| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
# |
|
2
|
|
|
|
|
|
|
# Copyright (C) 2015-2022 Joelle Maslak |
|
3
|
|
|
|
|
|
|
# All Rights Reserved - See License |
|
4
|
|
|
|
|
|
|
# |
|
5
|
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
package Crypt::EAMessage; |
|
7
|
|
|
|
|
|
|
$Crypt::EAMessage::VERSION = '1.220390'; # TRIAL |
|
8
|
8
|
|
|
8
|
|
1076292
|
use v5.22; |
|
|
8
|
|
|
|
|
51
|
|
|
9
|
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
# ABSTRACT: Simple-to-use Abstraction of Encrypted Authenticated Messages |
|
11
|
|
|
|
|
|
|
|
|
12
|
8
|
|
|
8
|
|
34
|
use strict; |
|
|
8
|
|
|
|
|
14
|
|
|
|
8
|
|
|
|
|
125
|
|
|
13
|
8
|
|
|
8
|
|
29
|
use warnings; |
|
|
8
|
|
|
|
|
9
|
|
|
|
8
|
|
|
|
|
151
|
|
|
14
|
8
|
|
|
8
|
|
2488
|
use autodie; |
|
|
8
|
|
|
|
|
77001
|
|
|
|
8
|
|
|
|
|
33
|
|
|
15
|
|
|
|
|
|
|
|
|
16
|
8
|
|
|
8
|
|
39321
|
use feature "signatures"; |
|
|
8
|
|
|
|
|
18
|
|
|
|
8
|
|
|
|
|
924
|
|
|
17
|
|
|
|
|
|
|
|
|
18
|
8
|
|
|
8
|
|
46
|
use Carp; |
|
|
8
|
|
|
|
|
15
|
|
|
|
8
|
|
|
|
|
566
|
|
|
19
|
|
|
|
|
|
|
|
|
20
|
8
|
|
|
8
|
|
4408
|
use Moose; |
|
|
8
|
|
|
|
|
2902362
|
|
|
|
8
|
|
|
|
|
51
|
|
|
21
|
8
|
|
|
8
|
|
45859
|
use Moose::Util::TypeConstraints; |
|
|
8
|
|
|
|
|
16
|
|
|
|
8
|
|
|
|
|
66
|
|
|
22
|
|
|
|
|
|
|
|
|
23
|
8
|
|
|
8
|
|
13795
|
no warnings "experimental::signatures"; |
|
|
8
|
|
|
|
|
14
|
|
|
|
8
|
|
|
|
|
338
|
|
|
24
|
|
|
|
|
|
|
|
|
25
|
8
|
|
|
8
|
|
4817
|
use Bytes::Random::Secure; |
|
|
8
|
|
|
|
|
64425
|
|
|
|
8
|
|
|
|
|
424
|
|
|
26
|
8
|
|
|
8
|
|
3071
|
use Crypt::AuthEnc::CCM qw(ccm_encrypt_authenticate ccm_decrypt_verify); |
|
|
8
|
|
|
|
|
18599
|
|
|
|
8
|
|
|
|
|
440
|
|
|
27
|
8
|
|
|
8
|
|
53
|
use MIME::Base64 qw(encode_base64 decode_base64); |
|
|
8
|
|
|
|
|
12
|
|
|
|
8
|
|
|
|
|
348
|
|
|
28
|
8
|
|
|
8
|
|
4229
|
use Storable qw(nfreeze thaw); |
|
|
8
|
|
|
|
|
21117
|
|
|
|
8
|
|
|
|
|
465
|
|
|
29
|
|
|
|
|
|
|
|
|
30
|
8
|
|
|
8
|
|
3269
|
use namespace::autoclean; |
|
|
8
|
|
|
|
|
50099
|
|
|
|
8
|
|
|
|
|
30
|
|
|
31
|
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
around 'BUILDARGS', sub ( $orig, $class, %args ) { |
|
35
|
|
|
|
|
|
|
my (@only_one) = qw(raw_key hex_key); |
|
36
|
|
|
|
|
|
|
my $cnt = 0; |
|
37
|
|
|
|
|
|
|
foreach my $a (@only_one) { |
|
38
|
|
|
|
|
|
|
if ( exists( $args{$a} ) ) { |
|
39
|
|
|
|
|
|
|
$cnt++; |
|
40
|
|
|
|
|
|
|
} |
|
41
|
|
|
|
|
|
|
} |
|
42
|
|
|
|
|
|
|
if ( $cnt > 1 ) { die("Must not have multiple *_key arguments"); } |
|
43
|
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
if ( exists( $args{hex_key} ) ) { |
|
45
|
|
|
|
|
|
|
my $hex = $args{hex_key}; |
|
46
|
|
|
|
|
|
|
delete( $args{hex_key} ); |
|
47
|
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
$args{raw_key} = _hex_to_raw($hex); |
|
49
|
|
|
|
|
|
|
} |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
$class->$orig(%args); |
|
52
|
|
|
|
|
|
|
}; |
|
53
|
|
|
|
|
|
|
|
|
54
|
35
|
|
|
35
|
|
41
|
sub _hex_to_raw ($hex) { |
|
|
35
|
|
|
|
|
44
|
|
|
|
35
|
|
|
|
|
40
|
|
|
55
|
35
|
|
|
|
|
58
|
$hex =~ s/^0x//; # Remove 0x leader if it is present |
|
56
|
|
|
|
|
|
|
|
|
57
|
35
|
100
|
|
|
|
101
|
if ( $hex =~ /[^0-9A-Fa-f]/s ) { die("Non-hex characters present in hex_key"); } |
|
|
1
|
|
|
|
|
7
|
|
|
58
|
|
|
|
|
|
|
|
|
59
|
34
|
|
|
|
|
46
|
my $l = length($hex); |
|
60
|
34
|
100
|
100
|
|
|
111
|
if ( ( $l != 32 ) && ( $l != 48 ) && ( $l != 64 ) ) { |
|
|
|
|
100
|
|
|
|
|
|
61
|
2
|
|
|
|
|
18
|
die("hex_key is the wrong length"); |
|
62
|
|
|
|
|
|
|
} |
|
63
|
|
|
|
|
|
|
|
|
64
|
32
|
|
|
|
|
257
|
return pack( 'H*', $hex ); |
|
65
|
|
|
|
|
|
|
} |
|
66
|
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
subtype 'Crypt::EAMessage::Key', as 'Str', |
|
68
|
|
|
|
|
|
|
where { _valid_key($_) }, |
|
69
|
|
|
|
|
|
|
message { "AES key lengths must be 16, 24, or 32 bytes long" }; |
|
70
|
|
|
|
|
|
|
|
|
71
|
42
|
|
|
42
|
|
59
|
sub _valid_key ($key) { |
|
|
42
|
|
|
|
|
58
|
|
|
|
42
|
|
|
|
|
42
|
|
|
72
|
42
|
|
|
|
|
56
|
my $l = length($_); |
|
73
|
|
|
|
|
|
|
|
|
74
|
42
|
100
|
100
|
|
|
118
|
if ( ( $l != 16 ) && ( $l != 24 ) && ( $l != 32 ) ) { return; } |
|
|
2
|
|
100
|
|
|
5
|
|
|
75
|
40
|
100
|
|
|
|
94
|
if ( utf8::is_utf8($key) ) { |
|
76
|
1
|
|
|
|
|
39
|
die("Key must not be UTF-8 encoded"); |
|
77
|
|
|
|
|
|
|
} |
|
78
|
|
|
|
|
|
|
|
|
79
|
39
|
|
|
|
|
63
|
return 1; |
|
80
|
|
|
|
|
|
|
} |
|
81
|
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
has 'raw_key' => ( |
|
84
|
|
|
|
|
|
|
is => 'rw', |
|
85
|
|
|
|
|
|
|
isa => 'Crypt::EAMessage::Key', |
|
86
|
|
|
|
|
|
|
required => 1, |
|
87
|
|
|
|
|
|
|
); |
|
88
|
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
sub hex_key { |
|
91
|
18
|
50
|
33
|
18
|
1
|
2797
|
if ( ( scalar(@_) < 1 ) || ( scalar(@_) > 2 ) ) { |
|
92
|
0
|
|
|
|
|
0
|
confess("Invalid call"); |
|
93
|
|
|
|
|
|
|
} |
|
94
|
|
|
|
|
|
|
|
|
95
|
18
|
|
|
|
|
29
|
my $self = shift; |
|
96
|
|
|
|
|
|
|
|
|
97
|
18
|
100
|
|
|
|
28
|
if ( scalar(@_) == 1 ) { |
|
98
|
|
|
|
|
|
|
# Setter |
|
99
|
5
|
|
|
|
|
11
|
$self->raw_key( _hex_to_raw(shift) ); |
|
100
|
|
|
|
|
|
|
} |
|
101
|
|
|
|
|
|
|
|
|
102
|
18
|
|
|
|
|
366
|
return unpack( 'H*', $self->raw_key() ); |
|
103
|
|
|
|
|
|
|
} |
|
104
|
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
|
|
106
|
10
|
|
|
10
|
1
|
5735
|
sub encrypt_auth ( $self, $input ) { |
|
|
8
|
|
|
|
|
11
|
|
|
|
8
|
|
|
|
|
9
|
|
|
|
8
|
|
|
|
|
9
|
|
|
107
|
8
|
|
|
|
|
21
|
my $ct = $self->_encrypt_auth_internal($input); |
|
108
|
8
|
|
|
|
|
23
|
return "1$ct"; # Type 1 = Binary Format |
|
109
|
|
|
|
|
|
|
} |
|
110
|
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
|
|
112
|
14
|
|
|
14
|
1
|
438
|
sub encrypt_auth_ascii ( $self, $input, $eol = undef ) { |
|
|
12
|
|
|
|
|
13
|
|
|
|
12
|
|
|
|
|
13
|
|
|
|
12
|
|
|
|
|
15
|
|
|
|
12
|
|
|
|
|
12
|
|
|
113
|
12
|
|
|
|
|
19
|
my $ct = $self->_encrypt_auth_internal($input); |
|
114
|
12
|
|
|
|
|
37
|
my $base64 = encode_base64( $ct, $eol ); |
|
115
|
12
|
|
|
|
|
32
|
return "2$base64"; # Type 2 = Base 64 |
|
116
|
|
|
|
|
|
|
} |
|
117
|
|
|
|
|
|
|
|
|
118
|
26
|
|
|
26
|
|
55
|
sub _encrypt_auth_internal ( $self, $input, $opts = {} ) { |
|
|
26
|
|
|
|
|
27
|
|
|
|
26
|
|
|
|
|
28
|
|
|
|
26
|
|
|
|
|
30
|
|
|
|
26
|
|
|
|
|
25
|
|
|
119
|
26
|
|
|
|
|
38
|
state $random = Bytes::Random::Secure->new( Bits => 1024, NonBlocking => 1 ); |
|
120
|
|
|
|
|
|
|
|
|
121
|
26
|
|
|
|
|
165
|
for my $opt ( sort keys %$opts ) { |
|
122
|
2
|
50
|
|
|
|
5
|
if ( $opt eq 'text' ) { next; } |
|
|
2
|
|
|
|
|
4
|
|
|
123
|
|
|
|
|
|
|
|
|
124
|
0
|
|
|
|
|
0
|
die("Unknown option to encrypt: $opt"); |
|
125
|
|
|
|
|
|
|
} |
|
126
|
|
|
|
|
|
|
|
|
127
|
26
|
|
|
|
|
69
|
my $nonce = $random->bytes(16); |
|
128
|
|
|
|
|
|
|
|
|
129
|
26
|
|
|
|
|
1369
|
my $data; |
|
130
|
26
|
100
|
66
|
|
|
89
|
if ( ( !exists( $opts->{text} ) ) && ( !$opts->{text} ) ) { |
|
131
|
|
|
|
|
|
|
# Any type of input |
|
132
|
24
|
|
|
|
|
54
|
$data = nfreeze( \$input ); |
|
133
|
|
|
|
|
|
|
} else { |
|
134
|
|
|
|
|
|
|
# Text only input |
|
135
|
2
|
|
|
|
|
3
|
$data = $input; |
|
136
|
|
|
|
|
|
|
} |
|
137
|
|
|
|
|
|
|
|
|
138
|
26
|
|
|
|
|
1521
|
my ( $enc, $tag ) = |
|
139
|
|
|
|
|
|
|
ccm_encrypt_authenticate( 'AES', $self->raw_key(), $nonce, '', 128, $data ); |
|
140
|
|
|
|
|
|
|
|
|
141
|
26
|
|
|
|
|
56
|
my $ct = $nonce . $tag . $enc; |
|
142
|
26
|
|
|
|
|
56
|
return $ct; |
|
143
|
|
|
|
|
|
|
} |
|
144
|
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
|
|
146
|
6
|
|
|
6
|
1
|
442
|
sub encrypt_auth_urlsafe ( $self, $input ) { |
|
|
4
|
|
|
|
|
7
|
|
|
|
4
|
|
|
|
|
5
|
|
|
|
4
|
|
|
|
|
5
|
|
|
147
|
4
|
|
|
|
|
8
|
my $ct = $self->_encrypt_auth_internal($input); |
|
148
|
|
|
|
|
|
|
|
|
149
|
4
|
|
|
|
|
12
|
my $urltext = encode_base64( $ct, "" ); |
|
150
|
4
|
|
|
|
|
10
|
$urltext =~ tr|\+/|-_|; |
|
151
|
|
|
|
|
|
|
|
|
152
|
4
|
|
|
|
|
11
|
return "3$urltext"; # Type 3 = Modified Base 64 |
|
153
|
|
|
|
|
|
|
} |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
|
|
156
|
4
|
|
|
4
|
1
|
421
|
sub encrypt_auth_portable ( $self, $input ) { |
|
|
2
|
|
|
|
|
4
|
|
|
|
2
|
|
|
|
|
3
|
|
|
|
2
|
|
|
|
|
2
|
|
|
157
|
2
|
|
|
|
|
6
|
my $ct = $self->_encrypt_auth_internal( $input, { text => 1 } ); |
|
158
|
|
|
|
|
|
|
|
|
159
|
2
|
|
|
|
|
7
|
my $urltext = encode_base64( $ct, "" ); |
|
160
|
2
|
|
|
|
|
5
|
$urltext =~ tr|\+/|-_|; |
|
161
|
|
|
|
|
|
|
|
|
162
|
2
|
|
|
|
|
8
|
return "4$urltext"; # Type 3 = Modified Base 64 |
|
163
|
|
|
|
|
|
|
} |
|
164
|
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
|
|
166
|
46
|
|
|
46
|
1
|
23987
|
sub decrypt_auth ( $self, $ct ) { |
|
|
44
|
|
|
|
|
52
|
|
|
|
44
|
|
|
|
|
50
|
|
|
|
44
|
|
|
|
|
44
|
|
|
167
|
44
|
50
|
|
|
|
87
|
if ( length($ct) < 34 ) { die("Message too short to be valid") } |
|
|
0
|
|
|
|
|
0
|
|
|
168
|
|
|
|
|
|
|
|
|
169
|
44
|
|
|
|
|
66
|
my $type = substr( $ct, 0, 1 ); |
|
170
|
44
|
|
|
|
|
71
|
my $enc = substr( $ct, 1 ); |
|
171
|
|
|
|
|
|
|
|
|
172
|
44
|
100
|
|
|
|
117
|
if ( $type eq '1' ) { |
|
|
|
100
|
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
173
|
17
|
|
|
|
|
36
|
return $self->_decrypt_auth_internal($enc); |
|
174
|
|
|
|
|
|
|
} elsif ( $type eq '2' ) { |
|
175
|
15
|
|
|
|
|
48
|
my $ascii = decode_base64($enc); # It's okay if this ignores bad base64, |
|
176
|
|
|
|
|
|
|
# since we'll fail decryption. |
|
177
|
15
|
|
|
|
|
28
|
return $self->_decrypt_auth_internal($ascii); |
|
178
|
|
|
|
|
|
|
} elsif ( $type eq '3' ) { |
|
179
|
6
|
|
|
|
|
16
|
$enc =~ tr|-_|+/|; |
|
180
|
6
|
|
|
|
|
20
|
my $ascii = decode_base64($enc); # It's okay if this ignores bad base64, |
|
181
|
|
|
|
|
|
|
# since we'll fail decryption. |
|
182
|
6
|
|
|
|
|
14
|
return $self->_decrypt_auth_internal($ascii); |
|
183
|
|
|
|
|
|
|
} elsif ( $type eq '4' ) { |
|
184
|
2
|
|
|
|
|
3
|
$enc =~ tr|-_|+/|; |
|
185
|
2
|
|
|
|
|
7
|
my $ascii = decode_base64($enc); # It's okay if this ignores bad base64, |
|
186
|
|
|
|
|
|
|
# since we'll fail decryption. |
|
187
|
2
|
|
|
|
|
7
|
return $self->_decrypt_auth_internal( $ascii, { text => 1 } ); |
|
188
|
|
|
|
|
|
|
} else { |
|
189
|
4
|
|
|
|
|
23
|
die("Unsupported encoding type"); |
|
190
|
|
|
|
|
|
|
} |
|
191
|
|
|
|
|
|
|
} |
|
192
|
|
|
|
|
|
|
|
|
193
|
40
|
|
|
40
|
|
40
|
sub _decrypt_auth_internal ( $self, $ct, $opts = {} ) { |
|
|
40
|
|
|
|
|
39
|
|
|
|
40
|
|
|
|
|
42
|
|
|
|
40
|
|
|
|
|
76
|
|
|
|
40
|
|
|
|
|
76
|
|
|
194
|
40
|
50
|
|
|
|
63
|
if ( length($ct) < 32 ) { die("Message too short to be valid") } |
|
|
0
|
|
|
|
|
0
|
|
|
195
|
|
|
|
|
|
|
|
|
196
|
40
|
|
|
|
|
97
|
for my $opt ( sort keys %$opts ) { |
|
197
|
2
|
50
|
|
|
|
6
|
if ( $opt eq 'text' ) { next; } |
|
|
2
|
|
|
|
|
3
|
|
|
198
|
|
|
|
|
|
|
|
|
199
|
0
|
|
|
|
|
0
|
die("Unknown option to decrypt: $opt"); |
|
200
|
|
|
|
|
|
|
} |
|
201
|
|
|
|
|
|
|
|
|
202
|
40
|
|
|
|
|
59
|
my $nonce = substr( $ct, 0, 16 ); |
|
203
|
40
|
|
|
|
|
71
|
my $tag = substr( $ct, 16, 16 ); |
|
204
|
40
|
|
|
|
|
52
|
my $enc = substr( $ct, 32 ); |
|
205
|
|
|
|
|
|
|
|
|
206
|
40
|
|
|
|
|
1040
|
my $frozen = ccm_decrypt_verify( 'AES', $self->raw_key(), $nonce, '', $enc, $tag ); |
|
207
|
40
|
100
|
|
|
|
95
|
if ( !defined($frozen) ) { die("Could not decrypt message") } |
|
|
12
|
|
|
|
|
87
|
|
|
208
|
|
|
|
|
|
|
|
|
209
|
28
|
100
|
66
|
|
|
112
|
if ( ( !exists( $opts->{text} ) ) && ( !$opts->{text} ) ) { |
|
210
|
|
|
|
|
|
|
# Perl 5 data structure |
|
211
|
26
|
|
|
|
|
70
|
my $plaintext = thaw($frozen); |
|
212
|
26
|
|
|
|
|
478
|
return $$plaintext; |
|
213
|
|
|
|
|
|
|
} else { |
|
214
|
|
|
|
|
|
|
# Plain text |
|
215
|
2
|
|
|
|
|
8
|
return $frozen; |
|
216
|
|
|
|
|
|
|
} |
|
217
|
|
|
|
|
|
|
} |
|
218
|
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
|
|
220
|
5
|
|
|
5
|
1
|
717
|
sub generate_key ($self) { |
|
|
4
|
|
|
|
|
10
|
|
|
|
4
|
|
|
|
|
4
|
|
|
221
|
4
|
|
|
|
|
17
|
return Bytes::Random::Secure::random_bytes_hex(32); |
|
222
|
|
|
|
|
|
|
} |
|
223
|
|
|
|
|
|
|
|
|
224
|
|
|
|
|
|
|
__PACKAGE__->meta->make_immutable; |
|
225
|
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
1; |
|
227
|
|
|
|
|
|
|
|
|
228
|
|
|
|
|
|
|
__END__ |
|
229
|
|
|
|
|
|
|
|
|
230
|
|
|
|
|
|
|
=pod |
|
231
|
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
=encoding UTF-8 |
|
233
|
|
|
|
|
|
|
|
|
234
|
|
|
|
|
|
|
=head1 NAME |
|
235
|
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
Crypt::EAMessage - Simple-to-use Abstraction of Encrypted Authenticated Messages |
|
237
|
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
=head1 VERSION |
|
239
|
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
version 1.220390 |
|
241
|
|
|
|
|
|
|
|
|
242
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
243
|
|
|
|
|
|
|
|
|
244
|
|
|
|
|
|
|
use Crypt::EAMessage; |
|
245
|
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
my $eamsg = Crypt::EAMessage->new( hex_key => $hex ); |
|
247
|
|
|
|
|
|
|
|
|
248
|
|
|
|
|
|
|
$encrypted = $eamsg->encrypt_auth($input); |
|
249
|
|
|
|
|
|
|
$enc_ascii = $eamsg->encrypt_auth_ascii($input); |
|
250
|
|
|
|
|
|
|
$enc_url = $eamsg->encrypt_auth_urlsafe($input); |
|
251
|
|
|
|
|
|
|
$enc_portable = $eamsg->encrypt_auth_portable($input); # Input must be text |
|
252
|
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
$decrypted = $eamsg->decrypt_auth($encrypted); |
|
254
|
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
256
|
|
|
|
|
|
|
|
|
257
|
|
|
|
|
|
|
This module provides an easy-to-use method to create encrypted and |
|
258
|
|
|
|
|
|
|
authenticated messages from arbitrary Perl objects (anything compatible |
|
259
|
|
|
|
|
|
|
with L<Storable>). |
|
260
|
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
While there are many modules that encrypt text, there are many less that |
|
262
|
|
|
|
|
|
|
provide encryption and authentication without a complex interface. This |
|
263
|
|
|
|
|
|
|
module uses AES encryption in CCM mode. This allows two parties to |
|
264
|
|
|
|
|
|
|
communicate securely, provided they both use the same secret key. In |
|
265
|
|
|
|
|
|
|
addition to providing privacy, this module also ensures that the message |
|
266
|
|
|
|
|
|
|
was created by someone who had knowledge of the private key - in otherwords |
|
267
|
|
|
|
|
|
|
the message was also not tampered with in-transit. |
|
268
|
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
When encrypting, this module produces a message that contains the |
|
270
|
|
|
|
|
|
|
message's nonce (a unique value that changes the results of the encryption |
|
271
|
|
|
|
|
|
|
so two identical messages will be encrypted differently), the authentication |
|
272
|
|
|
|
|
|
|
tag (used to authenticate the message), and the cipher text. It can be |
|
273
|
|
|
|
|
|
|
formatted in either a "printable" base 64 encoding or in raw binary form. |
|
274
|
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
|
276
|
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
=head2 raw_key |
|
278
|
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
This is the key used for encryption/decryption (a string of 16, 24, or 32 |
|
280
|
|
|
|
|
|
|
bytes). Note that the size of the key determines the strength of the AES |
|
281
|
|
|
|
|
|
|
encryption - a 16 byte string uses AES-128, 24 uses AES-192, 32 uses |
|
282
|
|
|
|
|
|
|
AES-256. |
|
283
|
|
|
|
|
|
|
|
|
284
|
|
|
|
|
|
|
=head2 hex_key |
|
285
|
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
This is the hex version of the key. This should consist of a string |
|
287
|
|
|
|
|
|
|
of 32, 48, or 64 hex digits (creating a 16, 24, or 32 byte key). |
|
288
|
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
=head1 METHODS |
|
290
|
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
=head2 new |
|
292
|
|
|
|
|
|
|
|
|
293
|
|
|
|
|
|
|
my $eamsg = Crypt::EAMessage->new( raw_key => $key ); |
|
294
|
|
|
|
|
|
|
|
|
295
|
|
|
|
|
|
|
or |
|
296
|
|
|
|
|
|
|
|
|
297
|
|
|
|
|
|
|
my $eamsg = Crypt::EAMessage->new( hex_key => $hex ); |
|
298
|
|
|
|
|
|
|
|
|
299
|
|
|
|
|
|
|
Create a new workunit class. It takes either a C<raw_key> or a C<hex_key> |
|
300
|
|
|
|
|
|
|
parameter. See the C<raw_key> and C<hex_key> attributes. |
|
301
|
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
=head2 encrypt_auth |
|
303
|
|
|
|
|
|
|
|
|
304
|
|
|
|
|
|
|
my $ciphertext = $ea->encrypt_auth( $plaintext ); |
|
305
|
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
Encrypts the plain text (or any other Perl object that C<Storable> can |
|
307
|
|
|
|
|
|
|
freeze and thaw) passed as a parameter, generating a binary (non-printable) |
|
308
|
|
|
|
|
|
|
cipher text output. |
|
309
|
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
=head2 encrypt_auth_ascii |
|
311
|
|
|
|
|
|
|
|
|
312
|
|
|
|
|
|
|
my $ciphertext = $ea->encrypt_auth_ascii( $plaintext ); |
|
313
|
|
|
|
|
|
|
my $ciphertext = $ea->encrypt_auth_ascii( $plaintext, "" ); |
|
314
|
|
|
|
|
|
|
|
|
315
|
|
|
|
|
|
|
Encrypts the plain text (or any other Perl object that C<Storable> can |
|
316
|
|
|
|
|
|
|
freeze and thaw) passed as a parameter, generating an ASCII (base64) |
|
317
|
|
|
|
|
|
|
cipher text output. |
|
318
|
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
Starting in version 1.004, a second, optional, argument is allowed. |
|
320
|
|
|
|
|
|
|
If an argument after C<$plaintext> is supplied, that becomes the line ending |
|
321
|
|
|
|
|
|
|
for the output text. If no argument is provided, a standard newline |
|
322
|
|
|
|
|
|
|
appropriate to the platform is used. Otherwise, the value of that string |
|
323
|
|
|
|
|
|
|
is used as the line ending, in the same way as it would be if passed as |
|
324
|
|
|
|
|
|
|
the L<MIME::Base64::encode_base64> function's second argument. |
|
325
|
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
Note that when using line endings other than a blank ending (no line ending) |
|
327
|
|
|
|
|
|
|
or a standard newline, you should strip the new line identifier from the |
|
328
|
|
|
|
|
|
|
cypertext before calling the L<decrypt_auth_ascii> method. |
|
329
|
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
=head2 encrypt_auth_urlsafe |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
my $ciphertext = $ea->encrypt_auth_urlsafe( $plaintext ); |
|
333
|
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
Added in version 1.006. |
|
335
|
|
|
|
|
|
|
|
|
336
|
|
|
|
|
|
|
Encrypts the plain text (or any other Perl object that C<Storable> can |
|
337
|
|
|
|
|
|
|
freeze and thaw) passed as a parameter, generating an ASCII (modified |
|
338
|
|
|
|
|
|
|
base64) cipher text output. This output is safe to pass as part of a |
|
339
|
|
|
|
|
|
|
query string or URL. Namely, it doesn't use the standard Base 64 |
|
340
|
|
|
|
|
|
|
characters C<+> or C</>, replacing them with C<-> and C<_> respectively. |
|
341
|
|
|
|
|
|
|
In addition, the cyphertext output will start with a "3" rather than the |
|
342
|
|
|
|
|
|
|
"2" that the base 64 variant starts with. |
|
343
|
|
|
|
|
|
|
|
|
344
|
|
|
|
|
|
|
=head2 encrypt_auth_portable |
|
345
|
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
my $ciphertext = $ea->encrypt_auth_portable( $plaintext ); |
|
347
|
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
Added in version 1.190900 |
|
349
|
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
Encrypts the plain text (or byte string) passed as a parameter, generating |
|
351
|
|
|
|
|
|
|
an ASCII (modified base64) cipher text output. This output is safe to pass |
|
352
|
|
|
|
|
|
|
as part of a query string or URL. Namely, it doesn't use the standard Base 64 |
|
353
|
|
|
|
|
|
|
characters C<+> or C</>, replacing them with C<-> and C<_> respectively. |
|
354
|
|
|
|
|
|
|
In addition, the cyphertext output will start with a "4". |
|
355
|
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
This is intended for cross-language compatibility, so it does not utilize |
|
357
|
|
|
|
|
|
|
store/thaw. |
|
358
|
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
SECURITY NOTE: The contents of a zero length string can be determined from |
|
360
|
|
|
|
|
|
|
the length of the encrypted portable message. |
|
361
|
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
=head2 decrypt_auth |
|
363
|
|
|
|
|
|
|
|
|
364
|
|
|
|
|
|
|
my $plaintext = $ea->decrypt_auth( $ciphertext ); |
|
365
|
|
|
|
|
|
|
|
|
366
|
|
|
|
|
|
|
Decrypts the cipher text into the object that was frozen during encryption. |
|
367
|
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
If the authentication or decryption fails, an exception is thrown. Otherwise |
|
369
|
|
|
|
|
|
|
it returns the plaintext/object. |
|
370
|
|
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
=head2 generate_key |
|
372
|
|
|
|
|
|
|
|
|
373
|
|
|
|
|
|
|
say "Hex key: " . Crypt::EAMessage->generate_key() |
|
374
|
|
|
|
|
|
|
|
|
375
|
|
|
|
|
|
|
Added in version 1.220390 |
|
376
|
|
|
|
|
|
|
|
|
377
|
|
|
|
|
|
|
This is a class method (I.E. you do not need to instantiate the |
|
378
|
|
|
|
|
|
|
C<Crypt::EAMessage> class to use this). |
|
379
|
|
|
|
|
|
|
|
|
380
|
|
|
|
|
|
|
Returns a randomly generated key suitable to use with AES256 as a hex number. |
|
381
|
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
=head1 GENERATING AES256 KEYS |
|
383
|
|
|
|
|
|
|
|
|
384
|
|
|
|
|
|
|
To generate a key, a simple Perl program can accomplish this - note that you |
|
385
|
|
|
|
|
|
|
should NOT use standard C<rand()> to do this. |
|
386
|
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
use feature 'say'; |
|
388
|
|
|
|
|
|
|
use Crypt::EAMessage; |
|
389
|
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
my $hexkey = Crypt::EAMessage->generate_key() |
|
391
|
|
|
|
|
|
|
say "Key is: $hexkey"; |
|
392
|
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
Alternative, you can do this with a one-liner to return a hex key, and the |
|
394
|
|
|
|
|
|
|
L<Crypt::EAMessage::Keygen> module: |
|
395
|
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
perl -MCrypt::EAMessage::Keygen -e 1 |
|
397
|
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
This will output a random key in hex format suitable for use as an AES256 key. |
|
399
|
|
|
|
|
|
|
|
|
400
|
|
|
|
|
|
|
=head1 SECURITY |
|
401
|
|
|
|
|
|
|
|
|
402
|
|
|
|
|
|
|
Note that this module use L<Storable>. Thus this module should only be used |
|
403
|
|
|
|
|
|
|
when the endpoint is trusted. This module will ensure that the stored |
|
404
|
|
|
|
|
|
|
object is received without tampering by an intermediary (and is secure even |
|
405
|
|
|
|
|
|
|
when an untrusted third party can modify the encrypted message in transit), |
|
406
|
|
|
|
|
|
|
because C<thaw> is not called unless the message passes authentication |
|
407
|
|
|
|
|
|
|
checks. But if an endpoint can create a malicious message using a valid |
|
408
|
|
|
|
|
|
|
key, it is possible that this message could exploit some vulnerability in |
|
409
|
|
|
|
|
|
|
the L<Storable> module. |
|
410
|
|
|
|
|
|
|
|
|
411
|
|
|
|
|
|
|
This module does not protect against replay attacks. |
|
412
|
|
|
|
|
|
|
|
|
413
|
|
|
|
|
|
|
This module is not protected against timing attacks. |
|
414
|
|
|
|
|
|
|
|
|
415
|
|
|
|
|
|
|
=head1 ALTERNATIVES |
|
416
|
|
|
|
|
|
|
|
|
417
|
|
|
|
|
|
|
This module implements a tiny subset of the functionality in L<Crypt::Util> |
|
418
|
|
|
|
|
|
|
which may be a better choice for more complex use cases. |
|
419
|
|
|
|
|
|
|
|
|
420
|
|
|
|
|
|
|
=head1 BUGS |
|
421
|
|
|
|
|
|
|
|
|
422
|
|
|
|
|
|
|
None known, however it is certainly possible that I am less than perfect! |
|
423
|
|
|
|
|
|
|
If you find any bug you believe has security implications, I would |
|
424
|
|
|
|
|
|
|
greatly appreciate being notified via email sent to jmaslak@antelope.net |
|
425
|
|
|
|
|
|
|
prior to public disclosure. In the event of such notification, I will |
|
426
|
|
|
|
|
|
|
attempt to work with you to develop a plan for fixing the bug. |
|
427
|
|
|
|
|
|
|
|
|
428
|
|
|
|
|
|
|
All other bugs can be reported via email to jmaslak@antelope.net or by |
|
429
|
|
|
|
|
|
|
using the Git Hub issue tracker |
|
430
|
|
|
|
|
|
|
at L<https://github.com/jmaslak/Crypt-EAMessage/issues> |
|
431
|
|
|
|
|
|
|
|
|
432
|
|
|
|
|
|
|
=head1 AUTHOR |
|
433
|
|
|
|
|
|
|
|
|
434
|
|
|
|
|
|
|
Joelle Maslak <jmaslak@antelope.net> |
|
435
|
|
|
|
|
|
|
|
|
436
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE |
|
437
|
|
|
|
|
|
|
|
|
438
|
|
|
|
|
|
|
This software is copyright (c) 2019-2022 by Joelle Maslak. |
|
439
|
|
|
|
|
|
|
|
|
440
|
|
|
|
|
|
|
This is free software; you can redistribute it and/or modify it under |
|
441
|
|
|
|
|
|
|
the same terms as the Perl 5 programming language system itself. |
|
442
|
|
|
|
|
|
|
|
|
443
|
|
|
|
|
|
|
=cut |