27
27
// options for ESLint
28
28
/* eslint strict: ["warn", "function"] */
29
29
/* global Components, Services */
30
- /* global Logging, Key, Policy, msgReader, rfcParser */
30
+ /* global Logging, Key, Policy, msgReader, rfcParser, PREF */
31
31
/* global dkimStrings, addrIsInDomain2, domainIsInDomain, stringEndsWith, stringEqual, writeStringToTmpFile, toType, DKIM_SigError, DKIM_TempError, DKIM_Error, copy */
32
32
/* exported EXPORTED_SYMBOLS, Verifier */
33
33
@@ -325,13 +325,13 @@ var Verifier = (function() {
325
325
} else if ( keyInfo . keyLength < 2048 ) {
326
326
// weak key
327
327
switch ( prefs . getIntPref ( "error.algorithm.rsa.weakKeyLength.treatAs" ) ) {
328
- case 0 : // error
328
+ case PREF . TREATAS . ERROR :
329
329
throw new DKIM_SigError ( "DKIM_SIGWARNING_KEY_IS_WEAK" ) ;
330
- case 1 : // warning
330
+ case PREF . TREATAS . WARNING :
331
331
warnings . push ( { name : "DKIM_SIGWARNING_KEY_IS_WEAK" } ) ;
332
332
log . debug ( "Warning: DKIM_SIGWARNING_KEY_IS_WEAK" ) ;
333
333
break ;
334
- case 2 : // ignore
334
+ case PREF . TREATAS . NOTHING :
335
335
break ;
336
336
default :
337
337
throw new Error ( "invalid error.algorithm.rsa.weakKeyLength.treatAs" ) ;
@@ -470,12 +470,12 @@ var Verifier = (function() {
470
470
// all is fine, nothing to do at the moment
471
471
} else if ( algorithmTag [ 0 ] === "rsa-sha1" ) {
472
472
switch ( prefs . getIntPref ( "error.algorithm.sign.rsa-sha1.treatAs" ) ) {
473
- case 0 : // error
473
+ case PREF . TREATAS . ERROR :
474
474
throw new DKIM_SigError ( "DKIM_SIGERROR_INSECURE_A" ) ;
475
- case 1 : // warning
475
+ case PREF . TREATAS . WARNING :
476
476
DKIMSignature . warnings . push ( { name : "DKIM_SIGERROR_INSECURE_A" } ) ;
477
477
break ;
478
- case 2 : // ignore
478
+ case PREF . TREATAS . NOTHING :
479
479
break ;
480
480
default :
481
481
throw new Error ( "invalid error.algorithm.sign.rsa-sha1.treatAs" ) ;
@@ -615,12 +615,12 @@ var Verifier = (function() {
615
615
exception . errorType === "DKIM_SIGERROR_ILLFORMED_I" )
616
616
{
617
617
switch ( prefs . getIntPref ( "error.illformed_i.treatAs" ) ) {
618
- case 0 : // error
618
+ case PREF . TREATAS . ERROR :
619
619
throw exception ;
620
- case 1 : // warning
620
+ case PREF . TREATAS . WARNING :
621
621
DKIMSignature . warnings . push ( { name : "DKIM_SIGERROR_ILLFORMED_I" } ) ;
622
622
break ;
623
- case 2 : // ignore
623
+ case PREF . TREATAS . NOTHING :
624
624
break ;
625
625
default :
626
626
throw new Error ( "invalid error.illformed_i.treatAs" ) ;
@@ -675,12 +675,12 @@ var Verifier = (function() {
675
675
var sub_domain_ = "(?:[A-Za-z0-9_](?:[A-Za-z0-9_-]*[A-Za-z0-9_])?)" ;
676
676
SelectorTag = rfcParser . parseTagValue ( tagMap , "s" , `${ sub_domain_ } (?:\\.${ sub_domain_ } )*` ) ;
677
677
switch ( prefs . getIntPref ( "error.illformed_s.treatAs" ) ) {
678
- case 0 : // error
678
+ case PREF . TREATAS . ERROR :
679
679
throw exception ;
680
- case 1 : // warning
680
+ case PREF . TREATAS . WARNING :
681
681
DKIMSignature . warnings . push ( { name : "DKIM_SIGERROR_ILLFORMED_S" } ) ;
682
682
break ;
683
- case 2 : // ignore
683
+ case PREF . TREATAS . NOTHING :
684
684
break ;
685
685
default :
686
686
throw new Error ( "invalid error.illformed_s.treatAs" ) ;
@@ -1168,13 +1168,13 @@ var Verifier = (function() {
1168
1168
// if key is not signed by DNSSEC
1169
1169
if ( ! DKIMSignature . keyQueryResult . secure ) {
1170
1170
switch ( prefs . getIntPref ( "error.policy.key_insecure.treatAs" ) ) {
1171
- case 0 : // error
1171
+ case PREF . TREATAS . ERROR :
1172
1172
throw new DKIM_SigError ( "DKIM_POLICYERROR_KEY_INSECURE" ) ;
1173
- case 1 : // warning
1173
+ case PREF . TREATAS . WARNING :
1174
1174
DKIMSignature . warnings . push ( { name : "DKIM_POLICYERROR_KEY_INSECURE" } ) ;
1175
1175
log . debug ( "Warning: DKIM_POLICYERROR_KEY_INSECURE" ) ;
1176
1176
break ;
1177
- case 2 : // ignore
1177
+ case PREF . TREATAS . NOTHING :
1178
1178
break ;
1179
1179
default :
1180
1180
throw new Error ( "invalid error.policy.key_insecure.treatAs" ) ;
@@ -1237,7 +1237,7 @@ var Verifier = (function() {
1237
1237
} finally {
1238
1238
DKIMSignature . a_keylength = keyInfo . keyLength ;
1239
1239
}
1240
- if ( ! isValid && prefs . getIntPref ( "error.contentTypeCharsetAddedQuotes.treatAs" ) > 0 ) {
1240
+ if ( ! isValid && prefs . getIntPref ( "error.contentTypeCharsetAddedQuotes.treatAs" ) > PREF . TREATAS . ERROR ) {
1241
1241
log . debug ( "Try with removed quotes in Content-Type charset." ) ;
1242
1242
const contentTypeField = msg . headerFields . get ( "content-type" ) [ 0 ] ;
1243
1243
const sanitizedContentTypeField = contentTypeField . replace ( / c h a r s e t = " ( [ ^ " ] + ) " / i, "charset=$1" ) ;
@@ -1251,7 +1251,7 @@ var Verifier = (function() {
1251
1251
keyInfo = { } ;
1252
1252
isValid = verifyFunction ( DKIMSignature . DKIMKey . p , headerHashInput ,
1253
1253
DKIMSignature . a_hash , DKIMSignature . b , DKIMSignature . warnings , keyInfo ) ;
1254
- if ( prefs . getIntPref ( "error.contentTypeCharsetAddedQuotes.treatAs" ) === 1 ) {
1254
+ if ( prefs . getIntPref ( "error.contentTypeCharsetAddedQuotes.treatAs" ) === PREF . TREATAS . WARNING ) {
1255
1255
DKIMSignature . warnings . push ( { name : "DKIM_SIGERROR_CONTENT_TYPE_CHARSET_ADDED_QUOTES" } ) ;
1256
1256
log . debug ( "Warning: DKIM_SIGERROR_CONTENT_TYPE_CHARSET_ADDED_QUOTES" ) ;
1257
1257
}
0 commit comments