OLD | NEW |
1 // Copyright 2014 PDFium Authors. All rights reserved. | 1 // Copyright 2014 PDFium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Original code copyright 2014 Foxit Software Inc. http://www.foxitsoftware.com | 5 // Original code copyright 2014 Foxit Software Inc. http://www.foxitsoftware.com |
6 | 6 |
7 #include <time.h> | 7 #include <time.h> |
8 #include "../../../include/fpdfapi/fpdf_parser.h" | 8 #include "../../../include/fpdfapi/fpdf_parser.h" |
9 #include "../../../include/fdrm/fx_crypt.h" | 9 #include "../../../include/fdrm/fx_crypt.h" |
10 const FX_BYTE defpasscode[32] = { | 10 const FX_BYTE defpasscode[32] = { |
(...skipping 274 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
285 ++i; | 285 ++i; |
286 } | 286 } |
287 FX_Free(aes); | 287 FX_Free(aes); |
288 if (hash) { | 288 if (hash) { |
289 FXSYS_memcpy32(hash, input, 32); | 289 FXSYS_memcpy32(hash, input, 32); |
290 } | 290 } |
291 } | 291 } |
292 FX_BOOL CPDF_StandardSecurityHandler::AES256_CheckPassword(FX_LPCBYTE password,
FX_DWORD size, | 292 FX_BOOL CPDF_StandardSecurityHandler::AES256_CheckPassword(FX_LPCBYTE password,
FX_DWORD size, |
293 FX_BOOL bOwner, FX_LPBYTE key) | 293 FX_BOOL bOwner, FX_LPBYTE key) |
294 { | 294 { |
295 CFX_ByteString okey = m_pEncryptDict->GetString(FX_BSTRC("O")); | 295 CFX_ByteString okey = m_pEncryptDict ? m_pEncryptDict->GetString(FX_BSTRC("O
")) : CFX_ByteString(); |
296 if (okey.GetLength() < 48) { | 296 if (okey.GetLength() < 48) { |
297 return FALSE; | 297 return FALSE; |
298 } | 298 } |
299 CFX_ByteString ukey = m_pEncryptDict->GetString(FX_BSTRC("U")); | 299 CFX_ByteString ukey = m_pEncryptDict ? m_pEncryptDict->GetString(FX_BSTRC("U
")) : CFX_ByteString(); |
300 if (ukey.GetLength() < 48) { | 300 if (ukey.GetLength() < 48) { |
301 return FALSE; | 301 return FALSE; |
302 } | 302 } |
303 FX_LPCBYTE pkey = bOwner ? (FX_LPCBYTE)okey : (FX_LPCBYTE)ukey; | 303 FX_LPCBYTE pkey = bOwner ? (FX_LPCBYTE)okey : (FX_LPCBYTE)ukey; |
304 FX_BYTE sha[128]; | 304 FX_BYTE sha[128]; |
305 FX_BYTE digest[32]; | 305 FX_BYTE digest[32]; |
306 if (m_Revision >= 6) { | 306 if (m_Revision >= 6) { |
307 Revision6_Hash(password, size, (FX_LPCBYTE)pkey + 32, (bOwner ? (FX_LPCB
YTE)ukey : NULL), digest); | 307 Revision6_Hash(password, size, (FX_LPCBYTE)pkey + 32, (bOwner ? (FX_LPCB
YTE)ukey : NULL), digest); |
308 } else { | 308 } else { |
309 CRYPT_SHA256Start(sha); | 309 CRYPT_SHA256Start(sha); |
(...skipping 14 matching lines...) Expand all Loading... |
324 Revision6_Hash(password, size, (FX_LPCBYTE)pkey + 40, (bOwner ? (FX_LPCB
YTE)ukey : NULL), digest); | 324 Revision6_Hash(password, size, (FX_LPCBYTE)pkey + 40, (bOwner ? (FX_LPCB
YTE)ukey : NULL), digest); |
325 } else { | 325 } else { |
326 CRYPT_SHA256Start(sha); | 326 CRYPT_SHA256Start(sha); |
327 CRYPT_SHA256Update(sha, password, size); | 327 CRYPT_SHA256Update(sha, password, size); |
328 CRYPT_SHA256Update(sha, pkey + 40, 8); | 328 CRYPT_SHA256Update(sha, pkey + 40, 8); |
329 if (bOwner) { | 329 if (bOwner) { |
330 CRYPT_SHA256Update(sha, ukey, 48); | 330 CRYPT_SHA256Update(sha, ukey, 48); |
331 } | 331 } |
332 CRYPT_SHA256Finish(sha, digest); | 332 CRYPT_SHA256Finish(sha, digest); |
333 } | 333 } |
334 CFX_ByteString ekey = m_pEncryptDict->GetString(bOwner ? FX_BSTRC("OE") : FX
_BSTRC("UE")); | 334 CFX_ByteString ekey = m_pEncryptDict ? m_pEncryptDict->GetString(bOwner ? FX
_BSTRC("OE") : FX_BSTRC("UE")) : CFX_ByteString(); |
335 if (ekey.GetLength() < 32) { | 335 if (ekey.GetLength() < 32) { |
336 return FALSE; | 336 return FALSE; |
337 } | 337 } |
338 FX_BYTE* aes = FX_Alloc(FX_BYTE, 2048); | 338 FX_BYTE* aes = FX_Alloc(FX_BYTE, 2048); |
339 CRYPT_AESSetKey(aes, 16, digest, 32, FALSE); | 339 CRYPT_AESSetKey(aes, 16, digest, 32, FALSE); |
340 FX_BYTE iv[16]; | 340 FX_BYTE iv[16]; |
341 FXSYS_memset32(iv, 0, 16); | 341 FXSYS_memset32(iv, 0, 16); |
342 CRYPT_AESSetIV(aes, iv); | 342 CRYPT_AESSetIV(aes, iv); |
343 CRYPT_AESDecrypt(aes, key, ekey, 32); | 343 CRYPT_AESDecrypt(aes, key, ekey, 32); |
344 CRYPT_AESSetKey(aes, 16, key, 32, FALSE); | 344 CRYPT_AESSetKey(aes, 16, key, 32, FALSE); |
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
384 if (bOwner) { | 384 if (bOwner) { |
385 return CheckOwnerPassword(password, size, key, key_len); | 385 return CheckOwnerPassword(password, size, key, key_len); |
386 } | 386 } |
387 return CheckUserPassword(password, size, FALSE, key, key_len) || CheckUserPa
ssword(password, size, TRUE, key, key_len); | 387 return CheckUserPassword(password, size, FALSE, key, key_len) || CheckUserPa
ssword(password, size, TRUE, key, key_len); |
388 } | 388 } |
389 FX_BOOL CPDF_StandardSecurityHandler::CheckUserPassword(FX_LPCBYTE password, FX_
DWORD pass_size, | 389 FX_BOOL CPDF_StandardSecurityHandler::CheckUserPassword(FX_LPCBYTE password, FX_
DWORD pass_size, |
390 FX_BOOL bIgnoreEncryptMeta, FX_LPBYTE key, FX_INT32 key_len) | 390 FX_BOOL bIgnoreEncryptMeta, FX_LPBYTE key, FX_INT32 key_len) |
391 { | 391 { |
392 CalcEncryptKey(m_pEncryptDict, password, pass_size, key, key_len, bIgnoreEnc
ryptMeta, | 392 CalcEncryptKey(m_pEncryptDict, password, pass_size, key, key_len, bIgnoreEnc
ryptMeta, |
393 m_pParser->GetIDArray()); | 393 m_pParser->GetIDArray()); |
394 CFX_ByteString ukey = m_pEncryptDict->GetString(FX_BSTRC("U")); | 394 CFX_ByteString ukey = m_pEncryptDict ? m_pEncryptDict->GetString(FX_BSTRC("U
")) : CFX_ByteString(); |
395 if (ukey.GetLength() < 16) { | 395 if (ukey.GetLength() < 16) { |
396 return FALSE; | 396 return FALSE; |
397 } | 397 } |
398 FX_BYTE ukeybuf[32]; | 398 FX_BYTE ukeybuf[32]; |
399 if (m_Revision == 2) { | 399 if (m_Revision == 2) { |
400 FXSYS_memcpy32(ukeybuf, defpasscode, 32); | 400 FXSYS_memcpy32(ukeybuf, defpasscode, 32); |
401 CRYPT_ArcFourCryptBlock(ukeybuf, 32, key, key_len); | 401 CRYPT_ArcFourCryptBlock(ukeybuf, 32, key, key_len); |
402 } else { | 402 } else { |
403 FX_BYTE test[32], tmpkey[32]; | 403 FX_BYTE test[32], tmpkey[32]; |
404 FX_DWORD copy_len = sizeof(test); | 404 FX_DWORD copy_len = sizeof(test); |
(...skipping 543 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
948 m_pAESContext = NULL; | 948 m_pAESContext = NULL; |
949 m_Cipher = FXCIPHER_NONE; | 949 m_Cipher = FXCIPHER_NONE; |
950 m_KeyLen = 0; | 950 m_KeyLen = 0; |
951 } | 951 } |
952 CPDF_StandardCryptoHandler::~CPDF_StandardCryptoHandler() | 952 CPDF_StandardCryptoHandler::~CPDF_StandardCryptoHandler() |
953 { | 953 { |
954 if (m_pAESContext) { | 954 if (m_pAESContext) { |
955 FX_Free(m_pAESContext); | 955 FX_Free(m_pAESContext); |
956 } | 956 } |
957 } | 957 } |
OLD | NEW |