Revision control

Copy as Markdown

Other Tools

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
/* eslint-enable valid-jsdoc */
const lazy = {};
ChromeUtils.defineESModuleGetters(lazy, {
});
ChromeUtils.defineLazyGetter(lazy, "l10n", () => {
return new Localization(["messenger/openpgp/openpgp.ftl"], true);
});
export var EnigmailKey = {
/**
* Format a key fingerprint
*
* @param {string} fingerprint - Unformatted OpenPGP fingerprint.
* @returns {string} The formatted string.
*/
formatFpr(fingerprint) {
let r = "";
const fpr = fingerprint.match(
/(....)(....)(....)(....)(....)(....)(....)(....)(....)?(....)?/
);
if (fpr && fpr.length > 2) {
fpr.shift();
r = fpr.join(" ");
}
return r;
},
/**
* Extract the public key from a status message.
*
* @param {string} statusMsg
* @returns {?string} the public key, if one is found.
*/
extractPubkey(statusMsg) {
const matchb = statusMsg.match(/(^|\n)NO_PUBKEY (\w{8})(\w{8})/);
if (matchb && matchb.length > 3) {
return matchb[2] + matchb[3];
}
return null;
},
/**
* Import a revocation certificate form a given keyblock string.
* Ask the user before importing the cert, and display an error
* message in case of failures.
*
* @param {string} keyId - The keyID to import for.
* @param {string} keyBlockStr - The key block to import from.
*/
importRevocationCert(keyId, keyBlockStr) {
const key = lazy.EnigmailKeyRing.getKeyById(keyId);
if (key) {
if (key.keyTrust === "r") {
// Key has already been revoked
lazy.l10n
.formatValue("revoke-key-already-revoked", {
keyId,
})
.then(value => {
Services.prompt.alert(null, null, value);
});
} else {
const userId = key.userId + " - 0x" + key.keyId;
if (
Services.prompt.confirmEx(
null,
null,
lazy.l10n.formatValueSync("revoke-key-question", { userId }),
Services.prompt.STD_OK_CANCEL_BUTTONS,
lazy.l10n.formatValueSync("key-man-button-revoke-key"),
null,
null,
null,
{}
)
) {
return;
}
const errorMsgObj = {};
// TODO this will certainly not work yet, because RNP requires
// calling a different function for importing revocation
// signatures, see RNP.importRevImpl
if (
lazy.EnigmailKeyRing.importKey(
null,
false,
keyBlockStr,
false,
keyId,
errorMsgObj
) > 0
) {
Services.prompt.alert(null, null, errorMsgObj.value);
}
}
} else {
// Suitable key for revocation certificate is not present in keyring
lazy.l10n
.formatValue("revoke-key-not-present", {
keyId,
})
.then(value => {
Services.prompt.alert(null, null, value);
});
}
},
_keyListCache: new Map(),
_keyListCacheMaxEntries: 50,
_keyListCacheMaxKeySize: 30720,
/**
* Get details (key ID, UID) of the data contained in a OpenPGP key block
*
* @param {string} keyBlockStr - the contents of one or more public keys
* @param {object} errorMsgObj - obj.value will contain an error message in case of failures
* @param {boolean} interactive - if in interactive mode, may display dialogs (default: true)
* @param {boolean} pubkey - load public keys from the given block
* @param {boolean} seckey - load secret keys from the given block
* @param {boolean} [withPubKey=false] - If true, an additional attribute
* "pubKey" will be added to each returned KeyObj, which will
* contain an ascii armor copy of the public key.
*
* @returns {object[]} objects - An array of objects.
* @returns {string} objects[].id - Key ID.
* @returns {string} objects[].fpr - Fingerprint.
* @returns {string} objects[].name - The UID of the key.
* @returns {"old"|"new"|"invalid"} objects[].state - One of:
* - "old" [existing key]
* - "new" [new key]
* - "invalid" [key cannot not be imported]
*/
async getKeyListFromKeyBlock(
keyBlockStr,
errorMsgObj,
interactive,
pubkey,
seckey,
withPubKey = false
) {
errorMsgObj.value = "";
const cacheEntry = this._keyListCache.get(keyBlockStr);
if (cacheEntry) {
// Remove and re-insert to move entry to the end of insertion order,
// so we know which entry was used least recently.
this._keyListCache.delete(keyBlockStr);
this._keyListCache.set(keyBlockStr, cacheEntry);
if (cacheEntry.error) {
errorMsgObj.value = cacheEntry.error;
return null;
}
return cacheEntry.data;
}
// We primarily want to cache single keys that are found in email
// attachments. We shouldn't attempt to cache larger key blocks
// that are likely arriving from explicit import attempts.
const updateCache = keyBlockStr.length < this._keyListCacheMaxKeySize;
if (
updateCache &&
this._keyListCache.size >= this._keyListCacheMaxEntries
) {
// Remove oldest entry, make room for new entry.
this._keyListCache.delete(this._keyListCache.keys().next().value);
}
let keyList;
let key = {};
let blocks;
errorMsgObj.value = "";
try {
keyList = await lazy.RNP.getKeyListFromKeyBlockImpl(
keyBlockStr,
pubkey,
seckey,
true,
withPubKey
);
} catch (ex) {
errorMsgObj.value = ex.toString();
if (updateCache && !withPubKey) {
this._keyListCache.set(keyBlockStr, {
error: errorMsgObj.value,
data: null,
});
}
return null;
}
if (!keyList) {
if (updateCache) {
this._keyListCache.set(keyBlockStr, { error: undefined, data: null });
}
return null;
}
if (interactive && keyList.length === 1) {
// TODO: not yet tested
key = keyList[0];
if ("revoke" in key && !("name" in key)) {
if (updateCache) {
this._keyListCache.set(keyBlockStr, { error: undefined, data: [] });
}
this.importRevocationCert(key.id, blocks.join("\n"));
return [];
}
}
if (updateCache) {
this._keyListCache.set(keyBlockStr, { error: undefined, data: keyList });
}
return keyList;
},
/**
* Get details of a key block to import. Works identically as getKeyListFromKeyBlock();
* except that the input is a file instead of a string
*
* @param {nsIFile} file - The file to read.
* @param {object} errorMsgObj - Object; obj.value will contain error message.
* @param {boolean} pubkey - Load public keys.
* @param {boolean} seckey - Load secret keys.
* @param {boolean} [withPubKey=false] - If true, an additional attribute
* "pubKey" will be added to each returned KeyObj, which will
* contain an ascii armor copy of the public key.
* @returns {object[]} An array of objects; see getKeyListFromKeyBlock()
*/
async getKeyListFromKeyFile(
file,
errorMsgObj,
pubkey,
seckey,
withPubKey = false
) {
const data = await IOUtils.read(file.path);
const contents = lazy.MailStringUtils.uint8ArrayToByteString(data);
return this.getKeyListFromKeyBlock(
contents,
errorMsgObj,
true,
pubkey,
seckey,
withPubKey
);
},
/**
* Compare 2 KeyIds of possible different length (short, long, FPR-length,
* with or without prefixed 0x are accepted).
*
* @param {string} keyId1 - First key to compare.
* @param {string} keyId2 - Second key to compare.
* @returns {boolean} true if the keyIDs are the same.
*/
compareKeyIds(keyId1, keyId2) {
var keyId1Raw = keyId1.replace(/^0x/, "").toUpperCase();
var keyId2Raw = keyId2.replace(/^0x/, "").toUpperCase();
var minlength = Math.min(keyId1Raw.length, keyId2Raw.length);
if (minlength < keyId1Raw.length) {
// Limit keyId1 to minlength
keyId1Raw = keyId1Raw.substr(-minlength, minlength);
}
if (minlength < keyId2Raw.length) {
// Limit keyId2 to minlength
keyId2Raw = keyId2Raw.substr(-minlength, minlength);
}
return keyId1Raw === keyId2Raw;
},
};