| 1 | /* crypt.h -- base code for crypt/uncrypt ZIPfile | 
 
 
 
 
 | 2 |  | 
 
 
 
 
 | 3 |  | 
 
 
 
 
 | 4 | Version 1.01e, February 12th, 2005 | 
 
 
 
 
 | 5 |  | 
 
 
 
 
 | 6 | Copyright (C) 1998-2005 Gilles Vollant | 
 
 
 
 
 | 7 |  | 
 
 
 
 
 | 8 | This code is a modified version of crypting code in Infozip distribution | 
 
 
 
 
 | 9 |  | 
 
 
 
 
 | 10 | The encryption/decryption parts of this source code (as opposed to the | 
 
 
 
 
 | 11 | non-echoing password parts) were originally written in Europe.  The | 
 
 
 
 
 | 12 | whole source package can be freely distributed, including from the USA. | 
 
 
 
 
 | 13 | (Prior to January 2000, re-export from the US was a violation of US law.) | 
 
 
 
 
 | 14 |  | 
 
 
 
 
 | 15 | This encryption code is a direct transcription of the algorithm from | 
 
 
 
 
 | 16 | Roger Schlafly, described by Phil Katz in the file appnote.txt.  This | 
 
 
 
 
 | 17 | file (appnote.txt) is distributed with the PKZIP program (even in the | 
 
 
 
 
 | 18 | version without encryption capabilities). | 
 
 
 
 
 | 19 |  | 
 
 
 
 
 | 20 | If you don't need crypting in your application, just define symbols | 
 
 
 
 
 | 21 | NOCRYPT and NOUNCRYPT. | 
 
 
 
 
 | 22 |  | 
 
 
 
 
 | 23 | This code support the "Traditional PKWARE Encryption". | 
 
 
 
 
 | 24 |  | 
 
 
 
 
 | 25 | The new AES encryption added on Zip format by Winzip (see the page | 
 
 
 
 
 | 26 | http://www.winzip.com/aes_info.htm ) and PKWare PKZip 5.x Strong | 
 
 
 
 
 | 27 | Encryption is not supported. | 
 
 
 
 
 | 28 | */ | 
 
 
 
 
 | 29 |  | 
 
 
 
 
 | 30 | #include "quazip_global.h" | 
 
 
 
 
 | 31 |  | 
 
 
 
 
 | 32 | #define CRC32(c, b) ((*(pcrc_32_tab+(((int)(c) ^ (b)) & 0xff))) ^ ((c) >> 8)) | 
 
 
 
 
 | 33 |  | 
 
 
 
 
 | 34 | /*********************************************************************** | 
 
 
 
 
 | 35 | * Return the next byte in the pseudo-random sequence | 
 
 
 
 
 | 36 | */ | 
 
 
 
 
 | 37 | static int decrypt_byte(unsigned long* pkeys, const z_crc_t FAR * pcrc_32_tab UNUSED) | 
 
 
 
 
 | 38 | { | 
 
 
 
 
 | 39 | //(void) pcrc_32_tab; /* avoid "unused parameter" warning */ | 
 
 
 
 
 | 40 | unsigned temp;  /* POTENTIAL BUG:  temp*(temp^1) may overflow in an | 
 
 
 
 
 | 41 | * unpredictable manner on 16-bit systems; not a problem | 
 
 
 
 
 | 42 | * with any known compiler so far, though */ | 
 
 
 
 
 | 43 |  | 
 
 
 
 
 | 44 | temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; | 
 
 
 
 
 | 45 | return (int)(((temp * (temp ^ 1)) >> 8) & 0xff); | 
 
 
 
 
 | 46 | } | 
 
 
 
 
 | 47 |  | 
 
 
 
 
 | 48 | /*********************************************************************** | 
 
 
 
 
 | 49 | * Update the encryption keys with the next byte of plain text | 
 
 
 
 
 | 50 | */ | 
 
 
 
 
 | 51 | static int update_keys(unsigned long* pkeys,const z_crc_t FAR * pcrc_32_tab,int c) | 
 
 
 
 
 | 52 | { | 
 
 
 
 
 | 53 | (*(pkeys+0)) = CRC32((*(pkeys+0)), c); | 
 
 
 
 
 | 54 | (*(pkeys+1)) += (*(pkeys+0)) & 0xff; | 
 
 
 
 
 | 55 | (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; | 
 
 
 
 
 | 56 | { | 
 
 
 
 
 | 57 | register int keyshift = (int)((*(pkeys+1)) >> 24); | 
 
 
 
 
 | 58 | (*(pkeys+2)) = CRC32((*(pkeys+2)), keyshift); | 
 
 
 
 
 | 59 | } | 
 
 
 
 
 | 60 | return c; | 
 
 
 
 
 | 61 | } | 
 
 
 
 
 | 62 |  | 
 
 
 
 
 | 63 |  | 
 
 
 
 
 | 64 | /*********************************************************************** | 
 
 
 
 
 | 65 | * Initialize the encryption keys and the random header according to | 
 
 
 
 
 | 66 | * the given password. | 
 
 
 
 
 | 67 | */ | 
 
 
 
 
 | 68 | static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t FAR * pcrc_32_tab) | 
 
 
 
 
 | 69 | { | 
 
 
 
 
 | 70 | *(pkeys+0) = 305419896L; | 
 
 
 
 
 | 71 | *(pkeys+1) = 591751049L; | 
 
 
 
 
 | 72 | *(pkeys+2) = 878082192L; | 
 
 
 
 
 | 73 | while (*passwd != '\0') { | 
 
 
 
 
 | 74 | update_keys(pkeys,pcrc_32_tab,(int)*passwd); | 
 
 
 
 
 | 75 | passwd++; | 
 
 
 
 
 | 76 | } | 
 
 
 
 
 | 77 | } | 
 
 
 
 
 | 78 |  | 
 
 
 
 
 | 79 | #define zdecode(pkeys,pcrc_32_tab,c) \ | 
 
 
 
 
 | 80 | (update_keys(pkeys,pcrc_32_tab,c ^= decrypt_byte(pkeys,pcrc_32_tab))) | 
 
 
 
 
 | 81 |  | 
 
 
 
 
 | 82 | #define zencode(pkeys,pcrc_32_tab,c,t) \ | 
 
 
 
 
 | 83 | (t=decrypt_byte(pkeys,pcrc_32_tab), update_keys(pkeys,pcrc_32_tab,c), t^(c)) | 
 
 
 
 
 | 84 |  | 
 
 
 
 
 | 85 | #ifdef INCLUDECRYPTINGCODE_IFCRYPTALLOWED | 
 
 
 
 
 | 86 |  | 
 
 
 
 
 | 87 | #define RAND_HEAD_LEN  12 | 
 
 
 
 
 | 88 | /* "last resort" source for second part of crypt seed pattern */ | 
 
 
 
 
 | 89 | #  ifndef ZCR_SEED2 | 
 
 
 
 
 | 90 | #    define ZCR_SEED2 3141592654UL     /* use PI as default pattern */ | 
 
 
 
 
 | 91 | #  endif | 
 
 
 
 
 | 92 |  | 
 
 
 
 
 | 93 | static int crypthead(passwd, buf, bufSize, pkeys, pcrc_32_tab, crcForCrypting) | 
 
 
 
 
 | 94 | const char *passwd;         /* password string */ | 
 
 
 
 
 | 95 | unsigned char *buf;         /* where to write header */ | 
 
 
 
 
 | 96 | int bufSize; | 
 
 
 
 
 | 97 | unsigned long* pkeys; | 
 
 
 
 
 | 98 | const z_crc_t FAR * pcrc_32_tab; | 
 
 
 
 
 | 99 | unsigned long crcForCrypting; | 
 
 
 
 
 | 100 | { | 
 
 
 
 
 | 101 | int n;                       /* index in random header */ | 
 
 
 
 
 | 102 | int t;                       /* temporary */ | 
 
 
 
 
 | 103 | int c;                       /* random byte */ | 
 
 
 
 
 | 104 | unsigned char header[RAND_HEAD_LEN-2]; /* random header */ | 
 
 
 
 
 | 105 | static unsigned calls = 0;   /* ensure different random header each time */ | 
 
 
 
 
 | 106 |  | 
 
 
 
 
 | 107 | if (bufSize<RAND_HEAD_LEN) | 
 
 
 
 
 | 108 | return 0; | 
 
 
 
 
 | 109 |  | 
 
 
 
 
 | 110 | /* First generate RAND_HEAD_LEN-2 random bytes. We encrypt the | 
 
 
 
 
 | 111 | * output of rand() to get less predictability, since rand() is | 
 
 
 
 
 | 112 | * often poorly implemented. | 
 
 
 
 
 | 113 | */ | 
 
 
 
 
 | 114 | if (++calls == 1) | 
 
 
 
 
 | 115 | { | 
 
 
 
 
 | 116 | srand((unsigned)(time(NULL) ^ ZCR_SEED2)); | 
 
 
 
 
 | 117 | } | 
 
 
 
 
 | 118 | init_keys(passwd, pkeys, pcrc_32_tab); | 
 
 
 
 
 | 119 | for (n = 0; n < RAND_HEAD_LEN-2; n++) | 
 
 
 
 
 | 120 | { | 
 
 
 
 
 | 121 | c = (rand() >> 7) & 0xff; | 
 
 
 
 
 | 122 | header[n] = (unsigned char)zencode(pkeys, pcrc_32_tab, c, t); | 
 
 
 
 
 | 123 | } | 
 
 
 
 
 | 124 | /* Encrypt random header (last two bytes is high word of crc) */ | 
 
 
 
 
 | 125 | init_keys(passwd, pkeys, pcrc_32_tab); | 
 
 
 
 
 | 126 | for (n = 0; n < RAND_HEAD_LEN-2; n++) | 
 
 
 
 
 | 127 | { | 
 
 
 
 
 | 128 | buf[n] = (unsigned char)zencode(pkeys, pcrc_32_tab, header[n], t); | 
 
 
 
 
 | 129 | } | 
 
 
 
 
 | 130 | buf[n++] = zencode(pkeys, pcrc_32_tab, (int)(crcForCrypting >> 16) & 0xff, t); | 
 
 
 
 
 | 131 | buf[n++] = zencode(pkeys, pcrc_32_tab, (int)(crcForCrypting >> 24) & 0xff, t); | 
 
 
 
 
 | 132 | return n; | 
 
 
 
 
 | 133 | } | 
 
 
 
 
 | 134 |  | 
 
 
 
 
 | 135 | #endif |