From b164190f6a7e908db9619eaa34b34b2cbfd70184 Mon Sep 17 00:00:00 2001 From: larabr <7375870+larabr@users.noreply.github.com> Date: Tue, 28 Mar 2023 18:14:50 +0200 Subject: [PATCH] Internal: rename `Curves` to `CurvesWithOID` Following the addition of the new format for Montgomery curves, which do not rely on OIDs. --- src/crypto/crypto.js | 6 ++--- src/crypto/public_key/elliptic/ecdh.js | 22 +++++++++---------- src/crypto/public_key/elliptic/ecdsa.js | 8 +++---- src/crypto/public_key/elliptic/index.js | 4 ++-- .../elliptic/{curves.js => oid_curves.js} | 6 ++--- src/crypto/signature.js | 2 +- test/crypto/ecdh.js | 14 ++++++------ test/crypto/elliptic.js | 8 +++---- test/general/x25519.js | 2 +- 9 files changed, 36 insertions(+), 36 deletions(-) rename src/crypto/public_key/elliptic/{curves.js => oid_curves.js} (98%) diff --git a/src/crypto/crypto.js b/src/crypto/crypto.js index c36c3297..d04a9765 100644 --- a/src/crypto/crypto.js +++ b/src/crypto/crypto.js @@ -33,7 +33,7 @@ import KDFParams from '../type/kdf_params'; import enums from '../enums'; import util from '../util'; import OID from '../type/oid'; -import { Curve } from './public_key/elliptic/curves'; +import { CurveWithOID } from './public_key/elliptic/oid_curves'; import { UnsupportedError } from '../packet/packet'; import ECDHXSymmetricKey from '../type/ecdh_x_symkey'; @@ -219,14 +219,14 @@ export function parsePrivateKeyParams(algo, bytes, publicParams) { } case enums.publicKey.ecdsa: case enums.publicKey.ecdh: { - const curve = new Curve(publicParams.oid); + const curve = new CurveWithOID(publicParams.oid); let d = util.readMPI(bytes.subarray(read)); read += d.length + 2; d = util.leftPad(d, curve.payloadSize); return { read, privateParams: { d } }; } case enums.publicKey.eddsa: case enums.publicKey.ed25519Legacy: { - const curve = new Curve(publicParams.oid); + const curve = new CurveWithOID(publicParams.oid); let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2; seed = util.leftPad(seed, curve.payloadSize); return { read, privateParams: { seed } }; diff --git a/src/crypto/public_key/elliptic/ecdh.js b/src/crypto/public_key/elliptic/ecdh.js index 50c43a4c..11238f71 100644 --- a/src/crypto/public_key/elliptic/ecdh.js +++ b/src/crypto/public_key/elliptic/ecdh.js @@ -22,7 +22,7 @@ */ import nacl from '@openpgp/tweetnacl/nacl-fast-light'; -import { Curve, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams } from './curves'; +import { CurveWithOID, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams } from './oid_curves'; import * as aesKW from '../../aes_kw'; import { getRandomBytes } from '../../random'; import hash from '../../hash'; @@ -86,7 +86,7 @@ async function kdf(hashAlgo, X, length, param, stripLeading = false, stripTraili /** * Generate ECDHE ephemeral key and secret from public key * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} Q - Recipient public key * @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>} * @async @@ -129,7 +129,7 @@ async function genPublicEphemeralKey(curve, Q) { export async function encrypt(oid, kdfParams, data, Q, fingerprint) { const m = pkcs5.encode(data); - const curve = new Curve(oid); + const curve = new CurveWithOID(oid); const { publicKey, sharedKey } = await genPublicEphemeralKey(curve, Q); const param = buildEcdhParam(enums.publicKey.ecdh, oid, kdfParams, fingerprint); const { keySize } = getCipher(kdfParams.cipher); @@ -141,7 +141,7 @@ export async function encrypt(oid, kdfParams, data, Q, fingerprint) { /** * Generate ECDHE secret from private key and public part of ephemeral key * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} V - Public part of ephemeral key * @param {Uint8Array} Q - Recipient public key * @param {Uint8Array} d - Recipient private key @@ -189,7 +189,7 @@ async function genPrivateEphemeralKey(curve, V, Q, d) { * @async */ export async function decrypt(oid, kdfParams, V, C, Q, d, fingerprint) { - const curve = new Curve(oid); + const curve = new CurveWithOID(oid); const { sharedKey } = await genPrivateEphemeralKey(curve, V, Q, d); const param = buildEcdhParam(enums.publicKey.ecdh, oid, kdfParams, fingerprint); const { keySize } = getCipher(kdfParams.cipher); @@ -209,7 +209,7 @@ export async function decrypt(oid, kdfParams, V, C, Q, d, fingerprint) { /** * Generate ECDHE secret from private key and public part of ephemeral key using webCrypto * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} V - Public part of ephemeral key * @param {Uint8Array} Q - Recipient public key * @param {Uint8Array} d - Recipient private key @@ -262,7 +262,7 @@ async function webPrivateEphemeralKey(curve, V, Q, d) { /** * Generate ECDHE ephemeral key and secret from public key using webCrypto * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} Q - Recipient public key * @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>} * @async @@ -310,7 +310,7 @@ async function webPublicEphemeralKey(curve, Q) { /** * Generate ECDHE secret from private key and public part of ephemeral key using indutny/elliptic * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} V - Public part of ephemeral key * @param {Uint8Array} d - Recipient private key * @returns {Promise<{secretKey: Uint8Array, sharedKey: Uint8Array}>} @@ -330,7 +330,7 @@ async function ellipticPrivateEphemeralKey(curve, V, d) { /** * Generate ECDHE ephemeral key and secret from public key using indutny/elliptic * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} Q - Recipient public key * @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>} * @async @@ -350,7 +350,7 @@ async function ellipticPublicEphemeralKey(curve, Q) { /** * Generate ECDHE secret from private key and public part of ephemeral key using nodeCrypto * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} V - Public part of ephemeral key * @param {Uint8Array} d - Recipient private key * @returns {Promise<{secretKey: Uint8Array, sharedKey: Uint8Array}>} @@ -367,7 +367,7 @@ async function nodePrivateEphemeralKey(curve, V, d) { /** * Generate ECDHE ephemeral key and secret from public key using nodeCrypto * - * @param {Curve} curve - Elliptic curve object + * @param {CurveWithOID} curve - Elliptic curve object * @param {Uint8Array} Q - Recipient public key * @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>} * @async diff --git a/src/crypto/public_key/elliptic/ecdsa.js b/src/crypto/public_key/elliptic/ecdsa.js index 528ddcf7..285c40f3 100644 --- a/src/crypto/public_key/elliptic/ecdsa.js +++ b/src/crypto/public_key/elliptic/ecdsa.js @@ -25,7 +25,7 @@ import enums from '../../../enums'; import util from '../../../util'; import { getRandomBytes } from '../../random'; import hash from '../../hash'; -import { Curve, webCurves, privateToJWK, rawPublicToJWK, validateStandardParams } from './curves'; +import { CurveWithOID, webCurves, privateToJWK, rawPublicToJWK, validateStandardParams } from './oid_curves'; import { getIndutnyCurve, keyFromPrivate, keyFromPublic } from './indutnyKey'; const webCrypto = util.getWebCrypto(); @@ -46,7 +46,7 @@ const nodeCrypto = util.getNodeCrypto(); * @async */ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) { - const curve = new Curve(oid); + const curve = new CurveWithOID(oid); if (message && !util.isStream(message)) { const keyPair = { publicKey, privateKey }; switch (curve.type) { @@ -91,7 +91,7 @@ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed * @async */ export async function verify(oid, hashAlgo, signature, message, publicKey, hashed) { - const curve = new Curve(oid); + const curve = new CurveWithOID(oid); if (message && !util.isStream(message)) { switch (curve.type) { case 'web': @@ -125,7 +125,7 @@ export async function verify(oid, hashAlgo, signature, message, publicKey, hashe * @async */ export async function validateParams(oid, Q, d) { - const curve = new Curve(oid); + const curve = new CurveWithOID(oid); // Reject curves x25519 and ed25519 if (curve.keyType !== enums.publicKey.ecdsa) { return false; diff --git a/src/crypto/public_key/elliptic/index.js b/src/crypto/public_key/elliptic/index.js index 4af14817..562918b9 100644 --- a/src/crypto/public_key/elliptic/index.js +++ b/src/crypto/public_key/elliptic/index.js @@ -25,7 +25,7 @@ * @private */ -import { Curve, generate, getPreferredHashAlgo } from './curves'; +import { CurveWithOID, generate, getPreferredHashAlgo } from './oid_curves'; import * as ecdsa from './ecdsa'; import * as eddsaLegacy from './eddsa_legacy'; import * as eddsa from './eddsa'; @@ -33,5 +33,5 @@ import * as ecdh from './ecdh'; import * as ecdhX from './ecdh_x'; export { - Curve, ecdh, ecdhX, ecdsa, eddsaLegacy, eddsa, generate, getPreferredHashAlgo + CurveWithOID, ecdh, ecdhX, ecdsa, eddsaLegacy, eddsa, generate, getPreferredHashAlgo }; diff --git a/src/crypto/public_key/elliptic/curves.js b/src/crypto/public_key/elliptic/oid_curves.js similarity index 98% rename from src/crypto/public_key/elliptic/curves.js rename to src/crypto/public_key/elliptic/oid_curves.js index 4a77d48f..af04896f 100644 --- a/src/crypto/public_key/elliptic/curves.js +++ b/src/crypto/public_key/elliptic/oid_curves.js @@ -131,7 +131,7 @@ const curves = { } }; -class Curve { +class CurveWithOID { constructor(oidOrName, params) { try { if (util.isArray(oidOrName) || @@ -208,7 +208,7 @@ class Curve { async function generate(curve) { const BigInteger = await util.getBigInteger(); - curve = new Curve(curve); + curve = new CurveWithOID(curve); const keyPair = await curve.genKeyPair(); const Q = new BigInteger(keyPair.publicKey).toUint8Array(); const secret = new BigInteger(keyPair.privateKey).toUint8Array('be', curve.payloadSize); @@ -293,7 +293,7 @@ async function validateStandardParams(algo, oid, Q, d) { } export { - Curve, curves, webCurves, nodeCurves, generate, getPreferredHashAlgo, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams + CurveWithOID, curves, webCurves, nodeCurves, generate, getPreferredHashAlgo, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams }; ////////////////////////// diff --git a/src/crypto/signature.js b/src/crypto/signature.js index c2027ed1..fcef95ae 100644 --- a/src/crypto/signature.js +++ b/src/crypto/signature.js @@ -97,7 +97,7 @@ export async function verify(algo, hashAlgo, signature, publicParams, data, hash } case enums.publicKey.ecdsa: { const { oid, Q } = publicParams; - const curveSize = new publicKey.elliptic.Curve(oid).payloadSize; + const curveSize = new publicKey.elliptic.CurveWithOID(oid).payloadSize; // padding needed for webcrypto const r = util.leftPad(signature.r, curveSize); const s = util.leftPad(signature.s, curveSize); diff --git a/test/crypto/ecdh.js b/test/crypto/ecdh.js index 193cda7b..d9e3d824 100644 --- a/test/crypto/ecdh.js +++ b/test/crypto/ecdh.js @@ -20,7 +20,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { data = new Uint8Array(data); } return Promise.resolve().then(() => { - const curve = new elliptic_curves.Curve(oid); + const curve = new elliptic_curves.CurveWithOID(oid); return elliptic_curves.ecdh.decrypt( new OID(curve.oid), new KDFParams({ cipher, hash }), @@ -138,7 +138,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { if (!openpgp.config.useIndutnyElliptic && !util.getNodeCrypto()) { this.skip(); } - const curve = new elliptic_curves.Curve('secp256k1'); + const curve = new elliptic_curves.CurveWithOID('secp256k1'); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); @@ -148,7 +148,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { }); it('Different keys', async function () { - const curve = new elliptic_curves.Curve('curve25519'); + const curve = new elliptic_curves.CurveWithOID('curve25519'); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); @@ -159,7 +159,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { }); it('Invalid fingerprint', async function () { - const curve = new elliptic_curves.Curve('curve25519'); + const curve = new elliptic_curves.CurveWithOID('curve25519'); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); @@ -170,7 +170,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { }); it('Successful exchange x25519 (legacy)', async function () { - const curve = new elliptic_curves.Curve('curve25519'); + const curve = new elliptic_curves.CurveWithOID('curve25519'); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); @@ -190,7 +190,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { ['p256', 'p384', 'p521'].forEach(curveName => { it(`NIST ${curveName} - Successful exchange`, async function () { - const curve = new elliptic_curves.Curve(curveName); + const curve = new elliptic_curves.CurveWithOID(curveName); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); @@ -233,7 +233,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () { this.skip(); } - const curve = new elliptic_curves.Curve(curveName); + const curve = new elliptic_curves.CurveWithOID(curveName); const oid = new OID(curve.oid); const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher }); const data = util.stringToUint8Array('test'); diff --git a/test/crypto/elliptic.js b/test/crypto/elliptic.js index 9f892600..f1a52a86 100644 --- a/test/crypto/elliptic.js +++ b/test/crypto/elliptic.js @@ -59,10 +59,10 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func describe('Basic Operations', function () { it('Creating curve from name or oid', function (done) { Object.keys(openpgp.enums.curve).forEach(function(name_or_oid) { - expect(new elliptic_curves.Curve(name_or_oid)).to.exist; + expect(new elliptic_curves.CurveWithOID(name_or_oid)).to.exist; }); Object.values(openpgp.enums.curve).forEach(function(name_or_oid) { - expect(new elliptic_curves.Curve(name_or_oid)).to.exist; + expect(new elliptic_curves.CurveWithOID(name_or_oid)).to.exist; }); done(); }); @@ -73,7 +73,7 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func const names = config.useIndutnyElliptic ? ['p256', 'p384', 'p521', 'secp256k1', 'curve25519', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1'] : ['p256', 'p384', 'p521', 'curve25519']; return Promise.all(names.map(function (name) { - const curve = new elliptic_curves.Curve(name); + const curve = new elliptic_curves.CurveWithOID(name); return curve.genKeyPair().then(keyPair => { expect(keyPair).to.exist; }); @@ -243,7 +243,7 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func .to.eventually.be.true.notify(done); }); it('Sign and verify message', function () { - const curve = new elliptic_curves.Curve('p521'); + const curve = new elliptic_curves.CurveWithOID('p521'); return curve.genKeyPair().then(async keyPair => { const keyPublic = new Uint8Array(keyPair.publicKey); const keyPrivate = new Uint8Array(keyPair.privateKey); diff --git a/test/general/x25519.js b/test/general/x25519.js index b58505be..0a465b83 100644 --- a/test/general/x25519.js +++ b/test/general/x25519.js @@ -218,7 +218,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr describe('Ed25519 Test Vectors from RFC8032', function () { // https://tools.ietf.org/html/rfc8032#section-7.1 function testVector(vector) { - const curve = new elliptic.Curve('ed25519'); + const curve = new elliptic.CurveWithOID('ed25519'); const { publicKey } = nacl.sign.keyPair.fromSeed(util.hexToUint8Array(vector.SECRET_KEY)); expect(publicKey).to.deep.equal(util.hexToUint8Array(vector.PUBLIC_KEY)); const data = vector.MESSAGE;