libgocryptfs/internal/siv_aead/siv_aead.go

103 lines
2.8 KiB
Go
Raw Normal View History

2016-09-26 23:06:40 +02:00
// Package siv_aead wraps the functions provided by siv
// in a crypto.AEAD interface.
package siv_aead
import (
2016-10-02 06:14:18 +02:00
"crypto/cipher"
"log"
2016-10-02 06:14:18 +02:00
"github.com/aperturerobotics/jacobsa-crypto/siv"
2016-09-26 23:06:40 +02:00
)
type sivAead struct {
key []byte
}
2016-10-02 06:14:18 +02:00
var _ cipher.AEAD = &sivAead{}
const (
2017-04-29 14:50:58 +02:00
// KeyLen is the required key length. The SIV algorithm supports other lengths,
// but we only support 64.
KeyLen = 64
// NonceSize is the required nonce/IV length.
// SIV supports any nonce size, but in gocryptfs we exclusively use 16.
NonceSize = 16
// Overhead is the number of bytes added for integrity checking
Overhead = 16
)
2016-10-02 06:14:18 +02:00
// New returns a new cipher.AEAD implementation.
func New(key []byte) cipher.AEAD {
if len(key) != KeyLen {
2017-04-29 14:50:58 +02:00
// SIV supports 32, 48 or 64-byte keys, but in gocryptfs we
// exclusively use 64.
log.Panicf("Key must be %d byte long (you passed %d)", KeyLen, len(key))
}
return new2(key)
}
// Same as "New" without the 64-byte restriction.
func new2(keyIn []byte) cipher.AEAD {
// Create a private copy so the caller can zero the one he owns
key := append([]byte{}, keyIn...)
2016-09-26 23:06:40 +02:00
return &sivAead{
key: key,
}
}
func (s *sivAead) NonceSize() int {
// SIV supports any nonce size, but in gocryptfs we exclusively use 16.
return NonceSize
2016-09-26 23:06:40 +02:00
}
func (s *sivAead) Overhead() int {
return Overhead
2016-09-26 23:06:40 +02:00
}
2017-09-17 11:42:46 +02:00
// Seal encrypts "in" using "nonce" and "authData" and appends the result to "dst"
2016-09-26 23:06:40 +02:00
func (s *sivAead) Seal(dst, nonce, plaintext, authData []byte) []byte {
if len(nonce) != 16 {
// SIV supports any nonce size, but in gocryptfs we exclusively use 16.
log.Panic("nonce must be 16 bytes long")
2016-09-26 23:06:40 +02:00
}
if len(s.key) == 0 {
log.Panic("Key has been wiped?")
}
// https://github.com/aperturerobotics/jacobsa-crypto/blob/master/siv/encrypt.go#L48:
2016-09-26 23:06:40 +02:00
// As per RFC 5297 section 3, you may use this function for nonce-based
// authenticated encryption by passing a nonce as the last associated
// data element.
associated := [][]byte{authData, nonce}
out, err := siv.Encrypt(dst, s.key, plaintext, associated)
if err != nil {
log.Panic(err)
2016-09-26 23:06:40 +02:00
}
return out
}
2017-09-17 11:42:46 +02:00
// Open decrypts "in" using "nonce" and "authData" and appends the result to "dst"
2016-09-26 23:06:40 +02:00
func (s *sivAead) Open(dst, nonce, ciphertext, authData []byte) ([]byte, error) {
if len(nonce) != 16 {
// SIV supports any nonce size, but in gocryptfs we exclusively use 16.
log.Panic("nonce must be 16 bytes long")
2016-09-26 23:06:40 +02:00
}
if len(s.key) == 0 {
log.Panic("Key has been wiped?")
}
2016-09-26 23:06:40 +02:00
associated := [][]byte{authData, nonce}
dec, err := siv.Decrypt(s.key, ciphertext, associated)
return append(dst, dec...), err
}
// Wipe tries to wipe the AES key from memory by overwriting it with zeros
// and setting the reference to nil.
//
// This is not bulletproof due to possible GC copies, but
// still raises to bar for extracting the key.
func (s *sivAead) Wipe() {
for i := range s.key {
s.key[i] = 0
}
s.key = nil
}