All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.pgpainless.policy.Policy Maven / Gradle / Ivy

There is a newer version: 1.6.7
Show newest version
// SPDX-FileCopyrightText: 2021 Paul Schaub 
//
// SPDX-License-Identifier: Apache-2.0

package org.pgpainless.policy;

import java.util.Arrays;
import java.util.Collections;
import java.util.Date;
import java.util.EnumMap;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.NoSuchElementException;

import javax.annotation.Nonnull;

import org.pgpainless.algorithm.AlgorithmSuite;
import org.pgpainless.algorithm.CompressionAlgorithm;
import org.pgpainless.algorithm.HashAlgorithm;
import org.pgpainless.algorithm.PublicKeyAlgorithm;
import org.pgpainless.algorithm.SymmetricKeyAlgorithm;
import org.pgpainless.util.DateUtil;
import org.pgpainless.util.NotationRegistry;

/**
 * Policy class used to configure acceptable algorithm suites etc.
 */
public final class Policy {

    private static Policy INSTANCE;

    private HashAlgorithmPolicy signatureHashAlgorithmPolicy =
            HashAlgorithmPolicy.smartSignatureHashAlgorithmPolicy();
    private HashAlgorithmPolicy revocationSignatureHashAlgorithmPolicy =
            HashAlgorithmPolicy.smartSignatureHashAlgorithmPolicy();
    private SymmetricKeyAlgorithmPolicy symmetricKeyEncryptionAlgorithmPolicy =
            SymmetricKeyAlgorithmPolicy.symmetricKeyEncryptionPolicy2022();
    private SymmetricKeyAlgorithmPolicy symmetricKeyDecryptionAlgorithmPolicy =
            SymmetricKeyAlgorithmPolicy.symmetricKeyDecryptionPolicy2022();
    private CompressionAlgorithmPolicy compressionAlgorithmPolicy =
            CompressionAlgorithmPolicy.anyCompressionAlgorithmPolicy();
    private PublicKeyAlgorithmPolicy publicKeyAlgorithmPolicy =
            PublicKeyAlgorithmPolicy.bsi2021PublicKeyAlgorithmPolicy();
    private final NotationRegistry notationRegistry = new NotationRegistry();

    private AlgorithmSuite keyGenerationAlgorithmSuite = AlgorithmSuite.getDefaultAlgorithmSuite();

    // Signers User-ID is soon to be deprecated.
    private SignerUserIdValidationLevel signerUserIdValidationLevel = SignerUserIdValidationLevel.DISABLED;

    private boolean enableKeyParameterValidation = false;

    public enum SignerUserIdValidationLevel {
        /**
         * PGPainless will verify {@link org.bouncycastle.bcpg.sig.SignerUserID} subpackets in signatures strictly.
         * This means, that signatures with Signer's User-ID subpackets containing a value that does not match the signer key's
         * user-id exactly, will be rejected.
         * E.g. Signer's user-id "[email protected]", User-ID: "Alice <[email protected]>" does not
         * match exactly and is therefore rejected.
         */
        STRICT,

        /**
         * PGPainless will ignore {@link org.bouncycastle.bcpg.sig.SignerUserID} subpackets on signature.
         */
        DISABLED
    }

    Policy() {
    }

    /**
     * Return the singleton instance of PGPainless' policy.
     *
     * @return singleton instance
     */
    public static Policy getInstance() {
        if (INSTANCE == null) {
            INSTANCE = new Policy();
        }
        return INSTANCE;
    }

    /**
     * Return the hash algorithm policy for signatures.
     * @return hash algorithm policy
     */
    public HashAlgorithmPolicy getSignatureHashAlgorithmPolicy() {
        return signatureHashAlgorithmPolicy;
    }

    /**
     * Set a custom hash algorithm policy for signatures.
     *
     * @param policy custom policy
     */
    public void setSignatureHashAlgorithmPolicy(HashAlgorithmPolicy policy) {
        if (policy == null) {
            throw new NullPointerException("Policy cannot be null.");
        }
        this.signatureHashAlgorithmPolicy = policy;
    }

    /**
     * Return the hash algorithm policy for revocations.
     * This policy is separate from {@link #getSignatureHashAlgorithmPolicy()}, as PGPainless by default uses a
     * less strict policy when it comes to acceptable algorithms.
     *
     * @return revocation signature hash algorithm policy
     */
    public HashAlgorithmPolicy getRevocationSignatureHashAlgorithmPolicy() {
        return revocationSignatureHashAlgorithmPolicy;
    }

    /**
     * Set a custom hash algorithm policy for revocations.
     *
     * @param policy custom policy
     */
    public void setRevocationSignatureHashAlgorithmPolicy(HashAlgorithmPolicy policy) {
        if (policy == null) {
            throw new NullPointerException("Policy cannot be null.");
        }
        this.revocationSignatureHashAlgorithmPolicy = policy;
    }

    /**
     * Return the symmetric encryption algorithm policy for encryption.
     * This policy defines which symmetric algorithms are acceptable when producing encrypted messages.
     *
     * @return symmetric algorithm policy for encryption
     */
    public SymmetricKeyAlgorithmPolicy getSymmetricKeyEncryptionAlgorithmPolicy() {
        return symmetricKeyEncryptionAlgorithmPolicy;
    }

    /**
     * Return the symmetric encryption algorithm policy for decryption.
     * This policy defines which symmetric algorithms are acceptable when decrypting encrypted messages.
     *
     * @return symmetric algorithm policy for decryption
     */
    public SymmetricKeyAlgorithmPolicy getSymmetricKeyDecryptionAlgorithmPolicy() {
        return symmetricKeyDecryptionAlgorithmPolicy;
    }

    /**
     * Set a custom symmetric encryption algorithm policy for encrypting messages.
     *
     * @param policy custom policy
     */
    public void setSymmetricKeyEncryptionAlgorithmPolicy(SymmetricKeyAlgorithmPolicy policy) {
        if (policy == null) {
            throw new NullPointerException("Policy cannot be null.");
        }
        this.symmetricKeyEncryptionAlgorithmPolicy = policy;
    }

    /**
     * Set a custom symmetric encryption algorithm policy for decrypting messages.
     *
     * @param policy custom policy
     */
    public void setSymmetricKeyDecryptionAlgorithmPolicy(SymmetricKeyAlgorithmPolicy policy) {
        if (policy == null) {
            throw new NullPointerException("Policy cannot be null.");
        }
        this.symmetricKeyDecryptionAlgorithmPolicy = policy;
    }

    public CompressionAlgorithmPolicy getCompressionAlgorithmPolicy() {
        return compressionAlgorithmPolicy;
    }

    public void setCompressionAlgorithmPolicy(CompressionAlgorithmPolicy policy) {
        if (policy == null) {
            throw new NullPointerException("Compression policy cannot be null.");
        }
        this.compressionAlgorithmPolicy = policy;
    }

    /**
     * Return the current public key algorithm policy.
     *
     * @return public key algorithm policy
     */
    public PublicKeyAlgorithmPolicy getPublicKeyAlgorithmPolicy() {
        return publicKeyAlgorithmPolicy;
    }

    /**
     * Set a custom public key algorithm policy.
     *
     * @param publicKeyAlgorithmPolicy custom policy
     */
    public void setPublicKeyAlgorithmPolicy(PublicKeyAlgorithmPolicy publicKeyAlgorithmPolicy) {
        if (publicKeyAlgorithmPolicy == null) {
            throw new NullPointerException("Public key algorithm policy cannot be null.");
        }
        this.publicKeyAlgorithmPolicy = publicKeyAlgorithmPolicy;
    }

    public static final class SymmetricKeyAlgorithmPolicy {

        private final SymmetricKeyAlgorithm defaultSymmetricKeyAlgorithm;
        private final List acceptableSymmetricKeyAlgorithms;

        public SymmetricKeyAlgorithmPolicy(SymmetricKeyAlgorithm defaultSymmetricKeyAlgorithm, List acceptableSymmetricKeyAlgorithms) {
            this.defaultSymmetricKeyAlgorithm = defaultSymmetricKeyAlgorithm;
            this.acceptableSymmetricKeyAlgorithms = Collections.unmodifiableList(acceptableSymmetricKeyAlgorithms);
        }

        /**
         * Return the default symmetric key algorithm.
         * This algorithm is used as a fallback when no consensus about symmetric algorithms can be reached.
         *
         * @return default symmetric encryption algorithm
         */
        public SymmetricKeyAlgorithm getDefaultSymmetricKeyAlgorithm() {
            return defaultSymmetricKeyAlgorithm;
        }

        /**
         * Return true if the given symmetric encryption algorithm is acceptable by this policy.
         *
         * @param algorithm algorithm
         * @return true if algorithm is acceptable, false otherwise
         */
        public boolean isAcceptable(SymmetricKeyAlgorithm algorithm) {
            return acceptableSymmetricKeyAlgorithms.contains(algorithm);
        }

        /**
         * Return true if the given symmetric encryption algorithm is acceptable by this policy.
         *
         * @param algorithmId algorithm
         * @return true if algorithm is acceptable, false otherwise
         */
        public boolean isAcceptable(int algorithmId) {
            try {
                SymmetricKeyAlgorithm algorithm = SymmetricKeyAlgorithm.requireFromId(algorithmId);
                return isAcceptable(algorithm);
            } catch (NoSuchElementException e) {
                // Unknown algorithm is not acceptable
                return false;
            }
        }

        /**
         * The default symmetric encryption algorithm policy of PGPainless.
         *
         * @return default symmetric encryption algorithm policy
         * @deprecated not expressive - will be removed in a future release
         */
        @Deprecated
        public static SymmetricKeyAlgorithmPolicy defaultSymmetricKeyEncryptionAlgorithmPolicy() {
            return symmetricKeyEncryptionPolicy2022();
        }

        /**
         * Policy for symmetric encryption algorithms in the context of message production (encryption).
         * This suite contains algorithms that are deemed safe to use in 2022.
         *
         * @return 2022 symmetric key encryption algorithm policy
         */
        public static SymmetricKeyAlgorithmPolicy symmetricKeyEncryptionPolicy2022() {
            return new SymmetricKeyAlgorithmPolicy(SymmetricKeyAlgorithm.AES_256, Arrays.asList(
                    // Reject: Unencrypted, IDEA, TripleDES, CAST5, Blowfish
                    SymmetricKeyAlgorithm.AES_256,
                    SymmetricKeyAlgorithm.AES_192,
                    SymmetricKeyAlgorithm.AES_128,
                    SymmetricKeyAlgorithm.TWOFISH,
                    SymmetricKeyAlgorithm.CAMELLIA_256,
                    SymmetricKeyAlgorithm.CAMELLIA_192,
                    SymmetricKeyAlgorithm.CAMELLIA_128
            ));
        }

        /**
         * The default symmetric decryption algorithm policy of PGPainless.
         *
         * @return default symmetric decryption algorithm policy
         * @deprecated not expressive - will be removed in a future update
         */
        @Deprecated
        public static SymmetricKeyAlgorithmPolicy defaultSymmetricKeyDecryptionAlgorithmPolicy() {
            return symmetricKeyDecryptionPolicy2022();
        }

        /**
         * Policy for symmetric key encryption algorithms in the context of message consumption (decryption).
         * This suite contains algorithms that are deemed safe to use in 2022.
         *
         * @return 2022 symmetric key decryption algorithm policy
         */
        public static SymmetricKeyAlgorithmPolicy symmetricKeyDecryptionPolicy2022() {
            return new SymmetricKeyAlgorithmPolicy(SymmetricKeyAlgorithm.AES_256, Arrays.asList(
                    // Reject: Unencrypted, IDEA, TripleDES, Blowfish
                    SymmetricKeyAlgorithm.CAST5,
                    SymmetricKeyAlgorithm.AES_256,
                    SymmetricKeyAlgorithm.AES_192,
                    SymmetricKeyAlgorithm.AES_128,
                    SymmetricKeyAlgorithm.TWOFISH,
                    SymmetricKeyAlgorithm.CAMELLIA_256,
                    SymmetricKeyAlgorithm.CAMELLIA_192,
                    SymmetricKeyAlgorithm.CAMELLIA_128
            ));
        }

        /**
         * Select the best acceptable algorithm from the options list.
         * The best algorithm is the first algorithm we encounter in our list of acceptable algorithms that
         * is also contained in the list of options.
         *
         *
         * @param options list of algorithm options
         * @return best
         */
        public SymmetricKeyAlgorithm selectBest(List options) {
            for (SymmetricKeyAlgorithm acceptable : acceptableSymmetricKeyAlgorithms) {
                if (options.contains(acceptable)) {
                    return acceptable;
                }
            }
            return null;
        }
    }

    public static final class HashAlgorithmPolicy {

        private final HashAlgorithm defaultHashAlgorithm;
        private final Map acceptableHashAlgorithmsAndTerminationDates;

        /**
         * Create a {@link HashAlgorithmPolicy} which accepts all {@link HashAlgorithm HashAlgorithms} from the
         * given map, if the queried usage date is BEFORE the respective termination date.
         * A termination date value of 
null
means no termination, resulting in the algorithm being * acceptable, regardless of usage date. * * @param defaultHashAlgorithm default hash algorithm * @param algorithmTerminationDates map of acceptable algorithms and their termination dates */ public HashAlgorithmPolicy(@Nonnull HashAlgorithm defaultHashAlgorithm, @Nonnull Map algorithmTerminationDates) { this.defaultHashAlgorithm = defaultHashAlgorithm; this.acceptableHashAlgorithmsAndTerminationDates = algorithmTerminationDates; } /** * Create a {@link HashAlgorithmPolicy} which accepts all {@link HashAlgorithm HashAlgorithms} listed in * the given list, regardless of usage date. * * @param defaultHashAlgorithm default hash algorithm (e.g. used as fallback if negotiation fails) * @param acceptableHashAlgorithms list of acceptable hash algorithms */ public HashAlgorithmPolicy(@Nonnull HashAlgorithm defaultHashAlgorithm, @Nonnull List acceptableHashAlgorithms) { this(defaultHashAlgorithm, Collections.unmodifiableMap(listToMap(acceptableHashAlgorithms))); } private static Map listToMap(@Nonnull List algorithms) { Map algorithmsAndTerminationDates = new HashMap<>(); for (HashAlgorithm algorithm : algorithms) { algorithmsAndTerminationDates.put(algorithm, null); } return algorithmsAndTerminationDates; } /** * Return the default hash algorithm. * This algorithm is used as a fallback when no consensus about hash algorithms can be reached. * * @return default hash algorithm */ public HashAlgorithm defaultHashAlgorithm() { return defaultHashAlgorithm; } /** * Return true if the given hash algorithm is currently acceptable by this policy. * * @param hashAlgorithm hash algorithm * @return true if the hash algorithm is acceptable, false otherwise */ public boolean isAcceptable(@Nonnull HashAlgorithm hashAlgorithm) { return isAcceptable(hashAlgorithm, new Date()); } /** * Return true if the given hash algorithm is currently acceptable by this policy. * * @param algorithmId hash algorithm * @return true if the hash algorithm is acceptable, false otherwise */ public boolean isAcceptable(int algorithmId) { try { HashAlgorithm algorithm = HashAlgorithm.requireFromId(algorithmId); return isAcceptable(algorithm); } catch (NoSuchElementException e) { // Unknown algorithm is not acceptable return false; } } /** * Return true, if the given algorithm is acceptable for the given usage date. * * @param hashAlgorithm algorithm * @param usageDate usage date (e.g. signature creation time) * * @return acceptance */ public boolean isAcceptable(@Nonnull HashAlgorithm hashAlgorithm, @Nonnull Date usageDate) { if (!acceptableHashAlgorithmsAndTerminationDates.containsKey(hashAlgorithm)) { return false; } // Check termination date Date terminationDate = acceptableHashAlgorithmsAndTerminationDates.get(hashAlgorithm); if (terminationDate == null) { return true; } // Reject if usage date is past termination date return terminationDate.after(usageDate); } public boolean isAcceptable(int algorithmId, @Nonnull Date usageDate) { try { HashAlgorithm algorithm = HashAlgorithm.requireFromId(algorithmId); return isAcceptable(algorithm, usageDate); } catch (NoSuchElementException e) { // Unknown algorithm is not acceptable return false; } } /** * The default signature hash algorithm policy of PGPainless. * Note that this policy is only used for non-revocation signatures. * For revocation signatures {@link #defaultRevocationSignatureHashAlgorithmPolicy()} is used instead. * * @return default signature hash algorithm policy * @deprecated not expressive - will be removed in an upcoming release */ @Deprecated public static HashAlgorithmPolicy defaultSignatureAlgorithmPolicy() { return smartSignatureHashAlgorithmPolicy(); } /** * {@link HashAlgorithmPolicy} which takes the date of the algorithm usage into consideration. * If the policy has a termination date for a given algorithm, and the usage date is after that termination * date, the algorithm is rejected. * * This policy is inspired by Sequoia-PGP's collision resistant algorithm policy. * * @see Sequoia-PGP's Collision Resistant Algorithm Policy * * @return smart signature algorithm policy */ public static HashAlgorithmPolicy smartSignatureHashAlgorithmPolicy() { Map algorithmDateMap = new HashMap<>(); algorithmDateMap.put(HashAlgorithm.MD5, DateUtil.parseUTCDate("1997-02-01 00:00:00 UTC")); algorithmDateMap.put(HashAlgorithm.SHA1, DateUtil.parseUTCDate("2013-02-01 00:00:00 UTC")); algorithmDateMap.put(HashAlgorithm.RIPEMD160, DateUtil.parseUTCDate("2013-02-01 00:00:00 UTC")); algorithmDateMap.put(HashAlgorithm.SHA224, null); algorithmDateMap.put(HashAlgorithm.SHA256, null); algorithmDateMap.put(HashAlgorithm.SHA384, null); algorithmDateMap.put(HashAlgorithm.SHA512, null); return new HashAlgorithmPolicy(HashAlgorithm.SHA512, algorithmDateMap); } /** * {@link HashAlgorithmPolicy} which only accepts signatures made using algorithms which are acceptable * according to 2022 standards. * * Particularly this policy only accepts algorithms from the SHA2 family. * * @return static signature algorithm policy */ public static HashAlgorithmPolicy static2022SignatureHashAlgorithmPolicy() { return new HashAlgorithmPolicy(HashAlgorithm.SHA512, Arrays.asList( HashAlgorithm.SHA224, HashAlgorithm.SHA256, HashAlgorithm.SHA384, HashAlgorithm.SHA512 )); } /** * The default revocation signature hash algorithm policy of PGPainless. * * @return default revocation signature hash algorithm policy * @deprecated not expressive - will be removed in an upcoming release */ @Deprecated public static HashAlgorithmPolicy defaultRevocationSignatureHashAlgorithmPolicy() { return smartSignatureHashAlgorithmPolicy(); } /** * Hash algorithm policy for revocation signatures, which accepts SHA1 and SHA2 algorithms, as well as RIPEMD160. * * @return static revocation signature hash algorithm policy */ public static HashAlgorithmPolicy static2022RevocationSignatureHashAlgorithmPolicy() { return new HashAlgorithmPolicy(HashAlgorithm.SHA512, Arrays.asList( HashAlgorithm.RIPEMD160, HashAlgorithm.SHA1, HashAlgorithm.SHA224, HashAlgorithm.SHA256, HashAlgorithm.SHA384, HashAlgorithm.SHA512 )); } } public static final class CompressionAlgorithmPolicy { private final CompressionAlgorithm defaultCompressionAlgorithm; private final List acceptableCompressionAlgorithms; public CompressionAlgorithmPolicy(CompressionAlgorithm defaultCompressionAlgorithm, List acceptableCompressionAlgorithms) { this.defaultCompressionAlgorithm = defaultCompressionAlgorithm; this.acceptableCompressionAlgorithms = Collections.unmodifiableList(acceptableCompressionAlgorithms); } public CompressionAlgorithm defaultCompressionAlgorithm() { return defaultCompressionAlgorithm; } public boolean isAcceptable(int compressionAlgorithmTag) { try { CompressionAlgorithm compressionAlgorithm = CompressionAlgorithm.requireFromId(compressionAlgorithmTag); return isAcceptable(compressionAlgorithm); } catch (NoSuchElementException e) { // Unknown algorithm is not acceptable return false; } } public boolean isAcceptable(CompressionAlgorithm compressionAlgorithm) { return acceptableCompressionAlgorithms.contains(compressionAlgorithm); } /** * Default {@link CompressionAlgorithmPolicy} of PGPainless. * The default compression algorithm policy accepts any compression algorithm. * * @return default algorithm policy * @deprecated not expressive - might be removed in a future release */ @Deprecated public static CompressionAlgorithmPolicy defaultCompressionAlgorithmPolicy() { return anyCompressionAlgorithmPolicy(); } /** * Policy that accepts any known compression algorithm and offers {@link CompressionAlgorithm#ZIP} as * default algorithm. * * @return compression algorithm policy */ public static CompressionAlgorithmPolicy anyCompressionAlgorithmPolicy() { return new CompressionAlgorithmPolicy(CompressionAlgorithm.ZIP, Arrays.asList( CompressionAlgorithm.UNCOMPRESSED, CompressionAlgorithm.ZIP, CompressionAlgorithm.BZIP2, CompressionAlgorithm.ZLIB )); } } public static final class PublicKeyAlgorithmPolicy { private final Map algorithmStrengths = new EnumMap<>(PublicKeyAlgorithm.class); public PublicKeyAlgorithmPolicy(Map minimalAlgorithmBitStrengths) { this.algorithmStrengths.putAll(minimalAlgorithmBitStrengths); } public boolean isAcceptable(int algorithmId, int bitStrength) { try { PublicKeyAlgorithm algorithm = PublicKeyAlgorithm.requireFromId(algorithmId); return isAcceptable(algorithm, bitStrength); } catch (NoSuchElementException e) { // Unknown algorithm is not acceptable return false; } } public boolean isAcceptable(PublicKeyAlgorithm algorithm, int bitStrength) { if (!algorithmStrengths.containsKey(algorithm)) { return false; } int minStrength = algorithmStrengths.get(algorithm); return bitStrength >= minStrength; } /** * Return PGPainless' default public key algorithm policy. * This policy is based upon recommendations made by the German Federal Office for Information Security (BSI). * * @return default algorithm policy * @deprecated not expressive - might be removed in a future release */ @Deprecated public static PublicKeyAlgorithmPolicy defaultPublicKeyAlgorithmPolicy() { return bsi2021PublicKeyAlgorithmPolicy(); } /** * This policy is based upon recommendations made by the German Federal Office for Information Security (BSI). * * Basically this policy requires keys based on elliptic curves to have a bit strength of at least 250, * and keys based on prime number factorization / discrete logarithm problems to have a strength of at least 2000 bits. * * @see BSI - Technical Guideline - Cryptographic Mechanisms: Recommendations and Key Lengths (2021-01) * @see BlueKrypt | Cryptographic Key Length Recommendation * * @return default algorithm policy */ public static PublicKeyAlgorithmPolicy bsi2021PublicKeyAlgorithmPolicy() { Map minimalBitStrengths = new EnumMap<>(PublicKeyAlgorithm.class); // §5.4.1 minimalBitStrengths.put(PublicKeyAlgorithm.RSA_GENERAL, 2000); minimalBitStrengths.put(PublicKeyAlgorithm.RSA_SIGN, 2000); minimalBitStrengths.put(PublicKeyAlgorithm.RSA_ENCRYPT, 2000); // Note: ElGamal is not mentioned in the BSI document. // We assume that the requirements are similar to other DH algorithms minimalBitStrengths.put(PublicKeyAlgorithm.ELGAMAL_ENCRYPT, 2000); minimalBitStrengths.put(PublicKeyAlgorithm.ELGAMAL_GENERAL, 2000); // §5.4.2 minimalBitStrengths.put(PublicKeyAlgorithm.DSA, 2000); // §5.4.3 minimalBitStrengths.put(PublicKeyAlgorithm.ECDSA, 250); // Note: EdDSA is not mentioned in the BSI document. // We assume that the requirements are similar to other EC algorithms. minimalBitStrengths.put(PublicKeyAlgorithm.EDDSA, 250); // §7.2.1 minimalBitStrengths.put(PublicKeyAlgorithm.DIFFIE_HELLMAN, 2000); // §7.2.2 minimalBitStrengths.put(PublicKeyAlgorithm.ECDH, 250); minimalBitStrengths.put(PublicKeyAlgorithm.EC, 250); return new PublicKeyAlgorithmPolicy(minimalBitStrengths); } } /** * Return the {@link NotationRegistry} of PGPainless. * The notation registry is used to decide, whether a Notation is known or not. * Background: Critical unknown notations render signatures invalid. * * @return Notation registry */ public NotationRegistry getNotationRegistry() { return notationRegistry; } /** * Return the current {@link AlgorithmSuite} which defines preferred algorithms used during key generation. * @return current algorithm suite */ public @Nonnull AlgorithmSuite getKeyGenerationAlgorithmSuite() { return keyGenerationAlgorithmSuite; } /** * Set a custom {@link AlgorithmSuite} which defines preferred algorithms used during key generation. * * @param algorithmSuite custom algorithm suite */ public void setKeyGenerationAlgorithmSuite(@Nonnull AlgorithmSuite algorithmSuite) { this.keyGenerationAlgorithmSuite = algorithmSuite; } /** * Return the level of validation PGPainless shall do on {@link org.bouncycastle.bcpg.sig.SignerUserID} subpackets. * By default, this value is {@link SignerUserIdValidationLevel#DISABLED}. * * @return the level of validation */ public SignerUserIdValidationLevel getSignerUserIdValidationLevel() { return signerUserIdValidationLevel; } /** * Specify, how {@link org.bouncycastle.bcpg.sig.SignerUserID} subpackets on signatures shall be validated. * * @param signerUserIdValidationLevel level of verification PGPainless shall do on * {@link org.bouncycastle.bcpg.sig.SignerUserID} subpackets. * @return policy instance */ public Policy setSignerUserIdValidationLevel(SignerUserIdValidationLevel signerUserIdValidationLevel) { if (signerUserIdValidationLevel == null) { throw new NullPointerException("SignerUserIdValidationLevel cannot be null."); } this.signerUserIdValidationLevel = signerUserIdValidationLevel; return this; } /** * Enable or disable validation of public key parameters when unlocking private keys. * Disabled by default. * When enabled, PGPainless will validate, whether public key parameters have been tampered with. * This is a countermeasure against possible attacks described in the paper * "Victory by KO: Attacking OpenPGP Using Key Overwriting" by Lara Bruseghini, Daniel Huigens, and Kenneth G. Paterson. * Since these attacks are only possible in very special conditions (attacker has access to the encrypted private key), * and the countermeasures are very costly, they are disabled by default, but can be enabled using this method. * * @see KOpenPGP.com * @param enable boolean * @return this */ public Policy setEnableKeyParameterValidation(boolean enable) { this.enableKeyParameterValidation = enable; return this; } /** * Return true, if countermeasures against the KOpenPGP attacks are enabled, false otherwise. * * @return true if countermeasures are enabled, false otherwise. */ public boolean isEnableKeyParameterValidation() { return enableKeyParameterValidation; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy