diff options
| author | Filippo Valsorda <filippo@golang.org> | 2021-08-27 08:44:45 -0400 |
|---|---|---|
| committer | Filippo Valsorda <filippo@golang.org> | 2021-09-15 21:47:49 +0000 |
| commit | c084706c2272f3d44b722e988e70d4a58e60e7f4 (patch) | |
| tree | e25982f01c65904da975b9459c6d2dc8bbd37524 | |
| parent | 32db794688a5a24a23a43f2a984cecd5b3d8da58 (diff) | |
| download | go-x-crypto-c084706c2272f3d44b722e988e70d4a58e60e7f4.tar.xz | |
poly1305: deprecate public package
Fixes golang/go#36646
Change-Id: Ic19dd2171c84472fc9d3f44803224b87fc5c0417
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/345649
Trust: Filippo Valsorda <filippo@golang.org>
Trust: Katie Hockman <katie@golang.org>
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Roland Shoemaker <roland@golang.org>
Reviewed-by: Katie Hockman <katie@golang.org>
| -rw-r--r-- | chacha20poly1305/chacha20poly1305.go | 6 | ||||
| -rw-r--r-- | chacha20poly1305/chacha20poly1305_generic.go | 2 | ||||
| -rw-r--r-- | chacha20poly1305/xchacha20poly1305.go | 2 | ||||
| -rw-r--r-- | internal/poly1305/bits_compat.go (renamed from poly1305/bits_compat.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/bits_go1.13.go (renamed from poly1305/bits_go1.13.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/mac_noasm.go (renamed from poly1305/mac_noasm.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/poly1305.go (renamed from poly1305/poly1305.go) | 2 | ||||
| -rw-r--r-- | internal/poly1305/poly1305_test.go (renamed from poly1305/poly1305_test.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_amd64.go (renamed from poly1305/sum_amd64.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_amd64.s (renamed from poly1305/sum_amd64.s) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_generic.go (renamed from poly1305/sum_generic.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_ppc64le.go (renamed from poly1305/sum_ppc64le.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_ppc64le.s (renamed from poly1305/sum_ppc64le.s) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_s390x.go (renamed from poly1305/sum_s390x.go) | 0 | ||||
| -rw-r--r-- | internal/poly1305/sum_s390x.s (renamed from poly1305/sum_s390x.s) | 0 | ||||
| -rw-r--r-- | internal/poly1305/vectors_test.go (renamed from poly1305/vectors_test.go) | 0 | ||||
| -rw-r--r-- | nacl/secretbox/secretbox.go | 2 | ||||
| -rw-r--r-- | poly1305/poly1305_compat.go | 91 | ||||
| -rw-r--r-- | ssh/cipher.go | 2 |
19 files changed, 101 insertions, 6 deletions
diff --git a/chacha20poly1305/chacha20poly1305.go b/chacha20poly1305/chacha20poly1305.go index 0d7bac3..93da732 100644 --- a/chacha20poly1305/chacha20poly1305.go +++ b/chacha20poly1305/chacha20poly1305.go @@ -26,6 +26,10 @@ const ( // NonceSizeX is the size of the nonce used with the XChaCha20-Poly1305 // variant of this AEAD, in bytes. NonceSizeX = 24 + + // Overhead is the size of the Poly1305 authentication tag, and the + // difference between a ciphertext length and its plaintext. + Overhead = 16 ) type chacha20poly1305 struct { @@ -47,7 +51,7 @@ func (c *chacha20poly1305) NonceSize() int { } func (c *chacha20poly1305) Overhead() int { - return 16 + return Overhead } func (c *chacha20poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { diff --git a/chacha20poly1305/chacha20poly1305_generic.go b/chacha20poly1305/chacha20poly1305_generic.go index fe191d3..96b2fd8 100644 --- a/chacha20poly1305/chacha20poly1305_generic.go +++ b/chacha20poly1305/chacha20poly1305_generic.go @@ -8,8 +8,8 @@ import ( "encoding/binary" "golang.org/x/crypto/chacha20" + "golang.org/x/crypto/internal/poly1305" "golang.org/x/crypto/internal/subtle" - "golang.org/x/crypto/poly1305" ) func writeWithPadding(p *poly1305.MAC, b []byte) { diff --git a/chacha20poly1305/xchacha20poly1305.go b/chacha20poly1305/xchacha20poly1305.go index d9d46b9..1cebfe9 100644 --- a/chacha20poly1305/xchacha20poly1305.go +++ b/chacha20poly1305/xchacha20poly1305.go @@ -35,7 +35,7 @@ func (*xchacha20poly1305) NonceSize() int { } func (*xchacha20poly1305) Overhead() int { - return 16 + return Overhead } func (x *xchacha20poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { diff --git a/poly1305/bits_compat.go b/internal/poly1305/bits_compat.go index 45b5c96..45b5c96 100644 --- a/poly1305/bits_compat.go +++ b/internal/poly1305/bits_compat.go diff --git a/poly1305/bits_go1.13.go b/internal/poly1305/bits_go1.13.go index ed52b34..ed52b34 100644 --- a/poly1305/bits_go1.13.go +++ b/internal/poly1305/bits_go1.13.go diff --git a/poly1305/mac_noasm.go b/internal/poly1305/mac_noasm.go index f184b67..f184b67 100644 --- a/poly1305/mac_noasm.go +++ b/internal/poly1305/mac_noasm.go diff --git a/poly1305/poly1305.go b/internal/poly1305/poly1305.go index 9d7a6af..4aaea81 100644 --- a/poly1305/poly1305.go +++ b/internal/poly1305/poly1305.go @@ -15,7 +15,7 @@ // used with a fixed key in order to generate one-time keys from an nonce. // However, in this package AES isn't used and the one-time key is specified // directly. -package poly1305 // import "golang.org/x/crypto/poly1305" +package poly1305 import "crypto/subtle" diff --git a/poly1305/poly1305_test.go b/internal/poly1305/poly1305_test.go index e7ec6d1..e7ec6d1 100644 --- a/poly1305/poly1305_test.go +++ b/internal/poly1305/poly1305_test.go diff --git a/poly1305/sum_amd64.go b/internal/poly1305/sum_amd64.go index 6d52233..6d52233 100644 --- a/poly1305/sum_amd64.go +++ b/internal/poly1305/sum_amd64.go diff --git a/poly1305/sum_amd64.s b/internal/poly1305/sum_amd64.s index 1d74f0f..1d74f0f 100644 --- a/poly1305/sum_amd64.s +++ b/internal/poly1305/sum_amd64.s diff --git a/poly1305/sum_generic.go b/internal/poly1305/sum_generic.go index c942a65..c942a65 100644 --- a/poly1305/sum_generic.go +++ b/internal/poly1305/sum_generic.go diff --git a/poly1305/sum_ppc64le.go b/internal/poly1305/sum_ppc64le.go index 4a06994..4a06994 100644 --- a/poly1305/sum_ppc64le.go +++ b/internal/poly1305/sum_ppc64le.go diff --git a/poly1305/sum_ppc64le.s b/internal/poly1305/sum_ppc64le.s index 58422aa..58422aa 100644 --- a/poly1305/sum_ppc64le.s +++ b/internal/poly1305/sum_ppc64le.s diff --git a/poly1305/sum_s390x.go b/internal/poly1305/sum_s390x.go index 62cc9f8..62cc9f8 100644 --- a/poly1305/sum_s390x.go +++ b/internal/poly1305/sum_s390x.go diff --git a/poly1305/sum_s390x.s b/internal/poly1305/sum_s390x.s index 69c64f8..69c64f8 100644 --- a/poly1305/sum_s390x.s +++ b/internal/poly1305/sum_s390x.s diff --git a/poly1305/vectors_test.go b/internal/poly1305/vectors_test.go index 4788950..4788950 100644 --- a/poly1305/vectors_test.go +++ b/internal/poly1305/vectors_test.go diff --git a/nacl/secretbox/secretbox.go b/nacl/secretbox/secretbox.go index a98d1bd..a2973e6 100644 --- a/nacl/secretbox/secretbox.go +++ b/nacl/secretbox/secretbox.go @@ -35,8 +35,8 @@ This package is interoperable with NaCl: https://nacl.cr.yp.to/secretbox.html. package secretbox // import "golang.org/x/crypto/nacl/secretbox" import ( + "golang.org/x/crypto/internal/poly1305" "golang.org/x/crypto/internal/subtle" - "golang.org/x/crypto/poly1305" "golang.org/x/crypto/salsa20/salsa" ) diff --git a/poly1305/poly1305_compat.go b/poly1305/poly1305_compat.go new file mode 100644 index 0000000..dd975a3 --- /dev/null +++ b/poly1305/poly1305_compat.go @@ -0,0 +1,91 @@ +// Copyright 2012 The Go Authors. All rights reserved. +// Use of this source code is governed by a BSD-style +// license that can be found in the LICENSE file. + +// Package poly1305 implements Poly1305 one-time message authentication code as +// specified in https://cr.yp.to/mac/poly1305-20050329.pdf. +// +// Poly1305 is a fast, one-time authentication function. It is infeasible for an +// attacker to generate an authenticator for a message without the key. However, a +// key must only be used for a single message. Authenticating two different +// messages with the same key allows an attacker to forge authenticators for other +// messages with the same key. +// +// Poly1305 was originally coupled with AES in order to make Poly1305-AES. AES was +// used with a fixed key in order to generate one-time keys from an nonce. +// However, in this package AES isn't used and the one-time key is specified +// directly. +// +// Deprecated: Poly1305 as implemented by this package is a cryptographic +// building block that is not safe for general purpose use. +// For encryption, use the full ChaCha20-Poly1305 construction implemented by +// golang.org/x/crypto/chacha20poly1305. For authentication, use a general +// purpose MAC such as HMAC implemented by crypto/hmac. +package poly1305 // import "golang.org/x/crypto/poly1305" + +import "golang.org/x/crypto/internal/poly1305" + +// TagSize is the size, in bytes, of a poly1305 authenticator. +// +// For use with golang.org/x/crypto/chacha20poly1305, chacha20poly1305.Overhead +// can be used instead. +const TagSize = 16 + +// Sum generates an authenticator for msg using a one-time key and puts the +// 16-byte result into out. Authenticating two different messages with the same +// key allows an attacker to forge messages at will. +func Sum(out *[16]byte, m []byte, key *[32]byte) { + poly1305.Sum(out, m, key) +} + +// Verify returns true if mac is a valid authenticator for m with the given key. +func Verify(mac *[16]byte, m []byte, key *[32]byte) bool { + return poly1305.Verify(mac, m, key) +} + +// New returns a new MAC computing an authentication +// tag of all data written to it with the given key. +// This allows writing the message progressively instead +// of passing it as a single slice. Common users should use +// the Sum function instead. +// +// The key must be unique for each message, as authenticating +// two different messages with the same key allows an attacker +// to forge messages at will. +func New(key *[32]byte) *MAC { + return &MAC{mac: poly1305.New(key)} +} + +// MAC is an io.Writer computing an authentication tag +// of the data written to it. +// +// MAC cannot be used like common hash.Hash implementations, +// because using a poly1305 key twice breaks its security. +// Therefore writing data to a running MAC after calling +// Sum or Verify causes it to panic. +type MAC struct { + mac *poly1305.MAC +} + +// Size returns the number of bytes Sum will return. +func (h *MAC) Size() int { return TagSize } + +// Write adds more data to the running message authentication code. +// It never returns an error. +// +// It must not be called after the first call of Sum or Verify. +func (h *MAC) Write(p []byte) (n int, err error) { + return h.mac.Write(p) +} + +// Sum computes the authenticator of all data written to the +// message authentication code. +func (h *MAC) Sum(b []byte) []byte { + return h.mac.Sum(b) +} + +// Verify returns whether the authenticator of all data written to +// the message authentication code matches the expected value. +func (h *MAC) Verify(expected []byte) bool { + return h.mac.Verify(expected) +} diff --git a/ssh/cipher.go b/ssh/cipher.go index 8bd6b3d..bddbde5 100644 --- a/ssh/cipher.go +++ b/ssh/cipher.go @@ -18,7 +18,7 @@ import ( "io/ioutil" "golang.org/x/crypto/chacha20" - "golang.org/x/crypto/poly1305" + "golang.org/x/crypto/internal/poly1305" ) const ( |
