All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.openpgp.operator.PublicKeyKeyEncryptionMethodGenerator Maven / Gradle / Ivy

Go to download

The Bouncy Castle Java APIs for the OpenPGP Protocol. The APIs are designed primarily to be used in conjunction with the BC FIPS provider. The APIs may also be used with other providers although if being used in a FIPS context it is the responsibility of the user to ensure that any other providers used are FIPS certified and used appropriately.

There is a newer version: 2.0.9
Show newest version
package org.bouncycastle.openpgp.operator;

import org.bouncycastle.bcpg.ContainedPacket;
import org.bouncycastle.bcpg.MPInteger;
import org.bouncycastle.bcpg.PublicKeyAlgorithmTags;
import org.bouncycastle.bcpg.PublicKeyEncSessionPacket;
import org.bouncycastle.openpgp.PGPException;
import org.bouncycastle.openpgp.PGPPublicKey;
import org.bouncycastle.util.Properties;

import java.io.IOException;
import java.math.BigInteger;

/**
 * Abstract generator class for encryption methods that produce PKESK (public-key encrypted session key) packets.
 * PKESKs are used when encrypting a message for a recipients public key.
 * The purpose of this class is to allow subclasses to decide, which implementation to use.
 */
public abstract class PublicKeyKeyEncryptionMethodGenerator
    implements PGPKeyEncryptionMethodGenerator
{
    public static final String SESSION_KEY_OBFUSCATION_PROPERTY = "org.bouncycastle.openpgp.session_key_obfuscation";
    public static final long WILDCARD_KEYID = 0L;
    /**
     * @deprecated use WILDCARD_KEYID
     */
    public static final long WILDCARD = 0L;
    public static final byte[] WILDCARD_FINGERPRINT = new byte[0];

    private static boolean getSessionKeyObfuscationDefault()
    {
        // by default we want this to be true.
        return !Properties.isOverrideSetTo(SESSION_KEY_OBFUSCATION_PROPERTY, false);
    }

    private final PGPPublicKey pubKey;

    protected boolean sessionKeyObfuscation;
    protected boolean useWildcardRecipient;

    protected PublicKeyKeyEncryptionMethodGenerator(
        PGPPublicKey pubKey)
    {
        switch (pubKey.getAlgorithm())
        {
        case PGPPublicKey.RSA_ENCRYPT:
        case PGPPublicKey.RSA_GENERAL:
        case PGPPublicKey.ELGAMAL_ENCRYPT:
        case PGPPublicKey.ELGAMAL_GENERAL:
        case PGPPublicKey.ECDH:
        case PGPPublicKey.X25519:
        case PGPPublicKey.X448:
            break;
        case PGPPublicKey.RSA_SIGN:
            throw new IllegalArgumentException("Can't use an RSA_SIGN key for encryption.");
        case PGPPublicKey.DSA:
            throw new IllegalArgumentException("Can't use DSA for encryption.");
        case PGPPublicKey.ECDSA:
            throw new IllegalArgumentException("Can't use ECDSA for encryption.");
        case PublicKeyAlgorithmTags.Ed448:
        case PublicKeyAlgorithmTags.Ed25519:
        case PublicKeyAlgorithmTags.EDDSA_LEGACY:
            throw new IllegalArgumentException("Can't use EdDSA for encryption.");
        default:
            throw new IllegalArgumentException("unknown asymmetric algorithm: " + pubKey.getAlgorithm());
        }

        this.pubKey = pubKey;
        this.sessionKeyObfuscation = getSessionKeyObfuscationDefault();
    }

    /**
     * Controls whether to obfuscate the size of ECDH session keys using extra padding where necessary.
     * 

* The default behaviour can be configured using the system property * "org.bouncycastle.openpgp.session_key_obfuscation", or else it will default to enabled. *

* * @return the current generator. */ public PublicKeyKeyEncryptionMethodGenerator setSessionKeyObfuscation(boolean enabled) { this.sessionKeyObfuscation = enabled; return this; } /** * Controls whether the recipient key ID/fingerprint is hidden (replaced by a wildcard value). * * @param enabled boolean * @return this * @deprecated use {@link #setUseWildcardRecipient(boolean)} instead * TODO: Remove in a future release */ @Deprecated public PublicKeyKeyEncryptionMethodGenerator setUseWildcardKeyID(boolean enabled) { return setUseWildcardRecipient(enabled); } /** * Controls whether the recipient key ID/fingerprint is hidden (replaced by a wildcard value). * * @param enabled boolean * @return this */ public PublicKeyKeyEncryptionMethodGenerator setUseWildcardRecipient(boolean enabled) { this.useWildcardRecipient = enabled; return this; } public byte[][] encodeEncryptedSessionInfo( byte[] encryptedSessionInfo) throws PGPException { byte[][] data; switch (pubKey.getAlgorithm()) { case PGPPublicKey.RSA_ENCRYPT: case PGPPublicKey.RSA_GENERAL: data = new byte[1][]; data[0] = convertToEncodedMPI(encryptedSessionInfo); break; case PGPPublicKey.ELGAMAL_ENCRYPT: case PGPPublicKey.ELGAMAL_GENERAL: byte[] b1 = new byte[encryptedSessionInfo.length / 2]; byte[] b2 = new byte[encryptedSessionInfo.length / 2]; System.arraycopy(encryptedSessionInfo, 0, b1, 0, b1.length); System.arraycopy(encryptedSessionInfo, b1.length, b2, 0, b2.length); data = new byte[2][]; data[0] = convertToEncodedMPI(b1); data[1] = convertToEncodedMPI(b2); break; case PGPPublicKey.ECDH: case PGPPublicKey.X448: case PGPPublicKey.X25519: data = new byte[1][]; data[0] = encryptedSessionInfo; break; default: throw new PGPException("unknown asymmetric algorithm: " + pubKey.getAlgorithm()); } return data; } private byte[] convertToEncodedMPI(byte[] encryptedSessionInfo) throws PGPException { try { return new MPInteger(new BigInteger(1, encryptedSessionInfo)).getEncoded(); } catch (IOException e) { throw new PGPException("Invalid MPI encoding: " + e.getMessage(), e); } } /** * Generate a Public-Key Encrypted Session-Key (PKESK) packet of version 3. * PKESKv3 packets are used with Symmetrically-Encrypted-Integrity-Protected Data (SEIPD) packets of * version 1 or with Symmetrically-Encrypted Data (SED) packets and MUST NOT be used with SEIPDv2 packets. * PKESKv3 packets are used with keys that do not support {@link org.bouncycastle.bcpg.sig.Features#FEATURE_SEIPD_V2} * or as a fallback. *

* Generate a Public-Key Encrypted Session-Key (PKESK) packet of version 6. * PKESKv6 packets are used with Symmetrically-Encrypted Integrity-Protected Data (SEIPD) packets * of version 2 only. * PKESKv6 packets are used with keys that support {@link org.bouncycastle.bcpg.sig.Features#FEATURE_SEIPD_V2}. * * @param sessionKey session-key algorithm id + session-key + checksum * @return PKESKv6 or v3 packet * @throws PGPException if the PKESK packet cannot be generated * @see * RFC9580 - Version 6 Public Key Encrypted Session Key Packet * @see * RFC9580 - Version 3 Public Key Encrypted Session Key Packet */ public ContainedPacket generate(PGPDataEncryptorBuilder dataEncryptorBuilder, byte[] sessionKey) throws PGPException { if (dataEncryptorBuilder.getAeadAlgorithm() <= 0 || dataEncryptorBuilder.isV5StyleAEAD()) { long keyId; if (useWildcardRecipient) { keyId = WILDCARD_KEYID; } else { keyId = pubKey.getKeyID(); } byte[] encryptedSessionInfo = encryptSessionInfo(pubKey, sessionKey, (byte)dataEncryptorBuilder.getAlgorithm(), true); byte[][] encodedEncSessionInfo = encodeEncryptedSessionInfo(encryptedSessionInfo); return PublicKeyEncSessionPacket.createV3PKESKPacket(keyId, pubKey.getAlgorithm(), encodedEncSessionInfo); } else { byte[] keyFingerprint; int keyVersion; if (useWildcardRecipient) { keyFingerprint = WILDCARD_FINGERPRINT; keyVersion = 0; } else { keyFingerprint = pubKey.getFingerprint(); keyVersion = pubKey.getVersion(); } // In V6, do not include the symmetric-key algorithm in the session-info byte[] encryptedSessionInfo = encryptSessionInfo(pubKey, sessionKey, (byte)dataEncryptorBuilder.getAlgorithm(), false); byte[][] encodedEncSessionInfo = encodeEncryptedSessionInfo(encryptedSessionInfo); return PublicKeyEncSessionPacket.createV6PKESKPacket(keyVersion, keyFingerprint, pubKey.getAlgorithm(), encodedEncSessionInfo); } } protected byte[] createSessionInfo( byte algorithm, byte[] keyBytes) { byte[] sessionInfo; if (algorithm != 0) { sessionInfo = new byte[keyBytes.length + 3]; sessionInfo[0] = algorithm; System.arraycopy(keyBytes, 0, sessionInfo, 1, keyBytes.length); addCheckSum(sessionInfo, 1); } else { sessionInfo = new byte[keyBytes.length + 2]; System.arraycopy(keyBytes, 0, sessionInfo, 0, keyBytes.length); addCheckSum(sessionInfo, 0); } return sessionInfo; } private void addCheckSum(byte[] sessionInfo, int pos) { int check = 0; for (int i = pos; i != sessionInfo.length - 2; i++) { check += sessionInfo[i] & 0xff; } sessionInfo[sessionInfo.length - 2] = (byte)(check >> 8); sessionInfo[sessionInfo.length - 1] = (byte)(check); } /** * Encrypt a session key using the recipients public key. * * @param pubKey recipients public key * @param sessionKey session-key * @param symAlgId for v3: session key algorithm ID; for v6: 0 * @return encrypted session info * @throws PGPException */ protected abstract byte[] encryptSessionInfo(PGPPublicKey pubKey, byte[] sessionKey, byte symAlgId, boolean isV3) throws PGPException; protected static byte[] getSessionInfo(byte[] ephPubEncoding, byte optSymKeyAlgorithm, byte[] wrappedSessionKey) { int len = ephPubEncoding.length + wrappedSessionKey.length + (optSymKeyAlgorithm == 0 ? 1 : 2); byte[] out = new byte[len]; // ephemeral pub key System.arraycopy(ephPubEncoding, 0, out, 0, ephPubEncoding.length); // len of two/one next fields out[ephPubEncoding.length] = (byte)(len - ephPubEncoding.length - 1); // sym key alg if (optSymKeyAlgorithm != 0) { out[ephPubEncoding.length + 1] = optSymKeyAlgorithm; } // wrapped session key System.arraycopy(wrappedSessionKey, 0, out, len - wrappedSessionKey.length, wrappedSessionKey.length); return out; } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy