summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCaolán McNamara <caolanm@redhat.com>2018-01-26 10:47:24 +0000
committerMichael Stahl <mstahl@redhat.com>2018-01-29 13:06:33 +0100
commitb5914ba44f2fff9f282b6a5cbe21cbebf19e45b2 (patch)
tree84d8b6983bd62b7206d86b945c0ef205472b67f1
parent14b227e3707f041f31446d7eead0884ff8326a62 (diff)
Resolves: tdf#114221 generate both std97 and cryptoapi keys from password..
when we open a cryptoapi encrypted binary msoffice document. That way when we save as the same format, and try to reuse the generated keys for encryption, we have matching std97 encryption keys available because we always export using that scheme. Change-Id: I25f24a01d102242615768255ce888acb08ef6447 Reviewed-on: https://gerrit.libreoffice.org/48712 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Michael Stahl <mstahl@redhat.com>
-rw-r--r--filter/source/msfilter/mscodec.cxx25
-rw-r--r--include/filter/msfilter/mscodec.hxx8
2 files changed, 25 insertions, 8 deletions
diff --git a/filter/source/msfilter/mscodec.cxx b/filter/source/msfilter/mscodec.cxx
index 02a1a1b444d1..5d24a0fa611a 100644
--- a/filter/source/msfilter/mscodec.cxx
+++ b/filter/source/msfilter/mscodec.cxx
@@ -245,8 +245,9 @@ void MSCodec_Xor95::Skip( std::size_t nBytes )
mnOffset = (mnOffset + nBytes) & 0x0F;
}
-MSCodec97::MSCodec97(size_t nHashLen)
- : m_nHashLen(nHashLen)
+MSCodec97::MSCodec97(size_t nHashLen, const OUString& rEncKeyName)
+ : m_sEncKeyName(rEncKeyName)
+ , m_nHashLen(nHashLen)
, m_hCipher(rtl_cipher_create(rtl_Cipher_AlgorithmARCFOUR, rtl_Cipher_ModeStream))
, m_aDocId(16, 0)
, m_aDigestValue(nHashLen, 0)
@@ -255,14 +256,14 @@ MSCodec97::MSCodec97(size_t nHashLen)
}
MSCodec_Std97::MSCodec_Std97()
- : MSCodec97(RTL_DIGEST_LENGTH_MD5)
+ : MSCodec97(RTL_DIGEST_LENGTH_MD5, "STD97EncryptionKey")
{
m_hDigest = rtl_digest_create(rtl_Digest_AlgorithmMD5);
assert(m_hDigest != nullptr);
}
MSCodec_CryptoAPI::MSCodec_CryptoAPI()
- : MSCodec97(RTL_DIGEST_LENGTH_SHA1)
+ : MSCodec97(RTL_DIGEST_LENGTH_SHA1, "CryptoAPIEncryptionKey")
{
}
@@ -300,7 +301,7 @@ bool MSCodec97::InitCodec( const uno::Sequence< beans::NamedValue >& aData )
bool bResult = false;
::comphelper::SequenceAsHashMap aHashData( aData );
- uno::Sequence< sal_Int8 > aKey = aHashData.getUnpackedValueOrDefault("STD97EncryptionKey", uno::Sequence< sal_Int8 >() );
+ uno::Sequence<sal_Int8> aKey = aHashData.getUnpackedValueOrDefault(m_sEncKeyName, uno::Sequence<sal_Int8>());
const size_t nKeyLen = aKey.getLength();
if (nKeyLen == m_nHashLen)
{
@@ -328,7 +329,7 @@ uno::Sequence< beans::NamedValue > MSCodec97::GetEncryptionData()
{
::comphelper::SequenceAsHashMap aHashData;
assert(m_aDigestValue.size() == m_nHashLen);
- aHashData[ OUString( "STD97EncryptionKey" ) ] <<= uno::Sequence< sal_Int8 >( reinterpret_cast<sal_Int8*>(m_aDigestValue.data()), m_nHashLen );
+ aHashData[m_sEncKeyName] <<= uno::Sequence<sal_Int8>(reinterpret_cast<sal_Int8*>(m_aDigestValue.data()), m_nHashLen);
aHashData[ OUString( "STD97UniqueID" ) ] <<= uno::Sequence< sal_Int8 >( reinterpret_cast<sal_Int8*>(m_aDocId.data()), m_aDocId.size() );
return aHashData.getAsConstNamedValueList();
@@ -384,6 +385,9 @@ void MSCodec_CryptoAPI::InitKey (
(void)memcpy(m_aDocId.data(), pDocId, 16);
lcl_PrintDigest(m_aDocId.data(), "DocId value");
+
+ //generate the old format key while we have the required data
+ m_aStd97Key = ::comphelper::DocPasswordHelper::GenerateStd97Key(pPassData, pDocId);
}
bool MSCodec97::VerifyKey(const sal_uInt8* pSaltData, const sal_uInt8* pSaltDigest)
@@ -483,6 +487,15 @@ bool MSCodec_CryptoAPI::InitCipher(sal_uInt32 nCounter)
return (result == rtl_Cipher_E_None);
}
+uno::Sequence<beans::NamedValue> MSCodec_CryptoAPI::GetEncryptionData()
+{
+ ::comphelper::SequenceAsHashMap aHashData(MSCodec97::GetEncryptionData());
+ //add in the old encryption key as well as our new key so saving using the
+ //old crypto scheme can be done without reprompt for the password
+ aHashData[OUString("STD97EncryptionKey")] <<= m_aStd97Key;
+ return aHashData.getAsConstNamedValueList();
+}
+
void MSCodec_Std97::CreateSaltDigest( const sal_uInt8 nSaltData[16], sal_uInt8 nSaltDigest[16] )
{
#if DEBUG_MSO_ENCRYPTION_STD97
diff --git a/include/filter/msfilter/mscodec.hxx b/include/filter/msfilter/mscodec.hxx
index b0ab818449ae..aa38f6e9fc00 100644
--- a/include/filter/msfilter/mscodec.hxx
+++ b/include/filter/msfilter/mscodec.hxx
@@ -178,7 +178,7 @@ public:
class MSFILTER_DLLPUBLIC MSCodec97
{
public:
- MSCodec97(size_t nHashLen);
+ MSCodec97(size_t nHashLen, const OUString& rEncKeyName);
virtual ~MSCodec97();
/** Initializes the algorithm with the encryption data.
@@ -195,7 +195,7 @@ public:
The sequence contains the necessary data to initialize
the codec.
*/
- css::uno::Sequence< css::beans::NamedValue > GetEncryptionData();
+ virtual css::uno::Sequence<css::beans::NamedValue> GetEncryptionData();
/** Initializes the algorithm with the specified password and document ID.
@@ -317,6 +317,7 @@ private:
MSCodec97& operator=(const MSCodec97&) = delete;
protected:
+ OUString m_sEncKeyName;
size_t m_nHashLen;
rtlCipher m_hCipher;
std::vector<sal_uInt8> m_aDocId;
@@ -396,6 +397,8 @@ private:
class MSFILTER_DLLPUBLIC MSCodec_CryptoAPI : public MSCodec97
{
+private:
+ css::uno::Sequence<sal_Int8> m_aStd97Key;
public:
MSCodec_CryptoAPI();
@@ -403,6 +406,7 @@ public:
const sal_uInt8 pDocId[16]) override;
virtual bool InitCipher(sal_uInt32 nCounter) override;
virtual void GetDigestFromSalt(const sal_uInt8* pSaltData, sal_uInt8* pDigest) override;
+ virtual css::uno::Sequence<css::beans::NamedValue> GetEncryptionData() override;
};
const sal_uInt32 ENCRYPTINFO_CRYPTOAPI = 0x00000004;