diff --git a/CHANGELOG.md b/CHANGELOG.md index a790a06f..be5fc267 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -111,3 +111,10 @@ ### Fixed - Fixed a bug that occurs when a filename in a ZIP32 file includes the ZIP64 magic bytes. + +## [0.7.4] + +### Merged from upstream + +- Added experimental [`zip_next::unstable::write::FileOptions::with_deprecated_encryption`] API to enable encrypting + files with PKWARE encryption. diff --git a/Cargo.toml b/Cargo.toml index 989bb20b..f8068edf 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,12 +1,13 @@ [package] name = "zip_next" -version = "0.7.3" +version = "0.7.4" authors = ["Mathijs van de Nes ", "Marli Frost ", "Ryan Levick ", "Chris Hennick "] license = "MIT" repository = "https://github.com/Pr0methean/zip-next.git" keywords = ["zip", "archive"] description = """ +rust-version = "1.66.0" Library to support the reading and writing of zip files. """ edition = "2021" @@ -21,8 +22,8 @@ flate2 = { version = "1.0.26", default-features = false, optional = true } hmac = { version = "0.12.1", optional = true, features = ["reset"] } pbkdf2 = {version = "0.12.1", optional = true } sha1 = {version = "0.10.5", optional = true } -time = { version = "0.3.20", optional = true, default-features = false, features = ["std"] } -zstd = { version = "0.12.3", optional = true, default-features = false } +time = { version = "0.3.21", optional = true, default-features = false, features = ["std"] } +zstd = { version = "0.12.3", optional = true } [target.'cfg(any(all(target_arch = "arm", target_pointer_width = "32"), target_arch = "mips", target_arch = "powerpc"))'.dependencies] crossbeam-utils = "0.8.15" @@ -34,7 +35,7 @@ arbitrary = { version = "1.3.0", features = ["derive"] } bencher = "0.1.5" getrandom = "0.2.9" walkdir = "2.3.3" -time = { version = "0.3.20", features = ["formatting", "macros"] } +time = { version = "0.3.21", features = ["formatting", "macros"] } [features] aes-crypto = [ "aes", "constant_time_eq", "hmac", "pbkdf2", "sha1" ] diff --git a/README.md b/README.md index 2eeeafa3..a52116eb 100644 --- a/README.md +++ b/README.md @@ -32,14 +32,14 @@ With all default features: ```toml [dependencies] -zip_next = "0.7.3" +zip_next = "0.7.4" ``` Without the default features: ```toml [dependencies] -zip_next = { version = "0.7.3", default-features = false } +zip_next = { version = "0.7.4", default-features = false } ``` The features available are: diff --git a/src/lib.rs b/src/lib.rs index 9a50fea5..b1c6d92b 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -49,6 +49,6 @@ mod zipcrypto; /// /// ```toml /// [dependencies] -/// zip = "=0.6.4" +/// zip = "=0.6.5" /// ``` pub mod unstable; diff --git a/src/read.rs b/src/read.rs index 75096950..bb2855b6 100644 --- a/src/read.rs +++ b/src/read.rs @@ -57,7 +57,7 @@ pub(crate) mod zip_archive { /// for i in 0..zip.len() { /// let mut file = zip.by_index(i)?; /// println!("Filename: {}", file.name()); - /// std::io::copy(&mut file, &mut std::io::stdout()); + /// std::io::copy(&mut file, &mut std::io::stdout())?; /// } /// /// Ok(()) diff --git a/src/types.rs b/src/types.rs index d09ee716..821a275c 100644 --- a/src/types.rs +++ b/src/types.rs @@ -567,27 +567,6 @@ mod test { #[cfg(feature = "time")] use time::{format_description::well_known::Rfc3339, OffsetDateTime}; - #[cfg(feature = "time")] - #[test] - fn datetime_from_time_bounds() { - use std::convert::TryFrom; - - use super::DateTime; - use time::macros::datetime; - - // 1979-12-31 23:59:59 - assert!(DateTime::try_from(datetime!(1979-12-31 23:59:59 UTC)).is_err()); - - // 1980-01-01 00:00:00 - assert!(DateTime::try_from(datetime!(1980-01-01 00:00:00 UTC)).is_ok()); - - // 2107-12-31 23:59:59 - assert!(DateTime::try_from(datetime!(2107-12-31 23:59:59 UTC)).is_ok()); - - // 2108-01-01 00:00:00 - assert!(DateTime::try_from(datetime!(2108-01-01 00:00:00 UTC)).is_err()); - } - #[cfg(feature = "time")] #[test] fn datetime_try_from_bounds() { diff --git a/src/unstable.rs b/src/unstable.rs index 2cbfa5bb..cc03ff9a 100644 --- a/src/unstable.rs +++ b/src/unstable.rs @@ -2,3 +2,19 @@ pub mod stream { pub use crate::read::stream::*; } +/// Types for creating ZIP archives. +pub mod write { + use crate::write::FileOptions; + /// Unstable methods for [`FileOptions`]. + pub trait FileOptionsExt { + /// Write the file with the given password using the deprecated ZipCrypto algorithm. + /// + /// This is not recommended for new archives, as ZipCrypto is not secure. + fn with_deprecated_encryption(self, password: &[u8]) -> Self; + } + impl FileOptionsExt for FileOptions { + fn with_deprecated_encryption(self, password: &[u8]) -> Self { + self.with_deprecated_encryption(password) + } + } +} diff --git a/src/write.rs b/src/write.rs index 62fad178..fdfcd8bc 100644 --- a/src/write.rs +++ b/src/write.rs @@ -31,19 +31,37 @@ use time::OffsetDateTime; #[cfg(feature = "zstd")] use zstd::stream::write::Encoder as ZstdEncoder; +enum MaybeEncrypted { + Unencrypted(W), + Encrypted(crate::zipcrypto::ZipCryptoWriter), +} +impl Write for MaybeEncrypted { + fn write(&mut self, buf: &[u8]) -> io::Result { + match self { + MaybeEncrypted::Unencrypted(w) => w.write(buf), + MaybeEncrypted::Encrypted(w) => w.write(buf), + } + } + fn flush(&mut self) -> io::Result<()> { + match self { + MaybeEncrypted::Unencrypted(w) => w.flush(), + MaybeEncrypted::Encrypted(w) => w.flush(), + } + } +} enum GenericZipWriter { Closed, - Storer(W), + Storer(MaybeEncrypted), #[cfg(any( feature = "deflate", feature = "deflate-miniz", feature = "deflate-zlib" ))] - Deflater(DeflateEncoder), + Deflater(DeflateEncoder>), #[cfg(feature = "bzip2")] - Bzip2(BzEncoder), + Bzip2(BzEncoder>), #[cfg(feature = "zstd")] - Zstd(ZstdEncoder<'static, W>), + Zstd(ZstdEncoder<'static, MaybeEncrypted>), } // Put the struct declaration in a private module to convince rustdoc to display ZipWriter nicely @@ -115,6 +133,7 @@ pub struct FileOptions { pub(crate) last_modified_time: DateTime, pub(crate) permissions: Option, pub(crate) large_file: bool, + encrypt_with: Option, } impl FileOptions { @@ -178,6 +197,10 @@ impl FileOptions { self.large_file = large; self } + pub(crate) fn with_deprecated_encryption(mut self, password: &[u8]) -> FileOptions { + self.encrypt_with = Some(crate::zipcrypto::ZipCryptoKeys::derive(password)); + self + } } impl Default for FileOptions { @@ -203,6 +226,7 @@ impl Default for FileOptions { last_modified_time: DateTime::default(), permissions: None, large_file: false, + encrypt_with: None, } } } @@ -293,7 +317,7 @@ impl ZipWriter { let _ = readwriter.seek(SeekFrom::Start(directory_start)); // seek directory_start to overwrite it Ok(ZipWriter { - inner: Storer(readwriter), + inner: Storer(MaybeEncrypted::Unencrypted(readwriter)), files, files_by_name, stats: Default::default(), @@ -360,7 +384,7 @@ impl ZipWriter { /// [`ZipWriter::is_writing_file`] to determine if the file remains open. pub fn new(inner: W) -> ZipWriter { ZipWriter { - inner: Storer(inner), + inner: Storer(MaybeEncrypted::Unencrypted(inner)), files: Vec::new(), files_by_name: HashMap::new(), stats: Default::default(), @@ -419,7 +443,7 @@ impl ZipWriter { let file = ZipFileData { system: System::Unix, version_made_by: DEFAULT_VERSION, - encrypted: false, + encrypted: options.encrypt_with.is_some(), using_data_descriptor: false, compression_method: options.compression_method, compression_level: options.compression_level, @@ -450,7 +474,17 @@ impl ZipWriter { self.stats.bytes_written = 0; self.stats.hasher = Hasher::new(); } + if let Some(keys) = options.encrypt_with { + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { + writer: mem::replace(&mut self.inner, Closed).unwrap(), + buffer: vec![], + keys, + }; + let crypto_header = [0u8; 12]; + zipwriter.write_all(&crypto_header)?; + self.inner = Storer(MaybeEncrypted::Encrypted(zipwriter)); + } Ok(()) } @@ -479,6 +513,14 @@ impl ZipWriter { .inner .prepare_next_writer(CompressionMethod::Stored, None)?; self.inner.switch_to(make_plain_writer)?; + match mem::replace(&mut self.inner, Closed) { + Storer(MaybeEncrypted::Encrypted(writer)) => { + let crc32 = self.stats.hasher.clone().finalize(); + self.inner = Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) + } + Storer(w) => self.inner = Storer(w), + _ => unreachable!(), + } let writer = self.inner.get_plain(); if !self.writing_raw { @@ -1000,12 +1042,14 @@ impl Drop for ZipWriter { } } +type SwitchWriterFunction = Box) -> GenericZipWriter>; + impl GenericZipWriter { fn prepare_next_writer( &self, compression: CompressionMethod, compression_level: Option, - ) -> ZipResult GenericZipWriter>> { + ) -> ZipResult> { if let Closed = self { return Err( io::Error::new(io::ErrorKind::BrokenPipe, "ZipWriter was already closed").into(), @@ -1083,10 +1127,7 @@ impl GenericZipWriter { } } - fn switch_to( - &mut self, - make_new_self: Box GenericZipWriter>, - ) -> ZipResult<()> { + fn switch_to(&mut self, make_new_self: SwitchWriterFunction) -> ZipResult<()> { let bare = match mem::replace(self, Closed) { Storer(w) => w, #[cfg(any( @@ -1134,15 +1175,15 @@ impl GenericZipWriter { fn get_plain(&mut self) -> &mut W { match *self { - Storer(ref mut w) => w, - _ => panic!("Should have switched to stored beforehand"), + Storer(MaybeEncrypted::Unencrypted(ref mut w)) => w, + _ => panic!("Should have switched to stored and unencrypted beforehand"), } } fn unwrap(self) -> W { match self { - Storer(w) => w, - _ => panic!("Should have switched to stored beforehand"), + Storer(MaybeEncrypted::Unencrypted(w)) => w, + _ => panic!("Should have switched to stored and unencrypted beforehand"), } } } @@ -1190,7 +1231,7 @@ fn write_local_file_header(writer: &mut T, file: &ZipFileData) -> ZipR 1u16 << 11 } else { 0 - }; + } | if file.encrypted { 1u16 << 0 } else { 0 }; writer.write_u16::(flag)?; // Compression method #[allow(deprecated)] @@ -1262,7 +1303,7 @@ fn write_central_directory_header(writer: &mut T, file: &ZipFileData) 1u16 << 11 } else { 0 - }; + } | if file.encrypted { 1u16 << 0 } else { 0 }; writer.write_u16::(flag)?; // compression method #[allow(deprecated)] @@ -1558,6 +1599,7 @@ mod test { last_modified_time: DateTime::default(), permissions: Some(33188), large_file: false, + encrypt_with: None, }; writer.start_file("mimetype", options).unwrap(); writer @@ -1594,6 +1636,7 @@ mod test { last_modified_time: DateTime::default(), permissions: Some(33188), large_file: false, + encrypt_with: None, }; writer.start_file(RT_TEST_FILENAME, options).unwrap(); writer.write_all(RT_TEST_TEXT.as_ref()).unwrap(); @@ -1640,6 +1683,7 @@ mod test { last_modified_time: DateTime::default(), permissions: Some(33188), large_file: false, + encrypt_with: None, }; writer.start_file(RT_TEST_FILENAME, options).unwrap(); writer.write_all(RT_TEST_TEXT.as_ref()).unwrap(); diff --git a/src/zipcrypto.rs b/src/zipcrypto.rs index 91d40395..71af39e3 100644 --- a/src/zipcrypto.rs +++ b/src/zipcrypto.rs @@ -3,15 +3,28 @@ //! The following paper was used to implement the ZipCrypto algorithm: //! [https://courses.cs.ut.ee/MTAT.07.022/2015_fall/uploads/Main/dmitri-report-f15-16.pdf](https://courses.cs.ut.ee/MTAT.07.022/2015_fall/uploads/Main/dmitri-report-f15-16.pdf) +use std::collections::hash_map::DefaultHasher; +use std::fmt::{Debug, Formatter}; +use std::hash::{Hash, Hasher}; use std::num::Wrapping; /// A container to hold the current key state -struct ZipCryptoKeys { +#[cfg_attr(fuzzing, derive(arbitrary::Arbitrary))] +#[derive(Clone, Copy, Hash, Ord, PartialOrd, Eq, PartialEq)] +pub(crate) struct ZipCryptoKeys { key_0: Wrapping, key_1: Wrapping, key_2: Wrapping, } +impl Debug for ZipCryptoKeys { + fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result { + let mut t = DefaultHasher::new(); + self.hash(&mut t); + f.write_fmt(format_args!("ZipCryptoKeys(hash {})", t.finish())) + } +} + impl ZipCryptoKeys { fn new() -> ZipCryptoKeys { ZipCryptoKeys { @@ -49,6 +62,13 @@ impl ZipCryptoKeys { fn crc32(crc: Wrapping, input: u8) -> Wrapping { (crc >> 8) ^ Wrapping(CRCTABLE[((crc & Wrapping(0xff)).0 as u8 ^ input) as usize]) } + pub(crate) fn derive(password: &[u8]) -> ZipCryptoKeys { + let mut keys = ZipCryptoKeys::new(); + for byte in password.iter() { + keys.update(*byte); + } + keys + } } /// A ZipCrypto reader with unverified password @@ -70,17 +90,10 @@ impl ZipCryptoReader { /// would be impossible to decrypt files that were encrypted with a /// password byte sequence that is unrepresentable in UTF-8. pub fn new(file: R, password: &[u8]) -> ZipCryptoReader { - let mut result = ZipCryptoReader { + ZipCryptoReader { file, - keys: ZipCryptoKeys::new(), - }; - - // Key the cipher by updating the keys with the password. - for byte in password.iter() { - result.keys.update(*byte); + keys: ZipCryptoKeys::derive(password), } - - result } /// Read the ZipCrypto header bytes and validate the password. @@ -122,6 +135,33 @@ impl ZipCryptoReader { Ok(Some(ZipCryptoReaderValid { reader: self })) } } +#[allow(unused)] +pub(crate) struct ZipCryptoWriter { + pub(crate) writer: W, + pub(crate) buffer: Vec, + pub(crate) keys: ZipCryptoKeys, +} +impl ZipCryptoWriter { + #[allow(unused)] + pub(crate) fn finish(mut self, crc32: u32) -> std::io::Result { + self.buffer[11] = (crc32 >> 24) as u8; + for byte in self.buffer.iter_mut() { + *byte = self.keys.encrypt_byte(*byte); + } + self.writer.write_all(&self.buffer)?; + self.writer.flush()?; + Ok(self.writer) + } +} +impl std::io::Write for ZipCryptoWriter { + fn write(&mut self, buf: &[u8]) -> std::io::Result { + self.buffer.extend_from_slice(buf); + Ok(buf.len()) + } + fn flush(&mut self) -> std::io::Result<()> { + Ok(()) + } +} /// A ZipCrypto reader with verified password pub struct ZipCryptoReaderValid { diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index 3251e4a6..45612aac 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -20,6 +20,27 @@ use std::io::Cursor; use std::io::Read; +#[test] +fn encrypting_file() { + use std::io::{Read, Write}; + use zip_next::unstable::write::FileOptionsExt; + let mut buf = vec![0; 2048]; + let mut archive = zip_next::write::ZipWriter::new(Cursor::new(&mut buf)); + archive + .start_file( + "name", + zip_next::write::FileOptions::default().with_deprecated_encryption(b"password"), + ) + .unwrap(); + archive.write_all(b"test").unwrap(); + archive.finish().unwrap(); + drop(archive); + let mut archive = zip_next::ZipArchive::new(Cursor::new(&mut buf)).unwrap(); + let mut file = archive.by_index_decrypt(0, b"password").unwrap().unwrap(); + let mut buf = Vec::new(); + file.read_to_end(&mut buf).unwrap(); + assert_eq!(buf, b"test"); +} #[test] fn encrypted_file() { let zip_file_bytes = &mut Cursor::new(vec![