Merge pull request #1762
`openpgp.verify`: fix bug preventing verification of detached signatures over streamed data
This commit is contained in:
commit
3eba29dba8
14
package-lock.json
generated
14
package-lock.json
generated
|
@ -18,7 +18,7 @@
|
||||||
"@openpgp/pako": "^1.0.12",
|
"@openpgp/pako": "^1.0.12",
|
||||||
"@openpgp/seek-bzip": "^1.0.5-git",
|
"@openpgp/seek-bzip": "^1.0.5-git",
|
||||||
"@openpgp/tweetnacl": "^1.0.3",
|
"@openpgp/tweetnacl": "^1.0.3",
|
||||||
"@openpgp/web-stream-tools": "0.0.11-patch-0",
|
"@openpgp/web-stream-tools": "0.0.11-patch-1",
|
||||||
"@rollup/plugin-commonjs": "^11.1.0",
|
"@rollup/plugin-commonjs": "^11.1.0",
|
||||||
"@rollup/plugin-node-resolve": "^7.1.3",
|
"@rollup/plugin-node-resolve": "^7.1.3",
|
||||||
"@rollup/plugin-replace": "^2.3.2",
|
"@rollup/plugin-replace": "^2.3.2",
|
||||||
|
@ -716,9 +716,9 @@
|
||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"node_modules/@openpgp/web-stream-tools": {
|
"node_modules/@openpgp/web-stream-tools": {
|
||||||
"version": "0.0.11-patch-0",
|
"version": "0.0.11-patch-1",
|
||||||
"resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.11-patch-0.tgz",
|
"resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.11-patch-1.tgz",
|
||||||
"integrity": "sha512-NrIF4DkCqC3WDcMDAgz17z+0Iik1fVrKuvdbjZXCnMZgYAWHpIG8CWnbp8yQRahAdF26jqCopA/qXrp8CYI2yw==",
|
"integrity": "sha512-sZkx4FsHGFPcGrEBmBLvg0PcFBgR7KWe+NXo3SI/e+gpVoK3rPzPgv4TpI3UFKiXrohaJyY/klf24tNbJCutBA==",
|
||||||
"dev": true,
|
"dev": true,
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@mattiasbuelens/web-streams-adapter": "~0.1.0",
|
"@mattiasbuelens/web-streams-adapter": "~0.1.0",
|
||||||
|
@ -8036,9 +8036,9 @@
|
||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"@openpgp/web-stream-tools": {
|
"@openpgp/web-stream-tools": {
|
||||||
"version": "0.0.11-patch-0",
|
"version": "0.0.11-patch-1",
|
||||||
"resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.11-patch-0.tgz",
|
"resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.11-patch-1.tgz",
|
||||||
"integrity": "sha512-NrIF4DkCqC3WDcMDAgz17z+0Iik1fVrKuvdbjZXCnMZgYAWHpIG8CWnbp8yQRahAdF26jqCopA/qXrp8CYI2yw==",
|
"integrity": "sha512-sZkx4FsHGFPcGrEBmBLvg0PcFBgR7KWe+NXo3SI/e+gpVoK3rPzPgv4TpI3UFKiXrohaJyY/klf24tNbJCutBA==",
|
||||||
"dev": true,
|
"dev": true,
|
||||||
"requires": {
|
"requires": {
|
||||||
"@mattiasbuelens/web-streams-adapter": "~0.1.0",
|
"@mattiasbuelens/web-streams-adapter": "~0.1.0",
|
||||||
|
|
|
@ -60,7 +60,7 @@
|
||||||
"@openpgp/pako": "^1.0.12",
|
"@openpgp/pako": "^1.0.12",
|
||||||
"@openpgp/seek-bzip": "^1.0.5-git",
|
"@openpgp/seek-bzip": "^1.0.5-git",
|
||||||
"@openpgp/tweetnacl": "^1.0.3",
|
"@openpgp/tweetnacl": "^1.0.3",
|
||||||
"@openpgp/web-stream-tools": "0.0.11-patch-0",
|
"@openpgp/web-stream-tools": "0.0.11-patch-1",
|
||||||
"@rollup/plugin-commonjs": "^11.1.0",
|
"@rollup/plugin-commonjs": "^11.1.0",
|
||||||
"@rollup/plugin-node-resolve": "^7.1.3",
|
"@rollup/plugin-node-resolve": "^7.1.3",
|
||||||
"@rollup/plugin-replace": "^2.3.2",
|
"@rollup/plugin-replace": "^2.3.2",
|
||||||
|
|
|
@ -480,7 +480,7 @@ export async function verify({ message, verificationKeys, expectSigned = false,
|
||||||
result.signatures = await message.verify(verificationKeys, date, config);
|
result.signatures = await message.verify(verificationKeys, date, config);
|
||||||
}
|
}
|
||||||
result.data = format === 'binary' ? message.getLiteralData() : message.getText();
|
result.data = format === 'binary' ? message.getLiteralData() : message.getText();
|
||||||
if (message.fromStream) linkStreams(result, message);
|
if (message.fromStream && !signature) linkStreams(result, message);
|
||||||
if (expectSigned) {
|
if (expectSigned) {
|
||||||
if (result.signatures.length === 0) {
|
if (result.signatures.length === 0) {
|
||||||
throw new Error('Message is not signed');
|
throw new Error('Message is not signed');
|
||||||
|
|
|
@ -15,6 +15,56 @@ const NodeReadableStream = useNativeStream ? undefined : require('stream').Reada
|
||||||
|
|
||||||
const detectNode = () => typeof globalThis.process === 'object' && typeof globalThis.process.versions === 'object';
|
const detectNode = () => typeof globalThis.process === 'object' && typeof globalThis.process.versions === 'object';
|
||||||
|
|
||||||
|
function getLargeDataStream() {
|
||||||
|
const dataChunks = [];
|
||||||
|
let dataArrived;
|
||||||
|
let canceled = false;
|
||||||
|
let i = 0;
|
||||||
|
const dataArrivedPromise = new Promise(resolve => {
|
||||||
|
dataArrived = resolve;
|
||||||
|
});
|
||||||
|
const expectedType = global.ReadableStream ? 'web' : 'node';
|
||||||
|
const dataStream = global.ReadableStream ? new global.ReadableStream({
|
||||||
|
async pull(controller) {
|
||||||
|
await new Promise(setTimeout);
|
||||||
|
if (i < (expectedType === 'web' ? 100 : 500)) {
|
||||||
|
i++;
|
||||||
|
if (i === 4) await dataArrivedPromise;
|
||||||
|
const randomBytes = random.getRandomBytes(1024);
|
||||||
|
controller.enqueue(randomBytes);
|
||||||
|
dataChunks.push(randomBytes);
|
||||||
|
} else {
|
||||||
|
controller.close();
|
||||||
|
}
|
||||||
|
},
|
||||||
|
cancel() {
|
||||||
|
canceled = true;
|
||||||
|
}
|
||||||
|
}, new ByteLengthQueuingStrategy({
|
||||||
|
highWaterMark: 1024
|
||||||
|
})) : new NodeReadableStream({
|
||||||
|
highWaterMark: 1024,
|
||||||
|
async read() {
|
||||||
|
while (true) {
|
||||||
|
await new Promise(setTimeout);
|
||||||
|
if (i < (expectedType === 'web' ? 100 : 500)) {
|
||||||
|
i++;
|
||||||
|
if (i === 4) await dataArrivedPromise;
|
||||||
|
const randomBytes = random.getRandomBytes(1024);
|
||||||
|
dataChunks.push(randomBytes);
|
||||||
|
if (!this.push(randomBytes)) break;
|
||||||
|
} else {
|
||||||
|
return this.push(null);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
destroy() {
|
||||||
|
canceled = true;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
return { dataStream, dataChunks, dataArrived, isCanceled: () => canceled, expectedType };
|
||||||
|
}
|
||||||
|
|
||||||
const pub_key = [
|
const pub_key = [
|
||||||
'-----BEGIN PGP PUBLIC KEY BLOCK-----',
|
'-----BEGIN PGP PUBLIC KEY BLOCK-----',
|
||||||
'Version: GnuPG v2.0.19 (GNU/Linux)',
|
'Version: GnuPG v2.0.19 (GNU/Linux)',
|
||||||
|
@ -168,16 +218,9 @@ const xPass = 'sun';
|
||||||
|
|
||||||
let privKey;
|
let privKey;
|
||||||
let pubKey;
|
let pubKey;
|
||||||
let plaintext;
|
|
||||||
let data;
|
|
||||||
let i;
|
|
||||||
let canceled;
|
|
||||||
let expectedType;
|
|
||||||
let dataArrived;
|
|
||||||
|
|
||||||
function tests() {
|
function tests() {
|
||||||
it('Encrypt small message', async function() {
|
it('Encrypt small message', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const data = global.ReadableStream ? new global.ReadableStream({
|
const data = global.ReadableStream ? new global.ReadableStream({
|
||||||
start(controller) {
|
start(controller) {
|
||||||
controller.enqueue(util.stringToUint8Array('hello '));
|
controller.enqueue(util.stringToUint8Array('hello '));
|
||||||
|
@ -205,8 +248,9 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt larger message', async function() {
|
it('Encrypt larger message', async function() {
|
||||||
|
const { dataStream, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
const reader = stream.getReader(encrypted);
|
const reader = stream.getReader(encrypted);
|
||||||
|
@ -220,12 +264,13 @@ function tests() {
|
||||||
message,
|
message,
|
||||||
format: 'binary'
|
format: 'binary'
|
||||||
});
|
});
|
||||||
expect(decrypted.data).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(decrypted.data).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Input stream should be canceled when canceling encrypted stream', async function() {
|
it('Input stream should be canceled when canceling encrypted stream', async function() {
|
||||||
|
const { dataStream, isCanceled, dataArrived } = getLargeDataStream();
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
const reader = stream.getReader(encrypted);
|
const reader = stream.getReader(encrypted);
|
||||||
|
@ -233,12 +278,14 @@ function tests() {
|
||||||
dataArrived();
|
dataArrived();
|
||||||
reader.releaseLock();
|
reader.releaseLock();
|
||||||
await stream.cancel(encrypted);
|
await stream.cancel(encrypted);
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Sign: Input stream should be canceled when canceling encrypted stream', async function() {
|
it('Sign: Input stream should be canceled when canceling encrypted stream', async function() {
|
||||||
|
const { dataStream, isCanceled, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
});
|
});
|
||||||
|
@ -247,14 +294,16 @@ function tests() {
|
||||||
dataArrived();
|
dataArrived();
|
||||||
reader.releaseLock();
|
reader.releaseLock();
|
||||||
await stream.cancel(signed);
|
await stream.cancel(signed);
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip', async function() {
|
it('Encrypt and decrypt larger message roundtrip', async function() {
|
||||||
|
const { dataStream, dataArrived, dataChunks, expectedType } = getLargeDataStream();
|
||||||
|
|
||||||
const aeadProtectValue = openpgp.config.aeadProtect;
|
const aeadProtectValue = openpgp.config.aeadProtect;
|
||||||
openpgp.config.aeadProtect = false;
|
openpgp.config.aeadProtect = false;
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test'],
|
passwords: ['test'],
|
||||||
format: 'binary'
|
format: 'binary'
|
||||||
});
|
});
|
||||||
|
@ -269,20 +318,22 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
if (i <= 10) throw new Error('Data arrived early.');
|
if (dataChunks.length <= 10) throw new Error('Data arrived early.');
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
openpgp.config.aeadProtect = aeadProtectValue;
|
openpgp.config.aeadProtect = aeadProtectValue;
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip (allowUnauthenticatedStream=true)', async function() {
|
it('Encrypt and decrypt larger message roundtrip (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const aeadProtectValue = openpgp.config.aeadProtect;
|
const aeadProtectValue = openpgp.config.aeadProtect;
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.aeadProtect = false;
|
openpgp.config.aeadProtect = false;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test'],
|
passwords: ['test'],
|
||||||
format: 'binary'
|
format: 'binary'
|
||||||
});
|
});
|
||||||
|
@ -297,9 +348,9 @@ function tests() {
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
expect(stream.isStream(decrypted.signatures)).to.be.false;
|
expect(stream.isStream(decrypted.signatures)).to.be.false;
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
expect(decrypted.signatures).to.exist.and.have.length(0);
|
expect(decrypted.signatures).to.exist.and.have.length(0);
|
||||||
} finally {
|
} finally {
|
||||||
openpgp.config.aeadProtect = aeadProtectValue;
|
openpgp.config.aeadProtect = aeadProtectValue;
|
||||||
|
@ -308,11 +359,13 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip using public keys (allowUnauthenticatedStream=true)', async function() {
|
it('Encrypt and decrypt larger message roundtrip using public keys (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
encryptionKeys: pubKey,
|
encryptionKeys: pubKey,
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
format: 'binary',
|
format: 'binary',
|
||||||
|
@ -329,15 +382,17 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
} finally {
|
} finally {
|
||||||
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip using curve x25519 (allowUnauthenticatedStream=true)', async function() {
|
it('Encrypt and decrypt larger message roundtrip using curve x25519 (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
const pub = await openpgp.readKey({ armoredKey: xPub });
|
const pub = await openpgp.readKey({ armoredKey: xPub });
|
||||||
|
@ -348,7 +403,7 @@ function tests() {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
encryptionKeys: pub,
|
encryptionKeys: pub,
|
||||||
signingKeys: priv,
|
signingKeys: priv,
|
||||||
format: 'binary'
|
format: 'binary'
|
||||||
|
@ -364,15 +419,17 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
} finally {
|
} finally {
|
||||||
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip using curve brainpool (allowUnauthenticatedStream=true)', async function() {
|
it('Encrypt and decrypt larger message roundtrip using curve brainpool (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
const pub = await openpgp.readKey({ armoredKey: brainpoolPub });
|
const pub = await openpgp.readKey({ armoredKey: brainpoolPub });
|
||||||
|
@ -384,7 +441,7 @@ function tests() {
|
||||||
try {
|
try {
|
||||||
const config = { rejectCurves: new Set() };
|
const config = { rejectCurves: new Set() };
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
encryptionKeys: pub,
|
encryptionKeys: pub,
|
||||||
signingKeys: priv,
|
signingKeys: priv,
|
||||||
format: 'binary',
|
format: 'binary',
|
||||||
|
@ -402,22 +459,24 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
} finally {
|
} finally {
|
||||||
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
openpgp.config.allowUnauthenticatedStream = allowUnauthenticatedStreamValue;
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detect MDC modifications (allowUnauthenticatedStream=true)', async function() {
|
it('Detect MDC modifications (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const aeadProtectValue = openpgp.config.aeadProtect;
|
const aeadProtectValue = openpgp.config.aeadProtect;
|
||||||
openpgp.config.aeadProtect = false;
|
openpgp.config.aeadProtect = false;
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data, filename: 'msg.bin' }),
|
message: await openpgp.createMessage({ binary: dataStream, filename: 'msg.bin' }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
||||||
|
@ -438,7 +497,7 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).not.to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await expect(reader.readToEnd()).to.be.rejectedWith('Modification detected.');
|
await expect(reader.readToEnd()).to.be.rejectedWith('Modification detected.');
|
||||||
expect(decrypted.signatures).to.exist.and.have.length(0);
|
expect(decrypted.signatures).to.exist.and.have.length(0);
|
||||||
|
@ -449,11 +508,13 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detect armor checksum error (allowUnauthenticatedStream=true)', async function() {
|
it('Detect armor checksum error (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
encryptionKeys: pubKey,
|
encryptionKeys: pubKey,
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
|
@ -476,7 +537,7 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).not.to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
||||||
expect(decrypted.signatures).to.exist.and.have.length(1);
|
expect(decrypted.signatures).to.exist.and.have.length(1);
|
||||||
|
@ -486,11 +547,13 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detect armor checksum error when not passing public keys (allowUnauthenticatedStream=true)', async function() {
|
it('Detect armor checksum error when not passing public keys (allowUnauthenticatedStream=true)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
const allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream;
|
||||||
openpgp.config.allowUnauthenticatedStream = true;
|
openpgp.config.allowUnauthenticatedStream = true;
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
encryptionKeys: pubKey,
|
encryptionKeys: pubKey,
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
|
@ -512,7 +575,7 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).not.to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
||||||
expect(decrypted.signatures).to.exist.and.have.length(1);
|
expect(decrypted.signatures).to.exist.and.have.length(1);
|
||||||
|
@ -523,8 +586,10 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Sign/verify: Detect armor checksum error', async function() {
|
it('Sign/verify: Detect armor checksum error', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
});
|
});
|
||||||
|
@ -546,15 +611,17 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(verified.data);
|
const reader = stream.getReader(verified.data);
|
||||||
expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).not.to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check failed');
|
||||||
expect(verified.signatures).to.exist.and.have.length(1);
|
expect(verified.signatures).to.exist.and.have.length(1);
|
||||||
});
|
});
|
||||||
|
|
||||||
it('stream.transformPair()', async function() {
|
it('stream.transformPair()', async function() {
|
||||||
|
const { dataStream, isCanceled, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
dataArrived(); // Do not wait until data arrived.
|
dataArrived(); // Do not wait until data arrived.
|
||||||
const transformed = stream.transformPair(stream.slice(data, 0, 5000), async (readable, writable) => {
|
const transformed = stream.transformPair(stream.slice(dataStream, 0, 5000), async (readable, writable) => {
|
||||||
const reader = stream.getReader(readable);
|
const reader = stream.getReader(readable);
|
||||||
const writer = stream.getWriter(writable);
|
const writer = stream.getWriter(writable);
|
||||||
try {
|
try {
|
||||||
|
@ -574,12 +641,14 @@ function tests() {
|
||||||
await new Promise(resolve => { setTimeout(resolve); });
|
await new Promise(resolve => { setTimeout(resolve); });
|
||||||
await stream.cancel(transformed);
|
await stream.cancel(transformed);
|
||||||
await new Promise(resolve => { setTimeout(resolve); });
|
await new Promise(resolve => { setTimeout(resolve); });
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Sign/verify: Input stream should be canceled when canceling verified stream', async function() {
|
it('Sign/verify: Input stream should be canceled when canceling verified stream', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived, isCanceled } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
});
|
});
|
||||||
|
@ -594,18 +663,20 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(verified.data);
|
const reader = stream.getReader(verified.data);
|
||||||
expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.readBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
reader.releaseLock();
|
reader.releaseLock();
|
||||||
await stream.cancel(verified.data, new Error('canceled by test'));
|
await stream.cancel(verified.data, new Error('canceled by test'));
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
expect(verified.signatures).to.exist.and.have.length(1);
|
expect(verified.signatures).to.exist.and.have.length(1);
|
||||||
await expect(verified.signatures[0].verified).to.be.rejectedWith('canceled');
|
await expect(verified.signatures[0].verified).to.be.rejectedWith('canceled');
|
||||||
});
|
});
|
||||||
|
|
||||||
it("Don't pull entire input stream when we're not pulling encrypted stream", async function() {
|
it("Don't pull entire input stream when we're not pulling encrypted stream", async function() {
|
||||||
|
const { dataStream, expectedType, dataArrived, dataChunks } = getLargeDataStream();
|
||||||
|
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
||||||
|
@ -614,12 +685,14 @@ function tests() {
|
||||||
expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/);
|
expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
||||||
expect(i).to.be.lessThan(expectedType === 'web' ? 50 : 100);
|
expect(dataChunks.length).to.be.lessThan(expectedType === 'web' ? 50 : 100);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("Sign: Don't pull entire input stream when we're not pulling signed stream", async function() {
|
it("Sign: Don't pull entire input stream when we're not pulling signed stream", async function() {
|
||||||
|
const { dataStream, expectedType, dataArrived, dataChunks } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
});
|
});
|
||||||
|
@ -629,12 +702,14 @@ function tests() {
|
||||||
expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/);
|
expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
||||||
expect(i).to.be.lessThan(expectedType === 'web' ? 50 : 100);
|
expect(dataChunks.length).to.be.lessThan(expectedType === 'web' ? 50 : 100);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("Sign/verify: Don't pull entire input stream when we're not pulling verified stream", async function() {
|
it("Sign/verify: Don't pull entire input stream when we're not pulling verified stream", async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
});
|
});
|
||||||
|
@ -647,14 +722,78 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(verified.data);
|
const reader = stream.getReader(verified.data);
|
||||||
expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.readBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
||||||
expect(i).to.be.lessThan(expectedType === 'web' ? 50 : 250);
|
expect(dataChunks.length).to.be.lessThan(expectedType === 'web' ? 50 : 250);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('Detached sign/verify: support streamed input', async function() {
|
||||||
|
const getDataStream = () => (global.ReadableStream ? new global.ReadableStream({
|
||||||
|
start(controller) {
|
||||||
|
controller.enqueue(util.stringToUint8Array('hello '));
|
||||||
|
controller.enqueue(util.stringToUint8Array('world'));
|
||||||
|
controller.close();
|
||||||
|
}
|
||||||
|
}) : new NodeReadableStream({
|
||||||
|
read() {
|
||||||
|
this.push(util.stringToUint8Array('hello '));
|
||||||
|
this.push(util.stringToUint8Array('world'));
|
||||||
|
this.push(null);
|
||||||
|
}
|
||||||
|
}));
|
||||||
|
|
||||||
|
const signed = await openpgp.sign({
|
||||||
|
message: await openpgp.createMessage({ binary: getDataStream() }),
|
||||||
|
signingKeys: privKey,
|
||||||
|
config: { minRSABits: 1024 },
|
||||||
|
detached: true
|
||||||
|
});
|
||||||
|
const armoredSignature = await stream.readToEnd(signed);
|
||||||
|
const message = await openpgp.createMessage({ binary: getDataStream() });
|
||||||
|
const verified = await openpgp.verify({
|
||||||
|
message,
|
||||||
|
signature: await openpgp.readSignature({ armoredSignature }),
|
||||||
|
verificationKeys: pubKey,
|
||||||
|
format: 'binary',
|
||||||
|
config: { minRSABits: 1024 }
|
||||||
|
});
|
||||||
|
expect(await stream.readToEnd(verified.data)).to.deep.equal(util.stringToUint8Array('hello world'));
|
||||||
|
expect(verified.signatures).to.exist.and.have.length(1);
|
||||||
|
expect(await verified.signatures[0].verified).to.be.true;
|
||||||
|
});
|
||||||
|
|
||||||
|
it('Detached verify: Input stream should be canceled when canceling verified stream', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived, isCanceled } = getLargeDataStream();
|
||||||
|
|
||||||
|
const armoredSignature = await openpgp.sign({
|
||||||
|
message: await openpgp.createMessage({ binary: util.stringToUint8Array('dummy data') }),
|
||||||
|
signingKeys: privKey,
|
||||||
|
config: { minRSABits: 1024 },
|
||||||
|
detached: true
|
||||||
|
});
|
||||||
|
|
||||||
|
const message = await openpgp.createMessage({ binary: dataStream });
|
||||||
|
const verified = await openpgp.verify({
|
||||||
|
message,
|
||||||
|
signature: await openpgp.readSignature({ armoredSignature }),
|
||||||
|
verificationKeys: pubKey,
|
||||||
|
format: 'binary',
|
||||||
|
config: { minRSABits: 1024 }
|
||||||
|
});
|
||||||
|
expect(stream.isStream(verified.data)).to.equal(expectedType);
|
||||||
|
const reader = stream.getReader(verified.data);
|
||||||
|
expect(await reader.readBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
|
dataArrived();
|
||||||
|
reader.releaseLock();
|
||||||
|
await stream.cancel(verified.data, new Error('canceled by test'));
|
||||||
|
expect(isCanceled()).to.be.true;
|
||||||
|
expect(verified.signatures).to.exist.and.have.length(1);
|
||||||
|
await expect(verified.signatures[0].verified).to.be.rejectedWith('canceled');
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
it('Detached sign small message', async function() {
|
it('Detached sign small message', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const data = global.ReadableStream ? new global.ReadableStream({
|
const data = global.ReadableStream ? new global.ReadableStream({
|
||||||
start(controller) {
|
start(controller) {
|
||||||
controller.enqueue(util.stringToUint8Array('hello '));
|
controller.enqueue(util.stringToUint8Array('hello '));
|
||||||
|
@ -668,6 +807,8 @@ function tests() {
|
||||||
this.push(null);
|
this.push(null);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
const expectedType = global.ReadableStream ? 'web' : 'node';
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: data }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
|
@ -689,7 +830,6 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detached sign small message using brainpool curve keys', async function() {
|
it('Detached sign small message using brainpool curve keys', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const data = global.ReadableStream ? new global.ReadableStream({
|
const data = global.ReadableStream ? new global.ReadableStream({
|
||||||
start(controller) {
|
start(controller) {
|
||||||
controller.enqueue(util.stringToUint8Array('hello '));
|
controller.enqueue(util.stringToUint8Array('hello '));
|
||||||
|
@ -703,6 +843,8 @@ function tests() {
|
||||||
this.push(null);
|
this.push(null);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
const expectedType = global.ReadableStream ? 'web' : 'node';
|
||||||
|
|
||||||
const pub = await openpgp.readKey({ armoredKey: brainpoolPub });
|
const pub = await openpgp.readKey({ armoredKey: brainpoolPub });
|
||||||
const priv = await openpgp.decryptKey({
|
const priv = await openpgp.decryptKey({
|
||||||
privateKey: await openpgp.readKey({ armoredKey: brainpoolPriv }),
|
privateKey: await openpgp.readKey({ armoredKey: brainpoolPriv }),
|
||||||
|
@ -731,7 +873,6 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detached sign small message using curve25519 keys (legacy format)', async function() {
|
it('Detached sign small message using curve25519 keys (legacy format)', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const data = global.ReadableStream ? new global.ReadableStream({
|
const data = global.ReadableStream ? new global.ReadableStream({
|
||||||
async start(controller) {
|
async start(controller) {
|
||||||
controller.enqueue(util.stringToUint8Array('hello '));
|
controller.enqueue(util.stringToUint8Array('hello '));
|
||||||
|
@ -745,6 +886,8 @@ function tests() {
|
||||||
this.push(null);
|
this.push(null);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
const expectedType = global.ReadableStream ? 'web' : 'node';
|
||||||
|
|
||||||
const pub = await openpgp.readKey({ armoredKey: xPub });
|
const pub = await openpgp.readKey({ armoredKey: xPub });
|
||||||
const priv = await openpgp.decryptKey({
|
const priv = await openpgp.decryptKey({
|
||||||
privateKey: await openpgp.readKey({ armoredKey: xPriv }),
|
privateKey: await openpgp.readKey({ armoredKey: xPriv }),
|
||||||
|
@ -770,8 +913,10 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it("Detached sign is expected to pull entire input stream when we're not pulling signed stream", async function() {
|
it("Detached sign is expected to pull entire input stream when we're not pulling signed stream", async function() {
|
||||||
|
const { dataStream, expectedType, dataArrived, dataChunks } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
detached: true,
|
detached: true,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
|
@ -781,12 +926,14 @@ function tests() {
|
||||||
expect((await reader.readBytes(30)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\n');
|
expect((await reader.readBytes(30)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\n');
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
||||||
expect(i).to.equal(expectedType === 'web' ? 100 : 500);
|
expect(dataChunks.length).to.equal(expectedType === 'web' ? 100 : 500);
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detached sign: Input stream should be canceled when canceling signed stream', async function() {
|
it('Detached sign: Input stream should be canceled when canceling signed stream', async function() {
|
||||||
|
const { dataStream, expectedType, dataArrived, isCanceled } = getLargeDataStream();
|
||||||
|
|
||||||
const signed = await openpgp.sign({
|
const signed = await openpgp.sign({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
signingKeys: privKey,
|
signingKeys: privKey,
|
||||||
detached: true,
|
detached: true,
|
||||||
config: { minRSABits: 1024 }
|
config: { minRSABits: 1024 }
|
||||||
|
@ -797,7 +944,7 @@ function tests() {
|
||||||
dataArrived();
|
dataArrived();
|
||||||
reader.releaseLock();
|
reader.releaseLock();
|
||||||
await stream.cancel(signed, new Error('canceled by test'));
|
await stream.cancel(signed, new Error('canceled by test'));
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
});
|
});
|
||||||
|
|
||||||
describe('AEAD', function() {
|
describe('AEAD', function() {
|
||||||
|
@ -816,8 +963,10 @@ function tests() {
|
||||||
|
|
||||||
|
|
||||||
it('Encrypt and decrypt larger message roundtrip (AEAD)', async function() {
|
it('Encrypt and decrypt larger message roundtrip (AEAD)', async function() {
|
||||||
|
const { dataStream, expectedType, dataArrived, dataChunks } = getLargeDataStream();
|
||||||
|
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test'],
|
passwords: ['test'],
|
||||||
format: 'binary'
|
format: 'binary'
|
||||||
});
|
});
|
||||||
|
@ -831,9 +980,9 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.peekBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext));
|
expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(dataChunks));
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Encrypt and decrypt larger text message roundtrip (AEAD)', async function() {
|
it('Encrypt and decrypt larger text message roundtrip (AEAD)', async function() {
|
||||||
|
@ -867,6 +1016,8 @@ function tests() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
const expectedType = global.ReadableStream ? 'web' : 'node';
|
||||||
|
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ text: data }),
|
message: await openpgp.createMessage({ text: data }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
|
@ -881,7 +1032,6 @@ function tests() {
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect((await reader.peekBytes(plaintext[0].length * 4)).toString('utf8').substr(0, plaintext[0].length)).to.equal(plaintext[0]);
|
expect((await reader.peekBytes(plaintext[0].length * 4)).toString('utf8').substr(0, plaintext[0].length)).to.equal(plaintext[0]);
|
||||||
dataArrived();
|
|
||||||
expect((await reader.readToEnd()).toString('utf8')).to.equal(util.concat(plaintext));
|
expect((await reader.readToEnd()).toString('utf8')).to.equal(util.concat(plaintext));
|
||||||
|
|
||||||
});
|
});
|
||||||
|
@ -895,9 +1045,12 @@ function tests() {
|
||||||
} else {
|
} else {
|
||||||
Object.defineProperty(navigator, 'hardwareConcurrency', { value: 1, configurable: true });
|
Object.defineProperty(navigator, 'hardwareConcurrency', { value: 1, configurable: true });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const { dataStream, expectedType, dataArrived, dataChunks } = getLargeDataStream();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
expect(stream.isStream(encrypted)).to.equal(expectedType);
|
||||||
|
@ -909,10 +1062,10 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.readBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
await new Promise(resolve => { setTimeout(resolve, 3000); });
|
||||||
expect(i).to.be.lessThan(expectedType === 'web' ? 50 : 300);
|
expect(dataChunks.length).to.be.lessThan(expectedType === 'web' ? 50 : 300);
|
||||||
} finally {
|
} finally {
|
||||||
if (detectNode()) {
|
if (detectNode()) {
|
||||||
coresStub.restore();
|
coresStub.restore();
|
||||||
|
@ -923,8 +1076,10 @@ function tests() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Input stream should be canceled when canceling decrypted stream (AEAD)', async function() {
|
it('Input stream should be canceled when canceling decrypted stream (AEAD)', async function() {
|
||||||
|
const { dataStream, expectedType, dataChunks, dataArrived, isCanceled } = getLargeDataStream();
|
||||||
|
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
message: await openpgp.createMessage({ binary: data }),
|
message: await openpgp.createMessage({ binary: dataStream }),
|
||||||
passwords: ['test']
|
passwords: ['test']
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -936,19 +1091,17 @@ function tests() {
|
||||||
});
|
});
|
||||||
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
expect(stream.isStream(decrypted.data)).to.equal(expectedType);
|
||||||
const reader = stream.getReader(decrypted.data);
|
const reader = stream.getReader(decrypted.data);
|
||||||
expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]);
|
expect(await reader.readBytes(1024)).to.deep.equal(dataChunks[0]);
|
||||||
dataArrived();
|
dataArrived();
|
||||||
reader.releaseLock();
|
reader.releaseLock();
|
||||||
await stream.cancel(decrypted.data, new Error('canceled by test'));
|
await stream.cancel(decrypted.data, new Error('canceled by test'));
|
||||||
await new Promise(setTimeout);
|
await new Promise(setTimeout);
|
||||||
expect(canceled).to.be.true;
|
expect(isCanceled()).to.be.true;
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = () => describe('Streaming', function() {
|
module.exports = () => describe('Streaming', function() {
|
||||||
let currentTest = 0;
|
|
||||||
|
|
||||||
before(async function() {
|
before(async function() {
|
||||||
pubKey = await openpgp.readKey({ armoredKey: pub_key });
|
pubKey = await openpgp.readKey({ armoredKey: pub_key });
|
||||||
privKey = await openpgp.decryptKey({
|
privKey = await openpgp.decryptKey({
|
||||||
|
@ -959,63 +1112,12 @@ module.exports = () => describe('Streaming', function() {
|
||||||
await stream.loadStreamsPonyfill();
|
await stream.loadStreamsPonyfill();
|
||||||
});
|
});
|
||||||
|
|
||||||
beforeEach(function() {
|
|
||||||
const test = ++currentTest;
|
|
||||||
|
|
||||||
const dataArrivedPromise = new Promise(resolve => {
|
|
||||||
dataArrived = resolve;
|
|
||||||
});
|
|
||||||
plaintext = [];
|
|
||||||
i = 0;
|
|
||||||
canceled = false;
|
|
||||||
data = global.ReadableStream ? new global.ReadableStream({
|
|
||||||
async pull(controller) {
|
|
||||||
await new Promise(setTimeout);
|
|
||||||
if (test === currentTest && i < (expectedType === 'web' ? 100 : 500)) {
|
|
||||||
i++;
|
|
||||||
if (i === 4) await dataArrivedPromise;
|
|
||||||
const randomBytes = random.getRandomBytes(1024);
|
|
||||||
controller.enqueue(randomBytes);
|
|
||||||
plaintext.push(randomBytes);
|
|
||||||
} else {
|
|
||||||
controller.close();
|
|
||||||
}
|
|
||||||
},
|
|
||||||
cancel() {
|
|
||||||
canceled = true;
|
|
||||||
}
|
|
||||||
}, new ByteLengthQueuingStrategy({
|
|
||||||
highWaterMark: 1024
|
|
||||||
})) : new NodeReadableStream({
|
|
||||||
highWaterMark: 1024,
|
|
||||||
async read() {
|
|
||||||
while (true) {
|
|
||||||
await new Promise(setTimeout);
|
|
||||||
if (test === currentTest && i < (expectedType === 'web' ? 100 : 500)) {
|
|
||||||
i++;
|
|
||||||
if (i === 4) await dataArrivedPromise;
|
|
||||||
const randomBytes = random.getRandomBytes(1024);
|
|
||||||
plaintext.push(randomBytes);
|
|
||||||
if (!this.push(randomBytes)) break;
|
|
||||||
} else {
|
|
||||||
return this.push(null);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
destroy() {
|
|
||||||
canceled = true;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
expectedType = global.ReadableStream ? 'web' : 'node';
|
|
||||||
});
|
|
||||||
|
|
||||||
tests();
|
tests();
|
||||||
|
|
||||||
if (detectNode()) {
|
if (detectNode()) {
|
||||||
const fs = require('fs');
|
const fs = require('fs');
|
||||||
|
|
||||||
it('Node: Encrypt and decrypt text message roundtrip', async function() {
|
it('Node: Encrypt and decrypt text message roundtrip', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js'), 'utf8'); // eslint-disable-line no-sync
|
const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js'), 'utf8'); // eslint-disable-line no-sync
|
||||||
const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js'), { encoding: 'utf8' });
|
const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js'), { encoding: 'utf8' });
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
|
@ -1034,7 +1136,6 @@ module.exports = () => describe('Streaming', function() {
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Node: Encrypt and decrypt binary message roundtrip', async function() {
|
it('Node: Encrypt and decrypt binary message roundtrip', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
|
||||||
const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js')); // eslint-disable-line no-sync
|
const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js')); // eslint-disable-line no-sync
|
||||||
const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js'));
|
const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js'));
|
||||||
const encrypted = await openpgp.encrypt({
|
const encrypted = await openpgp.encrypt({
|
||||||
|
|
Loading…
Reference in New Issue
Block a user