encrypt.py
154 lines
| 5.1 KiB
| text/x-python
|
PythonLexer
r5088 | # Copyright (C) 2014-2023 RhodeCode GmbH | |||
r1 | # | |||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
""" | ||||
Generic encryption library for RhodeCode | ||||
""" | ||||
import base64 | ||||
r4995 | import logging | |||
r1 | ||||
from Crypto.Cipher import AES | ||||
from Crypto import Random | ||||
r281 | from Crypto.Hash import HMAC, SHA256 | |||
r1 | ||||
r4995 | from rhodecode.lib.str_utils import safe_bytes, safe_str | |||
from rhodecode.lib.exceptions import signature_verification_error | ||||
r281 | ||||
class InvalidDecryptedValue(str): | ||||
def __new__(cls, content): | ||||
""" | ||||
This will generate something like this:: | ||||
<InvalidDecryptedValue(QkWusFgLJXR6m42v...)> | ||||
And represent a safe indicator that encryption key is broken | ||||
""" | ||||
r5095 | content = f'<{cls.__name__}({content[:16]}...)>' | |||
r281 | return str.__new__(cls, content) | |||
r4995 | KEY_FORMAT = b'enc$aes_hmac${1}' | |||
r281 | ||||
r1 | class AESCipher(object): | |||
r4995 | ||||
def __init__(self, key: bytes, hmac=False, strict_verification=True): | ||||
r1 | if not key: | |||
raise ValueError('passed key variable is empty') | ||||
r281 | self.strict_verification = strict_verification | |||
r1 | self.block_size = 32 | |||
r281 | self.hmac_size = 32 | |||
self.hmac = hmac | ||||
r4946 | self.key = SHA256.new(safe_bytes(key)).digest() | |||
r281 | self.hmac_key = SHA256.new(self.key).digest() | |||
def verify_hmac_signature(self, raw_data): | ||||
org_hmac_signature = raw_data[-self.hmac_size:] | ||||
data_without_sig = raw_data[:-self.hmac_size] | ||||
recomputed_hmac = HMAC.new( | ||||
self.hmac_key, data_without_sig, digestmod=SHA256).digest() | ||||
return org_hmac_signature == recomputed_hmac | ||||
r1 | ||||
r4995 | def encrypt(self, raw: bytes): | |||
r1 | raw = self._pad(raw) | |||
iv = Random.new().read(AES.block_size) | ||||
cipher = AES.new(self.key, AES.MODE_CBC, iv) | ||||
r281 | enc_value = cipher.encrypt(raw) | |||
r4995 | hmac_signature = b'' | |||
r281 | if self.hmac: | |||
# compute hmac+sha256 on iv + enc text, we use | ||||
# encrypt then mac method to create the signature | ||||
hmac_signature = HMAC.new( | ||||
self.hmac_key, iv + enc_value, digestmod=SHA256).digest() | ||||
return base64.b64encode(iv + enc_value + hmac_signature) | ||||
r1 | ||||
r4995 | def decrypt(self, enc, safe=True) -> bytes | InvalidDecryptedValue: | |||
r281 | enc_org = enc | |||
r4995 | try: | |||
enc = base64.b64decode(enc) | ||||
except Exception: | ||||
logging.exception('Failed Base64 decode') | ||||
raise signature_verification_error('Failed Base64 decode') | ||||
r281 | ||||
if self.hmac and len(enc) > self.hmac_size: | ||||
if self.verify_hmac_signature(enc): | ||||
# cut off the HMAC verification digest | ||||
enc = enc[:-self.hmac_size] | ||||
else: | ||||
r4995 | decrypt_fail = InvalidDecryptedValue(safe_str(enc_org)) | |||
if safe: | ||||
return decrypt_fail | ||||
raise signature_verification_error(decrypt_fail) | ||||
r281 | ||||
r1 | iv = enc[:AES.block_size] | |||
cipher = AES.new(self.key, AES.MODE_CBC, iv) | ||||
return self._unpad(cipher.decrypt(enc[AES.block_size:])) | ||||
def _pad(self, s): | ||||
r4995 | block_pad = (self.block_size - len(s) % self.block_size) | |||
return s + block_pad * safe_bytes(chr(block_pad)) | ||||
r1 | ||||
@staticmethod | ||||
def _unpad(s): | ||||
r3522 | return s[:-ord(s[len(s)-1:])] | |||
r4995 | def validate_and_decrypt_data(enc_data, enc_key, enc_strict_mode=False, safe=True): | |||
enc_data = safe_str(enc_data) | ||||
r5166 | if '$' not in enc_data: | |||
# probably not encrypted values | ||||
return enc_data | ||||
r3522 | parts = enc_data.split('$', 3) | |||
r4995 | if len(parts) != 3: | |||
r5166 | raise ValueError(f'Encrypted Data has invalid format, expected {KEY_FORMAT}, got {parts}, org value: {enc_data}') | |||
r4995 | ||||
enc_type = parts[1] | ||||
enc_data_part = parts[2] | ||||
if parts[0] != 'enc': | ||||
r5166 | # parts ok but without our header? | |||
r3522 | return enc_data | |||
r4995 | # at that stage we know it's our encryption | |||
if enc_type == 'aes': | ||||
decrypted_data = AESCipher(enc_key).decrypt(enc_data_part, safe=safe) | ||||
elif enc_type == 'aes_hmac': | ||||
decrypted_data = AESCipher( | ||||
enc_key, hmac=True, | ||||
strict_verification=enc_strict_mode).decrypt(enc_data_part, safe=safe) | ||||
else: | ||||
raise ValueError( | ||||
f'Encryption type part is wrong, must be `aes` ' | ||||
f'or `aes_hmac`, got `{enc_type}` instead') | ||||
return decrypted_data | ||||
def encrypt_data(data, enc_key: bytes): | ||||
enc_key = safe_bytes(enc_key) | ||||
enc_value = AESCipher(enc_key, hmac=True).encrypt(safe_bytes(data)) | ||||
return KEY_FORMAT.replace(b'{1}', enc_value) | ||||