private_key.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362
  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package packet
  5. import (
  6. "bytes"
  7. "crypto/cipher"
  8. "crypto/dsa"
  9. "crypto/ecdsa"
  10. "crypto/rsa"
  11. "crypto/sha1"
  12. "io"
  13. "io/ioutil"
  14. "math/big"
  15. "strconv"
  16. "time"
  17. "golang.org/x/crypto/openpgp/elgamal"
  18. "golang.org/x/crypto/openpgp/errors"
  19. "golang.org/x/crypto/openpgp/s2k"
  20. )
  21. // PrivateKey represents a possibly encrypted private key. See RFC 4880,
  22. // section 5.5.3.
  23. type PrivateKey struct {
  24. PublicKey
  25. Encrypted bool // if true then the private key is unavailable until Decrypt has been called.
  26. encryptedData []byte
  27. cipher CipherFunction
  28. s2k func(out, in []byte)
  29. PrivateKey interface{} // An *rsa.PrivateKey or *dsa.PrivateKey.
  30. sha1Checksum bool
  31. iv []byte
  32. }
  33. func NewRSAPrivateKey(currentTime time.Time, priv *rsa.PrivateKey) *PrivateKey {
  34. pk := new(PrivateKey)
  35. pk.PublicKey = *NewRSAPublicKey(currentTime, &priv.PublicKey)
  36. pk.PrivateKey = priv
  37. return pk
  38. }
  39. func NewDSAPrivateKey(currentTime time.Time, priv *dsa.PrivateKey) *PrivateKey {
  40. pk := new(PrivateKey)
  41. pk.PublicKey = *NewDSAPublicKey(currentTime, &priv.PublicKey)
  42. pk.PrivateKey = priv
  43. return pk
  44. }
  45. func NewElGamalPrivateKey(currentTime time.Time, priv *elgamal.PrivateKey) *PrivateKey {
  46. pk := new(PrivateKey)
  47. pk.PublicKey = *NewElGamalPublicKey(currentTime, &priv.PublicKey)
  48. pk.PrivateKey = priv
  49. return pk
  50. }
  51. func NewECDSAPrivateKey(currentTime time.Time, priv *ecdsa.PrivateKey) *PrivateKey {
  52. pk := new(PrivateKey)
  53. pk.PublicKey = *NewECDSAPublicKey(currentTime, &priv.PublicKey)
  54. pk.PrivateKey = priv
  55. return pk
  56. }
  57. func (pk *PrivateKey) parse(r io.Reader) (err error) {
  58. err = (&pk.PublicKey).parse(r)
  59. if err != nil {
  60. return
  61. }
  62. var buf [1]byte
  63. _, err = readFull(r, buf[:])
  64. if err != nil {
  65. return
  66. }
  67. s2kType := buf[0]
  68. switch s2kType {
  69. case 0:
  70. pk.s2k = nil
  71. pk.Encrypted = false
  72. case 254, 255:
  73. _, err = readFull(r, buf[:])
  74. if err != nil {
  75. return
  76. }
  77. pk.cipher = CipherFunction(buf[0])
  78. pk.Encrypted = true
  79. pk.s2k, err = s2k.Parse(r)
  80. if err != nil {
  81. return
  82. }
  83. if s2kType == 254 {
  84. pk.sha1Checksum = true
  85. }
  86. default:
  87. return errors.UnsupportedError("deprecated s2k function in private key")
  88. }
  89. if pk.Encrypted {
  90. blockSize := pk.cipher.blockSize()
  91. if blockSize == 0 {
  92. return errors.UnsupportedError("unsupported cipher in private key: " + strconv.Itoa(int(pk.cipher)))
  93. }
  94. pk.iv = make([]byte, blockSize)
  95. _, err = readFull(r, pk.iv)
  96. if err != nil {
  97. return
  98. }
  99. }
  100. pk.encryptedData, err = ioutil.ReadAll(r)
  101. if err != nil {
  102. return
  103. }
  104. if !pk.Encrypted {
  105. return pk.parsePrivateKey(pk.encryptedData)
  106. }
  107. return
  108. }
  109. func mod64kHash(d []byte) uint16 {
  110. var h uint16
  111. for _, b := range d {
  112. h += uint16(b)
  113. }
  114. return h
  115. }
  116. func (pk *PrivateKey) Serialize(w io.Writer) (err error) {
  117. // TODO(agl): support encrypted private keys
  118. buf := bytes.NewBuffer(nil)
  119. err = pk.PublicKey.serializeWithoutHeaders(buf)
  120. if err != nil {
  121. return
  122. }
  123. buf.WriteByte(0 /* no encryption */)
  124. privateKeyBuf := bytes.NewBuffer(nil)
  125. switch priv := pk.PrivateKey.(type) {
  126. case *rsa.PrivateKey:
  127. err = serializeRSAPrivateKey(privateKeyBuf, priv)
  128. case *dsa.PrivateKey:
  129. err = serializeDSAPrivateKey(privateKeyBuf, priv)
  130. case *elgamal.PrivateKey:
  131. err = serializeElGamalPrivateKey(privateKeyBuf, priv)
  132. case *ecdsa.PrivateKey:
  133. err = serializeECDSAPrivateKey(privateKeyBuf, priv)
  134. default:
  135. err = errors.InvalidArgumentError("unknown private key type")
  136. }
  137. if err != nil {
  138. return
  139. }
  140. ptype := packetTypePrivateKey
  141. contents := buf.Bytes()
  142. privateKeyBytes := privateKeyBuf.Bytes()
  143. if pk.IsSubkey {
  144. ptype = packetTypePrivateSubkey
  145. }
  146. err = serializeHeader(w, ptype, len(contents)+len(privateKeyBytes)+2)
  147. if err != nil {
  148. return
  149. }
  150. _, err = w.Write(contents)
  151. if err != nil {
  152. return
  153. }
  154. _, err = w.Write(privateKeyBytes)
  155. if err != nil {
  156. return
  157. }
  158. checksum := mod64kHash(privateKeyBytes)
  159. var checksumBytes [2]byte
  160. checksumBytes[0] = byte(checksum >> 8)
  161. checksumBytes[1] = byte(checksum)
  162. _, err = w.Write(checksumBytes[:])
  163. return
  164. }
  165. func serializeRSAPrivateKey(w io.Writer, priv *rsa.PrivateKey) error {
  166. err := writeBig(w, priv.D)
  167. if err != nil {
  168. return err
  169. }
  170. err = writeBig(w, priv.Primes[1])
  171. if err != nil {
  172. return err
  173. }
  174. err = writeBig(w, priv.Primes[0])
  175. if err != nil {
  176. return err
  177. }
  178. return writeBig(w, priv.Precomputed.Qinv)
  179. }
  180. func serializeDSAPrivateKey(w io.Writer, priv *dsa.PrivateKey) error {
  181. return writeBig(w, priv.X)
  182. }
  183. func serializeElGamalPrivateKey(w io.Writer, priv *elgamal.PrivateKey) error {
  184. return writeBig(w, priv.X)
  185. }
  186. func serializeECDSAPrivateKey(w io.Writer, priv *ecdsa.PrivateKey) error {
  187. return writeBig(w, priv.D)
  188. }
  189. // Decrypt decrypts an encrypted private key using a passphrase.
  190. func (pk *PrivateKey) Decrypt(passphrase []byte) error {
  191. if !pk.Encrypted {
  192. return nil
  193. }
  194. key := make([]byte, pk.cipher.KeySize())
  195. pk.s2k(key, passphrase)
  196. block := pk.cipher.new(key)
  197. cfb := cipher.NewCFBDecrypter(block, pk.iv)
  198. data := make([]byte, len(pk.encryptedData))
  199. cfb.XORKeyStream(data, pk.encryptedData)
  200. if pk.sha1Checksum {
  201. if len(data) < sha1.Size {
  202. return errors.StructuralError("truncated private key data")
  203. }
  204. h := sha1.New()
  205. h.Write(data[:len(data)-sha1.Size])
  206. sum := h.Sum(nil)
  207. if !bytes.Equal(sum, data[len(data)-sha1.Size:]) {
  208. return errors.StructuralError("private key checksum failure")
  209. }
  210. data = data[:len(data)-sha1.Size]
  211. } else {
  212. if len(data) < 2 {
  213. return errors.StructuralError("truncated private key data")
  214. }
  215. var sum uint16
  216. for i := 0; i < len(data)-2; i++ {
  217. sum += uint16(data[i])
  218. }
  219. if data[len(data)-2] != uint8(sum>>8) ||
  220. data[len(data)-1] != uint8(sum) {
  221. return errors.StructuralError("private key checksum failure")
  222. }
  223. data = data[:len(data)-2]
  224. }
  225. return pk.parsePrivateKey(data)
  226. }
  227. func (pk *PrivateKey) parsePrivateKey(data []byte) (err error) {
  228. switch pk.PublicKey.PubKeyAlgo {
  229. case PubKeyAlgoRSA, PubKeyAlgoRSASignOnly, PubKeyAlgoRSAEncryptOnly:
  230. return pk.parseRSAPrivateKey(data)
  231. case PubKeyAlgoDSA:
  232. return pk.parseDSAPrivateKey(data)
  233. case PubKeyAlgoElGamal:
  234. return pk.parseElGamalPrivateKey(data)
  235. case PubKeyAlgoECDSA:
  236. return pk.parseECDSAPrivateKey(data)
  237. }
  238. panic("impossible")
  239. }
  240. func (pk *PrivateKey) parseRSAPrivateKey(data []byte) (err error) {
  241. rsaPub := pk.PublicKey.PublicKey.(*rsa.PublicKey)
  242. rsaPriv := new(rsa.PrivateKey)
  243. rsaPriv.PublicKey = *rsaPub
  244. buf := bytes.NewBuffer(data)
  245. d, _, err := readMPI(buf)
  246. if err != nil {
  247. return
  248. }
  249. p, _, err := readMPI(buf)
  250. if err != nil {
  251. return
  252. }
  253. q, _, err := readMPI(buf)
  254. if err != nil {
  255. return
  256. }
  257. rsaPriv.D = new(big.Int).SetBytes(d)
  258. rsaPriv.Primes = make([]*big.Int, 2)
  259. rsaPriv.Primes[0] = new(big.Int).SetBytes(p)
  260. rsaPriv.Primes[1] = new(big.Int).SetBytes(q)
  261. if err := rsaPriv.Validate(); err != nil {
  262. return err
  263. }
  264. rsaPriv.Precompute()
  265. pk.PrivateKey = rsaPriv
  266. pk.Encrypted = false
  267. pk.encryptedData = nil
  268. return nil
  269. }
  270. func (pk *PrivateKey) parseDSAPrivateKey(data []byte) (err error) {
  271. dsaPub := pk.PublicKey.PublicKey.(*dsa.PublicKey)
  272. dsaPriv := new(dsa.PrivateKey)
  273. dsaPriv.PublicKey = *dsaPub
  274. buf := bytes.NewBuffer(data)
  275. x, _, err := readMPI(buf)
  276. if err != nil {
  277. return
  278. }
  279. dsaPriv.X = new(big.Int).SetBytes(x)
  280. pk.PrivateKey = dsaPriv
  281. pk.Encrypted = false
  282. pk.encryptedData = nil
  283. return nil
  284. }
  285. func (pk *PrivateKey) parseElGamalPrivateKey(data []byte) (err error) {
  286. pub := pk.PublicKey.PublicKey.(*elgamal.PublicKey)
  287. priv := new(elgamal.PrivateKey)
  288. priv.PublicKey = *pub
  289. buf := bytes.NewBuffer(data)
  290. x, _, err := readMPI(buf)
  291. if err != nil {
  292. return
  293. }
  294. priv.X = new(big.Int).SetBytes(x)
  295. pk.PrivateKey = priv
  296. pk.Encrypted = false
  297. pk.encryptedData = nil
  298. return nil
  299. }
  300. func (pk *PrivateKey) parseECDSAPrivateKey(data []byte) (err error) {
  301. ecdsaPub := pk.PublicKey.PublicKey.(*ecdsa.PublicKey)
  302. buf := bytes.NewBuffer(data)
  303. d, _, err := readMPI(buf)
  304. if err != nil {
  305. return
  306. }
  307. pk.PrivateKey = &ecdsa.PrivateKey{
  308. PublicKey: *ecdsaPub,
  309. D: new(big.Int).SetBytes(d),
  310. }
  311. pk.Encrypted = false
  312. pk.encryptedData = nil
  313. return nil
  314. }