mirror of
https://github.com/vanitasvitae/Smack.git
synced 2024-11-23 20:42:06 +01:00
Modify API
Add methods to decrypt messages Add lots of high quality documentation
This commit is contained in:
parent
2706f60744
commit
55b9c1ac2a
5 changed files with 234 additions and 22 deletions
|
@ -31,9 +31,12 @@ import java.util.Set;
|
||||||
import org.jivesoftware.smack.util.stringencoder.Base64;
|
import org.jivesoftware.smack.util.stringencoder.Base64;
|
||||||
import org.jivesoftware.smackx.ox.OpenPgpMessage;
|
import org.jivesoftware.smackx.ox.OpenPgpMessage;
|
||||||
import org.jivesoftware.smackx.ox.OpenPgpProvider;
|
import org.jivesoftware.smackx.ox.OpenPgpProvider;
|
||||||
|
import org.jivesoftware.smackx.ox.element.CryptElement;
|
||||||
import org.jivesoftware.smackx.ox.element.OpenPgpElement;
|
import org.jivesoftware.smackx.ox.element.OpenPgpElement;
|
||||||
import org.jivesoftware.smackx.ox.element.PubkeyElement;
|
import org.jivesoftware.smackx.ox.element.PubkeyElement;
|
||||||
import org.jivesoftware.smackx.ox.element.PublicKeysListElement;
|
import org.jivesoftware.smackx.ox.element.PublicKeysListElement;
|
||||||
|
import org.jivesoftware.smackx.ox.element.SignElement;
|
||||||
|
import org.jivesoftware.smackx.ox.element.SigncryptElement;
|
||||||
import org.jivesoftware.smackx.ox.exception.CorruptedOpenPgpKeyException;
|
import org.jivesoftware.smackx.ox.exception.CorruptedOpenPgpKeyException;
|
||||||
|
|
||||||
import name.neuhalfen.projects.crypto.bouncycastle.openpgp.BouncyGPG;
|
import name.neuhalfen.projects.crypto.bouncycastle.openpgp.BouncyGPG;
|
||||||
|
@ -81,14 +84,14 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void processPubkeyElement(PubkeyElement element, BareJid jid) throws CorruptedOpenPgpKeyException {
|
public void processPubkeyElement(PubkeyElement element, BareJid owner) throws CorruptedOpenPgpKeyException {
|
||||||
byte[] decoded = Base64.decode(element.getDataElement().getB64Data());
|
byte[] decoded = Base64.decode(element.getDataElement().getB64Data());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
InMemoryKeyring contactsKeyring = theirKeys.get(jid);
|
InMemoryKeyring contactsKeyring = theirKeys.get(owner);
|
||||||
if (contactsKeyring == null) {
|
if (contactsKeyring == null) {
|
||||||
contactsKeyring = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
contactsKeyring = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
||||||
theirKeys.put(jid, contactsKeyring);
|
theirKeys.put(owner, contactsKeyring);
|
||||||
}
|
}
|
||||||
|
|
||||||
contactsKeyring.addPublicKey(decoded);
|
contactsKeyring.addPublicKey(decoded);
|
||||||
|
@ -98,12 +101,12 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void processPublicKeysListElement(PublicKeysListElement listElement, BareJid from) throws Exception {
|
public void processPublicKeysListElement(PublicKeysListElement listElement, BareJid owner) throws Exception {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OpenPgpElement signAndEncrypt(InputStream inputStream, Set<BareJid> recipients)
|
public OpenPgpElement signAndEncrypt(SigncryptElement element, Set<BareJid> recipients)
|
||||||
throws Exception {
|
throws Exception {
|
||||||
if (recipients.isEmpty()) {
|
if (recipients.isEmpty()) {
|
||||||
throw new IllegalArgumentException("Set of recipients must not be empty");
|
throw new IllegalArgumentException("Set of recipients must not be empty");
|
||||||
|
@ -119,7 +122,7 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add our keys to encryption config
|
// Add our public and secret keys to encryption config
|
||||||
for (PGPPublicKeyRing p : ourKeys.getPublicKeyRings()) {
|
for (PGPPublicKeyRing p : ourKeys.getPublicKeyRings()) {
|
||||||
encryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
encryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
||||||
}
|
}
|
||||||
|
@ -134,6 +137,7 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
}
|
}
|
||||||
recipientUIDs[pos] = "xmpp:" + ourJid.toString();
|
recipientUIDs[pos] = "xmpp:" + ourJid.toString();
|
||||||
|
|
||||||
|
InputStream inputStream = element.toInputStream();
|
||||||
ByteArrayOutputStream encryptedOut = new ByteArrayOutputStream();
|
ByteArrayOutputStream encryptedOut = new ByteArrayOutputStream();
|
||||||
|
|
||||||
OutputStream encryptor = BouncyGPG.encryptToStream()
|
OutputStream encryptor = BouncyGPG.encryptToStream()
|
||||||
|
@ -154,28 +158,109 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OpenPgpElement sign(InputStream inputStream) throws Exception {
|
public OpenPgpElement sign(SignElement element) throws Exception {
|
||||||
|
InMemoryKeyring signingConfig = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
||||||
|
|
||||||
|
// Add our secret keys to signing config
|
||||||
|
for (PGPSecretKeyRing s : ourKeys.getSecretKeyRings()) {
|
||||||
|
signingConfig.addSecretKey(s.getSecretKey().getEncoded());
|
||||||
|
}
|
||||||
|
|
||||||
|
InputStream inputStream = element.toInputStream();
|
||||||
|
// TODO: Implement
|
||||||
|
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OpenPgpElement encrypt(InputStream inputStream, Set<BareJid> recipients) throws Exception {
|
public OpenPgpMessage verify(OpenPgpElement element, BareJid sender) throws Exception {
|
||||||
|
// TODO: Implement
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public OpenPgpMessage decrypt(OpenPgpElement element) throws Exception {
|
||||||
|
InMemoryKeyring decryptionConfig = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
||||||
|
|
||||||
|
// Add our secret keys to decryption config
|
||||||
|
for (PGPSecretKeyRing s : ourKeys.getSecretKeyRings()) {
|
||||||
|
decryptionConfig.addSecretKey(s.getSecretKey().getEncoded());
|
||||||
|
}
|
||||||
|
|
||||||
|
ByteArrayInputStream encryptedIn = new ByteArrayInputStream(
|
||||||
|
element.getEncryptedBase64MessageContent().getBytes(Charset.forName("UTF-8")));
|
||||||
|
|
||||||
|
InputStream decrypted = BouncyGPG.decryptAndVerifyStream()
|
||||||
|
.withConfig(decryptionConfig)
|
||||||
|
.withKeySelectionStrategy(new XmppKeySelectionStrategy(new Date()))
|
||||||
|
.andIgnoreSignatures()
|
||||||
|
.fromEncryptedInputStream(encryptedIn);
|
||||||
|
|
||||||
|
ByteArrayOutputStream decryptedOut = new ByteArrayOutputStream();
|
||||||
|
|
||||||
|
Streams.pipeAll(decrypted, decryptedOut);
|
||||||
|
|
||||||
|
return new OpenPgpMessage(OpenPgpMessage.State.crypt, new String(decryptedOut.toByteArray(), Charset.forName("UTF-8")));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public OpenPgpElement encrypt(CryptElement element, Set<BareJid> recipients) throws Exception {
|
||||||
|
if (recipients.isEmpty()) {
|
||||||
|
throw new IllegalArgumentException("Set of recipients must not be empty");
|
||||||
|
}
|
||||||
|
|
||||||
|
InMemoryKeyring encryptionConfig = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
||||||
|
|
||||||
|
// Add all recipients public keys to encryption config
|
||||||
|
for (BareJid recipient : recipients) {
|
||||||
|
KeyringConfig c = theirKeys.get(recipient);
|
||||||
|
for (PGPPublicKeyRing p : c.getPublicKeyRings()) {
|
||||||
|
encryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add our public keys to encryption config
|
||||||
|
for (PGPPublicKeyRing p : ourKeys.getPublicKeyRings()) {
|
||||||
|
encryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
||||||
|
}
|
||||||
|
|
||||||
|
String[] recipientUIDs = new String[recipients.size() + 1];
|
||||||
|
int pos = 0;
|
||||||
|
for (BareJid b : recipients) {
|
||||||
|
recipientUIDs[pos++] = "xmpp:" + b.toString();
|
||||||
|
}
|
||||||
|
recipientUIDs[pos] = "xmpp:" + ourJid.toString();
|
||||||
|
|
||||||
|
InputStream inputStream = element.toInputStream();
|
||||||
|
ByteArrayOutputStream encryptedOut = new ByteArrayOutputStream();
|
||||||
|
|
||||||
|
OutputStream encryptor = BouncyGPG.encryptToStream()
|
||||||
|
.withConfig(encryptionConfig)
|
||||||
|
.withKeySelectionStrategy(new XmppKeySelectionStrategy(new Date()))
|
||||||
|
.withOxAlgorithms()
|
||||||
|
.toRecipients(recipientUIDs)
|
||||||
|
.andDoNotSign()
|
||||||
|
.binaryOutput()
|
||||||
|
.andWriteTo(encryptedOut);
|
||||||
|
|
||||||
|
Streams.pipeAll(inputStream, encryptor);
|
||||||
|
encryptor.close();
|
||||||
|
|
||||||
|
String base64 = Base64.encodeToString(encryptedOut.toByteArray());
|
||||||
|
|
||||||
|
return new OpenPgpElement(base64);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OpenPgpMessage decryptAndVerify(OpenPgpElement element, BareJid sender) throws Exception {
|
public OpenPgpMessage decryptAndVerify(OpenPgpElement element, BareJid sender) throws Exception {
|
||||||
InMemoryKeyring decryptionConfig = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
InMemoryKeyring decryptionConfig = KeyringConfigs.forGpgExportedKeys(KeyringConfigCallbacks.withUnprotectedKeys());
|
||||||
|
|
||||||
// Add our keys to decryption config
|
// Add our secret keys to decryption config
|
||||||
// for (PGPPublicKeyRing p : ourKeys.getPublicKeyRings()) {
|
|
||||||
// decryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
|
||||||
// }
|
|
||||||
for (PGPSecretKeyRing s : ourKeys.getSecretKeyRings()) {
|
for (PGPSecretKeyRing s : ourKeys.getSecretKeyRings()) {
|
||||||
decryptionConfig.addSecretKey(s.getSecretKey().getEncoded());
|
decryptionConfig.addSecretKey(s.getSecretKey().getEncoded());
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add their keys to decryption config
|
// Add their public keys to decryption config
|
||||||
for (PGPPublicKeyRing p : theirKeys.get(sender).getPublicKeyRings()) {
|
for (PGPPublicKeyRing p : theirKeys.get(sender).getPublicKeyRings()) {
|
||||||
decryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
decryptionConfig.addPublicKey(p.getPublicKey().getEncoded());
|
||||||
}
|
}
|
||||||
|
@ -193,7 +278,7 @@ public class BouncyCastleOpenPgpProvider implements OpenPgpProvider {
|
||||||
|
|
||||||
Streams.pipeAll(decrypted, decryptedOut);
|
Streams.pipeAll(decrypted, decryptedOut);
|
||||||
|
|
||||||
return new OpenPgpMessage(new String(decryptedOut.toByteArray(), Charset.forName("UTF-8")));
|
return new OpenPgpMessage(OpenPgpMessage.State.signcrypt, new String(decryptedOut.toByteArray(), Charset.forName("UTF-8")));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -61,7 +61,7 @@ public class BouncyCastleOpenPgpProviderTest extends SmackTestSuite {
|
||||||
Collections.<ExtensionElement>singletonList(
|
Collections.<ExtensionElement>singletonList(
|
||||||
new Message.Body("en", "How do you know I’m mad?")));
|
new Message.Body("en", "How do you know I’m mad?")));
|
||||||
OpenPgpElement encrypted = aliceProvider.signAndEncrypt(
|
OpenPgpElement encrypted = aliceProvider.signAndEncrypt(
|
||||||
signcryptElement.toInputStream(),
|
signcryptElement,
|
||||||
Collections.singleton(cheshire));
|
Collections.singleton(cheshire));
|
||||||
|
|
||||||
// Decrypt the message as the cheshire cat
|
// Decrypt the message as the cheshire cat
|
||||||
|
|
|
@ -39,7 +39,8 @@ public class OpenPgpMessage {
|
||||||
|
|
||||||
private OpenPgpContentElement openPgpContentElement;
|
private OpenPgpContentElement openPgpContentElement;
|
||||||
|
|
||||||
public OpenPgpMessage(String content) {
|
public OpenPgpMessage(State state, String content) {
|
||||||
|
this.state = state;
|
||||||
this.element = content;
|
this.element = content;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -66,4 +67,9 @@ public class OpenPgpMessage {
|
||||||
state = State.crypt;
|
state = State.crypt;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public State getState() throws IOException, XmlPullParserException {
|
||||||
|
ensureOpenPgpContentElementSet();
|
||||||
|
return state;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,9 +23,28 @@ import org.jivesoftware.smackx.ox.element.SigncryptElement;
|
||||||
import org.jxmpp.jid.BareJid;
|
import org.jxmpp.jid.BareJid;
|
||||||
|
|
||||||
public interface OpenPgpMessageListener {
|
public interface OpenPgpMessageListener {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This method gets called whenever we received and successfully decrypted/verified an encrypted, signed message.
|
||||||
|
*
|
||||||
|
* @param from sender/signer of the message.
|
||||||
|
* @param signcryptElement decrypted and verified {@link SigncryptElement}.
|
||||||
|
*/
|
||||||
void signcryptElementReceived(BareJid from, SigncryptElement signcryptElement);
|
void signcryptElementReceived(BareJid from, SigncryptElement signcryptElement);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This method gets called whenever we received and successfully verified a signed message.
|
||||||
|
*
|
||||||
|
* @param from sender/signer of the message.
|
||||||
|
* @param signElement verified {@link SignElement}.
|
||||||
|
*/
|
||||||
void signElementReceived(BareJid from, SignElement signElement);
|
void signElementReceived(BareJid from, SignElement signElement);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This method gets called whenever we received and successfully decrypted an encrypted message.
|
||||||
|
*
|
||||||
|
* @param from sender of the message.
|
||||||
|
* @param cryptElement decrypted {@link CryptElement}.
|
||||||
|
*/
|
||||||
void cryptElementReceived(BareJid from, CryptElement cryptElement);
|
void cryptElementReceived(BareJid from, CryptElement cryptElement);
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,31 +16,133 @@
|
||||||
*/
|
*/
|
||||||
package org.jivesoftware.smackx.ox;
|
package org.jivesoftware.smackx.ox;
|
||||||
|
|
||||||
import java.io.InputStream;
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
|
import org.jivesoftware.smackx.ox.element.CryptElement;
|
||||||
import org.jivesoftware.smackx.ox.element.OpenPgpElement;
|
import org.jivesoftware.smackx.ox.element.OpenPgpElement;
|
||||||
import org.jivesoftware.smackx.ox.element.PubkeyElement;
|
import org.jivesoftware.smackx.ox.element.PubkeyElement;
|
||||||
import org.jivesoftware.smackx.ox.element.PublicKeysListElement;
|
import org.jivesoftware.smackx.ox.element.PublicKeysListElement;
|
||||||
|
import org.jivesoftware.smackx.ox.element.SignElement;
|
||||||
|
import org.jivesoftware.smackx.ox.element.SigncryptElement;
|
||||||
import org.jivesoftware.smackx.ox.exception.CorruptedOpenPgpKeyException;
|
import org.jivesoftware.smackx.ox.exception.CorruptedOpenPgpKeyException;
|
||||||
|
|
||||||
import org.jxmpp.jid.BareJid;
|
import org.jxmpp.jid.BareJid;
|
||||||
|
|
||||||
public interface OpenPgpProvider {
|
public interface OpenPgpProvider {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sign and encrypt a {@link SigncryptElement} element for usage within the context of instant messaging.
|
||||||
|
* The resulting {@link OpenPgpElement} contains a Base64 encoded, unarmored OpenPGP message,
|
||||||
|
* which can be decrypted by each recipient, as well as by ourselves.
|
||||||
|
* The message contains a signature made by our key.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0373.html#signcrypt">XEP-0373 §3</a>
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element {@link SigncryptElement} which contains the content of the message as plaintext.
|
||||||
|
* @param recipients {@link Set} of {@link BareJid} of recipients.
|
||||||
|
* @return encrypted {@link OpenPgpElement} which contains the encrypted, encoded message.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
OpenPgpElement signAndEncrypt(SigncryptElement element, Set<BareJid> recipients) throws Exception;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Decrypt an incoming {@link OpenPgpElement} which must contain a {@link SigncryptElement} and verify
|
||||||
|
* the signature made by the sender in the context of instant messaging.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element {@link OpenPgpElement} which contains an encrypted and signed {@link SigncryptElement}.
|
||||||
|
* @param sender {@link BareJid} of the user which sent the message. This is also the user who signed the message.
|
||||||
|
* @return decrypted {@link OpenPgpMessage} which contains the decrypted {@link SigncryptElement}.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
OpenPgpMessage decryptAndVerify(OpenPgpElement element, BareJid sender) throws Exception;
|
OpenPgpMessage decryptAndVerify(OpenPgpElement element, BareJid sender) throws Exception;
|
||||||
|
|
||||||
OpenPgpElement signAndEncrypt(InputStream inputStream, Set<BareJid> recipients) throws Exception;
|
/**
|
||||||
|
* Sign a {@link SignElement} and pack it inside a {@link OpenPgpElement}.
|
||||||
|
* The resulting {@link OpenPgpElement} contains the {@link SignElement} signed and base64 encoded.
|
||||||
|
*
|
||||||
|
* Note: DO NOT use this method in the context of instant messaging, as XEP-0374 forbids that.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0373.html#exchange">XEP-0373 §3.1</a>
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element {@link SignElement} which will be signed.
|
||||||
|
* @return {@link OpenPgpElement} which contains the signed, Base64 encoded {@link SignElement}.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
OpenPgpElement sign(SignElement element) throws Exception;
|
||||||
|
|
||||||
OpenPgpElement sign(InputStream inputStream) throws Exception;
|
/**
|
||||||
|
* Verify the signature on an incoming {@link OpenPgpElement} which must contain a {@link SignElement}.
|
||||||
|
*
|
||||||
|
* Note: DO NOT use this method in the context of instant messaging, as XEP-0374 forbids that.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0373.html#exchange">XEP-0373 §3.1</a>
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element incoming {@link OpenPgpElement} which must contain a signed {@link SignElement}.
|
||||||
|
* @param sender {@link BareJid} of the sender which also signed the message.
|
||||||
|
* @return {@link OpenPgpMessage} which contains the decoded {@link SignElement}.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
OpenPgpMessage verify(OpenPgpElement element, BareJid sender) throws Exception;
|
||||||
|
|
||||||
OpenPgpElement encrypt(InputStream inputStream, Set<BareJid> recipients) throws Exception;
|
/**
|
||||||
|
* Encrypt a {@link CryptElement} and pack it inside a {@link OpenPgpElement}.
|
||||||
|
* The resulting {@link OpenPgpElement} contains the encrypted and Base64 encoded {@link CryptElement}
|
||||||
|
* which can be decrypted by all recipients, as well as by ourselves.
|
||||||
|
*
|
||||||
|
* Note: DO NOT use this method in the context of instant messaging, as XEP-0374 forbids that.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element plaintext {@link CryptElement} which will be encrypted.
|
||||||
|
* @param recipients {@link Set} of {@link BareJid} of recipients, which will be able to decrypt the message.
|
||||||
|
* @return {@link OpenPgpElement} which contains the encrypted, Base64 encoded {@link CryptElement}.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
OpenPgpElement encrypt(CryptElement element, Set<BareJid> recipients) throws Exception;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Decrypt an incoming {@link OpenPgpElement} which must contain a {@link CryptElement}.
|
||||||
|
* The resulting {@link OpenPgpMessage} will contain the decrypted {@link CryptElement}.
|
||||||
|
*
|
||||||
|
* Note: DO NOT use this method in the context of instant messaging, as XEP-0374 forbids that.
|
||||||
|
*
|
||||||
|
* @see <a href="https://xmpp.org/extensions/xep-0374.html#openpgp-secured-im">XEP-0374 §2.1</a>
|
||||||
|
* @param element {@link OpenPgpElement} which contains the encrypted {@link CryptElement}.
|
||||||
|
* @return {@link OpenPgpMessage} which contains the decrypted {@link CryptElement}.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
OpenPgpMessage decrypt(OpenPgpElement element) throws Exception;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a {@link PubkeyElement} which contains our exported OpenPGP public key.
|
||||||
|
* The element can for example be published.
|
||||||
|
*
|
||||||
|
* @return {@link PubkeyElement} containing our public key.
|
||||||
|
* @throws CorruptedOpenPgpKeyException if our public key can for some reason not be serialized.
|
||||||
|
*/
|
||||||
PubkeyElement createPubkeyElement() throws CorruptedOpenPgpKeyException;
|
PubkeyElement createPubkeyElement() throws CorruptedOpenPgpKeyException;
|
||||||
|
|
||||||
void processPubkeyElement(PubkeyElement element, BareJid from) throws CorruptedOpenPgpKeyException;
|
/**
|
||||||
|
* Process an incoming {@link PubkeyElement} of a contact or ourselves.
|
||||||
|
* That typically includes importing/updating the key.
|
||||||
|
*
|
||||||
|
* @param element {@link PubkeyElement} which presumably contains the public key of the {@code owner}.
|
||||||
|
* @param owner owner of the OpenPGP public key contained in the {@link PubkeyElement}.
|
||||||
|
* @throws CorruptedOpenPgpKeyException if the key found in the {@link PubkeyElement}
|
||||||
|
* can not be deserialized or imported.
|
||||||
|
*/
|
||||||
|
void processPubkeyElement(PubkeyElement element, BareJid owner) throws CorruptedOpenPgpKeyException;
|
||||||
|
|
||||||
void processPublicKeysListElement(PublicKeysListElement listElement, BareJid from) throws Exception;
|
/**
|
||||||
|
* Process an incoming update to the OpenPGP metadata node.
|
||||||
|
* That typically includes fetching announced keys of which we don't have a local copy yet,
|
||||||
|
* as well as marking keys which are missing from the list as inactive.
|
||||||
|
*
|
||||||
|
* @param listElement {@link PublicKeysListElement} which contains a list of the keys of {@code owner}.
|
||||||
|
* @param owner {@link BareJid} of the owner of the announced public keys.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
void processPublicKeysListElement(PublicKeysListElement listElement, BareJid owner) throws Exception;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Return the OpenPGP v4-fingerprint of our key in hexadecimal upper case.
|
* Return the OpenPGP v4-fingerprint of our key in hexadecimal upper case.
|
||||||
|
|
Loading…
Reference in a new issue