2018-09-11 11:09:28 +02:00
|
|
|
package crypto
|
2018-09-05 14:56:06 +02:00
|
|
|
|
|
|
|
|
import (
|
2018-09-19 12:51:44 +02:00
|
|
|
"bytes"
|
|
|
|
|
"io"
|
2018-09-05 14:56:06 +02:00
|
|
|
"io/ioutil"
|
|
|
|
|
"mime"
|
2018-09-19 12:51:44 +02:00
|
|
|
"net/textproto"
|
2019-03-07 17:39:34 +01:00
|
|
|
|
2020-12-08 18:34:39 +01:00
|
|
|
"github.com/ProtonMail/go-crypto/openpgp"
|
|
|
|
|
"github.com/ProtonMail/go-crypto/openpgp/packet"
|
2019-05-15 13:40:19 +02:00
|
|
|
gomime "github.com/ProtonMail/go-mime"
|
2020-10-29 12:42:32 +01:00
|
|
|
"github.com/pkg/errors"
|
2018-09-19 12:51:44 +02:00
|
|
|
)
|
2018-09-05 14:56:06 +02:00
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
// SignatureCollector structure.
|
2018-09-05 14:56:06 +02:00
|
|
|
type SignatureCollector struct {
|
|
|
|
|
config *packet.Config
|
|
|
|
|
keyring openpgp.KeyRing
|
2019-05-15 13:40:19 +02:00
|
|
|
target gomime.VisitAcceptor
|
2018-09-05 14:56:06 +02:00
|
|
|
signature string
|
2019-07-02 07:36:02 -07:00
|
|
|
verified error
|
2018-09-05 14:56:06 +02:00
|
|
|
}
|
|
|
|
|
|
2019-05-14 14:42:38 +00:00
|
|
|
func newSignatureCollector(
|
2019-05-15 13:40:19 +02:00
|
|
|
targetAcceptor gomime.VisitAcceptor, keyring openpgp.KeyRing, config *packet.Config,
|
2019-05-14 14:42:38 +00:00
|
|
|
) *SignatureCollector {
|
2018-09-05 14:56:06 +02:00
|
|
|
return &SignatureCollector{
|
2019-05-13 12:33:01 +00:00
|
|
|
target: targetAcceptor,
|
2018-09-19 12:51:44 +02:00
|
|
|
config: config,
|
2018-09-05 14:56:06 +02:00
|
|
|
keyring: keyring,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
// Accept collects the signature.
|
2019-05-14 14:42:38 +00:00
|
|
|
func (sc *SignatureCollector) Accept(
|
|
|
|
|
part io.Reader, header textproto.MIMEHeader,
|
|
|
|
|
hasPlainSibling, isFirst, isLast bool,
|
|
|
|
|
) (err error) {
|
2018-09-05 14:56:06 +02:00
|
|
|
parentMediaType, params, _ := mime.ParseMediaType(header.Get("Content-Type"))
|
|
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
if parentMediaType != "multipart/signed" {
|
|
|
|
|
return sc.target.Accept(part, header, hasPlainSibling, isFirst, isLast)
|
|
|
|
|
}
|
2019-05-14 14:42:38 +00:00
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
newPart, rawBody := gomime.GetRawMimePart(part, "--"+params["boundary"])
|
|
|
|
|
multiparts, multipartHeaders, err := gomime.GetMultipartParts(newPart, params)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return
|
|
|
|
|
}
|
2019-05-13 12:33:01 +00:00
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
hasPlainChild := false
|
|
|
|
|
for _, header := range multipartHeaders {
|
|
|
|
|
mediaType, _, _ := mime.ParseMediaType(header.Get("Content-Type"))
|
|
|
|
|
hasPlainChild = (mediaType == "text/plain")
|
|
|
|
|
}
|
|
|
|
|
if len(multiparts) != 2 {
|
|
|
|
|
sc.verified = newSignatureNotSigned()
|
|
|
|
|
// Invalid multipart/signed format just pass along
|
|
|
|
|
if _, err = ioutil.ReadAll(rawBody); err != nil {
|
2020-10-29 12:42:32 +01:00
|
|
|
return errors.Wrap(err, "gopenpgp: error in reading raw message body")
|
2020-04-28 13:55:36 +02:00
|
|
|
}
|
2019-05-14 14:42:38 +00:00
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
for i, p := range multiparts {
|
|
|
|
|
if err = sc.target.Accept(p, multipartHeaders[i], hasPlainChild, true, true); err != nil {
|
|
|
|
|
return
|
2018-09-05 14:56:06 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return
|
|
|
|
|
}
|
2020-04-28 13:55:36 +02:00
|
|
|
|
|
|
|
|
// actual multipart/signed format
|
|
|
|
|
err = sc.target.Accept(multiparts[0], multipartHeaders[0], hasPlainChild, true, true)
|
2019-05-14 14:42:38 +00:00
|
|
|
if err != nil {
|
2020-10-29 12:42:32 +01:00
|
|
|
return errors.Wrap(err, "gopenpgp: error in parsing body")
|
2019-05-14 14:42:38 +00:00
|
|
|
}
|
|
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
partData, err := ioutil.ReadAll(multiparts[1])
|
|
|
|
|
if err != nil {
|
2020-10-29 12:42:32 +01:00
|
|
|
return errors.Wrap(err, "gopenpgp: error in ready part data")
|
2020-04-28 13:55:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
decodedPart := gomime.DecodeContentEncoding(
|
|
|
|
|
bytes.NewReader(partData),
|
|
|
|
|
multipartHeaders[1].Get("Content-Transfer-Encoding"))
|
|
|
|
|
|
|
|
|
|
buffer, err := ioutil.ReadAll(decodedPart)
|
|
|
|
|
if err != nil {
|
2020-10-29 12:42:32 +01:00
|
|
|
return errors.Wrap(err, "gopenpgp: error in reading decoded data")
|
2020-04-28 13:55:36 +02:00
|
|
|
}
|
|
|
|
|
mediaType, _, _ := mime.ParseMediaType(header.Get("Content-Type"))
|
|
|
|
|
buffer, err = gomime.DecodeCharset(buffer, mediaType, params)
|
|
|
|
|
if err != nil {
|
2020-10-29 12:42:32 +01:00
|
|
|
return errors.Wrap(err, "gopenpgp: error in decoding charset")
|
2020-04-28 13:55:36 +02:00
|
|
|
}
|
|
|
|
|
sc.signature = string(buffer)
|
|
|
|
|
str, _ := ioutil.ReadAll(rawBody)
|
|
|
|
|
rawBody = bytes.NewReader(str)
|
|
|
|
|
if sc.keyring != nil {
|
|
|
|
|
_, err = openpgp.CheckArmoredDetachedSignature(sc.keyring, rawBody, bytes.NewReader(buffer), sc.config)
|
|
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
sc.verified = newSignatureFailed()
|
|
|
|
|
} else {
|
|
|
|
|
sc.verified = nil
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
sc.verified = newSignatureNoVerifier()
|
|
|
|
|
}
|
2020-10-29 12:42:32 +01:00
|
|
|
|
|
|
|
|
return nil
|
2018-09-05 14:56:06 +02:00
|
|
|
}
|
|
|
|
|
|
2020-04-28 13:55:36 +02:00
|
|
|
// GetSignature collected by Accept.
|
2019-05-13 12:33:01 +00:00
|
|
|
func (sc SignatureCollector) GetSignature() string {
|
|
|
|
|
return sc.signature
|
2018-09-05 14:56:06 +02:00
|
|
|
}
|