pycryptodome/lib/Crypto/Cipher/_mode_openpgp.py
2015-03-11 11:30:16 -04:00

242 lines
8.8 KiB
Python

# ===================================================================
#
# Copyright (c) 2014, Legrandin <helderijs@gmail.com>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
# 1. Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in
# the documentation and/or other materials provided with the
# distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
# ===================================================================
"""
OpenPGP mode.
"""
__all__ = ['OpenPgpMode']
from Crypto.Util.py3compat import *
from Crypto.Util.number import long_to_bytes, bytes_to_long
class OpenPgpMode(object):
"""OpenPGP mode.
This mode is a variant of CFB, and it is only used in PGP and
OpenPGP_ applications.
An Initialization Vector (*IV*) is required.
Unlike CFB, the *encrypted* IV (not the IV itself) is
transmitted to the receiver.
The IV is a random data block. Two of its bytes are duplicated to act
as a checksum for the correctness of the key. The encrypted IV is
therefore 2 bytes longer than the clean IV.
.. _OpenPGP: http://tools.ietf.org/html/rfc4880
"""
def __init__(self, factory, **kwargs):
"""Create a new block cipher, configured in OpenPGP mode.
:Parameters:
factory : module
The module.
:Keywords:
key : byte string
The secret key to use in the symmetric cipher.
IV : byte string
The initialization vector to use for encryption or decryption.
For encryption, the IV must be as long as the
cipher block size.
For decryption, it must be 2 bytes longer (it is actually
the *encrypted* IV which was prefixed to the ciphertext).
"""
#: The block size of the underlying cipher, in bytes.
self.block_size = factory.block_size
self.IV = kwargs.pop("IV", None)
try:
key = kwargs.pop("key")
if self.IV is None:
self.IV = kwargs.pop("iv")
except KeyError, e:
raise TypeError("Missing component: " + str(e))
self._done_first_block = False # True after the first encryption
self._done_last_block = False # True after a partial block is processed
# Instantiate a temporary cipher to process the IV
IV_cipher = factory.new(
key,
factory.MODE_CFB,
IV=bchr(0) * self.block_size,
segment_size=self.block_size * 8,
**kwargs)
# The cipher will be used for...
if len(self.IV) == self.block_size:
# ... encryption
self._encrypted_IV = IV_cipher.encrypt(
self.IV + self.IV[-2:] + # Plaintext
bchr(0) * (self.block_size - 2) # Padding
)[:self.block_size + 2]
elif len(self.IV) == self.block_size + 2:
# ... decryption
self._encrypted_IV = self.IV
self.IV = IV_cipher.decrypt(
self.IV + # Ciphertext
bchr(0) * (self.block_size - 2) # Padding
)[:self.block_size + 2]
if self.IV[-2:] != self.IV[-4:-2]:
raise ValueError("Failed integrity check for OPENPGP IV")
self.IV = self.iv = self.IV[:-2]
else:
raise ValueError("Length of IV must be %d or %d bytes"
" for MODE_OPENPGP"
% (self.block_size, self.block_size + 2))
# Instantiate the cipher for the real PGP data
self._cipher = factory.new(
key,
factory.MODE_CFB,
IV=self._encrypted_IV[-self.block_size:],
segment_size=self.block_size * 8,
**kwargs
)
def encrypt(self, plaintext):
"""Encrypt data with the key and the parameters set at initialization.
A cipher object is stateful: once you have encrypted a message
you cannot encrypt (or decrypt) another message using the same
object.
The data to encrypt can be broken up in two or
more pieces and `encrypt` can be called multiple times.
That is, the statement:
>>> c.encrypt(a) + c.encrypt(b)
is equivalent to:
>>> c.encrypt(a+b)
This function does not add any padding to the plaintext.
:Parameters:
plaintext : byte string
The piece of data to encrypt.
It must be a multiple of *block_size*,
unless it is the last chunk of the message.
:Return:
the encrypted data, as a byte string.
It is as long as *plaintext* with one exception:
when encrypting the first message chunk,
the encypted IV is prepended to the returned ciphertext.
"""
padding_length = ((self.block_size -
len(plaintext) % self.block_size)
% self.block_size)
if padding_length > 0:
# CFB mode requires ciphertext to have length multiple
# of block size,
# but PGP mode allows the last block to be shorter
if self._done_last_block:
raise ValueError(
"Only the last chunk is allowed to have"
" length not multiple of %d bytes",
self.block_size
)
self._done_last_block = True
padded = plaintext + bchr(0) * padding_length
res = self._cipher.encrypt(padded)[:len(plaintext)]
else:
res = self._cipher.encrypt(plaintext)
if not self._done_first_block:
res = self._encrypted_IV + res
self._done_first_block = True
return res
def decrypt(self, ciphertext):
"""Decrypt data with the key and the parameters set at initialization.
A cipher object is stateful: once you have decrypted a message
you cannot decrypt (or encrypt) another message with the same
object.
The data to decrypt can be broken up in two or
more pieces and `decrypt` can be called multiple times.
That is, the statement:
>>> c.decrypt(a) + c.decrypt(b)
is equivalent to:
>>> c.decrypt(a+b)
This function does not remove any padding from the plaintext.
:Parameters:
ciphertext : byte string
The piece of data to decrypt.
It must be a multiple of *block_size*,
unless it is the last chunk of the message.
:Return: the decrypted data (byte string).
"""
padding_length = ((self.block_size -
len(ciphertext) % self.block_size)
% self.block_size)
if padding_length > 0:
# CFB mode requires ciphertext to have length multiple
# of block size,
# but PGP mode allows the last block to be shorter
if self._done_last_block:
raise ValueError(
"Only the last chunk is allowed to have"
" length not multiple of %d bytes",
self.block_size
)
self._done_last_block = True
padded = ciphertext + bchr(0) * padding_length
res = self._cipher.decrypt(padded)[:len(ciphertext)]
else:
res = self._cipher.decrypt(ciphertext)
return res
def _create_openpgp_cipher(factory, **kwargs):
return OpenPgpMode(factory, **kwargs)