summaryrefslogtreecommitdiffstats
path: root/store/sql_store.go
diff options
context:
space:
mode:
author=Corey Hulen <corey@hulen.com>2015-07-05 09:02:23 -0800
committer=Corey Hulen <corey@hulen.com>2015-07-05 09:02:23 -0800
commit592d68cf4134b668e3ff962d17f8aa75b1bc055f (patch)
tree6e743b07487caf5fe350439aefdf0355a7e80d9b /store/sql_store.go
parent72bfc1ee2afd2fa4a34186b62f144f8f6c50d693 (diff)
parent4a3003c0dcf7d642f233493e32b07beed5d08327 (diff)
downloadchat-592d68cf4134b668e3ff962d17f8aa75b1bc055f.tar.gz
chat-592d68cf4134b668e3ff962d17f8aa75b1bc055f.tar.bz2
chat-592d68cf4134b668e3ff962d17f8aa75b1bc055f.zip
Merge branch 'master' into mm-1391
Diffstat (limited to 'store/sql_store.go')
-rw-r--r--store/sql_store.go38
1 files changed, 32 insertions, 6 deletions
diff --git a/store/sql_store.go b/store/sql_store.go
index a2deea6ba..bef8b4867 100644
--- a/store/sql_store.go
+++ b/store/sql_store.go
@@ -7,6 +7,9 @@ import (
l4g "code.google.com/p/log4go"
"crypto/aes"
"crypto/cipher"
+ "crypto/hmac"
+ "crypto/sha256"
+ "crypto/sha512"
crand "crypto/rand"
dbsql "database/sql"
"encoding/base64"
@@ -327,20 +330,26 @@ func encrypt(key []byte, text string) (string, error) {
}
plaintext := []byte(text)
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
- ciphertext := make([]byte, aes.BlockSize+len(plaintext))
+ macfn := hmac.New(sha256.New, akey)
+ ciphertext := make([]byte, aes.BlockSize+macfn.Size()+len(plaintext))
iv := ciphertext[:aes.BlockSize]
if _, err := io.ReadFull(crand.Reader, iv); err != nil {
return "", err
}
stream := cipher.NewCFBEncrypter(block, iv)
- stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext)
+ stream.XORKeyStream(ciphertext[aes.BlockSize+macfn.Size():], plaintext)
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ mac := macfn.Sum(nil)
+ copy(ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()], mac)
return base64.URLEncoding.EncodeToString(ciphertext), nil
}
@@ -351,9 +360,26 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "{}", nil
}
- ciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)
+ ciphertext, err := base64.URLEncoding.DecodeString(cryptoText)
+ if err != nil {
+ return "", err
+ }
+
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
+ macfn := hmac.New(sha256.New, akey)
+ if len(ciphertext) < aes.BlockSize+macfn.Size() {
+ return "", errors.New("short ciphertext")
+ }
+
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ expectedMac := macfn.Sum(nil)
+ mac := ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()]
+ if hmac.Equal(expectedMac, mac) != true {
+ return "", errors.New("Incorrect MAC for the given ciphertext")
+ }
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
@@ -362,7 +388,7 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "", errors.New("ciphertext too short")
}
iv := ciphertext[:aes.BlockSize]
- ciphertext = ciphertext[aes.BlockSize:]
+ ciphertext = ciphertext[aes.BlockSize+macfn.Size():]
stream := cipher.NewCFBDecrypter(block, iv)