Internal: rename Curves
to CurvesWithOID
Following the addition of the new format for Montgomery curves, which do not rely on OIDs.
This commit is contained in:
parent
ef953ce81e
commit
b164190f6a
|
@ -33,7 +33,7 @@ import KDFParams from '../type/kdf_params';
|
|||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import OID from '../type/oid';
|
||||
import { Curve } from './public_key/elliptic/curves';
|
||||
import { CurveWithOID } from './public_key/elliptic/oid_curves';
|
||||
import { UnsupportedError } from '../packet/packet';
|
||||
import ECDHXSymmetricKey from '../type/ecdh_x_symkey';
|
||||
|
||||
|
@ -219,14 +219,14 @@ export function parsePrivateKeyParams(algo, bytes, publicParams) {
|
|||
}
|
||||
case enums.publicKey.ecdsa:
|
||||
case enums.publicKey.ecdh: {
|
||||
const curve = new Curve(publicParams.oid);
|
||||
const curve = new CurveWithOID(publicParams.oid);
|
||||
let d = util.readMPI(bytes.subarray(read)); read += d.length + 2;
|
||||
d = util.leftPad(d, curve.payloadSize);
|
||||
return { read, privateParams: { d } };
|
||||
}
|
||||
case enums.publicKey.eddsa:
|
||||
case enums.publicKey.ed25519Legacy: {
|
||||
const curve = new Curve(publicParams.oid);
|
||||
const curve = new CurveWithOID(publicParams.oid);
|
||||
let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2;
|
||||
seed = util.leftPad(seed, curve.payloadSize);
|
||||
return { read, privateParams: { seed } };
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
*/
|
||||
|
||||
import nacl from '@openpgp/tweetnacl/nacl-fast-light';
|
||||
import { Curve, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams } from './curves';
|
||||
import { CurveWithOID, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams } from './oid_curves';
|
||||
import * as aesKW from '../../aes_kw';
|
||||
import { getRandomBytes } from '../../random';
|
||||
import hash from '../../hash';
|
||||
|
@ -86,7 +86,7 @@ async function kdf(hashAlgo, X, length, param, stripLeading = false, stripTraili
|
|||
/**
|
||||
* Generate ECDHE ephemeral key and secret from public key
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
* @async
|
||||
|
@ -129,7 +129,7 @@ async function genPublicEphemeralKey(curve, Q) {
|
|||
export async function encrypt(oid, kdfParams, data, Q, fingerprint) {
|
||||
const m = pkcs5.encode(data);
|
||||
|
||||
const curve = new Curve(oid);
|
||||
const curve = new CurveWithOID(oid);
|
||||
const { publicKey, sharedKey } = await genPublicEphemeralKey(curve, Q);
|
||||
const param = buildEcdhParam(enums.publicKey.ecdh, oid, kdfParams, fingerprint);
|
||||
const { keySize } = getCipher(kdfParams.cipher);
|
||||
|
@ -141,7 +141,7 @@ export async function encrypt(oid, kdfParams, data, Q, fingerprint) {
|
|||
/**
|
||||
* Generate ECDHE secret from private key and public part of ephemeral key
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} V - Public part of ephemeral key
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @param {Uint8Array} d - Recipient private key
|
||||
|
@ -189,7 +189,7 @@ async function genPrivateEphemeralKey(curve, V, Q, d) {
|
|||
* @async
|
||||
*/
|
||||
export async function decrypt(oid, kdfParams, V, C, Q, d, fingerprint) {
|
||||
const curve = new Curve(oid);
|
||||
const curve = new CurveWithOID(oid);
|
||||
const { sharedKey } = await genPrivateEphemeralKey(curve, V, Q, d);
|
||||
const param = buildEcdhParam(enums.publicKey.ecdh, oid, kdfParams, fingerprint);
|
||||
const { keySize } = getCipher(kdfParams.cipher);
|
||||
|
@ -209,7 +209,7 @@ export async function decrypt(oid, kdfParams, V, C, Q, d, fingerprint) {
|
|||
/**
|
||||
* Generate ECDHE secret from private key and public part of ephemeral key using webCrypto
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} V - Public part of ephemeral key
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @param {Uint8Array} d - Recipient private key
|
||||
|
@ -262,7 +262,7 @@ async function webPrivateEphemeralKey(curve, V, Q, d) {
|
|||
/**
|
||||
* Generate ECDHE ephemeral key and secret from public key using webCrypto
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
* @async
|
||||
|
@ -310,7 +310,7 @@ async function webPublicEphemeralKey(curve, Q) {
|
|||
/**
|
||||
* Generate ECDHE secret from private key and public part of ephemeral key using indutny/elliptic
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} V - Public part of ephemeral key
|
||||
* @param {Uint8Array} d - Recipient private key
|
||||
* @returns {Promise<{secretKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
|
@ -330,7 +330,7 @@ async function ellipticPrivateEphemeralKey(curve, V, d) {
|
|||
/**
|
||||
* Generate ECDHE ephemeral key and secret from public key using indutny/elliptic
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
* @async
|
||||
|
@ -350,7 +350,7 @@ async function ellipticPublicEphemeralKey(curve, Q) {
|
|||
/**
|
||||
* Generate ECDHE secret from private key and public part of ephemeral key using nodeCrypto
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} V - Public part of ephemeral key
|
||||
* @param {Uint8Array} d - Recipient private key
|
||||
* @returns {Promise<{secretKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
|
@ -367,7 +367,7 @@ async function nodePrivateEphemeralKey(curve, V, d) {
|
|||
/**
|
||||
* Generate ECDHE ephemeral key and secret from public key using nodeCrypto
|
||||
*
|
||||
* @param {Curve} curve - Elliptic curve object
|
||||
* @param {CurveWithOID} curve - Elliptic curve object
|
||||
* @param {Uint8Array} Q - Recipient public key
|
||||
* @returns {Promise<{publicKey: Uint8Array, sharedKey: Uint8Array}>}
|
||||
* @async
|
||||
|
|
|
@ -25,7 +25,7 @@ import enums from '../../../enums';
|
|||
import util from '../../../util';
|
||||
import { getRandomBytes } from '../../random';
|
||||
import hash from '../../hash';
|
||||
import { Curve, webCurves, privateToJWK, rawPublicToJWK, validateStandardParams } from './curves';
|
||||
import { CurveWithOID, webCurves, privateToJWK, rawPublicToJWK, validateStandardParams } from './oid_curves';
|
||||
import { getIndutnyCurve, keyFromPrivate, keyFromPublic } from './indutnyKey';
|
||||
|
||||
const webCrypto = util.getWebCrypto();
|
||||
|
@ -46,7 +46,7 @@ const nodeCrypto = util.getNodeCrypto();
|
|||
* @async
|
||||
*/
|
||||
export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) {
|
||||
const curve = new Curve(oid);
|
||||
const curve = new CurveWithOID(oid);
|
||||
if (message && !util.isStream(message)) {
|
||||
const keyPair = { publicKey, privateKey };
|
||||
switch (curve.type) {
|
||||
|
@ -91,7 +91,7 @@ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed
|
|||
* @async
|
||||
*/
|
||||
export async function verify(oid, hashAlgo, signature, message, publicKey, hashed) {
|
||||
const curve = new Curve(oid);
|
||||
const curve = new CurveWithOID(oid);
|
||||
if (message && !util.isStream(message)) {
|
||||
switch (curve.type) {
|
||||
case 'web':
|
||||
|
@ -125,7 +125,7 @@ export async function verify(oid, hashAlgo, signature, message, publicKey, hashe
|
|||
* @async
|
||||
*/
|
||||
export async function validateParams(oid, Q, d) {
|
||||
const curve = new Curve(oid);
|
||||
const curve = new CurveWithOID(oid);
|
||||
// Reject curves x25519 and ed25519
|
||||
if (curve.keyType !== enums.publicKey.ecdsa) {
|
||||
return false;
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
* @private
|
||||
*/
|
||||
|
||||
import { Curve, generate, getPreferredHashAlgo } from './curves';
|
||||
import { CurveWithOID, generate, getPreferredHashAlgo } from './oid_curves';
|
||||
import * as ecdsa from './ecdsa';
|
||||
import * as eddsaLegacy from './eddsa_legacy';
|
||||
import * as eddsa from './eddsa';
|
||||
|
@ -33,5 +33,5 @@ import * as ecdh from './ecdh';
|
|||
import * as ecdhX from './ecdh_x';
|
||||
|
||||
export {
|
||||
Curve, ecdh, ecdhX, ecdsa, eddsaLegacy, eddsa, generate, getPreferredHashAlgo
|
||||
CurveWithOID, ecdh, ecdhX, ecdsa, eddsaLegacy, eddsa, generate, getPreferredHashAlgo
|
||||
};
|
||||
|
|
|
@ -131,7 +131,7 @@ const curves = {
|
|||
}
|
||||
};
|
||||
|
||||
class Curve {
|
||||
class CurveWithOID {
|
||||
constructor(oidOrName, params) {
|
||||
try {
|
||||
if (util.isArray(oidOrName) ||
|
||||
|
@ -208,7 +208,7 @@ class Curve {
|
|||
async function generate(curve) {
|
||||
const BigInteger = await util.getBigInteger();
|
||||
|
||||
curve = new Curve(curve);
|
||||
curve = new CurveWithOID(curve);
|
||||
const keyPair = await curve.genKeyPair();
|
||||
const Q = new BigInteger(keyPair.publicKey).toUint8Array();
|
||||
const secret = new BigInteger(keyPair.privateKey).toUint8Array('be', curve.payloadSize);
|
||||
|
@ -293,7 +293,7 @@ async function validateStandardParams(algo, oid, Q, d) {
|
|||
}
|
||||
|
||||
export {
|
||||
Curve, curves, webCurves, nodeCurves, generate, getPreferredHashAlgo, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams
|
||||
CurveWithOID, curves, webCurves, nodeCurves, generate, getPreferredHashAlgo, jwkToRawPublic, rawPublicToJWK, privateToJWK, validateStandardParams
|
||||
};
|
||||
|
||||
//////////////////////////
|
|
@ -97,7 +97,7 @@ export async function verify(algo, hashAlgo, signature, publicParams, data, hash
|
|||
}
|
||||
case enums.publicKey.ecdsa: {
|
||||
const { oid, Q } = publicParams;
|
||||
const curveSize = new publicKey.elliptic.Curve(oid).payloadSize;
|
||||
const curveSize = new publicKey.elliptic.CurveWithOID(oid).payloadSize;
|
||||
// padding needed for webcrypto
|
||||
const r = util.leftPad(signature.r, curveSize);
|
||||
const s = util.leftPad(signature.s, curveSize);
|
||||
|
|
|
@ -20,7 +20,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
data = new Uint8Array(data);
|
||||
}
|
||||
return Promise.resolve().then(() => {
|
||||
const curve = new elliptic_curves.Curve(oid);
|
||||
const curve = new elliptic_curves.CurveWithOID(oid);
|
||||
return elliptic_curves.ecdh.decrypt(
|
||||
new OID(curve.oid),
|
||||
new KDFParams({ cipher, hash }),
|
||||
|
@ -138,7 +138,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
if (!openpgp.config.useIndutnyElliptic && !util.getNodeCrypto()) {
|
||||
this.skip();
|
||||
}
|
||||
const curve = new elliptic_curves.Curve('secp256k1');
|
||||
const curve = new elliptic_curves.CurveWithOID('secp256k1');
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
@ -148,7 +148,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
});
|
||||
|
||||
it('Different keys', async function () {
|
||||
const curve = new elliptic_curves.Curve('curve25519');
|
||||
const curve = new elliptic_curves.CurveWithOID('curve25519');
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
@ -159,7 +159,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
});
|
||||
|
||||
it('Invalid fingerprint', async function () {
|
||||
const curve = new elliptic_curves.Curve('curve25519');
|
||||
const curve = new elliptic_curves.CurveWithOID('curve25519');
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
@ -170,7 +170,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
});
|
||||
|
||||
it('Successful exchange x25519 (legacy)', async function () {
|
||||
const curve = new elliptic_curves.Curve('curve25519');
|
||||
const curve = new elliptic_curves.CurveWithOID('curve25519');
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
@ -190,7 +190,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
|
||||
['p256', 'p384', 'p521'].forEach(curveName => {
|
||||
it(`NIST ${curveName} - Successful exchange`, async function () {
|
||||
const curve = new elliptic_curves.Curve(curveName);
|
||||
const curve = new elliptic_curves.CurveWithOID(curveName);
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
@ -233,7 +233,7 @@ module.exports = () => describe('ECDH key exchange @lightweight', function () {
|
|||
this.skip();
|
||||
}
|
||||
|
||||
const curve = new elliptic_curves.Curve(curveName);
|
||||
const curve = new elliptic_curves.CurveWithOID(curveName);
|
||||
const oid = new OID(curve.oid);
|
||||
const kdfParams = new KDFParams({ hash: curve.hash, cipher: curve.cipher });
|
||||
const data = util.stringToUint8Array('test');
|
||||
|
|
|
@ -59,10 +59,10 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func
|
|||
describe('Basic Operations', function () {
|
||||
it('Creating curve from name or oid', function (done) {
|
||||
Object.keys(openpgp.enums.curve).forEach(function(name_or_oid) {
|
||||
expect(new elliptic_curves.Curve(name_or_oid)).to.exist;
|
||||
expect(new elliptic_curves.CurveWithOID(name_or_oid)).to.exist;
|
||||
});
|
||||
Object.values(openpgp.enums.curve).forEach(function(name_or_oid) {
|
||||
expect(new elliptic_curves.Curve(name_or_oid)).to.exist;
|
||||
expect(new elliptic_curves.CurveWithOID(name_or_oid)).to.exist;
|
||||
});
|
||||
done();
|
||||
});
|
||||
|
@ -73,7 +73,7 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func
|
|||
const names = config.useIndutnyElliptic ? ['p256', 'p384', 'p521', 'secp256k1', 'curve25519', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1'] :
|
||||
['p256', 'p384', 'p521', 'curve25519'];
|
||||
return Promise.all(names.map(function (name) {
|
||||
const curve = new elliptic_curves.Curve(name);
|
||||
const curve = new elliptic_curves.CurveWithOID(name);
|
||||
return curve.genKeyPair().then(keyPair => {
|
||||
expect(keyPair).to.exist;
|
||||
});
|
||||
|
@ -243,7 +243,7 @@ module.exports = () => describe('Elliptic Curve Cryptography @lightweight', func
|
|||
.to.eventually.be.true.notify(done);
|
||||
});
|
||||
it('Sign and verify message', function () {
|
||||
const curve = new elliptic_curves.Curve('p521');
|
||||
const curve = new elliptic_curves.CurveWithOID('p521');
|
||||
return curve.genKeyPair().then(async keyPair => {
|
||||
const keyPublic = new Uint8Array(keyPair.publicKey);
|
||||
const keyPrivate = new Uint8Array(keyPair.privateKey);
|
||||
|
|
|
@ -218,7 +218,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr
|
|||
describe('Ed25519 Test Vectors from RFC8032', function () {
|
||||
// https://tools.ietf.org/html/rfc8032#section-7.1
|
||||
function testVector(vector) {
|
||||
const curve = new elliptic.Curve('ed25519');
|
||||
const curve = new elliptic.CurveWithOID('ed25519');
|
||||
const { publicKey } = nacl.sign.keyPair.fromSeed(util.hexToUint8Array(vector.SECRET_KEY));
|
||||
expect(publicKey).to.deep.equal(util.hexToUint8Array(vector.PUBLIC_KEY));
|
||||
const data = vector.MESSAGE;
|
||||
|
|
Loading…
Reference in New Issue
Block a user