forked from amazingfate/loongoffice
407 lines
14 KiB
C++
407 lines
14 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
/*
|
|
* This file is part of the LibreOffice project.
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
*/
|
|
|
|
#include "oox/crypto/DocumentDecryption.hxx"
|
|
|
|
#include <comphelper/sequenceashashmap.hxx>
|
|
#include <sax/tools/converter.hxx>
|
|
#include <cppuhelper/implbase1.hxx>
|
|
|
|
#include <com/sun/star/io/XSeekable.hpp>
|
|
#include <com/sun/star/uno/XComponentContext.hpp>
|
|
#include <com/sun/star/xml/sax/XFastParser.hpp>
|
|
#include <com/sun/star/xml/sax/XFastTokenHandler.hpp>
|
|
#include <com/sun/star/xml/sax/FastParser.hpp>
|
|
#include <com/sun/star/xml/sax/FastToken.hpp>
|
|
|
|
namespace oox {
|
|
namespace core {
|
|
|
|
using namespace css::beans;
|
|
using namespace css::io;
|
|
using namespace css::lang;
|
|
using namespace css::uno;
|
|
using namespace css::xml::sax;
|
|
using namespace css::xml;
|
|
|
|
using namespace std;
|
|
|
|
using ::comphelper::SequenceAsHashMap;
|
|
using ::sax::Converter;
|
|
|
|
namespace {
|
|
|
|
vector<sal_uInt8> convertToVector(Sequence<sal_Int8>& input)
|
|
{
|
|
const sal_uInt8* inputArray = reinterpret_cast<const sal_uInt8*>( input.getConstArray() );
|
|
return vector<sal_uInt8>(inputArray, inputArray + input.getLength());
|
|
}
|
|
|
|
class AgileTokenHandler : public cppu::WeakImplHelper1< XFastTokenHandler >
|
|
{
|
|
public:
|
|
virtual sal_Int32 SAL_CALL getToken( const OUString& /*nIdentifier*/ ) throw (RuntimeException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return FastToken::DONTKNOW;
|
|
}
|
|
|
|
virtual sal_Int32 SAL_CALL getTokenFromUTF8( const Sequence< sal_Int8 >& /*nIdentifier*/ ) throw (RuntimeException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return FastToken::DONTKNOW;
|
|
}
|
|
|
|
virtual OUString SAL_CALL getIdentifier( sal_Int32 /*nToken*/ ) throw (RuntimeException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return OUString();
|
|
}
|
|
|
|
virtual Sequence<sal_Int8> SAL_CALL getUTF8Identifier(sal_Int32 /*nToken*/) throw (RuntimeException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return Sequence<sal_Int8>();
|
|
}
|
|
};
|
|
|
|
class AgileDocumentHandler : public ::cppu::WeakImplHelper1< XFastDocumentHandler >
|
|
{
|
|
AgileEncryptionInfo& mInfo;
|
|
|
|
public:
|
|
AgileDocumentHandler(AgileEncryptionInfo& rInfo) :
|
|
mInfo(rInfo)
|
|
{}
|
|
|
|
void SAL_CALL startDocument()
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
void SAL_CALL endDocument()
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
void SAL_CALL setDocumentLocator( const Reference< XLocator >& /*xLocator*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
void SAL_CALL startFastElement( sal_Int32 /*Element*/, const Reference< XFastAttributeList >& /*Attribs*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
|
|
void SAL_CALL startUnknownElement( const OUString& /*aNamespace*/, const OUString& aName, const Reference< XFastAttributeList >& aAttributeList )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{
|
|
if(aName == "keyData")
|
|
{
|
|
Sequence<Attribute> aAttributes(aAttributeList->getUnknownAttributes());
|
|
|
|
for (int i=0; i<aAttributes.getLength(); i++)
|
|
{
|
|
if (aAttributes[i].Name == "saltValue")
|
|
{
|
|
Sequence<sal_Int8> keyDataSalt;
|
|
Converter::decodeBase64(keyDataSalt, aAttributes[i].Value);
|
|
mInfo.keyDataSalt = convertToVector(keyDataSalt);
|
|
}
|
|
}
|
|
}
|
|
else if(aName == "encryptedKey")
|
|
{
|
|
Sequence<Attribute> aAttributes(aAttributeList->getUnknownAttributes());
|
|
for (int i=0; i<aAttributes.getLength(); i++)
|
|
{
|
|
if (aAttributes[i].Name == "spinCount")
|
|
{
|
|
Converter::convertNumber(mInfo.spinCount, aAttributes[i].Value);
|
|
}
|
|
else if (aAttributes[i].Name == "saltSize")
|
|
{
|
|
Converter::convertNumber(mInfo.saltSize, aAttributes[i].Value);
|
|
}
|
|
else if (aAttributes[i].Name == "blockSize")
|
|
{
|
|
Converter::convertNumber(mInfo.blockSize, aAttributes[i].Value);
|
|
}
|
|
else if (aAttributes[i].Name == "keyBits")
|
|
{
|
|
Converter::convertNumber(mInfo.keyBits, aAttributes[i].Value);
|
|
}
|
|
else if (aAttributes[i].Name == "hashSize")
|
|
{
|
|
Converter::convertNumber(mInfo.hashSize, aAttributes[i].Value);
|
|
}
|
|
else if (aAttributes[i].Name == "cipherAlgorithm")
|
|
{
|
|
mInfo.cipherAlgorithm = aAttributes[i].Value;
|
|
}
|
|
else if (aAttributes[i].Name == "cipherChaining")
|
|
{
|
|
mInfo.cipherChaining = aAttributes[i].Value;
|
|
}
|
|
else if (aAttributes[i].Name == "hashAlgorithm")
|
|
{
|
|
mInfo.hashAlgorithm = aAttributes[i].Value;
|
|
}
|
|
else if (aAttributes[i].Name == "saltValue")
|
|
{
|
|
Sequence<sal_Int8> saltValue;
|
|
Converter::decodeBase64(saltValue, aAttributes[i].Value);
|
|
mInfo.saltValue = convertToVector(saltValue);
|
|
}
|
|
else if (aAttributes[i].Name == "encryptedVerifierHashInput")
|
|
{
|
|
Sequence<sal_Int8> encryptedVerifierHashInput;
|
|
Converter::decodeBase64(encryptedVerifierHashInput, aAttributes[i].Value);
|
|
mInfo.encryptedVerifierHashInput = convertToVector(encryptedVerifierHashInput);
|
|
}
|
|
else if (aAttributes[i].Name == "encryptedVerifierHashValue")
|
|
{
|
|
Sequence<sal_Int8> encryptedVerifierHashValue;
|
|
Converter::decodeBase64(encryptedVerifierHashValue, aAttributes[i].Value);
|
|
mInfo.encryptedVerifierHashValue = convertToVector(encryptedVerifierHashValue);
|
|
}
|
|
else if (aAttributes[i].Name == "encryptedKeyValue")
|
|
{
|
|
Sequence<sal_Int8> encryptedKeyValue;
|
|
Converter::decodeBase64(encryptedKeyValue, aAttributes[i].Value);
|
|
mInfo.encryptedKeyValue = convertToVector(encryptedKeyValue);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void SAL_CALL endFastElement( sal_Int32 /*aElement*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
void SAL_CALL endUnknownElement( const OUString& /*aNamespace*/, const OUString& /*aName*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
|
|
Reference< XFastContextHandler > SAL_CALL createFastChildContext( sal_Int32 /*aElement*/, const Reference< XFastAttributeList >& /*aAttribs*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
Reference< XFastContextHandler > SAL_CALL createUnknownChildContext( const OUString& /*aNamespace*/, const OUString& /*aName*/, const Reference< XFastAttributeList >& /*aAttribs*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{
|
|
return this;
|
|
}
|
|
|
|
void SAL_CALL characters( const OUString& /*aChars*/ )
|
|
throw (RuntimeException, SAXException, std::exception) SAL_OVERRIDE
|
|
{}
|
|
};
|
|
|
|
} // namespace
|
|
|
|
DocumentDecryption::DocumentDecryption(oox::ole::OleStorage& rOleStorage, Reference<XComponentContext> xContext) :
|
|
mxContext(xContext),
|
|
mrOleStorage(rOleStorage),
|
|
mCryptoType(UNKNOWN)
|
|
{}
|
|
|
|
bool DocumentDecryption::checkEncryptionData(const Sequence<NamedValue>& /*rEncryptionData*/)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
bool DocumentDecryption::generateEncryptionKey(const OUString& rPassword)
|
|
{
|
|
if (mEngine.get())
|
|
return mEngine->generateEncryptionKey(rPassword);
|
|
return false;
|
|
}
|
|
|
|
bool DocumentDecryption::readAgileEncryptionInfo(Reference< XInputStream >& xInputStream)
|
|
{
|
|
AgileEngine* engine = new AgileEngine();
|
|
mEngine.reset(engine);
|
|
AgileEncryptionInfo& info = engine->getInfo();
|
|
|
|
Reference<XFastDocumentHandler> xFastDocumentHandler( new AgileDocumentHandler(info) );
|
|
Reference<XFastTokenHandler> xFastTokenHandler ( new AgileTokenHandler );
|
|
|
|
Reference<XFastParser> xParser(
|
|
css::xml::sax::FastParser::create(mxContext));
|
|
|
|
xParser->setFastDocumentHandler( xFastDocumentHandler );
|
|
xParser->setTokenHandler( xFastTokenHandler );
|
|
|
|
InputSource aInputSource;
|
|
aInputSource.aInputStream = xInputStream;
|
|
xParser->parseStream( aInputSource );
|
|
|
|
// CHECK info data
|
|
if (2 > info.blockSize || info.blockSize > 4096)
|
|
return false;
|
|
|
|
if (0 > info.spinCount || info.spinCount > 10000000)
|
|
return false;
|
|
|
|
if (1 > info.saltSize|| info.saltSize > 65536) // Check
|
|
return false;
|
|
|
|
// AES 128 CBC with SHA1
|
|
if (info.keyBits == 128 &&
|
|
info.cipherAlgorithm == "AES" &&
|
|
info.cipherChaining == "ChainingModeCBC" &&
|
|
info.hashAlgorithm == "SHA1" &&
|
|
info.hashSize == 20)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
// AES 256 CBC with SHA512
|
|
if (info.keyBits == 256 &&
|
|
info.cipherAlgorithm == "AES" &&
|
|
info.cipherChaining == "ChainingModeCBC" &&
|
|
info.hashAlgorithm == "SHA512" &&
|
|
info.hashSize == 64 )
|
|
{
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
bool DocumentDecryption::readStandard2007EncryptionInfo(BinaryInputStream& rStream)
|
|
{
|
|
Standard2007Engine* engine = new Standard2007Engine();
|
|
mEngine.reset(engine);
|
|
StandardEncryptionInfo& info = engine->getInfo();
|
|
|
|
rStream >> info.header.flags;
|
|
if( getFlag( info.header.flags, ENCRYPTINFO_EXTERNAL ) )
|
|
return false;
|
|
|
|
sal_uInt32 nHeaderSize;
|
|
rStream >> nHeaderSize;
|
|
|
|
sal_uInt32 actualHeaderSize = sizeof(info.header);
|
|
|
|
if( (nHeaderSize < actualHeaderSize) )
|
|
return false;
|
|
|
|
rStream >> info.header.flags;
|
|
rStream >> info.header.sizeExtra;
|
|
rStream >> info.header.algId;
|
|
rStream >> info.header.algIdHash;
|
|
rStream >> info.header.keyBits;
|
|
rStream >> info.header.providedType;
|
|
rStream >> info.header.reserved1;
|
|
rStream >> info.header.reserved2;
|
|
|
|
rStream.skip( nHeaderSize - actualHeaderSize );
|
|
|
|
rStream >> info.verifier.saltSize;
|
|
rStream.readArray(info.verifier.salt, SAL_N_ELEMENTS(info.verifier.salt));
|
|
rStream.readArray(info.verifier.encryptedVerifier, SAL_N_ELEMENTS(info.verifier.encryptedVerifier));
|
|
rStream >> info.verifier.encryptedVerifierHashSize;
|
|
rStream.readArray(info.verifier.encryptedVerifierHash, SAL_N_ELEMENTS(info.verifier.encryptedVerifierHash));
|
|
|
|
if( info.verifier.saltSize != 16 )
|
|
return false;
|
|
|
|
// check flags and algorithm IDs, required are AES128 and SHA-1
|
|
if( !getFlag( info.header.flags , ENCRYPTINFO_CRYPTOAPI ) )
|
|
return false;
|
|
|
|
if( !getFlag( info.header.flags, ENCRYPTINFO_AES ) )
|
|
return false;
|
|
|
|
// algorithm ID 0 defaults to AES128 too, if ENCRYPTINFO_AES flag is set
|
|
if( info.header.algId != 0 && info.header.algId != ENCRYPT_ALGO_AES128 )
|
|
return false;
|
|
|
|
// hash algorithm ID 0 defaults to SHA-1 too
|
|
if( info.header.algIdHash != 0 && info.header.algIdHash != ENCRYPT_HASH_SHA1 )
|
|
return false;
|
|
|
|
if( info.verifier.encryptedVerifierHashSize != 20 )
|
|
return false;
|
|
|
|
return !rStream.isEof();
|
|
}
|
|
|
|
bool DocumentDecryption::readEncryptionInfo()
|
|
{
|
|
if( !mrOleStorage.isStorage() )
|
|
return false;
|
|
|
|
Reference< XInputStream > xEncryptionInfo( mrOleStorage.openInputStream( "EncryptionInfo" ), UNO_SET_THROW );
|
|
|
|
bool bResult = false;
|
|
|
|
BinaryXInputStream aBinaryInputStream( xEncryptionInfo, true );
|
|
|
|
sal_uInt32 aVersion;
|
|
aBinaryInputStream >> aVersion;
|
|
|
|
switch (aVersion)
|
|
{
|
|
case VERSION_INFO_2007_FORMAT:
|
|
case VERSION_INFO_2007_FORMAT_SP2:
|
|
mCryptoType = STANDARD_2007; // Set encryption info format
|
|
bResult = readStandard2007EncryptionInfo( aBinaryInputStream );
|
|
break;
|
|
case VERSION_INFO_AGILE:
|
|
mCryptoType = AGILE; // Set encryption info format
|
|
aBinaryInputStream.skip(4);
|
|
bResult = readAgileEncryptionInfo( xEncryptionInfo );
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return bResult;
|
|
}
|
|
|
|
Sequence<NamedValue> DocumentDecryption::createEncryptionData(const OUString& rPassword)
|
|
{
|
|
SequenceAsHashMap aEncryptionData;
|
|
|
|
if (mCryptoType == AGILE)
|
|
{
|
|
aEncryptionData["CryptoType"] <<= OUString("Agile");
|
|
}
|
|
else if (mCryptoType == STANDARD_2007)
|
|
{
|
|
aEncryptionData["CryptoType"] <<= OUString("Standard");
|
|
}
|
|
|
|
aEncryptionData["OOXPassword"] <<= rPassword;
|
|
return aEncryptionData.getAsConstNamedValueList();
|
|
}
|
|
|
|
bool DocumentDecryption::decrypt(Reference<XStream> xDocumentStream)
|
|
{
|
|
bool aResult = false;
|
|
|
|
if( !mrOleStorage.isStorage() )
|
|
return false;
|
|
|
|
// open the required input streams in the encrypted package
|
|
Reference< XInputStream > xEncryptedPackage( mrOleStorage.openInputStream( "EncryptedPackage" ), UNO_SET_THROW );
|
|
|
|
// create temporary file for unencrypted package
|
|
Reference< XOutputStream > xDecryptedPackage( xDocumentStream->getOutputStream(), UNO_SET_THROW );
|
|
BinaryXOutputStream aDecryptedPackage( xDecryptedPackage, true );
|
|
BinaryXInputStream aEncryptedPackage( xEncryptedPackage, true );
|
|
|
|
aResult = mEngine->decrypt(aEncryptedPackage, aDecryptedPackage);
|
|
|
|
xDecryptedPackage->flush();
|
|
aDecryptedPackage.seekToStart();
|
|
|
|
return aResult;
|
|
}
|
|
|
|
} // namespace core
|
|
} // namespace oox
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|