Alex Gaynor | 8912d3a | 2013-11-02 14:04:19 -0700 | [diff] [blame] | 1 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 2 | # you may not use this file except in compliance with the License. |
| 3 | # You may obtain a copy of the License at |
| 4 | # |
| 5 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 6 | # |
| 7 | # Unless required by applicable law or agreed to in writing, software |
| 8 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 9 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or |
| 10 | # implied. |
| 11 | # See the License for the specific language governing permissions and |
| 12 | # limitations under the License. |
| 13 | |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 14 | import base64 |
Alex Gaynor | 69ab59e | 2013-10-31 15:26:43 -0700 | [diff] [blame] | 15 | import binascii |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 16 | import os |
| 17 | import struct |
| 18 | import time |
| 19 | |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 20 | import cffi |
| 21 | |
Alex Gaynor | bbeba71 | 2013-10-30 14:29:58 -0700 | [diff] [blame] | 22 | import six |
| 23 | |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 24 | from cryptography.hazmat.primitives import padding, hashes |
| 25 | from cryptography.hazmat.primitives.hmac import HMAC |
Alex Gaynor | dcc3f66 | 2013-11-07 14:28:16 -0800 | [diff] [blame] | 26 | from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 27 | |
| 28 | |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 29 | class InvalidToken(Exception): |
| 30 | pass |
| 31 | |
| 32 | |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 33 | _ffi = cffi.FFI() |
| 34 | _ffi.cdef(""" |
| 35 | bool Cryptography_constant_time_compare(uint8_t *, size_t, uint8_t *, size_t); |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 36 | """) |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 37 | _lib = _ffi.verify(""" |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 38 | #include <stdbool.h> |
| 39 | |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 40 | bool Cryptography_constant_time_compare(uint8_t *a, size_t len_a, uint8_t *b, |
| 41 | size_t len_b) { |
Alex Gaynor | 38db214 | 2013-10-31 16:25:25 -0700 | [diff] [blame] | 42 | size_t i = 0; |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 43 | uint8_t mismatch = 0; |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 44 | if (len_a != len_b) { |
| 45 | return false; |
| 46 | } |
Alex Gaynor | 38db214 | 2013-10-31 16:25:25 -0700 | [diff] [blame] | 47 | for (i = 0; i < len_a; i++) { |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 48 | mismatch |= a[i] ^ b[i]; |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 49 | } |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 50 | |
| 51 | /* Make sure any bits set are copied to the lowest bit */ |
| 52 | mismatch |= mismatch >> 4; |
| 53 | mismatch |= mismatch >> 2; |
| 54 | mismatch |= mismatch >> 1; |
| 55 | /* Now check the low bit to see if it's set */ |
| 56 | return (mismatch & 1) == 0; |
Alex Gaynor | 3d5041c | 2013-10-31 15:55:33 -0700 | [diff] [blame] | 57 | } |
| 58 | """) |
| 59 | |
Alex Gaynor | 2c58bbe | 2013-10-31 16:31:38 -0700 | [diff] [blame] | 60 | |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 61 | class Fernet(object): |
Alex Gaynor | 105e813 | 2013-11-07 14:25:42 -0800 | [diff] [blame] | 62 | def __init__(self, key, backend=None): |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 63 | super(Fernet, self).__init__() |
Alex Gaynor | 898fe0f | 2013-11-20 16:38:32 -0800 | [diff] [blame] | 64 | key = base64.urlsafe_b64decode(key) |
Alex Gaynor | cd47c4a | 2013-10-31 09:46:27 -0700 | [diff] [blame] | 65 | assert len(key) == 32 |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 66 | self.signing_key = key[:16] |
| 67 | self.encryption_key = key[16:] |
Alex Gaynor | 105e813 | 2013-11-07 14:25:42 -0800 | [diff] [blame] | 68 | self.backend = backend |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 69 | |
| 70 | def encrypt(self, data): |
| 71 | current_time = int(time.time()) |
| 72 | iv = os.urandom(16) |
| 73 | return self._encrypt_from_parts(data, current_time, iv) |
| 74 | |
| 75 | def _encrypt_from_parts(self, data, current_time, iv): |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 76 | if isinstance(data, six.text_type): |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 77 | raise TypeError( |
| 78 | "Unicode-objects must be encoded before encryption" |
| 79 | ) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 80 | |
Alex Gaynor | dcc3f66 | 2013-11-07 14:28:16 -0800 | [diff] [blame] | 81 | padder = padding.PKCS7(algorithms.AES.block_size).padder() |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 82 | padded_data = padder.update(data) + padder.finalize() |
Alex Gaynor | dcc3f66 | 2013-11-07 14:28:16 -0800 | [diff] [blame] | 83 | encryptor = Cipher( |
| 84 | algorithms.AES(self.encryption_key), modes.CBC(iv), self.backend |
Alex Gaynor | de36e90 | 2013-10-31 10:10:44 -0700 | [diff] [blame] | 85 | ).encryptor() |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 86 | ciphertext = encryptor.update(padded_data) + encryptor.finalize() |
| 87 | |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame^] | 88 | basic_parts = ( |
| 89 | b"\x80" + struct.pack(">Q", current_time) + iv + ciphertext |
Alex Gaynor | 02fad00 | 2013-10-30 14:16:13 -0700 | [diff] [blame] | 90 | ) |
Alex Gaynor | bbeba71 | 2013-10-30 14:29:58 -0700 | [diff] [blame] | 91 | |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame^] | 92 | h = HMAC(self.signing_key, hashes.SHA256(), self.backend) |
| 93 | h.update(basic_parts) |
| 94 | hmac = h.finalize() |
| 95 | return base64.urlsafe_b64encode(basic_parts + hmac) |
| 96 | |
| 97 | def decrypt(self, data, ttl=None): |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 98 | if isinstance(data, six.text_type): |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 99 | raise TypeError( |
| 100 | "Unicode-objects must be encoded before decryption" |
| 101 | ) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 102 | |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame^] | 103 | current_time = int(time.time()) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 104 | |
| 105 | try: |
| 106 | data = base64.urlsafe_b64decode(data) |
Alex Gaynor | 69ab59e | 2013-10-31 15:26:43 -0700 | [diff] [blame] | 107 | except (TypeError, binascii.Error): |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 108 | raise InvalidToken |
| 109 | |
Alex Gaynor | 5c5342e | 2013-10-31 11:25:54 -0700 | [diff] [blame] | 110 | assert six.indexbytes(data, 0) == 0x80 |
Alex Gaynor | f593848 | 2013-10-30 14:34:55 -0700 | [diff] [blame] | 111 | timestamp = data[1:9] |
| 112 | iv = data[9:25] |
| 113 | ciphertext = data[25:-32] |
Alex Gaynor | bbeba71 | 2013-10-30 14:29:58 -0700 | [diff] [blame] | 114 | if ttl is not None: |
Alex Gaynor | 5e87dfd | 2013-10-31 09:46:03 -0700 | [diff] [blame] | 115 | if struct.unpack(">Q", timestamp)[0] + ttl < current_time: |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 116 | raise InvalidToken |
Alex Gaynor | 105e813 | 2013-11-07 14:25:42 -0800 | [diff] [blame] | 117 | h = HMAC(self.signing_key, hashes.SHA256(), self.backend) |
Alex Gaynor | bbeba71 | 2013-10-30 14:29:58 -0700 | [diff] [blame] | 118 | h.update(data[:-32]) |
Alex Gaynor | fa7081a | 2013-11-01 16:38:25 -0700 | [diff] [blame] | 119 | hmac = h.finalize() |
Alex Gaynor | 286433d | 2013-11-18 10:15:20 -0800 | [diff] [blame] | 120 | valid = _lib.Cryptography_constant_time_compare( |
| 121 | hmac, len(hmac), data[-32:], 32 |
| 122 | ) |
| 123 | if not valid: |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 124 | raise InvalidToken |
| 125 | |
Alex Gaynor | dcc3f66 | 2013-11-07 14:28:16 -0800 | [diff] [blame] | 126 | decryptor = Cipher( |
| 127 | algorithms.AES(self.encryption_key), modes.CBC(iv), self.backend |
Alex Gaynor | de36e90 | 2013-10-31 10:10:44 -0700 | [diff] [blame] | 128 | ).decryptor() |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 129 | plaintext_padded = decryptor.update(ciphertext) + decryptor.finalize() |
Alex Gaynor | dcc3f66 | 2013-11-07 14:28:16 -0800 | [diff] [blame] | 130 | unpadder = padding.PKCS7(algorithms.AES.block_size).unpadder() |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 131 | |
| 132 | unpadded = unpadder.update(plaintext_padded) |
| 133 | try: |
| 134 | unpadded += unpadder.finalize() |
| 135 | except ValueError: |
| 136 | raise InvalidToken |
| 137 | return unpadded |