From 5299561aa35a34282c1a9cc979cf81d498ea933d Mon Sep 17 00:00:00 2001 From: Daniel Huigens Date: Sun, 28 Mar 2021 16:05:33 +0200 Subject: [PATCH] Clean up async function JSDocs --- src/cleartext.js | 2 +- src/crypto/crypto.js | 10 ++++----- src/crypto/pkcs1.js | 2 +- src/crypto/public_key/dsa.js | 2 +- src/crypto/public_key/elgamal.js | 4 ++-- src/crypto/public_key/elliptic/ecdsa.js | 6 ++++-- src/crypto/public_key/elliptic/eddsa.js | 6 ++++-- src/crypto/public_key/rsa.js | 6 +++--- src/crypto/random.js | 4 ++-- src/crypto/signature.js | 6 +++--- src/key/key.js | 20 +++++++++++------- src/key/user.js | 6 ++++-- src/message.js | 28 +++++++++++++++---------- src/openpgp.js | 4 +++- src/packet/aead_encrypted_data.js | 2 +- src/packet/literal_data.js | 3 ++- src/signature.js | 2 +- src/type/s2k.js | 3 ++- 18 files changed, 69 insertions(+), 47 deletions(-) diff --git a/src/cleartext.js b/src/cleartext.js index 7459d50b..6174a896 100644 --- a/src/cleartext.js +++ b/src/cleartext.js @@ -128,7 +128,7 @@ export class CleartextMessage { * @param {Object} options * @param {String} options.cleartextMessage - Text to be parsed * @param {Object} [options.config] - Custom configuration settings to overwrite those in [config]{@link module:config} - * @returns {CleartextMessage} New cleartext message object. + * @returns {Promise} New cleartext message object. * @async * @static */ diff --git a/src/crypto/crypto.js b/src/crypto/crypto.js index 8cacbb3d..27bbdd20 100644 --- a/src/crypto/crypto.js +++ b/src/crypto/crypto.js @@ -41,7 +41,7 @@ import { Curve } from './public_key/elliptic/curves'; * @param {Object} publicParams - Algorithm-specific public key parameters * @param {Uint8Array} data - Data to be encrypted * @param {Uint8Array} fingerprint - Recipient fingerprint - * @returns {Object} Encrypted session key parameters. + * @returns {Promise} Encrypted session key parameters. * @async */ export async function publicKeyEncrypt(algo, publicParams, data, fingerprint) { @@ -75,7 +75,7 @@ export async function publicKeyEncrypt(algo, publicParams, data, fingerprint) { * @param {Object} privateKeyParams - Algorithm-specific private key parameters * @param {Object} sessionKeyParams - Encrypted session key parameters * @param {Uint8Array} fingerprint - Recipient fingerprint - * @returns {Uint8Array} Decrypted data. + * @returns {Promise} Decrypted data. * @async */ export async function publicKeyDecrypt(algo, publicKeyParams, privateKeyParams, sessionKeyParams, fingerprint) { @@ -253,7 +253,7 @@ export function serializeParams(algo, params) { * @param {module:enums.publicKey} algo - The public key algorithm * @param {Integer} bits - Bit length for RSA keys * @param {module:type/oid} oid - Object identifier for ECC keys - * @returns {{ publicParams: {Object}, privateParams: {Object} }} The parameters referenced by name. + * @returns {Promise<{ publicParams: {Object}, privateParams: {Object} }>} The parameters referenced by name. * @async */ export function generateParams(algo, bits, oid) { @@ -344,7 +344,7 @@ export async function validateParams(algo, publicParams, privateParams) { * Generates a random byte prefix for the specified algorithm * See {@link https://tools.ietf.org/html/rfc4880#section-9.2|RFC 4880 9.2} for algorithms. * @param {module:enums.symmetric} algo - Symmetric encryption algorithm - * @returns {Uint8Array} Random bytes with length equal to the block size of the cipher, plus the last two bytes repeated. + * @returns {Promise} Random bytes with length equal to the block size of the cipher, plus the last two bytes repeated. * @async */ export async function getPrefixRandom(algo) { @@ -357,7 +357,7 @@ export async function getPrefixRandom(algo) { * Generating a session key for the specified symmetric algorithm * See {@link https://tools.ietf.org/html/rfc4880#section-9.2|RFC 4880 9.2} for algorithms. * @param {module:enums.symmetric} algo - Symmetric encryption algorithm - * @returns {Uint8Array} Random bytes as a string to be used as a key. + * @returns {Promise} Random bytes as a string to be used as a key. * @async */ export function generateSessionKey(algo) { diff --git a/src/crypto/pkcs1.js b/src/crypto/pkcs1.js index 2fa3d5ae..7773b62c 100644 --- a/src/crypto/pkcs1.js +++ b/src/crypto/pkcs1.js @@ -49,7 +49,7 @@ hash_headers[11] = [0x30, 0x2d, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, * Create padding with secure random data * @private * @param {Integer} length - Length of the padding in bytes - * @returns {Uint8Array} Random padding. + * @returns {Promise} Random padding. * @async */ async function getPKCS1Padding(length) { diff --git a/src/crypto/public_key/dsa.js b/src/crypto/public_key/dsa.js index d8190995..3ac8db82 100644 --- a/src/crypto/public_key/dsa.js +++ b/src/crypto/public_key/dsa.js @@ -38,7 +38,7 @@ import { isProbablePrime } from './prime'; * @param {Uint8Array} p * @param {Uint8Array} q * @param {Uint8Array} x - * @returns {{ r: Uint8Array, s: Uint8Array }} + * @returns {Promise<{ r: Uint8Array, s: Uint8Array >}} * @async */ export async function sign(hashAlgo, hashed, g, p, q, x) { diff --git a/src/crypto/public_key/elgamal.js b/src/crypto/public_key/elgamal.js index 511bf463..5c67677d 100644 --- a/src/crypto/public_key/elgamal.js +++ b/src/crypto/public_key/elgamal.js @@ -32,7 +32,7 @@ import { emeEncode, emeDecode } from '../pkcs1'; * @param {Uint8Array} p * @param {Uint8Array} g * @param {Uint8Array} y - * @returns {{ c1: Uint8Array, c2: Uint8Array }} + * @returns {Promise<{ c1: Uint8Array, c2: Uint8Array >}} * @async */ export async function encrypt(data, p, g, y) { @@ -59,7 +59,7 @@ export async function encrypt(data, p, g, y) { * @param {Uint8Array} c2 * @param {Uint8Array} p * @param {Uint8Array} x - * @returns {Uint8Array} Unpadded message. + * @returns {Promise} Unpadded message. * @async */ export async function decrypt(c1, c2, p, x) { diff --git a/src/crypto/public_key/elliptic/ecdsa.js b/src/crypto/public_key/elliptic/ecdsa.js index e5fb82bf..099eeb95 100644 --- a/src/crypto/public_key/elliptic/ecdsa.js +++ b/src/crypto/public_key/elliptic/ecdsa.js @@ -39,8 +39,10 @@ const nodeCrypto = util.getNodeCrypto(); * @param {Uint8Array} publicKey - Public key * @param {Uint8Array} privateKey - Private key used to sign the message * @param {Uint8Array} hashed - The hashed message - * @returns {{r: Uint8Array, - * s: Uint8Array}} Signature of the message + * @returns {Promise<{ + * r: Uint8Array, + * s: Uint8Array + * }>} Signature of the message * @async */ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) { diff --git a/src/crypto/public_key/elliptic/eddsa.js b/src/crypto/public_key/elliptic/eddsa.js index 5d476ce1..45183c3d 100644 --- a/src/crypto/public_key/elliptic/eddsa.js +++ b/src/crypto/public_key/elliptic/eddsa.js @@ -37,8 +37,10 @@ nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest()); * @param {Uint8Array} publicKey - Public key * @param {Uint8Array} privateKey - Private key used to sign the message * @param {Uint8Array} hashed - The hashed message - * @returns {{r: Uint8Array, - * s: Uint8Array}} Signature of the message + * @returns {Promise<{ + * r: Uint8Array, + * s: Uint8Array + * }>} Signature of the message * @async */ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) { diff --git a/src/crypto/public_key/rsa.js b/src/crypto/public_key/rsa.js index 69566959..95e9aad6 100644 --- a/src/crypto/public_key/rsa.js +++ b/src/crypto/public_key/rsa.js @@ -80,7 +80,7 @@ const RSAPublicKey = util.detectNode() ? asn1.define('RSAPubliceKey', function ( * @param {Uint8Array} q - RSA private prime q * @param {Uint8Array} u - RSA private coefficient * @param {Uint8Array} hashed - Hashed message - * @returns {Uint8Array} RSA Signature. + * @returns {Promise} RSA Signature. * @async */ export async function sign(hashAlgo, data, n, e, d, p, q, u, hashed) { @@ -129,7 +129,7 @@ export async function verify(hashAlgo, data, s, n, e, hashed) { * @param {Uint8Array} data - Message * @param {Uint8Array} n - RSA public modulus * @param {Uint8Array} e - RSA public exponent - * @returns {Uint8Array} RSA Ciphertext. + * @returns {Promise} RSA Ciphertext. * @async */ export async function encrypt(data, n, e) { @@ -148,7 +148,7 @@ export async function encrypt(data, n, e) { * @param {Uint8Array} p - RSA private prime p * @param {Uint8Array} q - RSA private prime q * @param {Uint8Array} u - RSA private coefficient - * @returns {String} RSA Plaintext. + * @returns {Promise} RSA Plaintext. * @async */ export async function decrypt(data, n, e, d, p, q, u) { diff --git a/src/crypto/random.js b/src/crypto/random.js index 006685b9..0c6927db 100644 --- a/src/crypto/random.js +++ b/src/crypto/random.js @@ -96,7 +96,7 @@ class RandomBuffer { /** * Retrieve secure random byte array of the specified length * @param {Integer} length - Length in bytes to generate - * @returns {Uint8Array} Random byte array. + * @returns {Promise} Random byte array. * @async */ export async function getRandomBytes(length) { @@ -120,7 +120,7 @@ export async function getRandomBytes(length) { * Create a secure random BigInteger that is greater than or equal to min and less than max. * @param {module:BigInteger} min - Lower bound, included * @param {module:BigInteger} max - Upper bound, excluded - * @returns {module:BigInteger} Random BigInteger. + * @returns {Promise} Random BigInteger. * @async */ export async function getRandomBigInteger(min, max) { diff --git a/src/crypto/signature.js b/src/crypto/signature.js index 4358f45e..012db203 100644 --- a/src/crypto/signature.js +++ b/src/crypto/signature.js @@ -16,7 +16,7 @@ import util from '../util'; * See {@link https://tools.ietf.org/html/rfc4880#section-5.2.2|RFC 4880 5.2.2.} * @param {module:enums.publicKey} algo - Public key algorithm * @param {Uint8Array} signature - Data for which the signature was created - * @returns {Object} True if signature is valid. + * @returns {Promise} True if signature is valid. * @async */ export function parseSignatureParams(algo, signature) { @@ -70,7 +70,7 @@ export function parseSignatureParams(algo, signature) { * @param {Object} publicParams - Algorithm-specific public key parameters * @param {Uint8Array} data - Data for which the signature was created * @param {Uint8Array} hashed - The hashed data - * @returns {Boolean} True if signature is valid. + * @returns {Promise} True if signature is valid. * @async */ export async function verify(algo, hashAlgo, signature, publicParams, data, hashed) { @@ -116,7 +116,7 @@ export async function verify(algo, hashAlgo, signature, publicParams, data, hash * @param {Object} privateKeyParams - Algorithm-specific public and private key parameters * @param {Uint8Array} data - Data to be signed * @param {Uint8Array} hashed - The hashed data - * @returns {Object} Signature Object containing named signature parameters. + * @returns {Promise} Signature Object containing named signature parameters. * @async */ export async function sign(algo, hashAlgo, publicKeyParams, privateKeyParams, data, hashed) { diff --git a/src/key/key.js b/src/key/key.js index 4df16c6d..44240da4 100644 --- a/src/key/key.js +++ b/src/key/key.js @@ -627,8 +627,10 @@ class Key { * @param {Date} [date] - Use the given date for verification instead of the current time * @param {Object} [userID] - User ID to get instead of the primary user, if it exists * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {Promise<{user: User, - * selfCertification: SignaturePacket}>} The primary user and the self signature + * @returns {Promise<{ + * user: User, + * selfCertification: SignaturePacket + * }>} The primary user and the self signature * @async */ async getPrimaryUser(date = new Date(), userID = {}, config = defaultConfig) { @@ -862,8 +864,10 @@ class Key { * @param {Date} [date] - Use the given date for verification instead of the current time * @param {Object} [userID] - User ID to get instead of the primary user, if it exists * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {Promise>} List of signer's keyID and validity of signature + * @returns {Promise>} List of signer's keyID and validity of signature * @async */ async verifyPrimaryUser(keys, date, userID, config = defaultConfig) { @@ -880,9 +884,11 @@ class Key { * - otherwise, verifies all certificates signed with given keys. * @param {Array} keys - array of keys to verify certificate signatures * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {Promise>} list of userID, signer's keyID and validity of signature + * @returns {Promise>} List of userID, signer's keyID and validity of signature * @async */ async verifyAllUsers(keys, config = defaultConfig) { diff --git a/src/key/user.js b/src/key/user.js index e800514e..1bd14d43 100644 --- a/src/key/user.js +++ b/src/key/user.js @@ -141,8 +141,10 @@ class User { * @param {Array} keys - Array of keys to verify certificate signatures * @param {Date} date - Use the given date instead of the current time * @param {Object} config - Full configuration - * @returns {Promise>} List of signer's keyID and validity of signature + * @returns {Promise>} List of signer's keyID and validity of signature * @async */ async verifyAllCertifications(primaryKey, keys, date = new Date(), config) { diff --git a/src/message.js b/src/message.js index 23243153..1416aa17 100644 --- a/src/message.js +++ b/src/message.js @@ -158,10 +158,12 @@ export class Message { * @param {Array} [privateKeys] - Private keys with decrypted secret data * @param {Array} [passwords] - Passwords used to decrypt * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {Promise>} array of object with potential sessionKey, algorithm pairs - * @async - */ + * @returns {Promise>} array of object with potential sessionKey, algorithm pairs + * @async + */ async decryptSessionKeys(privateKeys, passwords, config = defaultConfig) { let keyPackets = []; @@ -698,9 +700,11 @@ export async function createSignaturePackets(literalDataPacket, privateKeys, sig * i.e. check signature creation time < date < expiration time * @param {Boolean} [detached] - Whether to verify detached signature packets * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {{keyID: module:type/keyid~KeyID, - * signature: Promise, - * verified: Promise}} signer's keyID and validity of signature + * @returns {Promise<{ + * keyID: module:type/keyid~KeyID, + * signature: Promise, + * verified: Promise + * }>} signer's keyID and validity of signature * @async * @private */ @@ -772,9 +776,11 @@ async function createVerificationObject(signature, literalDataList, keys, date = * i.e. check signature creation time < date < expiration time * @param {Boolean} [detached] - Whether to verify detached signature packets * @param {Object} [config] - Full configuration, defaults to openpgp.config - * @returns {Array<{keyID: module:type/keyid~KeyID, - * signature: Promise, - * verified: Promise}>} list of signer's keyID and validity of signatures + * @returns {Promise, + * verified: Promise + * }>>} list of signer's keyID and validity of signatures * @async * @private */ @@ -835,7 +841,7 @@ export async function readMessage({ armoredMessage, binaryMessage, config }) { * @param {String} [options.filename=""] - Name of the file (if any) * @param {Date} [options.date=current date] - Date of the message, or modification date of the file * @param {'utf8'|'binary'|'text'|'mime'} [options.format='utf8' if text is passed, 'binary' otherwise] - Data packet type - * @returns {Message} New message object. + * @returns {Promise} New message object. * @async * @static */ diff --git a/src/openpgp.js b/src/openpgp.js index af6fc8b7..760cb4a5 100644 --- a/src/openpgp.js +++ b/src/openpgp.js @@ -550,7 +550,8 @@ function toArray(param) { * @param {Object} data - the data to convert * @param {'web'|'ponyfill'|'node'|false} streaming - Whether to return a ReadableStream, and of what type * @param {'utf8'|'binary'} [encoding] - How to return data in Node Readable streams - * @returns {Object} The data in the respective format. + * @returns {Promise} The data in the respective format. + * @async * @private */ async function convertStream(data, streaming, encoding = 'utf8') { @@ -596,6 +597,7 @@ function linkStreams(result, message) { /** * Wait until signature objects have been verified * @param {Object} signatures - list of signatures + * @async * @private */ async function prepareSignatures(signatures) { diff --git a/src/packet/aead_encrypted_data.js b/src/packet/aead_encrypted_data.js index 052529cc..0cd0464c 100644 --- a/src/packet/aead_encrypted_data.js +++ b/src/packet/aead_encrypted_data.js @@ -119,7 +119,7 @@ class AEADEncryptedDataPacket { * @param {encrypt|decrypt} fn - Whether to encrypt or decrypt * @param {Uint8Array} key - The session key used to en/decrypt the payload * @param {Uint8Array | ReadableStream} data - The data to en/decrypt - * @returns {Uint8Array | ReadableStream} + * @returns {Promise>} * @async */ async crypt(fn, key, data) { diff --git a/src/packet/literal_data.js b/src/packet/literal_data.js index 9534627b..6b6a8a98 100644 --- a/src/packet/literal_data.js +++ b/src/packet/literal_data.js @@ -117,7 +117,8 @@ class LiteralDataPacket { * Parsing function for a literal data packet (tag 11). * * @param {Uint8Array | ReadableStream} input - Payload of a tag 11 packet - * @returns {LiteralDataPacket} Object representation. + * @returns {Promise} Object representation. + * @async */ async read(bytes) { await stream.parse(bytes, async reader => { diff --git a/src/signature.js b/src/signature.js index c9ce147f..e2fc32eb 100644 --- a/src/signature.js +++ b/src/signature.js @@ -59,7 +59,7 @@ export class Signature { * @param {String} [options.armoredSignature] - Armored signature to be parsed * @param {Uint8Array} [options.binarySignature] - Binary signature to be parsed * @param {Object} [options.config] - Custom configuration settings to overwrite those in [config]{@link module:config} - * @returns {Signature} New signature object. + * @returns {Promise} New signature object. * @async * @static */ diff --git a/src/type/s2k.js b/src/type/s2k.js index a29183df..f41d8677 100644 --- a/src/type/s2k.js +++ b/src/type/s2k.js @@ -143,8 +143,9 @@ class S2K { * Produces a key using the specified passphrase and the defined * hashAlgorithm * @param {String} passphrase - Passphrase containing user input - * @returns {Uint8Array} Produced key with a length corresponding to. + * @returns {Promise} Produced key with a length corresponding to. * hashAlgorithm hash length + * @async */ async produceKey(passphrase, numBytes) { passphrase = util.encodeUTF8(passphrase);