2014-08-26 21:02:40 +04:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-01-16 22:28:22 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2014-08-26 21:02:40 +04:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2015-10-05 21:54:56 +03:00
|
|
|
* @author Andreas Fischer <bantu@owncloud.com>
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author lynn-stephenson <lynn.stephenson@protonmail.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2014-08-26 21:02:40 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-08-26 21:02:40 +04:00
|
|
|
namespace OC\Security;
|
|
|
|
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\IConfig;
|
2014-08-26 21:02:40 +04:00
|
|
|
use OCP\Security\ICrypto;
|
2014-08-27 02:49:53 +04:00
|
|
|
use OCP\Security\ISecureRandom;
|
2019-11-22 22:52:10 +03:00
|
|
|
use phpseclib\Crypt\AES;
|
|
|
|
use phpseclib\Crypt\Hash;
|
2014-08-26 21:02:40 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class Crypto provides a high-level encryption layer using AES-CBC. If no key has been provided
|
|
|
|
* it will use the secret defined in config.php as key. Additionally the message will be HMAC'd.
|
|
|
|
*
|
|
|
|
* Usage:
|
|
|
|
* $encryptWithDefaultPassword = \OC::$server->getCrypto()->encrypt('EncryptedText');
|
|
|
|
* $encryptWithCustompassword = \OC::$server->getCrypto()->encrypt('EncryptedText', 'password');
|
|
|
|
*
|
|
|
|
* @package OC\Security
|
|
|
|
*/
|
|
|
|
class Crypto implements ICrypto {
|
2015-08-03 07:39:53 +03:00
|
|
|
/** @var AES $cipher */
|
2014-08-26 21:02:40 +04:00
|
|
|
private $cipher;
|
|
|
|
/** @var int */
|
|
|
|
private $ivLength = 16;
|
2014-08-27 02:49:53 +04:00
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
2014-08-26 21:02:40 +04:00
|
|
|
|
2015-08-04 22:41:33 +03:00
|
|
|
/**
|
|
|
|
* @param IConfig $config
|
|
|
|
* @param ISecureRandom $random
|
|
|
|
*/
|
2020-05-11 11:31:46 +03:00
|
|
|
public function __construct(IConfig $config) {
|
2015-08-03 07:39:53 +03:00
|
|
|
$this->cipher = new AES();
|
2014-08-27 02:49:53 +04:00
|
|
|
$this->config = $config;
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $message The message to authenticate
|
|
|
|
* @param string $password Password to use (defaults to `secret` in config.php)
|
|
|
|
* @return string Calculated HMAC
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
public function calculateHMAC(string $message, string $password = ''): string {
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($password === '') {
|
2014-08-27 02:49:53 +04:00
|
|
|
$password = $this->config->getSystemValue('secret');
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
|
|
|
|
2014-09-03 13:03:27 +04:00
|
|
|
// Append an "a" behind the password and hash it to prevent reusing the same password as for encryption
|
|
|
|
$password = hash('sha512', $password . 'a');
|
|
|
|
|
2015-08-03 07:39:53 +03:00
|
|
|
$hash = new Hash('sha512');
|
2014-08-26 21:02:40 +04:00
|
|
|
$hash->setKey($password);
|
|
|
|
return $hash->hash($message);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypts a value and adds an HMAC (Encrypt-Then-MAC)
|
|
|
|
* @param string $plaintext
|
|
|
|
* @param string $password Password to encrypt, if not specified the secret from config.php will be taken
|
|
|
|
* @return string Authenticated ciphertext
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
public function encrypt(string $plaintext, string $password = ''): string {
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($password === '') {
|
2014-08-27 02:49:53 +04:00
|
|
|
$password = $this->config->getSystemValue('secret');
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
2020-10-16 08:04:38 +03:00
|
|
|
$keyMaterial = hash_hkdf('sha512', $password);
|
|
|
|
$this->cipher->setPassword(substr($keyMaterial, 0, 32));
|
2014-08-26 21:02:40 +04:00
|
|
|
|
2020-05-11 11:31:46 +03:00
|
|
|
$iv = \random_bytes($this->ivLength);
|
2014-08-26 21:02:40 +04:00
|
|
|
$this->cipher->setIV($iv);
|
|
|
|
|
|
|
|
$ciphertext = bin2hex($this->cipher->encrypt($plaintext));
|
2020-05-11 11:31:46 +03:00
|
|
|
$iv = bin2hex($iv);
|
2020-10-16 08:04:38 +03:00
|
|
|
$hmac = bin2hex($this->calculateHMAC($ciphertext.$iv, substr($keyMaterial, 32)));
|
2014-08-26 21:02:40 +04:00
|
|
|
|
2020-10-16 08:04:38 +03:00
|
|
|
return $ciphertext.'|'.$iv.'|'.$hmac.'|3';
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypts a value and verifies the HMAC (Encrypt-Then-Mac)
|
|
|
|
* @param string $authenticatedCiphertext
|
|
|
|
* @param string $password Password to encrypt, if not specified the secret from config.php will be taken
|
|
|
|
* @return string plaintext
|
|
|
|
* @throws \Exception If the HMAC does not match
|
2018-11-14 14:47:35 +03:00
|
|
|
* @throws \Exception If the decryption failed
|
2014-08-26 21:02:40 +04:00
|
|
|
*/
|
2018-01-12 18:30:35 +03:00
|
|
|
public function decrypt(string $authenticatedCiphertext, string $password = ''): string {
|
2018-11-14 14:47:35 +03:00
|
|
|
if ($password === '') {
|
2014-08-27 02:49:53 +04:00
|
|
|
$password = $this->config->getSystemValue('secret');
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
2020-10-16 08:04:38 +03:00
|
|
|
$hmacKey = $encryptionKey = $password;
|
2014-08-26 21:02:40 +04:00
|
|
|
|
|
|
|
$parts = explode('|', $authenticatedCiphertext);
|
2020-05-11 11:31:46 +03:00
|
|
|
$partCount = \count($parts);
|
|
|
|
if ($partCount < 3 || $partCount > 4) {
|
2014-08-26 21:02:40 +04:00
|
|
|
throw new \Exception('Authenticated ciphertext could not be decoded.');
|
|
|
|
}
|
|
|
|
|
2014-12-04 13:17:33 +03:00
|
|
|
$ciphertext = hex2bin($parts[0]);
|
2014-08-26 21:02:40 +04:00
|
|
|
$iv = $parts[1];
|
2014-12-04 13:17:33 +03:00
|
|
|
$hmac = hex2bin($parts[2]);
|
2014-08-26 21:02:40 +04:00
|
|
|
|
2020-05-11 11:31:46 +03:00
|
|
|
if ($partCount === 4) {
|
|
|
|
$version = $parts[3];
|
2020-10-16 08:04:38 +03:00
|
|
|
if ($version >= '2') {
|
2020-05-11 11:31:46 +03:00
|
|
|
$iv = hex2bin($iv);
|
|
|
|
}
|
|
|
|
|
2020-10-16 08:04:38 +03:00
|
|
|
if ($version === '3') {
|
|
|
|
$keyMaterial = hash_hkdf('sha512', $password);
|
|
|
|
$encryptionKey = substr($keyMaterial, 0, 32);
|
|
|
|
$hmacKey = substr($keyMaterial, 32);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$this->cipher->setPassword($encryptionKey);
|
2014-08-26 21:02:40 +04:00
|
|
|
$this->cipher->setIV($iv);
|
|
|
|
|
2020-10-16 08:04:38 +03:00
|
|
|
if (!hash_equals($this->calculateHMAC($parts[0] . $parts[1], $hmacKey), $hmac)) {
|
2014-08-26 21:02:40 +04:00
|
|
|
throw new \Exception('HMAC does not match.');
|
|
|
|
}
|
|
|
|
|
2018-11-14 14:47:35 +03:00
|
|
|
$result = $this->cipher->decrypt($ciphertext);
|
|
|
|
if ($result === false) {
|
|
|
|
throw new \Exception('Decryption failed');
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
2014-08-26 21:02:40 +04:00
|
|
|
}
|
|
|
|
}
|