//! End-to-end encryption support. use std::io::Cursor; use anyhow::Result; use mail_builder::mime::MimePart; use crate::aheader::{Aheader, EncryptPreference}; use crate::context::Context; use crate::key::{SignedPublicKey, load_self_public_key, load_self_secret_key}; use crate::pgp::{self, SeipdVersion}; #[derive(Debug)] pub struct EncryptHelper { pub addr: String, pub public_key: SignedPublicKey, } impl EncryptHelper { pub async fn new(context: &Context) -> Result { let addr = context.get_primary_self_addr().await?; let public_key = load_self_public_key(context).await?; Ok(EncryptHelper { addr, public_key }) } pub fn get_aheader(&self) -> Aheader { Aheader { addr: self.addr.clone(), public_key: self.public_key.clone(), prefer_encrypt: EncryptPreference::Mutual, verified: false, } } /// Tries to encrypt the passed in `mail`. pub async fn encrypt( self, context: &Context, keyring: Vec, mail_to_encrypt: MimePart<'static>, compress: bool, anonymous_recipients: bool, seipd_version: SeipdVersion, ) -> Result { let sign_key = load_self_secret_key(context).await?; let mut raw_message = Vec::new(); let cursor = Cursor::new(&mut raw_message); mail_to_encrypt.clone().write_part(cursor).ok(); let ctext = pgp::pk_encrypt( raw_message, keyring, sign_key, compress, anonymous_recipients, seipd_version, ) .await?; Ok(ctext) } /// Symmetrically encrypt the message. This is used for broadcast channels. /// `shared secret` is the secret that will be used for symmetric encryption. pub async fn encrypt_symmetrically( self, context: &Context, shared_secret: &str, mail_to_encrypt: MimePart<'static>, compress: bool, ) -> Result { let sign_key = load_self_secret_key(context).await?; let mut raw_message = Vec::new(); let cursor = Cursor::new(&mut raw_message); mail_to_encrypt.clone().write_part(cursor).ok(); let ctext = pgp::symm_encrypt_message(raw_message, sign_key, shared_secret, compress).await?; Ok(ctext) } /// Signs the passed-in `mail` using the private key from `context`. /// Returns the payload and the signature. pub async fn sign(self, context: &Context, mail: &MimePart<'static>) -> Result { let sign_key = load_self_secret_key(context).await?; let mut buffer = Vec::new(); mail.clone().write_part(&mut buffer)?; let signature = pgp::pk_calc_signature(buffer, &sign_key)?; Ok(signature) } } /// Ensures a private key exists for the configured user. /// /// Normally the private key is generated when the first message is /// sent but in a few locations there are no such guarantees, /// e.g. when exporting keys, and calling this function ensures a /// private key will be present. // TODO, remove this once deltachat::key::Key no longer exists. pub async fn ensure_secret_key_exists(context: &Context) -> Result<()> { load_self_public_key(context).await?; Ok(()) } #[cfg(test)] mod tests { use super::*; use crate::chat::send_text_msg; use crate::config::Config; use crate::message::Message; use crate::receive_imf::receive_imf; use crate::test_utils::{TestContext, TestContextManager}; mod ensure_secret_key_exists { use super::*; #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_prexisting() { let t = TestContext::new_alice().await; assert!(ensure_secret_key_exists(&t).await.is_ok()); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_not_configured() { let t = TestContext::new().await; assert!(ensure_secret_key_exists(&t).await.is_err()); } } #[test] fn test_mailmime_parse() { let plain = b"Chat-Disposition-Notification-To: hello@world.de Chat-Group-ID: CovhGgau8M- Chat-Group-Name: Delta Chat Dev Subject: =?utf-8?Q?Chat=3A?= Delta Chat =?utf-8?Q?Dev=3A?= sidenote for =?utf-8?Q?all=3A?= rust core master ... Content-Type: text/plain; charset=\"utf-8\"; protected-headers=\"v1\" Content-Transfer-Encoding: quoted-printable sidenote for all: things are trick atm recomm= end not to try to run with desktop or ios unless you are ready to hunt bugs -- =20 Sent with my Delta Chat Messenger: https://delta.chat"; let mail = mailparse::parse_mail(plain).expect("failed to parse valid message"); assert_eq!(mail.headers.len(), 6); assert!( mail.get_body().unwrap().starts_with( "sidenote for all: things are trick atm recommend not to try to run with desktop or ios unless you are ready to hunt bugs") ); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_chatmail_can_send_unencrypted() -> Result<()> { let mut tcm = TestContextManager::new(); let bob = &tcm.bob().await; bob.set_config_bool(Config::IsChatmail, true).await?; let bob_chat_id = receive_imf( bob, b"From: alice@example.org\n\ To: bob@example.net\n\ Message-ID: <2222@example.org>\n\ Date: Sun, 22 Mar 3000 22:37:58 +0000\n\ \n\ Hello\n", false, ) .await? .unwrap() .chat_id; bob_chat_id.accept(bob).await?; send_text_msg(bob, bob_chat_id, "hi".to_string()).await?; let sent_msg = bob.pop_sent_msg().await; let msg = Message::load_from_db(bob, sent_msg.sender_msg_id).await?; assert!(!msg.get_showpadlock()); Ok(()) } }