1*e7b1675dSTing-Kang Chang// Copyright 2018 Google LLC 2*e7b1675dSTing-Kang Chang// 3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang// 7*e7b1675dSTing-Kang Chang// http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang// 9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang// limitations under the License. 14*e7b1675dSTing-Kang Chang// 15*e7b1675dSTing-Kang Chang//////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Changpackage signature 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Changimport ( 20*e7b1675dSTing-Kang Chang "errors" 21*e7b1675dSTing-Kang Chang "fmt" 22*e7b1675dSTing-Kang Chang 23*e7b1675dSTing-Kang Chang "github.com/google/tink/go/core/cryptofmt" 24*e7b1675dSTing-Kang Chang "github.com/google/tink/go/core/primitiveset" 25*e7b1675dSTing-Kang Chang "github.com/google/tink/go/internal/internalregistry" 26*e7b1675dSTing-Kang Chang "github.com/google/tink/go/internal/monitoringutil" 27*e7b1675dSTing-Kang Chang "github.com/google/tink/go/keyset" 28*e7b1675dSTing-Kang Chang "github.com/google/tink/go/monitoring" 29*e7b1675dSTing-Kang Chang "github.com/google/tink/go/tink" 30*e7b1675dSTing-Kang Chang tinkpb "github.com/google/tink/go/proto/tink_go_proto" 31*e7b1675dSTing-Kang Chang) 32*e7b1675dSTing-Kang Chang 33*e7b1675dSTing-Kang Chang// NewVerifier returns a Verifier primitive from the given keyset handle. 34*e7b1675dSTing-Kang Changfunc NewVerifier(handle *keyset.Handle) (tink.Verifier, error) { 35*e7b1675dSTing-Kang Chang ps, err := handle.Primitives() 36*e7b1675dSTing-Kang Chang if err != nil { 37*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("verifier_factory: cannot obtain primitive set: %s", err) 38*e7b1675dSTing-Kang Chang } 39*e7b1675dSTing-Kang Chang return newWrappedVerifier(ps) 40*e7b1675dSTing-Kang Chang} 41*e7b1675dSTing-Kang Chang 42*e7b1675dSTing-Kang Chang// verifierSet is a Verifier implementation that uses the 43*e7b1675dSTing-Kang Chang// underlying primitive set for verifying. 44*e7b1675dSTing-Kang Changtype wrappedVerifier struct { 45*e7b1675dSTing-Kang Chang ps *primitiveset.PrimitiveSet 46*e7b1675dSTing-Kang Chang logger monitoring.Logger 47*e7b1675dSTing-Kang Chang} 48*e7b1675dSTing-Kang Chang 49*e7b1675dSTing-Kang Chang// Asserts that verifierSet implements the Verifier interface. 50*e7b1675dSTing-Kang Changvar _ tink.Verifier = (*wrappedVerifier)(nil) 51*e7b1675dSTing-Kang Chang 52*e7b1675dSTing-Kang Changfunc newWrappedVerifier(ps *primitiveset.PrimitiveSet) (*wrappedVerifier, error) { 53*e7b1675dSTing-Kang Chang if _, ok := (ps.Primary.Primitive).(tink.Verifier); !ok { 54*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("verifier_factory: not a Verifier primitive") 55*e7b1675dSTing-Kang Chang } 56*e7b1675dSTing-Kang Chang 57*e7b1675dSTing-Kang Chang for _, primitives := range ps.Entries { 58*e7b1675dSTing-Kang Chang for _, p := range primitives { 59*e7b1675dSTing-Kang Chang if _, ok := (p.Primitive).(tink.Verifier); !ok { 60*e7b1675dSTing-Kang Chang return nil, fmt.Errorf("verifier_factory: not an Verifier primitive") 61*e7b1675dSTing-Kang Chang } 62*e7b1675dSTing-Kang Chang } 63*e7b1675dSTing-Kang Chang } 64*e7b1675dSTing-Kang Chang logger, err := createVerifierLogger(ps) 65*e7b1675dSTing-Kang Chang if err != nil { 66*e7b1675dSTing-Kang Chang return nil, err 67*e7b1675dSTing-Kang Chang } 68*e7b1675dSTing-Kang Chang return &wrappedVerifier{ 69*e7b1675dSTing-Kang Chang ps: ps, 70*e7b1675dSTing-Kang Chang logger: logger, 71*e7b1675dSTing-Kang Chang }, nil 72*e7b1675dSTing-Kang Chang} 73*e7b1675dSTing-Kang Chang 74*e7b1675dSTing-Kang Changfunc createVerifierLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logger, error) { 75*e7b1675dSTing-Kang Chang // only keysets which contain annotations are monitored. 76*e7b1675dSTing-Kang Chang if len(ps.Annotations) == 0 { 77*e7b1675dSTing-Kang Chang return &monitoringutil.DoNothingLogger{}, nil 78*e7b1675dSTing-Kang Chang } 79*e7b1675dSTing-Kang Chang keysetInfo, err := monitoringutil.KeysetInfoFromPrimitiveSet(ps) 80*e7b1675dSTing-Kang Chang if err != nil { 81*e7b1675dSTing-Kang Chang return nil, err 82*e7b1675dSTing-Kang Chang } 83*e7b1675dSTing-Kang Chang return internalregistry.GetMonitoringClient().NewLogger(&monitoring.Context{ 84*e7b1675dSTing-Kang Chang KeysetInfo: keysetInfo, 85*e7b1675dSTing-Kang Chang Primitive: "public_key_verify", 86*e7b1675dSTing-Kang Chang APIFunction: "verify", 87*e7b1675dSTing-Kang Chang }) 88*e7b1675dSTing-Kang Chang} 89*e7b1675dSTing-Kang Chang 90*e7b1675dSTing-Kang Changvar errInvalidSignature = errors.New("verifier_factory: invalid signature") 91*e7b1675dSTing-Kang Chang 92*e7b1675dSTing-Kang Chang// Verify checks whether the given signature is a valid signature of the given data. 93*e7b1675dSTing-Kang Changfunc (v *wrappedVerifier) Verify(signature, data []byte) error { 94*e7b1675dSTing-Kang Chang prefixSize := cryptofmt.NonRawPrefixSize 95*e7b1675dSTing-Kang Chang if len(signature) < prefixSize { 96*e7b1675dSTing-Kang Chang return errInvalidSignature 97*e7b1675dSTing-Kang Chang } 98*e7b1675dSTing-Kang Chang 99*e7b1675dSTing-Kang Chang // try non-raw keys 100*e7b1675dSTing-Kang Chang prefix := signature[:prefixSize] 101*e7b1675dSTing-Kang Chang signatureNoPrefix := signature[prefixSize:] 102*e7b1675dSTing-Kang Chang entries, err := v.ps.EntriesForPrefix(string(prefix)) 103*e7b1675dSTing-Kang Chang if err == nil { 104*e7b1675dSTing-Kang Chang for i := 0; i < len(entries); i++ { 105*e7b1675dSTing-Kang Chang var signedData []byte 106*e7b1675dSTing-Kang Chang if entries[i].PrefixType == tinkpb.OutputPrefixType_LEGACY { 107*e7b1675dSTing-Kang Chang signedData = make([]byte, 0, len(data)+1) 108*e7b1675dSTing-Kang Chang signedData = append(signedData, data...) 109*e7b1675dSTing-Kang Chang signedData = append(signedData, byte(0)) 110*e7b1675dSTing-Kang Chang } else { 111*e7b1675dSTing-Kang Chang signedData = data 112*e7b1675dSTing-Kang Chang } 113*e7b1675dSTing-Kang Chang 114*e7b1675dSTing-Kang Chang verifier, ok := (entries[i].Primitive).(tink.Verifier) 115*e7b1675dSTing-Kang Chang if !ok { 116*e7b1675dSTing-Kang Chang return fmt.Errorf("verifier_factory: not an Verifier primitive") 117*e7b1675dSTing-Kang Chang } 118*e7b1675dSTing-Kang Chang 119*e7b1675dSTing-Kang Chang if err = verifier.Verify(signatureNoPrefix, signedData); err == nil { 120*e7b1675dSTing-Kang Chang v.logger.Log(entries[i].KeyID, len(signedData)) 121*e7b1675dSTing-Kang Chang return nil 122*e7b1675dSTing-Kang Chang } 123*e7b1675dSTing-Kang Chang } 124*e7b1675dSTing-Kang Chang } 125*e7b1675dSTing-Kang Chang 126*e7b1675dSTing-Kang Chang // try raw keys 127*e7b1675dSTing-Kang Chang entries, err = v.ps.RawEntries() 128*e7b1675dSTing-Kang Chang if err == nil { 129*e7b1675dSTing-Kang Chang for i := 0; i < len(entries); i++ { 130*e7b1675dSTing-Kang Chang verifier, ok := (entries[i].Primitive).(tink.Verifier) 131*e7b1675dSTing-Kang Chang if !ok { 132*e7b1675dSTing-Kang Chang return fmt.Errorf("verifier_factory: not an Verifier primitive") 133*e7b1675dSTing-Kang Chang } 134*e7b1675dSTing-Kang Chang 135*e7b1675dSTing-Kang Chang if err = verifier.Verify(signature, data); err == nil { 136*e7b1675dSTing-Kang Chang v.logger.Log(entries[i].KeyID, len(data)) 137*e7b1675dSTing-Kang Chang return nil 138*e7b1675dSTing-Kang Chang } 139*e7b1675dSTing-Kang Chang } 140*e7b1675dSTing-Kang Chang } 141*e7b1675dSTing-Kang Chang v.logger.LogFailure() 142*e7b1675dSTing-Kang Chang return errInvalidSignature 143*e7b1675dSTing-Kang Chang} 144