All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.owasp.esapi.crypto.CipherTextSerializer Maven / Gradle / Ivy

package org.owasp.esapi.crypto;

import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.InvalidClassException;
import java.io.UnsupportedEncodingException;
import java.util.Date;

import org.owasp.esapi.ESAPI;
import org.owasp.esapi.Logger;
import org.owasp.esapi.util.ByteConversionUtil;
import org.owasp.esapi.errors.EncryptionException;

/**
 * Helper class to assist with programming language and platform independent
 * serialization of {@link CipherText} objects. The serialization is done in
 * network-byte order which is the same as big-endian byte order.
 * 

* This serialization scheme is documented in * * Format of Portable Serialization of org.owasp.esapi.crypto.CipherText Objects. * Other serialization schemes may be desirable and could be supported (notably, RFC 5083 - Cryptographic * Message Syntax (CMS) Authenticated-Enveloped-Data Content Type, or CMS' predecessor, * PKCS#7 (RFC 2315)), but these serialization schemes are by comparison very complicated, * and do not have extensive support for the various implementation languages which ESAPI * supports. (Perhaps wishful thinking that other ESAPI implementations such as * ESAPI for .NET, ESAPI for C, ESAPI for C++, etc. will all support a single, common * serialization technique so they could exchange encrypted data.) * * @author [email protected] * @since 2.0 * */ public class CipherTextSerializer { // This should be *same* version as in CipherText & KeyDerivationFunction as // these versions all need to work together. Therefore, when one changes one // one these versions, the other should be reviewed and changed as well to // accommodate any differences. // Previous versions: 20110203 - Original version (ESAPI releases 2.0 & 2.0.1) // 20130830 - Fix to issue #306 (release 2.1.0) // We check that in an static initialization block below. public static final int cipherTextSerializerVersion = 20130830; // Current version. Format: YYYYMMDD, max is 99991231. private static final long serialVersionUID = cipherTextSerializerVersion; private static final Logger logger = ESAPI.getLogger("CipherTextSerializer"); private CipherText cipherText_ = null; // Check if versions of KeyDerivationFunction, CipherText, and // CipherTextSerializer are all the same. { // Ignore error about comparing identical versions and dead code. // We expect them to be, but the point is to catch us if they aren't. if ( CipherTextSerializer.cipherTextSerializerVersion != CipherText.cipherTextVersion ) { throw new ExceptionInInitializerError("Versions of CipherTextSerializer and CipherText are not compatible."); } if ( CipherTextSerializer.cipherTextSerializerVersion != KeyDerivationFunction.kdfVersion ) { throw new ExceptionInInitializerError("Versions of CipherTextSerializer and KeyDerivationFunction are not compatible."); } } public CipherTextSerializer(CipherText cipherTextObj) { if ( cipherTextObj == null ) { throw new IllegalArgumentException("CipherText object must not be null."); } cipherText_ = cipherTextObj; } /** * Given byte array in network byte order (i.e., big-endian order), convert * it so that a {@code CipherText} can be constructed from it. * @param cipherTextSerializedBytes A serialized {@code CipherText} object * with the bytes in network byte order. * @throws EncryptionException Thrown if a valid {@code CipherText} object * cannot be reconstructed from the byte array. */ public CipherTextSerializer(byte[] cipherTextSerializedBytes) throws EncryptionException /* DISCUSS: Change exception type?? */ { cipherText_ = convertToCipherText(cipherTextSerializedBytes); } /** Return this {@code CipherText} object as a specialized, portable * serialized byte array. * @return A serialization of this object. Note that this is not the * Java serialization. */ public byte[] asSerializedByteArray() { int kdfInfo = cipherText_.getKDFInfo(); debug("asSerializedByteArray: kdfInfo = " + kdfInfo); long timestamp = cipherText_.getEncryptionTimestamp(); String cipherXform = cipherText_.getCipherTransformation(); if ( cipherText_.getKeySize() >= Short.MAX_VALUE ) { throw new IllegalArgumentException("Key size is too large. Max is " + Short.MAX_VALUE); } short keySize = (short) cipherText_.getKeySize(); if ( cipherText_.getBlockSize() >= Short.MAX_VALUE ) { throw new IllegalArgumentException("Block size is too large. Max is " + Short.MAX_VALUE); } short blockSize = (short) cipherText_.getBlockSize(); byte[] iv = cipherText_.getIV(); if ( iv.length >= Short.MAX_VALUE ) { throw new IllegalArgumentException("IV size too large. Max is " + Short.MAX_VALUE + " bytes"); } short ivLen = (short) iv.length; byte[] rawCiphertext = cipherText_.getRawCipherText(); int ciphertextLen = rawCiphertext.length; // Coverity issue 1352406, GitHub issue # 364 - possible NPE later if assertion disabled. // Replaced assertion with explicit check. if ( ciphertextLen < 1 ) { throw new IllegalArgumentException("Raw ciphertext length must be >= 1 byte."); } byte[] mac = cipherText_.getSeparateMAC(); if ( mac.length >= Short.MAX_VALUE ) { throw new IllegalArgumentException("MAC length too large. Max is " + Short.MAX_VALUE + " bytes"); } short macLen = (short) mac.length; byte[] serializedObj = computeSerialization(kdfInfo, timestamp, cipherXform, keySize, blockSize, ivLen, iv, ciphertextLen, rawCiphertext, macLen, mac ); return serializedObj; } /** * Return the actual {@code CipherText} object. * @return The {@code CipherText} object that we are serializing. */ public CipherText asCipherText() { if ( cipherText_ == null ) { throw new IllegalArgumentException("Program error? CipherText object, cipherText_, must not be null."); } return cipherText_; } /** * Take all the individual elements that make of the serialized ciphertext * format and put them in order and return them as a byte array. * @param kdfInfo Info about the KDF... which PRF and the KDF version {@link #asCipherText()}. * @param timestamp Timestamp when the data was encrypted. Intended to help * facilitate key change operations and nothing more. If it is meaningless, * then the expectations are just that the recipient should ignore it. Mostly * intended when encrypted data is kept long term over a period of many * key change operations. * @param cipherXform Details of how the ciphertext was encrypted. The format used * is the same as used by {@code javax.crypto.Cipher}, namely, * "cipherAlg/cipherMode/paddingScheme". * @param keySize The key size used for encrypting. Intended for cipher algorithms * supporting multiple key sizes such as triple DES (DESede) or * Blowfish. * @param blockSize The cipher block size. Intended to support cipher algorithms * that support variable block sizes, such as Rijndael. * @param ivLen The length of the IV. * @param iv The actual IV (initialization vector) bytes. * @param ciphertextLen The length of the raw ciphertext. * @param rawCiphertext The actual raw ciphertext itself * @param macLen The length of the MAC (message authentication code). * @param mac The MAC itself. * @return A byte array representing the serialized ciphertext. */ private byte[] computeSerialization(int kdfInfo, long timestamp, String cipherXform, short keySize, short blockSize, short ivLen, byte[] iv, int ciphertextLen, byte[] rawCiphertext, short macLen, byte[] mac ) { debug("computeSerialization: kdfInfo = " + kdfInfo); debug("computeSerialization: timestamp = " + new Date(timestamp)); debug("computeSerialization: cipherXform = " + cipherXform); debug("computeSerialization: keySize = " + keySize); debug("computeSerialization: blockSize = " + blockSize); debug("computeSerialization: ivLen = " + ivLen); debug("computeSerialization: ciphertextLen = " + ciphertextLen); debug("computeSerialization: macLen = " + macLen); ByteArrayOutputStream baos = new ByteArrayOutputStream(); writeInt(baos, kdfInfo); writeLong(baos, timestamp); String[] parts = cipherXform.split("/"); if ( parts.length != 3 ) { throw new IllegalArgumentException("Program error? Malformed cipher tranformation: " + cipherXform); } writeString(baos, cipherXform); // Size of string is prepended to string writeShort(baos, keySize); writeShort(baos, blockSize); writeShort(baos, ivLen); if ( ivLen > 0 ) baos.write(iv, 0, iv.length); writeInt(baos, ciphertextLen); baos.write(rawCiphertext, 0, rawCiphertext.length); writeShort(baos, macLen); if ( macLen > 0 ) baos.write(mac, 0, mac.length); return baos.toByteArray(); } // All strings are written as UTF-8 encoded byte streams with the // length prepended before it as a short. The prepended length is // more for the benefit of languages like C so they can pre-allocate // char arrays without worrying about buffer overflows. private void writeString(ByteArrayOutputStream baos, String str) { byte[] bytes; try { if ( str == null || str.length() == 0 ) { throw new IllegalArgumentException("Program error? writeString: str is null or empty!"); } bytes = str.getBytes("UTF8"); if ( bytes.length >= Short.MAX_VALUE ) { throw new IllegalArgumentException("Program error? writeString: String exceeds max length of " + Short.MAX_VALUE + " bytes"); } writeShort(baos, (short)bytes.length); baos.write(bytes, 0, bytes.length); } catch (UnsupportedEncodingException e) { // Should never happen. UTF8 is built into the rt.jar. We don't use native encoding as // a fall-back because that simply is not guaranteed to be portable across Java // platforms and could cause really bizarre errors way downstream. logger.error(Logger.EVENT_FAILURE, "Ignoring caught UnsupportedEncodingException " + "converting string to UTF8 encoding. Results suspect. Corrupt rt.jar????"); } } private String readString(ByteArrayInputStream bais, short sz) throws NullPointerException, IOException { byte[] bytes = new byte[sz]; int ret = bais.read(bytes, 0, sz); if ( ret != sz ) { throw new IllegalArgumentException("Program error? readString: Expected to read " + sz + " bytes, but only read " + ret + " bytes"); } return new String(bytes, "UTF8"); } private void writeShort(ByteArrayOutputStream baos, short s) { byte[] shortAsByteArray = ByteConversionUtil.fromShort(s); if ( shortAsByteArray.length != 2 ) { throw new IllegalArgumentException("Program error? writeShort: Excepted byte array != 2 bytes."); } baos.write(shortAsByteArray, 0, 2); } private short readShort(ByteArrayInputStream bais) throws NullPointerException, IndexOutOfBoundsException { byte[] shortAsByteArray = new byte[2]; int ret = bais.read(shortAsByteArray, 0, 2); if ( ret != 2 ) { throw new IllegalArgumentException("Program error? readShort: Failed to read 2 bytes."); } return ByteConversionUtil.toShort(shortAsByteArray); } private void writeInt(ByteArrayOutputStream baos, int i) { byte[] intAsByteArray = ByteConversionUtil.fromInt(i); baos.write(intAsByteArray, 0, 4); } private int readInt(ByteArrayInputStream bais) throws NullPointerException, IndexOutOfBoundsException { byte[] intAsByteArray = new byte[4]; int ret = bais.read(intAsByteArray, 0, 4); if ( ret != 4 ) { throw new IllegalArgumentException("Program error? readInt: Failed to read 4 bytes."); } return ByteConversionUtil.toInt(intAsByteArray); } private void writeLong(ByteArrayOutputStream baos, long l) { byte[] longAsByteArray = ByteConversionUtil.fromLong(l); if ( longAsByteArray.length != 8 ) { throw new IllegalArgumentException("Program error? writeLong: Expected byte array != 8 bytes."); } baos.write(longAsByteArray, 0, 8); } private long readLong(ByteArrayInputStream bais) throws NullPointerException, IndexOutOfBoundsException { byte[] longAsByteArray = new byte[8]; int ret = bais.read(longAsByteArray, 0, 8); if ( ret != 8 ) { throw new IllegalArgumentException("Program error? readLong: Failed to read 8 bytes."); } return ByteConversionUtil.toLong(longAsByteArray); } /** Convert the serialized ciphertext byte array to a {@code CipherText} * object. * @param cipherTextSerializedBytes The serialized ciphertext as a byte array. * @return The corresponding {@code CipherText} object. * @throws EncryptionException Thrown if the byte array data is corrupt or * there are version mismatches, etc. */ private CipherText convertToCipherText(byte[] cipherTextSerializedBytes) throws EncryptionException { try { if ( cipherTextSerializedBytes == null ) { throw new IllegalArgumentException("cipherTextSerializedBytes cannot be null."); } if ( cipherTextSerializedBytes.length == 0 ) { throw new IllegalArgumentException("cipherTextSerializedBytes must be > 0 in length."); } ByteArrayInputStream bais = new ByteArrayInputStream(cipherTextSerializedBytes); int kdfInfo = readInt(bais); debug("kdfInfo: " + kdfInfo); int kdfPrf = (kdfInfo >>> 28); debug("kdfPrf: " + kdfPrf); if ( kdfPrf < 0 || kdfPrf > 16 ) { throw new IllegalArgumentException("Program error? convertToCipherText: kdPrf is " + kdfPrf + ". Must be between 0 and 15 inclusive"); } int kdfVers = ( kdfInfo & 0x07ffffff); // First do a quick sanity check on the argument. Previously this was an assertion. if ( ! CryptoHelper.isValidKDFVersion(kdfVers, false, false) ) { // TODO: Clean up. Use StringBuilder. Good enough for now. String logMsg = "KDF version read from serialized ciphertext (" + kdfVers + ") is out of range. " + "Valid range for KDF version is [" + KeyDerivationFunction.originalVersion + ", " + "99991231]."; // This should never happen under actual circumstances (barring programming errors; but we've // tested the code, right?), so it is likely an attempted attack. Thus don't get the originator // of the suspect ciphertext too much info. They ought to know what they sent anyhow. throw new EncryptionException("Version info from serialized ciphertext not in valid range.", "Likely tampering with KDF version on serialized ciphertext." + logMsg); } debug("convertToCipherText: kdfPrf = " + kdfPrf + ", kdfVers = " + kdfVers); if ( ! versionIsCompatible( kdfVers) ) { throw new EncryptionException("This version of ESAPI is not compatible with the version of ESAPI that encrypted your data.", "KDF version " + kdfVers + " from serialized ciphertext not compatibile with current KDF version of " + KeyDerivationFunction.kdfVersion); } long timestamp = readLong(bais); debug("convertToCipherText: timestamp = " + new Date(timestamp)); short strSize = readShort(bais); debug("convertToCipherText: length of cipherXform = " + strSize); String cipherXform = readString(bais, strSize); debug("convertToCipherText: cipherXform = " + cipherXform); String[] parts = cipherXform.split("/"); if ( parts.length != 3 ) { throw new IllegalArgumentException("Program error? Malformed cipher transformation. Expecting 3 parts to cipher transformation, " + "alg/mode/padding, but found " + parts.length + " parts (" + cipherXform + ")."); } String cipherMode = parts[1]; if ( ! CryptoHelper.isAllowedCipherMode(cipherMode) ) { String msg = "Cipher mode " + cipherMode + " is not an allowed cipher mode"; throw new EncryptionException(msg, msg); } short keySize = readShort(bais); debug("convertToCipherText: keySize = " + keySize); short blockSize = readShort(bais); debug("convertToCipherText: blockSize = " + blockSize); short ivLen = readShort(bais); debug("convertToCipherText: ivLen = " + ivLen); byte[] iv = null; if ( ivLen > 0 ) { iv = new byte[ivLen]; bais.read(iv, 0, iv.length); } int ciphertextLen = readInt(bais); debug("convertToCipherText: ciphertextLen = " + ciphertextLen); if ( ciphertextLen <= 0 ) { throw new IllegalArgumentException("convertToCipherText: Invalid cipher text length; must be > 0."); } byte[] rawCiphertext = new byte[ciphertextLen]; bais.read(rawCiphertext, 0, rawCiphertext.length); short macLen = readShort(bais); debug("convertToCipherText: macLen = " + macLen); byte[] mac = null; if ( macLen > 0 ) { mac = new byte[macLen]; bais.read(mac, 0, mac.length); } CipherSpec cipherSpec = new CipherSpec(cipherXform, keySize); cipherSpec.setBlockSize(blockSize); cipherSpec.setIV(iv); debug("convertToCipherText: CipherSpec: " + cipherSpec); CipherText ct = new CipherText(cipherSpec); if ( ! (ivLen > 0 && ct.requiresIV()) ) { throw new EncryptionException("convertToCipherText: Mismatch between IV length and cipher mode.", "Possible tampering of serialized ciphertext?"); } ct.setCiphertext(rawCiphertext); // Set this *AFTER* setting raw ciphertext because setCiphertext() // method also sets encryption time. ct.setEncryptionTimestamp(timestamp); if ( macLen > 0 ) { ct.storeSeparateMAC(mac); } // Fixed in ESAPI crypto version 20130839. Previously is didn't really matter // because there was only one version (20110203) and it defaulted to that // version, which was the current version. But we don't want that as now there // are two versions and we could be decrypting data encrypted using the previous // version. ct.setKDF_PRF(kdfPrf); ct.setKDFVersion(kdfVers); return ct; } catch(EncryptionException ex) { throw new EncryptionException("Cannot deserialize byte array into CipherText object", "Cannot deserialize byte array into CipherText object", ex); } catch (IOException e) { throw new EncryptionException("Cannot deserialize byte array into CipherText object", "Cannot deserialize byte array into CipherText object", e); } } /** Check to see if we can support the KSF version that was extracted from * the serialized ciphertext. In particular, we assume that if we have a * newer version of KDF than we can support it as we assume that we have * built in backward compatibility. * * At this point (ESAPI 2.1.0, KDF version 20130830), all we need to check * if the version is either the current version or the previous version as * both versions work the same. This checking may get more complicated in * the future. * * @param readKdfVers The version information extracted from the serialized * ciphertext. */ private static boolean versionIsCompatible(int readKdfVers) { if ( readKdfVers <= 0 ) { throw new IllegalArgumentException("Extracted KDF version is <= 0. Must be integer >= 1."); } switch ( readKdfVers ) { case KeyDerivationFunction.originalVersion: // First version return true; // Add new versions here; hard coding is OK... // case YYYYMMDD: // return true; case KeyDerivationFunction.kdfVersion: // Current version return true; default: return false; } } private void debug(String msg) { if ( logger.isDebugEnabled() ) { logger.debug(Logger.EVENT_SUCCESS, msg); } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy