2019-09-12 11:33:17 +02:00
|
|
|
package helper
|
|
|
|
|
|
|
|
|
|
import (
|
2019-12-27 19:35:43 +01:00
|
|
|
"github.com/ProtonMail/gopenpgp/v2/crypto"
|
2019-09-12 11:33:17 +02:00
|
|
|
)
|
|
|
|
|
|
2019-12-27 19:35:43 +01:00
|
|
|
// ExplicitVerifyMessage contains explicitly the signature verification error, for gomobile users
|
2019-09-12 11:33:17 +02:00
|
|
|
type ExplicitVerifyMessage struct {
|
2019-12-27 19:35:43 +01:00
|
|
|
Message *crypto.PlainMessage
|
2019-09-12 11:33:17 +02:00
|
|
|
SignatureVerificationError *crypto.SignatureVerificationError
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-27 19:35:43 +01:00
|
|
|
// DecryptExplicitVerify decrypts an armored PGP message given a private key and its passphrase
|
2019-09-12 11:33:17 +02:00
|
|
|
// and verifies the embedded signature.
|
|
|
|
|
// Returns the plain data or an error on signature verification failure.
|
|
|
|
|
func DecryptExplicitVerify(
|
|
|
|
|
pgpMessage *crypto.PGPMessage,
|
|
|
|
|
privateKeyRing, publicKeyRing *crypto.KeyRing,
|
|
|
|
|
verifyTime int64,
|
|
|
|
|
) (*ExplicitVerifyMessage, error) {
|
|
|
|
|
var explicitVerify *ExplicitVerifyMessage
|
|
|
|
|
|
2019-12-27 19:35:43 +01:00
|
|
|
message, err := privateKeyRing.Decrypt(pgpMessage, publicKeyRing, verifyTime)
|
2019-09-12 11:33:17 +02:00
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
castedErr, isType := err.(crypto.SignatureVerificationError)
|
|
|
|
|
if !isType {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
explicitVerify = &ExplicitVerifyMessage{
|
2019-12-27 19:35:43 +01:00
|
|
|
Message: message,
|
2019-09-12 11:33:17 +02:00
|
|
|
SignatureVerificationError: &castedErr,
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
explicitVerify = &ExplicitVerifyMessage{
|
2019-12-27 19:35:43 +01:00
|
|
|
Message: message,
|
2019-09-12 11:33:17 +02:00
|
|
|
SignatureVerificationError: nil,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return explicitVerify, nil
|
|
|
|
|
}
|