builtin.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. package kms
  2. import (
  3. "crypto/aes"
  4. "crypto/cipher"
  5. "crypto/rand"
  6. "encoding/hex"
  7. "io"
  8. "github.com/minio/sha256-simd"
  9. )
  10. const (
  11. builtinProviderName = "Builtin"
  12. )
  13. type builtinSecret struct {
  14. baseSecret
  15. }
  16. func newBuiltinSecret(base baseSecret) SecretProvider {
  17. return &builtinSecret{
  18. baseSecret: base,
  19. }
  20. }
  21. func (s *builtinSecret) Name() string {
  22. return builtinProviderName
  23. }
  24. func (s *builtinSecret) IsEncrypted() bool {
  25. return s.Status == SecretStatusAES256GCM
  26. }
  27. func (s *builtinSecret) deriveKey(key []byte) []byte {
  28. var combined []byte
  29. combined = append(combined, key...)
  30. if s.AdditionalData != "" {
  31. combined = append(combined, []byte(s.AdditionalData)...)
  32. }
  33. combined = append(combined, key...)
  34. hash := sha256.Sum256(combined)
  35. return hash[:]
  36. }
  37. func (s *builtinSecret) Encrypt() error {
  38. if s.Payload == "" {
  39. return errInvalidSecret
  40. }
  41. switch s.Status {
  42. case SecretStatusPlain:
  43. key := make([]byte, 32)
  44. if _, err := io.ReadFull(rand.Reader, key); err != nil {
  45. return err
  46. }
  47. block, err := aes.NewCipher(s.deriveKey(key))
  48. if err != nil {
  49. return err
  50. }
  51. gcm, err := cipher.NewGCM(block)
  52. if err != nil {
  53. return err
  54. }
  55. nonce := make([]byte, gcm.NonceSize())
  56. if _, err = io.ReadFull(rand.Reader, nonce); err != nil {
  57. return err
  58. }
  59. var aad []byte
  60. if s.AdditionalData != "" {
  61. aad = []byte(s.AdditionalData)
  62. }
  63. ciphertext := gcm.Seal(nonce, nonce, []byte(s.Payload), aad)
  64. s.Key = hex.EncodeToString(key)
  65. s.Payload = hex.EncodeToString(ciphertext)
  66. s.Status = SecretStatusAES256GCM
  67. return nil
  68. default:
  69. return errWrongSecretStatus
  70. }
  71. }
  72. func (s *builtinSecret) Decrypt() error {
  73. switch s.Status {
  74. case SecretStatusAES256GCM:
  75. encrypted, err := hex.DecodeString(s.Payload)
  76. if err != nil {
  77. return err
  78. }
  79. key, err := hex.DecodeString(s.Key)
  80. if err != nil {
  81. return err
  82. }
  83. block, err := aes.NewCipher(s.deriveKey(key))
  84. if err != nil {
  85. return err
  86. }
  87. gcm, err := cipher.NewGCM(block)
  88. if err != nil {
  89. return err
  90. }
  91. nonceSize := gcm.NonceSize()
  92. if len(encrypted) < nonceSize {
  93. return errMalformedCiphertext
  94. }
  95. nonce, ciphertext := encrypted[:nonceSize], encrypted[nonceSize:]
  96. var aad []byte
  97. if s.AdditionalData != "" {
  98. aad = []byte(s.AdditionalData)
  99. }
  100. plaintext, err := gcm.Open(nil, nonce, ciphertext, aad)
  101. if err != nil {
  102. return err
  103. }
  104. s.Status = SecretStatusPlain
  105. s.Payload = string(plaintext)
  106. s.Key = ""
  107. s.AdditionalData = ""
  108. return nil
  109. default:
  110. return errWrongSecretStatus
  111. }
  112. }