2015-08-25 21:24:19 +00:00
|
|
|
package pgpkeys
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/base64"
|
|
|
|
"fmt"
|
|
|
|
|
2016-08-11 12:31:43 +00:00
|
|
|
"github.com/keybase/go-crypto/openpgp"
|
|
|
|
"github.com/keybase/go-crypto/openpgp/packet"
|
2015-08-25 21:24:19 +00:00
|
|
|
)
|
|
|
|
|
2016-01-09 02:21:02 +00:00
|
|
|
// EncryptShares takes an ordered set of byte slices to encrypt and the
|
|
|
|
// corresponding base64-encoded public keys to encrypt them with, encrypts each
|
|
|
|
// byte slice with the corresponding public key.
|
2015-08-25 21:24:19 +00:00
|
|
|
//
|
|
|
|
// Note: There is no corresponding test function; this functionality is
|
|
|
|
// thoroughly tested in the init and rekey command unit tests
|
2016-01-09 02:21:02 +00:00
|
|
|
func EncryptShares(input [][]byte, pgpKeys []string) ([]string, [][]byte, error) {
|
|
|
|
if len(input) != len(pgpKeys) {
|
2016-01-20 00:19:07 +00:00
|
|
|
return nil, nil, fmt.Errorf("Mismatch between number items to encrypt and number of PGP keys")
|
2015-08-25 21:24:19 +00:00
|
|
|
}
|
2015-12-16 21:56:15 +00:00
|
|
|
encryptedShares := make([][]byte, 0, len(pgpKeys))
|
|
|
|
entities, err := GetEntities(pgpKeys)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
for i, entity := range entities {
|
2015-08-25 21:24:19 +00:00
|
|
|
ctBuf := bytes.NewBuffer(nil)
|
|
|
|
pt, err := openpgp.Encrypt(ctBuf, []*openpgp.Entity{entity}, nil, nil, nil)
|
|
|
|
if err != nil {
|
2015-12-16 21:56:15 +00:00
|
|
|
return nil, nil, fmt.Errorf("Error setting up encryption for PGP message: %s", err)
|
2015-08-25 21:24:19 +00:00
|
|
|
}
|
2016-01-09 02:21:02 +00:00
|
|
|
_, err = pt.Write(input[i])
|
2015-08-25 21:24:19 +00:00
|
|
|
if err != nil {
|
2015-12-16 21:56:15 +00:00
|
|
|
return nil, nil, fmt.Errorf("Error encrypting PGP message: %s", err)
|
2015-08-25 21:24:19 +00:00
|
|
|
}
|
|
|
|
pt.Close()
|
2015-08-25 22:33:58 +00:00
|
|
|
encryptedShares = append(encryptedShares, ctBuf.Bytes())
|
2015-08-25 21:24:19 +00:00
|
|
|
}
|
2015-12-16 21:56:15 +00:00
|
|
|
|
|
|
|
fingerprints, err := GetFingerprints(nil, entities)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return fingerprints, encryptedShares, nil
|
|
|
|
}
|
|
|
|
|
2016-01-09 02:21:02 +00:00
|
|
|
// GetFingerprints takes in a list of openpgp Entities and returns the
|
|
|
|
// fingerprints. If entities is nil, it will instead parse both entities and
|
|
|
|
// fingerprints from the pgpKeys string slice.
|
2015-12-16 21:56:15 +00:00
|
|
|
func GetFingerprints(pgpKeys []string, entities []*openpgp.Entity) ([]string, error) {
|
|
|
|
if entities == nil {
|
|
|
|
var err error
|
|
|
|
entities, err = GetEntities(pgpKeys)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ret := make([]string, 0, len(entities))
|
|
|
|
for _, entity := range entities {
|
|
|
|
ret = append(ret, fmt.Sprintf("%x", entity.PrimaryKey.Fingerprint))
|
|
|
|
}
|
|
|
|
return ret, nil
|
|
|
|
}
|
|
|
|
|
2016-01-09 02:21:02 +00:00
|
|
|
// GetEntities takes in a string array of base64-encoded PGP keys and returns
|
|
|
|
// the openpgp Entities
|
2015-12-16 21:56:15 +00:00
|
|
|
func GetEntities(pgpKeys []string) ([]*openpgp.Entity, error) {
|
|
|
|
ret := make([]*openpgp.Entity, 0, len(pgpKeys))
|
|
|
|
for _, keystring := range pgpKeys {
|
|
|
|
data, err := base64.StdEncoding.DecodeString(keystring)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding given PGP key: %s", err)
|
|
|
|
}
|
|
|
|
entity, err := openpgp.ReadEntity(packet.NewReader(bytes.NewBuffer(data)))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error parsing given PGP key: %s", err)
|
|
|
|
}
|
|
|
|
ret = append(ret, entity)
|
|
|
|
}
|
|
|
|
return ret, nil
|
2015-08-25 21:24:19 +00:00
|
|
|
}
|
2016-01-09 02:21:02 +00:00
|
|
|
|
|
|
|
// DecryptBytes takes in base64-encoded encrypted bytes and the base64-encoded
|
|
|
|
// private key and decrypts it. A bytes.Buffer is returned to allow the caller
|
|
|
|
// to do useful thing with it (get it as a []byte, get it as a string, use it
|
|
|
|
// as an io.Reader, etc), and also because this function doesn't know if what
|
|
|
|
// comes out is binary data or a string, so let the caller decide.
|
|
|
|
func DecryptBytes(encodedCrypt, privKey string) (*bytes.Buffer, error) {
|
|
|
|
privKeyBytes, err := base64.StdEncoding.DecodeString(privKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding base64 private key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptBytes, err := base64.StdEncoding.DecodeString(encodedCrypt)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding base64 crypted bytes: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
entity, err := openpgp.ReadEntity(packet.NewReader(bytes.NewBuffer(privKeyBytes)))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error parsing private key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
entityList := &openpgp.EntityList{entity}
|
|
|
|
md, err := openpgp.ReadMessage(bytes.NewBuffer(cryptBytes), entityList, nil, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decrypting the messages: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ptBuf := bytes.NewBuffer(nil)
|
|
|
|
ptBuf.ReadFrom(md.UnverifiedBody)
|
|
|
|
|
|
|
|
return ptBuf, nil
|
|
|
|
}
|