crypto-refresh
: add support for new Ed25519 key and signature format
This addition is backwards compatible. We offer no way to generate v4 keys in the new format.
This commit is contained in:
parent
b6170aa40d
commit
3f44082457
|
@ -145,7 +145,8 @@ export function parsePublicKeyParams(algo, bytes) {
|
||||||
const Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
const Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
||||||
return { read: read, publicParams: { oid, Q } };
|
return { read: read, publicParams: { oid, Q } };
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy: {
|
||||||
const oid = new OID(); read += oid.read(bytes);
|
const oid = new OID(); read += oid.read(bytes);
|
||||||
checkSupportedCurve(oid);
|
checkSupportedCurve(oid);
|
||||||
let Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
let Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
||||||
|
@ -159,6 +160,10 @@ export function parsePublicKeyParams(algo, bytes) {
|
||||||
const kdfParams = new KDFParams(); read += kdfParams.read(bytes.subarray(read));
|
const kdfParams = new KDFParams(); read += kdfParams.read(bytes.subarray(read));
|
||||||
return { read: read, publicParams: { oid, Q, kdfParams } };
|
return { read: read, publicParams: { oid, Q, kdfParams } };
|
||||||
}
|
}
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const A = bytes.subarray(read, read + 32); read += A.length;
|
||||||
|
return { read, publicParams: { A } };
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
throw new UnsupportedError('Unknown public key encryption algorithm.');
|
throw new UnsupportedError('Unknown public key encryption algorithm.');
|
||||||
}
|
}
|
||||||
|
@ -195,12 +200,17 @@ export function parsePrivateKeyParams(algo, bytes, publicParams) {
|
||||||
d = util.leftPad(d, curve.payloadSize);
|
d = util.leftPad(d, curve.payloadSize);
|
||||||
return { read, privateParams: { d } };
|
return { read, privateParams: { d } };
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy: {
|
||||||
const curve = new Curve(publicParams.oid);
|
const curve = new Curve(publicParams.oid);
|
||||||
let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2;
|
let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2;
|
||||||
seed = util.leftPad(seed, curve.payloadSize);
|
seed = util.leftPad(seed, curve.payloadSize);
|
||||||
return { read, privateParams: { seed } };
|
return { read, privateParams: { seed } };
|
||||||
}
|
}
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const seed = bytes.subarray(read, read + 32); read += seed.length;
|
||||||
|
return { read, privateParams: { seed } };
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
throw new UnsupportedError('Unknown public key encryption algorithm.');
|
throw new UnsupportedError('Unknown public key encryption algorithm.');
|
||||||
}
|
}
|
||||||
|
@ -250,9 +260,12 @@ export function parseEncSessionKeyParams(algo, bytes) {
|
||||||
* @returns {Uint8Array} The array containing the MPIs.
|
* @returns {Uint8Array} The array containing the MPIs.
|
||||||
*/
|
*/
|
||||||
export function serializeParams(algo, params) {
|
export function serializeParams(algo, params) {
|
||||||
|
// Some algorithms do not rely on MPIs to store the binary params
|
||||||
|
const algosWithNativeRepresentation = new Set([enums.publicKey.ed25519]);
|
||||||
const orderedParams = Object.keys(params).map(name => {
|
const orderedParams = Object.keys(params).map(name => {
|
||||||
const param = params[name];
|
const param = params[name];
|
||||||
return util.isUint8Array(param) ? util.uint8ArrayToMPI(param) : param.write();
|
if (!util.isUint8Array(param)) return param.write();
|
||||||
|
return algosWithNativeRepresentation.has(algo) ? param : util.uint8ArrayToMPI(param);
|
||||||
});
|
});
|
||||||
return util.concatUint8Array(orderedParams);
|
return util.concatUint8Array(orderedParams);
|
||||||
}
|
}
|
||||||
|
@ -281,6 +294,7 @@ export function generateParams(algo, bits, oid) {
|
||||||
publicParams: { oid: new OID(oid), Q }
|
publicParams: { oid: new OID(oid), Q }
|
||||||
}));
|
}));
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy:
|
||||||
return publicKey.elliptic.generate(oid).then(({ oid, Q, secret }) => ({
|
return publicKey.elliptic.generate(oid).then(({ oid, Q, secret }) => ({
|
||||||
privateParams: { seed: secret },
|
privateParams: { seed: secret },
|
||||||
publicParams: { oid: new OID(oid), Q }
|
publicParams: { oid: new OID(oid), Q }
|
||||||
|
@ -294,6 +308,11 @@ export function generateParams(algo, bits, oid) {
|
||||||
kdfParams: new KDFParams({ hash, cipher })
|
kdfParams: new KDFParams({ hash, cipher })
|
||||||
}
|
}
|
||||||
}));
|
}));
|
||||||
|
case enums.publicKey.ed25519:
|
||||||
|
return publicKey.elliptic.eddsa.generate(algo).then(({ A, seed }) => ({
|
||||||
|
privateParams: { seed },
|
||||||
|
publicParams: { A }
|
||||||
|
}));
|
||||||
case enums.publicKey.dsa:
|
case enums.publicKey.dsa:
|
||||||
case enums.publicKey.elgamal:
|
case enums.publicKey.elgamal:
|
||||||
throw new Error('Unsupported algorithm for key generation.');
|
throw new Error('Unsupported algorithm for key generation.');
|
||||||
|
@ -339,10 +358,16 @@ export async function validateParams(algo, publicParams, privateParams) {
|
||||||
const { d } = privateParams;
|
const { d } = privateParams;
|
||||||
return algoModule.validateParams(oid, Q, d);
|
return algoModule.validateParams(oid, Q, d);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
const { oid, Q } = publicParams;
|
case enums.publicKey.ed25519Legacy: {
|
||||||
|
const { Q, oid } = publicParams;
|
||||||
const { seed } = privateParams;
|
const { seed } = privateParams;
|
||||||
return publicKey.elliptic.eddsa.validateParams(oid, Q, seed);
|
return publicKey.elliptic.eddsaLegacy.validateParams(oid, Q, seed);
|
||||||
|
}
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const { A } = publicParams;
|
||||||
|
const { seed } = privateParams;
|
||||||
|
return publicKey.elliptic.eddsa.validateParams(algo, A, seed);
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
throw new Error('Unknown public key algorithm.');
|
throw new Error('Unknown public key algorithm.');
|
||||||
|
|
|
@ -26,12 +26,30 @@ import nacl from '@openpgp/tweetnacl/nacl-fast-light';
|
||||||
import util from '../../../util';
|
import util from '../../../util';
|
||||||
import enums from '../../../enums';
|
import enums from '../../../enums';
|
||||||
import hash from '../../hash';
|
import hash from '../../hash';
|
||||||
|
import { getRandomBytes } from '../../random';
|
||||||
|
|
||||||
nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
|
nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Generate (non-legacy) EdDSA key
|
||||||
|
* @param {module:enums.publicKey} algo - Algorithm identifier
|
||||||
|
* @returns Promise<{ A, seed }>
|
||||||
|
*/
|
||||||
|
export async function generate(algo) {
|
||||||
|
switch (algo) {
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const seed = getRandomBytes(32);
|
||||||
|
const { publicKey: A } = nacl.sign.keyPair.fromSeed(seed);
|
||||||
|
return { A, seed };
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
throw new Error('Unsupported EdDSA algorithm');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Sign a message using the provided key
|
* Sign a message using the provided key
|
||||||
* @param {module:type/oid} oid - Elliptic curve object identifier
|
* @param {module:enums.publicKey} algo - Algorithm identifier
|
||||||
* @param {module:enums.hash} hashAlgo - Hash algorithm used to sign (must be sha256 or stronger)
|
* @param {module:enums.hash} hashAlgo - Hash algorithm used to sign (must be sha256 or stronger)
|
||||||
* @param {Uint8Array} message - Message to sign
|
* @param {Uint8Array} message - Message to sign
|
||||||
* @param {Uint8Array} publicKey - Public key
|
* @param {Uint8Array} publicKey - Public key
|
||||||
|
@ -43,55 +61,67 @@ nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
|
||||||
* }>} Signature of the message
|
* }>} Signature of the message
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) {
|
export async function sign(algo, hashAlgo, message, publicKey, privateKey, hashed) {
|
||||||
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
||||||
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
||||||
throw new Error('Hash algorithm too weak: sha256 or stronger is required for EdDSA.');
|
throw new Error('Hash algorithm too weak: sha256 or stronger is required for EdDSA.');
|
||||||
}
|
}
|
||||||
const secretKey = util.concatUint8Array([privateKey, publicKey.subarray(1)]);
|
switch (algo) {
|
||||||
const signature = nacl.sign.detached(hashed, secretKey);
|
case enums.publicKey.ed25519: {
|
||||||
// EdDSA signature params are returned in little-endian format
|
const secretKey = util.concatUint8Array([privateKey, publicKey]);
|
||||||
return {
|
const signature = nacl.sign.detached(hashed, secretKey);
|
||||||
r: signature.subarray(0, 32),
|
return { RS: signature };
|
||||||
s: signature.subarray(32)
|
}
|
||||||
};
|
case enums.publicKey.ed448:
|
||||||
|
default:
|
||||||
|
throw new Error('Unsupported EdDSA algorithm');
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Verifies if a signature is valid for a message
|
* Verifies if a signature is valid for a message
|
||||||
* @param {module:type/oid} oid - Elliptic curve object identifier
|
* @param {module:enums.publicKey} algo - Algorithm identifier
|
||||||
* @param {module:enums.hash} hashAlgo - Hash algorithm used in the signature
|
* @param {module:enums.hash} hashAlgo - Hash algorithm used in the signature
|
||||||
* @param {{r: Uint8Array,
|
* @param {{ RS: Uint8Array }} signature Signature to verify the message
|
||||||
s: Uint8Array}} signature Signature to verify the message
|
|
||||||
* @param {Uint8Array} m - Message to verify
|
* @param {Uint8Array} m - Message to verify
|
||||||
* @param {Uint8Array} publicKey - Public key used to verify the message
|
* @param {Uint8Array} publicKey - Public key used to verify the message
|
||||||
* @param {Uint8Array} hashed - The hashed message
|
* @param {Uint8Array} hashed - The hashed message
|
||||||
* @returns {Boolean}
|
* @returns {Boolean}
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function verify(oid, hashAlgo, { r, s }, m, publicKey, hashed) {
|
export async function verify(algo, hashAlgo, { RS }, m, publicKey, hashed) {
|
||||||
const signature = util.concatUint8Array([r, s]);
|
switch (algo) {
|
||||||
return nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1));
|
case enums.publicKey.ed25519: {
|
||||||
|
return nacl.sign.detached.verify(hashed, RS, publicKey);
|
||||||
|
}
|
||||||
|
case enums.publicKey.ed448:
|
||||||
|
default:
|
||||||
|
throw new Error('Unsupported EdDSA algorithm');
|
||||||
|
}
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* Validate EdDSA parameters
|
* Validate (non-legacy) EdDSA parameters
|
||||||
* @param {module:type/oid} oid - Elliptic curve object identifier
|
* @param {module:enums.publicKey} algo - Algorithm identifier
|
||||||
* @param {Uint8Array} Q - EdDSA public point
|
* @param {Uint8Array} A - EdDSA public point
|
||||||
* @param {Uint8Array} k - EdDSA secret seed
|
* @param {Uint8Array} k - EdDSA secret seed
|
||||||
|
* @param {Uint8Array} oid - (legacy only) EdDSA OID
|
||||||
* @returns {Promise<Boolean>} Whether params are valid.
|
* @returns {Promise<Boolean>} Whether params are valid.
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function validateParams(oid, Q, k) {
|
export async function validateParams(algo, A, k) {
|
||||||
// Check whether the given curve is supported
|
switch (algo) {
|
||||||
if (oid.getName() !== 'ed25519') {
|
case enums.publicKey.ed25519: {
|
||||||
return false;
|
/**
|
||||||
}
|
* Derive public point A' from private key
|
||||||
|
* and expect A == A'
|
||||||
|
*/
|
||||||
|
const { publicKey } = nacl.sign.keyPair.fromSeed(k);
|
||||||
|
return util.equalsUint8Array(A, publicKey);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
case enums.publicKey.ed448: // unsupported
|
||||||
* Derive public point Q' = dG from private key
|
default:
|
||||||
* and expect Q == Q'
|
return false;
|
||||||
*/
|
}
|
||||||
const { publicKey } = nacl.sign.keyPair.fromSeed(k);
|
|
||||||
const dG = new Uint8Array([0x40, ...publicKey]); // Add public key prefix
|
|
||||||
return util.equalsUint8Array(Q, dG);
|
|
||||||
}
|
}
|
||||||
|
|
99
src/crypto/public_key/elliptic/eddsa_legacy.js
Normal file
99
src/crypto/public_key/elliptic/eddsa_legacy.js
Normal file
|
@ -0,0 +1,99 @@
|
||||||
|
// OpenPGP.js - An OpenPGP implementation in javascript
|
||||||
|
// Copyright (C) 2018 Proton Technologies AG
|
||||||
|
//
|
||||||
|
// This library is free software; you can redistribute it and/or
|
||||||
|
// modify it under the terms of the GNU Lesser General Public
|
||||||
|
// License as published by the Free Software Foundation; either
|
||||||
|
// version 3.0 of the License, or (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This library is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
// Lesser General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Lesser General Public
|
||||||
|
// License along with this library; if not, write to the Free Software
|
||||||
|
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @fileoverview Implementation of legacy EdDSA following RFC4880bis-03 for OpenPGP.
|
||||||
|
* This key type has been deprecated by the crypto-refresh RFC.
|
||||||
|
* @module crypto/public_key/elliptic/eddsa_legacy
|
||||||
|
* @private
|
||||||
|
*/
|
||||||
|
|
||||||
|
import sha512 from 'hash.js/lib/hash/sha/512';
|
||||||
|
import nacl from '@openpgp/tweetnacl/nacl-fast-light';
|
||||||
|
import util from '../../../util';
|
||||||
|
import enums from '../../../enums';
|
||||||
|
import hash from '../../hash';
|
||||||
|
|
||||||
|
nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sign a message using the provided legacy EdDSA key
|
||||||
|
* @param {module:type/oid} oid - Elliptic curve object identifier
|
||||||
|
* @param {module:enums.hash} hashAlgo - Hash algorithm used to sign (must be sha256 or stronger)
|
||||||
|
* @param {Uint8Array} message - Message to sign
|
||||||
|
* @param {Uint8Array} publicKey - Public key
|
||||||
|
* @param {Uint8Array} privateKey - Private key used to sign the message
|
||||||
|
* @param {Uint8Array} hashed - The hashed message
|
||||||
|
* @returns {Promise<{
|
||||||
|
* r: Uint8Array,
|
||||||
|
* s: Uint8Array
|
||||||
|
* }>} Signature of the message
|
||||||
|
* @async
|
||||||
|
*/
|
||||||
|
export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) {
|
||||||
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
||||||
|
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
||||||
|
throw new Error('Hash algorithm too weak: sha256 or stronger is required for EdDSA.');
|
||||||
|
}
|
||||||
|
const secretKey = util.concatUint8Array([privateKey, publicKey.subarray(1)]);
|
||||||
|
const signature = nacl.sign.detached(hashed, secretKey);
|
||||||
|
// EdDSA signature params are returned in little-endian format
|
||||||
|
return {
|
||||||
|
r: signature.subarray(0, 32),
|
||||||
|
s: signature.subarray(32)
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verifies if a legacy EdDSA signature is valid for a message
|
||||||
|
* @param {module:type/oid} oid - Elliptic curve object identifier
|
||||||
|
* @param {module:enums.hash} hashAlgo - Hash algorithm used in the signature
|
||||||
|
* @param {{r: Uint8Array,
|
||||||
|
s: Uint8Array}} signature Signature to verify the message
|
||||||
|
* @param {Uint8Array} m - Message to verify
|
||||||
|
* @param {Uint8Array} publicKey - Public key used to verify the message
|
||||||
|
* @param {Uint8Array} hashed - The hashed message
|
||||||
|
* @returns {Boolean}
|
||||||
|
* @async
|
||||||
|
*/
|
||||||
|
export async function verify(oid, hashAlgo, { r, s }, m, publicKey, hashed) {
|
||||||
|
const signature = util.concatUint8Array([r, s]);
|
||||||
|
return nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1));
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Validate legacy EdDSA parameters
|
||||||
|
* @param {module:type/oid} oid - Elliptic curve object identifier
|
||||||
|
* @param {Uint8Array} Q - EdDSA public point
|
||||||
|
* @param {Uint8Array} k - EdDSA secret seed
|
||||||
|
* @returns {Promise<Boolean>} Whether params are valid.
|
||||||
|
* @async
|
||||||
|
*/
|
||||||
|
export async function validateParams(oid, Q, k) {
|
||||||
|
// Check whether the given curve is supported
|
||||||
|
if (oid.getName() !== 'ed25519') {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Derive public point Q' = dG from private key
|
||||||
|
* and expect Q == Q'
|
||||||
|
*/
|
||||||
|
const { publicKey } = nacl.sign.keyPair.fromSeed(k);
|
||||||
|
const dG = new Uint8Array([0x40, ...publicKey]); // Add public key prefix
|
||||||
|
return util.equalsUint8Array(Q, dG);
|
||||||
|
|
||||||
|
}
|
|
@ -27,9 +27,10 @@
|
||||||
|
|
||||||
import { Curve, generate, getPreferredHashAlgo } from './curves';
|
import { Curve, generate, getPreferredHashAlgo } from './curves';
|
||||||
import * as ecdsa from './ecdsa';
|
import * as ecdsa from './ecdsa';
|
||||||
|
import * as eddsaLegacy from './eddsa_legacy';
|
||||||
import * as eddsa from './eddsa';
|
import * as eddsa from './eddsa';
|
||||||
import * as ecdh from './ecdh';
|
import * as ecdh from './ecdh';
|
||||||
|
|
||||||
export {
|
export {
|
||||||
Curve, ecdh, ecdsa, eddsa, generate, getPreferredHashAlgo
|
Curve, ecdh, ecdsa, eddsaLegacy, eddsa, generate, getPreferredHashAlgo
|
||||||
};
|
};
|
||||||
|
|
|
@ -43,10 +43,11 @@ export function parseSignatureParams(algo, signature) {
|
||||||
const s = util.readMPI(signature.subarray(read));
|
const s = util.readMPI(signature.subarray(read));
|
||||||
return { r, s };
|
return { r, s };
|
||||||
}
|
}
|
||||||
// Algorithm-Specific Fields for EdDSA signatures:
|
// Algorithm-Specific Fields for legacy EdDSA signatures:
|
||||||
// - MPI of an EC point r.
|
// - MPI of an EC point r.
|
||||||
// - EdDSA value s, in MPI, in the little endian representation
|
// - EdDSA value s, in MPI, in the little endian representation
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy: {
|
||||||
// When parsing little-endian MPI data, we always need to left-pad it, as done with big-endian values:
|
// When parsing little-endian MPI data, we always need to left-pad it, as done with big-endian values:
|
||||||
// https://www.ietf.org/archive/id/draft-ietf-openpgp-rfc4880bis-10.html#section-3.2-9
|
// https://www.ietf.org/archive/id/draft-ietf-openpgp-rfc4880bis-10.html#section-3.2-9
|
||||||
let r = util.readMPI(signature.subarray(read)); read += r.length + 2;
|
let r = util.readMPI(signature.subarray(read)); read += r.length + 2;
|
||||||
|
@ -55,6 +56,12 @@ export function parseSignatureParams(algo, signature) {
|
||||||
s = util.leftPad(s, 32);
|
s = util.leftPad(s, 32);
|
||||||
return { r, s };
|
return { r, s };
|
||||||
}
|
}
|
||||||
|
// Algorithm-Specific Fields for Ed25519 signatures:
|
||||||
|
// - 64 octets of the native signature
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const RS = signature.subarray(read, read + 64); read += RS.length;
|
||||||
|
return { RS };
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
throw new UnsupportedError('Unknown signature algorithm.');
|
throw new UnsupportedError('Unknown signature algorithm.');
|
||||||
}
|
}
|
||||||
|
@ -96,10 +103,15 @@ export async function verify(algo, hashAlgo, signature, publicParams, data, hash
|
||||||
const s = util.leftPad(signature.s, curveSize);
|
const s = util.leftPad(signature.s, curveSize);
|
||||||
return publicKey.elliptic.ecdsa.verify(oid, hashAlgo, { r, s }, data, Q, hashed);
|
return publicKey.elliptic.ecdsa.verify(oid, hashAlgo, { r, s }, data, Q, hashed);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy: {
|
||||||
const { oid, Q } = publicParams;
|
const { oid, Q } = publicParams;
|
||||||
// signature already padded on parsing
|
// signature already padded on parsing
|
||||||
return publicKey.elliptic.eddsa.verify(oid, hashAlgo, signature, data, Q, hashed);
|
return publicKey.elliptic.eddsaLegacy.verify(oid, hashAlgo, signature, data, Q, hashed);
|
||||||
|
}
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const { A } = publicParams;
|
||||||
|
return publicKey.elliptic.eddsa.verify(algo, hashAlgo, signature, data, A, hashed);
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
throw new Error('Unknown signature algorithm.');
|
throw new Error('Unknown signature algorithm.');
|
||||||
|
@ -146,10 +158,16 @@ export async function sign(algo, hashAlgo, publicKeyParams, privateKeyParams, da
|
||||||
const { d } = privateKeyParams;
|
const { d } = privateKeyParams;
|
||||||
return publicKey.elliptic.ecdsa.sign(oid, hashAlgo, data, Q, d, hashed);
|
return publicKey.elliptic.ecdsa.sign(oid, hashAlgo, data, Q, d, hashed);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa: {
|
case enums.publicKey.eddsa:
|
||||||
|
case enums.publicKey.ed25519Legacy: {
|
||||||
const { oid, Q } = publicKeyParams;
|
const { oid, Q } = publicKeyParams;
|
||||||
const { seed } = privateKeyParams;
|
const { seed } = privateKeyParams;
|
||||||
return publicKey.elliptic.eddsa.sign(oid, hashAlgo, data, Q, seed, hashed);
|
return publicKey.elliptic.eddsaLegacy.sign(oid, hashAlgo, data, Q, seed, hashed);
|
||||||
|
}
|
||||||
|
case enums.publicKey.ed25519: {
|
||||||
|
const { A } = publicKeyParams;
|
||||||
|
const { seed } = privateKeyParams;
|
||||||
|
return publicKey.elliptic.eddsa.sign(algo, hashAlgo, data, A, seed, hashed);
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
throw new Error('Unknown signature algorithm.');
|
throw new Error('Unknown signature algorithm.');
|
||||||
|
|
17
src/enums.js
17
src/enums.js
|
@ -90,7 +90,7 @@ export default {
|
||||||
gnu: 101
|
gnu: 101
|
||||||
},
|
},
|
||||||
|
|
||||||
/** {@link https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-04#section-9.1|RFC4880bis-04, section 9.1}
|
/** {@link https://tools.ietf.org/html/draft-ietf-openpgp-crypto-refresh-08.html#section-9.1|crypto-refresh RFC, section 9.1}
|
||||||
* @enum {Integer}
|
* @enum {Integer}
|
||||||
* @readonly
|
* @readonly
|
||||||
*/
|
*/
|
||||||
|
@ -109,13 +109,22 @@ export default {
|
||||||
ecdh: 18,
|
ecdh: 18,
|
||||||
/** ECDSA (Sign only) [RFC6637] */
|
/** ECDSA (Sign only) [RFC6637] */
|
||||||
ecdsa: 19,
|
ecdsa: 19,
|
||||||
/** EdDSA (Sign only)
|
/** EdDSA (Sign only) - deprecated by crypto-refresh (replaced by `ed25519` identifier below)
|
||||||
* [{@link https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp-04|Draft RFC}] */
|
* [{@link https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp-04|Draft RFC}] */
|
||||||
eddsa: 22,
|
ed25519Legacy: 22, // NB: this is declared before `eddsa` to translate 22 to 'eddsa' for backwards compatibility
|
||||||
|
eddsa: 22, // to be deprecated in v6
|
||||||
/** Reserved for AEDH */
|
/** Reserved for AEDH */
|
||||||
aedh: 23,
|
aedh: 23,
|
||||||
/** Reserved for AEDSA */
|
/** Reserved for AEDSA */
|
||||||
aedsa: 24
|
aedsa: 24,
|
||||||
|
/** ECDH 25519 (encrypt only) */
|
||||||
|
x25519: 25,
|
||||||
|
/** ECDH 448 (encrypt only) */
|
||||||
|
x448: 26,
|
||||||
|
/** EdDSA 25519 (sign only) */
|
||||||
|
ed25519: 27,
|
||||||
|
/** EdDSA 448 (sign only) */
|
||||||
|
eddsa448: 28
|
||||||
},
|
},
|
||||||
|
|
||||||
/** {@link https://tools.ietf.org/html/rfc4880#section-9.2|RFC4880, section 9.2}
|
/** {@link https://tools.ietf.org/html/rfc4880#section-9.2|RFC4880, section 9.2}
|
||||||
|
|
|
@ -260,7 +260,7 @@ class PublicKeyPacket {
|
||||||
const modulo = this.publicParams.n || this.publicParams.p;
|
const modulo = this.publicParams.n || this.publicParams.p;
|
||||||
if (modulo) {
|
if (modulo) {
|
||||||
result.bits = util.uint8ArrayBitLength(modulo);
|
result.bits = util.uint8ArrayBitLength(modulo);
|
||||||
} else {
|
} else if (this.publicParams.oid) {
|
||||||
result.curve = this.publicParams.oid.getName();
|
result.curve = this.publicParams.oid.getName();
|
||||||
}
|
}
|
||||||
return result;
|
return result;
|
||||||
|
|
|
@ -87,7 +87,7 @@ async function generatePrivateKeyObject(options) {
|
||||||
|
|
||||||
/* eslint-disable no-invalid-this */
|
/* eslint-disable no-invalid-this */
|
||||||
module.exports = () => {
|
module.exports = () => {
|
||||||
describe('EdDSA parameter validation', function() {
|
describe('EdDSA parameter validation (legacy format)', function() {
|
||||||
let eddsaKey;
|
let eddsaKey;
|
||||||
before(async () => {
|
before(async () => {
|
||||||
eddsaKey = await generatePrivateKeyObject({ curve: 'ed25519' });
|
eddsaKey = await generatePrivateKeyObject({ curve: 'ed25519' });
|
||||||
|
|
|
@ -3012,6 +3012,22 @@ zWBsBR8VnoOVfEE+VQk6YAi7cTSjcMjfsIez9FYtAQDKo9aCMhUohYyqvhZjn8aS
|
||||||
})).to.be.rejectedWith(/Cannot read KDFParams/);
|
})).to.be.rejectedWith(/Cannot read KDFParams/);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('Parsing V4 key using new curve25519 format', async function() {
|
||||||
|
const privateKey = await openpgp.readKey({ armoredKey: `-----BEGIN PGP PRIVATE KEY BLOCK-----
|
||||||
|
|
||||||
|
xUkEZBw5PBscroGar9fsilA0q9AX979pBhTNkGQ69vQGGW7kxRxNuABB+eAw
|
||||||
|
JrQ9A3o1gUJg28ORTQd72+kFo87184qR97a6rRGFzQR0ZXN0wogEEBsIAD4F
|
||||||
|
gmQcOTwECwkHCAmQT/m+Rl22Ps8DFQgKBBYAAgECGQECmwMCHgEWIQSUlOfm
|
||||||
|
G7MWJd2909ZP+b5GXbY+zwAAVs/4pWH4l7pWcTATBavVqSATMKi4A+usp89G
|
||||||
|
J/qaHc+qmcEpIMmPNvLQ7n4F4kEXk8Zwz+OXovVWLQ+Njl5gzooF
|
||||||
|
=wYg1
|
||||||
|
-----END PGP PRIVATE KEY BLOCK-----` });
|
||||||
|
// sanity checks
|
||||||
|
await expect(privateKey.validate()).to.be.fulfilled;
|
||||||
|
const signingKey = await privateKey.getSigningKey();
|
||||||
|
expect(signingKey.keyPacket.algorithm).to.equal(openpgp.enums.publicKey.ed25519);
|
||||||
|
});
|
||||||
|
|
||||||
it('Testing key ID and fingerprint for V4 keys', async function() {
|
it('Testing key ID and fingerprint for V4 keys', async function() {
|
||||||
const pubKeysV4 = await openpgp.readKeys({ armoredKeys: twoKeys });
|
const pubKeysV4 = await openpgp.readKeys({ armoredKeys: twoKeys });
|
||||||
expect(pubKeysV4).to.exist;
|
expect(pubKeysV4).to.exist;
|
||||||
|
@ -4077,7 +4093,7 @@ XvmoLueOOShu01X/kaylMqaT8w==
|
||||||
await subkey.verify();
|
await subkey.verify();
|
||||||
});
|
});
|
||||||
|
|
||||||
it('sign/verify data with the new subkey correctly using curve25519', async function() {
|
it('sign/verify data with the new subkey correctly using curve25519 (legacy format)', async function() {
|
||||||
const userID = { name: 'test', email: 'a@b.com' };
|
const userID = { name: 'test', email: 'a@b.com' };
|
||||||
const opt = { curve: 'curve25519', userIDs: [userID], format: 'object', subkeys:[] };
|
const opt = { curve: 'curve25519', userIDs: [userID], format: 'object', subkeys:[] };
|
||||||
const { privateKey } = await openpgp.generateKey(opt);
|
const { privateKey } = await openpgp.generateKey(opt);
|
||||||
|
|
|
@ -4035,6 +4035,34 @@ bsZgJWVlAa5eil6J9ePX2xbo1vVAkLQdzE9+1jL+l7PRIZuVBQ==
|
||||||
expect(await verified.signatures[0].verified).to.be.true;
|
expect(await verified.signatures[0].verified).to.be.true;
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('sign/verify with new Ed25519 format', async function () {
|
||||||
|
// v4 key, which we do not support generating
|
||||||
|
const privateKey = await openpgp.readKey({ armoredKey: `-----BEGIN PGP PRIVATE KEY BLOCK-----
|
||||||
|
|
||||||
|
xUkEZBw5PBscroGar9fsilA0q9AX979pBhTNkGQ69vQGGW7kxRxNuABB+eAw
|
||||||
|
JrQ9A3o1gUJg28ORTQd72+kFo87184qR97a6rRGFzQR0ZXN0wogEEBsIAD4F
|
||||||
|
gmQcOTwECwkHCAmQT/m+Rl22Ps8DFQgKBBYAAgECGQECmwMCHgEWIQSUlOfm
|
||||||
|
G7MWJd2909ZP+b5GXbY+zwAAVs/4pWH4l7pWcTATBavVqSATMKi4A+usp89G
|
||||||
|
J/qaHc+qmcEpIMmPNvLQ7n4F4kEXk8Zwz+OXovVWLQ+Njl5gzooF
|
||||||
|
=wYg1
|
||||||
|
-----END PGP PRIVATE KEY BLOCK-----
|
||||||
|
` });
|
||||||
|
const plaintext = 'plaintext';
|
||||||
|
|
||||||
|
const signed = await openpgp.sign({
|
||||||
|
message: await openpgp.createMessage({ text: plaintext }),
|
||||||
|
signingKeys: privateKey
|
||||||
|
});
|
||||||
|
|
||||||
|
const { signatures, data } = await openpgp.verify({
|
||||||
|
message: await openpgp.readMessage({ armoredMessage: signed }),
|
||||||
|
verificationKeys: privateKey
|
||||||
|
});
|
||||||
|
expect(data).to.equal(plaintext);
|
||||||
|
expect(signatures).to.have.length(1);
|
||||||
|
expect(await signatures[0].verified).to.be.true;
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
describe('Errors', function() {
|
describe('Errors', function() {
|
||||||
|
|
|
@ -730,7 +730,7 @@ function tests() {
|
||||||
expect(await verified.signatures[0].verified).to.be.true;
|
expect(await verified.signatures[0].verified).to.be.true;
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Detached sign small message using x25519 curve keys', async function() {
|
it('Detached sign small message using curve25519 keys (legacy format)', async function() {
|
||||||
dataArrived(); // Do not wait until data arrived.
|
dataArrived(); // Do not wait until data arrived.
|
||||||
const data = global.ReadableStream ? new global.ReadableStream({
|
const data = global.ReadableStream ? new global.ReadableStream({
|
||||||
async start(controller) {
|
async start(controller) {
|
||||||
|
|
Loading…
Reference in New Issue
Block a user