summaryrefslogtreecommitdiffstats
path: root/store
diff options
context:
space:
mode:
authorCorey Hulen <corey@hulen.com>2015-06-30 20:17:32 -0800
committerCorey Hulen <corey@hulen.com>2015-06-30 20:17:32 -0800
commit5e204030ffe91aaab090a26547185017edf1d2e1 (patch)
treed5cf0e0442c4801cbf980819b09cf7ed0ba1a6cf /store
parent75c19380776e9ebf30345a922bd3a0e2df0711f4 (diff)
parent34d688ca72d8ef13b83987cc3b3d9b93ab989d9f (diff)
downloadchat-5e204030ffe91aaab090a26547185017edf1d2e1.tar.gz
chat-5e204030ffe91aaab090a26547185017edf1d2e1.tar.bz2
chat-5e204030ffe91aaab090a26547185017edf1d2e1.zip
Merge pull request #62 from jedisct1/authenticated-encryption
SQL store: use authenticated encryption
Diffstat (limited to 'store')
-rw-r--r--store/sql_store.go38
1 files changed, 32 insertions, 6 deletions
diff --git a/store/sql_store.go b/store/sql_store.go
index a2deea6ba..bef8b4867 100644
--- a/store/sql_store.go
+++ b/store/sql_store.go
@@ -7,6 +7,9 @@ import (
l4g "code.google.com/p/log4go"
"crypto/aes"
"crypto/cipher"
+ "crypto/hmac"
+ "crypto/sha256"
+ "crypto/sha512"
crand "crypto/rand"
dbsql "database/sql"
"encoding/base64"
@@ -327,20 +330,26 @@ func encrypt(key []byte, text string) (string, error) {
}
plaintext := []byte(text)
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
- ciphertext := make([]byte, aes.BlockSize+len(plaintext))
+ macfn := hmac.New(sha256.New, akey)
+ ciphertext := make([]byte, aes.BlockSize+macfn.Size()+len(plaintext))
iv := ciphertext[:aes.BlockSize]
if _, err := io.ReadFull(crand.Reader, iv); err != nil {
return "", err
}
stream := cipher.NewCFBEncrypter(block, iv)
- stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext)
+ stream.XORKeyStream(ciphertext[aes.BlockSize+macfn.Size():], plaintext)
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ mac := macfn.Sum(nil)
+ copy(ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()], mac)
return base64.URLEncoding.EncodeToString(ciphertext), nil
}
@@ -351,9 +360,26 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "{}", nil
}
- ciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)
+ ciphertext, err := base64.URLEncoding.DecodeString(cryptoText)
+ if err != nil {
+ return "", err
+ }
+
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
+ macfn := hmac.New(sha256.New, akey)
+ if len(ciphertext) < aes.BlockSize+macfn.Size() {
+ return "", errors.New("short ciphertext")
+ }
+
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ expectedMac := macfn.Sum(nil)
+ mac := ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()]
+ if hmac.Equal(expectedMac, mac) != true {
+ return "", errors.New("Incorrect MAC for the given ciphertext")
+ }
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
@@ -362,7 +388,7 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "", errors.New("ciphertext too short")
}
iv := ciphertext[:aes.BlockSize]
- ciphertext = ciphertext[aes.BlockSize:]
+ ciphertext = ciphertext[aes.BlockSize+macfn.Size():]
stream := cipher.NewCFBDecrypter(block, iv)