review & clippy

This commit is contained in:
Arnaud Gourlay 2024-05-23 20:12:22 +02:00
parent 6da1faa4f1
commit 6db572ce65
No known key found for this signature in database
GPG key ID: 8119C2F38355E359
3 changed files with 28 additions and 16 deletions

View file

@ -15,7 +15,7 @@ use std::io::{self, Error, ErrorKind, Read, Write};
use zeroize::{Zeroize, Zeroizing}; use zeroize::{Zeroize, Zeroizing};
/// The length of the password verifcation value in bytes /// The length of the password verifcation value in bytes
const PWD_VERIFY_LENGTH: usize = 2; pub const PWD_VERIFY_LENGTH: usize = 2;
/// The length of the authentication code in bytes /// The length of the authentication code in bytes
const AUTH_CODE_LENGTH: usize = 10; const AUTH_CODE_LENGTH: usize = 10;
/// The number of iterations used with PBKDF2 /// The number of iterations used with PBKDF2
@ -130,14 +130,16 @@ impl<R: Read> AesReader<R> {
/// # Returns /// # Returns
/// ///
/// the verification value and the salt /// the verification value and the salt
pub fn get_verification_value_and_salt(mut self) -> io::Result<(Vec<u8>, Vec<u8>)> { pub fn get_verification_value_and_salt(
mut self,
) -> io::Result<([u8; PWD_VERIFY_LENGTH], Vec<u8>)> {
let salt_length = self.aes_mode.salt_length(); let salt_length = self.aes_mode.salt_length();
let mut salt = vec![0; salt_length]; let mut salt = vec![0; salt_length];
self.reader.read_exact(&mut salt)?; self.reader.read_exact(&mut salt)?;
// next are 2 bytes used for password verification // next are 2 bytes used for password verification
let mut pwd_verification_value = vec![0; PWD_VERIFY_LENGTH]; let mut pwd_verification_value = [0; PWD_VERIFY_LENGTH];
self.reader.read_exact(&mut pwd_verification_value)?; self.reader.read_exact(&mut pwd_verification_value)?;
Ok((pwd_verification_value, salt)) Ok((pwd_verification_value, salt))
} }

View file

@ -82,6 +82,7 @@ pub(crate) mod zip_archive {
} }
} }
use crate::aes::PWD_VERIFY_LENGTH;
#[cfg(feature = "lzma")] #[cfg(feature = "lzma")]
use crate::read::lzma::LzmaDecoder; use crate::read::lzma::LzmaDecoder;
use crate::result::ZipError::{InvalidPassword, UnsupportedArchive}; use crate::result::ZipError::{InvalidPassword, UnsupportedArchive};
@ -647,33 +648,35 @@ impl<R: Read + Seek> ZipArchive<R> {
/// Returns the verification value and salt for the AES encryption of the file /// Returns the verification value and salt for the AES encryption of the file
/// ///
/// It fails if the file is not encrypted or if the file number is invalid. /// It fails if the file number is invalid.
/// ///
/// # Returns /// # Returns
/// ///
/// - Some with the verification value and the salt
/// - None if the file is not encrypted with AES /// - None if the file is not encrypted with AES
#[cfg(feature = "aes-crypto")] #[cfg(feature = "aes-crypto")]
pub fn get_aes_verification_key_and_salt( pub fn get_aes_verification_key_and_salt(
&mut self, &mut self,
file_number: usize, file_number: usize,
) -> ZipResult<Option<(AesMode, Vec<u8>, Vec<u8>)>> { ) -> ZipResult<Option<AesInfo>> {
let (_, data) = self let (_, data) = self
.shared .shared
.files .files
.get_index(file_number) .get_index(file_number)
.ok_or(ZipError::FileNotFound)?; .ok_or(ZipError::FileNotFound)?;
if !data.encrypted {
return Err(ZipError::UnsupportedArchive(ZipError::ARCHIVE_NOT_ENCRYPTED));
}
let limit_reader = find_content(data, &mut self.reader)?; let limit_reader = find_content(data, &mut self.reader)?;
match data.aes_mode { match data.aes_mode {
None => Ok(None), None => Ok(None),
Some((aes_mode, _, _)) => { Some((aes_mode, _, _)) => {
let (key, salt) = AesReader::new(limit_reader, aes_mode, data.compressed_size) let (verification_value, salt) =
AesReader::new(limit_reader, aes_mode, data.compressed_size)
.get_verification_value_and_salt()?; .get_verification_value_and_salt()?;
Ok(Some((aes_mode, key, salt))) let aes_info = AesInfo {
aes_mode,
verification_value,
salt,
};
Ok(Some(aes_info))
} }
} }
} }
@ -970,6 +973,17 @@ impl<R: Read + Seek> ZipArchive<R> {
} }
} }
/// Holds the AES information of a file in the zip archive
#[derive(Debug)]
pub struct AesInfo {
/// The AES encryption mode
pub aes_mode: AesMode,
/// The verification key
pub verification_value: [u8; PWD_VERIFY_LENGTH],
/// The salt
pub salt: Vec<u8>,
}
const fn unsupported_zip_error<T>(detail: &'static str) -> ZipResult<T> { const fn unsupported_zip_error<T>(detail: &'static str) -> ZipResult<T> {
Err(ZipError::UnsupportedArchive(detail)) Err(ZipError::UnsupportedArchive(detail))
} }

View file

@ -46,10 +46,6 @@ impl ZipError {
/// # () /// # ()
/// ``` /// ```
pub const PASSWORD_REQUIRED: &'static str = "Password required to decrypt file"; pub const PASSWORD_REQUIRED: &'static str = "Password required to decrypt file";
/// The text used as an error when the archive is not encrypted
pub const ARCHIVE_NOT_ENCRYPTED: &'static str = "the archive is not encrypted";
} }
impl From<ZipError> for io::Error { impl From<ZipError> for io::Error {