docker/swarmkit

View on GitHub
ca/keyutils/keyutils.go

Summary

Maintainability
A
0 mins
Test Coverage
// Package keyutils serves as a utility to parse, encrypt and decrypt
// PKCS#1 and PKCS#8 private keys based on current FIPS mode status,
// supporting only EC type keys. It always allows PKCS#8 private keys
// and disallow PKCS#1 private keys in FIPS-mode.
package keyutils

import (
    "crypto"
    cryptorand "crypto/rand"
    "crypto/x509"
    "encoding/pem"
    "errors"

    "github.com/cloudflare/cfssl/helpers"
    "github.com/moby/swarmkit/v2/ca/pkcs8"
)

// Formatter provides an interface for converting keys to the right format, and encrypting and decrypting keys
type Formatter interface {
    ParsePrivateKeyPEMWithPassword(pemBytes, password []byte) (crypto.Signer, error)
    DecryptPEMBlock(block *pem.Block, password []byte) ([]byte, error)
    EncryptPEMBlock(data, password []byte) (*pem.Block, error)
}

// ErrFIPSUnsupportedKeyFormat is returned when encryption/decryption operations are attempted on a PKCS1 key
// when FIPS mode is enabled.
var ErrFIPSUnsupportedKeyFormat = errors.New("unsupported key format due to FIPS compliance")

// Default is the default key util, where FIPS is not required
var Default Formatter = &utils{fips: false}

// FIPS is the key utility which enforces FIPS compliance
var FIPS Formatter = &utils{fips: true}

type utils struct {
    fips bool
}

// IsPKCS8 returns true if the provided der bytes is encrypted/unencrypted PKCS#8 key
func IsPKCS8(derBytes []byte) bool {
    if _, err := x509.ParsePKCS8PrivateKey(derBytes); err == nil {
        return true
    }

    return pkcs8.IsEncryptedPEMBlock(&pem.Block{
        Type:    "PRIVATE KEY",
        Headers: nil,
        Bytes:   derBytes,
    })
}

// IsEncryptedPEMBlock checks if a PKCS#1 or PKCS#8 PEM-block is encrypted or not
func IsEncryptedPEMBlock(block *pem.Block) bool {
    return pkcs8.IsEncryptedPEMBlock(block) || x509.IsEncryptedPEMBlock(block)
}

// ParsePrivateKeyPEMWithPassword parses an encrypted or a decrypted PKCS#1 or PKCS#8 PEM to crypto.Signer.
// It returns an error in FIPS mode if PKCS#1 PEM bytes are passed.
func (u *utils) ParsePrivateKeyPEMWithPassword(pemBytes, password []byte) (crypto.Signer, error) {
    block, _ := pem.Decode(pemBytes)
    if block == nil {
        return nil, errors.New("Could not parse PEM")
    }

    if IsPKCS8(block.Bytes) {
        return pkcs8.ParsePrivateKeyPEMWithPassword(pemBytes, password)
    } else if u.fips {
        return nil, ErrFIPSUnsupportedKeyFormat
    }

    return helpers.ParsePrivateKeyPEMWithPassword(pemBytes, password)
}

// DecryptPEMBlock requires PKCS#1 or PKCS#8 PEM Block and password to decrypt and return unencrypted der []byte
// It returns an error in FIPS mode when PKCS#1 PEM Block is passed.
func (u *utils) DecryptPEMBlock(block *pem.Block, password []byte) ([]byte, error) {
    if IsPKCS8(block.Bytes) {
        return pkcs8.DecryptPEMBlock(block, password)
    } else if u.fips {
        return nil, ErrFIPSUnsupportedKeyFormat
    }

    return x509.DecryptPEMBlock(block, password)
}

// EncryptPEMBlock takes DER-format bytes and password to return an encrypted PKCS#1 or PKCS#8 PEM-block
// It returns an error in FIPS mode when PKCS#1 PEM bytes are passed.
func (u *utils) EncryptPEMBlock(data, password []byte) (*pem.Block, error) {
    if IsPKCS8(data) {
        return pkcs8.EncryptPEMBlock(data, password)
    } else if u.fips {
        return nil, ErrFIPSUnsupportedKeyFormat
    }

    cipherType := x509.PEMCipherAES256
    return x509.EncryptPEMBlock(cryptorand.Reader,
        "EC PRIVATE KEY",
        data,
        password,
        cipherType)
}