More decryption functions and stub test cases for AWS
This commit is contained in:
191
decrypt.go
191
decrypt.go
@@ -1,15 +1,27 @@
|
||||
package secret
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/aes"
|
||||
"crypto/cipher"
|
||||
"crypto/ecdsa"
|
||||
"crypto/rsa"
|
||||
"crypto/sha256"
|
||||
"crypto/x509"
|
||||
"encoding/base64"
|
||||
"encoding/hex"
|
||||
"encoding/pem"
|
||||
"errors"
|
||||
"fmt"
|
||||
"hash"
|
||||
"os"
|
||||
"strings"
|
||||
|
||||
"golang.org/x/crypto/chacha20poly1305"
|
||||
"golang.org/x/crypto/nacl/secretbox"
|
||||
)
|
||||
|
||||
type aead struct {
|
||||
type aeadProvider struct {
|
||||
Provider
|
||||
aead cipher.AEAD
|
||||
}
|
||||
@@ -22,7 +34,7 @@ func WithChaCha20Poly1305(p Provider, key []byte) (Provider, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return aead{
|
||||
return aeadProvider{
|
||||
Provider: p,
|
||||
aead: cipher,
|
||||
}, nil
|
||||
@@ -36,13 +48,13 @@ func WithChaCha20Poly1305X(p Provider, key []byte) (Provider, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return aead{
|
||||
return aeadProvider{
|
||||
Provider: p,
|
||||
aead: cipher,
|
||||
}, nil
|
||||
}
|
||||
|
||||
// WithAESGCM wraps the returned value and decrypts it using AES GCM AEAD.
|
||||
// WithAESGCM wraps the returned value and decrypts it using AES-GCM AEAD.
|
||||
//
|
||||
// The accepted key sizes are 16 bytes for AES-128 and 32 bytes for AES-256.
|
||||
func WithAESGCM(p Provider, key []byte) (Provider, error) {
|
||||
@@ -56,13 +68,13 @@ func WithAESGCM(p Provider, key []byte) (Provider, error) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return aead{
|
||||
return aeadProvider{
|
||||
Provider: p,
|
||||
aead: gcm,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (p aead) GetSecret(key string) (value []byte, err error) {
|
||||
func (p aeadProvider) GetSecret(key string) (value []byte, err error) {
|
||||
if value, err = p.Provider.GetSecret(key); err != nil {
|
||||
return
|
||||
}
|
||||
@@ -76,19 +88,70 @@ func (p aead) GetSecret(key string) (value []byte, err error) {
|
||||
return p.aead.Open(nil, nonce, ciphertext, nil)
|
||||
}
|
||||
|
||||
type secretBox struct {
|
||||
type oaepProvider struct {
|
||||
Provider
|
||||
key [32]byte
|
||||
key *rsa.PrivateKey
|
||||
hash func() hash.Hash
|
||||
}
|
||||
|
||||
func WithSecretBox(p Provider, key [32]byte) Provider {
|
||||
return &secretBox{
|
||||
// WithOAEP transparently decrypts secrets returned from the provider using RSA-OAEP.
|
||||
//
|
||||
// Encryption and decryption of a given message must use the same hash function and sha256.New()
|
||||
// is a reasonable choice. When hashFunc is nil, then sha256 will be used.
|
||||
func WithOAEP(p Provider, key *rsa.PrivateKey, hashFunc func() hash.Hash) Provider {
|
||||
if hashFunc == nil {
|
||||
hashFunc = func() hash.Hash {
|
||||
return sha256.New()
|
||||
}
|
||||
}
|
||||
return oaepProvider{
|
||||
Provider: p,
|
||||
key: key,
|
||||
hash: hashFunc,
|
||||
}
|
||||
}
|
||||
|
||||
func (p oaepProvider) GetSecret(key string) (value []byte, err error) {
|
||||
if value, err = p.Provider.GetSecret(key); err != nil {
|
||||
return
|
||||
}
|
||||
return rsa.DecryptOAEP(p.hash(), nil, p.key, value, nil)
|
||||
}
|
||||
|
||||
type pkcs1v15Provider struct {
|
||||
Provider
|
||||
key *rsa.PrivateKey
|
||||
}
|
||||
|
||||
// WithPKCS1v15 transparently decrypts secrets returned from the provider using RSA and the padding scheme from PKCS #1 v1.5.
|
||||
func WithPKCS1v15(p Provider, key *rsa.PrivateKey) Provider {
|
||||
return pkcs1v15Provider{
|
||||
Provider: p,
|
||||
key: key,
|
||||
}
|
||||
}
|
||||
|
||||
func (p secretBox) GetSecret(key string) (value []byte, err error) {
|
||||
func (p pkcs1v15Provider) GetSecret(key string) (value []byte, err error) {
|
||||
if value, err = p.Provider.GetSecret(key); err != nil {
|
||||
return
|
||||
}
|
||||
return rsa.DecryptPKCS1v15(nil, p.key, value)
|
||||
}
|
||||
|
||||
type secretboxProvider struct {
|
||||
Provider
|
||||
key [32]byte
|
||||
}
|
||||
|
||||
// WithSecretBox transparently decrypts secrets returned from the provider using NaCL secretbox.
|
||||
func WithSecretBox(p Provider, key [32]byte) Provider {
|
||||
return &secretboxProvider{
|
||||
Provider: p,
|
||||
key: key,
|
||||
}
|
||||
}
|
||||
|
||||
func (p secretboxProvider) GetSecret(key string) (value []byte, err error) {
|
||||
if value, err = p.Provider.GetSecret(key); err != nil {
|
||||
return
|
||||
}
|
||||
@@ -105,3 +168,109 @@ func (p secretBox) GetSecret(key string) (value []byte, err error) {
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
const (
|
||||
pemECPrivateKey = "EC PRIVATE KEY"
|
||||
pemRSAPrivateKey = "RSA PRIVATE KEY"
|
||||
pemPrivateKey = "PRIVATE KEY"
|
||||
)
|
||||
|
||||
func loadPrivateKey(name string, blockType string) (any, error) {
|
||||
b, err := os.ReadFile(name)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return ParsePrivateKey(b, blockType)
|
||||
}
|
||||
|
||||
func LoadECPrivateKey(name string) (*ecdsa.PrivateKey, error) {
|
||||
k, err := loadPrivateKey(name, pemECPrivateKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return k.(*ecdsa.PrivateKey), nil
|
||||
}
|
||||
|
||||
func LoadRSAPrivateKey(name string) (*rsa.PrivateKey, error) {
|
||||
k, err := loadPrivateKey(name, pemRSAPrivateKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return k.(*rsa.PrivateKey), nil
|
||||
}
|
||||
|
||||
func ParseECPrivateKey(b []byte) (*ecdsa.PrivateKey, error) {
|
||||
k, err := ParsePrivateKey(b, pemECPrivateKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return k.(*ecdsa.PrivateKey), nil
|
||||
}
|
||||
|
||||
func ParseRSAPrivateKey(b []byte) (*rsa.PrivateKey, error) {
|
||||
k, err := ParsePrivateKey(b, pemRSAPrivateKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return k.(*rsa.PrivateKey), nil
|
||||
}
|
||||
|
||||
const (
|
||||
secretBoxHexEncodedLen = 64 // hex.EncodedLen(32)
|
||||
secretBoxRawBase64EncodedLen = 43 // base64.RawStdEncoding.EncodedLen(32)
|
||||
secretBoxStdBase64EncodedLen = 44 // base64.StdEncoding.EncodedLen(32)
|
||||
)
|
||||
|
||||
// ParseSecretBoxKey decodes a hex or base64 encoded SecretBox key.
|
||||
func ParseSecretBoxKey(b []byte) ([32]byte, error) {
|
||||
var key [32]byte
|
||||
b = bytes.TrimRight(b, "\r\n")
|
||||
switch len(b) {
|
||||
case secretBoxHexEncodedLen:
|
||||
if _, err := hex.Decode(key[:], b); err != nil {
|
||||
return key, err
|
||||
}
|
||||
case secretBoxRawBase64EncodedLen:
|
||||
if _, err := base64.RawStdEncoding.Decode(key[:], b); err != nil {
|
||||
return key, err
|
||||
}
|
||||
case secretBoxStdBase64EncodedLen:
|
||||
if _, err := base64.StdEncoding.Decode(key[:], b); err != nil {
|
||||
return key, err
|
||||
}
|
||||
default:
|
||||
return key, fmt.Errorf("secret: secretbox expected %d hex bytes, or %d/%d base64 bytes, got %d",
|
||||
secretBoxHexEncodedLen, secretBoxRawBase64EncodedLen, secretBoxStdBase64EncodedLen, len(b))
|
||||
}
|
||||
return key, nil
|
||||
}
|
||||
|
||||
func ParsePrivateKey(b []byte, blockType string) (any, error) {
|
||||
var (
|
||||
rest = b
|
||||
block *pem.Block
|
||||
)
|
||||
for {
|
||||
if block, rest = pem.Decode(rest); block == nil {
|
||||
return nil, errors.New("secret: no PEM encoded data remains")
|
||||
}
|
||||
if block.Type == blockType || block.Type == pemPrivateKey || blockType == "" {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if strings.Contains(block.Headers["Proc-Type"], "ENCRYPTED") {
|
||||
return nil, fmt.Errorf("secret: can't decrypt encrypted %s PEM block", block.Type)
|
||||
}
|
||||
|
||||
switch block.Type {
|
||||
case pemECPrivateKey:
|
||||
return x509.ParseECPrivateKey(block.Bytes)
|
||||
case pemRSAPrivateKey:
|
||||
return x509.ParsePKCS1PrivateKey(block.Bytes)
|
||||
case pemPrivateKey:
|
||||
return x509.ParsePKCS8PrivateKey(block.Bytes)
|
||||
default:
|
||||
return nil, fmt.Errorf("secret: don't know how to decode a %s PEM block", block.Type)
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user