123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455 |
- // ZipCrypto.cs
- // ------------------------------------------------------------------
- //
- // Copyright (c) 2008, 2009, 2011 Dino Chiesa
- // All rights reserved.
- //
- // This code module is part of DotNetZip, a zipfile class library.
- //
- // ------------------------------------------------------------------
- //
- // This code is licensed under the Microsoft Public License.
- // See the file License.txt for the license details.
- // More info on: http://dotnetzip.codeplex.com
- //
- // ------------------------------------------------------------------
- //
- // last saved (in emacs):
- // Time-stamp: <2011-July-28 06:30:59>
- //
- // ------------------------------------------------------------------
- //
- // This module provides the implementation for "traditional" Zip encryption.
- //
- // Created Tue Apr 15 17:39:56 2008
- //
- // ------------------------------------------------------------------
- using System;
- namespace Ionic.Zip
- {
- /// <summary>
- /// This class implements the "traditional" or "classic" PKZip encryption,
- /// which today is considered to be weak. On the other hand it is
- /// ubiquitous. This class is intended for use only by the DotNetZip
- /// library.
- /// </summary>
- ///
- /// <remarks>
- /// Most uses of the DotNetZip library will not involve direct calls into
- /// the ZipCrypto class. Instead, the ZipCrypto class is instantiated and
- /// used by the ZipEntry() class when encryption or decryption on an entry
- /// is employed. If for some reason you really wanted to use a weak
- /// encryption algorithm in some other application, you might use this
- /// library. But you would be much better off using one of the built-in
- /// strong encryption libraries in the .NET Framework, like the AES
- /// algorithm or SHA.
- /// </remarks>
- internal class ZipCrypto
- {
- /// <summary>
- /// The default constructor for ZipCrypto.
- /// </summary>
- ///
- /// <remarks>
- /// This class is intended for internal use by the library only. It's
- /// probably not useful to you. Seriously. Stop reading this
- /// documentation. It's a waste of your time. Go do something else.
- /// Check the football scores. Go get an ice cream with a friend.
- /// Seriously.
- /// </remarks>
- ///
- private ZipCrypto() { }
- public static ZipCrypto ForWrite(string password)
- {
- ZipCrypto z = new ZipCrypto();
- if (password == null)
- throw new BadPasswordException("This entry requires a password.");
- z.InitCipher(password);
- return z;
- }
- public static ZipCrypto ForRead(string password, ZipEntry e)
- {
- System.IO.Stream s = e._archiveStream;
- e._WeakEncryptionHeader = new byte[12];
- byte[] eh = e._WeakEncryptionHeader;
- ZipCrypto z = new ZipCrypto();
- if (password == null)
- throw new BadPasswordException("This entry requires a password.");
- z.InitCipher(password);
- ZipEntry.ReadWeakEncryptionHeader(s, eh);
- // Decrypt the header. This has a side effect of "further initializing the
- // encryption keys" in the traditional zip encryption.
- byte[] DecryptedHeader = z.DecryptMessage(eh, eh.Length);
- // CRC check
- // According to the pkzip spec, the final byte in the decrypted header
- // is the highest-order byte in the CRC. We check it here.
- if (DecryptedHeader[11] != (byte)((e._Crc32 >> 24) & 0xff))
- {
- // In the case that bit 3 of the general purpose bit flag is set to
- // indicate the presence of an 'Extended File Header' or a 'data
- // descriptor' (signature 0x08074b50), the last byte of the decrypted
- // header is sometimes compared with the high-order byte of the
- // lastmodified time, rather than the high-order byte of the CRC, to
- // verify the password.
- //
- // This is not documented in the PKWare Appnote.txt. It was
- // discovered this by analysis of the Crypt.c source file in the
- // InfoZip library http://www.info-zip.org/pub/infozip/
- //
- // The reason for this is that the CRC for a file cannot be known
- // until the entire contents of the file have been streamed. This
- // means a tool would have to read the file content TWICE in its
- // entirety in order to perform PKZIP encryption - once to compute
- // the CRC, and again to actually encrypt.
- //
- // This is so important for performance that using the timeblob as
- // the verification should be the standard practice for DotNetZip
- // when using PKZIP encryption. This implies that bit 3 must be
- // set. The downside is that some tools still cannot cope with ZIP
- // files that use bit 3. Therefore, DotNetZip DOES NOT force bit 3
- // when PKZIP encryption is in use, and instead, reads the stream
- // twice.
- //
- if ((e._BitField & 0x0008) != 0x0008)
- {
- throw new BadPasswordException("The password did not match.");
- }
- else if (DecryptedHeader[11] != (byte)((e._TimeBlob >> 8) & 0xff))
- {
- throw new BadPasswordException("The password did not match.");
- }
- // We have a good password.
- }
- else
- {
- // A-OK
- }
- return z;
- }
- /// <summary>
- /// From AppNote.txt:
- /// unsigned char decrypt_byte()
- /// local unsigned short temp
- /// temp :=- Key(2) | 2
- /// decrypt_byte := (temp * (temp ^ 1)) bitshift-right 8
- /// end decrypt_byte
- /// </summary>
- private byte MagicByte
- {
- get
- {
- UInt16 t = (UInt16)((UInt16)(_Keys[2] & 0xFFFF) | 2);
- return (byte)((t * (t ^ 1)) >> 8);
- }
- }
- // Decrypting:
- // From AppNote.txt:
- // loop for i from 0 to 11
- // C := buffer(i) ^ decrypt_byte()
- // update_keys(C)
- // buffer(i) := C
- // end loop
- /// <summary>
- /// Call this method on a cipher text to render the plaintext. You must
- /// first initialize the cipher with a call to InitCipher.
- /// </summary>
- ///
- /// <example>
- /// <code>
- /// var cipher = new ZipCrypto();
- /// cipher.InitCipher(Password);
- /// // Decrypt the header. This has a side effect of "further initializing the
- /// // encryption keys" in the traditional zip encryption.
- /// byte[] DecryptedMessage = cipher.DecryptMessage(EncryptedMessage);
- /// </code>
- /// </example>
- ///
- /// <param name="cipherText">The encrypted buffer.</param>
- /// <param name="length">
- /// The number of bytes to encrypt.
- /// Should be less than or equal to CipherText.Length.
- /// </param>
- ///
- /// <returns>The plaintext.</returns>
- public byte[] DecryptMessage(byte[] cipherText, int length)
- {
- if (cipherText == null)
- throw new ArgumentNullException("cipherText");
- if (length > cipherText.Length)
- throw new ArgumentOutOfRangeException("length",
- "Bad length during Decryption: the length parameter must be smaller than or equal to the size of the destination array.");
- byte[] plainText = new byte[length];
- for (int i = 0; i < length; i++)
- {
- byte C = (byte)(cipherText[i] ^ MagicByte);
- UpdateKeys(C);
- plainText[i] = C;
- }
- return plainText;
- }
- /// <summary>
- /// This is the converse of DecryptMessage. It encrypts the plaintext
- /// and produces a ciphertext.
- /// </summary>
- ///
- /// <param name="plainText">The plain text buffer.</param>
- ///
- /// <param name="length">
- /// The number of bytes to encrypt.
- /// Should be less than or equal to plainText.Length.
- /// </param>
- ///
- /// <returns>The ciphertext.</returns>
- public byte[] EncryptMessage(byte[] plainText, int length)
- {
- if (plainText == null)
- throw new ArgumentNullException("plaintext");
- if (length > plainText.Length)
- throw new ArgumentOutOfRangeException("length",
- "Bad length during Encryption: The length parameter must be smaller than or equal to the size of the destination array.");
- byte[] cipherText = new byte[length];
- for (int i = 0; i < length; i++)
- {
- byte C = plainText[i];
- cipherText[i] = (byte)(plainText[i] ^ MagicByte);
- UpdateKeys(C);
- }
- return cipherText;
- }
- /// <summary>
- /// This initializes the cipher with the given password.
- /// See AppNote.txt for details.
- /// </summary>
- ///
- /// <param name="passphrase">
- /// The passphrase for encrypting or decrypting with this cipher.
- /// </param>
- ///
- /// <remarks>
- /// <code>
- /// Step 1 - Initializing the encryption keys
- /// -----------------------------------------
- /// Start with these keys:
- /// Key(0) := 305419896 (0x12345678)
- /// Key(1) := 591751049 (0x23456789)
- /// Key(2) := 878082192 (0x34567890)
- ///
- /// Then, initialize the keys with a password:
- ///
- /// loop for i from 0 to length(password)-1
- /// update_keys(password(i))
- /// end loop
- ///
- /// Where update_keys() is defined as:
- ///
- /// update_keys(char):
- /// Key(0) := crc32(key(0),char)
- /// Key(1) := Key(1) + (Key(0) bitwiseAND 000000ffH)
- /// Key(1) := Key(1) * 134775813 + 1
- /// Key(2) := crc32(key(2),key(1) rightshift 24)
- /// end update_keys
- ///
- /// Where crc32(old_crc,char) is a routine that given a CRC value and a
- /// character, returns an updated CRC value after applying the CRC-32
- /// algorithm described elsewhere in this document.
- ///
- /// </code>
- ///
- /// <para>
- /// After the keys are initialized, then you can use the cipher to
- /// encrypt the plaintext.
- /// </para>
- ///
- /// <para>
- /// Essentially we encrypt the password with the keys, then discard the
- /// ciphertext for the password. This initializes the keys for later use.
- /// </para>
- ///
- /// </remarks>
- public void InitCipher(string passphrase)
- {
- byte[] p = SharedUtilities.StringToByteArray(passphrase);
- for (int i = 0; i < passphrase.Length; i++)
- UpdateKeys(p[i]);
- }
- private void UpdateKeys(byte byteValue)
- {
- _Keys[0] = (UInt32)crc32.ComputeCrc32((int)_Keys[0], byteValue);
- _Keys[1] = _Keys[1] + (byte)_Keys[0];
- _Keys[1] = _Keys[1] * 0x08088405 + 1;
- _Keys[2] = (UInt32)crc32.ComputeCrc32((int)_Keys[2], (byte)(_Keys[1] >> 24));
- }
- ///// <summary>
- ///// The byte array representing the seed keys used.
- ///// Get this after calling InitCipher. The 12 bytes represents
- ///// what the zip spec calls the "EncryptionHeader".
- ///// </summary>
- //public byte[] KeyHeader
- //{
- // get
- // {
- // byte[] result = new byte[12];
- // result[0] = (byte)(_Keys[0] & 0xff);
- // result[1] = (byte)((_Keys[0] >> 8) & 0xff);
- // result[2] = (byte)((_Keys[0] >> 16) & 0xff);
- // result[3] = (byte)((_Keys[0] >> 24) & 0xff);
- // result[4] = (byte)(_Keys[1] & 0xff);
- // result[5] = (byte)((_Keys[1] >> 8) & 0xff);
- // result[6] = (byte)((_Keys[1] >> 16) & 0xff);
- // result[7] = (byte)((_Keys[1] >> 24) & 0xff);
- // result[8] = (byte)(_Keys[2] & 0xff);
- // result[9] = (byte)((_Keys[2] >> 8) & 0xff);
- // result[10] = (byte)((_Keys[2] >> 16) & 0xff);
- // result[11] = (byte)((_Keys[2] >> 24) & 0xff);
- // return result;
- // }
- //}
- // private fields for the crypto stuff:
- private UInt32[] _Keys = { 0x12345678, 0x23456789, 0x34567890 };
- private Ionic.Crc.CRC32 crc32 = new Ionic.Crc.CRC32();
- }
- internal enum CryptoMode
- {
- Encrypt,
- Decrypt
- }
- /// <summary>
- /// A Stream for reading and concurrently decrypting data from a zip file,
- /// or for writing and concurrently encrypting data to a zip file.
- /// </summary>
- internal class ZipCipherStream : System.IO.Stream
- {
- private ZipCrypto _cipher;
- private System.IO.Stream _s;
- private CryptoMode _mode;
- /// <summary> The constructor. </summary>
- /// <param name="s">The underlying stream</param>
- /// <param name="mode">To either encrypt or decrypt.</param>
- /// <param name="cipher">The pre-initialized ZipCrypto object.</param>
- public ZipCipherStream(System.IO.Stream s, ZipCrypto cipher, CryptoMode mode)
- {
- if (s == null) throw new ArgumentNullException("s");
- _cipher = cipher;
- _s = s;
- _mode = mode;
- }
- public override int Read(byte[] buffer, int offset, int count)
- {
- if (_mode == CryptoMode.Encrypt)
- throw new NotSupportedException("This stream does not encrypt via Read()");
- if (buffer == null)
- throw new ArgumentNullException("buffer");
- byte[] db = new byte[count];
- int n = _s.Read(db, 0, count);
- byte[] decrypted = _cipher.DecryptMessage(db, n);
- for (int i = 0; i < n; i++)
- {
- buffer[offset + i] = decrypted[i];
- }
- return n;
- }
- public override void Write(byte[] buffer, int offset, int count)
- {
- if (_mode == CryptoMode.Decrypt)
- throw new NotSupportedException("This stream does not Decrypt via Write()");
- if (buffer == null)
- throw new ArgumentNullException("buffer");
- // workitem 7696
- if (count == 0) return;
- byte[] plaintext = null;
- if (offset != 0)
- {
- plaintext = new byte[count];
- for (int i = 0; i < count; i++)
- {
- plaintext[i] = buffer[offset + i];
- }
- }
- else plaintext = buffer;
- byte[] encrypted = _cipher.EncryptMessage(plaintext, count);
- _s.Write(encrypted, 0, encrypted.Length);
- }
- public override bool CanRead
- {
- get { return (_mode == CryptoMode.Decrypt); }
- }
- public override bool CanSeek
- {
- get { return false; }
- }
- public override bool CanWrite
- {
- get { return (_mode == CryptoMode.Encrypt); }
- }
- public override void Flush()
- {
- //throw new NotSupportedException();
- }
- public override long Length
- {
- get { throw new NotSupportedException(); }
- }
- public override long Position
- {
- get { throw new NotSupportedException(); }
- set { throw new NotSupportedException(); }
- }
- public override long Seek(long offset, System.IO.SeekOrigin origin)
- {
- throw new NotSupportedException();
- }
- public override void SetLength(long value)
- {
- throw new NotSupportedException();
- }
- }
- }
|