EncryptionEngine.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316
  1. package crypto
  2. import (
  3. "bytes"
  4. "crypto/hmac"
  5. "encoding/binary"
  6. "encoding/hex"
  7. "errors"
  8. "fmt"
  9. "github.com/jcmturner/gokrb5/iana/patype"
  10. "github.com/jcmturner/gokrb5/types"
  11. "hash"
  12. "crypto/rand"
  13. )
  14. type EType interface {
  15. GetETypeID() int
  16. GetHashID() int
  17. GetKeyByteSize() int // See "protocol key format" for defined values
  18. GetKeySeedBitLength() int // key-generation seed length, k
  19. GetDefaultStringToKeyParams() string // default string-to-key parameters (s2kparams)
  20. StringToKey(string, salt, s2kparams string) ([]byte, error) // string-to-key (UTF-8 string, UTF-8 string, opaque)->(protocol-key)
  21. RandomToKey(b []byte) []byte // random-to-key (bitstring[K])->(protocol-key)
  22. GetHMACBitLength() int // HMAC output size, h
  23. GetMessageBlockByteSize() int // message block size, m
  24. Encrypt(key, message []byte) ([]byte, []byte, error) // E function - encrypt (specific-key, state, octet string)->(state, octet string)
  25. Decrypt(key, ciphertext []byte) ([]byte, error) // D function
  26. GetCypherBlockBitLength() int // cipher block size, c
  27. GetConfounderByteSize() int // This is the same as the cipher block size but in bytes.
  28. DeriveKey(protocolKey, usage []byte) ([]byte, error) // DK key-derivation (protocol-key, integer)->(specific-key)
  29. DeriveRandom(protocolKey, usage []byte) ([]byte, error) // DR pseudo-random (protocol-key, octet-string)->(octet-string)
  30. VerifyIntegrity(protocolKey, ct, pt []byte, usage uint32) bool
  31. GetHash() hash.Hash
  32. }
  33. func GetEtype(id int) (EType, error) {
  34. switch id {
  35. case 17:
  36. var et Aes128CtsHmacSha96
  37. return et, nil
  38. case 18:
  39. var et Aes256CtsHmacSha96
  40. return et, nil
  41. default:
  42. return nil, fmt.Errorf("Unknown or unsupported EType: %d", id)
  43. }
  44. }
  45. // RFC3961: DR(Key, Constant) = k-truncate(E(Key, Constant, initial-cipher-state))
  46. // key - base key or protocol key. Likely to be a key from a keytab file
  47. // usage - a constant
  48. // n - block size in bits (not bytes) - note if you use something like aes.BlockSize this is in bytes.
  49. // k - key length / key seed length in bits. Eg. for AES256 this value is 256
  50. // encrypt - the encryption function to use
  51. func deriveRandom(key, usage []byte, n, k int, e EType) ([]byte, error) {
  52. //Ensure the usage constant is at least the size of the cypher block size. Pass it through the nfold algorithm that will "stretch" it if needs be.
  53. nFoldUsage := Nfold(usage, n)
  54. //k-truncate implemented by creating a byte array the size of k (k is in bits hence /8)
  55. out := make([]byte, k/8)
  56. /*If the output of E is shorter than k bits, it is fed back into the encryption as many times as necessary.
  57. The construct is as follows (where | indicates concatentation):
  58. K1 = E(Key, n-fold(Constant), initial-cipher-state)
  59. K2 = E(Key, K1, initial-cipher-state)
  60. K3 = E(Key, K2, initial-cipher-state)
  61. K4 = ...
  62. DR(Key, Constant) = k-truncate(K1 | K2 | K3 | K4 ...)*/
  63. _, K, err := e.Encrypt(key, nFoldUsage)
  64. if err != nil {
  65. return out, err
  66. }
  67. for i := copy(out, K); i < len(out); {
  68. _, K, _ = e.Encrypt(key, K)
  69. i = i + copy(out[i:], K)
  70. }
  71. return out, nil
  72. }
  73. func zeroPad(b []byte, m int) ([]byte, error) {
  74. if m <= 0 {
  75. return nil, errors.New("Invalid message block size when padding")
  76. }
  77. if b == nil || len(b) == 0 {
  78. return nil, errors.New("Data not valid to pad: Zero size")
  79. }
  80. if l := len(b) % m; l != 0 {
  81. n := m - l
  82. z := make([]byte, n)
  83. b = append(b, z...)
  84. }
  85. return b, nil
  86. }
  87. func pkcs7Pad(b []byte, m int) ([]byte, error) {
  88. if m <= 0 {
  89. return nil, errors.New("Invalid message block size when padding")
  90. }
  91. if b == nil || len(b) == 0 {
  92. return nil, errors.New("Data not valid to pad: Zero size")
  93. }
  94. n := m - (len(b) % m)
  95. pb := make([]byte, len(b)+n)
  96. copy(pb, b)
  97. copy(pb[len(b):], bytes.Repeat([]byte{byte(n)}, n))
  98. return pb, nil
  99. }
  100. func pkcs7Unpad(b []byte, m int) ([]byte, error) {
  101. if m <= 0 {
  102. return nil, errors.New("Invalid message block size when unpadding")
  103. }
  104. if b == nil || len(b) == 0 {
  105. return nil, errors.New("Padded data not valid: Zero size")
  106. }
  107. if len(b)%m != 0 {
  108. return nil, errors.New("Padded data not valid: Not multiple of message block size")
  109. }
  110. c := b[len(b)-1]
  111. n := int(c)
  112. if n == 0 || n > len(b) {
  113. return nil, errors.New("Padded data not valid: Data may not have been padded")
  114. }
  115. for i := 0; i < n; i++ {
  116. if b[len(b)-n+i] != c {
  117. return nil, errors.New("Padded data not valid")
  118. }
  119. }
  120. return b[:len(b)-n], nil
  121. }
  122. func DecryptEncPart(key []byte, pe types.EncryptedData, etype EType, usage uint32) ([]byte, error) {
  123. //Derive the key
  124. k, err := etype.DeriveKey(key, GetUsageKe(usage))
  125. if err != nil {
  126. return nil, fmt.Errorf("Error deriving key: %v", err)
  127. }
  128. // Strip off the checksum from the end
  129. b, err := etype.Decrypt(k, pe.Cipher[:len(pe.Cipher)-etype.GetHMACBitLength()/8])
  130. if err != nil {
  131. return nil, fmt.Errorf("Error decrypting: %v", err)
  132. }
  133. //Verify checksum
  134. if !etype.VerifyIntegrity(key, pe.Cipher, b, usage) {
  135. return nil, errors.New("Error decrypting encrypted part: integrity verification failed")
  136. }
  137. //Remove the confounder bytes
  138. b = b[etype.GetConfounderByteSize():]
  139. if err != nil {
  140. return nil, fmt.Errorf("Error decrypting encrypted part: %v", err)
  141. }
  142. return b, nil
  143. }
  144. func GetKeyFromPassword(passwd string, cn types.PrincipalName, realm string, etypeId int, pas types.PADataSequence) (types.EncryptionKey, EType, error) {
  145. var key types.EncryptionKey
  146. etype, err := GetEtype(etypeId)
  147. if err != nil {
  148. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  149. }
  150. sk2p := etype.GetDefaultStringToKeyParams()
  151. var salt string
  152. var paID int
  153. for _, pa := range pas {
  154. switch pa.PADataType {
  155. case patype.PA_PW_SALT:
  156. if paID > pa.PADataType {
  157. continue
  158. }
  159. salt = string(pa.PADataValue)
  160. case patype.PA_ETYPE_INFO:
  161. if paID > pa.PADataType {
  162. continue
  163. }
  164. var et types.ETypeInfo
  165. err := et.Unmarshal(pa.PADataValue)
  166. if err != nil {
  167. return key, etype, fmt.Errorf("Error unmashalling PA Data to PA-ETYPE-INFO2: %v", err)
  168. }
  169. if etypeId != et[0].EType {
  170. etype, err = GetEtype(et[0].EType)
  171. if err != nil {
  172. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  173. }
  174. }
  175. salt = string(et[0].Salt)
  176. case patype.PA_ETYPE_INFO2:
  177. if paID > pa.PADataType {
  178. continue
  179. }
  180. var et2 types.ETypeInfo2
  181. err := et2.Unmarshal(pa.PADataValue)
  182. if err != nil {
  183. return key, etype, fmt.Errorf("Error unmashalling PA Data to PA-ETYPE-INFO2: %v", err)
  184. }
  185. if etypeId != et2[0].EType {
  186. etype, err = GetEtype(et2[0].EType)
  187. if err != nil {
  188. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  189. }
  190. }
  191. if len(et2[0].S2KParams) == 4 {
  192. sk2p = hex.EncodeToString(et2[0].S2KParams)
  193. }
  194. salt = et2[0].Salt
  195. }
  196. }
  197. if salt == "" {
  198. salt = cn.GetSalt(realm)
  199. }
  200. k, err := etype.StringToKey(passwd, salt, sk2p)
  201. if err != nil {
  202. return key, etype, fmt.Errorf("Error deriving key from string: %+v", err)
  203. }
  204. key = types.EncryptionKey{
  205. KeyType: etypeId,
  206. KeyValue: k,
  207. }
  208. return key, etype, nil
  209. }
  210. func getHash(pt, key []byte, usage []byte, etype EType) ([]byte, error) {
  211. k, err := etype.DeriveKey(key, usage)
  212. if err != nil {
  213. return nil, fmt.Errorf("Unable to derive key for checksum: %v", err)
  214. }
  215. mac := hmac.New(etype.GetHash, k)
  216. mac.Write(pt)
  217. return mac.Sum(nil)[:etype.GetHMACBitLength()/8], nil
  218. }
  219. func GetChecksumHash(pt, key []byte, usage uint32, etype EType) ([]byte, error) {
  220. return getHash(pt, key, GetUsageKc(usage), etype)
  221. }
  222. func GetIntegrityHash(pt, key []byte, usage uint32, etype EType) ([]byte, error) {
  223. return getHash(pt, key, GetUsageKi(usage), etype)
  224. }
  225. func VerifyIntegrity(key, ct, pt []byte, usage uint32, etype EType) bool {
  226. //The ciphertext output is the concatenation of the output of the basic
  227. //encryption function E and a (possibly truncated) HMAC using the
  228. //specified hash function H, both applied to the plaintext with a
  229. //random confounder prefix and sufficient padding to bring it to a
  230. //multiple of the message block size. When the HMAC is computed, the
  231. //key is used in the protocol key form.
  232. h := make([]byte, etype.GetHMACBitLength()/8)
  233. copy(h, ct[len(ct)-etype.GetHMACBitLength()/8:])
  234. expectedMAC, _ := GetIntegrityHash(pt, key, usage, etype)
  235. return hmac.Equal(h, expectedMAC)
  236. }
  237. /*
  238. Key Usage Numbers
  239. RFC 3961: The "well-known constant" used for the DK function is the key usage number, expressed as four octets in big-endian order, followed by one octet indicated below.
  240. Kc = DK(base-key, usage | 0x99);
  241. Ke = DK(base-key, usage | 0xAA);
  242. Ki = DK(base-key, usage | 0x55);
  243. */
  244. // un - usage number
  245. func GetUsageKc(un uint32) []byte {
  246. return getUsage(un, 0x99)
  247. }
  248. // un - usage number
  249. func GetUsageKe(un uint32) []byte {
  250. return getUsage(un, 0xAA)
  251. }
  252. // un - usage number
  253. func GetUsageKi(un uint32) []byte {
  254. return getUsage(un, 0x55)
  255. }
  256. func getUsage(un uint32, o byte) []byte {
  257. var buf bytes.Buffer
  258. binary.Write(&buf, binary.BigEndian, un)
  259. return append(buf.Bytes(), o)
  260. }
  261. // Pass a usage value of zero to use the key provided directly rather than deriving one
  262. func GetEncryptedData(pt []byte, key types.EncryptionKey, usage int, kvno int) (types.EncryptedData, error) {
  263. var ed types.EncryptedData
  264. etype, err := GetEtype(key.KeyType)
  265. if err != nil {
  266. return ed, fmt.Errorf("Error getting etype: %v", err)
  267. }
  268. k := key.KeyValue
  269. if usage != 0 {
  270. k, err = etype.DeriveKey(key.KeyValue, GetUsageKe(uint32(usage)))
  271. if err != nil {
  272. return ed, fmt.Errorf("Error deriving key: %v", err)
  273. }
  274. }
  275. //confounder
  276. c := make([]byte, etype.GetConfounderByteSize())
  277. _, err = rand.Read(c)
  278. if err != nil {
  279. return ed, fmt.Errorf("Could not generate random confounder: %v", err)
  280. }
  281. pt = append(c, pt...)
  282. _, b, err := etype.Encrypt(k, pt)
  283. if err != nil {
  284. return ed, fmt.Errorf("Error encrypting data: %v", err)
  285. }
  286. ih, err := GetIntegrityHash(pt, key.KeyValue, uint32(usage), etype)
  287. b = append(b, ih...)
  288. ed = types.EncryptedData{
  289. EType: key.KeyType,
  290. Cipher: b,
  291. KVNO: kvno,
  292. }
  293. return ed, nil
  294. }