crypter.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536
  1. /*-
  2. * Copyright 2014 Square Inc.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package jose
  17. import (
  18. "crypto/ecdsa"
  19. "crypto/rsa"
  20. "errors"
  21. "fmt"
  22. "reflect"
  23. "gopkg.in/square/go-jose.v2/json"
  24. )
  25. // Encrypter represents an encrypter which produces an encrypted JWE object.
  26. type Encrypter interface {
  27. Encrypt(plaintext []byte) (*JSONWebEncryption, error)
  28. EncryptWithAuthData(plaintext []byte, aad []byte) (*JSONWebEncryption, error)
  29. Options() EncrypterOptions
  30. }
  31. // A generic content cipher
  32. type contentCipher interface {
  33. keySize() int
  34. encrypt(cek []byte, aad, plaintext []byte) (*aeadParts, error)
  35. decrypt(cek []byte, aad []byte, parts *aeadParts) ([]byte, error)
  36. }
  37. // A key generator (for generating/getting a CEK)
  38. type keyGenerator interface {
  39. keySize() int
  40. genKey() ([]byte, rawHeader, error)
  41. }
  42. // A generic key encrypter
  43. type keyEncrypter interface {
  44. encryptKey(cek []byte, alg KeyAlgorithm) (recipientInfo, error) // Encrypt a key
  45. }
  46. // A generic key decrypter
  47. type keyDecrypter interface {
  48. decryptKey(headers rawHeader, recipient *recipientInfo, generator keyGenerator) ([]byte, error) // Decrypt a key
  49. }
  50. // A generic encrypter based on the given key encrypter and content cipher.
  51. type genericEncrypter struct {
  52. contentAlg ContentEncryption
  53. compressionAlg CompressionAlgorithm
  54. cipher contentCipher
  55. recipients []recipientKeyInfo
  56. keyGenerator keyGenerator
  57. extraHeaders map[HeaderKey]interface{}
  58. }
  59. type recipientKeyInfo struct {
  60. keyID string
  61. keyAlg KeyAlgorithm
  62. keyEncrypter keyEncrypter
  63. }
  64. // EncrypterOptions represents options that can be set on new encrypters.
  65. type EncrypterOptions struct {
  66. Compression CompressionAlgorithm
  67. // Optional map of additional keys to be inserted into the protected header
  68. // of a JWS object. Some specifications which make use of JWS like to insert
  69. // additional values here. All values must be JSON-serializable.
  70. ExtraHeaders map[HeaderKey]interface{}
  71. }
  72. // WithHeader adds an arbitrary value to the ExtraHeaders map, initializing it
  73. // if necessary. It returns itself and so can be used in a fluent style.
  74. func (eo *EncrypterOptions) WithHeader(k HeaderKey, v interface{}) *EncrypterOptions {
  75. if eo.ExtraHeaders == nil {
  76. eo.ExtraHeaders = map[HeaderKey]interface{}{}
  77. }
  78. eo.ExtraHeaders[k] = v
  79. return eo
  80. }
  81. // WithContentType adds a content type ("cty") header and returns the updated
  82. // EncrypterOptions.
  83. func (eo *EncrypterOptions) WithContentType(contentType ContentType) *EncrypterOptions {
  84. return eo.WithHeader(HeaderContentType, contentType)
  85. }
  86. // WithType adds a type ("typ") header and returns the updated EncrypterOptions.
  87. func (eo *EncrypterOptions) WithType(typ ContentType) *EncrypterOptions {
  88. return eo.WithHeader(HeaderType, typ)
  89. }
  90. // Recipient represents an algorithm/key to encrypt messages to.
  91. //
  92. // PBES2Count and PBES2Salt correspond with the "p2c" and "p2s" headers used
  93. // on the password-based encryption algorithms PBES2-HS256+A128KW,
  94. // PBES2-HS384+A192KW, and PBES2-HS512+A256KW. If they are not provided a safe
  95. // default of 100000 will be used for the count and a 128-bit random salt will
  96. // be generated.
  97. type Recipient struct {
  98. Algorithm KeyAlgorithm
  99. Key interface{}
  100. KeyID string
  101. PBES2Count int
  102. PBES2Salt []byte
  103. }
  104. // NewEncrypter creates an appropriate encrypter based on the key type
  105. func NewEncrypter(enc ContentEncryption, rcpt Recipient, opts *EncrypterOptions) (Encrypter, error) {
  106. encrypter := &genericEncrypter{
  107. contentAlg: enc,
  108. recipients: []recipientKeyInfo{},
  109. cipher: getContentCipher(enc),
  110. }
  111. if opts != nil {
  112. encrypter.compressionAlg = opts.Compression
  113. encrypter.extraHeaders = opts.ExtraHeaders
  114. }
  115. if encrypter.cipher == nil {
  116. return nil, ErrUnsupportedAlgorithm
  117. }
  118. var keyID string
  119. var rawKey interface{}
  120. switch encryptionKey := rcpt.Key.(type) {
  121. case JSONWebKey:
  122. keyID, rawKey = encryptionKey.KeyID, encryptionKey.Key
  123. case *JSONWebKey:
  124. keyID, rawKey = encryptionKey.KeyID, encryptionKey.Key
  125. default:
  126. rawKey = encryptionKey
  127. }
  128. switch rcpt.Algorithm {
  129. case DIRECT:
  130. // Direct encryption mode must be treated differently
  131. if reflect.TypeOf(rawKey) != reflect.TypeOf([]byte{}) {
  132. return nil, ErrUnsupportedKeyType
  133. }
  134. if encrypter.cipher.keySize() != len(rawKey.([]byte)) {
  135. return nil, ErrInvalidKeySize
  136. }
  137. encrypter.keyGenerator = staticKeyGenerator{
  138. key: rawKey.([]byte),
  139. }
  140. recipientInfo, _ := newSymmetricRecipient(rcpt.Algorithm, rawKey.([]byte))
  141. recipientInfo.keyID = keyID
  142. if rcpt.KeyID != "" {
  143. recipientInfo.keyID = rcpt.KeyID
  144. }
  145. encrypter.recipients = []recipientKeyInfo{recipientInfo}
  146. return encrypter, nil
  147. case ECDH_ES:
  148. // ECDH-ES (w/o key wrapping) is similar to DIRECT mode
  149. typeOf := reflect.TypeOf(rawKey)
  150. if typeOf != reflect.TypeOf(&ecdsa.PublicKey{}) {
  151. return nil, ErrUnsupportedKeyType
  152. }
  153. encrypter.keyGenerator = ecKeyGenerator{
  154. size: encrypter.cipher.keySize(),
  155. algID: string(enc),
  156. publicKey: rawKey.(*ecdsa.PublicKey),
  157. }
  158. recipientInfo, _ := newECDHRecipient(rcpt.Algorithm, rawKey.(*ecdsa.PublicKey))
  159. recipientInfo.keyID = keyID
  160. if rcpt.KeyID != "" {
  161. recipientInfo.keyID = rcpt.KeyID
  162. }
  163. encrypter.recipients = []recipientKeyInfo{recipientInfo}
  164. return encrypter, nil
  165. default:
  166. // Can just add a standard recipient
  167. encrypter.keyGenerator = randomKeyGenerator{
  168. size: encrypter.cipher.keySize(),
  169. }
  170. err := encrypter.addRecipient(rcpt)
  171. return encrypter, err
  172. }
  173. }
  174. // NewMultiEncrypter creates a multi-encrypter based on the given parameters
  175. func NewMultiEncrypter(enc ContentEncryption, rcpts []Recipient, opts *EncrypterOptions) (Encrypter, error) {
  176. cipher := getContentCipher(enc)
  177. if cipher == nil {
  178. return nil, ErrUnsupportedAlgorithm
  179. }
  180. if rcpts == nil || len(rcpts) == 0 {
  181. return nil, fmt.Errorf("square/go-jose: recipients is nil or empty")
  182. }
  183. encrypter := &genericEncrypter{
  184. contentAlg: enc,
  185. recipients: []recipientKeyInfo{},
  186. cipher: cipher,
  187. keyGenerator: randomKeyGenerator{
  188. size: cipher.keySize(),
  189. },
  190. }
  191. if opts != nil {
  192. encrypter.compressionAlg = opts.Compression
  193. }
  194. for _, recipient := range rcpts {
  195. err := encrypter.addRecipient(recipient)
  196. if err != nil {
  197. return nil, err
  198. }
  199. }
  200. return encrypter, nil
  201. }
  202. func (ctx *genericEncrypter) addRecipient(recipient Recipient) (err error) {
  203. var recipientInfo recipientKeyInfo
  204. switch recipient.Algorithm {
  205. case DIRECT, ECDH_ES:
  206. return fmt.Errorf("square/go-jose: key algorithm '%s' not supported in multi-recipient mode", recipient.Algorithm)
  207. }
  208. recipientInfo, err = makeJWERecipient(recipient.Algorithm, recipient.Key)
  209. if recipient.KeyID != "" {
  210. recipientInfo.keyID = recipient.KeyID
  211. }
  212. switch recipient.Algorithm {
  213. case PBES2_HS256_A128KW, PBES2_HS384_A192KW, PBES2_HS512_A256KW:
  214. if sr, ok := recipientInfo.keyEncrypter.(*symmetricKeyCipher); ok {
  215. sr.p2c = recipient.PBES2Count
  216. sr.p2s = recipient.PBES2Salt
  217. }
  218. }
  219. if err == nil {
  220. ctx.recipients = append(ctx.recipients, recipientInfo)
  221. }
  222. return err
  223. }
  224. func makeJWERecipient(alg KeyAlgorithm, encryptionKey interface{}) (recipientKeyInfo, error) {
  225. switch encryptionKey := encryptionKey.(type) {
  226. case *rsa.PublicKey:
  227. return newRSARecipient(alg, encryptionKey)
  228. case *ecdsa.PublicKey:
  229. return newECDHRecipient(alg, encryptionKey)
  230. case []byte:
  231. return newSymmetricRecipient(alg, encryptionKey)
  232. case string:
  233. return newSymmetricRecipient(alg, []byte(encryptionKey))
  234. case *JSONWebKey:
  235. recipient, err := makeJWERecipient(alg, encryptionKey.Key)
  236. recipient.keyID = encryptionKey.KeyID
  237. return recipient, err
  238. default:
  239. return recipientKeyInfo{}, ErrUnsupportedKeyType
  240. }
  241. }
  242. // newDecrypter creates an appropriate decrypter based on the key type
  243. func newDecrypter(decryptionKey interface{}) (keyDecrypter, error) {
  244. switch decryptionKey := decryptionKey.(type) {
  245. case *rsa.PrivateKey:
  246. return &rsaDecrypterSigner{
  247. privateKey: decryptionKey,
  248. }, nil
  249. case *ecdsa.PrivateKey:
  250. return &ecDecrypterSigner{
  251. privateKey: decryptionKey,
  252. }, nil
  253. case []byte:
  254. return &symmetricKeyCipher{
  255. key: decryptionKey,
  256. }, nil
  257. case string:
  258. return &symmetricKeyCipher{
  259. key: []byte(decryptionKey),
  260. }, nil
  261. case JSONWebKey:
  262. return newDecrypter(decryptionKey.Key)
  263. case *JSONWebKey:
  264. return newDecrypter(decryptionKey.Key)
  265. default:
  266. return nil, ErrUnsupportedKeyType
  267. }
  268. }
  269. // Implementation of encrypt method producing a JWE object.
  270. func (ctx *genericEncrypter) Encrypt(plaintext []byte) (*JSONWebEncryption, error) {
  271. return ctx.EncryptWithAuthData(plaintext, nil)
  272. }
  273. // Implementation of encrypt method producing a JWE object.
  274. func (ctx *genericEncrypter) EncryptWithAuthData(plaintext, aad []byte) (*JSONWebEncryption, error) {
  275. obj := &JSONWebEncryption{}
  276. obj.aad = aad
  277. obj.protected = &rawHeader{}
  278. err := obj.protected.set(headerEncryption, ctx.contentAlg)
  279. if err != nil {
  280. return nil, err
  281. }
  282. obj.recipients = make([]recipientInfo, len(ctx.recipients))
  283. if len(ctx.recipients) == 0 {
  284. return nil, fmt.Errorf("square/go-jose: no recipients to encrypt to")
  285. }
  286. cek, headers, err := ctx.keyGenerator.genKey()
  287. if err != nil {
  288. return nil, err
  289. }
  290. obj.protected.merge(&headers)
  291. for i, info := range ctx.recipients {
  292. recipient, err := info.keyEncrypter.encryptKey(cek, info.keyAlg)
  293. if err != nil {
  294. return nil, err
  295. }
  296. err = recipient.header.set(headerAlgorithm, info.keyAlg)
  297. if err != nil {
  298. return nil, err
  299. }
  300. if info.keyID != "" {
  301. err = recipient.header.set(headerKeyID, info.keyID)
  302. if err != nil {
  303. return nil, err
  304. }
  305. }
  306. obj.recipients[i] = recipient
  307. }
  308. if len(ctx.recipients) == 1 {
  309. // Move per-recipient headers into main protected header if there's
  310. // only a single recipient.
  311. obj.protected.merge(obj.recipients[0].header)
  312. obj.recipients[0].header = nil
  313. }
  314. if ctx.compressionAlg != NONE {
  315. plaintext, err = compress(ctx.compressionAlg, plaintext)
  316. if err != nil {
  317. return nil, err
  318. }
  319. err = obj.protected.set(headerCompression, ctx.compressionAlg)
  320. if err != nil {
  321. return nil, err
  322. }
  323. }
  324. for k, v := range ctx.extraHeaders {
  325. b, err := json.Marshal(v)
  326. if err != nil {
  327. return nil, err
  328. }
  329. (*obj.protected)[k] = makeRawMessage(b)
  330. }
  331. authData := obj.computeAuthData()
  332. parts, err := ctx.cipher.encrypt(cek, authData, plaintext)
  333. if err != nil {
  334. return nil, err
  335. }
  336. obj.iv = parts.iv
  337. obj.ciphertext = parts.ciphertext
  338. obj.tag = parts.tag
  339. return obj, nil
  340. }
  341. func (ctx *genericEncrypter) Options() EncrypterOptions {
  342. return EncrypterOptions{
  343. Compression: ctx.compressionAlg,
  344. ExtraHeaders: ctx.extraHeaders,
  345. }
  346. }
  347. // Decrypt and validate the object and return the plaintext. Note that this
  348. // function does not support multi-recipient, if you desire multi-recipient
  349. // decryption use DecryptMulti instead.
  350. func (obj JSONWebEncryption) Decrypt(decryptionKey interface{}) ([]byte, error) {
  351. headers := obj.mergedHeaders(nil)
  352. if len(obj.recipients) > 1 {
  353. return nil, errors.New("square/go-jose: too many recipients in payload; expecting only one")
  354. }
  355. critical, err := headers.getCritical()
  356. if err != nil {
  357. return nil, fmt.Errorf("square/go-jose: invalid crit header")
  358. }
  359. if len(critical) > 0 {
  360. return nil, fmt.Errorf("square/go-jose: unsupported crit header")
  361. }
  362. decrypter, err := newDecrypter(decryptionKey)
  363. if err != nil {
  364. return nil, err
  365. }
  366. cipher := getContentCipher(headers.getEncryption())
  367. if cipher == nil {
  368. return nil, fmt.Errorf("square/go-jose: unsupported enc value '%s'", string(headers.getEncryption()))
  369. }
  370. generator := randomKeyGenerator{
  371. size: cipher.keySize(),
  372. }
  373. parts := &aeadParts{
  374. iv: obj.iv,
  375. ciphertext: obj.ciphertext,
  376. tag: obj.tag,
  377. }
  378. authData := obj.computeAuthData()
  379. var plaintext []byte
  380. recipient := obj.recipients[0]
  381. recipientHeaders := obj.mergedHeaders(&recipient)
  382. cek, err := decrypter.decryptKey(recipientHeaders, &recipient, generator)
  383. if err == nil {
  384. // Found a valid CEK -- let's try to decrypt.
  385. plaintext, err = cipher.decrypt(cek, authData, parts)
  386. }
  387. if plaintext == nil {
  388. return nil, ErrCryptoFailure
  389. }
  390. // The "zip" header parameter may only be present in the protected header.
  391. if comp := obj.protected.getCompression(); comp != "" {
  392. plaintext, err = decompress(comp, plaintext)
  393. }
  394. return plaintext, err
  395. }
  396. // DecryptMulti decrypts and validates the object and returns the plaintexts,
  397. // with support for multiple recipients. It returns the index of the recipient
  398. // for which the decryption was successful, the merged headers for that recipient,
  399. // and the plaintext.
  400. func (obj JSONWebEncryption) DecryptMulti(decryptionKey interface{}) (int, Header, []byte, error) {
  401. globalHeaders := obj.mergedHeaders(nil)
  402. critical, err := globalHeaders.getCritical()
  403. if err != nil {
  404. return -1, Header{}, nil, fmt.Errorf("square/go-jose: invalid crit header")
  405. }
  406. if len(critical) > 0 {
  407. return -1, Header{}, nil, fmt.Errorf("square/go-jose: unsupported crit header")
  408. }
  409. decrypter, err := newDecrypter(decryptionKey)
  410. if err != nil {
  411. return -1, Header{}, nil, err
  412. }
  413. encryption := globalHeaders.getEncryption()
  414. cipher := getContentCipher(encryption)
  415. if cipher == nil {
  416. return -1, Header{}, nil, fmt.Errorf("square/go-jose: unsupported enc value '%s'", string(encryption))
  417. }
  418. generator := randomKeyGenerator{
  419. size: cipher.keySize(),
  420. }
  421. parts := &aeadParts{
  422. iv: obj.iv,
  423. ciphertext: obj.ciphertext,
  424. tag: obj.tag,
  425. }
  426. authData := obj.computeAuthData()
  427. index := -1
  428. var plaintext []byte
  429. var headers rawHeader
  430. for i, recipient := range obj.recipients {
  431. recipientHeaders := obj.mergedHeaders(&recipient)
  432. cek, err := decrypter.decryptKey(recipientHeaders, &recipient, generator)
  433. if err == nil {
  434. // Found a valid CEK -- let's try to decrypt.
  435. plaintext, err = cipher.decrypt(cek, authData, parts)
  436. if err == nil {
  437. index = i
  438. headers = recipientHeaders
  439. break
  440. }
  441. }
  442. }
  443. if plaintext == nil || err != nil {
  444. return -1, Header{}, nil, ErrCryptoFailure
  445. }
  446. // The "zip" header parameter may only be present in the protected header.
  447. if comp := obj.protected.getCompression(); comp != "" {
  448. plaintext, err = decompress(comp, plaintext)
  449. }
  450. sanitized, err := headers.sanitized()
  451. if err != nil {
  452. return -1, Header{}, nil, fmt.Errorf("square/go-jose: failed to sanitize header: %v", err)
  453. }
  454. return index, sanitized, plaintext, err
  455. }