package crypto import ( "bytes" "errors" "strings" "time" "github.com/ProtonMail/go-pm-crypto/internal" "golang.org/x/crypto/openpgp" errors2 "golang.org/x/crypto/openpgp/errors" "golang.org/x/crypto/openpgp/packet" "io" ) // SignTextDetached sign detached text type func (pm *PmCrypto) SignTextDetached(plainText string, privateKey string, passphrase string, trim bool) (string, error) { //sign with 0x01 text var signEntity *openpgp.Entity if trim { plainText = internal.TrimNewlines(plainText) } signerReader := strings.NewReader(privateKey) signerEntries, err := openpgp.ReadArmoredKeyRing(signerReader) if err != nil { return "", err } for _, e := range signerEntries { // Entity.PrivateKey must be a signing key if e.PrivateKey != nil { if e.PrivateKey.Encrypted { e.PrivateKey.Decrypt([]byte(passphrase)) } if !e.PrivateKey.Encrypted { signEntity = e break } } } if signEntity == nil { return "", errors.New("cannot sign message, signer key is not unlocked") } config := &packet.Config{DefaultCipher: packet.CipherAES256, Time: pm.getTimeGenerator()} att := strings.NewReader(plainText) var outBuf bytes.Buffer //SignText if err = openpgp.ArmoredDetachSignText(&outBuf, signEntity, att, config); err != nil { return "", err } return outBuf.String(), nil } // Sign detached bin data using string key func (pm *PmCrypto) SignBinDetached(plainData []byte, privateKey string, passphrase string) (string, error) { //sign with 0x00 var signEntity *openpgp.Entity signerReader := strings.NewReader(privateKey) signerEntries, err := openpgp.ReadArmoredKeyRing(signerReader) if err != nil { return "", err } for _, e := range signerEntries { // Entity.PrivateKey must be a signing key if e.PrivateKey != nil { if e.PrivateKey.Encrypted { e.PrivateKey.Decrypt([]byte(passphrase)) } if !e.PrivateKey.Encrypted { signEntity = e break } } } if signEntity == nil { return "", errors.New("cannot sign message, singer key is not unlocked") } config := &packet.Config{DefaultCipher: packet.CipherAES256, Time: pm.getTimeGenerator()} att := bytes.NewReader(plainData) var outBuf bytes.Buffer //sign bin if err = openpgp.ArmoredDetachSign(&outBuf, signEntity, att, config); err != nil { return "", err } return outBuf.String(), nil } // Verify detached text - check if signature is valid using a given publicKey in binary format func (pm *PmCrypto) VerifyTextSignDetachedBinKey(signature string, plainText string, publicKey []byte, verifyTime int64) (bool, error) { pubKeyReader := bytes.NewReader(publicKey) pubKeyEntries, err := openpgp.ReadKeyRing(pubKeyReader) if err != nil { return false, err } plainText = internal.TrimNewlines(plainText) origText := bytes.NewReader(bytes.NewBufferString(plainText).Bytes()) return verifySignature(pubKeyEntries, origText, signature, verifyTime) } func verifySignature(pubKeyEntries openpgp.EntityList, origText *bytes.Reader, signature string, verifyTime int64) (bool, error) { config := &packet.Config{} if verifyTime == 0 { config.Time = func() time.Time { return time.Unix(0, 0) } } else { config.Time = func() time.Time { return time.Unix(verifyTime+internal.CreationTimeOffset, 0) } } signatureReader := strings.NewReader(signature) signer, err := openpgp.CheckArmoredDetachedSignature(pubKeyEntries, origText, signatureReader, config) if err == errors2.ErrSignatureExpired && signer != nil { if verifyTime > 0 { // Maybe the creation time offset pushed it over the edge // Retry with the actual verification time config.Time = func() time.Time { return time.Unix(verifyTime, 0) } signatureReader.Seek(0, io.SeekStart) signer, err = openpgp.CheckArmoredDetachedSignature(pubKeyEntries, origText, signatureReader, config) } else { // verifyTime = 0: time check disabled, everything is okay err = nil } } if err != nil { return false, err } if signer == nil { return false, errors.New("signer is empty") } // if signer.PrimaryKey.KeyId != signed.PrimaryKey.KeyId { // // t.Errorf("wrong signer got:%x want:%x", signer.PrimaryKey.KeyId, 0) // return false, errors.New("signer is nil") // } return true, nil } // Verify detached text in binary format - check if signature is valid using a given publicKey in binary format func (pm *PmCrypto) VerifyBinSignDetachedBinKey(signature string, plainData []byte, publicKey []byte, verifyTime int64) (bool, error) { pubKeyReader := bytes.NewReader(publicKey) pubKeyEntries, err := openpgp.ReadKeyRing(pubKeyReader) if err != nil { return false, err } origText := bytes.NewReader(plainData) return verifySignature(pubKeyEntries, origText, signature, verifyTime) }