//
// Copyright (C) 2012 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "shill/crypto_des_cbc.h"
#include <rpc/des_crypt.h>
#include <base/files/file_util.h>
#include <base/strings/string_util.h>
#include <brillo/data_encoding.h>
using base::FilePath;
using std::string;
using std::vector;
namespace shill {
const unsigned int CryptoDESCBC::kBlockSize = 8;
const char CryptoDESCBC::kID[] = "des-cbc";
const char CryptoDESCBC::kSentinel[] = "[ok]";
const char CryptoDESCBC::kVersion2Prefix[] = "02:";
CryptoDESCBC::CryptoDESCBC() {}
string CryptoDESCBC::GetID() {
return kID;
}
bool CryptoDESCBC::Encrypt(const string& plaintext, string* ciphertext) {
// Never encrypt. We'll fall back to rot47 which doesn't depend on
// the owner key which may change due to rotation.
return false;
}
bool CryptoDESCBC::Decrypt(const string& ciphertext, string* plaintext) {
CHECK_EQ(kBlockSize, key_.size());
CHECK_EQ(kBlockSize, iv_.size());
int version = 1;
string b64_ciphertext = ciphertext;
if (base::StartsWith(ciphertext, kVersion2Prefix,
base::CompareCase::SENSITIVE)) {
version = 2;
b64_ciphertext.erase(0, strlen(kVersion2Prefix));
}
string decoded_data;
if (!brillo::data_encoding::Base64Decode(b64_ciphertext, &decoded_data)) {
LOG(ERROR) << "Unable to base64-decode DEC-CBC ciphertext.";
return false;
}
vector<char> data(decoded_data.c_str(),
decoded_data.c_str() + decoded_data.length());
if (data.empty() || (data.size() % kBlockSize != 0)) {
LOG(ERROR) << "Invalid DES-CBC ciphertext size: " << data.size();
return false;
}
// The IV is modified in place.
vector<char> iv = iv_;
int rv =
cbc_crypt(key_.data(), data.data(), data.size(), DES_DECRYPT, iv.data());
if (DES_FAILED(rv)) {
LOG(ERROR) << "DES-CBC decryption failed.";
return false;
}
if (data.back() != '\0') {
LOG(ERROR) << "DEC-CBC decryption resulted in invalid plain text.";
return false;
}
string text = data.data();
if (version == 2) {
if (!base::EndsWith(text, kSentinel, base::CompareCase::SENSITIVE)) {
LOG(ERROR) << "DES-CBC decrypted text missing sentinel -- bad key?";
return false;
}
text.erase(text.size() - strlen(kSentinel), strlen(kSentinel));
}
*plaintext = text;
return true;
}
bool CryptoDESCBC::LoadKeyMatter(const FilePath& path) {
key_.clear();
iv_.clear();
string matter;
// TODO(petkov): This mimics current flimflam behavior. Fix it so that it
// doesn't read the whole file.
if (!base::ReadFileToString(path, &matter)) {
LOG(ERROR) << "Unable to load key matter from " << path.value();
return false;
}
if (matter.size() < 2 * kBlockSize) {
LOG(ERROR) << "Key matter data not enough " << matter.size() << " < "
<< 2 * kBlockSize;
return false;
}
string::const_iterator matter_start =
matter.begin() + (matter.size() - 2 * kBlockSize);
key_.assign(matter_start + kBlockSize, matter_start + 2 * kBlockSize);
iv_.assign(matter_start, matter_start + kBlockSize);
return true;
}
} // namespace shill