1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
/// Decrypts asymmetrically-encrypted OpenPGP messages using the
/// openpgp crate, Sequoia's low-level API.
use std::collections::HashMap;
use std::env;
use std::io;
extern crate failure;
extern crate sequoia_openpgp as openpgp;
use openpgp::crypto::{KeyPair, SessionKey};
use openpgp::constants::SymmetricAlgorithm;
use openpgp::parse::{
Parse,
stream::{
DecryptionHelper,
Decryptor,
VerificationHelper,
VerificationResult,
},
};
pub fn main() {
let args: Vec<String> = env::args().collect();
if args.len() < 2 {
panic!("A simple decryption filter.\n\n\
Usage: {} <keyfile> [<keyfile>...] <input >output\n", args[0]);
}
// Read the transferable secret keys from the given files.
let tpks =
args[1..].iter().map(|f| {
openpgp::TPK::from_file(f)
.expect("Failed to read key")
}).collect();
// Now, create a decryptor with a helper using the given TPKs.
let mut decryptor =
Decryptor::from_reader(io::stdin(), Helper::new(tpks), None).unwrap();
// Finally, stream the decrypted data to stdout.
io::copy(&mut decryptor, &mut io::stdout())
.expect("Decryption failed");
}
/// This helper provides secrets for the decryption, fetches public
/// keys for the signature verification and implements the
/// verification policy.
struct Helper {
keys: HashMap<openpgp::KeyID, KeyPair>,
}
impl Helper {
/// Creates a Helper for the given TPKs with appropriate secrets.
fn new(tpks: Vec<openpgp::TPK>) -> Self {
// Map (sub)KeyIDs to secrets.
let mut keys = HashMap::new();
for tpk in tpks {
for (sig, _, key) in tpk.keys_all() {
if sig.map(|s| (s.key_flags().can_encrypt_at_rest()
|| s.key_flags().can_encrypt_for_transport()))
.unwrap_or(false)
{
// This only works for unencrypted secret keys.
if let Ok(keypair) = key.clone().into_keypair() {
keys.insert(key.keyid(), keypair);
}
}
}
}
Helper {
keys: keys,
}
}
}
impl DecryptionHelper for Helper {
fn decrypt<D>(&mut self,
pkesks: &[openpgp::packet::PKESK],
_skesks: &[openpgp::packet::SKESK],
mut decrypt: D)
-> openpgp::Result<Option<openpgp::Fingerprint>>
where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
{
// Try each PKESK until we succeed.
for pkesk in pkesks {
if let Some(pair) = self.keys.get(pkesk.recipient()) {
if let Ok(_) = pkesks[0].decrypt(pair.public(), pair.secret())
.and_then(|(algo, session_key)| decrypt(algo, &session_key))
{
break;
}
}
}
// XXX: In production code, return the Fingerprint of the
// recipient's TPK here
Ok(None)
}
}
impl VerificationHelper for Helper {
fn get_public_keys(&mut self, _ids: &[openpgp::KeyID])
-> failure::Fallible<Vec<openpgp::TPK>> {
Ok(Vec::new()) // Feed the TPKs to the verifier here.
}
fn check(&mut self, _sigs: Vec<Vec<VerificationResult>>)
-> failure::Fallible<()> {
Ok(()) // Implement your verification policy here.
}
}
|