123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089 |
- ;; -*- mode: scheme; coding: utf-8 -*-
- ;; Copyright © 2010, 2012 Göran Weinholt <goran@weinholt.se>
- ;; Copyright © 2020 Ludovic Courtès <ludo@gnu.org>
- ;; Permission is hereby granted, free of charge, to any person obtaining a
- ;; copy of this software and associated documentation files (the "Software"),
- ;; to deal in the Software without restriction, including without limitation
- ;; the rights to use, copy, modify, merge, publish, distribute, sublicense,
- ;; and/or sell copies of the Software, and to permit persons to whom the
- ;; Software is furnished to do so, subject to the following conditions:
- ;; The above copyright notice and this permission notice shall be included in
- ;; all copies or substantial portions of the Software.
- ;; THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- ;; IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- ;; FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
- ;; THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- ;; LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- ;; FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
- ;; DEALINGS IN THE SOFTWARE.
- ;;; This code was originally written by Göran Weinholt for Industria and
- ;;; released under the Expat license shown above. It was then modified by
- ;;; Ludovic Courtès for use in GNU Guix: turned into a native Guile module,
- ;;; ported to Guile-Gcrypt, and extended and simplified in other ways.
- (define-module (guix openpgp)
- #:export (get-openpgp-detached-signature/ascii
- (get-packet . get-openpgp-packet)
- verify-openpgp-signature
- port-ascii-armored?
- openpgp-error?
- openpgp-unrecognized-packet-error?
- openpgp-unrecognized-packet-error-port
- openpgp-unrecognized-packet-error-type
- openpgp-invalid-signature-error?
- openpgp-invalid-signature-error-port
- openpgp-signature?
- openpgp-signature-issuer-key-id
- openpgp-signature-issuer-fingerprint
- openpgp-signature-public-key-algorithm
- openpgp-signature-hash-algorithm
- openpgp-signature-creation-time
- openpgp-signature-expiration-time
- openpgp-user-id?
- openpgp-user-id-value
- openpgp-user-attribute?
- openpgp-public-key?
- openpgp-public-key-subkey?
- openpgp-public-key-value
- openpgp-public-key-fingerprint openpgp-format-fingerprint
- openpgp-public-key-id
- openpgp-keyring?
- %empty-keyring
- lookup-key-by-id
- lookup-key-by-fingerprint
- get-openpgp-keyring
- read-radix-64
- string->openpgp-packet)
- #:use-module (rnrs bytevectors)
- #:use-module (rnrs io ports)
- #:use-module (srfi srfi-1)
- #:use-module (srfi srfi-9)
- #:use-module (srfi srfi-11)
- #:use-module (srfi srfi-19)
- #:use-module (srfi srfi-26)
- #:use-module (srfi srfi-34)
- #:use-module (srfi srfi-35)
- #:use-module (srfi srfi-60)
- #:use-module (ice-9 match)
- #:use-module ((ice-9 rdelim) #:select (read-line))
- #:use-module (ice-9 vlist)
- #:use-module (gcrypt hash)
- #:use-module (gcrypt pk-crypto)
- #:use-module (gcrypt base64)
- #:use-module (gcrypt base16)
- #:use-module ((guix build utils) #:select (dump-port)))
- ;;; Commentary:
- ;;;
- ;;; This module contains code to read OpenPGP messages as described in
- ;;; <https://tools.ietf.org/html/rfc4880>, with extensions from
- ;;; <https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-06> (notably
- ;;; EdDSA support and extra signature sub-packets).
- ;;;
- ;;; Currently this module does enough to verify detached signatures of binary
- ;;; data. It does _not_ perform sanity checks on self-signatures, subkey
- ;;; binding signatures, etc., among others. Use only in a context where this
- ;;; limitations are acceptable!
- ;;;
- ;;; Code:
- (define-syntax print
- (syntax-rules ()
- ;; ((_ args ...) (pk 'openpgp args))
- ((_ args ...) (values))))
- (define-syntax-rule (define-alias new old)
- (define-syntax new (identifier-syntax old)))
- (define-alias fx+ +)
- (define-alias fx- -)
- (define-alias fx* *)
- (define-alias fx/ /)
- (define-alias fxdiv quotient)
- (define-alias fxand logand)
- (define-inlinable (fxbit-set? n index) (bit-set? index n))
- (define-alias fxbit-field bit-field)
- (define-alias bitwise-bit-field bit-field)
- (define-alias fxarithmetic-shift-left ash)
- (define-inlinable (fxarithmetic-shift-right i n) (ash i (- n)))
- (define-inlinable (port-eof? port) (eof-object? (lookahead-u8 port)))
- (define (string-hex-pad str)
- (if (odd? (string-length str))
- (string-append "0" str)
- str))
- (define (unixtime n)
- (time-monotonic->date (make-time 'time-monotonic 0 n)))
- ;; Root of the error hierarchy.
- (define-condition-type &openpgp-error &error
- openpgp-error?)
- ;; Error raised when reading an unsupported or unrecognized packet tag.
- (define-condition-type &openpgp-unrecognized-packet-error &openpgp-error
- openpgp-unrecognized-packet-error?
- (type openpgp-unrecognized-packet-error-type)
- (port openpgp-unrecognized-packet-error-port))
- ;; Error raised when reading an invalid signature packet.
- (define-condition-type &openpgp-invalid-signature-error &openpgp-error
- openpgp-invalid-signature-error?
- (port openpgp-invalid-signature-error-port))
- ;;;
- ;;; Bitwise I/O.
- ;;;
- ;;; TODO: Use Bytestructures instead.
- ;;;
- (define-syntax-rule (integer-read size)
- (lambda (port)
- "Read from PORT a big-endian integer of SIZE bytes. Return the EOF object
- on end-of-file."
- (let ((buf (make-bytevector size)))
- (match (get-bytevector-n! port buf 0 size)
- (size (bytevector-uint-ref buf 0 (endianness big) size))
- (_ (eof-object))))))
- (define get-u16 (integer-read 2))
- (define get-u32 (integer-read 4))
- (define get-u64 (integer-read 8))
- (define-syntax get-integers
- (syntax-rules ()
- "Read from PORT integers of the given TYPE, in big endian encoding. Each
- TYPE must be one of u8, u16, u32, u64, or _, as in this example:
- (get-integers port u8 _ _ _ u32 u16)
- In the case of _ (wildcard), one byte is read and discarded. Return as many
- values as there are TYPEs."
- ((_ port type ...)
- (letrec-syntax ((get-integer (syntax-rules (u8 u16 u32 u64)
- ((x u8) (get-u8 port))
- ((x u16) (get-u16 port))
- ((x u32) (get-u32 port))
- ((x u64) (get-u64 port))))
- (values* (syntax-rules (_)
- ((x (result (... ...)))
- (values result (... ...)))
- ((x (result (... ...)) _ rest (... ...))
- (let ((x (get-u8 port)))
- (values* (result (... ...))
- rest (... ...))))
- ((x (result (... ...)) t rest (... ...))
- (let ((x (get-integer t)))
- (values* (result (... ...) x)
- rest (... ...)))))))
- (values* () type ...)))))
- (define (bytevector->uint bv)
- (bytevector-uint-ref bv 0 (endianness big)
- (bytevector-length bv)))
- (define-syntax-rule (integer-write size)
- (lambda (port integer)
- "Write INTEGER to PORT as a SIZE-byte integer and as big endian."
- (let ((bv (make-bytevector size)))
- (bytevector-uint-set! bv 0 integer (endianness big) size)
- (put-bytevector port bv))))
- (define put-u16 (integer-write 2))
- (define put-u32 (integer-write 4))
- (define put-u64 (integer-write 8))
- (define-syntax put-integers
- (syntax-rules ()
- "Write the given integers as big endian to PORT. For example:
- (put-integers port u8 42 u32 #x7777)
- writes to PORT the value 42 as an 8-bit integer and the value #x7777 as a
- 32-bit integer."
- ((_ port)
- #t)
- ((_ port type value rest ...)
- (let-syntax ((put (syntax-rules (u8 u16 u32 u64)
- ((_ u8 port integer)
- (put-u8 port integer))
- ((_ u16 port integer)
- (put-u16 port integer))
- ((_ u32 port integer)
- (put-u32 port integer))
- ((_ u64 port integer)
- (put-u64 port integer)))))
- (begin
- (put type port value)
- (put-integers port rest ...))))))
- (define-syntax-rule (integers->bytevector type value rest ...)
- "Return the the TYPE/VALUE integers representation as a bytevector."
- (let-values (((port get) (open-bytevector-output-port)))
- (put-integers port type value rest ...)
- (force-output port)
- (get)))
- (define (bytevector->bitnames bv names)
- (define (bit-set? bv i)
- (let ((idx (fxarithmetic-shift-right i 3))
- (bit (fxand i #b111)))
- (and (< idx (bytevector-length bv))
- (fxbit-set? (bytevector-u8-ref bv idx) bit))))
- (do ((names names (cdr names))
- (i 0 (fx+ i 1))
- (bits '()
- (if (bit-set? bv i)
- (cons (car names) bits)
- bits)))
- ((null? names) (reverse bits))))
- (define (openpgp-format-fingerprint bv)
- "Return a string representing BV, a bytevector, in the conventional OpenPGP
- hexadecimal format for fingerprints."
- (define (h i)
- (string-pad (string-upcase
- (number->string
- (bytevector-u16-ref bv (* i 2) (endianness big))
- 16))
- 4 #\0))
- (string-append (h 0) " " (h 1) " " (h 2) " " (h 3) " " (h 4)
- " "
- (h 5) " " (h 6) " " (h 7) " " (h 8) " " (h 9)))
- ;;; Constants
- (define PACKET-SESSION-KEY 1)
- (define PACKET-SIGNATURE 2)
- (define PACKET-SYMMETRIC-SESSION-KEY 3)
- (define PACKET-ONE-PASS-SIGNATURE 4)
- (define PACKET-SECRET-KEY 5)
- (define PACKET-PUBLIC-KEY 6)
- (define PACKET-SECRET-SUBKEY 7)
- (define PACKET-COMPRESSED-DATA 8)
- (define PACKET-SYMMETRIC-ENCRYPTED-DATA 9)
- (define PACKET-MARKER 10)
- (define PACKET-LITERAL-DATA 11)
- (define PACKET-TRUST 12)
- (define PACKET-USER-ID 13)
- (define PACKET-PUBLIC-SUBKEY 14)
- (define PACKET-USER-ATTRIBUTE 17)
- (define PACKET-SYMMETRIC-ENCRYPTED/PROTECTED-DATA 18)
- (define PACKET-MDC 19)
- (define PUBLIC-KEY-RSA 1)
- (define PUBLIC-KEY-RSA-ENCRYPT-ONLY 2)
- (define PUBLIC-KEY-RSA-SIGN-ONLY 3)
- (define PUBLIC-KEY-ELGAMAL-ENCRYPT-ONLY 16)
- (define PUBLIC-KEY-DSA 17)
- (define PUBLIC-KEY-ECDH 18) ;RFC-6637
- (define PUBLIC-KEY-ECDSA 19) ;RFC-6639
- (define PUBLIC-KEY-ELGAMAL 20) ;encrypt + sign (legacy)
- (define PUBLIC-KEY-EDDSA 22) ;"not yet assigned" says GPG
- (define (public-key-algorithm id)
- (cond ((= id PUBLIC-KEY-RSA) 'rsa)
- ((= id PUBLIC-KEY-DSA) 'dsa)
- ((= id PUBLIC-KEY-ELGAMAL-ENCRYPT-ONLY) 'elgamal)
- ((= id PUBLIC-KEY-EDDSA) 'eddsa)
- (else id)))
- (define SYMMETRIC-KEY-PLAINTEXT 0)
- (define SYMMETRIC-KEY-IDEA 1)
- (define SYMMETRIC-KEY-TRIPLE-DES 2)
- (define SYMMETRIC-KEY-CAST5-128 3)
- (define SYMMETRIC-KEY-BLOWFISH-128 4)
- (define SYMMETRIC-KEY-AES-128 7)
- (define SYMMETRIC-KEY-AES-192 8)
- (define SYMMETRIC-KEY-AES-256 9)
- (define SYMMETRIC-KEY-TWOFISH-256 10)
- (define SYMMETRIC-KEY-CAMELLIA-128 11) ;RFC-5581
- (define SYMMETRIC-KEY-CAMELLIA-192 12)
- (define SYMMETRIC-KEY-CAMELLIA-256 13)
- (define (symmetric-key-algorithm id)
- (cond ((= id SYMMETRIC-KEY-PLAINTEXT) 'plaintext)
- ((= id SYMMETRIC-KEY-IDEA) 'idea)
- ((= id SYMMETRIC-KEY-TRIPLE-DES) 'tdea)
- ((= id SYMMETRIC-KEY-CAST5-128) 'cast5-128)
- ((= id SYMMETRIC-KEY-BLOWFISH-128) 'blowfish-128)
- ((= id SYMMETRIC-KEY-AES-128) 'aes-128)
- ((= id SYMMETRIC-KEY-AES-192) 'aes-192)
- ((= id SYMMETRIC-KEY-AES-256) 'aes-256)
- ((= id SYMMETRIC-KEY-TWOFISH-256) 'twofish-256)
- (else id)))
- (define HASH-MD5 1)
- (define HASH-SHA-1 2)
- (define HASH-RIPE-MD160 3)
- (define HASH-SHA-256 8)
- (define HASH-SHA-384 9)
- (define HASH-SHA-512 10)
- (define HASH-SHA-224 11)
- (define (openpgp-hash-algorithm id signature-port)
- (cond ((= id HASH-MD5) 'md5)
- ((= id HASH-SHA-1) 'sha1)
- ((= id HASH-RIPE-MD160) 'rmd160)
- ((= id HASH-SHA-256) 'sha256)
- ((= id HASH-SHA-384) 'sha384)
- ((= id HASH-SHA-512) 'sha512)
- ((= id HASH-SHA-224) 'sha224)
- (else
- (raise (condition
- (&openpgp-invalid-signature-error (port signature-port)))))))
- (define COMPRESSION-UNCOMPRESSED 0)
- (define COMPRESSION-ZIP 1) ;deflate
- (define COMPRESSION-ZLIB 2)
- (define COMPRESSION-BZIP2 3)
- (define (compression-algorithm id)
- (cond ((= id COMPRESSION-UNCOMPRESSED) 'uncompressed)
- ((= id COMPRESSION-ZIP) 'deflate)
- ((= id COMPRESSION-ZLIB) 'zlib)
- ((= id COMPRESSION-BZIP2) 'bzip2)
- (else id)))
- (define SUBPACKET-SIGNATURE-CTIME 2)
- (define SUBPACKET-SIGNATURE-ETIME 3)
- ;; 4 = Exportable Certification
- (define SUBPACKET-TRUST-SIGNATURE 5)
- ;; 6 = Regular Expression
- (define SUBPACKET-REVOCABLE 7)
- (define SUBPACKET-KEY-ETIME 9)
- (define SUBPACKET-PREFERRED-SYMMETRIC-ALGORITHMS 11)
- ;; 12 = Revocation Key
- (define SUBPACKET-ISSUER 16)
- (define SUBPACKET-NOTATION-DATA 20)
- (define SUBPACKET-PREFERRED-HASH-ALGORITHMS 21)
- (define SUBPACKET-PREFERRED-COMPRESSION-ALGORITHMS 22)
- (define SUBPACKET-KEY-SERVER-PREFERENCES 23)
- (define SUBPACKET-PREFERRED-KEY-SERVER 24)
- (define SUBPACKET-PRIMARY-USER-ID 25)
- (define SUBPACKET-POLICY-URI 26)
- (define SUBPACKET-KEY-FLAGS 27)
- (define SUBPACKET-SIGNER-USER-ID 28)
- (define SUBPACKET-REASON-FOR-REVOCATION 29)
- (define SUBPACKET-FEATURES 30)
- ;; 31 = Signature Target
- (define SUBPACKET-EMBEDDED-SIGNATURE 32)
- (define SUBPACKET-ISSUER-FINGERPRINT 33) ;defined in RFC4880bis
- (define SIGNATURE-BINARY #x00)
- (define SIGNATURE-TEXT #x01)
- (define SIGNATURE-STANDALONE #x02)
- (define SIGNATURE-GENERIC-CERT #x10)
- (define SIGNATURE-PERSONA-CERT #x11)
- (define SIGNATURE-CASUAL-CERT #x12)
- (define SIGNATURE-POSITIVE-CERT #x13)
- (define SIGNATURE-SUBKEY-BINDING #x18)
- (define SIGNATURE-PRIMARY-KEY-BINDING #x19)
- (define SIGNATURE-DIRECT #x1f)
- (define SIGNATURE-KEY-REVOCATION #x20)
- (define SIGNATURE-SUBKEY-REVOCATION #x28)
- (define SIGNATURE-CERT-REVOCATION #x30)
- (define SIGNATURE-TIMESTAMP #x40)
- (define SIGNATURE-THIRD-PARTY #x50)
- ;;; Parsing
- ;; Look at the tag byte and see if it looks reasonable, if it does
- ;; then the file is likely not armored. Does not move the port
- ;; position.
- (define (port-ascii-armored? p)
- (let ((tag (lookahead-u8 p)))
- (cond ((eof-object? tag) #f)
- ((not (fxbit-set? tag 7)) #t)
- (else
- (let ((type (if (fxbit-set? tag 6)
- (fxbit-field tag 0 6)
- (fxbit-field tag 2 6))))
- (not (<= PACKET-SESSION-KEY type PACKET-MDC)))))))
- (define (get-mpi/bytevector p)
- (let* ((bitlen (get-u16 p))
- (bytelen (fxdiv (fx+ bitlen 7) 8)))
- (get-bytevector-n p bytelen)))
- (define (get-mpi p)
- (bytevector->uint (get-mpi/bytevector p)))
- (define (get-v4-length p)
- ;; TODO: indeterminate length (only for data packets)
- (let ((o1 (get-u8 p)))
- (cond ((< o1 192) o1)
- ((< o1 255)
- (+ (fxarithmetic-shift-left (fx- o1 192) 8)
- (get-u8 p)
- 192))
- ((= o1 255)
- (get-u32 p)))))
- (define (get-packet p)
- (if (port-eof? p)
- (eof-object)
- (get-packet* p get-data)))
- (define (get-packet* p get-data)
- (let ((tag (get-u8 p)))
- ;; (unless (fxbit-set? tag 7) (error 'get-packet "Invalid tag" tag))
- (cond ((fxbit-set? tag 6) ;New packet format
- (let ((tag (fxbit-field tag 0 6))
- (len (get-v4-length p)))
- (get-data p tag len)))
- (else ;Old packet format
- (let ((tag (fxbit-field tag 2 6))
- (len (case (fxbit-field tag 0 2)
- ((0) (get-u8 p))
- ((1) (get-u16 p))
- ((2) (get-u32 p))
- ((3) #f))))
- (get-data p tag len))))))
- (define (get-data p tag len)
- (let ((pp (if len
- (open-bytevector-input-port (get-bytevector-n p len))
- p))) ;indeterminate length
- (cond
- ((= tag PACKET-SIGNATURE)
- (get-signature pp))
- ((= tag PACKET-PUBLIC-KEY)
- (get-public-key pp #f))
- ((= tag PACKET-TRUST)
- 'openpgp-trust) ;XXX: non-standard format?
- ((= tag PACKET-USER-ID)
- (get-user-id pp len))
- ((= tag PACKET-PUBLIC-SUBKEY)
- (get-public-key pp #t))
- ((= tag PACKET-USER-ATTRIBUTE)
- (get-user-attribute pp len))
- ((= tag PACKET-ONE-PASS-SIGNATURE)
- 'one-pass-signature) ;TODO: implement
- (else
- (raise (condition (&openpgp-unrecognized-packet-error (type tag)
- (port p))))))))
- (define-record-type <openpgp-public-key>
- (make-openpgp-public-key version subkey? time value fingerprint)
- openpgp-public-key?
- (version openpgp-public-key-version)
- (subkey? openpgp-public-key-subkey?)
- (time openpgp-public-key-time)
- (value openpgp-public-key-value)
- (fingerprint openpgp-public-key-fingerprint))
- ;;; Signatures
- (define-record-type <openpgp-signature>
- (make-openpgp-signature version type pk-algorithm hash-algorithm hashl16
- append-data hashed-subpackets unhashed-subpackets
- value issuer issuer-fingerprint)
- openpgp-signature?
- (version openpgp-signature-version)
- (type openpgp-signature-type)
- (pk-algorithm openpgp-signature-public-key-algorithm)
- (hash-algorithm openpgp-signature-hash-algorithm)
- (hashl16 openpgp-signature-hashl16) ;left 16 bits of signed hash
- (append-data openpgp-signature-append-data) ;append to data when hashing
- (hashed-subpackets openpgp-signature-hashed-subpackets)
- (unhashed-subpackets openpgp-signature-unhashed-subpackets)
- (value openpgp-signature-value)
- (issuer openpgp-signature-issuer-key-id) ;integer | #f
- (issuer-fingerprint openpgp-signature-issuer-fingerprint)) ;bytevector | #f
- (define (openpgp-signature-creation-time sig)
- (cond ((assq 'signature-ctime (openpgp-signature-hashed-subpackets sig))
- => (lambda (x) (unixtime (cdr x))))
- ;; XXX: should be an error?
- (else #f)))
- (define (openpgp-signature-expiration-time sig)
- (cond ((assq 'signature-etime (openpgp-signature-hashed-subpackets sig))
- => (lambda (x)
- (unixtime (+ (cdr x)
- (openpgp-signature-creation-time sig)))))
- (else #f)))
- (define (get-openpgp-detached-signature/ascii port)
- "Read from PORT an ASCII-armored detached signature. Return an
- <openpgp-signature> record or the end-of-file object. Raise an error if the
- data read from PORT does is invalid or does not correspond to a detached
- signature."
- (let-values (((data type) (read-radix-64 port)))
- (cond ((eof-object? data) data)
- ((string=? type "PGP SIGNATURE")
- (get-packet (open-bytevector-input-port data)))
- (else
- (print "expected PGP SIGNATURE" type)
- (raise (condition
- (&openpgp-invalid-signature-error (port port))))))))
- (define (verify-openpgp-signature sig keyring dataport)
- "Verify that the data read from DATAPORT matches SIG, an
- <openpgp-signature>. Fetch the public key of the issuer of SIG from KEYRING,
- a keyring as returned by 'get-openpgp-keyring'. Return two values: a status
- symbol, such as 'bad-signature or 'missing-key, and additional info, such as
- the issuer's OpenPGP public key extracted from KEYRING."
- (define (check key sig)
- (let*-values (((hash-algorithm) (lookup-hash-algorithm
- (openpgp-signature-hash-algorithm sig)))
- ((port get-hash) (open-hash-port hash-algorithm)))
- (dump-port dataport port)
- ;; As per RFC4880 Section 5.2.4 ("Computing Signatures"), hash some of
- ;; the fields from the signature packet.
- (for-each (cut put-bytevector port <>)
- (openpgp-signature-append-data sig))
- (close-port port)
- (let* ((signature (openpgp-signature-value sig))
- (public-key (openpgp-public-key-value key))
- (hash (get-hash))
- (key-type (key-type public-key))
- (data
- ;; See "(gcrypt) Cryptographic Functions".
- (sexp->canonical-sexp
- (if (eq? key-type 'ecc)
- `(data
- (flags eddsa)
- (hash-algo sha512)
- (value ,hash))
- `(data
- (flags ,(match key-type
- ('rsa 'pkcs1)
- ('dsa 'rfc6979)))
- (hash ,(hash-algorithm-name hash-algorithm)
- ,hash))))))
- (values (if (verify signature data public-key)
- 'good-signature
- 'bad-signature)
- key))))
- ;; TODO: Support SIGNATURE-TEXT.
- (if (= (openpgp-signature-type sig) SIGNATURE-BINARY)
- (let* ((id (openpgp-signature-issuer-key-id sig))
- (fingerprint (openpgp-signature-issuer-fingerprint sig))
- (key (if fingerprint
- (lookup-key-by-fingerprint keyring fingerprint)
- (lookup-key-by-id keyring id))))
- (if key
- (check key sig)
- (values 'missing-key (or fingerprint id))))
- (values 'unsupported-signature sig)))
- (define (key-id-matches-fingerprint? key-id fingerprint)
- "Return true if KEY-ID, a number, corresponds to the low 8 bytes of
- FINGERPRINT, a bytevector."
- (let* ((len (bytevector-length fingerprint))
- (low (make-bytevector 8)))
- (bytevector-copy! fingerprint (- len 8) low 0 8)
- (= (bytevector->uint low) key-id)))
- (define (get-signature p)
- (define (->hex n)
- (string-hex-pad (number->string n 16)))
- (define (get-sig p pkalg)
- (cond ((= pkalg PUBLIC-KEY-RSA)
- (print "RSA signature")
- (string->canonical-sexp
- (format #f "(sig-val (rsa (s #~a#)))"
- (->hex (get-mpi p)))))
- ((= pkalg PUBLIC-KEY-DSA)
- (print "DSA signature")
- (let ((r (get-mpi p)) (s (get-mpi p)))
- (string->canonical-sexp
- (format #f "(sig-val (dsa (r #~a#) (s #~a#)))"
- (->hex r) (->hex s)))))
- ((= pkalg PUBLIC-KEY-EDDSA)
- (print "EdDSA signature")
- (let ((r (get-mpi/bytevector p))
- (s (get-mpi/bytevector p)))
- ;; XXX: 'verify' fails down the road with GPG_ERR_INV_LENGTH if
- ;; we provide a 31-byte R or S below, hence the second argument
- ;; to '->hex' ensuring the MPIs are represented as two-byte
- ;; multiples, with leading zeros.
- (define (bytevector->hex bv)
- (let ((str (bytevector->base16-string bv)))
- (if (odd? (bytevector-length bv))
- (string-append "00" str)
- str)))
- (string->canonical-sexp
- (format #f "(sig-val (eddsa (r #~a#) (s #~a#)))"
- (bytevector->hex r) (bytevector->hex s)))))
- (else
- (list 'unsupported-algorithm
- (public-key-algorithm pkalg)
- (get-bytevector-all p)))))
- (let ((version (get-u8 p)))
- (case version
- ((3)
- (let-values (((hmlen type ctime keyid pkalg halg hashl16)
- (get-integers p u8 u8 u32 u64 u8 u8 u16)))
- (unless (= hmlen 5)
- (raise (condition
- (&openpgp-invalid-signature-error (port p)))))
- (print "Signature type: " type " creation time: " (unixtime ctime))
- (print "Hash algorithm: " (openpgp-hash-algorithm halg p))
- (let ((value (get-sig p pkalg)))
- (unless (port-eof? p)
- (print "Trailing data in signature: " (get-bytevector-all p)))
- (make-openpgp-signature version type
- (public-key-algorithm pkalg)
- (openpgp-hash-algorithm halg p) hashl16
- (list (integers->bytevector u8 type
- u32 ctime))
- ;; Emulate hashed subpackets
- (list (cons 'signature-ctime ctime))
- ;; Unhashed subpackets
- (list (cons 'issuer keyid))
- value
- keyid #f))))
- ((4)
- (let*-values (((type pkalg halg) (get-integers p u8 u8 u8))
- ((hashed-subpackets)
- (get-bytevector-n p (get-u16 p)))
- ((unhashed-subpackets)
- (get-bytevector-n p (get-u16 p)))
- ((hashl16) (get-u16 p)))
- (print "Signature type: " type)
- (print "Hash algorithm: " (openpgp-hash-algorithm halg p))
- (let ((value (get-sig p pkalg)))
- (unless (port-eof? p)
- (print "Trailing data in signature: " (get-bytevector-all p)))
- (let* ((subpacket-len (bytevector-length hashed-subpackets))
- (append-data
- (list
- (integers->bytevector u8 version
- u8 type
- u8 pkalg
- u8 halg
- u16 subpacket-len)
- hashed-subpackets
- ;; http://www.rfc-editor.org/errata_search.php?rfc=4880
- ;; Errata ID: 2214.
- (integers->bytevector u8 #x04
- u8 #xff
- u32 (+ 6 subpacket-len))))
- (unhashed-subpackets
- (parse-subpackets unhashed-subpackets p))
- (hashed-subpackets (parse-subpackets hashed-subpackets p))
- (subpackets (append hashed-subpackets
- unhashed-subpackets))
- (issuer-key-id (assoc-ref subpackets 'issuer))
- (issuer (assoc-ref subpackets
- 'issuer-fingerprint)))
- (unless (or (not issuer) (not issuer-key-id)
- (key-id-matches-fingerprint? issuer-key-id issuer))
- (print "issuer key id does not match fingerprint"
- issuer-key-id issuer)
- (raise (condition
- (&openpgp-invalid-signature-error (port p)))))
- (make-openpgp-signature version type
- (public-key-algorithm pkalg)
- (openpgp-hash-algorithm halg p)
- hashl16
- append-data
- hashed-subpackets
- unhashed-subpackets
- value
- issuer-key-id issuer)))))
- (else
- (print "Unsupported signature version: " version)
- 'unsupported-signature-version))))
- (define (parse-subpackets bv signature-port)
- (define (parse tag data)
- (let ((type (fxbit-field tag 0 7))
- (critical? (fxbit-set? tag 7)))
- (cond
- ((= type SUBPACKET-SIGNATURE-CTIME)
- (cons 'signature-ctime
- (bytevector-u32-ref data 0 (endianness big))))
- ((= type SUBPACKET-SIGNATURE-ETIME)
- (cons 'signature-etime
- (bytevector-u32-ref data 0 (endianness big))))
- ((= type SUBPACKET-TRUST-SIGNATURE)
- (cons 'trust-signature
- (bytevector-u8-ref data 0)))
- ((= type SUBPACKET-REVOCABLE)
- (cons 'revocable
- (= (bytevector-u8-ref data 0) 1)))
- ((= type SUBPACKET-KEY-ETIME)
- (cons 'key-etime
- (bytevector-u32-ref data 0 (endianness big))))
- ((= type SUBPACKET-PREFERRED-SYMMETRIC-ALGORITHMS)
- (cons 'preferred-symmetric-algorithms
- (map symmetric-key-algorithm (bytevector->u8-list data))))
- ((= type SUBPACKET-ISSUER)
- (cons 'issuer
- (bytevector-u64-ref data 0 (endianness big))))
- ((= type SUBPACKET-ISSUER-FINGERPRINT) ;v4+ only, RFC4880bis
- (cons 'issuer-fingerprint
- (let* ((version (bytevector-u8-ref data 0))
- (len (match version (4 20) (5 32)) )
- (fingerprint (make-bytevector len)))
- (bytevector-copy! data 1 fingerprint 0 len)
- fingerprint)))
- ((= type SUBPACKET-NOTATION-DATA)
- (let ((p (open-bytevector-input-port data)))
- (let-values (((f1 nlen vlen)
- (get-integers p u8 _ _ _ u16 u16)))
- (let* ((name (get-bytevector-n p nlen))
- (value (get-bytevector-n p vlen)))
- (cons 'notation-data
- (list (utf8->string name)
- (if (fxbit-set? f1 7)
- (utf8->string value)
- value)))))))
- ((= type SUBPACKET-PREFERRED-HASH-ALGORITHMS)
- (cons 'preferred-hash-algorithms
- (map (cut openpgp-hash-algorithm <> signature-port)
- (bytevector->u8-list data))))
- ((= type SUBPACKET-PREFERRED-COMPRESSION-ALGORITHMS)
- (cons 'preferred-compression-algorithms
- (map compression-algorithm (bytevector->u8-list data))))
- ((= type SUBPACKET-KEY-SERVER-PREFERENCES)
- (cons 'key-server-preferences
- (if (and (>= (bytevector-length data) 1)
- (fxbit-set? (bytevector-u8-ref data 0) 7))
- (list 'no-modify)
- (list))))
- ((= type SUBPACKET-PREFERRED-KEY-SERVER)
- (cons 'preferred-key-server (utf8->string data)))
- ((= type SUBPACKET-PRIMARY-USER-ID)
- (cons 'primary-user-id (not (zero? (bytevector-u8-ref data 0)))))
- ((= type SUBPACKET-POLICY-URI)
- (cons 'policy-uri (utf8->string data)))
- ((= type SUBPACKET-KEY-FLAGS)
- (cons 'key-flags (bytevector->bitnames
- data
- '(certification sign-data
- communications-encryption
- storage-encryption
- split-key authentication
- group-key))))
- ((= type SUBPACKET-SIGNER-USER-ID)
- (cons 'signer-user-id (utf8->string data)))
- ((= type SUBPACKET-REASON-FOR-REVOCATION)
- (let* ((p (open-bytevector-input-port data))
- (revocation-code (get-u8 p)))
- (cons 'reason-for-revocation
- (list revocation-code
- (if (port-eof? p)
- ""
- (utf8->string (get-bytevector-all p)))))))
- ((= type SUBPACKET-FEATURES)
- (cons 'features (bytevector->bitnames
- data '(modification-detection))))
- ((= type SUBPACKET-EMBEDDED-SIGNATURE)
- (cons 'embedded-signature
- (get-signature (open-bytevector-input-port data))))
- (else
- ;; Unknown subpacket type. If it is critical, then the signature
- ;; should be considered invalid.
- (print "Unknown subpacket type: " type)
- (if critical?
- (raise (condition
- (&openpgp-unrecognized-packet-error
- (type type)
- (port signature-port))))
- (list 'unsupported-subpacket type data))))))
- (let ((p (open-bytevector-input-port bv)))
- (let lp ((subpackets '()))
- ;; In case of multiple subpackets of the same type, the last
- ;; one should be used. Therefore the list is not reversed
- ;; here.
- (if (port-eof? p)
- (reverse subpackets)
- (let* ((len (- (get-v4-length p) 1))
- (tag (get-u8 p))
- (sp (parse tag (get-bytevector-n p len))))
- (print "#;Subpacket " sp)
- (lp (cons sp subpackets)))))))
- ;;; Public keys
- (define (openpgp-public-key-id k)
- (let ((bv (openpgp-public-key-fingerprint k)))
- (bytevector-u64-ref bv
- (- (bytevector-length bv) 8)
- (endianness big))))
- (define (get-public-key p subkey?)
- (define (fingerprint p)
- (let ((len (port-position p)))
- (set-port-position! p 0)
- (let-values (((sha1-port get)
- (open-hash-port (hash-algorithm sha1))))
- (put-u8 sha1-port #x99)
- (put-u16 sha1-port len)
- (dump-port p sha1-port)
- (close-port sha1-port)
- (get))))
- (define (get-key p alg)
- (define (->hex n)
- (string-hex-pad (number->string n 16)))
- (cond ((= alg PUBLIC-KEY-RSA)
- (print "Public RSA key")
- (let* ((n (get-mpi p)) (e (get-mpi p)))
- (string->canonical-sexp
- (format #f "(public-key (rsa (n #~a#) (e #~a#)))"
- (->hex n) (->hex e)))))
- ((= alg PUBLIC-KEY-DSA)
- (print "Public DSA key")
- (let* ((p* (get-mpi p)) (q (get-mpi p))
- (g (get-mpi p)) (y (get-mpi p)))
- (string->canonical-sexp
- (format #f "(public-key (dsa (p #~a#)(q #~a#)(g #~a#)(y #~a#)))"
- (->hex p*) (->hex q) (->hex g) (->hex y)))))
- #;
- ((= alg PUBLIC-KEY-ELGAMAL-ENCRYPT-ONLY) ; ; ; ;
- (print "Public El-Gamal Key") ; ; ; ;
- (let* ((p* (get-mpi p)) (g (get-mpi p)) (y (get-mpi p))) ; ; ; ;
- (make-public-elgamal-key p* g y)))
- ((= alg PUBLIC-KEY-EDDSA)
- ;; See
- ;; <https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp-04>
- ;; and openpgp-oid.c in GnuPG.
- (print "Public EdDSA key")
- (let* ((len (get-u8 p))
- (oid (bytevector->uint (get-bytevector-n p len)))
- (q (get-mpi p)))
- (define curve
- (match oid
- (#x2b06010401da470f01 'Ed25519)
- (#x2b060104019755010501 'Curve25519)))
- (string->canonical-sexp
- (format #f "(public-key (ecc (curve ~a)(flags ~a)(q #~a#)))"
- curve
- (if (eq? curve 'Curve25519) 'djb-tweak 'eddsa)
- (->hex q)))))
- (else
- (list 'unsupported-algorithm ;FIXME: throw
- (public-key-algorithm alg)
- (get-bytevector-all p)))))
- (let ((version (get-u8 p)))
- (case version
- ((4)
- (let-values (((ctime alg) (get-integers p u32 u8)))
- (print "Key creation time: " (unixtime ctime))
- (let ((key (get-key p alg)))
- (unless (port-eof? p)
- ;; Probably an error? Gonna cause trouble anyway.
- (print "Trailing data in public key: " (get-bytevector-all p)))
- (let ((digest (fingerprint p)))
- (make-openpgp-public-key version subkey? ctime key
- digest)))))
- (else
- (print "Unsupported public key version: " version)
- 'unsupported-public-key-version))))
- (define (openpgp-public-key-primary? key)
- (and (openpgp-public-key? key)
- (not (openpgp-public-key-subkey? key))))
- ;;; User IDs and User attributes
- (define-record-type <openpgp-user-id>
- (make-openpgp-user-id value unparsed)
- openpgp-user-id?
- (value openpgp-user-id-value)
- (unparsed openpgp-user-id-unparsed))
- (define (get-user-id p len)
- (let ((unparsed (get-bytevector-n p len)))
- (make-openpgp-user-id (utf8->string unparsed) unparsed)))
- (define-record-type <openpgp-user-attribute>
- (make-openpgp-user-attribute unparsed)
- openpgp-user-attribute?
- (unparsed openpgp-user-attribute-unparsed))
- (define (get-user-attribute p len)
- (let ((bv (get-bytevector-n p len)))
- ;; TODO: bv contains subpackets. Type 1 is JFIF.
- (make-openpgp-user-attribute bv)))
- ;;; Keyring management
- (define-record-type <openpgp-keyring>
- (openpgp-keyring ids fingerprints)
- openpgp-keyring?
- (ids openpgp-keyring-ids) ;vhash mapping key id to packets
- (fingerprints openpgp-keyring-fingerprints)) ;mapping fingerprint to packets
- (define* (keyring-insert key keyring #:optional (packets '()))
- "Insert the KEY/PACKETS association into KEYRING and return the resulting
- keyring. PACKETS typically contains KEY, an <openpgp-public-key>, alongside
- with additional <openpgp-public-key> records for sub-keys, <openpgp-user-id>
- records, and so on."
- (openpgp-keyring (vhash-consv (openpgp-public-key-id key)
- (cons key packets)
- (openpgp-keyring-ids keyring))
- (vhash-cons (openpgp-public-key-fingerprint key)
- (cons key packets)
- (openpgp-keyring-fingerprints keyring))))
- (define (lookup-key-by-id keyring id)
- "Return two values: the first key with ID in KEYRING, and a list of
- associated packets (user IDs, signatures, etc.). Return #f and the empty list
- of ID was not found. ID must be the 64-bit key ID of the key, an integer."
- (match (vhash-assv id (openpgp-keyring-ids keyring))
- ((_ key packets ...) (values key packets))
- (#f (values #f '()))))
- (define (lookup-key-by-fingerprint keyring fingerprint)
- "Return two values: the key with FINGERPRINT in KEYRING, and a list of
- associated packets (user IDs, signatures, etc.). Return #f and the empty list
- of FINGERPRINT was not found. FINGERPRINT must be a bytevector."
- (match (vhash-assoc fingerprint (openpgp-keyring-fingerprints keyring))
- ((_ key packets ...) (values key packets))
- (#f (values #f '()))))
- ;; Reads a keyring from the binary input port p. It must not be
- ;; ASCII armored.
- (define %empty-keyring
- ;; The empty keyring.
- (openpgp-keyring vlist-null vlist-null))
- (define* (get-openpgp-keyring port
- #:optional (keyring %empty-keyring)
- #:key (limit -1))
- "Read from PORT an OpenPGP keyring in binary format; return a keyring based
- on all the OpenPGP primary keys that were read. The returned keyring
- complements KEYRING. LIMIT is the maximum number of keys to read, or -1 if
- there is no limit."
- (let lp ((pkt (get-packet port))
- (limit limit)
- (keyring keyring))
- (print "#;key " pkt)
- (cond ((or (zero? limit) (eof-object? pkt))
- keyring)
- ((openpgp-public-key-primary? pkt)
- ;; Read signatures, user id's, subkeys
- (let lp* ((pkt (get-packet port))
- (pkts (list pkt))
- (keys (list pkt)))
- (print "#;keydata " pkt)
- (cond ((or (eof-object? pkt)
- (eq? pkt 'unsupported-public-key-version)
- (openpgp-public-key-primary? pkt))
- ;; KEYRING is indexed by key-id. Key ids for both the
- ;; primary key and subkeys all point to the list of
- ;; packets.
- (lp pkt
- (- limit 1)
- (fold (cute keyring-insert <> <> (reverse pkts))
- keyring keys)))
- ((openpgp-public-key? pkt) ;subkey
- (lp* (get-packet port) (cons pkt pkts)
- (cons pkt keys)))
- (else
- (lp* (get-packet port) (cons pkt pkts) keys)))))
- (else
- ;; Skip until there's a primary key. Ignore errors...
- (lp (get-packet port) limit keyring)))))
- ;;;
- ;;; Radix-64 (RFC4880).
- ;;;
- (define (crc24 bv)
- "Compute a CRC24 as described in RFC4880, Section 6.1."
- ;; We used to have it implemented in Scheme but the C version here makes
- ;; 'load-keyring-from-reference' 18% faster when loading the 72
- ;; ASCII-armored files of today's Guix keyring.
- (bytevector->uint (bytevector-hash bv (hash-algorithm crc24-rfc2440))))
- (define %begin-block-prefix "-----BEGIN ")
- (define %begin-block-suffix "-----")
- (define %end-block-prefix "-----END ")
- (define %end-block-suffix "-----")
- (define (read-radix-64 port)
- "Read from PORT an ASCII-armored Radix-64 stream, decode it, and return the
- result as a bytevector as well as the type, a string such as \"PGP MESSAGE\".
- Return #f if PORT does not contain a valid Radix-64 stream, and the
- end-of-file object if the Radix-64 sequence was truncated."
- ;; This is the same as 'get-delimited-base64', except that it implements the
- ;; CRC24 check.
- (define (skip-headers port)
- ;; Skip the Radix-64 "armor headers".
- (match (read-line port)
- ((? eof-object? eof) eof)
- ((= string-trim-both "") "")
- (_ (skip-headers port))))
- (let ((line (string-trim-right (read-line port))))
- (if (and (string-prefix? %begin-block-prefix line)
- (string-suffix? %begin-block-suffix line))
- (let* ((kind (string-drop-right
- (string-drop line (string-length %begin-block-prefix))
- (string-length %begin-block-suffix)))
- (end (string-append %end-block-prefix kind
- %end-block-suffix)))
- (skip-headers port)
- (let loop ((lines '()))
- (let ((line (read-line port)))
- (match line
- ((? eof-object? eof)
- (values eof kind))
- ((= string-trim-both "")
- (loop lines))
- ((= string-trim-both str)
- (if (string=? str end)
- (match lines
- ((crc lines ...)
- ;; The last line should be the CRC, starting with an
- ;; "=" sign.
- (let ((crc (and (string-prefix? "=" crc)
- (base64-decode (string-drop crc 1))))
- (data (base64-decode
- (string-concatenate-reverse lines))))
- (if (and crc (= (bytevector->uint crc) (crc24 data)))
- (values data kind)
- (values #f kind))))
- (_
- (values #f kind)))
- (loop (cons str lines))))))))
- (values #f #f))))
- (define (string->openpgp-packet str)
- "Read STR, an ASCII-armored OpenPGP packet, and return the corresponding
- OpenPGP record."
- (get-packet
- (open-bytevector-input-port (call-with-input-string str read-radix-64))))
|