• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright 2014 PDFium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 // Original code copyright 2014 Foxit Software Inc. http://www.foxitsoftware.com
6 
7 #include "core/fpdfapi/parser/cpdf_crypto_handler.h"
8 
9 #include <time.h>
10 
11 #include <algorithm>
12 #include <stack>
13 #include <utility>
14 
15 #include "core/fdrm/crypto/fx_crypt.h"
16 #include "core/fpdfapi/edit/cpdf_encryptor.h"
17 #include "core/fpdfapi/edit/cpdf_flateencoder.h"
18 #include "core/fpdfapi/parser/cpdf_dictionary.h"
19 #include "core/fpdfapi/parser/cpdf_number.h"
20 #include "core/fpdfapi/parser/cpdf_object_walker.h"
21 #include "core/fpdfapi/parser/cpdf_parser.h"
22 #include "core/fpdfapi/parser/cpdf_security_handler.h"
23 #include "core/fpdfapi/parser/cpdf_simple_parser.h"
24 #include "core/fpdfapi/parser/cpdf_stream.h"
25 #include "core/fpdfapi/parser/cpdf_stream_acc.h"
26 #include "core/fpdfapi/parser/cpdf_string.h"
27 
28 namespace {
29 
30 constexpr char kContentsKey[] = "Contents";
31 constexpr char kTypeKey[] = "Type";
32 constexpr char kFTKey[] = "FT";
33 constexpr char kSignTypeValue[] = "Sig";
34 
35 }  // namespace
36 
37 // static
IsSignatureDictionary(const CPDF_Dictionary * dictionary)38 bool CPDF_CryptoHandler::IsSignatureDictionary(
39     const CPDF_Dictionary* dictionary) {
40   if (!dictionary)
41     return false;
42   const CPDF_Object* type_obj = dictionary->GetDirectObjectFor(kTypeKey);
43   if (!type_obj)
44     type_obj = dictionary->GetDirectObjectFor(kFTKey);
45   return type_obj && type_obj->GetString() == kSignTypeValue;
46 }
47 
CryptBlock(bool bEncrypt,uint32_t objnum,uint32_t gennum,const uint8_t * src_buf,uint32_t src_size,uint8_t * dest_buf,uint32_t & dest_size)48 void CPDF_CryptoHandler::CryptBlock(bool bEncrypt,
49                                     uint32_t objnum,
50                                     uint32_t gennum,
51                                     const uint8_t* src_buf,
52                                     uint32_t src_size,
53                                     uint8_t* dest_buf,
54                                     uint32_t& dest_size) {
55   if (m_Cipher == FXCIPHER_NONE) {
56     memcpy(dest_buf, src_buf, src_size);
57     return;
58   }
59   uint8_t realkey[16];
60   int realkeylen = 16;
61   if (m_Cipher != FXCIPHER_AES || m_KeyLen != 32) {
62     uint8_t key1[32];
63     PopulateKey(objnum, gennum, key1);
64 
65     if (m_Cipher == FXCIPHER_AES) {
66       memcpy(key1 + m_KeyLen + 5, "sAlT", 4);
67     }
68     CRYPT_MD5Generate(
69         key1, m_Cipher == FXCIPHER_AES ? m_KeyLen + 9 : m_KeyLen + 5, realkey);
70     realkeylen = m_KeyLen + 5;
71     if (realkeylen > 16) {
72       realkeylen = 16;
73     }
74   }
75   if (m_Cipher == FXCIPHER_AES) {
76     CRYPT_AESSetKey(m_pAESContext.get(), 16,
77                     m_KeyLen == 32 ? m_EncryptKey : realkey, m_KeyLen,
78                     bEncrypt);
79     if (bEncrypt) {
80       uint8_t iv[16];
81       for (int i = 0; i < 16; i++) {
82         iv[i] = (uint8_t)rand();
83       }
84       CRYPT_AESSetIV(m_pAESContext.get(), iv);
85       memcpy(dest_buf, iv, 16);
86       int nblocks = src_size / 16;
87       CRYPT_AESEncrypt(m_pAESContext.get(), dest_buf + 16, src_buf,
88                        nblocks * 16);
89       uint8_t padding[16];
90       memcpy(padding, src_buf + nblocks * 16, src_size % 16);
91       memset(padding + src_size % 16, 16 - src_size % 16, 16 - src_size % 16);
92       CRYPT_AESEncrypt(m_pAESContext.get(), dest_buf + nblocks * 16 + 16,
93                        padding, 16);
94       dest_size = 32 + nblocks * 16;
95     } else {
96       CRYPT_AESSetIV(m_pAESContext.get(), src_buf);
97       CRYPT_AESDecrypt(m_pAESContext.get(), dest_buf, src_buf + 16,
98                        src_size - 16);
99       dest_size = src_size - 16;
100       dest_size -= dest_buf[dest_size - 1];
101     }
102   } else {
103     ASSERT(dest_size == src_size);
104     if (dest_buf != src_buf) {
105       memcpy(dest_buf, src_buf, src_size);
106     }
107     CRYPT_ArcFourCryptBlock(dest_buf, dest_size, realkey, realkeylen);
108   }
109 }
110 
111 struct AESCryptContext {
112   bool m_bIV;
113   uint8_t m_Block[16];
114   uint32_t m_BlockOffset;
115   CRYPT_aes_context m_Context;
116 };
117 
CryptStart(uint32_t objnum,uint32_t gennum,bool bEncrypt)118 void* CPDF_CryptoHandler::CryptStart(uint32_t objnum,
119                                      uint32_t gennum,
120                                      bool bEncrypt) {
121   if (m_Cipher == FXCIPHER_NONE) {
122     return this;
123   }
124   if (m_Cipher == FXCIPHER_AES && m_KeyLen == 32) {
125     AESCryptContext* pContext = FX_Alloc(AESCryptContext, 1);
126     pContext->m_bIV = true;
127     pContext->m_BlockOffset = 0;
128     CRYPT_AESSetKey(&pContext->m_Context, 16, m_EncryptKey, 32, bEncrypt);
129     if (bEncrypt) {
130       for (int i = 0; i < 16; i++) {
131         pContext->m_Block[i] = (uint8_t)rand();
132       }
133       CRYPT_AESSetIV(&pContext->m_Context, pContext->m_Block);
134     }
135     return pContext;
136   }
137   uint8_t key1[48];
138   PopulateKey(objnum, gennum, key1);
139 
140   if (m_Cipher == FXCIPHER_AES) {
141     memcpy(key1 + m_KeyLen + 5, "sAlT", 4);
142   }
143   uint8_t realkey[16];
144   CRYPT_MD5Generate(
145       key1, m_Cipher == FXCIPHER_AES ? m_KeyLen + 9 : m_KeyLen + 5, realkey);
146   int realkeylen = m_KeyLen + 5;
147   if (realkeylen > 16) {
148     realkeylen = 16;
149   }
150   if (m_Cipher == FXCIPHER_AES) {
151     AESCryptContext* pContext = FX_Alloc(AESCryptContext, 1);
152     pContext->m_bIV = true;
153     pContext->m_BlockOffset = 0;
154     CRYPT_AESSetKey(&pContext->m_Context, 16, realkey, 16, bEncrypt);
155     if (bEncrypt) {
156       for (int i = 0; i < 16; i++) {
157         pContext->m_Block[i] = (uint8_t)rand();
158       }
159       CRYPT_AESSetIV(&pContext->m_Context, pContext->m_Block);
160     }
161     return pContext;
162   }
163   CRYPT_rc4_context* pContext = FX_Alloc(CRYPT_rc4_context, 1);
164   CRYPT_ArcFourSetup(pContext, realkey, realkeylen);
165   return pContext;
166 }
167 
CryptStream(void * context,const uint8_t * src_buf,uint32_t src_size,CFX_BinaryBuf & dest_buf,bool bEncrypt)168 bool CPDF_CryptoHandler::CryptStream(void* context,
169                                      const uint8_t* src_buf,
170                                      uint32_t src_size,
171                                      CFX_BinaryBuf& dest_buf,
172                                      bool bEncrypt) {
173   if (!context) {
174     return false;
175   }
176   if (m_Cipher == FXCIPHER_NONE) {
177     dest_buf.AppendBlock(src_buf, src_size);
178     return true;
179   }
180   if (m_Cipher == FXCIPHER_RC4) {
181     int old_size = dest_buf.GetSize();
182     dest_buf.AppendBlock(src_buf, src_size);
183     CRYPT_ArcFourCrypt(reinterpret_cast<CRYPT_rc4_context*>(context),
184                        dest_buf.GetBuffer() + old_size, src_size);
185     return true;
186   }
187   AESCryptContext* pContext = reinterpret_cast<AESCryptContext*>(context);
188   if (pContext->m_bIV && bEncrypt) {
189     dest_buf.AppendBlock(pContext->m_Block, 16);
190     pContext->m_bIV = false;
191   }
192   uint32_t src_off = 0;
193   uint32_t src_left = src_size;
194   while (1) {
195     uint32_t copy_size = 16 - pContext->m_BlockOffset;
196     if (copy_size > src_left) {
197       copy_size = src_left;
198     }
199     memcpy(pContext->m_Block + pContext->m_BlockOffset, src_buf + src_off,
200            copy_size);
201     src_off += copy_size;
202     src_left -= copy_size;
203     pContext->m_BlockOffset += copy_size;
204     if (pContext->m_BlockOffset == 16) {
205       if (!bEncrypt && pContext->m_bIV) {
206         CRYPT_AESSetIV(&pContext->m_Context, pContext->m_Block);
207         pContext->m_bIV = false;
208         pContext->m_BlockOffset = 0;
209       } else if (src_off < src_size) {
210         uint8_t block_buf[16];
211         if (bEncrypt) {
212           CRYPT_AESEncrypt(&pContext->m_Context, block_buf, pContext->m_Block,
213                            16);
214         } else {
215           CRYPT_AESDecrypt(&pContext->m_Context, block_buf, pContext->m_Block,
216                            16);
217         }
218         dest_buf.AppendBlock(block_buf, 16);
219         pContext->m_BlockOffset = 0;
220       }
221     }
222     if (!src_left) {
223       break;
224     }
225   }
226   return true;
227 }
CryptFinish(void * context,CFX_BinaryBuf & dest_buf,bool bEncrypt)228 bool CPDF_CryptoHandler::CryptFinish(void* context,
229                                      CFX_BinaryBuf& dest_buf,
230                                      bool bEncrypt) {
231   if (!context) {
232     return false;
233   }
234   if (m_Cipher == FXCIPHER_NONE) {
235     return true;
236   }
237   if (m_Cipher == FXCIPHER_RC4) {
238     FX_Free(context);
239     return true;
240   }
241   AESCryptContext* pContext = (AESCryptContext*)context;
242   if (bEncrypt) {
243     uint8_t block_buf[16];
244     if (pContext->m_BlockOffset == 16) {
245       CRYPT_AESEncrypt(&pContext->m_Context, block_buf, pContext->m_Block, 16);
246       dest_buf.AppendBlock(block_buf, 16);
247       pContext->m_BlockOffset = 0;
248     }
249     memset(pContext->m_Block + pContext->m_BlockOffset,
250            (uint8_t)(16 - pContext->m_BlockOffset),
251            16 - pContext->m_BlockOffset);
252     CRYPT_AESEncrypt(&pContext->m_Context, block_buf, pContext->m_Block, 16);
253     dest_buf.AppendBlock(block_buf, 16);
254   } else if (pContext->m_BlockOffset == 16) {
255     uint8_t block_buf[16];
256     CRYPT_AESDecrypt(&pContext->m_Context, block_buf, pContext->m_Block, 16);
257     if (block_buf[15] <= 16) {
258       dest_buf.AppendBlock(block_buf, 16 - block_buf[15]);
259     }
260   }
261   FX_Free(pContext);
262   return true;
263 }
264 
Decrypt(uint32_t objnum,uint32_t gennum,const ByteString & str)265 ByteString CPDF_CryptoHandler::Decrypt(uint32_t objnum,
266                                        uint32_t gennum,
267                                        const ByteString& str) {
268   CFX_BinaryBuf dest_buf;
269   void* context = DecryptStart(objnum, gennum);
270   DecryptStream(context, str.raw_str(), str.GetLength(), dest_buf);
271   DecryptFinish(context, dest_buf);
272   return ByteString(dest_buf.GetBuffer(), dest_buf.GetSize());
273 }
274 
DecryptStart(uint32_t objnum,uint32_t gennum)275 void* CPDF_CryptoHandler::DecryptStart(uint32_t objnum, uint32_t gennum) {
276   return CryptStart(objnum, gennum, false);
277 }
DecryptGetSize(uint32_t src_size)278 uint32_t CPDF_CryptoHandler::DecryptGetSize(uint32_t src_size) {
279   return m_Cipher == FXCIPHER_AES ? src_size - 16 : src_size;
280 }
281 
IsCipherAES() const282 bool CPDF_CryptoHandler::IsCipherAES() const {
283   return m_Cipher == FXCIPHER_AES;
284 }
285 
DecryptObjectTree(std::unique_ptr<CPDF_Object> object)286 std::unique_ptr<CPDF_Object> CPDF_CryptoHandler::DecryptObjectTree(
287     std::unique_ptr<CPDF_Object> object) {
288   if (!object)
289     return nullptr;
290 
291   struct MayBeSignature {
292     const CPDF_Dictionary* parent;
293     CPDF_Object* contents;
294   };
295 
296   std::stack<MayBeSignature> may_be_sign_dictionaries;
297   const uint32_t obj_num = object->GetObjNum();
298   const uint32_t gen_num = object->GetGenNum();
299 
300   CPDF_Object* object_to_decrypt = object.get();
301   while (object_to_decrypt) {
302     CPDF_NonConstObjectWalker walker(object_to_decrypt);
303     object_to_decrypt = nullptr;
304     while (CPDF_Object* child = walker.GetNext()) {
305       const CPDF_Dictionary* parent_dict =
306           walker.GetParent() ? walker.GetParent()->GetDict() : nullptr;
307       if (walker.dictionary_key() == kContentsKey &&
308           (parent_dict->KeyExist(kTypeKey) || parent_dict->KeyExist(kFTKey))) {
309         // This object may be contents of signature dictionary.
310         // But now values of 'Type' and 'FT' of dictionary keys are encrypted,
311         // and we can not check this.
312         // Temporary skip it, to prevent signature corruption.
313         // It will be decrypted on next interations, if this is not contents of
314         // signature dictionary.
315         may_be_sign_dictionaries.push(MayBeSignature({parent_dict, child}));
316         walker.SkipWalkIntoCurrentObject();
317         continue;
318       }
319       // Strings decryption.
320       if (child->IsString()) {
321         // TODO(art-snake): Move decryption into the CPDF_String class.
322         CPDF_String* str = child->AsString();
323         str->SetString(Decrypt(obj_num, gen_num, str->GetString()));
324       }
325       // Stream decryption.
326       if (child->IsStream()) {
327         // TODO(art-snake): Move decryption into the CPDF_Stream class.
328         CPDF_Stream* stream = child->AsStream();
329         auto stream_access = pdfium::MakeRetain<CPDF_StreamAcc>(stream);
330         stream_access->LoadAllDataRaw();
331 
332         if (IsCipherAES() && stream_access->GetSize() < 16) {
333           stream->SetData(nullptr, 0);
334           continue;
335         }
336 
337         CFX_BinaryBuf decrypted_buf;
338         decrypted_buf.EstimateSize(DecryptGetSize(stream_access->GetSize()));
339 
340         void* context = DecryptStart(obj_num, gen_num);
341         bool decrypt_result =
342             DecryptStream(context, stream_access->GetData(),
343                           stream_access->GetSize(), decrypted_buf);
344         decrypt_result &= DecryptFinish(context, decrypted_buf);
345         if (decrypt_result) {
346           const uint32_t decrypted_size = decrypted_buf.GetSize();
347           stream->SetData(decrypted_buf.DetachBuffer(), decrypted_size);
348         } else {
349           // Decryption failed, set the stream to empty
350           stream->SetData(nullptr, 0);
351         }
352       }
353     }
354     // Signature dictionaries check.
355     while (!may_be_sign_dictionaries.empty()) {
356       auto dict_and_contents = std::move(may_be_sign_dictionaries.top());
357       may_be_sign_dictionaries.pop();
358       if (!IsSignatureDictionary(dict_and_contents.parent)) {
359         // This is not signature dictionary. Do decrypt its contents.
360         object_to_decrypt = dict_and_contents.contents;
361         break;
362       }
363     }
364   }
365   return object;
366 }
367 
DecryptStream(void * context,const uint8_t * src_buf,uint32_t src_size,CFX_BinaryBuf & dest_buf)368 bool CPDF_CryptoHandler::DecryptStream(void* context,
369                                        const uint8_t* src_buf,
370                                        uint32_t src_size,
371                                        CFX_BinaryBuf& dest_buf) {
372   return CryptStream(context, src_buf, src_size, dest_buf, false);
373 }
374 
DecryptFinish(void * context,CFX_BinaryBuf & dest_buf)375 bool CPDF_CryptoHandler::DecryptFinish(void* context, CFX_BinaryBuf& dest_buf) {
376   return CryptFinish(context, dest_buf, false);
377 }
EncryptGetSize(uint32_t objnum,uint32_t version,const uint8_t * src_buf,uint32_t src_size)378 uint32_t CPDF_CryptoHandler::EncryptGetSize(uint32_t objnum,
379                                             uint32_t version,
380                                             const uint8_t* src_buf,
381                                             uint32_t src_size) {
382   if (m_Cipher == FXCIPHER_AES) {
383     return src_size + 32;
384   }
385   return src_size;
386 }
387 
EncryptContent(uint32_t objnum,uint32_t gennum,const uint8_t * src_buf,uint32_t src_size,uint8_t * dest_buf,uint32_t & dest_size)388 bool CPDF_CryptoHandler::EncryptContent(uint32_t objnum,
389                                         uint32_t gennum,
390                                         const uint8_t* src_buf,
391                                         uint32_t src_size,
392                                         uint8_t* dest_buf,
393                                         uint32_t& dest_size) {
394   CryptBlock(true, objnum, gennum, src_buf, src_size, dest_buf, dest_size);
395   return true;
396 }
397 
CPDF_CryptoHandler(int cipher,const uint8_t * key,int keylen)398 CPDF_CryptoHandler::CPDF_CryptoHandler(int cipher,
399                                        const uint8_t* key,
400                                        int keylen)
401     : m_KeyLen(std::min(keylen, 32)), m_Cipher(cipher) {
402   ASSERT(cipher != FXCIPHER_AES || keylen == 16 || keylen == 24 ||
403          keylen == 32);
404   ASSERT(cipher != FXCIPHER_AES2 || keylen == 32);
405   ASSERT(cipher != FXCIPHER_RC4 || (keylen >= 5 && keylen <= 16));
406 
407   if (m_Cipher != FXCIPHER_NONE)
408     memcpy(m_EncryptKey, key, m_KeyLen);
409 
410   if (m_Cipher == FXCIPHER_AES)
411     m_pAESContext.reset(FX_Alloc(CRYPT_aes_context, 1));
412 }
413 
~CPDF_CryptoHandler()414 CPDF_CryptoHandler::~CPDF_CryptoHandler() {}
415 
PopulateKey(uint32_t objnum,uint32_t gennum,uint8_t * key)416 void CPDF_CryptoHandler::PopulateKey(uint32_t objnum,
417                                      uint32_t gennum,
418                                      uint8_t* key) {
419   memcpy(key, m_EncryptKey, m_KeyLen);
420   key[m_KeyLen + 0] = (uint8_t)objnum;
421   key[m_KeyLen + 1] = (uint8_t)(objnum >> 8);
422   key[m_KeyLen + 2] = (uint8_t)(objnum >> 16);
423   key[m_KeyLen + 3] = (uint8_t)gennum;
424   key[m_KeyLen + 4] = (uint8_t)(gennum >> 8);
425 }
426