mirror of
https://github.com/openpgpjs/openpgpjs.git
synced 2025-03-30 15:08:32 +00:00
Compare commits
172 Commits
v6.0.0-alp
...
main
Author | SHA1 | Date | |
---|---|---|---|
![]() |
88310fe69d | ||
![]() |
c2526c8a88 | ||
![]() |
1848f51a4c | ||
![]() |
4762d2c762 | ||
![]() |
d5689894f6 | ||
![]() |
6d4a86295e | ||
![]() |
8a2062d342 | ||
![]() |
e9fe979649 | ||
![]() |
1ab6f27fc9 | ||
![]() |
a7660cc43b | ||
![]() |
b583bcad23 | ||
![]() |
a3a9e06802 | ||
![]() |
965e63b672 | ||
![]() |
96b13a468b | ||
![]() |
432856ff0e | ||
![]() |
b2bd8a0fdd | ||
![]() |
6db98f1e47 | ||
![]() |
8e5da78971 | ||
![]() |
a5d894f514 | ||
![]() |
a16160fc66 | ||
![]() |
abe750cf7c | ||
![]() |
2a8969b437 | ||
![]() |
bf85deedb8 | ||
![]() |
6c3b02872d | ||
![]() |
4d2d8740dc | ||
![]() |
bbdaad0cba | ||
![]() |
daeaf6b1da | ||
![]() |
67faffafff | ||
![]() |
f75447afaa | ||
![]() |
121b478312 | ||
![]() |
088d5f3638 | ||
![]() |
ac1bfc0d60 | ||
![]() |
287104aafb | ||
![]() |
2d65d1d553 | ||
![]() |
3f060660c2 | ||
![]() |
01b62399af | ||
![]() |
dd01ee00cb | ||
![]() |
a5645e1d6c | ||
![]() |
09800741f0 | ||
![]() |
31a7e2616b | ||
![]() |
42d504a69a | ||
![]() |
fb72ea449a | ||
![]() |
f9a3e54364 | ||
![]() |
d3e75de23d | ||
![]() |
12274a1543 | ||
![]() |
0138b69356 | ||
![]() |
821f260ba9 | ||
![]() |
09095ced4f | ||
![]() |
d7f5736d67 | ||
![]() |
693adb417e | ||
![]() |
013dffce70 | ||
![]() |
59c809c943 | ||
![]() |
4ddadd4f53 | ||
![]() |
ae5698c621 | ||
![]() |
4b017f6c67 | ||
![]() |
e924a50c31 | ||
![]() |
88f20974dd | ||
![]() |
05fbc63732 | ||
![]() |
3cdaab7894 | ||
![]() |
e58c02d5ee | ||
![]() |
a57bffc84a | ||
![]() |
5ee854140a | ||
![]() |
ada794cab6 | ||
![]() |
e80d71bdfc | ||
![]() |
e454faab0c | ||
![]() |
6ac17dc71c | ||
![]() |
148fff91e8 | ||
![]() |
ccb040ae96 | ||
![]() |
2b9a07e840 | ||
![]() |
0255fcba86 | ||
![]() |
f2818429db | ||
![]() |
8d8033383b | ||
![]() |
a3839f6db5 | ||
![]() |
1bcce67c68 | ||
![]() |
e7b7f6c6b1 | ||
![]() |
ab8445116c | ||
![]() |
f36be640cc | ||
![]() |
2f185481a7 | ||
![]() |
5fd7ef370f | ||
![]() |
79014f00f0 | ||
![]() |
5c583341d7 | ||
![]() |
db82968b48 | ||
![]() |
7698790d1c | ||
![]() |
bcaaa7e2d2 | ||
![]() |
fca699373a | ||
![]() |
efb0324330 | ||
![]() |
c0b35306cb | ||
![]() |
35a1e1f23b | ||
![]() |
b9c5c8df59 | ||
![]() |
857b794e13 | ||
![]() |
00e147f5c1 | ||
![]() |
42938c871a | ||
![]() |
40b6427658 | ||
![]() |
f729d2bfa7 | ||
![]() |
5268c484e9 | ||
![]() |
9efdaf14b1 | ||
![]() |
8d11c5fd0f | ||
![]() |
7af16be62b | ||
![]() |
4026e24585 | ||
![]() |
a0337780b7 | ||
![]() |
3eba29dba8 | ||
![]() |
12fb916360 | ||
![]() |
cf94380e26 | ||
![]() |
52611e7f26 | ||
![]() |
f8d0e6052f | ||
![]() |
08b71487c5 | ||
![]() |
75f10955e6 | ||
![]() |
1ce2df1119 | ||
![]() |
6ace4a00f5 | ||
![]() |
9f5ff66c3d | ||
![]() |
b1e27a1430 | ||
![]() |
a315c46583 | ||
![]() |
d138b5290b | ||
![]() |
1d732c34ff | ||
![]() |
6a306a1797 | ||
![]() |
676c31b748 | ||
![]() |
727c7cad37 | ||
![]() |
ad7165dfd0 | ||
![]() |
cf0285add5 | ||
![]() |
90495522f7 | ||
![]() |
2985b0f470 | ||
![]() |
5bfff907b4 | ||
![]() |
ec52bdea83 | ||
![]() |
d1a24d1758 | ||
![]() |
7e2ea3f871 | ||
![]() |
f3f1ab931b | ||
![]() |
2bf7c92469 | ||
![]() |
5464caa6f7 | ||
![]() |
231fbbe8ca | ||
![]() |
9a53ac15df | ||
![]() |
a05c23b507 | ||
![]() |
90c8fbbf00 | ||
![]() |
e9e843280b | ||
![]() |
c68bd960ce | ||
![]() |
aa222fecb2 | ||
![]() |
6ebd179ed5 | ||
![]() |
2574795d37 | ||
![]() |
b41298a3f6 | ||
![]() |
cb97c8fcb9 | ||
![]() |
aba61efa70 | ||
![]() |
147d043a32 | ||
![]() |
df59dec319 | ||
![]() |
f5cebfe6fd | ||
![]() |
15adf84a7d | ||
![]() |
d4fd9c8d43 | ||
![]() |
151f15e282 | ||
![]() |
a6283e64cc | ||
![]() |
9c75845944 | ||
![]() |
db15f6d6a1 | ||
![]() |
026b348cf8 | ||
![]() |
711c41826a | ||
![]() |
a4e2c56c49 | ||
![]() |
7a6b41fbd4 | ||
![]() |
17bbab44c9 | ||
![]() |
b413a113f9 | ||
![]() |
280828dae6 | ||
![]() |
3320eaccb2 | ||
![]() |
22c2682574 | ||
![]() |
f64dc3f35f | ||
![]() |
6370e0b2d3 | ||
![]() |
6bfb557ca6 | ||
![]() |
959956cfc9 | ||
![]() |
99899d1d5c | ||
![]() |
591b9399a8 | ||
![]() |
f77da9cdb0 | ||
![]() |
19cb6ee521 | ||
![]() |
e92b44bc84 | ||
![]() |
c754fac10f | ||
![]() |
90a2af9fe2 | ||
![]() |
ff4181ad5a | ||
![]() |
e93702bb8d | ||
![]() |
54fc2c8fbd |
@ -1,8 +1,15 @@
|
||||
module.exports = {
|
||||
'extends': 'airbnb-base',
|
||||
'extends': [
|
||||
'airbnb-base',
|
||||
'airbnb-typescript/base'
|
||||
],
|
||||
|
||||
'parser': '@typescript-eslint/parser',
|
||||
|
||||
'parserOptions': {
|
||||
'ecmaVersion': 11,
|
||||
'sourceType': 'module'
|
||||
'sourceType': 'module',
|
||||
'project': 'tsconfig.json'
|
||||
},
|
||||
|
||||
'env': {
|
||||
@ -12,11 +19,18 @@ module.exports = {
|
||||
},
|
||||
|
||||
'plugins': [
|
||||
'@typescript-eslint',
|
||||
'chai-friendly',
|
||||
'import',
|
||||
'unicorn'
|
||||
],
|
||||
|
||||
'settings': {
|
||||
'import/resolver': {
|
||||
'typescript': {}
|
||||
}
|
||||
},
|
||||
|
||||
'globals': { // TODO are all these necessary?
|
||||
'globalThis': true,
|
||||
'console': true,
|
||||
@ -43,11 +57,11 @@ module.exports = {
|
||||
'arrow-body-style': 'off',
|
||||
'arrow-parens': ['error','as-needed'],
|
||||
'class-methods-use-this': 'off',
|
||||
'comma-dangle': ['error', 'never'],
|
||||
'comma-spacing': 'off',
|
||||
'@typescript-eslint/comma-dangle': ['error', 'never'],
|
||||
'@typescript-eslint/comma-spacing': 'off',
|
||||
'consistent-return': 'off',
|
||||
'default-case': 'off',
|
||||
'default-param-last': 'off',
|
||||
'@typescript-eslint/default-param-last': 'off',
|
||||
'eol-last': ['error', 'always'],
|
||||
'function-call-argument-newline': 'off',
|
||||
'func-names': ['error', 'never'],
|
||||
@ -68,7 +82,7 @@ module.exports = {
|
||||
'no-plusplus': 'off',
|
||||
'no-restricted-syntax': ['error', 'ForInStatement', 'LabeledStatement', 'WithStatement'],
|
||||
'object-curly-newline': 'off',
|
||||
'no-shadow': 'off', // TODO get rid of this
|
||||
'@typescript-eslint/no-shadow': 'off', // TODO get rid of this
|
||||
'object-property-newline': [
|
||||
'error',
|
||||
{
|
||||
@ -89,10 +103,12 @@ module.exports = {
|
||||
'prefer-template': 'off',
|
||||
'quote-props': 'off',
|
||||
'quotes': ['error', 'single', { 'avoidEscape': true }],
|
||||
'space-before-function-paren': 'off',
|
||||
'@typescript-eslint/space-before-function-paren': ['error', { 'anonymous': 'ignore', 'named': 'never', 'asyncArrow': 'always' }],
|
||||
'spaced-comment': 'off',
|
||||
'indent': ['error', 2, { 'SwitchCase': 1 }],
|
||||
'no-unused-vars': 'error',
|
||||
'indent': 'off',
|
||||
'@typescript-eslint/indent': ['error', 2, { 'SwitchCase': 1 }],
|
||||
'no-unused-vars': 'off',
|
||||
'@typescript-eslint/no-unused-vars': 'error',
|
||||
|
||||
// eslint-plugin-import rules:
|
||||
'import/named': 'error',
|
||||
@ -100,24 +116,23 @@ module.exports = {
|
||||
'import/first': 'off',
|
||||
'import/no-extraneous-dependencies': ['error', { 'devDependencies': true, 'optionalDependencies': false, 'peerDependencies': false }],
|
||||
'import/no-unassigned-import': 'error',
|
||||
'import/no-unresolved': ['error', {
|
||||
// esm exports not supported: https://github.com/import-js/eslint-plugin-import/issues/1810
|
||||
ignore: ['openpgp', '@openpgp/noble-hashes', '@openpgp/web-stream-tools', '@openpgp/asmcrypto.js']
|
||||
}],
|
||||
'import/no-unresolved': 'error',
|
||||
'import/prefer-default-export': 'off',
|
||||
|
||||
// Custom silencers:
|
||||
'camelcase': 'off', // used in tests, need to fix separately
|
||||
'no-multi-assign': 'off',
|
||||
'no-underscore-dangle': 'off',
|
||||
'no-await-in-loop': 'off',
|
||||
'camelcase': 'off', // snake_case used in tests, need to fix separately
|
||||
'@typescript-eslint/naming-convention': 'off', // supersedes 'camelcase' rule
|
||||
'@typescript-eslint/lines-between-class-members': 'off',
|
||||
|
||||
// Custom errors:
|
||||
'no-use-before-define': [2, { 'functions': false, 'classes': true, 'variables': false }],
|
||||
'@typescript-eslint/no-use-before-define': ['error', { 'functions': false, 'classes': true, 'variables': false, 'allowNamedExports': true }],
|
||||
'no-constant-condition': [2, { 'checkLoops': false }],
|
||||
'new-cap': [2, { 'properties': false, 'capIsNewExceptionPattern': 'EAX|OCB|GCM|CMAC|CBC|OMAC|CTR', 'newIsCapExceptionPattern': 'type|hash*' }],
|
||||
'max-lines': [2, { 'max': 620, 'skipBlankLines': true, 'skipComments': true }],
|
||||
'no-unused-expressions': 0,
|
||||
'@typescript-eslint/no-unused-expressions': 0,
|
||||
'chai-friendly/no-unused-expressions': [2, { 'allowShortCircuit': true }],
|
||||
'unicorn/switch-case-braces': ['error', 'avoid'],
|
||||
|
||||
|
33
.github/dependabot.yml
vendored
Normal file
33
.github/dependabot.yml
vendored
Normal file
@ -0,0 +1,33 @@
|
||||
version: 2
|
||||
updates:
|
||||
- package-ecosystem: "npm"
|
||||
# The redundant target-branch directive is needed to set two different update schedules for npm,
|
||||
# working around a dependabot limitation:
|
||||
# see https://github.com/dependabot/dependabot-core/issues/1778#issuecomment-1988140219 .
|
||||
target-branch: main
|
||||
directory: "/"
|
||||
schedule:
|
||||
interval: "daily"
|
||||
allow:
|
||||
- dependency-name: "playwright"
|
||||
versioning-strategy: increase
|
||||
|
||||
- package-ecosystem: "npm"
|
||||
directory: "/"
|
||||
schedule:
|
||||
interval: "weekly"
|
||||
allow:
|
||||
- dependency-name: "@noble*"
|
||||
- dependency-name: "fflate"
|
||||
versioning-strategy: increase
|
||||
groups:
|
||||
# Any packages matching the pattern @noble* where the highest resolvable
|
||||
# version is minor or patch will be grouped together.
|
||||
# Grouping rules apply to version updates only.
|
||||
noble:
|
||||
applies-to: version-updates
|
||||
patterns:
|
||||
- "@noble*"
|
||||
update-types:
|
||||
- "minor"
|
||||
- "patch"
|
9
.github/test-suite/config.json.template
vendored
9
.github/test-suite/config.json.template
vendored
@ -11,7 +11,8 @@
|
||||
"id": "sop-openpgpjs-main",
|
||||
"path": "__SOP_OPENPGPJS__",
|
||||
"env": {
|
||||
"OPENPGPJS_PATH": "__OPENPGPJS_MAIN__"
|
||||
"OPENPGPJS_PATH": "__OPENPGPJS_MAIN__",
|
||||
"DISABLE_PROFILES": "true"
|
||||
}
|
||||
},
|
||||
{
|
||||
@ -21,10 +22,14 @@
|
||||
"path": "__GPGME_SOP__"
|
||||
},
|
||||
{
|
||||
"path": "__GOSOP__"
|
||||
"id": "gosop-v2",
|
||||
"path": "__GOSOP_V2__"
|
||||
},
|
||||
{
|
||||
"path": "__RNP_SOP__"
|
||||
},
|
||||
{
|
||||
"path": "__RSOP__"
|
||||
}
|
||||
],
|
||||
"rlimits": {
|
||||
|
5
.github/test-suite/prepare_config.sh
vendored
5
.github/test-suite/prepare_config.sh
vendored
@ -7,7 +7,8 @@ cat $CONFIG_TEMPLATE \
|
||||
| sed "s@__OPENPGPJS_MAIN__@${OPENPGPJS_MAIN}@g" \
|
||||
| sed "s@__SQOP__@${SQOP}@g" \
|
||||
| sed "s@__GPGME_SOP__@${GPGME_SOP}@g" \
|
||||
| sed "s@__GOSOP__@${GOSOP}@g" \
|
||||
| sed "s@__SOP_OPENPGPJS__@${SOP_OPENPGPJS}@g" \
|
||||
| sed "s@__GOSOP_V2__@${GOSOP_V2}@g" \
|
||||
| sed "s@__SOP_OPENPGPJS__@${SOP_OPENPGPJS_V2}@g" \
|
||||
| sed "s@__RNP_SOP__@${RNP_SOP}@g" \
|
||||
| sed "s@__RSOP__@${RSOP}@g" \
|
||||
> $CONFIG_OUTPUT
|
10
.github/workflows/benchmark.yml
vendored
10
.github/workflows/benchmark.yml
vendored
@ -2,7 +2,7 @@ name: Performance Regression Test
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
branches: [main, v6]
|
||||
branches: [main]
|
||||
|
||||
jobs:
|
||||
benchmark:
|
||||
@ -11,15 +11,17 @@ jobs:
|
||||
|
||||
steps:
|
||||
# check out pull request branch
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/checkout@v4
|
||||
with:
|
||||
path: pr
|
||||
# check out main branch (to compare performance)
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/checkout@v4
|
||||
with:
|
||||
ref: main
|
||||
path: main
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/setup-node@v4
|
||||
with:
|
||||
node-version: '>=20.6.0'
|
||||
|
||||
- name: Run pull request time benchmark
|
||||
run: cd pr && npm install && npm run --silent benchmark-time > benchmarks.txt && cat benchmarks.txt
|
||||
|
6
.github/workflows/docs.yml
vendored
6
.github/workflows/docs.yml
vendored
@ -4,7 +4,7 @@ on:
|
||||
push:
|
||||
branches: [main]
|
||||
pull_request:
|
||||
branches: [main, v6]
|
||||
branches: [main]
|
||||
|
||||
jobs:
|
||||
lint:
|
||||
@ -13,7 +13,7 @@ jobs:
|
||||
runs-on: ubuntu-latest
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
- run: npm ci --ignore-scripts
|
||||
- run: npm run docs
|
||||
|
26
.github/workflows/sop-test-suite.yml
vendored
26
.github/workflows/sop-test-suite.yml
vendored
@ -2,7 +2,7 @@ name: SOP interoperability test suite
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
branches: [ main, v6 ]
|
||||
branches: [ main ]
|
||||
|
||||
jobs:
|
||||
|
||||
@ -10,34 +10,34 @@ jobs:
|
||||
name: Run interoperability test suite
|
||||
runs-on: ubuntu-latest
|
||||
container:
|
||||
image: ghcr.io/protonmail/openpgp-interop-test-docker:v1.1.1
|
||||
image: ghcr.io/protonmail/openpgp-interop-test-docker:v1.1.12
|
||||
credentials:
|
||||
username: ${{ github.actor }}
|
||||
password: ${{ secrets.github_token }}
|
||||
steps:
|
||||
# check out repo for scripts
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/checkout@v4
|
||||
# check out pull request branch
|
||||
- name: Checkout openpgpjs-branch
|
||||
uses: actions/checkout@v3
|
||||
uses: actions/checkout@v4
|
||||
with:
|
||||
path: openpgpjs-branch
|
||||
- name: Install openpgpjs-branch
|
||||
run: cd openpgpjs-branch && npm install
|
||||
- name: Print openpgpjs-branch version
|
||||
run: $SOP_OPENPGPJS version --extended
|
||||
run: $SOP_OPENPGPJS_V2 version --extended
|
||||
env:
|
||||
OPENPGPJS_PATH: ${{ github.workspace }}/openpgpjs-branch
|
||||
# check out main branch
|
||||
- name: Checkout openpgpjs-main
|
||||
uses: actions/checkout@v3
|
||||
uses: actions/checkout@v4
|
||||
with:
|
||||
ref: main
|
||||
path: openpgpjs-main
|
||||
- name: Install openpgpjs-main
|
||||
run: cd openpgpjs-main && npm install
|
||||
- name: Print openpgpjs-main version
|
||||
run: $SOP_OPENPGPJS version --extended
|
||||
run: $SOP_OPENPGPJS_V2 version --extended
|
||||
env:
|
||||
OPENPGPJS_PATH: ${{ github.workspace }}/openpgpjs-main
|
||||
# Run test suite
|
||||
@ -56,12 +56,12 @@ jobs:
|
||||
RESULTS_HTML: .github/test-suite/test-suite-results.html
|
||||
# Upload results
|
||||
- name: Upload test results json artifact
|
||||
uses: actions/upload-artifact@v3
|
||||
uses: actions/upload-artifact@v4
|
||||
with:
|
||||
name: test-suite-results.json
|
||||
path: .github/test-suite/test-suite-results.json
|
||||
- name: Upload test results html artifact
|
||||
uses: actions/upload-artifact@v3
|
||||
uses: actions/upload-artifact@v4
|
||||
with:
|
||||
name: test-suite-results.html
|
||||
path: .github/test-suite/test-suite-results.html
|
||||
@ -72,16 +72,16 @@ jobs:
|
||||
needs: test-suite
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@v3
|
||||
uses: actions/checkout@v4
|
||||
- name: Download test results json artifact
|
||||
id: download-test-results
|
||||
uses: actions/download-artifact@v3
|
||||
uses: actions/download-artifact@v4
|
||||
with:
|
||||
name: test-suite-results.json
|
||||
- name: Compare with baseline
|
||||
uses: ProtonMail/openpgp-interop-test-analyzer@v1
|
||||
uses: ProtonMail/openpgp-interop-test-analyzer@v2
|
||||
with:
|
||||
results: ${{ steps.download-test-results.outputs.download-path }}/test-suite-results.json
|
||||
output: baseline-comparison.json
|
||||
baseline: sop-openpgpjs-main
|
||||
target: sop-openpgpjs-main
|
||||
target: sop-openpgpjs-branch
|
||||
|
85
.github/workflows/tests.yml
vendored
85
.github/workflows/tests.yml
vendored
@ -4,18 +4,18 @@ on:
|
||||
push:
|
||||
branches: [main]
|
||||
pull_request:
|
||||
branches: [main, v6]
|
||||
branches: [main]
|
||||
|
||||
jobs:
|
||||
build: # cache both dist and tests (non-lightweight only), based on commit hash
|
||||
name: Build
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
- name: Check for cached folders
|
||||
id: cache-full
|
||||
uses: actions/cache@v3
|
||||
uses: actions/cache@v4
|
||||
with:
|
||||
path: |
|
||||
dist
|
||||
@ -31,20 +31,20 @@ jobs:
|
||||
strategy:
|
||||
fail-fast: false # if tests for one version fail, continue with the rest
|
||||
matrix:
|
||||
node-version: [16.x, 18.x, '20.x']
|
||||
node-version: [18.x, 20.x, 22.x]
|
||||
# See supported Node.js release schedule at https://nodejs.org/en/about/releases/
|
||||
|
||||
name: Node ${{ matrix.node-version }}
|
||||
runs-on: ubuntu-latest
|
||||
needs: build
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
with:
|
||||
node-version: ${{ matrix.node-version }}
|
||||
- run: npm ci --ignore-scripts # for mocha
|
||||
- name: Retrieve cached folders
|
||||
uses: actions/cache/restore@v3
|
||||
uses: actions/cache/restore@v4
|
||||
id: cache-full
|
||||
with:
|
||||
# test/lib is not needed, but the path must be specified fully for a cache-hit
|
||||
@ -57,15 +57,22 @@ jobs:
|
||||
|
||||
test-browsers-latest:
|
||||
name: Browsers (latest)
|
||||
runs-on: ubuntu-latest
|
||||
needs: build
|
||||
strategy:
|
||||
fail-fast: false # if tests for one version fail, continue with the rest
|
||||
matrix:
|
||||
# run on all main platforms to test platform-specific code, if present
|
||||
# (e.g. webkit's WebCrypto API implementation is different in macOS vs Linux)
|
||||
# TODO: windows-latest fails to fetch resources from the wtr server; investigate if the problem is with path declaration or permissions
|
||||
runner: ['ubuntu-latest', 'macos-latest']
|
||||
runs-on: ${{ matrix.runner }}
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
|
||||
- name: Retrieve cached built folders
|
||||
uses: actions/cache/restore@v3
|
||||
uses: actions/cache/restore@v4
|
||||
id: cache-full
|
||||
with:
|
||||
path: |
|
||||
@ -79,33 +86,36 @@ jobs:
|
||||
npm pkg delete scripts.prepare
|
||||
npm ci
|
||||
|
||||
- name: Get Playwright version
|
||||
- name: Get Playwright version and cache location
|
||||
id: playwright-version
|
||||
run: |
|
||||
PLAYWRIGHT_VERSION=$(npm ls playwright | grep playwright | sed 's/.*@//')
|
||||
PLAYWRIGHT_VERSION=$(npm ls playwright --depth=0 | grep playwright | sed 's/.*@//')
|
||||
echo "version=$PLAYWRIGHT_VERSION" >> $GITHUB_OUTPUT
|
||||
PLAYWRIGHT_CACHE=${{ fromJSON('{"ubuntu-latest": "~/.cache/ms-playwright", "macos-latest": "~/Library/Caches/ms-playwright"}')[matrix.runner] }}
|
||||
echo "playwright_cache=$PLAYWRIGHT_CACHE" >> $GITHUB_OUTPUT
|
||||
- name: Check for cached browsers
|
||||
id: cache-playwright-browsers
|
||||
uses: actions/cache@v3
|
||||
uses: actions/cache@v4
|
||||
with:
|
||||
path: ~/.cache/ms-playwright
|
||||
key: playwright-browsers-${{ steps.playwright-version.outputs.version }}
|
||||
path: ${{ steps.playwright-version.outputs.playwright_cache }}
|
||||
key: playwright-browsers-${{ matrix.runner }}-${{ steps.playwright-version.outputs.version }}
|
||||
- name: Install browsers
|
||||
if: steps.cache-playwright-browsers.outputs.cache-hit != 'true'
|
||||
run: |
|
||||
npx playwright install-deps chrome
|
||||
npx playwright install-deps firefox
|
||||
npx playwright install --with-deps chromium
|
||||
npx playwright install --with-deps firefox
|
||||
|
||||
- name: Install WebKit # caching not possible, external shared libraries required
|
||||
run: npx playwright install-deps webkit
|
||||
if: ${{ matrix.runner == 'macos-latest' }} # do not install on ubuntu, since the X25519 WebCrypto implementation has issues
|
||||
run: npx playwright install --with-deps webkit
|
||||
|
||||
- name: Run browser tests
|
||||
run: npm run test-browser
|
||||
run: npm run test-browser:ci -- --static-logging
|
||||
|
||||
- name: Run browser tests (lightweight) # overwrite test/lib
|
||||
run: |
|
||||
npm run build-test --lightweight
|
||||
npm run test-browser
|
||||
npm run test-browser:ci -- --static-logging
|
||||
|
||||
test-browsers-compatibility:
|
||||
name: Browsers (older, on Browserstack)
|
||||
@ -116,14 +126,23 @@ jobs:
|
||||
BROWSERSTACK_ACCESS_KEY: VjgBVRMxNVBj7SjJFiau
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
|
||||
- name: Generate self-signed HTTPS certificates for web-test-runner server
|
||||
uses: kofemann/action-create-certificate@v0.0.4
|
||||
with:
|
||||
hostcert: '127.0.0.1.pem'
|
||||
hostkey: '127.0.0.1-key.pem'
|
||||
cachain: 'ca-chain.pem'
|
||||
- name: Adjust HTTPS certificates permissions
|
||||
run: sudo chown runner:docker *.pem
|
||||
|
||||
- name: Install dependencies
|
||||
run: npm ci --ignore-scripts
|
||||
|
||||
- name: Retrieve cached dist folder
|
||||
uses: actions/cache/restore@v3
|
||||
uses: actions/cache/restore@v4
|
||||
id: cache-full
|
||||
with:
|
||||
path: |
|
||||
@ -139,12 +158,12 @@ jobs:
|
||||
env:
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
- name: Run browserstack tests
|
||||
run: npm run test-browserstack
|
||||
run: npm run test-browserstack -- --static-logging
|
||||
|
||||
- name: Run browserstack tests (lightweight) # overwrite test/lib
|
||||
run: |
|
||||
npm run build-test --lightweight
|
||||
npm run test-browserstack
|
||||
npm run test-browserstack -- --static-logging
|
||||
env:
|
||||
LIGHTWEIGHT: true
|
||||
|
||||
@ -154,11 +173,11 @@ jobs:
|
||||
needs: build
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
- run: npm ci --ignore-scripts # TS
|
||||
- name: Retrieve cached folders
|
||||
uses: actions/cache/restore@v3
|
||||
uses: actions/cache/restore@v4
|
||||
id: cache-full
|
||||
with:
|
||||
path: |
|
||||
@ -173,11 +192,11 @@ jobs:
|
||||
needs: build
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-node@v3
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-node@v4
|
||||
- run: npm ci --ignore-scripts # linter
|
||||
- name: Retrieve cached folders
|
||||
uses: actions/cache/restore@v3
|
||||
uses: actions/cache/restore@v4
|
||||
id: cache-full
|
||||
with:
|
||||
path: |
|
||||
|
2
.gitignore
vendored
2
.gitignore
vendored
@ -5,4 +5,4 @@ test/lib/
|
||||
test/typescript/definitions.js
|
||||
dist/
|
||||
openpgp.store/
|
||||
.nyc_output/
|
||||
coverage
|
||||
|
92
README.md
92
README.md
@ -1,7 +1,7 @@
|
||||
OpenPGP.js [](https://automate.browserstack.com/public-build/N1l2eHFOanVBMU9wYWxJM3ZnWERnc1lidkt5UkRqa3BralV3SWVhOGpGTT0tLVljSjE4Z3dzVmdiQjl6RWgxb2c3T2c9PQ==--5864052cd523f751b6b907d547ac9c4c5f88c8a3) [](https://gitter.im/openpgpjs/openpgpjs?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
|
||||
OpenPGP.js [](https://gitter.im/openpgpjs/openpgpjs?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
|
||||
==========
|
||||
|
||||
[OpenPGP.js](https://openpgpjs.org/) is a JavaScript implementation of the OpenPGP protocol. It implements the [crypto-refresh](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) (superseding [RFC4880](https://tools.ietf.org/html/rfc4880) and [RFC4880bis](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-10)).
|
||||
[OpenPGP.js](https://openpgpjs.org/) is a JavaScript implementation of the OpenPGP protocol. It implements [RFC 9580](https://datatracker.ietf.org/doc/rfc9580/) (superseding [RFC 4880](https://tools.ietf.org/html/rfc4880) and [RFC 4880bis](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-10)).
|
||||
|
||||
**Table of Contents**
|
||||
|
||||
@ -33,60 +33,62 @@ OpenPGP.js [ bundle works with recent versions of Chrome, Firefox, Edge and Safari 13+.
|
||||
* The `dist/openpgp.min.js` (or `.mjs`) bundle works with recent versions of Chrome, Firefox, Edge and Safari 14+.
|
||||
|
||||
* The `dist/node/openpgp.min.mjs` (or `.cjs`) bundle works in Node.js v16+: it is used by default when you `import ... from 'openpgp'` (resp. `require('openpgp')`).
|
||||
* The `dist/node/openpgp.min.mjs` (or `.cjs`) bundle works in Node.js v18+: it is used by default when you `import ... from 'openpgp'` (or `require('openpgp')`, respectively).
|
||||
|
||||
* Support for the [Web Cryptography API](https://w3c.github.io/webcrypto/)'s `SubtleCrypto` is required.
|
||||
* In browsers, `SubtleCrypto` is only available in [secure contexts](https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts).
|
||||
* In supported versions of Node.js, `SubtleCrypto` is always available.
|
||||
|
||||
* Support for the [Web Streams API](https://streams.spec.whatwg.org/) is required.
|
||||
* In browsers: the latest versions of Chrome, Firefox, Edge and Safari support Streams, including `TransformStream`s.
|
||||
These are needed if you use the library with stream inputs.
|
||||
In previous versions of OpenPGP.js, Web Streams were automatically polyfilled by the library,
|
||||
but from v6 this task is left up to the library user, due to the more extensive browser support, and the
|
||||
polyfilling side-effects. If you're working with [older browsers versions which do not implement e.g. TransformStreams](https://developer.mozilla.org/en-US/docs/Web/API/TransformStream#browser_compatibility), you can manually
|
||||
load the [Web Streams polyfill](https://github.com/MattiasBuelens/web-streams-polyfills).
|
||||
Please note that when you load the polyfills, the global `ReadableStream` property (if it exists) gets overwritten with the polyfill version.
|
||||
In some edge cases, you might need to use the native
|
||||
`ReadableStream` (for example when using it to create a `Response`
|
||||
object), in which case you should store a reference to it before loading
|
||||
the polyfills. There is also the [web-streams-adapter](https://github.com/MattiasBuelens/web-streams-adapter)
|
||||
library to convert back and forth between them.
|
||||
* In Node.js: OpenPGP.js v6 no longer supports native Node `Readable` streams in inputs, and instead expects (and outputs) [Node's Web Streams](https://nodejs.org/api/webstreams.html#class-readablestream). [Node v17+ includes utilities to convert from and to Web Streams](https://nodejs.org/api/stream.html#streamreadabletowebstreamreadable-options).
|
||||
|
||||
* Streaming support: the latest versions of Chrome, Firefox, Edge and Safari implement the
|
||||
[Streams specification](https://streams.spec.whatwg.org/), including `TransformStream`s.
|
||||
These are needed if you use the library with streamed inputs.
|
||||
In previous versions of OpenPGP.js, WebStreams were automatically polyfilled by the library,
|
||||
but from v6 this task is left up to the library user, due to the more extensive browser support, and the
|
||||
polyfilling side-effects. If you're working with [older browsers versions which do not implement e.g. TransformStreams](https://developer.mozilla.org/en-US/docs/Web/API/TransformStream), you can manually
|
||||
load [WebStream polyfill](https://github.com/MattiasBuelens/web-streams-polyfills).
|
||||
Please note that when you load the polyfills, the global `ReadableStream` property (if it exists) gets overwritten with the polyfill version.
|
||||
In some edge cases, you might need to use the native
|
||||
`ReadableStream` (for example when using it to create a `Response`
|
||||
object), in which case you should store a reference to it before loading
|
||||
the polyfills. There is also the [web-streams-adapter](https://github.com/MattiasBuelens/web-streams-adapter)
|
||||
library to convert back and forth between them.
|
||||
|
||||
### Performance
|
||||
|
||||
* Version 3.0.0 of the library introduces support for public-key cryptography using [elliptic curves](https://wiki.gnupg.org/ECC). We use native implementations on browsers and Node.js when available. Elliptic curve cryptography provides stronger security per bits of key, which allows for much faster operations. Currently the following curves are supported:
|
||||
* Version 3.0.0 of the library introduced support for public-key cryptography using [elliptic curves](https://wiki.gnupg.org/ECC). We use native implementations on browsers and Node.js when available. Compared to RSA, elliptic curve cryptography provides stronger security per bits of key, which allows for much faster operations. Currently the following curves are supported:
|
||||
|
||||
| Curve | Encryption | Signature | NodeCrypto | WebCrypto | Constant-Time |
|
||||
|:---------------:|:----------:|:---------:|:----------:|:---------:|:-----------------:|
|
||||
| curve25519 | ECDH | N/A | No | No | Algorithmically** |
|
||||
| ed25519 | N/A | EdDSA | No | No | Algorithmically** |
|
||||
| p256 | ECDH | ECDSA | Yes* | Yes* | If native*** |
|
||||
| p384 | ECDH | ECDSA | Yes* | Yes* | If native*** |
|
||||
| p521 | ECDH | ECDSA | Yes* | Yes* | If native*** |
|
||||
| brainpoolP256r1 | ECDH | ECDSA | Yes* | No | If native*** |
|
||||
| brainpoolP384r1 | ECDH | ECDSA | Yes* | No | If native*** |
|
||||
| brainpoolP512r1 | ECDH | ECDSA | Yes* | No | If native*** |
|
||||
| secp256k1 | ECDH | ECDSA | Yes* | No | If native*** |
|
||||
| curve25519 | ECDH | N/A | No | No | Algorithmically |
|
||||
| ed25519 | N/A | EdDSA | No | Yes* | If native** |
|
||||
| nistP256 | ECDH | ECDSA | Yes* | Yes* | If native** |
|
||||
| nistP384 | ECDH | ECDSA | Yes* | Yes* | If native** |
|
||||
| nistP521 | ECDH | ECDSA | Yes* | Yes* | If native** |
|
||||
| brainpoolP256r1 | ECDH | ECDSA | Yes* | No | If native** |
|
||||
| brainpoolP384r1 | ECDH | ECDSA | Yes* | No | If native** |
|
||||
| brainpoolP512r1 | ECDH | ECDSA | Yes* | No | If native** |
|
||||
| secp256k1 | ECDH | ECDSA | Yes* | No | If native** |
|
||||
|
||||
\* when available
|
||||
\** the curve25519 and ed25519 implementations are algorithmically constant-time, but may not be constant-time after optimizations of the JavaScript compiler
|
||||
\*** these curves are only constant-time if the underlying native implementation is available and constant-time
|
||||
\** these curves are only constant-time if the underlying native implementation is available and constant-time
|
||||
|
||||
* If the user's browser supports [native WebCrypto](https://caniuse.com/#feat=cryptography) via the `window.crypto.subtle` API, this will be used. Under Node.js the native [crypto module](https://nodejs.org/api/crypto.html#crypto_crypto) is used.
|
||||
* The platform's [native Web Crypto API](https://w3c.github.io/webcrypto/) is used for performance. On Node.js the native [crypto module](https://nodejs.org/api/crypto.html#crypto_crypto) is also used, in cases where it offers additional functionality.
|
||||
|
||||
* The library implements authenticated encryption (AEAD) as per the ["crypto refresh" draft standard](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) using AES-OCB, EAX, or GCM. This makes symmetric encryption faster on platforms with native implementations. However, since the specification is very recent and other OpenPGP implementations are in the process of adopting it, the feature is currently behind a flag. **Note: activating this setting can break compatibility with other OpenPGP implementations which have yet to implement the feature.** You can enable it by setting `openpgp.config.aeadProtect = true`.
|
||||
Note that this setting has a different effect from the one in OpenPGP.js v5, which implemented support for a provisional version of AEAD from [RFC4880bis](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-10), which was modified in a later draft of the crypto refresh.
|
||||
* The library implements authenticated encryption (AEAD) as per [RFC 9580](https://datatracker.ietf.org/doc/rfc9580/) using AES-GCM, OCB, or EAX. This makes symmetric encryption faster on platforms with native implementations. However, since the specification is very recent and other OpenPGP implementations are in the process of adopting it, the feature is currently behind a flag. **Note: activating this setting can break compatibility with other OpenPGP implementations which have yet to implement the feature.** You can enable it by setting `openpgp.config.aeadProtect = true`.
|
||||
Note that this setting has a different effect from the one in OpenPGP.js v5, which implemented support for a provisional version of AEAD from [RFC 4880bis](https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-10), which was modified in RFC 9580.
|
||||
|
||||
You can change the AEAD mode by setting one of the following options:
|
||||
|
||||
```
|
||||
openpgp.config.preferredAEADAlgorithm = openpgp.enums.aead.ocb; // Default (widest ecosystem support), non-native
|
||||
openpgp.config.preferredAEADAlgorithm = openpgp.enums.aead.gcm; // Native in WebCrypto and Node.js
|
||||
openpgp.config.preferredAEADAlgorithm = openpgp.enums.aead.gcm; // Default, native in WebCrypto and Node.js
|
||||
openpgp.config.preferredAEADAlgorithm = openpgp.enums.aead.ocb; // Non-native, but supported across RFC 9580 implementations
|
||||
openpgp.config.preferredAEADAlgorithm = openpgp.enums.aead.eax; // Native in Node.js
|
||||
```
|
||||
|
||||
* For environments that don't provide native crypto, the library falls back to [asm.js](https://caniuse.com/#feat=asmjs) AES and AEAD implementations.
|
||||
|
||||
|
||||
### Getting started
|
||||
|
||||
#### Node.js
|
||||
@ -182,7 +184,7 @@ If you notice missing or incorrect type definitions, feel free to open a PR.
|
||||
|
||||
### Examples
|
||||
|
||||
Here are some examples of how to use OpenPGP.js v5. For more elaborate examples and working code, please check out the [public API unit tests](https://github.com/openpgpjs/openpgpjs/blob/main/test/general/openpgp.js). If you're upgrading from v4 it might help to check out the [changelog](https://github.com/openpgpjs/openpgpjs/wiki/V5-Changelog) and [documentation](https://github.com/openpgpjs/openpgpjs#documentation).
|
||||
Here are some examples of how to use OpenPGP.js v6. For more elaborate examples and working code, please check out the [public API unit tests](https://github.com/openpgpjs/openpgpjs/blob/main/test/general/openpgp.js). If you're upgrading from v4 it might help to check out the [changelog](https://github.com/openpgpjs/openpgpjs/wiki/v6-Changelog) and [documentation](https://github.com/openpgpjs/openpgpjs#documentation).
|
||||
|
||||
#### Encrypt and decrypt *Uint8Array* data with a password
|
||||
|
||||
@ -387,14 +389,8 @@ Where the value can be any of:
|
||||
})();
|
||||
```
|
||||
|
||||
For more information on using ReadableStreams, see [the MDN Documentation on the
|
||||
Streams API](https://developer.mozilla.org/en-US/docs/Web/API/Streams_API).
|
||||
|
||||
You can also pass a [Node.js `Readable`
|
||||
stream](https://nodejs.org/api/stream.html#stream_class_stream_readable), in
|
||||
which case OpenPGP.js will return a Node.js `Readable` stream as well, which you
|
||||
can `.pipe()` to a `Writable` stream, for example.
|
||||
|
||||
For more information on using ReadableStreams (both in browsers and Node.js), see [the MDN Documentation on the
|
||||
Streams API](https://developer.mozilla.org/en-US/docs/Web/API/Streams_API) .
|
||||
|
||||
#### Streaming encrypt and decrypt *String* data with PGP keys
|
||||
|
||||
@ -451,7 +447,7 @@ can `.pipe()` to a `Writable` stream, for example.
|
||||
|
||||
ECC keys (smaller and faster to generate):
|
||||
|
||||
Possible values for `curve` are: `curve25519`, `ed25519`, `p256`, `p384`, `p521`,
|
||||
Possible values for `curve` are: `curve25519`, `ed25519`, `nistP256`, `nistP384`, `nistP521`,
|
||||
`brainpoolP256r1`, `brainpoolP384r1`, `brainpoolP512r1`, and `secp256k1`.
|
||||
Note that both the `curve25519` and `ed25519` options generate a primary key for signing using Ed25519
|
||||
and a subkey for encryption using Curve25519.
|
||||
@ -668,7 +664,7 @@ To create your own build of the library, just run the following command after cl
|
||||
|
||||
npm install && npm test
|
||||
|
||||
For debugging browser errors, you can run `npm start` and open [`http://localhost:8080/test/unittests.html`](http://localhost:8080/test/unittests.html) in a browser, or run the following command:
|
||||
For debugging browser errors, run the following command:
|
||||
|
||||
npm run browsertest
|
||||
|
||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
1209
docs/global.html
1209
docs/global.html
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
400
docs/module-crypto_cipherMode.html
Normal file
400
docs/module-crypto_cipherMode.html
Normal file
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
222
openpgp.d.ts
vendored
222
openpgp.d.ts
vendored
@ -1,3 +1,5 @@
|
||||
/* eslint-disable max-lines, @typescript-eslint/indent */
|
||||
|
||||
/**
|
||||
* Type definitions for OpenPGP.js http://openpgpjs.org/
|
||||
*
|
||||
@ -7,9 +9,19 @@
|
||||
* - Errietta Kostala <https://github.com/errietta>
|
||||
*/
|
||||
|
||||
import type { WebStream as GenericWebStream, NodeStream as GenericNodeStream } from '@openpgp/web-stream-tools';
|
||||
import type { WebStream as GenericWebStream, NodeWebStream as GenericNodeWebStream } from '@openpgp/web-stream-tools';
|
||||
|
||||
/* ############## v5 KEY #################### */
|
||||
/* ############## STREAM #################### */
|
||||
type Data = Uint8Array | string;
|
||||
// web-stream-tools might end up supporting additional data types, so we re-declare the types
|
||||
// to enforce the type contraint that we need.
|
||||
export type WebStream<T extends Data> = GenericWebStream<T>;
|
||||
export type NodeWebStream<T extends Data> = GenericNodeWebStream<T>;
|
||||
export type Stream<T extends Data> = WebStream<T> | NodeWebStream<T>;
|
||||
export type MaybeStream<T extends Data> = T | Stream<T>;
|
||||
type MaybeArray<T> = T | Array<T>;
|
||||
|
||||
/* ############## KEY #################### */
|
||||
// The Key and PublicKey types can be used interchangably since TS cannot detect the difference, as they have the same class properties.
|
||||
// The declared readKey(s) return type is Key instead of a PublicKey since it seems more obvious that a Key can be cast to a PrivateKey.
|
||||
export function readKey(options: { armoredKey: string, config?: PartialConfig }): Promise<Key>;
|
||||
@ -54,8 +66,8 @@ export abstract class Key {
|
||||
// NB: the order of the `update` declarations matters, since PublicKey includes PrivateKey
|
||||
public update(sourceKey: PrivateKey, date?: Date, config?: Config): Promise<PrivateKey>;
|
||||
public update(sourceKey: PublicKey, date?: Date, config?: Config): Promise<PublicKey>;
|
||||
public signPrimaryUser(privateKeys: PrivateKey[], date?: Date, userID?: UserID, config?: Config): Promise<this>
|
||||
public signAllUsers(privateKeys: PrivateKey[], date?: Date, config?: Config): Promise<this>
|
||||
public signPrimaryUser(privateKeys: PrivateKey[], date?: Date, userID?: UserID, config?: Config): Promise<this>;
|
||||
public signAllUsers(privateKeys: PrivateKey[], date?: Date, config?: Config): Promise<this>;
|
||||
public verifyPrimaryKey(date?: Date, userID?: UserID, config?: Config): Promise<void>; // throws on error
|
||||
public verifyPrimaryUser(publicKeys: PublicKey[], date?: Date, userIDs?: UserID, config?: Config): Promise<{ keyID: KeyID, valid: boolean | null }[]>;
|
||||
public verifyAllUsers(publicKeys?: PublicKey[], date?: Date, config?: Config): Promise<{ userID: string, keyID: KeyID, valid: boolean | null }[]>;
|
||||
@ -82,7 +94,7 @@ export class PrivateKey extends PublicKey {
|
||||
public revoke(reason?: ReasonForRevocation, date?: Date, config?: Config): Promise<PrivateKey>;
|
||||
public isDecrypted(): boolean;
|
||||
public addSubkey(options: SubkeyOptions): Promise<PrivateKey>;
|
||||
public getDecryptionKeys(keyID?: KeyID, date?: Date | null, userID?: UserID, config?: Config): Promise<PrivateKey | Subkey>
|
||||
public getDecryptionKeys(keyID?: KeyID, date?: Date | null, userID?: UserID, config?: Config): Promise<(PrivateKey | Subkey)[]>;
|
||||
public update(sourceKey: PublicKey, date?: Date, config?: Config): Promise<PrivateKey>;
|
||||
}
|
||||
|
||||
@ -98,9 +110,9 @@ export class Subkey {
|
||||
public getCreationTime(): Date;
|
||||
public getAlgorithmInfo(): AlgorithmInfo;
|
||||
public getKeyID(): KeyID;
|
||||
public getExpirationTime(date?: Date, config?: Config): Promise<Date | typeof Infinity | null>
|
||||
public getExpirationTime(date?: Date, config?: Config): Promise<Date | typeof Infinity | null>;
|
||||
public isRevoked(signature: SignaturePacket, key: AnyKeyPacket, date?: Date, config?: Config): Promise<boolean>;
|
||||
public update(subKey: Subkey, date?: Date, config?: Config): Promise<void>
|
||||
public update(subKey: Subkey, date?: Date, config?: Config): Promise<void>;
|
||||
public revoke(primaryKey: SecretKeyPacket, reasonForRevocation?: ReasonForRevocation, date?: Date, config?: Config): Promise<Subkey>;
|
||||
}
|
||||
|
||||
@ -118,13 +130,13 @@ export interface PrimaryUser {
|
||||
selfCertification: SignaturePacket;
|
||||
}
|
||||
|
||||
type AlgorithmInfo = {
|
||||
export type AlgorithmInfo = {
|
||||
algorithm: enums.publicKeyNames;
|
||||
bits?: number;
|
||||
curve?: EllipticCurveName;
|
||||
};
|
||||
|
||||
/* ############## v5 SIG #################### */
|
||||
/* ############## SIG #################### */
|
||||
|
||||
export function readSignature(options: { armoredSignature: string, config?: PartialConfig }): Promise<Signature>;
|
||||
export function readSignature(options: { binarySignature: Uint8Array, config?: PartialConfig }): Promise<Signature>;
|
||||
@ -143,7 +155,7 @@ interface VerificationResult {
|
||||
signature: Promise<Signature>;
|
||||
}
|
||||
|
||||
/* ############## v5 CLEARTEXT #################### */
|
||||
/* ############## CLEARTEXT #################### */
|
||||
|
||||
export function readCleartextMessage(options: { cleartextMessage: string, config?: PartialConfig }): Promise<CleartextMessage>;
|
||||
|
||||
@ -176,7 +188,7 @@ export class CleartextMessage {
|
||||
verify(keys: PublicKey[], date?: Date, config?: Config): Promise<VerificationResult[]>;
|
||||
}
|
||||
|
||||
/* ############## v5 MSG #################### */
|
||||
/* ############## MSG #################### */
|
||||
export function generateSessionKey(options: { encryptionKeys: MaybeArray<PublicKey>, date?: Date, encryptionUserIDs?: MaybeArray<UserID>, config?: PartialConfig }): Promise<SessionKey>;
|
||||
export function encryptSessionKey(options: EncryptSessionKeyOptions & { format?: 'armored' }): Promise<string>;
|
||||
export function encryptSessionKey(options: EncryptSessionKeyOptions & { format: 'binary' }): Promise<Uint8Array>;
|
||||
@ -190,25 +202,25 @@ export function createMessage<T extends MaybeStream<string>>(options: { text: T,
|
||||
export function createMessage<T extends MaybeStream<Uint8Array>>(options: { binary: T, filename?: string, date?: Date, format?: enums.literalFormatNames }): Promise<Message<T>>;
|
||||
|
||||
export function encrypt<T extends MaybeStream<Data>>(options: EncryptOptions & { message: Message<T>, format?: 'armored' }): Promise<
|
||||
T extends WebStream<infer X> ? WebStream<string> :
|
||||
T extends NodeStream<infer X> ? NodeStream<string> :
|
||||
T extends WebStream<Data> ? WebStream<string> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<string> :
|
||||
string
|
||||
>;
|
||||
export function encrypt<T extends MaybeStream<Data>>(options: EncryptOptions & { message: Message<T>, format: 'binary' }): Promise<
|
||||
T extends WebStream<infer X> ? WebStream<Uint8Array> :
|
||||
T extends NodeStream<infer X> ? NodeStream<Uint8Array> :
|
||||
T extends WebStream<Data> ? WebStream<Uint8Array> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<Uint8Array> :
|
||||
Uint8Array
|
||||
>;
|
||||
export function encrypt<T extends MaybeStream<Data>>(options: EncryptOptions & { message: Message<T>, format: 'object' }): Promise<Message<T>>;
|
||||
|
||||
export function sign<T extends MaybeStream<Data>>(options: SignOptions & { message: Message<T>, format?: 'armored' }): Promise<
|
||||
T extends WebStream<infer X> ? WebStream<string> :
|
||||
T extends NodeStream<infer X> ? NodeStream<string> :
|
||||
T extends WebStream<Data> ? WebStream<string> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<string> :
|
||||
string
|
||||
>;
|
||||
export function sign<T extends MaybeStream<Data>>(options: SignOptions & { message: Message<T>, format: 'binary' }): Promise<
|
||||
T extends WebStream<infer X> ? WebStream<Uint8Array> :
|
||||
T extends NodeStream<infer X> ? NodeStream<Uint8Array> :
|
||||
T extends WebStream<Data> ? WebStream<Uint8Array> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<Uint8Array> :
|
||||
Uint8Array
|
||||
>;
|
||||
export function sign<T extends MaybeStream<Data>>(options: SignOptions & { message: Message<T>, format: 'object' }): Promise<Message<T>>;
|
||||
@ -217,26 +229,26 @@ export function sign(options: SignOptions & { message: CleartextMessage, format:
|
||||
|
||||
export function decrypt<T extends MaybeStream<Data>>(options: DecryptOptions & { message: Message<T>, format: 'binary' }): Promise<DecryptMessageResult & {
|
||||
data:
|
||||
T extends WebStream<infer X> ? WebStream<Uint8Array> :
|
||||
T extends NodeStream<infer X> ? NodeStream<Uint8Array> :
|
||||
T extends WebStream<Data> ? WebStream<Uint8Array> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<Uint8Array> :
|
||||
Uint8Array
|
||||
}>;
|
||||
export function decrypt<T extends MaybeStream<Data>>(options: DecryptOptions & { message: Message<T> }): Promise<DecryptMessageResult & {
|
||||
data:
|
||||
T extends WebStream<infer X> ? WebStream<string> :
|
||||
T extends NodeStream<infer X> ? NodeStream<string> :
|
||||
T extends WebStream<Data> ? WebStream<string> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<string> :
|
||||
string
|
||||
}>;
|
||||
|
||||
export function verify(options: VerifyOptions & { message: CleartextMessage, format?: 'utf8' }): Promise<VerifyMessageResult<string>>;
|
||||
export function verify<T extends MaybeStream<Data>>(options: VerifyOptions & { message: Message<T>, format: 'binary' }): Promise<VerifyMessageResult<
|
||||
T extends WebStream<infer X> ? WebStream<Uint8Array> :
|
||||
T extends NodeStream<infer X> ? NodeStream<Uint8Array> :
|
||||
T extends WebStream<Data> ? WebStream<Uint8Array> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<Uint8Array> :
|
||||
Uint8Array
|
||||
>>;
|
||||
export function verify<T extends MaybeStream<Data>>(options: VerifyOptions & { message: Message<T> }): Promise<VerifyMessageResult<
|
||||
T extends WebStream<infer X> ? WebStream<string> :
|
||||
T extends NodeStream<infer X> ? NodeStream<string> :
|
||||
T extends WebStream<Data> ? WebStream<string> :
|
||||
T extends NodeWebStream<Data> ? NodeWebStream<string> :
|
||||
string
|
||||
>>;
|
||||
|
||||
@ -263,7 +275,7 @@ export class Message<T extends MaybeStream<Data>> {
|
||||
/** Encrypt the message
|
||||
@param encryptionKeys array of public keys, used to encrypt the message
|
||||
*/
|
||||
public encrypt(encryptionKeys?: PublicKey[], passwords?: string[], sessionKeys?: SessionKey[], wildcard?: boolean, encryptionKeyIDs?: KeyID[], date?: Date, userIDs?: UserID[], config?: Config): Promise<Message<MaybeStream<Data>>>;
|
||||
public encrypt(encryptionKeys?: PublicKey[], passwords?: string[], sessionKeys?: SessionKey[], wildcard?: boolean, encryptionKeyIDs?: KeyID[], date?: Date, userIDs?: UserID[], config?: Config): Promise<Message<MaybeStream<Data>>>;
|
||||
|
||||
/** Returns the key IDs of the keys to which the session key is encrypted
|
||||
*/
|
||||
@ -305,7 +317,7 @@ export class Message<T extends MaybeStream<Data>> {
|
||||
}
|
||||
|
||||
|
||||
/* ############## v5 CONFIG #################### */
|
||||
/* ############## CONFIG #################### */
|
||||
|
||||
interface Config {
|
||||
preferredHashAlgorithm: enums.hash;
|
||||
@ -313,13 +325,11 @@ interface Config {
|
||||
preferredCompressionAlgorithm: enums.compression;
|
||||
showVersion: boolean;
|
||||
showComment: boolean;
|
||||
deflateLevel: number;
|
||||
aeadProtect: boolean;
|
||||
allowUnauthenticatedMessages: boolean;
|
||||
allowUnauthenticatedStream: boolean;
|
||||
minRSABits: number;
|
||||
passwordCollisionCheck: boolean;
|
||||
revocationsExpire: boolean;
|
||||
ignoreUnsupportedPackets: boolean;
|
||||
ignoreMalformedPackets: boolean;
|
||||
versionString: string;
|
||||
@ -330,6 +340,7 @@ interface Config {
|
||||
constantTimePKCS1Decryption: boolean;
|
||||
constantTimePKCS1DecryptionSupportedSymmetricAlgorithms: Set<enums.symmetric>;
|
||||
v6Keys: boolean;
|
||||
enableParsingV5Entities: boolean;
|
||||
preferredAEADAlgorithm: enums.aead;
|
||||
aeadChunkSizeByte: number;
|
||||
s2kType: enums.s2k.iterated | enums.s2k.argon2;
|
||||
@ -343,15 +354,15 @@ interface Config {
|
||||
rejectPublicKeyAlgorithms: Set<enums.publicKey>;
|
||||
rejectCurves: Set<enums.curve>;
|
||||
}
|
||||
export var config: Config;
|
||||
export const config: Config;
|
||||
|
||||
// PartialConfig has the same properties as Config, but declared as optional.
|
||||
// This interface is relevant for top-level functions, which accept a subset of configuration options
|
||||
interface PartialConfig extends Partial<Config> {}
|
||||
export interface PartialConfig extends Partial<Config> {}
|
||||
|
||||
/* ############## v5 PACKET #################### */
|
||||
/* ############## PACKET #################### */
|
||||
|
||||
declare abstract class BasePacket {
|
||||
export declare abstract class BasePacket {
|
||||
static readonly tag: enums.packet;
|
||||
public read(bytes: Uint8Array): void;
|
||||
public write(): Uint8Array;
|
||||
@ -424,7 +435,7 @@ export class AEADEncryptedDataPacket extends BasePacket {
|
||||
static readonly tag: enums.packet.aeadEncryptedData;
|
||||
private decrypt(sessionKeyAlgorithm: enums.symmetric, sessionKey: Uint8Array, config?: Config): void;
|
||||
private encrypt(sessionKeyAlgorithm: enums.symmetric, sessionKey: Uint8Array, config?: Config): void;
|
||||
private crypt(fn: Function, sessionKey: Uint8Array, data: MaybeStream<Uint8Array>): MaybeStream<Uint8Array>
|
||||
private crypt(fn: Function, sessionKey: Uint8Array, data: MaybeStream<Uint8Array>): MaybeStream<Uint8Array>;
|
||||
}
|
||||
|
||||
export class PublicKeyEncryptedSessionKeyPacket extends BasePacket {
|
||||
@ -487,7 +498,8 @@ export class SignaturePacket extends BasePacket {
|
||||
public hashAlgorithm: enums.hash | null;
|
||||
public publicKeyAlgorithm: enums.publicKey | null;
|
||||
public signatureData: null | Uint8Array;
|
||||
public unhashedSubpackets: null | Uint8Array;
|
||||
public unhashedSubpackets: RawSubpacket[];
|
||||
public unknownSubpackets: RawSubpacket[];
|
||||
public signedHashValue: null | Uint8Array;
|
||||
public created: Date | null;
|
||||
public signatureExpirationTime: null | number;
|
||||
@ -531,6 +543,12 @@ export class SignaturePacket extends BasePacket {
|
||||
public getExpirationTime(): Date | typeof Infinity;
|
||||
}
|
||||
|
||||
export interface RawSubpacket {
|
||||
type: number;
|
||||
critical: boolean;
|
||||
body: Uint8Array;
|
||||
}
|
||||
|
||||
export interface RawNotation {
|
||||
name: string;
|
||||
value: Uint8Array;
|
||||
@ -561,16 +579,7 @@ export class PacketList<T extends AnyPacket> extends Array<T> {
|
||||
public findPacket(tag: enums.packet): T | undefined;
|
||||
}
|
||||
|
||||
/* ############## v5 STREAM #################### */
|
||||
|
||||
type Data = Uint8Array | string;
|
||||
export interface WebStream<T extends Data> extends GenericWebStream<T> {}
|
||||
export interface NodeStream<T extends Data> extends GenericNodeStream<T> {}
|
||||
export type Stream<T extends Data> = WebStream<T> | NodeStream<T>;
|
||||
export type MaybeStream<T extends Data> = T | Stream<T>;
|
||||
|
||||
/* ############## v5 GENERAL #################### */
|
||||
type MaybeArray<T> = T | Array<T>;
|
||||
/* ############## GENERAL #################### */
|
||||
|
||||
export interface UserID { name?: string; email?: string; comment?: string; }
|
||||
export interface SessionKey {
|
||||
@ -586,7 +595,7 @@ export interface DecryptedSessionKey {
|
||||
|
||||
export interface ReasonForRevocation { flag?: enums.reasonForRevocation, string?: string }
|
||||
|
||||
interface EncryptOptions {
|
||||
export interface EncryptOptions {
|
||||
/** message to be encrypted as created by createMessage */
|
||||
message: Message<MaybeStream<Data>>;
|
||||
/** (optional) array of keys or single key, used to encrypt the message */
|
||||
@ -618,7 +627,7 @@ interface EncryptOptions {
|
||||
config?: PartialConfig;
|
||||
}
|
||||
|
||||
interface DecryptOptions {
|
||||
export interface DecryptOptions {
|
||||
/** the message object with the encrypted data */
|
||||
message: Message<MaybeStream<Data>>;
|
||||
/** (optional) private keys with decrypted secret key data or session key */
|
||||
@ -640,7 +649,7 @@ interface DecryptOptions {
|
||||
config?: PartialConfig;
|
||||
}
|
||||
|
||||
interface SignOptions {
|
||||
export interface SignOptions {
|
||||
message: CleartextMessage | Message<MaybeStream<Data>>;
|
||||
signingKeys: MaybeArray<PrivateKey>;
|
||||
format?: 'armored' | 'binary' | 'object';
|
||||
@ -652,7 +661,7 @@ interface SignOptions {
|
||||
config?: PartialConfig;
|
||||
}
|
||||
|
||||
interface VerifyOptions {
|
||||
export interface VerifyOptions {
|
||||
/** (cleartext) message object with signatures */
|
||||
message: CleartextMessage | Message<MaybeStream<Data>>;
|
||||
/** array of publicKeys or single key, to verify signatures */
|
||||
@ -668,7 +677,7 @@ interface VerifyOptions {
|
||||
config?: PartialConfig;
|
||||
}
|
||||
|
||||
interface EncryptSessionKeyOptions extends SessionKey {
|
||||
export interface EncryptSessionKeyOptions extends SessionKey {
|
||||
encryptionKeys?: MaybeArray<PublicKey>,
|
||||
passwords?: MaybeArray<string>,
|
||||
format?: 'armored' | 'binary' | 'object',
|
||||
@ -679,7 +688,7 @@ interface EncryptSessionKeyOptions extends SessionKey {
|
||||
config?: PartialConfig
|
||||
}
|
||||
|
||||
interface SerializedKeyPair<T extends string|Uint8Array> {
|
||||
interface SerializedKeyPair<T extends string | Uint8Array> {
|
||||
privateKey: T;
|
||||
publicKey: T;
|
||||
}
|
||||
@ -688,12 +697,12 @@ interface KeyPair {
|
||||
publicKey: PublicKey;
|
||||
}
|
||||
|
||||
export type EllipticCurveName = 'ed25519Legacy' | 'curve25519Legacy' | 'p256' | 'p384' | 'p521' | 'secp256k1' | 'brainpoolP256r1' | 'brainpoolP384r1' | 'brainpoolP512r1';
|
||||
export type EllipticCurveName = 'ed25519Legacy' | 'curve25519Legacy' | 'nistP256' | 'nistP384' | 'nistP521' | 'secp256k1' | 'brainpoolP256r1' | 'brainpoolP384r1' | 'brainpoolP512r1';
|
||||
|
||||
interface GenerateKeyOptions {
|
||||
userIDs: MaybeArray<UserID>;
|
||||
passphrase?: string;
|
||||
type?: 'ecc' | 'rsa';
|
||||
type?: 'ecc' | 'rsa' | 'curve25519' | 'curve448';
|
||||
curve?: EllipticCurveName;
|
||||
rsaBits?: number;
|
||||
keyExpirationTime?: number;
|
||||
@ -704,30 +713,24 @@ interface GenerateKeyOptions {
|
||||
}
|
||||
export type KeyOptions = GenerateKeyOptions;
|
||||
|
||||
interface SubkeyOptions {
|
||||
type?: 'ecc' | 'rsa';
|
||||
curve?: EllipticCurveName;
|
||||
rsaBits?: number;
|
||||
keyExpirationTime?: number;
|
||||
date?: Date;
|
||||
export interface SubkeyOptions extends Pick<GenerateKeyOptions, 'type' | 'curve' | 'rsaBits' | 'keyExpirationTime' | 'date' | 'config'> {
|
||||
sign?: boolean;
|
||||
config?: PartialConfig;
|
||||
}
|
||||
|
||||
declare class KeyID {
|
||||
export declare class KeyID {
|
||||
bytes: string;
|
||||
equals(keyID: KeyID, matchWildcard?: boolean): boolean;
|
||||
toHex(): string;
|
||||
static fromID(hex: string): KeyID;
|
||||
}
|
||||
|
||||
interface DecryptMessageResult {
|
||||
export interface DecryptMessageResult {
|
||||
data: MaybeStream<Data>;
|
||||
signatures: VerificationResult[];
|
||||
filename: string;
|
||||
}
|
||||
|
||||
interface VerifyMessageResult<T extends MaybeStream<Data> = MaybeStream<Data>> {
|
||||
export interface VerifyMessageResult<T extends MaybeStream<Data> = MaybeStream<Data>> {
|
||||
data: T;
|
||||
signatures: VerificationResult[];
|
||||
}
|
||||
@ -736,7 +739,7 @@ interface VerifyMessageResult<T extends MaybeStream<Data> = MaybeStream<Data>> {
|
||||
/**
|
||||
* Armor an OpenPGP binary packet block
|
||||
*/
|
||||
export function armor(messagetype: enums.armor, body: object, partindex?: number, parttotal?: number, customComment?: string, config?: Config): string;
|
||||
export function armor(messagetype: enums.armor, body: object, partindex?: number, parttotal?: number, customComment?: string, emitChecksum?: boolean, config?: Config): string;
|
||||
|
||||
/**
|
||||
* DeArmor an OpenPGP armored message; verify the checksum and return the encoded bytes
|
||||
@ -746,44 +749,44 @@ export function unarmor(input: string, config?: Config): Promise<{ text: string,
|
||||
/* ############## v5 ENUMS #################### */
|
||||
|
||||
export namespace enums {
|
||||
function read(type: typeof armor, e: armor): armorNames;
|
||||
function read(type: typeof compression, e: compression): compressionNames;
|
||||
function read(type: typeof hash, e: hash): hashNames;
|
||||
function read(type: typeof packet, e: packet): packetNames;
|
||||
function read(type: typeof publicKey, e: publicKey): publicKeyNames;
|
||||
function read(type: typeof symmetric, e: symmetric): symmetricNames;
|
||||
function read(type: typeof keyStatus, e: keyStatus): keyStatusNames;
|
||||
function read(type: typeof keyFlags, e: keyFlags): keyFlagsNames;
|
||||
export function read(type: typeof armor, e: armor): armorNames;
|
||||
export function read(type: typeof compression, e: compression): compressionNames;
|
||||
export function read(type: typeof hash, e: hash): hashNames;
|
||||
export function read(type: typeof packet, e: packet): packetNames;
|
||||
export function read(type: typeof publicKey, e: publicKey): publicKeyNames;
|
||||
export function read(type: typeof symmetric, e: symmetric): symmetricNames;
|
||||
export function read(type: typeof keyStatus, e: keyStatus): keyStatusNames;
|
||||
export function read(type: typeof keyFlags, e: keyFlags): keyFlagsNames;
|
||||
|
||||
export type armorNames = 'multipartSection' | 'multipartLast' | 'signed' | 'message' | 'publicKey' | 'privateKey';
|
||||
enum armor {
|
||||
export enum armor {
|
||||
multipartSection = 0,
|
||||
multipartLast = 1,
|
||||
signed = 2,
|
||||
message = 3,
|
||||
publicKey = 4,
|
||||
privateKey = 5,
|
||||
signature = 6,
|
||||
signature = 6
|
||||
}
|
||||
|
||||
enum reasonForRevocation {
|
||||
export enum reasonForRevocation {
|
||||
noReason = 0, // No reason specified (key revocations or cert revocations)
|
||||
keySuperseded = 1, // Key is superseded (key revocations)
|
||||
keyCompromised = 2, // Key material has been compromised (key revocations)
|
||||
keyRetired = 3, // Key is retired and no longer used (key revocations)
|
||||
userIDInvalid = 32, // User ID information is no longer valid (cert revocations)
|
||||
userIDInvalid = 32 // User ID information is no longer valid (cert revocations)
|
||||
}
|
||||
|
||||
export type compressionNames = 'uncompressed' | 'zip' | 'zlib' | 'bzip2';
|
||||
enum compression {
|
||||
export enum compression {
|
||||
uncompressed = 0,
|
||||
zip = 1,
|
||||
zlib = 2,
|
||||
bzip2 = 3,
|
||||
bzip2 = 3
|
||||
}
|
||||
|
||||
export type hashNames = 'md5' | 'sha1' | 'ripemd' | 'sha256' | 'sha384' | 'sha512' | 'sha224';
|
||||
enum hash {
|
||||
export type hashNames = 'md5' | 'sha1' | 'ripemd' | 'sha256' | 'sha384' | 'sha512' | 'sha224' | 'sha3_256' | 'sha3_512';
|
||||
export enum hash {
|
||||
md5 = 1,
|
||||
sha1 = 2,
|
||||
ripemd = 3,
|
||||
@ -791,12 +794,14 @@ export namespace enums {
|
||||
sha384 = 9,
|
||||
sha512 = 10,
|
||||
sha224 = 11,
|
||||
sha3_256 = 12,
|
||||
sha3_512 = 14
|
||||
}
|
||||
|
||||
export type packetNames = 'publicKeyEncryptedSessionKey' | 'signature' | 'symEncryptedSessionKey' | 'onePassSignature' | 'secretKey' | 'publicKey'
|
||||
| 'secretSubkey' | 'compressed' | 'symmetricallyEncrypted' | 'marker' | 'literal' | 'trust' | 'userID' | 'publicSubkey' | 'userAttribute'
|
||||
| 'symEncryptedIntegrityProtected' | 'modificationDetectionCode' | 'AEADEncryptedDataPacket';
|
||||
enum packet {
|
||||
export type packetNames = 'publicKeyEncryptedSessionKey' | 'signature' | 'symEncryptedSessionKey' | 'onePassSignature' | 'secretKey' | 'publicKey' |
|
||||
'secretSubkey' | 'compressed' | 'symmetricallyEncrypted' | 'marker' | 'literal' | 'trust' | 'userID' | 'publicSubkey' | 'userAttribute' |
|
||||
'symEncryptedIntegrityProtected' | 'modificationDetectionCode' | 'AEADEncryptedDataPacket';
|
||||
export enum packet {
|
||||
publicKeyEncryptedSessionKey = 1,
|
||||
signature = 2,
|
||||
symEncryptedSessionKey = 3,
|
||||
@ -814,11 +819,11 @@ export namespace enums {
|
||||
userAttribute = 17,
|
||||
symEncryptedIntegrityProtectedData = 18,
|
||||
modificationDetectionCode = 19,
|
||||
aeadEncryptedData = 20,
|
||||
aeadEncryptedData = 20
|
||||
}
|
||||
|
||||
export type publicKeyNames = 'rsaEncryptSign' | 'rsaEncrypt' | 'rsaSign' | 'elgamal' | 'dsa' | 'ecdh' | 'ecdsa' | 'eddsaLegacy' | 'aedh' | 'aedsa' | 'ed25519' | 'x25519' | 'ed448' | 'x448';
|
||||
enum publicKey {
|
||||
export enum publicKey {
|
||||
rsaEncryptSign = 1,
|
||||
rsaEncrypt = 2,
|
||||
rsaSign = 3,
|
||||
@ -835,10 +840,16 @@ export namespace enums {
|
||||
ed448 = 28
|
||||
}
|
||||
|
||||
enum curve {
|
||||
p256 = 'p256',
|
||||
p384 = 'p384',
|
||||
p521 = 'p521',
|
||||
export enum curve {
|
||||
/** @deprecated use `nistP256` instead */
|
||||
p256 = 'nistP256',
|
||||
nistP256 = 'nistP256',
|
||||
/** @deprecated use `nistP384` instead */
|
||||
p384 = 'nistP384',
|
||||
nistP384 = 'nistP384',
|
||||
/** @deprecated use `nistP521` instead */
|
||||
p521 = 'nistP521',
|
||||
nistP521 = 'nistP521',
|
||||
/** @deprecated use `ed25519Legacy` instead */
|
||||
ed25519 = 'ed25519Legacy',
|
||||
ed25519Legacy = 'ed25519Legacy',
|
||||
@ -852,7 +863,7 @@ export namespace enums {
|
||||
}
|
||||
|
||||
export type symmetricNames = 'idea' | 'tripledes' | 'cast5' | 'blowfish' | 'aes128' | 'aes192' | 'aes256' | 'twofish';
|
||||
enum symmetric {
|
||||
export enum symmetric {
|
||||
idea = 1,
|
||||
tripledes = 2,
|
||||
cast5 = 3,
|
||||
@ -860,31 +871,30 @@ export namespace enums {
|
||||
aes128 = 7,
|
||||
aes192 = 8,
|
||||
aes256 = 9,
|
||||
twofish = 10,
|
||||
twofish = 10
|
||||
}
|
||||
|
||||
export type keyStatusNames = 'invalid' | 'expired' | 'revoked' | 'valid' | 'noSelfCert';
|
||||
enum keyStatus {
|
||||
export enum keyStatus {
|
||||
invalid = 0,
|
||||
expired = 1,
|
||||
revoked = 2,
|
||||
valid = 3,
|
||||
noSelfCert = 4,
|
||||
noSelfCert = 4
|
||||
}
|
||||
|
||||
export type keyFlagsNames = 'certifyKeys' | 'signData' | 'encryptCommunication' | 'encryptStorage' | 'splitPrivateKey' | 'authentication'
|
||||
| 'sharedPrivateKey';
|
||||
enum keyFlags {
|
||||
export type keyFlagsNames = 'certifyKeys' | 'signData' | 'encryptCommunication' | 'encryptStorage' | 'splitPrivateKey' | 'authentication' | 'sharedPrivateKey';
|
||||
export enum keyFlags {
|
||||
certifyKeys = 1,
|
||||
signData = 2,
|
||||
encryptCommunication = 4,
|
||||
encryptStorage = 8,
|
||||
splitPrivateKey = 16,
|
||||
authentication = 32,
|
||||
sharedPrivateKey = 128,
|
||||
sharedPrivateKey = 128
|
||||
}
|
||||
|
||||
enum signature {
|
||||
export enum signature {
|
||||
binary = 0,
|
||||
text = 1,
|
||||
standalone = 2,
|
||||
@ -903,21 +913,23 @@ export namespace enums {
|
||||
}
|
||||
|
||||
export type aeadNames = 'eax' | 'ocb' | 'gcm';
|
||||
enum aead {
|
||||
export enum aead {
|
||||
eax = 1,
|
||||
ocb = 2,
|
||||
gcm = 3,
|
||||
/** @deprecated use `gcm` instead */
|
||||
experimentalGCM = 100 // Private algorithm
|
||||
}
|
||||
|
||||
export type literalFormatNames = 'utf8' | 'binary' | 'text' | 'mime'
|
||||
enum literal {
|
||||
export type literalFormatNames = 'utf8' | 'binary' | 'text' | 'mime';
|
||||
export enum literal {
|
||||
binary = 98,
|
||||
text = 116,
|
||||
utf8 = 117,
|
||||
mime = 109
|
||||
}
|
||||
|
||||
enum s2k {
|
||||
export enum s2k {
|
||||
simple = 0,
|
||||
salted = 1,
|
||||
iterated = 3,
|
||||
|
18084
package-lock.json
generated
18084
package-lock.json
generated
File diff suppressed because it is too large
Load Diff
101
package.json
101
package.json
@ -1,11 +1,11 @@
|
||||
{
|
||||
"name": "openpgp",
|
||||
"description": "OpenPGP.js is a Javascript implementation of the OpenPGP protocol. This is defined in RFC 4880.",
|
||||
"version": "6.0.0-alpha.0",
|
||||
"version": "6.1.0",
|
||||
"license": "LGPL-3.0+",
|
||||
"homepage": "https://openpgpjs.org/",
|
||||
"engines": {
|
||||
"node": ">= 16.0.0"
|
||||
"node": ">= 18.0.0"
|
||||
},
|
||||
"keywords": [
|
||||
"crypto",
|
||||
@ -22,12 +22,12 @@
|
||||
"exports": {
|
||||
".": {
|
||||
"types": "./openpgp.d.ts",
|
||||
"browser": "./dist/openpgp.min.mjs",
|
||||
"import": "./dist/node/openpgp.mjs",
|
||||
"require": "./dist/node/openpgp.min.cjs",
|
||||
"browser": "./dist/openpgp.min.mjs"
|
||||
"require": "./dist/node/openpgp.min.cjs"
|
||||
},
|
||||
"./lightweight": {
|
||||
"types": "../openpgp.d.ts",
|
||||
"types": "./openpgp.d.ts",
|
||||
"browser": "./dist/lightweight/openpgp.min.mjs"
|
||||
}
|
||||
},
|
||||
@ -46,67 +46,72 @@
|
||||
"build-test": "npm run build --build-only=test",
|
||||
"prepare": "npm run build",
|
||||
"test": "mocha --timeout 120000 test/unittests.js",
|
||||
"test-type-definitions": "ts-node --esm test/typescript/definitions.ts",
|
||||
"test-type-definitions": "tsx test/typescript/definitions.ts",
|
||||
"benchmark-time": "node test/benchmarks/time.js",
|
||||
"benchmark-memory-usage": "node test/benchmarks/memory_usage.js",
|
||||
"start": "http-server",
|
||||
"prebrowsertest": "npm run build-test",
|
||||
"browsertest": "npm start -- -o test/unittests.html",
|
||||
"test-browser": "karma start test/karma.conf.cjs",
|
||||
"test-browserstack": "karma start test/karma.conf.cjs --browsers bs_safari_latest,bs_ios_14,bs_safari_13_1",
|
||||
"coverage": "nyc npm test",
|
||||
"browsertest": "web-test-runner --config test/web-test-runner.config.js --group local --manual --open",
|
||||
"test-browser": "web-test-runner --config test/web-test-runner.config.js --group local --playwright --browsers chromium firefox webkit",
|
||||
"test-browser:ci": "web-test-runner --config test/web-test-runner.config.js --group headless:ci",
|
||||
"test-browserstack": "web-test-runner --config test/web-test-runner.browserstack.config.js",
|
||||
"coverage": "c8 npm test",
|
||||
"lint": "eslint .",
|
||||
"docs": "jsdoc --configure .jsdocrc.cjs --destination docs --recurse README.md src && printf '%s' 'docs.openpgpjs.org' > docs/CNAME",
|
||||
"preversion": "rm -rf dist docs node_modules && npm ci && npm test",
|
||||
"version": "npm run docs && git add -A docs",
|
||||
"postversion": "git push && git push --tags && npm publish"
|
||||
"postversion": "git push --follow-tags && npm publish"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@openpgp/asmcrypto.js": "^3.0.0",
|
||||
"@openpgp/noble-curves": "^1.2.1-0",
|
||||
"@noble/ciphers": "^1.2.1",
|
||||
"@noble/curves": "^1.8.1",
|
||||
"@noble/hashes": "^1.5.0",
|
||||
"@openpgp/jsdoc": "^3.6.11",
|
||||
"@openpgp/noble-hashes": "^1.3.3-0",
|
||||
"@openpgp/seek-bzip": "^1.0.5-git",
|
||||
"@openpgp/tweetnacl": "^1.0.4-1",
|
||||
"@openpgp/web-stream-tools": "^0.0.14",
|
||||
"@rollup/plugin-alias": "^5.0.0",
|
||||
"@rollup/plugin-commonjs": "^24.0.1",
|
||||
"@rollup/plugin-node-resolve": "^15.0.1",
|
||||
"@rollup/plugin-replace": "^5.0.2",
|
||||
"@rollup/plugin-terser": "^0.4.0",
|
||||
"@rollup/plugin-wasm": "^6.1.2",
|
||||
"@types/chai": "^4.2.14",
|
||||
"@openpgp/web-stream-tools": "~0.1.3",
|
||||
"@rollup/plugin-alias": "^5.1.1",
|
||||
"@rollup/plugin-commonjs": "^25.0.8",
|
||||
"@rollup/plugin-node-resolve": "^15.3.0",
|
||||
"@rollup/plugin-replace": "^5.0.7",
|
||||
"@rollup/plugin-terser": "^0.4.4",
|
||||
"@rollup/plugin-typescript": "^11.1.6",
|
||||
"@rollup/plugin-wasm": "^6.2.2",
|
||||
"@types/chai": "^4.3.19",
|
||||
"@types/sinon": "^17.0.3",
|
||||
"@typescript-eslint/parser": "^7.18.0",
|
||||
"@web/test-runner": "^0.19.0",
|
||||
"@web/test-runner-browserstack": "^0.7.2",
|
||||
"@web/test-runner-mocha": "^0.9.0",
|
||||
"@web/test-runner-playwright": "^0.11.0",
|
||||
"argon2id": "^1.0.1",
|
||||
"benchmark": "^2.1.4",
|
||||
"bn.js": "^4.11.8",
|
||||
"chai": "^4.3.7",
|
||||
"chai-as-promised": "^7.1.1",
|
||||
"eslint": "^8.34.0",
|
||||
"bn.js": "^5.2.1",
|
||||
"c8": "^8.0.1",
|
||||
"chai": "^4.4.1",
|
||||
"chai-as-promised": "^7.1.2",
|
||||
"eckey-utils": "^0.7.14",
|
||||
"eslint": "^8.57.1",
|
||||
"eslint-config-airbnb": "^19.0.4",
|
||||
"eslint-config-airbnb-base": "^15.0.0",
|
||||
"eslint-plugin-chai-friendly": "^0.7.2",
|
||||
"eslint-plugin-import": "^2.27.5",
|
||||
"eslint-config-airbnb-typescript": "^18.0.0",
|
||||
"eslint-import-resolver-typescript": "^3.6.3",
|
||||
"eslint-plugin-chai-friendly": "^0.7.4",
|
||||
"eslint-plugin-import": "^2.31.0",
|
||||
"eslint-plugin-unicorn": "^48.0.1",
|
||||
"fflate": "^0.7.4",
|
||||
"http-server": "^14.1.1",
|
||||
"karma": "^6.4.0",
|
||||
"karma-browserstack-launcher": "^1.6.0",
|
||||
"karma-chrome-launcher": "^3.1.1",
|
||||
"karma-firefox-launcher": "^2.1.2",
|
||||
"karma-mocha": "^2.0.1",
|
||||
"karma-mocha-reporter": "^2.2.5",
|
||||
"karma-webkit-launcher": "^2.1.0",
|
||||
"mocha": "^10.2.0",
|
||||
"nyc": "^14.1.1",
|
||||
"playwright": "^1.30.0",
|
||||
"rollup": "^3.29.4",
|
||||
"sinon": "^15.1.0",
|
||||
"ts-node": "^10.9.1",
|
||||
"typescript": "^4.1.2",
|
||||
"web-streams-polyfill": "^3.2.0"
|
||||
"fflate": "^0.8.2",
|
||||
"mocha": "^10.7.3",
|
||||
"playwright": "^1.51.1",
|
||||
"rollup": "^4.24.2",
|
||||
"sinon": "^18.0.1",
|
||||
"ts-node": "^10.9.2",
|
||||
"tslib": "^2.8.0",
|
||||
"tsx": "^4.19.2",
|
||||
"typescript": "^5.6.3",
|
||||
"web-streams-polyfill": "^4.0.0"
|
||||
},
|
||||
"dependencies": {
|
||||
"asn1.js": "^5.0.0"
|
||||
"overrides": {
|
||||
"@web/dev-server-core": "npm:@openpgp/wtr-dev-server-core@0.7.3-patch.1",
|
||||
"@web/test-runner-core": "npm:@openpgp/wtr-test-runner-core@0.13.4-patch.0"
|
||||
},
|
||||
"repository": {
|
||||
"type": "git",
|
||||
|
226
rollup.config.js
226
rollup.config.js
@ -9,12 +9,13 @@ import commonjs from '@rollup/plugin-commonjs';
|
||||
import replace from '@rollup/plugin-replace';
|
||||
import terser from '@rollup/plugin-terser';
|
||||
import { wasm } from '@rollup/plugin-wasm';
|
||||
import typescript from '@rollup/plugin-typescript';
|
||||
|
||||
// ESlint does not support JSON module imports yet, see https://github.com/eslint/eslint/discussions/15305
|
||||
// import pkg from './package.json' assert { type: 'json' };
|
||||
const pkg = JSON.parse(readFileSync('./package.json'));
|
||||
|
||||
const nodeDependencies = Object.keys(pkg.dependencies);
|
||||
const nodeDependencies = Object.keys(pkg.dependencies || {});
|
||||
const nodeBuiltinModules = builtinModules.concat(['module']);
|
||||
|
||||
const wasmOptions = {
|
||||
@ -22,13 +23,20 @@ const wasmOptions = {
|
||||
browser: { targetEnv: 'browser', maxFileSize: undefined } // always inlline (our wasm files are small)
|
||||
};
|
||||
|
||||
const getChunkFileName = (chunkInfo, extension) => {
|
||||
// index files result in chunks named simply 'index', so we rename them to include the package name
|
||||
if (chunkInfo.name === 'index') {
|
||||
const packageName = chunkInfo.facadeModuleId.split('/').at(-2); // assume index file is under the root folder
|
||||
return `${packageName}.${extension}`;
|
||||
const getChunkFileName = (chunkInfo, extension) => `[name].${extension}`;
|
||||
|
||||
/**
|
||||
* Dynamically imported modules which expose an index file as entrypoint end up with a chunk named `index`
|
||||
* by default. We want to preserve the module name instead.
|
||||
*/
|
||||
const setManualChunkName = chunkId => {
|
||||
if (chunkId.includes('seek-bzip')) {
|
||||
return 'seek-bzip';
|
||||
} else if (chunkId.includes('argon2id')) {
|
||||
return 'argon2id';
|
||||
} else {
|
||||
return undefined;
|
||||
}
|
||||
return `[name].${extension}`;
|
||||
};
|
||||
|
||||
const banner =
|
||||
@ -49,98 +57,120 @@ const terserOptions = {
|
||||
}
|
||||
};
|
||||
|
||||
const nodeBuild = {
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ file: 'dist/node/openpgp.cjs', format: 'cjs', name: pkg.name, banner, intro },
|
||||
{ file: 'dist/node/openpgp.min.cjs', format: 'cjs', name: pkg.name, banner, intro, plugins: [terser(terserOptions)], sourcemap: true },
|
||||
{ file: 'dist/node/openpgp.mjs', format: 'es', banner, intro },
|
||||
{ file: 'dist/node/openpgp.min.mjs', format: 'es', banner, intro, plugins: [terser(terserOptions)], sourcemap: true }
|
||||
].map(options => ({ ...options, inlineDynamicImports: true })),
|
||||
plugins: [
|
||||
resolve({
|
||||
exportConditions: ['node'] // needed for resolution of noble-curves import of '@noble/crypto' in Node 18
|
||||
}),
|
||||
typescript({
|
||||
compilerOptions: { outDir: './dist/tmp-ts' }
|
||||
}),
|
||||
commonjs(),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`
|
||||
}),
|
||||
wasm(wasmOptions.node)
|
||||
]
|
||||
};
|
||||
|
||||
const fullBrowserBuild = {
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ file: 'dist/openpgp.js', format: 'iife', name: pkg.name, banner, intro },
|
||||
{ file: 'dist/openpgp.min.js', format: 'iife', name: pkg.name, banner, intro, plugins: [terser(terserOptions)], sourcemap: true },
|
||||
{ file: 'dist/openpgp.mjs', format: 'es', banner, intro },
|
||||
{ file: 'dist/openpgp.min.mjs', format: 'es', banner, intro, plugins: [terser(terserOptions)], sourcemap: true }
|
||||
].map(options => ({ ...options, inlineDynamicImports: true })),
|
||||
plugins: [
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
typescript({
|
||||
compilerOptions: { outDir: './dist/tmp-ts' } // to avoid js files being overwritten
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies)
|
||||
}),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
};
|
||||
|
||||
const lightweightBrowserBuild = {
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ entryFileNames: 'openpgp.mjs', chunkFileNames: chunkInfo => getChunkFileName(chunkInfo, 'mjs') },
|
||||
{ entryFileNames: 'openpgp.min.mjs', chunkFileNames: chunkInfo => getChunkFileName(chunkInfo, 'min.mjs'), plugins: [terser(terserOptions)], sourcemap: true }
|
||||
].map(options => ({ ...options, dir: 'dist/lightweight', manualChunks: setManualChunkName, format: 'es', banner, intro })),
|
||||
preserveEntrySignatures: 'exports-only',
|
||||
plugins: [
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
typescript({
|
||||
compilerOptions: { outDir: './dist/lightweight/tmp-ts' }
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies)
|
||||
}),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
};
|
||||
|
||||
const testBuild = {
|
||||
input: 'test/unittests.js',
|
||||
output: [
|
||||
{ file: 'test/lib/unittests-bundle.js', format: 'es', intro, sourcemap: true, inlineDynamicImports: true }
|
||||
],
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
plugins: [
|
||||
alias({
|
||||
entries: {
|
||||
openpgp: `./dist/${process.env.npm_config_lightweight ? 'lightweight/' : ''}openpgp.mjs`
|
||||
}
|
||||
}),
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
typescript({
|
||||
compilerOptions: { outDir: './test/lib/tmp-ts' }
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies),
|
||||
requireReturnsDefault: 'preferred'
|
||||
}),
|
||||
replace({
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
};
|
||||
|
||||
export default Object.assign([
|
||||
{
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ file: 'dist/openpgp.js', format: 'iife', name: pkg.name, banner, intro },
|
||||
{ file: 'dist/openpgp.min.js', format: 'iife', name: pkg.name, banner, intro, plugins: [terser(terserOptions)], sourcemap: true },
|
||||
{ file: 'dist/openpgp.mjs', format: 'es', banner, intro },
|
||||
{ file: 'dist/openpgp.min.mjs', format: 'es', banner, intro, plugins: [terser(terserOptions)], sourcemap: true }
|
||||
].map(options => ({ ...options, inlineDynamicImports: true })),
|
||||
plugins: [
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies)
|
||||
}),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
},
|
||||
{
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ file: 'dist/node/openpgp.cjs', format: 'cjs', name: pkg.name, banner, intro },
|
||||
{ file: 'dist/node/openpgp.min.cjs', format: 'cjs', name: pkg.name, banner, intro, plugins: [terser(terserOptions)], sourcemap: true },
|
||||
{ file: 'dist/node/openpgp.mjs', format: 'es', banner, intro },
|
||||
{ file: 'dist/node/openpgp.min.mjs', format: 'es', banner, intro, plugins: [terser(terserOptions)], sourcemap: true }
|
||||
].map(options => ({ ...options, inlineDynamicImports: true })),
|
||||
plugins: [
|
||||
resolve(),
|
||||
commonjs(),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`
|
||||
}),
|
||||
wasm(wasmOptions.node)
|
||||
]
|
||||
},
|
||||
{
|
||||
input: 'src/index.js',
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
output: [
|
||||
{ dir: 'dist/lightweight', entryFileNames: 'openpgp.mjs', chunkFileNames: chunkInfo => getChunkFileName(chunkInfo, 'mjs'), format: 'es', banner, intro },
|
||||
{ dir: 'dist/lightweight', entryFileNames: 'openpgp.min.mjs', chunkFileNames: chunkInfo => getChunkFileName(chunkInfo, 'min.mjs'), format: 'es', banner, intro, plugins: [terser(terserOptions)], sourcemap: true }
|
||||
],
|
||||
preserveEntrySignatures: 'exports-only',
|
||||
plugins: [
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies)
|
||||
}),
|
||||
replace({
|
||||
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
},
|
||||
{
|
||||
input: 'test/unittests.js',
|
||||
output: [
|
||||
{ file: 'test/lib/unittests-bundle.js', format: 'es', intro, sourcemap: true, inlineDynamicImports: true }
|
||||
],
|
||||
external: nodeBuiltinModules.concat(nodeDependencies),
|
||||
plugins: [
|
||||
alias({
|
||||
entries: {
|
||||
openpgp: `./dist/${process.env.npm_config_lightweight ? 'lightweight/' : ''}openpgp.mjs`
|
||||
}
|
||||
}),
|
||||
resolve({
|
||||
browser: true
|
||||
}),
|
||||
commonjs({
|
||||
ignore: nodeBuiltinModules.concat(nodeDependencies),
|
||||
requireReturnsDefault: 'preferred'
|
||||
}),
|
||||
replace({
|
||||
"import { createRequire } from 'module';": 'const createRequire = () => () => {}',
|
||||
delimiters: ['', '']
|
||||
}),
|
||||
wasm(wasmOptions.browser)
|
||||
]
|
||||
}
|
||||
nodeBuild,
|
||||
fullBrowserBuild,
|
||||
lightweightBrowserBuild,
|
||||
testBuild
|
||||
].filter(config => {
|
||||
config.output = config.output.filter(output => {
|
||||
return (output.file || output.dir + '/' + output.entryFileNames).includes(
|
||||
|
@ -1,20 +0,0 @@
|
||||
/**
|
||||
* We don't use the BigIntegerInterface wrapper from noble-hashes because:
|
||||
* - importing the instance results in it being shared with noble-hashes, which separately calls `setImplementation()`
|
||||
* on load, causing it to throw due to duplicate initialization.
|
||||
* - even duplicating the interface code here to keep a separate instance requires handing a race-conditions the first time
|
||||
* `getBigInteger` is called, when the code needs to check if the implementation is set, and initialize it if not.
|
||||
* Ultimately, the interface provides no advantages and it's only needed because of TS.
|
||||
*/
|
||||
const detectBigInt = () => typeof BigInt !== 'undefined';
|
||||
export async function getBigInteger() {
|
||||
if (detectBigInt()) {
|
||||
// NativeBigInteger is small, so it's imported in isolation (it could also be imported at the top level)
|
||||
const { default: NativeBigInteger } = await import('@openpgp/noble-hashes/esm/biginteger/native.interface');
|
||||
return NativeBigInteger;
|
||||
} else {
|
||||
// FallbackBigInteger relies on large BN.js lib, which is also used by noble-hashes and noble-curves
|
||||
const { default: FallbackBigInteger } = await import('@openpgp/noble-hashes/esm/biginteger/bn.interface');
|
||||
return FallbackBigInteger;
|
||||
}
|
||||
}
|
@ -59,20 +59,22 @@ export class CleartextMessage {
|
||||
|
||||
/**
|
||||
* Sign the cleartext message
|
||||
* @param {Array<Key>} privateKeys - private keys with decrypted secret key data for signing
|
||||
* @param {Array<Key>} signingKeys - private keys with decrypted secret key data for signing
|
||||
* @param {Array<Key>} recipientKeys - recipient keys to get the signing preferences from
|
||||
* @param {Signature} [signature] - Any existing detached signature
|
||||
* @param {Array<module:type/keyid~KeyID>} [signingKeyIDs] - Array of key IDs to use for signing. Each signingKeyIDs[i] corresponds to privateKeys[i]
|
||||
* @param {Date} [date] - The creation time of the signature that should be created
|
||||
* @param {Array} [userIDs] - User IDs to sign with, e.g. [{ name:'Steve Sender', email:'steve@openpgp.org' }]
|
||||
* @param {Array} [signingKeyIDs] - User IDs to sign with, e.g. [{ name:'Steve Sender', email:'steve@openpgp.org' }]
|
||||
* @param {Array} [recipientUserIDs] - User IDs associated with `recipientKeys` to get the signing preferences from
|
||||
* @param {Array} [notations] - Notation Data to add to the signatures, e.g. [{ name: 'test@example.org', value: new TextEncoder().encode('test'), humanReadable: true, critical: false }]
|
||||
* @param {Object} [config] - Full configuration, defaults to openpgp.config
|
||||
* @returns {Promise<CleartextMessage>} New cleartext message with signed content.
|
||||
* @async
|
||||
*/
|
||||
async sign(privateKeys, signature = null, signingKeyIDs = [], date = new Date(), userIDs = [], notations = [], config = defaultConfig) {
|
||||
async sign(signingKeys, recipientKeys = [], signature = null, signingKeyIDs = [], date = new Date(), signingUserIDs = [], recipientUserIDs = [], notations = [], config = defaultConfig) {
|
||||
const literalDataPacket = new LiteralDataPacket();
|
||||
literalDataPacket.setText(this.text);
|
||||
const newSignature = new Signature(await createSignaturePackets(literalDataPacket, privateKeys, signature, signingKeyIDs, date, userIDs, notations, true, config));
|
||||
const newSignature = new Signature(await createSignaturePackets(literalDataPacket, signingKeys, recipientKeys, signature, signingKeyIDs, date, signingUserIDs, recipientUserIDs, notations, true, config));
|
||||
return new CleartextMessage(this.text, newSignature);
|
||||
}
|
||||
|
||||
@ -111,9 +113,9 @@ export class CleartextMessage {
|
||||
* @returns {String | ReadableStream<String>} ASCII armor.
|
||||
*/
|
||||
armor(config = defaultConfig) {
|
||||
// emit header if one of the signatures has a version not 6
|
||||
const emitHeader = this.signature.packets.some(packet => packet.version !== 6);
|
||||
const hash = emitHeader ?
|
||||
// emit header and checksum if one of the signatures has a version not 6
|
||||
const emitHeaderAndChecksum = this.signature.packets.some(packet => packet.version !== 6);
|
||||
const hash = emitHeaderAndChecksum ?
|
||||
Array.from(new Set(this.signature.packets.map(
|
||||
packet => enums.read(enums.hash, packet.hashAlgorithm).toUpperCase()
|
||||
))).join() :
|
||||
@ -124,7 +126,9 @@ export class CleartextMessage {
|
||||
text: this.text,
|
||||
data: this.signature.packets.write()
|
||||
};
|
||||
return armor(enums.armor.signed, body, undefined, undefined, undefined, config);
|
||||
|
||||
// An ASCII-armored sequence of Signature packets that only includes v6 Signature packets MUST NOT contain a CRC24 footer.
|
||||
return armor(enums.armor.signed, body, undefined, undefined, undefined, emitHeaderAndChecksum, config);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -26,7 +26,7 @@ export default {
|
||||
* @memberof module:config
|
||||
* @property {Integer} preferredHashAlgorithm Default hash algorithm {@link module:enums.hash}
|
||||
*/
|
||||
preferredHashAlgorithm: enums.hash.sha256,
|
||||
preferredHashAlgorithm: enums.hash.sha512,
|
||||
/**
|
||||
* @memberof module:config
|
||||
* @property {Integer} preferredSymmetricAlgorithm Default encryption cipher {@link module:enums.symmetric}
|
||||
@ -37,11 +37,6 @@ export default {
|
||||
* @property {Integer} compression Default compression algorithm {@link module:enums.compression}
|
||||
*/
|
||||
preferredCompressionAlgorithm: enums.compression.uncompressed,
|
||||
/**
|
||||
* @memberof module:config
|
||||
* @property {Integer} deflateLevel Default zip/zlib compression level, between 1 and 9
|
||||
*/
|
||||
deflateLevel: 6,
|
||||
/**
|
||||
* Use Authenticated Encryption with Additional Data (AEAD) protection for symmetric encryption.
|
||||
* This option is applicable to:
|
||||
@ -55,6 +50,14 @@ export default {
|
||||
* @property {Boolean} aeadProtect
|
||||
*/
|
||||
aeadProtect: false,
|
||||
/**
|
||||
* When reading OpenPGP v4 private keys (e.g. those generated in OpenPGP.js when not setting `config.v5Keys = true`)
|
||||
* which were encrypted by OpenPGP.js v5 (or older) using `config.aeadProtect = true`,
|
||||
* this option must be set, otherwise key parsing and/or key decryption will fail.
|
||||
* Note: only set this flag if you know that the keys are of the legacy type, as non-legacy keys
|
||||
* will be processed incorrectly.
|
||||
*/
|
||||
parseAEADEncryptedV4KeysAsLegacy: false,
|
||||
/**
|
||||
* Default Authenticated Encryption with Additional Data (AEAD) encryption mode
|
||||
* Only has an effect when aeadProtect is set to true.
|
||||
@ -78,6 +81,14 @@ export default {
|
||||
* @property {Boolean} v6Keys
|
||||
*/
|
||||
v6Keys: false,
|
||||
/**
|
||||
* Enable parsing v5 keys and v5 signatures (which is different from the AEAD-encrypted SEIPDv2 packet).
|
||||
* These are non-standard entities, which in the crypto-refresh have been superseded
|
||||
* by v6 keys and v6 signatures, respectively.
|
||||
* However, generation of v5 entities was supported behind config flag in OpenPGP.js v5, and some other libraries,
|
||||
* hence parsing them might be necessary in some cases.
|
||||
*/
|
||||
enableParsingV5Entities: false,
|
||||
/**
|
||||
* S2K (String to Key) type, used for key derivation in the context of secret key encryption
|
||||
* and password-encrypted data. Weaker s2k options are not allowed.
|
||||
@ -152,11 +163,6 @@ export default {
|
||||
* @property {Boolean} passwordCollisionCheck
|
||||
*/
|
||||
passwordCollisionCheck: false,
|
||||
/**
|
||||
* @memberof module:config
|
||||
* @property {Boolean} revocationsExpire If true, expired revocation signatures are ignored
|
||||
*/
|
||||
revocationsExpire: false,
|
||||
/**
|
||||
* Allow decryption using RSA keys without `encrypt` flag.
|
||||
* This setting is potentially insecure, but it is needed to get around an old openpgpjs bug
|
||||
@ -252,6 +258,14 @@ export default {
|
||||
* @property {Array} knownNotations
|
||||
*/
|
||||
knownNotations: [],
|
||||
/**
|
||||
* If true, a salt notation is used to randomize signatures generated by v4 and v5 keys (v6 signatures are always non-deterministic, by design).
|
||||
* This protects EdDSA signatures from potentially leaking the secret key in case of faults (i.e. bitflips) which, in principle, could occur
|
||||
* during the signing computation. It is added to signatures of any algo for simplicity, and as it may also serve as protection in case of
|
||||
* weaknesses in the hash algo, potentially hindering e.g. some chosen-prefix attacks.
|
||||
* NOTE: the notation is interoperable, but will reveal that the signature has been generated using OpenPGP.js, which may not be desirable in some cases.
|
||||
*/
|
||||
nonDeterministicSignaturesViaNotation: true,
|
||||
/**
|
||||
* Whether to use the the noble-curves library for curves (other than Curve25519) that are not supported by the available native crypto API.
|
||||
* When false, certain standard curves will not be supported (depending on the platform).
|
||||
|
@ -21,126 +21,77 @@
|
||||
* @module crypto/aes_kw
|
||||
*/
|
||||
|
||||
import * as cipher from './cipher';
|
||||
import { aeskw as nobleAesKW } from '@noble/ciphers/aes';
|
||||
import { getCipherParams } from './cipher';
|
||||
import util from '../util';
|
||||
|
||||
const webCrypto = util.getWebCrypto();
|
||||
/**
|
||||
* AES key wrap
|
||||
* @function
|
||||
* @param {Uint8Array} key
|
||||
* @param {Uint8Array} data
|
||||
* @returns {Uint8Array}
|
||||
* @param {enums.symmetric.aes128|enums.symmetric.aes256|enums.symmetric.aes192} algo - AES algo
|
||||
* @param {Uint8Array} key - wrapping key
|
||||
* @param {Uint8Array} dataToWrap
|
||||
* @returns {Uint8Array} wrapped key
|
||||
*/
|
||||
export function wrap(key, data) {
|
||||
const aes = new cipher['aes' + (key.length * 8)](key);
|
||||
const IV = new Uint32Array([0xA6A6A6A6, 0xA6A6A6A6]);
|
||||
const P = unpack(data);
|
||||
let A = IV;
|
||||
const R = P;
|
||||
const n = P.length / 2;
|
||||
const t = new Uint32Array([0, 0]);
|
||||
let B = new Uint32Array(4);
|
||||
for (let j = 0; j <= 5; ++j) {
|
||||
for (let i = 0; i < n; ++i) {
|
||||
t[1] = n * j + (1 + i);
|
||||
// B = A
|
||||
B[0] = A[0];
|
||||
B[1] = A[1];
|
||||
// B = A || R[i]
|
||||
B[2] = R[2 * i];
|
||||
B[3] = R[2 * i + 1];
|
||||
// B = AES(K, B)
|
||||
B = unpack(aes.encrypt(pack(B)));
|
||||
// A = MSB(64, B) ^ t
|
||||
A = B.subarray(0, 2);
|
||||
A[0] ^= t[0];
|
||||
A[1] ^= t[1];
|
||||
// R[i] = LSB(64, B)
|
||||
R[2 * i] = B[2];
|
||||
R[2 * i + 1] = B[3];
|
||||
}
|
||||
export async function wrap(algo, key, dataToWrap) {
|
||||
const { keySize } = getCipherParams(algo);
|
||||
// sanity checks, since WebCrypto does not use the `algo` input
|
||||
if (!util.isAES(algo) || key.length !== keySize) {
|
||||
throw new Error('Unexpected algorithm or key size');
|
||||
}
|
||||
return pack(A, R);
|
||||
|
||||
try {
|
||||
const wrappingKey = await webCrypto.importKey('raw', key, { name: 'AES-KW' }, false, ['wrapKey']);
|
||||
// Import data as HMAC key, as it has no key length requirements
|
||||
const keyToWrap = await webCrypto.importKey('raw', dataToWrap, { name: 'HMAC', hash: 'SHA-256' }, true, ['sign']);
|
||||
const wrapped = await webCrypto.wrapKey('raw', keyToWrap, wrappingKey, { name: 'AES-KW' });
|
||||
return new Uint8Array(wrapped);
|
||||
} catch (err) {
|
||||
// no 192 bit support in Chromium, which throws `OperationError`, see: https://www.chromium.org/blink/webcrypto#TOC-AES-support
|
||||
if (err.name !== 'NotSupportedError' &&
|
||||
!(key.length === 24 && err.name === 'OperationError')) {
|
||||
throw err;
|
||||
}
|
||||
util.printDebugError('Browser did not support operation: ' + err.message);
|
||||
}
|
||||
|
||||
return nobleAesKW(key).encrypt(dataToWrap);
|
||||
}
|
||||
|
||||
/**
|
||||
* AES key unwrap
|
||||
* @function
|
||||
* @param {String} key
|
||||
* @param {String} data
|
||||
* @returns {Uint8Array}
|
||||
* @throws {Error}
|
||||
* @param {enums.symmetric.aes128|enums.symmetric.aes256|enums.symmetric.aes192} algo - AES algo
|
||||
* @param {Uint8Array} key - wrapping key
|
||||
* @param {Uint8Array} wrappedData
|
||||
* @returns {Uint8Array} unwrapped data
|
||||
*/
|
||||
export function unwrap(key, data) {
|
||||
const aes = new cipher['aes' + (key.length * 8)](key);
|
||||
const IV = new Uint32Array([0xA6A6A6A6, 0xA6A6A6A6]);
|
||||
const C = unpack(data);
|
||||
let A = C.subarray(0, 2);
|
||||
const R = C.subarray(2);
|
||||
const n = C.length / 2 - 1;
|
||||
const t = new Uint32Array([0, 0]);
|
||||
let B = new Uint32Array(4);
|
||||
for (let j = 5; j >= 0; --j) {
|
||||
for (let i = n - 1; i >= 0; --i) {
|
||||
t[1] = n * j + (i + 1);
|
||||
// B = A ^ t
|
||||
B[0] = A[0] ^ t[0];
|
||||
B[1] = A[1] ^ t[1];
|
||||
// B = (A ^ t) || R[i]
|
||||
B[2] = R[2 * i];
|
||||
B[3] = R[2 * i + 1];
|
||||
// B = AES-1(B)
|
||||
B = unpack(aes.decrypt(pack(B)));
|
||||
// A = MSB(64, B)
|
||||
A = B.subarray(0, 2);
|
||||
// R[i] = LSB(64, B)
|
||||
R[2 * i] = B[2];
|
||||
R[2 * i + 1] = B[3];
|
||||
}
|
||||
export async function unwrap(algo, key, wrappedData) {
|
||||
const { keySize } = getCipherParams(algo);
|
||||
// sanity checks, since WebCrypto does not use the `algo` input
|
||||
if (!util.isAES(algo) || key.length !== keySize) {
|
||||
throw new Error('Unexpected algorithm or key size');
|
||||
}
|
||||
if (A[0] === IV[0] && A[1] === IV[1]) {
|
||||
return pack(R);
|
||||
}
|
||||
throw new Error('Key Data Integrity failed');
|
||||
}
|
||||
|
||||
function createArrayBuffer(data) {
|
||||
if (util.isString(data)) {
|
||||
const { length } = data;
|
||||
const buffer = new ArrayBuffer(length);
|
||||
const view = new Uint8Array(buffer);
|
||||
for (let j = 0; j < length; ++j) {
|
||||
view[j] = data.charCodeAt(j);
|
||||
let wrappingKey;
|
||||
try {
|
||||
wrappingKey = await webCrypto.importKey('raw', key, { name: 'AES-KW' }, false, ['unwrapKey']);
|
||||
} catch (err) {
|
||||
// no 192 bit support in Chromium, which throws `OperationError`, see: https://www.chromium.org/blink/webcrypto#TOC-AES-support
|
||||
if (err.name !== 'NotSupportedError' &&
|
||||
!(key.length === 24 && err.name === 'OperationError')) {
|
||||
throw err;
|
||||
}
|
||||
return buffer;
|
||||
util.printDebugError('Browser did not support operation: ' + err.message);
|
||||
return nobleAesKW(key).decrypt(wrappedData);
|
||||
}
|
||||
return new Uint8Array(data).buffer;
|
||||
}
|
||||
|
||||
function unpack(data) {
|
||||
const { length } = data;
|
||||
const buffer = createArrayBuffer(data);
|
||||
const view = new DataView(buffer);
|
||||
const arr = new Uint32Array(length / 4);
|
||||
for (let i = 0; i < length / 4; ++i) {
|
||||
arr[i] = view.getUint32(4 * i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
|
||||
function pack() {
|
||||
let length = 0;
|
||||
for (let k = 0; k < arguments.length; ++k) {
|
||||
length += 4 * arguments[k].length;
|
||||
}
|
||||
const buffer = new ArrayBuffer(length);
|
||||
const view = new DataView(buffer);
|
||||
let offset = 0;
|
||||
for (let i = 0; i < arguments.length; ++i) {
|
||||
for (let j = 0; j < arguments[i].length; ++j) {
|
||||
view.setUint32(offset + 4 * j, arguments[i][j]);
|
||||
try {
|
||||
const unwrapped = await webCrypto.unwrapKey('raw', wrappedData, wrappingKey, { name: 'AES-KW' }, { name: 'HMAC', hash: 'SHA-256' }, true, ['sign']);
|
||||
return new Uint8Array(await webCrypto.exportKey('raw', unwrapped));
|
||||
} catch (err) {
|
||||
if (err.name === 'OperationError') {
|
||||
throw new Error('Key Data Integrity failed');
|
||||
}
|
||||
offset += 4 * arguments[i].length;
|
||||
throw err;
|
||||
}
|
||||
return new Uint8Array(buffer);
|
||||
}
|
||||
|
216
src/crypto/biginteger.ts
Normal file
216
src/crypto/biginteger.ts
Normal file
@ -0,0 +1,216 @@
|
||||
// Operations are not constant time, but we try and limit timing leakage where we can
|
||||
|
||||
const _0n = BigInt(0);
|
||||
const _1n = BigInt(1);
|
||||
|
||||
export function uint8ArrayToBigInt(bytes: Uint8Array) {
|
||||
const hexAlphabet = '0123456789ABCDEF';
|
||||
let s = '';
|
||||
bytes.forEach(v => {
|
||||
s += hexAlphabet[v >> 4] + hexAlphabet[v & 15];
|
||||
});
|
||||
return BigInt('0x0' + s);
|
||||
}
|
||||
|
||||
export function mod(a: bigint, m: bigint) {
|
||||
const reduced = a % m;
|
||||
return reduced < _0n ? reduced + m : reduced;
|
||||
}
|
||||
|
||||
/**
|
||||
* Compute modular exponentiation using square and multiply
|
||||
* @param {BigInt} a - Base
|
||||
* @param {BigInt} e - Exponent
|
||||
* @param {BigInt} n - Modulo
|
||||
* @returns {BigInt} b ** e mod n.
|
||||
*/
|
||||
export function modExp(b: bigint, e: bigint, n: bigint) {
|
||||
if (n === _0n) throw Error('Modulo cannot be zero');
|
||||
if (n === _1n) return BigInt(0);
|
||||
if (e < _0n) throw Error('Unsopported negative exponent');
|
||||
|
||||
let exp = e;
|
||||
let x = b;
|
||||
|
||||
x %= n;
|
||||
let r = BigInt(1);
|
||||
while (exp > _0n) {
|
||||
const lsb = exp & _1n;
|
||||
exp >>= _1n; // e / 2
|
||||
// Always compute multiplication step, to reduce timing leakage
|
||||
const rx = (r * x) % n;
|
||||
// Update r only if lsb is 1 (odd exponent)
|
||||
r = lsb ? rx : r;
|
||||
x = (x * x) % n; // Square
|
||||
}
|
||||
return r;
|
||||
}
|
||||
|
||||
|
||||
function abs(x: bigint) {
|
||||
return x >= _0n ? x : -x;
|
||||
}
|
||||
|
||||
/**
|
||||
* Extended Eucleadian algorithm (http://anh.cs.luc.edu/331/notes/xgcd.pdf)
|
||||
* Given a and b, compute (x, y) such that ax + by = gdc(a, b).
|
||||
* Negative numbers are also supported.
|
||||
* @param {BigInt} a - First operand
|
||||
* @param {BigInt} b - Second operand
|
||||
* @returns {{ gcd, x, y: bigint }}
|
||||
*/
|
||||
function _egcd(aInput: bigint, bInput: bigint) {
|
||||
let x = BigInt(0);
|
||||
let y = BigInt(1);
|
||||
let xPrev = BigInt(1);
|
||||
let yPrev = BigInt(0);
|
||||
|
||||
// Deal with negative numbers: run algo over absolute values,
|
||||
// and "move" the sign to the returned x and/or y.
|
||||
// See https://math.stackexchange.com/questions/37806/extended-euclidean-algorithm-with-negative-numbers
|
||||
let a = abs(aInput);
|
||||
let b = abs(bInput);
|
||||
const aNegated = aInput < _0n;
|
||||
const bNegated = bInput < _0n;
|
||||
|
||||
while (b !== _0n) {
|
||||
const q = a / b;
|
||||
let tmp = x;
|
||||
x = xPrev - q * x;
|
||||
xPrev = tmp;
|
||||
|
||||
tmp = y;
|
||||
y = yPrev - q * y;
|
||||
yPrev = tmp;
|
||||
|
||||
tmp = b;
|
||||
b = a % b;
|
||||
a = tmp;
|
||||
}
|
||||
|
||||
return {
|
||||
x: aNegated ? -xPrev : xPrev,
|
||||
y: bNegated ? -yPrev : yPrev,
|
||||
gcd: a
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Compute the inverse of `a` modulo `n`
|
||||
* Note: `a` and and `n` must be relatively prime
|
||||
* @param {BigInt} a
|
||||
* @param {BigInt} n - Modulo
|
||||
* @returns {BigInt} x such that a*x = 1 mod n
|
||||
* @throws {Error} if the inverse does not exist
|
||||
*/
|
||||
export function modInv(a: bigint, n: bigint) {
|
||||
const { gcd, x } = _egcd(a, n);
|
||||
if (gcd !== _1n) {
|
||||
throw new Error('Inverse does not exist');
|
||||
}
|
||||
return mod(x + n, n);
|
||||
}
|
||||
|
||||
/**
|
||||
* Compute greatest common divisor between this and n
|
||||
* @param {BigInt} aInput - Operand
|
||||
* @param {BigInt} bInput - Operand
|
||||
* @returns {BigInt} gcd
|
||||
*/
|
||||
export function gcd(aInput: bigint, bInput: bigint) {
|
||||
let a = aInput;
|
||||
let b = bInput;
|
||||
while (b !== _0n) {
|
||||
const tmp = b;
|
||||
b = a % b;
|
||||
a = tmp;
|
||||
}
|
||||
return a;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get this value as an exact Number (max 53 bits)
|
||||
* Fails if this value is too large
|
||||
* @returns {Number}
|
||||
*/
|
||||
export function bigIntToNumber(x: bigint) {
|
||||
const number = Number(x);
|
||||
if (number > Number.MAX_SAFE_INTEGER) {
|
||||
// We throw and error to conform with the bn.js implementation
|
||||
throw new Error('Number can only safely store up to 53 bits');
|
||||
}
|
||||
return number;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get value of i-th bit
|
||||
* @param {BigInt} x
|
||||
* @param {Number} i - Bit index
|
||||
* @returns {Number} Bit value.
|
||||
*/
|
||||
export function getBit(x:bigint, i: number) {
|
||||
const bit = (x >> BigInt(i)) & _1n;
|
||||
return bit === _0n ? 0 : 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* Compute bit length
|
||||
*/
|
||||
export function bitLength(x: bigint) {
|
||||
// -1n >> -1n is -1n
|
||||
// 1n >> 1n is 0n
|
||||
const target = x < _0n ? BigInt(-1) : _0n;
|
||||
let bitlen = 1;
|
||||
let tmp = x;
|
||||
// eslint-disable-next-line no-cond-assign
|
||||
while ((tmp >>= _1n) !== target) {
|
||||
bitlen++;
|
||||
}
|
||||
return bitlen;
|
||||
}
|
||||
|
||||
/**
|
||||
* Compute byte length
|
||||
*/
|
||||
export function byteLength(x: bigint) {
|
||||
const target = x < _0n ? BigInt(-1) : _0n;
|
||||
const _8n = BigInt(8);
|
||||
let len = 1;
|
||||
let tmp = x;
|
||||
// eslint-disable-next-line no-cond-assign
|
||||
while ((tmp >>= _8n) !== target) {
|
||||
len++;
|
||||
}
|
||||
return len;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get Uint8Array representation of this number
|
||||
* @param {String} endian - Endianess of output array (defaults to 'be')
|
||||
* @param {Number} length - Of output array
|
||||
* @returns {Uint8Array}
|
||||
*/
|
||||
export function bigIntToUint8Array(x: bigint, endian = 'be', length: number) {
|
||||
// we get and parse the hex string (https://coolaj86.com/articles/convert-js-bigints-to-typedarrays/)
|
||||
// this is faster than shift+mod iterations
|
||||
let hex = x.toString(16);
|
||||
if (hex.length % 2 === 1) {
|
||||
hex = '0' + hex;
|
||||
}
|
||||
|
||||
const rawLength = hex.length / 2;
|
||||
const bytes = new Uint8Array(length || rawLength);
|
||||
// parse hex
|
||||
const offset = length ? length - rawLength : 0;
|
||||
let i = 0;
|
||||
while (i < rawLength) {
|
||||
bytes[i + offset] = parseInt(hex.slice(2 * i, 2 * i + 2), 16);
|
||||
i++;
|
||||
}
|
||||
|
||||
if (endian !== 'be') {
|
||||
bytes.reverse();
|
||||
}
|
||||
|
||||
return bytes;
|
||||
}
|
@ -1,26 +0,0 @@
|
||||
import { AES_ECB } from '@openpgp/asmcrypto.js/aes/ecb.js';
|
||||
|
||||
/**
|
||||
* Javascript AES implementation.
|
||||
* This is used as fallback if the native Crypto APIs are not available.
|
||||
*/
|
||||
function aes(length) {
|
||||
const C = function(key) {
|
||||
const aesECB = new AES_ECB(key);
|
||||
|
||||
this.encrypt = function(block) {
|
||||
return aesECB.encrypt(block);
|
||||
};
|
||||
|
||||
this.decrypt = function(block) {
|
||||
return aesECB.decrypt(block);
|
||||
};
|
||||
};
|
||||
|
||||
C.blockSize = C.prototype.blockSize = 16;
|
||||
C.keySize = C.prototype.keySize = length / 8;
|
||||
|
||||
return C;
|
||||
}
|
||||
|
||||
export default aes;
|
@ -1,13 +0,0 @@
|
||||
import * as cipher from '.';
|
||||
import enums from '../../enums';
|
||||
|
||||
/**
|
||||
* Get implementation of the given cipher
|
||||
* @param {enums.symmetric} algo
|
||||
* @returns {Object}
|
||||
* @throws {Error} on invalid algo
|
||||
*/
|
||||
export default function getCipher(algo) {
|
||||
const algoName = enums.read(enums.symmetric, algo);
|
||||
return cipher[algoName];
|
||||
}
|
@ -1,80 +1,73 @@
|
||||
/**
|
||||
* @fileoverview Symmetric cryptography functions
|
||||
* @module crypto/cipher
|
||||
*/
|
||||
import enums from '../../enums';
|
||||
|
||||
import aes from './aes';
|
||||
import { DES, TripleDES } from './des';
|
||||
import CAST5 from './cast5';
|
||||
import TF from './twofish';
|
||||
import BF from './blowfish';
|
||||
export async function getLegacyCipher(algo) {
|
||||
switch (algo) {
|
||||
case enums.symmetric.aes128:
|
||||
case enums.symmetric.aes192:
|
||||
case enums.symmetric.aes256:
|
||||
throw new Error('Not a legacy cipher');
|
||||
case enums.symmetric.cast5:
|
||||
case enums.symmetric.blowfish:
|
||||
case enums.symmetric.twofish:
|
||||
case enums.symmetric.tripledes: {
|
||||
const { legacyCiphers } = await import('./legacy_ciphers');
|
||||
const algoName = enums.read(enums.symmetric, algo);
|
||||
const cipher = legacyCiphers.get(algoName);
|
||||
if (!cipher) {
|
||||
throw new Error('Unsupported cipher algorithm');
|
||||
}
|
||||
return cipher;
|
||||
}
|
||||
default:
|
||||
throw new Error('Unsupported cipher algorithm');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* AES-128 encryption and decryption (ID 7)
|
||||
* @function
|
||||
* @param {String} key - 128-bit key
|
||||
* @see {@link https://github.com/asmcrypto/asmcrypto.js|asmCrypto}
|
||||
* @see {@link https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf|NIST FIPS-197}
|
||||
* @returns {Object}
|
||||
* Get block size for given cipher algo
|
||||
* @param {module:enums.symmetric} algo - alrogithm identifier
|
||||
*/
|
||||
export const aes128 = aes(128);
|
||||
function getCipherBlockSize(algo) {
|
||||
switch (algo) {
|
||||
case enums.symmetric.aes128:
|
||||
case enums.symmetric.aes192:
|
||||
case enums.symmetric.aes256:
|
||||
case enums.symmetric.twofish:
|
||||
return 16;
|
||||
case enums.symmetric.blowfish:
|
||||
case enums.symmetric.cast5:
|
||||
case enums.symmetric.tripledes:
|
||||
return 8;
|
||||
default:
|
||||
throw new Error('Unsupported cipher');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* AES-128 Block Cipher (ID 8)
|
||||
* @function
|
||||
* @param {String} key - 192-bit key
|
||||
* @see {@link https://github.com/asmcrypto/asmcrypto.js|asmCrypto}
|
||||
* @see {@link https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf|NIST FIPS-197}
|
||||
* @returns {Object}
|
||||
* Get key size for given cipher algo
|
||||
* @param {module:enums.symmetric} algo - alrogithm identifier
|
||||
*/
|
||||
export const aes192 = aes(192);
|
||||
function getCipherKeySize(algo) {
|
||||
switch (algo) {
|
||||
case enums.symmetric.aes128:
|
||||
case enums.symmetric.blowfish:
|
||||
case enums.symmetric.cast5:
|
||||
return 16;
|
||||
case enums.symmetric.aes192:
|
||||
case enums.symmetric.tripledes:
|
||||
return 24;
|
||||
case enums.symmetric.aes256:
|
||||
case enums.symmetric.twofish:
|
||||
return 32;
|
||||
default:
|
||||
throw new Error('Unsupported cipher');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* AES-128 Block Cipher (ID 9)
|
||||
* @function
|
||||
* @param {String} key - 256-bit key
|
||||
* @see {@link https://github.com/asmcrypto/asmcrypto.js|asmCrypto}
|
||||
* @see {@link https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf|NIST FIPS-197}
|
||||
* @returns {Object}
|
||||
* Get block and key size for given cipher algo
|
||||
* @param {module:enums.symmetric} algo - alrogithm identifier
|
||||
*/
|
||||
export const aes256 = aes(256);
|
||||
// Not in OpenPGP specifications
|
||||
export const des = DES;
|
||||
/**
|
||||
* Triple DES Block Cipher (ID 2)
|
||||
* @function
|
||||
* @param {String} key - 192-bit key
|
||||
* @see {@link https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf|NIST SP 800-67}
|
||||
* @returns {Object}
|
||||
*/
|
||||
export const tripledes = TripleDES;
|
||||
/**
|
||||
* CAST-128 Block Cipher (ID 3)
|
||||
* @function
|
||||
* @param {String} key - 128-bit key
|
||||
* @see {@link https://tools.ietf.org/html/rfc2144|The CAST-128 Encryption Algorithm}
|
||||
* @returns {Object}
|
||||
*/
|
||||
export const cast5 = CAST5;
|
||||
/**
|
||||
* Twofish Block Cipher (ID 10)
|
||||
* @function
|
||||
* @param {String} key - 256-bit key
|
||||
* @see {@link https://tools.ietf.org/html/rfc4880#ref-TWOFISH|TWOFISH}
|
||||
* @returns {Object}
|
||||
*/
|
||||
export const twofish = TF;
|
||||
/**
|
||||
* Blowfish Block Cipher (ID 4)
|
||||
* @function
|
||||
* @param {String} key - 128-bit key
|
||||
* @see {@link https://tools.ietf.org/html/rfc4880#ref-BLOWFISH|BLOWFISH}
|
||||
* @returns {Object}
|
||||
*/
|
||||
export const blowfish = BF;
|
||||
/**
|
||||
* Not implemented
|
||||
* @function
|
||||
* @throws {Error}
|
||||
*/
|
||||
export const idea = function() {
|
||||
throw new Error('IDEA symmetric-key algorithm not implemented');
|
||||
};
|
||||
export function getCipherParams(algo) {
|
||||
return { keySize: getCipherKeySize(algo), blockSize: getCipherBlockSize(algo) };
|
||||
}
|
||||
|
18
src/crypto/cipher/legacy_ciphers.js
Normal file
18
src/crypto/cipher/legacy_ciphers.js
Normal file
@ -0,0 +1,18 @@
|
||||
/**
|
||||
* This file is needed to dynamic import the legacy ciphers.
|
||||
* Separate dynamic imports are not convenient as they result in multiple chunks.
|
||||
*/
|
||||
|
||||
import { TripleDES as tripledes } from './des';
|
||||
import cast5 from './cast5';
|
||||
import twofish from './twofish';
|
||||
import blowfish from './blowfish';
|
||||
|
||||
// We avoid importing 'enums' as this module is lazy loaded, and doing so could mess up
|
||||
// chunking for the lightweight build
|
||||
export const legacyCiphers = new Map(Object.entries({
|
||||
tripledes,
|
||||
cast5,
|
||||
twofish,
|
||||
blowfish
|
||||
}));
|
@ -21,11 +21,13 @@
|
||||
* @module crypto/mode/cfb
|
||||
*/
|
||||
|
||||
import { AES_CFB } from '@openpgp/asmcrypto.js/aes/cfb.js';
|
||||
import * as stream from '@openpgp/web-stream-tools';
|
||||
import getCipher from '../cipher/getCipher';
|
||||
import { cfb as nobleAesCfb, unsafe as nobleAesHelpers } from '@noble/ciphers/aes';
|
||||
|
||||
import { transform as streamTransform } from '@openpgp/web-stream-tools';
|
||||
import util from '../../util';
|
||||
import enums from '../../enums';
|
||||
import { getLegacyCipher, getCipherParams } from '../cipher';
|
||||
import { getRandomBytes } from '../random';
|
||||
|
||||
const webCrypto = util.getWebCrypto();
|
||||
const nodeCrypto = util.getNodeCrypto();
|
||||
@ -42,6 +44,20 @@ const nodeAlgos = {
|
||||
/* twofish is not implemented in OpenSSL */
|
||||
};
|
||||
|
||||
/**
|
||||
* Generates a random byte prefix for the specified algorithm
|
||||
* See {@link https://tools.ietf.org/html/rfc4880#section-9.2|RFC 4880 9.2} for algorithms.
|
||||
* @param {module:enums.symmetric} algo - Symmetric encryption algorithm
|
||||
* @returns {Promise<Uint8Array>} Random bytes with length equal to the block size of the cipher, plus the last two bytes repeated.
|
||||
* @async
|
||||
*/
|
||||
export async function getPrefixRandom(algo) {
|
||||
const { blockSize } = getCipherParams(algo);
|
||||
const prefixrandom = await getRandomBytes(blockSize);
|
||||
const repeat = new Uint8Array([prefixrandom[prefixrandom.length - 2], prefixrandom[prefixrandom.length - 1]]);
|
||||
return util.concat([prefixrandom, repeat]);
|
||||
}
|
||||
|
||||
/**
|
||||
* CFB encryption
|
||||
* @param {enums.symmetric} algo - block cipher algorithm
|
||||
@ -60,8 +76,8 @@ export async function encrypt(algo, key, plaintext, iv, config) {
|
||||
return aesEncrypt(algo, key, plaintext, iv, config);
|
||||
}
|
||||
|
||||
const Cipher = getCipher(algo);
|
||||
const cipherfn = new Cipher(key);
|
||||
const LegacyCipher = await getLegacyCipher(algo);
|
||||
const cipherfn = new LegacyCipher(key);
|
||||
const block_size = cipherfn.blockSize;
|
||||
|
||||
const blockc = iv.slice();
|
||||
@ -83,7 +99,7 @@ export async function encrypt(algo, key, plaintext, iv, config) {
|
||||
}
|
||||
return ciphertext.subarray(0, j);
|
||||
};
|
||||
return stream.transform(plaintext, process, process);
|
||||
return streamTransform(plaintext, process, process);
|
||||
}
|
||||
|
||||
/**
|
||||
@ -103,8 +119,8 @@ export async function decrypt(algo, key, ciphertext, iv) {
|
||||
return aesDecrypt(algo, key, ciphertext, iv);
|
||||
}
|
||||
|
||||
const Cipher = getCipher(algo);
|
||||
const cipherfn = new Cipher(key);
|
||||
const LegacyCipher = await getLegacyCipher(algo);
|
||||
const cipherfn = new LegacyCipher(key);
|
||||
const block_size = cipherfn.blockSize;
|
||||
|
||||
let blockp = iv;
|
||||
@ -126,12 +142,12 @@ export async function decrypt(algo, key, ciphertext, iv) {
|
||||
}
|
||||
return plaintext.subarray(0, j);
|
||||
};
|
||||
return stream.transform(ciphertext, process, process);
|
||||
return streamTransform(ciphertext, process, process);
|
||||
}
|
||||
|
||||
class WebCryptoEncryptor {
|
||||
constructor(algo, key, iv) {
|
||||
const { blockSize } = getCipher(algo);
|
||||
const { blockSize } = getCipherParams(algo);
|
||||
this.key = key;
|
||||
this.prevBlock = iv;
|
||||
this.nextBlock = new Uint8Array(blockSize);
|
||||
@ -141,7 +157,7 @@ class WebCryptoEncryptor {
|
||||
}
|
||||
|
||||
static async isSupported(algo) {
|
||||
const { keySize } = getCipher(algo);
|
||||
const { keySize } = getCipherParams(algo);
|
||||
return webCrypto.importKey('raw', new Uint8Array(keySize), 'aes-cbc', false, ['encrypt'])
|
||||
.then(() => true, () => false);
|
||||
}
|
||||
@ -174,17 +190,17 @@ class WebCryptoEncryptor {
|
||||
|
||||
const encryptedBlocks = await this._runCBC(toEncrypt);
|
||||
xorMut(encryptedBlocks, plaintext);
|
||||
this.prevBlock = encryptedBlocks.subarray(-this.blockSize).slice();
|
||||
this.prevBlock = encryptedBlocks.slice(-this.blockSize);
|
||||
|
||||
// take care of leftover data
|
||||
if (leftover > 0) this.nextBlock.set(value.subarray(-leftover).slice());
|
||||
if (leftover > 0) this.nextBlock.set(value.subarray(-leftover));
|
||||
this.i = leftover;
|
||||
|
||||
return encryptedBlocks;
|
||||
}
|
||||
|
||||
this.i += added.length;
|
||||
let encryptedBlock = new Uint8Array();
|
||||
let encryptedBlock;
|
||||
if (this.i === this.nextBlock.length) { // block ready to be encrypted
|
||||
const curBlock = this.nextBlock;
|
||||
encryptedBlock = await this._runCBC(this.prevBlock);
|
||||
@ -195,6 +211,8 @@ class WebCryptoEncryptor {
|
||||
const remaining = value.subarray(added.length);
|
||||
this.nextBlock.set(remaining, this.i);
|
||||
this.i += remaining.length;
|
||||
} else {
|
||||
encryptedBlock = new Uint8Array();
|
||||
}
|
||||
|
||||
return encryptedBlock;
|
||||
@ -237,22 +255,111 @@ class WebCryptoEncryptor {
|
||||
}
|
||||
}
|
||||
|
||||
async function aesEncrypt(algo, key, pt, iv) {
|
||||
if (webCrypto && await WebCryptoEncryptor.isSupported(algo)) { // Chromium does not implement AES with 192-bit keys
|
||||
const cfb = new WebCryptoEncryptor(algo, key, iv);
|
||||
return util.isStream(pt) ? stream.transform(pt, value => cfb.encryptChunk(value), () => cfb.finish()) : cfb.encrypt(pt);
|
||||
} else {
|
||||
const cfb = new AES_CFB(key, iv);
|
||||
return stream.transform(pt, value => cfb.aes.AES_Encrypt_process(value), () => cfb.aes.AES_Encrypt_finish());
|
||||
class NobleStreamProcessor {
|
||||
constructor(forEncryption, algo, key, iv) {
|
||||
this.forEncryption = forEncryption;
|
||||
const { blockSize } = getCipherParams(algo);
|
||||
this.key = nobleAesHelpers.expandKeyLE(key);
|
||||
|
||||
if (iv.byteOffset % 4 !== 0) iv = iv.slice(); // aligned arrays required by noble-ciphers
|
||||
this.prevBlock = getUint32Array(iv);
|
||||
this.nextBlock = new Uint8Array(blockSize);
|
||||
this.i = 0; // pointer inside next block
|
||||
this.blockSize = blockSize;
|
||||
}
|
||||
|
||||
_runCFB(src) {
|
||||
const src32 = getUint32Array(src);
|
||||
const dst = new Uint8Array(src.length);
|
||||
const dst32 = getUint32Array(dst);
|
||||
for (let i = 0; i + 4 <= dst32.length; i += 4) {
|
||||
const { s0: e0, s1: e1, s2: e2, s3: e3 } = nobleAesHelpers.encrypt(this.key, this.prevBlock[0], this.prevBlock[1], this.prevBlock[2], this.prevBlock[3]);
|
||||
dst32[i + 0] = src32[i + 0] ^ e0;
|
||||
dst32[i + 1] = src32[i + 1] ^ e1;
|
||||
dst32[i + 2] = src32[i + 2] ^ e2;
|
||||
dst32[i + 3] = src32[i + 3] ^ e3;
|
||||
this.prevBlock = (this.forEncryption ? dst32 : src32).slice(i, i + 4);
|
||||
}
|
||||
return dst;
|
||||
}
|
||||
|
||||
async processChunk(value) {
|
||||
const missing = this.nextBlock.length - this.i;
|
||||
const added = value.subarray(0, missing);
|
||||
this.nextBlock.set(added, this.i);
|
||||
|
||||
if ((this.i + value.length) >= (2 * this.blockSize)) {
|
||||
const leftover = (value.length - missing) % this.blockSize;
|
||||
const toProcess = util.concatUint8Array([
|
||||
this.nextBlock,
|
||||
value.subarray(missing, value.length - leftover)
|
||||
]);
|
||||
|
||||
const processedBlocks = this._runCFB(toProcess);
|
||||
|
||||
// take care of leftover data
|
||||
if (leftover > 0) this.nextBlock.set(value.subarray(-leftover));
|
||||
this.i = leftover;
|
||||
|
||||
return processedBlocks;
|
||||
}
|
||||
|
||||
this.i += added.length;
|
||||
|
||||
let processedBlock;
|
||||
if (this.i === this.nextBlock.length) { // block ready to be encrypted
|
||||
processedBlock = this._runCFB(this.nextBlock);
|
||||
this.i = 0;
|
||||
|
||||
const remaining = value.subarray(added.length);
|
||||
this.nextBlock.set(remaining, this.i);
|
||||
this.i += remaining.length;
|
||||
} else {
|
||||
processedBlock = new Uint8Array();
|
||||
}
|
||||
|
||||
return processedBlock;
|
||||
}
|
||||
|
||||
async finish() {
|
||||
let result;
|
||||
if (this.i === 0) { // nothing more to encrypt
|
||||
result = new Uint8Array();
|
||||
} else {
|
||||
const processedBlock = this._runCFB(this.nextBlock);
|
||||
|
||||
result = processedBlock.subarray(0, this.i);
|
||||
}
|
||||
|
||||
this.clearSensitiveData();
|
||||
return result;
|
||||
}
|
||||
|
||||
clearSensitiveData() {
|
||||
this.nextBlock.fill(0);
|
||||
this.prevBlock.fill(0);
|
||||
this.key.fill(0);
|
||||
}
|
||||
}
|
||||
|
||||
function aesDecrypt(algo, key, ct, iv) {
|
||||
if (util.isStream(ct)) {
|
||||
const cfb = new AES_CFB(key, iv);
|
||||
return stream.transform(ct, value => cfb.aes.AES_Decrypt_process(value), () => cfb.aes.AES_Decrypt_finish());
|
||||
|
||||
async function aesEncrypt(algo, key, pt, iv) {
|
||||
if (webCrypto && await WebCryptoEncryptor.isSupported(algo)) { // Chromium does not implement AES with 192-bit keys
|
||||
const cfb = new WebCryptoEncryptor(algo, key, iv);
|
||||
return util.isStream(pt) ? streamTransform(pt, value => cfb.encryptChunk(value), () => cfb.finish()) : cfb.encrypt(pt);
|
||||
} else if (util.isStream(pt)) { // async callbacks are not accepted by streamTransform unless the input is a stream
|
||||
const cfb = new NobleStreamProcessor(true, algo, key, iv);
|
||||
return streamTransform(pt, value => cfb.processChunk(value), () => cfb.finish());
|
||||
}
|
||||
return AES_CFB.decrypt(ct, key, iv);
|
||||
return nobleAesCfb(key, iv).encrypt(pt);
|
||||
}
|
||||
|
||||
async function aesDecrypt(algo, key, ct, iv) {
|
||||
if (util.isStream(ct)) {
|
||||
const cfb = new NobleStreamProcessor(false, algo, key, iv);
|
||||
return streamTransform(ct, value => cfb.processChunk(value), () => cfb.finish());
|
||||
}
|
||||
return nobleAesCfb(key, iv).decrypt(ct);
|
||||
}
|
||||
|
||||
function xorMut(a, b) {
|
||||
@ -262,14 +369,16 @@ function xorMut(a, b) {
|
||||
}
|
||||
}
|
||||
|
||||
const getUint32Array = arr => new Uint32Array(arr.buffer, arr.byteOffset, Math.floor(arr.byteLength / 4));
|
||||
|
||||
function nodeEncrypt(algo, key, pt, iv) {
|
||||
const algoName = enums.read(enums.symmetric, algo);
|
||||
const cipherObj = new nodeCrypto.createCipheriv(nodeAlgos[algoName], key, iv);
|
||||
return stream.transform(pt, value => new Uint8Array(cipherObj.update(value)));
|
||||
return streamTransform(pt, value => new Uint8Array(cipherObj.update(value)));
|
||||
}
|
||||
|
||||
function nodeDecrypt(algo, key, ct, iv) {
|
||||
const algoName = enums.read(enums.symmetric, algo);
|
||||
const decipherObj = new nodeCrypto.createDecipheriv(nodeAlgos[algoName], key, iv);
|
||||
return stream.transform(ct, value => new Uint8Array(decipherObj.update(value)));
|
||||
return streamTransform(ct, value => new Uint8Array(decipherObj.update(value)));
|
||||
}
|
@ -21,7 +21,7 @@
|
||||
* @module crypto/mode/eax
|
||||
*/
|
||||
|
||||
import { AES_CTR } from '@openpgp/asmcrypto.js/aes/ctr.js';
|
||||
import { ctr as nobleAesCtr } from '@noble/ciphers/aes';
|
||||
import CMAC from '../cmac';
|
||||
import util from '../../util';
|
||||
import enums from '../../enums';
|
||||
@ -72,9 +72,8 @@ async function CTR(key) {
|
||||
}
|
||||
}
|
||||
|
||||
// asm.js fallback
|
||||
return async function(pt, iv) {
|
||||
return AES_CTR.encrypt(pt, key, iv);
|
||||
return nobleAesCtr(key, iv).encrypt(pt);
|
||||
};
|
||||
}
|
||||
|
@ -21,7 +21,7 @@
|
||||
* @module crypto/mode/gcm
|
||||
*/
|
||||
|
||||
import { AES_GCM } from '@openpgp/asmcrypto.js/aes/gcm.js';
|
||||
import { gcm as nobleAesGcm } from '@noble/ciphers/aes';
|
||||
import util from '../../util';
|
||||
import enums from '../../enums';
|
||||
|
||||
@ -74,7 +74,7 @@ async function GCM(cipher, key) {
|
||||
return {
|
||||
encrypt: async function(pt, iv, adata = new Uint8Array()) {
|
||||
if (webcryptoEmptyMessagesUnsupported && !pt.length) {
|
||||
return AES_GCM.encrypt(pt, key, iv, adata);
|
||||
return nobleAesGcm(key, iv, adata).encrypt(pt);
|
||||
}
|
||||
const ct = await webCrypto.encrypt({ name: ALGO, iv, additionalData: adata, tagLength: tagLength * 8 }, _key, pt);
|
||||
return new Uint8Array(ct);
|
||||
@ -82,7 +82,7 @@ async function GCM(cipher, key) {
|
||||
|
||||
decrypt: async function(ct, iv, adata = new Uint8Array()) {
|
||||
if (webcryptoEmptyMessagesUnsupported && ct.length === tagLength) {
|
||||
return AES_GCM.decrypt(ct, key, iv, adata);
|
||||
return nobleAesGcm(key, iv, adata).decrypt(ct);
|
||||
}
|
||||
try {
|
||||
const pt = await webCrypto.decrypt({ name: ALGO, iv, additionalData: adata, tagLength: tagLength * 8 }, _key, ct);
|
||||
@ -106,11 +106,11 @@ async function GCM(cipher, key) {
|
||||
|
||||
return {
|
||||
encrypt: async function(pt, iv, adata) {
|
||||
return AES_GCM.encrypt(pt, key, iv, adata);
|
||||
return nobleAesGcm(key, iv, adata).encrypt(pt);
|
||||
},
|
||||
|
||||
decrypt: async function(ct, iv, adata) {
|
||||
return AES_GCM.decrypt(ct, key, iv, adata);
|
||||
return nobleAesGcm(key, iv, adata).decrypt(ct);
|
||||
}
|
||||
};
|
||||
}
|
35
src/crypto/cipherMode/index.js
Normal file
35
src/crypto/cipherMode/index.js
Normal file
@ -0,0 +1,35 @@
|
||||
/**
|
||||
* @fileoverview Cipher modes
|
||||
* @module crypto/cipherMode
|
||||
*/
|
||||
|
||||
export * as cfb from './cfb';
|
||||
import eax from './eax';
|
||||
import ocb from './ocb';
|
||||
import gcm from './gcm';
|
||||
import enums from '../../enums';
|
||||
|
||||
/**
|
||||
* Get implementation of the given AEAD mode
|
||||
* @param {enums.aead} algo
|
||||
* @param {Boolean} [acceptExperimentalGCM] - whether to allow the non-standard, legacy `experimentalGCM` algo
|
||||
* @returns {Object}
|
||||
* @throws {Error} on invalid algo
|
||||
*/
|
||||
export function getAEADMode(algo, acceptExperimentalGCM = false) {
|
||||
switch (algo) {
|
||||
case enums.aead.eax:
|
||||
return eax;
|
||||
case enums.aead.ocb:
|
||||
return ocb;
|
||||
case enums.aead.gcm:
|
||||
return gcm;
|
||||
case enums.aead.experimentalGCM:
|
||||
if (!acceptExperimentalGCM) {
|
||||
throw new Error('Unexpected non-standard `experimentalGCM` AEAD algorithm provided in `config.preferredAEADAlgorithm`: use `gcm` instead');
|
||||
}
|
||||
return gcm;
|
||||
default:
|
||||
throw new Error('Unsupported AEAD mode');
|
||||
}
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user