@protontech/openpgp 5.11.0 → 5.11.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/dist/lightweight/argon2id.min.mjs +1 -1
- package/dist/lightweight/argon2id.mjs +1 -1
- package/dist/lightweight/bn.interface.min.mjs +1 -1
- package/dist/lightweight/bn.interface.mjs +1 -1
- package/dist/lightweight/bn.min.mjs +1 -1
- package/dist/lightweight/bn.mjs +1 -1
- package/dist/lightweight/elliptic.min.mjs +1 -1
- package/dist/lightweight/elliptic.mjs +1 -1
- package/dist/lightweight/openpgp.min.mjs +2 -2
- package/dist/lightweight/openpgp.min.mjs.map +1 -1
- package/dist/lightweight/openpgp.mjs +13 -9
- package/dist/lightweight/ponyfill.es6.min.mjs +1 -1
- package/dist/lightweight/ponyfill.es6.mjs +1 -1
- package/dist/lightweight/web-streams-adapter.min.mjs +1 -1
- package/dist/lightweight/web-streams-adapter.mjs +1 -1
- package/dist/node/openpgp.js +14 -8
- package/dist/node/openpgp.min.js +3 -3
- package/dist/node/openpgp.min.js.map +1 -1
- package/dist/node/openpgp.min.mjs +3 -3
- package/dist/node/openpgp.min.mjs.map +1 -1
- package/dist/node/openpgp.mjs +13 -9
- package/dist/openpgp.js +14 -8
- package/dist/openpgp.min.js +3 -3
- package/dist/openpgp.min.js.map +1 -1
- package/dist/openpgp.min.mjs +3 -3
- package/dist/openpgp.min.mjs.map +1 -1
- package/dist/openpgp.mjs +13 -9
- package/openpgp.d.ts +7 -0
- package/package.json +1 -1
package/dist/node/openpgp.mjs
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
/*! OpenPGP.js v5.11.
|
|
1
|
+
/*! OpenPGP.js v5.11.1 - 2024-04-10 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
|
|
2
2
|
const globalThis = typeof window !== 'undefined' ? window : typeof global !== 'undefined' ? global : typeof self !== 'undefined' ? self : {};
|
|
3
3
|
|
|
4
4
|
import buffer from 'buffer';
|
|
@@ -2956,7 +2956,7 @@ var config = {
|
|
|
2956
2956
|
* @memberof module:config
|
|
2957
2957
|
* @property {String} versionString A version string to be included in armored messages
|
|
2958
2958
|
*/
|
|
2959
|
-
versionString: 'OpenPGP.js 5.11.
|
|
2959
|
+
versionString: 'OpenPGP.js 5.11.1',
|
|
2960
2960
|
/**
|
|
2961
2961
|
* @memberof module:config
|
|
2962
2962
|
* @property {String} commentString A comment string to be included in armored messages
|
|
@@ -12584,8 +12584,15 @@ async function encrypt$1(data, n, e) {
|
|
|
12584
12584
|
* @async
|
|
12585
12585
|
*/
|
|
12586
12586
|
async function decrypt$1(data, n, e, d, p, q, u, randomPayload) {
|
|
12587
|
-
|
|
12588
|
-
|
|
12587
|
+
// Node v18.19.1, 20.11.1 and 21.6.2 have disabled support for PKCS#1 decryption,
|
|
12588
|
+
// and we want to avoid checking the error type to decide if the random payload
|
|
12589
|
+
// should indeed be returned.
|
|
12590
|
+
if (util.getNodeCrypto() && !randomPayload) {
|
|
12591
|
+
try {
|
|
12592
|
+
return await nodeDecrypt$1(data, n, e, d, p, q, u);
|
|
12593
|
+
} catch (err) {
|
|
12594
|
+
util.printDebugError(err);
|
|
12595
|
+
}
|
|
12589
12596
|
}
|
|
12590
12597
|
return bnDecrypt(data, n, e, d, p, q, u, randomPayload);
|
|
12591
12598
|
}
|
|
@@ -12887,7 +12894,7 @@ async function bnEncrypt(data, n, e) {
|
|
|
12887
12894
|
return data.modExp(e, n).toUint8Array('be', n.byteLength());
|
|
12888
12895
|
}
|
|
12889
12896
|
|
|
12890
|
-
async function nodeDecrypt$1(data, n, e, d, p, q, u
|
|
12897
|
+
async function nodeDecrypt$1(data, n, e, d, p, q, u) {
|
|
12891
12898
|
const { default: BN } = await Promise.resolve().then(function () { return bn$1; });
|
|
12892
12899
|
|
|
12893
12900
|
const pBNum = new BN(p);
|
|
@@ -12921,9 +12928,6 @@ async function nodeDecrypt$1(data, n, e, d, p, q, u, randomPayload) {
|
|
|
12921
12928
|
try {
|
|
12922
12929
|
return new Uint8Array(nodeCrypto$6.privateDecrypt(key, data));
|
|
12923
12930
|
} catch (err) {
|
|
12924
|
-
if (randomPayload) {
|
|
12925
|
-
return randomPayload;
|
|
12926
|
-
}
|
|
12927
12931
|
throw new Error('Decryption error');
|
|
12928
12932
|
}
|
|
12929
12933
|
}
|
|
@@ -45373,4 +45377,4 @@ var index = /*#__PURE__*/Object.freeze({
|
|
|
45373
45377
|
'default': loadWasm
|
|
45374
45378
|
});
|
|
45375
45379
|
|
|
45376
|
-
export { AEADEncryptedDataPacket, CleartextMessage, CompressedDataPacket, KDFParams, LiteralDataPacket, MarkerPacket, Message, OnePassSignaturePacket, PacketList, PrivateKey, PublicKey, PublicKeyEncryptedSessionKeyPacket, PublicKeyPacket, PublicSubkeyPacket, SecretKeyPacket, SecretSubkeyPacket, Signature, SignaturePacket, Subkey, SymEncryptedIntegrityProtectedDataPacket, SymEncryptedSessionKeyPacket, SymmetricallyEncryptedDataPacket, TrustPacket, UnparseablePacket, UserAttributePacket, UserIDPacket, armor, config, createCleartextMessage, createMessage, decrypt$5 as decrypt, decryptKey, decryptSessionKeys, encrypt$5 as encrypt, encryptKey, encryptSessionKey, enums, generateKey, generateSessionKey$1 as generateSessionKey, readCleartextMessage, readKey, readKeys, readMessage, readPrivateKey, readPrivateKeys, readSignature, reformatKey, revokeKey, sign$6 as sign, unarmor, verify$6 as verify };
|
|
45380
|
+
export { AEADEncryptedDataPacket, Argon2OutOfMemoryError, Argon2S2K, CleartextMessage, CompressedDataPacket, KDFParams, LiteralDataPacket, MarkerPacket, Message, OnePassSignaturePacket, PacketList, PrivateKey, PublicKey, PublicKeyEncryptedSessionKeyPacket, PublicKeyPacket, PublicSubkeyPacket, SecretKeyPacket, SecretSubkeyPacket, Signature, SignaturePacket, Subkey, SymEncryptedIntegrityProtectedDataPacket, SymEncryptedSessionKeyPacket, SymmetricallyEncryptedDataPacket, TrustPacket, UnparseablePacket, UserAttributePacket, UserIDPacket, armor, config, createCleartextMessage, createMessage, decrypt$5 as decrypt, decryptKey, decryptSessionKeys, encrypt$5 as encrypt, encryptKey, encryptSessionKey, enums, generateKey, generateSessionKey$1 as generateSessionKey, readCleartextMessage, readKey, readKeys, readMessage, readPrivateKey, readPrivateKeys, readSignature, reformatKey, revokeKey, sign$6 as sign, unarmor, verify$6 as verify };
|
package/dist/openpgp.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
/*! OpenPGP.js v5.11.
|
|
1
|
+
/*! OpenPGP.js v5.11.1 - 2024-04-10 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
|
|
2
2
|
var openpgp = (function (exports) {
|
|
3
3
|
'use strict';
|
|
4
4
|
|
|
@@ -2953,7 +2953,7 @@ var openpgp = (function (exports) {
|
|
|
2953
2953
|
* @memberof module:config
|
|
2954
2954
|
* @property {String} versionString A version string to be included in armored messages
|
|
2955
2955
|
*/
|
|
2956
|
-
versionString: 'OpenPGP.js 5.11.
|
|
2956
|
+
versionString: 'OpenPGP.js 5.11.1',
|
|
2957
2957
|
/**
|
|
2958
2958
|
* @memberof module:config
|
|
2959
2959
|
* @property {String} commentString A comment string to be included in armored messages
|
|
@@ -12573,8 +12573,15 @@ var openpgp = (function (exports) {
|
|
|
12573
12573
|
* @async
|
|
12574
12574
|
*/
|
|
12575
12575
|
async function decrypt$1(data, n, e, d, p, q, u, randomPayload) {
|
|
12576
|
-
|
|
12577
|
-
|
|
12576
|
+
// Node v18.19.1, 20.11.1 and 21.6.2 have disabled support for PKCS#1 decryption,
|
|
12577
|
+
// and we want to avoid checking the error type to decide if the random payload
|
|
12578
|
+
// should indeed be returned.
|
|
12579
|
+
if (util.getNodeCrypto() && !randomPayload) {
|
|
12580
|
+
try {
|
|
12581
|
+
return await nodeDecrypt$1(data, n, e, d, p, q, u);
|
|
12582
|
+
} catch (err) {
|
|
12583
|
+
util.printDebugError(err);
|
|
12584
|
+
}
|
|
12578
12585
|
}
|
|
12579
12586
|
return bnDecrypt(data, n, e, d, p, q, u, randomPayload);
|
|
12580
12587
|
}
|
|
@@ -12876,7 +12883,7 @@ var openpgp = (function (exports) {
|
|
|
12876
12883
|
return data.modExp(e, n).toUint8Array('be', n.byteLength());
|
|
12877
12884
|
}
|
|
12878
12885
|
|
|
12879
|
-
async function nodeDecrypt$1(data, n, e, d, p, q, u
|
|
12886
|
+
async function nodeDecrypt$1(data, n, e, d, p, q, u) {
|
|
12880
12887
|
const { default: BN } = await Promise.resolve().then(function () { return bn$1; });
|
|
12881
12888
|
|
|
12882
12889
|
const pBNum = new BN(p);
|
|
@@ -12910,9 +12917,6 @@ var openpgp = (function (exports) {
|
|
|
12910
12917
|
try {
|
|
12911
12918
|
return new Uint8Array(nodeCrypto$6.privateDecrypt(key, data));
|
|
12912
12919
|
} catch (err) {
|
|
12913
|
-
if (randomPayload) {
|
|
12914
|
-
return randomPayload;
|
|
12915
|
-
}
|
|
12916
12920
|
throw new Error('Decryption error');
|
|
12917
12921
|
}
|
|
12918
12922
|
}
|
|
@@ -45359,6 +45363,8 @@ var openpgp = (function (exports) {
|
|
|
45359
45363
|
});
|
|
45360
45364
|
|
|
45361
45365
|
exports.AEADEncryptedDataPacket = AEADEncryptedDataPacket;
|
|
45366
|
+
exports.Argon2OutOfMemoryError = Argon2OutOfMemoryError;
|
|
45367
|
+
exports.Argon2S2K = Argon2S2K;
|
|
45362
45368
|
exports.CleartextMessage = CleartextMessage;
|
|
45363
45369
|
exports.CompressedDataPacket = CompressedDataPacket;
|
|
45364
45370
|
exports.KDFParams = KDFParams;
|