XADMaster/XADWinZipAESHandle.m
2018-03-21 14:24:50 +02:00

146 lines
3.6 KiB
Objective-C

/*
* XADWinZipAESHandle.m
*
* Copyright (c) 2017-present, MacPaw Inc. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301 USA
*/
#import "XADWinZipAESHandle.h"
#import "XADException.h"
@implementation XADWinZipAESHandle
-(id)initWithHandle:(CSHandle *)handle length:(off_t)length password:(NSData *)passdata keyLength:(int)keylength
{
off_t actuallength=length-keylength/2-12;
if(self=[super initWithParentHandle:handle length:actuallength])
{
password=[passdata retain];
keybytes=keylength;
startoffs=[handle offsetInFile];
hmac_done=hmac_correct=NO;
}
return self;
}
-(void)dealloc
{
[password release];
[super dealloc];
}
static void DeriveKey(NSData *password,NSData *salt,int iterations,uint8_t *keybuffer,int keylength)
{
int blocks=(keylength+19)/20;
// memset(keybuffer,0,keylength);
for(int i=0;i<blocks;i++)
{
HMAC_SHA1_CTX hmac;
uint8_t counter[4]={(i+1)>>24,(i+1)>>16,(i+1)>>8,i+1};
uint8_t buffer[20];
HMAC_SHA1_Init(&hmac);
HMAC_SHA1_UpdateKey(&hmac,[password bytes],[password length]);
HMAC_SHA1_EndKey(&hmac);
HMAC_SHA1_StartMessage(&hmac);
HMAC_SHA1_UpdateMessage(&hmac,[salt bytes],[salt length]);
HMAC_SHA1_UpdateMessage(&hmac,counter,4);
HMAC_SHA1_EndMessage(buffer,&hmac);
int blocklen=20;
if(blocklen+i*20>keylength) blocklen=keylength-i*20;
memcpy(keybuffer,buffer,blocklen);
for(int j=1;j<iterations;j++)
{
HMAC_SHA1_Init(&hmac);
HMAC_SHA1_UpdateKey(&hmac,[password bytes],[password length]);
HMAC_SHA1_EndKey(&hmac);
HMAC_SHA1_StartMessage(&hmac);
HMAC_SHA1_UpdateMessage(&hmac,buffer,20);
HMAC_SHA1_EndMessage(buffer,&hmac);
for(int k=0;k<blocklen;k++) keybuffer[k]^=buffer[k];
}
keybuffer+=20;
}
}
-(void)resetStream
{
[parent seekToFileOffset:startoffs];
uint8_t keybuf[2*keybytes+2];
DeriveKey(password,[parent readDataOfLength:keybytes/2],1000,keybuf,sizeof(keybuf));
if([parent readUInt16LE]!=keybuf[2*keybytes]+(keybuf[2*keybytes+1]<<8)) [XADException raisePasswordException];
aes_encrypt_key(keybuf,keybytes*8,&aes);
memset(counter,0,16);
HMAC_SHA1_Init(&hmac);
HMAC_SHA1_UpdateKey(&hmac,keybuf+keybytes,keybytes);
HMAC_SHA1_EndKey(&hmac);
HMAC_SHA1_StartMessage(&hmac);
hmac_done=NO;
hmac_correct=NO;
}
-(int)streamAtMost:(int)num toBuffer:(void *)buffer
{
int actual=[parent readAtMost:num toBuffer:buffer];
HMAC_SHA1_UpdateMessage(&hmac,buffer,actual);
for(int i=0;i<actual;i++)
{
int bufoffs=(i+streampos)%16;
if(bufoffs==0)
{
for(int i=0;i<8;i++) if(++counter[i]!=0) break;
aes_encrypt(counter,aesbuffer,&aes);
}
((uint8_t *)buffer)[i]^=aesbuffer[bufoffs];
}
return actual;
}
-(BOOL)hasChecksum { return YES; }
-(BOOL)isChecksumCorrect
{
if(!hmac_done && streampos==streamlength)
{
uint8_t filedigest[10],calcdigest[20];
[parent readBytes:10 toBuffer:filedigest];
HMAC_SHA1_EndMessage(calcdigest,&hmac);
hmac_correct=memcmp(calcdigest,filedigest,10)==0;
hmac_done=YES;
}
return hmac_correct;
}
@end