Release new version
This commit is contained in:
parent
2e4861e0e0
commit
b22f84f9b9
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "openpgp",
|
"name": "openpgp",
|
||||||
"version": "2.6.1",
|
"version": "2.6.2",
|
||||||
"license": "LGPL-3.0+",
|
"license": "LGPL-3.0+",
|
||||||
"homepage": "http://openpgpjs.org/",
|
"homepage": "http://openpgpjs.org/",
|
||||||
"authors": [
|
"authors": [
|
||||||
|
|
69
dist/openpgp.js
vendored
69
dist/openpgp.js
vendored
|
@ -5188,6 +5188,7 @@ exports.default = {
|
||||||
integrity_protect: true, // use integrity protection for symmetric encryption
|
integrity_protect: true, // use integrity protection for symmetric encryption
|
||||||
ignore_mdc_error: false, // fail on decrypt if message is not integrity protected
|
ignore_mdc_error: false, // fail on decrypt if message is not integrity protected
|
||||||
checksum_required: false, // do not throw error when armor is missing a checksum
|
checksum_required: false, // do not throw error when armor is missing a checksum
|
||||||
|
verify_expired_keys: true, // allow signature verification with expired keys
|
||||||
rsa_blinding: true,
|
rsa_blinding: true,
|
||||||
use_native: true, // use native node.js crypto and Web Crypto apis (if available)
|
use_native: true, // use native node.js crypto and Web Crypto apis (if available)
|
||||||
zero_copy: false, // use transferable objects between the Web Worker and main thread
|
zero_copy: false, // use transferable objects between the Web Worker and main thread
|
||||||
|
@ -5195,7 +5196,7 @@ exports.default = {
|
||||||
tolerant: true, // ignore unsupported/unrecognizable packets instead of throwing an error
|
tolerant: true, // ignore unsupported/unrecognizable packets instead of throwing an error
|
||||||
show_version: true,
|
show_version: true,
|
||||||
show_comment: true,
|
show_comment: true,
|
||||||
versionstring: "OpenPGP.js v2.6.1",
|
versionstring: "OpenPGP.js v2.6.2",
|
||||||
commentstring: "https://openpgpjs.org",
|
commentstring: "https://openpgpjs.org",
|
||||||
keyserver: "https://keyserver.ubuntu.com",
|
keyserver: "https://keyserver.ubuntu.com",
|
||||||
node_store: './openpgp.store'
|
node_store: './openpgp.store'
|
||||||
|
@ -13792,16 +13793,19 @@ Key.prototype.armor = function () {
|
||||||
/**
|
/**
|
||||||
* Returns first key packet or key packet by given keyId that is available for signing or signature verification
|
* Returns first key packet or key packet by given keyId that is available for signing or signature verification
|
||||||
* @param {module:type/keyid} keyId, optional
|
* @param {module:type/keyid} keyId, optional
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {(module:packet/secret_subkey|module:packet/secret_key|null)} key packet or null if no signing key has been found
|
* @return {(module:packet/secret_subkey|module:packet/secret_key|null)} key packet or null if no signing key has been found
|
||||||
*/
|
*/
|
||||||
Key.prototype.getSigningKeyPacket = function (keyId) {
|
Key.prototype.getSigningKeyPacket = function (keyId) {
|
||||||
var primaryUser = this.getPrimaryUser();
|
var allowExpired = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
|
||||||
if (primaryUser && isValidSigningKeyPacket(this.primaryKey, primaryUser.selfCertificate) && (!keyId || this.primaryKey.getKeyId().equals(keyId))) {
|
|
||||||
|
var primaryUser = this.getPrimaryUser(allowExpired);
|
||||||
|
if (primaryUser && isValidSigningKeyPacket(this.primaryKey, primaryUser.selfCertificate) && (!keyId || this.primaryKey.getKeyId().equals(keyId)) && this.verifyPrimaryKey(allowExpired) === _enums2.default.keyStatus.valid) {
|
||||||
return this.primaryKey;
|
return this.primaryKey;
|
||||||
}
|
}
|
||||||
if (this.subKeys) {
|
if (this.subKeys) {
|
||||||
for (var i = 0; i < this.subKeys.length; i++) {
|
for (var i = 0; i < this.subKeys.length; i++) {
|
||||||
if (this.subKeys[i].isValidSigningKey(this.primaryKey) && (!keyId || this.subKeys[i].subKey.getKeyId().equals(keyId))) {
|
if (this.subKeys[i].isValidSigningKey(this.primaryKey, allowExpired) && (!keyId || this.subKeys[i].subKey.getKeyId().equals(keyId))) {
|
||||||
return this.subKeys[i].subKey;
|
return this.subKeys[i].subKey;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -13916,15 +13920,18 @@ Key.prototype.decryptKeyPacket = function (keyIds, passphrase) {
|
||||||
/**
|
/**
|
||||||
* Verify primary key. Checks for revocation signatures, expiration time
|
* Verify primary key. Checks for revocation signatures, expiration time
|
||||||
* and valid self signature
|
* and valid self signature
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {module:enums.keyStatus} The status of the primary key
|
* @return {module:enums.keyStatus} The status of the primary key
|
||||||
*/
|
*/
|
||||||
Key.prototype.verifyPrimaryKey = function () {
|
Key.prototype.verifyPrimaryKey = function () {
|
||||||
|
var allowExpired = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : false;
|
||||||
|
|
||||||
// check revocation signature
|
// check revocation signature
|
||||||
if (this.revocationSignature && !this.revocationSignature.isExpired() && (this.revocationSignature.verified || this.revocationSignature.verify(this.primaryKey, { key: this.primaryKey }))) {
|
if (this.revocationSignature && !this.revocationSignature.isExpired() && (this.revocationSignature.verified || this.revocationSignature.verify(this.primaryKey, { key: this.primaryKey }))) {
|
||||||
return _enums2.default.keyStatus.revoked;
|
return _enums2.default.keyStatus.revoked;
|
||||||
}
|
}
|
||||||
// check V3 expiration time
|
// check V3 expiration time
|
||||||
if (this.primaryKey.version === 3 && this.primaryKey.expirationTimeV3 !== 0 && Date.now() > this.primaryKey.created.getTime() + this.primaryKey.expirationTimeV3 * 24 * 3600 * 1000) {
|
if (!allowExpired && this.primaryKey.version === 3 && this.primaryKey.expirationTimeV3 !== 0 && Date.now() > this.primaryKey.created.getTime() + this.primaryKey.expirationTimeV3 * 24 * 3600 * 1000) {
|
||||||
return _enums2.default.keyStatus.expired;
|
return _enums2.default.keyStatus.expired;
|
||||||
}
|
}
|
||||||
// check for at least one self signature. Self signature of user ID not mandatory
|
// check for at least one self signature. Self signature of user ID not mandatory
|
||||||
|
@ -13944,7 +13951,7 @@ Key.prototype.verifyPrimaryKey = function () {
|
||||||
return _enums2.default.keyStatus.invalid;
|
return _enums2.default.keyStatus.invalid;
|
||||||
}
|
}
|
||||||
// check V4 expiration time
|
// check V4 expiration time
|
||||||
if (this.primaryKey.version === 4 && primaryUser.selfCertificate.keyNeverExpires === false && Date.now() > this.primaryKey.created.getTime() + primaryUser.selfCertificate.keyExpirationTime * 1000) {
|
if (!allowExpired && this.primaryKey.version === 4 && primaryUser.selfCertificate.keyNeverExpires === false && Date.now() > this.primaryKey.created.getTime() + primaryUser.selfCertificate.keyExpirationTime * 1000) {
|
||||||
return _enums2.default.keyStatus.expired;
|
return _enums2.default.keyStatus.expired;
|
||||||
}
|
}
|
||||||
return _enums2.default.keyStatus.valid;
|
return _enums2.default.keyStatus.valid;
|
||||||
|
@ -13983,9 +13990,12 @@ function getExpirationTime(keyPacket, selfCertificate) {
|
||||||
* Returns primary user and most significant (latest valid) self signature
|
* Returns primary user and most significant (latest valid) self signature
|
||||||
* - if multiple users are marked as primary users returns the one with the latest self signature
|
* - if multiple users are marked as primary users returns the one with the latest self signature
|
||||||
* - if no primary user is found returns the user with the latest self signature
|
* - if no primary user is found returns the user with the latest self signature
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {{user: Array<module:packet/User>, selfCertificate: Array<module:packet/signature>}|null} The primary user and the self signature
|
* @return {{user: Array<module:packet/User>, selfCertificate: Array<module:packet/signature>}|null} The primary user and the self signature
|
||||||
*/
|
*/
|
||||||
Key.prototype.getPrimaryUser = function () {
|
Key.prototype.getPrimaryUser = function () {
|
||||||
|
var allowExpired = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : false;
|
||||||
|
|
||||||
var primUser = [];
|
var primUser = [];
|
||||||
for (var i = 0; i < this.users.length; i++) {
|
for (var i = 0; i < this.users.length; i++) {
|
||||||
if (!this.users[i].userId || !this.users[i].selfCertifications) {
|
if (!this.users[i].userId || !this.users[i].selfCertifications) {
|
||||||
|
@ -14011,7 +14021,7 @@ Key.prototype.getPrimaryUser = function () {
|
||||||
});
|
});
|
||||||
// return first valid
|
// return first valid
|
||||||
for (var k = 0; k < primUser.length; k++) {
|
for (var k = 0; k < primUser.length; k++) {
|
||||||
if (primUser[k].user.isValidSelfCertificate(this.primaryKey, primUser[k].selfCertificate)) {
|
if (primUser[k].user.isValidSelfCertificate(this.primaryKey, primUser[k].selfCertificate, allowExpired)) {
|
||||||
return primUser[k];
|
return primUser[k];
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -14226,40 +14236,20 @@ User.prototype.isRevoked = function (certificate, primaryKey) {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the most significant (latest valid) self signature of the user
|
|
||||||
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
|
||||||
* @return {module:packet/signature} The self signature
|
|
||||||
*/
|
|
||||||
User.prototype.getValidSelfCertificate = function (primaryKey) {
|
|
||||||
if (!this.selfCertifications) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
// most recent first
|
|
||||||
var validCert = this.selfCertifications.sort(function (a, b) {
|
|
||||||
a = a.created;
|
|
||||||
b = b.created;
|
|
||||||
return a > b ? -1 : a < b ? 1 : 0;
|
|
||||||
});
|
|
||||||
for (var i = 0; i < validCert.length; i++) {
|
|
||||||
if (this.isValidSelfCertificate(primaryKey, validCert[i])) {
|
|
||||||
return validCert[i];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns true if the self certificate is valid
|
* Returns true if the self certificate is valid
|
||||||
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
||||||
* @param {module:packet/signature} selfCertificate A self certificate of this user
|
* @param {module:packet/signature} selfCertificate A self certificate of this user
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {Boolean}
|
* @return {Boolean}
|
||||||
*/
|
*/
|
||||||
User.prototype.isValidSelfCertificate = function (primaryKey, selfCertificate) {
|
User.prototype.isValidSelfCertificate = function (primaryKey, selfCertificate) {
|
||||||
|
var allowExpired = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : false;
|
||||||
|
|
||||||
if (this.isRevoked(selfCertificate, primaryKey)) {
|
if (this.isRevoked(selfCertificate, primaryKey)) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!selfCertificate.isExpired() && (selfCertificate.verified || selfCertificate.verify(primaryKey, { userid: this.userId || this.userAttribute, key: primaryKey }))) {
|
if ((!selfCertificate.isExpired() || allowExpired) && (selfCertificate.verified || selfCertificate.verify(primaryKey, { userid: this.userId || this.userAttribute, key: primaryKey }))) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
|
@ -14423,10 +14413,13 @@ SubKey.prototype.isValidEncryptionKey = function (primaryKey) {
|
||||||
/**
|
/**
|
||||||
* Returns true if the subkey can be used for signing of data
|
* Returns true if the subkey can be used for signing of data
|
||||||
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {Boolean}
|
* @return {Boolean}
|
||||||
*/
|
*/
|
||||||
SubKey.prototype.isValidSigningKey = function (primaryKey) {
|
SubKey.prototype.isValidSigningKey = function (primaryKey) {
|
||||||
if (this.verify(primaryKey) !== _enums2.default.keyStatus.valid) {
|
var allowExpired = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
|
||||||
|
|
||||||
|
if (this.verify(primaryKey, allowExpired) !== _enums2.default.keyStatus.valid) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
for (var i = 0; i < this.bindingSignatures.length; i++) {
|
for (var i = 0; i < this.bindingSignatures.length; i++) {
|
||||||
|
@ -14440,15 +14433,19 @@ SubKey.prototype.isValidSigningKey = function (primaryKey) {
|
||||||
/**
|
/**
|
||||||
* Verify subkey. Checks for revocation signatures, expiration time
|
* Verify subkey. Checks for revocation signatures, expiration time
|
||||||
* and valid binding signature
|
* and valid binding signature
|
||||||
|
* @param {module:packet/secret_key|module:packet/public_key} primaryKey The primary key packet
|
||||||
|
* @param {Boolean} allowExpired allows signature verification with expired keys
|
||||||
* @return {module:enums.keyStatus} The status of the subkey
|
* @return {module:enums.keyStatus} The status of the subkey
|
||||||
*/
|
*/
|
||||||
SubKey.prototype.verify = function (primaryKey) {
|
SubKey.prototype.verify = function (primaryKey) {
|
||||||
|
var allowExpired = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
|
||||||
|
|
||||||
// check subkey revocation signature
|
// check subkey revocation signature
|
||||||
if (this.revocationSignature && !this.revocationSignature.isExpired() && (this.revocationSignature.verified || this.revocationSignature.verify(primaryKey, { key: primaryKey, bind: this.subKey }))) {
|
if (this.revocationSignature && !this.revocationSignature.isExpired() && (this.revocationSignature.verified || this.revocationSignature.verify(primaryKey, { key: primaryKey, bind: this.subKey }))) {
|
||||||
return _enums2.default.keyStatus.revoked;
|
return _enums2.default.keyStatus.revoked;
|
||||||
}
|
}
|
||||||
// check V3 expiration time
|
// check V3 expiration time
|
||||||
if (this.subKey.version === 3 && this.subKey.expirationTimeV3 !== 0 && Date.now() > this.subKey.created.getTime() + this.subKey.expirationTimeV3 * 24 * 3600 * 1000) {
|
if (!allowExpired && this.subKey.version === 3 && this.subKey.expirationTimeV3 !== 0 && Date.now() > this.subKey.created.getTime() + this.subKey.expirationTimeV3 * 24 * 3600 * 1000) {
|
||||||
return _enums2.default.keyStatus.expired;
|
return _enums2.default.keyStatus.expired;
|
||||||
}
|
}
|
||||||
// check subkey binding signatures (at least one valid binding sig needed)
|
// check subkey binding signatures (at least one valid binding sig needed)
|
||||||
|
@ -14456,7 +14453,7 @@ SubKey.prototype.verify = function (primaryKey) {
|
||||||
var isLast = i === this.bindingSignatures.length - 1;
|
var isLast = i === this.bindingSignatures.length - 1;
|
||||||
var sig = this.bindingSignatures[i];
|
var sig = this.bindingSignatures[i];
|
||||||
// check binding signature is not expired
|
// check binding signature is not expired
|
||||||
if (sig.isExpired()) {
|
if (!allowExpired && sig.isExpired()) {
|
||||||
if (isLast) {
|
if (isLast) {
|
||||||
return _enums2.default.keyStatus.expired; // last expired binding signature
|
return _enums2.default.keyStatus.expired; // last expired binding signature
|
||||||
} else {
|
} else {
|
||||||
|
@ -14473,7 +14470,7 @@ SubKey.prototype.verify = function (primaryKey) {
|
||||||
}
|
}
|
||||||
// check V4 expiration time
|
// check V4 expiration time
|
||||||
if (this.subKey.version === 4) {
|
if (this.subKey.version === 4) {
|
||||||
if (sig.keyNeverExpires === false && Date.now() > this.subKey.created.getTime() + sig.keyExpirationTime * 1000) {
|
if (!allowExpired && sig.keyNeverExpires === false && Date.now() > this.subKey.created.getTime() + sig.keyExpirationTime * 1000) {
|
||||||
if (isLast) {
|
if (isLast) {
|
||||||
return _enums2.default.keyStatus.expired; // last V4 expired binding signature
|
return _enums2.default.keyStatus.expired; // last V4 expired binding signature
|
||||||
} else {
|
} else {
|
||||||
|
@ -15695,7 +15692,7 @@ function createVerificationObjects(signatureList, literalDataList, keys) {
|
||||||
for (var i = 0; i < signatureList.length; i++) {
|
for (var i = 0; i < signatureList.length; i++) {
|
||||||
var keyPacket = null;
|
var keyPacket = null;
|
||||||
for (var j = 0; j < keys.length; j++) {
|
for (var j = 0; j < keys.length; j++) {
|
||||||
keyPacket = keys[j].getSigningKeyPacket(signatureList[i].issuerKeyId);
|
keyPacket = keys[j].getSigningKeyPacket(signatureList[i].issuerKeyId, _config2.default.verify_expired_keys);
|
||||||
if (keyPacket) {
|
if (keyPacket) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
4
dist/openpgp.min.js
vendored
4
dist/openpgp.min.js
vendored
File diff suppressed because one or more lines are too long
2
dist/openpgp.worker.min.js
vendored
2
dist/openpgp.worker.min.js
vendored
|
@ -1,2 +1,2 @@
|
||||||
/*! OpenPGP.js v2.6.1 - 2017-12-22 - this is LGPL licensed code, see LICENSE/our website http://openpgpjs.org/ for more information. */
|
/*! OpenPGP.js v2.6.2 - 2018-01-21 - this is LGPL licensed code, see LICENSE/our website http://openpgpjs.org/ for more information. */
|
||||||
!function e(n,r,t){function o(i,f){if(!r[i]){if(!n[i]){var c="function"==typeof require&&require;if(!f&&c)return c(i,!0);if(a)return a(i,!0);var s=new Error("Cannot find module '"+i+"'");throw s.code="MODULE_NOT_FOUND",s}var u=r[i]={exports:{}};n[i][0].call(u.exports,function(e){var r=n[i][1][e];return o(r||e)},u,u.exports,e,n,r,t)}return r[i].exports}for(var a="function"==typeof require&&require,i=0;i<t.length;i++)o(t[i]);return o}({1:[function(e,n,r){function t(e){o.crypto.random.randomBuffer.size<a&&self.postMessage({event:"request-seed"}),self.postMessage(e,o.util.getTransferables.call(o.util,e.data))}self.window={},importScripts("openpgp.min.js");var o=window.openpgp,a=4e4;o.crypto.random.randomBuffer.init(6e4),self.onmessage=function(e){var n=e.data||{};switch(n.event){case"configure":!function(e){for(var n in e)o.config[n]=e[n]}(n.config);break;case"seed-random":!function(e){e instanceof Uint8Array||(e=new Uint8Array(e)),o.crypto.random.randomBuffer.set(e)}(n.buf);break;default:!function(e,n,r){"function"==typeof o[n]?(r=o.packet.clone.parseClonedPackets(r,n),o[n](r).then(function(n){t({id:e,event:"method-return",data:o.packet.clone.clonePackets(n)})}).catch(function(n){t({id:e,event:"method-return",err:n.message,stack:n.stack})})):t({id:e,event:"method-return",err:"Unknown Worker Event"})}(n.id,n.event,n.options||{})}}},{}]},{},[1]);
|
!function e(n,r,t){function o(i,f){if(!r[i]){if(!n[i]){var c="function"==typeof require&&require;if(!f&&c)return c(i,!0);if(a)return a(i,!0);var s=new Error("Cannot find module '"+i+"'");throw s.code="MODULE_NOT_FOUND",s}var u=r[i]={exports:{}};n[i][0].call(u.exports,function(e){var r=n[i][1][e];return o(r||e)},u,u.exports,e,n,r,t)}return r[i].exports}for(var a="function"==typeof require&&require,i=0;i<t.length;i++)o(t[i]);return o}({1:[function(e,n,r){function t(e){o.crypto.random.randomBuffer.size<a&&self.postMessage({event:"request-seed"}),self.postMessage(e,o.util.getTransferables.call(o.util,e.data))}self.window={},importScripts("openpgp.min.js");var o=window.openpgp,a=4e4;o.crypto.random.randomBuffer.init(6e4),self.onmessage=function(e){var n=e.data||{};switch(n.event){case"configure":!function(e){for(var n in e)o.config[n]=e[n]}(n.config);break;case"seed-random":!function(e){e instanceof Uint8Array||(e=new Uint8Array(e)),o.crypto.random.randomBuffer.set(e)}(n.buf);break;default:!function(e,n,r){"function"==typeof o[n]?(r=o.packet.clone.parseClonedPackets(r,n),o[n](r).then(function(n){t({id:e,event:"method-return",data:o.packet.clone.clonePackets(n)})}).catch(function(n){t({id:e,event:"method-return",err:n.message,stack:n.stack})})):t({id:e,event:"method-return",err:"Unknown Worker Event"})}(n.id,n.event,n.options||{})}}},{}]},{},[1]);
|
4964
npm-shrinkwrap.json
generated
4964
npm-shrinkwrap.json
generated
File diff suppressed because it is too large
Load Diff
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
"name": "openpgp",
|
"name": "openpgp",
|
||||||
"description": "OpenPGP.js is a Javascript implementation of the OpenPGP protocol. This is defined in RFC 4880.",
|
"description": "OpenPGP.js is a Javascript implementation of the OpenPGP protocol. This is defined in RFC 4880.",
|
||||||
"version": "2.6.1",
|
"version": "2.6.2",
|
||||||
"license": "LGPL-3.0+",
|
"license": "LGPL-3.0+",
|
||||||
"homepage": "http://openpgpjs.org/",
|
"homepage": "http://openpgpjs.org/",
|
||||||
"engines": {
|
"engines": {
|
||||||
|
|
Loading…
Reference in New Issue
Block a user