2021-05-27 17:11:38 +02:00
|
|
|
# PGPainless - Use OpenPGP Painlessly!
|
2018-07-24 16:06:45 +02:00
|
|
|
|
2020-11-29 15:40:17 +01:00
|
|
|
[![Travis (.com)](https://travis-ci.com/pgpainless/pgpainless.svg?branch=master)](https://travis-ci.com/pgpainless/pgpainless)
|
2021-06-06 13:33:14 +02:00
|
|
|
[![Maven Central](https://badgen.net/maven/v/maven-central/org.pgpainless/pgpainless-core)](https://search.maven.org/artifact/org.pgpainless/pgpainless-core)
|
2018-07-24 16:18:05 +02:00
|
|
|
[![Coverage Status](https://coveralls.io/repos/github/pgpainless/pgpainless/badge.svg?branch=master)](https://coveralls.io/github/pgpainless/pgpainless?branch=master)
|
2020-08-30 23:06:40 +02:00
|
|
|
[![JavaDoc](https://badgen.net/badge/javadoc/yes/green)](https://pgpainless.org/releases/latest/javadoc/)
|
2021-05-27 17:11:38 +02:00
|
|
|
[![Interoperability Test-Suite](https://badgen.net/badge/Sequoia%20Test%20Suite/%232/green)](https://tests.sequoia-pgp.org/)
|
2021-06-06 13:33:14 +02:00
|
|
|
[![PGP](https://img.shields.io/badge/pgp-A027%20DB2F%203E1E%20118A-blue)](https://keyoxide.org/7F9116FEA90A5983936C7CFAA027DB2F3E1E118A)
|
2021-05-27 17:11:38 +02:00
|
|
|
## About
|
2018-06-27 16:06:50 +02:00
|
|
|
|
|
|
|
PGPainless aims to make using OpenPGP in Java projects as simple as possible.
|
|
|
|
It does so by introducing an intuitive Builder structure, which allows easy
|
2021-05-27 17:11:38 +02:00
|
|
|
setup of encryptionOptions / decryption operations, as well as straight forward key generation.
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-02-03 16:42:06 +01:00
|
|
|
PGPainless is based around the Bouncycastle java library and can be used on Android down to API level 10.
|
2021-05-27 17:11:38 +02:00
|
|
|
It can be configured to either use the Java Cryptographic Engine (JCE), or Bouncycastles lightweight reimplementation.
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
While signature verification in Bouncycastle is limited to signature correctness, PGPainless goes much further.
|
|
|
|
It also checks if signing subkeys are properly bound to their primary key, if keys are expired or revoked, as well as
|
|
|
|
if keys are allowed to create signatures in the first place.
|
2018-07-19 19:01:16 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
These rigorous checks make PGPainless stand out from other Java-based OpenPGP libraries and are the reason why
|
2021-06-10 12:39:11 +02:00
|
|
|
PGPainless currently [*scores second place* on Sequoia-PGPs Interoperability Test-Suite](https://tests.sequoia-pgp.org).
|
2018-07-19 19:01:16 +02:00
|
|
|
|
2021-06-05 23:00:12 +02:00
|
|
|
> At FlowCrypt we are using PGPainless in our Kotlin code bases on Android and on server side.
|
|
|
|
> The ergonomy of legacy PGP tooling on Java is not very good, and PGPainless improves it greatly.
|
|
|
|
> We were so happy with our initial tests and with Paul - the maintainer, that we decided to sponsor further development of this library.
|
|
|
|
>
|
|
|
|
> -Tom @ FlowCrypt.com
|
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
## Features
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
Most of PGPainless' features can be accessed directly from the `PGPainless` class.
|
|
|
|
If you want to get started, this class is your friend :)
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
For further details you should check out the [javadoc](https://pgpainless.org/releases/latest/javadoc/)!
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-07-01 17:15:33 +02:00
|
|
|
### Handle Keys
|
|
|
|
Reading keys from ASCII armored strings or from binary files is easy:
|
|
|
|
|
|
|
|
```java
|
|
|
|
String key = "-----BEGIN PGP PRIVATE KEY BLOCK-----\n"...
|
|
|
|
PGPSecretKeyRing secretKey = PGPainless.readKeyRing()
|
|
|
|
.secretKeyRing(key);
|
|
|
|
```
|
|
|
|
|
|
|
|
Similarly, keys can quickly be exported::
|
|
|
|
|
|
|
|
```java
|
|
|
|
PGPSecretKeyRing secretKey = ...;
|
|
|
|
String armored = PGPainless.asciiArmor(secretKey);
|
|
|
|
ByteArrayOutputStream binary = new ByteArrayOutputStream();
|
|
|
|
secretKey.encode(binary);
|
|
|
|
```
|
|
|
|
|
|
|
|
Extract a public key certificate from a secret key:
|
|
|
|
|
|
|
|
```java
|
|
|
|
PGPSecretKeyRing secretKey = ...;
|
|
|
|
PGPPublicKeyRing certificate = PGPainless.extractCertificate(secretKey);
|
|
|
|
```
|
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
### Easily Generate Keys
|
|
|
|
PGPainless comes with a simple to use `KeyRingBuilder` class that helps you to quickly generate modern OpenPGP keys.
|
|
|
|
There are some predefined key archetypes, but it is possible to fully customize key generation to your needs.
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2018-07-30 17:58:23 +02:00
|
|
|
```java
|
2021-05-27 17:11:38 +02:00
|
|
|
// RSA key without additional subkeys
|
|
|
|
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
2018-06-28 15:49:32 +02:00
|
|
|
.simpleRsaKeyRing("Juliet <juliet@montague.lit>", RsaLength._4096);
|
2021-05-27 17:11:38 +02:00
|
|
|
|
|
|
|
// EdDSA primary key with EdDSA signing- and XDH encryption subkeys
|
|
|
|
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
|
|
|
.modernKeyRing("Romeo <romeo@montague.lit>", "I defy you, stars!");
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
// Customized key
|
2018-06-27 16:06:50 +02:00
|
|
|
PGPSecretKeyRing keyRing = PGPainless.generateKeyRing()
|
|
|
|
.withSubKey(
|
|
|
|
KeySpec.getBuilder(ECDSA.fromCurve(EllipticCurve._P256))
|
2021-05-27 17:11:38 +02:00
|
|
|
.withKeyFlags(KeyFlag.SIGN_DATA)
|
|
|
|
.withDetailedConfiguration()
|
|
|
|
.withDefaultSymmetricAlgorithms()
|
|
|
|
.withDefaultHashAlgorithms()
|
|
|
|
.withPreferredCompressionAlgorithms(CompressionAlgorithm.ZLIB)
|
|
|
|
.withFeature(Feature.MODIFICATION_DETECTION)
|
|
|
|
.done()
|
|
|
|
).withSubKey(
|
2018-06-27 16:06:50 +02:00
|
|
|
KeySpec.getBuilder(ECDH.fromCurve(EllipticCurve._P256))
|
2021-05-27 17:11:38 +02:00
|
|
|
.withKeyFlags(KeyFlag.ENCRYPT_COMMS, KeyFlag.ENCRYPT_STORAGE)
|
|
|
|
.withDefaultAlgorithms()
|
|
|
|
).withMasterKey(
|
2020-10-30 11:43:21 +01:00
|
|
|
KeySpec.getBuilder(RSA.withLength(RsaLength._8192))
|
2018-06-27 16:06:50 +02:00
|
|
|
.withKeyFlags(KeyFlag.SIGN_DATA, KeyFlag.CERTIFY_OTHER)
|
2021-05-27 17:11:38 +02:00
|
|
|
.withDefaultAlgorithms()
|
|
|
|
).withPrimaryUserId("Juliet <juliet@montague.lit>")
|
|
|
|
.withAdditionalUserId("xmpp:juliet@capulet.lit")
|
2018-06-27 16:06:50 +02:00
|
|
|
.withPassphrase("romeo_oh_Romeo<3")
|
|
|
|
.build();
|
|
|
|
```
|
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
### Encrypt and Sign Data
|
|
|
|
PGPainless makes it easy and painless to encrypt and/or sign data.
|
|
|
|
Passed in keys are automatically evaluated, so that you don't accidentally encrypt to revoked or expired keys.
|
|
|
|
PGPainless will furthermore detect which algorithms are supported by recipient keys and will negotiate
|
|
|
|
algorithms accordingly.
|
|
|
|
Still it allows you to manually specify which algorithms to use of course.
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2018-07-30 17:58:23 +02:00
|
|
|
```java
|
2021-05-27 17:11:38 +02:00
|
|
|
EncryptionStream encryptionStream = PGPainless.encryptAndOrSign()
|
|
|
|
.onOutputStream(outputStream)
|
|
|
|
.withOptions(
|
|
|
|
ProducerOptions.signAndEncrypt(
|
|
|
|
new EncryptionOptions()
|
|
|
|
.addRecipient(aliceKey)
|
|
|
|
.addRecipient(bobsKey)
|
|
|
|
// optionally encrypt to a passphrase
|
|
|
|
.addPassphrase(Passphrase.fromPassword("password123"))
|
|
|
|
// optionally override symmetric encryption algorithm
|
|
|
|
.overrideEncryptionAlgorithm(SymmetricKeyAlgorithm.AES_192),
|
|
|
|
new SigningOptions()
|
|
|
|
// Sign in-line (using one-pass-signature packet)
|
|
|
|
.addInlineSignature(secretKeyDecryptor, aliceSecKey, signatureType)
|
|
|
|
// Sign using a detached signature
|
|
|
|
.addDetachedSignature(secretKeyDecryptor, aliceSecKey, signatureType)
|
|
|
|
// optionally override hash algorithm
|
|
|
|
.overrideHashAlgorithm(HashAlgorithm.SHA256)
|
|
|
|
).setAsciiArmor(true) // Ascii armor or not
|
|
|
|
);
|
|
|
|
|
|
|
|
Streams.pipeAll(plaintextInputStream, encryptionStream);
|
|
|
|
encryptionStream.close();
|
2018-06-27 16:06:50 +02:00
|
|
|
```
|
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
### Decrypt and Verify Signatures
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-07-01 17:15:33 +02:00
|
|
|
Decrypting data and verifying signatures is being done similarly.
|
2021-05-27 17:11:38 +02:00
|
|
|
PGPainless will not only verify *correctness* of signatures, but also if the signing key was allowed to create the signature.
|
|
|
|
A key might not be allowed to create signatures if, for example, it expired or was revoked, or was not properly bound to the key ring.
|
2021-07-01 17:15:33 +02:00
|
|
|
Furthermore, PGPainless will reject signatures made using weak algorithms like SHA-1.
|
2021-05-27 17:11:38 +02:00
|
|
|
This behaviour can be modified though using the `Policy` class.
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2018-07-30 17:58:23 +02:00
|
|
|
```java
|
2021-05-27 17:11:38 +02:00
|
|
|
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
|
|
|
.onInputStream(encryptedInputStream)
|
2021-07-01 17:15:33 +02:00
|
|
|
.withOptions(new ConsumerOptions()
|
|
|
|
.addDecryptionKey(bobSecKeys, secretKeyProtector)
|
|
|
|
.addVerificationCert(alicePubKeys)
|
|
|
|
);
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
Streams.pipeAll(decryptionStream, outputStream);
|
|
|
|
decryptionStream.close();
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
// Result contains information like signature status etc.
|
|
|
|
OpenPgpMetadata metadata = decryptionStream.getResult();
|
2018-06-27 16:06:50 +02:00
|
|
|
```
|
|
|
|
|
2020-08-30 23:06:40 +02:00
|
|
|
*After* the `DecryptionStream` was closed, you can get metadata about the processed data by retrieving the `OpenPgpMetadata`.
|
2018-06-27 16:06:50 +02:00
|
|
|
Again, this object will contain information about how the message was encrypted, who signed it and so on.
|
|
|
|
|
2021-07-01 17:15:33 +02:00
|
|
|
#### Many more examples can be found in the [examples package](pgpainless-core/src/test/java/org/pgpainless/example)!!!
|
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
## Include PGPainless in your Project
|
2018-06-27 16:06:50 +02:00
|
|
|
|
2021-05-27 17:11:38 +02:00
|
|
|
PGPainless is available on maven central. In order to include it in your project, just add the
|
|
|
|
maven central repository and add PGPainless as a dependency.
|
|
|
|
|
|
|
|
```gradle
|
|
|
|
repositories {
|
|
|
|
mavenCentral()
|
|
|
|
}
|
|
|
|
|
|
|
|
dependencies {
|
2021-07-01 17:15:33 +02:00
|
|
|
implementation 'org.pgpainless:pgpainless-core:0.2.3'
|
2021-05-27 17:11:38 +02:00
|
|
|
}
|
|
|
|
```
|
2020-08-30 23:06:40 +02:00
|
|
|
|
2018-06-27 16:06:50 +02:00
|
|
|
## About
|
2020-01-10 19:39:02 +01:00
|
|
|
PGPainless is a by-product of my [Summer of Code 2018 project](https://blog.jabberhead.tk/summer-of-code-2018/).
|
2018-06-27 16:06:50 +02:00
|
|
|
For that project I was in need of a simple to use OpenPGP library.
|
|
|
|
|
|
|
|
Originally I was going to use [Bouncy-GPG](https://github.com/neuhalje/bouncy-gpg) for my project,
|
|
|
|
but ultimately I decided to create my own OpenPGP library which better fits my needs.
|
|
|
|
|
2020-08-30 23:06:40 +02:00
|
|
|
However, PGPainless is heavily influenced by Bouncy-GPG.
|
2018-07-18 16:55:48 +02:00
|
|
|
|
|
|
|
To reach out to the development team, feel free to send a mail: info@pgpainless.org
|
|
|
|
|
|
|
|
## Development
|
|
|
|
PGPainless is developed in - and accepts contributions from - the following places:
|
|
|
|
|
|
|
|
* [Github](https://github.com/pgpainless/pgpainless)
|
2020-01-10 19:39:02 +01:00
|
|
|
* [Codeberg](https://codeberg.org/PGPainless/pgpainless)
|
2018-07-18 16:55:48 +02:00
|
|
|
|
|
|
|
Please follow the [code of conduct](CODE_OF_CONDUCT.md) if you want to be part of the project.
|