003 File Manager
Current Path:
/usr/src/contrib/libarchive/libarchive
usr
/
src
/
contrib
/
libarchive
/
libarchive
/
📁
..
📄
archive.h
(51.93 KB)
📄
archive_acl.c
(51.2 KB)
📄
archive_acl_private.h
(3.13 KB)
📄
archive_blake2.h
(6.32 KB)
📄
archive_blake2_impl.h
(4.12 KB)
📄
archive_blake2s_ref.c
(9.46 KB)
📄
archive_blake2sp_ref.c
(9.11 KB)
📄
archive_check_magic.c
(4.7 KB)
📄
archive_cmdline.c
(5.21 KB)
📄
archive_cmdline_private.h
(1.82 KB)
📄
archive_crc32.h
(2.97 KB)
📄
archive_cryptor.c
(13.46 KB)
📄
archive_cryptor_private.h
(6.02 KB)
📄
archive_digest.c
(28.79 KB)
📄
archive_digest_private.h
(13.88 KB)
📄
archive_disk_acl_freebsd.c
(18.86 KB)
📄
archive_endian.h
(5.28 KB)
📄
archive_entry.3
(4.85 KB)
📄
archive_entry.c
(53.48 KB)
📄
archive_entry.h
(32.79 KB)
📄
archive_entry_acl.3
(14.32 KB)
📄
archive_entry_copy_stat.c
(3.73 KB)
📄
archive_entry_link_resolver.c
(11.74 KB)
📄
archive_entry_linkify.3
(5.9 KB)
📄
archive_entry_locale.h
(4.41 KB)
📄
archive_entry_misc.3
(2.47 KB)
📄
archive_entry_paths.3
(5.53 KB)
📄
archive_entry_perms.3
(7.59 KB)
📄
archive_entry_private.h
(6.09 KB)
📄
archive_entry_sparse.c
(3.95 KB)
📄
archive_entry_stat.3
(8.1 KB)
📄
archive_entry_stat.c
(4.29 KB)
📄
archive_entry_strmode.c
(2.6 KB)
📄
archive_entry_time.3
(4.5 KB)
📄
archive_entry_xattr.c
(3.86 KB)
📄
archive_getdate.c
(29.9 KB)
📄
archive_getdate.h
(1.56 KB)
📄
archive_hmac.c
(7.32 KB)
📄
archive_hmac_private.h
(3.59 KB)
📄
archive_match.c
(47.14 KB)
📄
archive_openssl_evp_private.h
(1.92 KB)
📄
archive_openssl_hmac_private.h
(1.98 KB)
📄
archive_options.c
(5.22 KB)
📄
archive_options_private.h
(2.02 KB)
📄
archive_pack_dev.c
(9.13 KB)
📄
archive_pack_dev.h
(2.08 KB)
📄
archive_pathmatch.c
(10.64 KB)
📄
archive_pathmatch.h
(2.09 KB)
📄
archive_platform.h
(5.93 KB)
📄
archive_platform_acl.h
(2 KB)
📄
archive_platform_xattr.h
(1.82 KB)
📄
archive_ppmd7.c
(27.63 KB)
📄
archive_ppmd7_private.h
(3.01 KB)
📄
archive_ppmd8.c
(31.05 KB)
📄
archive_ppmd8_private.h
(3.82 KB)
📄
archive_ppmd_private.h
(3.31 KB)
📄
archive_private.h
(5.56 KB)
📄
archive_random.c
(6.67 KB)
📄
archive_random_private.h
(1.6 KB)
📄
archive_rb.c
(20.84 KB)
📄
archive_rb.h
(4.43 KB)
📄
archive_read.3
(7.18 KB)
📄
archive_read.c
(48.21 KB)
📄
archive_read_add_passphrase.3
(2.48 KB)
📄
archive_read_add_passphrase.c
(5.21 KB)
📄
archive_read_append_filter.c
(6.1 KB)
📄
archive_read_data.3
(4.23 KB)
📄
archive_read_data_into_fd.c
(3.94 KB)
📄
archive_read_disk.3
(10.36 KB)
📄
archive_read_disk_entry_from_file.c
(27.96 KB)
📄
archive_read_disk_posix.c
(72.18 KB)
📄
archive_read_disk_private.h
(3.31 KB)
📄
archive_read_disk_set_standard_lookup.c
(8.03 KB)
📄
archive_read_extract.3
(4.39 KB)
📄
archive_read_extract.c
(2.21 KB)
📄
archive_read_extract2.c
(4.5 KB)
📄
archive_read_filter.3
(5.56 KB)
📄
archive_read_format.3
(5.97 KB)
📄
archive_read_free.3
(3.07 KB)
📄
archive_read_header.3
(2.97 KB)
📄
archive_read_new.3
(2.08 KB)
📄
archive_read_open.3
(6.78 KB)
📄
archive_read_open_fd.c
(5.92 KB)
📄
archive_read_open_file.c
(4.9 KB)
📄
archive_read_open_filename.c
(17.56 KB)
📄
archive_read_open_memory.c
(5.43 KB)
📄
archive_read_private.h
(9.26 KB)
📄
archive_read_set_format.c
(3.43 KB)
📄
archive_read_set_options.3
(6.53 KB)
📄
archive_read_set_options.c
(4.6 KB)
📄
archive_read_support_filter_all.c
(3.5 KB)
📄
archive_read_support_filter_by_code.c
(2.76 KB)
📄
archive_read_support_filter_bzip2.c
(9.93 KB)
📄
archive_read_support_filter_compress.c
(13.44 KB)
📄
archive_read_support_filter_grzip.c
(3.52 KB)
📄
archive_read_support_filter_gzip.c
(13.48 KB)
📄
archive_read_support_filter_lrzip.c
(3.79 KB)
📄
archive_read_support_filter_lz4.c
(20.26 KB)
📄
archive_read_support_filter_lzop.c
(13.59 KB)
📄
archive_read_support_filter_none.c
(1.87 KB)
📄
archive_read_support_filter_program.c
(13.21 KB)
📄
archive_read_support_filter_rpm.c
(6.84 KB)
📄
archive_read_support_filter_uu.c
(18.34 KB)
📄
archive_read_support_filter_xz.c
(21.51 KB)
📄
archive_read_support_filter_zstd.c
(7.59 KB)
📄
archive_read_support_format_7zip.c
(97.12 KB)
📄
archive_read_support_format_all.c
(3.47 KB)
📄
archive_read_support_format_ar.c
(17.4 KB)
📄
archive_read_support_format_by_code.c
(2.99 KB)
📄
archive_read_support_format_cab.c
(83 KB)
📄
archive_read_support_format_cpio.c
(31.93 KB)
📄
archive_read_support_format_empty.c
(2.93 KB)
📄
archive_read_support_format_iso9660.c
(92.13 KB)
📄
archive_read_support_format_lha.c
(83.33 KB)
📄
archive_read_support_format_mtree.c
(51.86 KB)
📄
archive_read_support_format_rar.c
(84.34 KB)
📄
archive_read_support_format_rar5.c
(107.18 KB)
📄
archive_read_support_format_raw.c
(5.43 KB)
📄
archive_read_support_format_tar.c
(83.23 KB)
📄
archive_read_support_format_warc.c
(21.17 KB)
📄
archive_read_support_format_xar.c
(79.96 KB)
📄
archive_read_support_format_zip.c
(117.12 KB)
📄
archive_string.c
(104.04 KB)
📄
archive_string.h
(9.26 KB)
📄
archive_string_composition.h
(80.15 KB)
📄
archive_string_sprintf.c
(5.13 KB)
📄
archive_util.3
(6.97 KB)
📄
archive_util.c
(14.54 KB)
📄
archive_version_details.c
(3.55 KB)
📄
archive_virtual.c
(3.95 KB)
📄
archive_write.3
(7.32 KB)
📄
archive_write.c
(21.65 KB)
📄
archive_write_add_filter.c
(2.63 KB)
📄
archive_write_add_filter_b64encode.c
(8.41 KB)
📄
archive_write_add_filter_by_name.c
(2.65 KB)
📄
archive_write_add_filter_bzip2.c
(11.14 KB)
📄
archive_write_add_filter_compress.c
(12.62 KB)
📄
archive_write_add_filter_grzip.c
(4.22 KB)
📄
archive_write_add_filter_gzip.c
(12.34 KB)
📄
archive_write_add_filter_lrzip.c
(5.72 KB)
📄
archive_write_add_filter_lz4.c
(18.85 KB)
📄
archive_write_add_filter_lzop.c
(13.69 KB)
📄
archive_write_add_filter_none.c
(1.67 KB)
📄
archive_write_add_filter_program.c
(9.77 KB)
📄
archive_write_add_filter_uuencode.c
(8.09 KB)
📄
archive_write_add_filter_xz.c
(14.97 KB)
📄
archive_write_add_filter_zstd.c
(10.7 KB)
📄
archive_write_blocksize.3
(4.13 KB)
📄
archive_write_data.3
(3.09 KB)
📄
archive_write_disk.3
(11.82 KB)
📄
archive_write_disk_posix.c
(123.89 KB)
📄
archive_write_disk_private.h
(1.77 KB)
📄
archive_write_disk_set_standard_lookup.c
(6.91 KB)
📄
archive_write_filter.3
(4.47 KB)
📄
archive_write_finish_entry.3
(2.67 KB)
📄
archive_write_format.3
(5.99 KB)
📄
archive_write_free.3
(3.05 KB)
📄
archive_write_header.3
(2.44 KB)
📄
archive_write_new.3
(2.02 KB)
📄
archive_write_open.3
(8.01 KB)
📄
archive_write_open_fd.c
(3.9 KB)
📄
archive_write_open_file.c
(2.93 KB)
📄
archive_write_open_filename.c
(6.85 KB)
📄
archive_write_open_memory.c
(3.61 KB)
📄
archive_write_private.h
(5.64 KB)
📄
archive_write_set_format.c
(4 KB)
📄
archive_write_set_format_7zip.c
(55.14 KB)
📄
archive_write_set_format_ar.c
(14.08 KB)
📄
archive_write_set_format_by_name.c
(3.35 KB)
📄
archive_write_set_format_cpio.c
(14.24 KB)
📄
archive_write_set_format_cpio_newc.c
(13.11 KB)
📄
archive_write_set_format_filter_by_ext.c
(4.67 KB)
📄
archive_write_set_format_gnutar.c
(22.62 KB)
📄
archive_write_set_format_iso9660.c
(206.67 KB)
📄
archive_write_set_format_mtree.c
(58.1 KB)
📄
archive_write_set_format_pax.c
(59.85 KB)
📄
archive_write_set_format_private.h
(1.71 KB)
📄
archive_write_set_format_raw.c
(3.65 KB)
📄
archive_write_set_format_shar.c
(16.93 KB)
📄
archive_write_set_format_ustar.c
(21.98 KB)
📄
archive_write_set_format_v7tar.c
(18.02 KB)
📄
archive_write_set_format_warc.c
(11.2 KB)
📄
archive_write_set_format_xar.c
(79.49 KB)
📄
archive_write_set_format_zip.c
(48.7 KB)
📄
archive_write_set_options.3
(21.85 KB)
📄
archive_write_set_options.c
(4.07 KB)
📄
archive_write_set_passphrase.3
(2.46 KB)
📄
archive_write_set_passphrase.c
(2.89 KB)
📄
archive_xxhash.h
(1.86 KB)
📄
cpio.5
(10.45 KB)
📄
filter_fork.h
(1.68 KB)
📄
filter_fork_posix.c
(6.18 KB)
📄
libarchive-formats.5
(18.29 KB)
📄
libarchive.3
(8.02 KB)
📄
libarchive_changes.3
(9.95 KB)
📄
libarchive_internals.3
(13.36 KB)
📄
tar.5
(31 KB)
📁
test
📄
xxhash.c
(15.77 KB)
Editing: archive_cryptor.c
/*- * Copyright (c) 2014 Michihiro NAKAJIMA * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "archive_platform.h" #ifdef HAVE_STRING_H #include <string.h> #endif #include "archive.h" #include "archive_cryptor_private.h" /* * On systems that do not support any recognized crypto libraries, * this file will normally define no usable symbols. * * But some compilers and linkers choke on empty object files, so * define a public symbol that will always exist. This could * be removed someday if this file gains another always-present * symbol definition. */ int __libarchive_cryptor_build_hack(void) { return 0; } #ifdef ARCHIVE_CRYPTOR_USE_Apple_CommonCrypto static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { CCKeyDerivationPBKDF(kCCPBKDF2, (const char *)pw, pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, derived_key, derived_key_len); return 0; } #elif defined(_WIN32) && !defined(__CYGWIN__) && defined(HAVE_BCRYPT_H) #ifdef _MSC_VER #pragma comment(lib, "Bcrypt.lib") #endif static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { NTSTATUS status; BCRYPT_ALG_HANDLE hAlg; status = BCryptOpenAlgorithmProvider(&hAlg, BCRYPT_SHA1_ALGORITHM, MS_PRIMITIVE_PROVIDER, BCRYPT_ALG_HANDLE_HMAC_FLAG); if (!BCRYPT_SUCCESS(status)) return -1; status = BCryptDeriveKeyPBKDF2(hAlg, (PUCHAR)(uintptr_t)pw, (ULONG)pw_len, (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, (PUCHAR)derived_key, (ULONG)derived_key_len, 0); BCryptCloseAlgorithmProvider(hAlg, 0); return (BCRYPT_SUCCESS(status)) ? 0: -1; } #elif defined(HAVE_LIBMBEDCRYPTO) && defined(HAVE_MBEDTLS_PKCS5_H) static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { mbedtls_md_context_t ctx; const mbedtls_md_info_t *info; int ret; mbedtls_md_init(&ctx); info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1); if (info == NULL) { mbedtls_md_free(&ctx); return (-1); } ret = mbedtls_md_setup(&ctx, info, 1); if (ret != 0) { mbedtls_md_free(&ctx); return (-1); } ret = mbedtls_pkcs5_pbkdf2_hmac(&ctx, (const unsigned char *)pw, pw_len, salt, salt_len, rounds, derived_key_len, derived_key); mbedtls_md_free(&ctx); return (ret); } #elif defined(HAVE_LIBNETTLE) && defined(HAVE_NETTLE_PBKDF2_H) static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, salt_len, salt, derived_key_len, derived_key); return 0; } #elif defined(HAVE_LIBCRYPTO) && defined(HAVE_PKCS5_PBKDF2_HMAC_SHA1) static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, derived_key_len, derived_key); return 0; } #else /* Stub */ static int pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) { (void)pw; /* UNUSED */ (void)pw_len; /* UNUSED */ (void)salt; /* UNUSED */ (void)salt_len; /* UNUSED */ (void)rounds; /* UNUSED */ (void)derived_key; /* UNUSED */ (void)derived_key_len; /* UNUSED */ return -1; /* UNSUPPORTED */ } #endif #ifdef ARCHIVE_CRYPTOR_USE_Apple_CommonCrypto # if MAC_OS_X_VERSION_MAX_ALLOWED < 1090 # define kCCAlgorithmAES kCCAlgorithmAES128 # endif static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { CCCryptorStatus r; ctx->key_len = key_len; memcpy(ctx->key, key, key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); ctx->encr_pos = AES_BLOCK_SIZE; r = CCCryptorCreateWithMode(kCCEncrypt, kCCModeECB, kCCAlgorithmAES, ccNoPadding, NULL, key, key_len, NULL, 0, 0, 0, &ctx->ctx); return (r == kCCSuccess)? 0: -1; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { CCCryptorRef ref = ctx->ctx; CCCryptorStatus r; r = CCCryptorReset(ref, NULL); if (r != kCCSuccess && r != kCCUnimplemented) return -1; r = CCCryptorUpdate(ref, ctx->nonce, AES_BLOCK_SIZE, ctx->encr_buf, AES_BLOCK_SIZE, NULL); return (r == kCCSuccess)? 0: -1; } static int aes_ctr_release(archive_crypto_ctx *ctx) { memset(ctx->key, 0, ctx->key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); return 0; } #elif defined(_WIN32) && !defined(__CYGWIN__) && defined(HAVE_BCRYPT_H) static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { BCRYPT_ALG_HANDLE hAlg; BCRYPT_KEY_HANDLE hKey; DWORD keyObj_len, aes_key_len; PBYTE keyObj; ULONG result; NTSTATUS status; BCRYPT_KEY_LENGTHS_STRUCT key_lengths; ctx->hAlg = NULL; ctx->hKey = NULL; ctx->keyObj = NULL; switch (key_len) { case 16: aes_key_len = 128; break; case 24: aes_key_len = 192; break; case 32: aes_key_len = 256; break; default: return -1; } status = BCryptOpenAlgorithmProvider(&hAlg, BCRYPT_AES_ALGORITHM, MS_PRIMITIVE_PROVIDER, 0); if (!BCRYPT_SUCCESS(status)) return -1; status = BCryptGetProperty(hAlg, BCRYPT_KEY_LENGTHS, (PUCHAR)&key_lengths, sizeof(key_lengths), &result, 0); if (!BCRYPT_SUCCESS(status)) { BCryptCloseAlgorithmProvider(hAlg, 0); return -1; } if (key_lengths.dwMinLength > aes_key_len || key_lengths.dwMaxLength < aes_key_len) { BCryptCloseAlgorithmProvider(hAlg, 0); return -1; } status = BCryptGetProperty(hAlg, BCRYPT_OBJECT_LENGTH, (PUCHAR)&keyObj_len, sizeof(keyObj_len), &result, 0); if (!BCRYPT_SUCCESS(status)) { BCryptCloseAlgorithmProvider(hAlg, 0); return -1; } keyObj = (PBYTE)HeapAlloc(GetProcessHeap(), 0, keyObj_len); if (keyObj == NULL) { BCryptCloseAlgorithmProvider(hAlg, 0); return -1; } status = BCryptSetProperty(hAlg, BCRYPT_CHAINING_MODE, (PUCHAR)BCRYPT_CHAIN_MODE_ECB, sizeof(BCRYPT_CHAIN_MODE_ECB), 0); if (!BCRYPT_SUCCESS(status)) { BCryptCloseAlgorithmProvider(hAlg, 0); HeapFree(GetProcessHeap(), 0, keyObj); return -1; } status = BCryptGenerateSymmetricKey(hAlg, &hKey, keyObj, keyObj_len, (PUCHAR)(uintptr_t)key, (ULONG)key_len, 0); if (!BCRYPT_SUCCESS(status)) { BCryptCloseAlgorithmProvider(hAlg, 0); HeapFree(GetProcessHeap(), 0, keyObj); return -1; } ctx->hAlg = hAlg; ctx->hKey = hKey; ctx->keyObj = keyObj; ctx->keyObj_len = keyObj_len; ctx->encr_pos = AES_BLOCK_SIZE; return 0; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { NTSTATUS status; ULONG result; status = BCryptEncrypt(ctx->hKey, (PUCHAR)ctx->nonce, AES_BLOCK_SIZE, NULL, NULL, 0, (PUCHAR)ctx->encr_buf, AES_BLOCK_SIZE, &result, 0); return BCRYPT_SUCCESS(status) ? 0 : -1; } static int aes_ctr_release(archive_crypto_ctx *ctx) { if (ctx->hAlg != NULL) { BCryptCloseAlgorithmProvider(ctx->hAlg, 0); ctx->hAlg = NULL; BCryptDestroyKey(ctx->hKey); ctx->hKey = NULL; HeapFree(GetProcessHeap(), 0, ctx->keyObj); ctx->keyObj = NULL; } memset(ctx, 0, sizeof(*ctx)); return 0; } #elif defined(HAVE_LIBMBEDCRYPTO) && defined(HAVE_MBEDTLS_AES_H) static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { mbedtls_aes_init(&ctx->ctx); ctx->key_len = key_len; memcpy(ctx->key, key, key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); ctx->encr_pos = AES_BLOCK_SIZE; return 0; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { if (mbedtls_aes_setkey_enc(&ctx->ctx, ctx->key, ctx->key_len * 8) != 0) return (-1); if (mbedtls_aes_crypt_ecb(&ctx->ctx, MBEDTLS_AES_ENCRYPT, ctx->nonce, ctx->encr_buf) != 0) return (-1); return 0; } static int aes_ctr_release(archive_crypto_ctx *ctx) { mbedtls_aes_free(&ctx->ctx); memset(ctx, 0, sizeof(*ctx)); return 0; } #elif defined(HAVE_LIBNETTLE) && defined(HAVE_NETTLE_AES_H) static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { ctx->key_len = key_len; memcpy(ctx->key, key, key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); ctx->encr_pos = AES_BLOCK_SIZE; memset(&ctx->ctx, 0, sizeof(ctx->ctx)); return 0; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { #if NETTLE_VERSION_MAJOR < 3 aes_set_encrypt_key(&ctx->ctx, ctx->key_len, ctx->key); aes_encrypt(&ctx->ctx, AES_BLOCK_SIZE, ctx->encr_buf, ctx->nonce); #else switch(ctx->key_len) { case AES128_KEY_SIZE: aes128_set_encrypt_key(&ctx->ctx.c128, ctx->key); aes128_encrypt(&ctx->ctx.c128, AES_BLOCK_SIZE, ctx->encr_buf, ctx->nonce); break; case AES192_KEY_SIZE: aes192_set_encrypt_key(&ctx->ctx.c192, ctx->key); aes192_encrypt(&ctx->ctx.c192, AES_BLOCK_SIZE, ctx->encr_buf, ctx->nonce); break; case AES256_KEY_SIZE: aes256_set_encrypt_key(&ctx->ctx.c256, ctx->key); aes256_encrypt(&ctx->ctx.c256, AES_BLOCK_SIZE, ctx->encr_buf, ctx->nonce); break; default: return -1; break; } #endif return 0; } static int aes_ctr_release(archive_crypto_ctx *ctx) { memset(ctx, 0, sizeof(*ctx)); return 0; } #elif defined(HAVE_LIBCRYPTO) static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { if ((ctx->ctx = EVP_CIPHER_CTX_new()) == NULL) return -1; switch (key_len) { case 16: ctx->type = EVP_aes_128_ecb(); break; case 24: ctx->type = EVP_aes_192_ecb(); break; case 32: ctx->type = EVP_aes_256_ecb(); break; default: ctx->type = NULL; return -1; } ctx->key_len = key_len; memcpy(ctx->key, key, key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); ctx->encr_pos = AES_BLOCK_SIZE; #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) if (!EVP_CIPHER_CTX_reset(ctx->ctx)) { EVP_CIPHER_CTX_free(ctx->ctx); ctx->ctx = NULL; } #else EVP_CIPHER_CTX_init(ctx->ctx); #endif return 0; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { int outl = 0; int r; r = EVP_EncryptInit_ex(ctx->ctx, ctx->type, NULL, ctx->key, NULL); if (r == 0) return -1; r = EVP_EncryptUpdate(ctx->ctx, ctx->encr_buf, &outl, ctx->nonce, AES_BLOCK_SIZE); if (r == 0 || outl != AES_BLOCK_SIZE) return -1; return 0; } static int aes_ctr_release(archive_crypto_ctx *ctx) { EVP_CIPHER_CTX_free(ctx->ctx); memset(ctx->key, 0, ctx->key_len); memset(ctx->nonce, 0, sizeof(ctx->nonce)); return 0; } #else #define ARCHIVE_CRYPTOR_STUB /* Stub */ static int aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len) { (void)ctx; /* UNUSED */ (void)key; /* UNUSED */ (void)key_len; /* UNUSED */ return -1; } static int aes_ctr_encrypt_counter(archive_crypto_ctx *ctx) { (void)ctx; /* UNUSED */ return -1; } static int aes_ctr_release(archive_crypto_ctx *ctx) { (void)ctx; /* UNUSED */ return 0; } #endif #ifdef ARCHIVE_CRYPTOR_STUB static int aes_ctr_update(archive_crypto_ctx *ctx, const uint8_t * const in, size_t in_len, uint8_t * const out, size_t *out_len) { (void)ctx; /* UNUSED */ (void)in; /* UNUSED */ (void)in_len; /* UNUSED */ (void)out; /* UNUSED */ (void)out_len; /* UNUSED */ aes_ctr_encrypt_counter(ctx); /* UNUSED */ /* Fix unused function warning */ return -1; } #else static void aes_ctr_increase_counter(archive_crypto_ctx *ctx) { uint8_t *const nonce = ctx->nonce; int j; for (j = 0; j < 8; j++) { if (++nonce[j]) break; } } static int aes_ctr_update(archive_crypto_ctx *ctx, const uint8_t * const in, size_t in_len, uint8_t * const out, size_t *out_len) { uint8_t *const ebuf = ctx->encr_buf; unsigned pos = ctx->encr_pos; unsigned max = (unsigned)((in_len < *out_len)? in_len: *out_len); unsigned i; for (i = 0; i < max; ) { if (pos == AES_BLOCK_SIZE) { aes_ctr_increase_counter(ctx); if (aes_ctr_encrypt_counter(ctx) != 0) return -1; while (max -i >= AES_BLOCK_SIZE) { for (pos = 0; pos < AES_BLOCK_SIZE; pos++) out[i+pos] = in[i+pos] ^ ebuf[pos]; i += AES_BLOCK_SIZE; aes_ctr_increase_counter(ctx); if (aes_ctr_encrypt_counter(ctx) != 0) return -1; } pos = 0; if (i >= max) break; } out[i] = in[i] ^ ebuf[pos++]; i++; } ctx->encr_pos = pos; *out_len = i; return 0; } #endif /* ARCHIVE_CRYPTOR_STUB */ const struct archive_cryptor __archive_cryptor = { &pbkdf2_sha1, &aes_ctr_init, &aes_ctr_update, &aes_ctr_release, &aes_ctr_init, &aes_ctr_update, &aes_ctr_release, };
Upload File
Create Folder