Merge pull request #1687
`crypto-refresh`: minor fixes and updates for X25519/Ed25519 (new format)
This commit is contained in:
commit
ed482a17c5
6
openpgp.d.ts
vendored
6
openpgp.d.ts
vendored
|
@ -820,7 +820,9 @@ export namespace enums {
|
||||||
dsa = 17,
|
dsa = 17,
|
||||||
ecdh = 18,
|
ecdh = 18,
|
||||||
ecdsa = 19,
|
ecdsa = 19,
|
||||||
|
/** @deprecated use `eddsaLegacy` instead */
|
||||||
eddsa = 22,
|
eddsa = 22,
|
||||||
|
eddsaLegacy = 22,
|
||||||
aedh = 23,
|
aedh = 23,
|
||||||
aedsa = 24,
|
aedsa = 24,
|
||||||
}
|
}
|
||||||
|
@ -829,8 +831,12 @@ export namespace enums {
|
||||||
p256 = 'p256',
|
p256 = 'p256',
|
||||||
p384 = 'p384',
|
p384 = 'p384',
|
||||||
p521 = 'p521',
|
p521 = 'p521',
|
||||||
|
/** @deprecated use `ed25519Legacy` instead */
|
||||||
ed25519 = 'ed25519',
|
ed25519 = 'ed25519',
|
||||||
|
ed25519Legacy = 'ed25519',
|
||||||
|
/** @deprecated use `x25519Legacy` instead */
|
||||||
curve25519 = 'curve25519',
|
curve25519 = 'curve25519',
|
||||||
|
x25519Legacy = 'curve25519',
|
||||||
secp256k1 = 'secp256k1',
|
secp256k1 = 'secp256k1',
|
||||||
brainpoolP256r1 = 'brainpoolP256r1',
|
brainpoolP256r1 = 'brainpoolP256r1',
|
||||||
brainpoolP384r1 = 'brainpoolP384r1',
|
brainpoolP384r1 = 'brainpoolP384r1',
|
||||||
|
|
|
@ -168,8 +168,7 @@ export function parsePublicKeyParams(algo, bytes) {
|
||||||
const Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
const Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
||||||
return { read: read, publicParams: { oid, Q } };
|
return { read: read, publicParams: { oid, Q } };
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
const oid = new OID(); read += oid.read(bytes);
|
const oid = new OID(); read += oid.read(bytes);
|
||||||
checkSupportedCurve(oid);
|
checkSupportedCurve(oid);
|
||||||
let Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
let Q = util.readMPI(bytes.subarray(read)); read += Q.length + 2;
|
||||||
|
@ -224,8 +223,7 @@ export function parsePrivateKeyParams(algo, bytes, publicParams) {
|
||||||
d = util.leftPad(d, curve.payloadSize);
|
d = util.leftPad(d, curve.payloadSize);
|
||||||
return { read, privateParams: { d } };
|
return { read, privateParams: { d } };
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
const curve = new CurveWithOID(publicParams.oid);
|
const curve = new CurveWithOID(publicParams.oid);
|
||||||
let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2;
|
let seed = util.readMPI(bytes.subarray(read)); read += seed.length + 2;
|
||||||
seed = util.leftPad(seed, curve.payloadSize);
|
seed = util.leftPad(seed, curve.payloadSize);
|
||||||
|
@ -331,8 +329,7 @@ export function generateParams(algo, bits, oid) {
|
||||||
privateParams: { d: secret },
|
privateParams: { d: secret },
|
||||||
publicParams: { oid: new OID(oid), Q }
|
publicParams: { oid: new OID(oid), Q }
|
||||||
}));
|
}));
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy:
|
||||||
case enums.publicKey.ed25519Legacy:
|
|
||||||
return publicKey.elliptic.generate(oid).then(({ oid, Q, secret }) => ({
|
return publicKey.elliptic.generate(oid).then(({ oid, Q, secret }) => ({
|
||||||
privateParams: { seed: secret },
|
privateParams: { seed: secret },
|
||||||
publicParams: { oid: new OID(oid), Q }
|
publicParams: { oid: new OID(oid), Q }
|
||||||
|
@ -401,8 +398,7 @@ export async function validateParams(algo, publicParams, privateParams) {
|
||||||
const { d } = privateParams;
|
const { d } = privateParams;
|
||||||
return algoModule.validateParams(oid, Q, d);
|
return algoModule.validateParams(oid, Q, d);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
const { Q, oid } = publicParams;
|
const { Q, oid } = publicParams;
|
||||||
const { seed } = privateParams;
|
const { seed } = privateParams;
|
||||||
return publicKey.elliptic.eddsaLegacy.validateParams(oid, Q, seed);
|
return publicKey.elliptic.eddsaLegacy.validateParams(oid, Q, seed);
|
||||||
|
@ -472,3 +468,20 @@ function checkSupportedCurve(oid) {
|
||||||
throw new UnsupportedError('Unknown curve OID');
|
throw new UnsupportedError('Unknown curve OID');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get preferred hash algo for a given elliptic algo
|
||||||
|
* @param {module:enums.publicKey} algo - alrogithm identifier
|
||||||
|
* @param {module:type/oid} [oid] - curve OID if needed by algo
|
||||||
|
*/
|
||||||
|
export function getPreferredCurveHashAlgo(algo, oid) {
|
||||||
|
switch (algo) {
|
||||||
|
case enums.publicKey.ecdsa:
|
||||||
|
case enums.publicKey.eddsaLegacy:
|
||||||
|
return publicKey.elliptic.getPreferredHashAlgo(oid);
|
||||||
|
case enums.publicKey.ed25519:
|
||||||
|
return publicKey.elliptic.eddsa.getPreferredHashAlgo(algo);
|
||||||
|
default:
|
||||||
|
throw new Error('Unknown elliptic signing algo');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -27,8 +27,6 @@ export async function generate(algo) {
|
||||||
case enums.publicKey.x25519: {
|
case enums.publicKey.x25519: {
|
||||||
// k stays in little-endian, unlike legacy ECDH over curve25519
|
// k stays in little-endian, unlike legacy ECDH over curve25519
|
||||||
const k = getRandomBytes(32);
|
const k = getRandomBytes(32);
|
||||||
k[0] &= 248;
|
|
||||||
k[31] = (k[31] & 127) | 64;
|
|
||||||
const { publicKey: A } = nacl.box.keyPair.fromSecretKey(k);
|
const { publicKey: A } = nacl.box.keyPair.fromSecretKey(k);
|
||||||
return { A, k };
|
return { A, k };
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,9 +61,8 @@ export async function generate(algo) {
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function sign(algo, hashAlgo, message, publicKey, privateKey, hashed) {
|
export async function sign(algo, hashAlgo, message, publicKey, privateKey, hashed) {
|
||||||
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(getPreferredHashAlgo(algo))) {
|
||||||
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
throw new Error('Hash algorithm too weak for EdDSA.');
|
||||||
throw new Error('Hash algorithm too weak: sha256 or stronger is required for EdDSA.');
|
|
||||||
}
|
}
|
||||||
switch (algo) {
|
switch (algo) {
|
||||||
case enums.publicKey.ed25519: {
|
case enums.publicKey.ed25519: {
|
||||||
|
@ -90,6 +89,9 @@ export async function sign(algo, hashAlgo, message, publicKey, privateKey, hashe
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function verify(algo, hashAlgo, { RS }, m, publicKey, hashed) {
|
export async function verify(algo, hashAlgo, { RS }, m, publicKey, hashed) {
|
||||||
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(getPreferredHashAlgo(algo))) {
|
||||||
|
throw new Error('Hash algorithm too weak for EdDSA.');
|
||||||
|
}
|
||||||
switch (algo) {
|
switch (algo) {
|
||||||
case enums.publicKey.ed25519: {
|
case enums.publicKey.ed25519: {
|
||||||
return nacl.sign.detached.verify(hashed, RS, publicKey);
|
return nacl.sign.detached.verify(hashed, RS, publicKey);
|
||||||
|
@ -124,3 +126,12 @@ export async function validateParams(algo, A, seed) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export function getPreferredHashAlgo(algo) {
|
||||||
|
switch (algo) {
|
||||||
|
case enums.publicKey.ed25519:
|
||||||
|
return enums.hash.sha256;
|
||||||
|
default:
|
||||||
|
throw new Error('Unknown EdDSA algo');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -47,7 +47,7 @@ nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());
|
||||||
export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) {
|
export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed) {
|
||||||
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
||||||
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
// see https://tools.ietf.org/id/draft-ietf-openpgp-rfc4880bis-10.html#section-15-7.2
|
||||||
throw new Error('Hash algorithm too weak: sha256 or stronger is required for EdDSA.');
|
throw new Error('Hash algorithm too weak for EdDSA.');
|
||||||
}
|
}
|
||||||
const secretKey = util.concatUint8Array([privateKey, publicKey.subarray(1)]);
|
const secretKey = util.concatUint8Array([privateKey, publicKey.subarray(1)]);
|
||||||
const signature = nacl.sign.detached(hashed, secretKey);
|
const signature = nacl.sign.detached(hashed, secretKey);
|
||||||
|
@ -71,6 +71,9 @@ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
export async function verify(oid, hashAlgo, { r, s }, m, publicKey, hashed) {
|
export async function verify(oid, hashAlgo, { r, s }, m, publicKey, hashed) {
|
||||||
|
if (hash.getHashByteLength(hashAlgo) < hash.getHashByteLength(enums.hash.sha256)) {
|
||||||
|
throw new Error('Hash algorithm too weak for EdDSA.');
|
||||||
|
}
|
||||||
const signature = util.concatUint8Array([r, s]);
|
const signature = util.concatUint8Array([r, s]);
|
||||||
return nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1));
|
return nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1));
|
||||||
}
|
}
|
||||||
|
|
|
@ -92,7 +92,7 @@ const curves = {
|
||||||
},
|
},
|
||||||
ed25519: {
|
ed25519: {
|
||||||
oid: [0x06, 0x09, 0x2B, 0x06, 0x01, 0x04, 0x01, 0xDA, 0x47, 0x0F, 0x01],
|
oid: [0x06, 0x09, 0x2B, 0x06, 0x01, 0x04, 0x01, 0xDA, 0x47, 0x0F, 0x01],
|
||||||
keyType: enums.publicKey.eddsa,
|
keyType: enums.publicKey.eddsaLegacy,
|
||||||
hash: enums.hash.sha512,
|
hash: enums.hash.sha512,
|
||||||
node: false, // nodeCurves.ed25519 TODO
|
node: false, // nodeCurves.ed25519 TODO
|
||||||
payloadSize: 32
|
payloadSize: 32
|
||||||
|
|
|
@ -46,8 +46,7 @@ export function parseSignatureParams(algo, signature) {
|
||||||
// Algorithm-Specific Fields for legacy EdDSA signatures:
|
// Algorithm-Specific Fields for legacy EdDSA signatures:
|
||||||
// - MPI of an EC point r.
|
// - MPI of an EC point r.
|
||||||
// - EdDSA value s, in MPI, in the little endian representation
|
// - EdDSA value s, in MPI, in the little endian representation
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
// When parsing little-endian MPI data, we always need to left-pad it, as done with big-endian values:
|
// When parsing little-endian MPI data, we always need to left-pad it, as done with big-endian values:
|
||||||
// https://www.ietf.org/archive/id/draft-ietf-openpgp-rfc4880bis-10.html#section-3.2-9
|
// https://www.ietf.org/archive/id/draft-ietf-openpgp-rfc4880bis-10.html#section-3.2-9
|
||||||
let r = util.readMPI(signature.subarray(read)); read += r.length + 2;
|
let r = util.readMPI(signature.subarray(read)); read += r.length + 2;
|
||||||
|
@ -103,8 +102,7 @@ export async function verify(algo, hashAlgo, signature, publicParams, data, hash
|
||||||
const s = util.leftPad(signature.s, curveSize);
|
const s = util.leftPad(signature.s, curveSize);
|
||||||
return publicKey.elliptic.ecdsa.verify(oid, hashAlgo, { r, s }, data, Q, hashed);
|
return publicKey.elliptic.ecdsa.verify(oid, hashAlgo, { r, s }, data, Q, hashed);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
const { oid, Q } = publicParams;
|
const { oid, Q } = publicParams;
|
||||||
// signature already padded on parsing
|
// signature already padded on parsing
|
||||||
return publicKey.elliptic.eddsaLegacy.verify(oid, hashAlgo, signature, data, Q, hashed);
|
return publicKey.elliptic.eddsaLegacy.verify(oid, hashAlgo, signature, data, Q, hashed);
|
||||||
|
@ -158,8 +156,7 @@ export async function sign(algo, hashAlgo, publicKeyParams, privateKeyParams, da
|
||||||
const { d } = privateKeyParams;
|
const { d } = privateKeyParams;
|
||||||
return publicKey.elliptic.ecdsa.sign(oid, hashAlgo, data, Q, d, hashed);
|
return publicKey.elliptic.ecdsa.sign(oid, hashAlgo, data, Q, d, hashed);
|
||||||
}
|
}
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy: {
|
||||||
case enums.publicKey.ed25519Legacy: {
|
|
||||||
const { oid, Q } = publicKeyParams;
|
const { oid, Q } = publicKeyParams;
|
||||||
const { seed } = privateKeyParams;
|
const { seed } = privateKeyParams;
|
||||||
return publicKey.elliptic.eddsaLegacy.sign(oid, hashAlgo, data, Q, seed, hashed);
|
return publicKey.elliptic.eddsaLegacy.sign(oid, hashAlgo, data, Q, seed, hashed);
|
||||||
|
|
15
src/enums.js
15
src/enums.js
|
@ -43,17 +43,21 @@ export default {
|
||||||
'2b8104000a': 'secp256k1',
|
'2b8104000a': 'secp256k1',
|
||||||
'2B8104000A': 'secp256k1',
|
'2B8104000A': 'secp256k1',
|
||||||
|
|
||||||
/** Ed25519 */
|
/** Ed25519 - deprecated by crypto-refresh (replaced by standaone Ed25519 algo) */
|
||||||
|
'ed25519Legacy': 'ed25519',
|
||||||
'ED25519': 'ed25519',
|
'ED25519': 'ed25519',
|
||||||
|
/** @deprecated use `ed25519Legacy` instead */
|
||||||
'ed25519': 'ed25519',
|
'ed25519': 'ed25519',
|
||||||
'Ed25519': 'ed25519',
|
'Ed25519': 'ed25519',
|
||||||
'1.3.6.1.4.1.11591.15.1': 'ed25519',
|
'1.3.6.1.4.1.11591.15.1': 'ed25519',
|
||||||
'2b06010401da470f01': 'ed25519',
|
'2b06010401da470f01': 'ed25519',
|
||||||
'2B06010401DA470F01': 'ed25519',
|
'2B06010401DA470F01': 'ed25519',
|
||||||
|
|
||||||
/** Curve25519 */
|
/** Curve25519 - deprecated by crypto-refresh (replaced by standaone X25519 algo) */
|
||||||
|
'x25519Legacy': 'curve25519',
|
||||||
'X25519': 'curve25519',
|
'X25519': 'curve25519',
|
||||||
'cv25519': 'curve25519',
|
'cv25519': 'curve25519',
|
||||||
|
/** @deprecated use `x25519Legacy` instead */
|
||||||
'curve25519': 'curve25519',
|
'curve25519': 'curve25519',
|
||||||
'Curve25519': 'curve25519',
|
'Curve25519': 'curve25519',
|
||||||
'1.3.6.1.4.1.3029.1.5.1': 'curve25519',
|
'1.3.6.1.4.1.3029.1.5.1': 'curve25519',
|
||||||
|
@ -111,8 +115,11 @@ export default {
|
||||||
ecdsa: 19,
|
ecdsa: 19,
|
||||||
/** EdDSA (Sign only) - deprecated by crypto-refresh (replaced by `ed25519` identifier below)
|
/** EdDSA (Sign only) - deprecated by crypto-refresh (replaced by `ed25519` identifier below)
|
||||||
* [{@link https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp-04|Draft RFC}] */
|
* [{@link https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp-04|Draft RFC}] */
|
||||||
ed25519Legacy: 22, // NB: this is declared before `eddsa` to translate 22 to 'eddsa' for backwards compatibility
|
eddsaLegacy: 22, // NB: this is declared before `eddsa` to translate 22 to 'eddsa' for backwards compatibility
|
||||||
eddsa: 22, // to be deprecated in v6
|
/** @deprecated use `eddsaLegacy` instead */
|
||||||
|
ed25519Legacy: 22,
|
||||||
|
/** @deprecated use `eddsaLegacy` instead */
|
||||||
|
eddsa: 22,
|
||||||
/** Reserved for AEDH */
|
/** Reserved for AEDH */
|
||||||
aedh: 23,
|
aedh: 23,
|
||||||
/** Reserved for AEDSA */
|
/** Reserved for AEDSA */
|
||||||
|
|
|
@ -197,50 +197,50 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options, conf
|
||||||
const dataToSign = {};
|
const dataToSign = {};
|
||||||
dataToSign.userID = userIDPacket;
|
dataToSign.userID = userIDPacket;
|
||||||
dataToSign.key = secretKeyPacket;
|
dataToSign.key = secretKeyPacket;
|
||||||
const signaturePacket = new SignaturePacket();
|
|
||||||
signaturePacket.signatureType = enums.signature.certGeneric;
|
const signatureProperties = {};
|
||||||
signaturePacket.publicKeyAlgorithm = secretKeyPacket.algorithm;
|
signatureProperties.signatureType = enums.signature.certGeneric;
|
||||||
signaturePacket.hashAlgorithm = await helper.getPreferredHashAlgo(null, secretKeyPacket, undefined, undefined, config);
|
signatureProperties.keyFlags = [enums.keyFlags.certifyKeys | enums.keyFlags.signData];
|
||||||
signaturePacket.keyFlags = [enums.keyFlags.certifyKeys | enums.keyFlags.signData];
|
signatureProperties.preferredSymmetricAlgorithms = createPreferredAlgos([
|
||||||
signaturePacket.preferredSymmetricAlgorithms = createPreferredAlgos([
|
|
||||||
// prefer aes256, aes128, then aes192 (no WebCrypto support: https://www.chromium.org/blink/webcrypto#TOC-AES-support)
|
// prefer aes256, aes128, then aes192 (no WebCrypto support: https://www.chromium.org/blink/webcrypto#TOC-AES-support)
|
||||||
enums.symmetric.aes256,
|
enums.symmetric.aes256,
|
||||||
enums.symmetric.aes128,
|
enums.symmetric.aes128,
|
||||||
enums.symmetric.aes192
|
enums.symmetric.aes192
|
||||||
], config.preferredSymmetricAlgorithm);
|
], config.preferredSymmetricAlgorithm);
|
||||||
if (config.aeadProtect) {
|
if (config.aeadProtect) {
|
||||||
signaturePacket.preferredAEADAlgorithms = createPreferredAlgos([
|
signatureProperties.preferredAEADAlgorithms = createPreferredAlgos([
|
||||||
enums.aead.eax,
|
enums.aead.eax,
|
||||||
enums.aead.ocb
|
enums.aead.ocb
|
||||||
], config.preferredAEADAlgorithm);
|
], config.preferredAEADAlgorithm);
|
||||||
}
|
}
|
||||||
signaturePacket.preferredHashAlgorithms = createPreferredAlgos([
|
signatureProperties.preferredHashAlgorithms = createPreferredAlgos([
|
||||||
// prefer fast asm.js implementations (SHA-256)
|
// prefer fast asm.js implementations (SHA-256)
|
||||||
enums.hash.sha256,
|
enums.hash.sha256,
|
||||||
enums.hash.sha512
|
enums.hash.sha512
|
||||||
], config.preferredHashAlgorithm);
|
], config.preferredHashAlgorithm);
|
||||||
signaturePacket.preferredCompressionAlgorithms = createPreferredAlgos([
|
signatureProperties.preferredCompressionAlgorithms = createPreferredAlgos([
|
||||||
enums.compression.zlib,
|
enums.compression.zlib,
|
||||||
enums.compression.zip,
|
enums.compression.zip,
|
||||||
enums.compression.uncompressed
|
enums.compression.uncompressed
|
||||||
], config.preferredCompressionAlgorithm);
|
], config.preferredCompressionAlgorithm);
|
||||||
if (index === 0) {
|
if (index === 0) {
|
||||||
signaturePacket.isPrimaryUserID = true;
|
signatureProperties.isPrimaryUserID = true;
|
||||||
}
|
}
|
||||||
// integrity protection always enabled
|
// integrity protection always enabled
|
||||||
signaturePacket.features = [0];
|
signatureProperties.features = [0];
|
||||||
signaturePacket.features[0] |= enums.features.modificationDetection;
|
signatureProperties.features[0] |= enums.features.modificationDetection;
|
||||||
if (config.aeadProtect) {
|
if (config.aeadProtect) {
|
||||||
signaturePacket.features[0] |= enums.features.aead;
|
signatureProperties.features[0] |= enums.features.aead;
|
||||||
}
|
}
|
||||||
if (config.v5Keys) {
|
if (config.v5Keys) {
|
||||||
signaturePacket.features[0] |= enums.features.v5Keys;
|
signatureProperties.features[0] |= enums.features.v5Keys;
|
||||||
}
|
}
|
||||||
if (options.keyExpirationTime > 0) {
|
if (options.keyExpirationTime > 0) {
|
||||||
signaturePacket.keyExpirationTime = options.keyExpirationTime;
|
signatureProperties.keyExpirationTime = options.keyExpirationTime;
|
||||||
signaturePacket.keyNeverExpires = false;
|
signatureProperties.keyNeverExpires = false;
|
||||||
}
|
}
|
||||||
await signaturePacket.sign(secretKeyPacket, dataToSign, options.date);
|
|
||||||
|
const signaturePacket = await helper.createSignaturePacket(dataToSign, null, secretKeyPacket, signatureProperties, options.date, undefined, undefined, undefined, config);
|
||||||
|
|
||||||
return { userIDPacket, signaturePacket };
|
return { userIDPacket, signaturePacket };
|
||||||
})).then(list => {
|
})).then(list => {
|
||||||
|
|
|
@ -5,8 +5,6 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
import {
|
import {
|
||||||
PublicKeyPacket,
|
|
||||||
PublicSubkeyPacket,
|
|
||||||
SecretKeyPacket,
|
SecretKeyPacket,
|
||||||
SecretSubkeyPacket,
|
SecretSubkeyPacket,
|
||||||
SignaturePacket
|
SignaturePacket
|
||||||
|
@ -88,23 +86,20 @@ export async function createBindingSignature(subkey, primaryKey, options, config
|
||||||
const dataToSign = {};
|
const dataToSign = {};
|
||||||
dataToSign.key = primaryKey;
|
dataToSign.key = primaryKey;
|
||||||
dataToSign.bind = subkey;
|
dataToSign.bind = subkey;
|
||||||
const subkeySignaturePacket = new SignaturePacket();
|
const signatureProperties = { signatureType: enums.signature.subkeyBinding };
|
||||||
subkeySignaturePacket.signatureType = enums.signature.subkeyBinding;
|
|
||||||
subkeySignaturePacket.publicKeyAlgorithm = primaryKey.algorithm;
|
|
||||||
subkeySignaturePacket.hashAlgorithm = await getPreferredHashAlgo(null, subkey, undefined, undefined, config);
|
|
||||||
if (options.sign) {
|
if (options.sign) {
|
||||||
subkeySignaturePacket.keyFlags = [enums.keyFlags.signData];
|
signatureProperties.keyFlags = [enums.keyFlags.signData];
|
||||||
subkeySignaturePacket.embeddedSignature = await createSignaturePacket(dataToSign, null, subkey, {
|
signatureProperties.embeddedSignature = await createSignaturePacket(dataToSign, null, subkey, {
|
||||||
signatureType: enums.signature.keyBinding
|
signatureType: enums.signature.keyBinding
|
||||||
}, options.date, undefined, undefined, undefined, config);
|
}, options.date, undefined, undefined, undefined, config);
|
||||||
} else {
|
} else {
|
||||||
subkeySignaturePacket.keyFlags = [enums.keyFlags.encryptCommunication | enums.keyFlags.encryptStorage];
|
signatureProperties.keyFlags = [enums.keyFlags.encryptCommunication | enums.keyFlags.encryptStorage];
|
||||||
}
|
}
|
||||||
if (options.keyExpirationTime > 0) {
|
if (options.keyExpirationTime > 0) {
|
||||||
subkeySignaturePacket.keyExpirationTime = options.keyExpirationTime;
|
signatureProperties.keyExpirationTime = options.keyExpirationTime;
|
||||||
subkeySignaturePacket.keyNeverExpires = false;
|
signatureProperties.keyNeverExpires = false;
|
||||||
}
|
}
|
||||||
await subkeySignaturePacket.sign(primaryKey, dataToSign, options.date);
|
const subkeySignaturePacket = await createSignaturePacket(dataToSign, null, primaryKey, signatureProperties, options.date, undefined, undefined, undefined, config);
|
||||||
return subkeySignaturePacket;
|
return subkeySignaturePacket;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -129,17 +124,11 @@ export async function getPreferredHashAlgo(key, keyPacket, date = new Date(), us
|
||||||
prefAlgo : hashAlgo;
|
prefAlgo : hashAlgo;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
switch (Object.getPrototypeOf(keyPacket)) {
|
switch (keyPacket.algorithm) {
|
||||||
case SecretKeyPacket.prototype:
|
case enums.publicKey.ecdsa:
|
||||||
case PublicKeyPacket.prototype:
|
case enums.publicKey.eddsaLegacy:
|
||||||
case SecretSubkeyPacket.prototype:
|
case enums.publicKey.ed25519:
|
||||||
case PublicSubkeyPacket.prototype:
|
prefAlgo = crypto.getPreferredCurveHashAlgo(keyPacket.algorithm, keyPacket.publicParams.oid);
|
||||||
switch (keyPacket.algorithm) {
|
|
||||||
case enums.publicKey.ecdh:
|
|
||||||
case enums.publicKey.ecdsa:
|
|
||||||
case enums.publicKey.eddsa:
|
|
||||||
prefAlgo = crypto.publicKey.elliptic.getPreferredHashAlgo(keyPacket.publicParams.oid);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return crypto.hash.getHashByteLength(hashAlgo) <= crypto.hash.getHashByteLength(prefAlgo) ?
|
return crypto.hash.getHashByteLength(hashAlgo) <= crypto.hash.getHashByteLength(prefAlgo) ?
|
||||||
prefAlgo : hashAlgo;
|
prefAlgo : hashAlgo;
|
||||||
|
@ -344,11 +333,11 @@ export function sanitizeKeyOptions(options, subkeyDefaults = {}) {
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
throw new Error('Unknown curve');
|
throw new Error('Unknown curve');
|
||||||
}
|
}
|
||||||
if (options.curve === enums.curve.ed25519 || options.curve === enums.curve.curve25519) {
|
if (options.curve === enums.curve.ed25519Legacy || options.curve === enums.curve.x25519Legacy) {
|
||||||
options.curve = options.sign ? enums.curve.ed25519 : enums.curve.curve25519;
|
options.curve = options.sign ? enums.curve.ed25519Legacy : enums.curve.x25519Legacy;
|
||||||
}
|
}
|
||||||
if (options.sign) {
|
if (options.sign) {
|
||||||
options.algorithm = options.curve === enums.curve.ed25519 ? enums.publicKey.eddsa : enums.publicKey.ecdsa;
|
options.algorithm = options.curve === enums.curve.ed25519Legacy ? enums.publicKey.eddsaLegacy : enums.publicKey.ecdsa;
|
||||||
} else {
|
} else {
|
||||||
options.algorithm = enums.publicKey.ecdh;
|
options.algorithm = enums.publicKey.ecdh;
|
||||||
}
|
}
|
||||||
|
@ -377,7 +366,7 @@ export function isValidEncryptionKeyPacket(keyPacket, signature) {
|
||||||
return keyAlgo !== enums.publicKey.dsa &&
|
return keyAlgo !== enums.publicKey.dsa &&
|
||||||
keyAlgo !== enums.publicKey.rsaSign &&
|
keyAlgo !== enums.publicKey.rsaSign &&
|
||||||
keyAlgo !== enums.publicKey.ecdsa &&
|
keyAlgo !== enums.publicKey.ecdsa &&
|
||||||
keyAlgo !== enums.publicKey.eddsa &&
|
keyAlgo !== enums.publicKey.eddsaLegacy &&
|
||||||
keyAlgo !== enums.publicKey.ed25519 &&
|
keyAlgo !== enums.publicKey.ed25519 &&
|
||||||
(!signature.keyFlags ||
|
(!signature.keyFlags ||
|
||||||
(signature.keyFlags[0] & enums.keyFlags.encryptCommunication) !== 0 ||
|
(signature.keyFlags[0] & enums.keyFlags.encryptCommunication) !== 0 ||
|
||||||
|
@ -417,7 +406,7 @@ export function checkKeyRequirements(keyPacket, config) {
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case enums.publicKey.ecdsa:
|
case enums.publicKey.ecdsa:
|
||||||
case enums.publicKey.eddsa:
|
case enums.publicKey.eddsaLegacy:
|
||||||
case enums.publicKey.ecdh:
|
case enums.publicKey.ecdh:
|
||||||
if (config.rejectCurves.has(algoInfo.curve)) {
|
if (config.rejectCurves.has(algoInfo.curve)) {
|
||||||
throw new Error(`Support for ${algoInfo.algorithm} keys using curve ${algoInfo.curve} is disabled.`);
|
throw new Error(`Support for ${algoInfo.algorithm} keys using curve ${algoInfo.curve} is disabled.`);
|
||||||
|
|
|
@ -178,7 +178,7 @@ n9/quqtmyOtYOA6gXNCw0Fal3iANKBmsPmYI
|
||||||
showComment: true,
|
showComment: true,
|
||||||
preferredCompressionAlgorithm: openpgp.enums.compression.zip,
|
preferredCompressionAlgorithm: openpgp.enums.compression.zip,
|
||||||
preferredHashAlgorithm: openpgp.enums.hash.sha512,
|
preferredHashAlgorithm: openpgp.enums.hash.sha512,
|
||||||
rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsa]) // should not matter in this context
|
rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsaLegacy]) // should not matter in this context
|
||||||
};
|
};
|
||||||
const opt2 = { privateKey: origKey, userIDs, config };
|
const opt2 = { privateKey: origKey, userIDs, config };
|
||||||
const { privateKey: refKeyArmored2 } = await openpgp.reformatKey(opt2);
|
const { privateKey: refKeyArmored2 } = await openpgp.reformatKey(opt2);
|
||||||
|
@ -296,11 +296,11 @@ n9/quqtmyOtYOA6gXNCw0Fal3iANKBmsPmYI
|
||||||
})).to.be.eventually.rejectedWith(/ecdh keys are considered too weak/);
|
})).to.be.eventually.rejectedWith(/ecdh keys are considered too weak/);
|
||||||
|
|
||||||
await expect(openpgp.encrypt({
|
await expect(openpgp.encrypt({
|
||||||
message, encryptionKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.curve25519]) }
|
message, encryptionKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.x25519Legacy]) }
|
||||||
})).to.be.eventually.rejectedWith(/Support for ecdh keys using curve curve25519 is disabled/);
|
})).to.be.eventually.rejectedWith(/Support for ecdh keys using curve curve25519 is disabled/);
|
||||||
|
|
||||||
const echdEncrypted = await openpgp.encrypt({
|
const echdEncrypted = await openpgp.encrypt({
|
||||||
message, encryptionKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.ed25519]) }
|
message, encryptionKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.ed25519Legacy]) }
|
||||||
});
|
});
|
||||||
expect(echdEncrypted).to.match(/---BEGIN PGP MESSAGE---/);
|
expect(echdEncrypted).to.match(/---BEGIN PGP MESSAGE---/);
|
||||||
} finally {
|
} finally {
|
||||||
|
@ -366,10 +366,10 @@ n9/quqtmyOtYOA6gXNCw0Fal3iANKBmsPmYI
|
||||||
await expect(openpgp.sign(opt2)).to.be.rejectedWith(/Insecure hash algorithm/);
|
await expect(openpgp.sign(opt2)).to.be.rejectedWith(/Insecure hash algorithm/);
|
||||||
|
|
||||||
await expect(openpgp.sign({
|
await expect(openpgp.sign({
|
||||||
message, signingKeys: [key], config: { rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsa]) }
|
message, signingKeys: [key], config: { rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsaLegacy]) }
|
||||||
})).to.be.eventually.rejectedWith(/eddsa keys are considered too weak/);
|
})).to.be.eventually.rejectedWith(/eddsa keys are considered too weak/);
|
||||||
await expect(openpgp.sign({
|
await expect(openpgp.sign({
|
||||||
message, signingKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.ed25519]) }
|
message, signingKeys: [key], config: { rejectCurves: new Set([openpgp.enums.curve.ed25519Legacy]) }
|
||||||
})).to.be.eventually.rejectedWith(/Support for eddsa keys using curve ed25519 is disabled/);
|
})).to.be.eventually.rejectedWith(/Support for eddsa keys using curve ed25519 is disabled/);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -411,7 +411,7 @@ n9/quqtmyOtYOA6gXNCw0Fal3iANKBmsPmYI
|
||||||
const opt4 = {
|
const opt4 = {
|
||||||
message: await openpgp.readMessage({ armoredMessage: signed }),
|
message: await openpgp.readMessage({ armoredMessage: signed }),
|
||||||
verificationKeys: [key],
|
verificationKeys: [key],
|
||||||
config: { rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsa]) }
|
config: { rejectPublicKeyAlgorithms: new Set([openpgp.enums.publicKey.eddsaLegacy]) }
|
||||||
};
|
};
|
||||||
const { signatures: [sig4] } = await openpgp.verify(opt4);
|
const { signatures: [sig4] } = await openpgp.verify(opt4);
|
||||||
await expect(sig4.verified).to.be.rejectedWith(/eddsa keys are considered too weak/);
|
await expect(sig4.verified).to.be.rejectedWith(/eddsa keys are considered too weak/);
|
||||||
|
@ -419,7 +419,7 @@ n9/quqtmyOtYOA6gXNCw0Fal3iANKBmsPmYI
|
||||||
const opt5 = {
|
const opt5 = {
|
||||||
message: await openpgp.readMessage({ armoredMessage: signed }),
|
message: await openpgp.readMessage({ armoredMessage: signed }),
|
||||||
verificationKeys: [key],
|
verificationKeys: [key],
|
||||||
config: { rejectCurves: new Set([openpgp.enums.curve.ed25519]) }
|
config: { rejectCurves: new Set([openpgp.enums.curve.ed25519Legacy]) }
|
||||||
};
|
};
|
||||||
const { signatures: [sig5] } = await openpgp.verify(opt5);
|
const { signatures: [sig5] } = await openpgp.verify(opt5);
|
||||||
await expect(sig5.verified).to.be.eventually.rejectedWith(/Support for eddsa keys using curve ed25519 is disabled/);
|
await expect(sig5.verified).to.be.eventually.rejectedWith(/Support for eddsa keys using curve ed25519 is disabled/);
|
||||||
|
|
|
@ -4070,7 +4070,7 @@ XvmoLueOOShu01X/kaylMqaT8w==
|
||||||
const subkey = newPrivateKey.subkeys[total];
|
const subkey = newPrivateKey.subkeys[total];
|
||||||
expect(subkey).to.exist;
|
expect(subkey).to.exist;
|
||||||
expect(subkey.getAlgorithmInfo().algorithm).to.be.equal('ecdh');
|
expect(subkey.getAlgorithmInfo().algorithm).to.be.equal('ecdh');
|
||||||
expect(subkey.getAlgorithmInfo().curve).to.be.equal(openpgp.enums.curve.curve25519);
|
expect(subkey.getAlgorithmInfo().curve).to.be.equal(openpgp.enums.curve.x25519Legacy);
|
||||||
await subkey.verify();
|
await subkey.verify();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user