mirror of
https://github.com/FiloSottile/age.git
synced 2025-12-23 05:25:14 +00:00
It was completely useless: the same checks in Match could be implemented in Unwrap, returning an early ErrIncorrectIdentity. Not sure why I added it. It felt clever at the time.
180 lines
5.6 KiB
Go
180 lines
5.6 KiB
Go
// Copyright 2019 Google LLC
|
|
//
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file or at
|
|
// https://developers.google.com/open-source/licenses/bsd
|
|
|
|
// Package age implements file encryption according to the age-encryption.org/v1
|
|
// specification.
|
|
//
|
|
// For most use cases, use the Encrypt and Decrypt functions with
|
|
// X25519Recipient and X25519Identity. If passphrase encryption is required, use
|
|
// ScryptRecipient and ScryptIdentity. For compatibility with existing SSH keys
|
|
// use the filippo.io/age/agessh package.
|
|
//
|
|
// Age encrypted files are binary and not malleable. For encoding them as text,
|
|
// use the filippo.io/age/armor package.
|
|
//
|
|
// Key management
|
|
//
|
|
// Age does not have a global keyring. Instead, since age keys are small,
|
|
// textual, and cheap, you are encoraged to generate dedicated keys for each
|
|
// task and application.
|
|
//
|
|
// Recipient public keys can be passed around as command line flags and in
|
|
// config files, while secret keys should be stored in dedicated files, through
|
|
// secret management systems, or as environment variables.
|
|
//
|
|
// There is no default path for age keys. Instead, they should be stored at
|
|
// application-specific paths. The CLI supports files where private keys are
|
|
// listed one per line, ignoring empty lines and lines starting with "#". These
|
|
// files can be parsed with ParseIdentities.
|
|
//
|
|
// When integrating age into a new system, it's recommended that you only
|
|
// support X25519 keys, and not SSH keys. The latter are supported for manual
|
|
// encryption operations. If you need to tie into existing key management
|
|
// infrastructure, you might want to consider implementing your own Recipient
|
|
// and Identity.
|
|
package age
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/rand"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
|
|
"filippo.io/age/internal/format"
|
|
"filippo.io/age/internal/stream"
|
|
)
|
|
|
|
// An Identity is a private key or other value that can decrypt an opaque file
|
|
// key from a recipient stanza.
|
|
//
|
|
// Unwrap must return ErrIncorrectIdentity for recipient stanzas that don't
|
|
// match the identity, any other error might be considered fatal.
|
|
type Identity interface {
|
|
Unwrap(block *Stanza) (fileKey []byte, err error)
|
|
}
|
|
|
|
var ErrIncorrectIdentity = errors.New("incorrect identity for recipient block")
|
|
|
|
// A Recipient is a public key or other value that can encrypt an opaque file
|
|
// key to a recipient stanza.
|
|
type Recipient interface {
|
|
Wrap(fileKey []byte) (*Stanza, error)
|
|
}
|
|
|
|
// A Stanza is a section of the age header that encapsulates the file key as
|
|
// encrypted to a specific recipient.
|
|
type Stanza struct {
|
|
Type string
|
|
Args []string
|
|
Body []byte
|
|
}
|
|
|
|
const fileKeySize = 16
|
|
const streamNonceSize = 16
|
|
|
|
// Encrypt encrypts a file to one or more recipients.
|
|
//
|
|
// Writes to the returned WriteCloser are encrypted and written to dst as an age
|
|
// file. Every recipient will be able to decrypt the file.
|
|
//
|
|
// The caller must call Close on the WriteCloser when done for the last chunk to
|
|
// be encrypted and flushed to dst.
|
|
func Encrypt(dst io.Writer, recipients ...Recipient) (io.WriteCloser, error) {
|
|
if len(recipients) == 0 {
|
|
return nil, errors.New("no recipients specified")
|
|
}
|
|
|
|
fileKey := make([]byte, fileKeySize)
|
|
if _, err := rand.Read(fileKey); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
hdr := &format.Header{}
|
|
for i, r := range recipients {
|
|
block, err := r.Wrap(fileKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to wrap key for recipient #%d: %v", i, err)
|
|
}
|
|
hdr.Recipients = append(hdr.Recipients, (*format.Stanza)(block))
|
|
|
|
if block.Type == "scrypt" && len(recipients) != 1 {
|
|
return nil, errors.New("an scrypt recipient must be the only one")
|
|
}
|
|
}
|
|
if mac, err := headerMAC(fileKey, hdr); err != nil {
|
|
return nil, fmt.Errorf("failed to compute header MAC: %v", err)
|
|
} else {
|
|
hdr.MAC = mac
|
|
}
|
|
if err := hdr.Marshal(dst); err != nil {
|
|
return nil, fmt.Errorf("failed to write header: %v", err)
|
|
}
|
|
|
|
nonce := make([]byte, streamNonceSize)
|
|
if _, err := rand.Read(nonce); err != nil {
|
|
return nil, err
|
|
}
|
|
if _, err := dst.Write(nonce); err != nil {
|
|
return nil, fmt.Errorf("failed to write nonce: %v", err)
|
|
}
|
|
|
|
return stream.NewWriter(streamKey(fileKey, nonce), dst)
|
|
}
|
|
|
|
// Decrypt decrypts a file encrypted to one or more identities.
|
|
//
|
|
// It returns a Reader reading the decrypted plaintext of the age file read
|
|
// from src. All identities will be tried until one successfully decrypts the file.
|
|
func Decrypt(src io.Reader, identities ...Identity) (io.Reader, error) {
|
|
if len(identities) == 0 {
|
|
return nil, errors.New("no identities specified")
|
|
}
|
|
|
|
hdr, payload, err := format.Parse(src)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to read header: %v", err)
|
|
}
|
|
if len(hdr.Recipients) > 20 {
|
|
return nil, errors.New("too many recipients")
|
|
}
|
|
|
|
var fileKey []byte
|
|
RecipientsLoop:
|
|
for _, r := range hdr.Recipients {
|
|
if r.Type == "scrypt" && len(hdr.Recipients) != 1 {
|
|
return nil, errors.New("an scrypt recipient must be the only one")
|
|
}
|
|
for _, i := range identities {
|
|
fileKey, err = i.Unwrap((*Stanza)(r))
|
|
if errors.Is(err, ErrIncorrectIdentity) {
|
|
continue
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
break RecipientsLoop
|
|
}
|
|
}
|
|
if fileKey == nil {
|
|
return nil, errors.New("no identity matched any of the recipients")
|
|
}
|
|
|
|
if mac, err := headerMAC(fileKey, hdr); err != nil {
|
|
return nil, fmt.Errorf("failed to compute header MAC: %v", err)
|
|
} else if !hmac.Equal(mac, hdr.MAC) {
|
|
return nil, errors.New("bad header MAC")
|
|
}
|
|
|
|
nonce := make([]byte, streamNonceSize)
|
|
if _, err := io.ReadFull(payload, nonce); err != nil {
|
|
return nil, fmt.Errorf("failed to read nonce: %v", err)
|
|
}
|
|
|
|
return stream.NewReader(streamKey(fileKey, nonce), payload)
|
|
}
|