forked from toolshed/abra
		
	We were running behind and there were quite some deprecations to update. This was mostly in the upstream copy/pasta package but seems quite minimal.
		
			
				
	
	
		
			1512 lines
		
	
	
		
			46 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1512 lines
		
	
	
		
			46 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2011 The Go Authors. All rights reserved.
 | |
| // Use of this source code is governed by a BSD-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package packet
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"crypto"
 | |
| 	"crypto/dsa"
 | |
| 	"encoding/asn1"
 | |
| 	"encoding/binary"
 | |
| 	"hash"
 | |
| 	"io"
 | |
| 	"math/big"
 | |
| 	"strconv"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/ecdsa"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/ed25519"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/ed448"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/eddsa"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/errors"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/internal/algorithm"
 | |
| 	"github.com/ProtonMail/go-crypto/openpgp/internal/encoding"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	// First octet of key flags.
 | |
| 	// See RFC 9580, section 5.2.3.29 for details.
 | |
| 	KeyFlagCertify = 1 << iota
 | |
| 	KeyFlagSign
 | |
| 	KeyFlagEncryptCommunications
 | |
| 	KeyFlagEncryptStorage
 | |
| 	KeyFlagSplitKey
 | |
| 	KeyFlagAuthenticate
 | |
| 	_
 | |
| 	KeyFlagGroupKey
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	// First octet of keyserver preference flags.
 | |
| 	// See RFC 9580, section 5.2.3.25 for details.
 | |
| 	_ = 1 << iota
 | |
| 	_
 | |
| 	_
 | |
| 	_
 | |
| 	_
 | |
| 	_
 | |
| 	_
 | |
| 	KeyserverPrefNoModify
 | |
| )
 | |
| 
 | |
| const SaltNotationName = "salt@notations.openpgpjs.org"
 | |
| 
 | |
| // Signature represents a signature. See RFC 9580, section 5.2.
 | |
| type Signature struct {
 | |
| 	Version    int
 | |
| 	SigType    SignatureType
 | |
| 	PubKeyAlgo PublicKeyAlgorithm
 | |
| 	Hash       crypto.Hash
 | |
| 	// salt contains a random salt value for v6 signatures
 | |
| 	// See RFC 9580 Section 5.2.4.
 | |
| 	salt []byte
 | |
| 
 | |
| 	// HashSuffix is extra data that is hashed in after the signed data.
 | |
| 	HashSuffix []byte
 | |
| 	// HashTag contains the first two bytes of the hash for fast rejection
 | |
| 	// of bad signed data.
 | |
| 	HashTag [2]byte
 | |
| 
 | |
| 	// Metadata includes format, filename and time, and is protected by v5
 | |
| 	// signatures of type 0x00 or 0x01. This metadata is included into the hash
 | |
| 	// computation; if nil, six 0x00 bytes are used instead. See section 5.2.4.
 | |
| 	Metadata *LiteralData
 | |
| 
 | |
| 	CreationTime time.Time
 | |
| 
 | |
| 	RSASignature         encoding.Field
 | |
| 	DSASigR, DSASigS     encoding.Field
 | |
| 	ECDSASigR, ECDSASigS encoding.Field
 | |
| 	EdDSASigR, EdDSASigS encoding.Field
 | |
| 	EdSig                []byte
 | |
| 
 | |
| 	// rawSubpackets contains the unparsed subpackets, in order.
 | |
| 	rawSubpackets []outputSubpacket
 | |
| 
 | |
| 	// The following are optional so are nil when not included in the
 | |
| 	// signature.
 | |
| 
 | |
| 	SigLifetimeSecs, KeyLifetimeSecs                        *uint32
 | |
| 	PreferredSymmetric, PreferredHash, PreferredCompression []uint8
 | |
| 	PreferredCipherSuites                                   [][2]uint8
 | |
| 	IssuerKeyId                                             *uint64
 | |
| 	IssuerFingerprint                                       []byte
 | |
| 	SignerUserId                                            *string
 | |
| 	IsPrimaryId                                             *bool
 | |
| 	Notations                                               []*Notation
 | |
| 	IntendedRecipients                                      []*Recipient
 | |
| 
 | |
| 	// TrustLevel and TrustAmount can be set by the signer to assert that
 | |
| 	// the key is not only valid but also trustworthy at the specified
 | |
| 	// level.
 | |
| 	// See RFC 9580, section 5.2.3.21 for details.
 | |
| 	TrustLevel  TrustLevel
 | |
| 	TrustAmount TrustAmount
 | |
| 
 | |
| 	// TrustRegularExpression can be used in conjunction with trust Signature
 | |
| 	// packets to limit the scope of the trust that is extended.
 | |
| 	// See RFC 9580, section 5.2.3.22 for details.
 | |
| 	TrustRegularExpression *string
 | |
| 
 | |
| 	// KeyserverPrefsValid is set if any keyserver preferences were given. See RFC 9580, section
 | |
| 	// 5.2.3.25 for details.
 | |
| 	KeyserverPrefsValid   bool
 | |
| 	KeyserverPrefNoModify bool
 | |
| 
 | |
| 	// PreferredKeyserver can be set to a URI where the latest version of the
 | |
| 	// key that this signature is made over can be found. See RFC 9580, section
 | |
| 	// 5.2.3.26 for details.
 | |
| 	PreferredKeyserver string
 | |
| 
 | |
| 	// PolicyURI can be set to the URI of a document that describes the
 | |
| 	// policy under which the signature was issued. See RFC 9580, section
 | |
| 	// 5.2.3.28 for details.
 | |
| 	PolicyURI string
 | |
| 
 | |
| 	// FlagsValid is set if any flags were given. See RFC 9580, section
 | |
| 	// 5.2.3.29 for details.
 | |
| 	FlagsValid                                                                                                         bool
 | |
| 	FlagCertify, FlagSign, FlagEncryptCommunications, FlagEncryptStorage, FlagSplitKey, FlagAuthenticate, FlagGroupKey bool
 | |
| 
 | |
| 	// RevocationReason is set if this signature has been revoked.
 | |
| 	// See RFC 9580, section 5.2.3.31 for details.
 | |
| 	RevocationReason     *ReasonForRevocation
 | |
| 	RevocationReasonText string
 | |
| 
 | |
| 	// In a self-signature, these flags are set there is a features subpacket
 | |
| 	// indicating that the issuer implementation supports these features
 | |
| 	// see https://datatracker.ietf.org/doc/html/draft-ietf-openpgp-crypto-refresh#features-subpacket
 | |
| 	SEIPDv1, SEIPDv2 bool
 | |
| 
 | |
| 	// EmbeddedSignature, if non-nil, is a signature of the parent key, by
 | |
| 	// this key. This prevents an attacker from claiming another's signing
 | |
| 	// subkey as their own.
 | |
| 	EmbeddedSignature *Signature
 | |
| 
 | |
| 	outSubpackets []outputSubpacket
 | |
| }
 | |
| 
 | |
| // VerifiableSignature internally keeps state if the
 | |
| // the signature has been verified before.
 | |
| type VerifiableSignature struct {
 | |
| 	Valid  *bool // nil if it has not been verified yet
 | |
| 	Packet *Signature
 | |
| }
 | |
| 
 | |
| // NewVerifiableSig returns a struct of type VerifiableSignature referencing the input signature.
 | |
| func NewVerifiableSig(signature *Signature) *VerifiableSignature {
 | |
| 	return &VerifiableSignature{
 | |
| 		Packet: signature,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Salt returns the signature salt for v6 signatures.
 | |
| func (sig *Signature) Salt() []byte {
 | |
| 	if sig == nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	return sig.salt
 | |
| }
 | |
| 
 | |
| func (sig *Signature) parse(r io.Reader) (err error) {
 | |
| 	// RFC 9580, section 5.2.3
 | |
| 	var buf [7]byte
 | |
| 	_, err = readFull(r, buf[:1])
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	sig.Version = int(buf[0])
 | |
| 	if sig.Version != 4 && sig.Version != 5 && sig.Version != 6 {
 | |
| 		err = errors.UnsupportedError("signature packet version " + strconv.Itoa(int(buf[0])))
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if V5Disabled && sig.Version == 5 {
 | |
| 		return errors.UnsupportedError("support for parsing v5 entities is disabled; build with `-tags v5` if needed")
 | |
| 	}
 | |
| 
 | |
| 	if sig.Version == 6 {
 | |
| 		_, err = readFull(r, buf[:7])
 | |
| 	} else {
 | |
| 		_, err = readFull(r, buf[:5])
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	sig.SigType = SignatureType(buf[0])
 | |
| 	sig.PubKeyAlgo = PublicKeyAlgorithm(buf[1])
 | |
| 	switch sig.PubKeyAlgo {
 | |
| 	case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly, PubKeyAlgoDSA, PubKeyAlgoECDSA, PubKeyAlgoEdDSA, PubKeyAlgoEd25519, PubKeyAlgoEd448:
 | |
| 	default:
 | |
| 		err = errors.UnsupportedError("public key algorithm " + strconv.Itoa(int(sig.PubKeyAlgo)))
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var ok bool
 | |
| 
 | |
| 	if sig.Version < 5 {
 | |
| 		sig.Hash, ok = algorithm.HashIdToHashWithSha1(buf[2])
 | |
| 	} else {
 | |
| 		sig.Hash, ok = algorithm.HashIdToHash(buf[2])
 | |
| 	}
 | |
| 
 | |
| 	if !ok {
 | |
| 		return errors.UnsupportedError("hash function " + strconv.Itoa(int(buf[2])))
 | |
| 	}
 | |
| 
 | |
| 	var hashedSubpacketsLength int
 | |
| 	if sig.Version == 6 {
 | |
| 		// For a v6 signature, a four-octet length is used.
 | |
| 		hashedSubpacketsLength =
 | |
| 			int(buf[3])<<24 |
 | |
| 				int(buf[4])<<16 |
 | |
| 				int(buf[5])<<8 |
 | |
| 				int(buf[6])
 | |
| 	} else {
 | |
| 		hashedSubpacketsLength = int(buf[3])<<8 | int(buf[4])
 | |
| 	}
 | |
| 	hashedSubpackets := make([]byte, hashedSubpacketsLength)
 | |
| 	_, err = readFull(r, hashedSubpackets)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	err = sig.buildHashSuffix(hashedSubpackets)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	err = parseSignatureSubpackets(sig, hashedSubpackets, true)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if sig.Version == 6 {
 | |
| 		_, err = readFull(r, buf[:4])
 | |
| 	} else {
 | |
| 		_, err = readFull(r, buf[:2])
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	var unhashedSubpacketsLength uint32
 | |
| 	if sig.Version == 6 {
 | |
| 		unhashedSubpacketsLength = uint32(buf[0])<<24 | uint32(buf[1])<<16 | uint32(buf[2])<<8 | uint32(buf[3])
 | |
| 	} else {
 | |
| 		unhashedSubpacketsLength = uint32(buf[0])<<8 | uint32(buf[1])
 | |
| 	}
 | |
| 	unhashedSubpackets := make([]byte, unhashedSubpacketsLength)
 | |
| 	_, err = readFull(r, unhashedSubpackets)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	err = parseSignatureSubpackets(sig, unhashedSubpackets, false)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	_, err = readFull(r, sig.HashTag[:2])
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if sig.Version == 6 {
 | |
| 		// Only for v6 signatures, a variable-length field containing the salt
 | |
| 		_, err = readFull(r, buf[:1])
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		saltLength := int(buf[0])
 | |
| 		var expectedSaltLength int
 | |
| 		expectedSaltLength, err = SaltLengthForHash(sig.Hash)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		if saltLength != expectedSaltLength {
 | |
| 			err = errors.StructuralError("unexpected salt size for the given hash algorithm")
 | |
| 			return
 | |
| 		}
 | |
| 		salt := make([]byte, expectedSaltLength)
 | |
| 		_, err = readFull(r, salt)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		sig.salt = salt
 | |
| 	}
 | |
| 
 | |
| 	switch sig.PubKeyAlgo {
 | |
| 	case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly:
 | |
| 		sig.RSASignature = new(encoding.MPI)
 | |
| 		_, err = sig.RSASignature.ReadFrom(r)
 | |
| 	case PubKeyAlgoDSA:
 | |
| 		sig.DSASigR = new(encoding.MPI)
 | |
| 		if _, err = sig.DSASigR.ReadFrom(r); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		sig.DSASigS = new(encoding.MPI)
 | |
| 		_, err = sig.DSASigS.ReadFrom(r)
 | |
| 	case PubKeyAlgoECDSA:
 | |
| 		sig.ECDSASigR = new(encoding.MPI)
 | |
| 		if _, err = sig.ECDSASigR.ReadFrom(r); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		sig.ECDSASigS = new(encoding.MPI)
 | |
| 		_, err = sig.ECDSASigS.ReadFrom(r)
 | |
| 	case PubKeyAlgoEdDSA:
 | |
| 		sig.EdDSASigR = new(encoding.MPI)
 | |
| 		if _, err = sig.EdDSASigR.ReadFrom(r); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		sig.EdDSASigS = new(encoding.MPI)
 | |
| 		if _, err = sig.EdDSASigS.ReadFrom(r); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	case PubKeyAlgoEd25519:
 | |
| 		sig.EdSig, err = ed25519.ReadSignature(r)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	case PubKeyAlgoEd448:
 | |
| 		sig.EdSig, err = ed448.ReadSignature(r)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	default:
 | |
| 		panic("unreachable")
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // parseSignatureSubpackets parses subpackets of the main signature packet. See
 | |
| // RFC 9580, section 5.2.3.1.
 | |
| func parseSignatureSubpackets(sig *Signature, subpackets []byte, isHashed bool) (err error) {
 | |
| 	for len(subpackets) > 0 {
 | |
| 		subpackets, err = parseSignatureSubpacket(sig, subpackets, isHashed)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if sig.CreationTime.IsZero() {
 | |
| 		err = errors.StructuralError("no creation time in signature")
 | |
| 	}
 | |
| 
 | |
| 	return
 | |
| }
 | |
| 
 | |
| type signatureSubpacketType uint8
 | |
| 
 | |
| const (
 | |
| 	creationTimeSubpacket        signatureSubpacketType = 2
 | |
| 	signatureExpirationSubpacket signatureSubpacketType = 3
 | |
| 	exportableCertSubpacket      signatureSubpacketType = 4
 | |
| 	trustSubpacket               signatureSubpacketType = 5
 | |
| 	regularExpressionSubpacket   signatureSubpacketType = 6
 | |
| 	keyExpirationSubpacket       signatureSubpacketType = 9
 | |
| 	prefSymmetricAlgosSubpacket  signatureSubpacketType = 11
 | |
| 	issuerSubpacket              signatureSubpacketType = 16
 | |
| 	notationDataSubpacket        signatureSubpacketType = 20
 | |
| 	prefHashAlgosSubpacket       signatureSubpacketType = 21
 | |
| 	prefCompressionSubpacket     signatureSubpacketType = 22
 | |
| 	keyserverPrefsSubpacket      signatureSubpacketType = 23
 | |
| 	prefKeyserverSubpacket       signatureSubpacketType = 24
 | |
| 	primaryUserIdSubpacket       signatureSubpacketType = 25
 | |
| 	policyUriSubpacket           signatureSubpacketType = 26
 | |
| 	keyFlagsSubpacket            signatureSubpacketType = 27
 | |
| 	signerUserIdSubpacket        signatureSubpacketType = 28
 | |
| 	reasonForRevocationSubpacket signatureSubpacketType = 29
 | |
| 	featuresSubpacket            signatureSubpacketType = 30
 | |
| 	embeddedSignatureSubpacket   signatureSubpacketType = 32
 | |
| 	issuerFingerprintSubpacket   signatureSubpacketType = 33
 | |
| 	intendedRecipientSubpacket   signatureSubpacketType = 35
 | |
| 	prefCipherSuitesSubpacket    signatureSubpacketType = 39
 | |
| )
 | |
| 
 | |
| // parseSignatureSubpacket parses a single subpacket. len(subpacket) is >= 1.
 | |
| func parseSignatureSubpacket(sig *Signature, subpacket []byte, isHashed bool) (rest []byte, err error) {
 | |
| 	// RFC 9580, section 5.2.3.7
 | |
| 	var (
 | |
| 		length     uint32
 | |
| 		packetType signatureSubpacketType
 | |
| 		isCritical bool
 | |
| 	)
 | |
| 	if len(subpacket) == 0 {
 | |
| 		err = errors.StructuralError("zero length signature subpacket")
 | |
| 		return
 | |
| 	}
 | |
| 	switch {
 | |
| 	case subpacket[0] < 192:
 | |
| 		length = uint32(subpacket[0])
 | |
| 		subpacket = subpacket[1:]
 | |
| 	case subpacket[0] < 255:
 | |
| 		if len(subpacket) < 2 {
 | |
| 			goto Truncated
 | |
| 		}
 | |
| 		length = uint32(subpacket[0]-192)<<8 + uint32(subpacket[1]) + 192
 | |
| 		subpacket = subpacket[2:]
 | |
| 	default:
 | |
| 		if len(subpacket) < 5 {
 | |
| 			goto Truncated
 | |
| 		}
 | |
| 		length = uint32(subpacket[1])<<24 |
 | |
| 			uint32(subpacket[2])<<16 |
 | |
| 			uint32(subpacket[3])<<8 |
 | |
| 			uint32(subpacket[4])
 | |
| 		subpacket = subpacket[5:]
 | |
| 	}
 | |
| 	if length > uint32(len(subpacket)) {
 | |
| 		goto Truncated
 | |
| 	}
 | |
| 	rest = subpacket[length:]
 | |
| 	subpacket = subpacket[:length]
 | |
| 	if len(subpacket) == 0 {
 | |
| 		err = errors.StructuralError("zero length signature subpacket")
 | |
| 		return
 | |
| 	}
 | |
| 	packetType = signatureSubpacketType(subpacket[0] & 0x7f)
 | |
| 	isCritical = subpacket[0]&0x80 == 0x80
 | |
| 	subpacket = subpacket[1:]
 | |
| 	sig.rawSubpackets = append(sig.rawSubpackets, outputSubpacket{isHashed, packetType, isCritical, subpacket})
 | |
| 	if !isHashed &&
 | |
| 		packetType != issuerSubpacket &&
 | |
| 		packetType != issuerFingerprintSubpacket &&
 | |
| 		packetType != embeddedSignatureSubpacket {
 | |
| 		return
 | |
| 	}
 | |
| 	switch packetType {
 | |
| 	case creationTimeSubpacket:
 | |
| 		if len(subpacket) != 4 {
 | |
| 			err = errors.StructuralError("signature creation time not four bytes")
 | |
| 			return
 | |
| 		}
 | |
| 		t := binary.BigEndian.Uint32(subpacket)
 | |
| 		sig.CreationTime = time.Unix(int64(t), 0)
 | |
| 	case signatureExpirationSubpacket:
 | |
| 		// Signature expiration time, section 5.2.3.18
 | |
| 		if len(subpacket) != 4 {
 | |
| 			err = errors.StructuralError("expiration subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		sig.SigLifetimeSecs = new(uint32)
 | |
| 		*sig.SigLifetimeSecs = binary.BigEndian.Uint32(subpacket)
 | |
| 	case exportableCertSubpacket:
 | |
| 		if subpacket[0] == 0 {
 | |
| 			err = errors.UnsupportedError("signature with non-exportable certification")
 | |
| 			return
 | |
| 		}
 | |
| 	case trustSubpacket:
 | |
| 		if len(subpacket) != 2 {
 | |
| 			err = errors.StructuralError("trust subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		// Trust level and amount, section 5.2.3.21
 | |
| 		sig.TrustLevel = TrustLevel(subpacket[0])
 | |
| 		sig.TrustAmount = TrustAmount(subpacket[1])
 | |
| 	case regularExpressionSubpacket:
 | |
| 		if len(subpacket) == 0 {
 | |
| 			err = errors.StructuralError("regexp subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		// Trust regular expression, section 5.2.3.22
 | |
| 		// RFC specifies the string should be null-terminated; remove a null byte from the end
 | |
| 		if subpacket[len(subpacket)-1] != 0x00 {
 | |
| 			err = errors.StructuralError("expected regular expression to be null-terminated")
 | |
| 			return
 | |
| 		}
 | |
| 		trustRegularExpression := string(subpacket[:len(subpacket)-1])
 | |
| 		sig.TrustRegularExpression = &trustRegularExpression
 | |
| 	case keyExpirationSubpacket:
 | |
| 		// Key expiration time, section 5.2.3.13
 | |
| 		if len(subpacket) != 4 {
 | |
| 			err = errors.StructuralError("key expiration subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		sig.KeyLifetimeSecs = new(uint32)
 | |
| 		*sig.KeyLifetimeSecs = binary.BigEndian.Uint32(subpacket)
 | |
| 	case prefSymmetricAlgosSubpacket:
 | |
| 		// Preferred symmetric algorithms, section 5.2.3.14
 | |
| 		sig.PreferredSymmetric = make([]byte, len(subpacket))
 | |
| 		copy(sig.PreferredSymmetric, subpacket)
 | |
| 	case issuerSubpacket:
 | |
| 		// Issuer, section 5.2.3.12
 | |
| 		if sig.Version > 4 && isHashed {
 | |
| 			err = errors.StructuralError("issuer subpacket found in v6 key")
 | |
| 			return
 | |
| 		}
 | |
| 		if len(subpacket) != 8 {
 | |
| 			err = errors.StructuralError("issuer subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		if sig.Version <= 4 {
 | |
| 			sig.IssuerKeyId = new(uint64)
 | |
| 			*sig.IssuerKeyId = binary.BigEndian.Uint64(subpacket)
 | |
| 		}
 | |
| 	case notationDataSubpacket:
 | |
| 		// Notation data, section 5.2.3.24
 | |
| 		if len(subpacket) < 8 {
 | |
| 			err = errors.StructuralError("notation data subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		nameLength := uint32(subpacket[4])<<8 | uint32(subpacket[5])
 | |
| 		valueLength := uint32(subpacket[6])<<8 | uint32(subpacket[7])
 | |
| 		if len(subpacket) != int(nameLength)+int(valueLength)+8 {
 | |
| 			err = errors.StructuralError("notation data subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		notation := Notation{
 | |
| 			IsHumanReadable: (subpacket[0] & 0x80) == 0x80,
 | |
| 			Name:            string(subpacket[8:(nameLength + 8)]),
 | |
| 			Value:           subpacket[(nameLength + 8):(valueLength + nameLength + 8)],
 | |
| 			IsCritical:      isCritical,
 | |
| 		}
 | |
| 
 | |
| 		sig.Notations = append(sig.Notations, ¬ation)
 | |
| 	case prefHashAlgosSubpacket:
 | |
| 		// Preferred hash algorithms, section 5.2.3.16
 | |
| 		sig.PreferredHash = make([]byte, len(subpacket))
 | |
| 		copy(sig.PreferredHash, subpacket)
 | |
| 	case prefCompressionSubpacket:
 | |
| 		// Preferred compression algorithms, section 5.2.3.17
 | |
| 		sig.PreferredCompression = make([]byte, len(subpacket))
 | |
| 		copy(sig.PreferredCompression, subpacket)
 | |
| 	case keyserverPrefsSubpacket:
 | |
| 		// Keyserver preferences, section 5.2.3.25
 | |
| 		sig.KeyserverPrefsValid = true
 | |
| 		if len(subpacket) == 0 {
 | |
| 			return
 | |
| 		}
 | |
| 		if subpacket[0]&KeyserverPrefNoModify != 0 {
 | |
| 			sig.KeyserverPrefNoModify = true
 | |
| 		}
 | |
| 	case prefKeyserverSubpacket:
 | |
| 		// Preferred keyserver, section 5.2.3.26
 | |
| 		sig.PreferredKeyserver = string(subpacket)
 | |
| 	case primaryUserIdSubpacket:
 | |
| 		// Primary User ID, section 5.2.3.27
 | |
| 		if len(subpacket) != 1 {
 | |
| 			err = errors.StructuralError("primary user id subpacket with bad length")
 | |
| 			return
 | |
| 		}
 | |
| 		sig.IsPrimaryId = new(bool)
 | |
| 		if subpacket[0] > 0 {
 | |
| 			*sig.IsPrimaryId = true
 | |
| 		}
 | |
| 	case keyFlagsSubpacket:
 | |
| 		// Key flags, section 5.2.3.29
 | |
| 		sig.FlagsValid = true
 | |
| 		if len(subpacket) == 0 {
 | |
| 			return
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagCertify != 0 {
 | |
| 			sig.FlagCertify = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagSign != 0 {
 | |
| 			sig.FlagSign = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagEncryptCommunications != 0 {
 | |
| 			sig.FlagEncryptCommunications = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagEncryptStorage != 0 {
 | |
| 			sig.FlagEncryptStorage = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagSplitKey != 0 {
 | |
| 			sig.FlagSplitKey = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagAuthenticate != 0 {
 | |
| 			sig.FlagAuthenticate = true
 | |
| 		}
 | |
| 		if subpacket[0]&KeyFlagGroupKey != 0 {
 | |
| 			sig.FlagGroupKey = true
 | |
| 		}
 | |
| 	case signerUserIdSubpacket:
 | |
| 		userId := string(subpacket)
 | |
| 		sig.SignerUserId = &userId
 | |
| 	case reasonForRevocationSubpacket:
 | |
| 		// Reason For Revocation, section 5.2.3.31
 | |
| 		if len(subpacket) == 0 {
 | |
| 			err = errors.StructuralError("empty revocation reason subpacket")
 | |
| 			return
 | |
| 		}
 | |
| 		sig.RevocationReason = new(ReasonForRevocation)
 | |
| 		*sig.RevocationReason = NewReasonForRevocation(subpacket[0])
 | |
| 		sig.RevocationReasonText = string(subpacket[1:])
 | |
| 	case featuresSubpacket:
 | |
| 		// Features subpacket, section 5.2.3.32 specifies a very general
 | |
| 		// mechanism for OpenPGP implementations to signal support for new
 | |
| 		// features.
 | |
| 		if len(subpacket) > 0 {
 | |
| 			if subpacket[0]&0x01 != 0 {
 | |
| 				sig.SEIPDv1 = true
 | |
| 			}
 | |
| 			// 0x02 and 0x04 are reserved
 | |
| 			if subpacket[0]&0x08 != 0 {
 | |
| 				sig.SEIPDv2 = true
 | |
| 			}
 | |
| 		}
 | |
| 	case embeddedSignatureSubpacket:
 | |
| 		// Only usage is in signatures that cross-certify
 | |
| 		// signing subkeys. section 5.2.3.34 describes the
 | |
| 		// format, with its usage described in section 11.1
 | |
| 		if sig.EmbeddedSignature != nil {
 | |
| 			err = errors.StructuralError("Cannot have multiple embedded signatures")
 | |
| 			return
 | |
| 		}
 | |
| 		sig.EmbeddedSignature = new(Signature)
 | |
| 		if err := sig.EmbeddedSignature.parse(bytes.NewBuffer(subpacket)); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		if sigType := sig.EmbeddedSignature.SigType; sigType != SigTypePrimaryKeyBinding {
 | |
| 			return nil, errors.StructuralError("cross-signature has unexpected type " + strconv.Itoa(int(sigType)))
 | |
| 		}
 | |
| 	case policyUriSubpacket:
 | |
| 		// Policy URI, section 5.2.3.28
 | |
| 		sig.PolicyURI = string(subpacket)
 | |
| 	case issuerFingerprintSubpacket:
 | |
| 		if len(subpacket) == 0 {
 | |
| 			err = errors.StructuralError("empty issuer fingerprint subpacket")
 | |
| 			return
 | |
| 		}
 | |
| 		v, l := subpacket[0], len(subpacket[1:])
 | |
| 		if v >= 5 && l != 32 || v < 5 && l != 20 {
 | |
| 			return nil, errors.StructuralError("bad fingerprint length")
 | |
| 		}
 | |
| 		sig.IssuerFingerprint = make([]byte, l)
 | |
| 		copy(sig.IssuerFingerprint, subpacket[1:])
 | |
| 		sig.IssuerKeyId = new(uint64)
 | |
| 		if v >= 5 {
 | |
| 			*sig.IssuerKeyId = binary.BigEndian.Uint64(subpacket[1:9])
 | |
| 		} else {
 | |
| 			*sig.IssuerKeyId = binary.BigEndian.Uint64(subpacket[13:21])
 | |
| 		}
 | |
| 	case intendedRecipientSubpacket:
 | |
| 		// Intended Recipient Fingerprint, section 5.2.3.36
 | |
| 		if len(subpacket) < 1 {
 | |
| 			return nil, errors.StructuralError("invalid intended recipient fingerpring length")
 | |
| 		}
 | |
| 		version, length := subpacket[0], len(subpacket[1:])
 | |
| 		if version >= 5 && length != 32 || version < 5 && length != 20 {
 | |
| 			return nil, errors.StructuralError("invalid fingerprint length")
 | |
| 		}
 | |
| 		fingerprint := make([]byte, length)
 | |
| 		copy(fingerprint, subpacket[1:])
 | |
| 		sig.IntendedRecipients = append(sig.IntendedRecipients, &Recipient{int(version), fingerprint})
 | |
| 	case prefCipherSuitesSubpacket:
 | |
| 		// Preferred AEAD cipher suites, section 5.2.3.15
 | |
| 		if len(subpacket)%2 != 0 {
 | |
| 			err = errors.StructuralError("invalid aead cipher suite length")
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		sig.PreferredCipherSuites = make([][2]byte, len(subpacket)/2)
 | |
| 
 | |
| 		for i := 0; i < len(subpacket)/2; i++ {
 | |
| 			sig.PreferredCipherSuites[i] = [2]uint8{subpacket[2*i], subpacket[2*i+1]}
 | |
| 		}
 | |
| 	default:
 | |
| 		if isCritical {
 | |
| 			err = errors.UnsupportedError("unknown critical signature subpacket type " + strconv.Itoa(int(packetType)))
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	return
 | |
| 
 | |
| Truncated:
 | |
| 	err = errors.StructuralError("signature subpacket truncated")
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // subpacketLengthLength returns the length, in bytes, of an encoded length value.
 | |
| func subpacketLengthLength(length int) int {
 | |
| 	if length < 192 {
 | |
| 		return 1
 | |
| 	}
 | |
| 	if length < 16320 {
 | |
| 		return 2
 | |
| 	}
 | |
| 	return 5
 | |
| }
 | |
| 
 | |
| func (sig *Signature) CheckKeyIdOrFingerprint(pk *PublicKey) bool {
 | |
| 	if sig.IssuerFingerprint != nil && len(sig.IssuerFingerprint) >= 20 {
 | |
| 		return bytes.Equal(sig.IssuerFingerprint, pk.Fingerprint)
 | |
| 	}
 | |
| 	return sig.IssuerKeyId != nil && *sig.IssuerKeyId == pk.KeyId
 | |
| }
 | |
| 
 | |
| func (sig *Signature) CheckKeyIdOrFingerprintExplicit(fingerprint []byte, keyId uint64) bool {
 | |
| 	if sig.IssuerFingerprint != nil && len(sig.IssuerFingerprint) >= 20 && fingerprint != nil {
 | |
| 		return bytes.Equal(sig.IssuerFingerprint, fingerprint)
 | |
| 	}
 | |
| 	return sig.IssuerKeyId != nil && *sig.IssuerKeyId == keyId
 | |
| }
 | |
| 
 | |
| // serializeSubpacketLength marshals the given length into to.
 | |
| func serializeSubpacketLength(to []byte, length int) int {
 | |
| 	// RFC 9580, Section 4.2.1.
 | |
| 	if length < 192 {
 | |
| 		to[0] = byte(length)
 | |
| 		return 1
 | |
| 	}
 | |
| 	if length < 16320 {
 | |
| 		length -= 192
 | |
| 		to[0] = byte((length >> 8) + 192)
 | |
| 		to[1] = byte(length)
 | |
| 		return 2
 | |
| 	}
 | |
| 	to[0] = 255
 | |
| 	to[1] = byte(length >> 24)
 | |
| 	to[2] = byte(length >> 16)
 | |
| 	to[3] = byte(length >> 8)
 | |
| 	to[4] = byte(length)
 | |
| 	return 5
 | |
| }
 | |
| 
 | |
| // subpacketsLength returns the serialized length, in bytes, of the given
 | |
| // subpackets.
 | |
| func subpacketsLength(subpackets []outputSubpacket, hashed bool) (length int) {
 | |
| 	for _, subpacket := range subpackets {
 | |
| 		if subpacket.hashed == hashed {
 | |
| 			length += subpacketLengthLength(len(subpacket.contents) + 1)
 | |
| 			length += 1 // type byte
 | |
| 			length += len(subpacket.contents)
 | |
| 		}
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // serializeSubpackets marshals the given subpackets into to.
 | |
| func serializeSubpackets(to []byte, subpackets []outputSubpacket, hashed bool) {
 | |
| 	for _, subpacket := range subpackets {
 | |
| 		if subpacket.hashed == hashed {
 | |
| 			n := serializeSubpacketLength(to, len(subpacket.contents)+1)
 | |
| 			to[n] = byte(subpacket.subpacketType)
 | |
| 			if subpacket.isCritical {
 | |
| 				to[n] |= 0x80
 | |
| 			}
 | |
| 			to = to[1+n:]
 | |
| 			n = copy(to, subpacket.contents)
 | |
| 			to = to[n:]
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // SigExpired returns whether sig is a signature that has expired or is created
 | |
| // in the future.
 | |
| func (sig *Signature) SigExpired(currentTime time.Time) bool {
 | |
| 	if sig.CreationTime.Unix() > currentTime.Unix() {
 | |
| 		return true
 | |
| 	}
 | |
| 	if sig.SigLifetimeSecs == nil || *sig.SigLifetimeSecs == 0 {
 | |
| 		return false
 | |
| 	}
 | |
| 	expiry := sig.CreationTime.Add(time.Duration(*sig.SigLifetimeSecs) * time.Second)
 | |
| 	return currentTime.Unix() > expiry.Unix()
 | |
| }
 | |
| 
 | |
| // buildHashSuffix constructs the HashSuffix member of sig in preparation for signing.
 | |
| func (sig *Signature) buildHashSuffix(hashedSubpackets []byte) (err error) {
 | |
| 	var hashId byte
 | |
| 	var ok bool
 | |
| 
 | |
| 	if sig.Version < 5 {
 | |
| 		hashId, ok = algorithm.HashToHashIdWithSha1(sig.Hash)
 | |
| 	} else {
 | |
| 		hashId, ok = algorithm.HashToHashId(sig.Hash)
 | |
| 	}
 | |
| 
 | |
| 	if !ok {
 | |
| 		sig.HashSuffix = nil
 | |
| 		return errors.InvalidArgumentError("hash cannot be represented in OpenPGP: " + strconv.Itoa(int(sig.Hash)))
 | |
| 	}
 | |
| 
 | |
| 	hashedFields := bytes.NewBuffer([]byte{
 | |
| 		uint8(sig.Version),
 | |
| 		uint8(sig.SigType),
 | |
| 		uint8(sig.PubKeyAlgo),
 | |
| 		uint8(hashId),
 | |
| 	})
 | |
| 	hashedSubpacketsLength := len(hashedSubpackets)
 | |
| 	if sig.Version == 6 {
 | |
| 		// v6 signatures store the length in 4 octets
 | |
| 		hashedFields.Write([]byte{
 | |
| 			uint8(hashedSubpacketsLength >> 24),
 | |
| 			uint8(hashedSubpacketsLength >> 16),
 | |
| 			uint8(hashedSubpacketsLength >> 8),
 | |
| 			uint8(hashedSubpacketsLength),
 | |
| 		})
 | |
| 	} else {
 | |
| 		hashedFields.Write([]byte{
 | |
| 			uint8(hashedSubpacketsLength >> 8),
 | |
| 			uint8(hashedSubpacketsLength),
 | |
| 		})
 | |
| 	}
 | |
| 	lenPrefix := hashedFields.Len()
 | |
| 	hashedFields.Write(hashedSubpackets)
 | |
| 
 | |
| 	var l uint64 = uint64(lenPrefix + len(hashedSubpackets))
 | |
| 	if sig.Version == 5 {
 | |
| 		// v5 case
 | |
| 		hashedFields.Write([]byte{0x05, 0xff})
 | |
| 		hashedFields.Write([]byte{
 | |
| 			uint8(l >> 56), uint8(l >> 48), uint8(l >> 40), uint8(l >> 32),
 | |
| 			uint8(l >> 24), uint8(l >> 16), uint8(l >> 8), uint8(l),
 | |
| 		})
 | |
| 	} else {
 | |
| 		// v4 and v6 case
 | |
| 		hashedFields.Write([]byte{byte(sig.Version), 0xff})
 | |
| 		hashedFields.Write([]byte{
 | |
| 			uint8(l >> 24), uint8(l >> 16), uint8(l >> 8), uint8(l),
 | |
| 		})
 | |
| 	}
 | |
| 	sig.HashSuffix = make([]byte, hashedFields.Len())
 | |
| 	copy(sig.HashSuffix, hashedFields.Bytes())
 | |
| 	return
 | |
| }
 | |
| 
 | |
| func (sig *Signature) signPrepareHash(h hash.Hash) (digest []byte, err error) {
 | |
| 	hashedSubpacketsLen := subpacketsLength(sig.outSubpackets, true)
 | |
| 	hashedSubpackets := make([]byte, hashedSubpacketsLen)
 | |
| 	serializeSubpackets(hashedSubpackets, sig.outSubpackets, true)
 | |
| 	err = sig.buildHashSuffix(hashedSubpackets)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	if sig.Version == 5 && (sig.SigType == 0x00 || sig.SigType == 0x01) {
 | |
| 		sig.AddMetadataToHashSuffix()
 | |
| 	}
 | |
| 
 | |
| 	h.Write(sig.HashSuffix)
 | |
| 	digest = h.Sum(nil)
 | |
| 	copy(sig.HashTag[:], digest)
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // PrepareSign must be called to create a hash object before Sign for v6 signatures.
 | |
| // The created hash object initially hashes a randomly generated salt
 | |
| // as required by v6 signatures. The generated salt is stored in sig. If the signature is not v6,
 | |
| // the method returns an empty hash object.
 | |
| // See RFC 9580 Section 5.2.4.
 | |
| func (sig *Signature) PrepareSign(config *Config) (hash.Hash, error) {
 | |
| 	if !sig.Hash.Available() {
 | |
| 		return nil, errors.UnsupportedError("hash function")
 | |
| 	}
 | |
| 	hasher := sig.Hash.New()
 | |
| 	if sig.Version == 6 {
 | |
| 		if sig.salt == nil {
 | |
| 			var err error
 | |
| 			sig.salt, err = SignatureSaltForHash(sig.Hash, config.Random())
 | |
| 			if err != nil {
 | |
| 				return nil, err
 | |
| 			}
 | |
| 		}
 | |
| 		hasher.Write(sig.salt)
 | |
| 	}
 | |
| 	return hasher, nil
 | |
| }
 | |
| 
 | |
| // SetSalt sets the signature salt for v6 signatures.
 | |
| // Assumes salt is generated correctly and checks if length matches.
 | |
| // If the signature is not v6, the method ignores the salt.
 | |
| // Use PrepareSign whenever possible instead of generating and
 | |
| // hashing the salt externally.
 | |
| // See RFC 9580 Section 5.2.4.
 | |
| func (sig *Signature) SetSalt(salt []byte) error {
 | |
| 	if sig.Version == 6 {
 | |
| 		expectedSaltLength, err := SaltLengthForHash(sig.Hash)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if salt == nil || len(salt) != expectedSaltLength {
 | |
| 			return errors.InvalidArgumentError("unexpected salt size for the given hash algorithm")
 | |
| 		}
 | |
| 		sig.salt = salt
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // PrepareVerify must be called to create a hash object before verifying v6 signatures.
 | |
| // The created hash object initially hashes the internally stored salt.
 | |
| // If the signature is not v6, the method returns an empty hash object.
 | |
| // See RFC 9580 Section 5.2.4.
 | |
| func (sig *Signature) PrepareVerify() (hash.Hash, error) {
 | |
| 	if !sig.Hash.Available() {
 | |
| 		return nil, errors.UnsupportedError("hash function")
 | |
| 	}
 | |
| 	hasher := sig.Hash.New()
 | |
| 	if sig.Version == 6 {
 | |
| 		if sig.salt == nil {
 | |
| 			return nil, errors.StructuralError("v6 requires a salt for the hash to be signed")
 | |
| 		}
 | |
| 		hasher.Write(sig.salt)
 | |
| 	}
 | |
| 	return hasher, nil
 | |
| }
 | |
| 
 | |
| // Sign signs a message with a private key. The hash, h, must contain
 | |
| // the hash of the message to be signed and will be mutated by this function.
 | |
| // On success, the signature is stored in sig. Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) Sign(h hash.Hash, priv *PrivateKey, config *Config) (err error) {
 | |
| 	if priv.Dummy() {
 | |
| 		return errors.ErrDummyPrivateKey("dummy key found")
 | |
| 	}
 | |
| 	sig.Version = priv.PublicKey.Version
 | |
| 	sig.IssuerFingerprint = priv.PublicKey.Fingerprint
 | |
| 	if sig.Version < 6 && config.RandomizeSignaturesViaNotation() {
 | |
| 		sig.removeNotationsWithName(SaltNotationName)
 | |
| 		salt, err := SignatureSaltForHash(sig.Hash, config.Random())
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		notation := Notation{
 | |
| 			Name:            SaltNotationName,
 | |
| 			Value:           salt,
 | |
| 			IsCritical:      false,
 | |
| 			IsHumanReadable: false,
 | |
| 		}
 | |
| 		sig.Notations = append(sig.Notations, ¬ation)
 | |
| 	}
 | |
| 	sig.outSubpackets, err = sig.buildSubpackets(priv.PublicKey)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	digest, err := sig.signPrepareHash(h)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	switch priv.PubKeyAlgo {
 | |
| 	case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly:
 | |
| 		// supports both *rsa.PrivateKey and crypto.Signer
 | |
| 		sigdata, err := priv.PrivateKey.(crypto.Signer).Sign(config.Random(), digest, sig.Hash)
 | |
| 		if err == nil {
 | |
| 			sig.RSASignature = encoding.NewMPI(sigdata)
 | |
| 		}
 | |
| 	case PubKeyAlgoDSA:
 | |
| 		dsaPriv := priv.PrivateKey.(*dsa.PrivateKey)
 | |
| 
 | |
| 		// Need to truncate hashBytes to match FIPS 186-3 section 4.6.
 | |
| 		subgroupSize := (dsaPriv.Q.BitLen() + 7) / 8
 | |
| 		if len(digest) > subgroupSize {
 | |
| 			digest = digest[:subgroupSize]
 | |
| 		}
 | |
| 		r, s, err := dsa.Sign(config.Random(), dsaPriv, digest)
 | |
| 		if err == nil {
 | |
| 			sig.DSASigR = new(encoding.MPI).SetBig(r)
 | |
| 			sig.DSASigS = new(encoding.MPI).SetBig(s)
 | |
| 		}
 | |
| 	case PubKeyAlgoECDSA:
 | |
| 		var r, s *big.Int
 | |
| 		if sk, ok := priv.PrivateKey.(*ecdsa.PrivateKey); ok {
 | |
| 			r, s, err = ecdsa.Sign(config.Random(), sk, digest)
 | |
| 		} else {
 | |
| 			var b []byte
 | |
| 			b, err = priv.PrivateKey.(crypto.Signer).Sign(config.Random(), digest, sig.Hash)
 | |
| 			if err == nil {
 | |
| 				r, s, err = unwrapECDSASig(b)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if err == nil {
 | |
| 			sig.ECDSASigR = new(encoding.MPI).SetBig(r)
 | |
| 			sig.ECDSASigS = new(encoding.MPI).SetBig(s)
 | |
| 		}
 | |
| 	case PubKeyAlgoEdDSA:
 | |
| 		sk := priv.PrivateKey.(*eddsa.PrivateKey)
 | |
| 		r, s, err := eddsa.Sign(sk, digest)
 | |
| 		if err == nil {
 | |
| 			sig.EdDSASigR = encoding.NewMPI(r)
 | |
| 			sig.EdDSASigS = encoding.NewMPI(s)
 | |
| 		}
 | |
| 	case PubKeyAlgoEd25519:
 | |
| 		sk := priv.PrivateKey.(*ed25519.PrivateKey)
 | |
| 		signature, err := ed25519.Sign(sk, digest)
 | |
| 		if err == nil {
 | |
| 			sig.EdSig = signature
 | |
| 		}
 | |
| 	case PubKeyAlgoEd448:
 | |
| 		sk := priv.PrivateKey.(*ed448.PrivateKey)
 | |
| 		signature, err := ed448.Sign(sk, digest)
 | |
| 		if err == nil {
 | |
| 			sig.EdSig = signature
 | |
| 		}
 | |
| 	default:
 | |
| 		err = errors.UnsupportedError("public key algorithm: " + strconv.Itoa(int(sig.PubKeyAlgo)))
 | |
| 	}
 | |
| 
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // unwrapECDSASig parses the two integer components of an ASN.1-encoded ECDSA signature.
 | |
| func unwrapECDSASig(b []byte) (r, s *big.Int, err error) {
 | |
| 	var ecsdaSig struct {
 | |
| 		R, S *big.Int
 | |
| 	}
 | |
| 	_, err = asn1.Unmarshal(b, &ecsdaSig)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	return ecsdaSig.R, ecsdaSig.S, nil
 | |
| }
 | |
| 
 | |
| // SignUserId computes a signature from priv, asserting that pub is a valid
 | |
| // key for the identity id.  On success, the signature is stored in sig. Call
 | |
| // Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) SignUserId(id string, pub *PublicKey, priv *PrivateKey, config *Config) error {
 | |
| 	if priv.Dummy() {
 | |
| 		return errors.ErrDummyPrivateKey("dummy key found")
 | |
| 	}
 | |
| 	prepareHash, err := sig.PrepareSign(config)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := userIdSignatureHash(id, pub, prepareHash); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return sig.Sign(prepareHash, priv, config)
 | |
| }
 | |
| 
 | |
| // SignDirectKeyBinding computes a signature from priv
 | |
| // On success, the signature is stored in sig.
 | |
| // Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) SignDirectKeyBinding(pub *PublicKey, priv *PrivateKey, config *Config) error {
 | |
| 	if priv.Dummy() {
 | |
| 		return errors.ErrDummyPrivateKey("dummy key found")
 | |
| 	}
 | |
| 	prepareHash, err := sig.PrepareSign(config)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := directKeySignatureHash(pub, prepareHash); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return sig.Sign(prepareHash, priv, config)
 | |
| }
 | |
| 
 | |
| // CrossSignKey computes a signature from signingKey on pub hashed using hashKey. On success,
 | |
| // the signature is stored in sig. Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) CrossSignKey(pub *PublicKey, hashKey *PublicKey, signingKey *PrivateKey,
 | |
| 	config *Config) error {
 | |
| 	prepareHash, err := sig.PrepareSign(config)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	h, err := keySignatureHash(hashKey, pub, prepareHash)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return sig.Sign(h, signingKey, config)
 | |
| }
 | |
| 
 | |
| // SignKey computes a signature from priv, asserting that pub is a subkey. On
 | |
| // success, the signature is stored in sig. Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) SignKey(pub *PublicKey, priv *PrivateKey, config *Config) error {
 | |
| 	if priv.Dummy() {
 | |
| 		return errors.ErrDummyPrivateKey("dummy key found")
 | |
| 	}
 | |
| 	prepareHash, err := sig.PrepareSign(config)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	h, err := keySignatureHash(&priv.PublicKey, pub, prepareHash)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return sig.Sign(h, priv, config)
 | |
| }
 | |
| 
 | |
| // RevokeKey computes a revocation signature of pub using priv. On success, the signature is
 | |
| // stored in sig. Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) RevokeKey(pub *PublicKey, priv *PrivateKey, config *Config) error {
 | |
| 	prepareHash, err := sig.PrepareSign(config)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := keyRevocationHash(pub, prepareHash); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return sig.Sign(prepareHash, priv, config)
 | |
| }
 | |
| 
 | |
| // RevokeSubkey computes a subkey revocation signature of pub using priv.
 | |
| // On success, the signature is stored in sig. Call Serialize to write it out.
 | |
| // If config is nil, sensible defaults will be used.
 | |
| func (sig *Signature) RevokeSubkey(pub *PublicKey, priv *PrivateKey, config *Config) error {
 | |
| 	// Identical to a subkey binding signature
 | |
| 	return sig.SignKey(pub, priv, config)
 | |
| }
 | |
| 
 | |
| // Serialize marshals sig to w. Sign, SignUserId or SignKey must have been
 | |
| // called first.
 | |
| func (sig *Signature) Serialize(w io.Writer) (err error) {
 | |
| 	if len(sig.outSubpackets) == 0 {
 | |
| 		sig.outSubpackets = sig.rawSubpackets
 | |
| 	}
 | |
| 	if sig.RSASignature == nil && sig.DSASigR == nil && sig.ECDSASigR == nil && sig.EdDSASigR == nil && sig.EdSig == nil {
 | |
| 		return errors.InvalidArgumentError("Signature: need to call Sign, SignUserId or SignKey before Serialize")
 | |
| 	}
 | |
| 
 | |
| 	sigLength := 0
 | |
| 	switch sig.PubKeyAlgo {
 | |
| 	case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly:
 | |
| 		sigLength = int(sig.RSASignature.EncodedLength())
 | |
| 	case PubKeyAlgoDSA:
 | |
| 		sigLength = int(sig.DSASigR.EncodedLength())
 | |
| 		sigLength += int(sig.DSASigS.EncodedLength())
 | |
| 	case PubKeyAlgoECDSA:
 | |
| 		sigLength = int(sig.ECDSASigR.EncodedLength())
 | |
| 		sigLength += int(sig.ECDSASigS.EncodedLength())
 | |
| 	case PubKeyAlgoEdDSA:
 | |
| 		sigLength = int(sig.EdDSASigR.EncodedLength())
 | |
| 		sigLength += int(sig.EdDSASigS.EncodedLength())
 | |
| 	case PubKeyAlgoEd25519:
 | |
| 		sigLength = ed25519.SignatureSize
 | |
| 	case PubKeyAlgoEd448:
 | |
| 		sigLength = ed448.SignatureSize
 | |
| 	default:
 | |
| 		panic("impossible")
 | |
| 	}
 | |
| 
 | |
| 	hashedSubpacketsLen := subpacketsLength(sig.outSubpackets, true)
 | |
| 	unhashedSubpacketsLen := subpacketsLength(sig.outSubpackets, false)
 | |
| 	length := 4 + /* length of version|signature type|public-key algorithm|hash algorithm */
 | |
| 		2 /* length of hashed subpackets */ + hashedSubpacketsLen +
 | |
| 		2 /* length of unhashed subpackets */ + unhashedSubpacketsLen +
 | |
| 		2 /* hash tag */ + sigLength
 | |
| 	if sig.Version == 6 {
 | |
| 		length += 4 + /* the two length fields are four-octet instead of two */
 | |
| 			1 + /* salt length */
 | |
| 			len(sig.salt) /* length salt */
 | |
| 	}
 | |
| 	err = serializeHeader(w, packetTypeSignature, length)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	err = sig.serializeBody(w)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| func (sig *Signature) serializeBody(w io.Writer) (err error) {
 | |
| 	var fields []byte
 | |
| 	if sig.Version == 6 {
 | |
| 		// v6 signatures use 4 octets for length
 | |
| 		hashedSubpacketsLen :=
 | |
| 			uint32(uint32(sig.HashSuffix[4])<<24) |
 | |
| 				uint32(uint32(sig.HashSuffix[5])<<16) |
 | |
| 				uint32(uint32(sig.HashSuffix[6])<<8) |
 | |
| 				uint32(sig.HashSuffix[7])
 | |
| 		fields = sig.HashSuffix[:8+hashedSubpacketsLen]
 | |
| 	} else {
 | |
| 		hashedSubpacketsLen := uint16(uint16(sig.HashSuffix[4])<<8) |
 | |
| 			uint16(sig.HashSuffix[5])
 | |
| 		fields = sig.HashSuffix[:6+hashedSubpacketsLen]
 | |
| 
 | |
| 	}
 | |
| 	_, err = w.Write(fields)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	unhashedSubpacketsLen := subpacketsLength(sig.outSubpackets, false)
 | |
| 	var unhashedSubpackets []byte
 | |
| 	if sig.Version == 6 {
 | |
| 		unhashedSubpackets = make([]byte, 4+unhashedSubpacketsLen)
 | |
| 		unhashedSubpackets[0] = byte(unhashedSubpacketsLen >> 24)
 | |
| 		unhashedSubpackets[1] = byte(unhashedSubpacketsLen >> 16)
 | |
| 		unhashedSubpackets[2] = byte(unhashedSubpacketsLen >> 8)
 | |
| 		unhashedSubpackets[3] = byte(unhashedSubpacketsLen)
 | |
| 		serializeSubpackets(unhashedSubpackets[4:], sig.outSubpackets, false)
 | |
| 	} else {
 | |
| 		unhashedSubpackets = make([]byte, 2+unhashedSubpacketsLen)
 | |
| 		unhashedSubpackets[0] = byte(unhashedSubpacketsLen >> 8)
 | |
| 		unhashedSubpackets[1] = byte(unhashedSubpacketsLen)
 | |
| 		serializeSubpackets(unhashedSubpackets[2:], sig.outSubpackets, false)
 | |
| 	}
 | |
| 
 | |
| 	_, err = w.Write(unhashedSubpackets)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	_, err = w.Write(sig.HashTag[:])
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if sig.Version == 6 {
 | |
| 		// write salt for v6 signatures
 | |
| 		_, err = w.Write([]byte{uint8(len(sig.salt))})
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		_, err = w.Write(sig.salt)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	switch sig.PubKeyAlgo {
 | |
| 	case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly:
 | |
| 		_, err = w.Write(sig.RSASignature.EncodedBytes())
 | |
| 	case PubKeyAlgoDSA:
 | |
| 		if _, err = w.Write(sig.DSASigR.EncodedBytes()); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		_, err = w.Write(sig.DSASigS.EncodedBytes())
 | |
| 	case PubKeyAlgoECDSA:
 | |
| 		if _, err = w.Write(sig.ECDSASigR.EncodedBytes()); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		_, err = w.Write(sig.ECDSASigS.EncodedBytes())
 | |
| 	case PubKeyAlgoEdDSA:
 | |
| 		if _, err = w.Write(sig.EdDSASigR.EncodedBytes()); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		_, err = w.Write(sig.EdDSASigS.EncodedBytes())
 | |
| 	case PubKeyAlgoEd25519:
 | |
| 		err = ed25519.WriteSignature(w, sig.EdSig)
 | |
| 	case PubKeyAlgoEd448:
 | |
| 		err = ed448.WriteSignature(w, sig.EdSig)
 | |
| 	default:
 | |
| 		panic("impossible")
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // outputSubpacket represents a subpacket to be marshaled.
 | |
| type outputSubpacket struct {
 | |
| 	hashed        bool // true if this subpacket is in the hashed area.
 | |
| 	subpacketType signatureSubpacketType
 | |
| 	isCritical    bool
 | |
| 	contents      []byte
 | |
| }
 | |
| 
 | |
| func (sig *Signature) buildSubpackets(issuer PublicKey) (subpackets []outputSubpacket, err error) {
 | |
| 	creationTime := make([]byte, 4)
 | |
| 	binary.BigEndian.PutUint32(creationTime, uint32(sig.CreationTime.Unix()))
 | |
| 	// Signature Creation Time
 | |
| 	subpackets = append(subpackets, outputSubpacket{true, creationTimeSubpacket, true, creationTime})
 | |
| 	// Signature Expiration Time
 | |
| 	if sig.SigLifetimeSecs != nil && *sig.SigLifetimeSecs != 0 {
 | |
| 		sigLifetime := make([]byte, 4)
 | |
| 		binary.BigEndian.PutUint32(sigLifetime, *sig.SigLifetimeSecs)
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, signatureExpirationSubpacket, true, sigLifetime})
 | |
| 	}
 | |
| 	// Trust Signature
 | |
| 	if sig.TrustLevel != 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, trustSubpacket, true, []byte{byte(sig.TrustLevel), byte(sig.TrustAmount)}})
 | |
| 	}
 | |
| 	// Regular Expression
 | |
| 	if sig.TrustRegularExpression != nil {
 | |
| 		// RFC specifies the string should be null-terminated; add a null byte to the end
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, regularExpressionSubpacket, true, []byte(*sig.TrustRegularExpression + "\000")})
 | |
| 	}
 | |
| 	// Key Expiration Time
 | |
| 	if sig.KeyLifetimeSecs != nil && *sig.KeyLifetimeSecs != 0 {
 | |
| 		keyLifetime := make([]byte, 4)
 | |
| 		binary.BigEndian.PutUint32(keyLifetime, *sig.KeyLifetimeSecs)
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, keyExpirationSubpacket, true, keyLifetime})
 | |
| 	}
 | |
| 	// Preferred Symmetric Ciphers for v1 SEIPD
 | |
| 	if len(sig.PreferredSymmetric) > 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, prefSymmetricAlgosSubpacket, false, sig.PreferredSymmetric})
 | |
| 	}
 | |
| 	// Issuer Key ID
 | |
| 	if sig.IssuerKeyId != nil && sig.Version == 4 {
 | |
| 		keyId := make([]byte, 8)
 | |
| 		binary.BigEndian.PutUint64(keyId, *sig.IssuerKeyId)
 | |
| 		// Note: making this critical breaks RPM <=4.16.
 | |
| 		// See: https://github.com/ProtonMail/go-crypto/issues/263
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, issuerSubpacket, false, keyId})
 | |
| 	}
 | |
| 	// Notation Data
 | |
| 	for _, notation := range sig.Notations {
 | |
| 		subpackets = append(
 | |
| 			subpackets,
 | |
| 			outputSubpacket{
 | |
| 				true,
 | |
| 				notationDataSubpacket,
 | |
| 				notation.IsCritical,
 | |
| 				notation.getData(),
 | |
| 			})
 | |
| 	}
 | |
| 	// Preferred Hash Algorithms
 | |
| 	if len(sig.PreferredHash) > 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, prefHashAlgosSubpacket, false, sig.PreferredHash})
 | |
| 	}
 | |
| 	// Preferred Compression Algorithms
 | |
| 	if len(sig.PreferredCompression) > 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, prefCompressionSubpacket, false, sig.PreferredCompression})
 | |
| 	}
 | |
| 	// Keyserver Preferences
 | |
| 	// Keyserver preferences may only appear in self-signatures or certification signatures.
 | |
| 	if sig.KeyserverPrefsValid {
 | |
| 		var prefs byte
 | |
| 		if sig.KeyserverPrefNoModify {
 | |
| 			prefs |= KeyserverPrefNoModify
 | |
| 		}
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, keyserverPrefsSubpacket, false, []byte{prefs}})
 | |
| 	}
 | |
| 	// Preferred Keyserver
 | |
| 	if len(sig.PreferredKeyserver) > 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, prefKeyserverSubpacket, false, []uint8(sig.PreferredKeyserver)})
 | |
| 	}
 | |
| 	// Primary User ID
 | |
| 	if sig.IsPrimaryId != nil && *sig.IsPrimaryId {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, primaryUserIdSubpacket, false, []byte{1}})
 | |
| 	}
 | |
| 	// Policy URI
 | |
| 	if len(sig.PolicyURI) > 0 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, policyUriSubpacket, false, []uint8(sig.PolicyURI)})
 | |
| 	}
 | |
| 	// Key Flags
 | |
| 	// Key flags may only appear in self-signatures or certification signatures.
 | |
| 	if sig.FlagsValid {
 | |
| 		var flags byte
 | |
| 		if sig.FlagCertify {
 | |
| 			flags |= KeyFlagCertify
 | |
| 		}
 | |
| 		if sig.FlagSign {
 | |
| 			flags |= KeyFlagSign
 | |
| 		}
 | |
| 		if sig.FlagEncryptCommunications {
 | |
| 			flags |= KeyFlagEncryptCommunications
 | |
| 		}
 | |
| 		if sig.FlagEncryptStorage {
 | |
| 			flags |= KeyFlagEncryptStorage
 | |
| 		}
 | |
| 		if sig.FlagSplitKey {
 | |
| 			flags |= KeyFlagSplitKey
 | |
| 		}
 | |
| 		if sig.FlagAuthenticate {
 | |
| 			flags |= KeyFlagAuthenticate
 | |
| 		}
 | |
| 		if sig.FlagGroupKey {
 | |
| 			flags |= KeyFlagGroupKey
 | |
| 		}
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, keyFlagsSubpacket, true, []byte{flags}})
 | |
| 	}
 | |
| 	// Signer's User ID
 | |
| 	if sig.SignerUserId != nil {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, signerUserIdSubpacket, false, []byte(*sig.SignerUserId)})
 | |
| 	}
 | |
| 	// Reason for Revocation
 | |
| 	// Revocation reason appears only in revocation signatures and is serialized as per section 5.2.3.31.
 | |
| 	if sig.RevocationReason != nil {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, reasonForRevocationSubpacket, true,
 | |
| 			append([]uint8{uint8(*sig.RevocationReason)}, []uint8(sig.RevocationReasonText)...)})
 | |
| 	}
 | |
| 	// Features
 | |
| 	var features = byte(0x00)
 | |
| 	if sig.SEIPDv1 {
 | |
| 		features |= 0x01
 | |
| 	}
 | |
| 	if sig.SEIPDv2 {
 | |
| 		features |= 0x08
 | |
| 	}
 | |
| 	if features != 0x00 {
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, featuresSubpacket, false, []byte{features}})
 | |
| 	}
 | |
| 	// Embedded Signature
 | |
| 	// EmbeddedSignature appears only in subkeys capable of signing and is serialized as per section 5.2.3.34.
 | |
| 	if sig.EmbeddedSignature != nil {
 | |
| 		var buf bytes.Buffer
 | |
| 		err = sig.EmbeddedSignature.serializeBody(&buf)
 | |
| 		if err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, embeddedSignatureSubpacket, true, buf.Bytes()})
 | |
| 	}
 | |
| 	// Issuer Fingerprint
 | |
| 	if sig.IssuerFingerprint != nil {
 | |
| 		contents := append([]uint8{uint8(issuer.Version)}, sig.IssuerFingerprint...)
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, issuerFingerprintSubpacket, sig.Version >= 5, contents})
 | |
| 	}
 | |
| 	// Intended Recipient Fingerprint
 | |
| 	for _, recipient := range sig.IntendedRecipients {
 | |
| 		subpackets = append(
 | |
| 			subpackets,
 | |
| 			outputSubpacket{
 | |
| 				true,
 | |
| 				intendedRecipientSubpacket,
 | |
| 				false,
 | |
| 				recipient.Serialize(),
 | |
| 			})
 | |
| 	}
 | |
| 	// Preferred AEAD Ciphersuites
 | |
| 	if len(sig.PreferredCipherSuites) > 0 {
 | |
| 		serialized := make([]byte, len(sig.PreferredCipherSuites)*2)
 | |
| 		for i, cipherSuite := range sig.PreferredCipherSuites {
 | |
| 			serialized[2*i] = cipherSuite[0]
 | |
| 			serialized[2*i+1] = cipherSuite[1]
 | |
| 		}
 | |
| 		subpackets = append(subpackets, outputSubpacket{true, prefCipherSuitesSubpacket, false, serialized})
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // AddMetadataToHashSuffix modifies the current hash suffix to include metadata
 | |
| // (format, filename, and time). Version 5 keys protect this data including it
 | |
| // in the hash computation. See section 5.2.4.
 | |
| func (sig *Signature) AddMetadataToHashSuffix() {
 | |
| 	if sig == nil || sig.Version != 5 {
 | |
| 		return
 | |
| 	}
 | |
| 	if sig.SigType != 0x00 && sig.SigType != 0x01 {
 | |
| 		return
 | |
| 	}
 | |
| 	lit := sig.Metadata
 | |
| 	if lit == nil {
 | |
| 		// This will translate into six 0x00 bytes.
 | |
| 		lit = &LiteralData{}
 | |
| 	}
 | |
| 
 | |
| 	// Extract the current byte count
 | |
| 	n := sig.HashSuffix[len(sig.HashSuffix)-8:]
 | |
| 	l := uint64(
 | |
| 		uint64(n[0])<<56 | uint64(n[1])<<48 | uint64(n[2])<<40 | uint64(n[3])<<32 |
 | |
| 			uint64(n[4])<<24 | uint64(n[5])<<16 | uint64(n[6])<<8 | uint64(n[7]))
 | |
| 
 | |
| 	suffix := bytes.NewBuffer(nil)
 | |
| 	suffix.Write(sig.HashSuffix[:l])
 | |
| 
 | |
| 	// Add the metadata
 | |
| 	var buf [4]byte
 | |
| 	buf[0] = lit.Format
 | |
| 	fileName := lit.FileName
 | |
| 	if len(lit.FileName) > 255 {
 | |
| 		fileName = fileName[:255]
 | |
| 	}
 | |
| 	buf[1] = byte(len(fileName))
 | |
| 	suffix.Write(buf[:2])
 | |
| 	suffix.Write([]byte(lit.FileName))
 | |
| 	binary.BigEndian.PutUint32(buf[:], lit.Time)
 | |
| 	suffix.Write(buf[:])
 | |
| 
 | |
| 	suffix.Write([]byte{0x05, 0xff})
 | |
| 	suffix.Write([]byte{
 | |
| 		uint8(l >> 56), uint8(l >> 48), uint8(l >> 40), uint8(l >> 32),
 | |
| 		uint8(l >> 24), uint8(l >> 16), uint8(l >> 8), uint8(l),
 | |
| 	})
 | |
| 	sig.HashSuffix = suffix.Bytes()
 | |
| }
 | |
| 
 | |
| // SaltLengthForHash selects the required salt length for the given hash algorithm,
 | |
| // as per Table 23 (Hash algorithm registry) of the crypto refresh.
 | |
| // See RFC 9580 Section 9.5.
 | |
| func SaltLengthForHash(hash crypto.Hash) (int, error) {
 | |
| 	switch hash {
 | |
| 	case crypto.SHA256, crypto.SHA224, crypto.SHA3_256:
 | |
| 		return 16, nil
 | |
| 	case crypto.SHA384:
 | |
| 		return 24, nil
 | |
| 	case crypto.SHA512, crypto.SHA3_512:
 | |
| 		return 32, nil
 | |
| 	default:
 | |
| 		return 0, errors.UnsupportedError("hash function not supported for V6 signatures")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // SignatureSaltForHash generates a random signature salt
 | |
| // with the length for the given hash algorithm.
 | |
| // See RFC 9580 Section 9.5.
 | |
| func SignatureSaltForHash(hash crypto.Hash, randReader io.Reader) ([]byte, error) {
 | |
| 	saltLength, err := SaltLengthForHash(hash)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	salt := make([]byte, saltLength)
 | |
| 	_, err = io.ReadFull(randReader, salt)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return salt, nil
 | |
| }
 | |
| 
 | |
| // removeNotationsWithName removes all notations in this signature with the given name.
 | |
| func (sig *Signature) removeNotationsWithName(name string) {
 | |
| 	if sig == nil || sig.Notations == nil {
 | |
| 		return
 | |
| 	}
 | |
| 	updatedNotations := make([]*Notation, 0, len(sig.Notations))
 | |
| 	for _, notation := range sig.Notations {
 | |
| 		if notation.Name != name {
 | |
| 			updatedNotations = append(updatedNotations, notation)
 | |
| 		}
 | |
| 	}
 | |
| 	sig.Notations = updatedNotations
 | |
| }
 |