File: tagidentity.go

package info (click to toggle)
age-plugin-tpm 1.0.1-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 196 kB
  • sloc: makefile: 23
file content (95 lines) | stat: -rw-r--r-- 2,405 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
package plugin

import (
	"crypto/subtle"
	"errors"
	"fmt"

	"filippo.io/age"
	"filippo.io/age/tag"
	"filippo.io/hpke"
	"github.com/google/go-tpm/tpm2/transport"
)

// TPMTagIdentity implements the p256tag identity handler
type TPMTagIdentity struct {
	tpm      transport.TPMCloser
	identity *Identity
	pin      func() ([]byte, error)
}

func NewTPMTagIdentity(tpm transport.TPMCloser, pin func() ([]byte, error), identity *Identity) *TPMTagIdentity {
	return &TPMTagIdentity{tpm, identity, pin}
}

var _ age.Identity = &TPMTagIdentity{}

func (t *TPMTagIdentity) unwrap(block *age.Stanza) ([]byte, error) {
	if len(block.Args) < 2 || block.Type != "p256tag" {
		return nil, age.ErrIncorrectIdentity
	}

	tag, err := b64Decode(block.Args[0])
	if err != nil {
		return nil, fmt.Errorf("failed base64 decode session key: %v", err)
	}

	sessionKey, err := b64Decode(block.Args[1])
	if err != nil {
		return nil, fmt.Errorf("failed base64 decode session key: %v", err)
	}

	rsp, err := t.identity.Recipient()
	if err != nil {
		return nil, fmt.Errorf("unwrap: failed to get recipient from identity %v", err)
	}

	itag, err := rsp.Tag(sessionKey)
	if err != nil {
		return nil, fmt.Errorf("unwrap: failed to get tag from recipient: %v", err)
	}

	// Check if we are dealing with the correct key
	if subtle.ConstantTimeCompare(tag, itag) != 1 {
		return nil, age.ErrIncorrectIdentity
	}
	var pin []byte
	if t.identity.HasPIN() {
		pin, err = t.pin()
		if err != nil {
			return nil, fmt.Errorf("failed to get pin: %v", err)
		}
	}

	k, err := hpke.NewDHKEMPrivateKey(NewTPMKeyExchange(t.tpm, pin, t.identity))
	if err != nil {
		return nil, fmt.Errorf("failed to unwrap file key: %v", err)
	}
	r, err := hpke.NewRecipient(sessionKey, k, hpke.HKDFSHA256(), hpke.ChaCha20Poly1305(), []byte("age-encryption.org/p256tag"))
	if err != nil {
		return nil, fmt.Errorf("failed to unwrap file key: %v", err)
	}
	return r.Open(nil, block.Body)
}

func (t *TPMTagIdentity) Unwrap(stanzas []*age.Stanza) ([]byte, error) {
	for _, s := range stanzas {
		fileKey, err := t.unwrap(s)
		if errors.Is(err, age.ErrIncorrectIdentity) {
			continue
		}
		if err != nil {
			return nil, err
		}
		return fileKey, nil
	}
	return nil, age.ErrIncorrectIdentity
}

func (t *TPMTagIdentity) Recipient() *tag.Recipient {
	resp, err := NewTagRecipient(t.identity.publickey)
	if err != nil {
		panic("this is unexpected")
	}
	return resp
}