2015-03-05 21:27:35 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/aes"
|
|
|
|
"crypto/cipher"
|
|
|
|
"crypto/rand"
|
2015-05-27 23:01:25 +00:00
|
|
|
"encoding/binary"
|
2015-03-05 21:57:45 +00:00
|
|
|
"encoding/json"
|
2015-03-05 21:27:35 +00:00
|
|
|
"fmt"
|
2015-03-12 18:27:32 +00:00
|
|
|
"strings"
|
2015-03-05 21:27:35 +00:00
|
|
|
"sync"
|
2015-04-08 23:43:17 +00:00
|
|
|
"time"
|
2015-03-05 21:27:35 +00:00
|
|
|
|
2015-04-08 23:43:17 +00:00
|
|
|
"github.com/armon/go-metrics"
|
2015-03-05 21:27:35 +00:00
|
|
|
"github.com/hashicorp/vault/physical"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2015-05-27 23:01:25 +00:00
|
|
|
// initialKeyTerm is the hard coded initial key term. This is
|
|
|
|
// used only for values that are not encrypted with the keyring.
|
|
|
|
initialKeyTerm = 1
|
2015-04-17 23:51:13 +00:00
|
|
|
|
2015-05-22 21:00:29 +00:00
|
|
|
// termSize the number of bytes used for the key term.
|
|
|
|
termSize = 4
|
2015-04-17 23:51:13 +00:00
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// aesgcmVersionByte is prefixed to a message to allow for
|
|
|
|
// future versioning of barrier implementations.
|
|
|
|
aesgcmVersionByte = 0x1
|
|
|
|
)
|
|
|
|
|
2015-03-05 21:57:45 +00:00
|
|
|
// barrierInit is the JSON encoded value stored
|
|
|
|
type barrierInit struct {
|
|
|
|
Version int // Version is the current format version
|
|
|
|
Key []byte // Key is the primary encryption key
|
|
|
|
}
|
|
|
|
|
2015-04-15 23:24:23 +00:00
|
|
|
// AESGCMBarrier is a SecurityBarrier implementation that uses the AES
|
|
|
|
// cipher core and the Galois Counter Mode block mode. It defaults to
|
|
|
|
// the golang NONCE default value of 12 and a key size of 256
|
|
|
|
// bit. AES-GCM is high performance, and provides both confidentiality
|
2015-03-05 21:27:35 +00:00
|
|
|
// and integrity.
|
|
|
|
type AESGCMBarrier struct {
|
|
|
|
backend physical.Backend
|
|
|
|
|
|
|
|
l sync.RWMutex
|
|
|
|
sealed bool
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// keyring is used to maintain all of the encryption keys, including
|
|
|
|
// the active key used for encryption, but also prior keys to allow
|
|
|
|
// decryption of keys encrypted under previous terms.
|
|
|
|
keyring *Keyring
|
|
|
|
|
|
|
|
// cache is used to reduce the number of AEAD constructions we do
|
|
|
|
cache map[uint32]cipher.AEAD
|
|
|
|
cacheLock sync.RWMutex
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewAESGCMBarrier is used to construct a new barrier that uses
|
|
|
|
// the provided physical backend for storage.
|
|
|
|
func NewAESGCMBarrier(physical physical.Backend) (*AESGCMBarrier, error) {
|
|
|
|
b := &AESGCMBarrier{
|
|
|
|
backend: physical,
|
|
|
|
sealed: true,
|
2015-05-27 23:01:25 +00:00
|
|
|
cache: make(map[uint32]cipher.AEAD),
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
return b, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialized checks if the barrier has been initialized
|
|
|
|
// and has a master key set.
|
|
|
|
func (b *AESGCMBarrier) Initialized() (bool, error) {
|
2015-05-27 23:01:25 +00:00
|
|
|
// Read the keyring file
|
|
|
|
out, err := b.backend.Get(keyringPath)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed to check for initialization: %v", err)
|
|
|
|
}
|
|
|
|
if out != nil {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fallback, check for the old sentinel file
|
|
|
|
out, err = b.backend.Get(barrierInitPath)
|
2015-03-05 21:27:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed to check for initialization: %v", err)
|
|
|
|
}
|
|
|
|
return out != nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize works only if the barrier has not been initialized
|
|
|
|
// and makes use of the given master key.
|
|
|
|
func (b *AESGCMBarrier) Initialize(key []byte) error {
|
|
|
|
// Verify the key size
|
2015-04-15 20:33:28 +00:00
|
|
|
min, max := b.KeyLength()
|
|
|
|
if len(key) < min || len(key) > max {
|
2015-04-15 23:24:23 +00:00
|
|
|
return fmt.Errorf("Key size must be %d or %d", min, max)
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if already initialized
|
|
|
|
if alreadyInit, err := b.Initialized(); err != nil {
|
|
|
|
return err
|
|
|
|
} else if alreadyInit {
|
|
|
|
return ErrBarrierAlreadyInit
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate encryption key
|
|
|
|
encrypt, err := b.GenerateKey()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to generate encryption key: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// Create a new keyring, install the keys
|
|
|
|
keyring := NewKeyring()
|
|
|
|
keyring.SetMasterKey(key)
|
|
|
|
keyring.AddKey(&Key{
|
|
|
|
Term: 1,
|
2015-03-05 21:57:45 +00:00
|
|
|
Version: 1,
|
2015-05-27 23:01:25 +00:00
|
|
|
Value: encrypt,
|
|
|
|
})
|
2015-05-27 23:29:59 +00:00
|
|
|
return b.persistKeyring(keyring)
|
|
|
|
}
|
2015-05-27 23:01:25 +00:00
|
|
|
|
2015-05-27 23:29:59 +00:00
|
|
|
// persistKeyring is used to write out the keyring using the
|
|
|
|
// master key to encrypt it.
|
|
|
|
func (b *AESGCMBarrier) persistKeyring(keyring *Keyring) error {
|
2015-05-27 23:01:25 +00:00
|
|
|
// Create the keyring entry
|
|
|
|
buf, err := keyring.Serialize()
|
2015-03-05 21:57:45 +00:00
|
|
|
if err != nil {
|
2015-05-27 23:01:25 +00:00
|
|
|
return fmt.Errorf("failed to serialize keyring: %v", err)
|
2015-03-05 21:57:45 +00:00
|
|
|
}
|
|
|
|
defer memzero(buf)
|
|
|
|
|
2015-05-27 23:29:59 +00:00
|
|
|
// Create the AES-GCM
|
|
|
|
gcm, err := b.aeadFromKey(keyring.MasterKey())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-03-05 21:57:45 +00:00
|
|
|
// Encrypt the barrier init value
|
2015-05-27 23:01:25 +00:00
|
|
|
value := b.encrypt(initialKeyTerm, gcm, buf)
|
2015-03-05 21:27:35 +00:00
|
|
|
|
2015-05-27 23:42:42 +00:00
|
|
|
// Create the keyring physical entry
|
2015-03-05 21:57:45 +00:00
|
|
|
pe := &physical.Entry{
|
2015-05-27 23:01:25 +00:00
|
|
|
Key: keyringPath,
|
2015-03-05 21:27:35 +00:00
|
|
|
Value: value,
|
|
|
|
}
|
2015-03-05 21:57:45 +00:00
|
|
|
if err := b.backend.Put(pe); err != nil {
|
2015-05-27 23:01:25 +00:00
|
|
|
return fmt.Errorf("failed to persist keyring: %v", err)
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateKey is used to generate a new key
|
|
|
|
func (b *AESGCMBarrier) GenerateKey() ([]byte, error) {
|
2015-04-15 20:33:40 +00:00
|
|
|
// Generate a 256bit key
|
|
|
|
buf := make([]byte, 2*aes.BlockSize)
|
2015-03-05 21:27:35 +00:00
|
|
|
_, err := rand.Read(buf)
|
|
|
|
return buf, err
|
|
|
|
}
|
|
|
|
|
2015-03-12 18:20:27 +00:00
|
|
|
// KeyLength is used to sanity check a key
|
|
|
|
func (b *AESGCMBarrier) KeyLength() (int, int) {
|
2015-04-15 20:33:28 +00:00
|
|
|
return aes.BlockSize, 2 * aes.BlockSize
|
2015-03-12 18:20:27 +00:00
|
|
|
}
|
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// Sealed checks if the barrier has been unlocked yet. The Barrier
|
|
|
|
// is not expected to be able to perform any CRUD until it is unsealed.
|
|
|
|
func (b *AESGCMBarrier) Sealed() (bool, error) {
|
|
|
|
b.l.RLock()
|
|
|
|
defer b.l.RUnlock()
|
|
|
|
return b.sealed, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unseal is used to provide the master key which permits the barrier
|
|
|
|
// to be unsealed. If the key is not correct, the barrier remains sealed.
|
|
|
|
func (b *AESGCMBarrier) Unseal(key []byte) error {
|
|
|
|
b.l.Lock()
|
|
|
|
defer b.l.Unlock()
|
|
|
|
|
|
|
|
// Do nothing if already unsealed
|
|
|
|
if !b.sealed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// Create the AES-GCM
|
|
|
|
gcm, err := b.aeadFromKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read in the keyring
|
|
|
|
out, err := b.backend.Get(keyringPath)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to check for keyring: %v", err)
|
|
|
|
}
|
|
|
|
if out != nil {
|
|
|
|
// Decrypt the barrier init key
|
|
|
|
plain, err := b.decrypt(gcm, out.Value)
|
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), "message authentication failed") {
|
|
|
|
return ErrBarrierInvalidKey
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer memzero(plain)
|
|
|
|
|
|
|
|
// Recover the keyring
|
|
|
|
keyring, err := DeserializeKeyring(plain)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("keyring deserialization failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup the keyring and finish
|
|
|
|
b.keyring = keyring
|
|
|
|
b.sealed = false
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// Read the barrier initialization key
|
2015-05-27 23:01:25 +00:00
|
|
|
out, err = b.backend.Get(barrierInitPath)
|
2015-03-05 21:27:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to check for initialization: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
return ErrBarrierNotInit
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrypt the barrier init key
|
2015-03-05 21:57:45 +00:00
|
|
|
plain, err := b.decrypt(gcm, out.Value)
|
2015-03-05 21:27:35 +00:00
|
|
|
if err != nil {
|
2015-03-12 18:27:32 +00:00
|
|
|
if strings.Contains(err.Error(), "message authentication failed") {
|
|
|
|
return ErrBarrierInvalidKey
|
|
|
|
}
|
2015-03-05 21:27:35 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-03-05 21:57:45 +00:00
|
|
|
defer memzero(plain)
|
|
|
|
|
|
|
|
// Unmarshal the barrier init
|
|
|
|
var init barrierInit
|
|
|
|
if err := json.Unmarshal(plain, &init); err != nil {
|
|
|
|
return fmt.Errorf("failed to unmarshal barrier init file")
|
|
|
|
}
|
|
|
|
defer memzero(init.Key)
|
2015-03-05 21:27:35 +00:00
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// Setup a new keyring, this is for backwards compatability
|
|
|
|
keyring := NewKeyring()
|
|
|
|
keyring.SetMasterKey(key)
|
|
|
|
keyring.AddKey(&Key{
|
|
|
|
Term: 1,
|
|
|
|
Version: 1,
|
|
|
|
Value: init.Key,
|
|
|
|
})
|
2015-05-27 23:29:59 +00:00
|
|
|
if err := b.persistKeyring(keyring); err != nil {
|
|
|
|
return err
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
|
2015-05-27 23:42:42 +00:00
|
|
|
// Delete the old barrier entry
|
|
|
|
if err := b.backend.Delete(barrierInitPath); err != nil {
|
|
|
|
return fmt.Errorf("failed to delete barrier init file: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// Set the vault as unsealed
|
2015-05-27 23:01:25 +00:00
|
|
|
b.keyring = keyring
|
2015-03-05 21:27:35 +00:00
|
|
|
b.sealed = false
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal is used to re-seal the barrier. This requires the barrier to
|
|
|
|
// be unsealed again to perform any further operations.
|
|
|
|
func (b *AESGCMBarrier) Seal() error {
|
|
|
|
b.l.Lock()
|
|
|
|
defer b.l.Unlock()
|
|
|
|
|
|
|
|
// Remove the primary key, and seal the vault
|
2015-05-27 23:01:25 +00:00
|
|
|
b.cache = make(map[uint32]cipher.AEAD)
|
|
|
|
if b.keyring != nil {
|
|
|
|
b.keyring.Wipe()
|
|
|
|
b.keyring = nil
|
|
|
|
}
|
2015-03-05 21:27:35 +00:00
|
|
|
b.sealed = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put is used to insert or update an entry
|
|
|
|
func (b *AESGCMBarrier) Put(entry *Entry) error {
|
2015-04-08 23:43:17 +00:00
|
|
|
defer metrics.MeasureSince([]string{"barrier", "put"}, time.Now())
|
2015-03-05 21:27:35 +00:00
|
|
|
b.l.RLock()
|
|
|
|
defer b.l.RUnlock()
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
keyring := b.keyring
|
|
|
|
if keyring == nil {
|
2015-03-05 21:27:35 +00:00
|
|
|
return ErrBarrierSealed
|
|
|
|
}
|
2015-05-27 23:01:25 +00:00
|
|
|
term := keyring.ActiveTerm()
|
|
|
|
primary, err := b.aeadForTerm(term)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-05 21:27:35 +00:00
|
|
|
|
|
|
|
pe := &physical.Entry{
|
|
|
|
Key: entry.Key,
|
2015-05-27 23:01:25 +00:00
|
|
|
Value: b.encrypt(term, primary, entry.Value),
|
2015-03-05 21:27:35 +00:00
|
|
|
}
|
|
|
|
return b.backend.Put(pe)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get is used to fetch an entry
|
|
|
|
func (b *AESGCMBarrier) Get(key string) (*Entry, error) {
|
2015-04-08 23:43:17 +00:00
|
|
|
defer metrics.MeasureSince([]string{"barrier", "get"}, time.Now())
|
2015-03-05 21:27:35 +00:00
|
|
|
b.l.RLock()
|
|
|
|
defer b.l.RUnlock()
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
keyring := b.keyring
|
|
|
|
if keyring == nil {
|
2015-03-05 21:27:35 +00:00
|
|
|
return nil, ErrBarrierSealed
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key from the backend
|
|
|
|
pe, err := b.backend.Get(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else if pe == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrypt the ciphertext
|
2015-05-27 23:01:25 +00:00
|
|
|
plain, err := b.decryptKeyring(pe.Value)
|
2015-03-05 21:27:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("decryption failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wrap in a logical entry
|
|
|
|
entry := &Entry{
|
|
|
|
Key: key,
|
|
|
|
Value: plain,
|
|
|
|
}
|
|
|
|
return entry, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete is used to permanently delete an entry
|
|
|
|
func (b *AESGCMBarrier) Delete(key string) error {
|
2015-04-08 23:43:17 +00:00
|
|
|
defer metrics.MeasureSince([]string{"barrier", "delete"}, time.Now())
|
2015-03-05 21:27:35 +00:00
|
|
|
b.l.RLock()
|
|
|
|
defer b.l.RUnlock()
|
|
|
|
if b.sealed {
|
|
|
|
return ErrBarrierSealed
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.backend.Delete(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// List is used ot list all the keys under a given
|
|
|
|
// prefix, up to the next prefix.
|
|
|
|
func (b *AESGCMBarrier) List(prefix string) ([]string, error) {
|
2015-04-08 23:43:17 +00:00
|
|
|
defer metrics.MeasureSince([]string{"barrier", "list"}, time.Now())
|
2015-03-05 21:27:35 +00:00
|
|
|
b.l.RLock()
|
|
|
|
defer b.l.RUnlock()
|
|
|
|
if b.sealed {
|
|
|
|
return nil, ErrBarrierSealed
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.backend.List(prefix)
|
|
|
|
}
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// aeadForTerm returns the AES-GCM AEAD for the given term
|
|
|
|
func (b *AESGCMBarrier) aeadForTerm(term uint32) (cipher.AEAD, error) {
|
|
|
|
// Check for the keyring
|
|
|
|
keyring := b.keyring
|
|
|
|
if keyring == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the cache for the aead
|
|
|
|
b.cacheLock.RLock()
|
|
|
|
aead, ok := b.cache[term]
|
|
|
|
b.cacheLock.RUnlock()
|
|
|
|
if ok {
|
|
|
|
return aead, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the underlying key
|
|
|
|
key := keyring.TermKey(term)
|
|
|
|
if key == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new aead
|
|
|
|
aead, err := b.aeadFromKey(key.Value)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the cache
|
|
|
|
b.cacheLock.Lock()
|
|
|
|
b.cache[term] = aead
|
|
|
|
b.cacheLock.Unlock()
|
|
|
|
return aead, nil
|
|
|
|
}
|
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// aeadFromKey returns an AES-GCM AEAD using the given key.
|
|
|
|
func (b *AESGCMBarrier) aeadFromKey(key []byte) (cipher.AEAD, error) {
|
|
|
|
// Create the AES cipher
|
|
|
|
aesCipher, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create cipher: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the GCM mode AEAD
|
|
|
|
gcm, err := cipher.NewGCM(aesCipher)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to initialize GCM mode")
|
|
|
|
}
|
|
|
|
return gcm, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// encrypt is used to encrypt a value
|
2015-05-27 23:01:25 +00:00
|
|
|
func (b *AESGCMBarrier) encrypt(term uint32, gcm cipher.AEAD, plain []byte) []byte {
|
2015-05-22 21:00:29 +00:00
|
|
|
// Allocate the output buffer with room for tern, version byte,
|
2015-03-05 21:27:35 +00:00
|
|
|
// nonce, GCM tag and the plaintext
|
2015-05-22 21:00:29 +00:00
|
|
|
capacity := termSize + 1 + gcm.NonceSize() + gcm.Overhead() + len(plain)
|
|
|
|
size := termSize + 1 + gcm.NonceSize()
|
2015-03-05 21:27:35 +00:00
|
|
|
out := make([]byte, size, capacity)
|
|
|
|
|
2015-05-27 23:01:25 +00:00
|
|
|
// Set the key term
|
|
|
|
binary.BigEndian.PutUint32(out[:4], term)
|
2015-04-17 23:51:13 +00:00
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// Set the version byte
|
2015-04-17 23:51:13 +00:00
|
|
|
out[4] = aesgcmVersionByte
|
2015-03-05 21:27:35 +00:00
|
|
|
|
|
|
|
// Generate a random nonce
|
2015-04-17 23:51:13 +00:00
|
|
|
nonce := out[5 : 5+gcm.NonceSize()]
|
2015-03-05 21:27:35 +00:00
|
|
|
rand.Read(nonce)
|
|
|
|
|
|
|
|
// Seal the output
|
|
|
|
out = gcm.Seal(out, nonce, plain, nil)
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
// decrypt is used to decrypt a value
|
|
|
|
func (b *AESGCMBarrier) decrypt(gcm cipher.AEAD, cipher []byte) ([]byte, error) {
|
2015-05-27 23:01:25 +00:00
|
|
|
// Verify the term is always just one
|
|
|
|
term := binary.BigEndian.Uint32(cipher[:4])
|
|
|
|
if term != initialKeyTerm {
|
2015-05-22 21:00:29 +00:00
|
|
|
return nil, fmt.Errorf("term mis-match")
|
2015-04-17 23:51:13 +00:00
|
|
|
}
|
|
|
|
|
2015-03-05 21:27:35 +00:00
|
|
|
// Verify the version byte
|
2015-04-17 23:51:13 +00:00
|
|
|
if cipher[4] != aesgcmVersionByte {
|
2015-03-05 21:27:35 +00:00
|
|
|
return nil, fmt.Errorf("version bytes mis-match")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Capture the parts
|
2015-04-17 23:51:13 +00:00
|
|
|
nonce := cipher[5 : 5+gcm.NonceSize()]
|
|
|
|
raw := cipher[5+gcm.NonceSize():]
|
2015-03-05 21:27:35 +00:00
|
|
|
out := make([]byte, 0, len(raw)-gcm.NonceSize())
|
|
|
|
|
|
|
|
// Attempt to open
|
|
|
|
return gcm.Open(out, nonce, raw, nil)
|
|
|
|
}
|
2015-05-27 23:01:25 +00:00
|
|
|
|
|
|
|
// decryptKeyring is used to decrypt a value using the keyring
|
|
|
|
func (b *AESGCMBarrier) decryptKeyring(cipher []byte) ([]byte, error) {
|
|
|
|
// Verify the term
|
|
|
|
term := binary.BigEndian.Uint32(cipher[:4])
|
|
|
|
|
|
|
|
// Verify the version byte
|
|
|
|
if cipher[4] != aesgcmVersionByte {
|
|
|
|
return nil, fmt.Errorf("version bytes mis-match")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the GCM by term
|
|
|
|
gcm, err := b.aeadForTerm(term)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if gcm == nil {
|
|
|
|
return nil, fmt.Errorf("no decryption key available for term %d", term)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Capture the parts
|
|
|
|
nonce := cipher[5 : 5+gcm.NonceSize()]
|
|
|
|
raw := cipher[5+gcm.NonceSize():]
|
|
|
|
out := make([]byte, 0, len(raw)-gcm.NonceSize())
|
|
|
|
|
|
|
|
// Attempt to open
|
|
|
|
return gcm.Open(out, nonce, raw, nil)
|
|
|
|
}
|