source: trunk/CrypPlugins/AES/AES.cs @ 786

Last change on this file since 786 was 786, checked in by kopal, 12 years ago
  • AES now works with the KeySearcher
  • Added sample for key searching with AES
  • Some Bug fixes on DES with KeySearcher
File size: 35.7 KB
Line 
1/*                              Apache License
2                           Version 2.0, January 2004
3                        http://www.apache.org/licenses/
4
5   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
6
7   1. Definitions.
8
9      "License" shall mean the terms and conditions for use, reproduction,
10      and distribution as defined by Sections 1 through 9 of this document.
11
12      "Licensor" shall mean the copyright owner or entity authorized by
13      the copyright owner that is granting the License.
14
15      "Legal Entity" shall mean the union of the acting entity and all
16      other entities that control, are controlled by, or are under common
17      control with that entity. For the purposes of this definition,
18      "control" means (i) the power, direct or indirect, to cause the
19      direction or management of such entity, whether by contract or
20      otherwise, or (ii) ownership of fifty percent (50%) or more of the
21      outstanding shares, or (iii) beneficial ownership of such entity.
22
23      "You" (or "Your") shall mean an individual or Legal Entity
24      exercising permissions granted by this License.
25
26      "Source" form shall mean the preferred form for making modifications,
27      including but not limited to software source code, documentation
28      source, and configuration files.
29
30      "Object" form shall mean any form resulting from mechanical
31      transformation or translation of a Source form, including but
32      not limited to compiled object code, generated documentation,
33      and conversions to other media types.
34
35      "Work" shall mean the work of authorship, whether in Source or
36      Object form, made available under the License, as indicated by a
37      copyright notice that is included in or attached to the work
38      (an example is provided in the Appendix below).
39
40      "Derivative Works" shall mean any work, whether in Source or Object
41      form, that is based on (or derived from) the Work and for which the
42      editorial revisions, annotations, elaborations, or other modifications
43      represent, as a whole, an original work of authorship. For the purposes
44      of this License, Derivative Works shall not include works that remain
45      separable from, or merely link (or bind by name) to the interfaces of,
46      the Work and Derivative Works thereof.
47
48      "Contribution" shall mean any work of authorship, including
49      the original version of the Work and any modifications or additions
50      to that Work or Derivative Works thereof, that is intentionally
51      submitted to Licensor for inclusion in the Work by the copyright owner
52      or by an individual or Legal Entity authorized to submit on behalf of
53      the copyright owner. For the purposes of this definition, "submitted"
54      means any form of electronic, verbal, or written communication sent
55      to the Licensor or its representatives, including but not limited to
56      communication on electronic mailing lists, source code control systems,
57      and issue tracking systems that are managed by, or on behalf of, the
58      Licensor for the purpose of discussing and improving the Work, but
59      excluding communication that is conspicuously marked or otherwise
60      designated in writing by the copyright owner as "Not a Contribution."
61
62      "Contributor" shall mean Licensor and any individual or Legal Entity
63      on behalf of whom a Contribution has been received by Licensor and
64      subsequently incorporated within the Work.
65
66   2. Grant of Copyright License. Subject to the terms and conditions of
67      this License, each Contributor hereby grants to You a perpetual,
68      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
69      copyright license to reproduce, prepare Derivative Works of,
70      publicly display, publicly perform, sublicense, and distribute the
71      Work and such Derivative Works in Source or Object form.
72
73   3. Grant of Patent License. Subject to the terms and conditions of
74      this License, each Contributor hereby grants to You a perpetual,
75      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
76      (except as stated in this section) patent license to make, have made,
77      use, offer to sell, sell, import, and otherwise transfer the Work,
78      where such license applies only to those patent claims licensable
79      by such Contributor that are necessarily infringed by their
80      Contribution(s) alone or by combination of their Contribution(s)
81      with the Work to which such Contribution(s) was submitted. If You
82      institute patent litigation against any entity (including a
83      cross-claim or counterclaim in a lawsuit) alleging that the Work
84      or a Contribution incorporated within the Work constitutes direct
85      or contributory patent infringement, then any patent licenses
86      granted to You under this License for that Work shall terminate
87      as of the date such litigation is filed.
88
89   4. Redistribution. You may reproduce and distribute copies of the
90      Work or Derivative Works thereof in any medium, with or without
91      modifications, and in Source or Object form, provided that You
92      meet the following conditions:
93
94      (a) You must give any other recipients of the Work or
95          Derivative Works a copy of this License; and
96
97      (b) You must cause any modified files to carry prominent notices
98          stating that You changed the files; and
99
100      (c) You must retain, in the Source form of any Derivative Works
101          that You distribute, all copyright, patent, trademark, and
102          attribution notices from the Source form of the Work,
103          excluding those notices that do not pertain to any part of
104          the Derivative Works; and
105
106      (d) If the Work includes a "NOTICE" text file as part of its
107          distribution, then any Derivative Works that You distribute must
108          include a readable copy of the attribution notices contained
109          within such NOTICE file, excluding those notices that do not
110          pertain to any part of the Derivative Works, in at least one
111          of the following places: within a NOTICE text file distributed
112          as part of the Derivative Works; within the Source form or
113          documentation, if provided along with the Derivative Works; or,
114          within a display generated by the Derivative Works, if and
115          wherever such third-party notices normally appear. The contents
116          of the NOTICE file are for informational purposes only and
117          do not modify the License. You may add Your own attribution
118          notices within Derivative Works that You distribute, alongside
119          or as an addendum to the NOTICE text from the Work, provided
120          that such additional attribution notices cannot be construed
121          as modifying the License.
122
123      You may add Your own copyright statement to Your modifications and
124      may provide additional or different license terms and conditions
125      for use, reproduction, or distribution of Your modifications, or
126      for any such Derivative Works as a whole, provided Your use,
127      reproduction, and distribution of the Work otherwise complies with
128      the conditions stated in this License.
129
130   5. Submission of Contributions. Unless You explicitly state otherwise,
131      any Contribution intentionally submitted for inclusion in the Work
132      by You to the Licensor shall be under the terms and conditions of
133      this License, without any additional terms or conditions.
134      Notwithstanding the above, nothing herein shall supersede or modify
135      the terms of any separate license agreement you may have executed
136      with Licensor regarding such Contributions.
137
138   6. Trademarks. This License does not grant permission to use the trade
139      names, trademarks, service marks, or product names of the Licensor,
140      except as required for reasonable and customary use in describing the
141      origin of the Work and reproducing the content of the NOTICE file.
142
143   7. Disclaimer of Warranty. Unless required by applicable law or
144      agreed to in writing, Licensor provides the Work (and each
145      Contributor provides its Contributions) on an "AS IS" BASIS,
146      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
147      implied, including, without limitation, any warranties or conditions
148      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
149      PARTICULAR PURPOSE. You are solely responsible for determining the
150      appropriateness of using or redistributing the Work and assume any
151      risks associated with Your exercise of permissions under this License.
152
153   8. Limitation of Liability. In no event and under no legal theory,
154      whether in tort (including negligence), contract, or otherwise,
155      unless required by applicable law (such as deliberate and grossly
156      negligent acts) or agreed to in writing, shall any Contributor be
157      liable to You for damages, including any direct, indirect, special,
158      incidental, or consequential damages of any character arising as a
159      result of this License or out of the use or inability to use the
160      Work (including but not limited to damages for loss of goodwill,
161      work stoppage, computer failure or malfunction, or any and all
162      other commercial damages or losses), even if such Contributor
163      has been advised of the possibility of such damages.
164
165   9. Accepting Warranty or Additional Liability. While redistributing
166      the Work or Derivative Works thereof, You may choose to offer,
167      and charge a fee for, acceptance of support, warranty, indemnity,
168      or other liability obligations and/or rights consistent with this
169      License. However, in accepting such obligations, You may act only
170      on Your own behalf and on Your sole responsibility, not on behalf
171      of any other Contributor, and only if You agree to indemnify,
172      defend, and hold each Contributor harmless for any liability
173      incurred by, or claims asserted against, such Contributor by reason
174      of your accepting any such warranty or additional liability.
175
176   END OF TERMS AND CONDITIONS
177
178   APPENDIX: How to apply the Apache License to your work.
179
180      To apply the Apache License to your work, attach the following
181      boilerplate notice, with the fields enclosed by brackets "[]"
182      replaced with your own identifying information. (Don't include
183      the brackets!)  The text should be enclosed in the appropriate
184      comment syntax for the file format. We also recommend that a
185      file or class name and description of purpose be included on the
186      same "printed page" as the copyright notice for easier
187      identification within third-party archives.
188
189   Copyright [2008] [Dr. Arno Wacker, University of Duisburg-Essen]
190
191   Licensed under the Apache License, Version 2.0 (the "License");
192   you may not use this file except in compliance with the License.
193   You may obtain a copy of the License at
194
195       http://www.apache.org/licenses/LICENSE-2.0
196
197   Unless required by applicable law or agreed to in writing, software
198   distributed under the License is distributed on an "AS IS" BASIS,
199   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
200   See the License for the specific language governing permissions and
201   limitations under the License.
202*/
203
204using System;
205using System.Collections.Generic;
206using System.Linq;
207using System.Text;
208using System.IO;
209using System.Security.Cryptography;
210using Cryptool.PluginBase;
211using System.ComponentModel;
212using Cryptool.PluginBase.Cryptography;
213using Cryptool.PluginBase.IO;
214using System.Windows.Controls;
215using System.Runtime.CompilerServices;
216using Cryptool.PluginBase.Miscellaneous;
217using System.Runtime.Remoting.Contexts;
218using Cryptool.PluginBase.Control;
219using System.Reflection;
220
221namespace Cryptool.Plugins.Cryptography.Encryption
222{
223    [Author("Dr. Arno Wacker", "arno.wacker@cryptool.org", "Uni Duisburg", "http://www.uni-duisburg-essen.de")]
224    [PluginInfo(false, "AES", "Advanced Encryption Standard (Rijndael)", "AES/DetailedDescription/Description.xaml", "AES/Images/AES.png", "AES/Images/encrypt.png", "AES/Images/decrypt.png", "AES/Images/Rijndael.png")]
225    [EncryptionType(EncryptionType.SymmetricBlock)]
226    public class AES : ContextBoundObject, IEncryption
227    {
228        #region Private variables
229        private AESSettings settings;
230        private CryptoolStream inputStream;
231        private CryptoolStream outputStream;
232        private byte[] inputKey;
233        private byte[] inputIV;
234        private CryptoStream p_crypto_stream;
235        private bool stop = false;
236        private List<CryptoolStream> listCryptoolStreamsOut = new List<CryptoolStream>();
237        #endregion
238
239        public AES()
240        {
241            this.settings = new AESSettings();
242            this.settings.OnPluginStatusChanged += settings_OnPluginStatusChanged;
243        }
244
245        void settings_OnPluginStatusChanged(IPlugin sender, StatusEventArgs args)
246        {
247          if (OnPluginStatusChanged != null) OnPluginStatusChanged(this, args);
248        }
249
250        public ISettings Settings
251        {
252            get { return this.settings; }
253            set { this.settings = (AESSettings)value; }
254        }
255
256        [PropertyInfo(Direction.InputData, "Input", "Data to be encrypted or decrypted", "", true, false, DisplayLevel.Beginner, QuickWatchFormat.Hex, null)]
257        public CryptoolStream InputStream
258        {
259            get 
260            {
261              if (inputStream != null)
262              {
263                CryptoolStream cs = new CryptoolStream();
264                cs.OpenRead(inputStream.FileName);
265                listCryptoolStreamsOut.Add(cs);
266                return cs;
267              }
268              else return null;
269            }
270            set 
271            { 
272              this.inputStream = value;
273              if (value != null) listCryptoolStreamsOut.Add(value);
274              OnPropertyChanged("InputStream");
275            }
276        }
277
278        [PropertyInfo(Direction.InputData, "Key", "The provided key should be 16, 24 or 32 bytes, dependig on the settings. Too short/long keys will be extended/truncated!", "", true, false, DisplayLevel.Beginner, QuickWatchFormat.Hex, null)]
279        public byte[] InputKey
280        {
281            get { return this.inputKey; }
282            set 
283            { 
284              this.inputKey = value;
285              OnPropertyChanged("InputKey");
286            }
287        }
288
289        [PropertyInfo(Direction.InputData, "IV", "The initialisation vector (IV) which is used in chaining modes. It always must be the same as the blocksize.", "", false, false, DisplayLevel.Professional, QuickWatchFormat.Hex, null)]
290        public byte[] InputIV
291        {
292            get { return this.inputIV; }
293            set 
294            { 
295              this.inputIV = value;
296              OnPropertyChanged("InputIV");
297            }
298        }
299
300        [PropertyInfo(Direction.OutputData, "Output stream", "Encrypted or decrypted output data", "", true, false, DisplayLevel.Beginner, QuickWatchFormat.Hex, null)]
301        public CryptoolStream OutputStream
302        {
303            get 
304            {
305              if (this.outputStream != null)
306              {
307                CryptoolStream cs = new CryptoolStream();
308                listCryptoolStreamsOut.Add(cs);
309                cs.OpenRead(this.outputStream.FileName);
310                return cs;
311              }
312              return null;
313            }
314            set 
315            {
316              outputStream = value;
317              if (value != null) listCryptoolStreamsOut.Add(value);
318              OnPropertyChanged("OutputStream");
319            }
320        }
321
322        private void ConfigureAlg(SymmetricAlgorithm alg)
323        {
324            // first set all paramter, then assign input values!
325            switch (settings.Mode)
326            { //0="ECB"=default, 1="CBC", 2="CFB", 3="OFB"
327                case 1: alg.Mode = CipherMode.CBC; break;
328                case 2: alg.Mode = CipherMode.CFB; break;
329                // case 3: alg.Mode = CipherMode.OFB; break;
330                default: alg.Mode = CipherMode.ECB; break;
331            }
332
333            switch (settings.Padding)
334            { //0="Zeros"=default, 1="None", 2="PKCS7" , 3="ANSIX923", 4="ISO10126"
335                case 1: alg.Padding = PaddingMode.None; break;
336                case 2: alg.Padding = PaddingMode.PKCS7; break;
337                case 3: alg.Padding = PaddingMode.ANSIX923; break;
338                case 4: alg.Padding = PaddingMode.ISO10126; break;
339                default: alg.Padding = PaddingMode.Zeros; break;
340            }
341            if (settings.CryptoAlgorithm == 1)
342            {
343                switch (settings.Blocksize)
344                {
345                    case 1: alg.BlockSize = 192; break;
346                    case 2: alg.BlockSize = 256; break;
347                    default:
348                        alg.BlockSize = 128;
349                        break;
350                }
351            }
352
353            //check for a valid key
354            if (this.inputKey == null)
355            {               
356                //create a trivial key
357                inputKey = new byte[16];
358                // write a warning to the ouside word
359                GuiLogMessage("WARNING - No key provided. Using 0x000..00!", NotificationLevel.Warning);
360            }
361
362            int keySizeInBytes = (16 + settings.Keysize * 8);
363
364            //prepare a long enough key
365            byte[] key = new byte[keySizeInBytes];
366
367            // copy the input key into the temporary key array
368            Array.Copy(inputKey, key, Math.Min(inputKey.Length, key.Length));
369
370            // Note: the SymmetricAlgorithm.Key setter clones the passed byte[] array and keeps his own copy
371            alg.Key = key;
372
373            if (inputKey.Length > keySizeInBytes)
374            {
375                GuiLogMessage("Overlength (" + inputKey.Length * 8 + " Bits) key provided. Removing trailing bytes to fit the desired key length of " + (keySizeInBytes * 8) + " Bits: " + bytesToHexString(key), NotificationLevel.Warning);
376            }
377
378            if (inputKey.Length < keySizeInBytes)
379            {
380                GuiLogMessage("Short (" + inputKey.Length * 8 + " Bits) key provided. Adding zero bytes to fill up to the desired key length of " + (keySizeInBytes * 8) + " Bits: " + bytesToHexString(key), NotificationLevel.Warning);
381            }
382
383            //check for a valid IV
384            if (this.inputIV == null)
385            {
386                //create a trivial key
387                inputIV = new byte[alg.BlockSize / 8];
388                GuiLogMessage("WARNING - No IV provided. Using 0x000..00!", NotificationLevel.Warning);
389            }
390            alg.IV = this.inputIV;
391        }
392
393        private string bytesToHexString(byte[] array)
394        {
395            StringBuilder sb = new StringBuilder();
396            foreach (byte b in array)
397            {
398                sb.Append(b.ToString("X2"));
399            }
400            return sb.ToString();
401        }
402
403        private void checkForInputStream()
404        {
405            if (settings.Action == 0 && (inputStream == null || (inputStream != null && inputStream.Length == 0)))
406            {
407                //create some input
408                String dummystring = "Dummy string - no input provided - \"Hello AES World\" - dummy string - no input provided!";
409                this.inputStream = new CryptoolStream();
410                this.inputStream.OpenRead(this.GetPluginInfoAttribute().Caption, Encoding.Default.GetBytes(dummystring.ToCharArray()));
411                // write a warning to the ouside word
412                GuiLogMessage("WARNING - No input provided. Using dummy data. (" + dummystring + ")", NotificationLevel.Warning);
413            }
414        }
415
416        public void Execute()
417        {
418            try
419            {
420                //copy inputStream for Slave
421                if (controlSlave is object && InputStream is object && InputIV is object)
422                {
423                    CryptoolStream cs = new CryptoolStream();
424                    cs.OpenRead(inputStream.FileName);
425                    ((AESControl)controlSlave).InputStream = cs;
426                }
427
428                process(settings.Action);
429
430                //Work with slave
431                if (controlSlave is object && InputStream is object && InputIV is object)
432                {
433                    ((AESControl)controlSlave).reset();
434                    ((AESControl)controlSlave).onStatusChanged();
435
436                }
437            }
438            finally
439            {
440                if (controlSlave is object && ((AESControl)controlSlave).InputStream is object)
441                    ((AESControl)controlSlave).closeStreams();
442                //InputStream = null;
443                //OutputStream = null;
444            }
445        }
446
447        public bool isStopped()
448        {
449
450            return this.stop;
451        }
452
453        private void process(int action)
454        {
455            //Encrypt/Decrypt Stream
456          try
457          {
458            checkForInputStream();
459            if (inputStream == null || inputStream.Length == 0)
460            {
461              GuiLogMessage("No input given. Not using dummy data in decrypt mode. Aborting now.", NotificationLevel.Error);
462              return;
463            }
464
465            if (this.inputStream.CanSeek) this.inputStream.Position = 0;
466            SymmetricAlgorithm p_alg = null;
467            if (settings.CryptoAlgorithm == 1)
468            { p_alg = new RijndaelManaged(); }
469            else
470            { p_alg = new AesCryptoServiceProvider(); }
471
472            ConfigureAlg(p_alg);
473
474            ICryptoTransform p_encryptor = null;
475            switch (action)
476            {
477              case 0:
478                p_encryptor = p_alg.CreateEncryptor();
479                break;
480              case 1:
481                p_encryptor = p_alg.CreateDecryptor();
482                break;
483            }
484
485            outputStream = new CryptoolStream();
486            listCryptoolStreamsOut.Add(outputStream);
487            outputStream.OpenWrite(this.GetPluginInfoAttribute().Caption);
488            p_crypto_stream = new CryptoStream((Stream)inputStream, p_encryptor, CryptoStreamMode.Read);
489            byte[] buffer = new byte[p_alg.BlockSize / 8];
490            int bytesRead;
491            int position = 0;
492            string mode = action == 0 ? "encryption" : "decryption";
493            GuiLogMessage("Starting " + mode + " [Keysize=" + p_alg.KeySize.ToString() + " Bits, Blocksize=" + p_alg.BlockSize.ToString() + " Bits]", NotificationLevel.Info);
494            DateTime startTime = DateTime.Now;
495            while ((bytesRead = p_crypto_stream.Read(buffer, 0, buffer.Length)) > 0 && !stop)
496            {
497              outputStream.Write(buffer, 0, bytesRead);
498
499              if ((int)(inputStream.Position * 100 / inputStream.Length) > position)
500              {
501                position = (int)(inputStream.Position * 100 / inputStream.Length);
502                ProgressChanged(inputStream.Position, inputStream.Length);
503              }
504            }
505
506
507            long outbytes = outputStream.Length;
508            p_crypto_stream.Flush();           
509            // p_crypto_stream.Close();
510            DateTime stopTime = DateTime.Now;
511            TimeSpan duration = stopTime - startTime;
512            // (outputStream as CryptoolStream).FinishWrite();
513
514            if (!stop)
515            {
516                mode = action == 0 ? "Encryption" : "Decryption";
517                GuiLogMessage(mode + " complete! (in: " + inputStream.Length.ToString() + " bytes, out: " + outbytes.ToString() + " bytes)", NotificationLevel.Info);
518                GuiLogMessage("Wrote data to file: " + outputStream.FileName, NotificationLevel.Info);
519                GuiLogMessage("Time used: " + duration.ToString(), NotificationLevel.Debug);
520                outputStream.Close();
521                OnPropertyChanged("OutputStream");
522            }
523            CryptoolStream test = outputStream;
524            if (stop)
525            {
526                outputStream.Close();
527                GuiLogMessage("Aborted!", NotificationLevel.Info);
528            }
529          }
530          catch (CryptographicException cryptographicException)
531          {
532            // TODO: For an unknown reason p_crypto_stream can not be closed after exception.
533            // Trying so makes p_crypto_stream throw the same exception again. So in Dispose
534            // the error messages will be doubled.
535            // As a workaround we set p_crypto_stream to null here.
536            p_crypto_stream = null;
537            GuiLogMessage(cryptographicException.Message, NotificationLevel.Error);
538          }
539          catch (Exception exception)
540          {
541            GuiLogMessage(exception.Message, NotificationLevel.Error);
542          }
543          finally
544          {
545              ProgressChanged(1, 1);
546          }
547        }
548
549        public void Encrypt()
550        {
551            //Encrypt Stream
552            process(0);
553        }
554       
555        public void Decrypt()
556        {
557            //Decrypt Stream
558            process(1);
559        }
560
561        #region IPlugin Member
562
563
564        public System.Windows.Controls.UserControl Presentation
565        {
566          get { return null; }
567        }
568
569        public UserControl QuickWatchPresentation
570        {
571          get { return null; }
572        }
573
574        public void Initialize()
575        {           
576        }
577
578        public void Dispose()
579        {
580          try
581          {
582            stop = false;
583            inputKey = null;
584            inputIV = null;
585            outputStream = null;
586            inputStream = null;
587
588            //if (inputStream != null)
589            //{
590            //  inputStream.Flush();
591            //  inputStream.Close();
592            //  inputStream = null;
593            //}
594            //if (outputStream != null)
595            //{
596            //  outputStream.Flush();
597            //  outputStream.Close();
598            //  outputStream = null;
599            //}
600            foreach (CryptoolStream stream in listCryptoolStreamsOut)
601            {
602              stream.Close();
603            }
604            listCryptoolStreamsOut.Clear();
605
606            if (p_crypto_stream != null)
607            {
608              p_crypto_stream.Flush();
609              p_crypto_stream.Close();
610              p_crypto_stream = null;
611            }
612          }
613          catch (Exception ex)
614          {         
615             GuiLogMessage(ex.Message, NotificationLevel.Error);
616          }
617          this.stop = false;
618        }
619
620        public void Stop()
621        {
622          this.stop = true;
623        }
624
625        public void PostExecution()
626        {
627          Dispose();
628        }
629
630        public void PreExecution()
631        {
632          Dispose();
633        }
634
635        #endregion
636
637        #region INotifyPropertyChanged Members
638
639        public event PropertyChangedEventHandler PropertyChanged;
640
641        public void OnPropertyChanged(string name)
642        {
643          EventsHelper.PropertyChanged(PropertyChanged, this, new PropertyChangedEventArgs(name));
644          //if (PropertyChanged != null)
645          //{
646          //  PropertyChanged(this, new PropertyChangedEventArgs(name));
647          //}
648        }
649
650        #endregion
651
652        #region IPlugin Members
653
654        public event StatusChangedEventHandler OnPluginStatusChanged;       
655
656        public event GuiLogNotificationEventHandler OnGuiLogNotificationOccured;
657        private void GuiLogMessage(string message, NotificationLevel logLevel)
658        {
659          EventsHelper.GuiLogMessage(OnGuiLogNotificationOccured, this, new GuiLogEventArgs(message, this, logLevel));
660        }
661
662        public event PluginProgressChangedEventHandler OnPluginProgressChanged;
663        private void ProgressChanged(double value, double max)
664        {
665          EventsHelper.ProgressChanged(OnPluginProgressChanged, this, new PluginProgressEventArgs(value, max));
666        }
667       
668        public void Pause()
669        {
670         
671        }
672
673        #endregion
674
675        private IControlEncryption controlSlave;
676        [PropertyInfo(Direction.ControlSlave, "AES Slave", "AES Slave", "", DisplayLevel.Experienced)]
677        public IControlEncryption ControlSlave
678        {
679          get 
680          {
681              if (controlSlave == null)
682                  controlSlave = new AESControl(this);
683              return controlSlave; 
684          }
685        }     
686    }
687
688    public class AESControl : IControlEncryption
689    {
690        public event KeyPatternChanged keyPatternChanged;
691        public event IControlStatusChangedEventHandler OnStatusChanged;
692        private AES plugin;
693        private SymmetricAlgorithm aes_algorithm = null;
694        private byte[] input;
695        private Stream inputStream;
696
697        public void reset()
698        {
699            input = null;
700            aes_algorithm = null;
701        }
702
703        public CryptoolStream InputStream{
704            get;set;
705        }
706
707        public AESControl(AES Plugin)
708        {
709            this.plugin = Plugin;
710        }
711
712        #region IControlEncryption Members
713
714        public byte[] Encrypt(byte[] key, int blocksize)
715        {
716            /// not implemented, currently not needed
717            return null;
718        }
719
720        public void closeStreams()
721        {
722            if (inputStream != null)
723                inputStream.Close();
724            if (InputStream != null)
725                InputStream.Close();
726        }
727
728        public byte[] Decrypt(byte[] key, int blocksize)
729        {
730            int size = (int)this.InputStream.Length;
731           
732            if (blocksize < size)
733                size = blocksize;
734           
735            if (!(this.input is object))
736            {
737                input = new byte[size];
738                this.InputStream.Seek(0, 0);
739                for (int i = 0; i < size && i < this.InputStream.Length; i++)
740                    input[i] = (byte)this.InputStream.ReadByte();
741                inputStream = new MemoryStream(input); 
742            }
743            inputStream.Seek(0, 0);
744
745            CryptoStream crypto_stream = null;
746            byte[] output = new byte[blocksize];
747
748            //Decrypt Stream
749            try
750            {
751                if (!(aes_algorithm is object))
752                {
753                    if (((AESSettings)plugin.Settings).CryptoAlgorithm == 1)
754                    { aes_algorithm = new RijndaelManaged(); }
755                    else
756                    { aes_algorithm = new AesCryptoServiceProvider(); }                   
757                }
758               
759                this.ConfigureAlg(aes_algorithm, key);
760               
761                ICryptoTransform p_decryptor;
762                try
763                {
764                    p_decryptor = aes_algorithm.CreateDecryptor();
765                }               
766                catch
767                {
768                    //dirty hack to allow weak keys:
769                    MethodInfo mi = aes_algorithm.GetType().GetMethod("_NewEncryptor", BindingFlags.NonPublic | BindingFlags.Instance);
770                    object[] Par = { aes_algorithm.Key, aes_algorithm.Mode, aes_algorithm.IV, aes_algorithm.FeedbackSize, 0 };
771                    p_decryptor = mi.Invoke(aes_algorithm, Par) as ICryptoTransform;
772                }
773
774                crypto_stream = new CryptoStream((Stream)inputStream, p_decryptor, CryptoStreamMode.Read);
775
776                byte[] buffer = new byte[aes_algorithm.BlockSize / 8];
777                int bytesRead;
778                int position = 0;
779
780                while ((bytesRead = crypto_stream.Read(buffer, 0, buffer.Length)) > 0 && !plugin.isStopped())
781                {
782                    for (int i = 0; i < bytesRead; i++)
783                    {
784                        if (position + i < output.Length)
785                        {
786                            output[position + i] = buffer[i];
787                        }
788                        else
789                        {
790                            break;
791                        }
792                    }                   
793                    position += bytesRead;
794                }
795
796            }
797            catch (Exception exception)
798            {
799                aes_algorithm = null;   // we got an exception so we do not use this object any more
800                throw exception;
801            }           
802
803            return output;
804        }
805
806        private void ConfigureAlg(SymmetricAlgorithm alg, byte[] key)
807        {
808            try
809            {
810                alg.Key = key;
811            }
812            catch
813            {
814                //dirty hack to allow weak keys:
815                FieldInfo field = aes_algorithm.GetType().GetField("KeyValue", BindingFlags.NonPublic | BindingFlags.Instance);
816                field.SetValue(alg, key);
817            }
818
819            try
820            {
821                alg.IV = this.plugin.InputIV;
822            }
823            catch
824            {
825                //dirty hack to allow weak keys:
826                FieldInfo field = aes_algorithm.GetType().GetField("IVValue", BindingFlags.NonPublic | BindingFlags.Instance);
827                field.SetValue(alg, this.plugin.InputIV);
828            }
829
830            switch (((AESSettings)plugin.Settings).Mode)
831            { //0="ECB"=default, 1="CBC", 2="CFB", 3="OFB"
832                case 1: alg.Mode = CipherMode.CBC; break;
833                case 2: alg.Mode = CipherMode.CFB; break;
834                case 3: alg.Mode = CipherMode.OFB; break;
835                default: alg.Mode = CipherMode.ECB; break;
836            }
837            switch (((AESSettings)plugin.Settings).Padding)
838            { //0="Zeros"=default, 1="None", 2="PKCS7"
839                case 1: alg.Padding = PaddingMode.None; break;
840                case 2: alg.Padding = PaddingMode.PKCS7; break;
841                case 3: alg.Padding = PaddingMode.ANSIX923; break;
842                case 4: alg.Padding = PaddingMode.ISO10126; break;
843                default: alg.Padding = PaddingMode.Zeros; break;
844            }
845           
846        }
847
848        /// <summary>
849        /// Called by AES if its status changes
850        /// </summary>
851        public void onStatusChanged()
852        {
853            if (OnStatusChanged != null)
854                OnStatusChanged(this, true);
855        }
856
857        public string getKeyPattern()
858        {
859            int bytes = 0;
860            switch (((AESSettings)plugin.Settings).Keysize)
861            {
862                case 0:
863                    bytes = 16;
864                    break;
865                case 1:
866                    bytes = 24;
867                    break;
868                case 2:
869                    bytes = 32;
870                    break;
871            }
872            string pattern = "";
873            for (int i = 1; i < bytes; i++)
874                pattern += "[0-9A-F][0-9A-F]-";
875            pattern += "[0-9A-F][0-9A-F]";
876            return pattern;
877        }
878
879        public byte[] getKeyFromString(string key)
880        {
881            int bytes = 0;
882            switch (((AESSettings)plugin.Settings).Keysize)
883            {
884                case 0:
885                    bytes = 16;
886                    break;
887                case 1:
888                    bytes = 24;
889                    break;
890                case 2:
891                    bytes = 32;
892                    break;
893            }
894            byte[] bkey = new byte[bytes];
895            for (int i = 0; i < bytes; i++)
896            {
897                bkey[i] = Convert.ToByte(key.Substring(i * 3, 2), 16);
898            }
899            return bkey;
900        }
901        #endregion
902    }
903}
Note: See TracBrowser for help on using the repository browser.