xref: /aosp_15_r20/external/tink/go/aead/aead_factory.go (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2018 Google LLC
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Changpackage aead
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Changimport (
20*e7b1675dSTing-Kang Chang	"fmt"
21*e7b1675dSTing-Kang Chang
22*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/core/cryptofmt"
23*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/core/primitiveset"
24*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/internal/internalregistry"
25*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/internal/monitoringutil"
26*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/keyset"
27*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/monitoring"
28*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/tink"
29*e7b1675dSTing-Kang Chang)
30*e7b1675dSTing-Kang Chang
31*e7b1675dSTing-Kang Chang// New returns an AEAD primitive from the given keyset handle.
32*e7b1675dSTing-Kang Changfunc New(handle *keyset.Handle) (tink.AEAD, error) {
33*e7b1675dSTing-Kang Chang	ps, err := handle.Primitives()
34*e7b1675dSTing-Kang Chang	if err != nil {
35*e7b1675dSTing-Kang Chang		return nil, fmt.Errorf("aead_factory: cannot obtain primitive set: %s", err)
36*e7b1675dSTing-Kang Chang	}
37*e7b1675dSTing-Kang Chang	return newWrappedAead(ps)
38*e7b1675dSTing-Kang Chang}
39*e7b1675dSTing-Kang Chang
40*e7b1675dSTing-Kang Chang// wrappedAead is an AEAD implementation that uses the underlying primitive set for encryption
41*e7b1675dSTing-Kang Chang// and decryption.
42*e7b1675dSTing-Kang Changtype wrappedAead struct {
43*e7b1675dSTing-Kang Chang	ps        *primitiveset.PrimitiveSet
44*e7b1675dSTing-Kang Chang	encLogger monitoring.Logger
45*e7b1675dSTing-Kang Chang	decLogger monitoring.Logger
46*e7b1675dSTing-Kang Chang}
47*e7b1675dSTing-Kang Chang
48*e7b1675dSTing-Kang Changfunc newWrappedAead(ps *primitiveset.PrimitiveSet) (*wrappedAead, error) {
49*e7b1675dSTing-Kang Chang	if _, ok := (ps.Primary.Primitive).(tink.AEAD); !ok {
50*e7b1675dSTing-Kang Chang		return nil, fmt.Errorf("aead_factory: not an AEAD primitive")
51*e7b1675dSTing-Kang Chang	}
52*e7b1675dSTing-Kang Chang
53*e7b1675dSTing-Kang Chang	for _, primitives := range ps.Entries {
54*e7b1675dSTing-Kang Chang		for _, p := range primitives {
55*e7b1675dSTing-Kang Chang			if _, ok := (p.Primitive).(tink.AEAD); !ok {
56*e7b1675dSTing-Kang Chang				return nil, fmt.Errorf("aead_factory: not an AEAD primitive")
57*e7b1675dSTing-Kang Chang			}
58*e7b1675dSTing-Kang Chang		}
59*e7b1675dSTing-Kang Chang	}
60*e7b1675dSTing-Kang Chang	encLogger, decLogger, err := createLoggers(ps)
61*e7b1675dSTing-Kang Chang	if err != nil {
62*e7b1675dSTing-Kang Chang		return nil, err
63*e7b1675dSTing-Kang Chang	}
64*e7b1675dSTing-Kang Chang	return &wrappedAead{
65*e7b1675dSTing-Kang Chang		ps:        ps,
66*e7b1675dSTing-Kang Chang		encLogger: encLogger,
67*e7b1675dSTing-Kang Chang		decLogger: decLogger,
68*e7b1675dSTing-Kang Chang	}, nil
69*e7b1675dSTing-Kang Chang}
70*e7b1675dSTing-Kang Chang
71*e7b1675dSTing-Kang Changfunc createLoggers(ps *primitiveset.PrimitiveSet) (monitoring.Logger, monitoring.Logger, error) {
72*e7b1675dSTing-Kang Chang	if len(ps.Annotations) == 0 {
73*e7b1675dSTing-Kang Chang		return &monitoringutil.DoNothingLogger{}, &monitoringutil.DoNothingLogger{}, nil
74*e7b1675dSTing-Kang Chang	}
75*e7b1675dSTing-Kang Chang	client := internalregistry.GetMonitoringClient()
76*e7b1675dSTing-Kang Chang	keysetInfo, err := monitoringutil.KeysetInfoFromPrimitiveSet(ps)
77*e7b1675dSTing-Kang Chang	if err != nil {
78*e7b1675dSTing-Kang Chang		return nil, nil, err
79*e7b1675dSTing-Kang Chang	}
80*e7b1675dSTing-Kang Chang	encLogger, err := client.NewLogger(&monitoring.Context{
81*e7b1675dSTing-Kang Chang		Primitive:   "aead",
82*e7b1675dSTing-Kang Chang		APIFunction: "encrypt",
83*e7b1675dSTing-Kang Chang		KeysetInfo:  keysetInfo,
84*e7b1675dSTing-Kang Chang	})
85*e7b1675dSTing-Kang Chang	if err != nil {
86*e7b1675dSTing-Kang Chang		return nil, nil, err
87*e7b1675dSTing-Kang Chang	}
88*e7b1675dSTing-Kang Chang	decLogger, err := client.NewLogger(&monitoring.Context{
89*e7b1675dSTing-Kang Chang		Primitive:   "aead",
90*e7b1675dSTing-Kang Chang		APIFunction: "decrypt",
91*e7b1675dSTing-Kang Chang		KeysetInfo:  keysetInfo,
92*e7b1675dSTing-Kang Chang	})
93*e7b1675dSTing-Kang Chang	if err != nil {
94*e7b1675dSTing-Kang Chang		return nil, nil, err
95*e7b1675dSTing-Kang Chang	}
96*e7b1675dSTing-Kang Chang	return encLogger, decLogger, nil
97*e7b1675dSTing-Kang Chang}
98*e7b1675dSTing-Kang Chang
99*e7b1675dSTing-Kang Chang// Encrypt encrypts the given plaintext with the given associatedData.
100*e7b1675dSTing-Kang Chang// It returns the concatenation of the primary's identifier and the ciphertext.
101*e7b1675dSTing-Kang Changfunc (a *wrappedAead) Encrypt(plaintext, associatedData []byte) ([]byte, error) {
102*e7b1675dSTing-Kang Chang	primary := a.ps.Primary
103*e7b1675dSTing-Kang Chang	p, ok := (primary.Primitive).(tink.AEAD)
104*e7b1675dSTing-Kang Chang	if !ok {
105*e7b1675dSTing-Kang Chang		return nil, fmt.Errorf("aead_factory: not an AEAD primitive")
106*e7b1675dSTing-Kang Chang	}
107*e7b1675dSTing-Kang Chang	ct, err := p.Encrypt(plaintext, associatedData)
108*e7b1675dSTing-Kang Chang	if err != nil {
109*e7b1675dSTing-Kang Chang		a.encLogger.LogFailure()
110*e7b1675dSTing-Kang Chang		return nil, err
111*e7b1675dSTing-Kang Chang	}
112*e7b1675dSTing-Kang Chang	a.encLogger.Log(primary.KeyID, len(plaintext))
113*e7b1675dSTing-Kang Chang	if len(primary.Prefix) == 0 {
114*e7b1675dSTing-Kang Chang		return ct, nil
115*e7b1675dSTing-Kang Chang	}
116*e7b1675dSTing-Kang Chang	output := make([]byte, 0, len(primary.Prefix)+len(ct))
117*e7b1675dSTing-Kang Chang	output = append(output, primary.Prefix...)
118*e7b1675dSTing-Kang Chang	output = append(output, ct...)
119*e7b1675dSTing-Kang Chang	return output, nil
120*e7b1675dSTing-Kang Chang}
121*e7b1675dSTing-Kang Chang
122*e7b1675dSTing-Kang Chang// Decrypt decrypts the given ciphertext and authenticates it with the given
123*e7b1675dSTing-Kang Chang// associatedData. It returns the corresponding plaintext if the
124*e7b1675dSTing-Kang Chang// ciphertext is authenticated.
125*e7b1675dSTing-Kang Changfunc (a *wrappedAead) Decrypt(ciphertext, associatedData []byte) ([]byte, error) {
126*e7b1675dSTing-Kang Chang	// try non-raw keys
127*e7b1675dSTing-Kang Chang	prefixSize := cryptofmt.NonRawPrefixSize
128*e7b1675dSTing-Kang Chang	if len(ciphertext) > prefixSize {
129*e7b1675dSTing-Kang Chang		prefix := ciphertext[:prefixSize]
130*e7b1675dSTing-Kang Chang		ctNoPrefix := ciphertext[prefixSize:]
131*e7b1675dSTing-Kang Chang		entries, err := a.ps.EntriesForPrefix(string(prefix))
132*e7b1675dSTing-Kang Chang		if err == nil {
133*e7b1675dSTing-Kang Chang			for i := 0; i < len(entries); i++ {
134*e7b1675dSTing-Kang Chang				p, ok := (entries[i].Primitive).(tink.AEAD)
135*e7b1675dSTing-Kang Chang				if !ok {
136*e7b1675dSTing-Kang Chang					return nil, fmt.Errorf("aead_factory: not an AEAD primitive")
137*e7b1675dSTing-Kang Chang				}
138*e7b1675dSTing-Kang Chang
139*e7b1675dSTing-Kang Chang				pt, err := p.Decrypt(ctNoPrefix, associatedData)
140*e7b1675dSTing-Kang Chang				if err == nil {
141*e7b1675dSTing-Kang Chang					a.decLogger.Log(entries[i].KeyID, len(ctNoPrefix))
142*e7b1675dSTing-Kang Chang					return pt, nil
143*e7b1675dSTing-Kang Chang				}
144*e7b1675dSTing-Kang Chang			}
145*e7b1675dSTing-Kang Chang		}
146*e7b1675dSTing-Kang Chang	}
147*e7b1675dSTing-Kang Chang	// try raw keys
148*e7b1675dSTing-Kang Chang	entries, err := a.ps.RawEntries()
149*e7b1675dSTing-Kang Chang	if err == nil {
150*e7b1675dSTing-Kang Chang		for i := 0; i < len(entries); i++ {
151*e7b1675dSTing-Kang Chang			p, ok := (entries[i].Primitive).(tink.AEAD)
152*e7b1675dSTing-Kang Chang			if !ok {
153*e7b1675dSTing-Kang Chang				return nil, fmt.Errorf("aead_factory: not an AEAD primitive")
154*e7b1675dSTing-Kang Chang			}
155*e7b1675dSTing-Kang Chang
156*e7b1675dSTing-Kang Chang			pt, err := p.Decrypt(ciphertext, associatedData)
157*e7b1675dSTing-Kang Chang			if err == nil {
158*e7b1675dSTing-Kang Chang				a.decLogger.Log(entries[i].KeyID, len(ciphertext))
159*e7b1675dSTing-Kang Chang				return pt, nil
160*e7b1675dSTing-Kang Chang			}
161*e7b1675dSTing-Kang Chang		}
162*e7b1675dSTing-Kang Chang	}
163*e7b1675dSTing-Kang Chang	// nothing worked
164*e7b1675dSTing-Kang Chang	a.decLogger.LogFailure()
165*e7b1675dSTing-Kang Chang	return nil, fmt.Errorf("aead_factory: decryption failed")
166*e7b1675dSTing-Kang Chang}
167