Add AEAD feature flags
This commit is contained in:
parent
f225f994ec
commit
997ec1c8db
15
src/enums.js
15
src/enums.js
|
@ -419,6 +419,21 @@ export default {
|
|||
signature: 6
|
||||
},
|
||||
|
||||
/** {@link https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-04#section-5.2.3.25|RFC4880bis-04, section 5.2.3.25}
|
||||
* @enum {Integer}
|
||||
* @readonly
|
||||
*/
|
||||
features: {
|
||||
/** 0x01 - Modification Detection (packets 18 and 19) */
|
||||
modification_detection: 1,
|
||||
/** 0x02 - AEAD Encrypted Data Packet (packet 20) and version 5
|
||||
* Symmetric-Key Encrypted Session Key Packets (packet 3) */
|
||||
aead: 2,
|
||||
/** 0x04 - Version 5 Public-Key Packet format and corresponding new
|
||||
* fingerprint format */
|
||||
v5_keys: 4
|
||||
},
|
||||
|
||||
/** Asserts validity and converts from string/integer to integer. */
|
||||
write: function(type, e) {
|
||||
if (typeof e === 'number') {
|
||||
|
|
|
@ -1278,8 +1278,13 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) {
|
|||
signaturePacket.isPrimaryUserID = true;
|
||||
}
|
||||
if (config.integrity_protect) {
|
||||
signaturePacket.features = [];
|
||||
signaturePacket.features.push(1); // Modification Detection
|
||||
signaturePacket.features = [0];
|
||||
signaturePacket.features[0] |= enums.features.modification_detection;
|
||||
}
|
||||
if (config.aead_protect === 'draft04') {
|
||||
signaturePacket.features || (signaturePacket.features = [0]);
|
||||
signaturePacket.features[0] |= enums.features.aead;
|
||||
signaturePacket.features[0] |= enums.features.v5_keys;
|
||||
}
|
||||
if (options.keyExpirationTime > 0) {
|
||||
signaturePacket.keyExpirationTime = options.keyExpirationTime;
|
||||
|
|
|
@ -1228,7 +1228,7 @@ p92yZgB3r2+f6/GIe2+7
|
|||
expect(key.users[0].selfCertifications[0].preferredHashAlgorithms).to.eql([hash.sha256, hash.sha512, hash.sha1]);
|
||||
const compr = openpgp.enums.compression;
|
||||
expect(key.users[0].selfCertifications[0].preferredCompressionAlgorithms).to.eql([compr.zlib, compr.zip]);
|
||||
expect(key.users[0].selfCertifications[0].features).to.eql(openpgp.config.integrity_protect ? [1] : null); // modification detection
|
||||
expect(key.users[0].selfCertifications[0].features).to.eql(openpgp.config.aead_protect === 'draft04' ? [7] : [1]);
|
||||
};
|
||||
const opt = {numBits: 512, userIds: 'test <a@b.com>', passphrase: 'hello'};
|
||||
if (openpgp.util.getWebCryptoAll()) { opt.numBits = 2048; } // webkit webcrypto accepts minimum 2048 bit keys
|
||||
|
|
Loading…
Reference in New Issue
Block a user