iTextSharp-LGPL/src/core/iTextSharp/text/pdf/PdfEncryption.cs

546 lines
21 KiB
C#

using System;
using System.Collections;
using System.Security.Cryptography;
using System.Text;
using System.IO;
using iTextSharp.text.pdf.crypto;
using Org.BouncyCastle.X509;
/*
* $Id: PdfEncryption.cs,v 1.13 2007/06/14 20:01:48 psoares33 Exp $
*
* Copyright 2001-2006 Paulo Soares
*
* The contents of this file are subject to the Mozilla Public License Version 1.1
* (the "License"); you may not use this file except in compliance with the License.
* You may obtain a copy of the License at http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the License.
*
* The Original Code is 'iText, a free JAVA-PDF library'.
*
* The Initial Developer of the Original Code is Bruno Lowagie. Portions created by
* the Initial Developer are Copyright (C) 1999, 2000, 2001, 2002 by Bruno Lowagie.
* All Rights Reserved.
* Co-Developer of the code is Paulo Soares. Portions created by the Co-Developer
* are Copyright (C) 2000, 2001, 2002 by Paulo Soares. All Rights Reserved.
*
* Contributor(s): all the names of the contributors are added in the source code
* where applicable.
*
* Alternatively, the contents of this file may be used under the terms of the
* LGPL license (the "GNU LIBRARY GENERAL PUBLIC LICENSE"), in which case the
* provisions of LGPL are applicable instead of those above. If you wish to
* allow use of your version of this file only under the terms of the LGPL
* License and not to allow others to use your version of this file under
* the MPL, indicate your decision by deleting the provisions above and
* replace them with the notice and other provisions required by the LGPL.
* If you do not delete the provisions above, a recipient may use your version
* of this file under either the MPL or the GNU LIBRARY GENERAL PUBLIC LICENSE.
*
* This library is free software; you can redistribute it and/or modify it
* under the terms of the MPL as stated above or under the terms of the GNU
* Library General Public License as published by the Free Software Foundation;
* either version 2 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU Library general Public License for more
* details.
*
* If you didn't download this code from the following link, you should check if
* you aren't using an obsolete version:
* http://www.lowagie.com/iText/
*/
namespace iTextSharp.text.pdf {
/**
*
* @author Paulo Soares (psoares@consiste.pt)
*/
public class PdfEncryption {
public const int STANDARD_ENCRYPTION_40 = 2;
public const int STANDARD_ENCRYPTION_128 = 3;
public const int AES_128 = 4;
private static byte[] pad = {
(byte)0x28, (byte)0xBF, (byte)0x4E, (byte)0x5E, (byte)0x4E, (byte)0x75,
(byte)0x8A, (byte)0x41, (byte)0x64, (byte)0x00, (byte)0x4E, (byte)0x56,
(byte)0xFF, (byte)0xFA, (byte)0x01, (byte)0x08, (byte)0x2E, (byte)0x2E,
(byte)0x00, (byte)0xB6, (byte)0xD0, (byte)0x68, (byte)0x3E, (byte)0x80,
(byte)0x2F, (byte)0x0C, (byte)0xA9, (byte)0xFE, (byte)0x64, (byte)0x53,
(byte)0x69, (byte)0x7A};
private static readonly byte[] salt = {(byte)0x73, (byte)0x41, (byte)0x6c, (byte)0x54};
internal static readonly byte[] metadataPad = {(byte)255,(byte)255,(byte)255,(byte)255};
/** The encryption key for a particular object/generation */
internal byte[] key;
/** The encryption key length for a particular object/generation */
internal int keySize;
/** The global encryption key */
internal byte[] mkey;
/** Work area to prepare the object/generation bytes */
internal byte[] extra = new byte[5];
/** The message digest algorithm MD5 */
internal MD5 md5;
/** The encryption key for the owner */
internal byte[] ownerKey = new byte[32];
/** The encryption key for the user */
internal byte[] userKey = new byte[32];
/** The public key security handler for certificate encryption */
protected PdfPublicKeySecurityHandler publicKeyHandler = null;
internal int permissions;
internal byte[] documentID;
internal static long seq = DateTime.Now.Ticks + Environment.TickCount;
private int revision;
private ARCFOUREncryption rc4 = new ARCFOUREncryption();
/** The generic key length. It may be 40 or 128. */
private int keyLength;
private bool encryptMetadata;
/**
* Indicates if the encryption is only necessary for embedded files.
* @since 2.1.3
*/
private bool embeddedFilesOnly;
private int cryptoMode;
public PdfEncryption() {
md5 = new MD5CryptoServiceProvider();
publicKeyHandler = new PdfPublicKeySecurityHandler();
}
public PdfEncryption(PdfEncryption enc) : this() {
mkey = (byte[])enc.mkey.Clone();
ownerKey = (byte[])enc.ownerKey.Clone();
userKey = (byte[])enc.userKey.Clone();
permissions = enc.permissions;
if (enc.documentID != null)
documentID = (byte[])enc.documentID.Clone();
revision = enc.revision;
keyLength = enc.keyLength;
encryptMetadata = enc.encryptMetadata;
embeddedFilesOnly = enc.embeddedFilesOnly;
publicKeyHandler = enc.publicKeyHandler;
}
public void SetCryptoMode(int mode, int kl) {
cryptoMode = mode;
encryptMetadata = (mode & PdfWriter.DO_NOT_ENCRYPT_METADATA) == 0;
embeddedFilesOnly = (mode & PdfWriter.EMBEDDED_FILES_ONLY) != 0;
mode &= PdfWriter.ENCRYPTION_MASK;
switch (mode) {
case PdfWriter.STANDARD_ENCRYPTION_40:
encryptMetadata = true;
embeddedFilesOnly = false;
keyLength = 40;
revision = STANDARD_ENCRYPTION_40;
break;
case PdfWriter.STANDARD_ENCRYPTION_128:
embeddedFilesOnly = false;
if (kl > 0)
keyLength = kl;
else
keyLength = 128;
revision = STANDARD_ENCRYPTION_128;
break;
case PdfWriter.ENCRYPTION_AES_128:
keyLength = 128;
revision = AES_128;
break;
default:
throw new ArgumentException("No valid encryption mode");
}
}
public int GetCryptoMode() {
return cryptoMode;
}
public bool IsMetadataEncrypted() {
return encryptMetadata;
}
/**
* Indicates if only the embedded files have to be encrypted.
* @return if true only the embedded files will be encrypted
* @since 2.1.3
*/
public bool IsEmbeddedFilesOnly() {
return embeddedFilesOnly;
}
private byte[] PadPassword(byte[] userPassword) {
byte[] userPad = new byte[32];
if (userPassword == null) {
Array.Copy(pad, 0, userPad, 0, 32);
}
else {
Array.Copy(userPassword, 0, userPad, 0, Math.Min(userPassword.Length, 32));
if (userPassword.Length < 32)
Array.Copy(pad, 0, userPad, userPassword.Length, 32 - userPassword.Length);
}
return userPad;
}
/**
*/
private byte[] ComputeOwnerKey(byte[] userPad, byte[] ownerPad) {
byte[] ownerKey = new byte[32];
byte[] digest = md5.ComputeHash(ownerPad);
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
byte[] mkey = new byte[keyLength / 8];
// only use for the input as many bit as the key consists of
for (int k = 0; k < 50; ++k)
Array.Copy(md5.ComputeHash(digest), 0, digest, 0, mkey.Length);
Array.Copy(userPad, 0, ownerKey, 0, 32);
for (int i = 0; i < 20; ++i) {
for (int j = 0; j < mkey.Length ; ++j)
mkey[j] = (byte)(digest[j] ^ i);
rc4.PrepareARCFOURKey(mkey);
rc4.EncryptARCFOUR(ownerKey);
}
}
else {
rc4.PrepareARCFOURKey(digest, 0, 5);
rc4.EncryptARCFOUR(userPad, ownerKey);
}
return ownerKey;
}
/**
*
* ownerKey, documentID must be setuped
*/
private void SetupGlobalEncryptionKey(byte[] documentID, byte[] userPad, byte[] ownerKey, int permissions) {
this.documentID = documentID;
this.ownerKey = ownerKey;
this.permissions = permissions;
// use variable keylength
mkey = new byte[keyLength / 8];
//fixed by ujihara in order to follow PDF refrence
md5.Initialize();
md5.TransformBlock(userPad, 0, userPad.Length, userPad, 0);
md5.TransformBlock(ownerKey, 0, ownerKey.Length, ownerKey, 0);
byte[] ext = new byte[4];
ext[0] = (byte)permissions;
ext[1] = (byte)(permissions >> 8);
ext[2] = (byte)(permissions >> 16);
ext[3] = (byte)(permissions >> 24);
md5.TransformBlock(ext, 0, 4, ext, 0);
if (documentID != null)
md5.TransformBlock(documentID, 0, documentID.Length, documentID, 0);
if (!encryptMetadata)
md5.TransformBlock(metadataPad, 0, metadataPad.Length, metadataPad, 0);
md5.TransformFinalBlock(ext, 0, 0);
byte[] digest = new byte[mkey.Length];
Array.Copy(md5.Hash, 0, digest, 0, mkey.Length);
md5.Initialize();
// only use the really needed bits as input for the hash
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
for (int k = 0; k < 50; ++k) {
Array.Copy(md5.ComputeHash(digest), 0, digest, 0, mkey.Length);
md5.Initialize();
}
}
Array.Copy(digest, 0, mkey, 0, mkey.Length);
}
/**
*
* mkey must be setuped
*/
// use the revision to choose the setup method
private void SetupUserKey() {
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
md5.TransformBlock(pad, 0, pad.Length, pad, 0);
md5.TransformFinalBlock(documentID, 0, documentID.Length);
byte[] digest = md5.Hash;
md5.Initialize();
Array.Copy(digest, 0, userKey, 0, 16);
for (int k = 16; k < 32; ++k)
userKey[k] = 0;
for (int i = 0; i < 20; ++i) {
for (int j = 0; j < mkey.Length; ++j)
digest[j] = (byte)(mkey[j] ^ i);
rc4.PrepareARCFOURKey(digest, 0, mkey.Length);
rc4.EncryptARCFOUR(userKey, 0, 16);
}
}
else {
rc4.PrepareARCFOURKey(mkey);
rc4.EncryptARCFOUR(pad, userKey);
}
}
// gets keylength and revision and uses revison to choose the initial values for permissions
public void SetupAllKeys(byte[] userPassword, byte[] ownerPassword, int permissions) {
if (ownerPassword == null || ownerPassword.Length == 0)
ownerPassword = md5.ComputeHash(CreateDocumentId());
md5.Initialize();
permissions |= (int)((revision == STANDARD_ENCRYPTION_128 || revision == AES_128) ? (uint)0xfffff0c0 : (uint)0xffffffc0);
permissions &= unchecked((int)0xfffffffc);
//PDF refrence 3.5.2 Standard Security Handler, Algorithum 3.3-1
//If there is no owner password, use the user password instead.
byte[] userPad = PadPassword(userPassword);
byte[] ownerPad = PadPassword(ownerPassword);
this.ownerKey = ComputeOwnerKey(userPad, ownerPad);
documentID = CreateDocumentId();
SetupByUserPad(this.documentID, userPad, this.ownerKey, permissions);
}
public static byte[] CreateDocumentId() {
MD5 md5 = new MD5CryptoServiceProvider();
long time = DateTime.Now.Ticks + Environment.TickCount;
long mem = GC.GetTotalMemory(false);
String s = time + "+" + mem + "+" + (seq++);
return md5.ComputeHash(Encoding.ASCII.GetBytes(s));
}
public void SetupByUserPassword(byte[] documentID, byte[] userPassword, byte[] ownerKey, int permissions) {
SetupByUserPad(documentID, PadPassword(userPassword), ownerKey, permissions);
}
/**
*/
private void SetupByUserPad(byte[] documentID, byte[] userPad, byte[] ownerKey, int permissions) {
SetupGlobalEncryptionKey(documentID, userPad, ownerKey, permissions);
SetupUserKey();
}
/**
*/
public void SetupByOwnerPassword(byte[] documentID, byte[] ownerPassword, byte[] userKey, byte[] ownerKey, int permissions) {
SetupByOwnerPad(documentID, PadPassword(ownerPassword), userKey, ownerKey, permissions);
}
private void SetupByOwnerPad(byte[] documentID, byte[] ownerPad, byte[] userKey, byte[] ownerKey, int permissions) {
byte[] userPad = ComputeOwnerKey(ownerKey, ownerPad); //userPad will be set in this.ownerKey
SetupGlobalEncryptionKey(documentID, userPad, ownerKey, permissions); //step 3
SetupUserKey();
}
public void SetupByEncryptionKey(byte[] key, int keylength) {
mkey = new byte[keylength/8];
System.Array.Copy(key, 0, mkey, 0, mkey.Length);
}
public void SetHashKey(int number, int generation) {
md5.Initialize(); //added by ujihara
extra[0] = (byte)number;
extra[1] = (byte)(number >> 8);
extra[2] = (byte)(number >> 16);
extra[3] = (byte)generation;
extra[4] = (byte)(generation >> 8);
md5.TransformBlock(mkey, 0, mkey.Length, mkey, 0);
md5.TransformBlock(extra, 0, extra.Length, extra, 0);
if (revision == AES_128)
md5.TransformBlock(salt, 0, salt.Length, salt, 0);
md5.TransformFinalBlock(extra, 0, 0);
key = md5.Hash;
md5.Initialize();
keySize = mkey.Length + 5;
if (keySize > 16)
keySize = 16;
}
public static PdfObject CreateInfoId(byte[] id) {
ByteBuffer buf = new ByteBuffer(90);
buf.Append('[').Append('<');
for (int k = 0; k < 16; ++k)
buf.AppendHex(id[k]);
buf.Append('>').Append('<');
id = CreateDocumentId();
for (int k = 0; k < 16; ++k)
buf.AppendHex(id[k]);
buf.Append('>').Append(']');
return new PdfLiteral(buf.ToByteArray());
}
public PdfDictionary GetEncryptionDictionary() {
PdfDictionary dic = new PdfDictionary();
if (publicKeyHandler.GetRecipientsSize() > 0) {
PdfArray recipients = null;
dic.Put(PdfName.FILTER, PdfName.PUBSEC);
dic.Put(PdfName.R, new PdfNumber(revision));
recipients = publicKeyHandler.GetEncodedRecipients();
if (revision == STANDARD_ENCRYPTION_40) {
dic.Put(PdfName.V, new PdfNumber(1));
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S4);
dic.Put(PdfName.RECIPIENTS, recipients);
}
else if (revision == STANDARD_ENCRYPTION_128 && encryptMetadata) {
dic.Put(PdfName.V, new PdfNumber(2));
dic.Put(PdfName.LENGTH, new PdfNumber(128));
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S4);
dic.Put(PdfName.RECIPIENTS, recipients);
}
else {
dic.Put(PdfName.R, new PdfNumber(AES_128));
dic.Put(PdfName.V, new PdfNumber(4));
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S5);
PdfDictionary stdcf = new PdfDictionary();
stdcf.Put(PdfName.RECIPIENTS, recipients);
if (!encryptMetadata)
stdcf.Put(PdfName.ENCRYPTMETADATA, PdfBoolean.PDFFALSE);
if (revision == AES_128)
stdcf.Put(PdfName.CFM, PdfName.AESV2);
else
stdcf.Put(PdfName.CFM, PdfName.V2);
PdfDictionary cf = new PdfDictionary();
cf.Put(PdfName.DEFAULTCRYPTFILER, stdcf);
dic.Put(PdfName.CF, cf);
if (embeddedFilesOnly) {
dic.Put(PdfName.EFF, PdfName.DEFAULTCRYPTFILER);
dic.Put(PdfName.STRF, PdfName.IDENTITY);
dic.Put(PdfName.STMF, PdfName.IDENTITY);
}
else {
dic.Put(PdfName.STRF, PdfName.DEFAULTCRYPTFILER);
dic.Put(PdfName.STMF, PdfName.DEFAULTCRYPTFILER);
}
}
SHA1 sh = new SHA1CryptoServiceProvider();
byte[] encodedRecipient = null;
byte[] seed = publicKeyHandler.GetSeed();
sh.TransformBlock(seed, 0, seed.Length, seed, 0);
for (int i=0; i<publicKeyHandler.GetRecipientsSize(); i++)
{
encodedRecipient = publicKeyHandler.GetEncodedRecipient(i);
sh.TransformBlock(encodedRecipient, 0, encodedRecipient.Length, encodedRecipient, 0);
}
if (!encryptMetadata)
sh.TransformBlock(metadataPad, 0, metadataPad.Length, metadataPad, 0);
sh.TransformFinalBlock(seed, 0, 0);
byte[] mdResult = sh.Hash;
SetupByEncryptionKey(mdResult, keyLength);
} else {
dic.Put(PdfName.FILTER, PdfName.STANDARD);
dic.Put(PdfName.O, new PdfLiteral(PdfContentByte.EscapeString(ownerKey)));
dic.Put(PdfName.U, new PdfLiteral(PdfContentByte.EscapeString(userKey)));
dic.Put(PdfName.P, new PdfNumber(permissions));
dic.Put(PdfName.R, new PdfNumber(revision));
if (revision == STANDARD_ENCRYPTION_40) {
dic.Put(PdfName.V, new PdfNumber(1));
}
else if (revision == STANDARD_ENCRYPTION_128 && encryptMetadata) {
dic.Put(PdfName.V, new PdfNumber(2));
dic.Put(PdfName.LENGTH, new PdfNumber(128));
}
else {
if (!encryptMetadata)
dic.Put(PdfName.ENCRYPTMETADATA, PdfBoolean.PDFFALSE);
dic.Put(PdfName.R, new PdfNumber(AES_128));
dic.Put(PdfName.V, new PdfNumber(4));
dic.Put(PdfName.LENGTH, new PdfNumber(128));
PdfDictionary stdcf = new PdfDictionary();
stdcf.Put(PdfName.LENGTH, new PdfNumber(16));
if (embeddedFilesOnly) {
stdcf.Put(PdfName.AUTHEVENT, PdfName.EFOPEN);
dic.Put(PdfName.EFF, PdfName.STDCF);
dic.Put(PdfName.STRF, PdfName.IDENTITY);
dic.Put(PdfName.STMF, PdfName.IDENTITY);
}
else {
stdcf.Put(PdfName.AUTHEVENT, PdfName.DOCOPEN);
dic.Put(PdfName.STRF, PdfName.STDCF);
dic.Put(PdfName.STMF, PdfName.STDCF);
}
if (revision == AES_128)
stdcf.Put(PdfName.CFM, PdfName.AESV2);
else
stdcf.Put(PdfName.CFM, PdfName.V2);
PdfDictionary cf = new PdfDictionary();
cf.Put(PdfName.STDCF, stdcf);
dic.Put(PdfName.CF, cf);
}
}
return dic;
}
public PdfObject FileID {
get {
return CreateInfoId(documentID);
}
}
public OutputStreamEncryption GetEncryptionStream(Stream os) {
return new OutputStreamEncryption(os, key, 0, keySize, revision);
}
public int CalculateStreamSize(int n) {
if (revision == AES_128)
return (n & 0x7ffffff0) + 32;
else
return n;
}
public byte[] EncryptByteArray(byte[] b) {
MemoryStream ba = new MemoryStream();
OutputStreamEncryption os2 = GetEncryptionStream(ba);
os2.Write(b, 0, b.Length);
os2.Finish();
return ba.ToArray();
}
public StandardDecryption GetDecryptor() {
return new StandardDecryption(key, 0, keySize, revision);
}
public byte[] DecryptByteArray(byte[] b) {
MemoryStream ba = new MemoryStream();
StandardDecryption dec = GetDecryptor();
byte[] b2 = dec.Update(b, 0, b.Length);
if (b2 != null)
ba.Write(b2, 0, b2.Length);
b2 = dec.Finish();
if (b2 != null)
ba.Write(b2, 0, b2.Length);
return ba.ToArray();
}
public void AddRecipient(X509Certificate cert, int permission) {
documentID = CreateDocumentId();
publicKeyHandler.AddRecipient(new PdfPublicKeyRecipient(cert, permission));
}
public byte[] ComputeUserPassword(byte[] ownerPassword) {
byte[] userPad = ComputeOwnerKey(ownerKey, PadPassword(ownerPassword));
for (int i = 0; i < userPad.Length; i++) {
bool match = true;
for (int j = 0; j < userPad.Length - i; j++) {
if (userPad[i + j] != pad[j]) {
match = false;
break;
}
}
if (!match) continue;
byte[] userPassword = new byte[i];
System.Array.Copy(userPad, 0, userPassword, 0, i);
return userPassword;
}
return userPad;
}
}
}