jellyfin/Emby.Server.Implementations/Cryptography/CryptographyProvider.cs

170 lines
5.7 KiB
C#
Raw Normal View History

2019-02-20 09:17:30 +00:00
using System;
using System.Collections.Generic;
using System.Globalization;
2019-02-20 09:17:30 +00:00
using System.IO;
using System.Security.Cryptography;
using System.Text;
using System.Linq;
2019-02-20 09:17:30 +00:00
using MediaBrowser.Model.Cryptography;
namespace Emby.Server.Implementations.Cryptography
{
public class CryptographyProvider : ICryptoProvider
{
2019-03-07 11:32:05 +00:00
private static readonly HashSet<string> _supportedHashMethods = new HashSet<string>()
2019-02-20 09:17:30 +00:00
{
2019-03-07 11:11:41 +00:00
"MD5",
"System.Security.Cryptography.MD5",
"SHA",
"SHA1",
"System.Security.Cryptography.SHA1",
"SHA256",
"SHA-256",
"System.Security.Cryptography.SHA256",
"SHA384",
"SHA-384",
"System.Security.Cryptography.SHA384",
"SHA512",
"SHA-512",
"System.Security.Cryptography.SHA512"
2019-02-20 09:17:30 +00:00
};
2019-03-07 11:32:05 +00:00
public string DefaultHashMethod => "PBKDF2";
private RandomNumberGenerator _randomNumberGenerator;
private const int _defaultIterations = 1000;
public CryptographyProvider()
{
//FIXME: When we get DotNet Standard 2.1 we need to revisit how we do the crypto
//Currently supported hash methods from https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography.cryptoconfig?view=netcore-2.1
//there might be a better way to autogenerate this list as dotnet updates, but I couldn't find one
//Please note the default method of PBKDF2 is not included, it cannot be used to generate hashes cleanly as it is actually a pbkdf with sha1
2019-03-05 07:58:25 +00:00
_randomNumberGenerator = RandomNumberGenerator.Create();
2019-02-20 09:17:30 +00:00
}
public Guid GetMD5(string str)
{
return new Guid(ComputeMD5(Encoding.Unicode.GetBytes(str)));
}
public byte[] ComputeSHA1(byte[] bytes)
{
using (var provider = SHA1.Create())
{
return provider.ComputeHash(bytes);
}
}
public byte[] ComputeMD5(Stream str)
{
using (var provider = MD5.Create())
{
return provider.ComputeHash(str);
}
}
public byte[] ComputeMD5(byte[] bytes)
{
using (var provider = MD5.Create())
{
return provider.ComputeHash(bytes);
}
}
public IEnumerable<string> GetSupportedHashMethods()
{
2019-03-05 07:58:25 +00:00
return _supportedHashMethods;
2019-02-20 09:17:30 +00:00
}
private byte[] PBKDF2(string method, byte[] bytes, byte[] salt, int iterations)
{
//downgrading for now as we need this library to be dotnetstandard compliant
//with this downgrade we'll add a check to make sure we're on the downgrade method at the moment
if (method == DefaultHashMethod)
2019-02-20 09:17:30 +00:00
{
using (var r = new Rfc2898DeriveBytes(bytes, salt, iterations))
{
return r.GetBytes(32);
}
2019-02-20 09:17:30 +00:00
}
2019-03-05 07:58:25 +00:00
throw new CryptographicException($"Cannot currently use PBKDF2 with requested hash method: {method}");
2019-02-20 09:17:30 +00:00
}
2019-03-05 07:58:25 +00:00
public byte[] ComputeHash(string hashMethod, byte[] bytes)
2019-02-20 09:17:30 +00:00
{
return ComputeHash(hashMethod, bytes, Array.Empty<byte>());
2019-02-20 09:17:30 +00:00
}
public byte[] ComputeHashWithDefaultMethod(byte[] bytes)
{
return ComputeHash(DefaultHashMethod, bytes);
}
2019-03-05 07:58:25 +00:00
public byte[] ComputeHash(string hashMethod, byte[] bytes, byte[] salt)
2019-02-20 09:17:30 +00:00
{
if (hashMethod == DefaultHashMethod)
{
2019-03-05 07:58:25 +00:00
return PBKDF2(hashMethod, bytes, salt, _defaultIterations);
}
2019-03-05 07:58:25 +00:00
else if (_supportedHashMethods.Contains(hashMethod))
2019-02-20 09:17:30 +00:00
{
2019-03-05 07:58:25 +00:00
using (var h = HashAlgorithm.Create(hashMethod))
2019-02-20 09:17:30 +00:00
{
if (salt.Length == 0)
2019-02-20 09:17:30 +00:00
{
return h.ComputeHash(bytes);
}
else
{
2019-03-07 11:11:41 +00:00
byte[] salted = new byte[bytes.Length + salt.Length];
Array.Copy(bytes, salted, bytes.Length);
Array.Copy(salt, 0, salted, bytes.Length, salt.Length);
return h.ComputeHash(salted);
}
2019-02-20 09:17:30 +00:00
}
}
else
{
2019-03-05 07:58:25 +00:00
throw new CryptographicException($"Requested hash method is not supported: {hashMethod}");
2019-02-20 09:17:30 +00:00
}
}
public byte[] ComputeHashWithDefaultMethod(byte[] bytes, byte[] salt)
{
2019-03-05 07:58:25 +00:00
return PBKDF2(DefaultHashMethod, bytes, salt, _defaultIterations);
2019-02-20 09:17:30 +00:00
}
public byte[] ComputeHash(PasswordHash hash)
{
2019-03-05 07:58:25 +00:00
int iterations = _defaultIterations;
2019-02-20 09:17:30 +00:00
if (!hash.Parameters.ContainsKey("iterations"))
{
2019-03-05 07:58:25 +00:00
hash.Parameters.Add("iterations", _defaultIterations.ToString(CultureInfo.InvariantCulture));
2019-02-20 09:17:30 +00:00
}
else
{
try
{
iterations = int.Parse(hash.Parameters["iterations"]);
}
catch (Exception e)
{
throw new InvalidDataException($"Couldn't successfully parse iterations value from string: {hash.Parameters["iterations"]}", e);
}
}
2019-03-05 07:58:25 +00:00
2019-02-20 09:17:30 +00:00
return PBKDF2(hash.Id, hash.HashBytes, hash.SaltBytes, iterations);
}
public byte[] GenerateSalt()
{
byte[] salt = new byte[64];
2019-03-05 07:58:25 +00:00
_randomNumberGenerator.GetBytes(salt);
2019-02-20 09:17:30 +00:00
return salt;
}
}
}