public override void Parse(TreeBuilder tree) { S2K = new S2K(); Version = tree.ReadByte("Version"); S2K.SymAlgo = tree.ReadByte("Symmetric Algorithm", SymmetricAlgorithmTypes.Get); byte S2KSpecifier = tree.ReadByte("S2K Specifier", S2KTypes.Get); if (S2KSpecifier != S2KTypes.Salted && S2KSpecifier != S2KTypes.Simple && S2KSpecifier != S2KTypes.IteratedAndSalted) { throw new InvalidDataException("Invalid S2K Specifier"); } S2K.HashAlgorithm = tree.ReadByte("Hash Algorithm", HashAlgorithmTypes.Get); if (S2KSpecifier == S2KTypes.Salted || S2KSpecifier == S2KTypes.IteratedAndSalted) { S2K.Salt = tree.ReadBytes("Salt", 8); if (S2KSpecifier == S2KTypes.IteratedAndSalted) { byte CodedCount = tree.ReadByte("Coded Iteration"); S2K.ByteCount = (16 + (CodedCount & 15)) << ((CodedCount >> 4) + 6); } } if (tree.IsMoreData()) { EncryptedSessionKey = tree.ReadBytes("Encrypted Session Key"); } else { EncryptedSessionKey = null; } }
public override void Parse(TreeBuilder tree) { tree.SetBookMark(); Version = tree.ReadByte("Version"); tree.ReadFormatted("Creation Time", BlockFormat.UnixTime); if (Version == 2 || Version == 3 || Version == 4) { if (Version != 4) { tree.ReadNumber("Days Valid", 2); } } else { throw new NotImplementedException("Unknown Public Key Packet Version Code: " + Version.ToString()); } byte AlgoCode = tree.ReadByte("Public Key Algorithm", PKAlgorithmTypes.Get); PublicKeyAlgorithm = PKAlgorithm.CreatePKAlgorithm(AlgoCode); if (PublicKeyAlgorithm == null) { tree.ReadBytes("Unknown Public Key Algorithm"); return; } PublicKeyAlgorithm.LoadPublicKey(tree); PacketDataPublicKey = tree.ReadBytesFromBookMark(); if (Version < 4) { // Only RSA is supported var ModN = ((RSA)PublicKeyAlgorithm).ModN; //KeyId = BitConverter.ToString(ModN, ModN.Length - 8); KeyId = ModN.SubArray(ModN.Length - 8, 8); } else { int l = PacketDataPublicKey.Length; SHA1 shaM = new SHA1Managed(); byte[] HashContext = new byte[l + 3]; HashContext[0] = 0x99; HashContext[1] = (byte)((l & 0xFF00) >> 8); HashContext[2] = (byte)(l & 0x00FF); Array.Copy(PacketDataPublicKey, 0, HashContext, 3, l); byte[] result = shaM.ComputeHash(HashContext); //KeyId = BitConverter.ToString(result, result.Length - 8); KeyId = result.SubArray(result.Length - 8, 8); } tree.AddCalculated("Key Id", BitConverter.ToString(KeyId), KeyId); }
private void ReadByteTags(TreeBuilder tree, string Label, int DataLength, Func <byte, string> DescFunc) { tree.AddNode(Label); tree.PushByteBlock(); //tree.AddChildLevel = true; while (DataLength-- > 0) { tree.SetBookMark(); byte ByteCode = tree.ReadByte(); tree.GoToBookMark(); //tree.Seek(-1); tree.ReadByte(DescFunc(ByteCode)); } tree.PopByteBlock(); }
public override void Parse(TreeBuilder tree) { tree.ReadByte("Data Format", true); byte FileNameLength = tree.ReadByte(); byte[] FileNameBytes = tree.ReadBytes("File Name", FileNameLength, true); ExtractFileName = System.Text.Encoding.UTF8.GetString(FileNameBytes); tree.ReadFormatted("Date/Time", BlockFormat.UnixTime); tree.RemainingBytes("Literal Data"); ThisBlock = tree.CurrentBlock; ThisBlock.ProcessBlock += ExtractData; }
public override void Parse(TreeBuilder tree) { tree.ReadByte("Compression Algorithm", CompressionAlgorithmTypes.Get); tree.SkipBytes("Compressed Data"); ThisBlock = tree.CurrentBlock; ThisBlock.ProcessBlock += ExtractData; }
//public HashAlgorithm HashAlgo { private set; get; } public override void Parse(TreeBuilder tree) { Version = tree.ReadByte("Version"); SignatureType = tree.ReadByte("Signature Type", SignatureTypes.Get); HashAlgorithm = tree.ReadByte("Hash Algorithm", HashAlgorithmTypes.Get); //try //{ // HashAlgo = null; // HashAlgo = HashAlgorithmTypes.GetHashAlgoManaged(HashAlgorithm); //} //catch { } PKAlgorithm = tree.ReadByte("Primary Key Algorithm", PKAlgorithmTypes.Get); tree.ReadBytes("Key ID", 8); Flag = tree.ReadByte("Flag"); }
public override void Parse(TreeBuilder tree) { Version = tree.ReadByte("Version"); KeyId = tree.ReadBytes("Key Id", 8); PKAlgoCode = tree.ReadByte("PK Algorithm", PKAlgorithmTypes.Get); var PublicKeyAlgorithm = PKAlgorithm.CreatePKAlgorithm(PKAlgoCode); PublicKeyTransformedData = null; if (PublicKeyAlgorithm == null) { tree.ReadBytes("Unknowon Encrypted Session Key"); } else { PublicKeyTransformedData = PublicKeyAlgorithm.LoadPublicKeyTransformedData(tree); } }
public override void Parse(TreeBuilder tree) { Version = tree.ReadByte("Version"); var block = tree.SkipBytes("Encrypted Data"); block.ProcessBlock += ExtractData; ThisBlock = block; }
public override void Parse(TreeBuilder tree) { base.Parse(tree); bool IsEncrypted = true; tree.SetBookMark(); var S2K = new S2K { S2KUsage = tree.ReadByte() }; if (S2K.S2KUsage == 254 || S2K.S2KUsage == 255) { S2K.SymAlgo = tree.ReadByte("Symmetric Algorithm", SymmetricAlgorithmTypes.Get); byte S2KSpecifier = tree.ReadByte("S2K Specifier", S2KTypes.Get); if (S2KSpecifier != S2KTypes.Salted && S2KSpecifier != S2KTypes.Simple && S2KSpecifier != S2KTypes.IteratedAndSalted) { //tree.AddCalculated("Invalid S2K", S2KSpecifier.ToString()); tree.AddCalculated("Unable to Process", S2KSpecifier.ToString(), ByteBlockType.CalculatedError); return; } S2K.HashAlgorithm = tree.ReadByte("Hash Algorithm", HashAlgorithmTypes.Get); if (S2KSpecifier == S2KTypes.Salted || S2KSpecifier == S2KTypes.IteratedAndSalted) { S2K.Salt = tree.ReadBytes("Salt", 8); if (S2KSpecifier == S2KTypes.IteratedAndSalted) { byte CodedCount = tree.ReadByte("Coded Iteration"); S2K.ByteCount = (16 + (CodedCount & 15)) << ((CodedCount >> 4) + 6); } } int BlockSizeBytes = SymmetricAlgorithmTypes.GetBlockSize(S2K.SymAlgo) / 8; S2K.IV = tree.ReadBytes("IV", BlockSizeBytes); } else { byte SymAlgo = S2K.S2KUsage; S2K.SymAlgo = SymAlgo; if (SymAlgo != 0) { tree.GoToBookMark(); tree.ReadByte("Symmetric Algorithm", SymmetricAlgorithmTypes.Get); int BlockSize = SymmetricAlgorithmTypes.GetBlockSize(SymAlgo) / 8; S2K.IV = tree.ReadBytes("IV", BlockSize); } else { IsEncrypted = false; } } PublicKeyAlgorithm.S2K = S2K; if (IsEncrypted) { byte[] Encrypted = tree.ReadBytes("Encrypted Secret Key"); PublicKeyAlgorithm.EncryptedPrivateKey = Encrypted; tree.CurrentBlock.ProcessBlock += ExtractPrivateKey; SecretKeyNode = tree.CurrentBlock; } else { byte[] ClearBytes = tree.ReadBytes("Unencrypted Secret Key"); var SecBlockClear = PublicKeyAlgorithm.SetPrivate(ClearBytes); tree.AddChild(PublicKeyAlgorithm.GetPrivateByteBlocks()); } }
public override void Parse(TreeBuilder tree) { Version = tree.ReadByte("Version"); SignatureType = tree.ReadByte("Signature Type", SignatureTypes.Get); PKAlgo = tree.ReadByte("Public Key Algorithm", PKAlgorithmTypes.Get); if (Version == 4) { uint SubPacketLength; HashAlgorithm = tree.ReadByte("Hash Algorithm", HashAlgorithmTypes.Get); SubPacketLength = tree.ReadNumber(2); tree.SetBookMark(); HashedSubPacketBytes = tree.ReadBytes("Hashed Sub Packet", (int)SubPacketLength); //tree.Seek(-SubPacketLength); tree.GoToBookMark(); var HashedSubPackets = new SignatureSubPackets(); HashedSubPackets.Parse(tree, (int)SubPacketLength); SubPacketLength = tree.ReadNumber(2); tree.SetBookMark(); UnHashedSubPacketBytes = tree.ReadBytes("Unhashed Sub Packet", (int)SubPacketLength); //tree.Seek(-SubPacketLength); tree.GoToBookMark(); var UnHashedSubPackets = new SignatureSubPackets(); UnHashedSubPackets.Parse(tree, (int)SubPacketLength); Issuer = UnHashedSubPackets.Issuer; tree.ReadBytes("Left 16 Bit Hash", 2); var PublicKeyAlgorithm = PKAlgorithm.CreatePKAlgorithm(PKAlgo); SecretKeyTransformedData = null; if (PublicKeyAlgorithm == null) { tree.ReadBytes("Unknowon Signature"); } else { SecretKeyTransformedData = PublicKeyAlgorithm.LoadSecretKeyTransformedData(tree); } //if (PublicKeySignature != null) //{ // tree.AddNode("Signature"); // tree.AddChild(PublicKeySignature.LoadSignatureValue(tree.ReadMPIBytes)); //} //else // tree.ReadBytes("Signature"); } else { throw new NotImplementedException("Not Implemented"); } }
public void Parse(TreeBuilder tree, int SubPacketsLength) { long SubPacketsEnd = tree.BaseReader.Position + SubPacketsLength; tree.PushByteBlock(); //if (tree.Position < SubPacketsEnd) // tree.AddChildLevel = true; while (tree.BaseReader.Position < SubPacketsEnd) { byte LengthFinder = tree.ReadByte(); uint SubPacketLength = 0; if (LengthFinder < 192) { SubPacketLength = LengthFinder; } else if (LengthFinder < 255) { byte b = tree.ReadByte(); SubPacketLength = (uint)((LengthFinder - 192) << 8) + b + 192; } else { byte[] b = new byte[4]; b[0] = tree.ReadByte(); b[1] = tree.ReadByte(); b[2] = tree.ReadByte(); b[3] = tree.ReadByte(); SubPacketLength = Program.GetBigEndian(b, 0, 4); } byte SubPacketType = tree.ReadByte(); string Label = SignatureSubPacketTypes.Get(SubPacketType); int DataLength = (int)SubPacketLength - 1; if (SubPacketType == SignatureSubPacketTypes.SignatureCreationTime) { tree.ReadFormatted(Label, BlockFormat.UnixTime); } else if (SubPacketType == SignatureSubPacketTypes.Issuer) { Issuer = tree.ReadBytes(Label, 8); } else if (SubPacketType == SignatureSubPacketTypes.KeyExpirationTime) { tree.ReadFormatted(Label, BlockFormat.Days); } else if (SubPacketType == SignatureSubPacketTypes.PreferredSymmetricAlgorithm) { ReadByteTags(tree, Label, DataLength, SymmetricAlgorithmTypes.Get); } else if (SubPacketType == SignatureSubPacketTypes.PreferredHashAlgorithm) { ReadByteTags(tree, Label, DataLength, HashAlgorithmTypes.Get); } else if (SubPacketType == SignatureSubPacketTypes.PreferredCompressionAlgorithm) { ReadByteTags(tree, Label, DataLength, CompressionAlgorithmTypes.Get); } else if (SubPacketType == SignatureSubPacketTypes.KeyFlags) { ReadByteTags(tree, Label, DataLength, KeyFlagsTypes.Get); } else if (SubPacketType == SignatureSubPacketTypes.PrimaryUserId) { tree.ReadBytes(Label, DataLength); } else if (SubPacketType == SignatureSubPacketTypes.ReasonForRevocation) { tree.AddNode(Label); tree.PushByteBlock(); tree.ReadByte("Reason", RevocationReasonTypes.Get); tree.ReadBytes("Message", DataLength - 1); tree.PopByteBlock(); } else { tree.ReadBytes(Label, DataLength); } } tree.PopByteBlock(); }