Throw on decryption of messages that don't contain any encrypted data packet (#1529)
Calling `openpgp.decrypt` with a message that contains encrypted session keys followed by a non-encrypted packet (e.g. Literal or Compressed Data packet) used to succeed, even if a wrong passphrase/key was provided. With this change, the operation will always fail, and the user is warned that the data was not encrypted. NB: a message that did not contain any encrypted session key packet would fail to decrypt even prior to this change.
This commit is contained in:
parent
ef066183dd
commit
6c32b62ef3
|
@ -116,7 +116,7 @@ export class Message {
|
|||
);
|
||||
|
||||
if (symEncryptedPacketlist.length === 0) {
|
||||
return this;
|
||||
throw new Error('No encrypted data found');
|
||||
}
|
||||
|
||||
const symEncryptedPacket = symEncryptedPacketlist[0];
|
||||
|
|
|
@ -3825,17 +3825,22 @@ amnR6g==
|
|||
});
|
||||
});
|
||||
|
||||
describe('Sign and verify with each curve', function() {
|
||||
const curves = ['secp256k1' , 'p256', 'p384', 'p521', 'curve25519', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1'];
|
||||
curves.forEach(curve => {
|
||||
it(`sign/verify with ${curve}`, async function() {
|
||||
const config = { rejectCurves: new Set() };
|
||||
const plaintext = 'short message';
|
||||
const { privateKey: key } = await openpgp.generateKey({ curve, userIDs: { name: 'Alice', email: 'info@alice.com' }, format: 'object', config });
|
||||
const signed = await openpgp.sign({ signingKeys:[key], message: await openpgp.createCleartextMessage({ text: plaintext }), config });
|
||||
const verified = await openpgp.verify({ verificationKeys:[key], message: await openpgp.readCleartextMessage({ cleartextMessage: signed }), config });
|
||||
expect(await verified.signatures[0].verified).to.be.true;
|
||||
it('should fail to decrypt a message containing a literal packet (and no session key)', async function() {
|
||||
const message = await openpgp.createMessage({ text: 'plaintext' });
|
||||
await expect(openpgp.decrypt({ message, passwords: 'password' })).to.be.rejectedWith(/Error decrypting message/);
|
||||
});
|
||||
|
||||
it('should fail to decrypt a message containing a literal packet (and a session key)', async function() {
|
||||
const skeskPlusLiteralData = `-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wy4ECQMIjvrInhvTxJwAbkqXp+KWFdBcjoPn03jCdyspVi9qXBDbyGaP1lrM
|
||||
habAyxd1AGKaNp1wbGFpbnRleHQgbWVzc2FnZQ==
|
||||
=XoUx
|
||||
-----END PGP MESSAGE-----
|
||||
`;
|
||||
|
||||
const message = await openpgp.readMessage({ armoredMessage: skeskPlusLiteralData });
|
||||
await expect(openpgp.decrypt({ message, passwords: 'password' })).to.be.rejectedWith(/No encrypted data found/);
|
||||
});
|
||||
|
||||
it('should fail to decrypt non-integrity-protected message by default', async function() {
|
||||
|
@ -3941,6 +3946,19 @@ bsZgJWVlAa5eil6J9ePX2xbo1vVAkLQdzE9+1jL+l7PRIZuVBQ==
|
|||
const data = await stream.readToEnd(decrypted.data);
|
||||
expect(data).to.equal('test');
|
||||
});
|
||||
|
||||
describe('Sign and verify with each curve', function() {
|
||||
const curves = ['secp256k1' , 'p256', 'p384', 'p521', 'curve25519', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1'];
|
||||
curves.forEach(curve => {
|
||||
it(`sign/verify with ${curve}`, async function() {
|
||||
const config = { rejectCurves: new Set() };
|
||||
const plaintext = 'short message';
|
||||
const { privateKey: key } = await openpgp.generateKey({ curve, userIDs: { name: 'Alice', email: 'info@alice.com' }, format: 'object', config });
|
||||
const signed = await openpgp.sign({ signingKeys:[key], message: await openpgp.createCleartextMessage({ text: plaintext }), config });
|
||||
const verified = await openpgp.verify({ verificationKeys:[key], message: await openpgp.readCleartextMessage({ cleartextMessage: signed }), config });
|
||||
expect(await verified.signatures[0].verified).to.be.true;
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Errors', function() {
|
||||
|
|
Loading…
Reference in New Issue
Block a user