mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-11-26 22:32:07 +01:00
Rework secret key protection
This commit is contained in:
parent
176574df50
commit
91080f411d
16 changed files with 217 additions and 165 deletions
|
@ -59,7 +59,6 @@ import org.pgpainless.key.util.RevocationAttributes;
|
||||||
import org.pgpainless.signature.SignatureUtils;
|
import org.pgpainless.signature.SignatureUtils;
|
||||||
import org.pgpainless.signature.builder.RevocationSignatureBuilder;
|
import org.pgpainless.signature.builder.RevocationSignatureBuilder;
|
||||||
import org.pgpainless.signature.builder.SelfSignatureBuilder;
|
import org.pgpainless.signature.builder.SelfSignatureBuilder;
|
||||||
import org.pgpainless.signature.builder.SignatureFactory;
|
|
||||||
import org.pgpainless.signature.subpackets.RevocationSignatureSubpackets;
|
import org.pgpainless.signature.subpackets.RevocationSignatureSubpackets;
|
||||||
import org.pgpainless.signature.subpackets.SelfSignatureSubpackets;
|
import org.pgpainless.signature.subpackets.SelfSignatureSubpackets;
|
||||||
import org.pgpainless.signature.subpackets.SignatureSubpacketGeneratorUtil;
|
import org.pgpainless.signature.subpackets.SignatureSubpacketGeneratorUtil;
|
||||||
|
@ -102,12 +101,11 @@ public class SecretKeyRingEditor implements SecretKeyRingEditorInterface {
|
||||||
KeyRingInfo info = PGPainless.inspectKeyRing(secretKeyRing);
|
KeyRingInfo info = PGPainless.inspectKeyRing(secretKeyRing);
|
||||||
List<KeyFlag> keyFlags = info.getKeyFlagsOf(info.getKeyId());
|
List<KeyFlag> keyFlags = info.getKeyFlagsOf(info.getKeyId());
|
||||||
|
|
||||||
SelfSignatureBuilder builder = SignatureFactory.selfCertifyUserId(
|
SelfSignatureBuilder builder = new SelfSignatureBuilder(primaryKey, protector);
|
||||||
primaryKey,
|
|
||||||
protector,
|
|
||||||
signatureSubpacketCallback,
|
|
||||||
keyFlags);
|
|
||||||
builder.setSignatureType(SignatureType.POSITIVE_CERTIFICATION);
|
builder.setSignatureType(SignatureType.POSITIVE_CERTIFICATION);
|
||||||
|
builder.getHashedSubpackets().setKeyFlags(keyFlags);
|
||||||
|
builder.applyCallback(signatureSubpacketCallback);
|
||||||
|
|
||||||
PGPSignature signature = builder.build(primaryKey.getPublicKey(), userId);
|
PGPSignature signature = builder.build(primaryKey.getPublicKey(), userId);
|
||||||
secretKeyRing = KeyRingUtils.injectCertification(secretKeyRing, userId, signature);
|
secretKeyRing = KeyRingUtils.injectCertification(secretKeyRing, userId, signature);
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,54 @@
|
||||||
|
// SPDX-FileCopyrightText: 2021 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package org.pgpainless.key.protection;
|
||||||
|
|
||||||
|
import org.bouncycastle.openpgp.PGPException;
|
||||||
|
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
|
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
|
||||||
|
import org.pgpainless.implementation.ImplementationFactory;
|
||||||
|
import org.pgpainless.key.protection.passphrase_provider.SecretKeyPassphraseProvider;
|
||||||
|
import org.pgpainless.util.Passphrase;
|
||||||
|
|
||||||
|
import javax.annotation.Nullable;
|
||||||
|
|
||||||
|
public class BaseSecretKeyRingProtector implements SecretKeyRingProtector {
|
||||||
|
|
||||||
|
private final SecretKeyPassphraseProvider passphraseProvider;
|
||||||
|
private final KeyRingProtectionSettings protectionSettings;
|
||||||
|
|
||||||
|
public BaseSecretKeyRingProtector(SecretKeyPassphraseProvider passphraseProvider) {
|
||||||
|
this(passphraseProvider, KeyRingProtectionSettings.secureDefaultSettings());
|
||||||
|
}
|
||||||
|
|
||||||
|
public BaseSecretKeyRingProtector(SecretKeyPassphraseProvider passphraseProvider, KeyRingProtectionSettings protectionSettings) {
|
||||||
|
this.passphraseProvider = passphraseProvider;
|
||||||
|
this.protectionSettings = protectionSettings;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean hasPassphraseFor(Long keyId) {
|
||||||
|
return passphraseProvider.hasPassphrase(keyId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
@Nullable
|
||||||
|
public PBESecretKeyDecryptor getDecryptor(Long keyId) throws PGPException {
|
||||||
|
Passphrase passphrase = passphraseProvider.getPassphraseFor(keyId);
|
||||||
|
return passphrase == null ? null :
|
||||||
|
ImplementationFactory.getInstance().getPBESecretKeyDecryptor(passphrase);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
@Nullable
|
||||||
|
public PBESecretKeyEncryptor getEncryptor(Long keyId) throws PGPException {
|
||||||
|
Passphrase passphrase = passphraseProvider.getPassphraseFor(keyId);
|
||||||
|
return passphrase == null ? null :
|
||||||
|
ImplementationFactory.getInstance().getPBESecretKeyEncryptor(
|
||||||
|
protectionSettings.getEncryptionAlgorithm(),
|
||||||
|
protectionSettings.getHashAlgorithm(),
|
||||||
|
protectionSettings.getS2kCount(),
|
||||||
|
passphrase);
|
||||||
|
}
|
||||||
|
}
|
|
@ -4,17 +4,13 @@
|
||||||
|
|
||||||
package org.pgpainless.key.protection;
|
package org.pgpainless.key.protection;
|
||||||
|
|
||||||
import java.util.Iterator;
|
|
||||||
import javax.annotation.Nonnull;
|
import javax.annotation.Nonnull;
|
||||||
import javax.annotation.Nullable;
|
import javax.annotation.Nullable;
|
||||||
|
|
||||||
import org.bouncycastle.openpgp.PGPException;
|
|
||||||
import org.bouncycastle.openpgp.PGPKeyRing;
|
import org.bouncycastle.openpgp.PGPKeyRing;
|
||||||
import org.bouncycastle.openpgp.PGPPublicKey;
|
|
||||||
import org.bouncycastle.openpgp.PGPSecretKey;
|
import org.bouncycastle.openpgp.PGPSecretKey;
|
||||||
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
|
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
|
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
|
||||||
import org.pgpainless.implementation.ImplementationFactory;
|
|
||||||
import org.pgpainless.key.protection.passphrase_provider.SecretKeyPassphraseProvider;
|
import org.pgpainless.key.protection.passphrase_provider.SecretKeyPassphraseProvider;
|
||||||
import org.pgpainless.util.Passphrase;
|
import org.pgpainless.util.Passphrase;
|
||||||
|
|
||||||
|
@ -22,10 +18,11 @@ import org.pgpainless.util.Passphrase;
|
||||||
* Provides {@link PBESecretKeyDecryptor} and {@link PBESecretKeyEncryptor} objects while getting the passphrases
|
* Provides {@link PBESecretKeyDecryptor} and {@link PBESecretKeyEncryptor} objects while getting the passphrases
|
||||||
* from a {@link SecretKeyPassphraseProvider} and using settings from an {@link KeyRingProtectionSettings}.
|
* from a {@link SecretKeyPassphraseProvider} and using settings from an {@link KeyRingProtectionSettings}.
|
||||||
*/
|
*/
|
||||||
public class PasswordBasedSecretKeyRingProtector implements SecretKeyRingProtector {
|
public class PasswordBasedSecretKeyRingProtector extends BaseSecretKeyRingProtector {
|
||||||
|
|
||||||
protected final KeyRingProtectionSettings protectionSettings;
|
public PasswordBasedSecretKeyRingProtector(@Nonnull SecretKeyPassphraseProvider passphraseProvider) {
|
||||||
protected final SecretKeyPassphraseProvider passphraseProvider;
|
super(passphraseProvider);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructor.
|
* Constructor.
|
||||||
|
@ -36,23 +33,15 @@ public class PasswordBasedSecretKeyRingProtector implements SecretKeyRingProtect
|
||||||
* @param passphraseProvider provider which provides passphrases.
|
* @param passphraseProvider provider which provides passphrases.
|
||||||
*/
|
*/
|
||||||
public PasswordBasedSecretKeyRingProtector(@Nonnull KeyRingProtectionSettings settings, @Nonnull SecretKeyPassphraseProvider passphraseProvider) {
|
public PasswordBasedSecretKeyRingProtector(@Nonnull KeyRingProtectionSettings settings, @Nonnull SecretKeyPassphraseProvider passphraseProvider) {
|
||||||
this.protectionSettings = settings;
|
super(passphraseProvider, settings);
|
||||||
this.passphraseProvider = passphraseProvider;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public static PasswordBasedSecretKeyRingProtector forKey(PGPKeyRing keyRing, Passphrase passphrase) {
|
public static PasswordBasedSecretKeyRingProtector forKey(PGPKeyRing keyRing, Passphrase passphrase) {
|
||||||
KeyRingProtectionSettings protectionSettings = KeyRingProtectionSettings.secureDefaultSettings();
|
|
||||||
SecretKeyPassphraseProvider passphraseProvider = new SecretKeyPassphraseProvider() {
|
SecretKeyPassphraseProvider passphraseProvider = new SecretKeyPassphraseProvider() {
|
||||||
@Override
|
@Override
|
||||||
@Nullable
|
@Nullable
|
||||||
public Passphrase getPassphraseFor(Long keyId) {
|
public Passphrase getPassphraseFor(Long keyId) {
|
||||||
for (Iterator<PGPPublicKey> it = keyRing.getPublicKeys(); it.hasNext(); ) {
|
return hasPassphrase(keyId) ? passphrase : null;
|
||||||
PGPPublicKey key = it.next();
|
|
||||||
if (key.getKeyID() == keyId) {
|
|
||||||
return passphrase;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -60,7 +49,7 @@ public class PasswordBasedSecretKeyRingProtector implements SecretKeyRingProtect
|
||||||
return keyRing.getPublicKey(keyId) != null;
|
return keyRing.getPublicKey(keyId) != null;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
return new PasswordBasedSecretKeyRingProtector(protectionSettings, passphraseProvider);
|
return new PasswordBasedSecretKeyRingProtector(passphraseProvider);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static PasswordBasedSecretKeyRingProtector forKey(PGPSecretKey key, Passphrase passphrase) {
|
public static PasswordBasedSecretKeyRingProtector forKey(PGPSecretKey key, Passphrase passphrase) {
|
||||||
|
@ -68,7 +57,6 @@ public class PasswordBasedSecretKeyRingProtector implements SecretKeyRingProtect
|
||||||
}
|
}
|
||||||
|
|
||||||
public static PasswordBasedSecretKeyRingProtector forKeyId(long singleKeyId, Passphrase passphrase) {
|
public static PasswordBasedSecretKeyRingProtector forKeyId(long singleKeyId, Passphrase passphrase) {
|
||||||
KeyRingProtectionSettings protectionSettings = KeyRingProtectionSettings.secureDefaultSettings();
|
|
||||||
SecretKeyPassphraseProvider passphraseProvider = new SecretKeyPassphraseProvider() {
|
SecretKeyPassphraseProvider passphraseProvider = new SecretKeyPassphraseProvider() {
|
||||||
@Nullable
|
@Nullable
|
||||||
@Override
|
@Override
|
||||||
|
@ -84,31 +72,7 @@ public class PasswordBasedSecretKeyRingProtector implements SecretKeyRingProtect
|
||||||
return keyId == singleKeyId;
|
return keyId == singleKeyId;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
return new PasswordBasedSecretKeyRingProtector(protectionSettings, passphraseProvider);
|
return new PasswordBasedSecretKeyRingProtector(passphraseProvider);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean hasPassphraseFor(Long keyId) {
|
|
||||||
return passphraseProvider.hasPassphrase(keyId);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
@Nullable
|
|
||||||
public PBESecretKeyDecryptor getDecryptor(Long keyId) throws PGPException {
|
|
||||||
Passphrase passphrase = passphraseProvider.getPassphraseFor(keyId);
|
|
||||||
return passphrase == null ? null :
|
|
||||||
ImplementationFactory.getInstance().getPBESecretKeyDecryptor(passphrase);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
@Nullable
|
|
||||||
public PBESecretKeyEncryptor getEncryptor(Long keyId) throws PGPException {
|
|
||||||
Passphrase passphrase = passphraseProvider.getPassphraseFor(keyId);
|
|
||||||
return passphrase == null ? null :
|
|
||||||
ImplementationFactory.getInstance().getPBESecretKeyEncryptor(
|
|
||||||
protectionSettings.getEncryptionAlgorithm(),
|
|
||||||
protectionSettings.getHashAlgorithm(),
|
|
||||||
protectionSettings.getS2kCount(),
|
|
||||||
passphrase);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,6 +7,7 @@ package org.pgpainless.key.protection;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.concurrent.ConcurrentHashMap;
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
import javax.annotation.Nonnull;
|
||||||
import javax.annotation.Nullable;
|
import javax.annotation.Nullable;
|
||||||
|
|
||||||
import org.bouncycastle.openpgp.PGPException;
|
import org.bouncycastle.openpgp.PGPException;
|
||||||
|
@ -15,6 +16,7 @@ import org.bouncycastle.openpgp.PGPSecretKeyRing;
|
||||||
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
|
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
|
||||||
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
|
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
|
||||||
import org.pgpainless.key.protection.passphrase_provider.SecretKeyPassphraseProvider;
|
import org.pgpainless.key.protection.passphrase_provider.SecretKeyPassphraseProvider;
|
||||||
|
import org.pgpainless.key.protection.passphrase_provider.SolitaryPassphraseProvider;
|
||||||
import org.pgpainless.util.Passphrase;
|
import org.pgpainless.util.Passphrase;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -66,7 +68,23 @@ public interface SecretKeyRingProtector {
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Use the provided passphrase to lock/unlock all subkeys in the provided key ring.
|
* Use the provided passphrase to lock/unlock all keys in the provided key ring.
|
||||||
|
*
|
||||||
|
* This protector will use the provided passphrase to lock/unlock all subkeys present in the provided keys object.
|
||||||
|
* For other keys that are not present in the ring, it will return null.
|
||||||
|
*
|
||||||
|
* @param passphrase passphrase
|
||||||
|
* @param keys key ring
|
||||||
|
* @return protector
|
||||||
|
* @deprecated use {@link #unlockEachKeyWith(Passphrase, PGPSecretKeyRing)} instead.
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
|
static SecretKeyRingProtector unlockAllKeysWith(@Nonnull Passphrase passphrase, @Nonnull PGPSecretKeyRing keys) {
|
||||||
|
return unlockEachKeyWith(passphrase, keys);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Use the provided passphrase to lock/unlock all keys in the provided key ring.
|
||||||
*
|
*
|
||||||
* This protector will use the provided passphrase to lock/unlock all subkeys present in the provided keys object.
|
* This protector will use the provided passphrase to lock/unlock all subkeys present in the provided keys object.
|
||||||
* For other keys that are not present in the ring, it will return null.
|
* For other keys that are not present in the ring, it will return null.
|
||||||
|
@ -75,7 +93,7 @@ public interface SecretKeyRingProtector {
|
||||||
* @param keys key ring
|
* @param keys key ring
|
||||||
* @return protector
|
* @return protector
|
||||||
*/
|
*/
|
||||||
static SecretKeyRingProtector unlockAllKeysWith(Passphrase passphrase, PGPSecretKeyRing keys) {
|
static SecretKeyRingProtector unlockEachKeyWith(@Nonnull Passphrase passphrase, @Nonnull PGPSecretKeyRing keys) {
|
||||||
Map<Long, Passphrase> map = new ConcurrentHashMap<>();
|
Map<Long, Passphrase> map = new ConcurrentHashMap<>();
|
||||||
for (PGPSecretKey secretKey : keys) {
|
for (PGPSecretKey secretKey : keys) {
|
||||||
map.put(secretKey.getKeyID(), passphrase);
|
map.put(secretKey.getKeyID(), passphrase);
|
||||||
|
@ -83,6 +101,16 @@ public interface SecretKeyRingProtector {
|
||||||
return fromPassphraseMap(map);
|
return fromPassphraseMap(map);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Use the provided passphrase to unlock any key.
|
||||||
|
*
|
||||||
|
* @param passphrase passphrase
|
||||||
|
* @return protector
|
||||||
|
*/
|
||||||
|
static SecretKeyRingProtector unlockAnyKeyWith(@Nonnull Passphrase passphrase) {
|
||||||
|
return new BaseSecretKeyRingProtector(new SolitaryPassphraseProvider(passphrase));
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Use the provided passphrase to lock/unlock only the provided (sub-)key.
|
* Use the provided passphrase to lock/unlock only the provided (sub-)key.
|
||||||
* This protector will only return a non-null encryptor/decryptor based on the provided passphrase if
|
* This protector will only return a non-null encryptor/decryptor based on the provided passphrase if
|
||||||
|
@ -94,11 +122,11 @@ public interface SecretKeyRingProtector {
|
||||||
* @param key key to lock/unlock
|
* @param key key to lock/unlock
|
||||||
* @return protector
|
* @return protector
|
||||||
*/
|
*/
|
||||||
static SecretKeyRingProtector unlockSingleKeyWith(Passphrase passphrase, PGPSecretKey key) {
|
static SecretKeyRingProtector unlockSingleKeyWith(@Nonnull Passphrase passphrase, @Nonnull PGPSecretKey key) {
|
||||||
return PasswordBasedSecretKeyRingProtector.forKey(key, passphrase);
|
return PasswordBasedSecretKeyRingProtector.forKey(key, passphrase);
|
||||||
}
|
}
|
||||||
|
|
||||||
static SecretKeyRingProtector unlockSingleKeyWith(Passphrase passphrase, long keyId) {
|
static SecretKeyRingProtector unlockSingleKeyWith(@Nonnull Passphrase passphrase, long keyId) {
|
||||||
return PasswordBasedSecretKeyRingProtector.forKeyId(keyId, passphrase);
|
return PasswordBasedSecretKeyRingProtector.forKeyId(keyId, passphrase);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -123,7 +151,7 @@ public interface SecretKeyRingProtector {
|
||||||
* @param passphraseMap map of key ids and their respective passphrases
|
* @param passphraseMap map of key ids and their respective passphrases
|
||||||
* @return protector
|
* @return protector
|
||||||
*/
|
*/
|
||||||
static SecretKeyRingProtector fromPassphraseMap(Map<Long, Passphrase> passphraseMap) {
|
static SecretKeyRingProtector fromPassphraseMap(@Nonnull Map<Long, Passphrase> passphraseMap) {
|
||||||
return new CachingSecretKeyRingProtector(passphraseMap, KeyRingProtectionSettings.secureDefaultSettings(), null);
|
return new CachingSecretKeyRingProtector(passphraseMap, KeyRingProtectionSettings.secureDefaultSettings(), null);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,47 +0,0 @@
|
||||||
// SPDX-FileCopyrightText: 2021 Paul Schaub <vanitasvitae@fsfe.org>
|
|
||||||
//
|
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
|
||||||
|
|
||||||
package org.pgpainless.signature.builder;
|
|
||||||
|
|
||||||
import java.util.List;
|
|
||||||
import javax.annotation.Nullable;
|
|
||||||
|
|
||||||
import org.bouncycastle.openpgp.PGPSecretKey;
|
|
||||||
import org.pgpainless.algorithm.KeyFlag;
|
|
||||||
import org.pgpainless.algorithm.SignatureType;
|
|
||||||
import org.pgpainless.exception.WrongPassphraseException;
|
|
||||||
import org.pgpainless.key.protection.SecretKeyRingProtector;
|
|
||||||
import org.pgpainless.signature.subpackets.SelfSignatureSubpackets;
|
|
||||||
|
|
||||||
public final class SignatureFactory {
|
|
||||||
|
|
||||||
private SignatureFactory() {
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public static SelfSignatureBuilder selfCertifyUserId(
|
|
||||||
PGPSecretKey primaryKey,
|
|
||||||
SecretKeyRingProtector primaryKeyProtector,
|
|
||||||
@Nullable SelfSignatureSubpackets.Callback selfSignatureCallback,
|
|
||||||
List<KeyFlag> keyFlags)
|
|
||||||
throws WrongPassphraseException {
|
|
||||||
KeyFlag[] keyFlagArray = keyFlags.toArray(new KeyFlag[0]);
|
|
||||||
return selfCertifyUserId(primaryKey, primaryKeyProtector, selfSignatureCallback, keyFlagArray);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static SelfSignatureBuilder selfCertifyUserId(
|
|
||||||
PGPSecretKey primaryKey,
|
|
||||||
SecretKeyRingProtector primaryKeyProtector,
|
|
||||||
@Nullable SelfSignatureSubpackets.Callback selfSignatureCallback,
|
|
||||||
KeyFlag... flags) throws WrongPassphraseException {
|
|
||||||
|
|
||||||
SelfSignatureBuilder certifier = new SelfSignatureBuilder(SignatureType.POSITIVE_CERTIFICATION, primaryKey, primaryKeyProtector);
|
|
||||||
certifier.getHashedSubpackets().setKeyFlags(flags);
|
|
||||||
|
|
||||||
certifier.applyCallback(selfSignatureCallback);
|
|
||||||
|
|
||||||
return certifier;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -5,6 +5,7 @@
|
||||||
package org.pgpainless.signature.subpackets;
|
package org.pgpainless.signature.subpackets;
|
||||||
|
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import javax.annotation.Nonnull;
|
import javax.annotation.Nonnull;
|
||||||
import javax.annotation.Nullable;
|
import javax.annotation.Nullable;
|
||||||
|
@ -30,6 +31,11 @@ public interface SelfSignatureSubpackets extends BaseSignatureSubpackets {
|
||||||
|
|
||||||
SelfSignatureSubpackets setKeyFlags(KeyFlag... keyFlags);
|
SelfSignatureSubpackets setKeyFlags(KeyFlag... keyFlags);
|
||||||
|
|
||||||
|
default SelfSignatureSubpackets setKeyFlags(List<KeyFlag> keyFlags) {
|
||||||
|
KeyFlag[] flags = keyFlags.toArray(new KeyFlag[0]);
|
||||||
|
return setKeyFlags(flags);
|
||||||
|
}
|
||||||
|
|
||||||
SelfSignatureSubpackets setKeyFlags(boolean isCritical, KeyFlag... keyFlags);
|
SelfSignatureSubpackets setKeyFlags(boolean isCritical, KeyFlag... keyFlags);
|
||||||
|
|
||||||
SelfSignatureSubpackets setKeyFlags(@Nullable KeyFlags keyFlags);
|
SelfSignatureSubpackets setKeyFlags(@Nullable KeyFlags keyFlags);
|
||||||
|
|
|
@ -546,7 +546,7 @@ public class AsciiArmorCRCTests {
|
||||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
||||||
.onInputStream(new ByteArrayInputStream(message.getBytes(StandardCharsets.UTF_8)))
|
.onInputStream(new ByteArrayInputStream(message.getBytes(StandardCharsets.UTF_8)))
|
||||||
.withOptions(new ConsumerOptions().addDecryptionKey(
|
.withOptions(new ConsumerOptions().addDecryptionKey(
|
||||||
key, SecretKeyRingProtector.unlockAllKeysWith(passphrase, key)
|
key, SecretKeyRingProtector.unlockAnyKeyWith(passphrase)
|
||||||
));
|
));
|
||||||
|
|
||||||
ByteArrayOutputStream outputStream = new ByteArrayOutputStream();
|
ByteArrayOutputStream outputStream = new ByteArrayOutputStream();
|
||||||
|
|
|
@ -537,7 +537,7 @@ public class ModificationDetectionTests {
|
||||||
assertThrows(MessageNotIntegrityProtectedException.class, () -> PGPainless.decryptAndOrVerify()
|
assertThrows(MessageNotIntegrityProtectedException.class, () -> PGPainless.decryptAndOrVerify()
|
||||||
.onInputStream(new ByteArrayInputStream(ciphertext.getBytes(StandardCharsets.UTF_8)))
|
.onInputStream(new ByteArrayInputStream(ciphertext.getBytes(StandardCharsets.UTF_8)))
|
||||||
.withOptions(new ConsumerOptions().addDecryptionKey(secretKeyRing,
|
.withOptions(new ConsumerOptions().addDecryptionKey(secretKeyRing,
|
||||||
SecretKeyRingProtector.unlockAllKeysWith(passphrase, secretKeyRing)))
|
SecretKeyRingProtector.unlockAnyKeyWith(passphrase)))
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -132,7 +132,7 @@ public class PostponeDecryptionUsingKeyWithMissingPassphraseTest {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
SecretKeyRingProtector protector2 = SecretKeyRingProtector.unlockAllKeysWith(p2, k2);
|
SecretKeyRingProtector protector2 = SecretKeyRingProtector.unlockEachKeyWith(p2, k2);
|
||||||
|
|
||||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
||||||
.onInputStream(new ByteArrayInputStream(ENCRYPTED_FOR_K1_K2.getBytes(StandardCharsets.UTF_8)))
|
.onInputStream(new ByteArrayInputStream(ENCRYPTED_FOR_K1_K2.getBytes(StandardCharsets.UTF_8)))
|
||||||
|
@ -149,7 +149,7 @@ public class PostponeDecryptionUsingKeyWithMissingPassphraseTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void missingPassphraseSecond() throws PGPException, IOException {
|
public void missingPassphraseSecond() throws PGPException, IOException {
|
||||||
SecretKeyRingProtector protector1 = SecretKeyRingProtector.unlockAllKeysWith(p1, k1);
|
SecretKeyRingProtector protector1 = SecretKeyRingProtector.unlockEachKeyWith(p1, k1);
|
||||||
SecretKeyRingProtector protector2 = new CachingSecretKeyRingProtector(new SecretKeyPassphraseProvider() {
|
SecretKeyRingProtector protector2 = new CachingSecretKeyRingProtector(new SecretKeyPassphraseProvider() {
|
||||||
@Nullable
|
@Nullable
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -54,7 +54,8 @@ public class SigningTest {
|
||||||
|
|
||||||
@ParameterizedTest
|
@ParameterizedTest
|
||||||
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
||||||
public void testEncryptionAndSignatureVerification(ImplementationFactory implementationFactory) throws IOException, PGPException {
|
public void testEncryptionAndSignatureVerification(ImplementationFactory implementationFactory)
|
||||||
|
throws IOException, PGPException {
|
||||||
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
||||||
|
|
||||||
PGPPublicKeyRing julietKeys = TestKeys.getJulietPublicKeyRing();
|
PGPPublicKeyRing julietKeys = TestKeys.getJulietPublicKeyRing();
|
||||||
|
@ -73,12 +74,13 @@ public class SigningTest {
|
||||||
EncryptionOptions.encryptDataAtRest()
|
EncryptionOptions.encryptDataAtRest()
|
||||||
.addRecipients(keys)
|
.addRecipients(keys)
|
||||||
.addRecipient(KeyRingUtils.publicKeyRingFrom(cryptieKeys)),
|
.addRecipient(KeyRingUtils.publicKeyRingFrom(cryptieKeys)),
|
||||||
new SigningOptions()
|
new SigningOptions().addInlineSignature(
|
||||||
.addInlineSignature(SecretKeyRingProtector.unlockSingleKeyWith(TestKeys.CRYPTIE_PASSPHRASE, cryptieSigningKey),
|
SecretKeyRingProtector.unlockSingleKeyWith(TestKeys.CRYPTIE_PASSPHRASE, cryptieSigningKey),
|
||||||
cryptieKeys, TestKeys.CRYPTIE_UID, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT)
|
cryptieKeys, TestKeys.CRYPTIE_UID, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT)
|
||||||
).setAsciiArmor(true));
|
).setAsciiArmor(true));
|
||||||
|
|
||||||
byte[] messageBytes = "This message is signed and encrypted to Romeo and Juliet.".getBytes(StandardCharsets.UTF_8);
|
byte[] messageBytes = "This message is signed and encrypted to Romeo and Juliet."
|
||||||
|
.getBytes(StandardCharsets.UTF_8);
|
||||||
ByteArrayInputStream message = new ByteArrayInputStream(messageBytes);
|
ByteArrayInputStream message = new ByteArrayInputStream(messageBytes);
|
||||||
|
|
||||||
Streams.pipeAll(message, encryptionStream);
|
Streams.pipeAll(message, encryptionStream);
|
||||||
|
@ -90,8 +92,10 @@ public class SigningTest {
|
||||||
PGPSecretKeyRing romeoSecret = TestKeys.getRomeoSecretKeyRing();
|
PGPSecretKeyRing romeoSecret = TestKeys.getRomeoSecretKeyRing();
|
||||||
PGPSecretKeyRing julietSecret = TestKeys.getJulietSecretKeyRing();
|
PGPSecretKeyRing julietSecret = TestKeys.getJulietSecretKeyRing();
|
||||||
|
|
||||||
PGPSecretKeyRingCollection secretKeys = new PGPSecretKeyRingCollection(Arrays.asList(romeoSecret, julietSecret));
|
PGPSecretKeyRingCollection secretKeys = new PGPSecretKeyRingCollection(
|
||||||
PGPPublicKeyRingCollection verificationKeys = new PGPPublicKeyRingCollection(Arrays.asList(KeyRingUtils.publicKeyRingFrom(cryptieKeys), romeoKeys));
|
Arrays.asList(romeoSecret, julietSecret));
|
||||||
|
PGPPublicKeyRingCollection verificationKeys = new PGPPublicKeyRingCollection(
|
||||||
|
Arrays.asList(KeyRingUtils.publicKeyRingFrom(cryptieKeys), romeoKeys));
|
||||||
|
|
||||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
||||||
.onInputStream(cryptIn)
|
.onInputStream(cryptIn)
|
||||||
|
@ -114,22 +118,26 @@ public class SigningTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testSignWithInvalidUserIdFails() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
public void testSignWithInvalidUserIdFails()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
||||||
.modernKeyRing("alice", "password123");
|
.modernKeyRing("alice", "password123");
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword("password123"), secretKeys);
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAnyKeyWith(Passphrase.fromPassword("password123"));
|
||||||
|
|
||||||
SigningOptions opts = new SigningOptions();
|
SigningOptions opts = new SigningOptions();
|
||||||
// "bob" is not a valid user-id
|
// "bob" is not a valid user-id
|
||||||
assertThrows(KeyValidationError.class,
|
assertThrows(KeyValidationError.class,
|
||||||
() -> opts.addInlineSignature(protector, secretKeys, "bob", DocumentSignatureType.CANONICAL_TEXT_DOCUMENT));
|
() -> opts.addInlineSignature(protector, secretKeys, "bob",
|
||||||
|
DocumentSignatureType.CANONICAL_TEXT_DOCUMENT));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testSignWithRevokedUserIdFails() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
public void testSignWithRevokedUserIdFails()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.generateKeyRing()
|
||||||
.modernKeyRing("alice", "password123");
|
.modernKeyRing("alice", "password123");
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword("password123"), secretKeys);
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAnyKeyWith(
|
||||||
|
Passphrase.fromPassword("password123"));
|
||||||
secretKeys = PGPainless.modifyKeyRing(secretKeys)
|
secretKeys = PGPainless.modifyKeyRing(secretKeys)
|
||||||
.revokeUserId("alice", protector)
|
.revokeUserId("alice", protector)
|
||||||
.done();
|
.done();
|
||||||
|
@ -139,7 +147,8 @@ public class SigningTest {
|
||||||
SigningOptions opts = new SigningOptions();
|
SigningOptions opts = new SigningOptions();
|
||||||
// "alice" has been revoked
|
// "alice" has been revoked
|
||||||
assertThrows(KeyValidationError.class,
|
assertThrows(KeyValidationError.class,
|
||||||
() -> opts.addInlineSignature(protector, fSecretKeys, "alice", DocumentSignatureType.CANONICAL_TEXT_DOCUMENT));
|
() -> opts.addInlineSignature(protector, fSecretKeys, "alice",
|
||||||
|
DocumentSignatureType.CANONICAL_TEXT_DOCUMENT));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -174,14 +183,18 @@ public class SigningTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void negotiateHashAlgorithmChoseFallbackIfEmptyPreferences() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void negotiateHashAlgorithmChoseFallbackIfEmptyPreferences()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
||||||
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA).overridePreferredHashAlgorithms())
|
.setPrimaryKey(KeySpec.getBuilder(
|
||||||
|
KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA)
|
||||||
|
.overridePreferredHashAlgorithms())
|
||||||
.addUserId("Alice")
|
.addUserId("Alice")
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
SigningOptions options = new SigningOptions()
|
SigningOptions options = new SigningOptions()
|
||||||
.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT);
|
.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys,
|
||||||
|
DocumentSignatureType.BINARY_DOCUMENT);
|
||||||
String data = "Hello, World!\n";
|
String data = "Hello, World!\n";
|
||||||
EncryptionStream signer = PGPainless.encryptAndOrSign()
|
EncryptionStream signer = PGPainless.encryptAndOrSign()
|
||||||
.onOutputStream(new ByteArrayOutputStream())
|
.onOutputStream(new ByteArrayOutputStream())
|
||||||
|
@ -194,19 +207,23 @@ public class SigningTest {
|
||||||
SubkeyIdentifier signingKey = sigs.keySet().iterator().next();
|
SubkeyIdentifier signingKey = sigs.keySet().iterator().next();
|
||||||
PGPSignature signature = sigs.get(signingKey).iterator().next();
|
PGPSignature signature = sigs.get(signingKey).iterator().next();
|
||||||
|
|
||||||
assertEquals(PGPainless.getPolicy().getSignatureHashAlgorithmPolicy().defaultHashAlgorithm().getAlgorithmId(), signature.getHashAlgorithm());
|
assertEquals(PGPainless.getPolicy().getSignatureHashAlgorithmPolicy().defaultHashAlgorithm().getAlgorithmId(),
|
||||||
|
signature.getHashAlgorithm());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void negotiateHashAlgorithmChoseFallbackIfUnacceptablePreferences() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void negotiateHashAlgorithmChoseFallbackIfUnacceptablePreferences()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
||||||
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA)
|
.setPrimaryKey(
|
||||||
|
KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA)
|
||||||
.overridePreferredHashAlgorithms(HashAlgorithm.MD5))
|
.overridePreferredHashAlgorithms(HashAlgorithm.MD5))
|
||||||
.addUserId("Alice")
|
.addUserId("Alice")
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
SigningOptions options = new SigningOptions()
|
SigningOptions options = new SigningOptions()
|
||||||
.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT);
|
.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys,
|
||||||
|
DocumentSignatureType.BINARY_DOCUMENT);
|
||||||
String data = "Hello, World!\n";
|
String data = "Hello, World!\n";
|
||||||
EncryptionStream signer = PGPainless.encryptAndOrSign()
|
EncryptionStream signer = PGPainless.encryptAndOrSign()
|
||||||
.onOutputStream(new ByteArrayOutputStream())
|
.onOutputStream(new ByteArrayOutputStream())
|
||||||
|
@ -219,33 +236,41 @@ public class SigningTest {
|
||||||
SubkeyIdentifier signingKey = sigs.keySet().iterator().next();
|
SubkeyIdentifier signingKey = sigs.keySet().iterator().next();
|
||||||
PGPSignature signature = sigs.get(signingKey).iterator().next();
|
PGPSignature signature = sigs.get(signingKey).iterator().next();
|
||||||
|
|
||||||
assertEquals(PGPainless.getPolicy().getSignatureHashAlgorithmPolicy().defaultHashAlgorithm().getAlgorithmId(), signature.getHashAlgorithm());
|
assertEquals(PGPainless.getPolicy().getSignatureHashAlgorithmPolicy().defaultHashAlgorithm().getAlgorithmId(),
|
||||||
|
signature.getHashAlgorithm());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void signingWithNonCapableKeyThrowsKeyCannotSignException() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void signingWithNonCapableKeyThrowsKeyCannotSignException()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
||||||
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER))
|
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER))
|
||||||
.addUserId("Alice")
|
.addUserId("Alice")
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
SigningOptions options = new SigningOptions();
|
SigningOptions options = new SigningOptions();
|
||||||
assertThrows(KeyCannotSignException.class, () -> options.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT));
|
assertThrows(KeyCannotSignException.class, () -> options.addDetachedSignature(
|
||||||
assertThrows(KeyCannotSignException.class, () -> options.addInlineSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT));
|
SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT));
|
||||||
|
assertThrows(KeyCannotSignException.class, () -> options.addInlineSignature(
|
||||||
|
SecretKeyRingProtector.unprotectedKeys(), secretKeys, DocumentSignatureType.BINARY_DOCUMENT));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void signWithInvalidUserIdThrowsKeyValidationError() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void signWithInvalidUserIdThrowsKeyValidationError()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
PGPSecretKeyRing secretKeys = PGPainless.buildKeyRing()
|
||||||
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519), KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA))
|
.setPrimaryKey(KeySpec.getBuilder(KeyType.EDDSA(EdDSACurve._Ed25519),
|
||||||
|
KeyFlag.CERTIFY_OTHER, KeyFlag.SIGN_DATA))
|
||||||
.addUserId("Alice")
|
.addUserId("Alice")
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
SigningOptions options = new SigningOptions();
|
SigningOptions options = new SigningOptions();
|
||||||
assertThrows(KeyValidationError.class, () ->
|
assertThrows(KeyValidationError.class, () ->
|
||||||
options.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, "Bob", DocumentSignatureType.BINARY_DOCUMENT));
|
options.addDetachedSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, "Bob",
|
||||||
|
DocumentSignatureType.BINARY_DOCUMENT));
|
||||||
assertThrows(KeyValidationError.class, () ->
|
assertThrows(KeyValidationError.class, () ->
|
||||||
options.addInlineSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, "Bob", DocumentSignatureType.BINARY_DOCUMENT));
|
options.addInlineSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, "Bob",
|
||||||
|
DocumentSignatureType.BINARY_DOCUMENT));
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -50,7 +50,8 @@ public class ModifyKeys {
|
||||||
private long signingSubkeyId;
|
private long signingSubkeyId;
|
||||||
|
|
||||||
@BeforeEach
|
@BeforeEach
|
||||||
public void generateKey() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
public void generateKey()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
secretKey = PGPainless.generateKeyRing()
|
secretKey = PGPainless.generateKeyRing()
|
||||||
.modernKeyRing(userId, originalPassphrase);
|
.modernKeyRing(userId, originalPassphrase);
|
||||||
|
|
||||||
|
@ -128,10 +129,13 @@ public class ModifyKeys {
|
||||||
|
|
||||||
// encryption key can now only be unlocked using the new passphrase
|
// encryption key can now only be unlocked using the new passphrase
|
||||||
assertThrows(WrongPassphraseException.class, () ->
|
assertThrows(WrongPassphraseException.class, () ->
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey.getSecretKey(encryptionSubkeyId), Passphrase.fromPassword(originalPassphrase)));
|
UnlockSecretKey.unlockSecretKey(
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey.getSecretKey(encryptionSubkeyId), Passphrase.fromPassword("cryptP4ssphr4s3"));
|
secretKey.getSecretKey(encryptionSubkeyId), Passphrase.fromPassword(originalPassphrase)));
|
||||||
|
UnlockSecretKey.unlockSecretKey(
|
||||||
|
secretKey.getSecretKey(encryptionSubkeyId), Passphrase.fromPassword("cryptP4ssphr4s3"));
|
||||||
// primary key remains unchanged
|
// primary key remains unchanged
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey.getSecretKey(primaryKeyId), Passphrase.fromPassword(originalPassphrase));
|
UnlockSecretKey.unlockSecretKey(
|
||||||
|
secretKey.getSecretKey(primaryKeyId), Passphrase.fromPassword(originalPassphrase));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -141,7 +145,8 @@ public class ModifyKeys {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void addUserId() throws PGPException {
|
public void addUserId() throws PGPException {
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
SecretKeyRingProtector protector =
|
||||||
|
SecretKeyRingProtector.unlockEachKeyWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
||||||
secretKey = PGPainless.modifyKeyRing(secretKey)
|
secretKey = PGPainless.modifyKeyRing(secretKey)
|
||||||
.addUserId("additional@user.id", protector)
|
.addUserId("additional@user.id", protector)
|
||||||
.done();
|
.done();
|
||||||
|
@ -172,7 +177,8 @@ public class ModifyKeys {
|
||||||
@Test
|
@Test
|
||||||
public void addSubkey() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void addSubkey() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
||||||
// Protector for unlocking the existing secret key
|
// Protector for unlocking the existing secret key
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
SecretKeyRingProtector protector =
|
||||||
|
SecretKeyRingProtector.unlockEachKeyWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
||||||
Passphrase subkeyPassphrase = Passphrase.fromPassword("subk3yP4ssphr4s3");
|
Passphrase subkeyPassphrase = Passphrase.fromPassword("subk3yP4ssphr4s3");
|
||||||
secretKey = PGPainless.modifyKeyRing(secretKey)
|
secretKey = PGPainless.modifyKeyRing(secretKey)
|
||||||
.addSubKey(
|
.addSubKey(
|
||||||
|
@ -202,16 +208,19 @@ public class ModifyKeys {
|
||||||
Date expirationDate = DateUtil.parseUTCDate("2030-06-24 12:44:56 UTC");
|
Date expirationDate = DateUtil.parseUTCDate("2030-06-24 12:44:56 UTC");
|
||||||
|
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector
|
SecretKeyRingProtector protector = SecretKeyRingProtector
|
||||||
.unlockAllKeysWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
.unlockEachKeyWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
||||||
secretKey = PGPainless.modifyKeyRing(secretKey)
|
secretKey = PGPainless.modifyKeyRing(secretKey)
|
||||||
.setExpirationDate(expirationDate, protector)
|
.setExpirationDate(expirationDate, protector)
|
||||||
.done();
|
.done();
|
||||||
|
|
||||||
|
|
||||||
KeyRingInfo info = PGPainless.inspectKeyRing(secretKey);
|
KeyRingInfo info = PGPainless.inspectKeyRing(secretKey);
|
||||||
assertEquals(DateUtil.formatUTCDate(expirationDate), DateUtil.formatUTCDate(info.getPrimaryKeyExpirationDate()));
|
assertEquals(DateUtil.formatUTCDate(expirationDate),
|
||||||
assertEquals(DateUtil.formatUTCDate(expirationDate), DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.ENCRYPT_COMMS)));
|
DateUtil.formatUTCDate(info.getPrimaryKeyExpirationDate()));
|
||||||
assertEquals(DateUtil.formatUTCDate(expirationDate), DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.SIGN_DATA)));
|
assertEquals(DateUtil.formatUTCDate(expirationDate),
|
||||||
|
DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.ENCRYPT_COMMS)));
|
||||||
|
assertEquals(DateUtil.formatUTCDate(expirationDate),
|
||||||
|
DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.SIGN_DATA)));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -223,7 +232,7 @@ public class ModifyKeys {
|
||||||
public void setSubkeyExpirationDate() throws PGPException {
|
public void setSubkeyExpirationDate() throws PGPException {
|
||||||
Date expirationDate = DateUtil.parseUTCDate("2032-01-13 22:30:01 UTC");
|
Date expirationDate = DateUtil.parseUTCDate("2032-01-13 22:30:01 UTC");
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector
|
SecretKeyRingProtector protector = SecretKeyRingProtector
|
||||||
.unlockAllKeysWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
.unlockEachKeyWith(Passphrase.fromPassword(originalPassphrase), secretKey);
|
||||||
|
|
||||||
secretKey = PGPainless.modifyKeyRing(secretKey)
|
secretKey = PGPainless.modifyKeyRing(secretKey)
|
||||||
.setExpirationDate(
|
.setExpirationDate(
|
||||||
|
@ -237,7 +246,8 @@ public class ModifyKeys {
|
||||||
KeyRingInfo info = PGPainless.inspectKeyRing(secretKey);
|
KeyRingInfo info = PGPainless.inspectKeyRing(secretKey);
|
||||||
assertNull(info.getPrimaryKeyExpirationDate());
|
assertNull(info.getPrimaryKeyExpirationDate());
|
||||||
assertNull(info.getExpirationDateForUse(KeyFlag.SIGN_DATA));
|
assertNull(info.getExpirationDateForUse(KeyFlag.SIGN_DATA));
|
||||||
assertEquals(DateUtil.formatUTCDate(expirationDate), DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.ENCRYPT_COMMS)));
|
assertEquals(DateUtil.formatUTCDate(expirationDate),
|
||||||
|
DateUtil.formatUTCDate(info.getExpirationDateForUse(KeyFlag.ENCRYPT_COMMS)));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -247,7 +257,7 @@ public class ModifyKeys {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void revokeUserId() throws PGPException {
|
public void revokeUserId() throws PGPException {
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockEachKeyWith(
|
||||||
Passphrase.fromPassword(originalPassphrase), secretKey);
|
Passphrase.fromPassword(originalPassphrase), secretKey);
|
||||||
secretKey = PGPainless.modifyKeyRing(secretKey)
|
secretKey = PGPainless.modifyKeyRing(secretKey)
|
||||||
.addUserId("alcie@pgpainless.org", protector)
|
.addUserId("alcie@pgpainless.org", protector)
|
||||||
|
|
|
@ -58,10 +58,10 @@ public class UnlockSecretKeys {
|
||||||
@Test
|
@Test
|
||||||
public void unlockWholeKeyWithSamePassphrase() throws PGPException, IOException {
|
public void unlockWholeKeyWithSamePassphrase() throws PGPException, IOException {
|
||||||
PGPSecretKeyRing secretKey = TestKeys.getCryptieSecretKeyRing();
|
PGPSecretKeyRing secretKey = TestKeys.getCryptieSecretKeyRing();
|
||||||
// Unlock all subkeys in the secret key with the same passphrase
|
Passphrase passphrase = TestKeys.CRYPTIE_PASSPHRASE;
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(
|
|
||||||
Passphrase.fromPassword(TestKeys.CRYPTIE_PASSWORD), secretKey);
|
|
||||||
|
|
||||||
|
// Unlock all subkeys in the secret key with the same passphrase
|
||||||
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAnyKeyWith(passphrase);
|
||||||
|
|
||||||
assertProtectorUnlocksAllSecretKeys(secretKey, protector);
|
assertProtectorUnlocksAllSecretKeys(secretKey, protector);
|
||||||
}
|
}
|
||||||
|
|
|
@ -65,7 +65,7 @@ public class AddSubKeyTest {
|
||||||
long subKeyId = keyIdsAfter.get(0);
|
long subKeyId = keyIdsAfter.get(0);
|
||||||
|
|
||||||
PGPSecretKey subKey = secretKeys.getSecretKey(subKeyId);
|
PGPSecretKey subKey = secretKeys.getSecretKey(subKeyId);
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockEachKeyWith(
|
||||||
Passphrase.fromPassword("subKeyPassphrase"), secretKeys);
|
Passphrase.fromPassword("subKeyPassphrase"), secretKeys);
|
||||||
PGPPrivateKey privateKey = UnlockSecretKey.unlockSecretKey(subKey, protector);
|
PGPPrivateKey privateKey = UnlockSecretKey.unlockSecretKey(subKey, protector);
|
||||||
|
|
||||||
|
|
|
@ -36,11 +36,13 @@ public class SecretKeyRingProtectorTest {
|
||||||
|
|
||||||
@ParameterizedTest
|
@ParameterizedTest
|
||||||
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
||||||
public void testUnlockAllKeysWithSamePassword(ImplementationFactory implementationFactory) throws IOException, PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
public void testUnlockAllKeysWithSamePassword(ImplementationFactory implementationFactory)
|
||||||
|
throws IOException, PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
||||||
|
|
||||||
PGPSecretKeyRing secretKeys = TestKeys.getCryptieSecretKeyRing();
|
PGPSecretKeyRing secretKeys = TestKeys.getCryptieSecretKeyRing();
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(TestKeys.CRYPTIE_PASSPHRASE, secretKeys);
|
SecretKeyRingProtector protector =
|
||||||
|
SecretKeyRingProtector.unlockEachKeyWith(TestKeys.CRYPTIE_PASSPHRASE, secretKeys);
|
||||||
for (PGPSecretKey secretKey : secretKeys) {
|
for (PGPSecretKey secretKey : secretKeys) {
|
||||||
PBESecretKeyDecryptor decryptor = protector.getDecryptor(secretKey.getKeyID());
|
PBESecretKeyDecryptor decryptor = protector.getDecryptor(secretKey.getKeyID());
|
||||||
assertNotNull(decryptor);
|
assertNotNull(decryptor);
|
||||||
|
@ -51,7 +53,8 @@ public class SecretKeyRingProtectorTest {
|
||||||
for (PGPSecretKey unrelatedKey : unrelatedKeys) {
|
for (PGPSecretKey unrelatedKey : unrelatedKeys) {
|
||||||
PBESecretKeyDecryptor decryptor = protector.getDecryptor(unrelatedKey.getKeyID());
|
PBESecretKeyDecryptor decryptor = protector.getDecryptor(unrelatedKey.getKeyID());
|
||||||
assertNull(decryptor);
|
assertNull(decryptor);
|
||||||
assertThrows(PGPException.class, () -> unrelatedKey.extractPrivateKey(protector.getDecryptor(unrelatedKey.getKeyID())));
|
assertThrows(PGPException.class,
|
||||||
|
() -> unrelatedKey.extractPrivateKey(protector.getDecryptor(unrelatedKey.getKeyID())));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -68,7 +71,8 @@ public class SecretKeyRingProtectorTest {
|
||||||
|
|
||||||
@ParameterizedTest
|
@ParameterizedTest
|
||||||
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
@MethodSource("org.pgpainless.util.TestImplementationFactoryProvider#provideImplementationFactories")
|
||||||
public void testUnlockSingleKeyWithPassphrase(ImplementationFactory implementationFactory) throws IOException, PGPException {
|
public void testUnlockSingleKeyWithPassphrase(ImplementationFactory implementationFactory)
|
||||||
|
throws IOException, PGPException {
|
||||||
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
ImplementationFactory.setFactoryImplementation(implementationFactory);
|
||||||
|
|
||||||
PGPSecretKeyRing secretKeys = TestKeys.getCryptieSecretKeyRing();
|
PGPSecretKeyRing secretKeys = TestKeys.getCryptieSecretKeyRing();
|
||||||
|
@ -76,7 +80,8 @@ public class SecretKeyRingProtectorTest {
|
||||||
PGPSecretKey secretKey = iterator.next();
|
PGPSecretKey secretKey = iterator.next();
|
||||||
PGPSecretKey subKey = iterator.next();
|
PGPSecretKey subKey = iterator.next();
|
||||||
|
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockSingleKeyWith(TestKeys.CRYPTIE_PASSPHRASE, secretKey);
|
SecretKeyRingProtector protector =
|
||||||
|
SecretKeyRingProtector.unlockSingleKeyWith(TestKeys.CRYPTIE_PASSPHRASE, secretKey);
|
||||||
assertNotNull(protector.getDecryptor(secretKey.getKeyID()));
|
assertNotNull(protector.getDecryptor(secretKey.getKeyID()));
|
||||||
assertNotNull(protector.getEncryptor(secretKey.getKeyID()));
|
assertNotNull(protector.getEncryptor(secretKey.getKeyID()));
|
||||||
assertNull(protector.getEncryptor(subKey.getKeyID()));
|
assertNull(protector.getEncryptor(subKey.getKeyID()));
|
||||||
|
@ -87,7 +92,8 @@ public class SecretKeyRingProtectorTest {
|
||||||
public void testFromPassphraseMap() {
|
public void testFromPassphraseMap() {
|
||||||
Map<Long, Passphrase> passphraseMap = new ConcurrentHashMap<>();
|
Map<Long, Passphrase> passphraseMap = new ConcurrentHashMap<>();
|
||||||
passphraseMap.put(1L, Passphrase.emptyPassphrase());
|
passphraseMap.put(1L, Passphrase.emptyPassphrase());
|
||||||
CachingSecretKeyRingProtector protector = (CachingSecretKeyRingProtector) SecretKeyRingProtector.fromPassphraseMap(passphraseMap);
|
CachingSecretKeyRingProtector protector =
|
||||||
|
(CachingSecretKeyRingProtector) SecretKeyRingProtector.fromPassphraseMap(passphraseMap);
|
||||||
|
|
||||||
assertNotNull(protector.getPassphraseFor(1L));
|
assertNotNull(protector.getPassphraseFor(1L));
|
||||||
assertNull(protector.getPassphraseFor(5L));
|
assertNull(protector.getPassphraseFor(5L));
|
||||||
|
|
|
@ -27,12 +27,17 @@ public class UnlockSecretKeyTest {
|
||||||
.simpleEcKeyRing("alice@wonderland.lit", "heureka!");
|
.simpleEcKeyRing("alice@wonderland.lit", "heureka!");
|
||||||
PGPSecretKey secretKey = secretKeyRing.getSecretKey();
|
PGPSecretKey secretKey = secretKeyRing.getSecretKey();
|
||||||
|
|
||||||
SecretKeyRingProtector correctPassphrase = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword("heureka!"), secretKeyRing);
|
SecretKeyRingProtector correctPassphrase = SecretKeyRingProtector
|
||||||
SecretKeyRingProtector incorrectPassphrase = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword("bazinga!"), secretKeyRing);
|
.unlockAnyKeyWith(Passphrase.fromPassword("heureka!"));
|
||||||
SecretKeyRingProtector emptyPassphrase = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.emptyPassphrase(), secretKeyRing);
|
SecretKeyRingProtector incorrectPassphrase = SecretKeyRingProtector
|
||||||
|
.unlockAnyKeyWith(Passphrase.fromPassword("bazinga!"));
|
||||||
|
SecretKeyRingProtector emptyPassphrase = SecretKeyRingProtector
|
||||||
|
.unlockAnyKeyWith(Passphrase.emptyPassphrase());
|
||||||
Passphrase cleared = Passphrase.fromPassword("cleared");
|
Passphrase cleared = Passphrase.fromPassword("cleared");
|
||||||
cleared.clear();
|
cleared.clear();
|
||||||
SecretKeyRingProtector invalidPassphrase = SecretKeyRingProtector.unlockAllKeysWith(cleared, secretKeyRing);
|
SecretKeyRingProtector invalidPassphrase = SecretKeyRingProtector
|
||||||
|
.unlockAnyKeyWith(cleared);
|
||||||
|
|
||||||
// Correct passphrase works
|
// Correct passphrase works
|
||||||
PGPPrivateKey privateKey = UnlockSecretKey.unlockSecretKey(secretKey, correctPassphrase);
|
PGPPrivateKey privateKey = UnlockSecretKey.unlockSecretKey(secretKey, correctPassphrase);
|
||||||
assertNotNull(privateKey);
|
assertNotNull(privateKey);
|
||||||
|
@ -41,7 +46,7 @@ public class UnlockSecretKeyTest {
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey, incorrectPassphrase));
|
UnlockSecretKey.unlockSecretKey(secretKey, incorrectPassphrase));
|
||||||
assertThrows(WrongPassphraseException.class, () ->
|
assertThrows(WrongPassphraseException.class, () ->
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey, emptyPassphrase));
|
UnlockSecretKey.unlockSecretKey(secretKey, emptyPassphrase));
|
||||||
assertThrows(WrongPassphraseException.class, () ->
|
assertThrows(IllegalStateException.class, () ->
|
||||||
UnlockSecretKey.unlockSecretKey(secretKey, invalidPassphrase));
|
UnlockSecretKey.unlockSecretKey(secretKey, invalidPassphrase));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -67,7 +67,8 @@ public class S2KUsageFixTest {
|
||||||
private static final String MESSAGE_PLAIN = "Hello, World!\n";
|
private static final String MESSAGE_PLAIN = "Hello, World!\n";
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void verifyOutFixInChangePassphraseWorks() throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, IOException {
|
public void verifyOutFixInChangePassphraseWorks()
|
||||||
|
throws PGPException, InvalidAlgorithmParameterException, NoSuchAlgorithmException {
|
||||||
PGPSecretKeyRing before = PGPainless.generateKeyRing().modernKeyRing("Alice", "before");
|
PGPSecretKeyRing before = PGPainless.generateKeyRing().modernKeyRing("Alice", "before");
|
||||||
for (PGPSecretKey key : before) {
|
for (PGPSecretKey key : before) {
|
||||||
assertEquals(SecretKeyPacket.USAGE_SHA1, key.getS2KUsage());
|
assertEquals(SecretKeyPacket.USAGE_SHA1, key.getS2KUsage());
|
||||||
|
@ -93,9 +94,10 @@ public class S2KUsageFixTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFixS2KUsageFrom_USAGE_CHECKSUM_to_USAGE_SHA1() throws IOException, PGPException {
|
public void testFixS2KUsageFrom_USAGE_CHECKSUM_to_USAGE_SHA1()
|
||||||
|
throws IOException, PGPException {
|
||||||
PGPSecretKeyRing keys = PGPainless.readKeyRing().secretKeyRing(KEY_WITH_USAGE_CHECKSUM);
|
PGPSecretKeyRing keys = PGPainless.readKeyRing().secretKeyRing(KEY_WITH_USAGE_CHECKSUM);
|
||||||
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAllKeysWith(Passphrase.fromPassword("after"), keys);
|
SecretKeyRingProtector protector = SecretKeyRingProtector.unlockAnyKeyWith(Passphrase.fromPassword("after"));
|
||||||
|
|
||||||
PGPSecretKeyRing fixed = S2KUsageFix.replaceUsageChecksumWithUsageSha1(keys, protector);
|
PGPSecretKeyRing fixed = S2KUsageFix.replaceUsageChecksumWithUsageSha1(keys, protector);
|
||||||
for (PGPSecretKey key : fixed) {
|
for (PGPSecretKey key : fixed) {
|
||||||
|
@ -105,7 +107,8 @@ public class S2KUsageFixTest {
|
||||||
testCanStillDecrypt(keys, protector);
|
testCanStillDecrypt(keys, protector);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void testCanStillDecrypt(PGPSecretKeyRing keys, SecretKeyRingProtector protector) throws PGPException, IOException {
|
private void testCanStillDecrypt(PGPSecretKeyRing keys, SecretKeyRingProtector protector)
|
||||||
|
throws PGPException, IOException {
|
||||||
ByteArrayInputStream in = new ByteArrayInputStream(MESSAGE.getBytes(StandardCharsets.UTF_8));
|
ByteArrayInputStream in = new ByteArrayInputStream(MESSAGE.getBytes(StandardCharsets.UTF_8));
|
||||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
||||||
.onInputStream(in)
|
.onInputStream(in)
|
||||||
|
|
Loading…
Reference in a new issue