Allow dead code elimination
This commit is contained in:
parent
c20b75252b
commit
fb3d23427d
29
package-lock.json
generated
29
package-lock.json
generated
|
@ -722,6 +722,15 @@
|
|||
"integrity": "sha1-p9BVi9icQveV3UIyj3QIMcpTvCU=",
|
||||
"dev": true
|
||||
},
|
||||
"commander": {
|
||||
"version": "2.8.1",
|
||||
"resolved": "https://registry.npmjs.org/commander/-/commander-2.8.1.tgz",
|
||||
"integrity": "sha1-Br42f+v9oMMwqh4qBy09yXYkJdQ=",
|
||||
"dev": true,
|
||||
"requires": {
|
||||
"graceful-readlink": ">= 1.0.0"
|
||||
}
|
||||
},
|
||||
"commondir": {
|
||||
"version": "1.0.1",
|
||||
"resolved": "https://registry.npmjs.org/commondir/-/commondir-1.0.1.tgz",
|
||||
|
@ -2815,9 +2824,8 @@
|
|||
}
|
||||
},
|
||||
"pako": {
|
||||
"version": "1.0.6",
|
||||
"resolved": "https://registry.npmjs.org/pako/-/pako-1.0.6.tgz",
|
||||
"integrity": "sha512-lQe48YPsMJAig+yngZ87Lus+NF+3mtu7DVOBu6b/gHO1YpKwIj5AWjZ/TOS7i46HD/UixzWb1zeWDZfGZ3iYcg==",
|
||||
"version": "github:openpgpjs/pako#f38f7368a5fa511e54b95add2f04444c3a9d803f",
|
||||
"from": "github:openpgpjs/pako#f38f7368a5fa511e54b95add2f04444c3a9d803f",
|
||||
"dev": true
|
||||
},
|
||||
"parse-json": {
|
||||
|
@ -3168,22 +3176,11 @@
|
|||
"dev": true
|
||||
},
|
||||
"seek-bzip": {
|
||||
"version": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
|
||||
"from": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
|
||||
"version": "github:openpgpjs/seek-bzip#4b89457f20c0e1921b4689106a31c99782c29829",
|
||||
"from": "github:openpgpjs/seek-bzip#4b89457f20c0e1921b4689106a31c99782c29829",
|
||||
"dev": true,
|
||||
"requires": {
|
||||
"commander": "~2.8.1"
|
||||
},
|
||||
"dependencies": {
|
||||
"commander": {
|
||||
"version": "2.8.1",
|
||||
"resolved": "https://registry.npmjs.org/commander/-/commander-2.8.1.tgz",
|
||||
"integrity": "sha1-Br42f+v9oMMwqh4qBy09yXYkJdQ=",
|
||||
"dev": true,
|
||||
"requires": {
|
||||
"graceful-readlink": ">= 1.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"semver": {
|
||||
|
|
|
@ -62,10 +62,10 @@
|
|||
"jsdoc": "github:openpgpjs/jsdoc#0f1816eb4553856647b4ca9561b9307b11ec4f9e",
|
||||
"mocha": "^5.0.0",
|
||||
"nyc": "^14.1.1",
|
||||
"pako": "^1.0.6",
|
||||
"pako": "github:openpgpjs/pako#f38f7368a5fa511e54b95add2f04444c3a9d803f",
|
||||
"rollup": "^2.7.2",
|
||||
"rollup-plugin-terser": "^5.3.0",
|
||||
"seek-bzip": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
|
||||
"seek-bzip": "github:openpgpjs/seek-bzip#4b89457f20c0e1921b4689106a31c99782c29829",
|
||||
"sinon": "^4.3.0",
|
||||
"text-encoding-utf-8": "^1.0.2",
|
||||
"tweetnacl": "github:openpgpjs/tweetnacl-js#3dae25bd3eaa77173f3405676b595721dde92eec",
|
||||
|
|
|
@ -20,6 +20,10 @@ const terserOptions = {
|
|||
ecma: 2017,
|
||||
compress: {
|
||||
unsafe: true
|
||||
},
|
||||
output: {
|
||||
comments: '/^(?:!|#__)/',
|
||||
preserve_annotations: true
|
||||
}
|
||||
};
|
||||
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
import armor from './encoding/armor';
|
||||
import enums from './enums';
|
||||
import util from './util';
|
||||
import packet from './packet';
|
||||
import { PacketList, LiteralDataPacket, SignaturePacket } from './packet';
|
||||
import { Signature } from './signature';
|
||||
import { createVerificationObjects, createSignaturePackets } from './message';
|
||||
|
||||
|
@ -47,7 +47,7 @@ export function CleartextMessage(text, signature) {
|
|||
if (signature && !(signature instanceof Signature)) {
|
||||
throw new Error('Invalid signature input');
|
||||
}
|
||||
this.signature = signature || new Signature(new packet.List());
|
||||
this.signature = signature || new Signature(new PacketList());
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -86,7 +86,7 @@ CleartextMessage.prototype.sign = async function(privateKeys, signature = null,
|
|||
* @async
|
||||
*/
|
||||
CleartextMessage.prototype.signDetached = async function(privateKeys, signature = null, date = new Date(), userIds = []) {
|
||||
const literalDataPacket = new packet.Literal();
|
||||
const literalDataPacket = new LiteralDataPacket();
|
||||
literalDataPacket.setText(this.text);
|
||||
|
||||
return new Signature(await createSignaturePackets(literalDataPacket, privateKeys, signature, date, userIds, true));
|
||||
|
@ -112,7 +112,7 @@ CleartextMessage.prototype.verify = function(keys, date = new Date()) {
|
|||
*/
|
||||
CleartextMessage.prototype.verifyDetached = function(signature, keys, date = new Date()) {
|
||||
const signatureList = signature.packets;
|
||||
const literalDataPacket = new packet.Literal();
|
||||
const literalDataPacket = new LiteralDataPacket();
|
||||
// we assume that cleartext signature is generated based on UTF8 cleartext
|
||||
literalDataPacket.setText(this.text);
|
||||
return createVerificationObjects(signatureList, [literalDataPacket], keys, date, true);
|
||||
|
@ -157,8 +157,8 @@ export async function readArmored(armoredText) {
|
|||
if (input.type !== enums.armor.signed) {
|
||||
throw new Error('No cleartext signed message.');
|
||||
}
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(input.data);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(input.data, { SignaturePacket });
|
||||
verifyHeaders(input.headers, packetlist);
|
||||
const signature = new Signature(packetlist);
|
||||
return new CleartextMessage(input.text, signature);
|
||||
|
@ -167,7 +167,7 @@ export async function readArmored(armoredText) {
|
|||
/**
|
||||
* Compare hash algorithm specified in the armor header with signatures
|
||||
* @param {Array<String>} headers Armor headers
|
||||
* @param {module:packet.List} packetlist The packetlist with signature packets
|
||||
* @param {PacketList} packetlist The packetlist with signature packets
|
||||
* @private
|
||||
*/
|
||||
function verifyHeaders(headers, packetlist) {
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
* @fileoverview Provides EME-PKCS1-v1_5 encoding and decoding and EMSA-PKCS1-v1_5 encoding function
|
||||
* @see module:crypto/public_key/rsa
|
||||
* @see module:crypto/public_key/elliptic/ecdh
|
||||
* @see module:packet.PublicKeyEncryptedSessionKey
|
||||
* @see PublicKeyEncryptedSessionKeyPacket
|
||||
* @requires crypto/random
|
||||
* @requires crypto/hash
|
||||
* @requires util
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
|
||||
/**
|
||||
* @fileoverview Functions to add and remove PKCS5 padding
|
||||
* @see module:packet.PublicKeyEncryptedSessionKey
|
||||
* @see PublicKeyEncryptedSessionKeyPacket
|
||||
* @module crypto/pkcs5
|
||||
*/
|
||||
|
||||
|
|
12
src/enums.js
12
src/enums.js
|
@ -196,17 +196,17 @@ export default {
|
|||
secretKey: 5,
|
||||
publicKey: 6,
|
||||
secretSubkey: 7,
|
||||
compressed: 8,
|
||||
symmetricallyEncrypted: 9,
|
||||
compressedData: 8,
|
||||
symmetricallyEncryptedData: 9,
|
||||
marker: 10,
|
||||
literal: 11,
|
||||
literalData: 11,
|
||||
trust: 12,
|
||||
userid: 13,
|
||||
userID: 13,
|
||||
publicSubkey: 14,
|
||||
userAttribute: 17,
|
||||
symEncryptedIntegrityProtected: 18,
|
||||
symEncryptedIntegrityProtectedData: 18,
|
||||
modificationDetectionCode: 19,
|
||||
symEncryptedAEADProtected: 20 // see IETF draft: https://tools.ietf.org/html/draft-ford-openpgp-format-00#section-2.1
|
||||
symEncryptedAEADProtectedData: 20 // see IETF draft: https://tools.ietf.org/html/draft-ford-openpgp-format-00#section-2.1
|
||||
},
|
||||
|
||||
/** Data types in the literal packet
|
||||
|
|
|
@ -51,7 +51,7 @@ export { default as util } from './util';
|
|||
* @see module:packet
|
||||
* @name module:openpgp.packet
|
||||
*/
|
||||
export { default as packet } from './packet';
|
||||
export * from './packet';
|
||||
|
||||
/**
|
||||
* @see module:type/mpi
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
* @module key/factory
|
||||
*/
|
||||
|
||||
import packet from '../packet';
|
||||
import { PacketList, UserIDPacket, SignaturePacket } from '../packet';
|
||||
import Key from './key';
|
||||
import * as helper from './helper';
|
||||
import enums from '../enums';
|
||||
|
@ -147,7 +147,7 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) {
|
|||
}
|
||||
}));
|
||||
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
|
||||
packetlist.push(secretKeyPacket);
|
||||
|
||||
|
@ -165,13 +165,13 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) {
|
|||
return algos;
|
||||
}
|
||||
|
||||
const userIdPacket = new packet.Userid();
|
||||
const userIdPacket = new UserIDPacket();
|
||||
userIdPacket.format(userId);
|
||||
|
||||
const dataToSign = {};
|
||||
dataToSign.userId = userIdPacket;
|
||||
dataToSign.key = secretKeyPacket;
|
||||
const signaturePacket = new packet.Signature(options.date);
|
||||
const signaturePacket = new SignaturePacket(options.date);
|
||||
signaturePacket.signatureType = enums.signature.certGeneric;
|
||||
signaturePacket.publicKeyAlgorithm = secretKeyPacket.algorithm;
|
||||
signaturePacket.hashAlgorithm = await helper.getPreferredHashAlgo(null, secretKeyPacket);
|
||||
|
@ -270,8 +270,8 @@ async function wrapKeyObject(secretKeyPacket, secretSubkeyPackets, options) {
|
|||
* @static
|
||||
*/
|
||||
export async function read(data) {
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(data);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(data, helper.allowedKeyPackets);
|
||||
return new Key(packetlist);
|
||||
}
|
||||
|
||||
|
@ -299,8 +299,8 @@ export async function readArmored(armoredKey) {
|
|||
*/
|
||||
export async function readAll(data) {
|
||||
const keys = [];
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(data);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(data, helper.allowedKeyPackets);
|
||||
const keyIndex = packetlist.indexOfTag(enums.packet.publicKey, enums.packet.secretKey);
|
||||
if (keyIndex.length === 0) {
|
||||
throw new Error('No key packet found');
|
||||
|
|
|
@ -7,14 +7,32 @@
|
|||
* @module key/helper
|
||||
*/
|
||||
|
||||
import packet from '../packet';
|
||||
import {
|
||||
PublicKeyPacket,
|
||||
PublicSubkeyPacket,
|
||||
SecretKeyPacket,
|
||||
SecretSubkeyPacket,
|
||||
UserIDPacket,
|
||||
UserAttributePacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
import enums from '../enums';
|
||||
import config from '../config';
|
||||
import crypto from '../crypto';
|
||||
import util from '../util';
|
||||
|
||||
export const allowedKeyPackets = {
|
||||
PublicKeyPacket,
|
||||
PublicSubkeyPacket,
|
||||
SecretKeyPacket,
|
||||
SecretSubkeyPacket,
|
||||
UserIDPacket,
|
||||
UserAttributePacket,
|
||||
SignaturePacket
|
||||
};
|
||||
|
||||
export async function generateSecretSubkey(options) {
|
||||
const secretSubkeyPacket = new packet.SecretSubkey(options.date);
|
||||
const secretSubkeyPacket = new SecretSubkeyPacket(options.date);
|
||||
secretSubkeyPacket.packets = null;
|
||||
secretSubkeyPacket.algorithm = enums.read(enums.publicKey, options.algorithm);
|
||||
await secretSubkeyPacket.generate(options.rsaBits, options.curve);
|
||||
|
@ -22,7 +40,7 @@ export async function generateSecretSubkey(options) {
|
|||
}
|
||||
|
||||
export async function generateSecretKey(options) {
|
||||
const secretKeyPacket = new packet.SecretKey(options.date);
|
||||
const secretKeyPacket = new SecretKeyPacket(options.date);
|
||||
secretKeyPacket.packets = null;
|
||||
secretKeyPacket.algorithm = enums.read(enums.publicKey, options.algorithm);
|
||||
await secretKeyPacket.generate(options.rsaBits, options.curve);
|
||||
|
@ -31,9 +49,9 @@ export async function generateSecretKey(options) {
|
|||
|
||||
/**
|
||||
* Returns the valid and non-expired signature that has the latest creation date, while ignoring signatures created in the future.
|
||||
* @param {Array<module:packet.Signature>} signatures List of signatures
|
||||
* @param {Array<SignaturePacket>} signatures List of signatures
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<module:packet.Signature>} The latest valid signature
|
||||
* @returns {Promise<SignaturePacket>} The latest valid signature
|
||||
* @async
|
||||
*/
|
||||
export async function getLatestValidSignature(signatures, primaryKey, signatureType, dataToVerify, date = new Date()) {
|
||||
|
@ -76,15 +94,15 @@ export function isDataExpired(keyPacket, signature, date = new Date()) {
|
|||
|
||||
/**
|
||||
* Create Binding signature to the key according to the {@link https://tools.ietf.org/html/rfc4880#section-5.2.1}
|
||||
* @param {module:packet.SecretSubkey} subkey Subkey key packet
|
||||
* @param {module:packet.SecretKey} primaryKey Primary key packet
|
||||
* @param {SecretSubkeyPacket} subkey Subkey key packet
|
||||
* @param {SecretKeyPacket} primaryKey Primary key packet
|
||||
* @param {Object} options
|
||||
*/
|
||||
export async function createBindingSignature(subkey, primaryKey, options) {
|
||||
const dataToSign = {};
|
||||
dataToSign.key = primaryKey;
|
||||
dataToSign.bind = subkey;
|
||||
const subkeySignaturePacket = new packet.Signature(options.date);
|
||||
const subkeySignaturePacket = new SignaturePacket(options.date);
|
||||
subkeySignaturePacket.signatureType = enums.signature.subkeyBinding;
|
||||
subkeySignaturePacket.publicKeyAlgorithm = primaryKey.algorithm;
|
||||
subkeySignaturePacket.hashAlgorithm = await getPreferredHashAlgo(null, subkey);
|
||||
|
@ -107,7 +125,7 @@ export async function createBindingSignature(subkey, primaryKey, options) {
|
|||
/**
|
||||
* Returns the preferred signature hash algorithm of a key
|
||||
* @param {module:key.Key} key (optional) the key to get preferences from
|
||||
* @param {module:packet.SecretKey|module:packet.SecretSubkey} keyPacket key packet used for signing
|
||||
* @param {SecretKeyPacket|SecretSubkeyPacket} keyPacket key packet used for signing
|
||||
* @param {Date} date (optional) use the given date for verification instead of the current time
|
||||
* @param {Object} userId (optional) user ID
|
||||
* @returns {Promise<String>}
|
||||
|
@ -125,10 +143,10 @@ export async function getPreferredHashAlgo(key, keyPacket, date = new Date(), us
|
|||
}
|
||||
}
|
||||
switch (Object.getPrototypeOf(keyPacket)) {
|
||||
case packet.SecretKey.prototype:
|
||||
case packet.PublicKey.prototype:
|
||||
case packet.SecretSubkey.prototype:
|
||||
case packet.PublicSubkey.prototype:
|
||||
case SecretKeyPacket.prototype:
|
||||
case PublicKeyPacket.prototype:
|
||||
case SecretSubkeyPacket.prototype:
|
||||
case PublicSubkeyPacket.prototype:
|
||||
switch (keyPacket.algorithm) {
|
||||
case 'ecdh':
|
||||
case 'ecdsa':
|
||||
|
@ -182,8 +200,8 @@ export async function getPreferredAlgo(type, keys, date = new Date(), userIds =
|
|||
/**
|
||||
* Create signature packet
|
||||
* @param {Object} dataToSign Contains packets to be signed
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.SecretSubkey} signingKeyPacket secret key packet for signing
|
||||
* @param {SecretKeyPacket|
|
||||
* SecretSubkeyPacket} signingKeyPacket secret key packet for signing
|
||||
* @param {Object} signatureProperties (optional) properties to write on the signature packet before signing
|
||||
* @param {Date} date (optional) override the creationtime of the signature
|
||||
* @param {Object} userId (optional) user ID
|
||||
|
@ -195,7 +213,7 @@ export async function createSignaturePacket(dataToSign, privateKey, signingKeyPa
|
|||
if (!signingKeyPacket.isDecrypted()) {
|
||||
throw new Error('Private key is not decrypted.');
|
||||
}
|
||||
const signaturePacket = new packet.Signature(date);
|
||||
const signaturePacket = new SignaturePacket(date);
|
||||
Object.assign(signaturePacket, signatureProperties);
|
||||
signaturePacket.publicKeyAlgorithm = signingKeyPacket.algorithm;
|
||||
signaturePacket.hashAlgorithm = await getPreferredHashAlgo(privateKey, signingKeyPacket, date, userId);
|
||||
|
@ -231,15 +249,15 @@ export async function mergeSignatures(source, dest, attr, checkFn) {
|
|||
|
||||
/**
|
||||
* Checks if a given certificate or binding signature is revoked
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {Object} dataToVerify The data to check
|
||||
* @param {Array<module:packet.Signature>} revocations The revocation signatures to check
|
||||
* @param {module:packet.Signature} signature The certificate or signature to check
|
||||
* @param {module:packet.PublicSubkey|
|
||||
* module:packet.SecretSubkey|
|
||||
* module:packet.PublicKey|
|
||||
* module:packet.SecretKey} key, optional The key packet to check the signature
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Object} dataToVerify The data to check
|
||||
* @param {Array<SignaturePacket>} revocations The revocation signatures to check
|
||||
* @param {SignaturePacket} signature The certificate or signature to check
|
||||
* @param {PublicSubkeyPacket|
|
||||
* SecretSubkeyPacket|
|
||||
* PublicKeyPacket|
|
||||
* SecretKeyPacket} key, optional The key packet to check the signature
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Boolean>} True if the signature revokes the data
|
||||
* @async
|
||||
|
|
|
@ -26,7 +26,12 @@
|
|||
*/
|
||||
|
||||
import armor from '../encoding/armor';
|
||||
import packet from '../packet';
|
||||
import {
|
||||
PacketList,
|
||||
PublicKeyPacket,
|
||||
PublicSubkeyPacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import User from './user';
|
||||
|
@ -37,13 +42,13 @@ import * as helper from './helper';
|
|||
* @class
|
||||
* @classdesc Class that represents an OpenPGP key. Must contain a primary key.
|
||||
* Can contain additional subkeys, signatures, user ids, user attributes.
|
||||
* @param {module:packet.List} packetlist The packets that form this key
|
||||
* @borrows module:packet.PublicKey#getKeyId as Key#getKeyId
|
||||
* @borrows module:packet.PublicKey#getFingerprint as Key#getFingerprint
|
||||
* @borrows module:packet.PublicKey#hasSameFingerprintAs as Key#hasSameFingerprintAs
|
||||
* @borrows module:packet.PublicKey#getAlgorithmInfo as Key#getAlgorithmInfo
|
||||
* @borrows module:packet.PublicKey#getCreationTime as Key#getCreationTime
|
||||
* @borrows module:packet.PublicKey#isDecrypted as Key#isDecrypted
|
||||
* @param {PacketList} packetlist The packets that form this key
|
||||
* @borrows PublicKeyPacket#getKeyId as Key#getKeyId
|
||||
* @borrows PublicKeyPacket#getFingerprint as Key#getFingerprint
|
||||
* @borrows PublicKeyPacket#hasSameFingerprintAs as Key#hasSameFingerprintAs
|
||||
* @borrows PublicKeyPacket#getAlgorithmInfo as Key#getAlgorithmInfo
|
||||
* @borrows PublicKeyPacket#getCreationTime as Key#getCreationTime
|
||||
* @borrows PublicKeyPacket#isDecrypted as Key#isDecrypted
|
||||
*/
|
||||
export default function Key(packetlist) {
|
||||
if (!(this instanceof Key)) {
|
||||
|
@ -71,7 +76,7 @@ Object.defineProperty(Key.prototype, 'primaryKey', {
|
|||
|
||||
/**
|
||||
* Transforms packetlist to structured key data
|
||||
* @param {module:packet.List} packetlist The packets that form a key
|
||||
* @param {PacketList} packetlist The packets that form a key
|
||||
*/
|
||||
Key.prototype.packetlist2structure = function(packetlist) {
|
||||
let user;
|
||||
|
@ -87,7 +92,7 @@ Key.prototype.packetlist2structure = function(packetlist) {
|
|||
this.keyPacket = packetlist[i];
|
||||
primaryKeyId = this.getKeyId();
|
||||
break;
|
||||
case enums.packet.userid:
|
||||
case enums.packet.userID:
|
||||
case enums.packet.userAttribute:
|
||||
user = new User(packetlist[i]);
|
||||
this.users.push(user);
|
||||
|
@ -149,10 +154,10 @@ Key.prototype.packetlist2structure = function(packetlist) {
|
|||
|
||||
/**
|
||||
* Transforms structured key data to packetlist
|
||||
* @returns {module:packet.List} The packets that form a key
|
||||
* @returns {PacketList} The packets that form a key
|
||||
*/
|
||||
Key.prototype.toPacketlist = function() {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
packetlist.push(this.keyPacket);
|
||||
packetlist.concat(this.revocationSignatures);
|
||||
packetlist.concat(this.directSignatures);
|
||||
|
@ -169,8 +174,8 @@ Key.prototype.toPacketlist = function() {
|
|||
*/
|
||||
Key.prototype.clone = async function(deep = false) {
|
||||
if (deep) {
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(this.toPacketlist().write());
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(this.toPacketlist().write(), helper.allowedKeyPackets);
|
||||
return new Key(packetlist);
|
||||
}
|
||||
return new Key(this.toPacketlist());
|
||||
|
@ -245,7 +250,7 @@ Key.prototype.isPrivate = function() {
|
|||
* @returns {module:key.Key} new public Key
|
||||
*/
|
||||
Key.prototype.toPublic = function() {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
const keyPackets = this.toPacketlist();
|
||||
let bytes;
|
||||
let pubKeyPacket;
|
||||
|
@ -254,13 +259,13 @@ Key.prototype.toPublic = function() {
|
|||
switch (keyPackets[i].tag) {
|
||||
case enums.packet.secretKey:
|
||||
bytes = keyPackets[i].writePublicKey();
|
||||
pubKeyPacket = new packet.PublicKey();
|
||||
pubKeyPacket = new PublicKeyPacket();
|
||||
pubKeyPacket.read(bytes);
|
||||
packetlist.push(pubKeyPacket);
|
||||
break;
|
||||
case enums.packet.secretSubkey:
|
||||
bytes = keyPackets[i].writePublicKey();
|
||||
pubSubkeyPacket = new packet.PublicSubkey();
|
||||
pubSubkeyPacket = new PublicSubkeyPacket();
|
||||
pubSubkeyPacket.read(bytes);
|
||||
packetlist.push(pubSubkeyPacket);
|
||||
break;
|
||||
|
@ -395,7 +400,7 @@ Key.prototype.getDecryptionKeys = async function(keyId, date = new Date(), userI
|
|||
* Encrypts all secret key and subkey packets matching keyId
|
||||
* @param {String|Array<String>} passphrases - if multiple passphrases, then should be in same order as packets each should encrypt
|
||||
* @param {module:type/keyid} keyId
|
||||
* @returns {Promise<Array<module:packet.SecretKey|module:packet.SecretSubkey>>}
|
||||
* @returns {Promise<Array<SecretKeyPacket|SecretSubkeyPacket>>}
|
||||
* @async
|
||||
*/
|
||||
Key.prototype.encrypt = async function(passphrases, keyId = null) {
|
||||
|
@ -516,12 +521,11 @@ Key.prototype.clearPrivateParams = function () {
|
|||
|
||||
/**
|
||||
* Checks if a signature on a key is revoked
|
||||
* @param {module:packet.SecretKey|
|
||||
* @param {module:packet.Signature} signature The signature to verify
|
||||
* @param {module:packet.PublicSubkey|
|
||||
* module:packet.SecretSubkey|
|
||||
* module:packet.PublicKey|
|
||||
* module:packet.SecretKey} key, optional The key to verify the signature
|
||||
* @param {SignaturePacket} signature The signature to verify
|
||||
* @param {PublicSubkeyPacket|
|
||||
* SecretSubkeyPacket|
|
||||
* PublicKeyPacket|
|
||||
* SecretKeyPacket} key, optional The key to verify the signature
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Boolean>} True if the certificate is revoked
|
||||
* @async
|
||||
|
@ -602,7 +606,7 @@ Key.prototype.getExpirationTime = async function(capabilities, keyId, userId) {
|
|||
* @param {Date} date (optional) use the given date for verification instead of the current time
|
||||
* @param {Object} userId (optional) user ID to get instead of the primary user, if it exists
|
||||
* @returns {Promise<{user: module:key.User,
|
||||
* selfCertification: module:packet.Signature}>} The primary user and the self signature
|
||||
* selfCertification: SignaturePacket}>} The primary user and the self signature
|
||||
* @async
|
||||
*/
|
||||
Key.prototype.getPrimaryUser = async function(date = new Date(), userId = {}) {
|
||||
|
@ -750,7 +754,7 @@ Key.prototype.revoke = async function({
|
|||
Key.prototype.getRevocationCertificate = async function(date = new Date()) {
|
||||
const dataToVerify = { key: this.keyPacket };
|
||||
const revocationSignature = await helper.getLatestValidSignature(this.revocationSignatures, this.keyPacket, enums.signature.keyRevocation, dataToVerify, date);
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
packetlist.push(revocationSignature);
|
||||
return armor.encode(enums.armor.publicKey, packetlist.write(), null, null, 'This is a revocation certificate');
|
||||
};
|
||||
|
@ -765,8 +769,8 @@ Key.prototype.getRevocationCertificate = async function(date = new Date()) {
|
|||
*/
|
||||
Key.prototype.applyRevocationCertificate = async function(revocationCertificate) {
|
||||
const input = await armor.decode(revocationCertificate);
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(input.data);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(input.data, { SignaturePacket });
|
||||
const revocationSignature = packetlist.findPacket(enums.packet.signature);
|
||||
if (!revocationSignature || revocationSignature.signatureType !== enums.signature.keyRevocation) {
|
||||
throw new Error('Could not find revocation signature packet');
|
||||
|
|
|
@ -7,17 +7,17 @@
|
|||
|
||||
import enums from '../enums';
|
||||
import * as helper from './helper';
|
||||
import packet from '../packet';
|
||||
import { PacketList } from '../packet';
|
||||
|
||||
/**
|
||||
* @class
|
||||
* @classdesc Class that represents a subkey packet and the relevant signatures.
|
||||
* @borrows module:packet.PublicSubkey#getKeyId as SubKey#getKeyId
|
||||
* @borrows module:packet.PublicSubkey#getFingerprint as SubKey#getFingerprint
|
||||
* @borrows module:packet.PublicSubkey#hasSameFingerprintAs as SubKey#hasSameFingerprintAs
|
||||
* @borrows module:packet.PublicSubkey#getAlgorithmInfo as SubKey#getAlgorithmInfo
|
||||
* @borrows module:packet.PublicSubkey#getCreationTime as SubKey#getCreationTime
|
||||
* @borrows module:packet.PublicSubkey#isDecrypted as SubKey#isDecrypted
|
||||
* @borrows PublicSubkeyPacket#getKeyId as SubKey#getKeyId
|
||||
* @borrows PublicSubkeyPacket#getFingerprint as SubKey#getFingerprint
|
||||
* @borrows PublicSubkeyPacket#hasSameFingerprintAs as SubKey#hasSameFingerprintAs
|
||||
* @borrows PublicSubkeyPacket#getAlgorithmInfo as SubKey#getAlgorithmInfo
|
||||
* @borrows PublicSubkeyPacket#getCreationTime as SubKey#getCreationTime
|
||||
* @borrows PublicSubkeyPacket#isDecrypted as SubKey#isDecrypted
|
||||
*/
|
||||
export default function SubKey(subKeyPacket) {
|
||||
if (!(this instanceof SubKey)) {
|
||||
|
@ -30,10 +30,10 @@ export default function SubKey(subKeyPacket) {
|
|||
|
||||
/**
|
||||
* Transforms structured subkey data to packetlist
|
||||
* @returns {module:packet.List}
|
||||
* @returns {PacketListPacket}
|
||||
*/
|
||||
SubKey.prototype.toPacketlist = function() {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
packetlist.push(this.keyPacket);
|
||||
packetlist.concat(this.revocationSignatures);
|
||||
packetlist.concat(this.bindingSignatures);
|
||||
|
@ -42,13 +42,13 @@ SubKey.prototype.toPacketlist = function() {
|
|||
|
||||
/**
|
||||
* Checks if a binding signature of a subkey is revoked
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {module:packet.Signature} signature The binding signature to verify
|
||||
* @param {module:packet.PublicSubkey|
|
||||
* module:packet.SecretSubkey|
|
||||
* module:packet.PublicKey|
|
||||
* module:packet.SecretKey} key, optional The key to verify the signature
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {SignaturePacket} signature The binding signature to verify
|
||||
* @param {PublicSubkeyPacket|
|
||||
* SecretSubkeyPacket|
|
||||
* PublicKeyPacket|
|
||||
* SecretKeyPacket} key, optional The key to verify the signature
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Boolean>} True if the binding signature is revoked
|
||||
* @async
|
||||
|
@ -66,9 +66,9 @@ SubKey.prototype.isRevoked = async function(primaryKey, signature, key, date = n
|
|||
/**
|
||||
* Verify subkey. Checks for revocation signatures, expiration time
|
||||
* and valid binding signature. Throws if the subkey is invalid.
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<undefined>}
|
||||
* @async
|
||||
*/
|
||||
|
@ -89,9 +89,9 @@ SubKey.prototype.verify = async function(primaryKey, date = new Date()) {
|
|||
/**
|
||||
* Returns the expiration time of the subkey or Infinity if key does not expire
|
||||
* Returns null if the subkey is invalid.
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Date | Infinity | null>}
|
||||
* @async
|
||||
*/
|
||||
|
@ -110,9 +110,9 @@ SubKey.prototype.getExpirationTime = async function(primaryKey, date = new Date(
|
|||
|
||||
/**
|
||||
* Update subkey with new components from specified subkey
|
||||
* @param {module:key~SubKey} subKey Source subkey to merge
|
||||
* @param {module:packet.SecretKey|
|
||||
module:packet.SecretSubkey} primaryKey primary key used for validation
|
||||
* @param {module:key~SubKey} subKey Source subkey to merge
|
||||
* @param {SecretKeyPacket|
|
||||
SecretSubkeyPacket} primaryKey primary key used for validation
|
||||
* @returns {Promise<undefined>}
|
||||
* @async
|
||||
*/
|
||||
|
@ -151,7 +151,7 @@ SubKey.prototype.update = async function(subKey, primaryKey) {
|
|||
|
||||
/**
|
||||
* Revokes the subkey
|
||||
* @param {module:packet.SecretKey} primaryKey decrypted private primary key for revocation
|
||||
* @param {SecretKeyPacket} primaryKey decrypted private primary key for revocation
|
||||
* @param {Object} reasonForRevocation optional, object indicating the reason for revocation
|
||||
* @param {module:enums.reasonForRevocation} reasonForRevocation.flag optional, flag indicating the reason for revocation
|
||||
* @param {String} reasonForRevocation.string optional, string explaining the reason for revocation
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import packet from '../packet';
|
||||
import { PacketList } from '../packet';
|
||||
import { mergeSignatures, isDataRevoked, createSignaturePacket } from './helper';
|
||||
|
||||
/**
|
||||
|
@ -19,7 +19,7 @@ export default function User(userPacket) {
|
|||
if (!(this instanceof User)) {
|
||||
return new User(userPacket);
|
||||
}
|
||||
this.userId = userPacket.tag === enums.packet.userid ? userPacket : null;
|
||||
this.userId = userPacket.tag === enums.packet.userID ? userPacket : null;
|
||||
this.userAttribute = userPacket.tag === enums.packet.userAttribute ? userPacket : null;
|
||||
this.selfCertifications = [];
|
||||
this.otherCertifications = [];
|
||||
|
@ -28,10 +28,10 @@ export default function User(userPacket) {
|
|||
|
||||
/**
|
||||
* Transforms structured user data to packetlist
|
||||
* @returns {module:packet.List}
|
||||
* @returns {PacketList}
|
||||
*/
|
||||
User.prototype.toPacketlist = function() {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
packetlist.push(this.userId || this.userAttribute);
|
||||
packetlist.concat(this.revocationSignatures);
|
||||
packetlist.concat(this.selfCertifications);
|
||||
|
@ -41,8 +41,8 @@ User.prototype.toPacketlist = function() {
|
|||
|
||||
/**
|
||||
* Signs user
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Array<module:key.Key>} privateKeys Decrypted private keys for signing
|
||||
* @returns {Promise<module:key.Key>} New user with new certificate signatures
|
||||
* @async
|
||||
|
@ -74,13 +74,13 @@ User.prototype.sign = async function(primaryKey, privateKeys) {
|
|||
|
||||
/**
|
||||
* Checks if a given certificate of the user is revoked
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {module:packet.Signature} certificate The certificate to verify
|
||||
* @param {module:packet.PublicSubkey|
|
||||
* module:packet.SecretSubkey|
|
||||
* module:packet.PublicKey|
|
||||
* module:packet.SecretKey} key, optional The key to verify the signature
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {SignaturePacket} certificate The certificate to verify
|
||||
* @param {PublicSubkeyPacket|
|
||||
* SecretSubkeyPacket|
|
||||
* PublicKeyPacket|
|
||||
* SecretKeyPacket} key, optional The key to verify the signature
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Boolean>} True if the certificate is revoked
|
||||
* @async
|
||||
|
@ -98,9 +98,9 @@ User.prototype.isRevoked = async function(primaryKey, certificate, key, date = n
|
|||
|
||||
/**
|
||||
* Verifies the user certificate. Throws if the user certificate is invalid.
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {module:packet.Signature} certificate A certificate of this user
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {SignaturePacket} certificate A certificate of this user
|
||||
* @param {Array<module:key.Key>} keys Array of keys to verify certificate signatures
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<true>} status of the certificate
|
||||
|
@ -137,8 +137,8 @@ User.prototype.verifyCertificate = async function(primaryKey, certificate, keys,
|
|||
|
||||
/**
|
||||
* Verifies all user certificates
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Array<module:key.Key>} keys Array of keys to verify certificate signatures
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<Array<{keyid: module:type/keyid,
|
||||
|
@ -159,10 +159,10 @@ User.prototype.verifyAllCertifications = async function(primaryKey, keys, date =
|
|||
/**
|
||||
* Verify User. Checks for existence of self signatures, revocation signatures
|
||||
* and validity of self signature. Throws when there are no valid self signatures.
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.PublicKey} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<true>} Status of user
|
||||
* @param {SecretKeyPacket|
|
||||
* PublicKeyPacket} primaryKey The primary key packet
|
||||
* @param {Date} date Use the given date instead of the current time
|
||||
* @returns {Promise<true>} Status of user
|
||||
* @async
|
||||
*/
|
||||
User.prototype.verify = async function(primaryKey, date = new Date()) {
|
||||
|
@ -201,9 +201,9 @@ User.prototype.verify = async function(primaryKey, date = new Date()) {
|
|||
|
||||
/**
|
||||
* Update user with new components from specified user
|
||||
* @param {module:key.User} user Source user to merge
|
||||
* @param {module:packet.SecretKey|
|
||||
* module:packet.SecretSubkey} primaryKey primary key used for validation
|
||||
* @param {module:key.User} user Source user to merge
|
||||
* @param {SecretKeyPacket|
|
||||
* SecretSubkeyPacket} primaryKey primary key used for validation
|
||||
* @returns {Promise<undefined>}
|
||||
* @async
|
||||
*/
|
||||
|
|
109
src/message.js
109
src/message.js
|
@ -36,7 +36,18 @@ import config from './config';
|
|||
import crypto from './crypto';
|
||||
import enums from './enums';
|
||||
import util from './util';
|
||||
import packet from './packet';
|
||||
import {
|
||||
PacketList,
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
SymEncryptedAEADProtectedDataPacket,
|
||||
SymEncryptedIntegrityProtectedDataPacket,
|
||||
SymmetricallyEncryptedDataPacket,
|
||||
PublicKeyEncryptedSessionKeyPacket,
|
||||
SymEncryptedSessionKeyPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
} from './packet';
|
||||
import { Signature } from './signature';
|
||||
import { getPreferredHashAlgo, getPreferredAlgo, isAeadSupported, createSignaturePacket } from './key';
|
||||
|
||||
|
@ -45,7 +56,7 @@ import { getPreferredHashAlgo, getPreferredAlgo, isAeadSupported, createSignatur
|
|||
* @class
|
||||
* @classdesc Class that represents an OpenPGP message.
|
||||
* Can be an encrypted message, signed message, compressed message or literal message
|
||||
* @param {module:packet.List} packetlist The packets that form this message
|
||||
* @param {module:PacketList} packetlist The packets that form this message
|
||||
* See {@link https://tools.ietf.org/html/rfc4880#section-11.3}
|
||||
*/
|
||||
|
||||
|
@ -53,7 +64,7 @@ export function Message(packetlist) {
|
|||
if (!(this instanceof Message)) {
|
||||
return new Message(packetlist);
|
||||
}
|
||||
this.packets = packetlist || new packet.List();
|
||||
this.packets = packetlist || new PacketList();
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -104,9 +115,9 @@ Message.prototype.decrypt = async function(privateKeys, passwords, sessionKeys,
|
|||
const keyObjs = sessionKeys || await this.decryptSessionKeys(privateKeys, passwords);
|
||||
|
||||
const symEncryptedPacketlist = this.packets.filterByTag(
|
||||
enums.packet.symmetricallyEncrypted,
|
||||
enums.packet.symEncryptedIntegrityProtected,
|
||||
enums.packet.symEncryptedAEADProtected
|
||||
enums.packet.symmetricallyEncryptedData,
|
||||
enums.packet.symEncryptedIntegrityProtectedData,
|
||||
enums.packet.symEncryptedAEADProtectedData
|
||||
);
|
||||
|
||||
if (symEncryptedPacketlist.length === 0) {
|
||||
|
@ -137,7 +148,7 @@ Message.prototype.decrypt = async function(privateKeys, passwords, sessionKeys,
|
|||
}
|
||||
|
||||
const resultMsg = new Message(symEncryptedPacket.packets);
|
||||
symEncryptedPacket.packets = new packet.List(); // remove packets after decryption
|
||||
symEncryptedPacket.packets = new PacketList(); // remove packets after decryption
|
||||
|
||||
return resultMsg;
|
||||
};
|
||||
|
@ -162,8 +173,8 @@ Message.prototype.decryptSessionKeys = async function(privateKeys, passwords) {
|
|||
await Promise.all(passwords.map(async function(password, i) {
|
||||
let packets;
|
||||
if (i) {
|
||||
packets = new packet.List();
|
||||
await packets.read(symESKeyPacketlist.write());
|
||||
packets = new PacketList();
|
||||
await packets.read(symESKeyPacketlist.write(), { SymEncryptedSessionKeyPacket });
|
||||
} else {
|
||||
packets = symESKeyPacketlist;
|
||||
}
|
||||
|
@ -249,7 +260,7 @@ Message.prototype.decryptSessionKeys = async function(privateKeys, passwords) {
|
|||
*/
|
||||
Message.prototype.getLiteralData = function() {
|
||||
const msg = this.unwrapCompressed();
|
||||
const literal = msg.packets.findPacket(enums.packet.literal);
|
||||
const literal = msg.packets.findPacket(enums.packet.literalData);
|
||||
return (literal && literal.getBytes()) || null;
|
||||
};
|
||||
|
||||
|
@ -259,7 +270,7 @@ Message.prototype.getLiteralData = function() {
|
|||
*/
|
||||
Message.prototype.getFilename = function() {
|
||||
const msg = this.unwrapCompressed();
|
||||
const literal = msg.packets.findPacket(enums.packet.literal);
|
||||
const literal = msg.packets.findPacket(enums.packet.literalData);
|
||||
return (literal && literal.getFilename()) || null;
|
||||
};
|
||||
|
||||
|
@ -269,7 +280,7 @@ Message.prototype.getFilename = function() {
|
|||
*/
|
||||
Message.prototype.getText = function() {
|
||||
const msg = this.unwrapCompressed();
|
||||
const literal = msg.packets.findPacket(enums.packet.literal);
|
||||
const literal = msg.packets.findPacket(enums.packet.literalData);
|
||||
if (literal) {
|
||||
return literal.getText();
|
||||
}
|
||||
|
@ -324,19 +335,19 @@ Message.prototype.encrypt = async function(keys, passwords, sessionKey, wildcard
|
|||
|
||||
let symEncryptedPacket;
|
||||
if (aeadAlgorithm) {
|
||||
symEncryptedPacket = new packet.SymEncryptedAEADProtected();
|
||||
symEncryptedPacket = new SymEncryptedAEADProtectedDataPacket();
|
||||
symEncryptedPacket.aeadAlgorithm = aeadAlgorithm;
|
||||
} else if (config.integrityProtect) {
|
||||
symEncryptedPacket = new packet.SymEncryptedIntegrityProtected();
|
||||
symEncryptedPacket = new SymEncryptedIntegrityProtectedDataPacket();
|
||||
} else {
|
||||
symEncryptedPacket = new packet.SymmetricallyEncrypted();
|
||||
symEncryptedPacket = new SymmetricallyEncryptedDataPacket();
|
||||
}
|
||||
symEncryptedPacket.packets = this.packets;
|
||||
|
||||
await symEncryptedPacket.encrypt(algorithm, sessionKeyData, streaming);
|
||||
|
||||
msg.packets.push(symEncryptedPacket);
|
||||
symEncryptedPacket.packets = new packet.List(); // remove packets after encryption
|
||||
symEncryptedPacket.packets = new PacketList(); // remove packets after encryption
|
||||
return msg;
|
||||
};
|
||||
|
||||
|
@ -354,12 +365,12 @@ Message.prototype.encrypt = async function(keys, passwords, sessionKey, wildcard
|
|||
* @async
|
||||
*/
|
||||
export async function encryptSessionKey(sessionKey, algorithm, aeadAlgorithm, publicKeys, passwords, wildcard = false, date = new Date(), userIds = []) {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
|
||||
if (publicKeys) {
|
||||
const results = await Promise.all(publicKeys.map(async function(publicKey) {
|
||||
const encryptionKey = await publicKey.getEncryptionKey(undefined, date, userIds);
|
||||
const pkESKeyPacket = new packet.PublicKeyEncryptedSessionKey();
|
||||
const pkESKeyPacket = new PublicKeyEncryptedSessionKeyPacket();
|
||||
pkESKeyPacket.publicKeyId = wildcard ? type_keyid.wildcard() : encryptionKey.getKeyId();
|
||||
pkESKeyPacket.publicKeyAlgorithm = encryptionKey.keyPacket.algorithm;
|
||||
pkESKeyPacket.sessionKey = sessionKey;
|
||||
|
@ -383,7 +394,7 @@ export async function encryptSessionKey(sessionKey, algorithm, aeadAlgorithm, pu
|
|||
const sum = (accumulator, currentValue) => accumulator + currentValue;
|
||||
|
||||
const encryptPassword = async function(sessionKey, algorithm, aeadAlgorithm, password) {
|
||||
const symEncryptedSessionKeyPacket = new packet.SymEncryptedSessionKey();
|
||||
const symEncryptedSessionKeyPacket = new SymEncryptedSessionKeyPacket();
|
||||
symEncryptedSessionKeyPacket.sessionKey = sessionKey;
|
||||
symEncryptedSessionKeyPacket.sessionKeyAlgorithm = algorithm;
|
||||
if (aeadAlgorithm) {
|
||||
|
@ -420,9 +431,9 @@ export async function encryptSessionKey(sessionKey, algorithm, aeadAlgorithm, pu
|
|||
* @async
|
||||
*/
|
||||
Message.prototype.sign = async function(privateKeys = [], signature = null, date = new Date(), userIds = [], streaming = false) {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
|
||||
const literalDataPacket = this.packets.findPacket(enums.packet.literal);
|
||||
const literalDataPacket = this.packets.findPacket(enums.packet.literalData);
|
||||
if (!literalDataPacket) {
|
||||
throw new Error('No literal data packet to sign.');
|
||||
}
|
||||
|
@ -437,7 +448,7 @@ Message.prototype.sign = async function(privateKeys = [], signature = null, date
|
|||
existingSigPacketlist = signature.packets.filterByTag(enums.packet.signature);
|
||||
for (i = existingSigPacketlist.length - 1; i >= 0; i--) {
|
||||
const signaturePacket = existingSigPacketlist[i];
|
||||
const onePassSig = new packet.OnePassSignature();
|
||||
const onePassSig = new OnePassSignaturePacket();
|
||||
onePassSig.signatureType = signaturePacket.signatureType;
|
||||
onePassSig.hashAlgorithm = signaturePacket.hashAlgorithm;
|
||||
onePassSig.publicKeyAlgorithm = signaturePacket.publicKeyAlgorithm;
|
||||
|
@ -454,7 +465,7 @@ Message.prototype.sign = async function(privateKeys = [], signature = null, date
|
|||
throw new Error('Need private key for signing');
|
||||
}
|
||||
const signingKey = await privateKey.getSigningKey(undefined, date, userIds);
|
||||
const onePassSig = new packet.OnePassSignature();
|
||||
const onePassSig = new OnePassSignaturePacket();
|
||||
onePassSig.signatureType = signatureType;
|
||||
onePassSig.hashAlgorithm = await getPreferredHashAlgo(privateKey, signingKey.keyPacket, date, userIds);
|
||||
onePassSig.publicKeyAlgorithm = signingKey.keyPacket.algorithm;
|
||||
|
@ -483,11 +494,11 @@ Message.prototype.compress = function(compression) {
|
|||
return this;
|
||||
}
|
||||
|
||||
const compressed = new packet.Compressed();
|
||||
const compressed = new CompressedDataPacket();
|
||||
compressed.packets = this.packets;
|
||||
compressed.algorithm = enums.read(enums.compression, compression);
|
||||
|
||||
const packetList = new packet.List();
|
||||
const packetList = new PacketList();
|
||||
packetList.push(compressed);
|
||||
|
||||
return new Message(packetList);
|
||||
|
@ -504,7 +515,7 @@ Message.prototype.compress = function(compression) {
|
|||
* @async
|
||||
*/
|
||||
Message.prototype.signDetached = async function(privateKeys = [], signature = null, date = new Date(), userIds = [], streaming = false) {
|
||||
const literalDataPacket = this.packets.findPacket(enums.packet.literal);
|
||||
const literalDataPacket = this.packets.findPacket(enums.packet.literalData);
|
||||
if (!literalDataPacket) {
|
||||
throw new Error('No literal data packet to sign.');
|
||||
}
|
||||
|
@ -513,18 +524,18 @@ Message.prototype.signDetached = async function(privateKeys = [], signature = nu
|
|||
|
||||
/**
|
||||
* Create signature packets for the message
|
||||
* @param {module:packet.Literal} literalDataPacket the literal data packet to sign
|
||||
* @param {LiteralDataPacket} literalDataPacket the literal data packet to sign
|
||||
* @param {Array<module:key.Key>} privateKeys private keys with decrypted secret key data for signing
|
||||
* @param {Signature} signature (optional) any existing detached signature to append
|
||||
* @param {Date} date (optional) override the creationtime of the signature
|
||||
* @param {Array} userIds (optional) user IDs to sign with, e.g. [{ name:'Steve Sender', email:'steve@openpgp.org' }]
|
||||
* @param {Boolean} detached (optional) whether to create detached signature packets
|
||||
* @param {Boolean} streaming (optional) whether to process data as a stream
|
||||
* @returns {Promise<module:packet.List>} list of signature packets
|
||||
* @returns {Promise<module:PacketList>} list of signature packets
|
||||
* @async
|
||||
*/
|
||||
export async function createSignaturePackets(literalDataPacket, privateKeys, signature = null, date = new Date(), userIds = [], detached = false, streaming = false) {
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
|
||||
// If data packet was created from Uint8Array, use binary, otherwise use text
|
||||
const signatureType = literalDataPacket.text === null ?
|
||||
|
@ -558,7 +569,7 @@ export async function createSignaturePackets(literalDataPacket, privateKeys, sig
|
|||
*/
|
||||
Message.prototype.verify = async function(keys, date = new Date(), streaming) {
|
||||
const msg = this.unwrapCompressed();
|
||||
const literalDataList = msg.packets.filterByTag(enums.packet.literal);
|
||||
const literalDataList = msg.packets.filterByTag(enums.packet.literalData);
|
||||
if (literalDataList.length !== 1) {
|
||||
throw new Error('Can only verify message with one literal data packet.');
|
||||
}
|
||||
|
@ -610,7 +621,7 @@ Message.prototype.verify = async function(keys, date = new Date(), streaming) {
|
|||
*/
|
||||
Message.prototype.verifyDetached = function(signature, keys, date = new Date()) {
|
||||
const msg = this.unwrapCompressed();
|
||||
const literalDataList = msg.packets.filterByTag(enums.packet.literal);
|
||||
const literalDataList = msg.packets.filterByTag(enums.packet.literalData);
|
||||
if (literalDataList.length !== 1) {
|
||||
throw new Error('Can only verify message with one literal data packet.');
|
||||
}
|
||||
|
@ -620,8 +631,8 @@ Message.prototype.verifyDetached = function(signature, keys, date = new Date())
|
|||
|
||||
/**
|
||||
* Create object containing signer's keyid and validity of signature
|
||||
* @param {module:packet.Signature} signature signature packets
|
||||
* @param {Array<module:packet.Literal>} literalDataList array of literal data packets
|
||||
* @param {SignaturePacket} signature signature packets
|
||||
* @param {Array<LiteralDataPacket>} literalDataList array of literal data packets
|
||||
* @param {Array<module:key.Key>} keys array of keys to verify signatures
|
||||
* @param {Date} date Verify the signature against the given date,
|
||||
* i.e. check signature creation time < date < expiration time
|
||||
|
@ -663,7 +674,7 @@ async function createVerificationObject(signature, literalDataList, keys, date =
|
|||
})(),
|
||||
signature: (async () => {
|
||||
const sig = await signaturePacket;
|
||||
const packetlist = new packet.List();
|
||||
const packetlist = new PacketList();
|
||||
packetlist.push(sig);
|
||||
return new Signature(packetlist);
|
||||
})()
|
||||
|
@ -681,8 +692,8 @@ async function createVerificationObject(signature, literalDataList, keys, date =
|
|||
|
||||
/**
|
||||
* Create list of objects containing signer's keyid and validity of signature
|
||||
* @param {Array<module:packet.Signature>} signatureList array of signature packets
|
||||
* @param {Array<module:packet.Literal>} literalDataList array of literal data packets
|
||||
* @param {Array<SignaturePacket>} signatureList array of signature packets
|
||||
* @param {Array<LiteralDataPacket>} literalDataList array of literal data packets
|
||||
* @param {Array<module:key.Key>} keys array of keys to verify signatures
|
||||
* @param {Date} date Verify the signature against the given date,
|
||||
* i.e. check signature creation time < date < expiration time
|
||||
|
@ -704,7 +715,7 @@ export async function createVerificationObjects(signatureList, literalDataList,
|
|||
* @returns {module:message.Message} message Content of compressed message
|
||||
*/
|
||||
Message.prototype.unwrapCompressed = function() {
|
||||
const compressed = this.packets.filterByTag(enums.packet.compressed);
|
||||
const compressed = this.packets.filterByTag(enums.packet.compressedData);
|
||||
if (compressed.length) {
|
||||
return new Message(compressed[0].packets);
|
||||
}
|
||||
|
@ -716,7 +727,7 @@ Message.prototype.unwrapCompressed = function() {
|
|||
* @param {String|Uint8Array} detachedSignature The detached ASCII-armored or Uint8Array PGP signature
|
||||
*/
|
||||
Message.prototype.appendSignature = async function(detachedSignature) {
|
||||
await this.packets.read(util.isUint8Array(detachedSignature) ? detachedSignature : (await armor.decode(detachedSignature)).data);
|
||||
await this.packets.read(util.isUint8Array(detachedSignature) ? detachedSignature : (await armor.decode(detachedSignature)).data, { SignaturePacket });
|
||||
};
|
||||
|
||||
/**
|
||||
|
@ -766,8 +777,18 @@ export async function read(input, fromStream = util.isStream(input)) {
|
|||
if (streamType === 'node') {
|
||||
input = stream.nodeToWeb(input);
|
||||
}
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(input, fromStream);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(input, {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
SymEncryptedAEADProtectedDataPacket,
|
||||
SymEncryptedIntegrityProtectedDataPacket,
|
||||
SymmetricallyEncryptedDataPacket,
|
||||
PublicKeyEncryptedSessionKeyPacket,
|
||||
SymEncryptedSessionKeyPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
}, fromStream);
|
||||
const message = new Message(packetlist);
|
||||
message.fromStream = fromStream;
|
||||
return message;
|
||||
|
@ -787,13 +808,13 @@ export function fromText(text, filename, date = new Date(), type = 'utf8') {
|
|||
if (streamType === 'node') {
|
||||
text = stream.nodeToWeb(text);
|
||||
}
|
||||
const literalDataPacket = new packet.Literal(date);
|
||||
const literalDataPacket = new LiteralDataPacket(date);
|
||||
// text will be converted to UTF8
|
||||
literalDataPacket.setText(text, type);
|
||||
if (filename !== undefined) {
|
||||
literalDataPacket.setFilename(filename);
|
||||
}
|
||||
const literalDataPacketlist = new packet.List();
|
||||
const literalDataPacketlist = new PacketList();
|
||||
literalDataPacketlist.push(literalDataPacket);
|
||||
const message = new Message(literalDataPacketlist);
|
||||
message.fromStream = streamType;
|
||||
|
@ -818,12 +839,12 @@ export function fromBinary(bytes, filename, date = new Date(), type = 'binary')
|
|||
bytes = stream.nodeToWeb(bytes);
|
||||
}
|
||||
|
||||
const literalDataPacket = new packet.Literal(date);
|
||||
const literalDataPacket = new LiteralDataPacket(date);
|
||||
literalDataPacket.setBytes(bytes, type);
|
||||
if (filename !== undefined) {
|
||||
literalDataPacket.setFilename(filename);
|
||||
}
|
||||
const literalDataPacketlist = new packet.List();
|
||||
const literalDataPacketlist = new PacketList();
|
||||
literalDataPacketlist.push(literalDataPacket);
|
||||
const message = new Message(literalDataPacketlist);
|
||||
message.fromStream = streamType;
|
||||
|
|
|
@ -40,7 +40,11 @@
|
|||
|
||||
import stream from 'web-stream-tools';
|
||||
import { createReadableStreamWrapper } from '@mattiasbuelens/web-streams-adapter';
|
||||
import * as messageLib from './message';
|
||||
import {
|
||||
Message,
|
||||
generateSessionKey as messageGenerateSessionKey,
|
||||
encryptSessionKey as messageEncryptSessionKey
|
||||
} from './message';
|
||||
import { CleartextMessage } from './cleartext';
|
||||
import { generate, reformat } from './key';
|
||||
import config from './config/config';
|
||||
|
@ -407,7 +411,7 @@ export function generateSessionKey({ publicKeys, date = new Date(), toUserIds =
|
|||
|
||||
return Promise.resolve().then(async function() {
|
||||
|
||||
return messageLib.generateSessionKey(publicKeys, date, toUserIds);
|
||||
return messageGenerateSessionKey(publicKeys, date, toUserIds);
|
||||
|
||||
}).catch(onError.bind(null, 'Error generating session key'));
|
||||
}
|
||||
|
@ -433,7 +437,7 @@ export function encryptSessionKey({ data, algorithm, aeadAlgorithm, publicKeys,
|
|||
|
||||
return Promise.resolve().then(async function() {
|
||||
|
||||
const message = await messageLib.encryptSessionKey(data, algorithm, aeadAlgorithm, publicKeys, passwords, wildcard, date, toUserIds);
|
||||
const message = await messageEncryptSessionKey(data, algorithm, aeadAlgorithm, publicKeys, passwords, wildcard, date, toUserIds);
|
||||
return armor ? message.armor() : message.write();
|
||||
|
||||
}).catch(onError.bind(null, 'Error encrypting session key'));
|
||||
|
@ -483,12 +487,12 @@ function checkBinary(data, name) {
|
|||
}
|
||||
}
|
||||
function checkMessage(message) {
|
||||
if (!(message instanceof messageLib.Message)) {
|
||||
if (!(message instanceof Message)) {
|
||||
throw new Error('Parameter [message] needs to be of type Message');
|
||||
}
|
||||
}
|
||||
function checkCleartextOrMessage(message) {
|
||||
if (!(message instanceof CleartextMessage) && !(message instanceof messageLib.Message)) {
|
||||
if (!(message instanceof CleartextMessage) && !(message instanceof Message)) {
|
||||
throw new Error('Parameter [message] needs to be of type Message or CleartextMessage');
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,75 +4,73 @@
|
|||
* @module packet/all_packets
|
||||
*/
|
||||
|
||||
import * as packets from './all_packets.js'; // re-import module to parse packets from tag
|
||||
|
||||
export {
|
||||
/** @see module:packet.Compressed */
|
||||
default as Compressed
|
||||
} from './compressed.js';
|
||||
/** @see CompressedDataPacket */
|
||||
default as CompressedDataPacket
|
||||
} from './compressed_data.js';
|
||||
export {
|
||||
/** @see module:packet.SymEncryptedIntegrityProtected */
|
||||
default as SymEncryptedIntegrityProtected
|
||||
} from './sym_encrypted_integrity_protected.js';
|
||||
/** @see SymEncryptedIntegrityProtectedDataPacket */
|
||||
default as SymEncryptedIntegrityProtectedDataPacket
|
||||
} from './sym_encrypted_integrity_protected_data.js';
|
||||
export {
|
||||
/** @see module:packet.SymEncryptedAEADProtected */
|
||||
default as SymEncryptedAEADProtected
|
||||
} from './sym_encrypted_aead_protected.js';
|
||||
/** @see SymEncryptedAEADProtectedDataPacket */
|
||||
default as SymEncryptedAEADProtectedDataPacket
|
||||
} from './sym_encrypted_aead_protected_data.js';
|
||||
export {
|
||||
/** @see module:packet.PublicKeyEncryptedSessionKey */
|
||||
default as PublicKeyEncryptedSessionKey
|
||||
/** @see PublicKeyEncryptedSessionKeyPacket */
|
||||
default as PublicKeyEncryptedSessionKeyPacket
|
||||
} from './public_key_encrypted_session_key.js';
|
||||
export {
|
||||
/** @see module:packet.SymEncryptedSessionKey */
|
||||
default as SymEncryptedSessionKey
|
||||
/** @see SymEncryptedSessionKeyPacket */
|
||||
default as SymEncryptedSessionKeyPacket
|
||||
} from './sym_encrypted_session_key.js';
|
||||
export {
|
||||
/** @see module:packet.Literal */
|
||||
default as Literal
|
||||
} from './literal.js';
|
||||
/** @see LiteralDataPacket */
|
||||
default as LiteralDataPacket
|
||||
} from './literal_data.js';
|
||||
export {
|
||||
/** @see module:packet.PublicKey */
|
||||
default as PublicKey
|
||||
/** @see PublicKeyPacket */
|
||||
default as PublicKeyPacket
|
||||
} from './public_key.js';
|
||||
export {
|
||||
/** @see module:packet.SymmetricallyEncrypted */
|
||||
default as SymmetricallyEncrypted
|
||||
} from './symmetrically_encrypted.js';
|
||||
/** @see SymmetricallyEncryptedDataPacket */
|
||||
default as SymmetricallyEncryptedDataPacket
|
||||
} from './symmetrically_encrypted_data.js';
|
||||
export {
|
||||
/** @see module:packet.Marker */
|
||||
default as Marker
|
||||
/** @see MarkerPacket */
|
||||
default as MarkerPacket
|
||||
} from './marker.js';
|
||||
export {
|
||||
/** @see module:packet.PublicSubkey */
|
||||
default as PublicSubkey
|
||||
/** @see PublicSubkeyPacket */
|
||||
default as PublicSubkeyPacket
|
||||
} from './public_subkey.js';
|
||||
export {
|
||||
/** @see module:packet.UserAttribute */
|
||||
default as UserAttribute
|
||||
/** @see UserAttributePacket */
|
||||
default as UserAttributePacket
|
||||
} from './user_attribute.js';
|
||||
export {
|
||||
/** @see module:packet.OnePassSignature */
|
||||
default as OnePassSignature
|
||||
/** @see OnePassSignaturePacket */
|
||||
default as OnePassSignaturePacket
|
||||
} from './one_pass_signature.js';
|
||||
export {
|
||||
/** @see module:packet.SecretKey */
|
||||
default as SecretKey
|
||||
/** @see SecretKeyPacket */
|
||||
default as SecretKeyPacket
|
||||
} from './secret_key.js';
|
||||
export {
|
||||
/** @see module:packet.Userid */
|
||||
default as Userid
|
||||
/** @see UserIDPacket */
|
||||
default as UserIDPacket
|
||||
} from './userid.js';
|
||||
export {
|
||||
/** @see module:packet.SecretSubkey */
|
||||
default as SecretSubkey
|
||||
/** @see SecretSubkeyPacket */
|
||||
default as SecretSubkeyPacket
|
||||
} from './secret_subkey.js';
|
||||
export {
|
||||
/** @see module:packet.Signature */
|
||||
default as Signature
|
||||
/** @see SignaturePacket */
|
||||
default as SignaturePacket
|
||||
} from './signature.js';
|
||||
export {
|
||||
/** @see module:packet.Trust */
|
||||
default as Trust
|
||||
/** @see TrustPacket */
|
||||
default as TrustPacket
|
||||
} from './trust.js';
|
||||
|
||||
/**
|
||||
|
@ -82,8 +80,12 @@ export {
|
|||
* @param {String} tag property name from {@link module:enums.packet}
|
||||
* @returns {Object} new packet object with type based on tag
|
||||
*/
|
||||
export function newPacketFromTag(tag) {
|
||||
return new packets[packetClassFromTagName(tag)]();
|
||||
export function newPacketFromTag(tag, allowedPackets) {
|
||||
const className = packetClassFromTagName(tag);
|
||||
if (!allowedPackets[className]) {
|
||||
throw new Error('Packet not allowed in this context: ' + className);
|
||||
}
|
||||
return new allowedPackets[className]();
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -93,5 +95,5 @@ export function newPacketFromTag(tag) {
|
|||
* @private
|
||||
*/
|
||||
function packetClassFromTagName(tag) {
|
||||
return tag.substr(0, 1).toUpperCase() + tag.substr(1);
|
||||
return tag.substr(0, 1).toUpperCase() + tag.substr(1) + 'Packet';
|
||||
}
|
||||
|
|
|
@ -18,18 +18,26 @@
|
|||
/**
|
||||
* @requires web-stream-tools
|
||||
* @requires pako
|
||||
* @requires seek-bzip
|
||||
* @requires config
|
||||
* @requires enums
|
||||
* @requires util
|
||||
* @requires compression/bzip2
|
||||
* @requires packet
|
||||
*/
|
||||
|
||||
import pako from 'pako';
|
||||
import Bunzip from 'seek-bzip';
|
||||
import { Deflate } from 'pako/lib/deflate';
|
||||
import { Inflate } from 'pako/lib/inflate';
|
||||
import { Z_SYNC_FLUSH, Z_FINISH } from 'pako/lib/zlib/constants';
|
||||
import { decode as BunzipDecode } from 'seek-bzip';
|
||||
import stream from 'web-stream-tools';
|
||||
import config from '../config';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import {
|
||||
LiteralDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
|
||||
/**
|
||||
* Implementation of the Compressed Data Packet (Tag 8)
|
||||
|
@ -41,15 +49,15 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function Compressed() {
|
||||
function CompressedDataPacket() {
|
||||
/**
|
||||
* Packet type
|
||||
* @type {module:enums.packet}
|
||||
*/
|
||||
this.tag = enums.packet.compressed;
|
||||
this.tag = enums.packet.compressedData;
|
||||
/**
|
||||
* List of packets
|
||||
* @type {module:packet.List}
|
||||
* @type {PacketList}
|
||||
*/
|
||||
this.packets = null;
|
||||
/**
|
||||
|
@ -69,7 +77,7 @@ function Compressed() {
|
|||
* Parsing function for the packet.
|
||||
* @param {Uint8Array | ReadableStream<Uint8Array>} bytes Payload of a tag 8 packet
|
||||
*/
|
||||
Compressed.prototype.read = async function (bytes, streaming) {
|
||||
CompressedDataPacket.prototype.read = async function (bytes, streaming) {
|
||||
await stream.parse(bytes, async reader => {
|
||||
|
||||
// One octet that gives the algorithm used to compress the packet.
|
||||
|
@ -87,7 +95,7 @@ Compressed.prototype.read = async function (bytes, streaming) {
|
|||
* Return the compressed packet.
|
||||
* @returns {Uint8Array | ReadableStream<Uint8Array>} binary compressed packet
|
||||
*/
|
||||
Compressed.prototype.write = function () {
|
||||
CompressedDataPacket.prototype.write = function () {
|
||||
if (this.compressed === null) {
|
||||
this.compress();
|
||||
}
|
||||
|
@ -100,19 +108,23 @@ Compressed.prototype.write = function () {
|
|||
* Decompression method for decompressing the compressed data
|
||||
* read by read_packet
|
||||
*/
|
||||
Compressed.prototype.decompress = async function (streaming) {
|
||||
CompressedDataPacket.prototype.decompress = async function (streaming) {
|
||||
|
||||
if (!decompress_fns[this.algorithm]) {
|
||||
throw new Error(this.algorithm + ' decompression not supported');
|
||||
}
|
||||
|
||||
await this.packets.read(decompress_fns[this.algorithm](this.compressed), streaming);
|
||||
await this.packets.read(decompress_fns[this.algorithm](this.compressed), {
|
||||
LiteralDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
}, streaming);
|
||||
};
|
||||
|
||||
/**
|
||||
* Compress the packet data (member decompressedData)
|
||||
*/
|
||||
Compressed.prototype.compress = function () {
|
||||
CompressedDataPacket.prototype.compress = function () {
|
||||
|
||||
if (!compress_fns[this.algorithm]) {
|
||||
throw new Error(this.algorithm + ' compression not supported');
|
||||
|
@ -121,7 +133,7 @@ Compressed.prototype.compress = function () {
|
|||
this.compressed = compress_fns[this.algorithm](this.packets.write());
|
||||
};
|
||||
|
||||
export default Compressed;
|
||||
export default CompressedDataPacket;
|
||||
|
||||
//////////////////////////
|
||||
// //
|
||||
|
@ -147,12 +159,12 @@ function pako_zlib(constructor, options = {}) {
|
|||
const obj = new constructor(options);
|
||||
return stream.transform(data, value => {
|
||||
if (value.length) {
|
||||
obj.push(value, pako.Z_SYNC_FLUSH);
|
||||
obj.push(value, Z_SYNC_FLUSH);
|
||||
return obj.result;
|
||||
}
|
||||
}, () => {
|
||||
if (constructor === pako.Deflate) {
|
||||
obj.push([], pako.Z_FINISH);
|
||||
if (constructor === Deflate) {
|
||||
obj.push([], Z_FINISH);
|
||||
return obj.result;
|
||||
}
|
||||
});
|
||||
|
@ -165,30 +177,22 @@ function bzip2(func) {
|
|||
};
|
||||
}
|
||||
|
||||
let compress_fns;
|
||||
let decompress_fns;
|
||||
if (nodeZlib) { // Use Node native zlib for DEFLATE compression/decompression
|
||||
compress_fns = {
|
||||
zip: node_zlib(nodeZlib.createDeflateRaw, { level: config.deflateLevel }),
|
||||
zlib: node_zlib(nodeZlib.createDeflate, { level: config.deflateLevel })
|
||||
};
|
||||
const compress_fns = nodeZlib ? {
|
||||
zip: /*#__PURE__*/ node_zlib(nodeZlib.createDeflateRaw, { level: config.deflateLevel }),
|
||||
zlib: /*#__PURE__*/ node_zlib(nodeZlib.createDeflate, { level: config.deflateLevel })
|
||||
} : {
|
||||
zip: /*#__PURE__*/ pako_zlib(Deflate, { raw: true, level: config.deflateLevel }),
|
||||
zlib: /*#__PURE__*/ pako_zlib(Deflate, { level: config.deflateLevel })
|
||||
};
|
||||
|
||||
decompress_fns = {
|
||||
uncompressed: uncompressed,
|
||||
zip: node_zlib(nodeZlib.createInflateRaw),
|
||||
zlib: node_zlib(nodeZlib.createInflate),
|
||||
bzip2: bzip2(Bunzip.decode)
|
||||
};
|
||||
} else { // Use JS fallbacks
|
||||
compress_fns = {
|
||||
zip: pako_zlib(pako.Deflate, { raw: true, level: config.deflateLevel }),
|
||||
zlib: pako_zlib(pako.Deflate, { level: config.deflateLevel })
|
||||
};
|
||||
|
||||
decompress_fns = {
|
||||
uncompressed: uncompressed,
|
||||
zip: pako_zlib(pako.Inflate, { raw: true }),
|
||||
zlib: pako_zlib(pako.Inflate),
|
||||
bzip2: bzip2(Bunzip.decode)
|
||||
};
|
||||
}
|
||||
const decompress_fns = nodeZlib ? {
|
||||
uncompressed: uncompressed,
|
||||
zip: /*#__PURE__*/ node_zlib(nodeZlib.createInflateRaw),
|
||||
zlib: /*#__PURE__*/ node_zlib(nodeZlib.createInflate),
|
||||
bzip2: /*#__PURE__*/ bzip2(BunzipDecode)
|
||||
} : {
|
||||
uncompressed: uncompressed,
|
||||
zip: /*#__PURE__*/ pako_zlib(Inflate, { raw: true }),
|
||||
zlib: /*#__PURE__*/ pako_zlib(Inflate),
|
||||
bzip2: /*#__PURE__*/ bzip2(BunzipDecode)
|
||||
};
|
|
@ -2,17 +2,9 @@
|
|||
* @fileoverview OpenPGP packet types
|
||||
* @see module:packet/all_packets
|
||||
* @see module:packet/clone
|
||||
* @see module:packet.List
|
||||
* @see PacketList
|
||||
* @module packet
|
||||
*/
|
||||
|
||||
import * as packets from './all_packets';
|
||||
import List from './packetlist';
|
||||
|
||||
const mod = {
|
||||
List
|
||||
};
|
||||
|
||||
Object.assign(mod, packets);
|
||||
|
||||
export default mod;
|
||||
export * from './all_packets';
|
||||
export { default as PacketList } from './packetlist';
|
||||
|
|
|
@ -35,8 +35,8 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function Literal(date = new Date()) {
|
||||
this.tag = enums.packet.literal;
|
||||
function LiteralDataPacket(date = new Date()) {
|
||||
this.tag = enums.packet.literalData;
|
||||
this.format = 'utf8'; // default format for literal data packets
|
||||
this.date = util.normalizeDate(date);
|
||||
this.text = null; // textual data representation
|
||||
|
@ -50,7 +50,7 @@ function Literal(date = new Date()) {
|
|||
* @param {String | ReadableStream<String>} text Any native javascript string
|
||||
* @param {utf8|binary|text|mime} format (optional) The format of the string of bytes
|
||||
*/
|
||||
Literal.prototype.setText = function(text, format = 'utf8') {
|
||||
LiteralDataPacket.prototype.setText = function(text, format = 'utf8') {
|
||||
this.format = format;
|
||||
this.text = text;
|
||||
this.data = null;
|
||||
|
@ -62,7 +62,7 @@ Literal.prototype.setText = function(text, format = 'utf8') {
|
|||
* @param {Boolean} clone (optional) Whether to return a clone so that getBytes/getText can be called again
|
||||
* @returns {String | ReadableStream<String>} literal data as text
|
||||
*/
|
||||
Literal.prototype.getText = function(clone = false) {
|
||||
LiteralDataPacket.prototype.getText = function(clone = false) {
|
||||
if (this.text === null || util.isStream(this.text)) { // Assume that this.text has been read
|
||||
this.text = util.decodeUtf8(util.nativeEOL(this.getBytes(clone)));
|
||||
}
|
||||
|
@ -74,7 +74,7 @@ Literal.prototype.getText = function(clone = false) {
|
|||
* @param {Uint8Array | ReadableStream<Uint8Array>} bytes The string of bytes
|
||||
* @param {utf8|binary|text|mime} format The format of the string of bytes
|
||||
*/
|
||||
Literal.prototype.setBytes = function(bytes, format) {
|
||||
LiteralDataPacket.prototype.setBytes = function(bytes, format) {
|
||||
this.format = format;
|
||||
this.data = bytes;
|
||||
this.text = null;
|
||||
|
@ -86,7 +86,7 @@ Literal.prototype.setBytes = function(bytes, format) {
|
|||
* @param {Boolean} clone (optional) Whether to return a clone so that getBytes/getText can be called again
|
||||
* @returns {Uint8Array | ReadableStream<Uint8Array>} A sequence of bytes
|
||||
*/
|
||||
Literal.prototype.getBytes = function(clone = false) {
|
||||
LiteralDataPacket.prototype.getBytes = function(clone = false) {
|
||||
if (this.data === null) {
|
||||
// encode UTF8 and normalize EOL to \r\n
|
||||
this.data = util.canonicalizeEOL(util.encodeUtf8(this.text));
|
||||
|
@ -102,7 +102,7 @@ Literal.prototype.getBytes = function(clone = false) {
|
|||
* Sets the filename of the literal packet data
|
||||
* @param {String} filename Any native javascript string
|
||||
*/
|
||||
Literal.prototype.setFilename = function(filename) {
|
||||
LiteralDataPacket.prototype.setFilename = function(filename) {
|
||||
this.filename = filename;
|
||||
};
|
||||
|
||||
|
@ -111,7 +111,7 @@ Literal.prototype.setFilename = function(filename) {
|
|||
* Get the filename of the literal packet data
|
||||
* @returns {String} filename
|
||||
*/
|
||||
Literal.prototype.getFilename = function() {
|
||||
LiteralDataPacket.prototype.getFilename = function() {
|
||||
return this.filename;
|
||||
};
|
||||
|
||||
|
@ -120,9 +120,9 @@ Literal.prototype.getFilename = function() {
|
|||
* Parsing function for a literal data packet (tag 11).
|
||||
*
|
||||
* @param {Uint8Array | ReadableStream<Uint8Array>} input Payload of a tag 11 packet
|
||||
* @returns {module:packet.Literal} object representation
|
||||
* @returns {LiteralDataPacket} object representation
|
||||
*/
|
||||
Literal.prototype.read = async function(bytes) {
|
||||
LiteralDataPacket.prototype.read = async function(bytes) {
|
||||
await stream.parse(bytes, async reader => {
|
||||
// - A one-octet field that describes how the data is formatted.
|
||||
const format = enums.read(enums.literal, await reader.readByte());
|
||||
|
@ -143,7 +143,7 @@ Literal.prototype.read = async function(bytes) {
|
|||
*
|
||||
* @returns {Uint8Array} Uint8Array representation of the packet
|
||||
*/
|
||||
Literal.prototype.writeHeader = function() {
|
||||
LiteralDataPacket.prototype.writeHeader = function() {
|
||||
const filename = util.encodeUtf8(this.filename);
|
||||
const filename_length = new Uint8Array([filename.length]);
|
||||
|
||||
|
@ -158,11 +158,11 @@ Literal.prototype.writeHeader = function() {
|
|||
*
|
||||
* @returns {Uint8Array | ReadableStream<Uint8Array>} Uint8Array representation of the packet
|
||||
*/
|
||||
Literal.prototype.write = function() {
|
||||
LiteralDataPacket.prototype.write = function() {
|
||||
const header = this.writeHeader();
|
||||
const data = this.getBytes();
|
||||
|
||||
return util.concat([header, data]);
|
||||
};
|
||||
|
||||
export default Literal;
|
||||
export default LiteralDataPacket;
|
|
@ -34,7 +34,7 @@ import enums from '../enums';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function Marker() {
|
||||
function MarkerPacket() {
|
||||
this.tag = enums.packet.marker;
|
||||
}
|
||||
|
||||
|
@ -47,9 +47,9 @@ function Marker() {
|
|||
* @param {Integer} len
|
||||
* Length of the packet or the remaining length of
|
||||
* input at position
|
||||
* @returns {module:packet.Marker} Object representation
|
||||
* @returns {MarkerPacket} Object representation
|
||||
*/
|
||||
Marker.prototype.read = function (bytes) {
|
||||
MarkerPacket.prototype.read = function (bytes) {
|
||||
if (bytes[0] === 0x50 && // P
|
||||
bytes[1] === 0x47 && // G
|
||||
bytes[2] === 0x50) { // P
|
||||
|
@ -59,4 +59,4 @@ Marker.prototype.read = function (bytes) {
|
|||
return false;
|
||||
};
|
||||
|
||||
export default Marker;
|
||||
export default MarkerPacket;
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
*/
|
||||
|
||||
import stream from 'web-stream-tools';
|
||||
import Signature from './signature';
|
||||
import SignaturePacket from './signature';
|
||||
import type_keyid from '../type/keyid';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
|
@ -41,7 +41,7 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function OnePassSignature() {
|
||||
function OnePassSignaturePacket() {
|
||||
/**
|
||||
* Packet type
|
||||
* @type {module:enums.packet}
|
||||
|
@ -78,9 +78,9 @@ function OnePassSignature() {
|
|||
/**
|
||||
* parsing function for a one-pass signature packet (tag 4).
|
||||
* @param {Uint8Array} bytes payload of a tag 4 packet
|
||||
* @returns {module:packet.OnePassSignature} object representation
|
||||
* @returns {OnePassSignaturePacket} object representation
|
||||
*/
|
||||
OnePassSignature.prototype.read = function (bytes) {
|
||||
OnePassSignaturePacket.prototype.read = function (bytes) {
|
||||
let mypos = 0;
|
||||
// A one-octet version number. The current version is 3.
|
||||
this.version = bytes[mypos++];
|
||||
|
@ -112,7 +112,7 @@ OnePassSignature.prototype.read = function (bytes) {
|
|||
* creates a string representation of a one-pass signature packet
|
||||
* @returns {Uint8Array} a Uint8Array representation of a one-pass signature packet
|
||||
*/
|
||||
OnePassSignature.prototype.write = function () {
|
||||
OnePassSignaturePacket.prototype.write = function () {
|
||||
const start = new Uint8Array([3, enums.write(enums.signature, this.signatureType),
|
||||
enums.write(enums.hash, this.hashAlgorithm),
|
||||
enums.write(enums.publicKey, this.publicKeyAlgorithm)]);
|
||||
|
@ -122,14 +122,14 @@ OnePassSignature.prototype.write = function () {
|
|||
return util.concatUint8Array([start, this.issuerKeyId.write(), end]);
|
||||
};
|
||||
|
||||
OnePassSignature.prototype.hash = Signature.prototype.hash;
|
||||
OnePassSignature.prototype.toHash = Signature.prototype.toHash;
|
||||
OnePassSignature.prototype.toSign = Signature.prototype.toSign;
|
||||
OnePassSignature.prototype.calculateTrailer = function(...args) {
|
||||
return stream.fromAsync(async () => Signature.prototype.calculateTrailer.apply(await this.correspondingSig, args));
|
||||
OnePassSignaturePacket.prototype.hash = SignaturePacket.prototype.hash;
|
||||
OnePassSignaturePacket.prototype.toHash = SignaturePacket.prototype.toHash;
|
||||
OnePassSignaturePacket.prototype.toSign = SignaturePacket.prototype.toSign;
|
||||
OnePassSignaturePacket.prototype.calculateTrailer = function(...args) {
|
||||
return stream.fromAsync(async () => SignaturePacket.prototype.calculateTrailer.apply(await this.correspondingSig, args));
|
||||
};
|
||||
|
||||
OnePassSignature.prototype.verify = async function() {
|
||||
OnePassSignaturePacket.prototype.verify = async function() {
|
||||
const correspondingSig = await this.correspondingSig;
|
||||
if (!correspondingSig || correspondingSig.tag !== enums.packet.signature) {
|
||||
throw new Error('Corresponding signature packet missing');
|
||||
|
@ -146,4 +146,4 @@ OnePassSignature.prototype.verify = async function() {
|
|||
return correspondingSig.verify.apply(correspondingSig, arguments);
|
||||
};
|
||||
|
||||
export default OnePassSignature;
|
||||
export default OnePassSignaturePacket;
|
||||
|
|
|
@ -105,11 +105,11 @@ export default {
|
|||
*/
|
||||
supportsStreaming: function(tag_type) {
|
||||
return [
|
||||
enums.packet.literal,
|
||||
enums.packet.compressed,
|
||||
enums.packet.symmetricallyEncrypted,
|
||||
enums.packet.symEncryptedIntegrityProtected,
|
||||
enums.packet.symEncryptedAEADProtected
|
||||
enums.packet.literalData,
|
||||
enums.packet.compressedData,
|
||||
enums.packet.symmetricallyEncryptedData,
|
||||
enums.packet.symEncryptedIntegrityProtectedData,
|
||||
enums.packet.symEncryptedAEADProtectedData
|
||||
].includes(tag_type);
|
||||
},
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@ import util from '../util';
|
|||
* @constructor
|
||||
* @extends Array
|
||||
*/
|
||||
function List() {
|
||||
function PacketList() {
|
||||
/**
|
||||
* The number of packets contained within the list.
|
||||
* @readonly
|
||||
|
@ -32,13 +32,13 @@ function List() {
|
|||
this.length = 0;
|
||||
}
|
||||
|
||||
List.prototype = [];
|
||||
PacketList.prototype = [];
|
||||
|
||||
/**
|
||||
* Reads a stream of binary data and interprents it as a list of packets.
|
||||
* @param {Uint8Array | ReadableStream<Uint8Array>} A Uint8Array of bytes.
|
||||
*/
|
||||
List.prototype.read = async function (bytes, streaming) {
|
||||
PacketList.prototype.read = async function (bytes, allowedPackets, streaming) {
|
||||
this.stream = stream.transformPair(bytes, async (readable, writable) => {
|
||||
const writer = stream.getWriter(writable);
|
||||
try {
|
||||
|
@ -47,8 +47,8 @@ List.prototype.read = async function (bytes, streaming) {
|
|||
const done = await packetParser.read(readable, streaming, async parsed => {
|
||||
try {
|
||||
const tag = enums.read(enums.packet, parsed.tag);
|
||||
const packet = packets.newPacketFromTag(tag);
|
||||
packet.packets = new List();
|
||||
const packet = packets.newPacketFromTag(tag, allowedPackets);
|
||||
packet.packets = new PacketList();
|
||||
packet.fromStream = util.isStream(parsed.packet);
|
||||
await packet.read(parsed.packet, streaming);
|
||||
await writer.write(packet);
|
||||
|
@ -94,7 +94,7 @@ List.prototype.read = async function (bytes, streaming) {
|
|||
* class instance.
|
||||
* @returns {Uint8Array} A Uint8Array containing valid openpgp packets.
|
||||
*/
|
||||
List.prototype.write = function () {
|
||||
PacketList.prototype.write = function () {
|
||||
const arr = [];
|
||||
|
||||
for (let i = 0; i < this.length; i++) {
|
||||
|
@ -137,12 +137,12 @@ List.prototype.write = function () {
|
|||
* writing to packetlist[i] directly will result in an error.
|
||||
* @param {Object} packet Packet to push
|
||||
*/
|
||||
List.prototype.push = function (packet) {
|
||||
PacketList.prototype.push = function (packet) {
|
||||
if (!packet) {
|
||||
return;
|
||||
}
|
||||
|
||||
packet.packets = packet.packets || new List();
|
||||
packet.packets = packet.packets || new PacketList();
|
||||
|
||||
this[this.length] = packet;
|
||||
this.length++;
|
||||
|
@ -151,8 +151,8 @@ List.prototype.push = function (packet) {
|
|||
/**
|
||||
* Creates a new PacketList with all packets from the given types
|
||||
*/
|
||||
List.prototype.filterByTag = function (...args) {
|
||||
const filtered = new List();
|
||||
PacketList.prototype.filterByTag = function (...args) {
|
||||
const filtered = new PacketList();
|
||||
|
||||
const handle = tag => packetType => tag === packetType;
|
||||
|
||||
|
@ -170,14 +170,14 @@ List.prototype.filterByTag = function (...args) {
|
|||
* @param {module:enums.packet} type The packet type
|
||||
* @returns {module:packet/packet|undefined}
|
||||
*/
|
||||
List.prototype.findPacket = function (type) {
|
||||
PacketList.prototype.findPacket = function (type) {
|
||||
return this.find(packet => packet.tag === type);
|
||||
};
|
||||
|
||||
/**
|
||||
* Returns array of found indices by tag
|
||||
*/
|
||||
List.prototype.indexOfTag = function (...args) {
|
||||
PacketList.prototype.indexOfTag = function (...args) {
|
||||
const tagIndex = [];
|
||||
const that = this;
|
||||
|
||||
|
@ -194,7 +194,7 @@ List.prototype.indexOfTag = function (...args) {
|
|||
/**
|
||||
* Concatenates packetlist or array of packets
|
||||
*/
|
||||
List.prototype.concat = function (packetlist) {
|
||||
PacketList.prototype.concat = function (packetlist) {
|
||||
if (packetlist) {
|
||||
for (let i = 0; i < packetlist.length; i++) {
|
||||
this.push(packetlist[i]);
|
||||
|
@ -203,4 +203,4 @@ List.prototype.concat = function (packetlist) {
|
|||
return this;
|
||||
};
|
||||
|
||||
export default List;
|
||||
export default PacketList;
|
||||
|
|
|
@ -46,7 +46,7 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function PublicKey(date = new Date()) {
|
||||
function PublicKeyPacket(date = new Date()) {
|
||||
/**
|
||||
* Packet type
|
||||
* @type {module:enums.packet}
|
||||
|
@ -95,7 +95,7 @@ function PublicKey(date = new Date()) {
|
|||
* @param {Uint8Array} bytes Input array to read the packet from
|
||||
* @returns {Object} This object with attributes set by the parser
|
||||
*/
|
||||
PublicKey.prototype.read = function (bytes) {
|
||||
PublicKeyPacket.prototype.read = function (bytes) {
|
||||
let pos = 0;
|
||||
// A one-octet version number (3, 4 or 5).
|
||||
this.version = bytes[pos++];
|
||||
|
@ -133,16 +133,16 @@ PublicKey.prototype.read = function (bytes) {
|
|||
|
||||
/**
|
||||
* Alias of read()
|
||||
* @see module:packet.PublicKey#read
|
||||
* @see PublicKeyPacket#read
|
||||
*/
|
||||
PublicKey.prototype.readPublicKey = PublicKey.prototype.read;
|
||||
PublicKeyPacket.prototype.readPublicKey = PublicKeyPacket.prototype.read;
|
||||
|
||||
/**
|
||||
* Same as write_private_key, but has less information because of
|
||||
* public key.
|
||||
* @returns {Uint8Array} OpenPGP packet body contents,
|
||||
*/
|
||||
PublicKey.prototype.write = function () {
|
||||
PublicKeyPacket.prototype.write = function () {
|
||||
const arr = [];
|
||||
// Version
|
||||
arr.push(new Uint8Array([this.version]));
|
||||
|
@ -164,14 +164,14 @@ PublicKey.prototype.write = function () {
|
|||
|
||||
/**
|
||||
* Alias of write()
|
||||
* @see module:packet.PublicKey#write
|
||||
* @see PublicKeyPacket#write
|
||||
*/
|
||||
PublicKey.prototype.writePublicKey = PublicKey.prototype.write;
|
||||
PublicKeyPacket.prototype.writePublicKey = PublicKeyPacket.prototype.write;
|
||||
|
||||
/**
|
||||
* Write packet in order to be hashed; either for a signature or a fingerprint.
|
||||
*/
|
||||
PublicKey.prototype.writeForHash = function (version) {
|
||||
PublicKeyPacket.prototype.writeForHash = function (version) {
|
||||
const bytes = this.writePublicKey();
|
||||
|
||||
if (version === 5) {
|
||||
|
@ -184,7 +184,7 @@ PublicKey.prototype.writeForHash = function (version) {
|
|||
* Check whether secret-key data is available in decrypted form. Returns null for public keys.
|
||||
* @returns {Boolean|null}
|
||||
*/
|
||||
PublicKey.prototype.isDecrypted = function() {
|
||||
PublicKeyPacket.prototype.isDecrypted = function() {
|
||||
return null;
|
||||
};
|
||||
|
||||
|
@ -192,7 +192,7 @@ PublicKey.prototype.isDecrypted = function() {
|
|||
* Returns the creation time of the key
|
||||
* @returns {Date}
|
||||
*/
|
||||
PublicKey.prototype.getCreationTime = function() {
|
||||
PublicKeyPacket.prototype.getCreationTime = function() {
|
||||
return this.created;
|
||||
};
|
||||
|
||||
|
@ -200,7 +200,7 @@ PublicKey.prototype.getCreationTime = function() {
|
|||
* Calculates the key id of the key
|
||||
* @returns {module:type/keyid} A 8 byte key id
|
||||
*/
|
||||
PublicKey.prototype.getKeyId = function () {
|
||||
PublicKeyPacket.prototype.getKeyId = function () {
|
||||
if (this.keyid) {
|
||||
return this.keyid;
|
||||
}
|
||||
|
@ -217,7 +217,7 @@ PublicKey.prototype.getKeyId = function () {
|
|||
* Calculates the fingerprint of the key
|
||||
* @returns {Uint8Array} A Uint8Array containing the fingerprint
|
||||
*/
|
||||
PublicKey.prototype.getFingerprintBytes = function () {
|
||||
PublicKeyPacket.prototype.getFingerprintBytes = function () {
|
||||
if (this.fingerprint) {
|
||||
return this.fingerprint;
|
||||
}
|
||||
|
@ -234,7 +234,7 @@ PublicKey.prototype.getFingerprintBytes = function () {
|
|||
* Calculates the fingerprint of the key
|
||||
* @returns {String} A string containing the fingerprint in lowercase hex
|
||||
*/
|
||||
PublicKey.prototype.getFingerprint = function() {
|
||||
PublicKeyPacket.prototype.getFingerprint = function() {
|
||||
return util.uint8ArrayToHex(this.getFingerprintBytes());
|
||||
};
|
||||
|
||||
|
@ -242,7 +242,7 @@ PublicKey.prototype.getFingerprint = function() {
|
|||
* Calculates whether two keys have the same fingerprint without actually calculating the fingerprint
|
||||
* @returns {Boolean} Whether the two keys have the same version and public key data
|
||||
*/
|
||||
PublicKey.prototype.hasSameFingerprintAs = function(other) {
|
||||
PublicKeyPacket.prototype.hasSameFingerprintAs = function(other) {
|
||||
return this.version === other.version && util.equalsUint8Array(this.writePublicKey(), other.writePublicKey());
|
||||
};
|
||||
|
||||
|
@ -250,7 +250,7 @@ PublicKey.prototype.hasSameFingerprintAs = function(other) {
|
|||
* Returns algorithm information
|
||||
* @returns {Object} An object of the form {algorithm: String, rsaBits:int, curve:String}
|
||||
*/
|
||||
PublicKey.prototype.getAlgorithmInfo = function () {
|
||||
PublicKeyPacket.prototype.getAlgorithmInfo = function () {
|
||||
const result = {};
|
||||
result.algorithm = this.algorithm;
|
||||
if (this.params[0] instanceof type_mpi) {
|
||||
|
@ -262,4 +262,4 @@ PublicKey.prototype.getAlgorithmInfo = function () {
|
|||
return result;
|
||||
};
|
||||
|
||||
export default PublicKey;
|
||||
export default PublicKeyPacket;
|
||||
|
|
|
@ -46,7 +46,7 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function PublicKeyEncryptedSessionKey() {
|
||||
function PublicKeyEncryptedSessionKeyPacket() {
|
||||
this.tag = enums.packet.publicKeyEncryptedSessionKey;
|
||||
this.version = 3;
|
||||
|
||||
|
@ -67,9 +67,9 @@ function PublicKeyEncryptedSessionKey() {
|
|||
* @param {Integer} position Position to start reading from the input string
|
||||
* @param {Integer} len Length of the packet or the remaining length of
|
||||
* input at position
|
||||
* @returns {module:packet.PublicKeyEncryptedSessionKey} Object representation
|
||||
* @returns {PublicKeyEncryptedSessionKeyPacket} Object representation
|
||||
*/
|
||||
PublicKeyEncryptedSessionKey.prototype.read = function (bytes) {
|
||||
PublicKeyEncryptedSessionKeyPacket.prototype.read = function (bytes) {
|
||||
this.version = bytes[0];
|
||||
this.publicKeyId.read(bytes.subarray(1, bytes.length));
|
||||
this.publicKeyAlgorithm = enums.read(enums.publicKey, bytes[9]);
|
||||
|
@ -90,7 +90,7 @@ PublicKeyEncryptedSessionKey.prototype.read = function (bytes) {
|
|||
*
|
||||
* @returns {Uint8Array} The Uint8Array representation
|
||||
*/
|
||||
PublicKeyEncryptedSessionKey.prototype.write = function () {
|
||||
PublicKeyEncryptedSessionKeyPacket.prototype.write = function () {
|
||||
const arr = [new Uint8Array([this.version]), this.publicKeyId.write(), new Uint8Array([enums.write(enums.publicKey, this.publicKeyAlgorithm)])];
|
||||
|
||||
for (let i = 0; i < this.encrypted.length; i++) {
|
||||
|
@ -102,11 +102,11 @@ PublicKeyEncryptedSessionKey.prototype.write = function () {
|
|||
|
||||
/**
|
||||
* Encrypt session key packet
|
||||
* @param {module:packet.PublicKey} key Public key
|
||||
* @param {PublicKeyPacket} key Public key
|
||||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
PublicKeyEncryptedSessionKey.prototype.encrypt = async function (key) {
|
||||
PublicKeyEncryptedSessionKeyPacket.prototype.encrypt = async function (key) {
|
||||
let data = String.fromCharCode(enums.write(enums.symmetric, this.sessionKeyAlgorithm));
|
||||
|
||||
data += util.uint8ArrayToStr(this.sessionKey);
|
||||
|
@ -121,12 +121,12 @@ PublicKeyEncryptedSessionKey.prototype.encrypt = async function (key) {
|
|||
* Decrypts the session key (only for public key encrypted session key
|
||||
* packets (tag 1)
|
||||
*
|
||||
* @param {module:packet.SecretKey} key
|
||||
* @param {SecretKeyPacket} key
|
||||
* Private key with secret params unlocked
|
||||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
PublicKeyEncryptedSessionKey.prototype.decrypt = async function (key) {
|
||||
PublicKeyEncryptedSessionKeyPacket.prototype.decrypt = async function (key) {
|
||||
const algo = enums.write(enums.publicKey, this.publicKeyAlgorithm);
|
||||
const keyAlgo = enums.write(enums.publicKey, key.algorithm);
|
||||
// check that session key algo matches the secret key algo
|
||||
|
@ -146,4 +146,4 @@ PublicKeyEncryptedSessionKey.prototype.decrypt = async function (key) {
|
|||
return true;
|
||||
};
|
||||
|
||||
export default PublicKeyEncryptedSessionKey;
|
||||
export default PublicKeyEncryptedSessionKeyPacket;
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
* @requires enums
|
||||
*/
|
||||
|
||||
import PublicKey from './public_key';
|
||||
import PublicKeyPacket from './public_key';
|
||||
import enums from '../enums';
|
||||
|
||||
/**
|
||||
|
@ -31,14 +31,14 @@ import enums from '../enums';
|
|||
* services.
|
||||
* @memberof module:packet
|
||||
* @constructor
|
||||
* @extends module:packet.PublicKey
|
||||
* @extends PublicKeyPacket
|
||||
*/
|
||||
function PublicSubkey() {
|
||||
PublicKey.call(this);
|
||||
function PublicSubkeyPacket() {
|
||||
PublicKeyPacket.call(this);
|
||||
this.tag = enums.packet.publicSubkey;
|
||||
}
|
||||
|
||||
PublicSubkey.prototype = new PublicKey();
|
||||
PublicSubkey.prototype.constructor = PublicSubkey;
|
||||
PublicSubkeyPacket.prototype = new PublicKeyPacket();
|
||||
PublicSubkeyPacket.prototype.constructor = PublicSubkeyPacket;
|
||||
|
||||
export default PublicSubkey;
|
||||
export default PublicSubkeyPacket;
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
* @requires util
|
||||
*/
|
||||
|
||||
import PublicKey from './public_key';
|
||||
import PublicKeyPacket from './public_key';
|
||||
import type_s2k from '../type/s2k';
|
||||
import crypto from '../crypto';
|
||||
import enums from '../enums';
|
||||
|
@ -36,10 +36,10 @@ import util from '../util';
|
|||
* includes the secret-key material after all the public-key fields.
|
||||
* @memberof module:packet
|
||||
* @constructor
|
||||
* @extends module:packet.PublicKey
|
||||
* @extends PublicKeyPacket
|
||||
*/
|
||||
function SecretKey(date = new Date()) {
|
||||
PublicKey.call(this, date);
|
||||
function SecretKeyPacket(date = new Date()) {
|
||||
PublicKeyPacket.call(this, date);
|
||||
/**
|
||||
* Packet type
|
||||
* @type {module:enums.packet}
|
||||
|
@ -75,8 +75,8 @@ function SecretKey(date = new Date()) {
|
|||
this.aead = null;
|
||||
}
|
||||
|
||||
SecretKey.prototype = new PublicKey();
|
||||
SecretKey.prototype.constructor = SecretKey;
|
||||
SecretKeyPacket.prototype = new PublicKeyPacket();
|
||||
SecretKeyPacket.prototype.constructor = SecretKeyPacket;
|
||||
|
||||
// Helper function
|
||||
|
||||
|
@ -116,7 +116,7 @@ function write_cleartext_params(params, algorithm) {
|
|||
* {@link https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-04#section-5.5.3|RFC4880bis-04 section 5.5.3}
|
||||
* @param {String} bytes Input string to read the packet from
|
||||
*/
|
||||
SecretKey.prototype.read = function (bytes) {
|
||||
SecretKeyPacket.prototype.read = function (bytes) {
|
||||
// - A Public-Key or Public-Subkey packet, as described above.
|
||||
let i = this.readPublicKey(bytes);
|
||||
|
||||
|
@ -197,7 +197,7 @@ SecretKey.prototype.read = function (bytes) {
|
|||
* Creates an OpenPGP key packet for the given key.
|
||||
* @returns {String} A string of bytes containing the secret key OpenPGP packet
|
||||
*/
|
||||
SecretKey.prototype.write = function () {
|
||||
SecretKeyPacket.prototype.write = function () {
|
||||
const arr = [this.writePublicKey()];
|
||||
|
||||
arr.push(new Uint8Array([this.s2k_usage]));
|
||||
|
@ -254,7 +254,7 @@ SecretKey.prototype.write = function () {
|
|||
* Check whether secret-key data is available in decrypted form. Returns null for public keys.
|
||||
* @returns {Boolean|null}
|
||||
*/
|
||||
SecretKey.prototype.isDecrypted = function() {
|
||||
SecretKeyPacket.prototype.isDecrypted = function() {
|
||||
return this.isEncrypted === false;
|
||||
};
|
||||
|
||||
|
@ -262,7 +262,7 @@ SecretKey.prototype.isDecrypted = function() {
|
|||
* Check whether this is a gnu-dummy key
|
||||
* @returns {Boolean}
|
||||
*/
|
||||
SecretKey.prototype.isDummy = function() {
|
||||
SecretKeyPacket.prototype.isDummy = function() {
|
||||
return !!(this.s2k && this.s2k.type === 'gnu-dummy');
|
||||
};
|
||||
|
||||
|
@ -298,7 +298,7 @@ SecretKey.prototype.makeDummy = function () {
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SecretKey.prototype.encrypt = async function (passphrase) {
|
||||
SecretKeyPacket.prototype.encrypt = async function (passphrase) {
|
||||
if (this.isDummy()) {
|
||||
return false;
|
||||
}
|
||||
|
@ -347,13 +347,13 @@ async function produceEncryptionKey(s2k, passphrase, algorithm) {
|
|||
|
||||
/**
|
||||
* Decrypts the private key params which are needed to use the key.
|
||||
* {@link module:packet.SecretKey.isDecrypted} should be false, as
|
||||
* {@link SecretKeyPacket.isDecrypted} should be false, as
|
||||
* otherwise calls to this function will throw an error.
|
||||
* @param {String} passphrase The passphrase for this private key as string
|
||||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SecretKey.prototype.decrypt = async function (passphrase) {
|
||||
SecretKeyPacket.prototype.decrypt = async function (passphrase) {
|
||||
if (this.isDummy()) {
|
||||
this.isEncrypted = false;
|
||||
return false;
|
||||
|
@ -404,7 +404,7 @@ SecretKey.prototype.decrypt = async function (passphrase) {
|
|||
return true;
|
||||
};
|
||||
|
||||
SecretKey.prototype.generate = async function (bits, curve) {
|
||||
SecretKeyPacket.prototype.generate = async function (bits, curve) {
|
||||
const algo = enums.write(enums.publicKey, this.algorithm);
|
||||
this.params = await crypto.generateParams(algo, bits, curve);
|
||||
this.isEncrypted = false;
|
||||
|
@ -415,7 +415,7 @@ SecretKey.prototype.generate = async function (bits, curve) {
|
|||
* @throws {Error} if validation was not successful
|
||||
* @async
|
||||
*/
|
||||
SecretKey.prototype.validate = async function () {
|
||||
SecretKeyPacket.prototype.validate = async function () {
|
||||
if (this.isDummy()) {
|
||||
return;
|
||||
}
|
||||
|
@ -434,7 +434,7 @@ SecretKey.prototype.validate = async function () {
|
|||
/**
|
||||
* Clear private key parameters
|
||||
*/
|
||||
SecretKey.prototype.clearPrivateParams = function () {
|
||||
SecretKeyPacket.prototype.clearPrivateParams = function () {
|
||||
if (this.s2k && this.s2k.type === 'gnu-dummy') {
|
||||
this.isEncrypted = true;
|
||||
return;
|
||||
|
@ -449,4 +449,4 @@ SecretKey.prototype.clearPrivateParams = function () {
|
|||
this.isEncrypted = true;
|
||||
};
|
||||
|
||||
export default SecretKey;
|
||||
export default SecretKeyPacket;
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
* @requires enums
|
||||
*/
|
||||
|
||||
import SecretKey from './secret_key';
|
||||
import SecretKeyPacket from './secret_key';
|
||||
import enums from '../enums';
|
||||
|
||||
/**
|
||||
|
@ -28,14 +28,14 @@ import enums from '../enums';
|
|||
* Key packet and has exactly the same format.
|
||||
* @memberof module:packet
|
||||
* @constructor
|
||||
* @extends module:packet.SecretKey
|
||||
* @extends SecretKeyPacket
|
||||
*/
|
||||
function SecretSubkey(date = new Date()) {
|
||||
SecretKey.call(this, date);
|
||||
function SecretSubkeyPacket(date = new Date()) {
|
||||
SecretKeyPacket.call(this, date);
|
||||
this.tag = enums.packet.secretSubkey;
|
||||
}
|
||||
|
||||
SecretSubkey.prototype = new SecretKey();
|
||||
SecretSubkey.prototype.constructor = SecretSubkey;
|
||||
SecretSubkeyPacket.prototype = new SecretKeyPacket();
|
||||
SecretSubkeyPacket.prototype.constructor = SecretSubkeyPacket;
|
||||
|
||||
export default SecretSubkey;
|
||||
export default SecretSubkeyPacket;
|
||||
|
|
|
@ -45,7 +45,7 @@ import config from '../config';
|
|||
* @constructor
|
||||
* @param {Date} date the creation date of the signature
|
||||
*/
|
||||
function Signature(date = new Date()) {
|
||||
function SignaturePacket(date = new Date()) {
|
||||
this.tag = enums.packet.signature;
|
||||
this.version = 4; // This is set to 5 below if we sign with a V5 key.
|
||||
this.signatureType = null;
|
||||
|
@ -99,9 +99,9 @@ function Signature(date = new Date()) {
|
|||
/**
|
||||
* parsing function for a signature packet (tag 2).
|
||||
* @param {String} bytes payload of a tag 2 packet
|
||||
* @returns {module:packet.Signature} object representation
|
||||
* @returns {SignaturePacket} object representation
|
||||
*/
|
||||
Signature.prototype.read = function (bytes) {
|
||||
SignaturePacket.prototype.read = function (bytes) {
|
||||
let i = 0;
|
||||
this.version = bytes[i++];
|
||||
|
||||
|
@ -134,7 +134,7 @@ Signature.prototype.read = function (bytes) {
|
|||
this.signature = bytes.subarray(i, bytes.length);
|
||||
};
|
||||
|
||||
Signature.prototype.write = function () {
|
||||
SignaturePacket.prototype.write = function () {
|
||||
const arr = [];
|
||||
arr.push(this.signatureData);
|
||||
arr.push(this.write_unhashed_sub_packets());
|
||||
|
@ -145,14 +145,14 @@ Signature.prototype.write = function () {
|
|||
|
||||
/**
|
||||
* Signs provided data. This needs to be done prior to serialization.
|
||||
* @param {module:packet.SecretKey} key private key used to sign the message.
|
||||
* @param {SecretKeyPacket} key private key used to sign the message.
|
||||
* @param {Object} data Contains packets to be signed.
|
||||
* @param {Boolean} detached (optional) whether to create a detached signature
|
||||
* @param {Boolean} streaming (optional) whether to process data as a stream
|
||||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
Signature.prototype.sign = async function (key, data, detached = false, streaming = false) {
|
||||
SignaturePacket.prototype.sign = async function (key, data, detached = false, streaming = false) {
|
||||
const signatureType = enums.write(enums.signature, this.signatureType);
|
||||
const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm);
|
||||
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
|
||||
|
@ -197,7 +197,7 @@ Signature.prototype.sign = async function (key, data, detached = false, streamin
|
|||
* Creates Uint8Array of bytes of all subpacket data except Issuer and Embedded Signature subpackets
|
||||
* @returns {Uint8Array} subpacket data
|
||||
*/
|
||||
Signature.prototype.write_hashed_sub_packets = function () {
|
||||
SignaturePacket.prototype.write_hashed_sub_packets = function () {
|
||||
const sub = enums.signatureSubpacket;
|
||||
const arr = [];
|
||||
let bytes;
|
||||
|
@ -300,7 +300,7 @@ Signature.prototype.write_hashed_sub_packets = function () {
|
|||
* Creates Uint8Array of bytes of Issuer and Embedded Signature subpackets
|
||||
* @returns {Uint8Array} subpacket data
|
||||
*/
|
||||
Signature.prototype.write_unhashed_sub_packets = function() {
|
||||
SignaturePacket.prototype.write_unhashed_sub_packets = function() {
|
||||
const sub = enums.signatureSubpacket;
|
||||
const arr = [];
|
||||
let bytes;
|
||||
|
@ -347,7 +347,7 @@ function write_sub_packet(type, data) {
|
|||
|
||||
// V4 signature sub packets
|
||||
|
||||
Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
|
||||
SignaturePacket.prototype.read_sub_packet = function (bytes, trusted = true) {
|
||||
let mypos = 0;
|
||||
|
||||
const read_array = (prop, bytes) => {
|
||||
|
@ -515,7 +515,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
|
|||
}
|
||||
case 32:
|
||||
// Embedded Signature
|
||||
this.embeddedSignature = new Signature();
|
||||
this.embeddedSignature = new SignaturePacket();
|
||||
this.embeddedSignature.read(bytes.subarray(mypos, bytes.length));
|
||||
break;
|
||||
case 33:
|
||||
|
@ -543,7 +543,7 @@ Signature.prototype.read_sub_packet = function (bytes, trusted = true) {
|
|||
}
|
||||
};
|
||||
|
||||
Signature.prototype.read_sub_packets = function(bytes, trusted = true) {
|
||||
SignaturePacket.prototype.read_sub_packets = function(bytes, trusted = true) {
|
||||
// Two-octet scalar octet count for following subpacket data.
|
||||
const subpacket_length = util.readNumber(bytes.subarray(0, 2));
|
||||
|
||||
|
@ -563,7 +563,7 @@ Signature.prototype.read_sub_packets = function(bytes, trusted = true) {
|
|||
};
|
||||
|
||||
// Produces data to produce signature on
|
||||
Signature.prototype.toSign = function (type, data) {
|
||||
SignaturePacket.prototype.toSign = function (type, data) {
|
||||
const t = enums.signature;
|
||||
|
||||
switch (type) {
|
||||
|
@ -632,7 +632,7 @@ Signature.prototype.toSign = function (type, data) {
|
|||
};
|
||||
|
||||
|
||||
Signature.prototype.calculateTrailer = function (data, detached) {
|
||||
SignaturePacket.prototype.calculateTrailer = function (data, detached) {
|
||||
let length = 0;
|
||||
return stream.transform(stream.clone(this.signatureData), value => {
|
||||
length += value.length;
|
||||
|
@ -657,13 +657,13 @@ Signature.prototype.calculateTrailer = function (data, detached) {
|
|||
};
|
||||
|
||||
|
||||
Signature.prototype.toHash = function(signatureType, data, detached = false) {
|
||||
SignaturePacket.prototype.toHash = function(signatureType, data, detached = false) {
|
||||
const bytes = this.toSign(signatureType, data);
|
||||
|
||||
return util.concat([bytes, this.signatureData, this.calculateTrailer(data, detached)]);
|
||||
};
|
||||
|
||||
Signature.prototype.hash = async function(signatureType, data, toHash, detached = false, streaming = true) {
|
||||
SignaturePacket.prototype.hash = async function(signatureType, data, toHash, detached = false, streaming = true) {
|
||||
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
|
||||
if (!toHash) toHash = this.toHash(signatureType, data, detached);
|
||||
if (!streaming && util.isStream(toHash)) {
|
||||
|
@ -675,15 +675,15 @@ Signature.prototype.hash = async function(signatureType, data, toHash, detached
|
|||
|
||||
/**
|
||||
* verifies the signature packet. Note: not all signature types are implemented
|
||||
* @param {module:packet.PublicSubkey|module:packet.PublicKey|
|
||||
* module:packet.SecretSubkey|module:packet.SecretKey} key the public key to verify the signature
|
||||
* @param {PublicSubkeyPacket|PublicKeyPacket|
|
||||
* SecretSubkeyPacket|SecretKeyPacket} key the public key to verify the signature
|
||||
* @param {module:enums.signature} signatureType expected signature type
|
||||
* @param {String|Object} data data which on the signature applies
|
||||
* @param {Boolean} detached (optional) whether to verify a detached signature
|
||||
* @returns {Promise<Boolean>} True if message is verified, else false.
|
||||
* @async
|
||||
*/
|
||||
Signature.prototype.verify = async function (key, signatureType, data, detached = false, streaming = false) {
|
||||
SignaturePacket.prototype.verify = async function (key, signatureType, data, detached = false, streaming = false) {
|
||||
const publicKeyAlgorithm = enums.write(enums.publicKey, this.publicKeyAlgorithm);
|
||||
const hashAlgorithm = enums.write(enums.hash, this.hashAlgorithm);
|
||||
|
||||
|
@ -757,7 +757,7 @@ Signature.prototype.verify = async function (key, signatureType, data, detached
|
|||
* @param {Date} date (optional) use the given date for verification instead of the current time
|
||||
* @returns {Boolean} true if expired
|
||||
*/
|
||||
Signature.prototype.isExpired = function (date = new Date()) {
|
||||
SignaturePacket.prototype.isExpired = function (date = new Date()) {
|
||||
const normDate = util.normalizeDate(date);
|
||||
if (normDate !== null) {
|
||||
const expirationTime = this.getExpirationTime();
|
||||
|
@ -770,8 +770,8 @@ Signature.prototype.isExpired = function (date = new Date()) {
|
|||
* Returns the expiration time of the signature or Infinity if signature does not expire
|
||||
* @returns {Date} expiration time
|
||||
*/
|
||||
Signature.prototype.getExpirationTime = function () {
|
||||
SignaturePacket.prototype.getExpirationTime = function () {
|
||||
return !this.signatureNeverExpires ? new Date(this.created.getTime() + this.signatureExpirationTime * 1000) : Infinity;
|
||||
};
|
||||
|
||||
export default Signature;
|
||||
export default SignaturePacket;
|
||||
|
|
|
@ -21,6 +21,7 @@
|
|||
* @requires crypto
|
||||
* @requires enums
|
||||
* @requires util
|
||||
* @requires packet
|
||||
*/
|
||||
|
||||
import stream from 'web-stream-tools';
|
||||
|
@ -28,6 +29,12 @@ import config from '../config';
|
|||
import crypto from '../crypto';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
|
||||
const VERSION = 1; // A one-octet version number of the data packet.
|
||||
|
||||
|
@ -40,8 +47,8 @@ const VERSION = 1; // A one-octet version number of the data packet.
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function SymEncryptedAEADProtected() {
|
||||
this.tag = enums.packet.symEncryptedAEADProtected;
|
||||
function SymEncryptedAEADProtectedDataPacket() {
|
||||
this.tag = enums.packet.symEncryptedAEADProtectedData;
|
||||
this.version = VERSION;
|
||||
this.cipherAlgo = null;
|
||||
this.aeadAlgorithm = 'eax';
|
||||
|
@ -52,13 +59,13 @@ function SymEncryptedAEADProtected() {
|
|||
this.packets = null;
|
||||
}
|
||||
|
||||
export default SymEncryptedAEADProtected;
|
||||
export default SymEncryptedAEADProtectedDataPacket;
|
||||
|
||||
/**
|
||||
* Parse an encrypted payload of bytes in the order: version, IV, ciphertext (see specification)
|
||||
* @param {Uint8Array | ReadableStream<Uint8Array>} bytes
|
||||
*/
|
||||
SymEncryptedAEADProtected.prototype.read = async function (bytes) {
|
||||
SymEncryptedAEADProtectedDataPacket.prototype.read = async function (bytes) {
|
||||
await stream.parse(bytes, async reader => {
|
||||
if (await reader.readByte() !== VERSION) { // The only currently defined value is 1.
|
||||
throw new Error('Invalid packet version.');
|
||||
|
@ -76,7 +83,7 @@ SymEncryptedAEADProtected.prototype.read = async function (bytes) {
|
|||
* Write the encrypted payload of bytes in the order: version, IV, ciphertext (see specification)
|
||||
* @returns {Uint8Array | ReadableStream<Uint8Array>} The encrypted payload
|
||||
*/
|
||||
SymEncryptedAEADProtected.prototype.write = function () {
|
||||
SymEncryptedAEADProtectedDataPacket.prototype.write = function () {
|
||||
return util.concat([new Uint8Array([this.version, this.cipherAlgo, this.aeadAlgo, this.chunkSizeByte]), this.iv, this.encrypted]);
|
||||
};
|
||||
|
||||
|
@ -88,8 +95,13 @@ SymEncryptedAEADProtected.prototype.write = function () {
|
|||
* @returns {Boolean}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedAEADProtected.prototype.decrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
await this.packets.read(await this.crypt('decrypt', key, stream.clone(this.encrypted), streaming), streaming);
|
||||
SymEncryptedAEADProtectedDataPacket.prototype.decrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
await this.packets.read(await this.crypt('decrypt', key, stream.clone(this.encrypted), streaming), {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
}, streaming);
|
||||
return true;
|
||||
};
|
||||
|
||||
|
@ -100,7 +112,7 @@ SymEncryptedAEADProtected.prototype.decrypt = async function (sessionKeyAlgorith
|
|||
* @param {Boolean} streaming Whether the top-level function will return a stream
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedAEADProtected.prototype.encrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
SymEncryptedAEADProtectedDataPacket.prototype.encrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
this.cipherAlgo = enums.write(enums.symmetric, sessionKeyAlgorithm);
|
||||
this.aeadAlgo = enums.write(enums.aead, this.aeadAlgorithm);
|
||||
const mode = crypto[enums.read(enums.aead, this.aeadAlgo)];
|
||||
|
@ -119,7 +131,7 @@ SymEncryptedAEADProtected.prototype.encrypt = async function (sessionKeyAlgorith
|
|||
* @returns {Uint8Array | ReadableStream<Uint8Array>}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedAEADProtected.prototype.crypt = async function (fn, key, data, streaming) {
|
||||
SymEncryptedAEADProtectedDataPacket.prototype.crypt = async function (fn, key, data, streaming) {
|
||||
const cipher = enums.read(enums.symmetric, this.cipherAlgo);
|
||||
const mode = crypto[enums.read(enums.aead, this.aeadAlgo)];
|
||||
const modeInstance = await mode(cipher, key);
|
|
@ -22,6 +22,7 @@
|
|||
* @requires crypto
|
||||
* @requires enums
|
||||
* @requires util
|
||||
* @requires packet
|
||||
*/
|
||||
|
||||
import stream from 'web-stream-tools';
|
||||
|
@ -29,6 +30,12 @@ import config from '../config';
|
|||
import crypto from '../crypto';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
|
||||
const VERSION = 1; // A one-octet version number of the data packet.
|
||||
|
||||
|
@ -44,8 +51,8 @@ const VERSION = 1; // A one-octet version number of the data packet.
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function SymEncryptedIntegrityProtected() {
|
||||
this.tag = enums.packet.symEncryptedIntegrityProtected;
|
||||
function SymEncryptedIntegrityProtectedDataPacket() {
|
||||
this.tag = enums.packet.symEncryptedIntegrityProtectedData;
|
||||
this.version = VERSION;
|
||||
/** The encrypted payload. */
|
||||
this.encrypted = null; // string
|
||||
|
@ -59,7 +66,7 @@ function SymEncryptedIntegrityProtected() {
|
|||
this.packets = null;
|
||||
}
|
||||
|
||||
SymEncryptedIntegrityProtected.prototype.read = async function (bytes) {
|
||||
SymEncryptedIntegrityProtectedDataPacket.prototype.read = async function (bytes) {
|
||||
await stream.parse(bytes, async reader => {
|
||||
|
||||
// - A one-octet version number. The only currently defined value is 1.
|
||||
|
@ -74,7 +81,7 @@ SymEncryptedIntegrityProtected.prototype.read = async function (bytes) {
|
|||
});
|
||||
};
|
||||
|
||||
SymEncryptedIntegrityProtected.prototype.write = function () {
|
||||
SymEncryptedIntegrityProtectedDataPacket.prototype.write = function () {
|
||||
return util.concat([new Uint8Array([VERSION]), this.encrypted]);
|
||||
};
|
||||
|
||||
|
@ -86,7 +93,7 @@ SymEncryptedIntegrityProtected.prototype.write = function () {
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedIntegrityProtected.prototype.encrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
SymEncryptedIntegrityProtectedDataPacket.prototype.encrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
let bytes = this.packets.write();
|
||||
if (!streaming) bytes = await stream.readToEnd(bytes);
|
||||
const prefix = await crypto.getPrefixRandom(sessionKeyAlgorithm);
|
||||
|
@ -108,7 +115,7 @@ SymEncryptedIntegrityProtected.prototype.encrypt = async function (sessionKeyAlg
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedIntegrityProtected.prototype.decrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
SymEncryptedIntegrityProtectedDataPacket.prototype.decrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
let encrypted = stream.clone(this.encrypted);
|
||||
if (!streaming) encrypted = await stream.readToEnd(encrypted);
|
||||
const decrypted = await crypto.cfb.decrypt(sessionKeyAlgorithm, key, encrypted, new Uint8Array(crypto.cipher[sessionKeyAlgorithm].blockSize));
|
||||
|
@ -132,8 +139,13 @@ SymEncryptedIntegrityProtected.prototype.decrypt = async function (sessionKeyAlg
|
|||
if (!util.isStream(encrypted) || !config.allowUnauthenticatedStream) {
|
||||
packetbytes = await stream.readToEnd(packetbytes);
|
||||
}
|
||||
await this.packets.read(packetbytes, streaming);
|
||||
await this.packets.read(packetbytes, {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
}, streaming);
|
||||
return true;
|
||||
};
|
||||
|
||||
export default SymEncryptedIntegrityProtected;
|
||||
export default SymEncryptedIntegrityProtectedDataPacket;
|
|
@ -47,7 +47,7 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function SymEncryptedSessionKey() {
|
||||
function SymEncryptedSessionKeyPacket() {
|
||||
this.tag = enums.packet.symEncryptedSessionKey;
|
||||
this.version = config.aeadProtect ? 5 : 4;
|
||||
this.sessionKey = null;
|
||||
|
@ -67,9 +67,9 @@ function SymEncryptedSessionKey() {
|
|||
* @param {Integer} len
|
||||
* Length of the packet or the remaining length of
|
||||
* input at position
|
||||
* @returns {module:packet.SymEncryptedSessionKey} Object representation
|
||||
* @returns {SymEncryptedSessionKeyPacket} Object representation
|
||||
*/
|
||||
SymEncryptedSessionKey.prototype.read = function(bytes) {
|
||||
SymEncryptedSessionKeyPacket.prototype.read = function(bytes) {
|
||||
let offset = 0;
|
||||
|
||||
// A one-octet version number. The only currently defined version is 4.
|
||||
|
@ -105,7 +105,7 @@ SymEncryptedSessionKey.prototype.read = function(bytes) {
|
|||
}
|
||||
};
|
||||
|
||||
SymEncryptedSessionKey.prototype.write = function() {
|
||||
SymEncryptedSessionKeyPacket.prototype.write = function() {
|
||||
const algo = this.encrypted === null ?
|
||||
this.sessionKeyAlgorithm :
|
||||
this.sessionKeyEncryptionAlgorithm;
|
||||
|
@ -131,7 +131,7 @@ SymEncryptedSessionKey.prototype.write = function() {
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedSessionKey.prototype.decrypt = async function(passphrase) {
|
||||
SymEncryptedSessionKeyPacket.prototype.decrypt = async function(passphrase) {
|
||||
const algo = this.sessionKeyEncryptionAlgorithm !== null ?
|
||||
this.sessionKeyEncryptionAlgorithm :
|
||||
this.sessionKeyAlgorithm;
|
||||
|
@ -162,7 +162,7 @@ SymEncryptedSessionKey.prototype.decrypt = async function(passphrase) {
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymEncryptedSessionKey.prototype.encrypt = async function(passphrase) {
|
||||
SymEncryptedSessionKeyPacket.prototype.encrypt = async function(passphrase) {
|
||||
const algo = this.sessionKeyEncryptionAlgorithm !== null ?
|
||||
this.sessionKeyEncryptionAlgorithm :
|
||||
this.sessionKeyAlgorithm;
|
||||
|
@ -194,4 +194,4 @@ SymEncryptedSessionKey.prototype.encrypt = async function(passphrase) {
|
|||
return true;
|
||||
};
|
||||
|
||||
export default SymEncryptedSessionKey;
|
||||
export default SymEncryptedSessionKeyPacket;
|
||||
|
|
|
@ -21,6 +21,7 @@
|
|||
* @requires crypto
|
||||
* @requires enums
|
||||
* @requires util
|
||||
* @requires packet
|
||||
*/
|
||||
|
||||
import stream from 'web-stream-tools';
|
||||
|
@ -28,6 +29,12 @@ import config from '../config';
|
|||
import crypto from '../crypto';
|
||||
import enums from '../enums';
|
||||
import util from '../util';
|
||||
import {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
} from '../packet';
|
||||
|
||||
/**
|
||||
* Implementation of the Symmetrically Encrypted Data Packet (Tag 9)
|
||||
|
@ -41,19 +48,19 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function SymmetricallyEncrypted() {
|
||||
function SymmetricallyEncryptedDataPacket() {
|
||||
/**
|
||||
* Packet type
|
||||
* @type {module:enums.packet}
|
||||
*/
|
||||
this.tag = enums.packet.symmetricallyEncrypted;
|
||||
this.tag = enums.packet.symmetricallyEncryptedData;
|
||||
/**
|
||||
* Encrypted secret-key data
|
||||
*/
|
||||
this.encrypted = null;
|
||||
/**
|
||||
* Decrypted packets contained within.
|
||||
* @type {module:packet.List}
|
||||
* @type {PacketList}
|
||||
*/
|
||||
this.packets = null;
|
||||
/**
|
||||
|
@ -63,11 +70,11 @@ function SymmetricallyEncrypted() {
|
|||
this.ignoreMdcError = config.ignoreMdcError;
|
||||
}
|
||||
|
||||
SymmetricallyEncrypted.prototype.read = function (bytes) {
|
||||
SymmetricallyEncryptedDataPacket.prototype.read = function (bytes) {
|
||||
this.encrypted = bytes;
|
||||
};
|
||||
|
||||
SymmetricallyEncrypted.prototype.write = function () {
|
||||
SymmetricallyEncryptedDataPacket.prototype.write = function () {
|
||||
return this.encrypted;
|
||||
};
|
||||
|
||||
|
@ -79,7 +86,7 @@ SymmetricallyEncrypted.prototype.write = function () {
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymmetricallyEncrypted.prototype.decrypt = async function (sessionKeyAlgorithm, key) {
|
||||
SymmetricallyEncryptedDataPacket.prototype.decrypt = async function (sessionKeyAlgorithm, key, streaming) {
|
||||
// If MDC errors are not being ignored, all missing MDC packets in symmetrically encrypted data should throw an error
|
||||
if (!this.ignoreMdcError) {
|
||||
throw new Error('Decryption failed due to missing MDC.');
|
||||
|
@ -91,7 +98,12 @@ SymmetricallyEncrypted.prototype.decrypt = async function (sessionKeyAlgorithm,
|
|||
this.encrypted.subarray(2, crypto.cipher[sessionKeyAlgorithm].blockSize + 2)
|
||||
);
|
||||
|
||||
await this.packets.read(decrypted);
|
||||
await this.packets.read(decrypted, {
|
||||
LiteralDataPacket,
|
||||
CompressedDataPacket,
|
||||
OnePassSignaturePacket,
|
||||
SignaturePacket
|
||||
}, streaming);
|
||||
|
||||
return true;
|
||||
};
|
||||
|
@ -104,7 +116,7 @@ SymmetricallyEncrypted.prototype.decrypt = async function (sessionKeyAlgorithm,
|
|||
* @returns {Promise<Boolean>}
|
||||
* @async
|
||||
*/
|
||||
SymmetricallyEncrypted.prototype.encrypt = async function (algo, key) {
|
||||
SymmetricallyEncryptedDataPacket.prototype.encrypt = async function (algo, key) {
|
||||
const data = this.packets.write();
|
||||
|
||||
const prefix = await crypto.getPrefixRandom(algo);
|
||||
|
@ -115,4 +127,4 @@ SymmetricallyEncrypted.prototype.encrypt = async function (algo, key) {
|
|||
return true;
|
||||
};
|
||||
|
||||
export default SymmetricallyEncrypted;
|
||||
export default SymmetricallyEncryptedDataPacket;
|
|
@ -21,7 +21,7 @@ import enums from '../enums';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function Trust() {
|
||||
function TrustPacket() {
|
||||
this.tag = enums.packet.trust;
|
||||
}
|
||||
|
||||
|
@ -30,6 +30,6 @@ function Trust() {
|
|||
* Currently not implemented as we ignore trust packets
|
||||
* @param {String} byptes payload of a tag 12 packet
|
||||
*/
|
||||
Trust.prototype.read = function () {}; // TODO
|
||||
TrustPacket.prototype.read = function () {}; // TODO
|
||||
|
||||
export default Trust;
|
||||
export default TrustPacket;
|
||||
|
|
|
@ -44,7 +44,7 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function UserAttribute() {
|
||||
function UserAttributePacket() {
|
||||
this.tag = enums.packet.userAttribute;
|
||||
this.attributes = [];
|
||||
}
|
||||
|
@ -53,7 +53,7 @@ function UserAttribute() {
|
|||
* parsing function for a user attribute packet (tag 17).
|
||||
* @param {Uint8Array} input payload of a tag 17 packet
|
||||
*/
|
||||
UserAttribute.prototype.read = function(bytes) {
|
||||
UserAttributePacket.prototype.read = function(bytes) {
|
||||
let i = 0;
|
||||
while (i < bytes.length) {
|
||||
const len = packet.readSimpleLength(bytes.subarray(i, bytes.length));
|
||||
|
@ -68,7 +68,7 @@ UserAttribute.prototype.read = function(bytes) {
|
|||
* Creates a binary representation of the user attribute packet
|
||||
* @returns {Uint8Array} string representation
|
||||
*/
|
||||
UserAttribute.prototype.write = function() {
|
||||
UserAttributePacket.prototype.write = function() {
|
||||
const arr = [];
|
||||
for (let i = 0; i < this.attributes.length; i++) {
|
||||
arr.push(packet.writeSimpleLength(this.attributes[i].length));
|
||||
|
@ -79,11 +79,11 @@ UserAttribute.prototype.write = function() {
|
|||
|
||||
/**
|
||||
* Compare for equality
|
||||
* @param {module:packet.UserAttribute} usrAttr
|
||||
* @param {UserAttributePacket} usrAttr
|
||||
* @returns {Boolean} true if equal
|
||||
*/
|
||||
UserAttribute.prototype.equals = function(usrAttr) {
|
||||
if (!usrAttr || !(usrAttr instanceof UserAttribute)) {
|
||||
UserAttributePacket.prototype.equals = function(usrAttr) {
|
||||
if (!usrAttr || !(usrAttr instanceof UserAttributePacket)) {
|
||||
return false;
|
||||
}
|
||||
return this.attributes.every(function(attr, index) {
|
||||
|
@ -91,4 +91,4 @@ UserAttribute.prototype.equals = function(usrAttr) {
|
|||
});
|
||||
};
|
||||
|
||||
export default UserAttribute;
|
||||
export default UserAttributePacket;
|
||||
|
|
|
@ -34,8 +34,8 @@ import util from '../util';
|
|||
* @memberof module:packet
|
||||
* @constructor
|
||||
*/
|
||||
function Userid() {
|
||||
this.tag = enums.packet.userid;
|
||||
function UserIDPacket() {
|
||||
this.tag = enums.packet.userID;
|
||||
/** A string containing the user id. Usually in the form
|
||||
* John Doe <john@example.com>
|
||||
* @type {String}
|
||||
|
@ -51,14 +51,14 @@ function Userid() {
|
|||
* Parsing function for a user id packet (tag 13).
|
||||
* @param {Uint8Array} input payload of a tag 13 packet
|
||||
*/
|
||||
Userid.prototype.read = function (bytes) {
|
||||
UserIDPacket.prototype.read = function (bytes) {
|
||||
this.parse(util.decodeUtf8(bytes));
|
||||
};
|
||||
|
||||
/**
|
||||
* Parse userid string, e.g. 'John Doe <john@example.com>'
|
||||
*/
|
||||
Userid.prototype.parse = function (userid) {
|
||||
UserIDPacket.prototype.parse = function (userid) {
|
||||
try {
|
||||
Object.assign(this, util.parseUserId(userid));
|
||||
} catch (e) {}
|
||||
|
@ -69,14 +69,14 @@ Userid.prototype.parse = function (userid) {
|
|||
* Creates a binary representation of the user id packet
|
||||
* @returns {Uint8Array} binary representation
|
||||
*/
|
||||
Userid.prototype.write = function () {
|
||||
UserIDPacket.prototype.write = function () {
|
||||
return util.encodeUtf8(this.userid);
|
||||
};
|
||||
|
||||
/**
|
||||
* Set userid string from object, e.g. { name:'Phil Zimmermann', email:'phil@openpgp.org' }
|
||||
*/
|
||||
Userid.prototype.format = function (userid) {
|
||||
UserIDPacket.prototype.format = function (userid) {
|
||||
if (util.isString(userid)) {
|
||||
userid = util.parseUserId(userid);
|
||||
}
|
||||
|
@ -84,4 +84,4 @@ Userid.prototype.format = function (userid) {
|
|||
this.userid = util.formatUserId(userid);
|
||||
};
|
||||
|
||||
export default Userid;
|
||||
export default UserIDPacket;
|
||||
|
|
|
@ -23,19 +23,19 @@
|
|||
*/
|
||||
|
||||
import armor from './encoding/armor';
|
||||
import packet from './packet';
|
||||
import { PacketList, SignaturePacket } from './packet';
|
||||
import enums from './enums';
|
||||
|
||||
/**
|
||||
* @class
|
||||
* @classdesc Class that represents an OpenPGP signature.
|
||||
* @param {module:packet.List} packetlist The signature packets
|
||||
* @param {PacketList} packetlist The signature packets
|
||||
*/
|
||||
export function Signature(packetlist) {
|
||||
if (!(this instanceof Signature)) {
|
||||
return new Signature(packetlist);
|
||||
}
|
||||
this.packets = packetlist || new packet.List();
|
||||
this.packets = packetlist || new PacketList();
|
||||
}
|
||||
|
||||
|
||||
|
@ -75,7 +75,7 @@ export async function readArmored(armoredText) {
|
|||
* @static
|
||||
*/
|
||||
export async function read(input) {
|
||||
const packetlist = new packet.List();
|
||||
await packetlist.read(input);
|
||||
const packetlist = new PacketList();
|
||||
await packetlist.read(input, { SignaturePacket });
|
||||
return new Signature(packetlist);
|
||||
}
|
||||
|
|
|
@ -2609,8 +2609,8 @@ module.exports = () => describe('Key', function() {
|
|||
43 ee 3b 24 06
|
||||
`.replace(/\s+/g, ''));
|
||||
|
||||
let packetlist = new openpgp.packet.List();
|
||||
await packetlist.read(packetBytes);
|
||||
let packetlist = new openpgp.PacketList();
|
||||
await packetlist.read(packetBytes, { PublicKeyPacket: openpgp.PublicKeyPacket });
|
||||
let key = packetlist[0];
|
||||
expect(key).to.exist;
|
||||
});
|
||||
|
@ -2638,9 +2638,9 @@ module.exports = () => describe('Key', function() {
|
|||
const pubKey = await openpgp.key.readArmored(pub_sig_test);
|
||||
expect(pubKey).to.exist;
|
||||
|
||||
const packetlist = new openpgp.packet.List();
|
||||
const packetlist = new openpgp.PacketList();
|
||||
|
||||
await packetlist.read((await openpgp.armor.decode(pub_sig_test)).data);
|
||||
await packetlist.read((await openpgp.armor.decode(pub_sig_test)).data, openpgp);
|
||||
|
||||
const subkeys = pubKey.getSubkeys();
|
||||
expect(subkeys).to.exist;
|
||||
|
@ -2886,7 +2886,7 @@ module.exports = () => describe('Key', function() {
|
|||
expect(source.revocationSignatures).to.exist;
|
||||
dest.revocationSignatures = [];
|
||||
return dest.update(source).then(() => {
|
||||
expect(dest.revocationSignatures[0]).to.exist.and.be.an.instanceof(openpgp.packet.Signature);
|
||||
expect(dest.revocationSignatures[0]).to.exist.and.be.an.instanceof(openpgp.SignaturePacket);
|
||||
});
|
||||
});
|
||||
|
||||
|
@ -3064,8 +3064,8 @@ module.exports = () => describe('Key', function() {
|
|||
const revocationCertificate = await revKey.getRevocationCertificate();
|
||||
|
||||
const input = await openpgp.armor.decode(revocation_certificate_arm4);
|
||||
const packetlist = new openpgp.packet.List();
|
||||
await packetlist.read(input.data);
|
||||
const packetlist = new openpgp.PacketList();
|
||||
await packetlist.read(input.data, { SignaturePacket: openpgp.SignaturePacket });
|
||||
const armored = openpgp.armor.encode(openpgp.enums.armor.publicKey, packetlist.write());
|
||||
|
||||
expect(revocationCertificate.replace(/^Comment: .*$\r\n/mg, '')).to.equal(armored.replace(/^Comment: .*$\r\n/mg, ''));
|
||||
|
@ -3158,7 +3158,7 @@ module.exports = () => describe('Key', function() {
|
|||
expect(primUser.user.userId.name).to.equal('Signature Test');
|
||||
expect(primUser.user.userId.email).to.equal('signature@test.com');
|
||||
expect(primUser.user.userId.comment).to.equal('');
|
||||
expect(primUser.selfCertification).to.be.an.instanceof(openpgp.packet.Signature);
|
||||
expect(primUser.selfCertification).to.be.an.instanceof(openpgp.SignaturePacket);
|
||||
});
|
||||
|
||||
it('getPrimaryUser() should throw if no UserIDs are bound', async function() {
|
||||
|
|
|
@ -452,8 +452,8 @@ function withCompression(tests) {
|
|||
let decompressSpy;
|
||||
|
||||
beforeEach(function () {
|
||||
compressSpy = spy(openpgp.packet.Compressed.prototype, 'compress');
|
||||
decompressSpy = spy(openpgp.packet.Compressed.prototype, 'decompress');
|
||||
compressSpy = spy(openpgp.CompressedDataPacket.prototype, 'compress');
|
||||
decompressSpy = spy(openpgp.CompressedDataPacket.prototype, 'decompress');
|
||||
});
|
||||
|
||||
afterEach(function () {
|
||||
|
@ -1080,7 +1080,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
return openpgp.encrypt(encOpt).then(async function (encrypted) {
|
||||
expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/);
|
||||
decOpt.message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(false);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(false);
|
||||
return openpgp.decrypt(decOpt);
|
||||
}).then(function (decrypted) {
|
||||
expect(decrypted.data).to.equal(plaintext);
|
||||
|
@ -1103,7 +1103,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
return openpgp.encrypt(encOpt).then(async function (encrypted) {
|
||||
expect(encrypted).to.match(/^-----BEGIN PGP MESSAGE/);
|
||||
decOpt.message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(false);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(false);
|
||||
return openpgp.decrypt(decOpt);
|
||||
}).then(function (decrypted) {
|
||||
expect(decrypted.data).to.equal(plaintext);
|
||||
|
@ -1122,7 +1122,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
};
|
||||
return openpgp.encrypt(encOpt).then(async function (encrypted) {
|
||||
decOpt.message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(openpgp.config.aeadProtect);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(openpgp.config.aeadProtect);
|
||||
return openpgp.decrypt(decOpt);
|
||||
}).then(async function (decrypted) {
|
||||
expect(decrypted.data).to.equal(plaintext);
|
||||
|
@ -1145,7 +1145,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
};
|
||||
return openpgp.encrypt(encOpt).then(async function (encrypted) {
|
||||
decOpt.message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(false);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(false);
|
||||
return openpgp.decrypt(decOpt);
|
||||
}).then(async function (decrypted) {
|
||||
expect(decrypted.data).to.equal(plaintext);
|
||||
|
@ -1176,7 +1176,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
};
|
||||
return openpgp.encrypt(encOpt).then(async function (encrypted) {
|
||||
decOpt.message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(openpgp.config.aeadProtect);
|
||||
expect(!!decOpt.message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(openpgp.config.aeadProtect);
|
||||
return openpgp.decrypt(decOpt);
|
||||
}).then(async function (decrypted) {
|
||||
expect(decrypted.data).to.equal(plaintext);
|
||||
|
@ -1205,7 +1205,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
detached: true
|
||||
});
|
||||
const message = await openpgp.message.readArmored(encrypted);
|
||||
expect(!!message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtected)).to.equal(openpgp.config.aeadProtect);
|
||||
expect(!!message.packets.findPacket(openpgp.enums.packet.symEncryptedAEADProtectedData)).to.equal(openpgp.config.aeadProtect);
|
||||
const decrypted = await openpgp.decrypt({
|
||||
message,
|
||||
signature: await openpgp.signature.readArmored(signed),
|
||||
|
@ -2020,9 +2020,9 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
return openpgp.sign(signOpt).then(async function (signed) {
|
||||
const message = await openpgp.message.read(signed);
|
||||
message.packets.concat(await openpgp.stream.readToEnd(message.packets.stream, _ => _));
|
||||
const packets = new openpgp.packet.List();
|
||||
const packets = new openpgp.PacketList();
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.signature));
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.literal));
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.literalData));
|
||||
verifyOpt.message = new openpgp.message.Message(packets);
|
||||
return openpgp.verify(verifyOpt);
|
||||
}).then(async function (verified) {
|
||||
|
@ -2052,9 +2052,9 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
expect(openpgp.util.isStream(signed)).to.equal(useNativeStream ? 'web' : 'ponyfill');
|
||||
const message = await openpgp.message.read(signed);
|
||||
message.packets.concat(await openpgp.stream.readToEnd(message.packets.stream, _ => _));
|
||||
const packets = new openpgp.packet.List();
|
||||
const packets = new openpgp.PacketList();
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.signature));
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.literal));
|
||||
packets.push(message.packets.findPacket(openpgp.enums.packet.literalData));
|
||||
verifyOpt.message = new openpgp.message.Message(packets);
|
||||
return openpgp.verify(verifyOpt);
|
||||
}).then(async function (verified) {
|
||||
|
@ -2080,7 +2080,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
const message = await openpgp.message.read(encrypted);
|
||||
return message.decrypt([privateKey_2038_2045]);
|
||||
}).then(async function (packets) {
|
||||
const literals = packets.packets.filterByTag(openpgp.enums.packet.literal);
|
||||
const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData);
|
||||
expect(literals.length).to.equal(1);
|
||||
expect(+literals[0].date).to.equal(+future);
|
||||
expect(await openpgp.stream.readToEnd(packets.getText())).to.equal(plaintext);
|
||||
|
@ -2101,7 +2101,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
const message = await openpgp.message.read(encrypted);
|
||||
return message.decrypt([privateKey_2000_2008]);
|
||||
}).then(async function (packets) {
|
||||
const literals = packets.packets.filterByTag(openpgp.enums.packet.literal);
|
||||
const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData);
|
||||
expect(literals.length).to.equal(1);
|
||||
expect(+literals[0].date).to.equal(+past);
|
||||
expect(await openpgp.stream.readToEnd(packets.getLiteralData())).to.deep.equal(data);
|
||||
|
@ -2122,7 +2122,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
const message = await openpgp.message.read(encrypted);
|
||||
return message.decrypt([privateKey_2000_2008]);
|
||||
}).then(async function (message) {
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literal);
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literalData);
|
||||
expect(literals.length).to.equal(1);
|
||||
expect(+literals[0].date).to.equal(+past);
|
||||
const signatures = await message.verify([publicKey_2000_2008], past);
|
||||
|
@ -2150,7 +2150,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
const message = await openpgp.message.read(encrypted);
|
||||
return message.decrypt([privateKey_2038_2045]);
|
||||
}).then(async function (message) {
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literal);
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literalData);
|
||||
expect(literals.length).to.equal(1);
|
||||
expect(literals[0].format).to.equal('binary');
|
||||
expect(+literals[0].date).to.equal(+future);
|
||||
|
@ -2179,7 +2179,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() {
|
|||
const message = await openpgp.message.read(encrypted);
|
||||
return message.decrypt([privateKey_2038_2045]);
|
||||
}).then(async function (message) {
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literal);
|
||||
const literals = message.packets.filterByTag(openpgp.enums.packet.literalData);
|
||||
expect(literals.length).to.equal(1);
|
||||
expect(literals[0].format).to.equal('mime');
|
||||
expect(+literals[0].date).to.equal(+future);
|
||||
|
|
|
@ -62,13 +62,13 @@ module.exports = () => describe("Packet", function() {
|
|||
'-----END PGP PRIVATE KEY BLOCK-----';
|
||||
|
||||
it('Symmetrically encrypted packet', async function() {
|
||||
const message = new openpgp.packet.List();
|
||||
const message = new openpgp.PacketList();
|
||||
const testText = input.createSomeMessage();
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
literal.setText(testText);
|
||||
|
||||
const enc = new openpgp.packet.SymmetricallyEncrypted();
|
||||
const enc = new openpgp.SymmetricallyEncryptedDataPacket();
|
||||
message.push(enc);
|
||||
enc.packets.push(literal);
|
||||
|
||||
|
@ -78,7 +78,7 @@ module.exports = () => describe("Packet", function() {
|
|||
await enc.encrypt(algo, key);
|
||||
|
||||
const msg2 = new openpgp.message.Message();
|
||||
await msg2.packets.read(message.write());
|
||||
await msg2.packets.read(message.write(), { SymmetricallyEncryptedDataPacket: openpgp.SymmetricallyEncryptedDataPacket });
|
||||
msg2.packets[0].ignoreMdcError = true;
|
||||
const dec = await msg2.decrypt(null, null, [{ algorithm: algo, data: key }]);
|
||||
|
||||
|
@ -86,13 +86,13 @@ module.exports = () => describe("Packet", function() {
|
|||
});
|
||||
|
||||
it('Symmetrically encrypted packet - MDC error for modern cipher', async function() {
|
||||
const message = new openpgp.packet.List();
|
||||
const message = new openpgp.PacketList();
|
||||
const testText = input.createSomeMessage();
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
literal.setText(testText);
|
||||
|
||||
const enc = new openpgp.packet.SymmetricallyEncrypted();
|
||||
const enc = new openpgp.SymmetricallyEncryptedDataPacket();
|
||||
message.push(enc);
|
||||
await enc.packets.push(literal);
|
||||
|
||||
|
@ -101,8 +101,8 @@ module.exports = () => describe("Packet", function() {
|
|||
|
||||
await enc.encrypt(algo, key);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(message.write());
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(message.write(), { SymmetricallyEncryptedDataPacket: openpgp.SymmetricallyEncryptedDataPacket });
|
||||
await expect(msg2[0].decrypt(algo, key)).to.eventually.be.rejectedWith('Decryption failed due to missing MDC.');
|
||||
});
|
||||
|
||||
|
@ -111,17 +111,17 @@ module.exports = () => describe("Packet", function() {
|
|||
const algo = 'aes256';
|
||||
const testText = input.createSomeMessage();
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const enc = new openpgp.packet.SymEncryptedIntegrityProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const enc = new openpgp.SymEncryptedIntegrityProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(enc);
|
||||
literal.setText(testText);
|
||||
enc.packets.push(literal);
|
||||
await enc.encrypt(algo, key);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(msg.write());
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
|
||||
await msg2[0].decrypt(algo, key);
|
||||
|
||||
|
@ -132,18 +132,18 @@ module.exports = () => describe("Packet", function() {
|
|||
const key = new Uint8Array([1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2]);
|
||||
const algo = 'aes256';
|
||||
const testText = input.createSomeMessage();
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(enc);
|
||||
literal.setText(testText);
|
||||
enc.packets.push(literal);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
const msg2 = new openpgp.PacketList();
|
||||
|
||||
return enc.encrypt(algo, key).then(async function() {
|
||||
await msg2.read(msg.write());
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
return msg2[0].decrypt(algo, key);
|
||||
}).then(async function() {
|
||||
expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data);
|
||||
|
@ -158,19 +158,19 @@ module.exports = () => describe("Packet", function() {
|
|||
const key = new Uint8Array([1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2]);
|
||||
const algo = 'aes256';
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(enc);
|
||||
literal.setText(testText);
|
||||
enc.packets.push(literal);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
const msg2 = new openpgp.PacketList();
|
||||
|
||||
try {
|
||||
await enc.encrypt(algo, key);
|
||||
await msg2.read(msg.write());
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
await msg2[0].decrypt(algo, key);
|
||||
expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data);
|
||||
} finally {
|
||||
|
@ -213,20 +213,20 @@ module.exports = () => describe("Packet", function() {
|
|||
const key = new Uint8Array([1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2]);
|
||||
const algo = 'aes256';
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
enc.aeadAlgorithm = 'experimentalGcm';
|
||||
|
||||
msg.push(enc);
|
||||
literal.setText(testText);
|
||||
enc.packets.push(literal);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
const msg2 = new openpgp.PacketList();
|
||||
|
||||
try {
|
||||
await enc.encrypt(algo, key);
|
||||
await msg2.read(msg.write());
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
await msg2[0].decrypt(algo, key);
|
||||
expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data);
|
||||
expect(encryptStub.callCount > 1).to.be.true;
|
||||
|
@ -259,16 +259,16 @@ module.exports = () => describe("Packet", function() {
|
|||
const key = openpgp.util.hexToUint8Array('86 f1 ef b8 69 52 32 9f 24 ac d3 bf d0 e5 34 6d'.replace(/\s+/g, ''));
|
||||
const algo = 'aes128';
|
||||
|
||||
const literal = new openpgp.packet.Literal(0);
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket(0);
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(enc);
|
||||
literal.setBytes(openpgp.util.strToUint8Array('Hello, world!\n'), openpgp.enums.literal.binary);
|
||||
literal.filename = '';
|
||||
enc.packets.push(literal);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
const msg2 = new openpgp.PacketList();
|
||||
|
||||
let randomBytesStub = stub(openpgp.crypto.random, 'getRandomBytes');
|
||||
randomBytesStub.returns(resolves(iv));
|
||||
|
@ -277,7 +277,7 @@ module.exports = () => describe("Packet", function() {
|
|||
await enc.encrypt(algo, key);
|
||||
const data = msg.write();
|
||||
expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes);
|
||||
await msg2.read(data);
|
||||
await msg2.read(data, openpgp);
|
||||
await msg2[0].decrypt(algo, key);
|
||||
expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data);
|
||||
} finally {
|
||||
|
@ -299,8 +299,8 @@ module.exports = () => describe("Packet", function() {
|
|||
|
||||
const msgbytes = (await openpgp.armor.decode(msg)).data;
|
||||
|
||||
const parsed = new openpgp.packet.List();
|
||||
await parsed.read(msgbytes);
|
||||
const parsed = new openpgp.PacketList();
|
||||
await parsed.read(msgbytes, openpgp);
|
||||
|
||||
return parsed[0].decrypt('test').then(() => {
|
||||
const key = parsed[0].sessionKey;
|
||||
|
@ -325,9 +325,9 @@ module.exports = () => describe("Packet", function() {
|
|||
return new openpgp.MPI(k);
|
||||
});
|
||||
|
||||
const enc = new openpgp.packet.PublicKeyEncryptedSessionKey();
|
||||
const msg = new openpgp.packet.List();
|
||||
const msg2 = new openpgp.packet.List();
|
||||
const enc = new openpgp.PublicKeyEncryptedSessionKeyPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
const msg2 = new openpgp.PacketList();
|
||||
|
||||
enc.sessionKey = new Uint8Array([1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2]);
|
||||
enc.publicKeyAlgorithm = 'rsaEncryptSign';
|
||||
|
@ -337,7 +337,7 @@ module.exports = () => describe("Packet", function() {
|
|||
|
||||
msg.push(enc);
|
||||
|
||||
await msg2.read(msg.write());
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
|
||||
return msg2[0].decrypt({ algorithm: 'rsaEncryptSign', params: mpi, getFingerprintBytes() {} }).then(() => {
|
||||
|
||||
|
@ -371,11 +371,11 @@ module.exports = () => describe("Packet", function() {
|
|||
'=lKiS\n' +
|
||||
'-----END PGP PRIVATE KEY BLOCK-----';
|
||||
|
||||
let key = new openpgp.packet.List();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data);
|
||||
let key = new openpgp.PacketList();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data, openpgp);
|
||||
key = key[0];
|
||||
|
||||
const enc = new openpgp.packet.PublicKeyEncryptedSessionKey();
|
||||
const enc = new openpgp.PublicKeyEncryptedSessionKeyPacket();
|
||||
const secret = new Uint8Array([1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2]);
|
||||
|
||||
enc.sessionKey = secret;
|
||||
|
@ -438,12 +438,12 @@ module.exports = () => describe("Packet", function() {
|
|||
'=iSaK\n' +
|
||||
'-----END PGP MESSAGE-----';
|
||||
|
||||
let key = new openpgp.packet.List();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data);
|
||||
let key = new openpgp.PacketList();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data, openpgp);
|
||||
key = key[3];
|
||||
|
||||
const msg = new openpgp.packet.List();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data);
|
||||
const msg = new openpgp.PacketList();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data, openpgp);
|
||||
|
||||
return msg[0].decrypt(key).then(async () => {
|
||||
await msg[1].decrypt(msg[0].sessionKeyAlgorithm, msg[0].sessionKey);
|
||||
|
@ -459,10 +459,10 @@ module.exports = () => describe("Packet", function() {
|
|||
const algo = 'aes256';
|
||||
const testText = input.createSomeMessage();
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const key_enc = new openpgp.packet.SymEncryptedSessionKey();
|
||||
const enc = new openpgp.packet.SymEncryptedIntegrityProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const key_enc = new openpgp.SymEncryptedSessionKeyPacket();
|
||||
const enc = new openpgp.SymEncryptedIntegrityProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(key_enc);
|
||||
msg.push(enc);
|
||||
|
@ -476,8 +476,8 @@ module.exports = () => describe("Packet", function() {
|
|||
enc.packets.push(literal);
|
||||
await enc.encrypt(algo, key);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(msg.write());
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
|
||||
await msg2[0].decrypt(passphrase);
|
||||
const key2 = msg2[0].sessionKey;
|
||||
|
@ -495,10 +495,10 @@ module.exports = () => describe("Packet", function() {
|
|||
const algo = 'aes256';
|
||||
const testText = input.createSomeMessage();
|
||||
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const key_enc = new openpgp.packet.SymEncryptedSessionKey();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const key_enc = new openpgp.SymEncryptedSessionKeyPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(key_enc);
|
||||
msg.push(enc);
|
||||
|
@ -512,8 +512,8 @@ module.exports = () => describe("Packet", function() {
|
|||
enc.packets.push(literal);
|
||||
await enc.encrypt(algo, key);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(msg.write());
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(msg.write(), openpgp);
|
||||
|
||||
await msg2[0].decrypt(passphrase);
|
||||
const key2 = msg2[0].sessionKey;
|
||||
|
@ -563,10 +563,10 @@ module.exports = () => describe("Packet", function() {
|
|||
const passphrase = 'password';
|
||||
const algo = 'aes128';
|
||||
|
||||
const literal = new openpgp.packet.Literal(0);
|
||||
const key_enc = new openpgp.packet.SymEncryptedSessionKey();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket(0);
|
||||
const key_enc = new openpgp.SymEncryptedSessionKeyPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
|
||||
msg.push(key_enc);
|
||||
msg.push(enc);
|
||||
|
@ -584,8 +584,8 @@ module.exports = () => describe("Packet", function() {
|
|||
const data = msg.write();
|
||||
expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(data);
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(data, openpgp);
|
||||
|
||||
await msg2[0].decrypt(passphrase);
|
||||
const key2 = msg2[0].sessionKey;
|
||||
|
@ -638,10 +638,10 @@ module.exports = () => describe("Packet", function() {
|
|||
const passphrase = 'password';
|
||||
const algo = 'aes128';
|
||||
|
||||
const literal = new openpgp.packet.Literal(0);
|
||||
const key_enc = new openpgp.packet.SymEncryptedSessionKey();
|
||||
const enc = new openpgp.packet.SymEncryptedAEADProtected();
|
||||
const msg = new openpgp.packet.List();
|
||||
const literal = new openpgp.LiteralDataPacket(0);
|
||||
const key_enc = new openpgp.SymEncryptedSessionKeyPacket();
|
||||
const enc = new openpgp.SymEncryptedAEADProtectedDataPacket();
|
||||
const msg = new openpgp.PacketList();
|
||||
enc.aeadAlgorithm = key_enc.aeadAlgorithm = 'ocb';
|
||||
|
||||
msg.push(key_enc);
|
||||
|
@ -660,8 +660,8 @@ module.exports = () => describe("Packet", function() {
|
|||
const data = msg.write();
|
||||
expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes);
|
||||
|
||||
const msg2 = new openpgp.packet.List();
|
||||
await msg2.read(data);
|
||||
const msg2 = new openpgp.PacketList();
|
||||
await msg2.read(data, openpgp);
|
||||
|
||||
await msg2[0].decrypt(passphrase);
|
||||
const key2 = msg2[0].sessionKey;
|
||||
|
@ -689,13 +689,13 @@ module.exports = () => describe("Packet", function() {
|
|||
'=pR+C\n' +
|
||||
'-----END PGP MESSAGE-----';
|
||||
|
||||
let key = new openpgp.packet.List();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data);
|
||||
let key = new openpgp.PacketList();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data, openpgp);
|
||||
key = key[3];
|
||||
await key.decrypt('test');
|
||||
|
||||
const msg = new openpgp.packet.List();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data);
|
||||
const msg = new openpgp.PacketList();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data, openpgp);
|
||||
|
||||
return msg[0].decrypt(key).then(async () => {
|
||||
await msg[1].decrypt(msg[0].sessionKeyAlgorithm, msg[0].sessionKey);
|
||||
|
@ -707,8 +707,8 @@ module.exports = () => describe("Packet", function() {
|
|||
});
|
||||
|
||||
it('Secret key reading with signature verification.', async function() {
|
||||
const key = new openpgp.packet.List();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data);
|
||||
const key = new openpgp.PacketList();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data, openpgp);
|
||||
return Promise.all([
|
||||
expect(key[2].verify(key[0],
|
||||
openpgp.enums.signature.certGeneric,
|
||||
|
@ -742,12 +742,12 @@ module.exports = () => describe("Packet", function() {
|
|||
'=htrB\n' +
|
||||
'-----END PGP MESSAGE-----';
|
||||
|
||||
const key = new openpgp.packet.List();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data);
|
||||
const key = new openpgp.PacketList();
|
||||
await key.read((await openpgp.armor.decode(armored_key)).data, openpgp);
|
||||
await key[3].decrypt('test');
|
||||
|
||||
const msg = new openpgp.packet.List();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data);
|
||||
const msg = new openpgp.PacketList();
|
||||
await msg.read((await openpgp.armor.decode(armored_msg)).data, openpgp);
|
||||
|
||||
return msg[0].decrypt(key[3]).then(async () => {
|
||||
await msg[1].decrypt(msg[0].sessionKeyAlgorithm, msg[0].sessionKey);
|
||||
|
@ -842,8 +842,8 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
});
|
||||
|
||||
it('Writing and encryption of a secret key packet.', function() {
|
||||
const key = new openpgp.packet.List();
|
||||
key.push(new openpgp.packet.SecretKey());
|
||||
const key = new openpgp.PacketList();
|
||||
key.push(new openpgp.SecretKeyPacket());
|
||||
|
||||
const rsa = openpgp.crypto.publicKey.rsa;
|
||||
const keySize = openpgp.util.getWebCryptoAll() ? 2048 : 512; // webkit webcrypto accepts minimum 2048 bit keys
|
||||
|
@ -861,8 +861,8 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
|
||||
const raw = key.write();
|
||||
|
||||
const key2 = new openpgp.packet.List();
|
||||
await key2.read(raw);
|
||||
const key2 = new openpgp.PacketList();
|
||||
await key2.read(raw, openpgp);
|
||||
await key2[0].decrypt('hello');
|
||||
|
||||
expect(key[0].params.toString()).to.equal(key2[0].params.toString());
|
||||
|
@ -873,8 +873,8 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
let aeadProtectVal = openpgp.config.aeadProtect;
|
||||
openpgp.config.aeadProtect = true;
|
||||
|
||||
const key = new openpgp.packet.List();
|
||||
key.push(new openpgp.packet.SecretKey());
|
||||
const key = new openpgp.PacketList();
|
||||
key.push(new openpgp.SecretKeyPacket());
|
||||
|
||||
const rsa = openpgp.crypto.publicKey.rsa;
|
||||
const keySize = openpgp.util.getWebCryptoAll() ? 2048 : 512; // webkit webcrypto accepts minimum 2048 bit keys
|
||||
|
@ -893,8 +893,8 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
|
||||
const raw = key.write();
|
||||
|
||||
const key2 = new openpgp.packet.List();
|
||||
await key2.read(raw);
|
||||
const key2 = new openpgp.PacketList();
|
||||
await key2.read(raw, openpgp);
|
||||
await key2[0].decrypt('hello');
|
||||
|
||||
expect(key[0].params.toString()).to.equal(key2[0].params.toString());
|
||||
|
@ -904,7 +904,7 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
});
|
||||
|
||||
it('Writing and verification of a signature packet.', function() {
|
||||
const key = new openpgp.packet.SecretKey();
|
||||
const key = new openpgp.SecretKeyPacket();
|
||||
|
||||
const rsa = openpgp.crypto.publicKey.rsa;
|
||||
const keySize = openpgp.util.getWebCryptoAll() ? 2048 : 512; // webkit webcrypto accepts minimum 2048 bit keys
|
||||
|
@ -919,9 +919,9 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
key.params = mpi;
|
||||
key.algorithm = "rsaSign";
|
||||
|
||||
const signed = new openpgp.packet.List();
|
||||
const literal = new openpgp.packet.Literal();
|
||||
const signature = new openpgp.packet.Signature();
|
||||
const signed = new openpgp.PacketList();
|
||||
const literal = new openpgp.LiteralDataPacket();
|
||||
const signature = new openpgp.SignaturePacket();
|
||||
|
||||
literal.setText(testText);
|
||||
|
||||
|
@ -936,8 +936,8 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+
|
|||
|
||||
const raw = signed.write();
|
||||
|
||||
const signed2 = new openpgp.packet.List();
|
||||
await signed2.read(raw);
|
||||
const signed2 = new openpgp.PacketList();
|
||||
await signed2.read(raw, openpgp);
|
||||
signed2.concat(await openpgp.stream.readToEnd(signed2.stream, arr => arr));
|
||||
|
||||
await Promise.all([
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
|
||||
|
||||
const { key, cleartext, util, packet: { Signature } } = openpgp;
|
||||
const { key, cleartext, util, SignaturePacket } = openpgp;
|
||||
|
||||
const chai = require('chai');
|
||||
chai.use(require('chai-as-promised'));
|
||||
|
@ -89,7 +89,7 @@ async function fakeSignature() {
|
|||
'You owe me',
|
||||
'I owe you'));
|
||||
// read the standalone signature packet
|
||||
const tmp = new Signature();
|
||||
const tmp = new SignaturePacket();
|
||||
await tmp.read(STANDALONE_PKT);
|
||||
|
||||
// replace the "text" signature with the
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
|
||||
|
||||
const { key, cleartext, enums, packet: { List, Signature } } = openpgp;
|
||||
const { key, cleartext, enums, PacketList, SignaturePacket } = openpgp;
|
||||
|
||||
const chai = require('chai');
|
||||
chai.use(require('chai-as-promised'));
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
|
||||
|
||||
const { key, cleartext, enums, packet: { List, Signature } } = openpgp;
|
||||
const { key, cleartext, enums, PacketList, SignaturePacket } = openpgp;
|
||||
|
||||
const chai = require('chai');
|
||||
chai.use(require('chai-as-promised'));
|
||||
|
@ -48,13 +48,13 @@ async function testSubkeyTrust() {
|
|||
key: attackerPrivKey.toPublic().keyPacket,
|
||||
bind: pktPubVictim[3] // victim subkey
|
||||
};
|
||||
const fakeBindingSignature = new Signature();
|
||||
const fakeBindingSignature = new SignaturePacket();
|
||||
fakeBindingSignature.signatureType = enums.signature.subkeyBinding;
|
||||
fakeBindingSignature.publicKeyAlgorithm = attackerPrivKey.keyPacket.algorithm;
|
||||
fakeBindingSignature.hashAlgorithm = enums.hash.sha256;
|
||||
fakeBindingSignature.keyFlags = [enums.keyFlags.signData];
|
||||
await fakeBindingSignature.sign(attackerPrivKey.keyPacket, dataToSign);
|
||||
const newList = new List();
|
||||
const newList = new PacketList();
|
||||
newList.concat([
|
||||
pktPrivAttacker[0], // attacker private key
|
||||
pktPrivAttacker[1], // attacker user
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
|
||||
|
||||
const { key, message, enums, packet: { List, Signature } } = openpgp;
|
||||
const { key, message, enums, PacketList, SignaturePacket } = openpgp;
|
||||
|
||||
const chai = require('chai');
|
||||
chai.use(require('chai-as-promised'));
|
||||
|
@ -70,7 +70,7 @@ async function makeKeyValid() {
|
|||
// deconstruct invalid key
|
||||
const [pubkey, puser, pusersig] = invalidkey.toPacketlist().map(i => i);
|
||||
// create a fake signature
|
||||
const fake = new Signature();
|
||||
const fake = new SignaturePacket();
|
||||
Object.assign(fake, pusersig);
|
||||
// extend expiration times
|
||||
fake.keyExpirationTime = 0x7FFFFFFF;
|
||||
|
@ -80,7 +80,7 @@ async function makeKeyValid() {
|
|||
// create modified subpacket data
|
||||
pusersig.read_sub_packets(fake.write_hashed_sub_packets(), false);
|
||||
// reconstruct the modified key
|
||||
const newlist = new List();
|
||||
const newlist = new PacketList();
|
||||
newlist.concat([pubkey, puser, pusersig]);
|
||||
let modifiedkey = new key.Key(newlist);
|
||||
// re-read the message to eliminate any
|
||||
|
|
Loading…
Reference in New Issue
Block a user