Restructuring and more work on browserify support.

This commit is contained in:
Michal Kolodziej 2013-05-11 08:25:53 +02:00
parent ccc0a4eb48
commit f421dc0d72
37 changed files with 2873 additions and 2824 deletions

File diff suppressed because one or more lines are too long

View File

@ -12,6 +12,8 @@
* warranty of any kind.
*/
var util = require('../../util/util.js');
function MD5(entree) {
var hex = md5(entree);
var bin = util.hex2bin(hex);

16
src/crypto/index.js Normal file
View File

@ -0,0 +1,16 @@
module.exports = {
cipher: {
aes: require('./symmetric/aes.js'),
des: require('./symmetric/dessrc.js'),
cast5: require('./symmetric/cast5.js'),
twofish: require('./symmetric/twofish.js'),
blowfish: require('./symmetric/blowfish.js')
},
hash: {
md5: require('./hash/md5.js'),
sha: require('./hash/sha.js'),
ripemd: require('./hash/ripe-md.js')
}
}

5
src/crypto/package.json Normal file
View File

@ -0,0 +1,5 @@
{
"name": "openpgp-crypto",
"version": "0.0.1",
"main": "./index.js"
}

View File

@ -12,6 +12,8 @@
* materials provided with the application or distribution.
*/
var util = require('../../util/util.js');
// The round constants used in subkey expansion
var Rcon = [
0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8,

View File

@ -385,6 +385,8 @@ Blowfish.prototype.init = function ( key ) {
}
};
var util = require('../../util/util.js');
// added by Recurity Labs
function BFencrypt(block,key) {
var bf = new Blowfish();

View File

@ -15,6 +15,8 @@
// CAST5 constructor
var util = require('../../util/util.js');
function cast5_encrypt(block, key) {
var cast5 = new openpgp_symenc_cast5();
cast5.setKey(util.str2bin(key));

View File

@ -21,6 +21,8 @@
//des
//this takes the key, the message, and whether to encrypt or decrypt
var util = require('../../util/util.js');
// added by Recurity Labs
function desede(block,key) {
var key1 = key.substring(0,8);

View File

@ -18,6 +18,8 @@
*
*/
var util = require('../../util/util.js');
// added by Recurity Labs
function TFencrypt(block, key) {
var block_copy = [].concat(block);

223
src/enum.js Normal file
View File

@ -0,0 +1,223 @@
module.exports = {
/** RFC4880, section 9.1
* @enum {String}
*/
openpgp.publicKey = {
rsa_encrypt_sign: 1,
rsa_encrypt: 2,
rsa_sign: 3,
elgamal: 16,
dsa: 17
};
/** RFC4880, section 9.2
* @enum {String}
*/
symmetric: {
plaintext: 0,
/** Not implemented! */
idea: 1,
tripledes: 2,
cast5: 3,
blowfish: 4,
aes128: 7,
aes192: 8,
aes256: 9,
twofish: 10
},
/** RFC4880, section 9.3
* @enum {String}
*/
compression: {
uncompressed: 0,
/** RFC1951 */
zip: 1,
/** RFC1950 */
zlib: 2,
bzip2: 3
},
/** RFC4880, section 9.4
* @enum {String}
*/
hash: {
md5: 1,
sha1: 2,
ripemd: 3,
sha256: 8,
sha384: 9,
sha512: 10,
sha224: 11
},
/**
* @enum {String}
* A list of packet types and numeric tags associated with them.
*/
packet: {
reserved: 0,
public_key_encrypted_session_key: 1,
signature: 2,
sym_encrypted_session_key: 3,
one_pass_signature: 4,
secret_key: 5,
public_key: 6,
secret_subkey: 7,
compressed: 8,
symmetrically_encrypted: 9,
marker: 10,
literal: 11,
trust: 12,
userid: 13,
public_subkey: 14,
user_attribute: 17,
sym_encrypted_integrity_protected: 18,
modification_detection_code: 19
},
/**
* Data types in the literal packet
* @readonly
* @enum {String}
*/
literal: {
/** Binary data */
binary: 'b'.charCodeAt(),
/** Text data */
text: 't'.charCodeAt(),
/** Utf8 data */
utf8: 'u'.charCodeAt()
},
/** One pass signature packet type
* @enum {String} */
signature: {
/** 0x00: Signature of a binary document. */
binary: 0,
/** 0x01: Signature of a canonical text document.
* Canonicalyzing the document by converting line endings. */
text: 1,
/** 0x02: Standalone signature.
* This signature is a signature of only its own subpacket contents.
* It is calculated identically to a signature over a zero-lengh
* binary document. Note that it doesn't make sense to have a V3
* standalone signature. */
standalone: 2,
/** 0x10: Generic certification of a User ID and Public-Key packet.
* The issuer of this certification does not make any particular
* assertion as to how well the certifier has checked that the owner
* of the key is in fact the person described by the User ID. */
cert_generic: 16,
/** 0x11: Persona certification of a User ID and Public-Key packet.
* The issuer of this certification has not done any verification of
* the claim that the owner of this key is the User ID specified. */
cert_persona: 17,
/** 0x12: Casual certification of a User ID and Public-Key packet.
* The issuer of this certification has done some casual
* verification of the claim of identity. */
cert_casual: 18,
/** 0x13: Positive certification of a User ID and Public-Key packet.
* The issuer of this certification has done substantial
* verification of the claim of identity.
*
* Most OpenPGP implementations make their "key signatures" as 0x10
* certifications. Some implementations can issue 0x11-0x13
* certifications, but few differentiate between the types. */
cert_positive: 19,
/** 0x30: Certification revocation signature
* This signature revokes an earlier User ID certification signature
* (signature class 0x10 through 0x13) or direct-key signature
* (0x1F). It should be issued by the same key that issued the
* revoked signature or an authorized revocation key. The signature
* is computed over the same data as the certificate that it
* revokes, and should have a later creation date than that
* certificate. */
cert_revocation: 48,
/** 0x18: Subkey Binding Signature
* This signature is a statement by the top-level signing key that
* indicates that it owns the subkey. This signature is calculated
* directly on the primary key and subkey, and not on any User ID or
* other packets. A signature that binds a signing subkey MUST have
* an Embedded Signature subpacket in this binding signature that
* contains a 0x19 signature made by the signing subkey on the
* primary key and subkey. */
subkey_binding: 24,
/** 0x19: Primary Key Binding Signature
* This signature is a statement by a signing subkey, indicating
* that it is owned by the primary key and subkey. This signature
* is calculated the same way as a 0x18 signature: directly on the
* primary key and subkey, and not on any User ID or other packets.
* When a signature is made over a key, the hash data starts with the
* octet 0x99, followed by a two-octet length of the key, and then body
* of the key packet. (Note that this is an old-style packet header for
* a key packet with two-octet length.) A subkey binding signature
* (type 0x18) or primary key binding signature (type 0x19) then hashes
* the subkey using the same format as the main key (also using 0x99 as
* the first octet). */
key_binding: 25,
/** 0x1F: Signature directly on a key
* This signature is calculated directly on a key. It binds the
* information in the Signature subpackets to the key, and is
* appropriate to be used for subpackets that provide information
* about the key, such as the Revocation Key subpacket. It is also
* appropriate for statements that non-self certifiers want to make
* about the key itself, rather than the binding between a key and a
* name. */
key: 31,
/** 0x20: Key revocation signature
* The signature is calculated directly on the key being revoked. A
* revoked key is not to be used. Only revocation signatures by the
* key being revoked, or by an authorized revocation key, should be
* considered valid revocation signatures.a */
key_revocation: 32,
/** 0x28: Subkey revocation signature
* The signature is calculated directly on the subkey being revoked.
* A revoked subkey is not to be used. Only revocation signatures
* by the top-level signature key that is bound to this subkey, or
* by an authorized revocation key, should be considered valid
* revocation signatures.
* Key revocation signatures (types 0x20 and 0x28)
* hash only the key being revoked. */
subkey_revocation: 40,
/** 0x40: Timestamp signature.
* This signature is only meaningful for the timestamp contained in
* it. */
timestamp: 64,
/** 0x50: Third-Party Confirmation signature.
* This signature is a signature over some other OpenPGP Signature
* packet(s). It is analogous to a notary seal on the signed data.
* A third-party signature SHOULD include Signature Target
* subpacket(s) to give easy identification. Note that we really do
* mean SHOULD. There are plausible uses for this (such as a blind
* party that only sees the signature, not the key or source
* document) that cannot include a target subpacket. */
third_party: 80
},
// Asserts validity and converts from string/integer to integer.
write: function(type, e) {
if(typeof n == 'number') {
e = this.read(type, e);
}
if(type[e] != undefined) {
return type[e];
} else throw new Error('Invalid enum value.');
},
// Converts from an integer to string.
read: function(type, e) {
for(var i in type)
if(type[i] == e) return type[e];
throw new Error('Invalid enum value.');
}
}

View File

@ -458,71 +458,8 @@ function _openpgp () {
var openpgp = new _openpgp();
/** RFC4880, section 9.1
* @enum {Integer}
*/
openpgp.publickey = {
rsa_encrypt_sign: 1,
rsa_encrypt: 2,
rsa_sign: 3,
elgamal: 16,
dsa: 17
};
var crypto = require('./crypto');
/** RFC4880, section 9.2
* @enum {Integer}
*/
openpgp.symmetric = {
plaintext: 0,
/** Not implemented! */
idea: 1,
tripledes: 2,
cast5: 3,
blowfish: 4,
aes128: 7,
aes192: 8,
aes256: 9,
twofish: 10
};
/** RFC4880, section 9.3
* @enum {Integer}
*/
openpgp.compression = {
uncompressed: 0,
/** RFC1951 */
zip: 1,
/** RFC1950 */
zlib: 2,
bzip2: 3
};
/** RFC4880, section 9.4
* @enum {Integer}
*/
openpgp.hash = {
md5: 1,
sha1: 2,
ripemd: 3,
sha256: 8,
sha384: 9,
sha512: 10,
sha224: 11
};
module.exports = {
cipher: {
aes: require('./ciphers/symmetric/aes.js'),
des: require('./ciphers/symmetric/dessrc.js'),
cast5: require('./ciphers/symmetric/cast5.js'),
twofish: require('./ciphers/symmetric/twofish.js'),
blowfish: require('./ciphers/symmetric/blowfish.js')
},
hash: {
md5: require('./ciphers/hash/md5.js'),
sha: require('./ciphers/hash/sha.js'),
ripemd: require('./ciphers/hash/ripe-md.js')
},
util: require('./util/util.js')
}
module.exports = crypto;
module.exports.util = require('./util/util.js');

View File

@ -15,6 +15,9 @@
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
var packetlist = require('./packetlist.js'),
enums = require('../enums.js');
/**
* @class
* @classdesc Implementation of the Compressed Data Packet (Tag 8)
@ -25,10 +28,12 @@
* a Signature or One-Pass Signature packet, and contains a literal data
* packet.
*/
function openpgp_packet_compressed() {
this.tag = 8;
this.packets = new openpgp_packetlist();
this.algorithm = openpgp.compression.uncompressed;
function packet_compressed() {
/** @type {packetlist} */
this.packets = new packetlist();
/** @type {compression} */
this.algorithm = 'uncompressed';
this.compressed = null;
@ -42,7 +47,8 @@ function openpgp_packet_compressed() {
*/
this.read = function(bytes) {
// One octet that gives the algorithm used to compress the packet.
this.algorithm = bytes.charCodeAt(0);
this.algorithm = enums.read(enums.compression, bytes.charCodeAt(0));
// Compressed data, which makes up the remainder of the packet.
this.compressed = bytes.substr(1);
@ -55,7 +61,8 @@ function openpgp_packet_compressed() {
if(this.compressed == null)
this.compress();
return String.fromCharCode(this.type) + this.compressed;
return String.fromCharCode(enums.write(enums.compression, this.algorithm))
+ this.compressed;
}
@ -68,12 +75,11 @@ function openpgp_packet_compressed() {
var decompressed;
switch (this.algorithm) {
case openpgp.compression.uncompressed:
case 'uncompressed':
decompressed = this.compressed;
break;
case openpgp.compression.zip:
util.print_info('Decompressed packet [Type 1-ZIP]: ' + this.toString());
case 'zip':
var compData = this.compressed;
var radix = s2r(compData).replace(/\n/g,"");
@ -83,8 +89,7 @@ function openpgp_packet_compressed() {
decompressed = unescape(jxg_obj.deflate()[0][0]);
break;
case openpgp.compression.zlib:
util.print_info('Decompressed packet [Type 2-ZLIB]: ' + this.toString());
case 'zlib':
//RFC 1950. Bits 0-3 Compression Method
var compressionMethod = this.compressed.charCodeAt(0) % 0x10;
@ -106,18 +111,16 @@ function openpgp_packet_compressed() {
}
break;
case openpgp.compression.bzip2:
case 'bzip2':
// TODO: need to implement this
util.print_error("Compression algorithm BZip2 [BZ2] is not implemented.");
throw new Error('Compression algorithm BZip2 [BZ2] is not implemented.');
break;
default:
util.print_error("Compression algorithm unknown :"+this.type);
throw new Error("Compression algorithm unknown :" + this.alogrithm);
break;
}
util.print_debug("decompressed:"+util.hexstrdump(decompressed));
this.packets.read(decompressed);
}
@ -128,22 +131,22 @@ function openpgp_packet_compressed() {
* @return {String} The compressed data stored in attribute compressedData
*/
this.compress = function() {
switch (this.type) {
switch (this.algorithm) {
case openpgp.compression.uncompressed: // - Uncompressed
case 'uncompressed': // - Uncompressed
this.compressed = this.packets.write();
break;
case openpgp.compression.zip: // - ZIP [RFC1951]
case 'zip': // - ZIP [RFC1951]
util.print_error("Compression algorithm ZIP [RFC1951] is not implemented.");
break;
case openpgp.compression.zlib: // - ZLIB [RFC1950]
case 'zlib': // - ZLIB [RFC1950]
// TODO: need to implement this
util.print_error("Compression algorithm ZLIB [RFC1950] is not implemented.");
break;
case openpgp.compression.bzip2: // - BZip2 [BZ2]
case 'bzip2': // - BZip2 [BZ2]
// TODO: need to implement this
util.print_error("Compression algorithm BZip2 [BZ2] is not implemented.");
break;

14
src/packet/index.js Normal file
View File

@ -0,0 +1,14 @@
var enums = require('../enums.js');
module.exports {
list: require('./packetlist.js')
}
// This need to be invoked before we do stuff with individual packets.
for(var i in enums.packets) {
var packet = require('./' + i + '.js');
// Setting the tag in one place.
packet.prototype.tag = enum.packets[i];
}

View File

@ -22,9 +22,8 @@
* RFC4880 5.9: A Literal Data packet contains the body of a message; data that
* is not to be further interpreted.
*/
function openpgp_packet_literal() {
this.tag = 11;
this.format = openpgp_packet_literal.format.utf8;
function literal() {
this.format = 'utf8';
this.data = '';
this.date = new Date();
@ -36,7 +35,7 @@ function openpgp_packet_literal() {
* @param {String} str Any native javascript string
* @param {openpgp_packet_literaldata.format} format
*/
this.set_data = function(str, format) {
this.set = function(str, format) {
this.format = format;
this.data = str;
}
@ -47,10 +46,10 @@ function openpgp_packet_literal() {
* @param {String} bytes The string of bytes
* @param {openpgp_packet_literaldata.format} format
*/
this.set_data_bytes = function(bytes, format) {
this.setBytes = function(bytes, format) {
this.format = format;
if(format == openpgp_packet_literal.format.utf8)
if(format == 'utf8')
bytes = util.decode_utf8(bytes);
this.data = bytes;
@ -60,8 +59,8 @@ function openpgp_packet_literal() {
* Get the byte sequence representing the literal packet data
* @returns {String} A sequence of bytes
*/
this.get_data_bytes = function() {
if(this.format == openpgp_packet_literal.format.utf8)
this.getBytes = function() {
if(this.format == 'utf8')
return util.encode_utf8(this.data);
else
return this.data;
@ -83,7 +82,7 @@ function openpgp_packet_literal() {
this.read = function(bytes) {
// - A one-octet field that describes how the data is formatted.
var format = bytes[0];
var format = enums.read(bytes[0]);
var filename_len = bytes.charCodeAt(1);
this.filename = util.decode_utf8(bytes.substr(2, filename_len));
@ -108,38 +107,12 @@ function openpgp_packet_literal() {
var data = this.get_data_bytes();
var result = '';
result += this.format;
result += enums.write(this.format);
result += String.fromCharCode(filename.length);
result += filename;
result += openpgp_packet_time_write(this.date);
result += data;
return result;
}
/**
* Generates debug output (pretty print)
*
* @return {String} String which gives some information about the keymaterial
*/
this.toString = function() {
return '5.9. Literal Data Packet (Tag 11)\n' + ' length: '
+ this.packetLength + '\n' + ' format: ' + this.format
+ '\n' + ' filename:' + this.filename + '\n'
+ ' date: ' + this.date + '\n' + ' data: |'
+ this.data + '|\n' + ' rdata: |' + this.real_data + '|\n';
}
}
/**
* Data types in the literal packet
* @readonly
* @enum {String}
*/
openpgp_packet_literal.format = {
/** Binary data */
binary: 'b',
/** Text data */
text: 't',
/** Utf8 data */
utf8: 'u'
};

View File

@ -27,8 +27,6 @@
* Such a packet MUST be ignored when received.
*/
function openpgp_packet_marker() {
this.tag = 10;
/**
* Parsing function for a literal data packet (tag 10).
*

View File

@ -26,8 +26,10 @@
* packet to be placed at the end of the message, so that the signer
* can compute the entire signed message in one pass.
*/
function openpgp_packet_one_pass_signature() {
this.tag = 4;
var enums = require('../enums.js');
function packet_one_pass_signature() {
this.version = null; // A one-octet version number. The current version is 3.
this.type = null; // A one-octet signature type. Signature types are described in RFC4880 Section 5.2.1.
this.hashAlgorithm = null; // A one-octet number describing the hash algorithm used. (See RFC4880 9.4)
@ -49,13 +51,14 @@ function openpgp_packet_one_pass_signature() {
// A one-octet signature type. Signature types are described in
// Section 5.2.1.
this.type = bytes.charCodeAt(mypos++);
this.type = enums.read(enums.signature, bytes.charCodeAt(mypos++));
// A one-octet number describing the hash algorithm used.
this.hashAlgorithm = bytes.charCodeAt(mypos++);
this.hashAlgorithm = enums.read(enums.hash, bytes.charCodeAt(mypos++));
// A one-octet number describing the public-key algorithm used.
this.publicKeyAlgorithm = bytes.charCodeAt(mypos++);
this.publicKeyAlgorithm = enums.read(enums.publicKey, bytes.charCodeAt(mypos++));
// An eight-octet number holding the Key ID of the signing key.
this.signingKeyId = new openpgp_type_keyid();
this.signingKeyId.read_packet(bytes,mypos);
@ -80,13 +83,13 @@ function openpgp_packet_one_pass_signature() {
* that describes another signature to be applied to the same message data.
* @return {String} a string representation of a one-pass signature packet
*/
this.write = function(type, hashalgorithm, privatekey,length, nested) {
this.write = function(type, hashalgorithm, privatekey, length, nested) {
var result ="";
result += String.fromCharCode(3);
result += String.fromCharCode(type);
result += String.fromCharCode(this.hashAlgorithm);
result += String.fromCharCode(privatekey.privateKeyPacket.publicKey.publicKeyAlgorithm);
result += String.fromCharCode(enums.write(enums.signature, type));
result += String.fromCharCode(enums.write(enums.hash, this.hashAlgorithm));
result += String.fromCharCode(enums.write(enums.publicKey, privatekey.algorithm));
result += privatekey.getKeyId();
if (nested)
result += String.fromCharCode(0);

5
src/packet/package.json Normal file
View File

@ -0,0 +1,5 @@
{
"name": "openpgp-packets",
"version": "0.0.1",
"main": "./index.js"
}

View File

@ -15,14 +15,11 @@
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
/**
* @class
* @classdesc Parent openpgp packet class. Operations focus on determining
* packet types and packet header.
*/
function _openpgp_packet() {
var enums = require('./enum.js');
this.read_simple_length = function(bytes) {
module.exports = {
readSimpleLength: function(bytes) {
var len = 0,
offset,
type = bytes[0].charCodeAt();
@ -40,7 +37,7 @@ function _openpgp_packet() {
}
return { len: len, offset: offset };
}
},
/**
* Encodes a given integer of length to the openpgp length specifier to a
@ -49,7 +46,7 @@ function _openpgp_packet() {
* @param {Integer} length The length to encode
* @return {String} String with openpgp length representation
*/
this.encode_length = function(length) {
writeSimpleLength: function(length) {
var result = "";
if (length < 192) {
result += String.fromCharCode(length);
@ -78,7 +75,7 @@ function _openpgp_packet() {
* @param {Integer} length Length of the payload
* @return {String} String of the header
*/
this.write_packet_header = function(tag_type, length) {
writeHeader: function(tag_type, length) {
/* we're only generating v4 packet headers here */
var result = "";
result += String.fromCharCode(0xC0 | tag_type);
@ -94,7 +91,7 @@ function _openpgp_packet() {
* @param {Integer} length Length of the payload
* @return {String} String of the header
*/
this.write_old_packet_header = function(tag_type, length) {
writeOldHeader: function(tag_type, length) {
var result = "";
if (length < 256) {
result += String.fromCharCode(0x80 | (tag_type << 2));
@ -299,46 +296,5 @@ function _openpgp_packet() {
offset: mypos + real_packet_length
};
}
/**
* @enum {Integer}
* A list of packet type and numeric tags associated with them.
*/
this.type = {
reserved: 0,
public_key_encrypted_session_key: 1,
signature: 2,
sym_encrypted_session_key: 3,
one_pass_signature: 4,
secret_key: 5,
public_key: 6,
secret_subkey: 7,
compressed: 8,
symmetrically_encrypted: 9,
marker: 10,
literal: 11,
trust: 12,
userid: 13,
public_subkey: 14,
user_attribute: 17,
sym_encrypted_integrity_protected: 18,
modification_detection_code: 19
};
/*
TODO Invoke this code instead of putting a tag variable
inside each and every packet class. Right now we don't
know whether or not they have been loaded yet.
for(var i in this.type) {
var classname = 'openpgp_packet_' + i;
window[classname].prototype.tag = this.type[i];
}
*/
}
var openpgp_packet = new _openpgp_packet();

View File

@ -6,7 +6,7 @@
* Take care when iterating over it - the packets themselves
* are stored as numerical indices.
*/
function openpgp_packetlist() {
function packetlist() {
/** The number of packets contained within the list.
* @readonly
* @type {Integer} */
@ -52,3 +52,5 @@ function openpgp_packetlist() {
}
}
module.exports = packetlist;

View File

@ -134,8 +134,3 @@ function openpgp_packet_public_key() {
}
}
function openpgp_packet_public_subkey() {
openpgp_packet_public_key.call(this);
this.tag = 14;
}

View File

@ -0,0 +1,25 @@
// GPG4Browsers - An OpenPGP implementation in javascript
// Copyright (C) 2011 Recurity Labs GmbH
//
// This library is free software; you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public
// License as published by the Free Software Foundation; either
// version 2.1 of the License, or (at your option) any later version.
//
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
var public_key = require('./public_key.js');
function public_subkey() {
public_key.call(this);
this.tag = 14;
}
module.exports = public_subkey;

View File

@ -307,9 +307,3 @@ function openpgp_packet_secret_key() {
openpgp_packet_secret_key.prototype = new openpgp_packet_public_key();
function openpgp_packet_secret_subkey() {
openpgp_packet_secret_key.call(this);
this.tag = 7;
}

View File

@ -0,0 +1,25 @@
// GPG4Browsers - An OpenPGP implementation in javascript
// Copyright (C) 2011 Recurity Labs GmbH
//
// This library is free software; you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public
// License as published by the Free Software Foundation; either
// version 2.1 of the License, or (at your option) any later version.
//
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
var secret_key = require('./secret_key.js');
function secret_subkey() {
secret_key.call(this);
this.tag = 7;
}
module.exports = secret_subkey.js;

View File

@ -477,110 +477,3 @@ function openpgp_packet_signature() {
}
}
/** One pass signature packet type
* @enum {Integer} */
openpgp_packet_signature.type = {
/** 0x00: Signature of a binary document. */
binary: 0,
/** 0x01: Signature of a canonical text document.
* Canonicalyzing the document by converting line endings. */
text: 1,
/** 0x02: Standalone signature.
* This signature is a signature of only its own subpacket contents.
* It is calculated identically to a signature over a zero-lengh
* binary document. Note that it doesn't make sense to have a V3
* standalone signature. */
standalone: 2,
/** 0x10: Generic certification of a User ID and Public-Key packet.
* The issuer of this certification does not make any particular
* assertion as to how well the certifier has checked that the owner
* of the key is in fact the person described by the User ID. */
cert_generic: 16,
/** 0x11: Persona certification of a User ID and Public-Key packet.
* The issuer of this certification has not done any verification of
* the claim that the owner of this key is the User ID specified. */
cert_persona: 17,
/** 0x12: Casual certification of a User ID and Public-Key packet.
* The issuer of this certification has done some casual
* verification of the claim of identity. */
cert_casual: 18,
/** 0x13: Positive certification of a User ID and Public-Key packet.
* The issuer of this certification has done substantial
* verification of the claim of identity.
*
* Most OpenPGP implementations make their "key signatures" as 0x10
* certifications. Some implementations can issue 0x11-0x13
* certifications, but few differentiate between the types. */
cert_positive: 19,
/** 0x30: Certification revocation signature
* This signature revokes an earlier User ID certification signature
* (signature class 0x10 through 0x13) or direct-key signature
* (0x1F). It should be issued by the same key that issued the
* revoked signature or an authorized revocation key. The signature
* is computed over the same data as the certificate that it
* revokes, and should have a later creation date than that
* certificate. */
cert_revocation: 48,
/** 0x18: Subkey Binding Signature
* This signature is a statement by the top-level signing key that
* indicates that it owns the subkey. This signature is calculated
* directly on the primary key and subkey, and not on any User ID or
* other packets. A signature that binds a signing subkey MUST have
* an Embedded Signature subpacket in this binding signature that
* contains a 0x19 signature made by the signing subkey on the
* primary key and subkey. */
subkey_binding: 24,
/** 0x19: Primary Key Binding Signature
* This signature is a statement by a signing subkey, indicating
* that it is owned by the primary key and subkey. This signature
* is calculated the same way as a 0x18 signature: directly on the
* primary key and subkey, and not on any User ID or other packets.
* When a signature is made over a key, the hash data starts with the
* octet 0x99, followed by a two-octet length of the key, and then body
* of the key packet. (Note that this is an old-style packet header for
* a key packet with two-octet length.) A subkey binding signature
* (type 0x18) or primary key binding signature (type 0x19) then hashes
* the subkey using the same format as the main key (also using 0x99 as
* the first octet). */
key_binding: 25,
/** 0x1F: Signature directly on a key
* This signature is calculated directly on a key. It binds the
* information in the Signature subpackets to the key, and is
* appropriate to be used for subpackets that provide information
* about the key, such as the Revocation Key subpacket. It is also
* appropriate for statements that non-self certifiers want to make
* about the key itself, rather than the binding between a key and a
* name. */
key: 31,
/** 0x20: Key revocation signature
* The signature is calculated directly on the key being revoked. A
* revoked key is not to be used. Only revocation signatures by the
* key being revoked, or by an authorized revocation key, should be
* considered valid revocation signatures.a */
key_revocation: 32,
/** 0x28: Subkey revocation signature
* The signature is calculated directly on the subkey being revoked.
* A revoked subkey is not to be used. Only revocation signatures
* by the top-level signature key that is bound to this subkey, or
* by an authorized revocation key, should be considered valid
* revocation signatures.
* Key revocation signatures (types 0x20 and 0x28)
* hash only the key being revoked. */
subkey_revocation: 40,
/** 0x40: Timestamp signature.
* This signature is only meaningful for the timestamp contained in
* it. */
timestamp: 64,
/** 0x50: Third-Party Confirmation signature.
* This signature is a signature over some other OpenPGP Signature
* packet(s). It is analogous to a notary seal on the signed data.
* A third-party signature SHOULD include Signature Target
* subpacket(s) to give easy identification. Note that we really do
* mean SHOULD. There are plausible uses for this (such as a blind
* party that only sees the signature, not the key or source
* document) that cannot include a target subpacket. */
third_party: 80
}

View File

@ -15,6 +15,8 @@
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
var util = require('../util/util.js');
/**
* @class
* @classdesc Implementation of the User ID Packet (Tag 13)
@ -24,13 +26,11 @@
* restrictions on its content. The packet length in the header
* specifies the length of the User ID.
*/
function openpgp_packet_userid() {
function packet_userid() {
/** @type {String} A string containing the user id. Usually in the form
* John Doe <john@example.com>
*/
this.userid = '';
this.tag = 13;
/**
@ -54,3 +54,5 @@ function openpgp_packet_userid() {
return util.encode_utf8(this.userid);
}
}
module.exports = packet_userid;

View File

@ -1,10 +1,11 @@
var openpgp = require('openpgp')
var util = openpgp.util,
keyExpansion = openpgp.cipher.aes.keyExpansion,
AESencrypt = openpgp.cipher.aes.AESencrypt;
unittests.register("AES Rijndael cipher test with test vectors from ecb_tbl.txt", function() {
var util = openpgp.util,
keyExpansion = openpgp.cipher.aes.keyExpansion,
AESencrypt = openpgp.cipher.aes.AESencrypt;
var result = new Array();
function test_aes(input, key, output) {
return (util.hexstrdump(util.bin2str(AESencrypt(input,keyExpansion(util.bin2str(key))))) == util.hexstrdump(util.bin2str(output)));

View File

@ -76,7 +76,7 @@
</style>
<script type="text/javascript">
util.debug = true;
require('openpgp').util.debug = true;
function unit_tests() {