mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
Use the new `postprocess` feature for the test of `StaticInitializationVector.ql`. This makes it easier to modify and test this query for diff-informed operation.
190 lines
7.3 KiB
Java
190 lines
7.3 KiB
Java
import javax.crypto.Cipher;
|
|
import javax.crypto.spec.GCMParameterSpec;
|
|
import javax.crypto.spec.IvParameterSpec;
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
import java.security.SecureRandom;
|
|
import java.util.Arrays;
|
|
|
|
public class StaticInitializationVector {
|
|
|
|
// BAD: AES-GCM with static IV from a byte array
|
|
public byte[] encryptWithStaticIvByteArrayWithInitializer(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] iv = new byte[] { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5 }; // $Source
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// BAD: AES-GCM with static IV from zero-initialized byte array
|
|
public byte[] encryptWithZeroStaticIvByteArray(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] iv = new byte[16]; // $Source
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// BAD: AES-CBC with static IV from zero-initialized byte array
|
|
public byte[] encryptWithStaticIvByteArray(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] iv = new byte[16]; // $Source
|
|
for (byte i = 0; i < iv.length; i++) {
|
|
iv[i] = 1;
|
|
}
|
|
|
|
IvParameterSpec ivSpec = new IvParameterSpec(iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// BAD: AES-GCM with static IV from a multidimensional byte array
|
|
public byte[] encryptWithOneOfStaticIvs01(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[][] staticIvs = new byte[][] {
|
|
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5 },
|
|
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 42 }
|
|
}; // $Source
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, staticIvs[1]);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// BAD: AES-GCM with static IV from a multidimensional byte array
|
|
public byte[] encryptWithOneOfStaticIvs02(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[][] staticIvs = new byte[][] {
|
|
new byte[] { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5 },
|
|
new byte[] { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 42 }
|
|
}; // $Source
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, staticIvs[1]);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// BAD: AES-GCM with static IV from a multidimensional byte array
|
|
public byte[] encryptWithOneOfStaticZeroIvs(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[][] ivs = new byte[][] {
|
|
new byte[8], // $Source
|
|
new byte[16] // $Source
|
|
};
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, ivs[1]);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec); // $Alert
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// GOOD: AES-GCM with a random IV
|
|
public byte[] encryptWithRandomIv(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] iv = new byte[16];
|
|
|
|
SecureRandom random = SecureRandom.getInstanceStrong();
|
|
random.nextBytes(iv);
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// GOOD: AES-GCM with a random IV
|
|
public byte[] encryptWithRandomIvByteByByte(byte[] key, byte[] plaintext) throws Exception {
|
|
SecureRandom random = SecureRandom.getInstanceStrong();
|
|
byte[] iv = new byte[16];
|
|
for (int i = 0; i < iv.length; i++) {
|
|
iv[i] = (byte) random.nextInt();
|
|
}
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// GOOD: AES-GCM with a random IV
|
|
public byte[] encryptWithRandomIvWithSystemArrayCopy(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] randomBytes = new byte[16];
|
|
SecureRandom.getInstanceStrong().nextBytes(randomBytes);
|
|
|
|
byte[] iv = new byte[16];
|
|
System.arraycopy(randomBytes, 0, iv, 0, 16);
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
// GOOD: AES-GCM with a random IV
|
|
public byte[] encryptWithRandomIvWithArraysCopy(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] randomBytes = new byte[16];
|
|
SecureRandom.getInstanceStrong().nextBytes(randomBytes);
|
|
|
|
byte[] iv = new byte[16];
|
|
iv = Arrays.copyOf(randomBytes, 16);
|
|
|
|
GCMParameterSpec ivSpec = new GCMParameterSpec(128, iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
|
|
public byte[] generate(int size) throws Exception {
|
|
if (size == 0) {
|
|
return new byte[0];
|
|
}
|
|
byte[] randomBytes = new byte[size];
|
|
SecureRandom.getInstanceStrong().nextBytes(randomBytes);
|
|
return randomBytes;
|
|
}
|
|
|
|
// GOOD: AES-CBC with a random IV
|
|
public byte[] encryptWithGeneratedIvByteArray(byte[] key, byte[] plaintext) throws Exception {
|
|
byte[] iv = generate(16);
|
|
|
|
IvParameterSpec ivSpec = new IvParameterSpec(iv);
|
|
SecretKeySpec keySpec = new SecretKeySpec(key, "AES");
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5PADDING");
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
cipher.update(plaintext);
|
|
return cipher.doFinal();
|
|
}
|
|
}
|