Switch util function names to camelCase (#1091)

This commit is contained in:
Ilya Chesnokov 2020-04-29 06:20:03 +07:00 committed by Daniel Huigens
parent d415bc2546
commit e16807505f
54 changed files with 313 additions and 313 deletions

View File

@ -77,16 +77,16 @@ library to convert back and forth between them.
* Version 2.x of the library has been built from the ground up with Uint8Arrays. This allows for much better performance and memory usage than strings.
* If the user's browser supports [native WebCrypto](https://caniuse.com/#feat=cryptography) via the `window.crypto.subtle` API, this will be used. Under Node.js the native [crypto module](https://nodejs.org/api/crypto.html#crypto_crypto) is used. This can be deactivated by setting `openpgp.config.use_native = false`.
* If the user's browser supports [native WebCrypto](https://caniuse.com/#feat=cryptography) via the `window.crypto.subtle` API, this will be used. Under Node.js the native [crypto module](https://nodejs.org/api/crypto.html#crypto_crypto) is used. This can be deactivated by setting `openpgp.config.useNative = false`.
* The library implements the [IETF proposal](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-07) for authenticated encryption using native AES-EAX, OCB, or GCM. This makes symmetric encryption up to 30x faster on supported platforms. Since the specification has not been finalized and other OpenPGP implementations haven't adopted it yet, the feature is currently behind a flag. **Note: activating this setting can break compatibility with other OpenPGP implementations, and also with future versions of OpenPGP.js. Don't use it with messages you want to store on disk or in a database.** You can enable it by setting `openpgp.config.aead_protect = true`.
* The library implements the [IETF proposal](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-07) for authenticated encryption using native AES-EAX, OCB, or GCM. This makes symmetric encryption up to 30x faster on supported platforms. Since the specification has not been finalized and other OpenPGP implementations haven't adopted it yet, the feature is currently behind a flag. **Note: activating this setting can break compatibility with other OpenPGP implementations, and also with future versions of OpenPGP.js. Don't use it with messages you want to store on disk or in a database.** You can enable it by setting `openpgp.config.aeadProtect = true`.
You can change the AEAD mode by setting one of the following options:
```
openpgp.config.aead_mode = openpgp.enums.aead.eax // Default, native
openpgp.config.aead_mode = openpgp.enums.aead.ocb // Non-native
openpgp.config.aead_mode = openpgp.enums.aead.experimental_gcm // **Non-standard**, fastest
openpgp.config.aeadMode = openpgp.enums.aead.eax // Default, native
openpgp.config.aeadMode = openpgp.enums.aead.ocb // Non-native
openpgp.config.aeadMode = openpgp.enums.aead.experimental_gcm // **Non-standard**, fastest
```
* For environments that don't provide native crypto, the library falls back to [asm.js](https://caniuse.com/#feat=asmjs) implementations of AES, SHA-1, and SHA-256. We use [Rusha](https://github.com/srijs/rusha) and [asmCrypto Lite](https://github.com/openpgpjs/asmcrypto-lite) (a minimal subset of asmCrypto.js built specifically for OpenPGP.js).
@ -127,12 +127,12 @@ Copy `dist/openpgp.min.js` or `dist/compat/openpgp.min.js` (depending on the bro
To offload cryptographic operations off the main thread, you can implement a Web Worker in your application and load OpenPGP.js from there. This can be more performant if you store or fetch keys and messages directly inside the Worker, so that they don't have to be `postMessage`d there. For an example Worker implementation, see `test/worker/worker_example.js`.
If you want to use the lightweight build (which is smaller, and lazily loads non-default curves on demand), copy `dist/lightweight/openpgp.min.js` and `dist/lightweight/elliptic.min.js`, load the former in a script tag, and point `openpgp.config.indutny_elliptic_path` to the latter:
If you want to use the lightweight build (which is smaller, and lazily loads non-default curves on demand), copy `dist/lightweight/openpgp.min.js` and `dist/lightweight/elliptic.min.js`, load the former in a script tag, and point `openpgp.config.indutnyEllipticPath` to the latter:
```html
<script src="lightweight/openpgp.min.js"></script>
<script>
openpgp.config.indutny_elliptic_path = 'lightweight/elliptic.min.js';
openpgp.config.indutnyEllipticPath = 'lightweight/elliptic.min.js';
</script>
```
@ -146,7 +146,7 @@ For more examples of how to generate a key, see [Generate new key pair](#generat
#### Encrypt and decrypt *Uint8Array* data with a password
Encryption will use the algorithm specified in config.encryption_cipher (defaults to aes256), and decryption will use the algorithm used for encryption.
Encryption will use the algorithm specified in config.encryptionCipher (defaults to aes256), and decryption will use the algorithm used for encryption.
```js
(async () => {

View File

@ -72,7 +72,7 @@ export default {
switch (algo) {
case enums.publicKey.rsa_encrypt:
case enums.publicKey.rsa_encrypt_sign: {
data = util.str_to_Uint8Array(data);
data = util.strToUint8Array(data);
const n = pub_params[0].toUint8Array();
const e = pub_params[1].toUint8Array();
const res = await publicKey.rsa.encrypt(data, n, e);

View File

@ -20,8 +20,8 @@ import util from '../../util';
// MD5 Digest
async function md5(entree) {
const digest = md51(util.Uint8Array_to_str(entree));
return util.hex_to_Uint8Array(hex(digest));
const digest = md51(util.uint8ArrayToStr(entree));
return util.hexToUint8Array(hex(digest));
}
function md5cycle(x, k) {

View File

@ -130,7 +130,7 @@ eme.decode = function(EM) {
*/
emsa.encode = async function(algo, hashed, emLen) {
let i;
const H = util.Uint8Array_to_str(hashed);
const H = util.uint8ArrayToStr(hashed);
if (H.length !== hash.getHashByteLength(algo)) {
throw new Error('Invalid hash length');
}
@ -160,7 +160,7 @@ emsa.encode = async function(algo, hashed, emLen) {
PS +
String.fromCharCode(0x00) +
T;
return util.str_to_hex(EM);
return util.strToHex(EM);
};
export default { eme, emsa };

View File

@ -105,7 +105,7 @@ export default {
verify: async function(hash_algo, r, s, hashed, g, p, q, y) {
if (zero.ucmp(r) >= 0 || r.ucmp(q) >= 0 ||
zero.ucmp(s) >= 0 || s.ucmp(q) >= 0) {
util.print_debug("invalid DSA Signature");
util.printDebug("invalid DSA Signature");
return null;
}
const redp = new BN.red(p);
@ -113,7 +113,7 @@ export default {
const h = new BN(hashed.subarray(0, q.byteLength()));
const w = s.toRed(redq).redInvm(); // s**-1 mod q
if (zero.cmp(w) === 0) {
util.print_debug("invalid DSA Signature");
util.printDebug("invalid DSA Signature");
return null;
}
const u1 = h.toRed(redq).redMul(w); // H(m) * w mod q

View File

@ -184,7 +184,7 @@ Curve.prototype.genKeyPair = async function () {
try {
return await webGenKeyPair(this.name);
} catch (err) {
util.print_debug_error("Browser did not support generating ec key " + err.message);
util.printDebugError("Browser did not support generating ec key " + err.message);
break;
}
case 'node':
@ -207,7 +207,7 @@ Curve.prototype.genKeyPair = async function () {
}
const indutnyCurve = await getIndutnyCurve(this.name);
keyPair = await indutnyCurve.genKeyPair({
entropy: util.Uint8Array_to_str(await random.getRandomBytes(32))
entropy: util.uint8ArrayToStr(await random.getRandomBytes(32))
});
return { publicKey: new Uint8Array(keyPair.getPublic('array', false)), privateKey: keyPair.getPrivate().toArrayLike(Uint8Array) };
};
@ -313,7 +313,7 @@ async function webGenKeyPair(name) {
return {
publicKey: jwkToRawPublic(publicKey),
privateKey: util.b64_to_Uint8Array(privateKey.d, true)
privateKey: util.b64ToUint8Array(privateKey.d, true)
};
}
@ -339,8 +339,8 @@ async function nodeGenKeyPair(name) {
* @returns {Uint8Array} raw public key
*/
function jwkToRawPublic(jwk) {
const bufX = util.b64_to_Uint8Array(jwk.x);
const bufY = util.b64_to_Uint8Array(jwk.y);
const bufX = util.b64ToUint8Array(jwk.x);
const bufY = util.b64ToUint8Array(jwk.y);
const publicKey = new Uint8Array(bufX.length + bufY.length + 1);
publicKey[0] = 0x04;
publicKey.set(bufX, 1);
@ -363,8 +363,8 @@ function rawPublicToJwk(payloadSize, name, publicKey) {
const jwk = {
kty: "EC",
crv: name,
x: util.Uint8Array_to_b64(bufX, true),
y: util.Uint8Array_to_b64(bufY, true),
x: util.uint8ArrayToB64(bufX, true),
y: util.uint8ArrayToB64(bufY, true),
ext: true
};
return jwk;
@ -380,6 +380,6 @@ function rawPublicToJwk(payloadSize, name, publicKey) {
*/
function privateToJwk(payloadSize, name, publicKey, privateKey) {
const jwk = rawPublicToJwk(payloadSize, name, publicKey);
jwk.d = util.Uint8Array_to_b64(privateKey, true);
jwk.d = util.uint8ArrayToB64(privateKey, true);
return jwk;
}

View File

@ -62,7 +62,7 @@ function buildEcdhParam(public_algo, oid, kdfParams, fingerprint) {
oid.write(),
new Uint8Array([public_algo]),
kdfParams.write(),
util.str_to_Uint8Array("Anonymous Sender "),
util.strToUint8Array("Anonymous Sender "),
fingerprint.subarray(0, 20)
]);
}
@ -138,7 +138,7 @@ async function genPublicEphemeralKey(curve, Q) {
try {
return await webPublicEphemeralKey(curve, Q);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
}
}
break;
@ -196,7 +196,7 @@ async function genPrivateEphemeralKey(curve, V, Q, d) {
try {
return await webPrivateEphemeralKey(curve, V, Q, d);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
}
}
break;
@ -286,7 +286,7 @@ async function webPrivateEphemeralKey(curve, V, Q, d) {
);
[S, secret] = await Promise.all([S, secret]);
const sharedKey = new Uint8Array(S);
const secretKey = util.b64_to_Uint8Array(secret.d, true);
const secretKey = util.b64ToUint8Array(secret.d, true);
return { secretKey, sharedKey };
}

View File

@ -65,7 +65,7 @@ async function sign(oid, hash_algo, message, publicKey, privateKey, hashed) {
if (curve.name !== 'p521' && (err.name === 'DataError' || err.name === 'OperationError')) {
throw err;
}
util.print_debug_error("Browser did not support verifying: " + err.message);
util.print_debug_error("Browser did not support signing: " + err.message);
}
break;
}

View File

@ -96,7 +96,7 @@ export default {
try {
return await this.webSign(enums.read(enums.webHash, hash_algo), data, n, e, d, p, q, u);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
}
} else if (util.getNodeCrypto()) {
return this.nodeSign(hash_algo, data, n, e, d, p, q, u);
@ -122,7 +122,7 @@ export default {
try {
return await this.webVerify(enums.read(enums.webHash, hash_algo), data, s, n, e);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
}
} else if (util.getNodeCrypto()) {
return this.nodeVerify(hash_algo, data, s, n, e);
@ -224,14 +224,14 @@ export default {
}
// map JWK parameters to BN
key = {};
key.n = new BN(util.b64_to_Uint8Array(jwk.n));
key.n = new BN(util.b64ToUint8Array(jwk.n));
key.e = E;
key.d = new BN(util.b64_to_Uint8Array(jwk.d));
key.d = new BN(util.b64ToUint8Array(jwk.d));
// switch p and q
key.p = new BN(util.b64_to_Uint8Array(jwk.q));
key.q = new BN(util.b64_to_Uint8Array(jwk.p));
key.p = new BN(util.b64ToUint8Array(jwk.q));
key.q = new BN(util.b64ToUint8Array(jwk.p));
// Since p and q are switched in places, we could keep u
key.u = new BN(util.b64_to_Uint8Array(jwk.qi));
key.u = new BN(util.b64ToUint8Array(jwk.qi));
return key;
} else if (util.getNodeCrypto() && nodeCrypto.generateKeyPair && RSAPrivateKey) {
const opts = {
@ -405,7 +405,7 @@ export default {
const nred = new BN.red(n);
const EM1 = s.toRed(nred).redPow(e).toArrayLike(Uint8Array, 'be', n.byteLength());
const EM2 = await pkcs1.emsa.encode(hash_algo, hashed, n.byteLength());
return util.Uint8Array_to_hex(EM1) === EM2;
return util.uint8ArrayToHex(EM1) === EM2;
},
webVerify: async function (hash_name, data, s, n, e) {
@ -462,7 +462,7 @@ export default {
bnEncrypt: async function (data, n, e) {
n = new BN(n);
data = new type_mpi(await pkcs1.eme.encode(util.Uint8Array_to_str(data), n.byteLength()));
data = new type_mpi(await pkcs1.eme.encode(util.uint8ArrayToStr(data), n.byteLength()));
data = data.toBN();
e = new BN(e);
if (n.cmp(data) <= 0) {
@ -502,7 +502,7 @@ export default {
key = { key: pem, padding: nodeCrypto.constants.RSA_PKCS1_PADDING };
}
try {
return util.Uint8Array_to_str(nodeCrypto.privateDecrypt(key, data));
return util.uint8ArrayToStr(nodeCrypto.privateDecrypt(key, data));
} catch (err) {
throw new Error('Decryption error');
}
@ -572,16 +572,16 @@ function privateToJwk(n, e, d, p, q, u) {
dq = dq.toArrayLike(Uint8Array);
return {
kty: 'RSA',
n: util.Uint8Array_to_b64(n, true),
e: util.Uint8Array_to_b64(e, true),
d: util.Uint8Array_to_b64(d, true),
n: util.uint8ArrayToB64(n, true),
e: util.uint8ArrayToB64(e, true),
d: util.uint8ArrayToB64(d, true),
// switch p and q
p: util.Uint8Array_to_b64(q, true),
q: util.Uint8Array_to_b64(p, true),
p: util.uint8ArrayToB64(q, true),
q: util.uint8ArrayToB64(p, true),
// switch dp and dq
dp: util.Uint8Array_to_b64(dq, true),
dq: util.Uint8Array_to_b64(dp, true),
qi: util.Uint8Array_to_b64(u, true),
dp: util.uint8ArrayToB64(dq, true),
dq: util.uint8ArrayToB64(dp, true),
qi: util.uint8ArrayToB64(u, true),
ext: true
};
}
@ -595,8 +595,8 @@ function privateToJwk(n, e, d, p, q, u) {
function publicToJwk(n, e) {
return {
kty: 'RSA',
n: util.Uint8Array_to_b64(n, true),
e: util.Uint8Array_to_b64(e, true),
n: util.uint8ArrayToB64(n, true),
e: util.uint8ArrayToB64(e, true),
ext: true
};
}

View File

@ -98,7 +98,7 @@ export default {
const q = key_params[4].toUint8Array();
const u = key_params[5].toUint8Array();
const signature = await publicKey.rsa.sign(hash_algo, data, n, e, d, p, q, u, hashed);
return util.Uint8Array_to_MPI(signature);
return util.uint8ArrayToMpi(signature);
}
case enums.publicKey.dsa: {
const p = key_params[0].toBN();
@ -107,8 +107,8 @@ export default {
const x = key_params[4].toBN();
const signature = await publicKey.dsa.sign(hash_algo, hashed, g, p, q, x);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.r),
util.Uint8Array_to_MPI(signature.s)
util.uint8ArrayToMpi(signature.r),
util.uint8ArrayToMpi(signature.s)
]);
}
case enums.publicKey.elgamal: {
@ -118,16 +118,16 @@ export default {
const { oid, Q, d } = publicKey.elliptic.ecdsa.parseParams(key_params);
const signature = await publicKey.elliptic.ecdsa.sign(oid, hash_algo, data, Q, d, hashed);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.r),
util.Uint8Array_to_MPI(signature.s)
util.uint8ArrayToMpi(signature.r),
util.uint8ArrayToMpi(signature.s)
]);
}
case enums.publicKey.eddsa: {
const { oid, Q, seed } = publicKey.elliptic.eddsa.parseParams(key_params);
const signature = await publicKey.elliptic.eddsa.sign(oid, hash_algo, data, Q, seed, hashed);
return util.concatUint8Array([
util.Uint8Array_to_MPI(signature.R),
util.Uint8Array_to_MPI(signature.S)
util.uint8ArrayToMpi(signature.R),
util.uint8ArrayToMpi(signature.S)
]);
}
default:

View File

@ -199,7 +199,7 @@ function verifyHeaders(headers) {
throw new Error('Improperly formatted armor header: ' + headers[i]);
}
if (!/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(headers[i])) {
util.print_debug_error(new Error('Unknown header: ' + headers[i]));
util.printDebugError(new Error('Unknown header: ' + headers[i]));
}
}
}

View File

@ -31,8 +31,8 @@ if (Buffer) {
return new Uint8Array(b.buffer, b.byteOffset, b.byteLength);
};
} else {
encodeChunk = buf => btoa(util.Uint8Array_to_str(buf));
decodeChunk = str => util.str_to_Uint8Array(atob(str));
encodeChunk = buf => btoa(util.uint8ArrayToStr(buf));
decodeChunk = str => util.strToUint8Array(atob(str));
}
/**

View File

@ -105,7 +105,7 @@ Key.prototype.packetlist2structure = function(packetlist) {
case enums.signature.cert_casual:
case enums.signature.cert_positive:
if (!user) {
util.print_debug('Dropping certification signatures without preceding user packet');
util.printDebug('Dropping certification signatures without preceding user packet');
continue;
}
if (packetlist[i].issuerKeyId.equals(primaryKeyId)) {
@ -126,7 +126,7 @@ Key.prototype.packetlist2structure = function(packetlist) {
break;
case enums.signature.subkey_binding:
if (!subKey) {
util.print_debug('Dropping subkey binding signature without preceding subkey packet');
util.printDebug('Dropping subkey binding signature without preceding subkey packet');
continue;
}
subKey.bindingSignatures.push(packetlist[i]);
@ -136,7 +136,7 @@ Key.prototype.packetlist2structure = function(packetlist) {
break;
case enums.signature.subkey_revocation:
if (!subKey) {
util.print_debug('Dropping subkey revocation signature without preceding subkey packet');
util.printDebug('Dropping subkey revocation signature without preceding subkey packet');
continue;
}
subKey.revocationSignatures.push(packetlist[i]);

View File

@ -123,7 +123,7 @@ Message.prototype.decrypt = async function(privateKeys, passwords, sessionKeys,
try {
await symEncryptedPacket.decrypt(keyObj.algorithm, keyObj.data, streaming);
} catch (e) {
util.print_debug_error(e);
util.printDebugError(e);
exception = e;
}
}));
@ -172,7 +172,7 @@ Message.prototype.decryptSessionKeys = async function(privateKeys, passwords) {
await keyPacket.decrypt(password);
keyPackets.push(keyPacket);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
}
}));
}));
@ -212,7 +212,7 @@ Message.prototype.decryptSessionKeys = async function(privateKeys, passwords) {
}
keyPackets.push(keyPacket);
} catch (err) {
util.print_debug_error(err);
util.printDebugError(err);
exception = err;
}
}));
@ -229,7 +229,7 @@ Message.prototype.decryptSessionKeys = async function(privateKeys, passwords) {
if (keyPackets.length > 1) {
const seen = {};
keyPackets = keyPackets.filter(function(item) {
const k = item.sessionKeyAlgorithm + util.Uint8Array_to_str(item.sessionKey);
const k = item.sessionKeyAlgorithm + util.uint8ArrayToStr(item.sessionKey);
if (seen.hasOwnProperty(k)) {
return false;
}

View File

@ -567,7 +567,7 @@ async function prepareSignatures(signatures) {
} catch (e) {
signature.valid = false;
signature.error = e;
util.print_debug_error(e);
util.printDebugError(e);
}
}));
}
@ -580,7 +580,7 @@ async function prepareSignatures(signatures) {
*/
function onError(message, error) {
// log the stack trace
util.print_debug_error(error);
util.printDebugError(error);
// update error message
try {

View File

@ -64,7 +64,7 @@ Literal.prototype.setText = function(text, format = 'utf8') {
*/
Literal.prototype.getText = function(clone = false) {
if (this.text === null || util.isStream(this.text)) { // Assume that this.text has been read
this.text = util.decode_utf8(util.nativeEOL(this.getBytes(clone)));
this.text = util.decodeUtf8(util.nativeEOL(this.getBytes(clone)));
}
return this.text;
};
@ -89,7 +89,7 @@ Literal.prototype.setBytes = function(bytes, format) {
Literal.prototype.getBytes = function(clone = false) {
if (this.data === null) {
// encode UTF8 and normalize EOL to \r\n
this.data = util.canonicalizeEOL(util.encode_utf8(this.text));
this.data = util.canonicalizeEOL(util.encodeUtf8(this.text));
}
if (clone) {
return stream.passiveClone(this.data);
@ -128,7 +128,7 @@ Literal.prototype.read = async function(bytes) {
const format = enums.read(enums.literal, await reader.readByte());
const filename_len = await reader.readByte();
this.filename = util.decode_utf8(await reader.readBytes(filename_len));
this.filename = util.decodeUtf8(await reader.readBytes(filename_len));
this.date = util.readDate(await reader.readBytes(4));
@ -144,7 +144,7 @@ Literal.prototype.read = async function(bytes) {
* @returns {Uint8Array} Uint8Array representation of the packet
*/
Literal.prototype.writeHeader = function() {
const filename = util.encode_utf8(this.filename);
const filename = util.encodeUtf8(this.filename);
const filename_length = new Uint8Array([filename.length]);
const format = new Uint8Array([enums.write(enums.literal, this.format)]);

View File

@ -59,7 +59,7 @@ List.prototype.read = async function (bytes, streaming) {
// about and throw on parse errors for.
await writer.abort(e);
}
util.print_debug_error(e);
util.printDebugError(e);
}
});
if (done) {

View File

@ -206,9 +206,9 @@ PublicKey.prototype.getKeyId = function () {
}
this.keyid = new type_keyid();
if (this.version === 5) {
this.keyid.read(util.hex_to_Uint8Array(this.getFingerprint()).subarray(0, 8));
this.keyid.read(util.hexToUint8Array(this.getFingerprint()).subarray(0, 8));
} else if (this.version === 4) {
this.keyid.read(util.hex_to_Uint8Array(this.getFingerprint()).subarray(12, 20));
this.keyid.read(util.hexToUint8Array(this.getFingerprint()).subarray(12, 20));
}
return this.keyid;
};
@ -235,7 +235,7 @@ PublicKey.prototype.getFingerprintBytes = function () {
* @returns {String} A string containing the fingerprint in lowercase hex
*/
PublicKey.prototype.getFingerprint = function() {
return util.Uint8Array_to_hex(this.getFingerprintBytes());
return util.uint8ArrayToHex(this.getFingerprintBytes());
};
/**

View File

@ -109,8 +109,8 @@ PublicKeyEncryptedSessionKey.prototype.write = function () {
PublicKeyEncryptedSessionKey.prototype.encrypt = async function (key) {
let data = String.fromCharCode(enums.write(enums.symmetric, this.sessionKeyAlgorithm));
data += util.Uint8Array_to_str(this.sessionKey);
data += util.Uint8Array_to_str(util.write_checksum(this.sessionKey));
data += util.uint8ArrayToStr(this.sessionKey);
data += util.uint8ArrayToStr(util.writeChecksum(this.sessionKey));
const algo = enums.write(enums.publicKey, this.publicKeyAlgorithm);
this.encrypted = await crypto.publicKeyEncrypt(
algo, key.params, data, key.getFingerprintBytes());
@ -134,10 +134,10 @@ PublicKeyEncryptedSessionKey.prototype.decrypt = async function (key) {
throw new Error('Decryption error');
}
const decoded = await crypto.publicKeyDecrypt(algo, key.params, this.encrypted, key.getFingerprintBytes());
const checksum = util.str_to_Uint8Array(decoded.substr(decoded.length - 2));
key = util.str_to_Uint8Array(decoded.substring(1, decoded.length - 2));
const checksum = util.strToUint8Array(decoded.substr(decoded.length - 2));
key = util.strToUint8Array(decoded.substring(1, decoded.length - 2));
if (!util.equalsUint8Array(checksum, util.write_checksum(key))) {
if (!util.equalsUint8Array(checksum, util.writeChecksum(key))) {
throw new Error('Decryption error');
} else {
this.sessionKey = key;

View File

@ -185,7 +185,7 @@ SecretKey.prototype.read = function (bytes) {
if (!this.isEncrypted) {
const cleartext = this.keyMaterial.subarray(0, -2);
if (!util.equalsUint8Array(util.write_checksum(cleartext), this.keyMaterial.subarray(-2))) {
if (!util.equalsUint8Array(util.writeChecksum(cleartext), this.keyMaterial.subarray(-2))) {
throw new Error('Key checksum mismatch');
}
const privParams = parse_cleartext_params(cleartext, this.algorithm);
@ -237,7 +237,7 @@ SecretKey.prototype.write = function () {
const cleartextParams = write_cleartext_params(this.params, this.algorithm);
this.keyMaterial = util.concatUint8Array([
cleartextParams,
util.write_checksum(cleartextParams)
util.writeChecksum(cleartextParams)
]);
}

View File

@ -224,7 +224,7 @@ Signature.prototype.write_hashed_sub_packets = function () {
arr.push(write_sub_packet(sub.key_expiration_time, util.writeNumber(this.keyExpirationTime, 4)));
}
if (this.preferredSymmetricAlgorithms !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.preferredSymmetricAlgorithms));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.preferredSymmetricAlgorithms));
arr.push(write_sub_packet(sub.preferred_symmetric_algorithms, bytes));
}
if (this.revocationKeyClass !== null) {
@ -238,55 +238,55 @@ Signature.prototype.write_hashed_sub_packets = function () {
bytes.push(util.writeNumber(name.length, 2));
// 2 octets of value length
bytes.push(util.writeNumber(value.length, 2));
bytes.push(util.str_to_Uint8Array(name));
bytes.push(util.strToUint8Array(name));
bytes.push(value);
bytes = util.concat(bytes);
arr.push(write_sub_packet(sub.notation_data, bytes));
});
if (this.preferredHashAlgorithms !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.preferredHashAlgorithms));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.preferredHashAlgorithms));
arr.push(write_sub_packet(sub.preferred_hash_algorithms, bytes));
}
if (this.preferredCompressionAlgorithms !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.preferredCompressionAlgorithms));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.preferredCompressionAlgorithms));
arr.push(write_sub_packet(sub.preferred_compression_algorithms, bytes));
}
if (this.keyServerPreferences !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.keyServerPreferences));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.keyServerPreferences));
arr.push(write_sub_packet(sub.key_server_preferences, bytes));
}
if (this.preferredKeyServer !== null) {
arr.push(write_sub_packet(sub.preferred_key_server, util.str_to_Uint8Array(this.preferredKeyServer)));
arr.push(write_sub_packet(sub.preferred_key_server, util.strToUint8Array(this.preferredKeyServer)));
}
if (this.isPrimaryUserID !== null) {
arr.push(write_sub_packet(sub.primary_user_id, new Uint8Array([this.isPrimaryUserID ? 1 : 0])));
}
if (this.policyURI !== null) {
arr.push(write_sub_packet(sub.policy_uri, util.str_to_Uint8Array(this.policyURI)));
arr.push(write_sub_packet(sub.policy_uri, util.strToUint8Array(this.policyURI)));
}
if (this.keyFlags !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.keyFlags));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.keyFlags));
arr.push(write_sub_packet(sub.key_flags, bytes));
}
if (this.signersUserId !== null) {
arr.push(write_sub_packet(sub.signers_user_id, util.str_to_Uint8Array(this.signersUserId)));
arr.push(write_sub_packet(sub.signers_user_id, util.strToUint8Array(this.signersUserId)));
}
if (this.reasonForRevocationFlag !== null) {
bytes = util.str_to_Uint8Array(String.fromCharCode(this.reasonForRevocationFlag) + this.reasonForRevocationString);
bytes = util.strToUint8Array(String.fromCharCode(this.reasonForRevocationFlag) + this.reasonForRevocationString);
arr.push(write_sub_packet(sub.reason_for_revocation, bytes));
}
if (this.features !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.features));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.features));
arr.push(write_sub_packet(sub.features, bytes));
}
if (this.signatureTargetPublicKeyAlgorithm !== null) {
bytes = [new Uint8Array([this.signatureTargetPublicKeyAlgorithm, this.signatureTargetHashAlgorithm])];
bytes.push(util.str_to_Uint8Array(this.signatureTargetHash));
bytes.push(util.strToUint8Array(this.signatureTargetHash));
bytes = util.concat(bytes);
arr.push(write_sub_packet(sub.signature_target, bytes));
}
if (this.preferredAeadAlgorithms !== null) {
bytes = util.str_to_Uint8Array(util.Uint8Array_to_str(this.preferredAeadAlgorithms));
bytes = util.strToUint8Array(util.uint8ArrayToStr(this.preferredAeadAlgorithms));
arr.push(write_sub_packet(sub.preferred_aead_algorithms, bytes));
}
@ -447,13 +447,13 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
const n = util.readNumber(bytes.subarray(mypos, mypos + 2));
mypos += 2;
const name = util.Uint8Array_to_str(bytes.subarray(mypos, mypos + m));
const name = util.uint8ArrayToStr(bytes.subarray(mypos, mypos + m));
const value = bytes.subarray(mypos + m, mypos + m + n);
this.rawNotations.push({ name, humanReadable, value });
if (humanReadable) {
this.notations[name] = util.Uint8Array_to_str(value);
this.notations[name] = util.uint8ArrayToStr(value);
}
if (critical && (config.knownNotations.indexOf(name) === -1)) {
@ -475,7 +475,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
break;
case 24:
// Preferred Key Server
this.preferredKeyServer = util.Uint8Array_to_str(bytes.subarray(mypos, bytes.length));
this.preferredKeyServer = util.uint8ArrayToStr(bytes.subarray(mypos, bytes.length));
break;
case 25:
// Primary User ID
@ -483,7 +483,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
break;
case 26:
// Policy URI
this.policyURI = util.Uint8Array_to_str(bytes.subarray(mypos, bytes.length));
this.policyURI = util.uint8ArrayToStr(bytes.subarray(mypos, bytes.length));
break;
case 27:
// Key Flags
@ -491,12 +491,12 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
break;
case 28:
// Signer's User ID
this.signersUserId = util.Uint8Array_to_str(bytes.subarray(mypos, bytes.length));
this.signersUserId = util.uint8ArrayToStr(bytes.subarray(mypos, bytes.length));
break;
case 29:
// Reason for Revocation
this.reasonForRevocationFlag = bytes[mypos++];
this.reasonForRevocationString = util.Uint8Array_to_str(bytes.subarray(mypos, bytes.length));
this.reasonForRevocationString = util.uint8ArrayToStr(bytes.subarray(mypos, bytes.length));
break;
case 30:
// Features
@ -510,7 +510,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
const len = crypto.getHashByteLength(this.signatureTargetHashAlgorithm);
this.signatureTargetHash = util.Uint8Array_to_str(bytes.subarray(mypos, mypos + len));
this.signatureTargetHash = util.uint8ArrayToStr(bytes.subarray(mypos, mypos + len));
break;
}
case 32:
@ -537,7 +537,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
if (critical) {
throw err;
} else {
util.print_debug(err);
util.printDebug(err);
}
}
}
@ -569,7 +569,7 @@ Signature.prototype.toSign = function (type, data) {
switch (type) {
case t.binary:
if (data.text !== null) {
return util.encode_utf8(data.getText(true));
return util.encodeUtf8(data.getText(true));
}
return data.getBytes(true);

View File

@ -59,7 +59,7 @@ UserAttribute.prototype.read = function(bytes) {
const len = packet.readSimpleLength(bytes.subarray(i, bytes.length));
i += len.offset;
this.attributes.push(util.Uint8Array_to_str(bytes.subarray(i, i + len.len)));
this.attributes.push(util.uint8ArrayToStr(bytes.subarray(i, i + len.len)));
i += len.len;
}
};
@ -72,7 +72,7 @@ UserAttribute.prototype.write = function() {
const arr = [];
for (let i = 0; i < this.attributes.length; i++) {
arr.push(packet.writeSimpleLength(this.attributes[i].length));
arr.push(util.str_to_Uint8Array(this.attributes[i]));
arr.push(util.strToUint8Array(this.attributes[i]));
}
return util.concatUint8Array(arr);
};

View File

@ -52,7 +52,7 @@ function Userid() {
* @param {Uint8Array} input payload of a tag 13 packet
*/
Userid.prototype.read = function (bytes) {
this.parse(util.decode_utf8(bytes));
this.parse(util.decodeUtf8(bytes));
};
/**
@ -70,7 +70,7 @@ Userid.prototype.parse = function (userid) {
* @returns {Uint8Array} binary representation
*/
Userid.prototype.write = function () {
return util.encode_utf8(this.userid);
return util.encodeUtf8(this.userid);
};
/**

View File

@ -31,7 +31,7 @@ function ECDHSymmetricKey(data) {
if (typeof data === 'undefined') {
data = new Uint8Array([]);
} else if (util.isString(data)) {
data = util.str_to_Uint8Array(data);
data = util.strToUint8Array(data);
} else {
data = new Uint8Array(data);
}

View File

@ -41,7 +41,7 @@ function Keyid() {
* @param {Uint8Array} input Input to read the key id from
*/
Keyid.prototype.read = function(bytes) {
this.bytes = util.Uint8Array_to_str(bytes.subarray(0, 8));
this.bytes = util.uint8ArrayToStr(bytes.subarray(0, 8));
};
/**
@ -49,7 +49,7 @@ Keyid.prototype.read = function(bytes) {
* @returns {Uint8Array} Key ID as a Uint8Array
*/
Keyid.prototype.write = function() {
return util.str_to_Uint8Array(this.bytes);
return util.strToUint8Array(this.bytes);
};
/**
@ -57,7 +57,7 @@ Keyid.prototype.write = function() {
* @returns {String} Key ID as a hexadecimal string
*/
Keyid.prototype.toHex = function() {
return util.str_to_hex(this.bytes);
return util.strToHex(this.bytes);
};
/**
@ -91,7 +91,7 @@ Keyid.mapToHex = function (keyId) {
Keyid.fromId = function (hex) {
const keyid = new Keyid();
keyid.read(util.hex_to_Uint8Array(hex));
keyid.read(util.hexToUint8Array(hex));
return keyid;
};

View File

@ -62,7 +62,7 @@ function MPI(data) {
*/
MPI.prototype.read = function (bytes, endian = 'be') {
if (util.isString(bytes)) {
bytes = util.str_to_Uint8Array(bytes);
bytes = util.strToUint8Array(bytes);
}
const bits = (bytes[0] << 8) | bytes[1];
@ -82,7 +82,7 @@ MPI.prototype.read = function (bytes, endian = 'be') {
* @returns {Uint8Aray} mpi Byte representation
*/
MPI.prototype.write = function (endian, length) {
return util.Uint8Array_to_MPI(this.toUint8Array(endian, length));
return util.uint8ArrayToMpi(this.toUint8Array(endian, length));
};
MPI.prototype.bitLength = function () {
@ -116,11 +116,11 @@ MPI.prototype.fromUint8Array = function (bytes, endian = 'be') {
};
MPI.prototype.toString = function () {
return util.Uint8Array_to_str(this.toUint8Array());
return util.uint8ArrayToStr(this.toUint8Array());
};
MPI.prototype.fromString = function (str, endian = 'be') {
this.fromUint8Array(util.str_to_Uint8Array(str), endian);
this.fromUint8Array(util.strToUint8Array(str), endian);
};
MPI.prototype.toBN = function () {

View File

@ -87,7 +87,7 @@ OID.prototype.write = function () {
* @returns {string} String with the hex value of the OID
*/
OID.prototype.toHex = function() {
return util.Uint8Array_to_hex(this.oid);
return util.uint8ArrayToHex(this.oid);
};
/**

View File

@ -90,7 +90,7 @@ S2K.prototype.read = function (bytes) {
break;
case 'gnu':
if (util.Uint8Array_to_str(bytes.subarray(i, i + 3)) === "GNU") {
if (util.uint8ArrayToStr(bytes.subarray(i, i + 3)) === "GNU") {
i += 3; // GNU
const gnuExtType = 1000 + bytes[i++];
if (gnuExtType === 1001) {
@ -118,7 +118,7 @@ S2K.prototype.read = function (bytes) {
*/
S2K.prototype.write = function () {
if (this.type === 'gnu-dummy') {
return new Uint8Array([101, 0, ...util.str_to_Uint8Array('GNU'), 1]);
return new Uint8Array([101, 0, ...util.strToUint8Array('GNU'), 1]);
}
const arr = [new Uint8Array([enums.write(enums.s2k, this.type), enums.write(enums.hash, this.algorithm)])];
@ -150,7 +150,7 @@ S2K.prototype.write = function () {
* hashAlgorithm hash length
*/
S2K.prototype.produce_key = async function (passphrase, numBytes) {
passphrase = util.encode_utf8(passphrase);
passphrase = util.encodeUtf8(passphrase);
const algorithm = enums.write(enums.hash, this.algorithm);
const arr = [];

View File

@ -123,7 +123,7 @@ export default {
* @param {String} str String to convert
* @returns {String} String containing the hexadecimal values
*/
str_to_hex: function (str) {
strToHex: function (str) {
if (str === null) {
return "";
}
@ -146,7 +146,7 @@ export default {
* @param {String} str Hex string to convert
* @returns {String}
*/
hex_to_str: function (hex) {
hexToStr: function (hex) {
let str = '';
for (let i = 0; i < hex.length; i += 2) {
str += String.fromCharCode(parseInt(hex.substr(i, 2), 16));
@ -162,7 +162,7 @@ export default {
* @param {Uint8Array} bin An array of 8-bit integers to convert
* @returns {Uint8Array} MPI-formatted Uint8Array
*/
Uint8Array_to_MPI: function (bin) {
uint8ArrayToMpi: function (bin) {
const size = (bin.length - 1) * 8 + util.nbits(bin[0]);
const prefix = Uint8Array.from([(size & 0xFF00) >> 8, size & 0xFF]);
return util.concatUint8Array([prefix, bin]);
@ -175,7 +175,7 @@ export default {
* @param {String} base64 Base-64 encoded string to convert
* @returns {Uint8Array} An array of 8-bit integers
*/
b64_to_Uint8Array: function (base64) {
b64ToUint8Array: function (base64) {
return b64.decode(base64.replace(/-/g, '+').replace(/_/g, '/'));
},
@ -185,7 +185,7 @@ export default {
* @param {bool} url If true, output is URL-safe
* @returns {String} Base-64 encoded string
*/
Uint8Array_to_b64: function (bytes, url) {
uint8ArrayToB64: function (bytes, url) {
let encoded = b64.encode(bytes).replace(/[\r\n]/g, '');
if (url) {
encoded = encoded.replace(/[+]/g, '-').replace(/[/]/g, '_').replace(/[=]/g, '');
@ -198,7 +198,7 @@ export default {
* @param {String} hex A hex string to convert
* @returns {Uint8Array} An array of 8-bit integers
*/
hex_to_Uint8Array: function (hex) {
hexToUint8Array: function (hex) {
const result = new Uint8Array(hex.length >> 1);
for (let k = 0; k < hex.length >> 1; k++) {
result[k] = parseInt(hex.substr(k << 1, 2), 16);
@ -211,7 +211,7 @@ export default {
* @param {Uint8Array} bytes Array of 8-bit integers to convert
* @returns {String} Hexadecimal representation of the array
*/
Uint8Array_to_hex: function (bytes) {
uint8ArrayToHex: function (bytes) {
const r = [];
const e = bytes.length;
let c = 0;
@ -231,10 +231,10 @@ export default {
* @param {String} str String to convert
* @returns {Uint8Array} An array of 8-bit integers
*/
str_to_Uint8Array: function (str) {
strToUint8Array: function (str) {
return stream.transform(str, str => {
if (!util.isString(str)) {
throw new Error('str_to_Uint8Array: Data must be in the form of a string');
throw new Error('strToUint8Array: Data must be in the form of a string');
}
const result = new Uint8Array(str.length);
@ -250,7 +250,7 @@ export default {
* @param {Uint8Array} bytes An array of 8-bit integers to convert
* @returns {String} String representation of the array
*/
Uint8Array_to_str: function (bytes) {
uint8ArrayToStr: function (bytes) {
bytes = new Uint8Array(bytes);
const result = [];
const bs = 1 << 14;
@ -267,7 +267,7 @@ export default {
* @param {String|ReadableStream} str The string to convert
* @returns {Uint8Array|ReadableStream} A valid squence of utf8 bytes
*/
encode_utf8: function (str) {
encodeUtf8: function (str) {
const encoder = new TextEncoder('utf-8');
// eslint-disable-next-line no-inner-declarations
function process(value, lastChunk = false) {
@ -281,7 +281,7 @@ export default {
* @param {Uint8Array|ReadableStream} utf8 A valid squence of utf8 bytes
* @returns {String|ReadableStream} A native javascript string
*/
decode_utf8: function (utf8) {
decodeUtf8: function (utf8) {
const decoder = new TextDecoder('utf-8');
// eslint-disable-next-line no-inner-declarations
function process(value, lastChunk = false) {
@ -334,7 +334,7 @@ export default {
* @param {Uint8Array} Uint8Array to create a sum of
* @returns {Uint8Array} 2 bytes containing the sum of all charcodes % 65535
*/
write_checksum: function (text) {
writeChecksum: function (text) {
let s = 0;
for (let i = 0; i < text.length; i++) {
s = (s + text[i]) & 0xFFFF;
@ -348,7 +348,7 @@ export default {
* @link module:config/config.debug is set to true.
* @param {String} str String of the debug message
*/
print_debug: function (str) {
printDebug: function (str) {
if (config.debug) {
console.log(str);
}
@ -358,12 +358,12 @@ export default {
* Helper function to print a debug message. Debug
* messages are only printed if
* @link module:config/config.debug is set to true.
* Different than print_debug because will call Uint8Array_to_hex iff necessary.
* Different than print_debug because will call Uint8ArrayToHex iff necessary.
* @param {String} str String of the debug message
*/
print_debug_hexarray_dump: function (str, arrToHex) {
printDebugHexArrayDump: function (str, arrToHex) {
if (config.debug) {
str += ': ' + util.Uint8Array_to_hex(arrToHex);
str += ': ' + util.uint8ArrayToHex(arrToHex);
console.log(str);
}
},
@ -372,12 +372,12 @@ export default {
* Helper function to print a debug message. Debug
* messages are only printed if
* @link module:config/config.debug is set to true.
* Different than print_debug because will call str_to_hex iff necessary.
* Different than print_debug because will call strToHex iff necessary.
* @param {String} str String of the debug message
*/
print_debug_hexstr_dump: function (str, strToHex) {
printDebugHexStrDump: function (str, strToHex) {
if (config.debug) {
str += util.str_to_hex(strToHex);
str += util.strToHex(strToHex);
console.log(str);
}
},
@ -388,7 +388,7 @@ export default {
* @link module:config/config.debug is set to true.
* @param {String} str String of the debug message
*/
print_debug_error: function (error) {
printDebugError: function (error) {
if (config.debug) {
console.error(error);
}
@ -400,7 +400,7 @@ export default {
* @param {ReadableStream|Uint8array|String} input Stream to print
* @param {Function} concat Function to concatenate chunks of the stream (defaults to util.concat).
*/
print_entire_stream: function (str, input, concat) {
printEntireStream: function (str, input, concat) {
stream.readToEnd(stream.clone(input), concat).then(result => {
console.log(str + ': ', result);
});

View File

@ -55,7 +55,7 @@ WKD.prototype.lookup = async function(options) {
}
const [, localPart, domain] = /(.*)@(.*)/.exec(options.email);
const localEncoded = util.encodeZBase32(await crypto.hash.sha1(util.str_to_Uint8Array(localPart.toLowerCase())));
const localEncoded = util.encodeZBase32(await crypto.hash.sha1(util.strToUint8Array(localPart.toLowerCase())));
const urlAdvanced = `https://openpgpkey.${domain}/.well-known/openpgpkey/${domain}/hu/${localEncoded}`;
const urlDirect = `https://${domain}/.well-known/openpgpkey/hu/${localEncoded}`;

View File

@ -44,13 +44,13 @@ describe('AES Key Wrap and Unwrap', function () {
test_vectors.forEach(function(test) {
it(test[0], function(done) {
const kek = openpgp.util.hex_to_Uint8Array(test[1]);
const kek = openpgp.util.hexToUint8Array(test[1]);
const input = test[2].replace(/\s/g, "");
const input_bin = openpgp.util.hex_to_str(input);
const input_bin = openpgp.util.hexToStr(input);
const output = test[3].replace(/\s/g, "");
const output_bin = openpgp.util.hex_to_str(output);
expect(openpgp.util.Uint8Array_to_hex(openpgp.crypto.aes_kw.wrap(kek, input_bin)).toUpperCase()).to.equal(output);
expect(openpgp.util.Uint8Array_to_hex(openpgp.crypto.aes_kw.unwrap(kek, output_bin)).toUpperCase()).to.equal(input);
const output_bin = openpgp.util.hexToStr(output);
expect(openpgp.util.uint8ArrayToHex(openpgp.crypto.aes_kw.wrap(kek, input_bin)).toUpperCase()).to.equal(output);
expect(openpgp.util.uint8ArrayToHex(openpgp.crypto.aes_kw.unwrap(kek, output_bin)).toUpperCase()).to.equal(input);
done();
});
});

View File

@ -7,10 +7,10 @@ const { expect } = chai;
it('Blowfish cipher test with test vectors from https://www.schneier.com/code/vectors.txt', function(done) {
function test_bf(input, key, output) {
const blowfish = new openpgp.crypto.cipher.blowfish(util.Uint8Array_to_str(key));
const result = util.Uint8Array_to_str(blowfish.encrypt(input));
const blowfish = new openpgp.crypto.cipher.blowfish(util.uint8ArrayToStr(key));
const result = util.uint8ArrayToStr(blowfish.encrypt(input));
return (util.str_to_hex(result) === util.str_to_hex(util.Uint8Array_to_str(output)));
return (util.strToHex(result) === util.strToHex(util.uint8ArrayToStr(output)));
}
const testvectors = [[[0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00],[0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00],[0x4E,0xF9,0x97,0x45,0x61,0x98,0xDD,0x78]],
@ -50,9 +50,9 @@ it('Blowfish cipher test with test vectors from https://www.schneier.com/code/ve
for (let i = 0; i < testvectors.length; i++) {
const res = test_bf(testvectors[i][1],testvectors[i][0],testvectors[i][2]);
expect(res, 'vector ' + i + '" with block ' + util.Uint8Array_to_hex(testvectors[i][0]) +
' and key ' + util.Uint8Array_to_hex(testvectors[i][1]) +
' should be ' + util.Uint8Array_to_hex(testvectors[i][2]), false);
expect(res, 'vector ' + i + '" with block ' + util.uint8ArrayToHex(testvectors[i][0]) +
' and key ' + util.uint8ArrayToHex(testvectors[i][1]) +
' should be ' + util.uint8ArrayToHex(testvectors[i][2]), false);
}
done();
});

View File

@ -8,18 +8,18 @@ const { expect } = chai;
it('CAST-128 cipher test with test vectors from RFC2144', function (done) {
function test_cast(input, key, output) {
const cast5 = new openpgp.crypto.cipher.cast5(key);
const result = util.Uint8Array_to_str(cast5.encrypt(input));
const result = util.uint8ArrayToStr(cast5.encrypt(input));
return util.str_to_hex(result) === util.str_to_hex(util.Uint8Array_to_str(output));
return util.strToHex(result) === util.strToHex(util.uint8ArrayToStr(output));
}
const testvectors = [[[0x01,0x23,0x45,0x67,0x12,0x34,0x56,0x78,0x23,0x45,0x67,0x89,0x34,0x56,0x78,0x9A],[0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF],[0x23,0x8B,0x4F,0xE5,0x84,0x7E,0x44,0xB2]]];
for (let i = 0; i < testvectors.length; i++) {
const res = test_cast(testvectors[i][1],testvectors[i][0],testvectors[i][2]);
expect(res, 'vector with block ' + util.Uint8Array_to_hex(testvectors[i][0]) +
' and key ' + util.Uint8Array_to_hex(testvectors[i][1]) +
' should be ' + util.Uint8Array_to_hex(testvectors[i][2])).to.be.true;
expect(res, 'vector with block ' + util.uint8ArrayToHex(testvectors[i][0]) +
' and key ' + util.uint8ArrayToHex(testvectors[i][1]) +
' should be ' + util.uint8ArrayToHex(testvectors[i][2])).to.be.true;
}
done();
});

View File

@ -77,12 +77,12 @@ describe('TripleDES (EDE) cipher test with test vectors from NIST SP 800-20', fu
for (let i = 0; i < testvectors.length; i++) {
const des = new openpgp.crypto.cipher.tripledes(key);
const encr = util.Uint8Array_to_str(des.encrypt(testvectors[i][0], key));
const encr = util.uint8ArrayToStr(des.encrypt(testvectors[i][0], key));
expect(encr, 'vector with block ' + util.Uint8Array_to_hex(testvectors[i][0]) +
' and key ' + util.str_to_hex(util.Uint8Array_to_str(key)) +
' should be ' + util.Uint8Array_to_hex(testvectors[i][1]) +
' != ' + util.Uint8Array_to_hex(encr)).to.be.equal(util.Uint8Array_to_str(testvectors[i][1]));
expect(encr, 'vector with block ' + util.uint8ArrayToHex(testvectors[i][0]) +
' and key ' + util.strToHex(util.uint8ArrayToStr(key)) +
' should be ' + util.uint8ArrayToHex(testvectors[i][1]) +
' != ' + util.uint8ArrayToHex(encr)).to.be.equal(util.uint8ArrayToStr(testvectors[i][1]));
}
done();
});
@ -124,18 +124,18 @@ describe('TripleDES (EDE) cipher test with test vectors from NIST SP 800-20', fu
const encrypted = des.encrypt(thisVectorSet[i][0], padding);
const decrypted = des.decrypt(encrypted, padding);
expect(util.Uint8Array_to_str(encrypted), 'vector with block [' + util.Uint8Array_to_hex(thisVectorSet[i][0]) +
'] and key [' + util.str_to_hex(util.Uint8Array_to_str(key)) +
expect(util.uint8ArrayToStr(encrypted), 'vector with block [' + util.uint8ArrayToHex(thisVectorSet[i][0]) +
'] and key [' + util.strToHex(util.uint8ArrayToStr(key)) +
'] and padding [' + padding +
'] should be ' + util.Uint8Array_to_hex(thisVectorSet[i][1]) +
' - Actually [' + util.Uint8Array_to_hex(encrypted) +
']').to.equal(util.Uint8Array_to_str(thisVectorSet[i][1]));
expect(util.Uint8Array_to_str(decrypted), 'vector with block [' + util.Uint8Array_to_hex(thisVectorSet[i][0]) +
'] and key [' + util.str_to_hex(util.Uint8Array_to_str(key)) +
'] should be ' + util.uint8ArrayToHex(thisVectorSet[i][1]) +
' - Actually [' + util.uint8ArrayToHex(encrypted) +
']').to.equal(util.uint8ArrayToStr(thisVectorSet[i][1]));
expect(util.uint8ArrayToStr(decrypted), 'vector with block [' + util.uint8ArrayToHex(thisVectorSet[i][0]) +
'] and key [' + util.strToHex(util.uint8ArrayToStr(key)) +
'] and padding [' + padding +
'] should be ' + util.Uint8Array_to_hex(thisVectorSet[i][0]) +
' - Actually [' + util.Uint8Array_to_hex(decrypted) +
']').to.equal(util.Uint8Array_to_str(thisVectorSet[i][0]));
'] should be ' + util.uint8ArrayToHex(thisVectorSet[i][0]) +
' - Actually [' + util.uint8ArrayToHex(decrypted) +
']').to.equal(util.uint8ArrayToStr(thisVectorSet[i][0]));
}
}
done();

View File

@ -7,7 +7,7 @@ const { expect } = chai;
it('Twofish with test vectors from https://www.schneier.com/code/ecb_ival.txt', function(done) {
function tfencrypt(block, key) {
const tf = new openpgp.crypto.cipher.twofish(util.str_to_Uint8Array(key));
const tf = new openpgp.crypto.cipher.twofish(util.strToUint8Array(key));
return tf.encrypt(block);
}
@ -36,36 +36,36 @@ it('Twofish with test vectors from https://www.schneier.com/code/ecb_ival.txt',
if (i === 0) {
blk = start_short;
key = util.Uint8Array_to_str(start);
key = util.uint8ArrayToStr(start);
ct = testvectors[0];
res = util.Uint8Array_to_str(tfencrypt(blk,key));
exp = util.Uint8Array_to_str(ct);
res = util.uint8ArrayToStr(tfencrypt(blk,key));
exp = util.uint8ArrayToStr(ct);
} else if (i === 1) {
blk = testvectors[0];
key = util.Uint8Array_to_str(start);
key = util.uint8ArrayToStr(start);
ct = testvectors[1];
res = util.Uint8Array_to_str(tfencrypt(blk,key));
exp = util.Uint8Array_to_str(ct);
res = util.uint8ArrayToStr(tfencrypt(blk,key));
exp = util.uint8ArrayToStr(ct);
} else if (i === 2) {
blk = testvectors[i - 1];
key = util.Uint8Array_to_str(testvectors[i - 2].concat(start_short));
key = util.uint8ArrayToStr(testvectors[i - 2].concat(start_short));
ct = testvectors[i];
res = util.Uint8Array_to_str(tfencrypt(blk,key));
exp = util.Uint8Array_to_str(ct);
res = util.uint8ArrayToStr(tfencrypt(blk,key));
exp = util.uint8ArrayToStr(ct);
} else if (i < 10 || i > 46) {
blk = testvectors[i - 1];
key = util.Uint8Array_to_str(testvectors[i - 2].concat(testvectors[i - 3]));
key = util.uint8ArrayToStr(testvectors[i - 2].concat(testvectors[i - 3]));
ct = testvectors[i];
res = util.Uint8Array_to_str(tfencrypt(blk,key));
exp = util.Uint8Array_to_str(ct);
res = util.uint8ArrayToStr(tfencrypt(blk,key));
exp = util.uint8ArrayToStr(ct);
} else {
testvectors[i] = tfencrypt(testvectors[i - 1],util.Uint8Array_to_str(testvectors[i - 2].concat(testvectors[i - 3])));
testvectors[i] = tfencrypt(testvectors[i - 1],util.uint8ArrayToStr(testvectors[i - 2].concat(testvectors[i - 3])));
continue;
}
expect(res, 'vector with block ' + util.Uint8Array_to_hex(blk) +
' with key ' + util.str_to_hex(key) +
' should be ' + util.Uint8Array_to_hex(ct) +
' but is ' + util.Uint8Array_to_hex(tfencrypt(blk,key))).to.equal(exp);
expect(res, 'vector with block ' + util.uint8ArrayToHex(blk) +
' with key ' + util.strToHex(key) +
' should be ' + util.uint8ArrayToHex(ct) +
' but is ' + util.uint8ArrayToHex(tfencrypt(blk,key))).to.equal(exp);
}
done();
});

View File

@ -231,7 +231,7 @@ describe('API functional testing', function() {
ElgamalpubMPIs[i].read(ElgamalpubMPIstrs[i]);
}
const data = util.str_to_Uint8Array("foobar");
const data = util.strToUint8Array("foobar");
describe('Sign and verify', function () {
it('RSA', async function () {
@ -256,7 +256,7 @@ describe('API functional testing', function() {
return crypto.signature.sign(
17, 2, DSApubMPIs.concat(DSAsecMPIs), data, await crypto.hash.digest(2, data)
).then(async DSAsignedData => {
DSAsignedData = util.Uint8Array_to_str(DSAsignedData);
DSAsignedData = util.uint8ArrayToStr(DSAsignedData);
const DSAmsgMPIs = [];
DSAmsgMPIs[0] = new openpgp.MPI();
DSAmsgMPIs[1] = new openpgp.MPI();
@ -281,8 +281,8 @@ describe('API functional testing', function() {
await Promise.all(symmAlgos.map(async function(algo) {
const symmKey = await crypto.generateSessionKey(algo);
const IV = new Uint8Array(crypto.cipher[algo].blockSize);
const symmencData = await crypto.cfb.encrypt(algo, symmKey, util.str_to_Uint8Array(plaintext), IV);
const text = util.Uint8Array_to_str(await crypto.cfb.decrypt(algo, symmKey, symmencData, new Uint8Array(crypto.cipher[algo].blockSize)));
const symmencData = await crypto.cfb.encrypt(algo, symmKey, util.strToUint8Array(plaintext), IV);
const text = util.uint8ArrayToStr(await crypto.cfb.decrypt(algo, symmKey, symmencData, new Uint8Array(crypto.cipher[algo].blockSize)));
expect(text).to.equal(plaintext);
}));
}
@ -295,13 +295,13 @@ describe('API functional testing', function() {
const iv = await crypto.random.getRandomBytes(crypto.gcm.ivLength);
let modeInstance = await crypto.gcm(algo, key);
const ciphertext = await modeInstance.encrypt(util.str_to_Uint8Array(plaintext), iv);
const ciphertext = await modeInstance.encrypt(util.strToUint8Array(plaintext), iv);
openpgp.config.useNative = nativeDecrypt;
modeInstance = await crypto.gcm(algo, key);
const decrypted = await modeInstance.decrypt(util.str_to_Uint8Array(util.Uint8Array_to_str(ciphertext)), iv);
const decryptedStr = util.Uint8Array_to_str(decrypted);
const decrypted = await modeInstance.decrypt(util.strToUint8Array(util.uint8ArrayToStr(ciphertext)), iv);
const decryptedStr = util.uint8ArrayToStr(decrypted);
expect(decryptedStr).to.equal(plaintext);
});
}
@ -355,26 +355,26 @@ describe('API functional testing', function() {
});
it('Asymmetric using RSA with eme_pkcs1 padding', function () {
const symmKey = util.Uint8Array_to_str(crypto.generateSessionKey('aes256'));
const symmKey = util.uint8ArrayToStr(crypto.generateSessionKey('aes256'));
crypto.publicKeyEncrypt(1, RSApubMPIs, symmKey).then(RSAEncryptedData => {
return crypto.publicKeyDecrypt(
1, RSApubMPIs.concat(RSAsecMPIs), RSAEncryptedData
).then(data => {
data = new openpgp.MPI(data).write();
data = util.Uint8Array_to_str(data.subarray(2, data.length));
data = util.uint8ArrayToStr(data.subarray(2, data.length));
expect(data).to.equal(symmKey);
});
});
});
it('Asymmetric using Elgamal with eme_pkcs1 padding', function () {
const symmKey = util.Uint8Array_to_str(crypto.generateSessionKey('aes256'));
const symmKey = util.uint8ArrayToStr(crypto.generateSessionKey('aes256'));
crypto.publicKeyEncrypt(16, ElgamalpubMPIs, symmKey).then(ElgamalEncryptedData => {
return crypto.publicKeyDecrypt(
16, ElgamalpubMPIs.concat(ElgamalsecMPIs), ElgamalEncryptedData
).then(data => {
data = new openpgp.MPI(data).write();
data = util.Uint8Array_to_str(data.subarray(2, data.length));
data = util.uint8ArrayToStr(data.subarray(2, data.length));
expect(data).to.equal(symmKey);
});
});

View File

@ -88,21 +88,21 @@ function testAESEAX() {
const cipher = 'aes128';
await Promise.all(vectors.map(async vec => {
const keyBytes = openpgp.util.hex_to_Uint8Array(vec.key);
const msgBytes = openpgp.util.hex_to_Uint8Array(vec.msg);
const nonceBytes = openpgp.util.hex_to_Uint8Array(vec.nonce);
const headerBytes = openpgp.util.hex_to_Uint8Array(vec.header);
const ctBytes = openpgp.util.hex_to_Uint8Array(vec.ct);
const keyBytes = openpgp.util.hexToUint8Array(vec.key);
const msgBytes = openpgp.util.hexToUint8Array(vec.msg);
const nonceBytes = openpgp.util.hexToUint8Array(vec.nonce);
const headerBytes = openpgp.util.hexToUint8Array(vec.header);
const ctBytes = openpgp.util.hexToUint8Array(vec.ct);
const eax = await openpgp.crypto.eax(cipher, keyBytes);
// encryption test
let ct = await eax.encrypt(msgBytes, nonceBytes, headerBytes);
expect(openpgp.util.Uint8Array_to_hex(ct)).to.equal(vec.ct.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(ct)).to.equal(vec.ct.toLowerCase());
// decryption test with verification
let pt = await eax.decrypt(ctBytes, nonceBytes, headerBytes);
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.msg.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
// tampering detection test
ct = await eax.encrypt(msgBytes, nonceBytes, headerBytes);
@ -113,12 +113,12 @@ function testAESEAX() {
// testing without additional data
ct = await eax.encrypt(msgBytes, nonceBytes, new Uint8Array());
pt = await eax.decrypt(ct, nonceBytes, new Uint8Array());
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.msg.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
// testing with multiple additional data
ct = await eax.encrypt(msgBytes, nonceBytes, openpgp.util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
pt = await eax.decrypt(ct, nonceBytes, openpgp.util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.msg.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
}));
});
}

View File

@ -11,7 +11,7 @@ describe('ECDH key exchange @lightweight', function () {
const elliptic_curves = openpgp.crypto.publicKey.elliptic;
const decrypt_message = function (oid, hash, cipher, priv, pub, ephemeral, data, fingerprint) {
if (openpgp.util.isString(data)) {
data = openpgp.util.str_to_Uint8Array(data);
data = openpgp.util.strToUint8Array(data);
} else {
data = new Uint8Array(data);
}
@ -257,7 +257,7 @@ describe('ECDH key exchange @lightweight', function () {
namedCurve: curve.web.web
}, false, ["sign", "verify"]);
} catch (err) {
openpgp.util.print_debug_error(err);
openpgp.util.printDebugError(err);
return;
}
const ECDHE_VZ1 = await genPublicEphemeralKey(name, key_data[name].pub, fingerprint1);

View File

@ -104,7 +104,7 @@ describe('Elliptic Curve Cryptography @lightweight', function () {
describe('ECDSA signature', function () {
const verify_signature = async function (oid, hash, r, s, message, pub) {
if (openpgp.util.isString(message)) {
message = openpgp.util.str_to_Uint8Array(message);
message = openpgp.util.strToUint8Array(message);
} else if (!openpgp.util.isUint8Array(message)) {
message = new Uint8Array(message);
}
@ -115,7 +115,7 @@ describe('Elliptic Curve Cryptography @lightweight', function () {
};
const verify_signature_elliptic = async function (oid, hash, r, s, message, pub) {
if (openpgp.util.isString(message)) {
message = openpgp.util.str_to_Uint8Array(message);
message = openpgp.util.strToUint8Array(message);
} else if (!openpgp.util.isUint8Array(message)) {
message = new Uint8Array(message);
}

View File

@ -7,10 +7,10 @@ const md5 = openpgp.crypto.hash.md5;
const { expect } = chai;
it('MD5 with test vectors from RFC 1321', async function() {
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array(''))), 'MD5("") = d41d8cd98f00b204e9800998ecf8427e')).to.equal('d41d8cd98f00b204e9800998ecf8427e');
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array('abc'))), 'MD5("a") = 0cc175b9c0f1b6a831c399e269772661')).to.equal('900150983cd24fb0d6963f7d28e17f72');
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array('message digest'))), 'MD5("message digest") = f96b697d7cb7938d525a2f31aaf161d0')).to.equal('f96b697d7cb7938d525a2f31aaf161d0');
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array('abcdefghijklmnopqrstuvwxyz'))), 'MD5("abcdefghijklmnopqrstuvwxyz") = c3fcd3d76192e4007dfb496cca67e13b')).to.equal('c3fcd3d76192e4007dfb496cca67e13b');
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'))), 'MD5("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") = d174ab98d277d9f5a5611c2c9f419d9f')).to.equal('d174ab98d277d9f5a5611c2c9f419d9f');
expect(util.str_to_hex(util.Uint8Array_to_str(await md5(util.str_to_Uint8Array('12345678901234567890123456789012345678901234567890123456789012345678901234567890'))), 'MD5("12345678901234567890123456789012345678901234567890123456789012345678901234567890") = 57edf4a22be3c955ac49da2e2107b67a')).to.equal('57edf4a22be3c955ac49da2e2107b67a');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array(''))), 'MD5("") = d41d8cd98f00b204e9800998ecf8427e')).to.equal('d41d8cd98f00b204e9800998ecf8427e');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('abc'))), 'MD5("a") = 0cc175b9c0f1b6a831c399e269772661')).to.equal('900150983cd24fb0d6963f7d28e17f72');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('message digest'))), 'MD5("message digest") = f96b697d7cb7938d525a2f31aaf161d0')).to.equal('f96b697d7cb7938d525a2f31aaf161d0');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('abcdefghijklmnopqrstuvwxyz'))), 'MD5("abcdefghijklmnopqrstuvwxyz") = c3fcd3d76192e4007dfb496cca67e13b')).to.equal('c3fcd3d76192e4007dfb496cca67e13b');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'))), 'MD5("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") = d174ab98d277d9f5a5611c2c9f419d9f')).to.equal('d174ab98d277d9f5a5611c2c9f419d9f');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('12345678901234567890123456789012345678901234567890123456789012345678901234567890'))), 'MD5("12345678901234567890123456789012345678901234567890123456789012345678901234567890") = 57edf4a22be3c955ac49da2e2107b67a')).to.equal('57edf4a22be3c955ac49da2e2107b67a');
});

View File

@ -7,8 +7,8 @@ const rmdString = openpgp.crypto.hash.ripemd;
const { expect } = chai;
it("RIPE-MD 160 bits with test vectors from https://homes.esat.kuleuven.be/~bosselae/ripemd160.html", async function() {
expect(util.str_to_hex(util.Uint8Array_to_str(await rmdString(util.str_to_Uint8Array(''))), 'RMDstring("") = 9c1185a5c5e9fc54612808977ee8f548b2258d31')).to.equal('9c1185a5c5e9fc54612808977ee8f548b2258d31');
expect(util.str_to_hex(util.Uint8Array_to_str(await rmdString(util.str_to_Uint8Array('a'))), 'RMDstring("a") = 0bdc9d2d256b3ee9daae347be6f4dc835a467ffe')).to.equal('0bdc9d2d256b3ee9daae347be6f4dc835a467ffe');
expect(util.str_to_hex(util.Uint8Array_to_str(await rmdString(util.str_to_Uint8Array('abc'))), 'RMDstring("abc") = 8eb208f7e05d987a9b044a8e98c6b087f15a0bfc')).to.equal('8eb208f7e05d987a9b044a8e98c6b087f15a0bfc');
expect(util.str_to_hex(util.Uint8Array_to_str(await rmdString(util.str_to_Uint8Array('message digest'))), 'RMDstring("message digest") = 5d0689ef49d2fae572b881b123a85ffa21595f36')).to.equal('5d0689ef49d2fae572b881b123a85ffa21595f36');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array(''))), 'RMDstring("") = 9c1185a5c5e9fc54612808977ee8f548b2258d31')).to.equal('9c1185a5c5e9fc54612808977ee8f548b2258d31');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array('a'))), 'RMDstring("a") = 0bdc9d2d256b3ee9daae347be6f4dc835a467ffe')).to.equal('0bdc9d2d256b3ee9daae347be6f4dc835a467ffe');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array('abc'))), 'RMDstring("abc") = 8eb208f7e05d987a9b044a8e98c6b087f15a0bfc')).to.equal('8eb208f7e05d987a9b044a8e98c6b087f15a0bfc');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array('message digest'))), 'RMDstring("message digest") = 5d0689ef49d2fae572b881b123a85ffa21595f36')).to.equal('5d0689ef49d2fae572b881b123a85ffa21595f36');
});

View File

@ -7,14 +7,14 @@ const { hash } = openpgp.crypto;
const { expect } = chai;
it('SHA* with test vectors from NIST FIPS 180-2', async function() {
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha1(util.str_to_Uint8Array('abc'))), 'hash.sha1("abc") = a9993e364706816aba3e25717850c26c9cd0d89d')).to.equal('a9993e364706816aba3e25717850c26c9cd0d89d');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha1(util.str_to_Uint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha1("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 84983e441c3bd26ebaae4aa1f95129e5e54670f1')).to.equal('84983e441c3bd26ebaae4aa1f95129e5e54670f1');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha224(util.str_to_Uint8Array('abc'))), 'hash.sha224("abc") = 23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7')).to.equal('23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha224(util.str_to_Uint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha224("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525')).to.equal('75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha256(util.str_to_Uint8Array('abc'))), 'hash.sha256("abc") = ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad')).to.equal('ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha256(util.str_to_Uint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha256("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1')).to.equal('248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha384(util.str_to_Uint8Array('abc'))), 'hash.sha384("abc") = cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7')).to.equal('cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha384(util.str_to_Uint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha384("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b')).to.equal('3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha512(util.str_to_Uint8Array('abc'))), 'hash.sha512("abc") = ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f')).to.equal('ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f');
expect(util.str_to_hex(util.Uint8Array_to_str(await hash.sha512(util.str_to_Uint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha512("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445')).to.equal('204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha1(util.strToUint8Array('abc'))), 'hash.sha1("abc") = a9993e364706816aba3e25717850c26c9cd0d89d')).to.equal('a9993e364706816aba3e25717850c26c9cd0d89d');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha1(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha1("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 84983e441c3bd26ebaae4aa1f95129e5e54670f1')).to.equal('84983e441c3bd26ebaae4aa1f95129e5e54670f1');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha224(util.strToUint8Array('abc'))), 'hash.sha224("abc") = 23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7')).to.equal('23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha224(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha224("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525')).to.equal('75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha256(util.strToUint8Array('abc'))), 'hash.sha256("abc") = ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad')).to.equal('ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha256(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha256("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1')).to.equal('248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha384(util.strToUint8Array('abc'))), 'hash.sha384("abc") = cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7')).to.equal('cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha384(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha384("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b')).to.equal('3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha512(util.strToUint8Array('abc'))), 'hash.sha512("abc") = ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f')).to.equal('ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha512(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha512("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445')).to.equal('204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445');
});

View File

@ -12,7 +12,7 @@ const expect = chai.expect;
describe('Symmetric AES-OCB', function() {
it('Passes all test vectors', async function() {
const K = '000102030405060708090A0B0C0D0E0F';
const keyBytes = openpgp.util.hex_to_Uint8Array(K);
const keyBytes = openpgp.util.hexToUint8Array(K);
const vectors = [
// From https://tools.ietf.org/html/rfc7253#appendix-A
@ -117,20 +117,20 @@ describe('Symmetric AES-OCB', function() {
const cipher = 'aes128';
await Promise.all(vectors.map(async vec => {
const msgBytes = openpgp.util.hex_to_Uint8Array(vec.P);
const nonceBytes = openpgp.util.hex_to_Uint8Array(vec.N);
const headerBytes = openpgp.util.hex_to_Uint8Array(vec.A);
const ctBytes = openpgp.util.hex_to_Uint8Array(vec.C);
const msgBytes = openpgp.util.hexToUint8Array(vec.P);
const nonceBytes = openpgp.util.hexToUint8Array(vec.N);
const headerBytes = openpgp.util.hexToUint8Array(vec.A);
const ctBytes = openpgp.util.hexToUint8Array(vec.C);
const ocb = await openpgp.crypto.ocb(cipher, keyBytes);
// encryption test
let ct = await ocb.encrypt(msgBytes, nonceBytes, headerBytes);
expect(openpgp.util.Uint8Array_to_hex(ct)).to.equal(vec.C.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(ct)).to.equal(vec.C.toLowerCase());
// decryption test with verification
let pt = await ocb.decrypt(ctBytes, nonceBytes, headerBytes);
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.P.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.P.toLowerCase());
// tampering detection test
ct = await ocb.encrypt(msgBytes, nonceBytes, headerBytes);
@ -141,12 +141,12 @@ describe('Symmetric AES-OCB', function() {
// testing without additional data
ct = await ocb.encrypt(msgBytes, nonceBytes, new Uint8Array());
pt = await ocb.decrypt(ct, nonceBytes, new Uint8Array());
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.P.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.P.toLowerCase());
// testing with multiple additional data
ct = await ocb.encrypt(msgBytes, nonceBytes, openpgp.util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
pt = await ocb.decrypt(ct, nonceBytes, openpgp.util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
expect(openpgp.util.Uint8Array_to_hex(pt)).to.equal(vec.P.toLowerCase());
expect(openpgp.util.uint8ArrayToHex(pt)).to.equal(vec.P.toLowerCase());
}));
});
@ -177,7 +177,7 @@ describe('Symmetric AES-OCB', function() {
}
n = openpgp.util.concatUint8Array([new Uint8Array(8), openpgp.util.writeNumber(385, 4)]);
const output = await ocb.encrypt(new Uint8Array(), n, openpgp.util.concatUint8Array(c));
expect(openpgp.util.Uint8Array_to_hex(output)).to.equal(outputs[keylen].toLowerCase());
expect(openpgp.util.uint8ArrayToHex(output)).to.equal(outputs[keylen].toLowerCase());
}));
});
});

View File

@ -47,8 +47,8 @@ const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
const p = keyParams[3].toUint8Array();
const q = keyParams[4].toUint8Array();
const u = keyParams[5].toUint8Array();
const message = openpgp.util.Uint8Array_to_str(await openpgp.crypto.generateSessionKey('aes256'));
const encrypted = await openpgp.crypto.publicKey.rsa.encrypt(openpgp.util.str_to_Uint8Array(message), n, e);
const message = openpgp.util.uint8ArrayToStr(await openpgp.crypto.generateSessionKey('aes256'));
const encrypted = await openpgp.crypto.publicKey.rsa.encrypt(openpgp.util.strToUint8Array(message), n, e);
const result = new openpgp.MPI(encrypted);
const decrypted = await openpgp.crypto.publicKey.rsa.decrypt(result.toUint8Array(), n, e, d, p, q, u);
expect(decrypted).to.be.equal(message);
@ -66,12 +66,12 @@ const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
const p = keyParams[3].toUint8Array();
const q = keyParams[4].toUint8Array();
const u = keyParams[5].toUint8Array();
const message = openpgp.util.Uint8Array_to_str(await openpgp.crypto.generateSessionKey('aes256'));
const encryptedBn = await openpgp.crypto.publicKey.rsa.bnEncrypt(openpgp.util.str_to_Uint8Array(message), n, e);
const message = openpgp.util.uint8ArrayToStr(await openpgp.crypto.generateSessionKey('aes256'));
const encryptedBn = await openpgp.crypto.publicKey.rsa.bnEncrypt(openpgp.util.strToUint8Array(message), n, e);
const resultBN = new openpgp.MPI(encryptedBn);
const decrypted1 = await openpgp.crypto.publicKey.rsa.nodeDecrypt(resultBN.toUint8Array(), n, e, d, p, q, u);
expect(decrypted1).to.be.equal(message);
const encryptedNode = await openpgp.crypto.publicKey.rsa.nodeEncrypt(openpgp.util.str_to_Uint8Array(message), n, e);
const encryptedNode = await openpgp.crypto.publicKey.rsa.nodeEncrypt(openpgp.util.strToUint8Array(message), n, e);
const resultNode = new openpgp.MPI(encryptedNode);
const decrypted2 = await openpgp.crypto.publicKey.rsa.bnDecrypt(resultNode.toUint8Array(), n, e, d, p, q, u);
expect(decrypted2).to.be.equal(message);
@ -97,11 +97,11 @@ const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
try {
signatureWeb = await openpgp.crypto.publicKey.rsa.webSign('SHA-256', message, n, e, d, p, q, u, hashed);
} catch (error) {
openpgp.util.print_debug_error('web crypto error');
openpgp.util.printDebugError('web crypto error');
this.skip();
}
const signatureBN = await openpgp.crypto.publicKey.rsa.bnSign(hash_algo, n, d, hashed);
expect(openpgp.util.Uint8Array_to_hex(signatureWeb)).to.be.equal(openpgp.util.Uint8Array_to_hex(signatureBN));
expect(openpgp.util.uint8ArrayToHex(signatureWeb)).to.be.equal(openpgp.util.uint8ArrayToHex(signatureBN));
});
it('compare webCrypto and bn math verify', async function() {
@ -126,7 +126,7 @@ const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
signature = await openpgp.crypto.publicKey.rsa.webSign('SHA-256', message, n, e, d, p, q, u, hashed);
verifyWeb = await openpgp.crypto.publicKey.rsa.webVerify('SHA-256', message, signature, n, e);
} catch (error) {
openpgp.util.print_debug_error('web crypto error');
openpgp.util.printDebugError('web crypto error');
this.skip();
}
const verifyBN = await openpgp.crypto.publicKey.rsa.bnVerify(hash_algo, signature, n, e, hashed);
@ -152,7 +152,7 @@ const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
const signatureNode = await openpgp.crypto.publicKey.rsa.nodeSign(hash_algo, message, n, e, d, p, q, u);
const signatureBN = await openpgp.crypto.publicKey.rsa.bnSign(hash_algo, n, d, hashed);
expect(openpgp.util.Uint8Array_to_hex(signatureNode)).to.be.equal(openpgp.util.Uint8Array_to_hex(signatureBN));
expect(openpgp.util.uint8ArrayToHex(signatureNode)).to.be.equal(openpgp.util.uint8ArrayToHex(signatureBN));
});
it('compare nodeCrypto and bn math verify', async function() {

View File

@ -2598,7 +2598,7 @@ describe('Key', function() {
it('Parsing V5 public key packet', async function() {
// Manually modified from https://gitlab.com/openpgp-wg/rfc4880bis/blob/00b2092/back.mkd#sample-eddsa-key
let packetBytes = openpgp.util.hex_to_Uint8Array(`
let packetBytes = openpgp.util.hexToUint8Array(`
98 37 05 53 f3 5f 0b 16 00 00 00 2d 09 2b 06 01 04 01 da 47
0f 01 01 07 40 3f 09 89 94 bd d9 16 ed 40 53 19
79 34 e4 a8 7c 80 73 3a 12 80 d6 2f 80 10 99 2e

View File

@ -15,7 +15,7 @@ describe('Oid tests', function() {
expect(oid).to.exist;
expect(oid.oid).to.exist;
expect(oid.oid).to.have.length(data.length);
expect(oid.toHex()).to.equal(util.Uint8Array_to_hex(data));
expect(oid.toHex()).to.equal(util.uint8ArrayToHex(data));
});
});
it('Reading and writing', function() {
@ -26,14 +26,14 @@ describe('Oid tests', function() {
expect(oid.read(data)).to.equal(data.length);
expect(oid.oid).to.exist;
expect(oid.oid).to.have.length(data.length-1);
expect(oid.toHex()).to.equal(util.Uint8Array_to_hex(data.subarray(1)));
expect(oid.toHex()).to.equal(util.uint8ArrayToHex(data.subarray(1)));
const result = oid.write();
expect(result).to.exist;
expect(result).to.have.length(data.length);
expect(result[0]).to.equal(data.length-1);
expect(
util.Uint8Array_to_hex(result.subarray(1))
).to.equal(util.Uint8Array_to_hex(data.subarray(1)));
util.uint8ArrayToHex(result.subarray(1))
).to.equal(util.uint8ArrayToHex(data.subarray(1)));
});
});
});

View File

@ -1502,7 +1502,7 @@ describe('OpenPGP.js public api tests', function() {
}
const badBodyEncrypted = data.replace(/\n=([a-zA-Z0-9/+]{4})/, 'aaa\n=$1');
for (let allow_streaming = 1; allow_streaming >= 0; allow_streaming--) {
openpgp.config.allow_unauthenticated_stream = !!allow_streaming;
openpgp.config.allowUnauthenticatedStream = !!allow_streaming;
await Promise.all([badSumEncrypted, badBodyEncrypted].map(async (encrypted, i) => {
await Promise.all([
encrypted,
@ -2345,7 +2345,7 @@ J9I8AcH94nE77JUtCm7s1kOlo0EIshZsAqJwGveDGdAuabfViVwVxG4I24M6
});
it('should decrypt with three passwords', async function() {
const messageBinary = openpgp.util.b64_to_Uint8Array('wy4ECQMIElIx/jiwJV9gp/MZ/ElZwUfHrzOBfOtM8VmgDy76F7eSGWH26tAlx3WI0kMBZv6Tlc1Y6baaZ6MEcOLTG/C7uzHH7KMfuQFd3fcMaVcDawk9EEy/CybiGBE+acT6id2pemHQy6Nk76d9UUTFubcB');
const messageBinary = openpgp.util.b64ToUint8Array('wy4ECQMIElIx/jiwJV9gp/MZ/ElZwUfHrzOBfOtM8VmgDy76F7eSGWH26tAlx3WI0kMBZv6Tlc1Y6baaZ6MEcOLTG/C7uzHH7KMfuQFd3fcMaVcDawk9EEy/CybiGBE+acT6id2pemHQy6Nk76d9UUTFubcB');
const message = await openpgp.message.read(messageBinary);
const passwords = ['Test', 'Pinata', 'a'];
const decrypted = await openpgp.decrypt({ message, passwords });
@ -2421,7 +2421,7 @@ amnR6g==
message: await openpgp.message.readArmored(encrypted),
format: 'binary'
});
expect(openpgp.util.decode_utf8(decrypted.data)).to.equal('"BEGIN:VCALENDAR\r\nVERSION:2.0\r\nBEGIN:VEVENT\r\nUID:123\r\nDTSTART:20191211T121212Z\r\nDTEND:20191212T121212Z\r\nEND:VEVENT\r\nEND:VCALENDAR"');
expect(openpgp.util.decodeUtf8(decrypted.data)).to.equal('"BEGIN:VCALENDAR\r\nVERSION:2.0\r\nBEGIN:VEVENT\r\nUID:123\r\nDTSTART:20191211T121212Z\r\nDTEND:20191212T121212Z\r\nEND:VEVENT\r\nEND:VCALENDAR"');
});
});

View File

@ -242,7 +242,7 @@ describe("Packet", function() {
it('Sym. encrypted AEAD protected packet test vector (AEAD)', async function() {
// From https://gitlab.com/openpgp-wg/rfc4880bis/commit/00b20923e6233fb6ff1666ecd5acfefceb32907d
let packetBytes = openpgp.util.hex_to_Uint8Array(`
let packetBytes = openpgp.util.hexToUint8Array(`
d4 4a 01 07 01 0e b7 32 37 9f 73 c4 92 8d e2 5f
ac fe 65 17 ec 10 5d c1 1a 81 dc 0c b8 a2 f6 f3
d9 00 16 38 4a 56 fc 82 1a e1 1a e8 db cb 49 86
@ -255,8 +255,8 @@ describe("Packet", function() {
openpgp.config.aeadProtect = true;
openpgp.config.aeadChunkSizeByte = 14;
const iv = openpgp.util.hex_to_Uint8Array('b7 32 37 9f 73 c4 92 8d e2 5f ac fe 65 17 ec 10'.replace(/\s+/g, ''));
const key = openpgp.util.hex_to_Uint8Array('86 f1 ef b8 69 52 32 9f 24 ac d3 bf d0 e5 34 6d'.replace(/\s+/g, ''));
const iv = openpgp.util.hexToUint8Array('b7 32 37 9f 73 c4 92 8d e2 5f ac fe 65 17 ec 10'.replace(/\s+/g, ''));
const key = openpgp.util.hexToUint8Array('86 f1 ef b8 69 52 32 9f 24 ac d3 bf d0 e5 34 6d'.replace(/\s+/g, ''));
const algo = 'aes128';
const literal = new openpgp.packet.Literal(0);
@ -264,7 +264,7 @@ describe("Packet", function() {
const msg = new openpgp.packet.List();
msg.push(enc);
literal.setBytes(openpgp.util.str_to_Uint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.setBytes(openpgp.util.strToUint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.filename = '';
enc.packets.push(literal);
@ -535,10 +535,10 @@ describe("Packet", function() {
openpgp.config.aeadChunkSizeByte = 14;
openpgp.config.s2kIterationCountByte = 0x90;
let salt = openpgp.util.hex_to_Uint8Array(`cd5a9f70fbe0bc65`);
let sessionKey = openpgp.util.hex_to_Uint8Array(`86 f1 ef b8 69 52 32 9f 24 ac d3 bf d0 e5 34 6d`.replace(/\s+/g, ''));
let sessionIV = openpgp.util.hex_to_Uint8Array(`bc 66 9e 34 e5 00 dc ae dc 5b 32 aa 2d ab 02 35`.replace(/\s+/g, ''));
let dataIV = openpgp.util.hex_to_Uint8Array(`b7 32 37 9f 73 c4 92 8d e2 5f ac fe 65 17 ec 10`.replace(/\s+/g, ''));
let salt = openpgp.util.hexToUint8Array(`cd5a9f70fbe0bc65`);
let sessionKey = openpgp.util.hexToUint8Array(`86 f1 ef b8 69 52 32 9f 24 ac d3 bf d0 e5 34 6d`.replace(/\s+/g, ''));
let sessionIV = openpgp.util.hexToUint8Array(`bc 66 9e 34 e5 00 dc ae dc 5b 32 aa 2d ab 02 35`.replace(/\s+/g, ''));
let dataIV = openpgp.util.hexToUint8Array(`b7 32 37 9f 73 c4 92 8d e2 5f ac fe 65 17 ec 10`.replace(/\s+/g, ''));
let randomBytesStub = stub(openpgp.crypto.random, 'getRandomBytes');
randomBytesStub.onCall(0).returns(resolves(salt));
@ -546,7 +546,7 @@ describe("Packet", function() {
randomBytesStub.onCall(2).returns(resolves(sessionIV));
randomBytesStub.onCall(3).returns(resolves(dataIV));
let packetBytes = openpgp.util.hex_to_Uint8Array(`
let packetBytes = openpgp.util.hexToUint8Array(`
c3 3e 05 07 01 03 08 cd 5a 9f 70 fb e0 bc 65 90
bc 66 9e 34 e5 00 dc ae dc 5b 32 aa 2d ab 02 35
9d ee 19 d0 7c 34 46 c4 31 2a 34 ae 19 67 a2 fb
@ -576,7 +576,7 @@ describe("Packet", function() {
const key = key_enc.sessionKey;
literal.setBytes(openpgp.util.str_to_Uint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.setBytes(openpgp.util.strToUint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.filename = '';
enc.packets.push(literal);
await enc.encrypt(algo, key);
@ -610,10 +610,10 @@ describe("Packet", function() {
openpgp.config.aeadChunkSizeByte = 14;
openpgp.config.s2kIterationCountByte = 0x90;
let salt = openpgp.util.hex_to_Uint8Array(`9f0b7da3e5ea6477`);
let sessionKey = openpgp.util.hex_to_Uint8Array(`d1 f0 1b a3 0e 13 0a a7 d2 58 2c 16 e0 50 ae 44`.replace(/\s+/g, ''));
let sessionIV = openpgp.util.hex_to_Uint8Array(`99 e3 26 e5 40 0a 90 93 6c ef b4 e8 eb a0 8c`.replace(/\s+/g, ''));
let dataIV = openpgp.util.hex_to_Uint8Array(`5e d2 bc 1e 47 0a be 8f 1d 64 4c 7a 6c 8a 56`.replace(/\s+/g, ''));
let salt = openpgp.util.hexToUint8Array(`9f0b7da3e5ea6477`);
let sessionKey = openpgp.util.hexToUint8Array(`d1 f0 1b a3 0e 13 0a a7 d2 58 2c 16 e0 50 ae 44`.replace(/\s+/g, ''));
let sessionIV = openpgp.util.hexToUint8Array(`99 e3 26 e5 40 0a 90 93 6c ef b4 e8 eb a0 8c`.replace(/\s+/g, ''));
let dataIV = openpgp.util.hexToUint8Array(`5e d2 bc 1e 47 0a be 8f 1d 64 4c 7a 6c 8a 56`.replace(/\s+/g, ''));
let randomBytesStub = stub(openpgp.crypto.random, 'getRandomBytes');
randomBytesStub.onCall(0).returns(resolves(salt));
@ -621,7 +621,7 @@ describe("Packet", function() {
randomBytesStub.onCall(2).returns(resolves(sessionIV));
randomBytesStub.onCall(3).returns(resolves(dataIV));
let packetBytes = openpgp.util.hex_to_Uint8Array(`
let packetBytes = openpgp.util.hexToUint8Array(`
c3 3d 05 07 02 03 08 9f 0b 7d a3 e5 ea 64 77 90
99 e3 26 e5 40 0a 90 93 6c ef b4 e8 eb a0 8c 67
73 71 6d 1f 27 14 54 0a 38 fc ac 52 99 49 da c5
@ -652,7 +652,7 @@ describe("Packet", function() {
const key = key_enc.sessionKey;
literal.setBytes(openpgp.util.str_to_Uint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.setBytes(openpgp.util.strToUint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
literal.filename = '';
enc.packets.push(literal);
await enc.encrypt(algo, key);

View File

@ -1118,7 +1118,7 @@ bwM=
});
it('Verify latin-1 signed message', async function() {
const latin1Binary = openpgp.util.hex_to_Uint8Array('48e46c6cf62057e86c74');
const latin1Binary = openpgp.util.hexToUint8Array('48e46c6cf62057e86c74');
const message = openpgp.message.fromBinary(latin1Binary);
message.appendSignature(`-----BEGIN PGP SIGNATURE-----
@ -1404,7 +1404,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
});
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - armored', async function() {
const plaintext = openpgp.util.str_to_Uint8Array('short message\nnext line \n한국어/조선말');
const plaintext = openpgp.util.strToUint8Array('short message\nnext line \n한국어/조선말');
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
@ -1424,7 +1424,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
});
it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - not armored', async function() {
const plaintext = openpgp.util.str_to_Uint8Array('short message\nnext line \n한국어/조선말');
const plaintext = openpgp.util.strToUint8Array('short message\nnext line \n한국어/조선말');
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
@ -1450,7 +1450,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
await privKey.decrypt('hello world');
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) {
const signature = await openpgp.signature.readArmored(signed);
return openpgp.verify({ publicKeys:[pubKey], message: openpgp.message.fromBinary(openpgp.util.encode_utf8(plaintext)), signature: signature });
return openpgp.verify({ publicKeys:[pubKey], message: openpgp.message.fromBinary(openpgp.util.encodeUtf8(plaintext)), signature: signature });
}).then(function(cleartextSig) {
expect(cleartextSig).to.exist;
expect(cleartextSig.signatures).to.have.length(1);
@ -1461,7 +1461,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
it('Should verify cleartext message correctly when using a detached binary signature and text literal data', async function () {
const plaintext = 'short message\nnext line \n한국어/조선말';
const plaintextArray = openpgp.util.encode_utf8(plaintext);
const plaintextArray = openpgp.util.encodeUtf8(plaintext);
const pubKey = await openpgp.key.readArmored(pub_key_arm2);
const privKey = await openpgp.key.readArmored(priv_key_arm2);
await privKey.decrypt('hello world');
@ -1483,7 +1483,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA
await Promise.all([privKey.primaryKey.decrypt('hello world'), privKey.subKeys[0].keyPacket.decrypt('hello world')]);
return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) {
const signature = await openpgp.signature.readArmored(signed);
return openpgp.encrypt({ message: openpgp.message.fromBinary(openpgp.util.encode_utf8(plaintext)), publicKeys: [pubKey], signature })
return openpgp.encrypt({ message: openpgp.message.fromBinary(openpgp.util.encodeUtf8(plaintext)), publicKeys: [pubKey], signature })
}).then(async data => {
const csMsg = await openpgp.message.readArmored(data);
return openpgp.decrypt({ message: csMsg, privateKeys: [ privKey ], publicKeys: [ pubKey ] });

View File

@ -170,8 +170,8 @@ function tests() {
dataArrived(); // Do not wait until data arrived.
const data = new ReadableStream({
async start(controller) {
controller.enqueue(util.str_to_Uint8Array('hello '));
controller.enqueue(util.str_to_Uint8Array('world'));
controller.enqueue(util.strToUint8Array('hello '));
controller.enqueue(util.strToUint8Array('world'));
controller.close();
}
});
@ -726,8 +726,8 @@ function tests() {
dataArrived(); // Do not wait until data arrived.
const data = new ReadableStream({
async start(controller) {
controller.enqueue(util.str_to_Uint8Array('hello '));
controller.enqueue(util.str_to_Uint8Array('world'));
controller.enqueue(util.strToUint8Array('hello '));
controller.enqueue(util.strToUint8Array('world'));
controller.close();
}
});
@ -754,8 +754,8 @@ function tests() {
dataArrived(); // Do not wait until data arrived.
const data = new ReadableStream({
async start(controller) {
controller.enqueue(util.str_to_Uint8Array('hello '));
controller.enqueue(util.str_to_Uint8Array('world'));
controller.enqueue(util.strToUint8Array('hello '));
controller.enqueue(util.strToUint8Array('world'));
controller.close();
}
});
@ -782,8 +782,8 @@ function tests() {
dataArrived(); // Do not wait until data arrived.
const data = new ReadableStream({
async start(controller) {
controller.enqueue(util.str_to_Uint8Array('hello '));
controller.enqueue(util.str_to_Uint8Array('world'));
controller.enqueue(util.strToUint8Array('hello '));
controller.enqueue(util.strToUint8Array('world'));
controller.close();
}
});
@ -813,8 +813,8 @@ function tests() {
dataArrived(); // Do not wait until data arrived.
const data = new ReadableStream({
async start(controller) {
controller.enqueue(util.str_to_Uint8Array('hello '));
controller.enqueue(util.str_to_Uint8Array('world'));
controller.enqueue(util.strToUint8Array('hello '));
controller.enqueue(util.strToUint8Array('world'));
controller.close();
}
});

View File

@ -143,7 +143,7 @@ describe('Util unit tests', function() {
describe("Zbase32", function() {
it('util.encodeZBase32 encodes correctly', function() {
const encoded = openpgp.util.encodeZBase32(openpgp.util.str_to_Uint8Array('test-wkd'));
const encoded = openpgp.util.encodeZBase32(openpgp.util.strToUint8Array('test-wkd'));
expect(encoded).to.equal('qt1zg7bpq7ise');
})
})

View File

@ -216,23 +216,23 @@ const input = require('./testInputs');
const util = openpgp.util;
function testVector(vector) {
const curve = new elliptic.Curve('ed25519');
const { publicKey } = openpgp.crypto.publicKey.nacl.sign.keyPair.fromSeed(openpgp.util.hex_to_Uint8Array(vector.SECRET_KEY));
expect(publicKey).to.deep.equal(openpgp.util.hex_to_Uint8Array(vector.PUBLIC_KEY));
const data = util.str_to_Uint8Array(vector.MESSAGE);
const { publicKey } = openpgp.crypto.publicKey.nacl.sign.keyPair.fromSeed(openpgp.util.hexToUint8Array(vector.SECRET_KEY));
expect(publicKey).to.deep.equal(openpgp.util.hexToUint8Array(vector.PUBLIC_KEY));
const data = util.strToUint8Array(vector.MESSAGE);
const keyIntegers = [
new openpgp.OID(curve.oid),
new openpgp.MPI(util.hex_to_str('40'+vector.PUBLIC_KEY)),
new openpgp.MPI(util.hex_to_str(vector.SECRET_KEY))
new openpgp.MPI(util.hexToStr('40'+vector.PUBLIC_KEY)),
new openpgp.MPI(util.hexToStr(vector.SECRET_KEY))
];
const msg_MPIs = [
new openpgp.MPI(util.Uint8Array_to_str(util.hex_to_Uint8Array(vector.SIGNATURE.R).reverse())),
new openpgp.MPI(util.Uint8Array_to_str(util.hex_to_Uint8Array(vector.SIGNATURE.S).reverse()))
new openpgp.MPI(util.uint8ArrayToStr(util.hexToUint8Array(vector.SIGNATURE.R).reverse())),
new openpgp.MPI(util.uint8ArrayToStr(util.hexToUint8Array(vector.SIGNATURE.S).reverse()))
];
return Promise.all([
signature.sign(22, undefined, keyIntegers, undefined, data).then(signed => {
const len = ((signed[0] << 8| signed[1]) + 7) / 8;
expect(util.hex_to_Uint8Array(vector.SIGNATURE.R)).to.deep.eq(signed.slice(2, 2 + len));
expect(util.hex_to_Uint8Array(vector.SIGNATURE.S)).to.deep.eq(signed.slice(4 + len));
expect(util.hexToUint8Array(vector.SIGNATURE.R)).to.deep.eq(signed.slice(2, 2 + len));
expect(util.hexToUint8Array(vector.SIGNATURE.S)).to.deep.eq(signed.slice(4 + len));
}),
signature.verify(22, undefined, msg_MPIs, keyIntegers, undefined, data).then(result => {
expect(result).to.be.true;
@ -265,7 +265,7 @@ const input = require('./testInputs');
PUBLIC_KEY:
['3d4017c3e843895a92b70aa74d1b7ebc',
'9c982ccf2ec4968cc0cd55f12af4660c'].join(''),
MESSAGE: util.hex_to_str('72'),
MESSAGE: util.hexToStr('72'),
SIGNATURE:
{ R: ['92a009a9f0d4cab8720e820b5f642540',
'a2b27b5416503f8fb3762223ebdb69da'].join(''),
@ -282,7 +282,7 @@ const input = require('./testInputs');
PUBLIC_KEY:
['fc51cd8e6218a1a38da47ed00230f058',
'0816ed13ba3303ac5deb911548908025'].join(''),
MESSAGE: util.hex_to_str('af82'),
MESSAGE: util.hexToStr('af82'),
SIGNATURE:
{ R: ['6291d657deec24024827e69c3abe01a3',
'0ce548a284743a445e3680d7db5ac3ac'].join(''),
@ -299,7 +299,7 @@ const input = require('./testInputs');
PUBLIC_KEY:
['278117fc144c72340f67d0f2316e8386',
'ceffbf2b2428c9c51fef7c597f1d426e'].join(''),
MESSAGE: util.hex_to_str([
MESSAGE: util.hexToStr([
'08b8b2b733424243760fe426a4b54908',
'632110a66c2f6591eabd3345e3e4eb98',
'fa6e264bf09efe12ee50f8f54e9f77b1',
@ -381,7 +381,7 @@ const input = require('./testInputs');
PUBLIC_KEY:
['ec172b93ad5e563bf4932c70e1245034',
'c35467ef2efd4d64ebf819683467e2bf'].join(''),
MESSAGE: util.hex_to_str([
MESSAGE: util.hexToStr([
'ddaf35a193617abacc417349ae204131',
'12e6fa4e89a97ea20a9eeee64b55d39a',
'2192992a274fc1a836ba3c23a3feebbd',

View File

@ -73,7 +73,7 @@ async function getOtherPubKey() {
/**
* The "standalone" signature signed by the victim.
*/
const STANDALONE_PKT = util.b64_to_Uint8Array(`
const STANDALONE_PKT = util.b64ToUint8Array(`
BAIBCAAQBQJbq3MKCRBVIIstGKzjzgAAWdoIALgj7OuhuuAWr6WEvGfvkx3e
Fn/mg76lh2Hawxq6ryI6+kzUH+YJsG94CfLgGuh5LghZFBnlkdZS11gK87fN
+ifmPdSDj8fsKqSFdX1sHGwzvzBcuPt+qhtHrACCWwiiBgajIOmIczKUlX4D

View File

@ -33,8 +33,8 @@ if (typeof Promise === 'undefined') {
describe('Unit Tests', function () {
if (typeof window !== 'undefined') {
openpgp.config.s2k_iteration_count_byte = 0;
openpgp.config.indutny_elliptic_path = '../dist/elliptic.min.js';
openpgp.config.s2kIterationCountByte = 0;
openpgp.config.indutnyEllipticPath = '../dist/elliptic.min.js';
window.location.search.substr(1).split('&').forEach(param => {
const [key, value] = param.split('=');