2018-09-11 11:09:28 +02:00
|
|
|
package crypto
|
2018-06-04 16:05:14 -07:00
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"bytes"
|
|
|
|
|
"io"
|
|
|
|
|
"io/ioutil"
|
2018-11-22 10:53:14 +01:00
|
|
|
"runtime"
|
|
|
|
|
"sync"
|
2018-06-04 16:05:14 -07:00
|
|
|
|
|
|
|
|
"golang.org/x/crypto/openpgp"
|
2018-09-19 11:52:14 +02:00
|
|
|
"golang.org/x/crypto/openpgp/packet"
|
2018-06-04 16:05:14 -07:00
|
|
|
)
|
|
|
|
|
|
2019-05-15 13:40:19 +02:00
|
|
|
// AttachmentProcessor keeps track of the progress of encrypting an attachment
|
|
|
|
|
// (optimized for encrypting large files).
|
2018-11-22 10:53:14 +01:00
|
|
|
type AttachmentProcessor struct {
|
|
|
|
|
w *io.WriteCloser
|
|
|
|
|
pipe *io.PipeWriter
|
|
|
|
|
done sync.WaitGroup
|
2019-06-03 17:00:01 +02:00
|
|
|
split *PGPSplitMessage
|
2018-11-22 10:53:14 +01:00
|
|
|
garbageCollector int
|
|
|
|
|
err error
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-15 13:40:19 +02:00
|
|
|
// Process writes attachment data to be encrypted
|
2018-11-22 10:53:14 +01:00
|
|
|
func (ap *AttachmentProcessor) Process(plainData []byte) {
|
2019-05-14 14:42:38 +00:00
|
|
|
if _, err := (*ap.w).Write(plainData); err != nil {
|
|
|
|
|
panic(err)
|
|
|
|
|
}
|
2018-11-22 10:53:14 +01:00
|
|
|
}
|
|
|
|
|
|
2019-05-15 13:40:19 +02:00
|
|
|
// Finish closes the attachment and returns the encrypted data
|
2019-06-03 17:00:01 +02:00
|
|
|
func (ap *AttachmentProcessor) Finish() (*PGPSplitMessage, error) {
|
2018-11-22 10:53:14 +01:00
|
|
|
if ap.err != nil {
|
|
|
|
|
return nil, ap.err
|
|
|
|
|
}
|
2019-12-27 19:35:43 +01:00
|
|
|
if err := (*ap.w).Close(); err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err := (*ap.pipe).Close(); err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-22 10:53:14 +01:00
|
|
|
ap.done.Wait()
|
|
|
|
|
if ap.garbageCollector > 0 {
|
|
|
|
|
runtime.GC()
|
2018-06-04 16:05:14 -07:00
|
|
|
}
|
2018-11-22 10:53:14 +01:00
|
|
|
return ap.split, nil
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
// newAttachmentProcessor creates an AttachmentProcessor which can be used to encrypt
|
2019-05-15 13:40:19 +02:00
|
|
|
// a file. It takes an estimatedSize and fileName as hints about the file.
|
2019-06-03 17:00:01 +02:00
|
|
|
func (keyRing *KeyRing) newAttachmentProcessor(
|
|
|
|
|
estimatedSize int, fileName string, garbageCollector int,
|
2019-05-14 14:42:38 +00:00
|
|
|
) (*AttachmentProcessor, error) {
|
2018-11-22 10:53:14 +01:00
|
|
|
attachmentProc := &AttachmentProcessor{}
|
2019-05-15 13:40:19 +02:00
|
|
|
// You could also add these one at a time if needed.
|
2018-11-22 10:53:14 +01:00
|
|
|
attachmentProc.done.Add(1)
|
|
|
|
|
attachmentProc.garbageCollector = garbageCollector
|
2018-06-04 16:05:14 -07:00
|
|
|
|
|
|
|
|
hints := &openpgp.FileHints{
|
|
|
|
|
FileName: fileName,
|
|
|
|
|
}
|
2018-06-22 16:04:20 +02:00
|
|
|
|
|
|
|
|
config := &packet.Config{
|
|
|
|
|
DefaultCipher: packet.CipherAES256,
|
2019-10-22 18:44:45 +02:00
|
|
|
Time: getTimeGenerator(),
|
2018-06-22 16:04:20 +02:00
|
|
|
}
|
2018-06-04 16:05:14 -07:00
|
|
|
|
2018-11-22 10:53:14 +01:00
|
|
|
reader, writer := io.Pipe()
|
|
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
|
defer attachmentProc.done.Done()
|
2019-06-03 17:00:01 +02:00
|
|
|
ciphertext, _ := ioutil.ReadAll(reader)
|
|
|
|
|
message := NewPGPMessage(ciphertext)
|
|
|
|
|
split, splitError := message.SeparateKeyAndData(estimatedSize, garbageCollector)
|
2018-11-22 10:53:14 +01:00
|
|
|
if attachmentProc.err != nil {
|
|
|
|
|
attachmentProc.err = splitError
|
|
|
|
|
}
|
|
|
|
|
attachmentProc.split = split
|
|
|
|
|
}()
|
|
|
|
|
|
|
|
|
|
var ew io.WriteCloser
|
|
|
|
|
var encryptErr error
|
2019-06-03 17:00:01 +02:00
|
|
|
ew, encryptErr = openpgp.Encrypt(writer, keyRing.entities, nil, hints, config)
|
2019-04-27 07:31:29 +02:00
|
|
|
if encryptErr != nil {
|
|
|
|
|
return nil, encryptErr
|
|
|
|
|
}
|
2018-11-22 10:53:14 +01:00
|
|
|
attachmentProc.w = &ew
|
|
|
|
|
attachmentProc.pipe = writer
|
|
|
|
|
|
|
|
|
|
return attachmentProc, nil
|
|
|
|
|
}
|
2018-06-04 16:05:14 -07:00
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
// EncryptAttachment encrypts a file given a PlainMessage and a fileName.
|
2019-08-29 17:45:13 +02:00
|
|
|
// Returns a PGPSplitMessage containing a session key packet and symmetrically encrypted data.
|
|
|
|
|
// Specifically designed for attachments rather than text messages.
|
2019-06-03 17:00:01 +02:00
|
|
|
func (keyRing *KeyRing) EncryptAttachment(message *PlainMessage, fileName string) (*PGPSplitMessage, error) {
|
|
|
|
|
ap, err := keyRing.newAttachmentProcessor(len(message.GetBinary()), fileName, -1)
|
2018-11-22 10:53:14 +01:00
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
2019-06-03 17:00:01 +02:00
|
|
|
ap.Process(message.GetBinary())
|
2018-11-22 10:53:14 +01:00
|
|
|
split, err := ap.Finish()
|
2018-06-04 16:05:14 -07:00
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
2018-06-04 17:50:26 -07:00
|
|
|
return split, nil
|
2018-11-22 10:53:14 +01:00
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
// NewLowMemoryAttachmentProcessor creates an AttachmentProcessor which can be used
|
2019-05-15 13:40:19 +02:00
|
|
|
// to encrypt a file. It takes an estimatedSize and fileName as hints about the
|
|
|
|
|
// file. It is optimized for low-memory environments and collects garbage every
|
|
|
|
|
// megabyte.
|
2019-06-03 17:00:01 +02:00
|
|
|
func (keyRing *KeyRing) NewLowMemoryAttachmentProcessor(
|
|
|
|
|
estimatedSize int, fileName string,
|
2019-05-14 14:42:38 +00:00
|
|
|
) (*AttachmentProcessor, error) {
|
2019-06-03 17:00:01 +02:00
|
|
|
return keyRing.newAttachmentProcessor(estimatedSize, fileName, 1<<20)
|
2018-06-04 16:05:14 -07:00
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
// DecryptAttachment takes a PGPSplitMessage, containing a session key packet and symmetrically encrypted data
|
|
|
|
|
// and returns a decrypted PlainMessage
|
2019-08-29 17:45:13 +02:00
|
|
|
// Specifically designed for attachments rather than text messages.
|
2019-06-03 17:00:01 +02:00
|
|
|
func (keyRing *KeyRing) DecryptAttachment(message *PGPSplitMessage) (*PlainMessage, error) {
|
|
|
|
|
privKeyEntries := keyRing.entities
|
2018-11-05 22:55:45 +01:00
|
|
|
|
2019-08-19 12:06:30 +02:00
|
|
|
keyReader := bytes.NewReader(message.GetBinaryKeyPacket())
|
|
|
|
|
dataReader := bytes.NewReader(message.GetBinaryDataPacket())
|
2018-06-04 16:05:14 -07:00
|
|
|
|
|
|
|
|
encryptedReader := io.MultiReader(keyReader, dataReader)
|
|
|
|
|
|
2019-10-22 18:44:45 +02:00
|
|
|
config := &packet.Config{Time: getTimeGenerator()}
|
2018-06-22 16:04:20 +02:00
|
|
|
|
|
|
|
|
md, err := openpgp.ReadMessage(encryptedReader, privKeyEntries, nil, config)
|
2018-06-04 16:05:14 -07:00
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
decrypted := md.UnverifiedBody
|
|
|
|
|
b, err := ioutil.ReadAll(decrypted)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
return NewPlainMessage(b), nil
|
2018-06-04 16:05:14 -07:00
|
|
|
}
|