![github-actions[bot]](/assets/img/avatar_default.png)
* Add go to rule S5542 * SONARGO-136: Add S5542 for Go * Improvements based on review --------- Co-authored-by: daniel-teuchert-sonarsource <daniel-teuchert-sonarsource@users.noreply.github.com> Co-authored-by: Daniel Teuchert <daniel.teuchert@sonarsource.com> Co-authored-by: daniel-teuchert-sonarsource <141642369+daniel-teuchert-sonarsource@users.noreply.github.com>
154 lines
3.0 KiB
Plaintext
154 lines
3.0 KiB
Plaintext
|
|
include::../summary.adoc[]
|
|
|
|
== Why is this an issue?
|
|
|
|
include::../rationale.adoc[]
|
|
|
|
include::../impact.adoc[]
|
|
|
|
// How to fix it section
|
|
|
|
== How to fix it
|
|
|
|
=== Code examples
|
|
|
|
==== Noncompliant code example
|
|
|
|
Example with a symmetric cipher, AES in CBC mode:
|
|
|
|
[source,go,diff-id=1,diff-type=noncompliant]
|
|
----
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/rand"
|
|
)
|
|
func encrypt() {
|
|
plaintext := []byte("Exampleplaintext")
|
|
|
|
key := make([]byte, 32)
|
|
rand.Read(key)
|
|
block, _ := aes.NewCipher(key)
|
|
iv := make([]byte, block.BlockSize())
|
|
rand.Read(iv)
|
|
|
|
encrypter := cipher.NewCBCEncrypter(block, iv) // Noncompliant
|
|
|
|
ciphertext := make([]byte, len(plaintext))
|
|
encrypter.CryptBlocks(ciphertext, plaintext)
|
|
}
|
|
----
|
|
|
|
The following example shows the function `cipher.Block.Encrypt` being used directly to run AES in a self-build ECB mode:
|
|
|
|
[source,go]
|
|
----
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/rand"
|
|
)
|
|
func encrypt() {
|
|
plaintext := []byte("Exampleplaintext")
|
|
|
|
key := make([]byte, 32)
|
|
rand.Read(key)
|
|
block, _ := aes.NewCipher(key)
|
|
|
|
ciphertext := make([]byte, len(plaintext))
|
|
block.Encrypt(ciphertext, plaintext) // Noncompliant
|
|
}
|
|
----
|
|
|
|
Example with an asymetric cipher, RSA with PKCS1v15 padding:
|
|
|
|
[source,go,diff-id=2,diff-type=noncompliant]
|
|
----
|
|
import (
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
)
|
|
func encrypt() {
|
|
random := rand.Reader
|
|
plaintext := []byte("Exampleplaintext")
|
|
privateKey, _ := rsa.GenerateKey(random, 4096)
|
|
ciphertext, _ := rsa.EncryptPKCS1v15(random, &privateKey.PublicKey, plaintext) // Noncompliant
|
|
}
|
|
----
|
|
|
|
==== Compliant solution
|
|
|
|
include::../common/fix/aes-compliant-example.adoc[]
|
|
|
|
[source,go,diff-id=1,diff-type=compliant]
|
|
----
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/rand"
|
|
)
|
|
func encrypt() {
|
|
plaintext := []byte("Exampleplaintext")
|
|
|
|
key := make([]byte, 32)
|
|
rand.Read(key)
|
|
block, _ := aes.NewCipher(key)
|
|
nonce := make([]byte, 12)
|
|
rand.Read(nonce)
|
|
|
|
aesgcm, _ := cipher.NewGCM(block)
|
|
|
|
ciphertext := aesgcm.Seal(nil, nonce, plaintext, nil)
|
|
}
|
|
----
|
|
|
|
include::../common/fix/rsa-compliant-example.adoc[]
|
|
|
|
[source,go,diff-id=2,diff-type=compliant]
|
|
----
|
|
import (
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/sha256"
|
|
)
|
|
func encrypt() {
|
|
random := rand.Reader
|
|
plaintext := []byte("Exampleplaintext")
|
|
privateKey, _ := rsa.GenerateKey(random, 4096)
|
|
ciphertext, _ := rsa.EncryptOAEP(sha256.New(), random, &privateKey.PublicKey, plaintext, nil)
|
|
}
|
|
----
|
|
|
|
=== How does this work?
|
|
|
|
include::../common/fix/fix.adoc[]
|
|
|
|
|
|
|
|
== Resources
|
|
|
|
include::../common/resources/docs.adoc[]
|
|
|
|
include::../common/resources/articles.adoc[]
|
|
|
|
include::../common/resources/presentations.adoc[]
|
|
|
|
include::../common/resources/standards.adoc[]
|
|
|
|
|
|
ifdef::env-github,rspecator-view[]
|
|
|
|
'''
|
|
== Implementation Specification
|
|
(visible only on this page)
|
|
|
|
include::../message.adoc[]
|
|
|
|
'''
|
|
== Comments And Links
|
|
(visible only on this page)
|
|
|
|
include::../comments-and-links.adoc[]
|
|
|
|
endif::env-github,rspecator-view[]
|