
work correctly with utf8 strings. Fixeda visibility issue with the testing suite and added relevant unit tests.
318 lines
15 KiB
HTML
318 lines
15 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="utf-8">
|
|
<title>JSDoc: Source: openpgp.msg.publickey.js</title>
|
|
|
|
<script src="scripts/prettify/prettify.js"> </script>
|
|
<script src="scripts/prettify/lang-css.js"> </script>
|
|
<!--[if lt IE 9]>
|
|
<script src="//html5shiv.googlecode.com/svn/trunk/html5.js"></script>
|
|
<![endif]-->
|
|
<link type="text/css" rel="stylesheet" href="styles/prettify-tomorrow.css">
|
|
<link type="text/css" rel="stylesheet" href="styles/jsdoc-default.css">
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<div id="main">
|
|
|
|
<h1 class="page-title">Source: openpgp.msg.publickey.js</h1>
|
|
|
|
|
|
|
|
|
|
|
|
<section>
|
|
<article>
|
|
<pre class="prettyprint source"><code>// GPG4Browsers - An OpenPGP implementation in javascript
|
|
// Copyright (C) 2011 Recurity Labs GmbH
|
|
//
|
|
// This library is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
// License as published by the Free Software Foundation; either
|
|
// version 2.1 of the License, or (at your option) any later version.
|
|
//
|
|
// This library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
// Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public
|
|
// License along with this library; if not, write to the Free Software
|
|
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
/**
|
|
* @class
|
|
* @classdesc Decoded public key object for internal openpgp.js use
|
|
*/
|
|
function openpgp_msg_publickey() {
|
|
this.data;
|
|
this.position;
|
|
this.len;
|
|
this.tostring = "OPENPGP PUBLIC KEY\n";
|
|
this.bindingSignature = null;
|
|
this.publicKeyPacket = null;
|
|
this.userIds = new Array();
|
|
this.userAttributes = new Array();
|
|
this.revocationSignatures = new Array();
|
|
this.subKeys = new Array();
|
|
this.arbitraryPacket = new Array();
|
|
this.directSignatures = new Array();
|
|
/**
|
|
*
|
|
* @return last position
|
|
*/
|
|
function read_nodes(parent_node, input, position, len) {
|
|
this.publicKeyPacket = parent_node;
|
|
var exit = false;
|
|
var pos = position;
|
|
var l = len;
|
|
while (input.length != pos) {
|
|
var result = openpgp_packet.read_packet(input, pos, input.length - pos);
|
|
if (result == null) {
|
|
util.print_error("openpgp.msg.publickey read_nodes:\n"+'[pub_key]parsing ends here @:' + pos + " l:" + l);
|
|
break;
|
|
} else {
|
|
switch (result.tagType) {
|
|
case 2: // public key revocation signature
|
|
if (result.signatureType == 32)
|
|
this.revocationSignatures[this.revocationSignatures.length] = result;
|
|
else if (result.signatureType == 16 || result.signatureType == 17 || result.signatureType == 18 || result.signatureType == 19)
|
|
this.certificationSignature = result;
|
|
else if (result.signatureType == 25) {
|
|
this.bindingSignature = result;
|
|
} else if (result.signatureType == 31) {
|
|
this.directSignatures[this.directSignatures.length] = result;
|
|
} else
|
|
util.print_error("openpgp.msg.publickey read_nodes:\n"+"unknown signature type directly on key "+result.signatureType);
|
|
pos += result.packetLength + result.headerLength;
|
|
break;
|
|
case 14: // Public-Subkey Packet
|
|
this.subKeys[this.subKeys.length] = result;
|
|
pos += result.packetLength + result.headerLength;
|
|
pos += result.read_nodes(this.publicKeyPacket,input, pos, input.length - pos);
|
|
break;
|
|
case 17: // User Attribute Packet
|
|
this.userAttributes[this.userAttributes.length] = result;
|
|
pos += result.packetLength + result.headerLength;
|
|
pos += result.read_nodes(this.publicKeyPacket,input, pos, input.length - pos);
|
|
break;
|
|
case 13: // User ID Packet
|
|
this.userIds[this.userIds.length] = result;
|
|
pos += result.packetLength + result.headerLength;
|
|
pos += result.read_nodes(this.publicKeyPacket, input, pos, input.length - pos);
|
|
break;
|
|
default:
|
|
this.data = input;
|
|
this.position = position - this.publicKeyPacket.packetLength - this.publicKeyPacket.headerLength;
|
|
this.len = pos - position;
|
|
return this.len;
|
|
}
|
|
}
|
|
}
|
|
this.data = input;
|
|
this.position = position - (this.publicKeyPacket.packetLength - this.publicKeyPacket.headerLength);
|
|
this.len = pos - position;
|
|
return this.len;
|
|
}
|
|
|
|
function write() {
|
|
|
|
}
|
|
|
|
function getKeyId() {
|
|
return this.publicKeyPacket.getKeyId();
|
|
}
|
|
|
|
function getFingerprint() {
|
|
return this.publicKeyPacket.getFingerprint();
|
|
}
|
|
|
|
|
|
|
|
function validate() {
|
|
// check revocation keys
|
|
for (var i = 0; i < this.revocationSignatures.length; i++) {
|
|
var tohash = this.publicKeyPacket.header+this.publicKeyPacket.data;
|
|
if (this.revocationSignatures[i].verify(tohash, this.publicKeyPacket))
|
|
return false;
|
|
}
|
|
|
|
if (this.subKeys.length != 0) {
|
|
// search for a valid subkey
|
|
var found = false;
|
|
for (var i = 0; i < this.subKeys.length; i++)
|
|
if (this.subKeys[i].verifyKey() == 3) {
|
|
found = true;
|
|
break;
|
|
}
|
|
if (!found)
|
|
return false;
|
|
}
|
|
// search for one valid userid
|
|
found = false;
|
|
for (var i = 0; i < this.userIds.length; i++)
|
|
if (this.userIds[i].verify(this.publicKeyPacket) == 0) {
|
|
found = true;
|
|
break;
|
|
}
|
|
if (!found)
|
|
return false;
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* verifies all signatures
|
|
* @return a 2 dimensional array. the first dimension corresponds to the userids available
|
|
*/
|
|
function verifyCertificationSignatures() {
|
|
var result = new Array();
|
|
for (var i = 0; i < this.userIds.length; i++) {
|
|
result[i] = this.userIds[i].verifyCertificationSignatures(this.publicKeyPacket);
|
|
}
|
|
return result;
|
|
}
|
|
this.verifyCertificationSignatures = verifyCertificationSignatures;
|
|
|
|
/**
|
|
* verifies:
|
|
* - revocation certificates directly on key
|
|
* - self signatures
|
|
* - subkey binding and revocation certificates
|
|
*
|
|
* This is useful for validating the key
|
|
* @returns {Boolean} true if the basic signatures are all valid
|
|
*/
|
|
function verifyBasicSignatures() {
|
|
for (var i = 0; i < this.revocationSignatures.length; i++) {
|
|
var tohash = this.publicKeyPacket.header+this.publicKeyPacket.data;
|
|
if (this.revocationSignatures[i].verify(tohash, this.publicKeyPacket))
|
|
return false;
|
|
}
|
|
|
|
if (this.subKeys.length != 0) {
|
|
// search for a valid subkey
|
|
var found = false;
|
|
for (var i = 0; i < this.subKeys.length; i++) {
|
|
if (this.subKeys[i] == null)
|
|
continue;
|
|
var result = this.subKeys[i].verifyKey();
|
|
if (result == 3) {
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!found)
|
|
return false;
|
|
}
|
|
var keyId = this.getKeyId();
|
|
for (var i = 0; i < this.userIds.length; i++) {
|
|
for (var j = 0; j < this.userIds[i].certificationRevocationSignatures.length; j++) {
|
|
if (this.userIds[i].certificationSignatures[j].getIssuer == keyId &&
|
|
this.userIds[i].certificationSignatures[j].verifyBasic(this.publicKeyPacket) != 4)
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
function toString() {
|
|
var result = " OPENPGP Public Key\n length: "+this.len+"\n";
|
|
result += " Revocation Signatures:\n"
|
|
for (var i=0; i < this.revocationSignatures.length; i++) {
|
|
result += " "+this.revocationSignatures[i].toString();
|
|
}
|
|
result += " User Ids:\n";
|
|
for (var i=0; i < this.userIds.length; i++) {
|
|
result += " "+this.userIds[i].toString();
|
|
}
|
|
result += " User Attributes:\n";
|
|
for (var i=0; i < this.userAttributes.length; i++) {
|
|
result += " "+this.userAttributes[i].toString();
|
|
}
|
|
result += " Public Key SubKeys:\n";
|
|
for (var i=0; i < this.subKeys.length; i++) {
|
|
result += " "+this.subKeys[i].toString();
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* finds an encryption key for this public key
|
|
* @returns null if no encryption key has been found
|
|
*/
|
|
function getEncryptionKey() {
|
|
// V4: by convention subkeys are prefered for encryption service
|
|
// V3: keys MUST NOT have subkeys
|
|
for (var j = 0; j < this.subKeys.length; j++)
|
|
if (this.subKeys[j].publicKeyAlgorithm != 17 &&
|
|
this.subKeys[j].publicKeyAlgorithm != 3 &&
|
|
this.subKeys[j].verifyKey()) {
|
|
return this.subKeys[j];
|
|
}
|
|
// if no valid subkey for encryption, use primary key
|
|
if (this.publicKeyPacket.publicKeyAlgorithm != 17 && this.publicKeyPacket.publicKeyAlgorithm != 3
|
|
&& this.publicKeyPacket.verifyKey()) {
|
|
return this.publicKeyPacket;
|
|
}
|
|
return null;
|
|
}
|
|
|
|
function getSigningKey() {
|
|
if ((this.publicKeyPacket.publicKeyAlgorithm == 17 ||
|
|
this.publicKeyPacket.publicKeyAlgorithm != 2))
|
|
return this.publicKeyPacket;
|
|
else if (this.publicKeyPacket.version == 4) // V3 keys MUST NOT have subkeys.
|
|
for (var j = 0; j < this.subKeys.length; j++) {
|
|
if ((this.subKeys[j].publicKeyAlgorithm == 17 ||
|
|
this.subKeys[j].publicKeyAlgorithm != 2) &&
|
|
this.subKeys[j].verifyKey())
|
|
return this.subKeys[j];
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/* Returns the i-th subKey as a openpgp_msg_publickey object */
|
|
function getSubKeyAsKey(i) {
|
|
var ret = new openpgp_msg_publickey();
|
|
ret.userIds = this.userIds;
|
|
ret.userAttributes = this.userAttributes;
|
|
ret.publicKeyPacket = this.subKeys[i];
|
|
return ret;
|
|
}
|
|
|
|
this.getEncryptionKey = getEncryptionKey;
|
|
this.getSigningKey = getSigningKey;
|
|
this.read_nodes = read_nodes;
|
|
this.write = write;
|
|
this.toString = toString;
|
|
this.validate = validate;
|
|
this.getFingerprint = getFingerprint;
|
|
this.getKeyId = getKeyId;
|
|
this.verifyBasicSignatures = verifyBasicSignatures;
|
|
this.getSubKeyAsKey = getSubKeyAsKey;
|
|
}
|
|
</code></pre>
|
|
</article>
|
|
</section>
|
|
|
|
|
|
|
|
|
|
</div>
|
|
|
|
<nav>
|
|
<h2><a href="index.html">Index</a></h2><h3>Classes</h3><ul><li><a href="_openpgp_packet.html">_openpgp_packet</a></li><li><a href="JXG.Util.html">Util</a></li><li><a href="openpgp.html">openpgp</a></li><li><a href="openpgp_config.html">openpgp_config</a></li><li><a href="openpgp_keyring.html">openpgp_keyring</a></li><li><a href="openpgp_msg_message.html">openpgp_msg_message</a></li><li><a href="openpgp_msg_privatekey.html">openpgp_msg_privatekey</a></li><li><a href="openpgp_msg_publickey.html">openpgp_msg_publickey</a></li><li><a href="openpgp_packet_compressed.html">openpgp_packet_compressed</a></li><li><a href="openpgp_packet_encrypteddata.html">openpgp_packet_encrypteddata</a></li><li><a href="openpgp_packet_encryptedintegrityprotecteddata.html">openpgp_packet_encryptedintegrityprotecteddata</a></li><li><a href="openpgp_packet_encryptedsessionkey.html">openpgp_packet_encryptedsessionkey</a></li><li><a href="openpgp_packet_keymaterial.html">openpgp_packet_keymaterial</a></li><li><a href="openpgp_packet_literaldata.html">openpgp_packet_literaldata</a></li><li><a href="openpgp_packet_marker.html">openpgp_packet_marker</a></li><li><a href="openpgp_packet_modificationdetectioncode.html">openpgp_packet_modificationdetectioncode</a></li><li><a href="openpgp_packet_onepasssignature.html">openpgp_packet_onepasssignature</a></li><li><a href="openpgp_packet_signature.html">openpgp_packet_signature</a></li><li><a href="openpgp_packet_userattribute.html">openpgp_packet_userattribute</a></li><li><a href="openpgp_packet_userid.html">openpgp_packet_userid</a></li><li><a href="openpgp_type_keyid.html">openpgp_type_keyid</a></li><li><a href="openpgp_type_mpi.html">openpgp_type_mpi</a></li><li><a href="openpgp_type_s2k.html">openpgp_type_s2k</a></li></ul><h3>Global</h3><ul><li><a href="global.html#bin2str">bin2str</a></li><li><a href="global.html#calc_checksum">calc_checksum</a></li><li><a href="global.html#crc_table">crc_table</a></li><li><a href="global.html#decode_utf8">decode_utf8</a></li><li><a href="global.html#encode_utf8">encode_utf8</a></li><li><a href="global.html#get_hashAlgorithmString">get_hashAlgorithmString</a></li><li><a href="global.html#getCheckSum">getCheckSum</a></li><li><a href="global.html#getPGPMessageType">getPGPMessageType</a></li><li><a href="global.html#hash_headers">hash_headers</a></li><li><a href="global.html#hex2bin">hex2bin</a></li><li><a href="global.html#hexidump">hexidump</a></li><li><a href="global.html#hexstrdump">hexstrdump</a></li><li><a href="global.html#MD5">MD5</a></li><li><a href="global.html#openpgp_cfb_decrypt">openpgp_cfb_decrypt</a></li><li><a href="global.html#openpgp_cfb_encrypt">openpgp_cfb_encrypt</a></li><li><a href="global.html#openpgp_cfb_mdc">openpgp_cfb_mdc</a></li><li><a href="global.html#openpgp_crypto_asymetricDecrypt">openpgp_crypto_asymetricDecrypt</a></li><li><a href="global.html#openpgp_crypto_asymetricEncrypt">openpgp_crypto_asymetricEncrypt</a></li><li><a href="global.html#openpgp_crypto_generateKeyPair">openpgp_crypto_generateKeyPair</a></li><li><a href="global.html#openpgp_crypto_generateSessionKey">openpgp_crypto_generateSessionKey</a></li><li><a href="global.html#openpgp_crypto_getHashByteLength">openpgp_crypto_getHashByteLength</a></li><li><a href="global.html#openpgp_crypto_getPrefixRandom">openpgp_crypto_getPrefixRandom</a></li><li><a href="global.html#openpgp_crypto_getPseudoRandom">openpgp_crypto_getPseudoRandom</a></li><li><a href="global.html#openpgp_crypto_getRandomBigInteger">openpgp_crypto_getRandomBigInteger</a></li><li><a href="global.html#openpgp_crypto_getRandomBytes">openpgp_crypto_getRandomBytes</a></li><li><a href="global.html#openpgp_crypto_getSecureRandom">openpgp_crypto_getSecureRandom</a></li><li><a href="global.html#openpgp_crypto_hashData">openpgp_crypto_hashData</a></li><li><a href="global.html#openpgp_crypto_MDCSystemBytes">openpgp_crypto_MDCSystemBytes</a></li><li><a href="global.html#openpgp_crypto_signData">openpgp_crypto_signData</a></li><li><a href="global.html#openpgp_crypto_symmetricDecrypt">openpgp_crypto_symmetricDecrypt</a></li><li><a href="global.html#openpgp_crypto_symmetricEncrypt">openpgp_crypto_symmetricEncrypt</a></li><li><a href="global.html#openpgp_crypto_verifySignature">openpgp_crypto_verifySignature</a></li><li><a href="global.html#openpgp_encoding_armor">openpgp_encoding_armor</a></li><li><a href="global.html#openpgp_encoding_armor_addheader">openpgp_encoding_armor_addheader</a></li><li><a href="global.html#openpgp_encoding_base64_decode">openpgp_encoding_base64_decode</a></li><li><a href="global.html#openpgp_encoding_base64_encode">openpgp_encoding_base64_encode</a></li><li><a href="global.html#openpgp_encoding_deArmor">openpgp_encoding_deArmor</a></li><li><a href="global.html#openpgp_encoding_eme_pkcs1_decode">openpgp_encoding_eme_pkcs1_decode</a></li><li><a href="global.html#openpgp_encoding_eme_pkcs1_encode">openpgp_encoding_eme_pkcs1_encode</a></li><li><a href="global.html#openpgp_encoding_emsa_pkcs1_decode">openpgp_encoding_emsa_pkcs1_decode</a></li><li><a href="global.html#openpgp_encoding_emsa_pkcs1_encode">openpgp_encoding_emsa_pkcs1_encode</a></li><li><a href="global.html#openpgp_encoding_html_encode">openpgp_encoding_html_encode</a></li><li><a href="global.html#print_debug">print_debug</a></li><li><a href="global.html#print_debug_hexstr_dump">print_debug_hexstr_dump</a></li><li><a href="global.html#print_error">print_error</a></li><li><a href="global.html#print_info">print_info</a></li><li><a href="global.html#shiftRight">shiftRight</a></li><li><a href="global.html#str2bin">str2bin</a></li><li><a href="global.html#str2Uint8Array">str2Uint8Array</a></li><li><a href="global.html#Uint8Array2str">Uint8Array2str</a></li><li><a href="global.html#util">util</a></li><li><a href="global.html#verifyCheckSum">verifyCheckSum</a></li></ul>
|
|
</nav>
|
|
|
|
<br clear="both">
|
|
|
|
<footer>
|
|
Documentation generated by <a href="https://github.com/jsdoc3/jsdoc">JSDoc 3.2.0-dev</a> on Tue Apr 16 2013 10:42:39 GMT+0200 (CEST)
|
|
</footer>
|
|
|
|
<script> prettyPrint(); </script>
|
|
</body>
|
|
</html>
|