builtin.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. package kms
  2. import (
  3. "crypto/aes"
  4. "crypto/cipher"
  5. "crypto/rand"
  6. "crypto/sha256"
  7. "encoding/hex"
  8. "errors"
  9. "io"
  10. )
  11. var (
  12. errMalformedCiphertext = errors.New("malformed ciphertext")
  13. )
  14. type builtinSecret struct {
  15. BaseSecret
  16. }
  17. func init() {
  18. RegisterSecretProvider(SchemeBuiltin, SecretStatusAES256GCM, newBuiltinSecret)
  19. }
  20. func newBuiltinSecret(base BaseSecret, url, masterKey string) SecretProvider {
  21. return &builtinSecret{
  22. BaseSecret: base,
  23. }
  24. }
  25. func (s *builtinSecret) Name() string {
  26. return "Builtin"
  27. }
  28. func (s *builtinSecret) IsEncrypted() bool {
  29. return s.Status == SecretStatusAES256GCM
  30. }
  31. func (s *builtinSecret) deriveKey(key []byte) []byte {
  32. var combined []byte
  33. combined = append(combined, key...)
  34. if s.AdditionalData != "" {
  35. combined = append(combined, []byte(s.AdditionalData)...)
  36. }
  37. combined = append(combined, key...)
  38. hash := sha256.Sum256(combined)
  39. return hash[:]
  40. }
  41. func (s *builtinSecret) Encrypt() error {
  42. if s.Payload == "" {
  43. return ErrInvalidSecret
  44. }
  45. switch s.Status {
  46. case SecretStatusPlain:
  47. key := make([]byte, 32)
  48. if _, err := io.ReadFull(rand.Reader, key); err != nil {
  49. return err
  50. }
  51. block, err := aes.NewCipher(s.deriveKey(key))
  52. if err != nil {
  53. return err
  54. }
  55. gcm, err := cipher.NewGCM(block)
  56. if err != nil {
  57. return err
  58. }
  59. nonce := make([]byte, gcm.NonceSize())
  60. if _, err = io.ReadFull(rand.Reader, nonce); err != nil {
  61. return err
  62. }
  63. var aad []byte
  64. if s.AdditionalData != "" {
  65. aad = []byte(s.AdditionalData)
  66. }
  67. ciphertext := gcm.Seal(nonce, nonce, []byte(s.Payload), aad)
  68. s.Key = hex.EncodeToString(key)
  69. s.Payload = hex.EncodeToString(ciphertext)
  70. s.Status = SecretStatusAES256GCM
  71. return nil
  72. default:
  73. return ErrWrongSecretStatus
  74. }
  75. }
  76. func (s *builtinSecret) Decrypt() error {
  77. switch s.Status {
  78. case SecretStatusAES256GCM:
  79. encrypted, err := hex.DecodeString(s.Payload)
  80. if err != nil {
  81. return err
  82. }
  83. key, err := hex.DecodeString(s.Key)
  84. if err != nil {
  85. return err
  86. }
  87. block, err := aes.NewCipher(s.deriveKey(key))
  88. if err != nil {
  89. return err
  90. }
  91. gcm, err := cipher.NewGCM(block)
  92. if err != nil {
  93. return err
  94. }
  95. nonceSize := gcm.NonceSize()
  96. if len(encrypted) < nonceSize {
  97. return errMalformedCiphertext
  98. }
  99. nonce, ciphertext := encrypted[:nonceSize], encrypted[nonceSize:]
  100. var aad []byte
  101. if s.AdditionalData != "" {
  102. aad = []byte(s.AdditionalData)
  103. }
  104. plaintext, err := gcm.Open(nil, nonce, ciphertext, aad)
  105. if err != nil {
  106. return err
  107. }
  108. s.Status = SecretStatusPlain
  109. s.Payload = string(plaintext)
  110. s.Key = ""
  111. s.AdditionalData = ""
  112. return nil
  113. default:
  114. return ErrWrongSecretStatus
  115. }
  116. }
  117. func (s *builtinSecret) Clone() SecretProvider {
  118. baseSecret := BaseSecret{
  119. Status: s.Status,
  120. Payload: s.Payload,
  121. Key: s.Key,
  122. AdditionalData: s.AdditionalData,
  123. Mode: s.Mode,
  124. }
  125. return newBuiltinSecret(baseSecret, "", "")
  126. }