EncryptionEngine.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282
  1. package crypto
  2. import (
  3. "bytes"
  4. "crypto/hmac"
  5. "encoding/binary"
  6. "encoding/hex"
  7. "errors"
  8. "fmt"
  9. "github.com/jcmturner/gokrb5/iana/patype"
  10. "github.com/jcmturner/gokrb5/keytab"
  11. "github.com/jcmturner/gokrb5/types"
  12. "hash"
  13. )
  14. type EType interface {
  15. GetETypeID() int
  16. GetKeyByteSize() int // See "protocol key format" for defined values
  17. GetKeySeedBitLength() int // key-generation seed length, k
  18. GetDefaultStringToKeyParams() string // default string-to-key parameters (s2kparams)
  19. StringToKey(string, salt, s2kparams string) ([]byte, error) // string-to-key (UTF-8 string, UTF-8 string, opaque)->(protocol-key)
  20. RandomToKey(b []byte) []byte // random-to-key (bitstring[K])->(protocol-key)
  21. GetHMACBitLength() int // HMAC output size, h
  22. GetMessageBlockByteSize() int // message block size, m
  23. Encrypt(key, message []byte) ([]byte, []byte, error) // E function - encrypt (specific-key, state, octet string)->(state, octet string)
  24. Decrypt(key, ciphertext []byte) ([]byte, error) // D function
  25. GetCypherBlockBitLength() int // cipher block size, c
  26. GetConfounderByteSize() int // This is the same as the cipher block size but in bytes.
  27. DeriveKey(protocolKey, usage []byte) ([]byte, error) // DK key-derivation (protocol-key, integer)->(specific-key)
  28. DeriveRandom(protocolKey, usage []byte) ([]byte, error) // DR pseudo-random (protocol-key, octet-string)->(octet-string)
  29. VerifyIntegrity(protocolKey, ct, pt []byte, usage uint32) bool
  30. GetHash() hash.Hash
  31. }
  32. func GetEtype(id int) (EType, error) {
  33. switch id {
  34. case 17:
  35. var et Aes128CtsHmacSha96
  36. return et, nil
  37. case 18:
  38. var et Aes256CtsHmacSha96
  39. return et, nil
  40. default:
  41. return nil, fmt.Errorf("Unknown or unsupported EType: %d", id)
  42. }
  43. }
  44. // RFC3961: DR(Key, Constant) = k-truncate(E(Key, Constant, initial-cipher-state))
  45. // key - base key or protocol key. Likely to be a key from a keytab file
  46. // usage - a constant
  47. // n - block size in bits (not bytes) - note if you use something like aes.BlockSize this is in bytes.
  48. // k - key length / key seed length in bits. Eg. for AES256 this value is 256
  49. // encrypt - the encryption function to use
  50. func deriveRandom(key, usage []byte, n, k int, e EType) ([]byte, error) {
  51. //Ensure the usage constant is at least the size of the cypher block size. Pass it through the nfold algorithm that will "stretch" it if needs be.
  52. nFoldUsage := Nfold(usage, n)
  53. //k-truncate implemented by creating a byte array the size of k (k is in bits hence /8)
  54. out := make([]byte, k/8)
  55. /*If the output of E is shorter than k bits, it is fed back into the encryption as many times as necessary.
  56. The construct is as follows (where | indicates concatentation):
  57. K1 = E(Key, n-fold(Constant), initial-cipher-state)
  58. K2 = E(Key, K1, initial-cipher-state)
  59. K3 = E(Key, K2, initial-cipher-state)
  60. K4 = ...
  61. DR(Key, Constant) = k-truncate(K1 | K2 | K3 | K4 ...)*/
  62. _, K, err := e.Encrypt(key, nFoldUsage)
  63. if err != nil {
  64. return out, err
  65. }
  66. for i := copy(out, K); i < len(out); {
  67. _, K, _ = e.Encrypt(key, K)
  68. i = i + copy(out[i:], K)
  69. }
  70. return out, nil
  71. }
  72. func zeroPad(b []byte, m int) ([]byte, error) {
  73. if m <= 0 {
  74. return nil, errors.New("Invalid message block size when padding")
  75. }
  76. if b == nil || len(b) == 0 {
  77. return nil, errors.New("Data not valid to pad: Zero size")
  78. }
  79. if l := len(b) % m; l != 0 {
  80. n := m - l
  81. z := make([]byte, n)
  82. b = append(b, z...)
  83. }
  84. return b, nil
  85. }
  86. func pkcs7Pad(b []byte, m int) ([]byte, error) {
  87. if m <= 0 {
  88. return nil, errors.New("Invalid message block size when padding")
  89. }
  90. if b == nil || len(b) == 0 {
  91. return nil, errors.New("Data not valid to pad: Zero size")
  92. }
  93. n := m - (len(b) % m)
  94. pb := make([]byte, len(b)+n)
  95. copy(pb, b)
  96. copy(pb[len(b):], bytes.Repeat([]byte{byte(n)}, n))
  97. return pb, nil
  98. }
  99. func pkcs7Unpad(b []byte, m int) ([]byte, error) {
  100. if m <= 0 {
  101. return nil, errors.New("Invalid message block size when unpadding")
  102. }
  103. if b == nil || len(b) == 0 {
  104. return nil, errors.New("Padded data not valid: Zero size")
  105. }
  106. if len(b)%m != 0 {
  107. return nil, errors.New("Padded data not valid: Not multiple of message block size")
  108. }
  109. c := b[len(b)-1]
  110. n := int(c)
  111. if n == 0 || n > len(b) {
  112. return nil, errors.New("Padded data not valid: Data may not have been padded")
  113. }
  114. for i := 0; i < n; i++ {
  115. if b[len(b)-n+i] != c {
  116. return nil, errors.New("Padded data not valid")
  117. }
  118. }
  119. return b[:len(b)-n], nil
  120. }
  121. func DecryptEncPart(key []byte, pe types.EncryptedData, etype EType, usage uint32) ([]byte, error) {
  122. //Derive the key
  123. k, err := etype.DeriveKey(key, GetUsageKe(usage))
  124. if err != nil {
  125. return nil, fmt.Errorf("Error deriving key: %v", err)
  126. }
  127. // Strip off the checksum from the end
  128. b, err := etype.Decrypt(k, pe.Cipher[:len(pe.Cipher)-etype.GetHMACBitLength()/8])
  129. if err != nil {
  130. return nil, fmt.Errorf("Error decrypting: %v", err)
  131. }
  132. //Verify checksum
  133. if !etype.VerifyIntegrity(key, pe.Cipher, b, usage) {
  134. return nil, errors.New("Error decrypting encrypted part: integrity verification failed")
  135. }
  136. //Remove the confounder bytes
  137. b = b[etype.GetConfounderByteSize():]
  138. if err != nil {
  139. return nil, fmt.Errorf("Error decrypting encrypted part: %v", err)
  140. }
  141. return b, nil
  142. }
  143. func GetKeyFromPassword(passwd string, cn types.PrincipalName, realm string, etypeId int, pas types.PADataSequence) ([]byte, EType, error) {
  144. var key []byte
  145. etype, err := GetEtype(etypeId)
  146. if err != nil {
  147. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  148. }
  149. sk2p := etype.GetDefaultStringToKeyParams()
  150. var salt string
  151. var paID int
  152. for _, pa := range pas {
  153. switch pa.PADataType {
  154. case patype.PA_PW_SALT:
  155. if paID > pa.PADataType {
  156. continue
  157. }
  158. salt = string(pa.PADataValue)
  159. case patype.PA_ETYPE_INFO:
  160. if paID > pa.PADataType {
  161. continue
  162. }
  163. var et types.ETypeInfo
  164. err := et.Unmarshal(pa.PADataValue)
  165. if err != nil {
  166. return key, etype, fmt.Errorf("Error unmashalling PA Data to PA-ETYPE-INFO2: %v", err)
  167. }
  168. if etypeId != et[0].EType {
  169. etype, err = GetEtype(et[0].EType)
  170. if err != nil {
  171. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  172. }
  173. }
  174. salt = string(et[0].Salt)
  175. case patype.PA_ETYPE_INFO2:
  176. if paID > pa.PADataType {
  177. continue
  178. }
  179. var et2 types.ETypeInfo2
  180. err := et2.Unmarshal(pa.PADataValue)
  181. if err != nil {
  182. return key, etype, fmt.Errorf("Error unmashalling PA Data to PA-ETYPE-INFO2: %v", err)
  183. }
  184. if etypeId != et2[0].EType {
  185. etype, err = GetEtype(et2[0].EType)
  186. if err != nil {
  187. return key, etype, fmt.Errorf("Error getting encryption type: %v", err)
  188. }
  189. }
  190. if len(et2[0].S2KParams) == 4 {
  191. sk2p = hex.EncodeToString(et2[0].S2KParams)
  192. }
  193. salt = et2[0].Salt
  194. }
  195. }
  196. if salt == "" {
  197. salt = cn.GetSalt(realm)
  198. }
  199. key, err = etype.StringToKey(passwd, salt, sk2p)
  200. if err != nil {
  201. return key, etype, fmt.Errorf("Error deriving key from string: %+v", err)
  202. }
  203. return key, etype, nil
  204. }
  205. func GetIntegrityHash(pt, key []byte, usage uint32, etype EType) ([]byte, error) {
  206. k, err := etype.DeriveKey(key, GetUsageKi(usage))
  207. if err != nil {
  208. return nil, fmt.Errorf("Unable to derive key for checksum: %v", err)
  209. }
  210. mac := hmac.New(etype.GetHash, k)
  211. mac.Write(pt)
  212. return mac.Sum(nil)[:etype.GetHMACBitLength()/8], nil
  213. }
  214. func VerifyIntegrity(key, ct, pt []byte, usage uint32, etype EType) bool {
  215. //The ciphertext output is the concatenation of the output of the basic
  216. //encryption function E and a (possibly truncated) HMAC using the
  217. //specified hash function H, both applied to the plaintext with a
  218. //random confounder prefix and sufficient padding to bring it to a
  219. //multiple of the message block size. When the HMAC is computed, the
  220. //key is used in the protocol key form.
  221. h := make([]byte, etype.GetHMACBitLength()/8)
  222. copy(h, ct[len(ct)-etype.GetHMACBitLength()/8:])
  223. expectedMAC, _ := GetIntegrityHash(pt, key, usage, etype)
  224. return hmac.Equal(h, expectedMAC)
  225. }
  226. /*
  227. Key Usage Numbers
  228. RFC 3961: The "well-known constant" used for the DK function is the key usage number, expressed as four octets in big-endian order, followed by one octet indicated below.
  229. Kc = DK(base-key, usage | 0x99);
  230. Ke = DK(base-key, usage | 0xAA);
  231. Ki = DK(base-key, usage | 0x55);
  232. */
  233. // un - usage number
  234. func GetUsageKc(un uint32) []byte {
  235. return getUsage(un, 0x99)
  236. }
  237. // un - usage number
  238. func GetUsageKe(un uint32) []byte {
  239. return getUsage(un, 0xAA)
  240. }
  241. // un - usage number
  242. func GetUsageKi(un uint32) []byte {
  243. return getUsage(un, 0x55)
  244. }
  245. func getUsage(un uint32, o byte) []byte {
  246. var buf bytes.Buffer
  247. binary.Write(&buf, binary.BigEndian, un)
  248. return append(buf.Bytes(), o)
  249. }
  250. func GetEncryptedData(b []byte, etype EType, crealm, username string, kt keytab.Keytab, kvno int) ([]byte, error) {
  251. key, err := kt.GetKey(username, crealm, kvno, etype.GetETypeID())
  252. _, cb, err := etype.Encrypt(key, b)
  253. if err != nil {
  254. return b, fmt.Errorf("Error encrypting data to form EncryptedData: %v", err)
  255. }
  256. ed := types.EncryptedData{
  257. KVNO: kvno,
  258. EType: etype.GetETypeID(),
  259. Cipher: cb,
  260. }
  261. return ed.Marshal()
  262. }