review & clippy
This commit is contained in:
parent
6da1faa4f1
commit
6db572ce65
3 changed files with 28 additions and 16 deletions
|
@ -15,7 +15,7 @@ use std::io::{self, Error, ErrorKind, Read, Write};
|
||||||
use zeroize::{Zeroize, Zeroizing};
|
use zeroize::{Zeroize, Zeroizing};
|
||||||
|
|
||||||
/// The length of the password verifcation value in bytes
|
/// The length of the password verifcation value in bytes
|
||||||
const PWD_VERIFY_LENGTH: usize = 2;
|
pub const PWD_VERIFY_LENGTH: usize = 2;
|
||||||
/// The length of the authentication code in bytes
|
/// The length of the authentication code in bytes
|
||||||
const AUTH_CODE_LENGTH: usize = 10;
|
const AUTH_CODE_LENGTH: usize = 10;
|
||||||
/// The number of iterations used with PBKDF2
|
/// The number of iterations used with PBKDF2
|
||||||
|
@ -130,14 +130,16 @@ impl<R: Read> AesReader<R> {
|
||||||
/// # Returns
|
/// # Returns
|
||||||
///
|
///
|
||||||
/// the verification value and the salt
|
/// the verification value and the salt
|
||||||
pub fn get_verification_value_and_salt(mut self) -> io::Result<(Vec<u8>, Vec<u8>)> {
|
pub fn get_verification_value_and_salt(
|
||||||
|
mut self,
|
||||||
|
) -> io::Result<([u8; PWD_VERIFY_LENGTH], Vec<u8>)> {
|
||||||
let salt_length = self.aes_mode.salt_length();
|
let salt_length = self.aes_mode.salt_length();
|
||||||
|
|
||||||
let mut salt = vec![0; salt_length];
|
let mut salt = vec![0; salt_length];
|
||||||
self.reader.read_exact(&mut salt)?;
|
self.reader.read_exact(&mut salt)?;
|
||||||
|
|
||||||
// next are 2 bytes used for password verification
|
// next are 2 bytes used for password verification
|
||||||
let mut pwd_verification_value = vec![0; PWD_VERIFY_LENGTH];
|
let mut pwd_verification_value = [0; PWD_VERIFY_LENGTH];
|
||||||
self.reader.read_exact(&mut pwd_verification_value)?;
|
self.reader.read_exact(&mut pwd_verification_value)?;
|
||||||
Ok((pwd_verification_value, salt))
|
Ok((pwd_verification_value, salt))
|
||||||
}
|
}
|
||||||
|
|
32
src/read.rs
32
src/read.rs
|
@ -82,6 +82,7 @@ pub(crate) mod zip_archive {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
use crate::aes::PWD_VERIFY_LENGTH;
|
||||||
#[cfg(feature = "lzma")]
|
#[cfg(feature = "lzma")]
|
||||||
use crate::read::lzma::LzmaDecoder;
|
use crate::read::lzma::LzmaDecoder;
|
||||||
use crate::result::ZipError::{InvalidPassword, UnsupportedArchive};
|
use crate::result::ZipError::{InvalidPassword, UnsupportedArchive};
|
||||||
|
@ -647,33 +648,35 @@ impl<R: Read + Seek> ZipArchive<R> {
|
||||||
|
|
||||||
/// Returns the verification value and salt for the AES encryption of the file
|
/// Returns the verification value and salt for the AES encryption of the file
|
||||||
///
|
///
|
||||||
/// It fails if the file is not encrypted or if the file number is invalid.
|
/// It fails if the file number is invalid.
|
||||||
///
|
///
|
||||||
/// # Returns
|
/// # Returns
|
||||||
///
|
///
|
||||||
/// - Some with the verification value and the salt
|
|
||||||
/// - None if the file is not encrypted with AES
|
/// - None if the file is not encrypted with AES
|
||||||
#[cfg(feature = "aes-crypto")]
|
#[cfg(feature = "aes-crypto")]
|
||||||
pub fn get_aes_verification_key_and_salt(
|
pub fn get_aes_verification_key_and_salt(
|
||||||
&mut self,
|
&mut self,
|
||||||
file_number: usize,
|
file_number: usize,
|
||||||
) -> ZipResult<Option<(AesMode, Vec<u8>, Vec<u8>)>> {
|
) -> ZipResult<Option<AesInfo>> {
|
||||||
let (_, data) = self
|
let (_, data) = self
|
||||||
.shared
|
.shared
|
||||||
.files
|
.files
|
||||||
.get_index(file_number)
|
.get_index(file_number)
|
||||||
.ok_or(ZipError::FileNotFound)?;
|
.ok_or(ZipError::FileNotFound)?;
|
||||||
|
|
||||||
if !data.encrypted {
|
|
||||||
return Err(ZipError::UnsupportedArchive(ZipError::ARCHIVE_NOT_ENCRYPTED));
|
|
||||||
}
|
|
||||||
let limit_reader = find_content(data, &mut self.reader)?;
|
let limit_reader = find_content(data, &mut self.reader)?;
|
||||||
match data.aes_mode {
|
match data.aes_mode {
|
||||||
None => Ok(None),
|
None => Ok(None),
|
||||||
Some((aes_mode, _, _)) => {
|
Some((aes_mode, _, _)) => {
|
||||||
let (key, salt) = AesReader::new(limit_reader, aes_mode, data.compressed_size)
|
let (verification_value, salt) =
|
||||||
.get_verification_value_and_salt()?;
|
AesReader::new(limit_reader, aes_mode, data.compressed_size)
|
||||||
Ok(Some((aes_mode, key, salt)))
|
.get_verification_value_and_salt()?;
|
||||||
|
let aes_info = AesInfo {
|
||||||
|
aes_mode,
|
||||||
|
verification_value,
|
||||||
|
salt,
|
||||||
|
};
|
||||||
|
Ok(Some(aes_info))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -970,6 +973,17 @@ impl<R: Read + Seek> ZipArchive<R> {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Holds the AES information of a file in the zip archive
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct AesInfo {
|
||||||
|
/// The AES encryption mode
|
||||||
|
pub aes_mode: AesMode,
|
||||||
|
/// The verification key
|
||||||
|
pub verification_value: [u8; PWD_VERIFY_LENGTH],
|
||||||
|
/// The salt
|
||||||
|
pub salt: Vec<u8>,
|
||||||
|
}
|
||||||
|
|
||||||
const fn unsupported_zip_error<T>(detail: &'static str) -> ZipResult<T> {
|
const fn unsupported_zip_error<T>(detail: &'static str) -> ZipResult<T> {
|
||||||
Err(ZipError::UnsupportedArchive(detail))
|
Err(ZipError::UnsupportedArchive(detail))
|
||||||
}
|
}
|
||||||
|
|
|
@ -46,10 +46,6 @@ impl ZipError {
|
||||||
/// # ()
|
/// # ()
|
||||||
/// ```
|
/// ```
|
||||||
pub const PASSWORD_REQUIRED: &'static str = "Password required to decrypt file";
|
pub const PASSWORD_REQUIRED: &'static str = "Password required to decrypt file";
|
||||||
|
|
||||||
|
|
||||||
/// The text used as an error when the archive is not encrypted
|
|
||||||
pub const ARCHIVE_NOT_ENCRYPTED: &'static str = "the archive is not encrypted";
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<ZipError> for io::Error {
|
impl From<ZipError> for io::Error {
|
||||||
|
|
Loading…
Add table
Reference in a new issue