xref: /aosp_15_r20/external/tink/go/signature/verifier_factory.go (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2018 Google LLC
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Changpackage signature
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Changimport (
20*e7b1675dSTing-Kang Chang	"errors"
21*e7b1675dSTing-Kang Chang	"fmt"
22*e7b1675dSTing-Kang Chang
23*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/core/cryptofmt"
24*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/core/primitiveset"
25*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/internal/internalregistry"
26*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/internal/monitoringutil"
27*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/keyset"
28*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/monitoring"
29*e7b1675dSTing-Kang Chang	"github.com/google/tink/go/tink"
30*e7b1675dSTing-Kang Chang	tinkpb "github.com/google/tink/go/proto/tink_go_proto"
31*e7b1675dSTing-Kang Chang)
32*e7b1675dSTing-Kang Chang
33*e7b1675dSTing-Kang Chang// NewVerifier returns a Verifier primitive from the given keyset handle.
34*e7b1675dSTing-Kang Changfunc NewVerifier(handle *keyset.Handle) (tink.Verifier, error) {
35*e7b1675dSTing-Kang Chang	ps, err := handle.Primitives()
36*e7b1675dSTing-Kang Chang	if err != nil {
37*e7b1675dSTing-Kang Chang		return nil, fmt.Errorf("verifier_factory: cannot obtain primitive set: %s", err)
38*e7b1675dSTing-Kang Chang	}
39*e7b1675dSTing-Kang Chang	return newWrappedVerifier(ps)
40*e7b1675dSTing-Kang Chang}
41*e7b1675dSTing-Kang Chang
42*e7b1675dSTing-Kang Chang// verifierSet is a Verifier implementation that uses the
43*e7b1675dSTing-Kang Chang// underlying primitive set for verifying.
44*e7b1675dSTing-Kang Changtype wrappedVerifier struct {
45*e7b1675dSTing-Kang Chang	ps     *primitiveset.PrimitiveSet
46*e7b1675dSTing-Kang Chang	logger monitoring.Logger
47*e7b1675dSTing-Kang Chang}
48*e7b1675dSTing-Kang Chang
49*e7b1675dSTing-Kang Chang// Asserts that verifierSet implements the Verifier interface.
50*e7b1675dSTing-Kang Changvar _ tink.Verifier = (*wrappedVerifier)(nil)
51*e7b1675dSTing-Kang Chang
52*e7b1675dSTing-Kang Changfunc newWrappedVerifier(ps *primitiveset.PrimitiveSet) (*wrappedVerifier, error) {
53*e7b1675dSTing-Kang Chang	if _, ok := (ps.Primary.Primitive).(tink.Verifier); !ok {
54*e7b1675dSTing-Kang Chang		return nil, fmt.Errorf("verifier_factory: not a Verifier primitive")
55*e7b1675dSTing-Kang Chang	}
56*e7b1675dSTing-Kang Chang
57*e7b1675dSTing-Kang Chang	for _, primitives := range ps.Entries {
58*e7b1675dSTing-Kang Chang		for _, p := range primitives {
59*e7b1675dSTing-Kang Chang			if _, ok := (p.Primitive).(tink.Verifier); !ok {
60*e7b1675dSTing-Kang Chang				return nil, fmt.Errorf("verifier_factory: not an Verifier primitive")
61*e7b1675dSTing-Kang Chang			}
62*e7b1675dSTing-Kang Chang		}
63*e7b1675dSTing-Kang Chang	}
64*e7b1675dSTing-Kang Chang	logger, err := createVerifierLogger(ps)
65*e7b1675dSTing-Kang Chang	if err != nil {
66*e7b1675dSTing-Kang Chang		return nil, err
67*e7b1675dSTing-Kang Chang	}
68*e7b1675dSTing-Kang Chang	return &wrappedVerifier{
69*e7b1675dSTing-Kang Chang		ps:     ps,
70*e7b1675dSTing-Kang Chang		logger: logger,
71*e7b1675dSTing-Kang Chang	}, nil
72*e7b1675dSTing-Kang Chang}
73*e7b1675dSTing-Kang Chang
74*e7b1675dSTing-Kang Changfunc createVerifierLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logger, error) {
75*e7b1675dSTing-Kang Chang	// only keysets which contain annotations are monitored.
76*e7b1675dSTing-Kang Chang	if len(ps.Annotations) == 0 {
77*e7b1675dSTing-Kang Chang		return &monitoringutil.DoNothingLogger{}, nil
78*e7b1675dSTing-Kang Chang	}
79*e7b1675dSTing-Kang Chang	keysetInfo, err := monitoringutil.KeysetInfoFromPrimitiveSet(ps)
80*e7b1675dSTing-Kang Chang	if err != nil {
81*e7b1675dSTing-Kang Chang		return nil, err
82*e7b1675dSTing-Kang Chang	}
83*e7b1675dSTing-Kang Chang	return internalregistry.GetMonitoringClient().NewLogger(&monitoring.Context{
84*e7b1675dSTing-Kang Chang		KeysetInfo:  keysetInfo,
85*e7b1675dSTing-Kang Chang		Primitive:   "public_key_verify",
86*e7b1675dSTing-Kang Chang		APIFunction: "verify",
87*e7b1675dSTing-Kang Chang	})
88*e7b1675dSTing-Kang Chang}
89*e7b1675dSTing-Kang Chang
90*e7b1675dSTing-Kang Changvar errInvalidSignature = errors.New("verifier_factory: invalid signature")
91*e7b1675dSTing-Kang Chang
92*e7b1675dSTing-Kang Chang// Verify checks whether the given signature is a valid signature of the given data.
93*e7b1675dSTing-Kang Changfunc (v *wrappedVerifier) Verify(signature, data []byte) error {
94*e7b1675dSTing-Kang Chang	prefixSize := cryptofmt.NonRawPrefixSize
95*e7b1675dSTing-Kang Chang	if len(signature) < prefixSize {
96*e7b1675dSTing-Kang Chang		return errInvalidSignature
97*e7b1675dSTing-Kang Chang	}
98*e7b1675dSTing-Kang Chang
99*e7b1675dSTing-Kang Chang	// try non-raw keys
100*e7b1675dSTing-Kang Chang	prefix := signature[:prefixSize]
101*e7b1675dSTing-Kang Chang	signatureNoPrefix := signature[prefixSize:]
102*e7b1675dSTing-Kang Chang	entries, err := v.ps.EntriesForPrefix(string(prefix))
103*e7b1675dSTing-Kang Chang	if err == nil {
104*e7b1675dSTing-Kang Chang		for i := 0; i < len(entries); i++ {
105*e7b1675dSTing-Kang Chang			var signedData []byte
106*e7b1675dSTing-Kang Chang			if entries[i].PrefixType == tinkpb.OutputPrefixType_LEGACY {
107*e7b1675dSTing-Kang Chang				signedData = make([]byte, 0, len(data)+1)
108*e7b1675dSTing-Kang Chang				signedData = append(signedData, data...)
109*e7b1675dSTing-Kang Chang				signedData = append(signedData, byte(0))
110*e7b1675dSTing-Kang Chang			} else {
111*e7b1675dSTing-Kang Chang				signedData = data
112*e7b1675dSTing-Kang Chang			}
113*e7b1675dSTing-Kang Chang
114*e7b1675dSTing-Kang Chang			verifier, ok := (entries[i].Primitive).(tink.Verifier)
115*e7b1675dSTing-Kang Chang			if !ok {
116*e7b1675dSTing-Kang Chang				return fmt.Errorf("verifier_factory: not an Verifier primitive")
117*e7b1675dSTing-Kang Chang			}
118*e7b1675dSTing-Kang Chang
119*e7b1675dSTing-Kang Chang			if err = verifier.Verify(signatureNoPrefix, signedData); err == nil {
120*e7b1675dSTing-Kang Chang				v.logger.Log(entries[i].KeyID, len(signedData))
121*e7b1675dSTing-Kang Chang				return nil
122*e7b1675dSTing-Kang Chang			}
123*e7b1675dSTing-Kang Chang		}
124*e7b1675dSTing-Kang Chang	}
125*e7b1675dSTing-Kang Chang
126*e7b1675dSTing-Kang Chang	// try raw keys
127*e7b1675dSTing-Kang Chang	entries, err = v.ps.RawEntries()
128*e7b1675dSTing-Kang Chang	if err == nil {
129*e7b1675dSTing-Kang Chang		for i := 0; i < len(entries); i++ {
130*e7b1675dSTing-Kang Chang			verifier, ok := (entries[i].Primitive).(tink.Verifier)
131*e7b1675dSTing-Kang Chang			if !ok {
132*e7b1675dSTing-Kang Chang				return fmt.Errorf("verifier_factory: not an Verifier primitive")
133*e7b1675dSTing-Kang Chang			}
134*e7b1675dSTing-Kang Chang
135*e7b1675dSTing-Kang Chang			if err = verifier.Verify(signature, data); err == nil {
136*e7b1675dSTing-Kang Chang				v.logger.Log(entries[i].KeyID, len(data))
137*e7b1675dSTing-Kang Chang				return nil
138*e7b1675dSTing-Kang Chang			}
139*e7b1675dSTing-Kang Chang		}
140*e7b1675dSTing-Kang Chang	}
141*e7b1675dSTing-Kang Chang	v.logger.LogFailure()
142*e7b1675dSTing-Kang Chang	return errInvalidSignature
143*e7b1675dSTing-Kang Chang}
144