diff --git a/src/aes.rs b/src/aes.rs index 363f9e13..3050263a 100644 --- a/src/aes.rs +++ b/src/aes.rs @@ -125,12 +125,12 @@ impl AesReader { }) } - /// Read the AES header bytes and returns the key and salt. + /// Read the AES header bytes and returns the verification value and salt. /// /// # Returns /// - /// the key and the salt - pub fn get_key_and_salt(mut self) -> io::Result<(Vec, Vec)> { + /// the verification value and the salt + pub fn get_verification_value_and_salt(mut self) -> io::Result<(Vec, Vec)> { let salt_length = self.aes_mode.salt_length(); let mut salt = vec![0; salt_length]; diff --git a/src/read.rs b/src/read.rs index 888ef330..3c9b36b6 100644 --- a/src/read.rs +++ b/src/read.rs @@ -645,8 +645,16 @@ impl ZipArchive { Ok(shared) } - /// Returns key and salt - pub fn get_aes_key_and_salt( + /// Returns the verification value and salt for the AES encryption of the file + /// + /// It fails if the file is not encrypted or if the file number is invalid. + /// + /// # Returns + /// + /// - Some with the verification value and the salt + /// - None if the file is not encrypted with AES + #[cfg(feature = "aes-crypto")] + pub fn get_aes_verification_key_and_salt( &mut self, file_number: usize, ) -> ZipResult, Vec)>> { @@ -657,15 +665,14 @@ impl ZipArchive { .ok_or(ZipError::FileNotFound)?; if !data.encrypted { - return Err(ZipError::UnsupportedArchive(ZipError::PASSWORD_REQUIRED)); + return Err(ZipError::UnsupportedArchive(ZipError::ARCHIVE_NOT_ENCRYPTED)); } let limit_reader = find_content(data, &mut self.reader)?; match data.aes_mode { None => Ok(None), Some((aes_mode, _, _)) => { let (key, salt) = AesReader::new(limit_reader, aes_mode, data.compressed_size) - .get_key_and_salt() - .expect("AES reader failed"); + .get_verification_value_and_salt()?; Ok(Some((aes_mode, key, salt))) } } diff --git a/src/result.rs b/src/result.rs index 7bd5cad5..a3a467a8 100644 --- a/src/result.rs +++ b/src/result.rs @@ -46,6 +46,10 @@ impl ZipError { /// # () /// ``` pub const PASSWORD_REQUIRED: &'static str = "Password required to decrypt file"; + + + /// The text used as an error when the archive is not encrypted + pub const ARCHIVE_NOT_ENCRYPTED: &'static str = "the archive is not encrypted"; } impl From for io::Error {