Kotlin conversion: KeyRingUtils

This commit is contained in:
Paul Schaub 2023-09-04 16:32:01 +02:00
parent ab42a7503f
commit dc064d1727
Signed by: vanitasvitae
GPG Key ID: 62BEE9264BF17311
3 changed files with 495 additions and 589 deletions

View File

@ -1,589 +0,0 @@
// SPDX-FileCopyrightText: 2020 Paul Schaub <vanitasvitae@fsfe.org>
//
// SPDX-License-Identifier: Apache-2.0
package org.pgpainless.key.util;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Iterator;
import java.util.List;
import java.util.NoSuchElementException;
import javax.annotation.Nonnull;
import javax.annotation.Nullable;
import org.bouncycastle.bcpg.S2K;
import org.bouncycastle.bcpg.SecretKeyPacket;
import org.bouncycastle.openpgp.PGPException;
import org.bouncycastle.openpgp.PGPKeyRing;
import org.bouncycastle.openpgp.PGPPrivateKey;
import org.bouncycastle.openpgp.PGPPublicKey;
import org.bouncycastle.openpgp.PGPPublicKeyRing;
import org.bouncycastle.openpgp.PGPPublicKeyRingCollection;
import org.bouncycastle.openpgp.PGPSecretKey;
import org.bouncycastle.openpgp.PGPSecretKeyRing;
import org.bouncycastle.openpgp.PGPSecretKeyRingCollection;
import org.bouncycastle.openpgp.PGPSignature;
import org.bouncycastle.openpgp.PGPUserAttributeSubpacketVector;
import org.bouncycastle.openpgp.operator.PBESecretKeyDecryptor;
import org.bouncycastle.openpgp.operator.PBESecretKeyEncryptor;
import org.bouncycastle.util.Strings;
import org.pgpainless.PGPainless;
import org.pgpainless.implementation.ImplementationFactory;
import org.pgpainless.key.protection.SecretKeyRingProtector;
import org.pgpainless.key.protection.UnlockSecretKey;
import org.pgpainless.key.protection.fixes.S2KUsageFix;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public final class KeyRingUtils {
private KeyRingUtils() {
}
private static final Logger LOGGER = LoggerFactory.getLogger(KeyRingUtils.class);
/**
* Return the primary {@link PGPSecretKey} from the provided {@link PGPSecretKeyRing}.
* If it has no primary secret key, throw a {@link NoSuchElementException}.
*
* @param secretKeys secret keys
* @return primary secret key
*/
@Nonnull
public static PGPSecretKey requirePrimarySecretKeyFrom(@Nonnull PGPSecretKeyRing secretKeys) {
PGPSecretKey primarySecretKey = getPrimarySecretKeyFrom(secretKeys);
if (primarySecretKey == null) {
throw new NoSuchElementException("Provided PGPSecretKeyRing has no primary secret key.");
}
return primarySecretKey;
}
/**
* Return the primary {@link PGPSecretKey} from the provided {@link PGPSecretKeyRing} or null if it has none.
*
* @param secretKeys secret key ring
* @return primary secret key
*/
@Nullable
public static PGPSecretKey getPrimarySecretKeyFrom(@Nonnull PGPSecretKeyRing secretKeys) {
PGPSecretKey secretKey = secretKeys.getSecretKey();
if (secretKey.isMasterKey()) {
return secretKey;
}
return null;
}
/**
* Return the primary {@link PGPPublicKey} from the provided key ring.
* Throws a {@link NoSuchElementException} if the key ring has no primary public key.
*
* @param keyRing key ring
* @return primary public key
*/
@Nonnull
public static PGPPublicKey requirePrimaryPublicKeyFrom(@Nonnull PGPKeyRing keyRing) {
PGPPublicKey primaryPublicKey = getPrimaryPublicKeyFrom(keyRing);
if (primaryPublicKey == null) {
throw new NoSuchElementException("Provided PGPKeyRing has no primary public key.");
}
return primaryPublicKey;
}
/**
* Return the primary {@link PGPPublicKey} from the provided key ring or null if it has none.
*
* @param keyRing key ring
* @return primary public key
*/
@Nullable
public static PGPPublicKey getPrimaryPublicKeyFrom(@Nonnull PGPKeyRing keyRing) {
PGPPublicKey primaryPublicKey = keyRing.getPublicKey();
if (primaryPublicKey.isMasterKey()) {
return primaryPublicKey;
}
return null;
}
/**
* Return the public key with the given subKeyId from the keyRing.
* If no such subkey exists, return null.
* @param keyRing key ring
* @param subKeyId subkey id
* @return subkey or null
*/
@Nullable
public static PGPPublicKey getPublicKeyFrom(@Nonnull PGPKeyRing keyRing, long subKeyId) {
return keyRing.getPublicKey(subKeyId);
}
/**
* Require the public key with the given subKeyId from the keyRing.
* If no such subkey exists, throw an {@link NoSuchElementException}.
*
* @param keyRing key ring
* @param subKeyId subkey id
* @return subkey
*/
@Nonnull
public static PGPPublicKey requirePublicKeyFrom(@Nonnull PGPKeyRing keyRing, long subKeyId) {
PGPPublicKey publicKey = getPublicKeyFrom(keyRing, subKeyId);
if (publicKey == null) {
throw new NoSuchElementException("KeyRing does not contain public key with keyID " + Long.toHexString(subKeyId));
}
return publicKey;
}
/**
* Require the secret key with the given secret subKeyId from the secret keyRing.
* If no such subkey exists, throw an {@link NoSuchElementException}.
*
* @param keyRing secret key ring
* @param subKeyId subkey id
* @return secret subkey
*/
@Nonnull
public static PGPSecretKey requireSecretKeyFrom(@Nonnull PGPSecretKeyRing keyRing, long subKeyId) {
PGPSecretKey secretKey = keyRing.getSecretKey(subKeyId);
if (secretKey == null) {
throw new NoSuchElementException("KeyRing does not contain secret key with keyID " + Long.toHexString(subKeyId));
}
return secretKey;
}
@Nonnull
public static PGPPublicKeyRing publicKeys(@Nonnull PGPKeyRing keys) {
if (keys instanceof PGPPublicKeyRing) {
return (PGPPublicKeyRing) keys;
} else if (keys instanceof PGPSecretKeyRing) {
return publicKeyRingFrom((PGPSecretKeyRing) keys);
} else {
throw new IllegalArgumentException("Unknown keys class: " + keys.getClass().getName());
}
}
/**
* Extract a {@link PGPPublicKeyRing} containing all public keys from the provided {@link PGPSecretKeyRing}.
*
* @param secretKeys secret key ring
* @return public key ring
*/
@Nonnull
public static PGPPublicKeyRing publicKeyRingFrom(@Nonnull PGPSecretKeyRing secretKeys) {
List<PGPPublicKey> publicKeyList = new ArrayList<>();
Iterator<PGPPublicKey> publicKeyIterator = secretKeys.getPublicKeys();
while (publicKeyIterator.hasNext()) {
publicKeyList.add(publicKeyIterator.next());
}
PGPPublicKeyRing publicKeyRing = new PGPPublicKeyRing(publicKeyList);
return publicKeyRing;
}
/**
* Extract {@link PGPPublicKeyRing PGPPublicKeyRings} from all {@link PGPSecretKeyRing PGPSecretKeyRings} in
* the given {@link PGPSecretKeyRingCollection} and return them as a {@link PGPPublicKeyRingCollection}.
*
* @param secretKeyRings secret key ring collection
* @return public key ring collection
*/
@Nonnull
public static PGPPublicKeyRingCollection publicKeyRingCollectionFrom(@Nonnull PGPSecretKeyRingCollection secretKeyRings) {
List<PGPPublicKeyRing> certificates = new ArrayList<>();
for (PGPSecretKeyRing secretKey : secretKeyRings) {
certificates.add(PGPainless.extractCertificate(secretKey));
}
return new PGPPublicKeyRingCollection(certificates);
}
/**
* Unlock a {@link PGPSecretKey} and return the resulting {@link PGPPrivateKey}.
*
* @param secretKey secret key
* @param protector protector to unlock the secret key
* @return private key
*
* @throws PGPException if something goes wrong (e.g. wrong passphrase)
*/
@Nonnull
public static PGPPrivateKey unlockSecretKey(@Nonnull PGPSecretKey secretKey, @Nonnull SecretKeyRingProtector protector)
throws PGPException {
return UnlockSecretKey.unlockSecretKey(secretKey, protector);
}
/**
* Create a new {@link PGPPublicKeyRingCollection} from an array of {@link PGPPublicKeyRing PGPPublicKeyRings}.
*
* @param rings array of public key rings
* @return key ring collection
*/
@Nonnull
public static PGPPublicKeyRingCollection keyRingsToKeyRingCollection(@Nonnull PGPPublicKeyRing... rings) {
return new PGPPublicKeyRingCollection(Arrays.asList(rings));
}
/**
* Create a new {@link PGPSecretKeyRingCollection} from an array of {@link PGPSecretKeyRing PGPSecretKeyRings}.
*
* @param rings array of secret key rings
* @return secret key ring collection
*/
@Nonnull
public static PGPSecretKeyRingCollection keyRingsToKeyRingCollection(@Nonnull PGPSecretKeyRing... rings) {
return new PGPSecretKeyRingCollection(Arrays.asList(rings));
}
/**
* Return true, if the given {@link PGPPublicKeyRing} contains a {@link PGPPublicKey} for the given key id.
*
* @param ring public key ring
* @param keyId id of the key in question
* @return true if ring contains said key, false otherwise
*/
public static boolean keyRingContainsKeyWithId(@Nonnull PGPPublicKeyRing ring,
long keyId) {
return ring.getPublicKey(keyId) != null;
}
/**
* Inject a key certification for the primary key into the given key ring.
*
* @param keyRing key ring
* @param certification key signature
* @return key ring with injected signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
*/
@Nonnull
public static <T extends PGPKeyRing> T injectCertification(@Nonnull T keyRing,
@Nonnull PGPSignature certification) {
return injectCertification(keyRing, keyRing.getPublicKey(), certification);
}
/**
* Inject a key certification for the given key into the given key ring.
*
* @param keyRing key ring
* @param certifiedKey signed public key
* @param certification key signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected signature
*
* @throws NoSuchElementException in case that the signed key is not part of the key ring
*/
@Nonnull
public static <T extends PGPKeyRing> T injectCertification(@Nonnull T keyRing,
@Nonnull PGPPublicKey certifiedKey,
@Nonnull PGPSignature certification) {
PGPSecretKeyRing secretKeys = null;
PGPPublicKeyRing publicKeys;
if (keyRing instanceof PGPSecretKeyRing) {
secretKeys = (PGPSecretKeyRing) keyRing;
publicKeys = PGPainless.extractCertificate(secretKeys);
} else {
publicKeys = (PGPPublicKeyRing) keyRing;
}
certifiedKey = PGPPublicKey.addCertification(certifiedKey, certification);
List<PGPPublicKey> publicKeyList = new ArrayList<>();
Iterator<PGPPublicKey> publicKeyIterator = publicKeys.iterator();
boolean added = false;
while (publicKeyIterator.hasNext()) {
PGPPublicKey key = publicKeyIterator.next();
if (key.getKeyID() == certifiedKey.getKeyID()) {
added = true;
publicKeyList.add(certifiedKey);
} else {
publicKeyList.add(key);
}
}
if (!added) {
throw new NoSuchElementException("Cannot find public key with id " + Long.toHexString(certifiedKey.getKeyID()) + " in the provided key ring.");
}
publicKeys = new PGPPublicKeyRing(publicKeyList);
if (secretKeys == null) {
return (T) publicKeys;
} else {
secretKeys = PGPSecretKeyRing.replacePublicKeys(secretKeys, publicKeys);
return (T) secretKeys;
}
}
/**
* Inject a user-id certification into the given key ring.
*
* @param keyRing key ring
* @param userId signed user-id
* @param certification signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected certification
*/
@Nonnull
public static <T extends PGPKeyRing> T injectCertification(@Nonnull T keyRing,
@Nonnull String userId,
@Nonnull PGPSignature certification) {
PGPSecretKeyRing secretKeys = null;
PGPPublicKeyRing publicKeys;
if (keyRing instanceof PGPSecretKeyRing) {
secretKeys = (PGPSecretKeyRing) keyRing;
publicKeys = PGPainless.extractCertificate(secretKeys);
} else {
publicKeys = (PGPPublicKeyRing) keyRing;
}
Iterator<PGPPublicKey> publicKeyIterator = publicKeys.iterator();
PGPPublicKey primaryKey = publicKeyIterator.next();
primaryKey = PGPPublicKey.addCertification(primaryKey, userId, certification);
List<PGPPublicKey> publicKeyList = new ArrayList<>();
publicKeyList.add(primaryKey);
while (publicKeyIterator.hasNext()) {
publicKeyList.add(publicKeyIterator.next());
}
publicKeys = new PGPPublicKeyRing(publicKeyList);
if (secretKeys == null) {
return (T) publicKeys;
} else {
secretKeys = PGPSecretKeyRing.replacePublicKeys(secretKeys, publicKeys);
return (T) secretKeys;
}
}
/**
* Inject a user-attribute vector certification into the given key ring.
*
* @param keyRing key ring
* @param userAttributes certified user attributes
* @param certification certification signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected user-attribute certification
*/
@Nonnull
public static <T extends PGPKeyRing> T injectCertification(@Nonnull T keyRing,
@Nonnull PGPUserAttributeSubpacketVector userAttributes,
@Nonnull PGPSignature certification) {
PGPSecretKeyRing secretKeys = null;
PGPPublicKeyRing publicKeys;
if (keyRing instanceof PGPSecretKeyRing) {
secretKeys = (PGPSecretKeyRing) keyRing;
publicKeys = PGPainless.extractCertificate(secretKeys);
} else {
publicKeys = (PGPPublicKeyRing) keyRing;
}
Iterator<PGPPublicKey> publicKeyIterator = publicKeys.iterator();
PGPPublicKey primaryKey = publicKeyIterator.next();
primaryKey = PGPPublicKey.addCertification(primaryKey, userAttributes, certification);
List<PGPPublicKey> publicKeyList = new ArrayList<>();
publicKeyList.add(primaryKey);
while (publicKeyIterator.hasNext()) {
publicKeyList.add(publicKeyIterator.next());
}
publicKeys = new PGPPublicKeyRing(publicKeyList);
if (secretKeys == null) {
return (T) publicKeys;
} else {
secretKeys = PGPSecretKeyRing.replacePublicKeys(secretKeys, publicKeys);
return (T) secretKeys;
}
}
/**
* Inject a {@link PGPPublicKey} into the given key ring.
*
* @param keyRing key ring
* @param publicKey public key
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected public key
*/
@Nonnull
public static <T extends PGPKeyRing> T keysPlusPublicKey(@Nonnull T keyRing,
@Nonnull PGPPublicKey publicKey) {
PGPSecretKeyRing secretKeys = null;
PGPPublicKeyRing publicKeys;
if (keyRing instanceof PGPSecretKeyRing) {
secretKeys = (PGPSecretKeyRing) keyRing;
publicKeys = PGPainless.extractCertificate(secretKeys);
} else {
publicKeys = (PGPPublicKeyRing) keyRing;
}
publicKeys = PGPPublicKeyRing.insertPublicKey(publicKeys, publicKey);
if (secretKeys == null) {
return (T) publicKeys;
} else {
secretKeys = PGPSecretKeyRing.insertOrReplacePublicKey(secretKeys, publicKey);
return (T) secretKeys;
}
}
/**
* Inject a {@link PGPSecretKey} into a {@link PGPSecretKeyRing}.
*
* @param secretKeys secret key ring
* @param secretKey secret key
* @return secret key ring with injected secret key
*/
@Nonnull
public static PGPSecretKeyRing keysPlusSecretKey(@Nonnull PGPSecretKeyRing secretKeys,
@Nonnull PGPSecretKey secretKey) {
return PGPSecretKeyRing.insertSecretKey(secretKeys, secretKey);
}
/**
* Inject the given signature into the public part of the given secret key.
* @param secretKey secret key
* @param signature signature
* @return secret key with the signature injected in its public key
*/
@Nonnull
public static PGPSecretKey secretKeyPlusSignature(@Nonnull PGPSecretKey secretKey,
@Nonnull PGPSignature signature) {
PGPPublicKey publicKey = secretKey.getPublicKey();
publicKey = PGPPublicKey.addCertification(publicKey, signature);
PGPSecretKey newSecretKey = PGPSecretKey.replacePublicKey(secretKey, publicKey);
return newSecretKey;
}
/**
* Remove the secret key of the subkey identified by the given secret key id from the key ring.
* The public part stays attached to the key ring, so that it can still be used for encryption / verification of signatures.
*
* This method is intended to be used to remove secret primary keys from live keys when those are kept in offline storage.
*
* @param secretKeys secret key ring
* @param secretKeyId id of the secret key to remove
* @return secret key ring with removed secret key
*
* @throws IOException in case of an error during serialization / deserialization of the key
* @throws PGPException in case of a broken key
*/
@Nonnull
public static PGPSecretKeyRing stripSecretKey(@Nonnull PGPSecretKeyRing secretKeys,
long secretKeyId)
throws IOException, PGPException {
if (secretKeys.getPublicKey().getKeyID() == secretKeyId) {
throw new IllegalArgumentException("Bouncy Castle currently cannot deal with stripped secret primary keys.");
}
if (secretKeys.getSecretKey(secretKeyId) == null) {
throw new NoSuchElementException("PGPSecretKeyRing does not contain secret key " + Long.toHexString(secretKeyId));
}
// Since BCs constructors for secret key rings are mostly private, we need to encode the key ring how we want it
// and then parse it again.
ByteArrayOutputStream encoded = new ByteArrayOutputStream();
for (PGPSecretKey secretKey : secretKeys) {
if (secretKey.getKeyID() == secretKeyId) {
// only encode the public part of the target key
secretKey.getPublicKey().encode(encoded);
} else {
// otherwise, encode secret + public key
secretKey.encode(encoded);
}
}
for (Iterator<PGPPublicKey> it = secretKeys.getExtraPublicKeys(); it.hasNext(); ) {
PGPPublicKey extra = it.next();
extra.encode(encoded);
}
// Parse the key back into an object
return new PGPSecretKeyRing(encoded.toByteArray(), ImplementationFactory.getInstance().getKeyFingerprintCalculator());
}
/**
* Strip all user-ids, user-attributes and signatures from the given public key.
*
* @param bloatedKey public key
* @return stripped public key
* @throws PGPException if the packet is faulty or the required calculations fail
*/
public static PGPPublicKey getStrippedDownPublicKey(PGPPublicKey bloatedKey) throws PGPException {
return new PGPPublicKey(bloatedKey.getPublicKeyPacket(), ImplementationFactory.getInstance().getKeyFingerprintCalculator());
}
public static List<String> getUserIdsIgnoringInvalidUTF8(PGPPublicKey key) {
List<String> userIds = new ArrayList<>();
Iterator<byte[]> it = key.getRawUserIDs();
while (it.hasNext()) {
byte[] rawUserId = it.next();
try {
userIds.add(Strings.fromUTF8ByteArray(rawUserId));
} catch (IllegalArgumentException e) {
LOGGER.warn("Invalid UTF-8 user-ID encountered: " + new String(rawUserId));
}
}
return userIds;
}
public static PGPSecretKeyRing changePassphrase(Long keyId,
PGPSecretKeyRing secretKeys,
SecretKeyRingProtector oldProtector,
SecretKeyRingProtector newProtector)
throws PGPException {
List<PGPSecretKey> secretKeyList = new ArrayList<>();
if (keyId == null) {
// change passphrase of whole key ring
Iterator<PGPSecretKey> secretKeyIterator = secretKeys.getSecretKeys();
while (secretKeyIterator.hasNext()) {
PGPSecretKey secretKey = secretKeyIterator.next();
secretKey = KeyRingUtils.reencryptPrivateKey(secretKey, oldProtector, newProtector);
secretKeyList.add(secretKey);
}
} else {
// change passphrase of selected subkey only
Iterator<PGPSecretKey> secretKeyIterator = secretKeys.getSecretKeys();
while (secretKeyIterator.hasNext()) {
PGPSecretKey secretKey = secretKeyIterator.next();
if (secretKey.getPublicKey().getKeyID() == keyId) {
// Re-encrypt only the selected subkey
secretKey = KeyRingUtils.reencryptPrivateKey(secretKey, oldProtector, newProtector);
}
secretKeyList.add(secretKey);
}
}
PGPSecretKeyRing newRing = new PGPSecretKeyRing(secretKeyList);
newRing = s2kUsageFixIfNecessary(newRing, newProtector);
return newRing;
}
public static PGPSecretKey reencryptPrivateKey(
PGPSecretKey secretKey,
SecretKeyRingProtector oldProtector,
SecretKeyRingProtector newProtector)
throws PGPException {
S2K s2k = secretKey.getS2K();
// If the key uses GNU_DUMMY_S2K, we leave it as is and skip this block
if (s2k == null || s2k.getType() != S2K.GNU_DUMMY_S2K) {
long secretKeyId = secretKey.getKeyID();
PBESecretKeyDecryptor decryptor = oldProtector.getDecryptor(secretKeyId);
PBESecretKeyEncryptor encryptor = newProtector.getEncryptor(secretKeyId);
secretKey = PGPSecretKey.copyWithNewPassword(secretKey, decryptor, encryptor);
}
return secretKey;
}
public static PGPSecretKeyRing s2kUsageFixIfNecessary(PGPSecretKeyRing secretKeys, SecretKeyRingProtector protector)
throws PGPException {
boolean hasS2KUsageChecksum = false;
for (PGPSecretKey secKey : secretKeys) {
if (secKey.getS2KUsage() == SecretKeyPacket.USAGE_CHECKSUM) {
hasS2KUsageChecksum = true;
break;
}
}
if (hasS2KUsageChecksum) {
secretKeys = S2KUsageFix.replaceUsageChecksumWithUsageSha1(
secretKeys, protector, true);
}
return secretKeys;
}
}

View File

@ -0,0 +1,11 @@
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
//
// SPDX-License-Identifier: Apache-2.0
package org.bouncycastle.extensions
import org.bouncycastle.openpgp.PGPPublicKeyRing
import org.bouncycastle.openpgp.PGPSecretKeyRing
val PGPSecretKeyRing.certificate: PGPPublicKeyRing
get() = PGPPublicKeyRing(this.publicKeys.asSequence().toList())

View File

@ -0,0 +1,484 @@
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
//
// SPDX-License-Identifier: Apache-2.0
package org.pgpainless.key.util
import _kotlin.hexKeyId
import org.bouncycastle.bcpg.S2K
import org.bouncycastle.bcpg.SecretKeyPacket
import org.bouncycastle.extensions.certificate
import org.bouncycastle.openpgp.*
import org.bouncycastle.util.Strings
import org.pgpainless.exception.MissingPassphraseException
import org.pgpainless.implementation.ImplementationFactory
import org.pgpainless.key.protection.SecretKeyRingProtector
import org.pgpainless.key.protection.UnlockSecretKey
import org.pgpainless.key.protection.fixes.S2KUsageFix
import org.slf4j.Logger
import org.slf4j.LoggerFactory
import java.io.ByteArrayOutputStream
import kotlin.jvm.Throws
class KeyRingUtils {
companion object {
@JvmStatic
private val LOGGER: Logger = LoggerFactory.getLogger(KeyRingUtils::class.java)
/**
* Return the primary {@link PGPSecretKey} from the provided {@link PGPSecretKeyRing}.
* If it has no primary secret key, throw a {@link NoSuchElementException}.
*
* @param secretKeys secret keys
* @return primary secret key
*/
@JvmStatic
fun requirePrimarySecretKeyFrom(secretKeys: PGPSecretKeyRing): PGPSecretKey {
return getPrimarySecretKeyFrom(secretKeys)
?: throw NoSuchElementException("Provided PGPSecretKeyRing has no primary secret key.")
}
/**
* Return the primary secret key from the given secret key ring.
* If the key ring only contains subkeys (e.g. if the primary secret key is stripped),
* this method may return null.
*
* @param secretKeys secret key ring
* @return primary secret key
*/
@JvmStatic
fun getPrimarySecretKeyFrom(secretKeys: PGPSecretKeyRing): PGPSecretKey? {
return secretKeys.secretKey.let {
if (it.isMasterKey) {
it
} else {
null
}
}
}
/**
* Return the primary {@link PGPPublicKey} from the provided key ring.
* Throws a {@link NoSuchElementException} if the key ring has no primary public key.
*
* @param keyRing key ring
* @return primary public key
*/
@JvmStatic
fun requirePrimaryPublicKeyFrom(keyRing: PGPKeyRing): PGPPublicKey {
return getPrimaryPublicKey(keyRing)
?: throw NoSuchElementException("Provided PGPKeyRing has no primary public key.")
}
/**
* Return the primary {@link PGPPublicKey} from the provided key ring or null if it has none.
*
* @param keyRing key ring
* @return primary public key
*/
@JvmStatic
fun getPrimaryPublicKey(keyRing: PGPKeyRing): PGPPublicKey? {
return keyRing.publicKey.let {
if (it.isMasterKey) {
it
} else {
null
}
}
}
/**
* Require the public key with the given subKeyId from the keyRing.
* If no such subkey exists, throw an {@link NoSuchElementException}.
*
* @param keyRing key ring
* @param subKeyId subkey id
* @return subkey
*/
@JvmStatic
fun requirePublicKeyFrom(keyRing: PGPKeyRing, subKeyId: Long): PGPPublicKey {
return keyRing.getPublicKey(subKeyId)
?: throw NoSuchElementException("KeyRing does not contain public key with keyId ${subKeyId.hexKeyId()}.")
}
/**
* Require the secret key with the given secret subKeyId from the secret keyRing.
* If no such subkey exists, throw an {@link NoSuchElementException}.
*
* @param keyRing secret key ring
* @param subKeyId subkey id
* @return secret subkey
*/
@JvmStatic
fun requireSecretKeyFrom(keyRing: PGPSecretKeyRing, subKeyId: Long): PGPSecretKey {
return keyRing.getSecretKey(subKeyId)
?: throw NoSuchElementException("KeyRing does not contain secret key with keyID ${subKeyId.hexKeyId()}.")
}
@JvmStatic
fun publicKeys(keys: PGPKeyRing): PGPPublicKeyRing {
return when (keys) {
is PGPPublicKeyRing -> keys
is PGPSecretKeyRing -> keys.certificate
else -> throw IllegalArgumentException("Unknown keys class: ${keys.javaClass.name}")
}
}
/**
* Extract a {@link PGPPublicKeyRing} containing all public keys from the provided {@link PGPSecretKeyRing}.
*
* @param secretKeys secret key ring
* @return public key ring
*/
@JvmStatic
@Deprecated("Deprecated in favor of PGPSecretKeyRing extension method.",
ReplaceWith("secretKeys.certificate", "org.bouncycastle.extensions.certificate"))
fun publicKeyRingFrom(secretKeys: PGPSecretKeyRing): PGPPublicKeyRing {
return secretKeys.certificate
}
/**
* Extract {@link PGPPublicKeyRing PGPPublicKeyRings} from all {@link PGPSecretKeyRing PGPSecretKeyRings} in
* the given {@link PGPSecretKeyRingCollection} and return them as a {@link PGPPublicKeyRingCollection}.
*
* @param secretKeyRings secret key ring collection
* @return public key ring collection
*/
@JvmStatic
fun publicKeyRingCollectionFrom(secretKeyRings: PGPSecretKeyRingCollection): PGPPublicKeyRingCollection {
return PGPPublicKeyRingCollection(
secretKeyRings.keyRings.asSequence()
.map { it.certificate }
.toList())
}
/**
* Unlock a {@link PGPSecretKey} and return the resulting {@link PGPPrivateKey}.
*
* @param secretKey secret key
* @param protector protector to unlock the secret key
* @return private key
*
* @throws PGPException if something goes wrong (e.g. wrong passphrase)
*/
@JvmStatic
fun unlockSecretKey(secretKey: PGPSecretKey, protector: SecretKeyRingProtector): PGPPrivateKey {
return UnlockSecretKey.unlockSecretKey(secretKey, protector)
}
/**
* Create a new {@link PGPPublicKeyRingCollection} from an array of {@link PGPPublicKeyRing PGPPublicKeyRings}.
*
* @param certificates array of public key rings
* @return key ring collection
*/
@JvmStatic
fun keyRingsToKeyRingCollection(vararg certificates: PGPPublicKeyRing): PGPPublicKeyRingCollection {
return PGPPublicKeyRingCollection(certificates.toList())
}
/**
* Create a new {@link PGPSecretKeyRingCollection} from an array of {@link PGPSecretKeyRing PGPSecretKeyRings}.
*
* @param secretKeys array of secret key rings
* @return secret key ring collection
*/
@JvmStatic
fun keyRingsToKeyRingCollection(vararg secretKeys: PGPSecretKeyRing): PGPSecretKeyRingCollection {
return PGPSecretKeyRingCollection(secretKeys.toList())
}
/**
* Return true, if the given {@link PGPPublicKeyRing} contains a {@link PGPPublicKey} for the given key id.
*
* @param certificate public key ring
* @param keyId id of the key in question
* @return true if ring contains said key, false otherwise
*/
@JvmStatic
fun keyRingContainsKeyWithId(certificate: PGPPublicKeyRing, keyId: Long): Boolean {
return certificate.getPublicKey(keyId) != null
}
/**
* Inject a key certification for the primary key into the given key ring.
*
* @param keyRing key ring
* @param certification key signature
* @return key ring with injected signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
*/
@JvmStatic
fun <T : PGPKeyRing> injectCertification(keyRing: T, certification: PGPSignature): T {
return injectCertification(keyRing, keyRing.publicKey, certification)
}
/**
* Inject a key certification for the given key into the given key ring.
*
* @param keyRing key ring
* @param certifiedKey signed public key
* @param certification key signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected signature
*
* @throws NoSuchElementException in case that the signed key is not part of the key ring
*/
@JvmStatic
fun <T : PGPKeyRing> injectCertification(keyRing: T, certifiedKey: PGPPublicKey, certification: PGPSignature): T {
val secretAndPublicKeys = secretAndPublicKeys(keyRing)
val secretKeys: PGPSecretKeyRing? = secretAndPublicKeys.first
var certificate: PGPPublicKeyRing = secretAndPublicKeys.second
if (!keyRingContainsKeyWithId(certificate, certifiedKey.keyID)) {
throw NoSuchElementException("Cannot find public key with id ${certifiedKey.keyID.hexKeyId()} in the provided key ring.")
}
certificate = PGPPublicKeyRing(
certificate.publicKeys.asSequence().map {
if (it.keyID == certifiedKey.keyID) {
PGPPublicKey.addCertification(it, certification)
} else {
it
}
}.toList())
return if (secretKeys == null) {
certificate as T
} else {
PGPSecretKeyRing.replacePublicKeys(secretKeys, certificate) as T
}
}
/**
* Inject a user-id certification into the given key ring.
*
* @param keyRing key ring
* @param userId signed user-id
* @param certification signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected certification
*/
@JvmStatic
fun <T : PGPKeyRing> injectCertification(keyRing: T, userId: CharSequence, certification: PGPSignature): T {
val secretAndPublicKeys = secretAndPublicKeys(keyRing)
val secretKeys: PGPSecretKeyRing? = secretAndPublicKeys.first
var certificate: PGPPublicKeyRing = secretAndPublicKeys.second
certificate = PGPPublicKeyRing(
listOf<PGPPublicKey>(
PGPPublicKey.addCertification(requirePrimaryPublicKeyFrom(certificate),
userId.toString(), certification)
).plus(certificate.publicKeys.asSequence().drop(1)))
return if (secretKeys == null) {
certificate as T
} else {
PGPSecretKeyRing.replacePublicKeys(secretKeys, certificate) as T
}
}
/**
* Inject a user-attribute vector certification into the given key ring.
*
* @param keyRing key ring
* @param userAttributes certified user attributes
* @param certification certification signature
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected user-attribute certification
*/
@JvmStatic
fun <T : PGPKeyRing> injectCertification(keyRing: T, userAttributes: PGPUserAttributeSubpacketVector, certification: PGPSignature): T {
val secretAndPublicKeys = secretAndPublicKeys(keyRing)
val secretKeys: PGPSecretKeyRing? = secretAndPublicKeys.first
var certificate: PGPPublicKeyRing = secretAndPublicKeys.second
certificate = PGPPublicKeyRing(
listOf<PGPPublicKey>(
PGPPublicKey.addCertification(requirePrimaryPublicKeyFrom(certificate),
userAttributes, certification)
).plus(certificate.publicKeys.asSequence().drop(1)))
return if (secretKeys == null) {
certificate as T
} else {
PGPSecretKeyRing.replacePublicKeys(secretKeys, certificate) as T
}
}
/**
* Inject a {@link PGPPublicKey} into the given key ring.
*
* @param keyRing key ring
* @param publicKey public key
* @param <T> either {@link PGPPublicKeyRing} or {@link PGPSecretKeyRing}
* @return key ring with injected public key
*/
@JvmStatic
fun <T : PGPKeyRing> keysPlusPublicKey(keyRing: T, publicKey: PGPPublicKey): T {
val secretAndPublicKeys = secretAndPublicKeys(keyRing)
val secretKeys: PGPSecretKeyRing? = secretAndPublicKeys.first
var certificate: PGPPublicKeyRing = secretAndPublicKeys.second
return if (secretKeys == null) {
PGPPublicKeyRing.insertPublicKey(certificate, publicKey) as T
} else {
PGPSecretKeyRing.insertOrReplacePublicKey(secretKeys, publicKey) as T
}
}
@JvmStatic
private fun secretAndPublicKeys(keyRing: PGPKeyRing): Pair<PGPSecretKeyRing?, PGPPublicKeyRing> {
var secretKeys: PGPSecretKeyRing? = null
val certificate: PGPPublicKeyRing
when (keyRing) {
is PGPSecretKeyRing -> {
secretKeys = keyRing
certificate = secretKeys.certificate
}
is PGPPublicKeyRing -> {
certificate = keyRing
}
else -> throw IllegalArgumentException("keyRing is an unknown PGPKeyRing subclass: ${keyRing.javaClass.name}")
}
return secretKeys to certificate
}
/**
* Inject a {@link PGPSecretKey} into a {@link PGPSecretKeyRing}.
*
* @param secretKeys secret key ring
* @param secretKey secret key
* @return secret key ring with injected secret key
*/
@JvmStatic
fun keysPlusSecretKey(secretKeys: PGPSecretKeyRing, secretKey: PGPSecretKey): PGPSecretKeyRing {
return PGPSecretKeyRing.insertSecretKey(secretKeys, secretKey)
}
/**
* Inject the given signature into the public part of the given secret key.
* @param secretKey secret key
* @param signature signature
* @return secret key with the signature injected in its public key
*/
@JvmStatic
fun secretKeyPlusSignature(secretKey: PGPSecretKey, signature: PGPSignature): PGPSecretKey {
PGPPublicKey.addCertification(secretKey.publicKey, signature).let {
return PGPSecretKey.replacePublicKey(secretKey, it)
}
}
/**
* Remove the secret key of the subkey identified by the given secret key id from the key ring.
* The public part stays attached to the key ring, so that it can still be used for encryption / verification of signatures.
*
* This method is intended to be used to remove secret primary keys from live keys when those are kept in offline storage.
*
* @param secretKeys secret key ring
* @param keyId id of the secret key to remove
* @return secret key ring with removed secret key
*
* @throws IOException in case of an error during serialization / deserialization of the key
* @throws PGPException in case of a broken key
*/
@JvmStatic
fun stripSecretKey(secretKeys: PGPSecretKeyRing, keyId: Long): PGPSecretKeyRing {
require(keyId != secretKeys.publicKey.keyID) {
"Bouncy Castle currently cannot deal with stripped primary secret keys."
}
if (secretKeys.getSecretKey(keyId) == null) {
throw NoSuchElementException("PGPSecretKeyRing does not contain secret key ${keyId.hexKeyId()}.")
}
val out = ByteArrayOutputStream()
secretKeys.forEach {
if (it.keyID == keyId) {
// only encode the public key
it.publicKey.encode(out)
} else {
// else encode the whole secret + public key
it.encode(out)
}
}
secretKeys.extraPublicKeys.forEach {
it.encode(out)
}
return PGPSecretKeyRing(out.toByteArray(), ImplementationFactory.getInstance().keyFingerprintCalculator)
}
/**
* Strip all user-ids, user-attributes and signatures from the given public key.
*
* @param bloatedKey public key
* @return stripped public key
* @throws PGPException if the packet is faulty or the required calculations fail
*/
@JvmStatic
fun getStrippedDownPublicKey(bloatedKey: PGPPublicKey): PGPPublicKey {
return PGPPublicKey(bloatedKey.publicKeyPacket, ImplementationFactory.getInstance().keyFingerprintCalculator)
}
@JvmStatic
fun getUserIdsIgnoringInvalidUTF8(key: PGPPublicKey): List<String> {
return buildList {
key.rawUserIDs.forEach {
try {
add(Strings.fromUTF8ByteArray(it))
} catch (e : IllegalArgumentException) {
LOGGER.warn("Invalid UTF-8 user-ID encountered: ${String(it)}")
}
}
}
}
@JvmStatic
@Throws(MissingPassphraseException::class, PGPException::class)
fun changePassphrase(keyId: Long?,
secretKeys: PGPSecretKeyRing,
oldProtector: SecretKeyRingProtector,
newProtector: SecretKeyRingProtector): PGPSecretKeyRing {
return if (keyId == null) {
PGPSecretKeyRing(
secretKeys.secretKeys.asSequence().map {
reencryptPrivateKey(it, oldProtector, newProtector)
}.toList()
)
} else {
PGPSecretKeyRing(
secretKeys.secretKeys.asSequence().map {
if (it.keyID == keyId) {
reencryptPrivateKey(it, oldProtector, newProtector)
} else {
it
}
}.toList()
)
}.let { s2kUsageFixIfNecessary(it, newProtector) }
}
@JvmStatic
fun reencryptPrivateKey(secretKey: PGPSecretKey,
oldProtector: SecretKeyRingProtector,
newProtector: SecretKeyRingProtector): PGPSecretKey {
if (secretKey.s2K != null && secretKey.s2K.type == S2K.GNU_DUMMY_S2K) {
// If the key uses GNU_DUMMY_S2K we leave it as is
return secretKey
}
return PGPSecretKey.copyWithNewPassword(secretKey,
oldProtector.getDecryptor(secretKey.keyID),
newProtector.getEncryptor(secretKey.keyID))
}
@JvmStatic
fun s2kUsageFixIfNecessary(secretKeys: PGPSecretKeyRing, protector: SecretKeyRingProtector): PGPSecretKeyRing {
if (secretKeys.secretKeys.asSequence().any { it.s2KUsage == SecretKeyPacket.USAGE_CHECKSUM }) {
return S2KUsageFix.replaceUsageChecksumWithUsageSha1(secretKeys, protector, true)
}
return secretKeys
}
}
}