Use higher level functions in key validation tests (#1128)

Use `key.keyPacket.validate` instead of `crypto.publicKey.validateParams`, see
https://github.com/openpgpjs/openpgpjs/pull/1116#discussion_r447781386.

Also, `key.decrypt` now only throws on error, no other value is returned.

Also, fix typo (rebase error) that caused tests to fail in Safari for p521.
This commit is contained in:
larabr 2020-08-07 16:48:44 +02:00 committed by Daniel Huigens
parent 10aa1aa5cb
commit 8d67af729a
8 changed files with 261 additions and 214 deletions

View File

@ -65,7 +65,7 @@ async function sign(oid, hash_algo, message, publicKey, privateKey, hashed) {
if (curve.name !== 'p521' && (err.name === 'DataError' || err.name === 'OperationError')) {
throw err;
}
util.print_debug_error("Browser did not support signing: " + err.message);
util.printDebugError("Browser did not support signing: " + err.message);
}
break;
}
@ -108,7 +108,7 @@ async function verify(oid, hash_algo, signature, message, publicKey, hashed) {
if (curve.name !== 'p521' && (err.name === 'DataError' || err.name === 'OperationError')) {
throw err;
}
util.print_debug_error("Browser did not support verifying: " + err.message);
util.printDebugError("Browser did not support verifying: " + err.message);
}
break;
case 'node':

View File

@ -166,7 +166,7 @@ class Key {
/**
* Clones the key object
* @param {type/keyid} deep Whether to clone each packet, in addition to the list of packets
* @param {Boolean} deep Whether to clone each packet, in addition to the list of packets
* @returns {Promise<module:key.Key>} cloned key
* @async
*/
@ -424,7 +424,6 @@ class Key {
* Decrypts all secret key and subkey packets matching keyId
* @param {String|Array<String>} passphrases
* @param {module:type/keyid} keyId
* @returns {Promise<Boolean>} true if all matching key and subkey packets decrypted successfully
* @throws {Error} if any matching key or subkey packets did not decrypt successfully
* @async
*/
@ -434,7 +433,7 @@ class Key {
}
passphrases = util.isArray(passphrases) ? passphrases : [passphrases];
const results = await Promise.all(this.getKeys(keyId).map(async function(key) {
await Promise.all(this.getKeys(keyId).map(async function(key) {
let decrypted = false;
let error = null;
await Promise.all(passphrases.map(async function(passphrase) {
@ -457,8 +456,6 @@ class Key {
// The full key should be decrypted and we can validate it all
await this.validate();
}
return results.every(result => result === true);
}
/**

View File

@ -74,83 +74,122 @@ vqBGKJzmO5q3cECw
=X9kJ
-----END PGP PRIVATE KEY BLOCK-----`;
function cloneKeyPacket(key) {
const keyPacket = new openpgp.SecretKeyPacket();
keyPacket.read(key.keyPacket.write());
return keyPacket;
}
module.exports = () => {
describe('EdDSA parameter validation', function() {
let keyParams;
let eddsaKey;
before(async () => {
keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.eddsa, null, 'ed25519');
eddsaKey = (await openpgp.generateKey({ curve: 'ed25519', userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
});
it('EdDSA params should be valid', async function() {
const { oid, Q, seed } = openpgp.crypto.publicKey.elliptic.eddsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.eddsa.validateParams(oid, Q, seed);
expect(valid).to.be.true;
await expect(eddsaKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid edDSA Q', async function() {
const { oid, Q, seed } = openpgp.crypto.publicKey.elliptic.eddsa.parseParams(keyParams);
const eddsaKeyPacket = cloneKeyPacket(eddsaKey);
const Q = eddsaKeyPacket.params[1];
Q.data[0]++;
await expect(eddsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
Q[0]++;
let valid = await openpgp.crypto.publicKey.elliptic.eddsa.validateParams(oid, Q, seed);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.length);
valid = await openpgp.crypto.publicKey.elliptic.eddsa.validateParams(oid, infQ, seed);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.data.length);
eddsaKeyPacket.params[1] = new openpgp.MPI(infQ);
await expect(eddsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
describe('ECC curve validation', function() {
let eddsaKey;
let ecdhKey;
let ecdsaKey;
before(async () => {
eddsaKey = (await openpgp.generateKey({ curve: 'ed25519', userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
ecdhKey = eddsaKey.subKeys[0];
ecdsaKey = (await openpgp.generateKey({ curve: 'p256', userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
});
it('EdDSA params are not valid for ECDH', async function() {
const keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.eddsa,
null,
'ed25519'
);
const { oid, Q, seed } = openpgp.crypto.publicKey.elliptic.eddsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.ecdh.validateParams(oid, Q, seed);
expect(valid).to.be.false;
const oid = eddsaKey.keyPacket.params[0];
const Q = eddsaKey.keyPacket.params[1];
const seed = eddsaKey.keyPacket.params[2];
const ecdhKeyPacket = cloneKeyPacket(ecdhKey);
const ecdhOID = ecdhKeyPacket.params[0];
ecdhKeyPacket.params[0] = oid;
await expect(ecdhKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
ecdhKeyPacket.params[0] = ecdhOID;
ecdhKeyPacket.params[1] = Q;
ecdhKeyPacket.params[3] = seed;
await expect(ecdhKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('EdDSA params are not valid for EcDSA', async function() {
const keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.eddsa,
null,
'ed25519'
);
const { oid, Q, seed } = openpgp.crypto.publicKey.elliptic.eddsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.ecdsa.validateParams(oid, Q, seed);
expect(valid).to.be.false;
const oid = eddsaKey.keyPacket.params[0];
const Q = eddsaKey.keyPacket.params[1];
const seed = eddsaKey.keyPacket.params[2];
const ecdsaKeyPacket = cloneKeyPacket(ecdsaKey);
const ecdsaOID = ecdsaKeyPacket.params[0];
ecdsaKeyPacket.params[0] = oid;
await expect(ecdsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
ecdsaKeyPacket.params[0] = ecdsaOID;
ecdsaKeyPacket.params[1] = Q;
ecdsaKeyPacket.params[2] = seed;
await expect(ecdsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('x25519 params are not valid for EcDSA', async function() {
const keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.ecdsa,
null,
'curve25519'
);
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.ecdsa.validateParams(oid, Q, d);
expect(valid).to.be.false;
it('ECDH x25519 params are not valid for EcDSA', async function() {
const ecdh25519KeyPacket = ecdhKey.keyPacket;
const oid = ecdh25519KeyPacket.params[0];
const Q = ecdh25519KeyPacket.params[1];
const d = ecdh25519KeyPacket.params[3];
const ecdsaKeyPacket = cloneKeyPacket(ecdsaKey);
ecdsaKeyPacket.params[0] = oid;
ecdsaKeyPacket.params[1] = Q;
ecdsaKeyPacket.params[2] = d;
await expect(ecdsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('EcDSA params are not valid for EdDSA', async function() {
const keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.ecdsa, null, 'p256'
);
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.eddsa.validateParams(oid, Q, d);
expect(valid).to.be.false;
const oid = ecdsaKey.keyPacket.params[0];
const Q = ecdsaKey.keyPacket.params[1];
const d = ecdsaKey.keyPacket.params[2];
const eddsaKeyPacket = cloneKeyPacket(eddsaKey);
const eddsaOID = eddsaKeyPacket.params[0];
eddsaKeyPacket.params[0] = oid;
await expect(eddsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
eddsaKeyPacket.params[0] = eddsaOID;
eddsaKeyPacket.params[1] = Q;
eddsaKeyPacket.params[2] = d;
await expect(eddsaKeyPacket.validate()).to.be.rejected;
});
it('x25519 params are not valid for EdDSA', async function() {
const keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.ecdsa, null, 'curve25519'
);
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.eddsa.validateParams(oid, Q, d);
expect(valid).to.be.false;
it('ECDH x25519 params are not valid for EdDSA', async function() {
const ecdh25519KeyPacket = ecdhKey.keyPacket;
const oid = ecdh25519KeyPacket.params[0];
const Q = ecdh25519KeyPacket.params[1];
const d = ecdh25519KeyPacket.params[3];
const eddsaKeyPacket = cloneKeyPacket(eddsaKey);
const eddsaOID = eddsaKeyPacket.params[0];
eddsaKeyPacket.params[0] = oid;
await expect(eddsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
eddsaKeyPacket.params[0] = eddsaOID;
eddsaKeyPacket.params[1] = Q;
eddsaKeyPacket.params[2] = d;
await expect(eddsaKeyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
@ -158,95 +197,74 @@ module.exports = () => {
const curves = ['curve25519', 'p256', 'p384', 'p521', 'secp256k1', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1'];
curves.forEach(curve => {
describe(`ECC ${curve} parameter validation`, () => {
let keyParams;
let ecdsaKey;
let ecdhKey;
before(async () => {
// we generate also ecdh params as ecdsa ones since we do not need the kdf params
keyParams = await openpgp.crypto.generateParams(
openpgp.enums.publicKey.ecdsa, null, curve
);
if (curve !== 'curve25519') {
ecdsaKey = (await openpgp.generateKey({ curve, userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
ecdhKey = ecdsaKey.subKeys[0];
} else {
const eddsaKey = (await openpgp.generateKey({ curve: 'ed25519', userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
ecdhKey = eddsaKey.subKeys[0];
}
});
if (curve !== 'curve25519') {
if (ecdsaKey) {
it(`EcDSA ${curve} params should be valid`, async function() {
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.ecdsa.validateParams(oid, Q, d);
expect(valid).to.be.true;
await expect(ecdsaKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid EcDSA Q', async function() {
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const keyPacket = cloneKeyPacket(ecdsaKey);
const Q = keyPacket.params[1];
Q.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
Q[16]++;
let valid = await openpgp.crypto.publicKey.elliptic.ecdsa.validateParams(oid, Q, d);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.length);
valid = await openpgp.crypto.publicKey.elliptic.ecdsa.validateParams(oid, infQ, d);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.data.length);
keyPacket.params[1] = new openpgp.MPI(infQ);
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
}
it(`ECDH ${curve} params should be valid`, async function() {
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const valid = await openpgp.crypto.publicKey.elliptic.ecdh.validateParams(oid, Q, d);
expect(valid).to.be.true;
await expect(ecdhKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid ECDH Q', async function() {
const { oid, Q, d } = openpgp.crypto.publicKey.elliptic.ecdsa.parseParams(keyParams);
const keyPacket = cloneKeyPacket(ecdhKey);
const Q = keyPacket.params[1];
Q.data[16]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
Q[16]++;
let valid = await openpgp.crypto.publicKey.elliptic.ecdh.validateParams(oid, Q, d);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.length);
valid = await openpgp.crypto.publicKey.elliptic.ecdh.validateParams(oid, infQ, d);
expect(valid).to.be.false;
const infQ = new Uint8Array(Q.data.length);
keyPacket.params[1] = new openpgp.MPI(infQ);
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
});
describe('RSA parameter validation', function() {
let keyParams;
let rsaKey;
before(async () => {
keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsaSign, 2048);
rsaKey = (await openpgp.generateKey({ rsaBits: 2048, userIds: [{ name: 'Test', email: 'test@test.com' }] })).key;
});
it('generated RSA params are valid', async function() {
const n = keyParams[0].toUint8Array();
const e = keyParams[1].toUint8Array();
const d = keyParams[2].toUint8Array();
const p = keyParams[3].toUint8Array();
const q = keyParams[4].toUint8Array();
const u = keyParams[5].toUint8Array();
const valid = await openpgp.crypto.publicKey.rsa.validateParams(n, e, d, p, q, u);
expect(valid).to.be.true;
await expect(rsaKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid RSA n', async function() {
const n = keyParams[0].toUint8Array();
const e = keyParams[1].toUint8Array();
const d = keyParams[2].toUint8Array();
const p = keyParams[3].toUint8Array();
const q = keyParams[4].toUint8Array();
const u = keyParams[5].toUint8Array();
n[0]++;
const valid = await openpgp.crypto.publicKey.rsa.validateParams(n, e, d, p, q, u);
expect(valid).to.be.false;
const keyPacket = cloneKeyPacket(rsaKey);
const n = keyPacket.params[0];
n.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect invalid RSA e', async function() {
const n = keyParams[0].toUint8Array();
const e = keyParams[1].toUint8Array();
const d = keyParams[2].toUint8Array();
const p = keyParams[3].toUint8Array();
const q = keyParams[4].toUint8Array();
const u = keyParams[5].toUint8Array();
e[0]++;
const valid = await openpgp.crypto.publicKey.rsa.validateParams(n, e, d, p, q, u);
expect(valid).to.be.false;
const keyPacket = cloneKeyPacket(rsaKey);
const e = keyPacket.params[1];
e.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
@ -257,59 +275,34 @@ module.exports = () => {
});
it('DSA params should be valid', async function() {
const params = dsaKey.keyPacket.params;
const p = params[0].toUint8Array();
const q = params[1].toUint8Array();
const g = params[2].toUint8Array();
const y = params[3].toUint8Array();
const x = params[4].toUint8Array();
const valid = await openpgp.crypto.publicKey.dsa.validateParams(p, q, g, y, x);
expect(valid).to.be.true;
await expect(dsaKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid DSA p', async function() {
const params = dsaKey.keyPacket.params;
const p = params[0].toUint8Array();
const q = params[1].toUint8Array();
const g = params[2].toUint8Array();
const y = params[3].toUint8Array();
const x = params[4].toUint8Array();
p[0]++;
const valid = await openpgp.crypto.publicKey.dsa.validateParams(p, q, g, y, x);
expect(valid).to.be.false;
const keyPacket = cloneKeyPacket(dsaKey);
const p = keyPacket.params[0];
p.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect invalid DSA y', async function() {
const params = dsaKey.keyPacket.params;
const p = params[0].toUint8Array();
const q = params[1].toUint8Array();
const g = params[2].toUint8Array();
const y = params[3].toUint8Array();
const x = params[4].toUint8Array();
const keyPacket = cloneKeyPacket(dsaKey);
const y = keyPacket.params[3];
y[0]++;
const valid = await openpgp.crypto.publicKey.dsa.validateParams(p, q, g, y, x);
expect(valid).to.be.false;
y.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect invalid DSA g', async function() {
const params = dsaKey.keyPacket.params;
const p = params[0].toUint8Array();
const q = params[1].toUint8Array();
const g = params[2].toUint8Array();
const y = params[3].toUint8Array();
const x = params[4].toUint8Array();
const keyPacket = cloneKeyPacket(dsaKey);
const g = keyPacket.params[2];
g[0]++;
let valid = await openpgp.crypto.publicKey.dsa.validateParams(p, q, g, y, x);
expect(valid).to.be.false;
g.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
const gOne = new Uint8Array([1]);
valid = await openpgp.crypto.publicKey.dsa.validateParams(p, q, gOne, y, x);
expect(valid).to.be.false;
const gOne = new openpgp.MPI(new Uint8Array([1]));
keyPacket.params[2] = gOne;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
@ -320,70 +313,46 @@ module.exports = () => {
});
it('params should be valid', async function() {
const params = egKey.keyPacket.params;
const p = params[0].toUint8Array();
const g = params[1].toUint8Array();
const y = params[2].toUint8Array();
const x = params[3].toUint8Array();
const valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, g, y, x);
expect(valid).to.be.true;
await expect(egKey.keyPacket.validate()).to.not.be.rejected;
});
it('detect invalid p', async function() {
const params = egKey.keyPacket.params;
const p = params[0].toUint8Array();
const g = params[1].toUint8Array();
const y = params[2].toUint8Array();
const x = params[3].toUint8Array();
p[0]++;
const valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, g, y, x);
expect(valid).to.be.false;
const keyPacket = cloneKeyPacket(egKey);
const p = keyPacket.params[0];
p.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect invalid y', async function() {
const params = egKey.keyPacket.params;
const p = params[0].toUint8Array();
const g = params[1].toUint8Array();
const y = params[2].toUint8Array();
const x = params[3].toUint8Array();
y[0]++;
const valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, g, y, x);
expect(valid).to.be.false;
const keyPacket = cloneKeyPacket(egKey);
const y = keyPacket.params[2];
y.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect invalid g', async function() {
const params = egKey.keyPacket.params;
const p = params[0].toUint8Array();
const g = params[1].toUint8Array();
const y = params[2].toUint8Array();
const x = params[3].toUint8Array();
const keyPacket = cloneKeyPacket(egKey);
const g = keyPacket.params[1];
g[0]++;
let valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, g, y, x);
expect(valid).to.be.false;
g.data[0]++;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
const gOne = new Uint8Array([1]);
valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, gOne, y, x);
expect(valid).to.be.false;
const gOne = new openpgp.MPI(new Uint8Array([1]));
keyPacket.params[1] = gOne;
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
it('detect g with small order', async function() {
const params = egKey.keyPacket.params;
const p = params[0].toUint8Array();
const g = params[1].toUint8Array();
const y = params[2].toUint8Array();
const x = params[3].toUint8Array();
const keyPacket = cloneKeyPacket(egKey);
const p = keyPacket.params[0].toUint8Array();
const g = keyPacket.params[1].toUint8Array();
const pBN = new BN(p);
const gModP = new BN(g).toRed(new BN.red(pBN));
// g**(p-1)/2 has order 2
const gOrd2 = gModP.redPow(pBN.subn(1).shrn(1));
const valid = await openpgp.crypto.publicKey.elgamal.validateParams(p, gOrd2.toArrayLike(Uint8Array, 'be'), y, x);
expect(valid).to.be.false;
keyPacket.params[1] = new openpgp.MPI(gOrd2.toArrayLike(Uint8Array, 'be'));
await expect(keyPacket.validate()).to.be.rejectedWith('Key is invalid');
});
});
};

View File

@ -184,7 +184,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g=
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
await pk.decrypt(data[name].pass);
data[name].priv_key = pk;
return pk;
}

View File

@ -154,7 +154,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
await pk.decrypt(data[name].pass);
data[name].priv_key = pk;
return pk;
}

View File

@ -2252,13 +2252,13 @@ function versionSpecificTests() {
const armor1 = key.armor();
const armor2 = key.armor();
expect(armor1).to.equal(armor2);
expect(await key.decrypt('passphrase')).to.be.true;
await key.decrypt('passphrase');
expect(key.isDecrypted()).to.be.true;
await key.encrypt('new_passphrase');
expect(key.isDecrypted()).to.be.false;
await expect(key.decrypt('passphrase')).to.eventually.be.rejectedWith('Incorrect key passphrase');
await expect(key.decrypt('passphrase')).to.be.rejectedWith('Incorrect key passphrase');
expect(key.isDecrypted()).to.be.false;
expect(await key.decrypt('new_passphrase')).to.be.true;
await key.decrypt('new_passphrase');
expect(key.isDecrypted()).to.be.true;
const armor3 = key.armor();
expect(armor3).to.not.equal(armor1);

View File

@ -374,6 +374,71 @@ EQr2Mx42THr260IFYp5E/rIA
=oA0b
-----END PGP PRIVATE KEY BLOCK-----`;
const mismatchingKeyParams = `-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: OpenPGP.js v4.7.0
Comment: https://openpgpjs.org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=Lj9k
-----END PGP PRIVATE KEY BLOCK-----
`;
const rsaPrivateKeyPKCS1 = `-----BEGIN PGP PRIVATE KEY BLOCK-----
xcLYBF7yFJcBCACv2ad3tpfA8agLV+7ZO+7vWAS8f4CgCLsW2fvyIG0X3to9
@ -662,6 +727,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
let aeadModeVal;
let aeadChunkSizeByteVal;
let v5KeysVal;
let privateKeyMismatchingParams;
beforeEach(async function() {
publicKey = await openpgp.key.readArmored(pub_key);
@ -673,6 +739,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
publicKey_2038_2045 = privateKey_2038_2045.toPublic();
privateKey_1337 = await openpgp.key.readArmored(priv_key_expires_1337);
publicKey_1337 = privateKey_1337.toPublic();
privateKeyMismatchingParams = await openpgp.key.readArmored(mismatchingKeyParams);
useNativeVal = openpgp.config.useNative;
aeadProtectVal = openpgp.config.aeadProtect;
aeadModeVal = openpgp.config.aeadMode;
@ -703,8 +771,10 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
await expect(privateKey.decrypt('wrong passphrase')).to.eventually.be.rejectedWith('Incorrect key passphrase');
});
it('Decrypting key with correct passphrase returns true', async function () {
expect(await privateKey.decrypt(passphrase)).to.be.true;
it('Can decrypt key with correct passphrase', async function () {
expect(privateKey.isDecrypted()).to.be.false;
await privateKey.decrypt(passphrase);
expect(privateKey.isDecrypted()).to.be.true;
});
describe('decryptKey', function() {
@ -729,6 +799,17 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
expect(error.message).to.match(/Incorrect key passphrase/);
});
});
it('should fail for corrupted key', function() {
return openpgp.decryptKey({
privateKey: privateKeyMismatchingParams,
passphrase: 'userpass'
}).then(function() {
throw new Error('Should not decrypt corrupted key');
}).catch(function(error){
expect(error.message).to.match(/Key is invalid/);
});
});
});
it('Calling decrypt with not decrypted key leads to exception', async function() {
@ -798,7 +879,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
let decryptedPrivateKey;
beforeEach(async function() {
if (!decryptedPrivateKey) {
expect(await privateKey.decrypt(passphrase)).to.be.true;
await privateKey.decrypt(passphrase);
decryptedPrivateKey = privateKey;
}
privateKey = decryptedPrivateKey;
@ -958,7 +1039,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
let decryptedPrivateKey;
beforeEach(async function() {
if (!decryptedPrivateKey) {
expect(await privateKey.decrypt(passphrase)).to.be.true;
await privateKey.decrypt(passphrase);
decryptedPrivateKey = privateKey;
}
privateKey = decryptedPrivateKey;
@ -1767,7 +1848,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
let decryptedPrivateKey;
beforeEach(async function() {
if (!decryptedPrivateKey) {
expect(await privateKey.decrypt(passphrase)).to.be.true;
await privateKey.decrypt(passphrase);
decryptedPrivateKey = privateKey;
}
privateKey = decryptedPrivateKey;

View File

@ -136,7 +136,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr
const pk = await openpgp.key.readArmored(data[name].priv);
expect(pk).to.exist;
expect(pk.getKeyId().toHex()).to.equal(data[name].id);
expect(await pk.decrypt(data[name].pass)).to.be.true;
await pk.decrypt(data[name].pass);
data[name].priv_key = pk;
return pk;
}