| // ZipCrypto.cs |
| // ------------------------------------------------------------------ |
| // |
| // Copyright (c) 2008, 2009, 2011 Dino Chiesa |
| // All rights reserved. |
| // |
| // This code module is part of DotNetZip, a zipfile class library. |
| // |
| // ------------------------------------------------------------------ |
| // |
| // This code is licensed under the Microsoft Public License. |
| // See the file License.txt for the license details. |
| // More info on: http://dotnetzip.codeplex.com |
| // |
| // ------------------------------------------------------------------ |
| // |
| // last saved (in emacs): |
| // Time-stamp: <2011-July-28 06:30:59> |
| // |
| // ------------------------------------------------------------------ |
| // |
| // This module provides the implementation for "traditional" Zip encryption. |
| // |
| // Created Tue Apr 15 17:39:56 2008 |
| // |
| // ------------------------------------------------------------------ |
| |
| using System; |
| |
| namespace OfficeOpenXml.Packaging.Ionic.Zip |
| { |
| /// <summary> |
| /// This class implements the "traditional" or "classic" PKZip encryption, |
| /// which today is considered to be weak. On the other hand it is |
| /// ubiquitous. This class is intended for use only by the DotNetZip |
| /// library. |
| /// </summary> |
| /// |
| /// <remarks> |
| /// Most uses of the DotNetZip library will not involve direct calls into |
| /// the ZipCrypto class. Instead, the ZipCrypto class is instantiated and |
| /// used by the ZipEntry() class when encryption or decryption on an entry |
| /// is employed. If for some reason you really wanted to use a weak |
| /// encryption algorithm in some other application, you might use this |
| /// library. But you would be much better off using one of the built-in |
| /// strong encryption libraries in the .NET Framework, like the AES |
| /// algorithm or SHA. |
| /// </remarks> |
| internal class ZipCrypto |
| { |
| /// <summary> |
| /// The default constructor for ZipCrypto. |
| /// </summary> |
| /// |
| /// <remarks> |
| /// This class is intended for internal use by the library only. It's |
| /// probably not useful to you. Seriously. Stop reading this |
| /// documentation. It's a waste of your time. Go do something else. |
| /// Check the football scores. Go get an ice cream with a friend. |
| /// Seriously. |
| /// </remarks> |
| /// |
| private ZipCrypto() { } |
| |
| public static ZipCrypto ForWrite(string password) |
| { |
| ZipCrypto z = new ZipCrypto(); |
| if (password == null) |
| throw new BadPasswordException("This entry requires a password."); |
| z.InitCipher(password); |
| return z; |
| } |
| |
| |
| public static ZipCrypto ForRead(string password, ZipEntry e) |
| { |
| System.IO.Stream s = e._archiveStream; |
| e._WeakEncryptionHeader = new byte[12]; |
| byte[] eh = e._WeakEncryptionHeader; |
| ZipCrypto z = new ZipCrypto(); |
| |
| if (password == null) |
| throw new BadPasswordException("This entry requires a password."); |
| |
| z.InitCipher(password); |
| |
| ZipEntry.ReadWeakEncryptionHeader(s, eh); |
| |
| // Decrypt the header. This has a side effect of "further initializing the |
| // encryption keys" in the traditional zip encryption. |
| byte[] DecryptedHeader = z.DecryptMessage(eh, eh.Length); |
| |
| // CRC check |
| // According to the pkzip spec, the final byte in the decrypted header |
| // is the highest-order byte in the CRC. We check it here. |
| if (DecryptedHeader[11] != (byte)((e._Crc32 >> 24) & 0xff)) |
| { |
| // In the case that bit 3 of the general purpose bit flag is set to |
| // indicate the presence of an 'Extended File Header' or a 'data |
| // descriptor' (signature 0x08074b50), the last byte of the decrypted |
| // header is sometimes compared with the high-order byte of the |
| // lastmodified time, rather than the high-order byte of the CRC, to |
| // verify the password. |
| // |
| // This is not documented in the PKWare Appnote.txt. It was |
| // discovered this by analysis of the Crypt.c source file in the |
| // InfoZip library http://www.info-zip.org/pub/infozip/ |
| // |
| // The reason for this is that the CRC for a file cannot be known |
| // until the entire contents of the file have been streamed. This |
| // means a tool would have to read the file content TWICE in its |
| // entirety in order to perform PKZIP encryption - once to compute |
| // the CRC, and again to actually encrypt. |
| // |
| // This is so important for performance that using the timeblob as |
| // the verification should be the standard practice for DotNetZip |
| // when using PKZIP encryption. This implies that bit 3 must be |
| // set. The downside is that some tools still cannot cope with ZIP |
| // files that use bit 3. Therefore, DotNetZip DOES NOT force bit 3 |
| // when PKZIP encryption is in use, and instead, reads the stream |
| // twice. |
| // |
| |
| if ((e._BitField & 0x0008) != 0x0008) |
| { |
| throw new BadPasswordException("The password did not match."); |
| } |
| else if (DecryptedHeader[11] != (byte)((e._TimeBlob >> 8) & 0xff)) |
| { |
| throw new BadPasswordException("The password did not match."); |
| } |
| |
| // We have a good password. |
| } |
| else |
| { |
| // A-OK |
| } |
| return z; |
| } |
| |
| |
| |
| |
| /// <summary> |
| /// From AppNote.txt: |
| /// unsigned char decrypt_byte() |
| /// local unsigned short temp |
| /// temp :=- Key(2) | 2 |
| /// decrypt_byte := (temp * (temp ^ 1)) bitshift-right 8 |
| /// end decrypt_byte |
| /// </summary> |
| private byte MagicByte |
| { |
| get |
| { |
| UInt16 t = (UInt16)((UInt16)(_Keys[2] & 0xFFFF) | 2); |
| return (byte)((t * (t ^ 1)) >> 8); |
| } |
| } |
| |
| // Decrypting: |
| // From AppNote.txt: |
| // loop for i from 0 to 11 |
| // C := buffer(i) ^ decrypt_byte() |
| // update_keys(C) |
| // buffer(i) := C |
| // end loop |
| |
| |
| /// <summary> |
| /// Call this method on a cipher text to render the plaintext. You must |
| /// first initialize the cipher with a call to InitCipher. |
| /// </summary> |
| /// |
| /// <example> |
| /// <code> |
| /// var cipher = new ZipCrypto(); |
| /// cipher.InitCipher(Password); |
| /// // Decrypt the header. This has a side effect of "further initializing the |
| /// // encryption keys" in the traditional zip encryption. |
| /// byte[] DecryptedMessage = cipher.DecryptMessage(EncryptedMessage); |
| /// </code> |
| /// </example> |
| /// |
| /// <param name="cipherText">The encrypted buffer.</param> |
| /// <param name="length"> |
| /// The number of bytes to encrypt. |
| /// Should be less than or equal to CipherText.Length. |
| /// </param> |
| /// |
| /// <returns>The plaintext.</returns> |
| public byte[] DecryptMessage(byte[] cipherText, int length) |
| { |
| if (cipherText == null) |
| throw new ArgumentNullException("cipherText"); |
| |
| if (length > cipherText.Length) |
| throw new ArgumentOutOfRangeException("length", |
| "Bad length during Decryption: the length parameter must be smaller than or equal to the size of the destination array."); |
| |
| byte[] plainText = new byte[length]; |
| for (int i = 0; i < length; i++) |
| { |
| byte C = (byte)(cipherText[i] ^ MagicByte); |
| UpdateKeys(C); |
| plainText[i] = C; |
| } |
| return plainText; |
| } |
| |
| /// <summary> |
| /// This is the converse of DecryptMessage. It encrypts the plaintext |
| /// and produces a ciphertext. |
| /// </summary> |
| /// |
| /// <param name="plainText">The plain text buffer.</param> |
| /// |
| /// <param name="length"> |
| /// The number of bytes to encrypt. |
| /// Should be less than or equal to plainText.Length. |
| /// </param> |
| /// |
| /// <returns>The ciphertext.</returns> |
| public byte[] EncryptMessage(byte[] plainText, int length) |
| { |
| if (plainText == null) |
| throw new ArgumentNullException("plaintext"); |
| |
| if (length > plainText.Length) |
| throw new ArgumentOutOfRangeException("length", |
| "Bad length during Encryption: The length parameter must be smaller than or equal to the size of the destination array."); |
| |
| byte[] cipherText = new byte[length]; |
| for (int i = 0; i < length; i++) |
| { |
| byte C = plainText[i]; |
| cipherText[i] = (byte)(plainText[i] ^ MagicByte); |
| UpdateKeys(C); |
| } |
| return cipherText; |
| } |
| |
| |
| /// <summary> |
| /// This initializes the cipher with the given password. |
| /// See AppNote.txt for details. |
| /// </summary> |
| /// |
| /// <param name="passphrase"> |
| /// The passphrase for encrypting or decrypting with this cipher. |
| /// </param> |
| /// |
| /// <remarks> |
| /// <code> |
| /// Step 1 - Initializing the encryption keys |
| /// ----------------------------------------- |
| /// Start with these keys: |
| /// Key(0) := 305419896 (0x12345678) |
| /// Key(1) := 591751049 (0x23456789) |
| /// Key(2) := 878082192 (0x34567890) |
| /// |
| /// Then, initialize the keys with a password: |
| /// |
| /// loop for i from 0 to length(password)-1 |
| /// update_keys(password(i)) |
| /// end loop |
| /// |
| /// Where update_keys() is defined as: |
| /// |
| /// update_keys(char): |
| /// Key(0) := crc32(key(0),char) |
| /// Key(1) := Key(1) + (Key(0) bitwiseAND 000000ffH) |
| /// Key(1) := Key(1) * 134775813 + 1 |
| /// Key(2) := crc32(key(2),key(1) rightshift 24) |
| /// end update_keys |
| /// |
| /// Where crc32(old_crc,char) is a routine that given a CRC value and a |
| /// character, returns an updated CRC value after applying the CRC-32 |
| /// algorithm described elsewhere in this document. |
| /// |
| /// </code> |
| /// |
| /// <para> |
| /// After the keys are initialized, then you can use the cipher to |
| /// encrypt the plaintext. |
| /// </para> |
| /// |
| /// <para> |
| /// Essentially we encrypt the password with the keys, then discard the |
| /// ciphertext for the password. This initializes the keys for later use. |
| /// </para> |
| /// |
| /// </remarks> |
| public void InitCipher(string passphrase) |
| { |
| byte[] p = SharedUtilities.StringToByteArray(passphrase); |
| for (int i = 0; i < passphrase.Length; i++) |
| UpdateKeys(p[i]); |
| } |
| |
| |
| private void UpdateKeys(byte byteValue) |
| { |
| _Keys[0] = (UInt32)crc32.ComputeCrc32((int)_Keys[0], byteValue); |
| _Keys[1] = _Keys[1] + (byte)_Keys[0]; |
| _Keys[1] = _Keys[1] * 0x08088405 + 1; |
| _Keys[2] = (UInt32)crc32.ComputeCrc32((int)_Keys[2], (byte)(_Keys[1] >> 24)); |
| } |
| |
| ///// <summary> |
| ///// The byte array representing the seed keys used. |
| ///// Get this after calling InitCipher. The 12 bytes represents |
| ///// what the zip spec calls the "EncryptionHeader". |
| ///// </summary> |
| //public byte[] KeyHeader |
| //{ |
| // get |
| // { |
| // byte[] result = new byte[12]; |
| // result[0] = (byte)(_Keys[0] & 0xff); |
| // result[1] = (byte)((_Keys[0] >> 8) & 0xff); |
| // result[2] = (byte)((_Keys[0] >> 16) & 0xff); |
| // result[3] = (byte)((_Keys[0] >> 24) & 0xff); |
| // result[4] = (byte)(_Keys[1] & 0xff); |
| // result[5] = (byte)((_Keys[1] >> 8) & 0xff); |
| // result[6] = (byte)((_Keys[1] >> 16) & 0xff); |
| // result[7] = (byte)((_Keys[1] >> 24) & 0xff); |
| // result[8] = (byte)(_Keys[2] & 0xff); |
| // result[9] = (byte)((_Keys[2] >> 8) & 0xff); |
| // result[10] = (byte)((_Keys[2] >> 16) & 0xff); |
| // result[11] = (byte)((_Keys[2] >> 24) & 0xff); |
| // return result; |
| // } |
| //} |
| |
| // private fields for the crypto stuff: |
| private UInt32[] _Keys = { 0x12345678, 0x23456789, 0x34567890 }; |
| private Ionic.Crc.CRC32 crc32 = new Ionic.Crc.CRC32(); |
| |
| } |
| |
| internal enum CryptoMode |
| { |
| Encrypt, |
| Decrypt |
| } |
| |
| /// <summary> |
| /// A Stream for reading and concurrently decrypting data from a zip file, |
| /// or for writing and concurrently encrypting data to a zip file. |
| /// </summary> |
| internal class ZipCipherStream : System.IO.Stream |
| { |
| private ZipCrypto _cipher; |
| private System.IO.Stream _s; |
| private CryptoMode _mode; |
| |
| /// <summary> The constructor. </summary> |
| /// <param name="s">The underlying stream</param> |
| /// <param name="mode">To either encrypt or decrypt.</param> |
| /// <param name="cipher">The pre-initialized ZipCrypto object.</param> |
| public ZipCipherStream(System.IO.Stream s, ZipCrypto cipher, CryptoMode mode) |
| : base() |
| { |
| _cipher = cipher; |
| _s = s; |
| _mode = mode; |
| } |
| |
| public override int Read(byte[] buffer, int offset, int count) |
| { |
| if (_mode == CryptoMode.Encrypt) |
| throw new NotSupportedException("This stream does not encrypt via Read()"); |
| |
| if (buffer == null) |
| throw new ArgumentNullException("buffer"); |
| |
| byte[] db = new byte[count]; |
| int n = _s.Read(db, 0, count); |
| byte[] decrypted = _cipher.DecryptMessage(db, n); |
| for (int i = 0; i < n; i++) |
| { |
| buffer[offset + i] = decrypted[i]; |
| } |
| return n; |
| } |
| |
| public override void Write(byte[] buffer, int offset, int count) |
| { |
| if (_mode == CryptoMode.Decrypt) |
| throw new NotSupportedException("This stream does not Decrypt via Write()"); |
| |
| if (buffer == null) |
| throw new ArgumentNullException("buffer"); |
| |
| // workitem 7696 |
| if (count == 0) return; |
| |
| byte[] plaintext = null; |
| if (offset != 0) |
| { |
| plaintext = new byte[count]; |
| for (int i = 0; i < count; i++) |
| { |
| plaintext[i] = buffer[offset + i]; |
| } |
| } |
| else plaintext = buffer; |
| |
| byte[] encrypted = _cipher.EncryptMessage(plaintext, count); |
| _s.Write(encrypted, 0, encrypted.Length); |
| } |
| |
| |
| public override bool CanRead |
| { |
| get { return (_mode == CryptoMode.Decrypt); } |
| } |
| public override bool CanSeek |
| { |
| get { return false; } |
| } |
| |
| public override bool CanWrite |
| { |
| get { return (_mode == CryptoMode.Encrypt); } |
| } |
| |
| public override void Flush() |
| { |
| //throw new NotSupportedException(); |
| } |
| |
| public override long Length |
| { |
| get { throw new NotSupportedException(); } |
| } |
| |
| public override long Position |
| { |
| get { throw new NotSupportedException(); } |
| set { throw new NotSupportedException(); } |
| } |
| public override long Seek(long offset, System.IO.SeekOrigin origin) |
| { |
| throw new NotSupportedException(); |
| } |
| |
| public override void SetLength(long value) |
| { |
| throw new NotSupportedException(); |
| } |
| } |
| } |