summaryrefslogtreecommitdiff
path: root/satp/crypto-kd-aesctr.go
blob: b3f290766e805ab67cf28971de58d3527fba2762 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
//
// Copyright (c) 2017 anygone contributors (see AUTHORS file)
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// * Redistributions of source code must retain the above copyright notice, this
//   list of conditions and the following disclaimer.
//
// * Redistributions in binary form must reproduce the above copyright notice,
//   this list of conditions and the following disclaimer in the documentation
//   and/or other materials provided with the distribution.
//
// * Neither the name of anygone nor the names of its
//   contributors may be used to endorse or promote products derived from
//   this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//

package satp

import (
	"crypto/aes"
	"crypto/cipher"
	"crypto/subtle"
	"encoding/binary"
	"errors"
	"strconv"
)

const (
	AES_CTR_KD_SALT_LENGTH = aes.BlockSize - 2 // two bytes spare for counter
)

type AESCTRKeyDerivation struct {
	cipher cipher.Block
	salt   []byte
	role   KDRole
}

func (kd *AESCTRKeyDerivation) generateCTR(dir Direction, usage KeyUsage, sequenceNumber uint32, ctr []byte) {
	ctr[aes.BlockSize-1] = 0
	ctr[aes.BlockSize-2] = 0
	subtle.ConstantTimeCopy(1, ctr[:len(kd.salt)], kd.salt)

	keyID := [8]byte{}
	binary.BigEndian.PutUint32(keyID[:4], getKDLabel(kd.role, dir, usage))
	binary.BigEndian.PutUint32(keyID[4:], sequenceNumber)

	// unfortunately crypto.xorBytes is not exported...
	offset := len(kd.salt) - len(keyID)
	n := len(keyID)
	for i := 0; i < n; i++ {
		ctr[offset+i] = ctr[offset+i] ^ keyID[i]
	}
}

func (kd *AESCTRKeyDerivation) Generate(dir Direction, usage KeyUsage, sequenceNumber uint32, out []byte) error {
	// this needs to stay in this function so that the go compiler can detect that it doesn't escape
	// from this function and whence will get allocated on the stack
	ctr := [aes.BlockSize]byte{}
	kd.generateCTR(dir, usage, sequenceNumber, ctr[:])
	for i := range out { // unfortunately there is no memset-style function in go...
		out[i] = 0
	}
	c := cipher.NewCTR(kd.cipher, ctr[:])
	c.XORKeyStream(out, out)
	return nil
}

func NewAESCTRKeyDerivation(key, salt []byte, role KDRole) (KeyDerivation, error) {
	if len(salt) != AES_CTR_KD_SALT_LENGTH {
		return nil, errors.New("invalid salt size: " + strconv.Itoa(len(salt)))
	}

	kd := &AESCTRKeyDerivation{salt: salt, role: role}

	var err error
	if kd.cipher, err = aes.NewCipher(key); err != nil {
		return nil, err
	}
	return kd, nil
}