mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-11-26 22:32:07 +01:00
Add ProducerOptions.applyCRLFEncoding()
Enabling it will automatically apply CRLF encoding to input data. Further, disentangle signing from the encryption stream
This commit is contained in:
parent
ade07bde85
commit
f8e66f4d61
4 changed files with 214 additions and 41 deletions
|
@ -21,6 +21,7 @@ import org.bouncycastle.openpgp.PGPSignatureGenerator;
|
||||||
import org.bouncycastle.openpgp.operator.PGPDataEncryptorBuilder;
|
import org.bouncycastle.openpgp.operator.PGPDataEncryptorBuilder;
|
||||||
import org.bouncycastle.openpgp.operator.PGPKeyEncryptionMethodGenerator;
|
import org.bouncycastle.openpgp.operator.PGPKeyEncryptionMethodGenerator;
|
||||||
import org.pgpainless.algorithm.CompressionAlgorithm;
|
import org.pgpainless.algorithm.CompressionAlgorithm;
|
||||||
|
import org.pgpainless.algorithm.StreamEncoding;
|
||||||
import org.pgpainless.algorithm.SymmetricKeyAlgorithm;
|
import org.pgpainless.algorithm.SymmetricKeyAlgorithm;
|
||||||
import org.pgpainless.implementation.ImplementationFactory;
|
import org.pgpainless.implementation.ImplementationFactory;
|
||||||
import org.pgpainless.key.SubkeyIdentifier;
|
import org.pgpainless.key.SubkeyIdentifier;
|
||||||
|
@ -70,6 +71,8 @@ public final class EncryptionStream extends OutputStream {
|
||||||
prepareCompression();
|
prepareCompression();
|
||||||
prepareOnePassSignatures();
|
prepareOnePassSignatures();
|
||||||
prepareLiteralDataProcessing();
|
prepareLiteralDataProcessing();
|
||||||
|
prepareSigningStream();
|
||||||
|
prepareInputEncoding();
|
||||||
}
|
}
|
||||||
|
|
||||||
private void prepareArmor() {
|
private void prepareArmor() {
|
||||||
|
@ -174,20 +177,19 @@ public final class EncryptionStream extends OutputStream {
|
||||||
.setFileEncoding(options.getEncoding());
|
.setFileEncoding(options.getEncoding());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void prepareSigningStream() {
|
||||||
|
outermostStream = new SignatureGenerationStream(outermostStream, options.getSigningOptions());
|
||||||
|
}
|
||||||
|
|
||||||
|
public void prepareInputEncoding() {
|
||||||
|
CRLFGeneratorStream crlfGeneratorStream = new CRLFGeneratorStream(outermostStream,
|
||||||
|
options.isApplyCRLFEncoding() ? StreamEncoding.UTF8 : StreamEncoding.BINARY);
|
||||||
|
outermostStream = crlfGeneratorStream;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void write(int data) throws IOException {
|
public void write(int data) throws IOException {
|
||||||
outermostStream.write(data);
|
outermostStream.write(data);
|
||||||
SigningOptions signingOptions = options.getSigningOptions();
|
|
||||||
if (signingOptions == null || signingOptions.getSigningMethods().isEmpty()) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
for (SubkeyIdentifier signingKey : signingOptions.getSigningMethods().keySet()) {
|
|
||||||
SigningOptions.SigningMethod signingMethod = signingOptions.getSigningMethods().get(signingKey);
|
|
||||||
PGPSignatureGenerator signatureGenerator = signingMethod.getSignatureGenerator();
|
|
||||||
byte asByte = (byte) (data & 0xff);
|
|
||||||
signatureGenerator.update(asByte);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -199,15 +201,6 @@ public final class EncryptionStream extends OutputStream {
|
||||||
@Override
|
@Override
|
||||||
public void write(@Nonnull byte[] buffer, int off, int len) throws IOException {
|
public void write(@Nonnull byte[] buffer, int off, int len) throws IOException {
|
||||||
outermostStream.write(buffer, 0, len);
|
outermostStream.write(buffer, 0, len);
|
||||||
SigningOptions signingOptions = options.getSigningOptions();
|
|
||||||
if (signingOptions == null || signingOptions.getSigningMethods().isEmpty()) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
for (SubkeyIdentifier signingKey : signingOptions.getSigningMethods().keySet()) {
|
|
||||||
SigningOptions.SigningMethod signingMethod = signingOptions.getSigningMethods().get(signingKey);
|
|
||||||
PGPSignatureGenerator signatureGenerator = signingMethod.getSignatureGenerator();
|
|
||||||
signatureGenerator.update(buffer, 0, len);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -221,6 +214,8 @@ public final class EncryptionStream extends OutputStream {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
outermostStream.close();
|
||||||
|
|
||||||
// Literal Data
|
// Literal Data
|
||||||
if (literalDataStream != null) {
|
if (literalDataStream != null) {
|
||||||
literalDataStream.flush();
|
literalDataStream.flush();
|
||||||
|
|
|
@ -19,7 +19,8 @@ public final class ProducerOptions {
|
||||||
private final SigningOptions signingOptions;
|
private final SigningOptions signingOptions;
|
||||||
private String fileName = "";
|
private String fileName = "";
|
||||||
private Date modificationDate = PGPLiteralData.NOW;
|
private Date modificationDate = PGPLiteralData.NOW;
|
||||||
private StreamEncoding streamEncoding = StreamEncoding.BINARY;
|
private StreamEncoding encodingField = StreamEncoding.BINARY;
|
||||||
|
private boolean applyCRLFEncoding = false;
|
||||||
private boolean cleartextSigned = false;
|
private boolean cleartextSigned = false;
|
||||||
|
|
||||||
private CompressionAlgorithm compressionAlgorithmOverride = PGPainless.getPolicy().getCompressionAlgorithmPolicy()
|
private CompressionAlgorithm compressionAlgorithmOverride = PGPainless.getPolicy().getCompressionAlgorithmPolicy()
|
||||||
|
@ -223,9 +224,12 @@ public final class ProducerOptions {
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Set the format of the literal data packet.
|
* Set format metadata field of the literal data packet.
|
||||||
* Defaults to {@link StreamEncoding#BINARY}.
|
* Defaults to {@link StreamEncoding#BINARY}.
|
||||||
*
|
*
|
||||||
|
* This does not change the encoding of the wrapped data itself.
|
||||||
|
* To apply CR/LF encoding to your input data before processing, use {@link #applyCRLFEncoding(boolean)} instead.
|
||||||
|
*
|
||||||
* @see <a href="https://datatracker.ietf.org/doc/html/rfc4880#section-5.9">RFC4880 §5.9. Literal Data Packet</a>
|
* @see <a href="https://datatracker.ietf.org/doc/html/rfc4880#section-5.9">RFC4880 §5.9. Literal Data Packet</a>
|
||||||
*
|
*
|
||||||
* @param encoding encoding
|
* @param encoding encoding
|
||||||
|
@ -235,12 +239,37 @@ public final class ProducerOptions {
|
||||||
*/
|
*/
|
||||||
@Deprecated
|
@Deprecated
|
||||||
public ProducerOptions setEncoding(@Nonnull StreamEncoding encoding) {
|
public ProducerOptions setEncoding(@Nonnull StreamEncoding encoding) {
|
||||||
this.streamEncoding = encoding;
|
this.encodingField = encoding;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public StreamEncoding getEncoding() {
|
public StreamEncoding getEncoding() {
|
||||||
return streamEncoding;
|
return encodingField;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Apply special encoding of line endings to the input data.
|
||||||
|
* By default, this is set to <pre>false</pre>, which means that the data is not altered.
|
||||||
|
*
|
||||||
|
* Setting it to <pre>true</pre> will change the line endings to CR/LF.
|
||||||
|
* Note: The encoding will not be reversed when decrypting, so applying CR/LF encoding will result in
|
||||||
|
* the identity "decrypt(encrypt(data)) == data == verify(sign(data))".
|
||||||
|
*
|
||||||
|
* @param applyCRLFEncoding apply crlf encoding
|
||||||
|
* @return this
|
||||||
|
*/
|
||||||
|
public ProducerOptions applyCRLFEncoding(boolean applyCRLFEncoding) {
|
||||||
|
this.applyCRLFEncoding = applyCRLFEncoding;
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return the input encoding that will be applied before signing / encryption.
|
||||||
|
*
|
||||||
|
* @return input encoding
|
||||||
|
*/
|
||||||
|
public boolean isApplyCRLFEncoding() {
|
||||||
|
return applyCRLFEncoding;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -0,0 +1,61 @@
|
||||||
|
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package org.pgpainless.encryption_signing;
|
||||||
|
|
||||||
|
import org.bouncycastle.openpgp.PGPSignatureGenerator;
|
||||||
|
import org.pgpainless.key.SubkeyIdentifier;
|
||||||
|
|
||||||
|
import javax.annotation.Nonnull;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.OutputStream;
|
||||||
|
|
||||||
|
class SignatureGenerationStream extends OutputStream {
|
||||||
|
|
||||||
|
private final OutputStream wrapped;
|
||||||
|
private final SigningOptions options;
|
||||||
|
|
||||||
|
SignatureGenerationStream(OutputStream wrapped, SigningOptions signingOptions) {
|
||||||
|
this.wrapped = wrapped;
|
||||||
|
this.options = signingOptions;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void write(int b) throws IOException {
|
||||||
|
wrapped.write(b);
|
||||||
|
if (options == null || options.getSigningMethods().isEmpty()) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (SubkeyIdentifier signingKey : options.getSigningMethods().keySet()) {
|
||||||
|
SigningOptions.SigningMethod signingMethod = options.getSigningMethods().get(signingKey);
|
||||||
|
PGPSignatureGenerator signatureGenerator = signingMethod.getSignatureGenerator();
|
||||||
|
byte asByte = (byte) (b & 0xff);
|
||||||
|
signatureGenerator.update(asByte);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void write(@Nonnull byte[] buffer) throws IOException {
|
||||||
|
write(buffer, 0, buffer.length);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void write(@Nonnull byte[] buffer, int off, int len) throws IOException {
|
||||||
|
wrapped.write(buffer, 0, len);
|
||||||
|
if (options == null || options.getSigningMethods().isEmpty()) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
for (SubkeyIdentifier signingKey : options.getSigningMethods().keySet()) {
|
||||||
|
SigningOptions.SigningMethod signingMethod = options.getSigningMethods().get(signingKey);
|
||||||
|
PGPSignatureGenerator signatureGenerator = signingMethod.getSignatureGenerator();
|
||||||
|
signatureGenerator.update(buffer, 0, len);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void close() throws IOException {
|
||||||
|
wrapped.close();
|
||||||
|
}
|
||||||
|
}
|
|
@ -2,7 +2,7 @@
|
||||||
//
|
//
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package investigations;
|
package org.pgpainless.decryption_verification;
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||||
|
@ -34,9 +34,6 @@ import org.pgpainless.PGPainless;
|
||||||
import org.pgpainless.algorithm.DocumentSignatureType;
|
import org.pgpainless.algorithm.DocumentSignatureType;
|
||||||
import org.pgpainless.algorithm.HashAlgorithm;
|
import org.pgpainless.algorithm.HashAlgorithm;
|
||||||
import org.pgpainless.algorithm.StreamEncoding;
|
import org.pgpainless.algorithm.StreamEncoding;
|
||||||
import org.pgpainless.decryption_verification.ConsumerOptions;
|
|
||||||
import org.pgpainless.decryption_verification.DecryptionStream;
|
|
||||||
import org.pgpainless.decryption_verification.OpenPgpMetadata;
|
|
||||||
import org.pgpainless.encryption_signing.CRLFGeneratorStream;
|
import org.pgpainless.encryption_signing.CRLFGeneratorStream;
|
||||||
import org.pgpainless.encryption_signing.EncryptionOptions;
|
import org.pgpainless.encryption_signing.EncryptionOptions;
|
||||||
import org.pgpainless.encryption_signing.EncryptionStream;
|
import org.pgpainless.encryption_signing.EncryptionStream;
|
||||||
|
@ -120,9 +117,11 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
// CHECKSTYLE:ON
|
// CHECKSTYLE:ON
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NO CR/LF ENCODING PRIOR TO PROCESSING
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void binaryDataBinarySig() throws PGPException, IOException {
|
public void noInputEncodingBinaryDataBinarySig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.BINARY);
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.BINARY, false);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -135,8 +134,8 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void binaryDataTextSig() throws PGPException, IOException {
|
public void noInputEncodingBinaryDataTextSig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.BINARY);
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.BINARY, false);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -149,8 +148,8 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void textDataBinarySig() throws PGPException, IOException {
|
public void noInputEncodingTextDataBinarySig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.TEXT);
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.TEXT, false);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -163,8 +162,8 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void textDataTextSig() throws PGPException, IOException {
|
public void noInputEncodingTextDataTextSig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.TEXT);
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.TEXT, false);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -177,8 +176,8 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void utf8DataBinarySig() throws PGPException, IOException {
|
public void noInputEncodingUtf8DataBinarySig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.UTF8);
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.UTF8, false);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -191,8 +190,23 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void utf8DataTextSig() throws PGPException, IOException {
|
public void noInputEncodingUtf8DataTextSig() throws PGPException, IOException {
|
||||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.UTF8);
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.UTF8, false);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// APPLY CR/LF ENCODING PRIOR TO PROCESSING
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inputEncodingBinaryDataBinarySig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.BINARY, true);
|
||||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
if (!metadata.isVerified()) {
|
if (!metadata.isVerified()) {
|
||||||
|
@ -204,7 +218,80 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private String encryptAndSign(String message, DocumentSignatureType sigType, StreamEncoding dataFormat)
|
@Test
|
||||||
|
public void inputEncodingBinaryDataTextSig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.BINARY, true);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inputEncodingTextDataBinarySig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.TEXT, true);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inputEncodingTextDataTextSig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.TEXT, true);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inputEncodingUtf8DataBinarySig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.UTF8, true);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inputEncodingUtf8DataTextSig() throws PGPException, IOException {
|
||||||
|
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.UTF8, true);
|
||||||
|
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||||
|
|
||||||
|
if (!metadata.isVerified()) {
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||||
|
System.out.println(msg);
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
fail();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private String encryptAndSign(String message,
|
||||||
|
DocumentSignatureType sigType,
|
||||||
|
StreamEncoding dataFormat,
|
||||||
|
boolean applyCRLFEncoding)
|
||||||
throws PGPException, IOException {
|
throws PGPException, IOException {
|
||||||
ByteArrayOutputStream out = new ByteArrayOutputStream();
|
ByteArrayOutputStream out = new ByteArrayOutputStream();
|
||||||
|
|
||||||
|
@ -218,6 +305,7 @@ public class CanonicalizedDataEncryptionTest {
|
||||||
.addInlineSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, sigType)
|
.addInlineSignature(SecretKeyRingProtector.unprotectedKeys(), secretKeys, sigType)
|
||||||
)
|
)
|
||||||
.setEncoding(dataFormat)
|
.setEncoding(dataFormat)
|
||||||
|
.applyCRLFEncoding(applyCRLFEncoding)
|
||||||
);
|
);
|
||||||
|
|
||||||
ByteArrayInputStream inputStream = new ByteArrayInputStream(message.getBytes(StandardCharsets.UTF_8));
|
ByteArrayInputStream inputStream = new ByteArrayInputStream(message.getBytes(StandardCharsets.UTF_8));
|
Loading…
Reference in a new issue