minizip-ng/mz_crypt_apple.c

431 lines
12 KiB
C
Raw Normal View History

2018-11-01 16:16:19 -07:00
/* mz_crypt_apple.c -- Crypto/hash functions for Apple
2021-01-23 16:18:11 -08:00
part of the minizip-ng project
2018-11-01 16:16:19 -07:00
2023-02-16 13:14:21 -08:00
Copyright (C) Nathan Moinvaziri
2021-01-23 16:18:11 -08:00
https://github.com/zlib-ng/minizip-ng
2018-11-01 16:16:19 -07:00
This program is distributed under the terms of the same license as zlib.
See the accompanying LICENSE file for the full text of the license.
*/
#include "mz.h"
2018-11-01 19:03:40 -07:00
#include <CoreFoundation/CoreFoundation.h>
2018-11-01 16:16:19 -07:00
#include <CommonCrypto/CommonCryptor.h>
#include <CommonCrypto/CommonDigest.h>
#include <CommonCrypto/CommonHMAC.h>
2018-11-01 19:03:40 -07:00
#include <Security/Security.h>
#include <Security/SecPolicy.h>
2018-11-01 16:16:19 -07:00
/***************************************************************************/
enum {
kCCModeGCM = 11,
};
CCCryptorStatus CCCryptorGCMReset(CCCryptorRef cryptorRef);
CCCryptorStatus CCCryptorGCMAddIV(CCCryptorRef cryptorRef, const void *iv, size_t ivLen);
CCCryptorStatus CCCryptorGCMEncrypt(CCCryptorRef cryptorRef, const void *dataIn, size_t dataInLength, void *dataOut);
CCCryptorStatus CCCryptorGCMDecrypt(CCCryptorRef cryptorRef, const void *dataIn, size_t dataInLength, void *dataOut);
CCCryptorStatus CCCryptorGCMFinal(CCCryptorRef cryptorRef, void *tagOut, size_t *tagLength);
/***************************************************************************/
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_rand(uint8_t *buf, int32_t size) {
if (SecRandomCopyBytes(kSecRandomDefault, size, buf) != errSecSuccess)
2018-11-01 16:16:19 -07:00
return 0;
return size;
}
/***************************************************************************/
typedef struct mz_crypt_sha_s {
2022-01-17 12:37:25 -07:00
union {
CC_SHA1_CTX ctx1;
CC_SHA256_CTX ctx256;
CC_SHA512_CTX ctx512;
};
int32_t error;
int32_t initialized;
uint16_t algorithm;
2018-11-01 16:16:19 -07:00
} mz_crypt_sha;
/***************************************************************************/
2022-01-17 12:37:25 -07:00
static const uint8_t mz_crypt_sha_digest_size[] = {
MZ_HASH_SHA1_SIZE, 0, MZ_HASH_SHA224_SIZE,
MZ_HASH_SHA256_SIZE, MZ_HASH_SHA384_SIZE, MZ_HASH_SHA512_SIZE
};
/***************************************************************************/
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_reset(void *handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
sha->error = 0;
sha->initialized = 0;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_begin(void *handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
2023-02-19 11:17:54 -08:00
if (!sha)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
mz_crypt_sha_reset(handle);
2022-01-17 12:37:25 -07:00
switch (sha->algorithm) {
case MZ_HASH_SHA1:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA1_Init(&sha->ctx1);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA224:
sha->error = CC_SHA224_Init(&sha->ctx256);
break;
case MZ_HASH_SHA256:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA256_Init(&sha->ctx256);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA384:
sha->error = CC_SHA384_Init(&sha->ctx512);
break;
case MZ_HASH_SHA512:
sha->error = CC_SHA512_Init(&sha->ctx512);
break;
default:
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
}
2018-11-01 16:16:19 -07:00
if (!sha->error)
return MZ_HASH_ERROR;
sha->initialized = 1;
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_update(void *handle, const void *buf, int32_t size) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
2023-02-19 11:17:54 -08:00
if (!sha || !buf || !sha->initialized)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
switch (sha->algorithm) {
case MZ_HASH_SHA1:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA1_Update(&sha->ctx1, buf, size);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA224:
sha->error = CC_SHA224_Update(&sha->ctx256, buf, size);
break;
case MZ_HASH_SHA256:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA256_Update(&sha->ctx256, buf, size);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA384:
sha->error = CC_SHA384_Update(&sha->ctx512, buf, size);
break;
case MZ_HASH_SHA512:
sha->error = CC_SHA512_Update(&sha->ctx512, buf, size);
break;
}
2019-07-04 10:32:02 -07:00
2018-11-01 16:16:19 -07:00
if (!sha->error)
return MZ_HASH_ERROR;
return size;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_end(void *handle, uint8_t *digest, int32_t digest_size) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
2023-02-19 11:17:54 -08:00
if (!sha || !digest || !sha->initialized)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
if (digest_size < mz_crypt_sha_digest_size[sha->algorithm - MZ_HASH_SHA1])
return MZ_PARAM_ERROR;
2018-11-01 16:16:19 -07:00
2022-01-17 12:37:25 -07:00
switch (sha->algorithm) {
case MZ_HASH_SHA1:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA1_Final(digest, &sha->ctx1);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA224:
sha->error = CC_SHA224_Final(digest, &sha->ctx256);
break;
case MZ_HASH_SHA256:
2018-11-01 16:16:19 -07:00
sha->error = CC_SHA256_Final(digest, &sha->ctx256);
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA384:
sha->error = CC_SHA384_Final(digest, &sha->ctx512);
break;
case MZ_HASH_SHA512:
sha->error = CC_SHA512_Final(digest, &sha->ctx512);
break;
2018-11-01 16:16:19 -07:00
}
if (!sha->error)
return MZ_HASH_ERROR;
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_set_algorithm(void *handle, uint16_t algorithm) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
2022-01-17 12:37:25 -07:00
if (MZ_HASH_SHA1 <= algorithm && algorithm <= MZ_HASH_SHA512)
sha->algorithm = algorithm;
2018-11-01 16:16:19 -07:00
}
void *mz_crypt_sha_create(void) {
mz_crypt_sha *sha = (mz_crypt_sha *)calloc(1, sizeof(mz_crypt_sha));
2023-02-19 11:17:54 -08:00
if (sha) {
2018-11-01 16:16:19 -07:00
memset(sha, 0, sizeof(mz_crypt_sha));
sha->algorithm = MZ_HASH_SHA256;
}
return sha;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_delete(void **handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha *sha = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
2018-11-01 16:16:19 -07:00
return;
sha = (mz_crypt_sha *)*handle;
2023-02-19 11:17:54 -08:00
if (sha) {
2018-11-01 16:16:19 -07:00
mz_crypt_sha_reset(*handle);
free(sha);
2018-11-01 16:16:19 -07:00
}
*handle = NULL;
}
/***************************************************************************/
typedef struct mz_crypt_aes_s {
CCCryptorRef crypt;
int32_t mode;
int32_t error;
} mz_crypt_aes;
/***************************************************************************/
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_reset(void *handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
2023-02-19 11:17:54 -08:00
if (aes->crypt)
2018-11-01 16:16:19 -07:00
CCCryptorRelease(aes->crypt);
aes->crypt = NULL;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_encrypt(void *handle, uint8_t *buf, int32_t size) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
size_t data_moved = 0;
if (!aes || !buf || size % MZ_AES_BLOCK_SIZE != 0)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
if (aes->mode == MZ_AES_MODE_GCM)
aes->error = CCCryptorGCMEncrypt(aes->crypt, buf, size, buf);
else
aes->error = CCCryptorUpdate(aes->crypt, buf, size, buf, size, &data_moved);
2018-11-01 16:16:19 -07:00
if (aes->error != kCCSuccess)
return MZ_CRYPT_ERROR;
2018-11-01 16:16:19 -07:00
return size;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_decrypt(void *handle, uint8_t *buf, int32_t size) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
size_t data_moved = 0;
if (!aes || !buf || size % MZ_AES_BLOCK_SIZE != 0)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
if (aes->mode == MZ_AES_MODE_GCM)
aes->error = CCCryptorGCMDecrypt(aes->crypt, buf, size, buf);
else
aes->error = CCCryptorUpdate(aes->crypt, buf, size, buf, size, &data_moved);
2019-07-04 10:32:02 -07:00
2018-11-01 16:16:19 -07:00
if (aes->error != kCCSuccess)
return MZ_CRYPT_ERROR;
2018-11-01 16:16:19 -07:00
return size;
}
int32_t mz_crypt_aes_get_auth_tag(void *handle, uint8_t *tag, int32_t tag_size) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
size_t tag_length = (size_t)tag_size;
2018-11-01 16:16:19 -07:00
if (!aes || !tag || !tag_size)
2023-04-18 13:07:50 -07:00
return MZ_PARAM_ERROR;
aes->error = CCCryptorGCMFinal(aes->crypt, tag, &tag_length);
2018-11-01 16:16:19 -07:00
if (aes->error != kCCSuccess)
return MZ_CRYPT_ERROR;
2018-11-01 16:16:19 -07:00
return tag_size;
2018-11-01 16:16:19 -07:00
}
static int32_t mz_crypt_aes_set_key(void *handle, const void *key, int32_t key_length,
const void *iv, int32_t iv_length, CCOperation op) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
CCMode mode;
if (aes->mode == MZ_AES_MODE_CBC)
mode = kCCModeCBC;
else if (aes->mode == MZ_AES_MODE_ECB)
mode = kCCModeECB;
else if (aes->mode == MZ_AES_MODE_GCM)
mode = kCCModeGCM;
else
return MZ_PARAM_ERROR;
2018-11-01 16:16:19 -07:00
mz_crypt_aes_reset(handle);
aes->error = CCCryptorCreateWithMode(op, mode, kCCAlgorithmAES, ccNoPadding, iv, key, key_length,
NULL, 0, 0, 0, &aes->crypt);
2018-11-01 16:16:19 -07:00
if (aes->error != kCCSuccess)
return MZ_HASH_ERROR;
if (aes->mode == MZ_AES_MODE_GCM) {
aes->error = CCCryptorGCMAddIV(aes->crypt, iv, iv_length);
if (aes->error != kCCSuccess)
return MZ_HASH_ERROR;
}
return MZ_OK;
}
int32_t mz_crypt_aes_set_encrypt_key(void *handle, const void *key, int32_t key_length,
const void *iv, int32_t iv_length) {
return mz_crypt_aes_set_key(handle, key, key_length, iv, iv_length, kCCEncrypt);
}
int32_t mz_crypt_aes_set_decrypt_key(void *handle, const void *key, int32_t key_length,
const void *iv, int32_t iv_length) {
return mz_crypt_aes_set_key(handle, key, key_length, iv, iv_length, kCCDecrypt);
2018-11-01 16:16:19 -07:00
}
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_set_mode(void *handle, int32_t mode) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
aes->mode = mode;
}
void *mz_crypt_aes_create(void) {
mz_crypt_aes *aes = (mz_crypt_aes *)calloc(1, sizeof(mz_crypt_aes));
2018-11-01 16:16:19 -07:00
return aes;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_delete(void **handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes *aes = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
2018-11-01 16:16:19 -07:00
return;
aes = (mz_crypt_aes *)*handle;
2023-02-19 11:17:54 -08:00
if (aes) {
2018-11-01 16:16:19 -07:00
mz_crypt_aes_reset(*handle);
free(aes);
2018-11-01 16:16:19 -07:00
}
*handle = NULL;
}
/***************************************************************************/
typedef struct mz_crypt_hmac_s {
CCHmacContext ctx;
int32_t initialized;
int32_t error;
uint16_t algorithm;
} mz_crypt_hmac;
/***************************************************************************/
2020-06-14 15:19:14 -07:00
static void mz_crypt_hmac_free(void *handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
memset(&hmac->ctx, 0, sizeof(hmac->ctx));
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_reset(void *handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
mz_crypt_hmac_free(handle);
hmac->error = 0;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_init(void *handle, const void *key, int32_t key_length) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
CCHmacAlgorithm algorithm = 0;
2019-07-04 10:32:02 -07:00
2023-02-19 11:17:54 -08:00
if (!hmac || !key)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
2019-07-04 10:32:02 -07:00
2018-11-01 16:16:19 -07:00
mz_crypt_hmac_reset(handle);
if (hmac->algorithm == MZ_HASH_SHA1)
algorithm = kCCHmacAlgSHA1;
else if (hmac->algorithm == MZ_HASH_SHA256)
algorithm = kCCHmacAlgSHA256;
else
return MZ_PARAM_ERROR;
CCHmacInit(&hmac->ctx, algorithm, key, key_length);
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_update(void *handle, const void *buf, int32_t size) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
2023-02-19 11:17:54 -08:00
if (!hmac || !buf)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
CCHmacUpdate(&hmac->ctx, buf, size);
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_end(void *handle, uint8_t *digest, int32_t digest_size) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
2023-02-19 11:17:54 -08:00
if (!hmac || !digest)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
2020-06-14 15:19:14 -07:00
if (hmac->algorithm == MZ_HASH_SHA1) {
2018-11-01 16:16:19 -07:00
if (digest_size < MZ_HASH_SHA1_SIZE)
return MZ_BUF_ERROR;
CCHmacFinal(&hmac->ctx, digest);
2020-06-14 15:19:14 -07:00
} else {
2018-11-01 16:16:19 -07:00
if (digest_size < MZ_HASH_SHA256_SIZE)
return MZ_BUF_ERROR;
CCHmacFinal(&hmac->ctx, digest);
}
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_set_algorithm(void *handle, uint16_t algorithm) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
hmac->algorithm = algorithm;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_copy(void *src_handle, void *target_handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *source = (mz_crypt_hmac *)src_handle;
mz_crypt_hmac *target = (mz_crypt_hmac *)target_handle;
2023-02-19 11:17:54 -08:00
if (!source || !target)
2018-11-01 16:16:19 -07:00
return MZ_PARAM_ERROR;
memcpy(&target->ctx, &source->ctx, sizeof(CCHmacContext));
return MZ_OK;
}
void *mz_crypt_hmac_create(void) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)calloc(1, sizeof(mz_crypt_hmac));
if (hmac)
2018-11-01 16:16:19 -07:00
hmac->algorithm = MZ_HASH_SHA256;
return hmac;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_delete(void **handle) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac *hmac = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
2018-11-01 16:16:19 -07:00
return;
hmac = (mz_crypt_hmac *)*handle;
2023-02-19 11:17:54 -08:00
if (hmac) {
2018-11-01 16:16:19 -07:00
mz_crypt_hmac_free(*handle);
free(hmac);
2018-11-01 16:16:19 -07:00
}
*handle = NULL;
}