Comparing version 0.3.1 to 0.3.2
@@ -1,5 +0,21 @@ | ||
## 0.3.1 | ||
## 0.3.2 | ||
Bugfixes: | ||
- Strip out stray debug message | ||
- Use 'armored' rather than 'raw' in KeyManager interface, for consistency's sake. | ||
Still allow 'raw' but mark it as DEPRECATED. | ||
- Don't require unlock_pgp() to be called on an unlocked key. Do it internally | ||
so as not to confuse people. | ||
- Upgrade to Triplesec v3.0.18 for less-wasteful entropy generation | ||
Features: | ||
- ASPs now accepted and supported in box/unbox operations | ||
- API streamlining: easier to get the key_manager from a packetsig | ||
## 0.3.1 (2014-08-06) | ||
Tweaks: | ||
- Rename generate_std to generate_rsa | ||
@@ -19,4 +35,4 @@ - Alias KeyManager.export_pgp_private | ||
- Change the KeyFetcher::fetch interface. Callback now callsback | ||
with (err, key_manager, index) triple rather than the shmorgasbord | ||
- Change the KeyFetcher::fetch interface. Callback now callsback | ||
with (err, key_manager, index) triple rather than the shmorgasbord | ||
of parameters we had before. Do a minor version update to show lack | ||
@@ -29,3 +45,3 @@ of compatibility with previous 0.2.0 release | ||
- RFC 6637: ECC crypto: ECDSA and ECDH. Experimental and not recommended, | ||
- RFC 6637: ECC crypto: ECDSA and ECDH. Experimental and not recommended, | ||
since more GPG clients do not support it. | ||
@@ -110,3 +126,3 @@ - Add new API entrance points for cleaner code and consistent metaphors. | ||
Features: | ||
- Add an RSA hiding feature, to hide what the public key is. Also, blind the output ciphertext. | ||
@@ -136,3 +152,3 @@ | ||
- Strip out some profane debugging info (sorry) | ||
- Allow unlocking of keys that were not actually locked. | ||
- Allow unlocking of keys that were not actually locked. | ||
@@ -170,3 +186,3 @@ ## 0.1.12 (2014-04-24) | ||
- Better support for private key merging --- don't require an exact-key-for-key | ||
match, but rather, allow only some of the secret subkeys (and not the primary) to | ||
match, but rather, allow only some of the secret subkeys (and not the primary) to | ||
be merged. This addresses [Keybase Issue #216](https://github.com/keybase/keybase-issues/issues/216) | ||
@@ -267,3 +283,3 @@ | ||
Bugfixes: | ||
- Close #38 - Handle ElGamal encrypt and sign. Throw it away, don't puke | ||
@@ -281,3 +297,3 @@ - Close keybase/keybase-issues#273 as well. | ||
Features: | ||
- Figure out which keyid is primary | ||
@@ -308,3 +324,3 @@ | ||
- Close keybase/keybase-issues#196: better support for v3 signatures mixed in | ||
- Close keybase/keybase-issues#196: better support for v3 signatures mixed in | ||
with v4 signatures in public key blocks. | ||
@@ -311,0 +327,0 @@ |
@@ -148,3 +148,3 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "Engine.sign_subkeys" | ||
@@ -223,3 +223,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "Engine.sign" | ||
@@ -246,3 +246,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "Engine.sign" | ||
@@ -330,3 +330,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "Engine.unlock_keys" | ||
@@ -374,3 +374,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "Engine.unlock_keys" | ||
@@ -476,3 +476,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "PgpEngine._v_self_sign_primary" | ||
@@ -511,3 +511,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "PgpEngine._v_sign_subkey" | ||
@@ -753,3 +753,3 @@ }); | ||
parent: ___iced_passed_deferral1, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced" | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced" | ||
}); | ||
@@ -792,3 +792,3 @@ params.algo.generate({ | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.generate" | ||
@@ -841,3 +841,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.generate" | ||
@@ -933,14 +933,18 @@ }); | ||
KeyManager.import_from_armored_pgp = function(_arg, cb) { | ||
var armored, asp, err, msg, raw, ret, warnings, ___iced_passed_deferral, __iced_deferrals, __iced_k, _ref5, _ref6; | ||
var armored, asp, binary, err, msg, raw, ret, warnings, ___iced_passed_deferral, __iced_deferrals, __iced_k, _ref5, _ref6; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
armored = _arg.armored, raw = _arg.raw, asp = _arg.asp; | ||
raw || (raw = armored); | ||
asp = ASP.make(asp); | ||
warnings = null; | ||
ret = null; | ||
_ref5 = decode(raw), err = _ref5[0], msg = _ref5[1]; | ||
if (err == null) { | ||
if (!((_ref6 = msg.type) === C.message_types.public_key || _ref6 === C.message_types.private_key)) { | ||
err = new Error("Wanted a public or private key; got: " + msg.type); | ||
armored = _arg.armored, raw = _arg.raw, binary = _arg.binary, asp = _arg.asp; | ||
msg = binary; | ||
err = null; | ||
if (msg == null) { | ||
raw || (raw = armored); | ||
asp = ASP.make(asp); | ||
warnings = null; | ||
ret = null; | ||
_ref5 = decode(raw), err = _ref5[0], msg = _ref5[1]; | ||
if (err == null) { | ||
if (!((_ref6 = msg.type) === C.message_types.public_key || _ref6 === C.message_types.private_key)) { | ||
err = new Error("Wanted a public or private key; got: " + msg.type); | ||
} | ||
} | ||
@@ -954,3 +958,3 @@ } | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.import_from_armored_pgp" | ||
@@ -969,3 +973,3 @@ }); | ||
})(), | ||
lineno: 448 | ||
lineno: 461 | ||
})); | ||
@@ -980,3 +984,26 @@ __iced_deferrals._fulfill(); | ||
return function() { | ||
return cb(err, ret, warnings); | ||
(function(__iced_k) { | ||
if (!(err != null) && ret.has_pgp_private() && !ret.is_pgp_locked()) { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.import_from_armored_pgp" | ||
}); | ||
ret.unlock_pgp({}, __iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return err = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 467 | ||
})); | ||
__iced_deferrals._fulfill(); | ||
})(__iced_k); | ||
} else { | ||
return __iced_k(); | ||
} | ||
})(function() { | ||
return cb(err, ret, warnings); | ||
}); | ||
}; | ||
@@ -987,6 +1014,7 @@ })(this)); | ||
KeyManager.import_from_p3skb = function(_arg, cb) { | ||
var asp, err, km, msg, p3skb, raw, warnings, ___iced_passed_deferral, __iced_deferrals, __iced_k, _ref5; | ||
var armored, asp, err, km, msg, p3skb, raw, warnings, ___iced_passed_deferral, __iced_deferrals, __iced_k, _ref5; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
raw = _arg.raw, asp = _arg.asp; | ||
raw = _arg.raw, armored = _arg.armored, asp = _arg.asp; | ||
armored || (armored = raw); | ||
asp = ASP.make(asp); | ||
@@ -996,3 +1024,3 @@ km = null; | ||
_ref5 = katch(function() { | ||
return P3SKB.alloc(unbox(read_base64(raw))); | ||
return P3SKB.alloc(unbox(read_base64(armored))); | ||
}), err = _ref5[0], p3skb = _ref5[1]; | ||
@@ -1009,3 +1037,3 @@ (function(_this) { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.import_from_p3skb" | ||
@@ -1024,3 +1052,3 @@ }); | ||
})(), | ||
lineno: 461 | ||
lineno: 483 | ||
})); | ||
@@ -1057,3 +1085,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.unlock_p3skb" | ||
@@ -1070,3 +1098,3 @@ }); | ||
})(), | ||
lineno: 471 | ||
lineno: 493 | ||
})); | ||
@@ -1086,3 +1114,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.unlock_p3skb" | ||
@@ -1100,3 +1128,3 @@ }); | ||
})(), | ||
lineno: 474 | ||
lineno: 496 | ||
})); | ||
@@ -1118,3 +1146,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.unlock_p3skb" | ||
@@ -1130,3 +1158,3 @@ }); | ||
})(), | ||
lineno: 483 | ||
lineno: 505 | ||
})); | ||
@@ -1164,3 +1192,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.import_from_pgp_message" | ||
@@ -1174,3 +1202,3 @@ }); | ||
})(), | ||
lineno: 498 | ||
lineno: 520 | ||
})); | ||
@@ -1211,6 +1239,6 @@ __iced_deferrals._fulfill(); | ||
KeyManager.prototype.merge_pgp_private = function(_arg, cb) { | ||
var asp, b2, err, raw, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
var armored, asp, b2, err, raw, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
raw = _arg.raw, asp = _arg.asp; | ||
armored = _arg.armored, raw = _arg.raw, asp = _arg.asp; | ||
asp = ASP.make(asp); | ||
@@ -1221,6 +1249,7 @@ (function(_this) { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.merge_pgp_private" | ||
}); | ||
KeyManager.import_from_armored_pgp({ | ||
armored: armored, | ||
raw: raw, | ||
@@ -1235,3 +1264,3 @@ asp: asp | ||
})(), | ||
lineno: 516 | ||
lineno: 538 | ||
})); | ||
@@ -1263,3 +1292,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.unlock_pgp" | ||
@@ -1275,3 +1304,3 @@ }); | ||
})(), | ||
lineno: 530 | ||
lineno: 552 | ||
})); | ||
@@ -1323,3 +1352,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.unlock_keybase" | ||
@@ -1336,3 +1365,3 @@ }); | ||
})(), | ||
lineno: 548 | ||
lineno: 570 | ||
})); | ||
@@ -1362,3 +1391,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.export_private_to_server" | ||
@@ -1375,3 +1404,3 @@ }); | ||
})(), | ||
lineno: 561 | ||
lineno: 583 | ||
})); | ||
@@ -1449,3 +1478,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.export_private" | ||
@@ -1463,3 +1492,3 @@ }); | ||
})(), | ||
lineno: 597 | ||
lineno: 620 | ||
})); | ||
@@ -1472,3 +1501,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.export_private" | ||
@@ -1486,3 +1515,3 @@ }); | ||
})(), | ||
lineno: 599 | ||
lineno: 622 | ||
})); | ||
@@ -1524,3 +1553,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager.sign" | ||
@@ -1536,3 +1565,3 @@ }); | ||
})(), | ||
lineno: 612 | ||
lineno: 635 | ||
})); | ||
@@ -1704,3 +1733,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/keymanager.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/keymanager.iced", | ||
funcname: "KeyManager._apply_to_engines" | ||
@@ -1714,3 +1743,3 @@ }); | ||
})(), | ||
lineno: 705 | ||
lineno: 728 | ||
})); | ||
@@ -1717,0 +1746,0 @@ __iced_deferrals._fulfill(); |
@@ -5,3 +5,3 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
mods = [require("./keymanager"), require("./basex"), require("./openpgp/burner"), require("./openpgp/hilev")]; | ||
mods = [require("./keymanager"), require("./basex"), require("./openpgp/burner"), require("./openpgp/hilev"), require("./keyfetch"), require("./keyring")]; | ||
@@ -8,0 +8,0 @@ for (_i = 0, _len = mods.length; _i < _len; _i++) { |
// Generated by IcedCoffeeScript 1.7.1-c | ||
(function() { | ||
var BaseBurner, iced, make_esc, __iced_k, __iced_k_noop; | ||
var ASP, BaseBurner, iced, make_esc, __iced_k, __iced_k_noop; | ||
@@ -10,5 +10,8 @@ iced = require('iced-runtime').iced; | ||
ASP = require('pgp-utils').util.ASP; | ||
exports.BaseBurner = BaseBurner = (function() { | ||
function BaseBurner(_arg) { | ||
this.sign_with = _arg.sign_with, this.encrypt_for = _arg.encrypt_for, this.signing_key = _arg.signing_key, this.encryption_key = _arg.encryption_key; | ||
this.sign_with = _arg.sign_with, this.encrypt_for = _arg.encrypt_for, this.signing_key = _arg.signing_key, this.encryption_key = _arg.encryption_key, this.asp = _arg.asp; | ||
this.asp = ASP.make(this.asp); | ||
} | ||
@@ -25,7 +28,7 @@ | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/baseburner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/baseburner.iced", | ||
funcname: "BaseBurner._find_keys" | ||
}); | ||
_this._find_signing_key(esc(__iced_deferrals.defer({ | ||
lineno: 15 | ||
lineno: 17 | ||
}))); | ||
@@ -39,7 +42,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/baseburner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/baseburner.iced", | ||
funcname: "BaseBurner._find_keys" | ||
}); | ||
_this._find_encryption_key(esc(__iced_deferrals.defer({ | ||
lineno: 16 | ||
lineno: 18 | ||
}))); | ||
@@ -51,7 +54,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/baseburner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/baseburner.iced", | ||
funcname: "BaseBurner._find_keys" | ||
}); | ||
_this._assert_one(esc(__iced_deferrals.defer({ | ||
lineno: 17 | ||
lineno: 19 | ||
}))); | ||
@@ -58,0 +61,0 @@ __iced_deferrals._fulfill(); |
@@ -59,4 +59,4 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
function Burner(_arg) { | ||
var encrypt_for, encryption_key, sign_with, signing_key; | ||
this.literals = _arg.literals, this.opts = _arg.opts, sign_with = _arg.sign_with, encrypt_for = _arg.encrypt_for, signing_key = _arg.signing_key, encryption_key = _arg.encryption_key; | ||
var asp, encrypt_for, encryption_key, sign_with, signing_key; | ||
this.literals = _arg.literals, this.opts = _arg.opts, sign_with = _arg.sign_with, encrypt_for = _arg.encrypt_for, signing_key = _arg.signing_key, encryption_key = _arg.encryption_key, asp = _arg.asp; | ||
Burner.__super__.constructor.call(this, { | ||
@@ -66,3 +66,4 @@ sign_with: sign_with, | ||
signing_key: signing_key, | ||
encryption_key: encryption_key | ||
encryption_key: encryption_key, | ||
asp: asp | ||
}); | ||
@@ -110,3 +111,3 @@ this.packets = []; | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._frame_literals" | ||
@@ -139,3 +140,3 @@ }); | ||
Burner.prototype._sign = function(cb) { | ||
var err, esc, fp, ops, ops_framed, sig, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
var esc, fp, ops, ops_framed, sig, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
@@ -155,3 +156,3 @@ ___iced_passed_deferral = iced.findDeferral(arguments); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._sign" | ||
@@ -180,21 +181,50 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._sign" | ||
}); | ||
sig.write(_this.signed_payload, __iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
err = arguments[0]; | ||
return fp = arguments[1]; | ||
}; | ||
})(), | ||
_this.asp.progress({ | ||
what: 'sign', | ||
i: 0, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 74 | ||
})); | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
if (typeof err === "undefined" || err === null) { | ||
_this.packets.unshift(ops_framed); | ||
_this.packets.push(fp); | ||
} | ||
return cb(err); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._sign" | ||
}); | ||
sig.write(_this.signed_payload, esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return fp = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 75 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._sign" | ||
}); | ||
_this.asp.progress({ | ||
what: 'sign', | ||
i: 1, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 76 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
_this.packets.unshift(ops_framed); | ||
_this.packets.push(fp); | ||
return cb(null); | ||
}); | ||
}); | ||
}); | ||
@@ -213,5 +243,6 @@ }; | ||
Burner.prototype._compress = function(cb) { | ||
var err, inflated, opkt, pkt, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
var esc, inflated, opkt, pkt, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
esc = make_esc(cb, "Burner::_compress"); | ||
inflated = this.collect_packets(); | ||
@@ -226,14 +257,12 @@ pkt = new Compressed({ | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._compress" | ||
}); | ||
pkt.write(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
err = arguments[0]; | ||
return opkt = arguments[1]; | ||
}; | ||
})(), | ||
lineno: 92 | ||
})); | ||
_this.asp.progress({ | ||
what: 'compress', | ||
i: 0, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 94 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
@@ -243,6 +272,37 @@ }); | ||
return function() { | ||
if (typeof err === "undefined" || err === null) { | ||
_this.packets.push(opkt); | ||
} | ||
return cb(err); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._compress" | ||
}); | ||
pkt.write(esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return opkt = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 95 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._compress" | ||
}); | ||
_this.asp.progress({ | ||
what: 'compress', | ||
i: 1, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 96 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
_this.packets.push(opkt); | ||
return cb(null); | ||
}); | ||
}); | ||
}; | ||
@@ -262,3 +322,3 @@ })(this)); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._make_session_key" | ||
@@ -272,3 +332,3 @@ }); | ||
})(_this), | ||
lineno: 102 | ||
lineno: 105 | ||
})); | ||
@@ -306,14 +366,11 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
pub_k.pad_and_encrypt(payload, { | ||
fingerprint: fingerprint | ||
_this.asp.progress({ | ||
what: 'session key encrypt', | ||
i: 0, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return ekey = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 119 | ||
lineno: 122 | ||
}))); | ||
@@ -325,46 +382,113 @@ __iced_deferrals._fulfill(); | ||
(function(__iced_k) { | ||
if (_this.opts.hide) { | ||
key_id = dummy_key_id; | ||
(function(__iced_k) { | ||
var _ref3, _ref4; | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
ekey.hide({ | ||
max: (_ref3 = _this.opts.hide) != null ? _ref3.max : void 0, | ||
slosh: (_ref4 = _this.opts.hide) != null ? _ref4.slosh : void 0, | ||
key: pub_k | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 122 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(__iced_k); | ||
} else { | ||
return __iced_k(key_id = _this.encryption_key.get_key_id()); | ||
} | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
pub_k.pad_and_encrypt(payload, { | ||
fingerprint: fingerprint | ||
}, esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return ekey = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 123 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
pkt = new PKESK({ | ||
crypto_type: pub_k.type, | ||
key_id: key_id, | ||
ekey: ekey | ||
}); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
pkt.write(esc(__iced_deferrals.defer({ | ||
assign_fn: (function(__slot_1) { | ||
return function() { | ||
return __slot_1._pkesk = arguments[0]; | ||
}; | ||
})(_this), | ||
lineno: 130 | ||
_this.asp.progress({ | ||
what: 'session key encrypt', | ||
i: 1, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 124 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
return cb(null); | ||
(function(__iced_k) { | ||
if (_this.opts.hide) { | ||
key_id = dummy_key_id; | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
_this.asp.progress({ | ||
what: 'hide encryption', | ||
i: 0, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 127 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
(function(__iced_k) { | ||
var _ref3, _ref4; | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
ekey.hide({ | ||
max: (_ref3 = _this.opts.hide) != null ? _ref3.max : void 0, | ||
slosh: (_ref4 = _this.opts.hide) != null ? _ref4.slosh : void 0, | ||
key: pub_k | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 128 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
_this.asp.progress({ | ||
what: 'hide encryption', | ||
i: 1, | ||
total: 1 | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 129 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(__iced_k); | ||
}); | ||
}); | ||
} else { | ||
return __iced_k(key_id = _this.encryption_key.get_key_id()); | ||
} | ||
})(function() { | ||
pkt = new PKESK({ | ||
crypto_type: pub_k.type, | ||
key_id: key_id, | ||
ekey: ekey | ||
}); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_session_key" | ||
}); | ||
pkt.write(esc(__iced_deferrals.defer({ | ||
assign_fn: (function(__slot_1) { | ||
return function() { | ||
return __slot_1._pkesk = arguments[0]; | ||
}; | ||
})(_this), | ||
lineno: 137 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
return cb(null); | ||
}); | ||
}); | ||
}); | ||
@@ -377,3 +501,3 @@ }); | ||
Burner.prototype._encrypt_payload = function(cb) { | ||
var esc, pkt, plaintext, prefixrandom, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
var asp, esc, pkt, plaintext, prefixrandom, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
@@ -387,3 +511,3 @@ ___iced_passed_deferral = iced.findDeferral(arguments); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_payload" | ||
@@ -397,3 +521,3 @@ }); | ||
})(), | ||
lineno: 138 | ||
lineno: 145 | ||
})); | ||
@@ -405,6 +529,7 @@ __iced_deferrals._fulfill(); | ||
pkt = new SEIPD({}); | ||
asp = _this.asp.section('encrypt payload'); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_payload" | ||
@@ -415,5 +540,6 @@ }); | ||
plaintext: plaintext, | ||
prefixrandom: prefixrandom | ||
prefixrandom: prefixrandom, | ||
asp: asp | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 140 | ||
lineno: 148 | ||
}))); | ||
@@ -425,3 +551,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt_payload" | ||
@@ -435,3 +561,3 @@ }); | ||
})(), | ||
lineno: 141 | ||
lineno: 149 | ||
}))); | ||
@@ -458,7 +584,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt" | ||
}); | ||
_this._make_session_key(esc(__iced_deferrals.defer({ | ||
lineno: 150 | ||
lineno: 158 | ||
}))); | ||
@@ -472,7 +598,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt" | ||
}); | ||
_this._encrypt_session_key(esc(__iced_deferrals.defer({ | ||
lineno: 151 | ||
lineno: 159 | ||
}))); | ||
@@ -484,7 +610,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner._encrypt" | ||
}); | ||
_this._encrypt_payload(esc(__iced_deferrals.defer({ | ||
lineno: 152 | ||
lineno: 160 | ||
}))); | ||
@@ -511,7 +637,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner.burn" | ||
}); | ||
_this._find_keys(esc(__iced_deferrals.defer({ | ||
lineno: 163 | ||
lineno: 171 | ||
}))); | ||
@@ -525,7 +651,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner.burn" | ||
}); | ||
_this._frame_literals(esc(__iced_deferrals.defer({ | ||
lineno: 164 | ||
lineno: 172 | ||
}))); | ||
@@ -539,7 +665,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner.burn" | ||
}); | ||
_this._sign(esc(__iced_deferrals.defer({ | ||
lineno: 166 | ||
lineno: 174 | ||
}))); | ||
@@ -555,7 +681,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner.burn" | ||
}); | ||
_this._compress(esc(__iced_deferrals.defer({ | ||
lineno: 167 | ||
lineno: 175 | ||
}))); | ||
@@ -569,7 +695,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "Burner.burn" | ||
}); | ||
_this._encrypt(esc(__iced_deferrals.defer({ | ||
lineno: 169 | ||
lineno: 177 | ||
}))); | ||
@@ -613,6 +739,6 @@ __iced_deferrals._fulfill(); | ||
exports.burn = function(_arg, cb) { | ||
var aout, b, encrypt_for, encryption_key, err, literals, msg, opts, raw, sign_with, signing_key, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
var aout, asp, b, encrypt_for, encryption_key, err, literals, msg, opts, raw, sign_with, signing_key, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
msg = _arg.msg, literals = _arg.literals, sign_with = _arg.sign_with, encrypt_for = _arg.encrypt_for, signing_key = _arg.signing_key, encryption_key = _arg.encryption_key, opts = _arg.opts; | ||
msg = _arg.msg, literals = _arg.literals, sign_with = _arg.sign_with, encrypt_for = _arg.encrypt_for, signing_key = _arg.signing_key, encryption_key = _arg.encryption_key, asp = _arg.asp, opts = _arg.opts; | ||
if ((msg != null) && (literals == null)) { | ||
@@ -627,2 +753,3 @@ literals = make_simple_literals(msg); | ||
encryption_key: encryption_key, | ||
asp: asp, | ||
opts: opts | ||
@@ -634,3 +761,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/burner.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/burner.iced", | ||
funcname: "burn" | ||
@@ -645,3 +772,3 @@ }); | ||
})(), | ||
lineno: 229 | ||
lineno: 237 | ||
})); | ||
@@ -648,0 +775,0 @@ __iced_deferrals._fulfill(); |
// Generated by IcedCoffeeScript 1.7.1-c | ||
(function() { | ||
var AES, Base, Decryptor, Encryptor, SlicerBuffer, WordArray, decrypt, encrypt, repeat, rng, test, triplesec, | ||
var AES, ASP, Base, Decryptor, Encryptor, SlicerBuffer, WordArray, decrypt, encrypt, iced, make_esc, repeat, rng, test, triplesec, __iced_k, __iced_k_noop, | ||
__hasProp = {}.hasOwnProperty, | ||
__extends = function(child, parent) { for (var key in parent) { if (__hasProp.call(parent, key)) child[key] = parent[key]; } function ctor() { this.constructor = child; } ctor.prototype = parent.prototype; child.prototype = new ctor(); child.__super__ = parent.prototype; return child; }; | ||
iced = require('iced-runtime').iced; | ||
__iced_k = __iced_k_noop = function() {}; | ||
WordArray = require('triplesec').WordArray; | ||
@@ -15,2 +18,6 @@ | ||
ASP = require('pgp-utils').util.ASP; | ||
make_esc = require('iced-error').make_esc; | ||
repeat = function(b, n) { | ||
@@ -22,4 +29,4 @@ return Buffer.concat([b, b.slice(b.length - n)]); | ||
function Base(_arg) { | ||
var key; | ||
this.block_cipher_class = _arg.block_cipher_class, key = _arg.key, this.cipher = _arg.cipher, this.resync = _arg.resync; | ||
var asp, key; | ||
this.block_cipher_class = _arg.block_cipher_class, key = _arg.key, this.cipher = _arg.cipher, this.resync = _arg.resync, asp = _arg.asp; | ||
this.block_cipher_class || (this.block_cipher_class = AES); | ||
@@ -29,2 +36,3 @@ this.cipher || (this.cipher = new this.block_cipher_class(WordArray.from_buffer(key))); | ||
this.out_bufs = []; | ||
this.asp = ASP.make(asp); | ||
} | ||
@@ -47,4 +55,4 @@ | ||
function Encryptor(_arg) { | ||
var block_cipher_class, cipher, key, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync; | ||
var asp, block_cipher_class, cipher, key, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync, asp = _arg.asp; | ||
Encryptor.__super__.constructor.call(this, { | ||
@@ -54,3 +62,4 @@ block_cipher_class: block_cipher_class, | ||
cipher: cipher, | ||
resync: resync | ||
resync: resync, | ||
asp: asp | ||
}); | ||
@@ -119,5 +128,8 @@ this._init(prefixrandom); | ||
Encryptor.prototype.enc = function(plaintext) { | ||
var buf, ct, n_wanted, ret, sb, wa; | ||
Encryptor.prototype.enc = function(plaintext, cb) { | ||
var buf, ct, esc, j, n_wanted, ret, sb, total, wa, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
sb = new SlicerBuffer(plaintext); | ||
esc = make_esc(cb, "Encryptor::enc"); | ||
if (this.resync) { | ||
@@ -134,9 +146,74 @@ this._emit_sb(sb); | ||
} | ||
while (sb.rem()) { | ||
this._enc(); | ||
this._emit_sb(sb); | ||
} | ||
ret = this.compact(); | ||
n_wanted = plaintext.length + this.block_size + 2; | ||
return ret.slice(0, n_wanted); | ||
total = sb.rem(); | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced", | ||
funcname: "Encryptor.enc" | ||
}); | ||
_this.asp.progress({ | ||
what: "ofcb encryption", | ||
i: 0, | ||
total: total | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 168 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
(function(__iced_k) { | ||
var _results, _while; | ||
_results = []; | ||
_while = function(__iced_k) { | ||
var _break, _continue, _i, _next; | ||
_break = function() { | ||
return __iced_k(_results); | ||
}; | ||
_continue = function() { | ||
return iced.trampoline(function() { | ||
return _while(__iced_k); | ||
}); | ||
}; | ||
_next = function(__iced_next_arg) { | ||
_results.push(__iced_next_arg); | ||
return _continue(); | ||
}; | ||
if (!(j = sb.rem())) { | ||
return _break(); | ||
} else { | ||
for (_i = 0; _i < 4096; _i++) { | ||
_this._enc(); | ||
_this._emit_sb(sb); | ||
if (!(j = sb.rem())) { | ||
break; | ||
} | ||
} | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced", | ||
funcname: "Encryptor.enc" | ||
}); | ||
_this.asp.progress({ | ||
what: "ofcb encryption", | ||
i: total - j, | ||
total: total | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 177 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(_next); | ||
} | ||
}; | ||
_while(__iced_k); | ||
})(function() { | ||
ret = _this.compact(); | ||
n_wanted = plaintext.length + _this.block_size + 2; | ||
ret = ret.slice(0, n_wanted); | ||
return cb(null, ret); | ||
}); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -152,4 +229,4 @@ | ||
function Decryptor(_arg) { | ||
var block_cipher_class, cipher, key, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync, this.ciphertext = _arg.ciphertext; | ||
var asp, block_cipher_class, cipher, key, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync, this.ciphertext = _arg.ciphertext, asp = _arg.asp; | ||
Decryptor.__super__.constructor.call(this, { | ||
@@ -159,3 +236,4 @@ block_cipher_class: block_cipher_class, | ||
cipher: cipher, | ||
resync: resync | ||
resync: resync, | ||
asp: asp | ||
}); | ||
@@ -181,4 +259,4 @@ this._init(); | ||
Decryptor.prototype.check = function() { | ||
var ablock, i, iblock, lhs, rhs; | ||
Decryptor.prototype.check = function(cb) { | ||
var ablock, err, i, iblock, lhs, rhs; | ||
this.reset(); | ||
@@ -200,11 +278,10 @@ iblock = new WordArray((function() { | ||
rhs = (ablock.words[0] >>> 16) ^ (this.sb.peek_uint16()); | ||
if (lhs === rhs) { | ||
return null; | ||
} else { | ||
return new Error("Canary block mismatch: " + lhs + " != " + rhs); | ||
} | ||
err = lhs === rhs ? null : new Error("Canary block mismatch: " + lhs + " != " + rhs); | ||
return cb(err); | ||
}; | ||
Decryptor.prototype.dec = function() { | ||
var ablock, iblock, out; | ||
Decryptor.prototype.dec = function(cb) { | ||
var ablock, esc, iblock, j, out, total, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
this.reset(); | ||
@@ -215,14 +292,79 @@ if (this.resync) { | ||
iblock = this.next_block(); | ||
while (this.sb.rem()) { | ||
ablock = iblock; | ||
this.cipher.encryptBlock(ablock.words, 0); | ||
iblock = this.next_block(); | ||
ablock.xor(iblock, {}); | ||
this.out_bufs.push(ablock.to_buffer().slice(0, iblock.sigBytes)); | ||
} | ||
out = this.compact(); | ||
if (!this.resync) { | ||
out = out.slice(2); | ||
} | ||
return out; | ||
esc = make_esc(cb, "Decryption::dec"); | ||
total = this.sb.rem(); | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced", | ||
funcname: "Decryptor.dec" | ||
}); | ||
_this.asp.progress({ | ||
what: "ofcb decrypt", | ||
i: 0, | ||
total: total | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 239 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
(function(__iced_k) { | ||
var _results, _while; | ||
_results = []; | ||
_while = function(__iced_k) { | ||
var _break, _continue, _i, _next; | ||
_break = function() { | ||
return __iced_k(_results); | ||
}; | ||
_continue = function() { | ||
return iced.trampoline(function() { | ||
return _while(__iced_k); | ||
}); | ||
}; | ||
_next = function(__iced_next_arg) { | ||
_results.push(__iced_next_arg); | ||
return _continue(); | ||
}; | ||
if (!(j = _this.sb.rem())) { | ||
return _break(); | ||
} else { | ||
for (_i = 0; _i < 4096; _i++) { | ||
ablock = iblock; | ||
_this.cipher.encryptBlock(ablock.words, 0); | ||
iblock = _this.next_block(); | ||
ablock.xor(iblock, {}); | ||
_this.out_bufs.push(ablock.to_buffer().slice(0, iblock.sigBytes)); | ||
if (!(j = _this.sb.rem())) { | ||
break; | ||
} | ||
} | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced", | ||
funcname: "Decryptor.dec" | ||
}); | ||
_this.asp.progress({ | ||
what: "ofcb decrypt", | ||
i: total - j, | ||
total: total | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 251 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(_next); | ||
} | ||
}; | ||
_while(__iced_k); | ||
})(function() { | ||
out = _this.compact(); | ||
if (!_this.resync) { | ||
out = out.slice(2); | ||
} | ||
return cb(null, out); | ||
}); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -234,5 +376,5 @@ | ||
encrypt = function(_arg) { | ||
var block_cipher_class, cipher, eng, key, plaintext, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync, plaintext = _arg.plaintext; | ||
encrypt = function(_arg, cb) { | ||
var asp, block_cipher_class, cipher, eng, key, plaintext, prefixrandom, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, prefixrandom = _arg.prefixrandom, resync = _arg.resync, plaintext = _arg.plaintext, asp = _arg.asp; | ||
eng = new Encryptor({ | ||
@@ -243,10 +385,13 @@ block_cipher_class: block_cipher_class, | ||
prefixrandom: prefixrandom, | ||
resync: resync | ||
resync: resync, | ||
asp: asp | ||
}); | ||
return eng.enc(plaintext); | ||
return eng.enc(plaintext, cb); | ||
}; | ||
decrypt = function(_arg) { | ||
var block_cipher_class, cipher, ciphertext, eng, err, key, resync; | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, resync = _arg.resync, ciphertext = _arg.ciphertext; | ||
decrypt = function(_arg, cb) { | ||
var asp, block_cipher_class, cipher, ciphertext, eng, err, key, pt, resync, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
block_cipher_class = _arg.block_cipher_class, key = _arg.key, cipher = _arg.cipher, resync = _arg.resync, ciphertext = _arg.ciphertext, asp = _arg.asp; | ||
eng = new Decryptor({ | ||
@@ -257,9 +402,49 @@ block_cipher_class: block_cipher_class, | ||
resync: resync, | ||
ciphertext: ciphertext | ||
ciphertext: ciphertext, | ||
asp: asp | ||
}); | ||
err = eng.check(); | ||
if (err != null) { | ||
throw err; | ||
} | ||
return eng.dec(); | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced" | ||
}); | ||
eng.check(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return err = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 267 | ||
})); | ||
__iced_deferrals._fulfill(); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
(function(__iced_k) { | ||
if (typeof err === "undefined" || err === null) { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/ocfb.iced" | ||
}); | ||
eng.dec(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
err = arguments[0]; | ||
return pt = arguments[1]; | ||
}; | ||
})(), | ||
lineno: 268 | ||
})); | ||
__iced_deferrals._fulfill(); | ||
})(__iced_k); | ||
} else { | ||
return __iced_k(); | ||
} | ||
})(function() { | ||
return cb(err, pt); | ||
}); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -266,0 +451,0 @@ |
@@ -61,3 +61,3 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
}); | ||
@@ -70,3 +70,3 @@ inflater.write(buf, __iced_deferrals.defer({ | ||
})(), | ||
lineno: 42 | ||
lineno: 53 | ||
})); | ||
@@ -82,3 +82,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
}); | ||
@@ -108,3 +108,3 @@ inflater.end(err); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced" | ||
}); | ||
@@ -118,3 +118,3 @@ zlib.deflate(buf, __iced_deferrals.defer({ | ||
})(), | ||
lineno: 51 | ||
lineno: 62 | ||
})); | ||
@@ -170,3 +170,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.inflate" | ||
@@ -181,3 +181,3 @@ }); | ||
})(), | ||
lineno: 85 | ||
lineno: 96 | ||
})); | ||
@@ -188,7 +188,6 @@ __iced_deferrals._fulfill(); | ||
case C.compression.zip: | ||
console.log("ok, i'm unzipping now!"); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.inflate" | ||
@@ -203,3 +202,3 @@ }); | ||
})(), | ||
lineno: 88 | ||
lineno: 98 | ||
})); | ||
@@ -213,3 +212,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.inflate" | ||
@@ -224,3 +223,3 @@ }); | ||
})(), | ||
lineno: 90 | ||
lineno: 100 | ||
})); | ||
@@ -255,3 +254,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.deflate" | ||
@@ -266,3 +265,3 @@ }); | ||
})(), | ||
lineno: 102 | ||
lineno: 112 | ||
})); | ||
@@ -276,3 +275,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.deflate" | ||
@@ -287,3 +286,3 @@ }); | ||
})(), | ||
lineno: 104 | ||
lineno: 114 | ||
})); | ||
@@ -313,3 +312,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.write_unframed" | ||
@@ -324,3 +323,3 @@ }); | ||
})(_this), | ||
lineno: 113 | ||
lineno: 123 | ||
})); | ||
@@ -349,3 +348,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/compressed.iced", | ||
funcname: "Compressed.write" | ||
@@ -360,3 +359,3 @@ }); | ||
})(), | ||
lineno: 123 | ||
lineno: 133 | ||
})); | ||
@@ -363,0 +362,0 @@ __iced_deferrals._fulfill(); |
@@ -31,6 +31,13 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
Literal.prototype.toString = function() { | ||
return this.data.toString(this.buffer_format()); | ||
Literal.prototype.toString = function(encoding) { | ||
if (encoding == null) { | ||
encoding = null; | ||
} | ||
return this.data.toString(encoding || this.buffer_format()); | ||
}; | ||
Literal.prototype.toBuffer = function() { | ||
return this.data; | ||
}; | ||
Literal.prototype.buffer_format = function() { | ||
@@ -68,3 +75,3 @@ switch (this.format) { | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/packet/literal.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/literal.iced", | ||
funcname: "Literal.write" | ||
@@ -79,3 +86,3 @@ }); | ||
})(), | ||
lineno: 40 | ||
lineno: 41 | ||
})); | ||
@@ -82,0 +89,0 @@ __iced_deferrals._fulfill(); |
@@ -85,2 +85,7 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
Data.prototype.get_key_manager = function() { | ||
var _ref; | ||
return (_ref = this.sig) != null ? _ref.key_manager : void 0; | ||
}; | ||
return Data; | ||
@@ -87,0 +92,0 @@ |
// Generated by IcedCoffeeScript 1.7.1-c | ||
(function() { | ||
var C, Decryptor, MDC, MDC_Parser, PKESK, PKESK_Parser, Packet, SEIPD, SEIPD_Parser, SHA1, asymmetric, bufeq_fast, bufeq_secure, encrypt, iced, uint_to_buffer, __iced_k, __iced_k_noop, _ref, _ref1, | ||
var ASP, C, Decryptor, MDC, MDC_Parser, PKESK, PKESK_Parser, Packet, SEIPD, SEIPD_Parser, SHA1, asymmetric, bufeq_fast, bufeq_secure, encrypt, iced, make_esc, streamers, uint_to_buffer, __iced_k, __iced_k_noop, _ref, _ref1, _ref2, | ||
__hasProp = {}.hasOwnProperty, | ||
@@ -16,8 +16,12 @@ __extends = function(child, parent) { for (var key in parent) { if (__hasProp.call(parent, key)) child[key] = parent[key]; } function ctor() { this.constructor = child; } ctor.prototype = parent.prototype; child.prototype = new ctor(); child.__super__ = parent.prototype; return child; }; | ||
SHA1 = require('../../hash').SHA1; | ||
_ref = require('../../hash'), SHA1 = _ref.SHA1, streamers = _ref.streamers; | ||
_ref = require('../../util'), uint_to_buffer = _ref.uint_to_buffer, bufeq_secure = _ref.bufeq_secure, bufeq_fast = _ref.bufeq_fast; | ||
_ref1 = require('../../util'), uint_to_buffer = _ref1.uint_to_buffer, bufeq_secure = _ref1.bufeq_secure, bufeq_fast = _ref1.bufeq_fast; | ||
_ref1 = require('../ocfb'), encrypt = _ref1.encrypt, Decryptor = _ref1.Decryptor; | ||
_ref2 = require('../ocfb'), encrypt = _ref2.encrypt, Decryptor = _ref2.Decryptor; | ||
ASP = require('pgp-utils').util.ASP; | ||
make_esc = require('iced-error').make_esc; | ||
PKESK = (function(_super) { | ||
@@ -59,3 +63,3 @@ __extends(PKESK, _super); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/packet/sess.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "PKESK.write" | ||
@@ -70,3 +74,3 @@ }); | ||
})(), | ||
lineno: 34 | ||
lineno: 36 | ||
})); | ||
@@ -106,40 +110,126 @@ __iced_deferrals._fulfill(); | ||
SEIPD.prototype.decrypt = function(cipher) { | ||
var eng, err, mdc, plaintext, prefix, pt, _ref2; | ||
SEIPD.prototype.decrypt = function(_arg, cb) { | ||
var asp, cipher, eng, err, esc, mdc, plaintext, prefix, pt, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
cipher = _arg.cipher, asp = _arg.asp; | ||
eng = new Decryptor({ | ||
cipher: cipher, | ||
ciphertext: this.ciphertext | ||
ciphertext: this.ciphertext, | ||
asp: asp | ||
}); | ||
err = eng.check(); | ||
if (err != null) { | ||
throw err; | ||
} | ||
pt = eng.dec(); | ||
_ref2 = MDC.parse(pt), mdc = _ref2[0], plaintext = _ref2[1]; | ||
prefix = eng.get_prefix(); | ||
mdc.compute({ | ||
prefix: prefix, | ||
plaintext: plaintext | ||
}); | ||
if (!mdc.check()) { | ||
throw new Error("MDC mismatch"); | ||
} | ||
return plaintext; | ||
esc = make_esc(cb, "SEIPD::decrypt"); | ||
asp = ASP.make(asp); | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.decrypt" | ||
}); | ||
eng.check(esc(__iced_deferrals.defer({ | ||
lineno: 63 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.decrypt" | ||
}); | ||
eng.dec(esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return pt = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 64 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
var _ref3; | ||
_ref3 = MDC.parse(pt), mdc = _ref3[0], plaintext = _ref3[1]; | ||
prefix = eng.get_prefix(); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.decrypt" | ||
}); | ||
mdc.compute({ | ||
prefix: prefix, | ||
plaintext: plaintext, | ||
asp: asp | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 70 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
err = mdc.check() ? null : new Error("MDC mismatch"); | ||
return cb(err, plaintext); | ||
}); | ||
}); | ||
}; | ||
})(this)); | ||
}; | ||
SEIPD.prototype.encrypt = function(_arg, cb) { | ||
var cipher, mdc, mdc_buf, plaintext, prefixrandom; | ||
cipher = _arg.cipher, plaintext = _arg.plaintext, prefixrandom = _arg.prefixrandom; | ||
var asp, cipher, esc, mdc, mdc_buf, plaintext, prefixrandom, ___iced_passed_deferral, __iced_deferrals, __iced_k; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
cipher = _arg.cipher, plaintext = _arg.plaintext, prefixrandom = _arg.prefixrandom, asp = _arg.asp; | ||
mdc = new MDC({}); | ||
mdc_buf = mdc.compute({ | ||
plaintext: plaintext, | ||
prefix: prefixrandom | ||
}); | ||
plaintext = Buffer.concat([plaintext, MDC.header, mdc_buf]); | ||
this.ciphertext = encrypt({ | ||
cipher: cipher, | ||
plaintext: plaintext, | ||
prefixrandom: prefixrandom | ||
}); | ||
return cb(null); | ||
esc = make_esc(cb, "SEIPD::encrypt"); | ||
asp = ASP.make(asp); | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.encrypt" | ||
}); | ||
mdc.compute({ | ||
plaintext: plaintext, | ||
prefix: prefixrandom, | ||
asp: asp | ||
}, esc(__iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
return mdc_buf = arguments[0]; | ||
}; | ||
})(), | ||
lineno: 81 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
plaintext = Buffer.concat([plaintext, MDC.header, mdc_buf]); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.encrypt" | ||
}); | ||
encrypt({ | ||
cipher: cipher, | ||
plaintext: plaintext, | ||
prefixrandom: prefixrandom | ||
}, esc(__iced_deferrals.defer({ | ||
assign_fn: (function(__slot_1) { | ||
return function() { | ||
return __slot_1.ciphertext = arguments[0]; | ||
}; | ||
})(_this), | ||
lineno: 83 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(function() { | ||
return cb(null); | ||
}); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -163,3 +253,3 @@ | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/kbpgp/src/openpgp/packet/sess.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "SEIPD.write" | ||
@@ -174,3 +264,3 @@ }); | ||
})(), | ||
lineno: 90 | ||
lineno: 97 | ||
})); | ||
@@ -208,7 +298,70 @@ __iced_deferrals._fulfill(); | ||
MDC.prototype.compute = function(_arg) { | ||
var plaintext, prefix; | ||
plaintext = _arg.plaintext, prefix = _arg.prefix; | ||
this.computed = SHA1(Buffer.concat([prefix, prefix.slice(-2), plaintext, this.header])); | ||
return this.computed; | ||
MDC.prototype.compute = function(_arg, cb) { | ||
var asp, esc, hasher, i, plaintext, prefix, step, ___iced_passed_deferral, __iced_deferrals, __iced_k, _begin, _end, _positive; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
plaintext = _arg.plaintext, prefix = _arg.prefix, asp = _arg.asp; | ||
asp = ASP.make(asp); | ||
hasher = streamers.SHA1(); | ||
hasher.update(Buffer.concat([prefix, prefix.slice(-2)])); | ||
esc = make_esc(cb, "MDC::compute"); | ||
step = 0x100000; | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
var _i, _results, _while; | ||
i = 0; | ||
_begin = 0; | ||
_end = plaintext.length; | ||
_positive = _end > _begin; | ||
_results = []; | ||
_while = function(__iced_k) { | ||
var _break, _continue, _next; | ||
_break = function() { | ||
return __iced_k(_results); | ||
}; | ||
_continue = function() { | ||
return iced.trampoline(function() { | ||
if (_positive) { | ||
i += step; | ||
} else { | ||
i -= step; | ||
} | ||
return _while(__iced_k); | ||
}); | ||
}; | ||
_next = function(__iced_next_arg) { | ||
_results.push(__iced_next_arg); | ||
return _continue(); | ||
}; | ||
if (!!((_positive === true && i >= plaintext.length) || (_positive === false && i <= plaintext.length))) { | ||
return _break(); | ||
} else { | ||
hasher.update(plaintext.slice(i, i + step)); | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/packet/sess.iced", | ||
funcname: "MDC.compute" | ||
}); | ||
asp.progress({ | ||
what: "MDC", | ||
total: plaintext.length, | ||
i: i | ||
}, esc(__iced_deferrals.defer({ | ||
lineno: 122 | ||
}))); | ||
__iced_deferrals._fulfill(); | ||
})(_next); | ||
} | ||
}; | ||
_while(__iced_k); | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
hasher.update(_this.header); | ||
_this.computed = hasher(); | ||
return cb(null, _this.computed); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -215,0 +368,0 @@ |
// Generated by IcedCoffeeScript 1.7.1-c | ||
(function() { | ||
var C, KeyBlock, Message, OPS, Warnings, armor, athrow, bufeq_secure, do_message, hashmod, iced, import_key_pgp, konst, make_esc, parse, unix_time, util, verify_clearsign, verify_detached, __iced_k, __iced_k_noop, _ref; | ||
var C, KeyBlock, Message, OPS, Warnings, armor, athrow, bufeq_secure, do_message, hashmod, iced, import_key_pgp, katch, konst, make_esc, parse, unix_time, util, verify_clearsign, verify_detached, __iced_k, __iced_k_noop, _ref; | ||
@@ -16,3 +16,3 @@ iced = require('iced-runtime').iced; | ||
_ref = require('../util'), unix_time = _ref.unix_time, athrow = _ref.athrow, Warnings = _ref.Warnings, bufeq_secure = _ref.bufeq_secure; | ||
_ref = require('../util'), katch = _ref.katch, unix_time = _ref.unix_time, athrow = _ref.athrow, Warnings = _ref.Warnings, bufeq_secure = _ref.bufeq_secure; | ||
@@ -118,3 +118,3 @@ parse = require('./parser').parse; | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "KeyBlock.process" | ||
@@ -199,3 +199,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "KeyBlock._verify_sigs" | ||
@@ -269,3 +269,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._get_session_key" | ||
@@ -294,3 +294,3 @@ }); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._get_session_key" | ||
@@ -340,12 +340,39 @@ }); | ||
Message.prototype._decrypt_with_session_key = function(sesskey, edat, pkcs5, cb) { | ||
var cipher, e, err, ret; | ||
err = null; | ||
try { | ||
cipher = import_key_pgp(sesskey, pkcs5); | ||
ret = edat.decrypt(cipher); | ||
} catch (_error) { | ||
e = _error; | ||
err = e; | ||
} | ||
return cb(err, ret); | ||
var cipher, err, ret, ___iced_passed_deferral, __iced_deferrals, __iced_k, _ref1; | ||
__iced_k = __iced_k_noop; | ||
___iced_passed_deferral = iced.findDeferral(arguments); | ||
_ref1 = katch(function() { | ||
return import_key_pgp(sesskey, pkcs5); | ||
}), err = _ref1[0], cipher = _ref1[1]; | ||
(function(_this) { | ||
return (function(__iced_k) { | ||
if (err == null) { | ||
(function(__iced_k) { | ||
__iced_deferrals = new iced.Deferrals(__iced_k, { | ||
parent: ___iced_passed_deferral, | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._decrypt_with_session_key" | ||
}); | ||
edat.decrypt({ | ||
cipher: cipher | ||
}, __iced_deferrals.defer({ | ||
assign_fn: (function() { | ||
return function() { | ||
err = arguments[0]; | ||
return ret = arguments[1]; | ||
}; | ||
})(), | ||
lineno: 175 | ||
})); | ||
__iced_deferrals._fulfill(); | ||
})(__iced_k); | ||
} else { | ||
return __iced_k(); | ||
} | ||
}); | ||
})(this)((function(_this) { | ||
return function() { | ||
return cb(err, ret); | ||
}; | ||
})(this)); | ||
}; | ||
@@ -369,3 +396,3 @@ | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._decrypt" | ||
@@ -381,3 +408,3 @@ }); | ||
})(), | ||
lineno: 192 | ||
lineno: 189 | ||
}))); | ||
@@ -393,3 +420,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._decrypt" | ||
@@ -403,3 +430,3 @@ }); | ||
})(), | ||
lineno: 194 | ||
lineno: 191 | ||
}))); | ||
@@ -411,3 +438,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._decrypt" | ||
@@ -421,3 +448,3 @@ }); | ||
})(), | ||
lineno: 195 | ||
lineno: 192 | ||
}))); | ||
@@ -429,3 +456,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._decrypt" | ||
@@ -439,3 +466,3 @@ }); | ||
})(), | ||
lineno: 196 | ||
lineno: 193 | ||
}))); | ||
@@ -493,3 +520,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._inflate" | ||
@@ -503,3 +530,3 @@ }); | ||
})(), | ||
lineno: 206 | ||
lineno: 203 | ||
}))); | ||
@@ -513,3 +540,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._inflate" | ||
@@ -523,3 +550,3 @@ }); | ||
})(), | ||
lineno: 208 | ||
lineno: 205 | ||
}))); | ||
@@ -590,3 +617,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._verify_sig" | ||
@@ -602,3 +629,3 @@ }); | ||
})(), | ||
lineno: 246 | ||
lineno: 243 | ||
})); | ||
@@ -621,3 +648,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._verify_sig" | ||
@@ -631,3 +658,3 @@ }); | ||
})(), | ||
lineno: 257 | ||
lineno: 254 | ||
})); | ||
@@ -681,7 +708,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._verify" | ||
}); | ||
_this._verify_sig(sig, esc(__iced_deferrals.defer({ | ||
lineno: 267 | ||
lineno: 264 | ||
}))); | ||
@@ -725,7 +752,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process_generic" | ||
}); | ||
_this._decrypt(esc(__iced_deferrals.defer({ | ||
lineno: 280 | ||
lineno: 277 | ||
}))); | ||
@@ -739,7 +766,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process_generic" | ||
}); | ||
_this._inflate(esc(__iced_deferrals.defer({ | ||
lineno: 281 | ||
lineno: 278 | ||
}))); | ||
@@ -751,7 +778,7 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process_generic" | ||
}); | ||
_this._verify(esc(__iced_deferrals.defer({ | ||
lineno: 282 | ||
lineno: 279 | ||
}))); | ||
@@ -780,3 +807,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._verify_clearsign" | ||
@@ -795,3 +822,3 @@ }); | ||
})(), | ||
lineno: 291 | ||
lineno: 288 | ||
})); | ||
@@ -818,3 +845,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message.parse_and_process" | ||
@@ -828,3 +855,3 @@ }); | ||
})(), | ||
lineno: 298 | ||
lineno: 295 | ||
}))); | ||
@@ -838,3 +865,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message.parse_and_process" | ||
@@ -851,3 +878,3 @@ }); | ||
})(), | ||
lineno: 299 | ||
lineno: 296 | ||
}))); | ||
@@ -875,3 +902,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._verify_signature" | ||
@@ -890,3 +917,3 @@ }); | ||
})(), | ||
lineno: 308 | ||
lineno: 305 | ||
})); | ||
@@ -917,3 +944,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process" | ||
@@ -930,3 +957,3 @@ }); | ||
})(), | ||
lineno: 317 | ||
lineno: 314 | ||
})); | ||
@@ -940,3 +967,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process" | ||
@@ -954,3 +981,3 @@ }); | ||
})(), | ||
lineno: 319 | ||
lineno: 316 | ||
})); | ||
@@ -964,3 +991,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced", | ||
funcname: "Message._process" | ||
@@ -977,3 +1004,3 @@ }); | ||
})(), | ||
lineno: 321 | ||
lineno: 318 | ||
})); | ||
@@ -1027,3 +1054,3 @@ __iced_deferrals._fulfill(); | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/processor.iced" | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/processor.iced" | ||
}); | ||
@@ -1037,3 +1064,3 @@ proc.parse_and_process(msg, __iced_deferrals.defer({ | ||
})(), | ||
lineno: 359 | ||
lineno: 356 | ||
})); | ||
@@ -1040,0 +1067,0 @@ __iced_deferrals._fulfill(); |
@@ -33,3 +33,3 @@ // Generated by IcedCoffeeScript 1.7.1-c | ||
parent: ___iced_passed_deferral, | ||
filename: "/Users/max/src/keybase/kbpgp/src/openpgp/verifier.iced", | ||
filename: "/home/max/src/keybase/kbpgp/src/openpgp/verifier.iced", | ||
funcname: "Base._fetch_key" | ||
@@ -36,0 +36,0 @@ }); |
@@ -10,3 +10,3 @@ { | ||
"author": "Maxwell Krohn", | ||
"version": "0.3.1", | ||
"version": "0.3.2", | ||
"license": "BSD-3-Clause", | ||
@@ -32,3 +32,3 @@ "main": "./lib/main.js", | ||
"purepack": ">=1.0.1", | ||
"triplesec": ">=3.0.16" | ||
"triplesec": ">=3.0.18" | ||
}, | ||
@@ -35,0 +35,0 @@ "devDependencies": { |
@@ -5,11 +5,11 @@ ##### Signed by https://keybase.io/max | ||
Version: GnuPG/MacGPG2 v2.0.22 (Darwin) | ||
Comment: GPGTools - https://gpgtools.org | ||
Comment: GPGTools - http://gpgtools.org | ||
iQEcBAABCgAGBQJT4lCLAAoJEJgKPw0B/gTfaqkIAL4jRYcdcZ3ew5lh1N+WIucT | ||
YJ2ZdFYZywdbXD4AP6Skocl74Bd24A2B7owyCKWT82uKov71NNp6hOUklRRFMygA | ||
Vq7Wz6JgT2sDn83egIXq4Jf0UKocO6gTaJOnlrZfJUpJWHMDDVRAlLpiso/5512F | ||
sZY+W/yOlOsC9wZrPMAjXRD3iWYaYOaKPq+/24kv75lhs6O917ZXqVsh8ln92xuv | ||
ubWZ1rpDydRB3OudIxEDTl7lPiBMSo0yctEs7r4Wc2VEAGMCnd84nEG9tJK56UV7 | ||
9cQi6Mh8IMhmy/ZNoK/bLmt/aDPLogmL2Hqtd8ZEhCaaeVEpsAAlCmpOF5PO83c= | ||
=tiGY | ||
iQEcBAABAgAGBQJT72JZAAoJEJgKPw0B/gTfATMIALWz8ezKxTnhukDUjrX0NTV1 | ||
5imQ34v3goUa539ZchdYC1u8t5c/4M4Z+FukH0bCm1H6SKsnFvCB7/4Q+aGN9X4S | ||
TvalUyXWV5EqM64pGKMmCKLgQWxpuueJhrP62y2e92nz1aFUpSeHfGUsE9rM81+z | ||
GcQXiJjQS5ep0tDXshTat13xe4pN/F61DIXnxd1QNzDP06c+047EBmDy7AVd0MkR | ||
Ori29SIeW46N57HZq5abj/vGfwX4A7gII6tI3Ok6Do04nDSKiVRykGfjydSGBsx+ | ||
dbQsUmozsMHTFNnv1GlRhxpIWhjKcf/uaxf/NjBimYcRUKvHsmhjmrDkUQkd4PA= | ||
=hSwV | ||
-----END PGP SIGNATURE----- | ||
@@ -30,3 +30,3 @@ | ||
31 .npmignore 18894d4475fffb5e284a7bdfb00a9633ffdd660396a780b7fc5e14f013f95783 | ||
8984 CHANGELOG.md 86ab92244d9c79723a5b6ba218666fc795a47b1d390048d775e886dc0d4481ce | ||
9500 CHANGELOG.md f15a489cda8441de953e266d63edbb68da8d418b950ce93a3ab4b717fa33c375 | ||
1483 LICENSE 333be7050513d91d9e77ca9acb4a91261721f0050209636076ed58676bfc643d | ||
@@ -88,12 +88,12 @@ 2759 Makefile 79277def75623d4146be210a7f3f3cf6d7839e2d95df434430fa8c5b58c7ce2f | ||
330 keyfetch.js f8c05474c9e37b5d11c4ec991f20958d6f308a96703dfa939f3c85b9f6f19bc7 | ||
57080 keymanager.js 8927c6c28f5f32b5404a2f8c15d9d631e7dee97dc46d14e4d015cc4df8aa5d5d | ||
58216 keymanager.js 122e4b990082f169c0f9002b50279eb649ed6ab1c30a06a59ffb57e09aacd9f1 | ||
2641 keyring.js df5afbb75be8b00a6a6326ce7615bf813a4ba65794d44bc3a4e3c7c4b9a1e437 | ||
2224 keywrapper.js 04d92f8ae35e6321cbc8a312942915f7ea72f4c710031b5246b7d0b935fb805c | ||
3195 lock.js 597a7bf31a347553bf4a4f7c9628edde1196f4b0a4f11d8b4e162d833f4e540c | ||
856 main.js f5c3573a3bc18e3d02474f062c8b35a56b7f590e32d717668c2d5bd127b0b8f9 | ||
901 main.js fbabe7a53ff0d5efd64b36705152074023c394aeaa72066529cae34ae7c5577e | ||
openpgp/ | ||
2533 armor.js 45b5677fcbd83a729b216a3615459d5f65e3a3fd8754a2bab0c6bdae2c6f300b | ||
3569 baseburner.js 6166d63241b17a24076ed33d23ad4b6266486724330f41dc96def21af99a1179 | ||
3693 baseburner.js d69bddd376c13c8df81d823f7c206aca5b54123e280819fa29ef3f9d313d00f0 | ||
3407 buffer.js f35590b328b6b8671516607691f9ef0695115c7ab5d1a10459326e50eb426c8f | ||
22544 burner.js 7b8eed96ea72399271428332c6a4e53aa6cbdc7d84cc14c3de4ab70e15f1feeb | ||
27905 burner.js b58b435cce41bfc16c5b8ba972efb1dea5f62aa453bb4bb8636413d797b28c0f | ||
36498 cast5.js 6f5dd34f8e223fa58d6cd6f0c4fb3de322e5e708eb7b0becb9cfd61005d93b62 | ||
@@ -104,13 +104,13 @@ 2485 cfb.js 965f142ee47a889b3dc5284061a674145aff2cbdff910563d949e6c8e808513a | ||
2294 hilev.js f18ec73b060130fd74955b1433221f8e1714414db6543b08e681e0ae1c0909e1 | ||
8958 ocfb.js 26ca754f440a21c27ed34c5db8fbfbe74c870bd4d94870e4b7f3d7c55d3b027e | ||
15859 ocfb.js 48059a052b678e815d48e47fd863fec8606b4d5606970899ceec577b0b311884 | ||
packet/ | ||
238 all.js b3107bcc0993a1a9848e6a08a30a32dae36323f65385cdc4df355cac3cbf91f0 | ||
2224 base.js c7c55e94b808e996982bd9d2d00cc0aa5ae9eb74e5a3782ef0a7166c995601b0 | ||
12907 compressed.js ee7aadf37fa13cd2440b24855b6dcea631ed27a0288d3f831191f80878f38350 | ||
12845 compressed.js 9821196d59129bc45159b035f68cdc95a4cb92e9307b49323b7d6c54aa0a9782 | ||
681 generic.js b71bde7d0b2327dbc2f270cd06336cd9eff38e026b69d83a33f87d043d9c672a | ||
27589 keymaterial.js 2190e4c89884b56af4cbfb8c55d5f6a0b1d0161e1ababdbd8a18bdd9d2364cfb | ||
4256 literal.js 8927b88c3c1b0071c0ceacc41d900c315b3ba2a55024e4ee7297307826c82531 | ||
4424 literal.js 9e56f1991ba15e3ff07ba67fa48180bb86ab84106b998932e7e9fcc90c2cd6f2 | ||
3804 one_pass_sig.js 0c10840149552af05a0c98690b8dfcc05c60de308be7a09cd1748c50909cddd9 | ||
4785 packetsigs.js 0f7041ca085ce3eb25dbb6fe7945bbf1f75a1bbea37661ef04611ff950e2af79 | ||
8393 sess.js 5b9a1cde400b9680a66b6d17d3cb328d31748f33c10adf748f753885293b924b | ||
4927 packetsigs.js 05e94c79edb8adcba2e6da44225e9aed09f9ff8d03b15bfeb2eda123a296ec89 | ||
14279 sess.js 25a1ba963ebdd58e3426ff5b2948a7e7114f08f77078cb4fcd81b655283527fa | ||
43593 signature.js a8b2c1eadce7616bac958b03f36fd5bb9237b2f5095b05ed67e29e020d99e6fe | ||
@@ -120,6 +120,6 @@ 1781 user_attribute.js a8121babda05665b05e742e71aa020abedd2cf18aac20f7950363f2626d34957 | ||
5807 parser.js 832fea89ecc84b4a38ef0c51a8792bebd4d4a579d99bb4465f2ec4b7a1c6c0a4 | ||
36533 processor.js 1e63e55e74b08be28ffe9f7f0c476f8de31f0a1cde49b141c7e447f94eb57371 | ||
37624 processor.js c74b85b99275dc71f7a9033b58b160829ccb79e84290ef374dc9035b3be07176 | ||
4404 s2k.js 7af616feea0983261ccc5e84164eccd947e505798ff3043012c444460d4b0dcd | ||
1547 util.js c10cd4d3cc3e7b231bb81db7af9ea72abb925ab33c8b0ae4fc3b11a4f2ecf380 | ||
2097 verifier.js cd08c5424b6b1d174f5c8a3686dc877c33bb8df9649492dbff6008edee85eb72 | ||
2096 verifier.js d54bad151e7e7de7b72d37a45aa840937cb177c96464a63da92a364306eb6432 | ||
8387 pad.js 0a23379c02219bc0deef51b671bc114bf46aedd6d023577f1d6065714eaf9682 | ||
@@ -133,3 +133,3 @@ 17446 primegen.js 7dc276b57b09ba87e8a4c39dc884dae686b9802e4e54a8208de8c8938360c807 | ||
308 util.js 09c0292aca20f6e8f32989db027b2fa9ce46a8cd26893d0550de57eb852b429c | ||
1002 package.json 56a51c154d1e071b2bb6027308bd7067f16c16b387c71d2b2b8fc734cc91e45d | ||
1002 package.json 30a9fefdb10f64d6bf533ee52df8ef0da10e5fc0fa63d76e2c007aedeacf6f1e | ||
ref/ | ||
@@ -177,12 +177,12 @@ 239671 nist-curves.pdf f42d43be9a49de789ca6dd2539258825187628e391fe0c225a1e5af4bf32e107|abd5e66e46aa8f1005a942a39acba0e7950cc7d6fec09dec80526aede74a2f7c | ||
856 keyfetch.iced 10037e667a57ab8bd04d8239836c4d3e97ebe2fc72166020ab4f73203d6a1963 | ||
22367 keymanager.iced 5431950f8ca8033906c0912d1a1316bc8ffcbe516d1c06111b3a155c21968b63 | ||
23220 keymanager.iced 1972f1527f7a4e0cb4711119660bc927f2382f93f1c0e2825d8cc46e32470769 | ||
1626 keyring.iced 8357f83439f997d056163b79ff315a2a46e540c24e904422588520d043c18de9 | ||
1475 keywrapper.iced c4a522c888684a1a05b93e8faffdd3589eff9cc12fe98b62146194849dfb4128 | ||
1943 lock.iced 69ffa5d4715acb25f06cbf4853dc50aa4124a3be00db6677321a9cecf715d37f | ||
776 main.iced 6cfa50e2a4998c77a4cd442e4d6f9b12030cad34f1073ca9fb4191a794b7dafb | ||
820 main.iced 8942212ea84ed1dbf26ebfecfac5e1449c4ac162dda35fc8ed08c5e5f20e55d0 | ||
openpgp/ | ||
1860 armor.iced 844940075a814c94776068adf27d101f1e7023554bd12954b0a3923164600dcc | ||
1421 baseburner.iced 834887c1edec4e3d3385469c4c4591f6a19e38eed54f118916002b8f323a6c76 | ||
1484 baseburner.iced 0b91f43b55f3818271cb22d78690023ff60928fa279aa8211cfa23c10c1f623c | ||
1972 buffer.iced f7869b08373cc7f603af1056c2a0e70eef20978217a05335df08be495f05b683 | ||
7502 burner.iced c0b20aaca1e117d5325c5f59583038f1bc0ff02f727e68e5567ab0ed60723c07 | ||
8205 burner.iced 5bdc02702376e4f20cd5f40dc09695fc7c8b273010544bc1efc13f88fb9fec61 | ||
35636 cast5.iced 9931b6c18476e8ee81b4597b10fe4dd95ba647e5370667cbb2505e633138b82e | ||
@@ -193,3 +193,3 @@ 2500 cfb.iced a1a9d1aa336d99bb69de44cc77e925336fd0b2299c627290afead87d9aae204e | ||
705 hilev.iced 83dea830c28f5551b6c0ff492cf50de7a50ebc6242572c4f900d07a0a530cd87 | ||
8588 ocfb.iced 75e81214a67a59ac6e104e4bfb613dfd2a4941a5a882818b6f24e8f8cc36e686 | ||
9418 ocfb.iced 907951ce199b0e59b0e4d21b503f910aaa3a1c9bc57994d3437f333e3be902fb | ||
packet/ | ||
@@ -201,6 +201,6 @@ 157 all.iced 42724a5bfbf1329c4932e74ba60ec0cda51f4b8a1062e34d41abf6773275c09b | ||
16229 keymaterial.iced 4c4d3f3158b8550046e80864d25ebf9180850b3a6b77fa08309584a9f25f6469 | ||
2142 literal.iced a7aed106cadb16882dd9f60143c99db62570571ee3e8fff987f0a8926c16ad40 | ||
2193 literal.iced f6424f833f745fdb4287d0ab0ed1a5e43e0a53e9dc3bc9b5095951d155399bbb | ||
2115 one_pass_sig.iced d0e2d1a35b42e9e92205ffe4651b7b650f5395a9b1f60dbe85f8c8c3cd8911b1 | ||
3080 packetsigs.iced 76216495f471ca7151e64e36da288a5f73a251dd1daaa088e4844d9a234ee8ac | ||
4923 sess.iced 9bd44065c82d2599128b545c311c8152e089a842394a4cab54914f6f8bea2900 | ||
3117 packetsigs.iced 8ac7e620eb240a980ad75bd340fa21287e18677d3ea31c2cfab9ad91617c364e | ||
5607 sess.iced 8867703460996686a50e30686fc976610c4f92a43e725872e99dce314ee71b63 | ||
21235 signature.iced 398dbe75e949fa14d5bb3d56b218ad261c47c83a90b586e7872d30dabf02954b | ||
@@ -210,3 +210,3 @@ 1322 user_attribute.iced 1a478736ca1a087fd544fe73afdd2028203e5ef176f3bb41faa9f75381e04611 | ||
4149 parser.iced 54a415da348c62680a7876fe1fd8b4641c01cffe23dfd068cbe1f7b831d4c8d7 | ||
11002 processor.iced 8d0f0dde59c1dfe491bd2605c5f87b2430b6353882cd7a53c13cdd9e6dd3d9a5 | ||
11009 processor.iced e0643d6e149d98218fc461537f27885e8007dc97a1a1fbc7149635677659287b | ||
5937 s2k.iced af09de1da25cea11e0cdda54c78ba8f6ec3b13a6af6f9e6e66853cbca4c22426 | ||
@@ -245,4 +245,4 @@ 1795 util.iced 267788a2659c0850edc8019a71f67ab53a0913031c98920f5ad32eeddc287693 | ||
7114 decoder.iced f5862f9073dd00e1cd37e3dd1d9f1d8daea9ae66e652730e3b7c2080cc91b4c5 | ||
17586 decrypt_verify_msg.iced a30cae39a845efa5061f1b4c5935f3336d7d67b3154859bdd3c921ae1e558f58 | ||
4394 dsa.iced 79b8648a559bbf8b3ae38ceddd33320473cec8ebcacd14a11f232ffae4bca920 | ||
17584 decrypt_verify_msg.iced c00ef85f2f7166db859cbd8400df1d09f69c103853b95f77f5a7d845f39c01f8 | ||
4396 dsa.iced 51c628e28c7e52a1a2ec75e6bdba9ebfd16329c9dae59bc0e82d54e2fb38610e | ||
10269 ecc1.iced 1cbbf415bfeedff0182ac4897dfc37417b92124a7e501c3de383e843462d2285 | ||
@@ -249,0 +249,0 @@ 5626 ecc2.iced 769b221f770301a7d8b97724eb020b4a7e6e97a0cf61ae1237c730afed1debc1|a9b21d5854c38808dd3b5c2156704891b26f73e6943f9c375d1fb51207745d68 |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
1043693
15242
Updatedtriplesec@>=3.0.18