0];
const priv = await openpgp.key.readArmored(xPriv);
const pub = await openpgp.key.readArmored(xPub);
await priv.decrypt(xPass);
try {
const encrypted = await openpgp.encrypt({
@ -348,8 +348,8 @@ function tests() {
it('Encrypt and decrypt larger message roundtrip using curve brainpool (allow_unauthenticated_stream=true)', async function() {
let allow_unauthenticated_streamValue = openpgp.config.allow_unauthenticated_stream;
openpgp.config.allow_unauthenticated_stream = true;
const priv = (await openpgp.key.readArmored(brainpoolPriv)).keys[0];
const pub = (await openpgp.key.readArmored(brainpoolPub)).keys[0];
const priv = await openpgp.key.readArmored(brainpoolPriv);
const pub = await openpgp.key.readArmored(brainpoolPub);
await priv.decrypt(brainpoolPass);
try {
const encrypted = await openpgp.encrypt({
@ -806,8 +806,8 @@ function tests() {
controller.close();
}
});
const priv = (await openpgp.key.readArmored(brainpoolPriv)).keys[0];
const pub = (await openpgp.key.readArmored(brainpoolPub)).keys[0];
const priv = await openpgp.key.readArmored(brainpoolPriv);
const pub = await openpgp.key.readArmored(brainpoolPub);
await priv.decrypt(brainpoolPass);
const signed = await openpgp.sign({
message: openpgp.message.fromBinary(data),
@ -837,8 +837,8 @@ function tests() {
controller.close();
}
});
const priv = (await openpgp.key.readArmored(xPriv)).keys[0];
const pub = (await openpgp.key.readArmored(xPub)).keys[0];
const priv = await openpgp.key.readArmored(xPriv);
const pub = await openpgp.key.readArmored(xPub);
await priv.decrypt(xPass);
const signed = await openpgp.sign({
message: openpgp.message.fromBinary(data),
@ -893,8 +893,8 @@ describe('Streaming', function() {
let currentTest = 0;
before(async function() {
pubKey = (await openpgp.key.readArmored(pub_key)).keys[0];
privKey = (await openpgp.key.readArmored(priv_key)).keys[0];
pubKey = await openpgp.key.readArmored(pub_key);
privKey = await openpgp.key.readArmored(priv_key);
await privKey.decrypt(passphrase);
});

View File

@ -20,27 +20,26 @@ describe.skip('WKD unit tests', function() {
return wkd.lookup({
email: 'test-wkd@metacode.biz',
rawBytes: true
}).then(function(key) {
expect(key).to.exist;
expect(key).to.be.an.instanceof(Uint8Array);
}).then(function(keys) {
expect(keys).to.exist;
expect(keys).to.be.an.instanceof(Uint8Array);
});
});
it('by email address should work', function() {
return wkd.lookup({
email: 'test-wkd@metacode.biz'
}).then(function(key) {
expect(key).to.exist;
expect(key).to.have.property('keys');
expect(key.keys).to.have.length(1);
}).then(function(keys) {
expect(keys).to.exist;
expect(keys).to.have.length(1);
});
});
it('by email address should not find a key', function() {
return wkd.lookup({
email: 'test-wkd-does-not-exist@metacode.biz'
}).then(function(key) {
expect(key).to.be.undefined;
}).then(function(keys) {
expect(keys).to.be.undefined;
});
});
});

View File

@ -124,11 +124,9 @@ const input = require('./testInputs');
}
const pub = await openpgp.key.readArmored(data[name].pub);
expect(pub).to.exist;
expect(pub.err).to.not.exist;
expect(pub.keys).to.have.length(1);
expect(pub.keys[0].getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub.keys[0];
return data[name].pub_key;
expect(pub.getKeyId().toHex()).to.equal(data[name].id);
data[name].pub_key = pub;
return pub;
}
async function load_priv_key(name) {
@ -137,12 +135,10 @@ const input = require('./testInputs');
}
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.err).to.not.exist;
expect(pk.keys).to.have.length(1);
expect(pk.keys[0].getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.keys[0].decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk.keys[0];
return data[name].priv_key;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
data[name].priv_key = pk;
return pk;
}
it('Load public key', async function () {
@ -417,7 +413,7 @@ const input = require('./testInputs');
'Gbm1oe83ZB+0aSp5m34YkpHQNb80y8PGFy7nIexiAA==',
'=xeG/',
'-----END PGP PUBLIC KEY BLOCK-----'].join('\n');
const hi = (await openpgp.key.readArmored(pubKey)).keys[0];
const hi = await openpgp.key.readArmored(pubKey);
const results = hi.getPrimaryUser();
expect(results).to.exist;
expect(results.user).to.exist;

View File

@ -67,7 +67,7 @@ fhGyl7nA7UCwgsqf7ZPBhRg=
=nbjQ
-----END PGP SIGNATURE-----`;
async function getOtherPubKey() {
return (await key.readArmored(OTHERPUBKEY)).keys[0];
return await key.readArmored(OTHERPUBKEY);
}
/**

View File

@ -44,6 +44,6 @@ EnxUPL95HuMKoVkf4w==
it('Does not accept message encrypted with algo not mentioned in preferred algorithms', async function() {
const message = await openpgp.message.readArmored(messageArmor);
const privKey = (await openpgp.key.readArmored(privateKeyArmor)).keys[0];
const privKey = await openpgp.key.readArmored(privateKeyArmor);
await expect(openpgp.decrypt({ message, privateKeys: [privKey] })).to.be.rejectedWith('A non-preferred symmetric algorithm was used.');
});

View File

@ -63,7 +63,7 @@ async function testSubkeyTrust() {
fakeBindingSignature // faked key binding
]);
let fakeKey = new key.Key(newList);
fakeKey = (await key.readArmored(await fakeKey.toPublic().armor())).keys[0];
fakeKey = await key.readArmored(await fakeKey.toPublic().armor());
const verifyAttackerIsBatman = await openpgp.verify({
message: (await cleartext.readArmored(signed)),
publicKeys: fakeKey,

View File

@ -49,7 +49,7 @@ Dc2vwS83Aja9iWrIEg==
-----END PGP PRIVATE KEY BLOCK-----`;
async function getInvalidKey() {
return (await key.readArmored(INVALID_KEY)).keys[0];
return await key.readArmored(INVALID_KEY);
}
async function makeKeyValid() {
/**
@ -85,8 +85,7 @@ async function makeKeyValid() {
let modifiedkey = new key.Key(newlist);
// re-read the message to eliminate any
// behaviour due to cached values.
modifiedkey = (await key.readArmored(
await modifiedkey.armor())).keys[0];
modifiedkey = await key.readArmored(await modifiedkey.armor());
expect(await encryptFails(invalidkey)).to.be.true;
expect(await encryptFails(modifiedkey)).to.be.true;

View File

@ -42,7 +42,7 @@ tryTests('Async Proxy', tests, {
} catch (e) {
openpgp.util.print_debug_error(e);
}
pubKey = (await openpgp.key.readArmored(pub_key)).keys[0];
pubKey = await openpgp.key.readArmored(pub_key);
},
after: async function() {
await openpgp.destroyWorker();

View File

@ -42,25 +42,25 @@ onmessage = async function({ data: { action, message }, ports: [port] }) {
let result;
switch (action) {
case 'encrypt': {
const { keys: publicKeys } = await openpgp.key.readArmored(publicKeyArmored);
const { keys: privateKeys } = await openpgp.key.readArmored(privateKeyArmored);
await privateKeys[0].decrypt('test');
const publicKey = await openpgp.key.readArmored(publicKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt('test');
const data = await openpgp.encrypt({
message: openpgp.message.fromText(message),
publicKeys,
privateKeys
publicKeys: publicKey,
privateKeys: privateKey
});
result = data;
break;
}
case 'decrypt': {
const { keys: publicKeys } = await openpgp.key.readArmored(publicKeyArmored);
const { keys: privateKeys } = await openpgp.key.readArmored(privateKeyArmored);
await privateKeys[0].decrypt('test');
const publicKey = await openpgp.key.readArmored(publicKeyArmored);
const privateKey = await openpgp.key.readArmored(privateKeyArmored);
await privateKey.decrypt('test');
const { data, signatures } = await openpgp.decrypt({
message: await openpgp.message.readArmored(message),
publicKeys,
privateKeys
publicKeys: publicKey,
privateKeys: privateKey
});
if (!signatures[0].valid) {
throw new Error("Couldn't veriy signature");