#[cfg(test)]
use quickcheck::{Arbitrary, Gen};
use crate::packet::key;
use crate::packet::Key;
use crate::KeyID;
use crate::crypto::Decryptor;
use crate::crypto::mpi::Ciphertext;
use crate::Packet;
use crate::PublicKeyAlgorithm;
use crate::Result;
use crate::SymmetricAlgorithm;
use crate::crypto::SessionKey;
use crate::packet;
#[derive(Clone, Debug, PartialEq, Eq, Hash)]
pub struct PKESK3 {
pub(crate) common: packet::Common,
recipient: Option<KeyID>,
pk_algo: PublicKeyAlgorithm,
esk: Ciphertext,
}
assert_send_and_sync!(PKESK3);
impl PKESK3 {
pub fn new(recipient: Option<KeyID>,
pk_algo: PublicKeyAlgorithm,
encrypted_session_key: Ciphertext)
-> Result<PKESK3> {
let recipient =
if recipient.as_ref().map(KeyID::is_wildcard).unwrap_or(true) {
None
} else {
recipient
};
Ok(PKESK3 {
common: Default::default(),
recipient,
pk_algo,
esk: encrypted_session_key,
})
}
pub fn for_recipient<P, R>(algo: SymmetricAlgorithm,
session_key: &SessionKey,
recipient: &Key<P, R>)
-> Result<PKESK3>
where P: key::KeyParts,
R: key::KeyRole,
{
Ok(PKESK3{
common: Default::default(),
recipient: Some(recipient.keyid()),
pk_algo: recipient.pk_algo(),
esk: packet::PKESK::encrypt_common(
Some(algo), session_key,
recipient.parts_as_unspecified().role_as_unspecified())?,
})
}
pub fn recipient(&self) -> Option<&KeyID> {
self.recipient.as_ref()
}
pub fn set_recipient(&mut self, recipient: Option<KeyID>) -> Option<KeyID> {
::std::mem::replace(&mut self.recipient, recipient)
}
pub fn pk_algo(&self) -> PublicKeyAlgorithm {
self.pk_algo
}
pub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm {
::std::mem::replace(&mut self.pk_algo, algo)
}
pub fn esk(&self) -> &Ciphertext {
&self.esk
}
pub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext {
::std::mem::replace(&mut self.esk, esk)
}
pub fn decrypt(&self, decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>)
-> Option<(SymmetricAlgorithm, SessionKey)>
{
self.decrypt_insecure(decryptor, sym_algo_hint).ok()
}
fn decrypt_insecure(&self, decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>)
-> Result<(SymmetricAlgorithm, SessionKey)>
{
packet::PKESK::decrypt_common(&self.esk, decryptor, sym_algo_hint, true)
.map(|(sym_algo, sk)| (sym_algo.expect("known for v3 PKESK"), sk))
}
}
impl From<PKESK3> for crate::packet::PKESK {
fn from(p: PKESK3) -> Self {
crate::packet::PKESK::V3(p)
}
}
impl From<PKESK3> for Packet {
fn from(p: PKESK3) -> Self {
Packet::PKESK(p.into())
}
}
#[cfg(test)]
impl Arbitrary for PKESK3 {
fn arbitrary(g: &mut Gen) -> Self {
let (ciphertext, pk_algo) = loop {
let ciphertext = Ciphertext::arbitrary(g);
if let Some(pk_algo) = ciphertext.pk_algo() {
break (ciphertext, pk_algo);
}
};
let keyid = bool::arbitrary(g).then_some(KeyID::arbitrary(g));
PKESK3::new(keyid, pk_algo, ciphertext).unwrap()
}
}
#[cfg(test)]
mod tests {
use super::*;
use crate::Cert;
use crate::PacketPile;
use crate::packet::*;
use crate::parse::Parse;
use crate::serialize::MarshalInto;
use crate::types::Curve;
quickcheck! {
fn roundtrip(p: PKESK3) -> bool {
let q = PKESK3::from_bytes(&p.to_vec().unwrap()).unwrap();
assert_eq!(p, q);
true
}
}
#[test]
fn decrypt_rsa() {
if ! PublicKeyAlgorithm::RSAEncryptSign.is_supported() {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
let cert = Cert::from_bytes(
crate::tests::key("testy-private.pgp")).unwrap();
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-testy.pgp")).unwrap();
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret().unwrap().into_keypair().unwrap();
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None).unwrap();
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
}
#[test]
fn decrypt_ecdh_cv25519() {
if ! (PublicKeyAlgorithm::EdDSA.is_supported()
&& Curve::Ed25519.is_supported()
&& PublicKeyAlgorithm::ECDH.is_supported()
&& Curve::Cv25519.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
let cert = Cert::from_bytes(
crate::tests::key("testy-new-private.pgp")).unwrap();
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-testy-new.pgp")).unwrap();
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret().unwrap().into_keypair().unwrap();
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None).unwrap();
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
}
#[test]
fn decrypt_ecdh_nistp256() {
if ! (PublicKeyAlgorithm::ECDSA.is_supported()
&& PublicKeyAlgorithm::ECDH.is_supported()
&& Curve::NistP256.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
let cert = Cert::from_bytes(
crate::tests::key("testy-nistp256-private.pgp")).unwrap();
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-testy-nistp256.pgp")).unwrap();
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret().unwrap().into_keypair().unwrap();
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None)
.expect("ECDH decryption using P-256 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
}
#[test]
fn decrypt_ecdh_nistp384() {
if ! (PublicKeyAlgorithm::ECDSA.is_supported()
&& PublicKeyAlgorithm::ECDH.is_supported()
&& Curve::NistP384.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
let cert = Cert::from_bytes(
crate::tests::key("testy-nistp384-private.pgp")).unwrap();
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-testy-nistp384.pgp")).unwrap();
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret().unwrap().into_keypair().unwrap();
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None)
.expect("ECDH decryption using P-384 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
}
#[test]
#[allow(deprecated)]
fn decrypt_elgamal() -> Result<()> {
if ! (PublicKeyAlgorithm::DSA.is_supported()
&& PublicKeyAlgorithm::ElGamalEncrypt.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return Ok(());
}
let cert = Cert::from_bytes(
crate::tests::key("dsa2048-elgamal3072-private.pgp"))?;
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-dsa2048-elgamal3072.pgp"))?;
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret()?.into_keypair()?;
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None).unwrap();
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
Ok(())
}
#[test]
fn decrypt_ecdh_nistp521() {
if ! (PublicKeyAlgorithm::ECDSA.is_supported()
&& PublicKeyAlgorithm::ECDH.is_supported()
&& Curve::NistP521.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
let cert = Cert::from_bytes(
crate::tests::key("testy-nistp521-private.pgp")).unwrap();
let pile = PacketPile::from_bytes(
crate::tests::message("encrypted-to-testy-nistp521.pgp")).unwrap();
let mut keypair =
cert.subkeys().next().unwrap()
.key().clone().parts_into_secret().unwrap().into_keypair().unwrap();
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let plain = pkesk.decrypt(&mut keypair, None)
.expect("ECDH decryption using P-521 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
assert_eq!(plain, plain_);
eprintln!("plain: {:?}", plain);
}
#[test]
fn decrypt_with_short_cv25519_secret_key() {
if ! (PublicKeyAlgorithm::ECDH.is_supported()
&& Curve::Cv25519.is_supported()) {
eprintln!("Skipping test, algorithm is not supported.");
return;
}
use super::PKESK3;
use crate::crypto::SessionKey;
use crate::{HashAlgorithm, SymmetricAlgorithm};
use crate::packet::key::{Key4, UnspecifiedRole};
let mut secret_key = [
0x0,0x0,
0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,
0x1,0x2,0x2,0x2,0x2,0x2,0x2,0x2,0x2,0x2,
0x1,0x2,0x2,0x2,0x2,0x2,0x2,0x2,0x0,0x0
];
secret_key[31] &= 0x7f;
secret_key[31] |= 0x40;
let key: Key<_, UnspecifiedRole> = Key4::import_secret_cv25519(
&secret_key,
HashAlgorithm::SHA256,
SymmetricAlgorithm::AES256,
None,
).unwrap().into();
let sess_key = SessionKey::new(32).unwrap();
let pkesk = PKESK3::for_recipient(SymmetricAlgorithm::AES256, &sess_key,
&key).unwrap();
let mut keypair = key.into_keypair().unwrap();
pkesk.decrypt(&mut keypair, None).unwrap();
}
#[test]
fn cve_2021_3580_ciphertext_too_long() -> Result<()> {
if ! PublicKeyAlgorithm::RSAEncryptSign.is_supported() {
eprintln!("Skipping test, algorithm is not supported.");
return Ok(());
}
let cert = Cert::from_bytes(
crate::tests::key("testy-private.pgp"))?;
let mut keypair = cert.primary_key().key().clone()
.parts_into_secret()?.into_keypair()?;
let pile = PacketPile::from_bytes(b"-----BEGIN PGP ARMORED FILE-----
wcDNAwAAAAAAAAAAAQwGI5SkpcRMjkiOKx332kxv+2Xh4y1QTefPilKOPOlHYFa0
rnnLaQVEACKJNQ38YuCFUvtpK4IN2grjlj71IP24+KDp3ZuVWnVTS6JcyE10Y9iq
uGvKdS0C17XCze2LD4ouVOrUZHGXpeDT47w6DsHb/0UE85h56wpk2CzO1XFQzHxX
HR2DDLqqeFVzTv0peYiQfLHl7kWXijTNEqmYhFCzxuICXzuClAAJM+fVIRfcm2tm
2R4AxOQGv9DlWfZwbkpKfj/uuo0CAe21n4NT+NzdVgPlff/hna3yGgPe1B+vjq4e
jfxHg+pvo/HTLkV+c2HAGbM1bCb/5TedGd1nAMSAIOu/J/WQp/l3HtEv63HaVPZJ
JInJ6L/KyPwjm/ieZx5EWOLJgFRWGCrBGnb8T81lkFey7uZR5Xiq+9KoUhHQFw8N
joc0YUVyhUBVFf4B0zVZRUfqZyJtJ07Sl5xppI12U1HQCTjn7Fp8BHMPKuBotYzv
1Q4f00k6Txctw+LDRM17/w==
=VtwB
-----END PGP ARMORED FILE-----
")?;
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let _ = pkesk.decrypt(&mut keypair, None);
Ok(())
}
#[test]
fn cve_2021_3580_zero_ciphertext() -> Result<()> {
if ! PublicKeyAlgorithm::RSAEncryptSign.is_supported() {
eprintln!("Skipping test, algorithm is not supported.");
return Ok(());
}
let cert = Cert::from_bytes(
crate::tests::key("testy-private.pgp"))?;
let mut keypair = cert.primary_key().key().clone()
.parts_into_secret()?.into_keypair()?;
let pile = PacketPile::from_bytes(b"-----BEGIN PGP ARMORED FILE-----
wQwDAAAAAAAAAAABAAA=
=H/1T
-----END PGP ARMORED FILE-----
")?;
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
let _ = pkesk.decrypt(&mut keypair, None);
Ok(())
}
}