diff --git a/README.md b/README.md index 55543c6e..183a90ab 100644 --- a/README.md +++ b/README.md @@ -148,16 +148,16 @@ Encryption will use the algorithm specified in config.encryptionCipher (defaults ```js (async () => { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(new Uint8Array([0x01, 0x01, 0x01])), // input as Message object + message: openpgp.Message.fromBinary(new Uint8Array([0x01, 0x01, 0x01])), // input as Message object passwords: ['secret stuff'], // multiple passwords possible armor: false // don't ASCII armor (for Uint8Array output) }); console.log(encrypted); // Uint8Array const { data: decrypted } = await openpgp.decrypt({ - message: await openpgp.message.read(encrypted), // parse encrypted bytes - passwords: ['secret stuff'], // decrypt with password - format: 'binary' // output as Uint8Array + message: await openpgp.readMessage(encrypted), // parse encrypted bytes + passwords: ['secret stuff'], // decrypt with password + format: 'binary' // output as Uint8Array }); console.log(decrypted); // Uint8Array([0x01, 0x01, 0x01]) })(); @@ -180,19 +180,19 @@ const openpgp = require('openpgp'); // use as CommonJS, AMD, ES6 module or via w -----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key const passphrase = `yourPassphrase`; // what the private key is encrypted with - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText('Hello, World!'), // input as Message object - publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for encryption - privateKeys: privateKey // for signing (optional) + message: openpgp.Message.fromText('Hello, World!'), // input as Message object + publicKeys: await openpgp.readArmoredKey(publicKeyArmored), // for encryption + privateKeys: privateKey // for signing (optional) }); console.log(encrypted); // '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----' const { data: decrypted } = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), // parse armored message - publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for verification (optional) - privateKeys: privateKey // for decryption + message: await openpgp.readArmoredMessage(encrypted), // parse armored message + publicKeys: await openpgp.readArmoredKey(publicKeyArmored), // for verification (optional) + privateKeys: privateKey // for decryption }); console.log(decrypted); // 'Hello, World!' })(); @@ -216,13 +216,13 @@ Encrypt with multiple public keys: const passphrase = `yourPassphrase`; // what the private key is encrypted with const message = 'Hello, World!'; - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase) - const publicKeys = await Promise.all(publicKeysArmored.map(openpgp.key.readArmored)); + const publicKeys = await Promise.all(publicKeysArmored.map(openpgp.readArmoredKey)); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(message), // input as Message object + message: openpgp.Message.fromText(message), // input as Message object publicKeys, // for encryption privateKeys: [privateKey] // for signing (optional) }); @@ -239,7 +239,7 @@ Either set the `compression` parameter in the options object when calling `encry ```js (async () => { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(new Uint8Array([0x01, 0x02, 0x03])), // or .fromText('string') + message: openpgp.Message.fromBinary(new Uint8Array([0x01, 0x02, 0x03])), // or .fromText('string') passwords: ['secret stuff'], // multiple passwords possible compression: openpgp.enums.compression.zip // compress the data with zip }); @@ -269,7 +269,7 @@ Where the value can be any of: }); const { message } = await openpgp.encrypt({ - message: openpgp.message.fromBinary(readableStream), // input as Message object + message: openpgp.Message.fromBinary(readableStream), // input as Message object passwords: ['secret stuff'], // multiple passwords possible armor: false // don't ASCII armor (for Uint8Array output) }); @@ -309,7 +309,7 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html). -----END PGP PRIVATE KEY BLOCK-----`; // Encrypted private key const passphrase = `yourPassphrase`; // Password that private key is encrypted with - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase); const readableStream = new openpgp.stream.ReadableStream({ @@ -320,16 +320,16 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html). }); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(readableStream), // input as Message object - publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for encryption - privateKeys: privateKey // for signing (optional) + message: openpgp.Message.fromText(readableStream), // input as Message object + publicKeys: await openpgp.readArmoredKey(publicKeyArmored), // for encryption + privateKeys: privateKey // for signing (optional) }); console.log(encrypted); // ReadableStream containing '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----' const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), // parse armored message - publicKeys: await openpgp.key.readArmored(publicKeyArmored), // for verification (optional) - privateKeys: privateKey // for decryption + message: await openpgp.readArmoredMessage(encrypted), // parse armored message + publicKeys: await openpgp.readArmoredKey(publicKeyArmored), // for verification (optional) + privateKeys: privateKey // for decryption }); const plaintext = await openpgp.stream.readToEnd(decrypted.data); console.log(plaintext); // 'Hello, World!' @@ -378,7 +378,7 @@ Using a revocation certificate: ```js (async () => { const { publicKeyArmored: revokedKeyArmored } = await openpgp.revokeKey({ - key: await openpgp.key.readArmored(publicKeyArmored), + key: await openpgp.readArmoredKey(publicKeyArmored), revocationCertificate }); console.log(revokedKeyArmored); // '-----BEGIN PGP PUBLIC KEY BLOCK ... ' @@ -389,7 +389,7 @@ Using the private key: ```js (async () => { const { publicKeyArmored, publicKey } = await openpgp.revokeKey({ - key: await openpgp.key.readArmored(privateKeyArmored) + key: await openpgp.readArmoredKey(privateKeyArmored) }); })(); ``` @@ -403,7 +403,7 @@ Using the private key: let publicKeyArmored = await hkp.lookup({ query: 'alice@example.com' }); - let publicKey = await openpgp.key.readArmored(publicKeyArmored); + let publicKey = await openpgp.readArmoredKey(publicKeyArmored); })(); ``` @@ -433,18 +433,18 @@ Using the private key: -----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key const passphrase = `yourPassphrase`; // what the private key is encrypted with - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase); const cleartext = await openpgp.sign({ - message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object - privateKeys: privateKey // for signing + message: openpgp.CleartextMessage.fromText('Hello, World!'), // CleartextMessage or Message object + privateKeys: privateKey // for signing }); console.log(cleartext); // '-----BEGIN PGP SIGNED MESSAGE ... END PGP SIGNATURE-----' const verified = await openpgp.verify({ - message: await openpgp.cleartext.readArmored(cleartext), // parse armored message - publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification + message: await openpgp.readArmoredCleartextMessage(cleartext), // parse armored message + publicKeys: await openpgp.readArmoredKey(publicKeyArmored) // for verification }); const { valid } = verified.signatures[0]; if (valid) { @@ -467,20 +467,20 @@ Using the private key: -----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key const passphrase = `yourPassphrase`; // what the private key is encrypted with - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase); const { signature: detachedSignature } = await openpgp.sign({ - message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object - privateKeys: privateKey , // for signing + message: openpgp.CleartextMessage.fromText('Hello, World!'), // CleartextMessage or Message object + privateKeys: privateKey, // for signing detached: true }); console.log(detachedSignature); const verified = await openpgp.verify({ - message: openpgp.cleartext.fromText('Hello, World!'), // CleartextMessage or Message object - signature: await openpgp.signature.readArmored(detachedSignature), // parse detached signature - publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification + message: openpgp.CleartextMessage.fromText('Hello, World!'), // CleartextMessage or Message object + signature: await openpgp.readArmoredSignature(detachedSignature), // parse detached signature + publicKeys: await openpgp.readArmoredKey(publicKeyArmored) // for verification }); const { valid } = verified.signatures[0]; if (valid) { @@ -510,18 +510,18 @@ Using the private key: -----END PGP PRIVATE KEY BLOCK-----`; // encrypted private key const passphrase = `yourPassphrase`; // what the private key is encrypted with - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt(passphrase); const signatureArmored = await openpgp.sign({ - message: openpgp.message.fromBinary(readableStream), // or .fromText(readableStream: ReadableStream) + message: openpgp.Message.fromBinary(readableStream), // or .fromText(readableStream: ReadableStream) privateKeys: privateKey // for signing }); console.log(signatureArmored); // ReadableStream containing '-----BEGIN PGP MESSAGE ... END PGP MESSAGE-----' const verified = await openpgp.verify({ - message: await openpgp.message.readArmored(signatureArmored), // parse armored signature - publicKeys: await openpgp.key.readArmored(publicKeyArmored) // for verification + message: await openpgp.readArmoredMessage(signatureArmored), // parse armored signature + publicKeys: await openpgp.readArmoredKey(publicKeyArmored) // for verification }); await openpgp.stream.readToEnd(verified.data); diff --git a/src/cleartext.js b/src/cleartext.js index 37c03c58..db2f282f 100644 --- a/src/cleartext.js +++ b/src/cleartext.js @@ -142,6 +142,15 @@ export class CleartextMessage { }; return armor.encode(enums.armor.signed, body); } + + /** + * Creates a new CleartextMessage object from text + * @param {String} text + * @static + */ + static fromText(text) { + return new CleartextMessage(text); + } } @@ -152,7 +161,7 @@ export class CleartextMessage { * @async * @static */ -export async function readArmored(armoredText) { +export async function readArmoredCleartextMessage(armoredText) { const input = await armor.decode(armoredText); if (input.type !== enums.armor.signed) { throw new Error('No cleartext signed message.'); @@ -209,12 +218,3 @@ function verifyHeaders(headers, packetlist) { throw new Error('Hash algorithm mismatch in armor header and signature'); } } - -/** - * Creates a new CleartextMessage object from text - * @param {String} text - * @static - */ -export function fromText(text) { - return new CleartextMessage(text); -} diff --git a/src/index.js b/src/index.js index 9acd3990..dee6ba34 100644 --- a/src/index.js +++ b/src/index.js @@ -17,29 +17,28 @@ export { * @see module:key * @name module:openpgp.key */ -import * as keyMod from './key'; -export const key = keyMod; +export * from './key'; /** * @see module:signature * @name module:openpgp.signature */ -import * as signatureMod from './signature'; -export const signature = signatureMod; +export * from './signature'; /** * @see module:message * @name module:openpgp.message */ -import * as messageMod from './message'; -export const message = messageMod; +export { + readMessage, readArmoredMessage, + Message +} from './message'; /** * @see module:cleartext * @name module:openpgp.cleartext */ -import * as cleartextMod from './cleartext'; -export const cleartext = cleartextMod; +export * from './cleartext'; /** * @see module:util diff --git a/src/key/factory.js b/src/key/factory.js index 6c9bacea..4e73ab67 100644 --- a/src/key/factory.js +++ b/src/key/factory.js @@ -269,7 +269,7 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) { * @async * @static */ -export async function read(data) { +export async function readKey(data) { const packetlist = new PacketList(); await packetlist.read(data, helper.allowedKeyPackets); return new Key(packetlist); @@ -282,12 +282,12 @@ export async function read(data) { * @async * @static */ -export async function readArmored(armoredKey) { +export async function readArmoredKey(armoredKey) { const input = await armor.decode(armoredKey); if (!(input.type === enums.armor.publicKey || input.type === enums.armor.privateKey)) { throw new Error('Armored text not of type key'); } - return read(input.data); + return readKey(input.data); } /** @@ -297,7 +297,7 @@ export async function readArmored(armoredKey) { * @async * @static */ -export async function readAll(data) { +export async function readKeys(data) { const keys = []; const packetlist = new PacketList(); await packetlist.read(data, helper.allowedKeyPackets); @@ -320,10 +320,10 @@ export async function readAll(data) { * @async * @static */ -export async function readAllArmored(armoredKey) { +export async function readArmoredKeys(armoredKey) { const input = await armor.decode(armoredKey); if (!(input.type === enums.armor.publicKey || input.type === enums.armor.privateKey)) { throw new Error('Armored text not of type key'); } - return readAll(input.data); + return readKeys(input.data); } diff --git a/src/key/index.js b/src/key/index.js index 72aef191..2aee3bb7 100644 --- a/src/key/index.js +++ b/src/key/index.js @@ -4,8 +4,8 @@ */ import { - read, readArmored, - readAll, readAllArmored, + readKey, readArmoredKey, + readKeys, readArmoredKeys, generate, reformat } from './factory'; @@ -20,8 +20,8 @@ import { import Key from './key.js'; export { - read, readArmored, - readAll, readAllArmored, + readKey, readArmoredKey, + readKeys, readArmoredKeys, generate, reformat, getPreferredAlgo, diff --git a/src/keyring/keyring.js b/src/keyring/keyring.js index b4298015..448b1ef4 100644 --- a/src/keyring/keyring.js +++ b/src/keyring/keyring.js @@ -22,7 +22,7 @@ * @module keyring/keyring */ -import { readAllArmored } from '../key'; +import { readArmoredKeys } from '../key'; import LocalStore from './localstore'; /** @@ -80,7 +80,7 @@ class KeyArray { * @async */ async importKey(armored) { - const imported = await readAllArmored(armored); + const imported = await readArmoredKeys(armored); for (let i = 0; i < imported.length; i++) { const key = imported[i]; // check if key already in key array diff --git a/src/keyring/localstore.js b/src/keyring/localstore.js index 31087c24..0ae711f4 100644 --- a/src/keyring/localstore.js +++ b/src/keyring/localstore.js @@ -25,7 +25,7 @@ import stream from 'web-stream-tools'; import config from '../config'; -import { readArmored } from '../key'; +import { readArmoredKey } from '../key'; /** * The class that deals with storage of the keyring. @@ -97,7 +97,7 @@ async function loadKeys(storage, itemname) { if (armoredKeys !== null && armoredKeys.length !== 0) { let key; for (let i = 0; i < armoredKeys.length; i++) { - key = await readArmored(armoredKeys[i]); + key = await readArmoredKey(armoredKeys[i]); keys.push(key); } } diff --git a/src/message.js b/src/message.js index cfd9df61..23657eb6 100644 --- a/src/message.js +++ b/src/message.js @@ -625,6 +625,63 @@ export class Message { armor() { return armor.encode(enums.armor.message, this.write()); } + + /** + * creates new message object from text + * @param {String | ReadableStream} text + * @param {String} filename (optional) + * @param {Date} date (optional) + * @param {utf8|binary|text|mime} type (optional) data packet type + * @returns {module:message.Message} new message object + * @static + */ + static fromText(text, filename, date = new Date(), type = 'utf8') { + const streamType = util.isStream(text); + if (streamType === 'node') { + text = stream.nodeToWeb(text); + } + const literalDataPacket = new LiteralDataPacket(date); + // text will be converted to UTF8 + literalDataPacket.setText(text, type); + if (filename !== undefined) { + literalDataPacket.setFilename(filename); + } + const literalDataPacketlist = new PacketList(); + literalDataPacketlist.push(literalDataPacket); + const message = new Message(literalDataPacketlist); + message.fromStream = streamType; + return message; + } + + /** + * creates new message object from binary data + * @param {Uint8Array | ReadableStream} bytes + * @param {String} filename (optional) + * @param {Date} date (optional) + * @param {utf8|binary|text|mime} type (optional) data packet type + * @returns {module:message.Message} new message object + * @static + */ + static fromBinary(bytes, filename, date = new Date(), type = 'binary') { + const streamType = util.isStream(bytes); + if (!util.isUint8Array(bytes) && !streamType) { + throw new Error('Data must be in the form of a Uint8Array or Stream'); + } + if (streamType === 'node') { + bytes = stream.nodeToWeb(bytes); + } + + const literalDataPacket = new LiteralDataPacket(date); + literalDataPacket.setBytes(bytes, type); + if (filename !== undefined) { + literalDataPacket.setFilename(filename); + } + const literalDataPacketlist = new PacketList(); + literalDataPacketlist.push(literalDataPacket); + const message = new Message(literalDataPacketlist); + message.fromStream = streamType; + return message; + } } /** @@ -752,7 +809,7 @@ export async function createVerificationObjects(signatureList, literalDataList, * @async * @static */ -export async function readArmored(armoredText) { +export async function readArmoredMessage(armoredText) { //TODO how do we want to handle bad text? Exception throwing //TODO don't accept non-message armored texts const streamType = util.isStream(armoredText); @@ -760,7 +817,7 @@ export async function readArmored(armoredText) { armoredText = stream.nodeToWeb(armoredText); } const input = await armor.decode(armoredText); - return read(input.data, streamType); + return readMessage(input.data, streamType); } /** @@ -771,7 +828,7 @@ export async function readArmored(armoredText) { * @async * @static */ -export async function read(input, fromStream = util.isStream(input)) { +export async function readMessage(input, fromStream = util.isStream(input)) { const streamType = util.isStream(input); if (streamType === 'node') { input = stream.nodeToWeb(input); @@ -792,60 +849,3 @@ export async function read(input, fromStream = util.isStream(input)) { message.fromStream = fromStream; return message; } - -/** - * creates new message object from text - * @param {String | ReadableStream} text - * @param {String} filename (optional) - * @param {Date} date (optional) - * @param {utf8|binary|text|mime} type (optional) data packet type - * @returns {module:message.Message} new message object - * @static - */ -export function fromText(text, filename, date = new Date(), type = 'utf8') { - const streamType = util.isStream(text); - if (streamType === 'node') { - text = stream.nodeToWeb(text); - } - const literalDataPacket = new LiteralDataPacket(date); - // text will be converted to UTF8 - literalDataPacket.setText(text, type); - if (filename !== undefined) { - literalDataPacket.setFilename(filename); - } - const literalDataPacketlist = new PacketList(); - literalDataPacketlist.push(literalDataPacket); - const message = new Message(literalDataPacketlist); - message.fromStream = streamType; - return message; -} - -/** - * creates new message object from binary data - * @param {Uint8Array | ReadableStream} bytes - * @param {String} filename (optional) - * @param {Date} date (optional) - * @param {utf8|binary|text|mime} type (optional) data packet type - * @returns {module:message.Message} new message object - * @static - */ -export function fromBinary(bytes, filename, date = new Date(), type = 'binary') { - const streamType = util.isStream(bytes); - if (!util.isUint8Array(bytes) && !streamType) { - throw new Error('Data must be in the form of a Uint8Array or Stream'); - } - if (streamType === 'node') { - bytes = stream.nodeToWeb(bytes); - } - - const literalDataPacket = new LiteralDataPacket(date); - literalDataPacket.setBytes(bytes, type); - if (filename !== undefined) { - literalDataPacket.setFilename(filename); - } - const literalDataPacketlist = new PacketList(); - literalDataPacketlist.push(literalDataPacket); - const message = new Message(literalDataPacketlist); - message.fromStream = streamType; - return message; -} diff --git a/src/openpgp.js b/src/openpgp.js index ac12a088..b3f21ade 100644 --- a/src/openpgp.js +++ b/src/openpgp.js @@ -211,7 +211,7 @@ export function encryptKey({ privateKey, passphrase }) { /** * Encrypts message text/data with public keys, passwords or both at once. At least either public keys or passwords * must be specified. If private keys are specified, those will be used to sign the message. - * @param {Message} message message to be encrypted as created by openpgp.message.fromText or openpgp.message.fromBinary + * @param {Message} message message to be encrypted as created by openpgp.Message.fromText or openpgp.Message.fromBinary * @param {Key|Array} publicKeys (optional) array of keys or single key, used to encrypt the message * @param {Key|Array} privateKeys (optional) private keys for signing. If omitted message will not be signed * @param {String|Array} passwords (optional) array of passwords or a single password to encrypt the message diff --git a/src/signature.js b/src/signature.js index 9cbf2158..541b3115 100644 --- a/src/signature.js +++ b/src/signature.js @@ -61,9 +61,9 @@ export class Signature { * @async * @static */ -export async function readArmored(armoredText) { +export async function readArmoredSignature(armoredText) { const input = await armor.decode(armoredText); - return read(input.data); + return readSignature(input.data); } /** @@ -73,7 +73,7 @@ export async function readArmored(armoredText) { * @async * @static */ -export async function read(input) { +export async function readSignature(input) { const packetlist = new PacketList(); await packetlist.read(input, { SignaturePacket }); return new Signature(packetlist); diff --git a/src/wkd.js b/src/wkd.js index c0705442..1a672862 100644 --- a/src/wkd.js +++ b/src/wkd.js @@ -24,7 +24,7 @@ import util from './util'; import crypto from './crypto'; -import * as keyMod from './key'; +import { readKeys } from './key'; class WKD { /** @@ -78,7 +78,7 @@ class WKD { if (options.rawBytes) { return rawBytes; } - return keyMod.readAll(rawBytes); + return readKeys(rawBytes); } } diff --git a/test/crypto/validate.js b/test/crypto/validate.js index 84c24c1b..bfe3c883 100644 --- a/test/crypto/validate.js +++ b/test/crypto/validate.js @@ -263,7 +263,7 @@ module.exports = () => { describe('DSA parameter validation', function() { let dsaKey; before(async () => { - dsaKey = await openpgp.key.readArmored(armoredDSAKey); + dsaKey = await openpgp.readArmoredKey(armoredDSAKey); }); it('DSA params should be valid', async function() { @@ -300,7 +300,7 @@ module.exports = () => { describe('ElGamal parameter validation', function() { let egKey; before(async () => { - egKey = (await openpgp.key.readArmored(armoredElGamalKey)).subKeys[0]; + egKey = (await openpgp.readArmoredKey(armoredElGamalKey)).subKeys[0]; }); it('params should be valid', async function() { diff --git a/test/general/armor.js b/test/general/armor.js index aa681541..bb154f4e 100644 --- a/test/general/armor.js +++ b/test/general/armor.js @@ -28,55 +28,55 @@ module.exports = () => describe("ASCII armor", function() { it('Parse cleartext signed message', async function () { let msg = getArmor(['Hash: SHA1']); - msg = await openpgp.cleartext.readArmored(msg); - expect(msg).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + msg = await openpgp.readArmoredCleartextMessage(msg); + expect(msg).to.be.an.instanceof(openpgp.CleartextMessage); }); it('Exception if mismatch in armor header and signature', async function () { let msg = getArmor(['Hash: SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Hash algorithm mismatch in armor header and signature/); }); it('Exception if no header and non-MD5 signature', async function () { let msg = getArmor(null); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /If no "Hash" header in cleartext signed message, then only MD5 signatures allowed/); }); it('Exception if unknown hash algorithm', async function () { let msg = getArmor(['Hash: LAV750']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Unknown hash algorithm in armor header/); }); it('Multiple hash values', async function () { let msg = getArmor(['Hash: SHA1, SHA256']); - msg = await openpgp.cleartext.readArmored(msg); - expect(msg).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + msg = await openpgp.readArmoredCleartextMessage(msg); + expect(msg).to.be.an.instanceof(openpgp.CleartextMessage); }); it('Multiple hash header lines', async function () { let msg = getArmor(['Hash: SHA1', 'Hash: SHA256']); - msg = await openpgp.cleartext.readArmored(msg); - expect(msg).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + msg = await openpgp.readArmoredCleartextMessage(msg); + expect(msg).to.be.an.instanceof(openpgp.CleartextMessage); }); it('Non-hash header line throws exception', async function () { let msg = getArmor(['Hash: SHA1', 'Comment: could be anything']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Only "Hash" header allowed in cleartext signed message/); }); it('Multiple wrong hash values', async function () { let msg = getArmor(['Hash: SHA512, SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Hash algorithm mismatch in armor header and signature/); }); it('Multiple wrong hash values', async function () { let msg = getArmor(['Hash: SHA512, SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Hash algorithm mismatch in armor header and signature/); }); @@ -96,33 +96,33 @@ module.exports = () => describe("ASCII armor", function() { '=e/eA', '-----END PGP SIGNATURE-----'].join('\n'); - msg = await openpgp.cleartext.readArmored(msg); - expect(msg).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + msg = await openpgp.readArmoredCleartextMessage(msg); + expect(msg).to.be.an.instanceof(openpgp.CleartextMessage); }); it('Exception if improperly formatted armor header - plaintext section', async function () { let msg = getArmor(['Hash:SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Improperly formatted armor header/); msg = getArmor(['Ha sh: SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Only "Hash" header allowed in cleartext signed message/); msg = getArmor(['Hash SHA256']); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Improperly formatted armor header/); }); it('Exception if improperly formatted armor header - signature section', async function () { await Promise.all(['Space : trailing', 'Space :switched', ': empty', 'none', 'Space:missing'].map(async function (invalidHeader) { - await expect(openpgp.cleartext.readArmored(getArmor(['Hash: SHA1'], [invalidHeader]))).to.be.rejectedWith(Error, /Improperly formatted armor header/); + await expect(openpgp.readArmoredCleartextMessage(getArmor(['Hash: SHA1'], [invalidHeader]))).to.be.rejectedWith(Error, /Improperly formatted armor header/); })); }); it('Ignore unknown armor header - signature section', async function () { const validHeaders = ['Version: BCPG C# v1.7.4114.6375', 'Independent Reserve Pty. Ltd. 2017: 1.0.0.0']; - expect(await openpgp.cleartext.readArmored(getArmor(['Hash: SHA1'], validHeaders))).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + expect(await openpgp.readArmoredCleartextMessage(getArmor(['Hash: SHA1'], validHeaders))).to.be.an.instanceof(openpgp.CleartextMessage); await Promise.all(['A: Hello', 'Ab: 1.2.3', 'Abcd: #!/yah', 'Acd 123 5.6.$.8: Hello', '_: Hello', '*: Hello', '* & ## ?? ()(): Hello', '( ): Weird'].map(async function (validHeader) { - expect(await openpgp.cleartext.readArmored(getArmor(['Hash: SHA1'], [validHeader]))).to.be.an.instanceof(openpgp.cleartext.CleartextMessage); + expect(await openpgp.readArmoredCleartextMessage(getArmor(['Hash: SHA1'], [validHeader]))).to.be.an.instanceof(openpgp.CleartextMessage); })); }); @@ -141,7 +141,7 @@ module.exports = () => describe("ASCII armor", function() { '=e/eA', '-----END PGP SIGNNATURE-----'].join('\n'); - msg = openpgp.cleartext.readArmored(msg); + msg = openpgp.readArmoredCleartextMessage(msg); await expect(msg).to.be.rejectedWith(Error, /Unknown ASCII armor type/); }); @@ -167,11 +167,11 @@ module.exports = () => describe("ASCII armor", function() { '-----END PGP PRIVATE KEY BLOCK-----'].join('\n'); // try with default config - await expect(openpgp.key.readArmored(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); // try opposite config openpgp.config.checksumRequired = !openpgp.config.checksumRequired; - await expect(openpgp.key.readArmored(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKey)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); // back to default openpgp.config.checksumRequired = !openpgp.config.checksumRequired; @@ -199,11 +199,11 @@ module.exports = () => describe("ASCII armor", function() { '-----END PGP PRIVATE KEY BLOCK-----'].join('\n'); // try with default config - await openpgp.key.readArmored(privKey); + await openpgp.readArmoredKey(privKey); // try opposite config openpgp.config.checksumRequired = !openpgp.config.checksumRequired; - await openpgp.key.readArmored(privKey); + await openpgp.readArmoredKey(privKey); // back to default openpgp.config.checksumRequired = !openpgp.config.checksumRequired; @@ -231,17 +231,17 @@ module.exports = () => describe("ASCII armor", function() { // try with default config if (openpgp.config.checksumRequired) { - await expect(openpgp.key.readArmored(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); } else { - await openpgp.key.readArmored(privKeyNoCheckSum); + await openpgp.readArmoredKey(privKeyNoCheckSum); } // try opposite config openpgp.config.checksumRequired = !openpgp.config.checksumRequired; if (openpgp.config.checksumRequired) { - await expect(openpgp.key.readArmored(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKeyNoCheckSum)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); } else { - await openpgp.key.readArmored(privKeyNoCheckSum); + await openpgp.readArmoredKey(privKeyNoCheckSum); } // back to default @@ -271,17 +271,17 @@ module.exports = () => describe("ASCII armor", function() { // try with default config if (openpgp.config.checksumRequired) { - await expect(openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); } else { - await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline); + await openpgp.readArmoredKey(privKeyNoCheckSumWithTrailingNewline); } // try opposite config openpgp.config.checksumRequired = !openpgp.config.checksumRequired; if (openpgp.config.checksumRequired) { - await expect(openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); + await expect(openpgp.readArmoredKey(privKeyNoCheckSumWithTrailingNewline)).to.be.rejectedWith(/Ascii armor integrity check on message failed/); } else { - await openpgp.key.readArmored(privKeyNoCheckSumWithTrailingNewline); + await openpgp.readArmoredKey(privKeyNoCheckSumWithTrailingNewline); } // back to default @@ -310,13 +310,13 @@ module.exports = () => describe("ASCII armor", function() { '-----END PGP PRIVATE KEY BLOCK-----', ''].join('\t \r\n'); - const result = await openpgp.key.readArmored(privKey); - expect(result).to.be.an.instanceof(openpgp.key.Key); + const result = await openpgp.readArmoredKey(privKey); + expect(result).to.be.an.instanceof(openpgp.Key); }); it('Do not filter blank lines after header', async function () { let msg = getArmor(['Hash: SHA1', '']); - msg = await openpgp.cleartext.readArmored(msg); + msg = await openpgp.readArmoredCleartextMessage(msg); expect(msg.text).to.equal('\r\nsign this'); }); diff --git a/test/general/brainpool.js b/test/general/brainpool.js index ae1de43f..fd555fea 100644 --- a/test/general/brainpool.js +++ b/test/general/brainpool.js @@ -172,7 +172,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= if (data[name].pub_key) { return data[name].pub_key; } - const pub = await openpgp.key.readArmored(data[name].pub); + const pub = await openpgp.readArmoredKey(data[name].pub); expect(pub.getKeyId().toHex()).to.equal(data[name].id); data[name].pub_key = pub; return pub; @@ -181,7 +181,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= if (data[name].priv_key) { return data[name].priv_key; } - const pk = await openpgp.key.readArmored(data[name].priv); + const pk = await openpgp.readArmoredKey(data[name].priv); expect(pk).to.exist; expect(pk.getKeyId().toHex()).to.equal(data[name].id); await pk.decrypt(data[name].pass); @@ -199,7 +199,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= }); it('Verify clear signed message', async function () { const pub = await load_pub_key('juliet'); - const msg = await openpgp.cleartext.readArmored(data.juliet.message_signed); + const msg = await openpgp.readArmoredCleartextMessage(data.juliet.message_signed); return openpgp.verify({publicKeys: [pub], message: msg}).then(function(result) { expect(result).to.exist; expect(result.data).to.equal(data.juliet.message); @@ -209,9 +209,9 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= }); it('Sign message', async function () { const romeoPrivate = await load_priv_key('romeo'); - const signed = await openpgp.sign({privateKeys: [romeoPrivate], message: openpgp.cleartext.fromText(data.romeo.message)}); + const signed = await openpgp.sign({privateKeys: [romeoPrivate], message: openpgp.CleartextMessage.fromText(data.romeo.message)}); const romeoPublic = await load_pub_key('romeo'); - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); const result = await openpgp.verify({publicKeys: [romeoPublic], message: msg}); expect(result).to.exist; @@ -222,7 +222,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= it('Decrypt and verify message', async function () { const juliet = await load_pub_key('juliet'); const romeo = await load_priv_key('romeo'); - const msg = await openpgp.message.readArmored(data.romeo.message_encrypted); + const msg = await openpgp.readArmoredMessage(data.romeo.message_encrypted); const result = await openpgp.decrypt({ privateKeys: romeo, publicKeys: [juliet], message: msg }); expect(result).to.exist; @@ -233,7 +233,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= it('Decrypt and verify message with leading zero in hash', async function () { const juliet = await load_priv_key('juliet'); const romeo = await load_pub_key('romeo'); - const msg = await openpgp.message.readArmored(data.romeo.message_encrypted_with_leading_zero_in_hash); + const msg = await openpgp.readArmoredMessage(data.romeo.message_encrypted_with_leading_zero_in_hash); const result = await openpgp.decrypt({privateKeys: juliet, publicKeys: [romeo], message: msg}); expect(result).to.exist; @@ -247,7 +247,7 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= openpgp.config.useNative = false; const juliet = await load_priv_key('juliet'); const romeo = await load_pub_key('romeo'); - const msg = await openpgp.message.readArmored(data.romeo. message_encrypted_with_leading_zero_in_hash_signed_by_elliptic_with_old_implementation); + const msg = await openpgp.readArmoredMessage(data.romeo. message_encrypted_with_leading_zero_in_hash_signed_by_elliptic_with_old_implementation); const result = await openpgp.decrypt({privateKeys: juliet, publicKeys: [romeo], message: msg}); openpgp.config.useNative = useNative; expect(result).to.exist; @@ -259,9 +259,9 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g= it('Encrypt and sign message', async function () { const romeoPrivate = await load_priv_key('romeo'); const julietPublic = await load_pub_key('juliet'); - const encrypted = await openpgp.encrypt({publicKeys: [julietPublic], privateKeys: [romeoPrivate], message: openpgp.message.fromText(data.romeo.message)}); + const encrypted = await openpgp.encrypt({publicKeys: [julietPublic], privateKeys: [romeoPrivate], message: openpgp.Message.fromText(data.romeo.message)}); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const romeoPublic = await load_pub_key('romeo'); const julietPrivate = await load_priv_key('juliet'); const result = await openpgp.decrypt({privateKeys: julietPrivate, publicKeys: [romeoPublic], message: message}); @@ -294,9 +294,9 @@ function omnibus() { return Promise.all([ // Signing message openpgp.sign( - { message: openpgp.cleartext.fromText(testData), privateKeys: hi } + { message: openpgp.CleartextMessage.fromText(testData), privateKeys: hi } ).then(async signed => { - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); // Verifying signed message return Promise.all([ openpgp.verify( @@ -305,9 +305,9 @@ function omnibus() { // Verifying detached signature openpgp.verify( { - message: openpgp.cleartext.fromText(testData), + message: openpgp.CleartextMessage.fromText(testData), publicKeys: pubHi, - signature: await openpgp.signature.readArmored(signed) + signature: await openpgp.readArmoredSignature(signed) } ).then(output => expect(output.signatures[0].valid).to.be.true) ]); @@ -315,12 +315,12 @@ function omnibus() { // Encrypting and signing openpgp.encrypt( { - message: openpgp.message.fromText(testData2), + message: openpgp.Message.fromText(testData2), publicKeys: [pubBye], privateKeys: [hi] } ).then(async encrypted => { - const msg = await openpgp.message.readArmored(encrypted); + const msg = await openpgp.readArmoredMessage(encrypted); // Decrypting and verifying return openpgp.decrypt( { diff --git a/test/general/decompression.js b/test/general/decompression.js index 952b4daf..d2df75b6 100644 --- a/test/general/decompression.js +++ b/test/general/decompression.js @@ -44,7 +44,7 @@ module.exports = () => describe('Decrypt and decompress message tests', function function runTest(key, test) { it(`Decrypts message compressed with ${key}`, async function () { - const message = await openpgp.message.readArmored(test.input); + const message = await openpgp.readArmoredMessage(test.input); const options = { passwords: password, message diff --git a/test/general/ecc_nist.js b/test/general/ecc_nist.js index e5aac8ec..4b148849 100644 --- a/test/general/ecc_nist.js +++ b/test/general/ecc_nist.js @@ -27,9 +27,9 @@ module.exports = () => describe('Elliptic Curve Cryptography for NIST P-256,P-38 // Signing message openpgp.sign( - { message: openpgp.cleartext.fromText(testData), privateKeys: hi } + { message: openpgp.CleartextMessage.fromText(testData), privateKeys: hi } ).then(async signed => { - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); // Verifying signed message return Promise.all([ openpgp.verify( @@ -37,19 +37,19 @@ module.exports = () => describe('Elliptic Curve Cryptography for NIST P-256,P-38 ).then(output => expect(output.signatures[0].valid).to.be.true), // Verifying detached signature openpgp.verify( - { message: openpgp.cleartext.fromText(testData), + { message: openpgp.CleartextMessage.fromText(testData), publicKeys: pubHi, - signature: await openpgp.signature.readArmored(signed) } + signature: await openpgp.readArmoredSignature(signed) } ).then(output => expect(output.signatures[0].valid).to.be.true) ]); }), // Encrypting and signing openpgp.encrypt( - { message: openpgp.message.fromText(testData2), + { message: openpgp.Message.fromText(testData2), publicKeys: [pubBye], privateKeys: [hi] } ).then(async encrypted => { - const msg = await openpgp.message.readArmored(encrypted); + const msg = await openpgp.readArmoredMessage(encrypted); // Decrypting and verifying return openpgp.decrypt( { message: msg, @@ -72,8 +72,8 @@ module.exports = () => describe('Elliptic Curve Cryptography for NIST P-256,P-38 const testData = input.createSomeMessage(); let options = { userIds: {name: "Hi", email: "hi@hel.lo"}, curve: "p256" }; const firstKey = await openpgp.generateKey(options); - const signature = await openpgp.sign({ message: openpgp.cleartext.fromText(testData), privateKeys: firstKey.key }); - const msg = await openpgp.cleartext.readArmored(signature); + const signature = await openpgp.sign({ message: openpgp.CleartextMessage.fromText(testData), privateKeys: firstKey.key }); + const msg = await openpgp.readArmoredCleartextMessage(signature); const result = await openpgp.verify({ message: msg, publicKeys: firstKey.key.toPublic()}); expect(result.signatures[0].valid).to.be.true; }); @@ -85,11 +85,11 @@ module.exports = () => describe('Elliptic Curve Cryptography for NIST P-256,P-38 options = { userIds: { name: "Bye", email: "bye@good.bye" }, curve: "p256" }; const secondKey = await openpgp.generateKey(options); const encrypted = await openpgp.encrypt( - { message: openpgp.message.fromText(testData), + { message: openpgp.Message.fromText(testData), publicKeys: [secondKey.key.toPublic()], privateKeys: [firstKey.key] } ); - const msg = await openpgp.message.readArmored(encrypted); + const msg = await openpgp.readArmoredMessage(encrypted); const result = await openpgp.decrypt( { message: msg, privateKeys: secondKey.key, diff --git a/test/general/ecc_secp256k1.js b/test/general/ecc_secp256k1.js index fc0cd31a..caff2710 100644 --- a/test/general/ecc_secp256k1.js +++ b/test/general/ecc_secp256k1.js @@ -141,7 +141,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve if (data[name].pub_key) { return data[name].pub_key; } - const pub = await openpgp.key.readArmored(data[name].pub); + const pub = await openpgp.readArmoredKey(data[name].pub); expect(pub).to.exist; expect(pub.getKeyId().toHex()).to.equal(data[name].id); data[name].pub_key = pub; @@ -151,7 +151,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve if (data[name].priv_key) { return data[name].priv_key; } - const pk = await openpgp.key.readArmored(data[name].priv); + const pk = await openpgp.readArmoredKey(data[name].priv); expect(pk).to.exist; expect(pk.getKeyId().toHex()).to.equal(data[name].id); await pk.decrypt(data[name].pass); @@ -175,7 +175,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve }); it('Verify clear signed message', async function () { const pub = await load_pub_key('juliet'); - const msg = await openpgp.cleartext.readArmored(data.juliet.message_signed); + const msg = await openpgp.readArmoredCleartextMessage(data.juliet.message_signed); return openpgp.verify({publicKeys: [pub], message: msg}).then(function(result) { expect(result).to.exist; expect(result.data).to.equal(data.juliet.message); @@ -185,9 +185,9 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve }); it('Sign message', async function () { const romeoPrivate = await load_priv_key('romeo'); - const signed = await openpgp.sign({privateKeys: [romeoPrivate], message: openpgp.cleartext.fromText(data.romeo.message)}); + const signed = await openpgp.sign({privateKeys: [romeoPrivate], message: openpgp.CleartextMessage.fromText(data.romeo.message)}); const romeoPublic = await load_pub_key('romeo'); - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); const result = await openpgp.verify({publicKeys: [romeoPublic], message: msg}); expect(result).to.exist; @@ -198,7 +198,7 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve it('Decrypt and verify message', async function () { const juliet = await load_pub_key('juliet'); const romeo = await load_priv_key('romeo'); - const msg = await openpgp.message.readArmored(data.juliet.message_encrypted); + const msg = await openpgp.readArmoredMessage(data.juliet.message_encrypted); const result = await openpgp.decrypt({privateKeys: romeo, publicKeys: [juliet], message: msg}); expect(result).to.exist; @@ -209,9 +209,9 @@ module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve it('Encrypt and sign message', async function () { const romeoPrivate = await load_priv_key('romeo'); const julietPublic = await load_pub_key('juliet'); - const encrypted = await openpgp.encrypt({publicKeys: [julietPublic], privateKeys: [romeoPrivate], message: openpgp.message.fromText(data.romeo.message)}); + const encrypted = await openpgp.encrypt({publicKeys: [julietPublic], privateKeys: [romeoPrivate], message: openpgp.Message.fromText(data.romeo.message)}); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const romeoPublic = await load_pub_key('romeo'); const julietPrivate = await load_priv_key('juliet'); const result = await openpgp.decrypt({privateKeys: julietPrivate, publicKeys: [romeoPublic], message: message}); diff --git a/test/general/key.js b/test/general/key.js index 20c33ee1..a3803be2 100644 --- a/test/general/key.js +++ b/test/general/key.js @@ -2052,7 +2052,7 @@ function versionSpecificTests() { const opt = { userIds: 'test ', passphrase: 'hello' }; return openpgp.generateKey(opt).then(async function(key) { testPref(key.key); - testPref(await openpgp.key.readArmored(key.publicKeyArmored)); + testPref(await openpgp.readArmoredKey(key.publicKeyArmored)); }); }); @@ -2098,7 +2098,7 @@ function versionSpecificTests() { try { const key = await openpgp.generateKey(opt); testPref(key.key); - testPref(await openpgp.key.readArmored(key.publicKeyArmored)); + testPref(await openpgp.readArmoredKey(key.publicKeyArmored)); } finally { openpgp.config.encryptionCipher = encryptionCipherVal; openpgp.config.preferHashAlgorithm = preferHashAlgorithmVal; @@ -2112,7 +2112,7 @@ function versionSpecificTests() { let key; return openpgp.generateKey(opt).then(function(newKey) { key = newKey.key; - return openpgp.message.fromText('hello').encrypt([key]); + return openpgp.Message.fromText('hello').encrypt([key]); }).then(function(msg) { return msg.decrypt([key]); }).catch(function(err) { @@ -2252,7 +2252,7 @@ function versionSpecificTests() { const userId = 'test '; const opt = { userIds: [userId], passphrase: '123', subkeys:[{}, { sign: true }] }; return openpgp.generateKey(opt).then(async function({ privateKeyArmored }) { - const key = await openpgp.key.readArmored(privateKeyArmored); + const key = await openpgp.readArmoredKey(privateKeyArmored); expect(key.users.length).to.equal(1); expect(key.users[0].userId.userid).to.equal(userId); expect(key.users[0].selfCertifications[0].isPrimaryUserID).to.be.true; @@ -2271,7 +2271,7 @@ function versionSpecificTests() { await key.decrypt('123'); return openpgp.reformatKey({ privateKey: key, userIds: [userId] }); }).then(async function({ privateKeyArmored }) { - const key = await openpgp.key.readArmored(privateKeyArmored); + const key = await openpgp.readArmoredKey(privateKeyArmored); expect(key.users.length).to.equal(1); expect(key.users[0].userId.userid).to.equal(userId); expect(key.users[0].selfCertifications[0].isPrimaryUserID).to.be.true; @@ -2340,8 +2340,8 @@ function versionSpecificTests() { }); it('Sign and verify key - primary user', async function() { - let publicKey = await openpgp.key.readArmored(pub_sig_test); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + let publicKey = await openpgp.readArmoredKey(pub_sig_test); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); publicKey = await publicKey.signPrimaryUser([privateKey]); const signatures = await publicKey.verifyPrimaryUser([privateKey]); @@ -2355,9 +2355,9 @@ function versionSpecificTests() { }); it('Sign key and verify with wrong key - primary user', async function() { - let publicKey = await openpgp.key.readArmored(pub_sig_test); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); - const wrongKey = await openpgp.key.readArmored(wrong_key); + let publicKey = await openpgp.readArmoredKey(pub_sig_test); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); + const wrongKey = await openpgp.readArmoredKey(wrong_key); await privateKey.decrypt('hello world'); publicKey = await publicKey.signPrimaryUser([privateKey]); const signatures = await publicKey.verifyPrimaryUser([wrongKey]); @@ -2371,8 +2371,8 @@ function versionSpecificTests() { }); it('Sign and verify key - all users', async function() { - let publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + let publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); publicKey = await publicKey.signAllUsers([privateKey]); const signatures = await publicKey.verifyAllUsers([privateKey]); @@ -2394,9 +2394,9 @@ function versionSpecificTests() { }); it('Sign key and verify with wrong key - all users', async function() { - let publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); - const wrongKey = await openpgp.key.readArmored(wrong_key); + let publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); + const wrongKey = await openpgp.readArmoredKey(wrong_key); await privateKey.decrypt('hello world'); publicKey = await publicKey.signAllUsers([privateKey]); const signatures = await publicKey.verifyAllUsers([wrongKey]); @@ -2439,7 +2439,7 @@ function versionSpecificTests() { it('Reformat key with no subkey with passphrase', async function() { const userId = 'test1 '; - const key = await openpgp.key.readArmored(key_without_subkey); + const key = await openpgp.readArmoredKey(key_without_subkey); const opt = { privateKey: key, userIds: [userId], passphrase: "test" }; return openpgp.reformatKey(opt).then(function(newKey) { newKey = newKey.key; @@ -2473,16 +2473,16 @@ function versionSpecificTests() { it('Reformat key with no subkey without passphrase', async function() { const userId = 'test1 '; - const key = await openpgp.key.readArmored(key_without_subkey); + const key = await openpgp.readArmoredKey(key_without_subkey); const opt = { privateKey: key, userIds: [userId] }; return openpgp.reformatKey(opt).then(function(newKey) { newKey = newKey.key; expect(newKey.users.length).to.equal(1); expect(newKey.users[0].userId.userid).to.equal(userId); expect(newKey.isDecrypted()).to.be.true; - return openpgp.sign({ message: openpgp.cleartext.fromText('hello'), privateKeys: newKey, armor: true }).then(async function(signed) { + return openpgp.sign({ message: openpgp.CleartextMessage.fromText('hello'), privateKeys: newKey, armor: true }).then(async function(signed) { return openpgp.verify( - { message: await openpgp.cleartext.readArmored(signed), publicKeys: newKey.toPublic() } + { message: await openpgp.readArmoredCleartextMessage(signed), publicKeys: newKey.toPublic() } ).then(async function(verified) { expect(verified.signatures[0].valid).to.be.true; const newSigningKey = await newKey.getSigningKey(); @@ -2524,8 +2524,8 @@ function versionSpecificTests() { opt.userIds = userId2; return openpgp.reformatKey(opt).then(function(newKey) { newKey = newKey.key; - return openpgp.encrypt({ message: openpgp.message.fromText('hello'), publicKeys: newKey.toPublic(), privateKeys: newKey, armor: true }).then(async function(encrypted) { - return openpgp.decrypt({ message: await openpgp.message.readArmored(encrypted), privateKeys: newKey, publicKeys: newKey.toPublic() }).then(function(decrypted) { + return openpgp.encrypt({ message: openpgp.Message.fromText('hello'), publicKeys: newKey.toPublic(), privateKeys: newKey, armor: true }).then(async function(encrypted) { + return openpgp.decrypt({ message: await openpgp.readArmoredMessage(encrypted), privateKeys: newKey, publicKeys: newKey.toPublic() }).then(function(decrypted) { expect(decrypted.data).to.equal('hello'); expect(decrypted.signatures[0].valid).to.be.true; }); @@ -2576,7 +2576,7 @@ function versionSpecificTests() { // uid emma.goldman@example.net // ssb cv25519 2019-03-20 [E] // E4557C2B02FFBF4B04F87401EC336AF7133D0F85BE7FD09BAEFD9CAEB8C93965 - const key = await openpgp.key.readArmored(v5_sample_key); + const key = await openpgp.readArmoredKey(v5_sample_key); expect(key.primaryKey.getFingerprint()).to.equal('19347bc9872464025f99df3ec2e0000ed9884892e1f7b3ea4c94009159569b54'); expect(key.subKeys[0].getFingerprint()).to.equal('e4557c2b02ffbf4b04f87401ec336af7133d0f85be7fd09baefd9caeb8c93965'); await key.verifyPrimaryKey(); @@ -2641,14 +2641,14 @@ module.exports = () => describe('Key', function() { it('Parsing armored text with RSA key and ECC subkey', async function() { openpgp.config.tolerant = true; - const pubKeys = await openpgp.key.readAllArmored(rsa_ecc_pub); + const pubKeys = await openpgp.readArmoredKeys(rsa_ecc_pub); expect(pubKeys).to.exist; expect(pubKeys).to.have.length(1); expect(pubKeys[0].getKeyId().toHex()).to.equal('b8e4105cc9dedc77'); }); it('Parsing armored text with two keys', async function() { - const pubKeys = await openpgp.key.readAllArmored(twoKeys); + const pubKeys = await openpgp.readArmoredKeys(twoKeys); expect(pubKeys).to.exist; expect(pubKeys).to.have.length(2); expect(pubKeys[0].getKeyId().toHex()).to.equal('4a63613a4d6e4094'); @@ -2656,12 +2656,12 @@ module.exports = () => describe('Key', function() { }); it('Parsing armored key with an authorized revocation key in a User ID self-signature', async function() { - const pubKey = await openpgp.key.readArmored(key_with_authorized_revocation_key); + const pubKey = await openpgp.readArmoredKey(key_with_authorized_revocation_key); await expect(pubKey.getPrimaryUser()).to.be.rejectedWith('This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.'); }); it('Parsing armored key with an authorized revocation key in a direct-key signature', async function() { - const pubKey = await openpgp.key.readArmored(key_with_authorized_revocation_key_in_separate_sig); + const pubKey = await openpgp.readArmoredKey(key_with_authorized_revocation_key_in_separate_sig); const primaryUser = await pubKey.getPrimaryUser(); expect(primaryUser).to.exist; }); @@ -2682,7 +2682,7 @@ module.exports = () => describe('Key', function() { }); it('Testing key ID and fingerprint for V4 keys', async function() { - const pubKeysV4 = await openpgp.key.readAllArmored(twoKeys); + const pubKeysV4 = await openpgp.readArmoredKeys(twoKeys); expect(pubKeysV4).to.exist; expect(pubKeysV4).to.have.length(2); @@ -2694,14 +2694,14 @@ module.exports = () => describe('Key', function() { }); it('Create new key ID with fromId()', async function() { - const [pubKeyV4] = await openpgp.key.readAllArmored(twoKeys); + const [pubKeyV4] = await openpgp.readArmoredKeys(twoKeys); const keyId = pubKeyV4.getKeyId(); const newKeyId = keyId.constructor.fromId(keyId.toHex()); expect(newKeyId.toHex()).to.equal(keyId.toHex()); }); it('Testing key method getSubkeys', async function() { - const pubKey = await openpgp.key.readArmored(pub_sig_test); + const pubKey = await openpgp.readArmoredKey(pub_sig_test); expect(pubKey).to.exist; const packetlist = new openpgp.PacketList(); @@ -2716,12 +2716,12 @@ module.exports = () => describe('Key', function() { }); it('Verify status of revoked primary key', async function() { - const pubKey = await openpgp.key.readArmored(pub_revoked_subkeys); + const pubKey = await openpgp.readArmoredKey(pub_revoked_subkeys); await expect(pubKey.verifyPrimaryKey()).to.be.rejectedWith('Primary key is revoked'); }); it('Verify status of revoked subkey', async function() { - const pubKey = await openpgp.key.readArmored(pub_sig_test); + const pubKey = await openpgp.readArmoredKey(pub_sig_test); expect(pubKey).to.exist; expect(pubKey.subKeys).to.exist; expect(pubKey.subKeys).to.have.length(2); @@ -2732,13 +2732,13 @@ module.exports = () => describe('Key', function() { }); it('Verify status of key with non-self revocation signature', async function() { - const pubKey = await openpgp.key.readArmored(key_with_revoked_third_party_cert); + const pubKey = await openpgp.readArmoredKey(key_with_revoked_third_party_cert); const [selfCertification] = await pubKey.verifyPrimaryUser(); const publicSigningKey = await pubKey.getSigningKey(); expect(selfCertification.keyid.toHex()).to.equal(publicSigningKey.getKeyId().toHex()); expect(selfCertification.valid).to.be.true; - const certifyingKey = await openpgp.key.readArmored(certifying_key); + const certifyingKey = await openpgp.readArmoredKey(certifying_key); const certifyingSigningKey = await certifyingKey.getSigningKey(); const signatures = await pubKey.verifyPrimaryUser([certifyingKey]); expect(signatures.length).to.equal(2); @@ -2752,7 +2752,7 @@ module.exports = () => describe('Key', function() { }); it('Verify certificate of key with future creation date', async function() { - const pubKey = await openpgp.key.readArmored(key_created_2030); + const pubKey = await openpgp.readArmoredKey(key_created_2030); const user = pubKey.users[0]; await user.verifyCertificate(pubKey.primaryKey, user.selfCertifications[0], [pubKey], pubKey.primaryKey.created); const verifyAllResult = await user.verifyAllCertifications(pubKey.primaryKey, [pubKey], pubKey.primaryKey.created); @@ -2761,7 +2761,7 @@ module.exports = () => describe('Key', function() { }); it('Evaluate key flags to find valid encryption key packet', async function() { - const pubKey = await openpgp.key.readArmored(pub_sig_test); + const pubKey = await openpgp.readArmoredKey(pub_sig_test); // remove subkeys pubKey.subKeys = []; // primary key has only key flags for signing @@ -2770,17 +2770,17 @@ module.exports = () => describe('Key', function() { it('should not decrypt using a sign-only RSA key, unless explicitly configured', async function () { const allowSigningKeyDecryption = openpgp.config.allowInsecureDecryptionWithSigningKeys; - const key = await openpgp.key.readArmored(rsaSignOnly); + const key = await openpgp.readArmoredKey(rsaSignOnly); try { openpgp.config.allowInsecureDecryptionWithSigningKeys = false; await expect(openpgp.decrypt({ - message: await openpgp.message.readArmored(encryptedRsaSignOnly), + message: await openpgp.readArmoredMessage(encryptedRsaSignOnly), privateKeys: key })).to.be.rejectedWith(/Session key decryption failed/); openpgp.config.allowInsecureDecryptionWithSigningKeys = true; await expect(openpgp.decrypt({ - message: await openpgp.message.readArmored(encryptedRsaSignOnly), + message: await openpgp.readArmoredMessage(encryptedRsaSignOnly), privateKeys: key })).to.be.fulfilled; } finally { @@ -2789,33 +2789,33 @@ module.exports = () => describe('Key', function() { }); it('Method getExpirationTime V4 Key', async function() { - const [, pubKey] = await openpgp.key.readAllArmored(twoKeys); + const [, pubKey] = await openpgp.readArmoredKeys(twoKeys); expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.key.Key); + expect(pubKey).to.be.an.instanceof(openpgp.Key); const expirationTime = await pubKey.getExpirationTime(); expect(expirationTime.toISOString()).to.be.equal('2018-11-26T10:58:29.000Z'); }); it('Method getExpirationTime expired V4 Key', async function() { - const pubKey = await openpgp.key.readArmored(expiredKey); + const pubKey = await openpgp.readArmoredKey(expiredKey); expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.key.Key); + expect(pubKey).to.be.an.instanceof(openpgp.Key); const expirationTime = await pubKey.getExpirationTime(); expect(expirationTime.toISOString()).to.be.equal('1970-01-01T00:22:18.000Z'); }); it('Method getExpirationTime V4 SubKey', async function() { - const [, pubKey] = await openpgp.key.readAllArmored(twoKeys); + const [, pubKey] = await openpgp.readArmoredKeys(twoKeys); expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.key.Key); + expect(pubKey).to.be.an.instanceof(openpgp.Key); const expirationTime = await pubKey.subKeys[0].getExpirationTime(pubKey.primaryKey); expect(expirationTime.toISOString()).to.be.equal('2018-11-26T10:58:29.000Z'); }); it('Method getExpirationTime V4 Key with capabilities', async function() { - const pubKey = await openpgp.key.readArmored(priv_key_2000_2008); + const pubKey = await openpgp.readArmoredKey(priv_key_2000_2008); expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.key.Key); + expect(pubKey).to.be.an.instanceof(openpgp.Key); pubKey.users[0].selfCertifications[0].keyFlags = [1]; const expirationTime = await pubKey.getExpirationTime(); expect(expirationTime).to.equal(Infinity); @@ -2824,9 +2824,9 @@ module.exports = () => describe('Key', function() { }); it('Method getExpirationTime V4 Key with capabilities - capable primary key', async function() { - const pubKey = await openpgp.key.readArmored(priv_key_2000_2008); + const pubKey = await openpgp.readArmoredKey(priv_key_2000_2008); expect(pubKey).to.exist; - expect(pubKey).to.be.an.instanceof(openpgp.key.Key); + expect(pubKey).to.be.an.instanceof(openpgp.Key); const expirationTime = await pubKey.getExpirationTime(); expect(expirationTime).to.equal(Infinity); const encryptExpirationTime = await pubKey.getExpirationTime('encrypt_sign'); @@ -2834,12 +2834,12 @@ module.exports = () => describe('Key', function() { }); it("decrypt() - throw if key parameters don't correspond", async function() { - const key = await openpgp.key.readArmored(mismatchingKeyParams); + const key = await openpgp.readArmoredKey(mismatchingKeyParams); await expect(key.decrypt('userpass')).to.be.rejectedWith('Key is invalid'); }); it("decrypt(keyId) - throw if key parameters don't correspond", async function() { - const key = await openpgp.key.readArmored(mismatchingKeyParams); + const key = await openpgp.readArmoredKey(mismatchingKeyParams); const subKeyId = key.subKeys[0].getKeyId(); await expect(key.decrypt('userpass', subKeyId)).to.be.rejectedWith('Key is invalid'); }); @@ -2850,34 +2850,34 @@ module.exports = () => describe('Key', function() { }); it("validate() - throw if all-gnu-dummy key", async function() { - const key = await openpgp.key.readArmored(gnuDummyKey); + const key = await openpgp.readArmoredKey(gnuDummyKey); await expect(key.validate()).to.be.rejectedWith('Cannot validate an all-gnu-dummy key'); }); it("validate() - gnu-dummy primary key with signing subkey", async function() { - const key = await openpgp.key.readArmored(gnuDummyKeySigningSubkey); + const key = await openpgp.readArmoredKey(gnuDummyKeySigningSubkey); await expect(key.validate()).to.not.be.rejected; }); it("validate() - gnu-dummy primary key with encryption subkey", async function() { - const key = await openpgp.key.readArmored(dsaGnuDummyKeyWithElGamalSubkey); + const key = await openpgp.readArmoredKey(dsaGnuDummyKeyWithElGamalSubkey); await expect(key.validate()).to.not.be.rejected; }); it("validate() - curve ed25519 (eddsa) cannot be used for ecdsa", async function() { - const key = await openpgp.key.readArmored(eddsaKeyAsEcdsa); + const key = await openpgp.readArmoredKey(eddsaKeyAsEcdsa); await expect(key.validate()).to.be.rejectedWith('Key is invalid'); }); it('makeDummy() - the converted key can be parsed', async function() { - const { key: key } = await openpgp.generateKey({ userIds: 'dummy ' }); + const { key } = await openpgp.generateKey({ userIds: 'dummy ' }); key.primaryKey.makeDummy(); - const parsedKeys = await openpgp.key.readArmored(key.armor()); + const parsedKeys = await openpgp.readArmoredKey(key.armor()); expect(parsedKeys).to.not.be.empty; }); it('makeDummy() - the converted key can be encrypted and decrypted', async function() { - const { key: key } = await openpgp.generateKey({ userIds: 'dummy ' }); + const { key } = await openpgp.generateKey({ userIds: 'dummy ' }); const passphrase = 'passphrase'; key.primaryKey.makeDummy(); expect(key.isDecrypted()).to.be.true; @@ -2888,7 +2888,7 @@ module.exports = () => describe('Key', function() { }); it('makeDummy() - the converted key is valid but can no longer sign', async function() { - const key = await openpgp.key.readArmored(priv_key_rsa); + const key = await openpgp.readArmoredKey(priv_key_rsa); await key.decrypt('hello world'); expect(key.primaryKey.isDummy()).to.be.false; key.primaryKey.makeDummy(); @@ -2898,23 +2898,23 @@ module.exports = () => describe('Key', function() { }); it('makeDummy() - subkeys of the converted key can still sign', async function() { - const key = await openpgp.key.readArmored(priv_key_rsa); + const key = await openpgp.readArmoredKey(priv_key_rsa); await key.decrypt('hello world'); expect(key.primaryKey.isDummy()).to.be.false; key.primaryKey.makeDummy(); expect(key.primaryKey.isDummy()).to.be.true; - await expect(openpgp.sign({ message: openpgp.message.fromText('test'), privateKeys: [key] })).to.be.fulfilled; + await expect(openpgp.sign({ message: openpgp.Message.fromText('test'), privateKeys: [key] })).to.be.fulfilled; }); it('clearPrivateParams() - check that private key can no longer be used', async function() { - const key = await openpgp.key.readArmored(priv_key_rsa); + const key = await openpgp.readArmoredKey(priv_key_rsa); await key.decrypt('hello world'); await key.clearPrivateParams(); await expect(key.validate()).to.be.rejectedWith('Key is not decrypted'); }); it('clearPrivateParams() - detect that private key parameters were removed', async function() { - const key = await openpgp.key.readArmored(priv_key_rsa); + const key = await openpgp.readArmoredKey(priv_key_rsa); await key.decrypt('hello world'); const signingKeyPacket = key.subKeys[0].keyPacket; const privateParams = signingKeyPacket.privateParams; @@ -2927,7 +2927,7 @@ module.exports = () => describe('Key', function() { }); it('clearPrivateParams() - detect that private key parameters were zeroed out', async function() { - const key = await openpgp.key.readArmored(priv_key_rsa); + const key = await openpgp.readArmoredKey(priv_key_rsa); await key.decrypt('hello world'); const signingKeyPacket = key.subKeys[0].keyPacket; const privateParams = {}; @@ -2943,15 +2943,15 @@ module.exports = () => describe('Key', function() { }); it('update() - throw error if fingerprints not equal', async function() { - const keys = await openpgp.key.readAllArmored(twoKeys); + const keys = await openpgp.readArmoredKeys(twoKeys); await expect(keys[0].update.bind( keys[0], keys[1] )()).to.be.rejectedWith('Key update method: fingerprints of keys not equal'); }); it('update() - merge revocation signatures', async function() { - const source = await openpgp.key.readArmored(pub_revoked_subkeys); - const dest = await openpgp.key.readArmored(pub_revoked_subkeys); + const source = await openpgp.readArmoredKey(pub_revoked_subkeys); + const dest = await openpgp.readArmoredKey(pub_revoked_subkeys); expect(source.revocationSignatures).to.exist; dest.revocationSignatures = []; return dest.update(source).then(() => { @@ -2960,8 +2960,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge user', async function() { - const source = await openpgp.key.readArmored(pub_sig_test); - const dest = await openpgp.key.readArmored(pub_sig_test); + const source = await openpgp.readArmoredKey(pub_sig_test); + const dest = await openpgp.readArmoredKey(pub_sig_test); expect(source.users[1]).to.exist; dest.users.pop(); return dest.update(source).then(() => { @@ -2971,8 +2971,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge user - other and certification revocation signatures', async function() { - const source = await openpgp.key.readArmored(pub_sig_test); - const dest = await openpgp.key.readArmored(pub_sig_test); + const source = await openpgp.readArmoredKey(pub_sig_test); + const dest = await openpgp.readArmoredKey(pub_sig_test); expect(source.users[1].otherCertifications).to.exist; expect(source.users[1].revocationSignatures).to.exist; dest.users[1].otherCertifications = []; @@ -2986,8 +2986,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge subkey', async function() { - const source = await openpgp.key.readArmored(pub_sig_test); - const dest = await openpgp.key.readArmored(pub_sig_test); + const source = await openpgp.readArmoredKey(pub_sig_test); + const dest = await openpgp.readArmoredKey(pub_sig_test); expect(source.subKeys[1]).to.exist; dest.subKeys.pop(); return dest.update(source).then(() => { @@ -2999,8 +2999,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge subkey - revocation signature', async function() { - const source = await openpgp.key.readArmored(pub_sig_test); - const dest = await openpgp.key.readArmored(pub_sig_test); + const source = await openpgp.readArmoredKey(pub_sig_test); + const dest = await openpgp.readArmoredKey(pub_sig_test); expect(source.subKeys[0].revocationSignatures).to.exist; dest.subKeys[0].revocationSignatures = []; return dest.update(source).then(() => { @@ -3010,8 +3010,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge private key into public key', async function() { - const source = await openpgp.key.readArmored(priv_key_rsa); - const [dest] = await openpgp.key.readAllArmored(twoKeys); + const source = await openpgp.readArmoredKey(priv_key_rsa); + const [dest] = await openpgp.readArmoredKeys(twoKeys); expect(dest.isPublic()).to.be.true; return dest.update(source).then(() => { expect(dest.isPrivate()).to.be.true; @@ -3030,8 +3030,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge private key into public key - no subkeys', async function() { - const source = await openpgp.key.readArmored(priv_key_rsa); - const [dest] = await openpgp.key.readAllArmored(twoKeys); + const source = await openpgp.readArmoredKey(priv_key_rsa); + const [dest] = await openpgp.readArmoredKeys(twoKeys); source.subKeys = []; dest.subKeys = []; expect(dest.isPublic()).to.be.true; @@ -3049,8 +3049,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge private key into public key - mismatch throws error', async function() { - const source = await openpgp.key.readArmored(priv_key_rsa); - const [dest] = await openpgp.key.readAllArmored(twoKeys); + const source = await openpgp.readArmoredKey(priv_key_rsa); + const [dest] = await openpgp.readArmoredKeys(twoKeys); source.subKeys = []; expect(dest.subKeys).to.exist; expect(dest.isPublic()).to.be.true; @@ -3059,8 +3059,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge subkey binding signatures', async function() { - const source = await openpgp.key.readArmored(pgp_desktop_pub); - const dest = await openpgp.key.readArmored(pgp_desktop_priv); + const source = await openpgp.readArmoredKey(pgp_desktop_pub); + const dest = await openpgp.readArmoredKey(pgp_desktop_priv); expect(source.subKeys[0].bindingSignatures[0]).to.exist; await source.subKeys[0].verify(source.primaryKey); expect(dest.subKeys[0].bindingSignatures[0]).to.not.exist; @@ -3070,8 +3070,8 @@ module.exports = () => describe('Key', function() { }); it('update() - merge multiple subkey binding signatures', async function() { - const source = await openpgp.key.readArmored(multipleBindingSignatures); - const dest = await openpgp.key.readArmored(multipleBindingSignatures); + const source = await openpgp.readArmoredKey(multipleBindingSignatures); + const dest = await openpgp.readArmoredKey(multipleBindingSignatures); // remove last subkey binding signature of destination subkey dest.subKeys[0].bindingSignatures.length = 1; expect((await source.subKeys[0].getExpirationTime(source.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); @@ -3084,7 +3084,7 @@ module.exports = () => describe('Key', function() { }); it('revoke() - primary key', async function() { - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); await privKey.revoke({ @@ -3102,8 +3102,8 @@ module.exports = () => describe('Key', function() { }); it('revoke() - subkey', async function() { - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); const subKey = pubKey.subKeys[0]; @@ -3121,15 +3121,15 @@ module.exports = () => describe('Key', function() { }); it('applyRevocationCertificate() should produce the same revoked key as GnuPG', async function() { - const pubKey = await openpgp.key.readArmored(pub_key_arm4); + const pubKey = await openpgp.readArmoredKey(pub_key_arm4); return pubKey.applyRevocationCertificate(revocation_certificate_arm4).then(async revKey => { - expect(revKey.armor()).to.equal((await openpgp.key.readArmored(revoked_key_arm4)).armor()); + expect(revKey.armor()).to.equal((await openpgp.readArmoredKey(revoked_key_arm4)).armor()); }); }); it('getRevocationCertificate() should produce the same revocation certificate as GnuPG', async function() { - const revKey = await openpgp.key.readArmored(revoked_key_arm4); + const revKey = await openpgp.readArmoredKey(revoked_key_arm4); const revocationCertificate = await revKey.getRevocationCertificate(); const input = await openpgp.armor.decode(revocation_certificate_arm4); @@ -3141,7 +3141,7 @@ module.exports = () => describe('Key', function() { }); it('getRevocationCertificate() should have an appropriate comment', async function() { - const revKey = await openpgp.key.readArmored(revoked_key_arm4); + const revKey = await openpgp.readArmoredKey(revoked_key_arm4); const revocationCertificate = await revKey.getRevocationCertificate(); expect(revocationCertificate).to.match(/Comment: This is a revocation certificate/); @@ -3149,44 +3149,44 @@ module.exports = () => describe('Key', function() { }); it("getPreferredAlgo('symmetric') - one key - AES256", async function() { - const [key1] = await openpgp.key.readAllArmored(twoKeys); - const prefAlgo = await openpgp.key.getPreferredAlgo('symmetric', [key1]); + const [key1] = await openpgp.readArmoredKeys(twoKeys); + const prefAlgo = await openpgp.getPreferredAlgo('symmetric', [key1]); expect(prefAlgo).to.equal(openpgp.enums.symmetric.aes256); }); it("getPreferredAlgo('symmetric') - two key - AES192", async function() { - const keys = await openpgp.key.readAllArmored(twoKeys); + const keys = await openpgp.readArmoredKeys(twoKeys); const key1 = keys[0]; const key2 = keys[1]; const primaryUser = await key2.getPrimaryUser(); primaryUser.selfCertification.preferredSymmetricAlgorithms = [6,8,3]; - const prefAlgo = await openpgp.key.getPreferredAlgo('symmetric', [key1, key2]); + const prefAlgo = await openpgp.getPreferredAlgo('symmetric', [key1, key2]); expect(prefAlgo).to.equal(openpgp.enums.symmetric.aes192); }); it("getPreferredAlgo('symmetric') - two key - one without pref", async function() { - const keys = await openpgp.key.readAllArmored(twoKeys); + const keys = await openpgp.readArmoredKeys(twoKeys); const key1 = keys[0]; const key2 = keys[1]; const primaryUser = await key2.getPrimaryUser(); primaryUser.selfCertification.preferredSymmetricAlgorithms = null; - const prefAlgo = await openpgp.key.getPreferredAlgo('symmetric', [key1, key2]); + const prefAlgo = await openpgp.getPreferredAlgo('symmetric', [key1, key2]); expect(prefAlgo).to.equal(openpgp.enums.symmetric.aes128); }); it("getPreferredAlgo('aead') - one key - OCB", async function() { - const [key1] = await openpgp.key.readAllArmored(twoKeys); + const [key1] = await openpgp.readArmoredKeys(twoKeys); const primaryUser = await key1.getPrimaryUser(); primaryUser.selfCertification.features = [7]; // Monkey-patch AEAD feature flag primaryUser.selfCertification.preferredAeadAlgorithms = [2,1]; - const prefAlgo = await openpgp.key.getPreferredAlgo('aead', [key1]); + const prefAlgo = await openpgp.getPreferredAlgo('aead', [key1]); expect(prefAlgo).to.equal(openpgp.enums.aead.ocb); - const supported = await openpgp.key.isAeadSupported([key1]); + const supported = await openpgp.isAeadSupported([key1]); expect(supported).to.be.true; }); it("getPreferredAlgo('aead') - two key - one without pref", async function() { - const keys = await openpgp.key.readAllArmored(twoKeys); + const keys = await openpgp.readArmoredKeys(twoKeys); const key1 = keys[0]; const key2 = keys[1]; const primaryUser = await key1.getPrimaryUser(); @@ -3194,33 +3194,33 @@ module.exports = () => describe('Key', function() { primaryUser.selfCertification.preferredAeadAlgorithms = [2,1]; const primaryUser2 = await key2.getPrimaryUser(); primaryUser2.selfCertification.features = [7]; // Monkey-patch AEAD feature flag - const prefAlgo = await openpgp.key.getPreferredAlgo('aead', [key1, key2]); + const prefAlgo = await openpgp.getPreferredAlgo('aead', [key1, key2]); expect(prefAlgo).to.equal(openpgp.enums.aead.eax); - const supported = await openpgp.key.isAeadSupported([key1, key2]); + const supported = await openpgp.isAeadSupported([key1, key2]); expect(supported).to.be.true; }); it("getPreferredAlgo('aead') - two key - one with no support", async function() { - const keys = await openpgp.key.readAllArmored(twoKeys); + const keys = await openpgp.readArmoredKeys(twoKeys); const key1 = keys[0]; const key2 = keys[1]; const primaryUser = await key1.getPrimaryUser(); primaryUser.selfCertification.features = [7]; // Monkey-patch AEAD feature flag primaryUser.selfCertification.preferredAeadAlgorithms = [2,1]; - const prefAlgo = await openpgp.key.getPreferredAlgo('aead', [key1, key2]); + const prefAlgo = await openpgp.getPreferredAlgo('aead', [key1, key2]); expect(prefAlgo).to.equal(openpgp.enums.aead.eax); - const supported = await openpgp.key.isAeadSupported([key1, key2]); + const supported = await openpgp.isAeadSupported([key1, key2]); expect(supported).to.be.false; }); it('User attribute packet read & write', async function() { - const key = await openpgp.key.readArmored(user_attr_key); - const key2 = await openpgp.key.readArmored(key.armor()); + const key = await openpgp.readArmoredKey(user_attr_key); + const key2 = await openpgp.readArmoredKey(key.armor()); expect(key.users[1].userAttribute).eql(key2.users[1].userAttribute); }); it('getPrimaryUser()', async function() { - const key = await openpgp.key.readArmored(pub_sig_test); + const key = await openpgp.readArmoredKey(pub_sig_test); const primUser = await key.getPrimaryUser(); expect(primUser).to.exist; expect(primUser.user.userId.userid).to.equal('Signature Test '); @@ -3243,13 +3243,13 @@ Vz/bMCJoAShgybW1r6kRWejybzIjFSLnx/YA/iLZeo5UNdlXRJco+15RbFiNSAbw VYGdb3eNlV8CfoEC =FYbP -----END PGP PRIVATE KEY BLOCK-----`; - const key = await openpgp.key.readArmored(keyWithoutUserID); + const key = await openpgp.readArmoredKey(keyWithoutUserID); await expect(key.getPrimaryUser()).to.be.rejectedWith('Could not find valid self-signature in key 3ce893915c44212f'); }); it('Generate session key - latest created user', async function() { - const publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); // Set second user to prefer aes128. We should select this user by default, since it was created later. publicKey.users[1].selfCertifications[0].preferredSymmetricAlgorithms = [openpgp.enums.symmetric.aes128]; @@ -3258,8 +3258,8 @@ VYGdb3eNlV8CfoEC }); it('Generate session key - primary user', async function() { - const publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); // Set first user to primary. We should select this user by default. publicKey.users[0].selfCertifications[0].isPrimaryUserID = true; @@ -3270,8 +3270,8 @@ VYGdb3eNlV8CfoEC }); it('Generate session key - specific user', async function() { - const publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); // Set first user to primary. We won't select this user, this is to test that. publicKey.users[0].selfCertifications[0].isPrimaryUserID = true; @@ -3279,23 +3279,23 @@ VYGdb3eNlV8CfoEC publicKey.users[1].selfCertifications[0].preferredSymmetricAlgorithms = [openpgp.enums.symmetric.aes128]; const sessionKey = await openpgp.generateSessionKey({ publicKeys: publicKey, toUserIds: { name: 'Test User', email: 'b@c.com' } }); expect(sessionKey.algorithm).to.equal('aes128'); - await openpgp.encrypt({ message: openpgp.message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, toUserIds: { name: 'Test User', email: 'b@c.com' }, armor: false }); - await expect(openpgp.encrypt({ message: openpgp.message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, toUserIds: { name: 'Test User', email: 'c@c.com' }, armor: false })).to.be.rejectedWith('Could not find user that matches that user ID'); + await openpgp.encrypt({ message: openpgp.Message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, toUserIds: { name: 'Test User', email: 'b@c.com' }, armor: false }); + await expect(openpgp.encrypt({ message: openpgp.Message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, toUserIds: { name: 'Test User', email: 'c@c.com' }, armor: false })).to.be.rejectedWith('Could not find user that matches that user ID'); }); it('Fails to encrypt to User ID-less key', async function() { - const publicKey = await openpgp.key.readArmored(uidlessKey); + const publicKey = await openpgp.readArmoredKey(uidlessKey); expect(publicKey.users.length).to.equal(0); - const privateKey = await openpgp.key.readArmored(uidlessKey); + const privateKey = await openpgp.readArmoredKey(uidlessKey); await privateKey.decrypt('correct horse battery staple'); - await expect(openpgp.encrypt({ message: openpgp.message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, armor: false })).to.be.rejectedWith('Could not find primary user'); + await expect(openpgp.encrypt({ message: openpgp.Message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, armor: false })).to.be.rejectedWith('Could not find primary user'); }); it('Sign - specific user', async function() { - const publicKey = await openpgp.key.readArmored(multi_uid_key); - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const publicKey = await openpgp.readArmoredKey(multi_uid_key); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); - const privateKeyClone = await openpgp.key.readArmored(priv_key_rsa); + const privateKeyClone = await openpgp.readArmoredKey(priv_key_rsa); // Duplicate user privateKey.users.push(privateKeyClone.users[0]); // Set first user to primary. We won't select this user, this is to test that. @@ -3304,48 +3304,48 @@ VYGdb3eNlV8CfoEC privateKey.users[0].userId.parse('Test User '); // Set second user to prefer aes128. We will select this user. privateKey.users[1].selfCertifications[0].preferredHashAlgorithms = [openpgp.enums.hash.sha512]; - const signed = await openpgp.sign({ message: openpgp.message.fromText('hello'), privateKeys: privateKey, fromUserIds: { name: 'Test McTestington', email: 'test@example.com' }, armor: false }); - const signature = await openpgp.message.read(signed); + const signed = await openpgp.sign({ message: openpgp.Message.fromText('hello'), privateKeys: privateKey, fromUserIds: { name: 'Test McTestington', email: 'test@example.com' }, armor: false }); + const signature = await openpgp.readMessage(signed); expect(signature.packets[0].hashAlgorithm).to.equal(openpgp.enums.hash.sha512); - const encrypted = await openpgp.encrypt({ message: openpgp.message.fromText('hello'), passwords: 'test', privateKeys: privateKey, fromUserIds: { name: 'Test McTestington', email: 'test@example.com' }, armor: false }); - const { signatures } = await openpgp.decrypt({ message: await openpgp.message.read(encrypted), passwords: 'test' }); + const encrypted = await openpgp.encrypt({ message: openpgp.Message.fromText('hello'), passwords: 'test', privateKeys: privateKey, fromUserIds: { name: 'Test McTestington', email: 'test@example.com' }, armor: false }); + const { signatures } = await openpgp.decrypt({ message: await openpgp.readMessage(encrypted), passwords: 'test' }); expect(signatures[0].signature.packets[0].hashAlgorithm).to.equal(openpgp.enums.hash.sha512); - await expect(openpgp.encrypt({ message: openpgp.message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, fromUserIds: { name: 'Not Test McTestington', email: 'test@example.com' }, armor: false })).to.be.rejectedWith('Could not find user that matches that user ID'); + await expect(openpgp.encrypt({ message: openpgp.Message.fromText('hello'), publicKeys: publicKey, privateKeys: privateKey, fromUserIds: { name: 'Not Test McTestington', email: 'test@example.com' }, armor: false })).to.be.rejectedWith('Could not find user that matches that user ID'); }); it('Find a valid subkey binding signature among many invalid ones', async function() { - const key = await openpgp.key.readArmored(valid_binding_sig_among_many_expired_sigs_pub); + const key = await openpgp.readArmoredKey(valid_binding_sig_among_many_expired_sigs_pub); expect(await key.getEncryptionKey()).to.not.be.null; }); it('Selects the most recent subkey binding signature', async function() { - const key = await openpgp.key.readArmored(multipleBindingSignatures); + const key = await openpgp.readArmoredKey(multipleBindingSignatures); expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2015-10-18T07:41:30.000Z'); }); it('Selects the most recent non-expired subkey binding signature', async function() { - const key = await openpgp.key.readArmored(multipleBindingSignatures); + const key = await openpgp.readArmoredKey(multipleBindingSignatures); key.subKeys[0].bindingSignatures[1].signatureNeverExpires = false; key.subKeys[0].bindingSignatures[1].signatureExpirationTime = 0; expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); }); it('Selects the most recent valid subkey binding signature', async function() { - const key = await openpgp.key.readArmored(multipleBindingSignatures); + const key = await openpgp.readArmoredKey(multipleBindingSignatures); key.subKeys[0].bindingSignatures[1].signatureData[0]++; expect((await key.subKeys[0].getExpirationTime(key.primaryKey)).toISOString()).to.equal('2018-09-07T06:03:37.000Z'); }); it('Handles a key with no valid subkey binding signatures gracefully', async function() { - const key = await openpgp.key.readArmored(multipleBindingSignatures); + const key = await openpgp.readArmoredKey(multipleBindingSignatures); key.subKeys[0].bindingSignatures[0].signatureData[0]++; key.subKeys[0].bindingSignatures[1].signatureData[0]++; expect(await key.subKeys[0].getExpirationTime(key.primaryKey)).to.be.null; }); it('Reject encryption with revoked primary user', async function() { - const key = await openpgp.key.readArmored(pub_revoked_subkeys); - return openpgp.encrypt({ publicKeys: [key], message: openpgp.message.fromText('random data') }).then(() => { + const key = await openpgp.readArmoredKey(pub_revoked_subkeys); + return openpgp.encrypt({ publicKeys: [key], message: openpgp.Message.fromText('random data') }).then(() => { throw new Error('encryptSessionKey should not encrypt with revoked public key'); }).catch(function(error) { expect(error.message).to.equal('Error encrypting message: Primary user is revoked'); @@ -3353,10 +3353,10 @@ VYGdb3eNlV8CfoEC }); it('Reject encryption with revoked subkey', async function() { - const key = await openpgp.key.readArmored(pub_revoked_subkeys); + const key = await openpgp.readArmoredKey(pub_revoked_subkeys); key.revocationSignatures = []; key.users[0].revocationSignatures = []; - return openpgp.encrypt({ publicKeys: [key], message: openpgp.message.fromText('random data'), date: new Date(1386842743000) }).then(() => { + return openpgp.encrypt({ publicKeys: [key], message: openpgp.Message.fromText('random data'), date: new Date(1386842743000) }).then(() => { throw new Error('encryptSessionKey should not encrypt with revoked public key'); }).catch(function(error) { expect(error.message).to.equal('Error encrypting message: Could not find valid encryption key packet in key ' + key.getKeyId().toHex() + ': Subkey is revoked'); @@ -3364,8 +3364,8 @@ VYGdb3eNlV8CfoEC }); it('Reject encryption with key revoked with appended revocation cert', async function() { - const key = await openpgp.key.readArmored(pub_revoked_with_cert); - return openpgp.encrypt({ publicKeys: [key], message: openpgp.message.fromText('random data') }).then(() => { + const key = await openpgp.readArmoredKey(pub_revoked_with_cert); + return openpgp.encrypt({ publicKeys: [key], message: openpgp.Message.fromText('random data') }).then(() => { throw new Error('encryptSessionKey should not encrypt with revoked public key'); }).catch(function(error) { expect(error.message).to.equal('Error encrypting message: Primary key is revoked'); @@ -3373,8 +3373,8 @@ VYGdb3eNlV8CfoEC }); it('Merge key with another key with non-ID user attributes', async function() { - const key = await openpgp.key.readArmored(mergeKey1); - const updateKey = await openpgp.key.readArmored(mergeKey2); + const key = await openpgp.readArmoredKey(mergeKey1); + const updateKey = await openpgp.readArmoredKey(mergeKey2); expect(key).to.exist; expect(updateKey).to.exist; expect(key.users).to.have.length(1); @@ -3389,7 +3389,7 @@ VYGdb3eNlV8CfoEC it("Should throw when trying to encrypt a key that's already encrypted", async function() { await expect((async function() { const { privateKeyArmored } = await openpgp.generateKey({ userIds: [{ email: 'hello@user.com' }], passphrase: 'pass' }); - const k = await openpgp.key.readArmored(privateKeyArmored); + const k = await openpgp.readArmoredKey(privateKeyArmored); await k.decrypt('pass'); await k.encrypt('pass'); await k.encrypt('pass'); @@ -3404,12 +3404,12 @@ VYGdb3eNlV8CfoEC rsaOpt = { rsaBits: rsaBits }; } it('create and add a new rsa subkey to stored rsa key', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const total = privateKey.subKeys.length; let newPrivateKey = await privateKey.addSubkey(rsaOpt); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; expect(subKey).to.exist; expect(newPrivateKey.subKeys.length).to.be.equal(total + 1); @@ -3422,21 +3422,21 @@ VYGdb3eNlV8CfoEC }); it('should throw when trying to encrypt a subkey separately from key', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const opt = { rsaBits: rsaBits, passphrase: 'subkey passphrase' }; await expect(privateKey.addSubkey(opt)).to.be.rejectedWith('Subkey could not be encrypted here, please encrypt whole key'); }); it('encrypt and decrypt key with added subkey', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const total = privateKey.subKeys.length; let newPrivateKey = await privateKey.addSubkey(rsaOpt); - newPrivateKey = await openpgp.key.readArmored(newPrivateKey.armor()); + newPrivateKey = await openpgp.readArmoredKey(newPrivateKey.armor()); await newPrivateKey.encrypt('12345678'); const armoredKey = newPrivateKey.armor(); - const importedPrivateKey = await openpgp.key.readArmored(armoredKey); + const importedPrivateKey = await openpgp.readArmoredKey(armoredKey); await importedPrivateKey.decrypt('12345678'); const subKey = importedPrivateKey.subKeys[total]; expect(subKey).to.exist; @@ -3454,7 +3454,7 @@ VYGdb3eNlV8CfoEC const subKey1 = newPrivateKey.subKeys[total]; await newPrivateKey.encrypt('12345678'); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); await newPrivateKey.decrypt('12345678'); const subKey = newPrivateKey.subKeys[total]; expect(subKey.isDecrypted()).to.be.true; @@ -3469,13 +3469,13 @@ VYGdb3eNlV8CfoEC }); it('create and add a new ec subkey to a rsa key', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const total = privateKey.subKeys.length; const opt2 = { curve: 'curve25519' }; let newPrivateKey = await privateKey.addSubkey(opt2); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; expect(subKey).to.exist; expect(newPrivateKey.subKeys.length).to.be.equal(total + 1); @@ -3492,7 +3492,7 @@ VYGdb3eNlV8CfoEC const opt2 = { sign: true }; let newPrivateKey = await privateKey.addSubkey(opt2); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; const subkeyOid = subKey.keyPacket.publicParams.oid; const pkOid = newPrivateKey.primaryKey.publicParams.oid; @@ -3500,8 +3500,8 @@ VYGdb3eNlV8CfoEC expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa'); await subKey.verify(newPrivateKey.primaryKey); expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey); - const signed = await openpgp.sign({ message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false }); - const message = await openpgp.message.read(signed); + const signed = await openpgp.sign({ message: openpgp.Message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false }); + const message = await openpgp.readMessage(signed); const { signatures } = await openpgp.verify({ message, publicKeys: [newPrivateKey.toPublic()] }); expect(signatures).to.exist; expect(signatures.length).to.be.equal(1); @@ -3517,14 +3517,14 @@ VYGdb3eNlV8CfoEC const total = privateKey.subKeys.length; let newPrivateKey = await privateKey.addSubkey(); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; const publicKey = newPrivateKey.toPublic(); await subKey.verify(newPrivateKey.primaryKey); expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey); - const encrypted = await openpgp.encrypt({ message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false }); + const encrypted = await openpgp.encrypt({ message: openpgp.Message.fromText(vData), publicKeys: publicKey, armor:false }); expect(encrypted).to.be.exist; - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey); expect(pkSessionKeys).to.exist; expect(pkSessionKeys.length).to.be.equal(1); @@ -3535,19 +3535,19 @@ VYGdb3eNlV8CfoEC }); it('sign/verify data with the new subkey correctly using rsa', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const total = privateKey.subKeys.length; const opt2 = { sign: true, rsaBits: rsaBits }; let newPrivateKey = await privateKey.addSubkey(opt2); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign'); await subKey.verify(newPrivateKey.primaryKey); expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey); - const signed = await openpgp.sign({ message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false }); - const message = await openpgp.message.read(signed); + const signed = await openpgp.sign({ message: openpgp.Message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false }); + const message = await openpgp.readMessage(signed); const { signatures } = await openpgp.verify({ message, publicKeys: [newPrivateKey.toPublic()] }); expect(signatures).to.exist; expect(signatures.length).to.be.equal(1); @@ -3556,19 +3556,19 @@ VYGdb3eNlV8CfoEC }); it('encrypt/decrypt data with the new subkey correctly using rsa', async function() { - const privateKey = await openpgp.key.readArmored(priv_key_rsa); + const privateKey = await openpgp.readArmoredKey(priv_key_rsa); await privateKey.decrypt('hello world'); const total = privateKey.subKeys.length; let newPrivateKey = await privateKey.addSubkey(rsaOpt); const armoredKey = newPrivateKey.armor(); - newPrivateKey = await openpgp.key.readArmored(armoredKey); + newPrivateKey = await openpgp.readArmoredKey(armoredKey); const subKey = newPrivateKey.subKeys[total]; const publicKey = newPrivateKey.toPublic(); const vData = 'the data to encrypted!'; expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey); - const encrypted = await openpgp.encrypt({ message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false }); + const encrypted = await openpgp.encrypt({ message: openpgp.Message.fromText(vData), publicKeys: publicKey, armor:false }); expect(encrypted).to.be.exist; - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey); expect(pkSessionKeys).to.exist; expect(pkSessionKeys.length).to.be.equal(1); diff --git a/test/general/keyring.js b/test/general/keyring.js index 2842ea78..0de1e10c 100644 --- a/test/general/keyring.js +++ b/test/general/keyring.js @@ -135,7 +135,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.getForId() - valid id', function() { const key = keyring.publicKeys.getForId(keyId); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId); }); @@ -146,7 +146,7 @@ module.exports = () => describe("Keyring", async function() { it('privateKeys.getForId() - valid id', function() { const key = keyring.privateKeys.getForId(keyId); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId); }); @@ -157,7 +157,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.getForId() - deep, including subkeys - subkey id', function() { const key = keyring.publicKeys.getForId(subkeyId2, true); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId2); }); @@ -179,7 +179,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.getForId() - valid fingerprint', function() { const key = keyring.publicKeys.getForId(keyFingerP2); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId2); }); @@ -190,7 +190,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.getForId() - deep, including subkeys - subkey fingerprint', function() { const key = keyring.publicKeys.getForId(subkeyFingerP2, true); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId2); }); @@ -250,7 +250,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.removeForId() - valid id', function() { const key = keyring.publicKeys.removeForId(keyId); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId); expect(keyring.publicKeys.keys).to.exist.and.have.length(1); }); @@ -263,7 +263,7 @@ module.exports = () => describe("Keyring", async function() { it('publicKeys.removeForId() - valid fingerprint', function() { const key = keyring.publicKeys.removeForId(keyFingerP2); - expect(key).to.exist.and.be.an.instanceof(openpgp.key.Key); + expect(key).to.exist.and.be.an.instanceof(openpgp.Key); expect(key.getKeyId().toHex()).equals(keyId2); expect(keyring.publicKeys.keys).to.be.empty; }); @@ -273,14 +273,14 @@ module.exports = () => describe("Keyring", async function() { const localstore2 = new openpgp.Keyring.localstore('my-custom-prefix-'); const localstore3 = new openpgp.Keyring.localstore(); await localstore3.storePublic([]); - const key = await openpgp.key.readArmored(pubkey); + const key = await openpgp.readArmoredKey(pubkey); await localstore1.storePublic([key]); expect((await localstore2.loadPublic())[0].getKeyId().equals(key.getKeyId())).to.be.true; expect(await localstore3.loadPublic()).to.have.length(0); }); it('emptying keyring and storing removes keys', async function() { - const key = await openpgp.key.readArmored(pubkey); + const key = await openpgp.readArmoredKey(pubkey); const localstore = new openpgp.Keyring.localstore('remove-prefix-'); diff --git a/test/general/openpgp.js b/test/general/openpgp.js index 826cb03c..f7f4e942 100644 --- a/test/general/openpgp.js +++ b/test/general/openpgp.js @@ -741,16 +741,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { let privateKeyMismatchingParams; beforeEach(async function() { - publicKey = await openpgp.key.readArmored(pub_key); - publicKeyNoAEAD = await openpgp.key.readArmored(pub_key); - privateKey = await openpgp.key.readArmored(priv_key); - privateKey_2000_2008 = await openpgp.key.readArmored(priv_key_2000_2008); + publicKey = await openpgp.readArmoredKey(pub_key); + publicKeyNoAEAD = await openpgp.readArmoredKey(pub_key); + privateKey = await openpgp.readArmoredKey(priv_key); + privateKey_2000_2008 = await openpgp.readArmoredKey(priv_key_2000_2008); publicKey_2000_2008 = privateKey_2000_2008.toPublic(); - privateKey_2038_2045 = await openpgp.key.readArmored(priv_key_2038_2045); + privateKey_2038_2045 = await openpgp.readArmoredKey(priv_key_2038_2045); publicKey_2038_2045 = privateKey_2038_2045.toPublic(); - privateKey_1337 = await openpgp.key.readArmored(priv_key_expires_1337); + privateKey_1337 = await openpgp.readArmoredKey(priv_key_expires_1337); publicKey_1337 = privateKey_1337.toPublic(); - privateKeyMismatchingParams = await openpgp.key.readArmored(mismatchingKeyParams); + privateKeyMismatchingParams = await openpgp.readArmoredKey(mismatchingKeyParams); useNativeVal = openpgp.config.useNative; aeadProtectVal = openpgp.config.aeadProtect; @@ -771,7 +771,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { openpgp.config.showVersion = false; openpgp.config.commentString = 'different'; - return openpgp.encrypt({ publicKeys:publicKey, message:openpgp.message.fromText(plaintext) }).then(function(encrypted) { + return openpgp.encrypt({ publicKeys:publicKey, message:openpgp.Message.fromText(plaintext) }).then(function(encrypted) { expect(encrypted).to.exist; expect(encrypted).not.to.match(/^Version:/); expect(encrypted).to.match(/Comment: different/); @@ -825,14 +825,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('Calling decrypt with not decrypted key leads to exception', async function() { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }; const decOpt = { privateKeys: privateKey }; const encrypted = await openpgp.encrypt(encOpt); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); await expect(openpgp.decrypt(decOpt)).to.be.rejectedWith('Error decrypting message: Private key is not decrypted.'); }); @@ -903,7 +903,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey, armor: false }).then(async function(encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return openpgp.decryptSessionKeys({ message, privateKeys: privateKey @@ -920,7 +920,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { passwords: password1, armor: false }).then(async function(encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return openpgp.decryptSessionKeys({ message, passwords: password1 @@ -937,8 +937,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey, armor: false }).then(async function(encrypted) { - const message = await openpgp.message.read(encrypted); - const invalidPrivateKey = await openpgp.key.readArmored(priv_key); + const message = await openpgp.readMessage(encrypted); + const invalidPrivateKey = await openpgp.readArmoredKey(priv_key); invalidPrivateKey.subKeys[0].bindingSignatures = []; return openpgp.decryptSessionKeys({ message, @@ -953,15 +953,15 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('roundtrip workflow: encrypt, decryptSessionKeys, decrypt with pgp key pair', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }); const decryptedSessionKeys = await openpgp.decryptSessionKeys({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), privateKeys: privateKey }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: decryptedSessionKeys[0] }); expect(decrypted.data).to.equal(plaintext); @@ -970,15 +970,15 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('roundtrip workflow: encrypt, decryptSessionKeys, decrypt with pgp key pair -- trailing spaces', async function () { const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }); const decryptedSessionKeys = await openpgp.decryptSessionKeys({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), privateKeys: privateKey }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: decryptedSessionKeys[0] }); expect(decrypted.data).to.equal(plaintext); @@ -986,15 +986,15 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('roundtrip workflow: encrypt, decryptSessionKeys, decrypt with password', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: password1 }); const decryptedSessionKeys = await openpgp.decryptSessionKeys({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), passwords: password1 }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: decryptedSessionKeys[0] }); expect(decrypted.data).to.equal(plaintext); @@ -1002,15 +1002,15 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('roundtrip workflow: encrypt with multiple passwords, decryptSessionKeys, decrypt with multiple passwords', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: [password1, password2] }); const decryptedSessionKeys = await openpgp.decryptSessionKeys({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), passwords: [password1, password2] }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: decryptedSessionKeys[0] }); expect(decrypted.data).to.equal(plaintext); @@ -1018,16 +1018,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('roundtrip workflow: encrypt twice with one password, decryptSessionKeys, only one session key', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: [password1, password1] }); const decryptedSessionKeys = await openpgp.decryptSessionKeys({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), passwords: password1 }); expect(decryptedSessionKeys.length).to.equal(1); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: decryptedSessionKeys[0] }); expect(decrypted.data).to.equal(plaintext); @@ -1058,7 +1058,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt then decrypt', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }; const decOpt = { @@ -1066,7 +1066,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1076,11 +1076,11 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should encrypt then decrypt with multiple private keys', async function () { - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }; const decOpt = { @@ -1088,7 +1088,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1099,7 +1099,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt then decrypt with wildcard', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, wildcard: true }; @@ -1108,7 +1108,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1118,11 +1118,11 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should encrypt then decrypt with wildcard with multiple private keys', async function () { - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, wildcard: true }; @@ -1131,7 +1131,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1145,12 +1145,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), sessionKey }); expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), sessionKeys: sessionKey }); expect(decrypted.data).to.equal(plaintext); @@ -1164,7 +1164,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { algorithm: 'aes256' }; const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), sessionKey: sessionKey, publicKeys: publicKey }; @@ -1173,7 +1173,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(false); return openpgp.decrypt(decOpt); }).then(function (decrypted) { @@ -1187,7 +1187,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { algorithm: 'aes128' }; const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), sessionKey: sessionKey, publicKeys: publicKey }; @@ -1196,7 +1196,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/); - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(false); return openpgp.decrypt(decOpt); }).then(function (decrypted) { @@ -1206,7 +1206,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt/sign and decrypt/verify', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, privateKeys: privateKey }; @@ -1215,7 +1215,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(openpgp.config.aeadProtect); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { @@ -1229,7 +1229,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt/sign and decrypt/verify (no AEAD support)', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKeyNoAEAD, privateKeys: privateKey }; @@ -1238,7 +1238,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKeyNoAEAD }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(false); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { @@ -1256,11 +1256,11 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.generateKey(genOpt).then(async function(newKey) { - const newPublicKey = await openpgp.key.readArmored(newKey.publicKeyArmored); - const newPrivateKey = await openpgp.key.readArmored(newKey.privateKeyArmored); + const newPublicKey = await openpgp.readArmoredKey(newKey.publicKeyArmored); + const newPrivateKey = await openpgp.readArmoredKey(newKey.privateKeyArmored); const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: newPublicKey, privateKeys: newPrivateKey }; @@ -1269,7 +1269,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: newPublicKey }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(openpgp.config.aeadProtect); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { @@ -1286,23 +1286,23 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const newKey = await openpgp.generateKey({ userIds: [{ name: 'Test User', email: 'text@example.com' }], }); - const newPublicKey = await openpgp.key.readArmored(newKey.publicKeyArmored); - const newPrivateKey = await openpgp.key.readArmored(newKey.privateKeyArmored); + const newPublicKey = await openpgp.readArmoredKey(newKey.publicKeyArmored); + const newPrivateKey = await openpgp.readArmoredKey(newKey.privateKeyArmored); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: newPublicKey }); const signed = await openpgp.sign({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), privateKeys: newPrivateKey, detached: true }); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); expect(!!message.packets.findPacket(openpgp.enums.packet.AEADEncryptedData)).to.equal(openpgp.config.aeadProtect); const decrypted = await openpgp.decrypt({ message, - signature: await openpgp.signature.readArmored(signed), + signature: await openpgp.readArmoredSignature(signed), privateKeys: newPrivateKey, publicKeys: newPublicKey }); @@ -1315,7 +1315,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt/sign and decrypt/verify with null string input', function () { const encOpt = { - message: openpgp.message.fromText(''), + message: openpgp.Message.fromText(''), publicKeys: publicKey, privateKeys: privateKey }; @@ -1324,7 +1324,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { expect(decrypted.data).to.equal(''); @@ -1337,17 +1337,17 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt/sign and decrypt/verify with detached signatures', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }); const signed = await openpgp.sign({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), privateKeys: privateKey, detached: true }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), - signature: await openpgp.signature.readArmored(signed), + message: await openpgp.readArmoredMessage(encrypted), + signature: await openpgp.readArmoredSignature(signed), privateKeys: privateKey, publicKeys: publicKey }); @@ -1361,19 +1361,19 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt/verify with detached signature as input for encryption', async function () { const plaintext = "  \t┍ͤ޵၂༫዇◧˘˻ᙑ᎚⏴ំந⛑nٓኵΉⅶ⋋ŵ⋲΂ͽᣏ₅ᄶɼ┋⌔û᬴Ƚᔡᧅ≃ṱἆ⃷݂૿ӌ᰹෇ٹჵ⛇໶⛌  \t\n한국어/조선말"; - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); const signOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), privateKeys: privKeyDE, detached: true }; const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, privateKeys: privateKey }; @@ -1384,10 +1384,10 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.sign(signOpt).then(async function (signed) { - encOpt.signature = await openpgp.signature.readArmored(signed); + encOpt.signature = await openpgp.readArmoredSignature(signed); return openpgp.encrypt(encOpt); }).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { let signingKey; @@ -1405,26 +1405,26 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to encrypt and decrypt/verify with detached signature as input for encryption with wrong public key', async function () { const signOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), privateKeys: privateKey, detached: true }; const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }; const decOpt = { privateKeys: privateKey, - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }; return openpgp.sign(signOpt).then(async function (signed) { - encOpt.signature = await openpgp.signature.readArmored(signed); + encOpt.signature = await openpgp.readArmoredSignature(signed); return openpgp.encrypt(encOpt); }).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1437,16 +1437,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to verify decrypted data with wrong public pgp key', async function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, privateKeys: privateKey }; const decOpt = { privateKeys: privateKey, - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1459,16 +1459,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to verify decrypted null string with wrong public pgp key', async function () { const encOpt = { - message: openpgp.message.fromText(''), + message: openpgp.Message.fromText(''), publicKeys: publicKey, privateKeys: privateKey }; const decOpt = { privateKeys: privateKey, - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { expect(decrypted.data).to.equal(''); @@ -1481,7 +1481,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should successfully decrypt signed message without public keys to verify', async function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, privateKeys: privateKey }; @@ -1489,7 +1489,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKeys: privateKey }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1502,19 +1502,19 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to verify decrypted data with wrong public pgp key with detached signatures', async function () { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey }); const signed = await openpgp.sign({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), privateKeys: privateKey, detached: true }); const decrypted = await openpgp.decrypt({ - message: await openpgp.message.readArmored(encrypted), - signature: await openpgp.signature.readArmored(signed), + message: await openpgp.readArmoredMessage(encrypted), + signature: await openpgp.readArmoredSignature(signed), privateKeys: privateKey, - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }); expect(decrypted.data).to.equal(plaintext); expect(decrypted.signatures[0].valid).to.be.null; @@ -1524,13 +1524,13 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should encrypt and decrypt/verify both signatures when signed with two private keys', async function () { - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: publicKey, privateKeys: [privateKey, privKeyDE] }; @@ -1541,7 +1541,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(async function (decrypted) { let signingKey; @@ -1559,8 +1559,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to decrypt modified message', async function() { const { privateKeyArmored } = await openpgp.generateKey({ curve: 'curve25519', userIds: [{ email: 'test@email.com' }] }); - const key = await openpgp.key.readArmored(privateKeyArmored); - const data = await openpgp.encrypt({ message: openpgp.message.fromBinary(new Uint8Array(500)), publicKeys: [key.toPublic()] }); + const key = await openpgp.readArmoredKey(privateKeyArmored); + const data = await openpgp.encrypt({ message: openpgp.Message.fromBinary(new Uint8Array(500)), publicKeys: [key.toPublic()] }); let badSumEncrypted = data.replace(/\n=[a-zA-Z0-9/+]{4}/, '\n=aaaa'); if (badSumEncrypted === data) { // checksum was already =aaaa badSumEncrypted = data.replace(/\n=[a-zA-Z0-9/+]{4}/, '\n=bbbb'); @@ -1591,7 +1591,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { ].map(async (encrypted, j) => { let stepReached = 0; try { - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); stepReached = 1; const { data: decrypted } = await openpgp.decrypt({ message: message, privateKeys: [key] }); stepReached = 2; @@ -1613,10 +1613,10 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should fail to decrypt unarmored message with garbage data appended', async function() { const { key } = await openpgp.generateKey({ userIds: {} }); - const message = await openpgp.encrypt({ message: openpgp.message.fromText('test'), publicKeys: key, privateKeys: key, armor: false }); + const message = await openpgp.encrypt({ message: openpgp.Message.fromText('test'), publicKeys: key, privateKeys: key, armor: false }); const encrypted = openpgp.util.concat([message, new Uint8Array([11])]); await expect( - openpgp.decrypt({ message: await openpgp.message.read(encrypted), privateKeys: key, publicKeys: key }) + openpgp.decrypt({ message: await openpgp.readMessage(encrypted), privateKeys: key, publicKeys: key }) ).to.be.rejectedWith('Error during parsing. This message / key probably does not conform to a valid OpenPGP format.'); }); }); @@ -1624,19 +1624,19 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { describe('ELG / DSA encrypt, decrypt, sign, verify', function() { it('round trip test', async function () { - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); pubKeyDE.users[0].selfCertifications[0].features = [7]; // Monkey-patch AEAD feature flag return openpgp.encrypt({ publicKeys: pubKeyDE, privateKeys: privKeyDE, - message: openpgp.message.fromText(plaintext) + message: openpgp.Message.fromText(plaintext) }).then(async function (encrypted) { return openpgp.decrypt({ privateKeys: privKeyDE, publicKeys: pubKeyDE, - message: await openpgp.message.readArmored(encrypted) + message: await openpgp.readArmoredMessage(encrypted) }); }).then(async function (decrypted) { expect(decrypted.data).to.exist; @@ -1702,9 +1702,9 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { '-----END PGP PRIVATE KEY BLOCK-----'].join('\n'); it('Decrypt message', async function() { - const privKey = await openpgp.key.readArmored(priv_key); + const privKey = await openpgp.readArmoredKey(priv_key); await privKey.decrypt('1234'); - const message = await openpgp.message.readArmored(pgp_msg); + const message = await openpgp.readArmoredMessage(pgp_msg); return openpgp.decrypt({ privateKeys:privKey, message:message }).then(function(decrypted) { expect(decrypted.data).to.equal('hello 3des\n'); @@ -1717,14 +1717,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt with one password', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: password1 }; const decOpt = { passwords: password1 }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1734,14 +1734,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt with two passwords', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: [password1, password2] }; const decOpt = { passwords: password2 }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1751,7 +1751,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt with password and not ascii armor', function () { const encOpt = { - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: password1, armor: false }; @@ -1759,7 +1759,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { passwords: password1 }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.read(encrypted); + decOpt.message = await openpgp.readMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1769,7 +1769,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt with binary data', function () { const encOpt = { - message: openpgp.message.fromBinary(new Uint8Array([0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01])), + message: openpgp.Message.fromBinary(new Uint8Array([0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01])), passwords: password1, armor: false }; @@ -1778,7 +1778,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { format: 'binary' }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.read(encrypted); + decOpt.message = await openpgp.readMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.deep.equal(new Uint8Array([0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01])); @@ -1791,14 +1791,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { withCompression(function (modifyCompressionEncryptOptions, verifyCompressionDecrypted) { it('should encrypt and decrypt with one password', function () { const encOpt = modifyCompressionEncryptOptions({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), passwords: password1 }); const decOpt = { passwords: password1 }; return openpgp.encrypt(encOpt).then(async function (encrypted) { - decOpt.message = await openpgp.message.readArmored(encrypted); + decOpt.message = await openpgp.readArmoredMessage(encrypted); return openpgp.decrypt(decOpt); }).then(function (decrypted) { expect(decrypted.data).to.equal(plaintext); @@ -1824,12 +1824,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { } }); const encrypted = await openpgp.encrypt(modifyCompressionEncryptOptions({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'] })); expect(openpgp.util.isStream(encrypted)).to.equal(useNativeStream ? 'web' : 'ponyfill'); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -1866,7 +1866,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and verify cleartext message', function () { - const message = openpgp.cleartext.fromText(plaintext); + const message = openpgp.CleartextMessage.fromText(plaintext); const signOpt = { message, privateKeys: privateKey @@ -1876,7 +1876,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.sign(signOpt).then(async function (signed) { expect(signed).to.match(/-----BEGIN PGP SIGNED MESSAGE-----/); - verifyOpt.message = await openpgp.cleartext.readArmored(signed); + verifyOpt.message = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext.replace(/[ \t]+$/mg, '')); @@ -1888,10 +1888,10 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and verify cleartext message with multiple private keys', async function () { - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); - const message = openpgp.cleartext.fromText(plaintext); + const message = openpgp.CleartextMessage.fromText(plaintext); const signOpt = { message, privateKeys: [privateKey, privKeyDE] @@ -1901,7 +1901,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.sign(signOpt).then(async function (signed) { expect(signed).to.match(/-----BEGIN PGP SIGNED MESSAGE-----/); - verifyOpt.message = await openpgp.cleartext.readArmored(signed); + verifyOpt.message = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { let signingKey; @@ -1918,7 +1918,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and verify data with detached signatures', function () { - const message = openpgp.message.fromText(plaintext); + const message = openpgp.Message.fromText(plaintext); const signOpt = { message, privateKeys: privateKey, @@ -1929,7 +1929,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.signature = await openpgp.signature.readArmored(signed); + verifyOpt.signature = await openpgp.readArmoredSignature(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext); @@ -1941,16 +1941,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and fail to verify cleartext message with wrong public pgp key', async function () { - const message = openpgp.cleartext.fromText(plaintext); + const message = openpgp.CleartextMessage.fromText(plaintext); const signOpt = { message, privateKeys: privateKey }; const verifyOpt = { - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.message = await openpgp.cleartext.readArmored(signed); + verifyOpt.message = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext.replace(/[ \t]+$/mg, '')); @@ -1962,7 +1962,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and fail to verify data with wrong public pgp key with detached signature', async function () { - const message = openpgp.message.fromText(plaintext); + const message = openpgp.Message.fromText(plaintext); const signOpt = { message, privateKeys: privateKey, @@ -1970,10 +1970,10 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; const verifyOpt = { message, - publicKeys: await openpgp.key.readArmored(wrong_pubkey) + publicKeys: await openpgp.readArmoredKey(wrong_pubkey) }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.signature = await openpgp.signature.readArmored(signed); + verifyOpt.signature = await openpgp.readArmoredSignature(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext); @@ -1985,7 +1985,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and verify data and not armor', function () { - const message = openpgp.message.fromText(plaintext); + const message = openpgp.Message.fromText(plaintext); const signOpt = { message, privateKeys: privateKey, @@ -1995,7 +1995,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.message = await openpgp.message.read(signed); + verifyOpt.message = await openpgp.readMessage(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext); @@ -2008,7 +2008,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should sign and verify data and not armor with detached signatures', function () { const start = openpgp.util.normalizeDate(); - const message = openpgp.message.fromText(plaintext); + const message = openpgp.Message.fromText(plaintext); const signOpt = { message, privateKeys: privateKey, @@ -2020,7 +2020,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.signature = await openpgp.signature.read(signed); + verifyOpt.signature = await openpgp.readSignature(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(verified.data).to.equal(plaintext); @@ -2034,7 +2034,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should sign and verify data with a date in the past', function () { - const message = openpgp.message.fromText(plaintext); + const message = openpgp.Message.fromText(plaintext); const past = new Date(2000); const signOpt = { message, @@ -2049,7 +2049,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { date: past }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.signature = await openpgp.signature.read(signed); + verifyOpt.signature = await openpgp.readSignature(signed); return openpgp.verify(verifyOpt).then(async function (verified) { expect(+verified.signatures[0].signature.packets[0].created).to.equal(+past); expect(verified.data).to.equal(plaintext); @@ -2075,7 +2075,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const future = new Date(2040, 5, 5, 5, 5, 5, 0); const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const signOpt = { - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privateKey_2038_2045, detached: true, date: future, @@ -2087,8 +2087,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { format: 'binary' }; return openpgp.sign(signOpt).then(async function (signed) { - verifyOpt.message = openpgp.message.fromBinary(data); - verifyOpt.signature = await openpgp.signature.read(signed); + verifyOpt.message = openpgp.Message.fromBinary(data); + verifyOpt.signature = await openpgp.readSignature(signed); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(+verified.signatures[0].signature.packets[0].created).to.equal(+future); @@ -2103,7 +2103,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should sign and verify binary data without one-pass signature', function () { const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const signOpt = { - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privateKey, armor: false }; @@ -2112,12 +2112,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { format: 'binary' }; return openpgp.sign(signOpt).then(async function (signed) { - const message = await openpgp.message.read(signed); + const message = await openpgp.readMessage(signed); message.packets.concat(await openpgp.stream.readToEnd(message.packets.stream, _ => _)); const packets = new openpgp.PacketList(); packets.push(message.packets.findPacket(openpgp.enums.packet.signature)); packets.push(message.packets.findPacket(openpgp.enums.packet.literalData)); - verifyOpt.message = new openpgp.message.Message(packets); + verifyOpt.message = new openpgp.Message(packets); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect([].slice.call(verified.data)).to.deep.equal([].slice.call(data)); @@ -2131,7 +2131,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should streaming sign and verify binary data without one-pass signature', function () { const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const signOpt = { - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privateKey, armor: false, streaming: 'web' @@ -2144,12 +2144,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const useNativeStream = (() => { try { new global.ReadableStream(); return true; } catch (e) { return false; } })(); return openpgp.sign(signOpt).then(async function (signed) { expect(openpgp.util.isStream(signed)).to.equal(useNativeStream ? 'web' : 'ponyfill'); - const message = await openpgp.message.read(signed); + const message = await openpgp.readMessage(signed); message.packets.concat(await openpgp.stream.readToEnd(message.packets.stream, _ => _)); const packets = new openpgp.PacketList(); packets.push(message.packets.findPacket(openpgp.enums.packet.signature)); packets.push(message.packets.findPacket(openpgp.enums.packet.literalData)); - verifyOpt.message = new openpgp.message.Message(packets); + verifyOpt.message = new openpgp.Message(packets); return openpgp.verify(verifyOpt); }).then(async function (verified) { expect(openpgp.stream.isStream(verified.data)).to.equal(useNativeStream ? 'web' : 'ponyfill'); @@ -2164,14 +2164,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should encrypt and decrypt data with a date in the future', function () { const future = new Date(2040, 5, 5, 5, 5, 5, 0); const encryptOpt = { - message: openpgp.message.fromText(plaintext, undefined, future), + message: openpgp.Message.fromText(plaintext, undefined, future), publicKeys: publicKey_2038_2045, date: future, armor: false }; return openpgp.encrypt(encryptOpt).then(async function (encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return message.decrypt([privateKey_2038_2045]); }).then(async function (packets) { const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData); @@ -2185,14 +2185,14 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const past = new Date(2005, 5, 5, 5, 5, 5, 0); const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const encryptOpt = { - message: openpgp.message.fromBinary(data, undefined, past), + message: openpgp.Message.fromBinary(data, undefined, past), publicKeys: publicKey_2000_2008, date: past, armor: false }; return openpgp.encrypt(encryptOpt).then(async function (encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return message.decrypt([privateKey_2000_2008]); }).then(async function (packets) { const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData); @@ -2205,7 +2205,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { it('should sign, encrypt and decrypt, verify data with a date in the past', function () { const past = new Date(2005, 5, 5, 5, 5, 5, 0); const encryptOpt = { - message: openpgp.message.fromText(plaintext, undefined, past), + message: openpgp.Message.fromText(plaintext, undefined, past), publicKeys: publicKey_2000_2008, privateKeys: privateKey_2000_2008, date: past, @@ -2213,7 +2213,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encryptOpt).then(async function (encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return message.decrypt([privateKey_2000_2008]); }).then(async function (message) { const literals = message.packets.filterByTag(openpgp.enums.packet.literalData); @@ -2233,7 +2233,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const future = new Date(2040, 5, 5, 5, 5, 5, 0); const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const encryptOpt = { - message: openpgp.message.fromBinary(data, undefined, future), + message: openpgp.Message.fromBinary(data, undefined, future), publicKeys: publicKey_2038_2045, privateKeys: privateKey_2038_2045, date: future, @@ -2241,7 +2241,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encryptOpt).then(async function (encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return message.decrypt([privateKey_2038_2045]); }).then(async function (message) { const literals = message.packets.filterByTag(openpgp.enums.packet.literalData); @@ -2262,7 +2262,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const future = new Date(2040, 5, 5, 5, 5, 5, 0); const data = new Uint8Array([3, 14, 15, 92, 65, 35, 59]); const encryptOpt = { - message: openpgp.message.fromBinary(data, undefined, future, 'mime'), + message: openpgp.Message.fromBinary(data, undefined, future, 'mime'), publicKeys: publicKey_2038_2045, privateKeys: privateKey_2038_2045, date: future, @@ -2270,7 +2270,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.encrypt(encryptOpt).then(async function (encrypted) { - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); return message.decrypt([privateKey_2038_2045]); }).then(async function (message) { const literals = message.packets.filterByTag(openpgp.enums.packet.literalData); @@ -2292,7 +2292,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { key: privateKey }).then(function(revKey) { return openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: revKey.publicKey }).then(function() { throw new Error('Should not encrypt with revoked key'); @@ -2303,13 +2303,13 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should fail to encrypt with revoked subkey', async function() { - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); return privKeyDE.subKeys[0].revoke(privKeyDE.primaryKey).then(function(revSubKey) { pubKeyDE.subKeys[0] = revSubKey; return openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: pubKeyDE }).then(function() { throw new Error('Should not encrypt with revoked subkey'); @@ -2320,16 +2320,16 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should decrypt with revoked subkey', async function() { - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); await privKeyDE.decrypt(passphrase); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: pubKeyDE }); privKeyDE.subKeys[0] = await privKeyDE.subKeys[0].revoke(privKeyDE.primaryKey); const decOpt = { - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), privateKeys: privKeyDE }; const decrypted = await openpgp.decrypt(decOpt); @@ -2337,18 +2337,18 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('should not decrypt with corrupted subkey', async function() { - const pubKeyDE = await openpgp.key.readArmored(pub_key_de); - const privKeyDE = await openpgp.key.readArmored(priv_key_de); + const pubKeyDE = await openpgp.readArmoredKey(pub_key_de); + const privKeyDE = await openpgp.readArmoredKey(priv_key_de); // corrupt the public key params privKeyDE.subKeys[0].keyPacket.publicParams.p[0]++; // validation will not check the decryption subkey and will succeed await privKeyDE.decrypt(passphrase); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(plaintext), + message: openpgp.Message.fromText(plaintext), publicKeys: pubKeyDE }); const decOpt = { - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), privateKeys: privKeyDE }; // binding signature is invalid @@ -2356,8 +2356,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }); it('RSA decryption with PKCS1 padding of wrong length should fail', async function() { - const key = await openpgp.key.readArmored(rsaPrivateKeyPKCS1); - const key = (await openpgp.key.readArmored(rsaPrivateKeyPKCS1)).keys[0]; + const key = await openpgp.readArmoredKey(rsaPrivateKeyPKCS1); // the paddings of these messages are prefixed by 0x02 and 0x000002 instead of 0x0002 // the code should discriminate between these cases by checking the length of the padded plaintext const padding02 = `-----BEGIN PGP MESSAGE----- @@ -2390,13 +2389,13 @@ J9I8AcH94nE77JUtCm7s1kOlo0EIshZsAqJwGveDGdAuabfViVwVxG4I24M6 -----END PGP MESSAGE-----`; const decOpt02 = { - message: await openpgp.message.readArmored(padding02), + message: await openpgp.readArmoredMessage(padding02), privateKeys: key }; await expect(openpgp.decrypt(decOpt02)).to.be.rejectedWith(/Decryption error/); const decOpt000002 = { - message: await openpgp.message.readArmored(padding000002), + message: await openpgp.readArmoredMessage(padding000002), privateKeys: key }; await expect(openpgp.decrypt(decOpt000002)).to.be.rejectedWith(/Decryption error/); @@ -2404,7 +2403,7 @@ J9I8AcH94nE77JUtCm7s1kOlo0EIshZsAqJwGveDGdAuabfViVwVxG4I24M6 it('should decrypt with two passwords message which GPG fails on', async function() { const decOpt = { - message: await openpgp.message.readArmored(twoPasswordGPGFail), + message: await openpgp.readArmoredMessage(twoPasswordGPGFail), passwords: password2 }; return openpgp.decrypt(decOpt).then(function(decrypted) { @@ -2415,23 +2414,23 @@ J9I8AcH94nE77JUtCm7s1kOlo0EIshZsAqJwGveDGdAuabfViVwVxG4I24M6 it('should decrypt with three passwords', async function() { const messageBinary = openpgp.util.b64ToUint8Array('wy4ECQMIElIx/jiwJV9gp/MZ/ElZwUfHrzOBfOtM8VmgDy76F7eSGWH26tAlx3WI0kMBZv6Tlc1Y6baaZ6MEcOLTG/C7uzHH7KMfuQFd3fcMaVcDawk9EEy/CybiGBE+acT6id2pemHQy6Nk76d9UUTFubcB'); - const message = await openpgp.message.read(messageBinary); + const message = await openpgp.readMessage(messageBinary); const passwords = ['Test', 'Pinata', 'a']; const decrypted = await openpgp.decrypt({ message, passwords }); expect(decrypted.data).to.equal('Hello world'); }); it('should decrypt broken ECC message from old OpenPGP.js', async function() { - const key = await openpgp.key.readArmored(ecdh_dec_key); - const message = await openpgp.message.readArmored(ecdh_msg_bad); + const key = await openpgp.readArmoredKey(ecdh_dec_key); + const message = await openpgp.readArmoredMessage(ecdh_msg_bad); await key.decrypt('12345'); const decrypted = await openpgp.decrypt({ message, privateKeys: [key] }); expect(decrypted.data).to.equal('\n'); }); it('should decrypt broken ECC message from old go crypto', async function() { - const key = await openpgp.key.readArmored(ecdh_dec_key_2); - const message = await openpgp.message.readArmored(ecdh_msg_bad_2); + const key = await openpgp.readArmoredKey(ecdh_dec_key_2); + const message = await openpgp.readArmoredMessage(ecdh_msg_bad_2); await key.decrypt('12345'); const decrypted = await openpgp.decrypt({ message, privateKeys: [key] }); expect(decrypted.data).to.equal('Tesssst


Sent from ProtonMail mobile


'); @@ -2445,7 +2444,7 @@ J9I8AcH94nE77JUtCm7s1kOlo0EIshZsAqJwGveDGdAuabfViVwVxG4I24M6 try { const { data } = await openpgp.decrypt({ passwords: 'test', - message: await openpgp.message.readArmored(`-----BEGIN PGP MESSAGE----- + message: await openpgp.readArmoredMessage(`-----BEGIN PGP MESSAGE----- Version: OpenPGP.js v4.8.1 Comment: https://openpgpjs.org @@ -2466,7 +2465,7 @@ YCXOZwd3z5lxcj/M it('should decrypt correct Blowfish message from new OpenPGP.js', async function() { const { data } = await openpgp.decrypt({ passwords: 'test', - message: await openpgp.message.readArmored(`-----BEGIN PGP MESSAGE----- + message: await openpgp.readArmoredMessage(`-----BEGIN PGP MESSAGE----- Version: OpenPGP.js v4.9.0 Comment: https://openpgpjs.org @@ -2480,14 +2479,14 @@ amnR6g== }); it('should normalize newlines in encrypted text message', async function() { - const message = openpgp.message.fromText('"BEGIN:VCALENDAR\nVERSION:2.0\nBEGIN:VEVENT\r\nUID:123\r\nDTSTART:20191211T121212Z\r\nDTEND:20191212T121212Z\r\nEND:VEVENT\nEND:VCALENDAR"'); + const message = openpgp.Message.fromText('"BEGIN:VCALENDAR\nVERSION:2.0\nBEGIN:VEVENT\r\nUID:123\r\nDTSTART:20191211T121212Z\r\nDTEND:20191212T121212Z\r\nEND:VEVENT\nEND:VCALENDAR"'); const encrypted = await openpgp.encrypt({ passwords: 'test', message }); const decrypted = await openpgp.decrypt({ passwords: 'test', - message: await openpgp.message.readArmored(encrypted), + message: await openpgp.readArmoredMessage(encrypted), format: 'binary' }); expect(openpgp.util.decodeUtf8(decrypted.data)).to.equal('"BEGIN:VCALENDAR\r\nVERSION:2.0\r\nBEGIN:VEVENT\r\nUID:123\r\nDTSTART:20191211T121212Z\r\nDTEND:20191212T121212Z\r\nEND:VEVENT\r\nEND:VCALENDAR"'); @@ -2499,7 +2498,7 @@ amnR6g== it('Error message should contain the original error message', function() { return openpgp.encrypt({ - message: openpgp.message.fromBinary(new Uint8Array([0x01, 0x01, 0x01])), + message: openpgp.Message.fromBinary(new Uint8Array([0x01, 0x01, 0x01])), passwords: null }).then(function() { throw new Error('Error expected.'); diff --git a/test/general/packet.js b/test/general/packet.js index ed082aac..df6066e6 100644 --- a/test/general/packet.js +++ b/test/general/packet.js @@ -78,7 +78,7 @@ module.exports = () => describe("Packet", function() { await enc.encrypt(algo, key); - const msg2 = new openpgp.message.Message(); + const msg2 = new openpgp.Message(); await msg2.packets.read(message.write(), { SymmetricallyEncryptedDataPacket: openpgp.SymmetricallyEncryptedDataPacket }); msg2.packets[0].ignoreMdcError = true; const dec = await msg2.decrypt(null, null, [{ algorithm: algo, data: key }]); @@ -771,7 +771,7 @@ kePFjAnu9cpynKXu3usf8+FuBw2zLsg1Id1n7ttxoAte416KjBN9lFBt8mcu =wEIR -----END PGP SIGNATURE-----`; - const signature = await openpgp.signature.readArmored(armored_sig); + const signature = await openpgp.readArmoredSignature(armored_sig); expect(signature.packets[0].signersUserId).to.equal('test-wkd@metacode.biz'); }); @@ -810,7 +810,7 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+ =et/d -----END PGP PUBLIC KEY BLOCK-----`; - const key = await openpgp.key.readArmored(pubkey); + const key = await openpgp.readArmoredKey(pubkey); const { notations, rawNotations } = key.users[0].selfCertifications[0]; diff --git a/test/general/signature.js b/test/general/signature.js index 1334aa74..b007a3c2 100644 --- a/test/general/signature.js +++ b/test/general/signature.js @@ -844,9 +844,9 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== const { rejectMessageHashAlgorithms } = openpgp.config; Object.assign(openpgp.config, { rejectMessageHashAlgorithms: new Set([openpgp.enums.hash.md5, openpgp.enums.hash.ripemd]) }); try { - const priv_key = await openpgp.key.readArmored(priv_key_arm1); - const pub_key = await openpgp.key.readArmored(pub_key_arm1); - const msg = await openpgp.message.readArmored(msg_arm1); + const priv_key = await openpgp.readArmoredKey(priv_key_arm1); + const pub_key = await openpgp.readArmoredKey(pub_key_arm1); + const msg = await openpgp.readArmoredMessage(msg_arm1); await priv_key.decrypt("abcd"); const decrypted = await openpgp.decrypt({ privateKeys: priv_key, publicKeys:[pub_key], message:msg }); expect(decrypted.data).to.exist; @@ -863,10 +863,10 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== try { // exercises the GnuPG s2k type 1001 extension: // the secrets on the primary key have been stripped. - const priv_key_gnupg_ext = await openpgp.key.readArmored(priv_key_arm1_stripped); - const priv_key_gnupg_ext_2 = await openpgp.key.readArmored(priv_key_arm1_stripped); - const pub_key = await openpgp.key.readArmored(pub_key_arm1); - const message = await openpgp.message.readArmored(msg_arm1); + const priv_key_gnupg_ext = await openpgp.readArmoredKey(priv_key_arm1_stripped); + const priv_key_gnupg_ext_2 = await openpgp.readArmoredKey(priv_key_arm1_stripped); + const pub_key = await openpgp.readArmoredKey(pub_key_arm1); + const message = await openpgp.readArmoredMessage(msg_arm1); const primaryKey_packet = priv_key_gnupg_ext.primaryKey.write(); expect(priv_key_gnupg_ext.isDecrypted()).to.be.false; await priv_key_gnupg_ext.decrypt("abcd"); @@ -877,7 +877,7 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== expect(msg.signatures).to.have.length(1); expect(msg.signatures[0].valid).to.be.true; expect(msg.signatures[0].signature.packets.length).to.equal(1); - await expect(openpgp.sign({ message: openpgp.message.fromText('test'), privateKeys: [priv_key_gnupg_ext] })).to.eventually.be.rejectedWith(/Missing key parameters/); + await expect(openpgp.sign({ message: openpgp.Message.fromText('test'), privateKeys: [priv_key_gnupg_ext] })).to.eventually.be.rejectedWith(/Missing key parameters/); await expect(openpgp.reformatKey({ userIds: { name: 'test' }, privateKey: priv_key_gnupg_ext })).to.eventually.be.rejectedWith(/Missing key parameters/); await expect(openpgp.reformatKey({ userIds: { name: 'test' }, privateKey: priv_key_gnupg_ext_2, passphrase: 'test' })).to.eventually.be.rejectedWith(/Missing key parameters/); await priv_key_gnupg_ext.encrypt("abcd"); @@ -890,14 +890,14 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== }); it('Supports signing with GnuPG stripped-key extension', async function() { - const priv_key_gnupg_ext = await openpgp.key.readArmored(flowcrypt_stripped_key); + const priv_key_gnupg_ext = await openpgp.readArmoredKey(flowcrypt_stripped_key); await priv_key_gnupg_ext.decrypt('FlowCrypt'); - const sig = await openpgp.sign({ message: openpgp.message.fromText('test'), privateKeys: [priv_key_gnupg_ext], date: new Date('2018-12-17T03:24:00') }); + const sig = await openpgp.sign({ message: openpgp.Message.fromText('test'), privateKeys: [priv_key_gnupg_ext], date: new Date('2018-12-17T03:24:00') }); expect(sig).to.match(/-----END PGP MESSAGE-----\r\n$/); }); it('Supports non-human-readable notations', async function() { - const { packets: [signature] } = await openpgp.message.readArmored(signature_with_non_human_readable_notations); + const { packets: [signature] } = await openpgp.readArmoredMessage(signature_with_non_human_readable_notations); // There are no human-readable notations so `notations` property does not // expose the `test@key.com` notation. expect(Object.keys(signature.notations).length).to.equal(0); @@ -914,7 +914,7 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== it('Checks for critical bit in non-human-readable notations', async function() { try { openpgp.config.tolerant = false; - await openpgp.message.readArmored(`-----BEGIN PGP SIGNATURE----- + await openpgp.readArmoredMessage(`-----BEGIN PGP SIGNATURE----- wsEfBAABCABJBYJfKDH0K5QAAAAAAB0ABXVua25vd25AdGVzdHMuc2VxdW9pYS1w Z3Aub3JndmFsdWUWIQTRpm4aI7GCyZgPeIz7/MgqAV5zMAAKCRD7/MgqAV5zMLBK @@ -929,7 +929,7 @@ IYs+aFmldMg4p1t1Ab/bRHbBxIlzhtbNE6IyOfc17mgOcjQzVJBc/EaxD7S3KjU2 bwM= =0x2S -----END PGP SIGNATURE-----`); - throw new Error('openpgp.message.readArmored should throw but it did not.'); + throw new Error('openpgp.readArmoredMessage should throw but it did not.'); } catch (e) { expect(e.message).to.equal('Unknown critical notation: unknown@tests.sequoia-pgp.org'); } finally { @@ -953,8 +953,8 @@ bwM= '=VH8F', '-----END PGP MESSAGE-----'].join('\n'); - const sMsg = await openpgp.message.readArmored(signedArmor); - const pub_key = await openpgp.key.readArmored(pub_key_arm2); + const sMsg = await openpgp.readArmoredMessage(signedArmor); + const pub_key = await openpgp.readArmoredKey(pub_key_arm2); const verified = await sMsg.verify([pub_key]); openpgp.stream.pipe(sMsg.getLiteralData(), new openpgp.stream.WritableStream()); expect(verified).to.exist; @@ -984,9 +984,9 @@ bwM= '-----END PGP MESSAGE-----'].join('\n'); const plaintext = 'short message\nnext line\n한국어/조선말'; - const esMsg = await openpgp.message.readArmored(msg_armor); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const esMsg = await openpgp.readArmoredMessage(msg_armor); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await Promise.all(esMsg.getEncryptionKeyIds().map(keyId => privKey.decrypt('hello world', keyId))); @@ -1019,9 +1019,9 @@ bwM= '-----END PGP MESSAGE-----'].join('\n'); const plaintext = 'short message\nnext line\n한국어/조선말'; - const sMsg = await openpgp.message.readArmored(msg_armor); - const pubKey2 = await openpgp.key.readArmored(pub_key_arm2); - const pubKey3 = await openpgp.key.readArmored(pub_key_arm3); + const sMsg = await openpgp.readArmoredMessage(msg_armor); + const pubKey2 = await openpgp.readArmoredKey(pub_key_arm2); + const pubKey3 = await openpgp.readArmoredKey(pub_key_arm3); const keyids = sMsg.getSigningKeyIds(); @@ -1043,8 +1043,8 @@ bwM= let testFailed = true; try { openpgp.config.tolerant = false; - const sMsg = await openpgp.message.readArmored(signature_with_critical_notation); - const pub_key = await openpgp.key.readArmored(pub_key_arm2); + const sMsg = await openpgp.readArmoredMessage(signature_with_critical_notation); + const pub_key = await openpgp.readArmoredKey(pub_key_arm2); const verified = await sMsg.verify([pub_key]); await verified[0].verified; testFailed = false; @@ -1061,8 +1061,8 @@ bwM= openpgp.config.tolerant = false; openpgp.config.knownNotations.push('test@example.com'); try { - const sMsg = await openpgp.message.readArmored(signature_with_critical_notation); - const pub_key = await openpgp.key.readArmored(pub_key_arm2); + const sMsg = await openpgp.readArmoredMessage(signature_with_critical_notation); + const pub_key = await openpgp.readArmoredKey(pub_key_arm2); const verified = await sMsg.verify([pub_key]); openpgp.stream.pipe(sMsg.getLiteralData(), new openpgp.stream.WritableStream()); expect(await verified[0].verified).to.be.true; @@ -1097,9 +1097,9 @@ bwM= '-----END PGP SIGNATURE-----'].join('\n'); const plaintext = 'short message\nnext line\n한국어/조선말'; - const csMsg = await openpgp.cleartext.readArmored(msg_armor); - const pubKey2 = await openpgp.key.readArmored(pub_key_arm2); - const pubKey3 = await openpgp.key.readArmored(pub_key_arm3); + const csMsg = await openpgp.readArmoredCleartextMessage(msg_armor); + const pubKey2 = await openpgp.readArmoredKey(pub_key_arm2); + const pubKey3 = await openpgp.readArmoredKey(pub_key_arm3); const keyids = csMsg.getSigningKeyIds(); @@ -1119,7 +1119,7 @@ bwM= it('Verify latin-1 signed message', async function() { const latin1Binary = openpgp.util.hexToUint8Array('48e46c6cf62057e86c74'); - const message = openpgp.message.fromBinary(latin1Binary); + const message = openpgp.Message.fromBinary(latin1Binary); message.appendSignature(`-----BEGIN PGP SIGNATURE----- @@ -1138,7 +1138,7 @@ PAAeuQTUrcJdZeJ86eQ9cCUB216HCwSKOWTQRzL+hBWKXij4WD4= =ZEFm -----END PGP SIGNATURE-----`); - const pubKey = await openpgp.key.readArmored(pub_latin1_msg); + const pubKey = await openpgp.readArmoredKey(pub_latin1_msg); return message.verify([pubKey]).then(async verifiedSig => { expect(await openpgp.stream.readToEnd(message.getLiteralData())).to.equal(latin1Binary); @@ -1175,8 +1175,8 @@ zmuVOdNuWQqxT9Sqa84= -----END PGP SIGNATURE-----`; const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const csMsg = await openpgp.cleartext.readArmored(msg_armor); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); + const csMsg = await openpgp.readArmoredCleartextMessage(msg_armor); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); const keyids = csMsg.getSigningKeyIds(); @@ -1209,8 +1209,8 @@ yYDnCgA= -----END PGP MESSAGE-----`; const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const sMsg = await openpgp.message.readArmored(msg_armor); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); + const sMsg = await openpgp.readArmoredMessage(msg_armor); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); const keyids = sMsg.getSigningKeyIds(); @@ -1240,14 +1240,14 @@ yYDnCgA= -----END PGP MESSAGE-----`.split(''); const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const sMsg = await openpgp.message.readArmored(new openpgp.stream.ReadableStream({ + const sMsg = await openpgp.readArmoredMessage(new openpgp.stream.ReadableStream({ async pull(controller) { await new Promise(setTimeout); controller.enqueue(msg_armor.shift()); if (!msg_armor.length) controller.close(); } })); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); const keyids = sMsg.getSigningKeyIds(); @@ -1279,8 +1279,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA -----END PGP MESSAGE-----`; const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const sMsg = await openpgp.message.readArmored(msg_armor); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); + const sMsg = await openpgp.readArmoredMessage(msg_armor); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); const keyids = sMsg.getSigningKeyIds(); @@ -1306,14 +1306,14 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA -----END PGP MESSAGE-----`.split(''); const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const sMsg = await openpgp.message.readArmored(new openpgp.stream.ReadableStream({ + const sMsg = await openpgp.readArmoredMessage(new openpgp.stream.ReadableStream({ async pull(controller) { await new Promise(setTimeout); controller.enqueue(msg_armor.shift()); if (!msg_armor.length) controller.close(); } })); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); const keyids = sMsg.getSigningKeyIds(); @@ -1345,13 +1345,13 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures', async function() { const plaintext = 'short message\nnext line \n한국어/조선말'; - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) { + return openpgp.sign({ privateKeys:[privKey], message: openpgp.CleartextMessage.fromText(plaintext) }).then(async function(signed) { - const csMsg = await openpgp.cleartext.readArmored(signed); + const csMsg = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify({ publicKeys:[pubKey], message:csMsg }); }).then(function(cleartextSig) { @@ -1365,13 +1365,13 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures -- escape armored message', async function() { const plaintext = pub_key_arm2; - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) { + return openpgp.sign({ privateKeys:[privKey], message: openpgp.CleartextMessage.fromText(plaintext) }).then(async function(signed) { - const csMsg = await openpgp.cleartext.readArmored(signed); + const csMsg = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify({ publicKeys:[pubKey], message:csMsg }); }).then(function(cleartextSig) { @@ -1385,13 +1385,13 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Sign text with openpgp.sign and verify with openpgp.verify leads to same string cleartext and valid signatures -- trailing spaces', async function() { const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.cleartext.fromText(plaintext) }).then(async function(signed) { + return openpgp.sign({ privateKeys:[privKey], message: openpgp.CleartextMessage.fromText(plaintext) }).then(async function(signed) { - const csMsg = await openpgp.cleartext.readArmored(signed); + const csMsg = await openpgp.readArmoredCleartextMessage(signed); return openpgp.verify({ publicKeys:[pubKey], message:csMsg }); }).then(function(cleartextSig) { @@ -1405,13 +1405,13 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - armored', async function() { const plaintext = openpgp.util.strToUint8Array('short message\nnext line \n한국어/조선말'); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromBinary(plaintext) }).then(async function(signed) { + return openpgp.sign({ privateKeys:[privKey], message: openpgp.Message.fromBinary(plaintext) }).then(async function(signed) { - const csMsg = await openpgp.message.readArmored(signed); + const csMsg = await openpgp.readArmoredMessage(signed); return openpgp.verify({ publicKeys:[pubKey], message:csMsg, format: 'binary' }); }).then(async function(cleartextSig) { @@ -1425,13 +1425,13 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Sign text with openpgp.sign and verify with openpgp.verify leads to same bytes cleartext and valid signatures - not armored', async function() { const plaintext = openpgp.util.strToUint8Array('short message\nnext line \n한국어/조선말'); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromBinary(plaintext), armor:false }).then(async function(signed) { + return openpgp.sign({ privateKeys:[privKey], message: openpgp.Message.fromBinary(plaintext), armor:false }).then(async function(signed) { - const csMsg = await openpgp.message.read(signed); + const csMsg = await openpgp.readMessage(signed); return openpgp.verify({ publicKeys:[pubKey], message:csMsg, format: 'binary' }); }).then(function(cleartextSig) { @@ -1445,12 +1445,12 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Should verify cleartext message correctly when using a detached cleartext signature and binary literal data', async function () { const plaintext = 'short message\nnext line \n한국어/조선말'; - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) { - const signature = await openpgp.signature.readArmored(signed); - return openpgp.verify({ publicKeys:[pubKey], message: openpgp.message.fromBinary(openpgp.util.encodeUtf8(plaintext)), signature: signature }); + return openpgp.sign({ privateKeys:[privKey], message: openpgp.Message.fromText(plaintext), detached: true}).then(async function(signed) { + const signature = await openpgp.readArmoredSignature(signed); + return openpgp.verify({ publicKeys:[pubKey], message: openpgp.Message.fromBinary(openpgp.util.encodeUtf8(plaintext)), signature: signature }); }).then(function(cleartextSig) { expect(cleartextSig).to.exist; expect(cleartextSig.signatures).to.have.length(1); @@ -1462,12 +1462,12 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Should verify cleartext message correctly when using a detached binary signature and text literal data', async function () { const plaintext = 'short message\nnext line \n한국어/조선말'; const plaintextArray = openpgp.util.encodeUtf8(plaintext); - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await privKey.decrypt('hello world'); - return openpgp.sign({ privateKeys:[privKey], message:openpgp.message.fromBinary(plaintextArray), detached: true}).then(async function(signed) { - const signature = await openpgp.signature.readArmored(signed); - return openpgp.verify({ publicKeys:[pubKey], message: openpgp.message.fromText(plaintext), signature: signature }); + return openpgp.sign({ privateKeys:[privKey], message:openpgp.Message.fromBinary(plaintextArray), detached: true}).then(async function(signed) { + const signature = await openpgp.readArmoredSignature(signed); + return openpgp.verify({ publicKeys:[pubKey], message: openpgp.Message.fromText(plaintext), signature: signature }); }).then(function(cleartextSig) { expect(cleartextSig).to.exist; expect(cleartextSig.signatures).to.have.length(1); @@ -1478,14 +1478,14 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA it('Should verify encrypted cleartext message correctly when encrypting binary literal data with a canonical text signature', async function () { const plaintext = 'short message\nnext line \n한국어/조선말'; - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const privKey = await openpgp.key.readArmored(priv_key_arm2); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const privKey = await openpgp.readArmoredKey(priv_key_arm2); await Promise.all([privKey.primaryKey.decrypt('hello world'), privKey.subKeys[0].keyPacket.decrypt('hello world')]); - return openpgp.sign({ privateKeys:[privKey], message: openpgp.message.fromText(plaintext), detached: true}).then(async function(signed) { - const signature = await openpgp.signature.readArmored(signed); - return openpgp.encrypt({ message: openpgp.message.fromBinary(openpgp.util.encodeUtf8(plaintext)), publicKeys: [pubKey], signature }) + return openpgp.sign({ privateKeys:[privKey], message: openpgp.Message.fromText(plaintext), detached: true}).then(async function(signed) { + const signature = await openpgp.readArmoredSignature(signed); + return openpgp.encrypt({ message: openpgp.Message.fromBinary(openpgp.util.encodeUtf8(plaintext)), publicKeys: [pubKey], signature }) }).then(async data => { - const csMsg = await openpgp.message.readArmored(data); + const csMsg = await openpgp.readArmoredMessage(data); return openpgp.decrypt({ message: csMsg, privateKeys: [ privKey ], publicKeys: [ pubKey ] }); }).then(function(cleartextSig) { expect(cleartextSig).to.exist; @@ -1496,8 +1496,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA }); it('Verify test with expired verification public key', async function() { - const pubKey = await openpgp.key.readArmored(pub_expired); - const message = await openpgp.message.readArmored(msg_sig_expired); + const pubKey = await openpgp.readArmoredKey(pub_expired); + const message = await openpgp.readArmoredMessage(msg_sig_expired); return openpgp.verify({ publicKeys:[pubKey], message:message }).then(function(verified) { expect(verified).to.exist; expect(verified.signatures).to.have.length(1); @@ -1507,8 +1507,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA }); it('Verify test with expired verification public key and disable expiration checks using null date', async function() { - const pubKey = await openpgp.key.readArmored(pub_expired); - const message = await openpgp.message.readArmored(msg_sig_expired); + const pubKey = await openpgp.readArmoredKey(pub_expired); + const message = await openpgp.readArmoredMessage(msg_sig_expired); return openpgp.verify({ publicKeys:[pubKey], message:message, date: null }).then(function(verified) { expect(verified).to.exist; expect(verified.signatures).to.have.length(1); @@ -1519,7 +1519,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA // TODO add test with multiple revocation signatures it('Verify primary key revocation signatures', async function() { - const pubKey = await openpgp.key.readArmored(pub_revoked); + const pubKey = await openpgp.readArmoredKey(pub_revoked); await expect(pubKey.revocationSignatures[0].verify( pubKey.primaryKey, openpgp.enums.signature.keyRevocation, {key: pubKey.primaryKey} )).to.eventually.be.true; @@ -1527,14 +1527,14 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA // TODO add test with multiple revocation signatures it('Verify subkey revocation signatures', async function() { - const pubKey = await openpgp.key.readArmored(pub_revoked); + const pubKey = await openpgp.readArmoredKey(pub_revoked); await expect(pubKey.subKeys[0].revocationSignatures[0].verify( pubKey.primaryKey, openpgp.enums.signature.subkeyRevocation, {key: pubKey.primaryKey, bind: pubKey.subKeys[0].keyPacket} )).to.eventually.be.true; }); it('Verify key expiration date', async function() { - const pubKey = await openpgp.key.readArmored(pub_revoked); + const pubKey = await openpgp.readArmoredKey(pub_revoked); expect(pubKey).to.exist; expect(pubKey.users[0].selfCertifications[0].keyNeverExpires).to.be.false; @@ -1542,15 +1542,15 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA }); it('Write unhashed subpackets', async function() { - let pubKey = await openpgp.key.readArmored(pub_key_arm2); + let pubKey = await openpgp.readArmoredKey(pub_key_arm2); expect(pubKey.users[0].selfCertifications).to.exist; - pubKey = await openpgp.key.readArmored(pubKey.armor()); + pubKey = await openpgp.readArmoredKey(pubKey.armor()); expect(pubKey.users[0].selfCertifications).to.exist; }); it('Write V4 signatures', async function() { - const pubKey = await openpgp.key.readArmored(pub_key_arm2); - const pubKey2 = await openpgp.key.readArmored(pubKey.armor()); + const pubKey = await openpgp.readArmoredKey(pub_key_arm2); + const pubKey2 = await openpgp.readArmoredKey(pubKey.armor()); expect(pubKey2).to.exist; expect(pubKey.users[0].selfCertifications).to.eql(pubKey2.users[0].selfCertifications); }); @@ -1592,10 +1592,10 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA ''].join('\r\n'); const publicKeyArmored = '-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nVersion: OpenPGP.js v.1.20131116\r\nComment: Whiteout Mail - https://whiteout.io\r\n\r\nxsBNBFKODs4BB/9iOF4THsjQMY+WEpT7ShgKxj4bHzRRaQkqczS4nZvP0U3g\r\nqeqCnbpagyeKXA+bhWFQW4GmXtgAoeD5PXs6AZYrw3tWNxLKu2Oe6Tp9K/XI\r\nxTMQ2wl4qZKDXHvuPsJ7cmgaWqpPyXtxA4zHHS3WrkI/6VzHAcI/y6x4szSB\r\nKgSuhI3hjh3s7TybUC1U6AfoQGx/S7e3WwlCOrK8GTClirN/2mCPRC5wuIft\r\nnkoMfA6jK8d2OPrJ63shy5cgwHOjQg/xuk46dNS7tkvGmbaa+X0PgqSKB+Hf\r\nYPPNS/ylg911DH9qa8BqYU2QpNh9jUKXSF+HbaOM+plWkCSAL7czV+R3ABEB\r\nAAHNLVdoaXRlb3V0IFVzZXIgPHNhZmV3aXRobWUudGVzdHVzZXJAZ21haWwu\r\nY29tPsLAXAQQAQgAEAUCUo4O2gkQ1/uT/N+/wjwAAN2cB/9gFRmAfvEQ2qz+\r\nWubmT2EsSSnjPMxzG4uyykFoa+TaZCWo2Xa2tQghmU103kEkQb1OEjRjpgwJ\r\nYX9Kghnl8DByM686L5AXnRyHP78qRJCLXSXl0AGicboUDp5sovaa4rswQceH\r\nvcdWgZ/mgHTRoiQeJddy9k+H6MPFiyFaVcFwegVsmpc+dCcC8yT+qh8ZIbyG\r\nRJU60PmKKN7LUusP+8DbSv39zCGJCBlVVKyA4MzdF5uM+sqTdXbKzOrT5DGd\r\nCZaox4s+w16Sq1rHzZKFWfQPfKLDB9pyA0ufCVRA3AF6BUi7G3ZqhZiHNhMP\r\nNvE45V/hS1PbZcfPVoUjE2qc1Ix1\r\n=7Wpe\r\n-----END PGP PUBLIC KEY BLOCK-----'; - const publicKey = await openpgp.key.readArmored(publicKeyArmored); + const publicKey = await openpgp.readArmoredKey(publicKeyArmored); // Text - const msg = openpgp.message.fromText(content); + const msg = openpgp.Message.fromText(content); await msg.appendSignature(detachedSig); return msg.verify([publicKey]).then(async result => { openpgp.stream.pipe(msg.getLiteralData(), new openpgp.stream.WritableStream()); @@ -1604,9 +1604,9 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA }); it('Detached signature signing and verification', async function() { - const msg = openpgp.message.fromText('hello'); - const pubKey2 = await openpgp.key.readArmored(pub_key_arm2); - const privKey2 = await openpgp.key.readArmored(priv_key_arm2); + const msg = openpgp.Message.fromText('hello'); + const pubKey2 = await openpgp.readArmoredKey(pub_key_arm2); + const privKey2 = await openpgp.readArmoredKey(priv_key_arm2); await privKey2.decrypt('hello world'); const opt = {rsaBits: 512, userIds: { name:'test', email:'a@b.com' }, passphrase: null}; @@ -1626,7 +1626,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA const opt = {userIds: { name:'test', email:'a@b.com' }, passphrase: null}; return openpgp.generateKey(opt).then(function(gen) { const key = gen.key; - let message = openpgp.message.fromText('hello world'); + let message = openpgp.Message.fromText('hello world'); message = message.sign([key]); expect(message).to.exist; }); @@ -1660,8 +1660,8 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA '-----END PGP PUBLIC KEY BLOCK-----' ].join('\n'); - const signedKey = await openpgp.key.readArmored(signedArmor); - const signerKey = await openpgp.key.readArmored(priv_key_arm1); + const signedKey = await openpgp.readArmoredKey(signedArmor); + const signerKey = await openpgp.readArmoredKey(priv_key_arm1); return signedKey.verifyPrimaryUser([signerKey]).then(signatures => { expect(signatures[0].valid).to.be.null; expect(signatures[0].keyid.toHex()).to.equal(signedKey.getKeyId().toHex()); @@ -1695,7 +1695,7 @@ iTuGu4fEU1UligAXSrZmCdE= =VK6I -----END PGP PUBLIC KEY BLOCK-----`; - const key = await openpgp.key.readArmored(armoredKeyWithPhoto); + const key = await openpgp.readArmoredKey(armoredKeyWithPhoto); for (const user of key.users) { await user.verify(key.primaryKey); } diff --git a/test/general/streaming.js b/test/general/streaming.js index d976e77c..abbb06dc 100644 --- a/test/general/streaming.js +++ b/test/general/streaming.js @@ -176,11 +176,11 @@ function tests() { } }); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], }); const msgAsciiArmored = await openpgp.stream.readToEnd(encrypted); - const message = await openpgp.message.readArmored(msgAsciiArmored); + const message = await openpgp.readArmoredMessage(msgAsciiArmored); const decrypted = await openpgp.decrypt({ passwords: ['test'], message @@ -190,7 +190,7 @@ function tests() { it('Encrypt larger message', async function() { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], }); const reader = openpgp.stream.getReader(encrypted); @@ -198,7 +198,7 @@ function tests() { dataArrived(); reader.releaseLock(); const msgAsciiArmored = await openpgp.stream.readToEnd(encrypted); - const message = await openpgp.message.readArmored(msgAsciiArmored); + const message = await openpgp.readArmoredMessage(msgAsciiArmored); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -209,7 +209,7 @@ function tests() { it('Input stream should be canceled when canceling encrypted stream', async function() { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], }); const reader = openpgp.stream.getReader(encrypted); @@ -222,7 +222,7 @@ function tests() { it('Sign: Input stream should be canceled when canceling encrypted stream', async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey }); const reader = openpgp.stream.getReader(signed); @@ -237,13 +237,13 @@ function tests() { let aeadProtectValue = openpgp.config.aeadProtect; openpgp.config.aeadProtect = false; const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); setTimeout(dataArrived, 3000); // Do not wait until data arrived, but wait a bit to check that it doesn't arrive early. const decrypted = await openpgp.decrypt({ passwords: ['test'], @@ -265,13 +265,13 @@ function tests() { openpgp.config.allowUnauthenticatedStream = true; try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -295,14 +295,14 @@ function tests() { openpgp.config.allowUnauthenticatedStream = true; try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), publicKeys: pubKey, privateKeys: privKey, armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ publicKeys: pubKey, privateKeys: privKey, @@ -322,19 +322,19 @@ function tests() { it('Encrypt and decrypt larger message roundtrip using curve x25519 (allowUnauthenticatedStream=true)', async function() { let allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream; openpgp.config.allowUnauthenticatedStream = true; - const priv = await openpgp.key.readArmored(xPriv); - const pub = await openpgp.key.readArmored(xPub); + const priv = await openpgp.readArmoredKey(xPriv); + const pub = await openpgp.readArmoredKey(xPub); await priv.decrypt(xPass); try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), publicKeys: pub, privateKeys: priv, armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ publicKeys: pub, privateKeys: priv, @@ -354,19 +354,19 @@ function tests() { it('Encrypt and decrypt larger message roundtrip using curve brainpool (allowUnauthenticatedStream=true)', async function() { let allowUnauthenticatedStreamValue = openpgp.config.allowUnauthenticatedStream; openpgp.config.allowUnauthenticatedStream = true; - const priv = await openpgp.key.readArmored(brainpoolPriv); - const pub = await openpgp.key.readArmored(brainpoolPub); + const priv = await openpgp.readArmoredKey(brainpoolPriv); + const pub = await openpgp.readArmoredKey(brainpoolPub); await priv.decrypt(brainpoolPass); try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), publicKeys: pub, privateKeys: priv, armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ publicKeys: pub, privateKeys: priv, @@ -390,12 +390,12 @@ function tests() { openpgp.config.allowUnauthenticatedStream = true; try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'] }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.readArmored(openpgp.stream.transform(encrypted, value => { + const message = await openpgp.readArmoredMessage(openpgp.stream.transform(encrypted, value => { value += ''; if (value === '=' || value.length === 6) return; // Remove checksum const newlineIndex = value.indexOf('\r\n', 500); @@ -425,13 +425,13 @@ function tests() { openpgp.config.allowUnauthenticatedStream = true; try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), publicKeys: pubKey, privateKeys: privKey }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.readArmored(openpgp.stream.transform(encrypted, value => { + const message = await openpgp.readArmoredMessage(openpgp.stream.transform(encrypted, value => { value += ''; const newlineIndex = value.indexOf('\r\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -460,13 +460,13 @@ function tests() { openpgp.config.allowUnauthenticatedStream = true; try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), publicKeys: pubKey, privateKeys: privKey }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.readArmored(openpgp.stream.transform(encrypted, value => { + const message = await openpgp.readArmoredMessage(openpgp.stream.transform(encrypted, value => { value += ''; const newlineIndex = value.indexOf('\r\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -492,12 +492,12 @@ function tests() { it('Sign/verify: Detect armor checksum error', async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey }); expect(util.isStream(signed)).to.equal(expectedType); - const message = await openpgp.message.readArmored(openpgp.stream.transform(signed, value => { + const message = await openpgp.readArmoredMessage(openpgp.stream.transform(signed, value => { value += ''; const newlineIndex = value.indexOf('\r\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -519,13 +519,13 @@ function tests() { it('Encrypt and decrypt larger message roundtrip (AEAD)', async function() { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], armor: false }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -557,13 +557,13 @@ function tests() { } }); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(data), + message: openpgp.Message.fromText(data), streaming: expectedType, passwords: ['test'] }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message @@ -605,11 +605,11 @@ function tests() { it('Input stream should be canceled when canceling decrypted stream (AEAD)', async function() { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], }); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -626,12 +626,12 @@ function tests() { it('Sign/verify: Input stream should be canceled when canceling verified stream', async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey }); expect(util.isStream(signed)).to.equal(expectedType); - const message = await openpgp.message.readArmored(signed); + const message = await openpgp.readArmoredMessage(signed); const verified = await openpgp.verify({ publicKeys: pubKey, message, @@ -650,7 +650,7 @@ function tests() { it("Don't pull entire input stream when we're not pulling encrypted stream", async function() { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'] }); expect(util.isStream(encrypted)).to.equal(expectedType); @@ -664,7 +664,7 @@ function tests() { it("Sign: Don't pull entire input stream when we're not pulling signed stream", async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey }); expect(util.isStream(signed)).to.equal(expectedType); @@ -681,11 +681,11 @@ function tests() { coresStub.returns(1); try { const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'] }); expect(util.isStream(encrypted)).to.equal(expectedType); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, @@ -704,11 +704,11 @@ function tests() { it("Sign/verify: Don't pull entire input stream when we're not pulling verified stream", async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey }); expect(util.isStream(signed)).to.equal(expectedType); - const message = await openpgp.message.readArmored(signed); + const message = await openpgp.readArmoredMessage(signed); const verified = await openpgp.verify({ publicKeys: pubKey, message, @@ -732,18 +732,18 @@ function tests() { } }); const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey, detached: true, streaming: expectedType }); expect(util.isStream(signed)).to.equal(expectedType); const sigArmored = await openpgp.stream.readToEnd(signed); - const signature = await openpgp.message.readArmored(sigArmored); + const signature = await openpgp.readArmoredMessage(sigArmored); const verified = await openpgp.verify({ signature, publicKeys: pubKey, - message: openpgp.message.fromText('hello world') + message: openpgp.Message.fromText('hello world') }); expect(verified.data).to.equal('hello world'); expect(verified.signatures).to.exist.and.have.length(1); @@ -760,18 +760,18 @@ function tests() { } }); const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey, detached: true, streaming: false, armor: false }); expect(util.isStream(signed)).to.be.false; - const signature = await openpgp.message.read(signed); + const signature = await openpgp.readMessage(signed); const verified = await openpgp.verify({ signature, publicKeys: pubKey, - message: openpgp.message.fromText('hello world') + message: openpgp.Message.fromText('hello world') }); expect(verified.data).to.equal('hello world'); expect(verified.signatures).to.exist.and.have.length(1); @@ -787,22 +787,22 @@ function tests() { controller.close(); } }); - const priv = await openpgp.key.readArmored(brainpoolPriv); - const pub = await openpgp.key.readArmored(brainpoolPub); + const priv = await openpgp.readArmoredKey(brainpoolPriv); + const pub = await openpgp.readArmoredKey(brainpoolPub); await priv.decrypt(brainpoolPass); const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: priv, detached: true, streaming: expectedType }); expect(util.isStream(signed)).to.equal(expectedType); const sigArmored = await openpgp.stream.readToEnd(signed); - const signature = await openpgp.message.readArmored(sigArmored); + const signature = await openpgp.readArmoredMessage(sigArmored); const verified = await openpgp.verify({ signature, publicKeys: pub, - message: openpgp.message.fromText('hello world') + message: openpgp.Message.fromText('hello world') }); expect(verified.data).to.equal('hello world'); expect(verified.signatures).to.exist.and.have.length(1); @@ -818,22 +818,22 @@ function tests() { controller.close(); } }); - const priv = await openpgp.key.readArmored(xPriv); - const pub = await openpgp.key.readArmored(xPub); + const priv = await openpgp.readArmoredKey(xPriv); + const pub = await openpgp.readArmoredKey(xPub); await priv.decrypt(xPass); const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: priv, detached: true, streaming: expectedType }); expect(util.isStream(signed)).to.equal(expectedType); const sigArmored = await openpgp.stream.readToEnd(signed); - const signature = await openpgp.message.readArmored(sigArmored); + const signature = await openpgp.readArmoredMessage(sigArmored); const verified = await openpgp.verify({ signature, publicKeys: pub, - message: openpgp.message.fromText('hello world') + message: openpgp.Message.fromText('hello world') }); expect(verified.data).to.equal('hello world'); expect(verified.signatures).to.exist.and.have.length(1); @@ -842,7 +842,7 @@ function tests() { it("Detached sign is expected to pull entire input stream when we're not pulling signed stream", async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey, detached: true }); @@ -856,7 +856,7 @@ function tests() { it('Detached sign: Input stream should be canceled when canceling signed stream', async function() { const signed = await openpgp.sign({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), privateKeys: privKey, detached: true }); @@ -877,8 +877,8 @@ module.exports = () => describe('Streaming', function() { before(async function() { openpgp.config.aeadChunkSizeByte = 4; - pubKey = await openpgp.key.readArmored(pub_key); - privKey = await openpgp.key.readArmored(priv_key); + pubKey = await openpgp.readArmoredKey(pub_key); + privKey = await openpgp.readArmoredKey(priv_key); await privKey.decrypt(passphrase); }); @@ -936,12 +936,12 @@ module.exports = () => describe('Streaming', function() { const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js'), 'utf8'); const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js'), { encoding: 'utf8' }); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromText(data), + message: openpgp.Message.fromText(data), passwords: ['test'] }); expect(util.isStream(encrypted)).to.equal('node'); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message @@ -955,13 +955,13 @@ module.exports = () => describe('Streaming', function() { const plaintext = fs.readFileSync(__filename.replace('streaming.js', 'openpgp.js')); const data = fs.createReadStream(__filename.replace('streaming.js', 'openpgp.js')); const encrypted = await openpgp.encrypt({ - message: openpgp.message.fromBinary(data), + message: openpgp.Message.fromBinary(data), passwords: ['test'], armor: false }); expect(util.isStream(encrypted)).to.equal('node'); - const message = await openpgp.message.read(encrypted); + const message = await openpgp.readMessage(encrypted); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, diff --git a/test/general/x25519.js b/test/general/x25519.js index bc6f5573..ef28eba5 100644 --- a/test/general/x25519.js +++ b/test/general/x25519.js @@ -122,7 +122,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr if (data[name].pub_key) { return data[name].pub_key; } - const pub = await openpgp.key.readArmored(data[name].pub); + const pub = await openpgp.readArmoredKey(data[name].pub); expect(pub).to.exist; expect(pub.getKeyId().toHex()).to.equal(data[name].id); data[name].pub_key = pub; @@ -133,7 +133,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr if (data[name].priv_key) { return data[name].priv_key; } - const pk = await openpgp.key.readArmored(data[name].priv); + const pk = await openpgp.readArmoredKey(data[name].priv); expect(pk).to.exist; expect(pk.getKeyId().toHex()).to.equal(data[name].id); await pk.decrypt(data[name].pass); @@ -157,7 +157,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr it('Verify clear signed message', async function () { const name = 'light'; const pub = await load_pub_key(name); - const msg = await openpgp.cleartext.readArmored(data[name].message_signed); + const msg = await openpgp.readArmoredCleartextMessage(data[name].message_signed); return openpgp.verify({ publicKeys: [pub], message: msg }).then(function(result) { expect(result).to.exist; expect(result.data).to.equal(data[name].message); @@ -170,9 +170,9 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr const name = 'light'; const randomData = input.createSomeMessage(); const priv = await load_priv_key(name); - const signed = await openpgp.sign({ privateKeys: [priv], message: openpgp.cleartext.fromText(randomData)}); + const signed = await openpgp.sign({ privateKeys: [priv], message: openpgp.CleartextMessage.fromText(randomData)}); const pub = await load_pub_key(name); - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); const result = await openpgp.verify({ publicKeys: [pub], message: msg}); expect(result).to.exist; @@ -184,7 +184,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr it('Decrypt and verify message', async function () { const light = await load_pub_key('light'); const night = await load_priv_key('night'); - const msg = await openpgp.message.readArmored(data.night.message_encrypted); + const msg = await openpgp.readArmoredMessage(data.night.message_encrypted); const result = await openpgp.decrypt({ privateKeys: night, publicKeys: [light], message: msg }); expect(result).to.exist; @@ -197,9 +197,9 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr const nightPublic = await load_pub_key('night'); const lightPrivate = await load_priv_key('light'); const randomData = input.createSomeMessage(); - const encrypted = await openpgp.encrypt({ publicKeys: [nightPublic], privateKeys: [lightPrivate], message: openpgp.message.fromText(randomData) }); + const encrypted = await openpgp.encrypt({ publicKeys: [nightPublic], privateKeys: [lightPrivate], message: openpgp.Message.fromText(randomData) }); - const message = await openpgp.message.readArmored(encrypted); + const message = await openpgp.readArmoredMessage(encrypted); const lightPublic = await load_pub_key('light'); const nightPrivate = await load_priv_key('night'); const result = await openpgp.decrypt({ privateKeys: nightPrivate, publicKeys: [lightPublic], message: message }); @@ -390,7 +390,7 @@ module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cr '=xeG/', '-----END PGP PUBLIC KEY BLOCK-----' ].join('\n'); - const hi = await openpgp.key.readArmored(pubKey); + const hi = await openpgp.readArmoredKey(pubKey); const results = await hi.getPrimaryUser(); // console.log(results); expect(results).to.exist; @@ -466,9 +466,9 @@ function omnibus() { }), // Signing message openpgp.sign( - { message: openpgp.cleartext.fromText('Hi, this is me, Hi!'), privateKeys: hi } + { message: openpgp.CleartextMessage.fromText('Hi, this is me, Hi!'), privateKeys: hi } ).then(async signed => { - const msg = await openpgp.cleartext.readArmored(signed); + const msg = await openpgp.readArmoredCleartextMessage(signed); // Verifying signed message return Promise.all([ openpgp.verify( @@ -477,9 +477,9 @@ function omnibus() { // Verifying detached signature openpgp.verify( { - message: openpgp.message.fromText('Hi, this is me, Hi!'), + message: openpgp.Message.fromText('Hi, this is me, Hi!'), publicKeys: hi.toPublic(), - signature: await openpgp.signature.readArmored(signed) + signature: await openpgp.readArmoredSignature(signed) } ).then(output => expect(output.signatures[0].valid).to.be.true) ]); @@ -487,12 +487,12 @@ function omnibus() { // Encrypting and signing openpgp.encrypt( { - message: openpgp.message.fromText('Hi, Hi wrote this but only Bye can read it!'), + message: openpgp.Message.fromText('Hi, Hi wrote this but only Bye can read it!'), publicKeys: [bye.toPublic()], privateKeys: [hi] } ).then(async encrypted => { - const msg = await openpgp.message.readArmored(encrypted); + const msg = await openpgp.readArmoredMessage(encrypted); // Decrypting and verifying return openpgp.decrypt( { diff --git a/test/security/message_signature_bypass.js b/test/security/message_signature_bypass.js index abb65eb9..e9d04df3 100644 --- a/test/security/message_signature_bypass.js +++ b/test/security/message_signature_bypass.js @@ -1,6 +1,6 @@ const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..'); -const { key, cleartext, util, SignaturePacket } = openpgp; +const { readArmoredKey, readArmoredCleartextMessage, util, SignaturePacket } = openpgp; const chai = require('chai'); chai.use(require('chai-as-promised')); @@ -67,7 +67,7 @@ fhGyl7nA7UCwgsqf7ZPBhRg= =nbjQ -----END PGP SIGNATURE-----`; async function getOtherPubKey() { - return await key.readArmored(OTHERPUBKEY); + return await readArmoredKey(OTHERPUBKEY); } /** @@ -84,7 +84,7 @@ jhAfE9q2ElqlaAvZZYw=`); async function fakeSignature() { // read the template and modify the text to // invalidate the signature. - let fake = await cleartext.readArmored( + let fake = await readArmoredCleartextMessage( ORIGINAL.replace( 'You owe me', 'I owe you')); @@ -98,7 +98,7 @@ async function fakeSignature() { const faked_armored = await fake.armor(); // re-read the message to eliminate any // behaviour due to cached values. - fake = await cleartext.readArmored(faked_armored); + fake = await readArmoredCleartextMessage(faked_armored); // faked message now verifies correctly const res = await openpgp.verify({ message: fake, diff --git a/test/security/preferred_algo_mismatch.js b/test/security/preferred_algo_mismatch.js index 5dd1094a..6bb7942d 100644 --- a/test/security/preferred_algo_mismatch.js +++ b/test/security/preferred_algo_mismatch.js @@ -43,7 +43,7 @@ EnxUPL95HuMKoVkf4w== -----END PGP PRIVATE KEY BLOCK-----`; module.exports = () => it('Does not accept message encrypted with algo not mentioned in preferred algorithms', async function() { - const message = await openpgp.message.readArmored(messageArmor); - const privKey = await openpgp.key.readArmored(privateKeyArmor); + const message = await openpgp.readArmoredMessage(messageArmor); + const privKey = await openpgp.readArmoredKey(privateKeyArmor); await expect(openpgp.decrypt({ message, privateKeys: [privKey] })).to.be.rejectedWith('A non-preferred symmetric algorithm was used.'); }); diff --git a/test/security/subkey_trust.js b/test/security/subkey_trust.js index 175a3468..24de1cda 100644 --- a/test/security/subkey_trust.js +++ b/test/security/subkey_trust.js @@ -1,6 +1,6 @@ const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..'); -const { key, cleartext, enums, PacketList, SignaturePacket } = openpgp; +const { readArmoredKey, generate, Key, readArmoredCleartextMessage, CleartextMessage, enums, PacketList, SignaturePacket } = openpgp; const chai = require('chai'); chai.use(require('chai-as-promised')); @@ -8,7 +8,7 @@ chai.use(require('chai-as-promised')); const expect = chai.expect; async function generateTestData() { - const victimPrivKey = await key.generate({ + const victimPrivKey = await generate({ userIds: ['Victim '], rsaBits: openpgp.util.getWebCryptoAll() ? 2048 : 1024, subkeys: [{ @@ -17,7 +17,7 @@ async function generateTestData() { }); victimPrivKey.revocationSignatures = []; - const attackerPrivKey = await key.generate({ + const attackerPrivKey = await generate({ userIds: ['Attacker '], rsaBits: openpgp.util.getWebCryptoAll() ? 2048 : 1024, subkeys: [], @@ -25,7 +25,7 @@ async function generateTestData() { }); attackerPrivKey.revocationSignatures = []; const signed = await openpgp.sign({ - message: await cleartext.fromText('I am batman'), + message: await CleartextMessage.fromText('I am batman'), privateKeys: victimPrivKey, streaming: false, armor: true @@ -62,10 +62,10 @@ async function testSubkeyTrust() { pktPubVictim[3], // victim subkey fakeBindingSignature // faked key binding ]); - let fakeKey = new key.Key(newList); - fakeKey = await key.readArmored(await fakeKey.toPublic().armor()); + let fakeKey = new Key(newList); + fakeKey = await readArmoredKey(await fakeKey.toPublic().armor()); const verifyAttackerIsBatman = await openpgp.verify({ - message: (await cleartext.readArmored(signed)), + message: (await readArmoredCleartextMessage(signed)), publicKeys: fakeKey, streaming: false }); diff --git a/test/security/unsigned_subpackets.js b/test/security/unsigned_subpackets.js index 5c305d27..67cfac9e 100644 --- a/test/security/unsigned_subpackets.js +++ b/test/security/unsigned_subpackets.js @@ -1,6 +1,6 @@ const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..'); -const { key, message, enums, PacketList, SignaturePacket } = openpgp; +const { readArmoredKey, Key, message, enums, PacketList, SignaturePacket } = openpgp; const chai = require('chai'); chai.use(require('chai-as-promised')); @@ -49,7 +49,7 @@ Dc2vwS83Aja9iWrIEg== -----END PGP PRIVATE KEY BLOCK-----`; async function getInvalidKey() { - return await key.readArmored(INVALID_KEY); + return await readArmoredKey(INVALID_KEY); } async function makeKeyValid() { /** @@ -82,10 +82,10 @@ async function makeKeyValid() { // reconstruct the modified key const newlist = new PacketList(); newlist.concat([pubkey, puser, pusersig]); - let modifiedkey = new key.Key(newlist); + let modifiedkey = new Key(newlist); // re-read the message to eliminate any // behaviour due to cached values. - modifiedkey = await key.readArmored(await modifiedkey.armor()); + modifiedkey = await readArmoredKey(await modifiedkey.armor()); expect(await encryptFails(invalidkey)).to.be.true; expect(await encryptFails(modifiedkey)).to.be.true; diff --git a/test/worker/worker_example.js b/test/worker/worker_example.js index 80db206d..5b992304 100644 --- a/test/worker/worker_example.js +++ b/test/worker/worker_example.js @@ -42,11 +42,11 @@ onmessage = async function({ data: { action, message }, ports: [port] }) { let result; switch (action) { case 'encrypt': { - const publicKey = await openpgp.key.readArmored(publicKeyArmored); - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const publicKey = await openpgp.readArmoredKey(publicKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt('test'); const data = await openpgp.encrypt({ - message: openpgp.message.fromText(message), + message: openpgp.Message.fromText(message), publicKeys: publicKey, privateKeys: privateKey }); @@ -54,11 +54,11 @@ onmessage = async function({ data: { action, message }, ports: [port] }) { break; } case 'decrypt': { - const publicKey = await openpgp.key.readArmored(publicKeyArmored); - const privateKey = await openpgp.key.readArmored(privateKeyArmored); + const publicKey = await openpgp.readArmoredKey(publicKeyArmored); + const privateKey = await openpgp.readArmoredKey(privateKeyArmored); await privateKey.decrypt('test'); const { data, signatures } = await openpgp.decrypt({ - message: await openpgp.message.readArmored(message), + message: await openpgp.readArmoredMessage(message), publicKeys: publicKey, privateKeys: privateKey });