|
1 | 1 | package jose
|
2 | 2 |
|
3 | 3 | import (
|
4 |
| - "errors" |
5 |
| - "github.com/dvsekhvalnov/jose2go/arrays" |
6 |
| - "github.com/dvsekhvalnov/jose2go/padding" |
7 |
| - "crypto/hmac" |
8 |
| - "crypto/cipher" |
9 | 4 | "crypto/aes"
|
| 5 | + "crypto/cipher" |
| 6 | + "crypto/hmac" |
| 7 | + "errors" |
10 | 8 | "fmt"
|
| 9 | + "github.com/dvsekhvalnov/jose2go/arrays" |
| 10 | + "github.com/dvsekhvalnov/jose2go/padding" |
11 | 11 | )
|
12 | 12 |
|
13 | 13 | // AES CBC with HMAC authenticated encryption algorithm implementation
|
14 |
| -type AesCbcHmac struct{ |
| 14 | +type AesCbcHmac struct { |
15 | 15 | keySizeBits int
|
16 | 16 | }
|
17 | 17 |
|
18 | 18 | func init() {
|
19 |
| - RegisterJwe(&AesCbcHmac{keySizeBits:256}) |
20 |
| - RegisterJwe(&AesCbcHmac{keySizeBits:384}) |
21 |
| - RegisterJwe(&AesCbcHmac{keySizeBits:512}) |
| 19 | + RegisterJwe(&AesCbcHmac{keySizeBits: 256}) |
| 20 | + RegisterJwe(&AesCbcHmac{keySizeBits: 384}) |
| 21 | + RegisterJwe(&AesCbcHmac{keySizeBits: 512}) |
22 | 22 | }
|
23 | 23 |
|
24 | 24 | func (alg *AesCbcHmac) Name() string {
|
25 | 25 | switch alg.keySizeBits {
|
26 |
| - case 256: return A128CBC_HS256 |
27 |
| - case 384: return A192CBC_HS384 |
28 |
| - default: return A256CBC_HS512 |
29 |
| - } |
| 26 | + case 256: |
| 27 | + return A128CBC_HS256 |
| 28 | + case 384: |
| 29 | + return A192CBC_HS384 |
| 30 | + default: |
| 31 | + return A256CBC_HS512 |
| 32 | + } |
30 | 33 | }
|
31 | 34 |
|
32 | 35 | func (alg *AesCbcHmac) KeySizeBits() int {
|
33 | 36 | return alg.keySizeBits
|
34 | 37 | }
|
35 | 38 |
|
| 39 | +func (alg *AesCbcHmac) SetKeySizeBits(bits int) { |
| 40 | + alg.keySizeBits = bits |
| 41 | +} |
| 42 | + |
36 | 43 | func (alg *AesCbcHmac) Encrypt(aad, plainText, cek []byte) (iv, cipherText, authTag []byte, err error) {
|
37 |
| - |
38 |
| - cekSizeBits := len(cek)<<3 |
| 44 | + |
| 45 | + cekSizeBits := len(cek) << 3 |
39 | 46 | if cekSizeBits != alg.keySizeBits {
|
40 |
| - return nil,nil,nil, errors.New(fmt.Sprintf("AesCbcHmac.Encrypt(): expected key of size %v bits, but was given %v bits.",alg.keySizeBits, cekSizeBits)) |
41 |
| - } |
42 |
| - |
43 |
| - hmacKey := cek[0:len(cek)/2] |
44 |
| - aesKey := cek[len(cek)/2:] |
45 |
| - |
46 |
| - if iv,err = arrays.Random(16);err!=nil { |
47 |
| - return nil,nil,nil,err |
| 47 | + return nil, nil, nil, errors.New(fmt.Sprintf("AesCbcHmac.Encrypt(): expected key of size %v bits, but was given %v bits.", alg.keySizeBits, cekSizeBits)) |
| 48 | + } |
| 49 | + |
| 50 | + hmacKey := cek[0 : len(cek)/2] |
| 51 | + aesKey := cek[len(cek)/2:] |
| 52 | + |
| 53 | + if iv, err = arrays.Random(16); err != nil { |
| 54 | + return nil, nil, nil, err |
48 | 55 | }
|
49 |
| - |
| 56 | + |
50 | 57 | var block cipher.Block
|
51 | 58 |
|
52 |
| - if block, err = aes.NewCipher(aesKey);err!=nil { |
53 |
| - return nil,nil,nil,err |
| 59 | + if block, err = aes.NewCipher(aesKey); err != nil { |
| 60 | + return nil, nil, nil, err |
54 | 61 | }
|
55 |
| - |
56 | 62 |
|
57 |
| - padded := padding.AddPkcs7(plainText,16) |
| 63 | + padded := padding.AddPkcs7(plainText, 16) |
58 | 64 |
|
59 |
| - cipherText = make([]byte,len(padded),cap(padded)) |
| 65 | + cipherText = make([]byte, len(padded), cap(padded)) |
60 | 66 | mode := cipher.NewCBCEncrypter(block, iv)
|
61 |
| - mode.CryptBlocks(cipherText,padded) |
62 |
| - |
| 67 | + mode.CryptBlocks(cipherText, padded) |
| 68 | + |
63 | 69 | authTag = alg.computeAuthTag(aad, iv, cipherText, hmacKey)
|
64 |
| - |
65 |
| - return iv,cipherText,authTag,nil |
66 |
| -} |
67 | 70 |
|
| 71 | + return iv, cipherText, authTag, nil |
| 72 | +} |
68 | 73 |
|
69 | 74 | func (alg *AesCbcHmac) Decrypt(aad, cek, iv, cipherText, authTag []byte) (plainText []byte, err error) {
|
70 |
| - |
71 |
| - cekSizeBits := len(cek)<<3 |
72 |
| - |
73 |
| - if cekSizeBits != alg.keySizeBits { |
74 |
| - return nil, errors.New(fmt.Sprintf("AesCbcHmac.Decrypt(): expected key of size %v bits, but was given %v bits.",alg.keySizeBits, cekSizeBits)) |
75 |
| - } |
76 |
| - |
77 |
| - hmacKey := cek[0:len(cek)/2] |
78 |
| - aesKey := cek[len(cek)/2:] |
79 |
| - |
| 75 | + |
| 76 | + cekSizeBits := len(cek) << 3 |
| 77 | + |
| 78 | + if cekSizeBits != alg.keySizeBits { |
| 79 | + return nil, errors.New(fmt.Sprintf("AesCbcHmac.Decrypt(): expected key of size %v bits, but was given %v bits.", alg.keySizeBits, cekSizeBits)) |
| 80 | + } |
| 81 | + |
| 82 | + hmacKey := cek[0 : len(cek)/2] |
| 83 | + aesKey := cek[len(cek)/2:] |
| 84 | + |
80 | 85 | // Check MAC
|
81 |
| - expectedAuthTag := alg.computeAuthTag(aad, iv, cipherText, hmacKey); |
| 86 | + expectedAuthTag := alg.computeAuthTag(aad, iv, cipherText, hmacKey) |
82 | 87 |
|
83 |
| - if !hmac.Equal(expectedAuthTag, authTag) { |
84 |
| - return nil,errors.New("AesCbcHmac.Decrypt(): Authentication tag do not match.") |
| 88 | + if !hmac.Equal(expectedAuthTag, authTag) { |
| 89 | + return nil, errors.New("AesCbcHmac.Decrypt(): Authentication tag do not match.") |
85 | 90 | }
|
86 | 91 |
|
87 | 92 | var block cipher.Block
|
88 | 93 |
|
89 |
| - if block, err = aes.NewCipher(aesKey);err==nil { |
| 94 | + if block, err = aes.NewCipher(aesKey); err == nil { |
90 | 95 | mode := cipher.NewCBCDecrypter(block, iv)
|
91 |
| - |
92 |
| - var padded []byte=make([]byte, len(cipherText), cap(cipherText)) |
| 96 | + |
| 97 | + var padded []byte = make([]byte, len(cipherText), cap(cipherText)) |
93 | 98 | mode.CryptBlocks(padded, cipherText)
|
94 |
| - |
95 |
| - return padding.RemovePkcs7(padded,16),nil |
| 99 | + |
| 100 | + return padding.RemovePkcs7(padded, 16), nil |
96 | 101 | }
|
97 |
| - |
98 |
| - return nil,err |
| 102 | + |
| 103 | + return nil, err |
99 | 104 | }
|
100 | 105 |
|
101 | 106 | func (alg *AesCbcHmac) computeAuthTag(aad []byte, iv []byte, cipherText []byte, hmacKey []byte) (signature []byte) {
|
102 |
| - al := arrays.UInt64ToBytes(uint64(len(aad) << 3)); |
| 107 | + al := arrays.UInt64ToBytes(uint64(len(aad) << 3)) |
103 | 108 | hmacInput := arrays.Concat(aad, iv, cipherText, al)
|
104 |
| - hmac :=calculateHmac(alg.keySizeBits, hmacInput, hmacKey); |
| 109 | + hmac := calculateHmac(alg.keySizeBits, hmacInput, hmacKey) |
105 | 110 |
|
106 |
| - return hmac[0:len(hmac)/2]; |
| 111 | + return hmac[0 : len(hmac)/2] |
107 | 112 | }
|
108 |
| - |
|
0 commit comments