Merge pull request #893 from twiss/tweetnacl

Use tweetnacl's 25519 implementation
This commit is contained in:
Daniel Huigens 2019-05-02 12:57:18 +02:00 committed by GitHub
commit 39bb4dde92
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
23 changed files with 295 additions and 180 deletions

View File

@ -17,11 +17,11 @@ matrix:
env: OPENPGP_NODE_JS='12' OPENPGPJSTEST='unit' env: OPENPGP_NODE_JS='12' OPENPGPJSTEST='unit'
- node_js: "9" - node_js: "9"
env: BROWSER='Firefox' VERSION='26' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' COMPAT=1 env: BROWSER='Firefox' VERSION='26' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' COMPAT=1
- node_js: "10" - node_js: "9"
env: BROWSER='Firefox' VERSION='61' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' env: BROWSER='Firefox' VERSION='61' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs'
- node_js: "9" - node_js: "9"
env: BROWSER='Chrome' VERSION='49' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' COMPAT=1 env: BROWSER='Chrome' VERSION='49' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' COMPAT=1
- node_js: "9" - node_js: "10"
env: BROWSER='Chrome' VERSION='68' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs' env: BROWSER='Chrome' VERSION='68' PLATFORM='macOS 10.13' OPENPGPJSTEST='saucelabs'
- node_js: "9" - node_js: "9"
env: BROWSER='Internet Explorer' VERSION='11.103' PLATFORM='Windows 10' OPENPGPJSTEST='saucelabs' COMPAT=1 env: BROWSER='Internet Explorer' VERSION='11.103' PLATFORM='Windows 10' OPENPGPJSTEST='saucelabs' COMPAT=1

View File

@ -56,7 +56,7 @@ module.exports = function(grunt) {
"transform-runtime" "transform-runtime"
] : [], ] : [],
ignore: ['*.min.js'], ignore: ['*.min.js'],
presets: [["env", { presets: [[require.resolve('babel-preset-env'), {
targets: { targets: {
browsers: compat ? [ browsers: compat ? [
'IE >= 11', 'IE >= 11',

View File

@ -119,7 +119,7 @@ Here are some examples of how to use the v2.x+ API. For more elaborate examples
```js ```js
var openpgp = require('openpgp'); // use as CommonJS, AMD, ES6 module or via window.openpgp var openpgp = require('openpgp'); // use as CommonJS, AMD, ES6 module or via window.openpgp
openpgp.initWorker({ path:'openpgp.worker.js' }) // set the relative web worker path await openpgp.initWorker({ path:'openpgp.worker.js' }) // set the relative web worker path
``` ```
#### Encrypt and decrypt *Uint8Array* data with a password #### Encrypt and decrypt *Uint8Array* data with a password
@ -159,7 +159,7 @@ Encryption will use the algorithm preferred by the public key (defaults to aes25
```js ```js
const openpgp = require('openpgp') // use as CommonJS, AMD, ES6 module or via window.openpgp const openpgp = require('openpgp') // use as CommonJS, AMD, ES6 module or via window.openpgp
openpgp.initWorker({ path:'openpgp.worker.js' }) // set the relative web worker path await openpgp.initWorker({ path:'openpgp.worker.js' }) // set the relative web worker path
// put keys in backtick (``) to avoid errors caused by spaces or tabs // put keys in backtick (``) to avoid errors caused by spaces or tabs
const pubkey = `-----BEGIN PGP PUBLIC KEY BLOCK----- const pubkey = `-----BEGIN PGP PUBLIC KEY BLOCK-----

116
npm-shrinkwrap.json generated
View File

@ -7,7 +7,8 @@
"@mattiasbuelens/web-streams-polyfill": { "@mattiasbuelens/web-streams-polyfill": {
"version": "0.3.1", "version": "0.3.1",
"resolved": "https://registry.npmjs.org/@mattiasbuelens/web-streams-polyfill/-/web-streams-polyfill-0.3.1.tgz", "resolved": "https://registry.npmjs.org/@mattiasbuelens/web-streams-polyfill/-/web-streams-polyfill-0.3.1.tgz",
"integrity": "sha512-IW+tCurEH2NL2tA3KKFAMXa90WWmTJMZksnQWMABe3bMijV7hEiOLthy4tKGTnUTV8qVf8WTCApiGmKb75Bxkg==" "integrity": "sha512-IW+tCurEH2NL2tA3KKFAMXa90WWmTJMZksnQWMABe3bMijV7hEiOLthy4tKGTnUTV8qVf8WTCApiGmKb75Bxkg==",
"dev": true
}, },
"@sinonjs/formatio": { "@sinonjs/formatio": {
"version": "2.0.0", "version": "2.0.0",
@ -107,6 +108,7 @@
"version": "2.0.3", "version": "2.0.3",
"resolved": "https://registry.npmjs.org/address-rfc2822/-/address-rfc2822-2.0.3.tgz", "resolved": "https://registry.npmjs.org/address-rfc2822/-/address-rfc2822-2.0.3.tgz",
"integrity": "sha1-LzDSHYEVCGLBSJpHL0lARQIa+IE=", "integrity": "sha1-LzDSHYEVCGLBSJpHL0lARQIa+IE=",
"dev": true,
"requires": { "requires": {
"email-addresses": "^3.0.0" "email-addresses": "^3.0.0"
} }
@ -152,6 +154,7 @@
"resolved": "https://registry.npmjs.org/align-text/-/align-text-0.1.4.tgz", "resolved": "https://registry.npmjs.org/align-text/-/align-text-0.1.4.tgz",
"integrity": "sha1-DNkKVhCT810KmSVsIrcGlDP60Rc=", "integrity": "sha1-DNkKVhCT810KmSVsIrcGlDP60Rc=",
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"kind-of": "^3.0.2", "kind-of": "^3.0.2",
"longest": "^1.0.1", "longest": "^1.0.1",
@ -269,7 +272,8 @@
}, },
"asmcrypto.js": { "asmcrypto.js": {
"version": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83", "version": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83",
"from": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83" "from": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83",
"dev": true
}, },
"asn1": { "asn1": {
"version": "0.2.3", "version": "0.2.3",
@ -1132,7 +1136,8 @@
"base64-js": { "base64-js": {
"version": "1.2.1", "version": "1.2.1",
"resolved": "https://registry.npmjs.org/base64-js/-/base64-js-1.2.1.tgz", "resolved": "https://registry.npmjs.org/base64-js/-/base64-js-1.2.1.tgz",
"integrity": "sha512-dwVUVIXsBZXwTuwnXI9RK8sBmgq09NDHzyR9SAph9eqk76gKK2JSQmZARC2zRC81JC2QTtxD0ARU5qTS25gIGw==" "integrity": "sha512-dwVUVIXsBZXwTuwnXI9RK8sBmgq09NDHzyR9SAph9eqk76gKK2JSQmZARC2zRC81JC2QTtxD0ARU5qTS25gIGw==",
"dev": true
}, },
"basic-auth": { "basic-auth": {
"version": "2.0.0", "version": "2.0.0",
@ -1157,6 +1162,15 @@
"optional": true, "optional": true,
"requires": { "requires": {
"tweetnacl": "^0.14.3" "tweetnacl": "^0.14.3"
},
"dependencies": {
"tweetnacl": {
"version": "0.14.5",
"resolved": "https://registry.npmjs.org/tweetnacl/-/tweetnacl-0.14.5.tgz",
"integrity": "sha1-WuaBd/GS1EViadEIr6k/+HQ/T2Q=",
"dev": true,
"optional": true
}
} }
}, },
"binary-extensions": { "binary-extensions": {
@ -1212,7 +1226,8 @@
"brorand": { "brorand": {
"version": "1.1.0", "version": "1.1.0",
"resolved": "https://registry.npmjs.org/brorand/-/brorand-1.1.0.tgz", "resolved": "https://registry.npmjs.org/brorand/-/brorand-1.1.0.tgz",
"integrity": "sha1-EsJe/kCkXjwyPrhnWgoM5XsiNx8=" "integrity": "sha1-EsJe/kCkXjwyPrhnWgoM5XsiNx8=",
"dev": true
}, },
"browser-pack": { "browser-pack": {
"version": "6.1.0", "version": "6.1.0",
@ -1529,6 +1544,7 @@
"version": "5.0.8", "version": "5.0.8",
"resolved": "https://registry.npmjs.org/buffer/-/buffer-5.0.8.tgz", "resolved": "https://registry.npmjs.org/buffer/-/buffer-5.0.8.tgz",
"integrity": "sha512-xXvjQhVNz50v2nPeoOsNqWCLGfiv4ji/gXZM28jnVwdLJxH4mFyqgqCKfaK9zf1KUbG6zTkjLOy7ou+jSMarGA==", "integrity": "sha512-xXvjQhVNz50v2nPeoOsNqWCLGfiv4ji/gXZM28jnVwdLJxH4mFyqgqCKfaK9zf1KUbG6zTkjLOy7ou+jSMarGA==",
"dev": true,
"requires": { "requires": {
"base64-js": "^1.0.2", "base64-js": "^1.0.2",
"ieee754": "^1.1.4" "ieee754": "^1.1.4"
@ -2290,8 +2306,9 @@
"dev": true "dev": true
}, },
"elliptic": { "elliptic": {
"version": "github:openpgpjs/elliptic#ad81845f693effa5b4b6d07db2e82112de222f48", "version": "github:openpgpjs/elliptic#1beea74833b48bd5698ed079c75fd21f0eb70b1c",
"from": "github:openpgpjs/elliptic#ad81845f693effa5b4b6d07db2e82112de222f48", "from": "github:openpgpjs/elliptic#1beea74833b48bd5698ed079c75fd21f0eb70b1c",
"dev": true,
"requires": { "requires": {
"bn.js": "^4.4.0", "bn.js": "^4.4.0",
"brorand": "^1.0.1", "brorand": "^1.0.1",
@ -2305,7 +2322,8 @@
"email-addresses": { "email-addresses": {
"version": "3.0.1", "version": "3.0.1",
"resolved": "https://registry.npmjs.org/email-addresses/-/email-addresses-3.0.1.tgz", "resolved": "https://registry.npmjs.org/email-addresses/-/email-addresses-3.0.1.tgz",
"integrity": "sha1-wfwgwYnn+W1AEtN121/qzN0kORw=" "integrity": "sha1-wfwgwYnn+W1AEtN121/qzN0kORw=",
"dev": true
}, },
"encodeurl": { "encodeurl": {
"version": "1.0.1", "version": "1.0.1",
@ -3116,7 +3134,8 @@
"ansi-regex": { "ansi-regex": {
"version": "2.1.1", "version": "2.1.1",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"aproba": { "aproba": {
"version": "1.2.0", "version": "1.2.0",
@ -3137,12 +3156,14 @@
"balanced-match": { "balanced-match": {
"version": "1.0.0", "version": "1.0.0",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"brace-expansion": { "brace-expansion": {
"version": "1.1.11", "version": "1.1.11",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"balanced-match": "^1.0.0", "balanced-match": "^1.0.0",
"concat-map": "0.0.1" "concat-map": "0.0.1"
@ -3157,17 +3178,20 @@
"code-point-at": { "code-point-at": {
"version": "1.1.0", "version": "1.1.0",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"concat-map": { "concat-map": {
"version": "0.0.1", "version": "0.0.1",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"console-control-strings": { "console-control-strings": {
"version": "1.1.0", "version": "1.1.0",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"core-util-is": { "core-util-is": {
"version": "1.0.2", "version": "1.0.2",
@ -3284,7 +3308,8 @@
"inherits": { "inherits": {
"version": "2.0.3", "version": "2.0.3",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"ini": { "ini": {
"version": "1.3.5", "version": "1.3.5",
@ -3296,6 +3321,7 @@
"version": "1.0.0", "version": "1.0.0",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"number-is-nan": "^1.0.0" "number-is-nan": "^1.0.0"
} }
@ -3310,6 +3336,7 @@
"version": "3.0.4", "version": "3.0.4",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"brace-expansion": "^1.1.7" "brace-expansion": "^1.1.7"
} }
@ -3317,12 +3344,14 @@
"minimist": { "minimist": {
"version": "0.0.8", "version": "0.0.8",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"minipass": { "minipass": {
"version": "2.2.4", "version": "2.2.4",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"safe-buffer": "^5.1.1", "safe-buffer": "^5.1.1",
"yallist": "^3.0.0" "yallist": "^3.0.0"
@ -3341,6 +3370,7 @@
"version": "0.5.1", "version": "0.5.1",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"minimist": "0.0.8" "minimist": "0.0.8"
} }
@ -3421,7 +3451,8 @@
"number-is-nan": { "number-is-nan": {
"version": "1.0.1", "version": "1.0.1",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"object-assign": { "object-assign": {
"version": "4.1.1", "version": "4.1.1",
@ -3433,6 +3464,7 @@
"version": "1.4.0", "version": "1.4.0",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"wrappy": "1" "wrappy": "1"
} }
@ -3518,7 +3550,8 @@
"safe-buffer": { "safe-buffer": {
"version": "5.1.1", "version": "5.1.1",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"safer-buffer": { "safer-buffer": {
"version": "2.1.2", "version": "2.1.2",
@ -3554,6 +3587,7 @@
"version": "1.0.2", "version": "1.0.2",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"code-point-at": "^1.0.0", "code-point-at": "^1.0.0",
"is-fullwidth-code-point": "^1.0.0", "is-fullwidth-code-point": "^1.0.0",
@ -3573,6 +3607,7 @@
"version": "3.0.1", "version": "3.0.1",
"bundled": true, "bundled": true,
"dev": true, "dev": true,
"optional": true,
"requires": { "requires": {
"ansi-regex": "^2.0.0" "ansi-regex": "^2.0.0"
} }
@ -3616,12 +3651,14 @@
"wrappy": { "wrappy": {
"version": "1.0.2", "version": "1.0.2",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
}, },
"yallist": { "yallist": {
"version": "3.0.2", "version": "3.0.2",
"bundled": true, "bundled": true,
"dev": true "dev": true,
"optional": true
} }
} }
}, },
@ -3773,7 +3810,8 @@
"graceful-readlink": { "graceful-readlink": {
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/graceful-readlink/-/graceful-readlink-1.0.1.tgz", "resolved": "https://registry.npmjs.org/graceful-readlink/-/graceful-readlink-1.0.1.tgz",
"integrity": "sha1-TK+tdrxi8C+gObL5Tpo906ORpyU=" "integrity": "sha1-TK+tdrxi8C+gObL5Tpo906ORpyU=",
"dev": true
}, },
"growl": { "growl": {
"version": "1.10.3", "version": "1.10.3",
@ -4308,6 +4346,7 @@
"version": "1.1.3", "version": "1.1.3",
"resolved": "https://registry.npmjs.org/hash.js/-/hash.js-1.1.3.tgz", "resolved": "https://registry.npmjs.org/hash.js/-/hash.js-1.1.3.tgz",
"integrity": "sha512-/UETyP0W22QILqS+6HowevwhEFJ3MBJnwTf75Qob9Wz9t0DPuisL8kW8YZMK62dHAKE1c1p+gY1TtOLY+USEHA==", "integrity": "sha512-/UETyP0W22QILqS+6HowevwhEFJ3MBJnwTf75Qob9Wz9t0DPuisL8kW8YZMK62dHAKE1c1p+gY1TtOLY+USEHA==",
"dev": true,
"requires": { "requires": {
"inherits": "^2.0.3", "inherits": "^2.0.3",
"minimalistic-assert": "^1.0.0" "minimalistic-assert": "^1.0.0"
@ -4323,6 +4362,7 @@
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/hmac-drbg/-/hmac-drbg-1.0.1.tgz", "resolved": "https://registry.npmjs.org/hmac-drbg/-/hmac-drbg-1.0.1.tgz",
"integrity": "sha1-0nRXAQJabHdabFRXk+1QL8DGSaE=", "integrity": "sha1-0nRXAQJabHdabFRXk+1QL8DGSaE=",
"dev": true,
"requires": { "requires": {
"hash.js": "^1.0.3", "hash.js": "^1.0.3",
"minimalistic-assert": "^1.0.0", "minimalistic-assert": "^1.0.0",
@ -4418,7 +4458,8 @@
"ieee754": { "ieee754": {
"version": "1.1.8", "version": "1.1.8",
"resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.1.8.tgz", "resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.1.8.tgz",
"integrity": "sha1-vjPUCsEO8ZJnAfbwii2G+/0a0+Q=" "integrity": "sha1-vjPUCsEO8ZJnAfbwii2G+/0a0+Q=",
"dev": true
}, },
"ignore": { "ignore": {
"version": "3.3.7", "version": "3.3.7",
@ -5139,7 +5180,8 @@
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/longest/-/longest-1.0.1.tgz", "resolved": "https://registry.npmjs.org/longest/-/longest-1.0.1.tgz",
"integrity": "sha1-MKCy2jj3N3DoKUoNIuZiXtd9AJc=", "integrity": "sha1-MKCy2jj3N3DoKUoNIuZiXtd9AJc=",
"dev": true "dev": true,
"optional": true
}, },
"loose-envify": { "loose-envify": {
"version": "1.3.1", "version": "1.3.1",
@ -5289,7 +5331,8 @@
"minimalistic-crypto-utils": { "minimalistic-crypto-utils": {
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/minimalistic-crypto-utils/-/minimalistic-crypto-utils-1.0.1.tgz", "resolved": "https://registry.npmjs.org/minimalistic-crypto-utils/-/minimalistic-crypto-utils-1.0.1.tgz",
"integrity": "sha1-9sAMHAsIIkblxNmd+4x8CDsrWCo=" "integrity": "sha1-9sAMHAsIIkblxNmd+4x8CDsrWCo=",
"dev": true
}, },
"minimatch": { "minimatch": {
"version": "3.0.4", "version": "3.0.4",
@ -5698,7 +5741,8 @@
"pako": { "pako": {
"version": "1.0.6", "version": "1.0.6",
"resolved": "https://registry.npmjs.org/pako/-/pako-1.0.6.tgz", "resolved": "https://registry.npmjs.org/pako/-/pako-1.0.6.tgz",
"integrity": "sha512-lQe48YPsMJAig+yngZ87Lus+NF+3mtu7DVOBu6b/gHO1YpKwIj5AWjZ/TOS7i46HD/UixzWb1zeWDZfGZ3iYcg==" "integrity": "sha512-lQe48YPsMJAig+yngZ87Lus+NF+3mtu7DVOBu6b/gHO1YpKwIj5AWjZ/TOS7i46HD/UixzWb1zeWDZfGZ3iYcg==",
"dev": true
}, },
"parents": { "parents": {
"version": "1.0.1", "version": "1.0.1",
@ -6452,8 +6496,9 @@
} }
}, },
"seek-bzip": { "seek-bzip": {
"version": "github:openpgpjs/seek-bzip#3aca608ffedc055a1da1d898ecb244804ef32209", "version": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
"from": "github:openpgpjs/seek-bzip#3aca608ffedc055a1da1d898ecb244804ef32209", "from": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
"dev": true,
"requires": { "requires": {
"commander": "~2.8.1" "commander": "~2.8.1"
}, },
@ -6462,6 +6507,7 @@
"version": "2.8.1", "version": "2.8.1",
"resolved": "https://registry.npmjs.org/commander/-/commander-2.8.1.tgz", "resolved": "https://registry.npmjs.org/commander/-/commander-2.8.1.tgz",
"integrity": "sha1-Br42f+v9oMMwqh4qBy09yXYkJdQ=", "integrity": "sha1-Br42f+v9oMMwqh4qBy09yXYkJdQ=",
"dev": true,
"requires": { "requires": {
"graceful-readlink": ">= 1.0.0" "graceful-readlink": ">= 1.0.0"
} }
@ -6731,6 +6777,15 @@
"jsbn": "~0.1.0", "jsbn": "~0.1.0",
"safer-buffer": "^2.0.2", "safer-buffer": "^2.0.2",
"tweetnacl": "~0.14.0" "tweetnacl": "~0.14.0"
},
"dependencies": {
"tweetnacl": {
"version": "0.14.5",
"resolved": "https://registry.npmjs.org/tweetnacl/-/tweetnacl-0.14.5.tgz",
"integrity": "sha1-WuaBd/GS1EViadEIr6k/+HQ/T2Q=",
"dev": true,
"optional": true
}
} }
}, },
"statuses": { "statuses": {
@ -7180,11 +7235,9 @@
} }
}, },
"tweetnacl": { "tweetnacl": {
"version": "0.14.5", "version": "github:openpgpjs/tweetnacl-js#1ef755f2b252a3e328ac739848d00e0dad76be2d",
"resolved": "https://registry.npmjs.org/tweetnacl/-/tweetnacl-0.14.5.tgz", "from": "github:openpgpjs/tweetnacl-js#1ef755f2b252a3e328ac739848d00e0dad76be2d",
"integrity": "sha1-WuaBd/GS1EViadEIr6k/+HQ/T2Q=", "dev": true
"dev": true,
"optional": true
}, },
"type-check": { "type-check": {
"version": "0.3.2", "version": "0.3.2",
@ -7368,7 +7421,8 @@
}, },
"web-stream-tools": { "web-stream-tools": {
"version": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc", "version": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc",
"from": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc" "from": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc",
"dev": true
}, },
"websocket-driver": { "websocket-driver": {
"version": "0.7.0", "version": "0.7.0",

View File

@ -76,10 +76,11 @@
"asmcrypto.js": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83", "asmcrypto.js": "github:openpgpjs/asmcrypto#6e4e407b9b8ae317925a9e677cc7b4de3e447e83",
"bn.js": "^4.11.8", "bn.js": "^4.11.8",
"buffer": "^5.0.8", "buffer": "^5.0.8",
"elliptic": "github:openpgpjs/elliptic#ad81845f693effa5b4b6d07db2e82112de222f48", "elliptic": "github:openpgpjs/elliptic#1beea74833b48bd5698ed079c75fd21f0eb70b1c",
"hash.js": "^1.1.3", "hash.js": "^1.1.3",
"pako": "^1.0.6", "pako": "^1.0.6",
"seek-bzip": "github:openpgpjs/seek-bzip#3aca608ffedc055a1da1d898ecb244804ef32209", "seek-bzip": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
"tweetnacl": "github:openpgpjs/tweetnacl-js#1ef755f2b252a3e328ac739848d00e0dad76be2d",
"web-stream-tools": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc" "web-stream-tools": "github:openpgpjs/web-stream-tools#84a497715c9df271a673f8616318264ab42ab3cc"
}, },
"dependencies": { "dependencies": {

View File

@ -69,7 +69,6 @@ export default {
*/ */
publicKeyEncrypt: async function(algo, pub_params, data, fingerprint) { publicKeyEncrypt: async function(algo, pub_params, data, fingerprint) {
const types = this.getEncSessionKeyParamTypes(algo); const types = this.getEncSessionKeyParamTypes(algo);
return (async function() {
switch (algo) { switch (algo) {
case enums.publicKey.rsa_encrypt: case enums.publicKey.rsa_encrypt:
case enums.publicKey.rsa_encrypt_sign: { case enums.publicKey.rsa_encrypt_sign: {
@ -91,14 +90,13 @@ export default {
const oid = pub_params[0]; const oid = pub_params[0];
const Q = pub_params[1].toUint8Array(); const Q = pub_params[1].toUint8Array();
const kdf_params = pub_params[2]; const kdf_params = pub_params[2];
const { V, C } = await publicKey.elliptic.ecdh.encrypt( const { publicKey: V, wrappedKey: C } = await publicKey.elliptic.ecdh.encrypt(
oid, kdf_params.cipher, kdf_params.hash, data, Q, fingerprint); oid, kdf_params.cipher, kdf_params.hash, data, Q, fingerprint);
return constructParams(types, [new BN(V), C]); return constructParams(types, [new BN(V), C]);
} }
default: default:
return []; return [];
} }
}());
}, },
/** /**
@ -112,11 +110,10 @@ export default {
module:type/ecdh_symkey>} module:type/ecdh_symkey>}
data_params encrypted session key parameters data_params encrypted session key parameters
* @param {String} fingerprint Recipient fingerprint * @param {String} fingerprint Recipient fingerprint
* @returns {module:type/mpi} An MPI containing the decrypted data * @returns {BN} A BN containing the decrypted data
* @async * @async
*/ */
publicKeyDecrypt: async function(algo, key_params, data_params, fingerprint) { publicKeyDecrypt: async function(algo, key_params, data_params, fingerprint) {
return new type_mpi(await (async function() {
switch (algo) { switch (algo) {
case enums.publicKey.rsa_encrypt_sign: case enums.publicKey.rsa_encrypt_sign:
case enums.publicKey.rsa_encrypt: { case enums.publicKey.rsa_encrypt: {
@ -148,7 +145,6 @@ export default {
default: default:
throw new Error('Invalid public key encryption algorithm.'); throw new Error('Invalid public key encryption algorithm.');
} }
}()));
}, },
/** Returns the types comprising the private key of an algorithm /** Returns the types comprising the private key of an algorithm

View File

@ -172,10 +172,6 @@ Curve.prototype.keyFromPrivate = function (priv) { // Not for ed25519
return new KeyPair(this, { priv: priv }); return new KeyPair(this, { priv: priv });
}; };
Curve.prototype.keyFromSecret = function (secret) { // Only for ed25519
return new KeyPair(this, { secret: secret });
};
Curve.prototype.keyFromPublic = function (pub) { Curve.prototype.keyFromPublic = function (pub) {
const keyPair = new KeyPair(this, { pub: pub }); const keyPair = new KeyPair(this, { pub: pub });
if ( if (

View File

@ -18,6 +18,7 @@
/** /**
* @fileoverview Key encryption and decryption for RFC 6637 ECDH * @fileoverview Key encryption and decryption for RFC 6637 ECDH
* @requires bn.js * @requires bn.js
* @requires tweetnacl
* @requires crypto/public_key/elliptic/curve * @requires crypto/public_key/elliptic/curve
* @requires crypto/aes_kw * @requires crypto/aes_kw
* @requires crypto/cipher * @requires crypto/cipher
@ -29,6 +30,7 @@
*/ */
import BN from 'bn.js'; import BN from 'bn.js';
import nacl from 'tweetnacl/nacl-fast-light.js';
import Curve from './curves'; import Curve from './curves';
import aes_kw from '../../aes_kw'; import aes_kw from '../../aes_kw';
import cipher from '../../cipher'; import cipher from '../../cipher';
@ -50,13 +52,10 @@ function buildEcdhParam(public_algo, oid, cipher_algo, hash_algo, fingerprint) {
} }
// Key Derivation Function (RFC 6637) // Key Derivation Function (RFC 6637)
async function kdf(hash_algo, S, length, param, curve, stripLeading=false, stripTrailing=false) { async function kdf(hash_algo, X, length, param, stripLeading=false, stripTrailing=false) {
const len = curve.curve.curve.p.byteLength(); // Note: X is little endian for Curve25519, big-endian for all others.
// Note: this is not ideal, but the RFC's are unclear // This is not ideal, but the RFC's are unclear
// https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-02#appendix-B // https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-02#appendix-B
let X = curve.curve.curve.type === 'mont' ?
S.toArrayLike(Uint8Array, 'le', len) :
S.toArrayLike(Uint8Array, 'be', len);
let i; let i;
if (stripLeading) { if (stripLeading) {
// Work around old go crypto bug // Work around old go crypto bug
@ -85,11 +84,20 @@ async function kdf(hash_algo, S, length, param, curve, stripLeading=false, strip
* @async * @async
*/ */
async function genPublicEphemeralKey(curve, Q) { async function genPublicEphemeralKey(curve, Q) {
if (curve.name === 'curve25519') {
const { secretKey: d } = nacl.box.keyPair();
const { secretKey, sharedKey } = await genPrivateEphemeralKey(curve, Q, d);
let { publicKey } = nacl.box.keyPair.fromSecretKey(secretKey);
publicKey = util.concatUint8Array([new Uint8Array([0x40]), publicKey]);
return { publicKey, sharedKey }; // Note: sharedKey is little-endian here, unlike below
}
const v = await curve.genKeyPair(); const v = await curve.genKeyPair();
Q = curve.keyFromPublic(Q); Q = curve.keyFromPublic(Q);
const V = new Uint8Array(v.getPublic()); const publicKey = new Uint8Array(v.getPublic());
const S = v.derive(Q); const S = v.derive(Q);
return { V, S }; const len = curve.curve.curve.p.byteLength();
const sharedKey = S.toArrayLike(Uint8Array, 'be', len);
return { publicKey, sharedKey };
} }
/** /**
@ -106,12 +114,12 @@ async function genPublicEphemeralKey(curve, Q) {
*/ */
async function encrypt(oid, cipher_algo, hash_algo, m, Q, fingerprint) { async function encrypt(oid, cipher_algo, hash_algo, m, Q, fingerprint) {
const curve = new Curve(oid); const curve = new Curve(oid);
const { V, S } = await genPublicEphemeralKey(curve, Q); const { publicKey, sharedKey } = await genPublicEphemeralKey(curve, Q);
const param = buildEcdhParam(enums.publicKey.ecdh, oid, cipher_algo, hash_algo, fingerprint); const param = buildEcdhParam(enums.publicKey.ecdh, oid, cipher_algo, hash_algo, fingerprint);
cipher_algo = enums.read(enums.symmetric, cipher_algo); cipher_algo = enums.read(enums.symmetric, cipher_algo);
const Z = await kdf(hash_algo, S, cipher[cipher_algo].keySize, param, curve); const Z = await kdf(hash_algo, sharedKey, cipher[cipher_algo].keySize, param);
const C = aes_kw.wrap(Z, m.toString()); const wrappedKey = aes_kw.wrap(Z, m.toString());
return { V, C }; return { publicKey, wrappedKey };
} }
/** /**
@ -124,9 +132,23 @@ async function encrypt(oid, cipher_algo, hash_algo, m, Q, fingerprint) {
* @async * @async
*/ */
async function genPrivateEphemeralKey(curve, V, d) { async function genPrivateEphemeralKey(curve, V, d) {
if (curve.name === 'curve25519') {
const one = new BN(1);
const mask = one.ushln(255 - 3).sub(one).ushln(3);
let secretKey = new BN(d);
secretKey = secretKey.or(one.ushln(255 - 1));
secretKey = secretKey.and(mask);
secretKey = secretKey.toArrayLike(Uint8Array, 'le', 32);
const sharedKey = nacl.scalarMult(secretKey, V.subarray(1));
return { secretKey, sharedKey }; // Note: sharedKey is little-endian here, unlike below
}
V = curve.keyFromPublic(V); V = curve.keyFromPublic(V);
d = curve.keyFromPrivate(d); d = curve.keyFromPrivate(d);
return d.derive(V); const secretKey = new Uint8Array(d.getPrivate());
const S = d.derive(V);
const len = curve.curve.curve.p.byteLength();
const sharedKey = S.toArrayLike(Uint8Array, 'be', len);
return { secretKey, sharedKey };
} }
/** /**
@ -144,14 +166,14 @@ async function genPrivateEphemeralKey(curve, V, d) {
*/ */
async function decrypt(oid, cipher_algo, hash_algo, V, C, d, fingerprint) { async function decrypt(oid, cipher_algo, hash_algo, V, C, d, fingerprint) {
const curve = new Curve(oid); const curve = new Curve(oid);
const S = await genPrivateEphemeralKey(curve, V, d); const { sharedKey } = await genPrivateEphemeralKey(curve, V, d);
const param = buildEcdhParam(enums.publicKey.ecdh, oid, cipher_algo, hash_algo, fingerprint); const param = buildEcdhParam(enums.publicKey.ecdh, oid, cipher_algo, hash_algo, fingerprint);
cipher_algo = enums.read(enums.symmetric, cipher_algo); cipher_algo = enums.read(enums.symmetric, cipher_algo);
let err; let err;
for (let i = 0; i < 3; i++) { for (let i = 0; i < 3; i++) {
try { try {
// Work around old go crypto bug and old OpenPGP.js bug, respectively. // Work around old go crypto bug and old OpenPGP.js bug, respectively.
const Z = await kdf(hash_algo, S, cipher[cipher_algo].keySize, param, curve, i === 1, i === 2); const Z = await kdf(hash_algo, sharedKey, cipher[cipher_algo].keySize, param, i === 1, i === 2);
return new BN(aes_kw.unwrap(Z, C)); return new BN(aes_kw.unwrap(Z, C));
} catch (e) { } catch (e) {
err = e; err = e;

View File

@ -17,11 +17,18 @@
/** /**
* @fileoverview Implementation of EdDSA following RFC4880bis-03 for OpenPGP * @fileoverview Implementation of EdDSA following RFC4880bis-03 for OpenPGP
* @requires hash.js
* @requires tweetnacl
* @requires crypto/public_key/elliptic/curve * @requires crypto/public_key/elliptic/curve
* @requires util
* @module crypto/public_key/elliptic/eddsa * @module crypto/public_key/elliptic/eddsa
*/ */
import Curve from './curves'; import sha512 from 'hash.js/lib/hash/sha/512';
import nacl from 'tweetnacl/nacl-fast-light.js';
import util from '../../../util';
nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
/** /**
* Sign a message using the provided key * Sign a message using the provided key
@ -35,12 +42,13 @@ import Curve from './curves';
* @async * @async
*/ */
async function sign(oid, hash_algo, m, d, hashed) { async function sign(oid, hash_algo, m, d, hashed) {
const curve = new Curve(oid); const { secretKey } = nacl.sign.keyPair.fromSeed(d);
const key = curve.keyFromSecret(d); const signature = nacl.sign.detached(hashed, secretKey);
const signature = await key.sign(m, hash_algo, hashed);
// EdDSA signature params are returned in little-endian format // EdDSA signature params are returned in little-endian format
return { R: new Uint8Array(signature.Rencoded()), return {
S: new Uint8Array(signature.Sencoded()) }; R: signature.subarray(0, 32),
S: signature.subarray(32)
};
} }
/** /**
@ -50,15 +58,14 @@ async function sign(oid, hash_algo, m, d, hashed) {
* @param {{R: Uint8Array, * @param {{R: Uint8Array,
S: Uint8Array}} signature Signature to verify the message S: Uint8Array}} signature Signature to verify the message
* @param {Uint8Array} m Message to verify * @param {Uint8Array} m Message to verify
* @param {Uint8Array} Q Public key used to verify the message * @param {Uint8Array} publicKey Public key used to verify the message
* @param {Uint8Array} hashed The hashed message * @param {Uint8Array} hashed The hashed message
* @returns {Boolean} * @returns {Boolean}
* @async * @async
*/ */
async function verify(oid, hash_algo, signature, m, Q, hashed) { async function verify(oid, hash_algo, { R, S }, m, publicKey, hashed) {
const curve = new Curve(oid); const signature = util.concatUint8Array([R, S]);
const key = curve.keyFromPublic(Q); return nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1));
return key.verify(m, signature, hash_algo, hashed);
} }
export default { sign, verify }; export default { sign, verify };

View File

@ -1,5 +1,6 @@
/** /**
* @fileoverview Asymmetric cryptography functions * @fileoverview Asymmetric cryptography functions
* @requires tweetnacl
* @requires crypto/public_key/dsa * @requires crypto/public_key/dsa
* @requires crypto/public_key/elgamal * @requires crypto/public_key/elgamal
* @requires crypto/public_key/elliptic * @requires crypto/public_key/elliptic
@ -7,6 +8,7 @@
* @module crypto/public_key * @module crypto/public_key
*/ */
import nacl from 'tweetnacl/nacl-fast-light.js';
import rsa from './rsa'; import rsa from './rsa';
import elgamal from './elgamal'; import elgamal from './elgamal';
import elliptic from './elliptic'; import elliptic from './elliptic';
@ -20,5 +22,7 @@ export default {
/** @see module:crypto/public_key/elliptic */ /** @see module:crypto/public_key/elliptic */
elliptic: elliptic, elliptic: elliptic,
/** @see module:crypto/public_key/dsa */ /** @see module:crypto/public_key/dsa */
dsa: dsa dsa: dsa,
/** @see tweetnacl */
nacl: nacl
}; };

View File

@ -58,11 +58,10 @@ export default {
} }
case enums.publicKey.eddsa: { case enums.publicKey.eddsa: {
const oid = pub_MPIs[0]; const oid = pub_MPIs[0];
// TODO refactor elliptic to accept Uint8Array
// EdDSA signature params are expected in little-endian format // EdDSA signature params are expected in little-endian format
const signature = { R: Array.from(msg_MPIs[0].toUint8Array('le', 32)), const signature = { R: msg_MPIs[0].toUint8Array('le', 32),
S: Array.from(msg_MPIs[1].toUint8Array('le', 32)) }; S: msg_MPIs[1].toUint8Array('le', 32) };
const Q = Array.from(pub_MPIs[1].toUint8Array('be', 33)); const Q = pub_MPIs[1].toUint8Array('be', 33);
return publicKey.elliptic.eddsa.verify(oid, hash_algo, signature, data, Q, hashed); return publicKey.elliptic.eddsa.verify(oid, hash_algo, signature, data, Q, hashed);
} }
default: default:
@ -120,7 +119,7 @@ export default {
} }
case enums.publicKey.eddsa: { case enums.publicKey.eddsa: {
const oid = key_params[0]; const oid = key_params[0];
const d = Array.from(key_params[2].toUint8Array('be', 32)); const d = key_params[2].toUint8Array('be', 32);
const signature = await publicKey.elliptic.eddsa.sign(oid, hash_algo, data, d, hashed); const signature = await publicKey.elliptic.eddsa.sign(oid, hash_algo, data, d, hashed);
return util.concatUint8Array([ return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.R), util.Uint8Array_to_MPI(signature.R),

View File

@ -63,12 +63,19 @@ let asyncProxy; // instance of the asyncproxy
* @param {String} path relative path to the worker scripts, default: 'openpgp.worker.js' * @param {String} path relative path to the worker scripts, default: 'openpgp.worker.js'
* @param {Number} n number of workers to initialize * @param {Number} n number of workers to initialize
* @param {Array<Object>} workers alternative to path parameter: web workers initialized with 'openpgp.worker.js' * @param {Array<Object>} workers alternative to path parameter: web workers initialized with 'openpgp.worker.js'
* @returns {Promise<Boolean>} returns a promise that resolves to true if all workers have succesfully finished loading
* @async
*/ */
export function initWorker({ path='openpgp.worker.js', n = 1, workers = [] } = {}) { export async function initWorker({ path='openpgp.worker.js', n = 1, workers = [] } = {}) {
if (workers.length || (typeof window !== 'undefined' && window.Worker && window.MessageChannel)) { if (workers.length || (typeof window !== 'undefined' && window.Worker && window.MessageChannel)) {
asyncProxy = new AsyncProxy({ path, n, workers, config }); const proxy = new AsyncProxy({ path, n, workers, config });
const loaded = await proxy.loaded();
if (loaded) {
asyncProxy = proxy;
return true; return true;
} }
}
return false;
} }
/** /**

View File

@ -137,8 +137,8 @@ PublicKeyEncryptedSessionKey.prototype.encrypt = async function (key) {
*/ */
PublicKeyEncryptedSessionKey.prototype.decrypt = async function (key) { PublicKeyEncryptedSessionKey.prototype.decrypt = async function (key) {
const algo = enums.write(enums.publicKey, this.publicKeyAlgorithm); const algo = enums.write(enums.publicKey, this.publicKeyAlgorithm);
const result = await crypto.publicKeyDecrypt( const result = new type_mpi(await crypto.publicKeyDecrypt(
algo, key.params, this.encrypted, key.getFingerprintBytes()); algo, key.params, this.encrypted, key.getFingerprintBytes()));
let checksum; let checksum;
let decoded; let decoded;

View File

@ -49,6 +49,9 @@ function AsyncProxy({ path='openpgp.worker.js', n = 1, workers = [], config } =
const handleMessage = workerId => event => { const handleMessage = workerId => event => {
const msg = event.data; const msg = event.data;
switch (msg.event) { switch (msg.event) {
case 'loaded':
this.workers[workerId].loadedResolve(true);
break;
case 'method-return': case 'method-return':
if (msg.err) { if (msg.err) {
// fail // fail
@ -83,10 +86,15 @@ function AsyncProxy({ path='openpgp.worker.js', n = 1, workers = [], config } =
let workerId = 0; let workerId = 0;
this.workers.forEach(worker => { this.workers.forEach(worker => {
worker.loadedPromise = new Promise(resolve => {
worker.loadedResolve = resolve;
});
worker.requests = 0; worker.requests = 0;
worker.onmessage = handleMessage(workerId++); worker.onmessage = handleMessage(workerId++);
worker.onerror = e => { worker.onerror = e => {
throw new Error('Unhandled error in openpgp worker: ' + e.message + ' (' + e.filename + ':' + e.lineno + ')'); worker.loadedResolve(false);
console.error('Unhandled error in openpgp worker: ' + e.message + ' (' + e.filename + ':' + e.lineno + ')');
return false;
}; };
if (config) { if (config) {
@ -99,6 +107,15 @@ function AsyncProxy({ path='openpgp.worker.js', n = 1, workers = [], config } =
this.currentID = 0; this.currentID = 0;
} }
/**
* Returns a promise that resolves when all workers have finished loading
* @returns {Promise<Boolean>} Resolves to true if all workers have loaded succesfully; false otherwise
*/
AsyncProxy.prototype.loaded = async function() {
const loaded = await Promise.all(this.workers.map(worker => worker.loadedPromise));
return loaded.every(Boolean);
};
/** /**
* Get new request ID * Get new request ID
* @returns {integer} New unique request ID * @returns {integer} New unique request ID

View File

@ -135,3 +135,8 @@ function delegate(id, method, options) {
function response(event) { function response(event) {
self.postMessage(event, openpgp.util.getTransferables(event.data, true)); self.postMessage(event, openpgp.util.getTransferables(event.data, true));
} }
/**
* Let the main window know the worker has loaded.
*/
postMessage({ event: 'loaded' });

View File

@ -364,7 +364,7 @@ describe('API functional testing', function() {
return crypto.publicKeyDecrypt( return crypto.publicKeyDecrypt(
1, RSApubMPIs.concat(RSAsecMPIs), RSAEncryptedData 1, RSApubMPIs.concat(RSAsecMPIs), RSAEncryptedData
).then(data => { ).then(data => {
data = data.write(); data = new openpgp.MPI(data).write();
data = util.Uint8Array_to_str(data.subarray(2, data.length)); data = util.Uint8Array_to_str(data.subarray(2, data.length));
const result = crypto.pkcs1.eme.decode(data, RSApubMPIs[0].byteLength()); const result = crypto.pkcs1.eme.decode(data, RSApubMPIs[0].byteLength());
@ -383,7 +383,7 @@ describe('API functional testing', function() {
return crypto.publicKeyDecrypt( return crypto.publicKeyDecrypt(
16, ElgamalpubMPIs.concat(ElgamalsecMPIs), ElgamalEncryptedData 16, ElgamalpubMPIs.concat(ElgamalsecMPIs), ElgamalEncryptedData
).then(data => { ).then(data => {
data = data.write(); data = new openpgp.MPI(data).write();
data = util.Uint8Array_to_str(data.subarray(2, data.length)); data = util.Uint8Array_to_str(data.subarray(2, data.length));
const result = crypto.pkcs1.eme.decode(data, ElgamalpubMPIs[0].byteLength()); const result = crypto.pkcs1.eme.decode(data, ElgamalpubMPIs[0].byteLength());

View File

@ -429,7 +429,7 @@ describe('Elliptic Curve Cryptography', function () {
async function genPublicEphemeralKey(curve, Q, fingerprint) { async function genPublicEphemeralKey(curve, Q, fingerprint) {
const curveObj = new openpgp.crypto.publicKey.elliptic.Curve(curve); const curveObj = new openpgp.crypto.publicKey.elliptic.Curve(curve);
const oid = new openpgp.OID(curveObj.oid); const oid = new openpgp.OID(curveObj.oid);
const { V, S } = await openpgp.crypto.publicKey.elliptic.ecdh.genPublicEphemeralKey( const { publicKey: V, sharedKey } = await openpgp.crypto.publicKey.elliptic.ecdh.genPublicEphemeralKey(
curveObj, Q curveObj, Q
); );
let cipher_algo = curveObj.cipher; let cipher_algo = curveObj.cipher;
@ -439,14 +439,14 @@ describe('Elliptic Curve Cryptography', function () {
); );
cipher_algo = openpgp.enums.read(openpgp.enums.symmetric, cipher_algo); cipher_algo = openpgp.enums.read(openpgp.enums.symmetric, cipher_algo);
const Z = await openpgp.crypto.publicKey.elliptic.ecdh.kdf( const Z = await openpgp.crypto.publicKey.elliptic.ecdh.kdf(
hash_algo, S, openpgp.crypto.cipher[cipher_algo].keySize, param, curveObj, false hash_algo, sharedKey, openpgp.crypto.cipher[cipher_algo].keySize, param, curveObj, false
); );
return { V, Z }; return { V, Z };
} }
async function genPrivateEphemeralKey(curve, V, d, fingerprint) { async function genPrivateEphemeralKey(curve, V, d, fingerprint) {
const curveObj = new openpgp.crypto.publicKey.elliptic.Curve(curve); const curveObj = new openpgp.crypto.publicKey.elliptic.Curve(curve);
const oid = new openpgp.OID(curveObj.oid); const oid = new openpgp.OID(curveObj.oid);
const S = await openpgp.crypto.publicKey.elliptic.ecdh.genPrivateEphemeralKey( const { sharedKey } = await openpgp.crypto.publicKey.elliptic.ecdh.genPrivateEphemeralKey(
curveObj, V, d curveObj, V, d
); );
let cipher_algo = curveObj.cipher; let cipher_algo = curveObj.cipher;
@ -456,7 +456,7 @@ describe('Elliptic Curve Cryptography', function () {
); );
cipher_algo = openpgp.enums.read(openpgp.enums.symmetric, cipher_algo); cipher_algo = openpgp.enums.read(openpgp.enums.symmetric, cipher_algo);
const Z = await openpgp.crypto.publicKey.elliptic.ecdh.kdf( const Z = await openpgp.crypto.publicKey.elliptic.ecdh.kdf(
hash_algo, S, openpgp.crypto.cipher[cipher_algo].keySize, param, curveObj, false hash_algo, sharedKey, openpgp.crypto.cipher[cipher_algo].keySize, param, curveObj, false
); );
return Z; return Z;
} }

View File

@ -273,8 +273,8 @@ describe('Brainpool Cryptography', function () {
tryTests('Brainpool Worker Tests', omnibus, { tryTests('Brainpool Worker Tests', omnibus, {
if: typeof window !== 'undefined' && window.Worker, if: typeof window !== 'undefined' && window.Worker,
before: function() { before: async function() {
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
}, },
beforeEach: function() { beforeEach: function() {
openpgp.config.use_native = true; openpgp.config.use_native = true;

View File

@ -297,8 +297,8 @@ describe('Elliptic Curve Cryptography', function () {
tryTests('ECC Worker Tests', omnibus, { tryTests('ECC Worker Tests', omnibus, {
if: typeof window !== 'undefined' && window.Worker, if: typeof window !== 'undefined' && window.Worker,
before: function() { before: async function() {
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
}, },
beforeEach: function() { beforeEach: function() {
openpgp.config.use_native = true; openpgp.config.use_native = true;

View File

@ -444,13 +444,16 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
openpgp.destroyWorker(); // cleanup worker in case of failure openpgp.destroyWorker(); // cleanup worker in case of failure
}); });
it('should work', function() { it('should work', async function() {
const workerStub = { const workerStub = {
postMessage: function() {} postMessage: function() {}
}; };
await Promise.all([
openpgp.initWorker({ openpgp.initWorker({
workers: [workerStub] workers: [workerStub]
}); }),
workerStub.onmessage({ data: { event: 'loaded' } })
]);
expect(openpgp.getWorker()).to.exist; expect(openpgp.getWorker()).to.exist;
openpgp.destroyWorker(); openpgp.destroyWorker();
expect(openpgp.getWorker()).to.not.exist; expect(openpgp.getWorker()).to.not.exist;
@ -595,13 +598,16 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
}); });
}); });
it('should delegate to async proxy', function() { it('should delegate to async proxy', async function() {
const workerStub = { const workerStub = {
postMessage: function() {} postMessage: function() {}
}; };
await Promise.all([
openpgp.initWorker({ openpgp.initWorker({
workers: [workerStub] workers: [workerStub]
}); }),
workerStub.onmessage({ data: { event: 'loaded' } })
]);
const proxyGenStub = stub(openpgp.getWorker(), 'delegate'); const proxyGenStub = stub(openpgp.getWorker(), 'delegate');
getWebCryptoAllStub.returns(); getWebCryptoAllStub.returns();
@ -643,9 +649,9 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
}); });
}); });
it('should work in JS (with worker)', function() { it('should work in JS (with worker)', async function() {
openpgp.config.use_native = false; openpgp.config.use_native = false;
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
const opt = { const opt = {
userIds: [{ name: 'Test User', email: 'text@example.com' }], userIds: [{ name: 'Test User', email: 'text@example.com' }],
numBits: 512 numBits: 512
@ -727,11 +733,11 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
openpgp.config.aead_chunk_size_byte = aead_chunk_size_byteVal; openpgp.config.aead_chunk_size_byte = aead_chunk_size_byteVal;
}); });
it('Configuration', function() { it('Configuration', async function() {
openpgp.config.show_version = false; openpgp.config.show_version = false;
openpgp.config.commentstring = 'different'; openpgp.config.commentstring = 'different';
if (openpgp.getWorker()) { // init again to trigger config event if (openpgp.getWorker()) { // init again to trigger config event
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
} }
return openpgp.encrypt({ publicKeys:publicKey.keys, message:openpgp.message.fromText(plaintext) }).then(function(encrypted) { return openpgp.encrypt({ publicKeys:publicKey.keys, message:openpgp.message.fromText(plaintext) }).then(function(encrypted) {
expect(encrypted.data).to.exist; expect(encrypted.data).to.exist;
@ -749,7 +755,7 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
const { workers } = openpgp.getWorker(); const { workers } = openpgp.getWorker();
try { try {
await privateKey.keys[0].decrypt(passphrase) await privateKey.keys[0].decrypt(passphrase)
openpgp.initWorker({path: '../dist/openpgp.worker.js', workers, n: 2}); await openpgp.initWorker({path: '../dist/openpgp.worker.js', workers, n: 2});
const workerTest = (_, index) => { const workerTest = (_, index) => {
const plaintext = input.createSomeMessage() + index; const plaintext = input.createSomeMessage() + index;
@ -770,7 +776,7 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
}; };
await Promise.all(Array(10).fill(null).map(workerTest)); await Promise.all(Array(10).fill(null).map(workerTest));
} finally { } finally {
openpgp.initWorker({path: '../dist/openpgp.worker.js', workers, n: 1 }); await openpgp.initWorker({path: '../dist/openpgp.worker.js', workers, n: 1 });
} }
}); });
@ -828,8 +834,8 @@ describe('[Sauce Labs Group 2] OpenPGP.js public api tests', function() {
tryTests('CFB mode (asm.js, worker)', tests, { tryTests('CFB mode (asm.js, worker)', tests, {
if: typeof window !== 'undefined' && window.Worker, if: typeof window !== 'undefined' && window.Worker,
before: function() { before: async function() {
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
}, },
beforeEach: function() { beforeEach: function() {
openpgp.config.aead_protect = false; openpgp.config.aead_protect = false;

View File

@ -640,7 +640,7 @@ function tests() {
const reader = openpgp.stream.getReader(signed.signature); const reader = openpgp.stream.getReader(signed.signature);
expect((await reader.readBytes(31)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\r\n'); expect((await reader.readBytes(31)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\r\n');
dataArrived(); dataArrived();
await new Promise(resolve => setTimeout(resolve, 1000)); await new Promise(resolve => setTimeout(resolve, 3000));
expect(i).to.be.greaterThan(100); expect(i).to.be.greaterThan(100);
}); });

View File

@ -319,8 +319,8 @@ describe('X25519 Cryptography', function () {
tryTests('X25519 Worker Tests', omnibus, { tryTests('X25519 Worker Tests', omnibus, {
if: typeof window !== 'undefined' && window.Worker, if: typeof window !== 'undefined' && window.Worker,
before: function() { before: async function() {
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
}, },
beforeEach: function() { beforeEach: function() {
openpgp.config.use_native = true; openpgp.config.use_native = true;
@ -336,9 +336,8 @@ describe('X25519 Cryptography', function () {
const util = openpgp.util; const util = openpgp.util;
function testVector(vector) { function testVector(vector) {
const curve = new elliptic.Curve('ed25519'); const curve = new elliptic.Curve('ed25519');
const S = curve.keyFromSecret(vector.SECRET_KEY); const { publicKey } = openpgp.crypto.publicKey.nacl.sign.keyPair.fromSeed(openpgp.util.hex_to_Uint8Array(vector.SECRET_KEY));
const P = curve.keyFromPublic('40'+vector.PUBLIC_KEY); expect(publicKey).to.deep.equal(openpgp.util.hex_to_Uint8Array(vector.PUBLIC_KEY));
expect(S.getPublic()).to.deep.equal(P.getPublic());
const data = util.str_to_Uint8Array(vector.MESSAGE); const data = util.str_to_Uint8Array(vector.MESSAGE);
const keyIntegers = [ const keyIntegers = [
openpgp.OID.fromClone(curve), openpgp.OID.fromClone(curve),
@ -350,12 +349,12 @@ describe('X25519 Cryptography', function () {
new openpgp.MPI(util.Uint8Array_to_str(util.hex_to_Uint8Array(vector.SIGNATURE.S).reverse())) new openpgp.MPI(util.Uint8Array_to_str(util.hex_to_Uint8Array(vector.SIGNATURE.S).reverse()))
]; ];
return Promise.all([ return Promise.all([
signature.sign(22, undefined, keyIntegers, data).then(signed => { signature.sign(22, undefined, keyIntegers, undefined, data).then(signed => {
const len = ((signed[0] << 8| signed[1]) + 7) / 8; const len = ((signed[0] << 8| signed[1]) + 7) / 8;
expect(util.hex_to_Uint8Array(vector.SIGNATURE.R)).to.deep.eq(signed.slice(2, 2 + len)); expect(util.hex_to_Uint8Array(vector.SIGNATURE.R)).to.deep.eq(signed.slice(2, 2 + len));
expect(util.hex_to_Uint8Array(vector.SIGNATURE.S)).to.deep.eq(signed.slice(4 + len)); expect(util.hex_to_Uint8Array(vector.SIGNATURE.S)).to.deep.eq(signed.slice(4 + len));
}), }),
signature.verify(22, undefined, msg_MPIs, keyIntegers, data).then(result => { signature.verify(22, undefined, msg_MPIs, keyIntegers, undefined, data).then(result => {
expect(result).to.be.true; expect(result).to.be.true;
}) })
]); ]);

View File

@ -37,7 +37,7 @@ let pubKey;
tryTests('Async Proxy', tests, { tryTests('Async Proxy', tests, {
if: typeof window !== 'undefined' && window.Worker && window.MessageChannel, if: typeof window !== 'undefined' && window.Worker && window.MessageChannel,
before: async function() { before: async function() {
openpgp.initWorker({ path:'../dist/openpgp.worker.js' }); await openpgp.initWorker({ path:'../dist/openpgp.worker.js' });
pubKey = (await openpgp.key.readArmored(pub_key)).keys[0]; pubKey = (await openpgp.key.readArmored(pub_key)).keys[0];
}, },
after: function() { after: function() {
@ -48,11 +48,13 @@ tryTests('Async Proxy', tests, {
function tests() { function tests() {
describe('Random number pipeline', function() { describe('Random number pipeline', function() {
it('Random number buffer automatically reseeded', function() { it('Random number buffer automatically reseeded', async function() {
const worker = new Worker('../dist/openpgp.worker.js'); const worker = new Worker('../dist/openpgp.worker.js');
const wProxy = new openpgp.AsyncProxy({ path:'../dist/openpgp.worker.js', workers: [worker] }); const wProxy = new openpgp.AsyncProxy({ path:'../dist/openpgp.worker.js', workers: [worker] });
const loaded = await wProxy.loaded();
if (loaded) {
return wProxy.delegate('encrypt', { publicKeys:[pubKey], message:openpgp.message.fromText(plaintext) }); return wProxy.delegate('encrypt', { publicKeys:[pubKey], message:openpgp.message.fromText(plaintext) });
}
}); });
}); });