@protontech/openpgp 5.11.0 → 5.11.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,4 +1,4 @@
1
- /*! OpenPGP.js v5.11.0 - 2023-11-27 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
1
+ /*! OpenPGP.js v5.11.1 - 2024-04-10 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
2
  const globalThis = typeof window !== 'undefined' ? window : typeof global !== 'undefined' ? global : typeof self !== 'undefined' ? self : {};
3
3
 
4
4
  import buffer from 'buffer';
@@ -2956,7 +2956,7 @@ var config = {
2956
2956
  * @memberof module:config
2957
2957
  * @property {String} versionString A version string to be included in armored messages
2958
2958
  */
2959
- versionString: 'OpenPGP.js 5.11.0',
2959
+ versionString: 'OpenPGP.js 5.11.1',
2960
2960
  /**
2961
2961
  * @memberof module:config
2962
2962
  * @property {String} commentString A comment string to be included in armored messages
@@ -12584,8 +12584,15 @@ async function encrypt$1(data, n, e) {
12584
12584
  * @async
12585
12585
  */
12586
12586
  async function decrypt$1(data, n, e, d, p, q, u, randomPayload) {
12587
- if (util.getNodeCrypto()) {
12588
- return nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload);
12587
+ // Node v18.19.1, 20.11.1 and 21.6.2 have disabled support for PKCS#1 decryption,
12588
+ // and we want to avoid checking the error type to decide if the random payload
12589
+ // should indeed be returned.
12590
+ if (util.getNodeCrypto() && !randomPayload) {
12591
+ try {
12592
+ return await nodeDecrypt$1(data, n, e, d, p, q, u);
12593
+ } catch (err) {
12594
+ util.printDebugError(err);
12595
+ }
12589
12596
  }
12590
12597
  return bnDecrypt(data, n, e, d, p, q, u, randomPayload);
12591
12598
  }
@@ -12887,7 +12894,7 @@ async function bnEncrypt(data, n, e) {
12887
12894
  return data.modExp(e, n).toUint8Array('be', n.byteLength());
12888
12895
  }
12889
12896
 
12890
- async function nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload) {
12897
+ async function nodeDecrypt$1(data, n, e, d, p, q, u) {
12891
12898
  const { default: BN } = await Promise.resolve().then(function () { return bn$1; });
12892
12899
 
12893
12900
  const pBNum = new BN(p);
@@ -12921,9 +12928,6 @@ async function nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload) {
12921
12928
  try {
12922
12929
  return new Uint8Array(nodeCrypto$6.privateDecrypt(key, data));
12923
12930
  } catch (err) {
12924
- if (randomPayload) {
12925
- return randomPayload;
12926
- }
12927
12931
  throw new Error('Decryption error');
12928
12932
  }
12929
12933
  }
@@ -45373,4 +45377,4 @@ var index = /*#__PURE__*/Object.freeze({
45373
45377
  'default': loadWasm
45374
45378
  });
45375
45379
 
45376
- export { AEADEncryptedDataPacket, CleartextMessage, CompressedDataPacket, KDFParams, LiteralDataPacket, MarkerPacket, Message, OnePassSignaturePacket, PacketList, PrivateKey, PublicKey, PublicKeyEncryptedSessionKeyPacket, PublicKeyPacket, PublicSubkeyPacket, SecretKeyPacket, SecretSubkeyPacket, Signature, SignaturePacket, Subkey, SymEncryptedIntegrityProtectedDataPacket, SymEncryptedSessionKeyPacket, SymmetricallyEncryptedDataPacket, TrustPacket, UnparseablePacket, UserAttributePacket, UserIDPacket, armor, config, createCleartextMessage, createMessage, decrypt$5 as decrypt, decryptKey, decryptSessionKeys, encrypt$5 as encrypt, encryptKey, encryptSessionKey, enums, generateKey, generateSessionKey$1 as generateSessionKey, readCleartextMessage, readKey, readKeys, readMessage, readPrivateKey, readPrivateKeys, readSignature, reformatKey, revokeKey, sign$6 as sign, unarmor, verify$6 as verify };
45380
+ export { AEADEncryptedDataPacket, Argon2OutOfMemoryError, Argon2S2K, CleartextMessage, CompressedDataPacket, KDFParams, LiteralDataPacket, MarkerPacket, Message, OnePassSignaturePacket, PacketList, PrivateKey, PublicKey, PublicKeyEncryptedSessionKeyPacket, PublicKeyPacket, PublicSubkeyPacket, SecretKeyPacket, SecretSubkeyPacket, Signature, SignaturePacket, Subkey, SymEncryptedIntegrityProtectedDataPacket, SymEncryptedSessionKeyPacket, SymmetricallyEncryptedDataPacket, TrustPacket, UnparseablePacket, UserAttributePacket, UserIDPacket, armor, config, createCleartextMessage, createMessage, decrypt$5 as decrypt, decryptKey, decryptSessionKeys, encrypt$5 as encrypt, encryptKey, encryptSessionKey, enums, generateKey, generateSessionKey$1 as generateSessionKey, readCleartextMessage, readKey, readKeys, readMessage, readPrivateKey, readPrivateKeys, readSignature, reformatKey, revokeKey, sign$6 as sign, unarmor, verify$6 as verify };
package/dist/openpgp.js CHANGED
@@ -1,4 +1,4 @@
1
- /*! OpenPGP.js v5.11.0 - 2023-11-27 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
1
+ /*! OpenPGP.js v5.11.1 - 2024-04-10 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
2
  var openpgp = (function (exports) {
3
3
  'use strict';
4
4
 
@@ -2953,7 +2953,7 @@ var openpgp = (function (exports) {
2953
2953
  * @memberof module:config
2954
2954
  * @property {String} versionString A version string to be included in armored messages
2955
2955
  */
2956
- versionString: 'OpenPGP.js 5.11.0',
2956
+ versionString: 'OpenPGP.js 5.11.1',
2957
2957
  /**
2958
2958
  * @memberof module:config
2959
2959
  * @property {String} commentString A comment string to be included in armored messages
@@ -12573,8 +12573,15 @@ var openpgp = (function (exports) {
12573
12573
  * @async
12574
12574
  */
12575
12575
  async function decrypt$1(data, n, e, d, p, q, u, randomPayload) {
12576
- if (util.getNodeCrypto()) {
12577
- return nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload);
12576
+ // Node v18.19.1, 20.11.1 and 21.6.2 have disabled support for PKCS#1 decryption,
12577
+ // and we want to avoid checking the error type to decide if the random payload
12578
+ // should indeed be returned.
12579
+ if (util.getNodeCrypto() && !randomPayload) {
12580
+ try {
12581
+ return await nodeDecrypt$1(data, n, e, d, p, q, u);
12582
+ } catch (err) {
12583
+ util.printDebugError(err);
12584
+ }
12578
12585
  }
12579
12586
  return bnDecrypt(data, n, e, d, p, q, u, randomPayload);
12580
12587
  }
@@ -12876,7 +12883,7 @@ var openpgp = (function (exports) {
12876
12883
  return data.modExp(e, n).toUint8Array('be', n.byteLength());
12877
12884
  }
12878
12885
 
12879
- async function nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload) {
12886
+ async function nodeDecrypt$1(data, n, e, d, p, q, u) {
12880
12887
  const { default: BN } = await Promise.resolve().then(function () { return bn$1; });
12881
12888
 
12882
12889
  const pBNum = new BN(p);
@@ -12910,9 +12917,6 @@ var openpgp = (function (exports) {
12910
12917
  try {
12911
12918
  return new Uint8Array(nodeCrypto$6.privateDecrypt(key, data));
12912
12919
  } catch (err) {
12913
- if (randomPayload) {
12914
- return randomPayload;
12915
- }
12916
12920
  throw new Error('Decryption error');
12917
12921
  }
12918
12922
  }
@@ -45359,6 +45363,8 @@ var openpgp = (function (exports) {
45359
45363
  });
45360
45364
 
45361
45365
  exports.AEADEncryptedDataPacket = AEADEncryptedDataPacket;
45366
+ exports.Argon2OutOfMemoryError = Argon2OutOfMemoryError;
45367
+ exports.Argon2S2K = Argon2S2K;
45362
45368
  exports.CleartextMessage = CleartextMessage;
45363
45369
  exports.CompressedDataPacket = CompressedDataPacket;
45364
45370
  exports.KDFParams = KDFParams;