summaryrefslogtreecommitdiff
path: root/internal/stupidgcm/common.go
blob: bb100eb372cf39a3e2e69dec962316bdc50060bd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
// +build !without_openssl

package stupidgcm

import (
	"log"
)

/*
#include <openssl/evp.h>
*/
import "C"

type stupidAEADCommon struct {
	wiped            bool
	key              []byte
	openSSLEVPCipher *C.EVP_CIPHER
	nonceSize        int
}

// Overhead returns the number of bytes that are added for authentication.
//
// Part of the cipher.AEAD interface.
func (c *stupidAEADCommon) Overhead() int {
	return tagLen
}

// NonceSize returns the required size of the nonce / IV
//
// Part of the cipher.AEAD interface.
func (c *stupidAEADCommon) NonceSize() int {
	return c.nonceSize
}

// Seal encrypts "in" using "iv" and "authData" and append the result to "dst"
//
// Part of the cipher.AEAD interface.
func (c *stupidAEADCommon) Seal(dst, iv, in, authData []byte) []byte {
	return openSSLSeal(c, dst, iv, in, authData)
}

// Open decrypts "in" using "iv" and "authData" and append the result to "dst"
//
// Part of the cipher.AEAD interface.
func (c *stupidAEADCommon) Open(dst, iv, in, authData []byte) ([]byte, error) {
	return openSSLOpen(c, dst, iv, in, authData)
}

// Wipe tries to wipe the key from memory by overwriting it with zeros.
//
// This is not bulletproof due to possible GC copies, but
// still raises the bar for extracting the key.
func (c *stupidAEADCommon) Wipe() {
	key := c.key
	c.wiped = true
	c.key = nil
	for i := range key {
		key[i] = 0
	}
}

func (c *stupidAEADCommon) Wiped() bool {
	if c.wiped {
		return true
	}
	if len(c.key) != keyLen {
		log.Panicf("wrong key length %d", len(c.key))
	}
	return false
}