Documentation ¶
Index ¶
- Variables
- func DecryptShortBuffer(k []byte, rcvd any) ([]byte, error)
- func ECDHDecrypt(data []byte, privateKey ECDHHandler) ([]byte, error)
- func ECDHEncrypt(data []byte, remote *ecdh.PublicKey, rnd io.Reader) ([]byte, error)
- func EncryptShortBuffer(k []byte, rcvd crypto.PublicKey) ([]byte, error)
- func Hash(b []byte, alg ...func() hash.Hash) []byte
- func MemClr(b []byte)
- func Sign(key crypto.Signer, buf []byte, opts ...crypto.SignerOpts) ([]byte, error)
- func Verify(key crypto.PublicKey, buf, sig []byte, opts ...crypto.SignerOpts) error
- type Bottle
- type ECDHHandler
- type IDCard
- func (id *IDCard) GetKeys(purpose string) []crypto.PublicKey
- func (id *IDCard) SetKeyDuration(k crypto.PublicKey, t time.Duration) error
- func (id *IDCard) SetKeyPurposes(k crypto.PublicKey, purposes ...string) error
- func (id *IDCard) Sign(k crypto.Signer) ([]byte, error)
- func (id *IDCard) UnmarshalBinary(b []byte) error
- type Membership
- type MessageFormat
- type MessageRecipient
- type MessageSignature
- type OpenResult
- type Opener
- type SubKey
Constants ¶
This section is empty.
Variables ¶
var ( ErrNoAppropriateKey = errors.New("no appropriate key available to open bottle") ErrVerifyFailed = errors.New("signature verification failed") )
Functions ¶
func DecryptShortBuffer ¶ added in v0.1.1
DecryptShortBuffer decrypts a given buffer
func ECDHDecrypt ¶
func ECDHDecrypt(data []byte, privateKey ECDHHandler) ([]byte, error)
ECDHDecrypt decrypts data received for us, using the private key passed (can be a tpm, etc)
func ECDHEncrypt ¶
ECDHEncrypt encrypts data for receiving by remote
func EncryptShortBuffer ¶ added in v0.1.1
EncryptShortBuffer performs a simple encryption of a buffer
func Hash ¶ added in v0.1.1
Hash is a helper function to perform hashes on buffers, including multi-level hashing
func Sign ¶ added in v0.1.4
Sign generates a signature for the given buffer. Hash will be performed as needed
func Verify ¶ added in v0.1.4
Verify will verify the given buffer against the signature, depending on the key type. If the key is a RSA key and PSS options are given, then the signature will be handled as a PSS signature.
Unlike Verify methods found in most packages, this one takes in the actual buffer to be signed and will perform the hash if it needs to be done.
Types ¶
type Bottle ¶ added in v0.1.1
type Bottle struct { Header map[string]any `json:"hdr,omitempty"` // extra values to be stored, will not be signed/encrypted unless the message is bottled Message []byte `json:"msg"` Format MessageFormat `json:"fmt"` Recipients []*MessageRecipient `json:"dst,omitempty"` // if Format != ClearText Signatures []*MessageSignature `json:"sig,omitempty"` // signature // contains filtered or unexported fields }
Bottle is a signed, encrypted message container. Any Format other than ClearText means the Message contains a Bottle that has been encrypted.
func AsCborBottle ¶ added in v0.1.3
AsCborBottle considers data to be a cbor-encoded Bottle, and will return a Bottle container matching this assumption
func AsJsonBottle ¶ added in v0.1.3
AsJsonBottle considers data to be a json-encoded Bottle, and will return a Bottle container matching this assumption
func NewBottle ¶ added in v0.1.1
NewBottle will return a new clean bottle only containing the provided data
func (*Bottle) BottleUp ¶ added in v0.1.1
BottleUp encodes the current message into itself, allowing application of extra layers
func (*Bottle) Encrypt ¶ added in v0.1.1
Encrypt encrypts the message so only recipients can decrypt it
func (*Bottle) IsCleanBottle ¶ added in v0.1.1
IsCleanBottle returns true if the Bottle is clean (ie. so signature has been scribbed on top) and contains another Bottle.
func (*Bottle) Sign ¶ added in v0.1.1
Sign signs the message, and can be called multiple times. Any message can be signed, including a raw message. It is however recommanded to bottle up an encrypted message before signing in order to ensure the encryption information is signed too.
Attempting to apply encryption to a message with a signature will always cause it to be bottled up
type IDCard ¶ added in v0.1.1
type IDCard struct { Self []byte `json:"self" cbor:"1,keyasint"` // our own public key (PKIX) Issued time.Time `json:"iss" cbor:"2,keyasint"` // issuance date. If two IDCard exist for the same public key, the most recent one will be taken into account SubKeys []*SubKey `json:"sub" cbor:"3,keyasint"` // known sub keys Revoke []*SubKey `json:"rev" cbor:"4,keyasint"` // any key into the revoke list will be strongly rejected Groups []*Membership `json:"grp" cbor:"5,keyasint"` // groups this key is member of Meta map[string]string `json:"meta" cbor:"6,keyasint"` // self-defined metadata }
IDCard is a basic ID for a given signature key that allows it to specify keys that can be used for encryption/etc
func (*IDCard) SetKeyDuration ¶ added in v0.1.1
SetKeyDuration specifies the duration for the given key
func (*IDCard) SetKeyPurposes ¶ added in v0.1.1
SetKeyPurposes specifies the purpose of a given key (sign, decrypt, etc)
func (*IDCard) UnmarshalBinary ¶ added in v0.1.1
UnmarshalBinary will read a signed ID card, returning an error if it wasn't signed
type Membership ¶ added in v0.1.4
type Membership struct { Subject []byte `json:"sub" cbor:"1,keyasint"` // must be == parent.Self (if empty, fill with parent.Self before sig) Key []byte `json:"key" cbor:"2,keyasint"` // group key (group identification) Status string `json:"sta" cbor:"3,keyasint"` // status of membership (valid|suspended) Issued time.Time `json:"iss" cbor:"4,keyasint"` // update time of membership info Info map[string]string `json:"nfo" cbor:"5,keyasint"` // subject information (name, etc) SignKey []byte `json:"sky" cbor:"6,keyasint"` // signature generating key (must be listed as sign key for the Key's IDCard) Signature []byte `json:"sig" cbor:"7,keyasint"` // signature of structure with sign=nil by group key }
Membership is a membership in a group.
func NewMembership ¶ added in v0.1.4
func NewMembership(member *IDCard, key []byte) *Membership
func (*Membership) Sign ¶ added in v0.1.4
func (m *Membership) Sign(key crypto.Signer, opts ...crypto.SignerOpts) error
Sign signs the membership using the provided key
func (*Membership) SignatureBytes ¶ added in v0.1.4
func (m *Membership) SignatureBytes() ([]byte, error)
SignatureBytes returns a representation of Membership that can be used to sign or verify the structure
type MessageFormat ¶ added in v0.1.1
type MessageFormat int
const ( ClearText MessageFormat = iota CborBottle // bottle in a bottle AES // AES+AEAD encrypted cbor bottle JsonBottle // bottle in a bottle (json version) )
type MessageRecipient ¶ added in v0.1.1
type MessageSignature ¶ added in v0.1.1
type MessageSignature struct { Type int `json:"typ,omitempty"` // always 0 (for now) Signer []byte `json:"key"` // signature's key Data []byte `json:"dat"` // signature payload, similar format to jwt (NOTE: ECDSA signatures are weird) // contains filtered or unexported fields }
func (*MessageSignature) Verify ¶ added in v0.1.1
func (sig *MessageSignature) Verify(buf []byte, opts ...crypto.SignerOpts) error
type OpenResult ¶ added in v0.1.1
type OpenResult struct { Decryption int // number of performed decryptions Signatures []*MessageSignature // verified message signatures Bottles []*Bottle }
type Opener ¶ added in v0.1.1
type Opener struct {
// contains filtered or unexported fields
}
Opener allows opening a Bottle
func (*Opener) Open ¶ added in v0.1.1
func (o *Opener) Open(b *Bottle) ([]byte, *OpenResult, error)
Open opens the given Bottle, decrypting any encrypted elements, checking all signatures and returning the embedded buffer in the end
type SubKey ¶ added in v0.1.1
type SubKey struct { Key []byte `json:"key" cbor:"1,keyasint"` // public key as PKIX Issued time.Time `json:"iss" cbor:"2,keyasint"` // issuance (addition) date Expires *time.Time `json:"exp,omitempty" cbor:"3,keyasint,omitempty"` // expiration date (if any) Purposes []string `json:"pur" cbor:"4,keyasint"` // purposes: can contain "sign", "decrypt" }
SubKey is a key found in a given id card