mirror of
https://github.com/zlib-ng/minizip-ng
synced 2025-03-28 21:13:18 +00:00
445 lines
10 KiB
C
445 lines
10 KiB
C
/* mz_crypt_brg.c -- Crypto/hash functions using Brian Gladman's library
|
|
Version 2.8.9, July 4, 2019
|
|
part of the MiniZip project
|
|
|
|
Copyright (C) 2010-2019 Nathan Moinvaziri
|
|
https://github.com/nmoinvaz/minizip
|
|
|
|
This program is distributed under the terms of the same license as zlib.
|
|
See the accompanying LICENSE file for the full text of the license.
|
|
*/
|
|
|
|
|
|
#include "mz.h"
|
|
#include "mz_os.h"
|
|
|
|
#if defined(HAVE_GETRANDOM)
|
|
# include <sys/random.h>
|
|
#endif
|
|
#if defined(HAVE_LIBBSD)
|
|
# include <sys/types.h>
|
|
# ifndef __u_char_defined
|
|
typedef unsigned char u_char;
|
|
# endif
|
|
# include <bsd/stdlib.h> /* arc4random_buf */
|
|
#endif
|
|
|
|
#include "aes.h"
|
|
#include "sha1.h"
|
|
#include "sha2.h"
|
|
#include "hmac.h"
|
|
|
|
/***************************************************************************/
|
|
|
|
#if defined(HAVE_ARC4RANDOM_BUF)
|
|
int32_t mz_crypt_rand(uint8_t *buf, int32_t size)
|
|
{
|
|
if (size < 0)
|
|
return 0;
|
|
arc4random_buf(buf, (uint32_t)size);
|
|
return size;
|
|
}
|
|
#elif defined(HAVE_ARC4RANDOM)
|
|
int32_t mz_crypt_rand(uint8_t *buf, int32_t size)
|
|
{
|
|
int32_t left = size;
|
|
for (; left > 2; left -= 3, buf += 3)
|
|
{
|
|
uint32_t val = arc4random();
|
|
|
|
buf[0] = (val) & 0xFF;
|
|
buf[1] = (val >> 8) & 0xFF;
|
|
buf[2] = (val >> 16) & 0xFF;
|
|
}
|
|
for (; left > 0; left--, buf++)
|
|
{
|
|
*buf = arc4random() & 0xFF;
|
|
}
|
|
return size - left;
|
|
}
|
|
#elif defined(HAVE_GETRANDOM)
|
|
int32_t mz_crypt_rand(uint8_t *buf, int32_t size)
|
|
{
|
|
int32_t left = size;
|
|
int32_t written = 0;
|
|
|
|
while (left > 0)
|
|
{
|
|
written = getrandom(buf, left, 0);
|
|
if (written < 0)
|
|
return MZ_INTERNAL_ERROR;
|
|
|
|
buf += written;
|
|
left -= written;
|
|
}
|
|
return size - left;
|
|
}
|
|
#else
|
|
#if !defined(FORCE_LOWQUALITY_ENTROPY)
|
|
#pragma message("Warning: Low quality entropy function used for encryption")
|
|
#endif
|
|
int32_t mz_crypt_rand(uint8_t *buf, int32_t size)
|
|
{
|
|
return mz_os_rand(buf, size);
|
|
}
|
|
#endif
|
|
|
|
/***************************************************************************/
|
|
|
|
typedef struct mz_crypt_sha_s {
|
|
sha256_ctx ctx256;
|
|
sha1_ctx ctx1;
|
|
int32_t initialized;
|
|
uint16_t algorithm;
|
|
} mz_crypt_sha;
|
|
|
|
/***************************************************************************/
|
|
|
|
void mz_crypt_sha_reset(void *handle)
|
|
{
|
|
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
|
sha->initialized = 0;
|
|
}
|
|
|
|
int32_t mz_crypt_sha_begin(void *handle)
|
|
{
|
|
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
|
|
|
if (sha == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
if (sha->algorithm == MZ_HASH_SHA1)
|
|
sha1_begin(&sha->ctx1);
|
|
else
|
|
sha256_begin(&sha->ctx256);
|
|
|
|
sha->initialized = 1;
|
|
return MZ_OK;
|
|
}
|
|
|
|
int32_t mz_crypt_sha_update(void *handle, const void *buf, int32_t size)
|
|
{
|
|
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
|
|
|
if (sha == NULL || buf == NULL || !sha->initialized)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
if (sha->algorithm == MZ_HASH_SHA1)
|
|
sha1_hash(buf, size, &sha->ctx1);
|
|
else
|
|
sha256_hash(buf, size, &sha->ctx256);
|
|
|
|
return size;
|
|
}
|
|
|
|
int32_t mz_crypt_sha_end(void *handle, uint8_t *digest, int32_t digest_size)
|
|
{
|
|
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
|
|
|
if (sha == NULL || digest == NULL || !sha->initialized)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
if (sha->algorithm == MZ_HASH_SHA1)
|
|
{
|
|
if (digest_size < MZ_HASH_SHA1_SIZE)
|
|
return MZ_BUF_ERROR;
|
|
sha1_end(digest, &sha->ctx1);
|
|
}
|
|
else
|
|
{
|
|
if (digest_size < MZ_HASH_SHA256_SIZE)
|
|
return MZ_BUF_ERROR;
|
|
sha256_end(digest, &sha->ctx256);
|
|
}
|
|
|
|
return MZ_OK;
|
|
}
|
|
|
|
void mz_crypt_sha_set_algorithm(void *handle, uint16_t algorithm)
|
|
{
|
|
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
|
sha->algorithm = algorithm;
|
|
}
|
|
|
|
void *mz_crypt_sha_create(void **handle)
|
|
{
|
|
mz_crypt_sha *sha = NULL;
|
|
|
|
sha = (mz_crypt_sha *)MZ_ALLOC(sizeof(mz_crypt_sha));
|
|
if (sha != NULL)
|
|
{
|
|
memset(sha, 0, sizeof(mz_crypt_sha));
|
|
sha->algorithm = MZ_HASH_SHA256;
|
|
}
|
|
if (handle != NULL)
|
|
*handle = sha;
|
|
|
|
return sha;
|
|
}
|
|
|
|
void mz_crypt_sha_delete(void **handle)
|
|
{
|
|
mz_crypt_sha *sha = NULL;
|
|
if (handle == NULL)
|
|
return;
|
|
sha = (mz_crypt_sha *)*handle;
|
|
if (sha != NULL)
|
|
{
|
|
mz_crypt_sha_reset(*handle);
|
|
MZ_FREE(sha);
|
|
}
|
|
*handle = NULL;
|
|
}
|
|
|
|
/***************************************************************************/
|
|
|
|
typedef struct mz_crypt_aes_s {
|
|
aes_encrypt_ctx encrypt_ctx;
|
|
aes_decrypt_ctx decrypt_ctx;
|
|
int32_t mode;
|
|
int32_t error;
|
|
} mz_crypt_aes;
|
|
|
|
/***************************************************************************/
|
|
|
|
void mz_crypt_aes_reset(void *handle)
|
|
{
|
|
MZ_UNUSED(handle);
|
|
}
|
|
|
|
int32_t mz_crypt_aes_encrypt(void *handle, uint8_t *buf, int32_t size)
|
|
{
|
|
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
|
|
|
|
if (aes == NULL || buf == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
if (size != MZ_AES_BLOCK_SIZE)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
aes->error = aes_encrypt(buf, buf, &aes->encrypt_ctx);
|
|
if (aes->error)
|
|
return MZ_CRYPT_ERROR;
|
|
return size;
|
|
}
|
|
|
|
int32_t mz_crypt_aes_decrypt(void *handle, uint8_t *buf, int32_t size)
|
|
{
|
|
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
|
|
if (aes == NULL || buf == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
if (size != MZ_AES_BLOCK_SIZE)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
aes->error = aes_decrypt(buf, buf, &aes->decrypt_ctx);
|
|
if (aes->error)
|
|
return MZ_CRYPT_ERROR;
|
|
return size;
|
|
}
|
|
|
|
int32_t mz_crypt_aes_set_encrypt_key(void *handle, const void *key, int32_t key_length)
|
|
{
|
|
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
|
|
|
|
|
|
if (aes == NULL || key == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
mz_crypt_aes_reset(handle);
|
|
|
|
aes->error = aes_encrypt_key(key, key_length, &aes->encrypt_ctx);
|
|
if (aes->error)
|
|
return MZ_HASH_ERROR;
|
|
|
|
return MZ_OK;
|
|
}
|
|
|
|
int32_t mz_crypt_aes_set_decrypt_key(void *handle, const void *key, int32_t key_length)
|
|
{
|
|
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
|
|
|
|
|
|
if (aes == NULL || key == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
mz_crypt_aes_reset(handle);
|
|
|
|
aes->error = aes_decrypt_key(key, key_length, &aes->decrypt_ctx);
|
|
if (aes->error)
|
|
return MZ_HASH_ERROR;
|
|
|
|
return MZ_OK;
|
|
}
|
|
|
|
void mz_crypt_aes_set_mode(void *handle, int32_t mode)
|
|
{
|
|
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
|
|
aes->mode = mode;
|
|
}
|
|
|
|
void *mz_crypt_aes_create(void **handle)
|
|
{
|
|
mz_crypt_aes *aes = NULL;
|
|
|
|
aes = (mz_crypt_aes *)MZ_ALLOC(sizeof(mz_crypt_aes));
|
|
if (aes != NULL)
|
|
memset(aes, 0, sizeof(mz_crypt_aes));
|
|
if (handle != NULL)
|
|
*handle = aes;
|
|
|
|
return aes;
|
|
}
|
|
|
|
void mz_crypt_aes_delete(void **handle)
|
|
{
|
|
mz_crypt_aes *aes = NULL;
|
|
if (handle == NULL)
|
|
return;
|
|
aes = (mz_crypt_aes *)*handle;
|
|
if (aes != NULL)
|
|
MZ_FREE(aes);
|
|
*handle = NULL;
|
|
}
|
|
|
|
/***************************************************************************/
|
|
|
|
typedef struct mz_crypt_hmac_s {
|
|
hmac_ctx ctx;
|
|
int32_t initialized;
|
|
int32_t error;
|
|
uint16_t algorithm;
|
|
} mz_crypt_hmac;
|
|
|
|
/***************************************************************************/
|
|
|
|
void mz_crypt_hmac_reset(void *handle)
|
|
{
|
|
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
|
|
hmac->error = 0;
|
|
}
|
|
|
|
int32_t mz_crypt_hmac_init(void *handle, const void *key, int32_t key_length)
|
|
{
|
|
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
|
|
|
|
if (hmac == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
mz_crypt_hmac_reset(handle);
|
|
|
|
if (hmac->algorithm == MZ_HASH_SHA1)
|
|
hmac_sha_begin(HMAC_SHA1, &hmac->ctx);
|
|
else
|
|
hmac_sha_begin(HMAC_SHA256, &hmac->ctx);
|
|
|
|
hmac_sha_key(key, key_length, &hmac->ctx);
|
|
|
|
return MZ_OK;
|
|
}
|
|
|
|
int32_t mz_crypt_hmac_update(void *handle, const void *buf, int32_t size)
|
|
{
|
|
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
|
|
|
|
if (hmac == NULL || buf == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
hmac_sha_data(buf, size, &hmac->ctx);
|
|
return MZ_OK;
|
|
}
|
|
|
|
int32_t mz_crypt_hmac_end(void *handle, uint8_t *digest, int32_t digest_size)
|
|
{
|
|
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
|
|
|
|
if (hmac == NULL || digest == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
if (hmac->algorithm == MZ_HASH_SHA1)
|
|
{
|
|
if (digest_size < MZ_HASH_SHA1_SIZE)
|
|
return MZ_BUF_ERROR;
|
|
hmac_sha_end(digest, digest_size, &hmac->ctx);
|
|
}
|
|
else
|
|
{
|
|
if (digest_size < MZ_HASH_SHA256_SIZE)
|
|
return MZ_BUF_ERROR;
|
|
hmac_sha_end(digest, digest_size, &hmac->ctx);
|
|
}
|
|
|
|
return MZ_OK;
|
|
}
|
|
|
|
void mz_crypt_hmac_set_algorithm(void *handle, uint16_t algorithm)
|
|
{
|
|
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
|
|
hmac->algorithm = algorithm;
|
|
}
|
|
|
|
int32_t mz_crypt_hmac_copy(void *src_handle, void *target_handle)
|
|
{
|
|
mz_crypt_hmac *source = (mz_crypt_hmac *)src_handle;
|
|
mz_crypt_hmac *target = (mz_crypt_hmac *)target_handle;
|
|
|
|
if (target == NULL || source == NULL)
|
|
return MZ_PARAM_ERROR;
|
|
|
|
memcpy(&target->ctx, &source->ctx, sizeof(hmac_ctx));
|
|
return MZ_OK;
|
|
}
|
|
|
|
void *mz_crypt_hmac_create(void **handle)
|
|
{
|
|
mz_crypt_hmac *hmac = NULL;
|
|
|
|
hmac = (mz_crypt_hmac *)MZ_ALLOC(sizeof(mz_crypt_hmac));
|
|
if (hmac != NULL)
|
|
{
|
|
memset(hmac, 0, sizeof(mz_crypt_hmac));
|
|
hmac->algorithm = MZ_HASH_SHA256;
|
|
}
|
|
if (handle != NULL)
|
|
*handle = hmac;
|
|
|
|
return hmac;
|
|
}
|
|
|
|
void mz_crypt_hmac_delete(void **handle)
|
|
{
|
|
mz_crypt_hmac *hmac = NULL;
|
|
if (handle == NULL)
|
|
return;
|
|
hmac = (mz_crypt_hmac *)*handle;
|
|
if (hmac != NULL)
|
|
MZ_FREE(hmac);
|
|
*handle = NULL;
|
|
}
|
|
|
|
/***************************************************************************/
|
|
|
|
#if defined(MZ_ZIP_SIGNING)
|
|
int32_t mz_crypt_sign(uint8_t *message, int32_t message_size, uint8_t *cert_data, int32_t cert_data_size,
|
|
const char *cert_pwd, uint8_t **signature, int32_t *signature_size)
|
|
{
|
|
MZ_UNUSED(message);
|
|
MZ_UNUSED(message_size);
|
|
MZ_UNUSED(cert_data);
|
|
MZ_UNUSED(cert_data_size);
|
|
MZ_UNUSED(cert_pwd);
|
|
MZ_UNUSED(signature);
|
|
MZ_UNUSED(signature_size);
|
|
|
|
return MZ_SUPPORT_ERROR;
|
|
}
|
|
|
|
int32_t mz_crypt_sign_verify(uint8_t *message, int32_t message_size, uint8_t *signature, int32_t signature_size)
|
|
{
|
|
MZ_UNUSED(message);
|
|
MZ_UNUSED(message_size);
|
|
MZ_UNUSED(signature);
|
|
MZ_UNUSED(signature_size);
|
|
|
|
return MZ_SUPPORT_ERROR;
|
|
}
|
|
#endif
|