1
|
1 /**
|
|
2 * Cloud storage plugins for Orthanc
|
|
3 * Copyright (C) 2017-2020 Osimis S.A., Belgium
|
|
4 *
|
|
5 * This program is free software: you can redistribute it and/or
|
|
6 * modify it under the terms of the GNU Affero General Public License
|
|
7 * as published by the Free Software Foundation, either version 3 of
|
|
8 * the License, or (at your option) any later version.
|
|
9 *
|
|
10 * This program is distributed in the hope that it will be useful, but
|
|
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
13 * Affero General Public License for more details.
|
|
14 *
|
|
15 * You should have received a copy of the GNU Affero General Public License
|
|
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
17 **/
|
|
18
|
|
19 #include "EncryptionHelpers.h"
|
|
20 #include <assert.h>
|
|
21
|
|
22 #include <boost/lexical_cast.hpp>
|
|
23 #include <iostream>
|
|
24 #include "cryptopp/cryptlib.h"
|
|
25 #include "cryptopp/modes.h"
|
|
26 #include "cryptopp/hex.h"
|
|
27 #include "cryptopp/gcm.h"
|
|
28 #include "cryptopp/files.h"
|
|
29
|
|
30 const std::string EncryptionHelpers::HEADER_VERSION = "A1";
|
|
31
|
|
32 using namespace CryptoPP;
|
|
33
|
|
34 std::string EncryptionHelpers::ToHexString(const byte* block, size_t size)
|
|
35 {
|
|
36 std::string blockAsString = std::string(reinterpret_cast<const char*>(block), size);
|
|
37
|
|
38 return ToHexString(blockAsString);
|
|
39 }
|
|
40
|
|
41 std::string EncryptionHelpers::ToHexString(const std::string& block)
|
|
42 {
|
|
43 std::string hexString;
|
|
44 StringSource ss(block, true,
|
|
45 new HexEncoder(
|
|
46 new StringSink(hexString)
|
|
47 ) // StreamTransformationFilter
|
|
48 ); // StringSource
|
|
49
|
|
50 return hexString;
|
|
51 }
|
|
52
|
|
53 std::string EncryptionHelpers::ToHexString(const SecByteBlock& block)
|
|
54 {
|
|
55 return ToHexString(ToString(block));
|
|
56 }
|
|
57
|
|
58 std::string EncryptionHelpers::ToString(const CryptoPP::SecByteBlock& block)
|
|
59 {
|
|
60 return std::string(reinterpret_cast<const char*>(block.data()), block.size());
|
|
61 }
|
|
62
|
|
63 std::string EncryptionHelpers::ToString(uint32_t value)
|
|
64 {
|
|
65 return std::string(reinterpret_cast<const char*>(&value), 4);
|
|
66 }
|
|
67
|
|
68 void EncryptionHelpers::ReadKey(CryptoPP::SecByteBlock& key, const std::string& path)
|
|
69 {
|
|
70 try
|
|
71 {
|
|
72 FileSource fs(path.c_str(), true,
|
|
73 new HexDecoder(
|
|
74 new ArraySink(key.begin(), key.size())
|
|
75 )
|
|
76 );
|
|
77 }
|
|
78 catch (CryptoPP::Exception& ex)
|
|
79 {
|
|
80 throw EncryptionException("unabled to read key from file '" + path + "': " + ex.what());
|
|
81 }
|
|
82 }
|
|
83
|
|
84 void EncryptionHelpers::SetCurrentMasterKey(uint32_t id, const std::string& path)
|
|
85 {
|
|
86 SecByteBlock key(AES_KEY_SIZE);
|
|
87
|
|
88 ReadKey(key, path);
|
|
89 SetCurrentMasterKey(id, key);
|
|
90 }
|
|
91
|
|
92 void EncryptionHelpers::AddPreviousMasterKey(uint32_t id, const std::string& path)
|
|
93 {
|
|
94 SecByteBlock key(AES_KEY_SIZE);
|
|
95
|
|
96 ReadKey(key, path);
|
|
97 AddPreviousMasterKey(id, key);
|
|
98 }
|
|
99
|
|
100 EncryptionHelpers::EncryptionHelpers(size_t maxConcurrentInputSize)
|
|
101 : concurrentInputSizeSemaphore_(maxConcurrentInputSize),
|
|
102 maxConcurrentInputSize_(maxConcurrentInputSize)
|
|
103 {
|
|
104 }
|
|
105
|
|
106 void EncryptionHelpers::SetCurrentMasterKey(uint32_t id, const CryptoPP::SecByteBlock& key)
|
|
107 {
|
|
108 encryptionMasterKey_ = key;
|
|
109 encryptionMasterKeyId_ = ToString(id);
|
|
110 }
|
|
111
|
|
112 void EncryptionHelpers::AddPreviousMasterKey(uint32_t id, const CryptoPP::SecByteBlock& key)
|
|
113 {
|
|
114 previousMasterKeys_[ToString(id)] = key;
|
|
115 }
|
|
116
|
|
117 const CryptoPP::SecByteBlock& EncryptionHelpers::GetMasterKey(const std::string& keyId)
|
|
118 {
|
|
119 if (encryptionMasterKeyId_ == keyId)
|
|
120 {
|
|
121 return encryptionMasterKey_;
|
|
122 }
|
|
123
|
|
124 if (previousMasterKeys_.find(keyId) == previousMasterKeys_.end())
|
|
125 {
|
|
126 throw EncryptionException("The master key whose id is '" + ToHexString(keyId) + "' could not be found. Unable to decrypt file");
|
|
127 }
|
|
128
|
|
129 return previousMasterKeys_.at(keyId);
|
|
130 }
|
|
131
|
|
132 void EncryptionHelpers::GenerateKey(CryptoPP::SecByteBlock& key)
|
|
133 {
|
|
134 AutoSeededRandomPool prng;
|
|
135
|
|
136 SecByteBlock tempKey(AES_KEY_SIZE);
|
|
137 prng.GenerateBlock( tempKey, tempKey.size() );
|
|
138 key = tempKey;
|
|
139 }
|
|
140
|
|
141 void EncryptionHelpers::Encrypt(std::string &output, const std::string &input)
|
|
142 {
|
|
143 Encrypt(output, input.data(), input.size());
|
|
144 }
|
|
145
|
|
146 void EncryptionHelpers::Encrypt(std::string &output, const char* data, size_t size)
|
|
147 {
|
|
148 if (size > maxConcurrentInputSize_)
|
|
149 {
|
|
150 throw EncryptionException("The file is too large to encrypt: " + boost::lexical_cast<std::string>(size) + " bytes. Try increasing the MaxConcurrentInputSize");
|
|
151 }
|
|
152
|
|
153 Orthanc::Semaphore::Locker lock(concurrentInputSizeSemaphore_, size);
|
|
154
|
|
155 EncryptInternal(output, data, size, encryptionMasterKey_);
|
|
156 }
|
|
157
|
|
158 void EncryptionHelpers::Decrypt(std::string &output, const std::string &input)
|
|
159 {
|
|
160 output.resize(input.size() - OVERHEAD_SIZE);
|
|
161 Decrypt(const_cast<char*>(output.data()), input.data(), input.size());
|
|
162 }
|
|
163
|
|
164 void EncryptionHelpers::Decrypt(char* output, const char* data, size_t size)
|
|
165 {
|
|
166 if (size > maxConcurrentInputSize_)
|
|
167 {
|
|
168 throw EncryptionException("The file is too large to decrypt: " + boost::lexical_cast<std::string>(size) + " bytes. Try increasing the MaxConcurrentInputSize");
|
|
169 }
|
|
170
|
|
171 Orthanc::Semaphore::Locker lock(concurrentInputSizeSemaphore_, size);
|
|
172
|
|
173 if (size < HEADER_VERSION_SIZE)
|
|
174 {
|
|
175 throw EncryptionException("Unable to decrypt data, no header found");
|
|
176 }
|
|
177
|
|
178 std::string version = std::string(data, HEADER_VERSION_SIZE);
|
|
179
|
|
180 if (version != "A1")
|
|
181 {
|
|
182 throw EncryptionException("Unable to decrypt data, version '" + version + "' is not supported");
|
|
183 }
|
|
184
|
|
185 if (size < (HEADER_VERSION_SIZE + MASTER_KEY_ID_SIZE))
|
|
186 {
|
|
187 throw EncryptionException("Unable to decrypt data, no master key id found");
|
|
188 }
|
|
189
|
|
190 std::string decryptionMasterKeyId = std::string(data + HEADER_VERSION_SIZE, MASTER_KEY_ID_SIZE);
|
|
191
|
|
192 const SecByteBlock& decryptionMasterKey = GetMasterKey(decryptionMasterKeyId);
|
|
193 DecryptInternal(output, data, size, decryptionMasterKey);
|
|
194 }
|
|
195
|
|
196 void EncryptionHelpers::EncryptPrefixSecBlock(std::string& output, const CryptoPP::SecByteBlock& input, const CryptoPP::SecByteBlock& masterKey)
|
|
197 {
|
|
198 try
|
|
199 {
|
|
200 SecByteBlock iv(16);
|
|
201 memset(iv.data(), 0, iv.size());
|
|
202
|
|
203 CTR_Mode<AES>::Encryption e;
|
|
204 e.SetKeyWithIV(masterKey, masterKey.size(), iv.data(), iv.size());
|
|
205
|
|
206 std::string inputString = ToString(input);
|
|
207
|
|
208 // The StreamTransformationFilter adds padding
|
|
209 // as required. ECB and CBC Mode must be padded
|
|
210 // to the block size of the cipher.
|
|
211 StringSource ss(inputString, true,
|
|
212 new StreamTransformationFilter(e,
|
|
213 new StringSink(output)
|
|
214 ) // StreamTransformationFilter
|
|
215 ); // StringSource
|
|
216 }
|
|
217 catch (CryptoPP::Exception& e)
|
|
218 {
|
|
219 throw EncryptionException(e.what());
|
|
220 }
|
|
221
|
|
222 assert(output.size() == input.size());
|
|
223 }
|
|
224
|
|
225 void EncryptionHelpers::DecryptPrefixSecBlock(CryptoPP::SecByteBlock& output, const std::string& input, const CryptoPP::SecByteBlock& masterKey)
|
|
226 {
|
|
227 try
|
|
228 {
|
|
229 SecByteBlock iv(16);
|
|
230 memset(iv.data(), 0, iv.size());
|
|
231
|
|
232 CTR_Mode<AES>::Decryption d;
|
|
233 d.SetKeyWithIV(masterKey, masterKey.size(), iv.data(), iv.size());
|
|
234
|
|
235 std::string outputString;
|
|
236
|
|
237 // The StreamTransformationFilter adds padding
|
|
238 // as required. ECB and CBC Mode must be padded
|
|
239 // to the block size of the cipher.
|
|
240 StringSource ss(input, true,
|
|
241 new StreamTransformationFilter(d,
|
|
242 new StringSink(outputString)
|
|
243 ) // StreamTransformationFilter
|
|
244 ); // StringSource
|
|
245
|
|
246 output.Assign((const byte*)outputString.data(), outputString.size());
|
|
247 }
|
|
248 catch (CryptoPP::Exception& e)
|
|
249 {
|
|
250 throw EncryptionException(e.what());
|
|
251 }
|
|
252
|
|
253 assert(output.size() == input.size());
|
|
254 }
|
|
255
|
|
256
|
|
257 void EncryptionHelpers::EncryptInternal(std::string& output, const char* data, size_t size, const CryptoPP::SecByteBlock& masterKey)
|
|
258 {
|
|
259 SecByteBlock iv(IV_SIZE);
|
|
260 randomGenerator_.GenerateBlock(iv, iv.size()); // with GCM, the iv is supposed to be a nonce (not a random number). However, since each dataKey is used only once, we consider a random number is fine.
|
|
261
|
|
262 SecByteBlock dataKey;
|
|
263 GenerateKey(dataKey);
|
|
264
|
|
265 // std::cout << ToHexString(dataKey) << std::endl;
|
|
266 // std::cout << ToHexString(iv) << std::endl;
|
|
267 std::string encryptedDataKey;
|
|
268 std::string encryptedIv;
|
|
269
|
|
270 EncryptPrefixSecBlock(encryptedIv, iv, masterKey);
|
|
271 EncryptPrefixSecBlock(encryptedDataKey, dataKey, masterKey);
|
|
272
|
|
273 std::string prefix = HEADER_VERSION + encryptionMasterKeyId_ + encryptedIv + encryptedDataKey;
|
|
274
|
|
275 try
|
|
276 {
|
|
277 GCM<AES>::Encryption e;
|
|
278 e.SetKeyWithIV(dataKey, dataKey.size(), iv, sizeof(iv));
|
|
279
|
|
280 // the output text starts with the unencrypted prefix
|
|
281 output = prefix;
|
|
282
|
|
283 AuthenticatedEncryptionFilter ef(e,
|
|
284 new StringSink(output), false, INTEGRITY_CHECK_TAG_SIZE
|
|
285 );
|
|
286
|
|
287
|
|
288 // AuthenticatedEncryptionFilter::ChannelPut
|
|
289 // defines two channels: "" (empty) and "AAD"
|
|
290 // channel "" is encrypted and authenticated
|
|
291 // channel "AAD" is authenticated
|
|
292 ef.ChannelPut("AAD", (const byte*)prefix.data(), prefix.size());
|
|
293 ef.ChannelMessageEnd("AAD");
|
|
294
|
|
295 // Authenticated data *must* be pushed before
|
|
296 // Confidential/Authenticated data. Otherwise
|
|
297 // we must catch the BadState exception
|
|
298 ef.ChannelPut("", (const byte*)data, size);
|
|
299 ef.ChannelMessageEnd("");
|
|
300 }
|
|
301 catch(CryptoPP::Exception& e)
|
|
302 {
|
|
303 throw EncryptionException(e.what());
|
|
304 }
|
|
305 }
|
|
306
|
|
307 void EncryptionHelpers::DecryptInternal(char* output, const char* data, size_t size, const CryptoPP::SecByteBlock& masterKey)
|
|
308 {
|
|
309 size_t prefixSize = HEADER_VERSION_SIZE + MASTER_KEY_ID_SIZE + IV_SIZE + AES_KEY_SIZE;
|
|
310
|
|
311 std::string prefix = std::string(data, prefixSize);
|
|
312 std::string mac = std::string(data + size - INTEGRITY_CHECK_TAG_SIZE, INTEGRITY_CHECK_TAG_SIZE);
|
|
313
|
|
314 std::string encryptedIv = prefix.substr(HEADER_VERSION_SIZE + MASTER_KEY_ID_SIZE, IV_SIZE);
|
|
315 std::string encryptedDataKey = prefix.substr(HEADER_VERSION_SIZE + MASTER_KEY_ID_SIZE + IV_SIZE, AES_KEY_SIZE);
|
|
316
|
|
317 SecByteBlock dataKey;
|
|
318 SecByteBlock iv;
|
|
319
|
|
320 DecryptPrefixSecBlock(iv, encryptedIv, masterKey);
|
|
321 DecryptPrefixSecBlock(dataKey, encryptedDataKey, masterKey);
|
|
322 // std::cout << ToHexString(dataKey) << std::endl;
|
|
323 // std::cout << ToHexString(iv) << std::endl;
|
|
324
|
|
325 GCM<AES>::Decryption d;
|
|
326 d.SetKeyWithIV(dataKey, sizeof(dataKey), iv, sizeof(iv));
|
|
327
|
|
328 try {
|
|
329 AuthenticatedDecryptionFilter df(d, NULL,
|
|
330 AuthenticatedDecryptionFilter::MAC_AT_BEGIN |
|
|
331 AuthenticatedDecryptionFilter::THROW_EXCEPTION, INTEGRITY_CHECK_TAG_SIZE);
|
|
332
|
|
333 // The order of the following calls are important
|
|
334 df.ChannelPut("", (const byte*)mac.data(), mac.size());
|
|
335 df.ChannelPut("AAD", (const byte*)prefix.data(), prefix.size());
|
|
336 df.ChannelPut("", (const byte*)(data) + prefixSize, size - INTEGRITY_CHECK_TAG_SIZE - prefixSize);
|
|
337
|
|
338 // If the object throws, it will most likely occur
|
|
339 // during ChannelMessageEnd()
|
|
340 df.ChannelMessageEnd("AAD");
|
|
341 df.ChannelMessageEnd("");
|
|
342
|
|
343 // If the object does not throw, here's the only
|
|
344 // opportunity to check the data's integrity
|
|
345 if (!df.GetLastResult())
|
|
346 {
|
|
347 throw EncryptionException("The decryption filter failed for some unknown reason. Integrity check failed ?");
|
|
348 }
|
|
349
|
|
350 // Remove data from channel
|
|
351 size_t n = (size_t)-1;
|
|
352
|
|
353 // Recover plain text
|
|
354 df.SetRetrievalChannel("");
|
|
355 n = (size_t)df.MaxRetrievable();
|
|
356
|
|
357 if(n > 0)
|
|
358 {
|
|
359 assert(n == size - OVERHEAD_SIZE);
|
|
360
|
|
361 df.Get((byte*)output, n);
|
|
362 }
|
|
363 }
|
|
364 catch (CryptoPP::Exception& ex)
|
|
365 {
|
|
366 throw EncryptionException(ex.what());
|
|
367 }
|
|
368 }
|