1*e7b1675dSTing-Kang Chang// Copyright 2018 Google LLC 2*e7b1675dSTing-Kang Chang// 3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang// 7*e7b1675dSTing-Kang Chang// http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang// 9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang// limitations under the License. 14*e7b1675dSTing-Kang Chang// 15*e7b1675dSTing-Kang Chang//////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Changpackage aead 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Changimport ( 20*e7b1675dSTing-Kang Chang "fmt" 21*e7b1675dSTing-Kang Chang 22*e7b1675dSTing-Kang Chang "github.com/google/tink/go/core/cryptofmt" 23*e7b1675dSTing-Kang Chang "github.com/google/tink/go/core/primitiveset" 24*e7b1675dSTing-Kang Chang "github.com/google/tink/go/internal/internalregistry" 25*e7b1675dSTing-Kang Chang "github.com/google/tink/go/internal/monitoringutil" 26*e7b1675dSTing-Kang Chang "github.com/google/tink/go/keyset" 27*e7b1675dSTing-Kang Chang "github.com/google/tink/go/monitoring" 28*e7b1675dSTing-Kang Chang "github.com/google/tink/go/tink" 29*e7b1675dSTing-Kang Chang) 30*e7b1675dSTing-Kang Chang 31*e7b1675dSTing-Kang Chang// New returns an AEAD primitive from the given keyset handle. 32*e7b1675dSTing-Kang Changfunc New(handle *keyset.Handle) (tink.AEAD, error) { 33*e7b1675dSTing-Kang Chang ps, err := handle.Primitives() 34*e7b1675dSTing-Kang Chang if err != nil { 35*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: cannot obtain primitive set: %s", err) 36*e7b1675dSTing-Kang Chang } 37*e7b1675dSTing-Kang Chang return newWrappedAead(ps) 38*e7b1675dSTing-Kang Chang} 39*e7b1675dSTing-Kang Chang 40*e7b1675dSTing-Kang Chang// wrappedAead is an AEAD implementation that uses the underlying primitive set for encryption 41*e7b1675dSTing-Kang Chang// and decryption. 42*e7b1675dSTing-Kang Changtype wrappedAead struct { 43*e7b1675dSTing-Kang Chang ps *primitiveset.PrimitiveSet 44*e7b1675dSTing-Kang Chang encLogger monitoring.Logger 45*e7b1675dSTing-Kang Chang decLogger monitoring.Logger 46*e7b1675dSTing-Kang Chang} 47*e7b1675dSTing-Kang Chang 48*e7b1675dSTing-Kang Changfunc newWrappedAead(ps *primitiveset.PrimitiveSet) (*wrappedAead, error) { 49*e7b1675dSTing-Kang Chang if _, ok := (ps.Primary.Primitive).(tink.AEAD); !ok { 50*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: not an AEAD primitive") 51*e7b1675dSTing-Kang Chang } 52*e7b1675dSTing-Kang Chang 53*e7b1675dSTing-Kang Chang for _, primitives := range ps.Entries { 54*e7b1675dSTing-Kang Chang for _, p := range primitives { 55*e7b1675dSTing-Kang Chang if _, ok := (p.Primitive).(tink.AEAD); !ok { 56*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: not an AEAD primitive") 57*e7b1675dSTing-Kang Chang } 58*e7b1675dSTing-Kang Chang } 59*e7b1675dSTing-Kang Chang } 60*e7b1675dSTing-Kang Chang encLogger, decLogger, err := createLoggers(ps) 61*e7b1675dSTing-Kang Chang if err != nil { 62*e7b1675dSTing-Kang Chang return nil, err 63*e7b1675dSTing-Kang Chang } 64*e7b1675dSTing-Kang Chang return &wrappedAead{ 65*e7b1675dSTing-Kang Chang ps: ps, 66*e7b1675dSTing-Kang Chang encLogger: encLogger, 67*e7b1675dSTing-Kang Chang decLogger: decLogger, 68*e7b1675dSTing-Kang Chang }, nil 69*e7b1675dSTing-Kang Chang} 70*e7b1675dSTing-Kang Chang 71*e7b1675dSTing-Kang Changfunc createLoggers(ps *primitiveset.PrimitiveSet) (monitoring.Logger, monitoring.Logger, error) { 72*e7b1675dSTing-Kang Chang if len(ps.Annotations) == 0 { 73*e7b1675dSTing-Kang Chang return &monitoringutil.DoNothingLogger{}, &monitoringutil.DoNothingLogger{}, nil 74*e7b1675dSTing-Kang Chang } 75*e7b1675dSTing-Kang Chang client := internalregistry.GetMonitoringClient() 76*e7b1675dSTing-Kang Chang keysetInfo, err := monitoringutil.KeysetInfoFromPrimitiveSet(ps) 77*e7b1675dSTing-Kang Chang if err != nil { 78*e7b1675dSTing-Kang Chang return nil, nil, err 79*e7b1675dSTing-Kang Chang } 80*e7b1675dSTing-Kang Chang encLogger, err := client.NewLogger(&monitoring.Context{ 81*e7b1675dSTing-Kang Chang Primitive: "aead", 82*e7b1675dSTing-Kang Chang APIFunction: "encrypt", 83*e7b1675dSTing-Kang Chang KeysetInfo: keysetInfo, 84*e7b1675dSTing-Kang Chang }) 85*e7b1675dSTing-Kang Chang if err != nil { 86*e7b1675dSTing-Kang Chang return nil, nil, err 87*e7b1675dSTing-Kang Chang } 88*e7b1675dSTing-Kang Chang decLogger, err := client.NewLogger(&monitoring.Context{ 89*e7b1675dSTing-Kang Chang Primitive: "aead", 90*e7b1675dSTing-Kang Chang APIFunction: "decrypt", 91*e7b1675dSTing-Kang Chang KeysetInfo: keysetInfo, 92*e7b1675dSTing-Kang Chang }) 93*e7b1675dSTing-Kang Chang if err != nil { 94*e7b1675dSTing-Kang Chang return nil, nil, err 95*e7b1675dSTing-Kang Chang } 96*e7b1675dSTing-Kang Chang return encLogger, decLogger, nil 97*e7b1675dSTing-Kang Chang} 98*e7b1675dSTing-Kang Chang 99*e7b1675dSTing-Kang Chang// Encrypt encrypts the given plaintext with the given associatedData. 100*e7b1675dSTing-Kang Chang// It returns the concatenation of the primary's identifier and the ciphertext. 101*e7b1675dSTing-Kang Changfunc (a *wrappedAead) Encrypt(plaintext, associatedData []byte) ([]byte, error) { 102*e7b1675dSTing-Kang Chang primary := a.ps.Primary 103*e7b1675dSTing-Kang Chang p, ok := (primary.Primitive).(tink.AEAD) 104*e7b1675dSTing-Kang Chang if !ok { 105*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: not an AEAD primitive") 106*e7b1675dSTing-Kang Chang } 107*e7b1675dSTing-Kang Chang ct, err := p.Encrypt(plaintext, associatedData) 108*e7b1675dSTing-Kang Chang if err != nil { 109*e7b1675dSTing-Kang Chang a.encLogger.LogFailure() 110*e7b1675dSTing-Kang Chang return nil, err 111*e7b1675dSTing-Kang Chang } 112*e7b1675dSTing-Kang Chang a.encLogger.Log(primary.KeyID, len(plaintext)) 113*e7b1675dSTing-Kang Chang if len(primary.Prefix) == 0 { 114*e7b1675dSTing-Kang Chang return ct, nil 115*e7b1675dSTing-Kang Chang } 116*e7b1675dSTing-Kang Chang output := make([]byte, 0, len(primary.Prefix)+len(ct)) 117*e7b1675dSTing-Kang Chang output = append(output, primary.Prefix...) 118*e7b1675dSTing-Kang Chang output = append(output, ct...) 119*e7b1675dSTing-Kang Chang return output, nil 120*e7b1675dSTing-Kang Chang} 121*e7b1675dSTing-Kang Chang 122*e7b1675dSTing-Kang Chang// Decrypt decrypts the given ciphertext and authenticates it with the given 123*e7b1675dSTing-Kang Chang// associatedData. It returns the corresponding plaintext if the 124*e7b1675dSTing-Kang Chang// ciphertext is authenticated. 125*e7b1675dSTing-Kang Changfunc (a *wrappedAead) Decrypt(ciphertext, associatedData []byte) ([]byte, error) { 126*e7b1675dSTing-Kang Chang // try non-raw keys 127*e7b1675dSTing-Kang Chang prefixSize := cryptofmt.NonRawPrefixSize 128*e7b1675dSTing-Kang Chang if len(ciphertext) > prefixSize { 129*e7b1675dSTing-Kang Chang prefix := ciphertext[:prefixSize] 130*e7b1675dSTing-Kang Chang ctNoPrefix := ciphertext[prefixSize:] 131*e7b1675dSTing-Kang Chang entries, err := a.ps.EntriesForPrefix(string(prefix)) 132*e7b1675dSTing-Kang Chang if err == nil { 133*e7b1675dSTing-Kang Chang for i := 0; i < len(entries); i++ { 134*e7b1675dSTing-Kang Chang p, ok := (entries[i].Primitive).(tink.AEAD) 135*e7b1675dSTing-Kang Chang if !ok { 136*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: not an AEAD primitive") 137*e7b1675dSTing-Kang Chang } 138*e7b1675dSTing-Kang Chang 139*e7b1675dSTing-Kang Chang pt, err := p.Decrypt(ctNoPrefix, associatedData) 140*e7b1675dSTing-Kang Chang if err == nil { 141*e7b1675dSTing-Kang Chang a.decLogger.Log(entries[i].KeyID, len(ctNoPrefix)) 142*e7b1675dSTing-Kang Chang return pt, nil 143*e7b1675dSTing-Kang Chang } 144*e7b1675dSTing-Kang Chang } 145*e7b1675dSTing-Kang Chang } 146*e7b1675dSTing-Kang Chang } 147*e7b1675dSTing-Kang Chang // try raw keys 148*e7b1675dSTing-Kang Chang entries, err := a.ps.RawEntries() 149*e7b1675dSTing-Kang Chang if err == nil { 150*e7b1675dSTing-Kang Chang for i := 0; i < len(entries); i++ { 151*e7b1675dSTing-Kang Chang p, ok := (entries[i].Primitive).(tink.AEAD) 152*e7b1675dSTing-Kang Chang if !ok { 153*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: not an AEAD primitive") 154*e7b1675dSTing-Kang Chang } 155*e7b1675dSTing-Kang Chang 156*e7b1675dSTing-Kang Chang pt, err := p.Decrypt(ciphertext, associatedData) 157*e7b1675dSTing-Kang Chang if err == nil { 158*e7b1675dSTing-Kang Chang a.decLogger.Log(entries[i].KeyID, len(ciphertext)) 159*e7b1675dSTing-Kang Chang return pt, nil 160*e7b1675dSTing-Kang Chang } 161*e7b1675dSTing-Kang Chang } 162*e7b1675dSTing-Kang Chang } 163*e7b1675dSTing-Kang Chang // nothing worked 164*e7b1675dSTing-Kang Chang a.decLogger.LogFailure() 165*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("aead_factory: decryption failed") 166*e7b1675dSTing-Kang Chang} 167