merge: Merge branch 'master' into explainer
This commit is contained in:
commit
ca60821c0a
15 changed files with 969 additions and 154 deletions
26
Cargo.toml
26
Cargo.toml
|
@ -11,24 +11,30 @@ Library to support the reading and writing of zip files.
|
||||||
edition = "2018"
|
edition = "2018"
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
flate2 = { version = "1.0.0", default-features = false, optional = true }
|
aes = { version = "0.7.5", optional = true }
|
||||||
time = { version = "0.3", features = ["formatting", "macros" ], optional = true }
|
byteorder = "1.4.3"
|
||||||
byteorder = "1.3"
|
bzip2 = { version = "0.4.3", optional = true }
|
||||||
bzip2 = { version = "0.4", optional = true }
|
constant_time_eq = { version = "0.1.5", optional = true }
|
||||||
crc32fast = "1.1.1"
|
crc32fast = "1.3.2"
|
||||||
zstd = { version = "0.10", optional = true }
|
flate2 = { version = "1.0.22", default-features = false, optional = true }
|
||||||
|
hmac = { version = "0.12.1", optional = true, features = ["reset"] }
|
||||||
|
pbkdf2 = {version = "0.10.1", optional = true }
|
||||||
|
sha1 = {version = "0.10.1", optional = true }
|
||||||
|
time = { version = "0.3.7", features = ["formatting", "macros" ], optional = true }
|
||||||
|
zstd = { version = "0.10.0", optional = true }
|
||||||
|
|
||||||
[dev-dependencies]
|
[dev-dependencies]
|
||||||
bencher = "0.1"
|
bencher = "0.1.5"
|
||||||
getrandom = "0.2"
|
getrandom = "0.2.5"
|
||||||
walkdir = "2"
|
walkdir = "2.3.2"
|
||||||
|
|
||||||
[features]
|
[features]
|
||||||
|
aes-crypto = [ "aes", "constant_time_eq", "hmac", "pbkdf2", "sha1" ]
|
||||||
deflate = ["flate2/rust_backend"]
|
deflate = ["flate2/rust_backend"]
|
||||||
deflate-miniz = ["flate2/default"]
|
deflate-miniz = ["flate2/default"]
|
||||||
deflate-zlib = ["flate2/zlib"]
|
deflate-zlib = ["flate2/zlib"]
|
||||||
unreserved = []
|
unreserved = []
|
||||||
default = ["bzip2", "deflate", "time", "zstd"]
|
default = ["aes-crypto", "bzip2", "deflate", "time", "zstd"]
|
||||||
|
|
||||||
[[bench]]
|
[[bench]]
|
||||||
name = "read_entry"
|
name = "read_entry"
|
||||||
|
|
|
@ -3,6 +3,7 @@ zip-rs
|
||||||
|
|
||||||
[](https://github.com/zip-rs/zip/actions?query=branch%3Amaster+workflow%3ACI)
|
[](https://github.com/zip-rs/zip/actions?query=branch%3Amaster+workflow%3ACI)
|
||||||
[](https://crates.io/crates/zip)
|
[](https://crates.io/crates/zip)
|
||||||
|
[](https://discord.gg/rQ7H9cSsF4)
|
||||||
|
|
||||||
[Documentation](https://docs.rs/zip/0.5.13/zip/)
|
[Documentation](https://docs.rs/zip/0.5.13/zip/)
|
||||||
|
|
||||||
|
@ -43,6 +44,7 @@ zip = { version = "0.5", default-features = false }
|
||||||
|
|
||||||
The features available are:
|
The features available are:
|
||||||
|
|
||||||
|
* `aes-crypto`: Enables decryption of files which were encrypted with AES. Supports AE-1 and AE-2 methods.
|
||||||
* `deflate`: Enables the deflate compression algorithm, which is the default for zip files.
|
* `deflate`: Enables the deflate compression algorithm, which is the default for zip files.
|
||||||
* `bzip2`: Enables the BZip2 compression algorithm.
|
* `bzip2`: Enables the BZip2 compression algorithm.
|
||||||
* `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate.
|
* `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate.
|
||||||
|
|
|
@ -30,7 +30,7 @@ fn real_main() -> i32 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (&*file.name()).ends_with('/') {
|
if (*file.name()).ends_with('/') {
|
||||||
println!("File {} extracted to \"{}\"", i, outpath.display());
|
println!("File {} extracted to \"{}\"", i, outpath.display());
|
||||||
fs::create_dir_all(&outpath).unwrap();
|
fs::create_dir_all(&outpath).unwrap();
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -34,7 +34,7 @@ fn real_main() -> i32 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (&*file.name()).ends_with('/') {
|
if (*file.name()).ends_with('/') {
|
||||||
println!(
|
println!(
|
||||||
"Entry {} is a directory with name \"{}\"",
|
"Entry {} is a directory with name \"{}\"",
|
||||||
i,
|
i,
|
||||||
|
|
185
src/aes.rs
Normal file
185
src/aes.rs
Normal file
|
@ -0,0 +1,185 @@
|
||||||
|
//! Implementation of the AES decryption for zip files.
|
||||||
|
//!
|
||||||
|
//! This was implemented according to the [WinZip specification](https://www.winzip.com/win/en/aes_info.html).
|
||||||
|
//! Note that using CRC with AES depends on the used encryption specification, AE-1 or AE-2.
|
||||||
|
//! If the file is marked as encrypted with AE-2 the CRC field is ignored, even if it isn't set to 0.
|
||||||
|
|
||||||
|
use crate::aes_ctr;
|
||||||
|
use crate::types::AesMode;
|
||||||
|
use constant_time_eq::constant_time_eq;
|
||||||
|
use hmac::{Hmac, Mac};
|
||||||
|
use sha1::Sha1;
|
||||||
|
use std::io::{self, Read};
|
||||||
|
|
||||||
|
/// The length of the password verifcation value in bytes
|
||||||
|
const PWD_VERIFY_LENGTH: usize = 2;
|
||||||
|
/// The length of the authentication code in bytes
|
||||||
|
const AUTH_CODE_LENGTH: usize = 10;
|
||||||
|
/// The number of iterations used with PBKDF2
|
||||||
|
const ITERATION_COUNT: u32 = 1000;
|
||||||
|
|
||||||
|
/// Create a AesCipher depending on the used `AesMode` and the given `key`.
|
||||||
|
///
|
||||||
|
/// # Panics
|
||||||
|
///
|
||||||
|
/// This panics if `key` doesn't have the correct size for the chosen aes mode.
|
||||||
|
fn cipher_from_mode(aes_mode: AesMode, key: &[u8]) -> Box<dyn aes_ctr::AesCipher> {
|
||||||
|
match aes_mode {
|
||||||
|
AesMode::Aes128 => Box::new(aes_ctr::AesCtrZipKeyStream::<aes_ctr::Aes128>::new(key))
|
||||||
|
as Box<dyn aes_ctr::AesCipher>,
|
||||||
|
AesMode::Aes192 => Box::new(aes_ctr::AesCtrZipKeyStream::<aes_ctr::Aes192>::new(key))
|
||||||
|
as Box<dyn aes_ctr::AesCipher>,
|
||||||
|
AesMode::Aes256 => Box::new(aes_ctr::AesCtrZipKeyStream::<aes_ctr::Aes256>::new(key))
|
||||||
|
as Box<dyn aes_ctr::AesCipher>,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// An aes encrypted file starts with a salt, whose length depends on the used aes mode
|
||||||
|
// followed by a 2 byte password verification value
|
||||||
|
// then the variable length encrypted data
|
||||||
|
// and lastly a 10 byte authentication code
|
||||||
|
pub struct AesReader<R> {
|
||||||
|
reader: R,
|
||||||
|
aes_mode: AesMode,
|
||||||
|
data_length: u64,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<R: Read> AesReader<R> {
|
||||||
|
pub fn new(reader: R, aes_mode: AesMode, compressed_size: u64) -> AesReader<R> {
|
||||||
|
let data_length = compressed_size
|
||||||
|
- (PWD_VERIFY_LENGTH + AUTH_CODE_LENGTH + aes_mode.salt_length()) as u64;
|
||||||
|
|
||||||
|
Self {
|
||||||
|
reader,
|
||||||
|
aes_mode,
|
||||||
|
data_length,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Read the AES header bytes and validate the password.
|
||||||
|
///
|
||||||
|
/// Even if the validation succeeds, there is still a 1 in 65536 chance that an incorrect
|
||||||
|
/// password was provided.
|
||||||
|
/// It isn't possible to check the authentication code in this step. This will be done after
|
||||||
|
/// reading and decrypting the file.
|
||||||
|
///
|
||||||
|
/// # Returns
|
||||||
|
///
|
||||||
|
/// If the password verification failed `Ok(None)` will be returned to match the validate
|
||||||
|
/// method of ZipCryptoReader.
|
||||||
|
pub fn validate(mut self, password: &[u8]) -> io::Result<Option<AesReaderValid<R>>> {
|
||||||
|
let salt_length = self.aes_mode.salt_length();
|
||||||
|
let key_length = self.aes_mode.key_length();
|
||||||
|
|
||||||
|
let mut salt = vec![0; salt_length];
|
||||||
|
self.reader.read_exact(&mut salt)?;
|
||||||
|
|
||||||
|
// next are 2 bytes used for password verification
|
||||||
|
let mut pwd_verification_value = vec![0; PWD_VERIFY_LENGTH];
|
||||||
|
self.reader.read_exact(&mut pwd_verification_value)?;
|
||||||
|
|
||||||
|
// derive a key from the password and salt
|
||||||
|
// the length depends on the aes key length
|
||||||
|
let derived_key_len = 2 * key_length + PWD_VERIFY_LENGTH;
|
||||||
|
let mut derived_key: Vec<u8> = vec![0; derived_key_len];
|
||||||
|
|
||||||
|
// use PBKDF2 with HMAC-Sha1 to derive the key
|
||||||
|
pbkdf2::pbkdf2::<Hmac<Sha1>>(password, &salt, ITERATION_COUNT, &mut derived_key);
|
||||||
|
let decrypt_key = &derived_key[0..key_length];
|
||||||
|
let hmac_key = &derived_key[key_length..key_length * 2];
|
||||||
|
let pwd_verify = &derived_key[derived_key_len - 2..];
|
||||||
|
|
||||||
|
// the last 2 bytes should equal the password verification value
|
||||||
|
if pwd_verification_value != pwd_verify {
|
||||||
|
// wrong password
|
||||||
|
return Ok(None);
|
||||||
|
}
|
||||||
|
|
||||||
|
let cipher = cipher_from_mode(self.aes_mode, decrypt_key);
|
||||||
|
let hmac = Hmac::<Sha1>::new_from_slice(hmac_key).unwrap();
|
||||||
|
|
||||||
|
Ok(Some(AesReaderValid {
|
||||||
|
reader: self.reader,
|
||||||
|
data_remaining: self.data_length,
|
||||||
|
cipher,
|
||||||
|
hmac,
|
||||||
|
finalized: false,
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// A reader for aes encrypted files, which has already passed the first password check.
|
||||||
|
///
|
||||||
|
/// There is a 1 in 65536 chance that an invalid password passes that check.
|
||||||
|
/// After the data has been read and decrypted an HMAC will be checked and provide a final means
|
||||||
|
/// to check if either the password is invalid or if the data has been changed.
|
||||||
|
pub struct AesReaderValid<R: Read> {
|
||||||
|
reader: R,
|
||||||
|
data_remaining: u64,
|
||||||
|
cipher: Box<dyn aes_ctr::AesCipher>,
|
||||||
|
hmac: Hmac<Sha1>,
|
||||||
|
finalized: bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<R: Read> Read for AesReaderValid<R> {
|
||||||
|
/// This implementation does not fulfill all requirements set in the trait documentation.
|
||||||
|
///
|
||||||
|
/// ```txt
|
||||||
|
/// "If an error is returned then it must be guaranteed that no bytes were read."
|
||||||
|
/// ```
|
||||||
|
///
|
||||||
|
/// Whether this applies to errors that occur while reading the encrypted data depends on the
|
||||||
|
/// underlying reader. If the error occurs while verifying the HMAC, the reader might become
|
||||||
|
/// practically unusable, since its position after the error is not known.
|
||||||
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
if self.data_remaining == 0 {
|
||||||
|
return Ok(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
// get the number of bytes to read, compare as u64 to make sure we can read more than
|
||||||
|
// 2^32 bytes even on 32 bit systems.
|
||||||
|
let bytes_to_read = self.data_remaining.min(buf.len() as u64) as usize;
|
||||||
|
let read = self.reader.read(&mut buf[0..bytes_to_read])?;
|
||||||
|
self.data_remaining -= read as u64;
|
||||||
|
|
||||||
|
// Update the hmac with the encrypted data
|
||||||
|
self.hmac.update(&buf[0..read]);
|
||||||
|
|
||||||
|
// decrypt the data
|
||||||
|
self.cipher.crypt_in_place(&mut buf[0..read]);
|
||||||
|
|
||||||
|
// if there is no data left to read, check the integrity of the data
|
||||||
|
if self.data_remaining == 0 {
|
||||||
|
assert!(
|
||||||
|
!self.finalized,
|
||||||
|
"Tried to use an already finalized HMAC. This is a bug!"
|
||||||
|
);
|
||||||
|
self.finalized = true;
|
||||||
|
|
||||||
|
// Zip uses HMAC-Sha1-80, which only uses the first half of the hash
|
||||||
|
// see https://www.winzip.com/win/en/aes_info.html#auth-faq
|
||||||
|
let mut read_auth_code = [0; AUTH_CODE_LENGTH];
|
||||||
|
self.reader.read_exact(&mut read_auth_code)?;
|
||||||
|
let computed_auth_code = &self.hmac.finalize_reset().into_bytes()[0..AUTH_CODE_LENGTH];
|
||||||
|
|
||||||
|
// use constant time comparison to mitigate timing attacks
|
||||||
|
if !constant_time_eq(computed_auth_code, &read_auth_code) {
|
||||||
|
return Err(
|
||||||
|
io::Error::new(
|
||||||
|
io::ErrorKind::InvalidData,
|
||||||
|
"Invalid authentication code, this could be due to an invalid password or errors in the data"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(read)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<R: Read> AesReaderValid<R> {
|
||||||
|
/// Consumes this decoder, returning the underlying reader.
|
||||||
|
pub fn into_inner(self) -> R {
|
||||||
|
self.reader
|
||||||
|
}
|
||||||
|
}
|
281
src/aes_ctr.rs
Normal file
281
src/aes_ctr.rs
Normal file
|
@ -0,0 +1,281 @@
|
||||||
|
//! A counter mode (CTR) for AES to work with the encryption used in zip files.
|
||||||
|
//!
|
||||||
|
//! This was implemented since the zip specification requires the mode to not use a nonce and uses a
|
||||||
|
//! different byte order (little endian) than NIST (big endian).
|
||||||
|
//! See [AesCtrZipKeyStream](./struct.AesCtrZipKeyStream.html) for more information.
|
||||||
|
|
||||||
|
use aes::cipher::generic_array::GenericArray;
|
||||||
|
use aes::{BlockEncrypt, NewBlockCipher};
|
||||||
|
use byteorder::WriteBytesExt;
|
||||||
|
use std::{any, fmt};
|
||||||
|
|
||||||
|
/// Internal block size of an AES cipher.
|
||||||
|
const AES_BLOCK_SIZE: usize = 16;
|
||||||
|
|
||||||
|
/// AES-128.
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct Aes128;
|
||||||
|
/// AES-192
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct Aes192;
|
||||||
|
/// AES-256.
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct Aes256;
|
||||||
|
|
||||||
|
/// An AES cipher kind.
|
||||||
|
pub trait AesKind {
|
||||||
|
/// Key type.
|
||||||
|
type Key: AsRef<[u8]>;
|
||||||
|
/// Cipher used to decrypt.
|
||||||
|
type Cipher;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AesKind for Aes128 {
|
||||||
|
type Key = [u8; 16];
|
||||||
|
type Cipher = aes::Aes128;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AesKind for Aes192 {
|
||||||
|
type Key = [u8; 24];
|
||||||
|
type Cipher = aes::Aes192;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AesKind for Aes256 {
|
||||||
|
type Key = [u8; 32];
|
||||||
|
type Cipher = aes::Aes256;
|
||||||
|
}
|
||||||
|
|
||||||
|
/// An AES-CTR key stream generator.
|
||||||
|
///
|
||||||
|
/// Implements the slightly non-standard AES-CTR variant used by WinZip AES encryption.
|
||||||
|
///
|
||||||
|
/// Typical AES-CTR implementations combine a nonce with a 64 bit counter. WinZIP AES instead uses
|
||||||
|
/// no nonce and also uses a different byte order (little endian) than NIST (big endian).
|
||||||
|
///
|
||||||
|
/// The stream implements the `Read` trait; encryption or decryption is performed by XOR-ing the
|
||||||
|
/// bytes from the key stream with the ciphertext/plaintext.
|
||||||
|
pub struct AesCtrZipKeyStream<C: AesKind> {
|
||||||
|
/// Current AES counter.
|
||||||
|
counter: u128,
|
||||||
|
/// AES cipher instance.
|
||||||
|
cipher: C::Cipher,
|
||||||
|
/// Stores the currently available keystream bytes.
|
||||||
|
buffer: [u8; AES_BLOCK_SIZE],
|
||||||
|
/// Number of bytes already used up from `buffer`.
|
||||||
|
pos: usize,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<C> fmt::Debug for AesCtrZipKeyStream<C>
|
||||||
|
where
|
||||||
|
C: AesKind,
|
||||||
|
{
|
||||||
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||||
|
write!(
|
||||||
|
f,
|
||||||
|
"AesCtrZipKeyStream<{}>(counter: {})",
|
||||||
|
any::type_name::<C>(),
|
||||||
|
self.counter
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<C> AesCtrZipKeyStream<C>
|
||||||
|
where
|
||||||
|
C: AesKind,
|
||||||
|
C::Cipher: NewBlockCipher,
|
||||||
|
{
|
||||||
|
/// Creates a new zip variant AES-CTR key stream.
|
||||||
|
///
|
||||||
|
/// # Panics
|
||||||
|
///
|
||||||
|
/// This panics if `key` doesn't have the correct size for cipher `C`.
|
||||||
|
pub fn new(key: &[u8]) -> AesCtrZipKeyStream<C> {
|
||||||
|
AesCtrZipKeyStream {
|
||||||
|
counter: 1,
|
||||||
|
cipher: C::Cipher::new(GenericArray::from_slice(key)),
|
||||||
|
buffer: [0u8; AES_BLOCK_SIZE],
|
||||||
|
pos: AES_BLOCK_SIZE,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<C> AesCipher for AesCtrZipKeyStream<C>
|
||||||
|
where
|
||||||
|
C: AesKind,
|
||||||
|
C::Cipher: BlockEncrypt,
|
||||||
|
{
|
||||||
|
/// Decrypt or encrypt `target`.
|
||||||
|
#[inline]
|
||||||
|
fn crypt_in_place(&mut self, mut target: &mut [u8]) {
|
||||||
|
while !target.is_empty() {
|
||||||
|
if self.pos == AES_BLOCK_SIZE {
|
||||||
|
// Note: AES block size is always 16 bytes, same as u128.
|
||||||
|
self.buffer
|
||||||
|
.as_mut()
|
||||||
|
.write_u128::<byteorder::LittleEndian>(self.counter)
|
||||||
|
.expect("did not expect u128 le conversion to fail");
|
||||||
|
self.cipher
|
||||||
|
.encrypt_block(GenericArray::from_mut_slice(&mut self.buffer));
|
||||||
|
self.counter += 1;
|
||||||
|
self.pos = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
let target_len = target.len().min(AES_BLOCK_SIZE - self.pos);
|
||||||
|
|
||||||
|
xor(
|
||||||
|
&mut target[0..target_len],
|
||||||
|
&self.buffer[self.pos..(self.pos + target_len)],
|
||||||
|
);
|
||||||
|
target = &mut target[target_len..];
|
||||||
|
self.pos += target_len;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This trait allows using generic AES ciphers with different key sizes.
|
||||||
|
pub trait AesCipher {
|
||||||
|
fn crypt_in_place(&mut self, target: &mut [u8]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// XORs a slice in place with another slice.
|
||||||
|
#[inline]
|
||||||
|
fn xor(dest: &mut [u8], src: &[u8]) {
|
||||||
|
assert_eq!(dest.len(), src.len());
|
||||||
|
|
||||||
|
for (lhs, rhs) in dest.iter_mut().zip(src.iter()) {
|
||||||
|
*lhs ^= *rhs;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use super::{Aes128, Aes192, Aes256, AesCipher, AesCtrZipKeyStream, AesKind};
|
||||||
|
use aes::{BlockEncrypt, NewBlockCipher};
|
||||||
|
|
||||||
|
/// Checks whether `crypt_in_place` produces the correct plaintext after one use and yields the
|
||||||
|
/// cipertext again after applying it again.
|
||||||
|
fn roundtrip<Aes>(key: &[u8], ciphertext: &mut [u8], expected_plaintext: &[u8])
|
||||||
|
where
|
||||||
|
Aes: AesKind,
|
||||||
|
Aes::Cipher: NewBlockCipher + BlockEncrypt,
|
||||||
|
{
|
||||||
|
let mut key_stream = AesCtrZipKeyStream::<Aes>::new(key);
|
||||||
|
|
||||||
|
let mut plaintext: Vec<u8> = ciphertext.to_vec();
|
||||||
|
key_stream.crypt_in_place(plaintext.as_mut_slice());
|
||||||
|
assert_eq!(plaintext, expected_plaintext.to_vec());
|
||||||
|
|
||||||
|
// Round-tripping should yield the ciphertext again.
|
||||||
|
let mut key_stream = AesCtrZipKeyStream::<Aes>::new(key);
|
||||||
|
key_stream.crypt_in_place(&mut plaintext);
|
||||||
|
assert_eq!(plaintext, ciphertext.to_vec());
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
#[should_panic]
|
||||||
|
fn new_with_wrong_key_size() {
|
||||||
|
AesCtrZipKeyStream::<Aes128>::new(&[1, 2, 3, 4, 5]);
|
||||||
|
}
|
||||||
|
|
||||||
|
// The data used in these tests was generated with p7zip without any compression.
|
||||||
|
// It's not possible to recreate the exact same data, since a random salt is used for encryption.
|
||||||
|
// `7z a -phelloworld -mem=AES256 -mx=0 aes256_40byte.zip 40byte_data.txt`
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_256_0_byte() {
|
||||||
|
let mut ciphertext = [];
|
||||||
|
let expected_plaintext = &[];
|
||||||
|
let key = [
|
||||||
|
0x0b, 0xec, 0x2e, 0xf2, 0x46, 0xf0, 0x7e, 0x35, 0x16, 0x54, 0xe0, 0x98, 0x10, 0xb3,
|
||||||
|
0x18, 0x55, 0x24, 0xa3, 0x9e, 0x0e, 0x40, 0xe7, 0x92, 0xad, 0xb2, 0x8a, 0x48, 0xf4,
|
||||||
|
0x5c, 0xd0, 0xc0, 0x54,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes256>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_128_5_byte() {
|
||||||
|
let mut ciphertext = [0x98, 0xa9, 0x8c, 0x26, 0x0e];
|
||||||
|
let expected_plaintext = b"asdf\n";
|
||||||
|
let key = [
|
||||||
|
0xe0, 0x25, 0x7b, 0x57, 0x97, 0x6a, 0xa4, 0x23, 0xab, 0x94, 0xaa, 0x44, 0xfd, 0x47,
|
||||||
|
0x4f, 0xa5,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes128>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_192_5_byte() {
|
||||||
|
let mut ciphertext = [0x36, 0x55, 0x5c, 0x61, 0x3c];
|
||||||
|
let expected_plaintext = b"asdf\n";
|
||||||
|
let key = [
|
||||||
|
0xe4, 0x4a, 0x88, 0x52, 0x8f, 0xf7, 0x0b, 0x81, 0x7b, 0x75, 0xf1, 0x74, 0x21, 0x37,
|
||||||
|
0x8c, 0x90, 0xad, 0xbe, 0x4a, 0x65, 0xa8, 0x96, 0x0e, 0xcc,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes192>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_256_5_byte() {
|
||||||
|
let mut ciphertext = [0xc2, 0x47, 0xc0, 0xdc, 0x56];
|
||||||
|
let expected_plaintext = b"asdf\n";
|
||||||
|
let key = [
|
||||||
|
0x79, 0x5e, 0x17, 0xf2, 0xc6, 0x3d, 0x28, 0x9b, 0x4b, 0x4b, 0xbb, 0xa9, 0xba, 0xc9,
|
||||||
|
0xa5, 0xee, 0x3a, 0x4f, 0x0f, 0x4b, 0x29, 0xbd, 0xe9, 0xb8, 0x41, 0x9c, 0x41, 0xa5,
|
||||||
|
0x15, 0xb2, 0x86, 0xab,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes256>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_128_40_byte() {
|
||||||
|
let mut ciphertext = [
|
||||||
|
0xcf, 0x72, 0x6b, 0xa1, 0xb2, 0x0f, 0xdf, 0xaa, 0x10, 0xad, 0x9c, 0x7f, 0x6d, 0x1c,
|
||||||
|
0x8d, 0xb5, 0x16, 0x7e, 0xbb, 0x11, 0x69, 0x52, 0x8c, 0x89, 0x80, 0x32, 0xaa, 0x76,
|
||||||
|
0xa6, 0x18, 0x31, 0x98, 0xee, 0xdd, 0x22, 0x68, 0xb7, 0xe6, 0x77, 0xd2,
|
||||||
|
];
|
||||||
|
let expected_plaintext = b"Lorem ipsum dolor sit amet, consectetur\n";
|
||||||
|
let key = [
|
||||||
|
0x43, 0x2b, 0x6d, 0xbe, 0x05, 0x76, 0x6c, 0x9e, 0xde, 0xca, 0x3b, 0xf8, 0xaf, 0x5d,
|
||||||
|
0x81, 0xb6,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes128>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_192_40_byte() {
|
||||||
|
let mut ciphertext = [
|
||||||
|
0xa6, 0xfc, 0x52, 0x79, 0x2c, 0x6c, 0xfe, 0x68, 0xb1, 0xa8, 0xb3, 0x07, 0x52, 0x8b,
|
||||||
|
0x82, 0xa6, 0x87, 0x9c, 0x72, 0x42, 0x3a, 0xf8, 0xc6, 0xa9, 0xc9, 0xfb, 0x61, 0x19,
|
||||||
|
0x37, 0xb9, 0x56, 0x62, 0xf4, 0xfc, 0x5e, 0x7a, 0xdd, 0x55, 0x0a, 0x48,
|
||||||
|
];
|
||||||
|
let expected_plaintext = b"Lorem ipsum dolor sit amet, consectetur\n";
|
||||||
|
let key = [
|
||||||
|
0xac, 0x92, 0x41, 0xba, 0xde, 0xd9, 0x02, 0xfe, 0x40, 0x92, 0x20, 0xf6, 0x56, 0x03,
|
||||||
|
0xfe, 0xae, 0x1b, 0xba, 0x01, 0x97, 0x97, 0x79, 0xbb, 0xa6,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes192>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn crypt_aes_256_40_byte() {
|
||||||
|
let mut ciphertext = [
|
||||||
|
0xa9, 0x99, 0xbd, 0xea, 0x82, 0x9b, 0x8f, 0x2f, 0xb7, 0x52, 0x2f, 0x6b, 0xd8, 0xf6,
|
||||||
|
0xab, 0x0e, 0x24, 0x51, 0x9e, 0x18, 0x0f, 0xc0, 0x8f, 0x54, 0x15, 0x80, 0xae, 0xbc,
|
||||||
|
0xa0, 0x5c, 0x8a, 0x11, 0x8d, 0x14, 0x7e, 0xc5, 0xb4, 0xae, 0xd3, 0x37,
|
||||||
|
];
|
||||||
|
let expected_plaintext = b"Lorem ipsum dolor sit amet, consectetur\n";
|
||||||
|
let key = [
|
||||||
|
0x64, 0x7c, 0x7a, 0xde, 0xf0, 0xf2, 0x61, 0x49, 0x1c, 0xf1, 0xf1, 0xe3, 0x37, 0xfc,
|
||||||
|
0xe1, 0x4d, 0x4a, 0x77, 0xd4, 0xeb, 0x9e, 0x3d, 0x75, 0xce, 0x9a, 0x3e, 0x10, 0x50,
|
||||||
|
0xc2, 0x07, 0x36, 0xb6,
|
||||||
|
];
|
||||||
|
|
||||||
|
roundtrip::<Aes256>(&key, &mut ciphertext, expected_plaintext);
|
||||||
|
}
|
||||||
|
}
|
|
@ -72,6 +72,11 @@ impl CompressionMethod {
|
||||||
pub const JPEG: Self = CompressionMethod::Unsupported(96);
|
pub const JPEG: Self = CompressionMethod::Unsupported(96);
|
||||||
pub const WAVPACK: Self = CompressionMethod::Unsupported(97);
|
pub const WAVPACK: Self = CompressionMethod::Unsupported(97);
|
||||||
pub const PPMD: Self = CompressionMethod::Unsupported(98);
|
pub const PPMD: Self = CompressionMethod::Unsupported(98);
|
||||||
|
/// Encrypted using AES.
|
||||||
|
///
|
||||||
|
/// The actual compression method has to be taken from the AES extra data field
|
||||||
|
/// or from `ZipFileData`.
|
||||||
|
pub const AES: Self = CompressionMethod::Unsupported(99);
|
||||||
}
|
}
|
||||||
impl CompressionMethod {
|
impl CompressionMethod {
|
||||||
/// Converts an u16 to its corresponding CompressionMethod
|
/// Converts an u16 to its corresponding CompressionMethod
|
||||||
|
@ -93,6 +98,7 @@ impl CompressionMethod {
|
||||||
12 => CompressionMethod::Bzip2,
|
12 => CompressionMethod::Bzip2,
|
||||||
#[cfg(feature = "zstd")]
|
#[cfg(feature = "zstd")]
|
||||||
93 => CompressionMethod::Zstd,
|
93 => CompressionMethod::Zstd,
|
||||||
|
99 => CompressionMethod::AES,
|
||||||
|
|
||||||
v => CompressionMethod::Unsupported(v),
|
v => CompressionMethod::Unsupported(v),
|
||||||
}
|
}
|
||||||
|
@ -115,6 +121,7 @@ impl CompressionMethod {
|
||||||
CompressionMethod::Deflated => 8,
|
CompressionMethod::Deflated => 8,
|
||||||
#[cfg(feature = "bzip2")]
|
#[cfg(feature = "bzip2")]
|
||||||
CompressionMethod::Bzip2 => 12,
|
CompressionMethod::Bzip2 => 12,
|
||||||
|
CompressionMethod::AES => 99,
|
||||||
#[cfg(feature = "zstd")]
|
#[cfg(feature = "zstd")]
|
||||||
CompressionMethod::Zstd => 93,
|
CompressionMethod::Zstd => 93,
|
||||||
|
|
||||||
|
@ -130,9 +137,24 @@ impl fmt::Display for CompressionMethod {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// The compression methods which have been implemented.
|
||||||
|
pub const SUPPORTED_COMPRESSION_METHODS: &[CompressionMethod] = &[
|
||||||
|
CompressionMethod::Stored,
|
||||||
|
#[cfg(any(
|
||||||
|
feature = "deflate",
|
||||||
|
feature = "deflate-miniz",
|
||||||
|
feature = "deflate-zlib"
|
||||||
|
))]
|
||||||
|
CompressionMethod::Deflated,
|
||||||
|
#[cfg(feature = "bzip2")]
|
||||||
|
CompressionMethod::Bzip2,
|
||||||
|
#[cfg(feature = "zstd")]
|
||||||
|
CompressionMethod::Zstd,
|
||||||
|
];
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod test {
|
mod test {
|
||||||
use super::CompressionMethod;
|
use super::{CompressionMethod, SUPPORTED_COMPRESSION_METHODS};
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn from_eq_to() {
|
fn from_eq_to() {
|
||||||
|
@ -145,22 +167,6 @@ mod test {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn methods() -> Vec<CompressionMethod> {
|
|
||||||
vec![
|
|
||||||
CompressionMethod::Stored,
|
|
||||||
#[cfg(any(
|
|
||||||
feature = "deflate",
|
|
||||||
feature = "deflate-miniz",
|
|
||||||
feature = "deflate-zlib"
|
|
||||||
))]
|
|
||||||
CompressionMethod::Deflated,
|
|
||||||
#[cfg(feature = "bzip2")]
|
|
||||||
CompressionMethod::Bzip2,
|
|
||||||
#[cfg(feature = "zstd")]
|
|
||||||
CompressionMethod::Zstd,
|
|
||||||
]
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn to_eq_from() {
|
fn to_eq_from() {
|
||||||
fn check_match(method: CompressionMethod) {
|
fn check_match(method: CompressionMethod) {
|
||||||
|
@ -173,7 +179,7 @@ mod test {
|
||||||
assert_eq!(to, back);
|
assert_eq!(to, back);
|
||||||
}
|
}
|
||||||
|
|
||||||
for method in methods() {
|
for &method in SUPPORTED_COMPRESSION_METHODS {
|
||||||
check_match(method);
|
check_match(method);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -186,7 +192,7 @@ mod test {
|
||||||
assert_eq!(debug_str, display_str);
|
assert_eq!(debug_str, display_str);
|
||||||
}
|
}
|
||||||
|
|
||||||
for method in methods() {
|
for &method in SUPPORTED_COMPRESSION_METHODS {
|
||||||
check_match(method);
|
check_match(method);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
21
src/crc32.rs
21
src/crc32.rs
|
@ -10,15 +10,20 @@ pub struct Crc32Reader<R> {
|
||||||
inner: R,
|
inner: R,
|
||||||
hasher: Hasher,
|
hasher: Hasher,
|
||||||
check: u32,
|
check: u32,
|
||||||
|
/// Signals if `inner` stores aes encrypted data.
|
||||||
|
/// AE-2 encrypted data doesn't use crc and sets the value to 0.
|
||||||
|
ae2_encrypted: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<R> Crc32Reader<R> {
|
impl<R> Crc32Reader<R> {
|
||||||
/// Get a new Crc32Reader which check the inner reader against checksum.
|
/// Get a new Crc32Reader which checks the inner reader against checksum.
|
||||||
pub fn new(inner: R, checksum: u32) -> Crc32Reader<R> {
|
/// The check is disabled if `ae2_encrypted == true`.
|
||||||
|
pub(crate) fn new(inner: R, checksum: u32, ae2_encrypted: bool) -> Crc32Reader<R> {
|
||||||
Crc32Reader {
|
Crc32Reader {
|
||||||
inner,
|
inner,
|
||||||
hasher: Hasher::new(),
|
hasher: Hasher::new(),
|
||||||
check: checksum,
|
check: checksum,
|
||||||
|
ae2_encrypted,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -33,8 +38,10 @@ impl<R> Crc32Reader<R> {
|
||||||
|
|
||||||
impl<R: Read> Read for Crc32Reader<R> {
|
impl<R: Read> Read for Crc32Reader<R> {
|
||||||
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
let invalid_check = !buf.is_empty() && !self.check_matches() && !self.ae2_encrypted;
|
||||||
|
|
||||||
let count = match self.inner.read(buf) {
|
let count = match self.inner.read(buf) {
|
||||||
Ok(0) if !buf.is_empty() && !self.check_matches() => {
|
Ok(0) if invalid_check => {
|
||||||
return Err(io::Error::new(io::ErrorKind::Other, "Invalid checksum"))
|
return Err(io::Error::new(io::ErrorKind::Other, "Invalid checksum"))
|
||||||
}
|
}
|
||||||
Ok(n) => n,
|
Ok(n) => n,
|
||||||
|
@ -55,10 +62,10 @@ mod test {
|
||||||
let data: &[u8] = b"";
|
let data: &[u8] = b"";
|
||||||
let mut buf = [0; 1];
|
let mut buf = [0; 1];
|
||||||
|
|
||||||
let mut reader = Crc32Reader::new(data, 0);
|
let mut reader = Crc32Reader::new(data, 0, false);
|
||||||
assert_eq!(reader.read(&mut buf).unwrap(), 0);
|
assert_eq!(reader.read(&mut buf).unwrap(), 0);
|
||||||
|
|
||||||
let mut reader = Crc32Reader::new(data, 1);
|
let mut reader = Crc32Reader::new(data, 1, false);
|
||||||
assert!(reader
|
assert!(reader
|
||||||
.read(&mut buf)
|
.read(&mut buf)
|
||||||
.unwrap_err()
|
.unwrap_err()
|
||||||
|
@ -71,7 +78,7 @@ mod test {
|
||||||
let data: &[u8] = b"1234";
|
let data: &[u8] = b"1234";
|
||||||
let mut buf = [0; 1];
|
let mut buf = [0; 1];
|
||||||
|
|
||||||
let mut reader = Crc32Reader::new(data, 0x9be3e0a3);
|
let mut reader = Crc32Reader::new(data, 0x9be3e0a3, false);
|
||||||
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
||||||
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
||||||
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
assert_eq!(reader.read(&mut buf).unwrap(), 1);
|
||||||
|
@ -86,7 +93,7 @@ mod test {
|
||||||
let data: &[u8] = b"1234";
|
let data: &[u8] = b"1234";
|
||||||
let mut buf = [0; 5];
|
let mut buf = [0; 5];
|
||||||
|
|
||||||
let mut reader = Crc32Reader::new(data, 0x9be3e0a3);
|
let mut reader = Crc32Reader::new(data, 0x9be3e0a3, false);
|
||||||
assert_eq!(reader.read(&mut buf[..0]).unwrap(), 0);
|
assert_eq!(reader.read(&mut buf[..0]).unwrap(), 0);
|
||||||
assert_eq!(reader.read(&mut buf).unwrap(), 4);
|
assert_eq!(reader.read(&mut buf).unwrap(), 4);
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,11 +24,15 @@
|
||||||
|
|
||||||
#![warn(missing_docs)]
|
#![warn(missing_docs)]
|
||||||
|
|
||||||
pub use crate::compression::CompressionMethod;
|
pub use crate::compression::{CompressionMethod, SUPPORTED_COMPRESSION_METHODS};
|
||||||
pub use crate::read::ZipArchive;
|
pub use crate::read::ZipArchive;
|
||||||
pub use crate::types::DateTime;
|
pub use crate::types::DateTime;
|
||||||
pub use crate::write::ZipWriter;
|
pub use crate::write::ZipWriter;
|
||||||
|
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
mod aes;
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
mod aes_ctr;
|
||||||
mod compression;
|
mod compression;
|
||||||
mod cp437;
|
mod cp437;
|
||||||
mod crc32;
|
mod crc32;
|
||||||
|
|
215
src/read.rs
215
src/read.rs
|
@ -1,18 +1,20 @@
|
||||||
//! Types for reading ZIP archives
|
//! Types for reading ZIP archives
|
||||||
|
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
use crate::aes::{AesReader, AesReaderValid};
|
||||||
use crate::compression::CompressionMethod;
|
use crate::compression::CompressionMethod;
|
||||||
|
use crate::cp437::FromCp437;
|
||||||
use crate::crc32::Crc32Reader;
|
use crate::crc32::Crc32Reader;
|
||||||
use crate::result::{InvalidPassword, ZipError, ZipResult};
|
use crate::result::{InvalidPassword, ZipError, ZipResult};
|
||||||
use crate::spec;
|
use crate::spec;
|
||||||
|
use crate::types::{AesMode, AesVendorVersion, AtomicU64, DateTime, System, ZipFileData};
|
||||||
use crate::zipcrypto::{ZipCryptoReader, ZipCryptoReaderValid, ZipCryptoValidator};
|
use crate::zipcrypto::{ZipCryptoReader, ZipCryptoReaderValid, ZipCryptoValidator};
|
||||||
|
use byteorder::{LittleEndian, ReadBytesExt};
|
||||||
use std::borrow::Cow;
|
use std::borrow::Cow;
|
||||||
use std::collections::HashMap;
|
use std::collections::HashMap;
|
||||||
use std::io::{self, prelude::*};
|
use std::io::{self, prelude::*};
|
||||||
use std::path::{Component, Path};
|
use std::path::{Component, Path};
|
||||||
|
use std::sync::Arc;
|
||||||
use crate::cp437::FromCp437;
|
|
||||||
use crate::types::{DateTime, System, ZipFileData};
|
|
||||||
use byteorder::{LittleEndian, ReadBytesExt};
|
|
||||||
|
|
||||||
#[cfg(any(
|
#[cfg(any(
|
||||||
feature = "deflate",
|
feature = "deflate",
|
||||||
|
@ -34,9 +36,21 @@ mod ffi {
|
||||||
|
|
||||||
// Put the struct declaration in a private module to convince rustdoc to display ZipArchive nicely
|
// Put the struct declaration in a private module to convince rustdoc to display ZipArchive nicely
|
||||||
pub(crate) mod zip_archive {
|
pub(crate) mod zip_archive {
|
||||||
|
/// Extract immutable data from `ZipArchive` to make it cheap to clone
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct Shared {
|
||||||
|
pub(super) files: Vec<super::ZipFileData>,
|
||||||
|
pub(super) names_map: super::HashMap<String, usize>,
|
||||||
|
pub(super) offset: u64,
|
||||||
|
pub(super) comment: Vec<u8>,
|
||||||
|
}
|
||||||
|
|
||||||
/// ZIP archive reader
|
/// ZIP archive reader
|
||||||
///
|
///
|
||||||
|
/// At the moment, this type is cheap to clone if this is the case for the
|
||||||
|
/// reader it uses. However, this is not guaranteed by this crate and it may
|
||||||
|
/// change in the future.
|
||||||
|
///
|
||||||
/// ```no_run
|
/// ```no_run
|
||||||
/// use std::io::prelude::*;
|
/// use std::io::prelude::*;
|
||||||
/// fn list_zip_contents(reader: impl Read + Seek) -> zip::result::ZipResult<()> {
|
/// fn list_zip_contents(reader: impl Read + Seek) -> zip::result::ZipResult<()> {
|
||||||
|
@ -54,16 +68,20 @@ pub(crate) mod zip_archive {
|
||||||
#[derive(Clone, Debug)]
|
#[derive(Clone, Debug)]
|
||||||
pub struct ZipArchive<R> {
|
pub struct ZipArchive<R> {
|
||||||
pub(super) reader: R,
|
pub(super) reader: R,
|
||||||
pub(super) files: Vec<super::ZipFileData>,
|
pub(super) shared: super::Arc<Shared>,
|
||||||
pub(super) names_map: super::HashMap<String, usize>,
|
|
||||||
pub(super) offset: u64,
|
|
||||||
pub(super) comment: Vec<u8>,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
pub use zip_archive::ZipArchive;
|
|
||||||
|
pub use zip_archive::{Shared, ZipArchive};
|
||||||
|
#[allow(clippy::large_enum_variant)]
|
||||||
enum CryptoReader<'a> {
|
enum CryptoReader<'a> {
|
||||||
Plaintext(io::Take<&'a mut dyn Read>),
|
Plaintext(io::Take<&'a mut dyn Read>),
|
||||||
ZipCrypto(ZipCryptoReaderValid<io::Take<&'a mut dyn Read>>),
|
ZipCrypto(ZipCryptoReaderValid<io::Take<&'a mut dyn Read>>),
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
Aes {
|
||||||
|
reader: AesReaderValid<io::Take<&'a mut dyn Read>>,
|
||||||
|
vendor_version: AesVendorVersion,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<'a> Read for CryptoReader<'a> {
|
impl<'a> Read for CryptoReader<'a> {
|
||||||
|
@ -71,6 +89,8 @@ impl<'a> Read for CryptoReader<'a> {
|
||||||
match self {
|
match self {
|
||||||
CryptoReader::Plaintext(r) => r.read(buf),
|
CryptoReader::Plaintext(r) => r.read(buf),
|
||||||
CryptoReader::ZipCrypto(r) => r.read(buf),
|
CryptoReader::ZipCrypto(r) => r.read(buf),
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
CryptoReader::Aes { reader: r, .. } => r.read(buf),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -81,8 +101,24 @@ impl<'a> CryptoReader<'a> {
|
||||||
match self {
|
match self {
|
||||||
CryptoReader::Plaintext(r) => r,
|
CryptoReader::Plaintext(r) => r,
|
||||||
CryptoReader::ZipCrypto(r) => r.into_inner(),
|
CryptoReader::ZipCrypto(r) => r.into_inner(),
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
CryptoReader::Aes { reader: r, .. } => r.into_inner(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns `true` if the data is encrypted using AE2.
|
||||||
|
pub fn is_ae2_encrypted(&self) -> bool {
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
return matches!(
|
||||||
|
self,
|
||||||
|
CryptoReader::Aes {
|
||||||
|
vendor_version: AesVendorVersion::Ae2,
|
||||||
|
..
|
||||||
|
}
|
||||||
|
);
|
||||||
|
#[cfg(not(feature = "aes-crypto"))]
|
||||||
|
false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
enum ZipFileReader<'a> {
|
enum ZipFileReader<'a> {
|
||||||
|
@ -150,7 +186,7 @@ pub struct ZipFile<'a> {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn find_content<'a>(
|
fn find_content<'a>(
|
||||||
data: &mut ZipFileData,
|
data: &ZipFileData,
|
||||||
reader: &'a mut (impl Read + Seek),
|
reader: &'a mut (impl Read + Seek),
|
||||||
) -> ZipResult<io::Take<&'a mut dyn Read>> {
|
) -> ZipResult<io::Take<&'a mut dyn Read>> {
|
||||||
// Parse local header
|
// Parse local header
|
||||||
|
@ -164,12 +200,14 @@ fn find_content<'a>(
|
||||||
let file_name_length = reader.read_u16::<LittleEndian>()? as u64;
|
let file_name_length = reader.read_u16::<LittleEndian>()? as u64;
|
||||||
let extra_field_length = reader.read_u16::<LittleEndian>()? as u64;
|
let extra_field_length = reader.read_u16::<LittleEndian>()? as u64;
|
||||||
let magic_and_header = 4 + 22 + 2 + 2;
|
let magic_and_header = 4 + 22 + 2 + 2;
|
||||||
data.data_start = data.header_start + magic_and_header + file_name_length + extra_field_length;
|
let data_start = data.header_start + magic_and_header + file_name_length + extra_field_length;
|
||||||
|
data.data_start.store(data_start);
|
||||||
|
|
||||||
reader.seek(io::SeekFrom::Start(data.data_start))?;
|
reader.seek(io::SeekFrom::Start(data_start))?;
|
||||||
Ok((reader as &mut dyn Read).take(data.compressed_size))
|
Ok((reader as &mut dyn Read).take(data.compressed_size))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[allow(clippy::too_many_arguments)]
|
||||||
fn make_crypto_reader<'a>(
|
fn make_crypto_reader<'a>(
|
||||||
compression_method: crate::compression::CompressionMethod,
|
compression_method: crate::compression::CompressionMethod,
|
||||||
crc32: u32,
|
crc32: u32,
|
||||||
|
@ -177,6 +215,8 @@ fn make_crypto_reader<'a>(
|
||||||
using_data_descriptor: bool,
|
using_data_descriptor: bool,
|
||||||
reader: io::Take<&'a mut dyn io::Read>,
|
reader: io::Take<&'a mut dyn io::Read>,
|
||||||
password: Option<&[u8]>,
|
password: Option<&[u8]>,
|
||||||
|
aes_info: Option<(AesMode, AesVendorVersion)>,
|
||||||
|
#[cfg(feature = "aes-crypto")] compressed_size: u64,
|
||||||
) -> ZipResult<Result<CryptoReader<'a>, InvalidPassword>> {
|
) -> ZipResult<Result<CryptoReader<'a>, InvalidPassword>> {
|
||||||
#[allow(deprecated)]
|
#[allow(deprecated)]
|
||||||
{
|
{
|
||||||
|
@ -185,9 +225,24 @@ fn make_crypto_reader<'a>(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
let reader = match password {
|
let reader = match (password, aes_info) {
|
||||||
None => CryptoReader::Plaintext(reader),
|
#[cfg(not(feature = "aes-crypto"))]
|
||||||
Some(password) => {
|
(Some(_), Some(_)) => {
|
||||||
|
return Err(ZipError::UnsupportedArchive(
|
||||||
|
"AES encrypted files cannot be decrypted without the aes-crypto feature.",
|
||||||
|
))
|
||||||
|
}
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
(Some(password), Some((aes_mode, vendor_version))) => {
|
||||||
|
match AesReader::new(reader, aes_mode, compressed_size).validate(password)? {
|
||||||
|
None => return Ok(Err(InvalidPassword)),
|
||||||
|
Some(r) => CryptoReader::Aes {
|
||||||
|
reader: r,
|
||||||
|
vendor_version,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
(Some(password), None) => {
|
||||||
let validator = if using_data_descriptor {
|
let validator = if using_data_descriptor {
|
||||||
ZipCryptoValidator::InfoZipMsdosTime(last_modified_time.timepart())
|
ZipCryptoValidator::InfoZipMsdosTime(last_modified_time.timepart())
|
||||||
} else {
|
} else {
|
||||||
|
@ -198,6 +253,8 @@ fn make_crypto_reader<'a>(
|
||||||
Some(r) => CryptoReader::ZipCrypto(r),
|
Some(r) => CryptoReader::ZipCrypto(r),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
(None, Some(_)) => return Ok(Err(InvalidPassword)),
|
||||||
|
(None, None) => CryptoReader::Plaintext(reader),
|
||||||
};
|
};
|
||||||
Ok(Ok(reader))
|
Ok(Ok(reader))
|
||||||
}
|
}
|
||||||
|
@ -207,8 +264,12 @@ fn make_reader(
|
||||||
crc32: u32,
|
crc32: u32,
|
||||||
reader: CryptoReader,
|
reader: CryptoReader,
|
||||||
) -> ZipFileReader {
|
) -> ZipFileReader {
|
||||||
|
let ae2_encrypted = reader.is_ae2_encrypted();
|
||||||
|
|
||||||
match compression_method {
|
match compression_method {
|
||||||
CompressionMethod::Stored => ZipFileReader::Stored(Crc32Reader::new(reader, crc32)),
|
CompressionMethod::Stored => {
|
||||||
|
ZipFileReader::Stored(Crc32Reader::new(reader, crc32, ae2_encrypted))
|
||||||
|
}
|
||||||
#[cfg(any(
|
#[cfg(any(
|
||||||
feature = "deflate",
|
feature = "deflate",
|
||||||
feature = "deflate-miniz",
|
feature = "deflate-miniz",
|
||||||
|
@ -216,17 +277,17 @@ fn make_reader(
|
||||||
))]
|
))]
|
||||||
CompressionMethod::Deflated => {
|
CompressionMethod::Deflated => {
|
||||||
let deflate_reader = DeflateDecoder::new(reader);
|
let deflate_reader = DeflateDecoder::new(reader);
|
||||||
ZipFileReader::Deflated(Crc32Reader::new(deflate_reader, crc32))
|
ZipFileReader::Deflated(Crc32Reader::new(deflate_reader, crc32, ae2_encrypted))
|
||||||
}
|
}
|
||||||
#[cfg(feature = "bzip2")]
|
#[cfg(feature = "bzip2")]
|
||||||
CompressionMethod::Bzip2 => {
|
CompressionMethod::Bzip2 => {
|
||||||
let bzip2_reader = BzDecoder::new(reader);
|
let bzip2_reader = BzDecoder::new(reader);
|
||||||
ZipFileReader::Bzip2(Crc32Reader::new(bzip2_reader, crc32))
|
ZipFileReader::Bzip2(Crc32Reader::new(bzip2_reader, crc32, ae2_encrypted))
|
||||||
}
|
}
|
||||||
#[cfg(feature = "zstd")]
|
#[cfg(feature = "zstd")]
|
||||||
CompressionMethod::Zstd => {
|
CompressionMethod::Zstd => {
|
||||||
let zstd_reader = ZstdDecoder::new(reader).unwrap();
|
let zstd_reader = ZstdDecoder::new(reader).unwrap();
|
||||||
ZipFileReader::Zstd(Crc32Reader::new(zstd_reader, crc32))
|
ZipFileReader::Zstd(Crc32Reader::new(zstd_reader, crc32, ae2_encrypted))
|
||||||
}
|
}
|
||||||
_ => panic!("Compression method not supported"),
|
_ => panic!("Compression method not supported"),
|
||||||
}
|
}
|
||||||
|
@ -362,13 +423,14 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
files.push(file);
|
files.push(file);
|
||||||
}
|
}
|
||||||
|
|
||||||
Ok(ZipArchive {
|
let shared = Arc::new(Shared {
|
||||||
reader,
|
|
||||||
files,
|
files,
|
||||||
names_map,
|
names_map,
|
||||||
offset: archive_offset,
|
offset: archive_offset,
|
||||||
comment: footer.zip_file_comment,
|
comment: footer.zip_file_comment,
|
||||||
})
|
});
|
||||||
|
|
||||||
|
Ok(ZipArchive { reader, shared })
|
||||||
}
|
}
|
||||||
/// Extract a Zip archive into a directory, overwriting files if they
|
/// Extract a Zip archive into a directory, overwriting files if they
|
||||||
/// already exist. Paths are sanitized with [`ZipFile::enclosed_name`].
|
/// already exist. Paths are sanitized with [`ZipFile::enclosed_name`].
|
||||||
|
@ -411,7 +473,7 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
|
|
||||||
/// Number of files contained in this zip.
|
/// Number of files contained in this zip.
|
||||||
pub fn len(&self) -> usize {
|
pub fn len(&self) -> usize {
|
||||||
self.files.len()
|
self.shared.files.len()
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Whether this zip archive contains no files
|
/// Whether this zip archive contains no files
|
||||||
|
@ -424,17 +486,17 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
/// Normally this value is zero, but if the zip has arbitrary data prepended to it, then this value will be the size
|
/// Normally this value is zero, but if the zip has arbitrary data prepended to it, then this value will be the size
|
||||||
/// of that prepended data.
|
/// of that prepended data.
|
||||||
pub fn offset(&self) -> u64 {
|
pub fn offset(&self) -> u64 {
|
||||||
self.offset
|
self.shared.offset
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Get the comment of the zip archive.
|
/// Get the comment of the zip archive.
|
||||||
pub fn comment(&self) -> &[u8] {
|
pub fn comment(&self) -> &[u8] {
|
||||||
&self.comment
|
&self.shared.comment
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns an iterator over all the file and directory names in this archive.
|
/// Returns an iterator over all the file and directory names in this archive.
|
||||||
pub fn file_names(&self) -> impl Iterator<Item = &str> {
|
pub fn file_names(&self) -> impl Iterator<Item = &str> {
|
||||||
self.names_map.keys().map(|s| s.as_str())
|
self.shared.names_map.keys().map(|s| s.as_str())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Search for a file entry by name, decrypt with given password
|
/// Search for a file entry by name, decrypt with given password
|
||||||
|
@ -456,7 +518,7 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
name: &str,
|
name: &str,
|
||||||
password: Option<&[u8]>,
|
password: Option<&[u8]>,
|
||||||
) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
|
) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
|
||||||
let index = match self.names_map.get(name) {
|
let index = match self.shared.names_map.get(name) {
|
||||||
Some(index) => *index,
|
Some(index) => *index,
|
||||||
None => {
|
None => {
|
||||||
return Err(ZipError::FileNotFound);
|
return Err(ZipError::FileNotFound);
|
||||||
|
@ -484,8 +546,9 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
/// Get a contained file by index without decompressing it
|
/// Get a contained file by index without decompressing it
|
||||||
pub fn by_index_raw(&mut self, file_number: usize) -> ZipResult<ZipFile<'_>> {
|
pub fn by_index_raw(&mut self, file_number: usize) -> ZipResult<ZipFile<'_>> {
|
||||||
let reader = &mut self.reader;
|
let reader = &mut self.reader;
|
||||||
self.files
|
self.shared
|
||||||
.get_mut(file_number)
|
.files
|
||||||
|
.get(file_number)
|
||||||
.ok_or(ZipError::FileNotFound)
|
.ok_or(ZipError::FileNotFound)
|
||||||
.and_then(move |data| {
|
.and_then(move |data| {
|
||||||
Ok(ZipFile {
|
Ok(ZipFile {
|
||||||
|
@ -501,10 +564,11 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
file_number: usize,
|
file_number: usize,
|
||||||
mut password: Option<&[u8]>,
|
mut password: Option<&[u8]>,
|
||||||
) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
|
) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
|
||||||
if file_number >= self.files.len() {
|
let data = self
|
||||||
return Err(ZipError::FileNotFound);
|
.shared
|
||||||
}
|
.files
|
||||||
let data = &mut self.files[file_number];
|
.get(file_number)
|
||||||
|
.ok_or(ZipError::FileNotFound)?;
|
||||||
|
|
||||||
match (password, data.encrypted) {
|
match (password, data.encrypted) {
|
||||||
(None, true) => return Err(ZipError::UnsupportedArchive(ZipError::PASSWORD_REQUIRED)),
|
(None, true) => return Err(ZipError::UnsupportedArchive(ZipError::PASSWORD_REQUIRED)),
|
||||||
|
@ -520,6 +584,9 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
data.using_data_descriptor,
|
data.using_data_descriptor,
|
||||||
limit_reader,
|
limit_reader,
|
||||||
password,
|
password,
|
||||||
|
data.aes_mode,
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
data.compressed_size,
|
||||||
) {
|
) {
|
||||||
Ok(Ok(crypto_reader)) => Ok(Ok(ZipFile {
|
Ok(Ok(crypto_reader)) => Ok(Ok(ZipFile {
|
||||||
crypto_reader: Some(crypto_reader),
|
crypto_reader: Some(crypto_reader),
|
||||||
|
@ -610,9 +677,10 @@ pub(crate) fn central_header_to_zip_file<R: Read + io::Seek>(
|
||||||
file_comment,
|
file_comment,
|
||||||
header_start: offset,
|
header_start: offset,
|
||||||
central_header_start,
|
central_header_start,
|
||||||
data_start: 0,
|
data_start: AtomicU64::new(0),
|
||||||
external_attributes: external_file_attributes,
|
external_attributes: external_file_attributes,
|
||||||
large_file: false,
|
large_file: false,
|
||||||
|
aes_mode: None,
|
||||||
};
|
};
|
||||||
|
|
||||||
match parse_extra_field(&mut result) {
|
match parse_extra_field(&mut result) {
|
||||||
|
@ -620,6 +688,13 @@ pub(crate) fn central_header_to_zip_file<R: Read + io::Seek>(
|
||||||
Err(e) => return Err(e),
|
Err(e) => return Err(e),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
let aes_enabled = result.compression_method == CompressionMethod::AES;
|
||||||
|
if aes_enabled && result.aes_mode.is_none() {
|
||||||
|
return Err(ZipError::InvalidArchive(
|
||||||
|
"AES encryption without AES extra data field",
|
||||||
|
));
|
||||||
|
}
|
||||||
|
|
||||||
// Account for shifted zip offsets.
|
// Account for shifted zip offsets.
|
||||||
result.header_start = result
|
result.header_start = result
|
||||||
.header_start
|
.header_start
|
||||||
|
@ -636,24 +711,58 @@ fn parse_extra_field(file: &mut ZipFileData) -> ZipResult<()> {
|
||||||
let kind = reader.read_u16::<LittleEndian>()?;
|
let kind = reader.read_u16::<LittleEndian>()?;
|
||||||
let len = reader.read_u16::<LittleEndian>()?;
|
let len = reader.read_u16::<LittleEndian>()?;
|
||||||
let mut len_left = len as i64;
|
let mut len_left = len as i64;
|
||||||
// Zip64 extended information extra field
|
match kind {
|
||||||
if kind == 0x0001 {
|
// Zip64 extended information extra field
|
||||||
if file.uncompressed_size == 0xFFFFFFFF {
|
0x0001 => {
|
||||||
file.large_file = true;
|
if file.uncompressed_size == 0xFFFFFFFF {
|
||||||
file.uncompressed_size = reader.read_u64::<LittleEndian>()?;
|
file.large_file = true;
|
||||||
len_left -= 8;
|
file.uncompressed_size = reader.read_u64::<LittleEndian>()?;
|
||||||
|
len_left -= 8;
|
||||||
|
}
|
||||||
|
if file.compressed_size == 0xFFFFFFFF {
|
||||||
|
file.large_file = true;
|
||||||
|
file.compressed_size = reader.read_u64::<LittleEndian>()?;
|
||||||
|
len_left -= 8;
|
||||||
|
}
|
||||||
|
if file.header_start == 0xFFFFFFFF {
|
||||||
|
file.header_start = reader.read_u64::<LittleEndian>()?;
|
||||||
|
len_left -= 8;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if file.compressed_size == 0xFFFFFFFF {
|
0x9901 => {
|
||||||
file.large_file = true;
|
// AES
|
||||||
file.compressed_size = reader.read_u64::<LittleEndian>()?;
|
if len != 7 {
|
||||||
len_left -= 8;
|
return Err(ZipError::UnsupportedArchive(
|
||||||
|
"AES extra data field has an unsupported length",
|
||||||
|
));
|
||||||
|
}
|
||||||
|
let vendor_version = reader.read_u16::<LittleEndian>()?;
|
||||||
|
let vendor_id = reader.read_u16::<LittleEndian>()?;
|
||||||
|
let aes_mode = reader.read_u8()?;
|
||||||
|
let compression_method = reader.read_u16::<LittleEndian>()?;
|
||||||
|
|
||||||
|
if vendor_id != 0x4541 {
|
||||||
|
return Err(ZipError::InvalidArchive("Invalid AES vendor"));
|
||||||
|
}
|
||||||
|
let vendor_version = match vendor_version {
|
||||||
|
0x0001 => AesVendorVersion::Ae1,
|
||||||
|
0x0002 => AesVendorVersion::Ae2,
|
||||||
|
_ => return Err(ZipError::InvalidArchive("Invalid AES vendor version")),
|
||||||
|
};
|
||||||
|
match aes_mode {
|
||||||
|
0x01 => file.aes_mode = Some((AesMode::Aes128, vendor_version)),
|
||||||
|
0x02 => file.aes_mode = Some((AesMode::Aes192, vendor_version)),
|
||||||
|
0x03 => file.aes_mode = Some((AesMode::Aes256, vendor_version)),
|
||||||
|
_ => return Err(ZipError::InvalidArchive("Invalid AES encryption strength")),
|
||||||
|
};
|
||||||
|
file.compression_method = {
|
||||||
|
#[allow(deprecated)]
|
||||||
|
CompressionMethod::from_u16(compression_method)
|
||||||
|
};
|
||||||
}
|
}
|
||||||
if file.header_start == 0xFFFFFFFF {
|
_ => {
|
||||||
file.header_start = reader.read_u64::<LittleEndian>()?;
|
// Other fields are ignored
|
||||||
len_left -= 8;
|
|
||||||
}
|
}
|
||||||
// Unparsed fields:
|
|
||||||
// u32: disk start number
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// We could also check for < 0 to check for errors
|
// We could also check for < 0 to check for errors
|
||||||
|
@ -843,7 +952,7 @@ impl<'a> ZipFile<'a> {
|
||||||
|
|
||||||
/// Get the starting offset of the data of the compressed file
|
/// Get the starting offset of the data of the compressed file
|
||||||
pub fn data_start(&self) -> u64 {
|
pub fn data_start(&self) -> u64 {
|
||||||
self.data.data_start
|
self.data.data_start.load()
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Get the starting offset of the zip header for this file
|
/// Get the starting offset of the zip header for this file
|
||||||
|
@ -964,13 +1073,14 @@ pub fn read_zipfile_from_stream<'a, R: io::Read>(
|
||||||
// header_start and data start are not available, but also don't matter, since seeking is
|
// header_start and data start are not available, but also don't matter, since seeking is
|
||||||
// not available.
|
// not available.
|
||||||
header_start: 0,
|
header_start: 0,
|
||||||
data_start: 0,
|
data_start: AtomicU64::new(0),
|
||||||
central_header_start: 0,
|
central_header_start: 0,
|
||||||
// The external_attributes field is only available in the central directory.
|
// The external_attributes field is only available in the central directory.
|
||||||
// We set this to zero, which should be valid as the docs state 'If input came
|
// We set this to zero, which should be valid as the docs state 'If input came
|
||||||
// from standard input, this field is set to zero.'
|
// from standard input, this field is set to zero.'
|
||||||
external_attributes: 0,
|
external_attributes: 0,
|
||||||
large_file: false,
|
large_file: false,
|
||||||
|
aes_mode: None,
|
||||||
};
|
};
|
||||||
|
|
||||||
match parse_extra_field(&mut result) {
|
match parse_extra_field(&mut result) {
|
||||||
|
@ -996,6 +1106,9 @@ pub fn read_zipfile_from_stream<'a, R: io::Read>(
|
||||||
result.using_data_descriptor,
|
result.using_data_descriptor,
|
||||||
limit_reader,
|
limit_reader,
|
||||||
None,
|
None,
|
||||||
|
None,
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
result.compressed_size,
|
||||||
)?
|
)?
|
||||||
.unwrap();
|
.unwrap();
|
||||||
|
|
||||||
|
|
73
src/types.rs
73
src/types.rs
|
@ -2,6 +2,8 @@
|
||||||
#[cfg(doc)]
|
#[cfg(doc)]
|
||||||
use {crate::read::ZipFile, crate::write::FileOptions};
|
use {crate::read::ZipFile, crate::write::FileOptions};
|
||||||
|
|
||||||
|
use std::sync::atomic;
|
||||||
|
|
||||||
#[cfg(feature = "time")]
|
#[cfg(feature = "time")]
|
||||||
use time::{error::ComponentRange, Date, Month, OffsetDateTime, PrimitiveDateTime, Time};
|
use time::{error::ComponentRange, Date, Month, OffsetDateTime, PrimitiveDateTime, Time};
|
||||||
|
|
||||||
|
@ -219,6 +221,37 @@ impl DateTime {
|
||||||
|
|
||||||
pub const DEFAULT_VERSION: u8 = 46;
|
pub const DEFAULT_VERSION: u8 = 46;
|
||||||
|
|
||||||
|
/// A type like `AtomicU64` except it implements `Clone` and has predefined
|
||||||
|
/// ordering.
|
||||||
|
///
|
||||||
|
/// It uses `Relaxed` ordering because it is not used for synchronisation.
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub struct AtomicU64(atomic::AtomicU64);
|
||||||
|
|
||||||
|
impl AtomicU64 {
|
||||||
|
pub fn new(v: u64) -> Self {
|
||||||
|
Self(atomic::AtomicU64::new(v))
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn load(&self) -> u64 {
|
||||||
|
self.0.load(atomic::Ordering::Relaxed)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn store(&self, val: u64) {
|
||||||
|
self.0.store(val, atomic::Ordering::Relaxed)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn get_mut(&mut self) -> &mut u64 {
|
||||||
|
self.0.get_mut()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Clone for AtomicU64 {
|
||||||
|
fn clone(&self) -> Self {
|
||||||
|
Self(atomic::AtomicU64::new(self.load()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// Structure representing a ZIP file.
|
/// Structure representing a ZIP file.
|
||||||
#[derive(Debug, Clone)]
|
#[derive(Debug, Clone)]
|
||||||
pub struct ZipFileData {
|
pub struct ZipFileData {
|
||||||
|
@ -255,11 +288,13 @@ pub struct ZipFileData {
|
||||||
/// Note that when this is not known, it is set to 0
|
/// Note that when this is not known, it is set to 0
|
||||||
pub central_header_start: u64,
|
pub central_header_start: u64,
|
||||||
/// Specifies where the compressed data of the file starts
|
/// Specifies where the compressed data of the file starts
|
||||||
pub data_start: u64,
|
pub data_start: AtomicU64,
|
||||||
/// External file attributes
|
/// External file attributes
|
||||||
pub external_attributes: u32,
|
pub external_attributes: u32,
|
||||||
/// Reserve local ZIP64 extra field
|
/// Reserve local ZIP64 extra field
|
||||||
pub large_file: bool,
|
pub large_file: bool,
|
||||||
|
/// AES mode if applicable
|
||||||
|
pub aes_mode: Option<(AesMode, AesVendorVersion)>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl ZipFileData {
|
impl ZipFileData {
|
||||||
|
@ -307,6 +342,39 @@ impl ZipFileData {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// The encryption specification used to encrypt a file with AES.
|
||||||
|
///
|
||||||
|
/// According to the [specification](https://www.winzip.com/win/en/aes_info.html#winzip11) AE-2
|
||||||
|
/// does not make use of the CRC check.
|
||||||
|
#[derive(Copy, Clone, Debug)]
|
||||||
|
pub enum AesVendorVersion {
|
||||||
|
Ae1,
|
||||||
|
Ae2,
|
||||||
|
}
|
||||||
|
|
||||||
|
/// AES variant used.
|
||||||
|
#[derive(Copy, Clone, Debug)]
|
||||||
|
pub enum AesMode {
|
||||||
|
Aes128,
|
||||||
|
Aes192,
|
||||||
|
Aes256,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "aes-crypto")]
|
||||||
|
impl AesMode {
|
||||||
|
pub fn salt_length(&self) -> usize {
|
||||||
|
self.key_length() / 2
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn key_length(&self) -> usize {
|
||||||
|
match self {
|
||||||
|
Self::Aes128 => 16,
|
||||||
|
Self::Aes192 => 24,
|
||||||
|
Self::Aes256 => 32,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod test {
|
mod test {
|
||||||
#[test]
|
#[test]
|
||||||
|
@ -337,10 +405,11 @@ mod test {
|
||||||
extra_field: Vec::new(),
|
extra_field: Vec::new(),
|
||||||
file_comment: String::new(),
|
file_comment: String::new(),
|
||||||
header_start: 0,
|
header_start: 0,
|
||||||
data_start: 0,
|
data_start: AtomicU64::new(0),
|
||||||
central_header_start: 0,
|
central_header_start: 0,
|
||||||
external_attributes: 0,
|
external_attributes: 0,
|
||||||
large_file: false,
|
large_file: false,
|
||||||
|
aes_mode: None,
|
||||||
};
|
};
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
data.file_name_sanitized(),
|
data.file_name_sanitized(),
|
||||||
|
|
24
src/write.rs
24
src/write.rs
|
@ -4,7 +4,7 @@ use crate::compression::CompressionMethod;
|
||||||
use crate::read::{central_header_to_zip_file, ZipArchive, ZipFile};
|
use crate::read::{central_header_to_zip_file, ZipArchive, ZipFile};
|
||||||
use crate::result::{ZipError, ZipResult};
|
use crate::result::{ZipError, ZipResult};
|
||||||
use crate::spec;
|
use crate::spec;
|
||||||
use crate::types::{DateTime, System, ZipFileData, DEFAULT_VERSION};
|
use crate::types::{AtomicU64, DateTime, System, ZipFileData, DEFAULT_VERSION};
|
||||||
use byteorder::{LittleEndian, ReadBytesExt, WriteBytesExt};
|
use byteorder::{LittleEndian, ReadBytesExt, WriteBytesExt};
|
||||||
use crc32fast::Hasher;
|
use crc32fast::Hasher;
|
||||||
use std::default::Default;
|
use std::default::Default;
|
||||||
|
@ -349,16 +349,17 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
||||||
extra_field: Vec::new(),
|
extra_field: Vec::new(),
|
||||||
file_comment: String::new(),
|
file_comment: String::new(),
|
||||||
header_start,
|
header_start,
|
||||||
data_start: 0,
|
data_start: AtomicU64::new(0),
|
||||||
central_header_start: 0,
|
central_header_start: 0,
|
||||||
external_attributes: permissions << 16,
|
external_attributes: permissions << 16,
|
||||||
large_file: options.large_file,
|
large_file: options.large_file,
|
||||||
|
aes_mode: None,
|
||||||
};
|
};
|
||||||
write_local_file_header(writer, &file)?;
|
write_local_file_header(writer, &file)?;
|
||||||
|
|
||||||
let header_end = writer.seek(io::SeekFrom::Current(0))?;
|
let header_end = writer.seek(io::SeekFrom::Current(0))?;
|
||||||
self.stats.start = header_end;
|
self.stats.start = header_end;
|
||||||
file.data_start = header_end;
|
*file.data_start.get_mut() = header_end;
|
||||||
|
|
||||||
self.stats.bytes_written = 0;
|
self.stats.bytes_written = 0;
|
||||||
self.stats.hasher = Hasher::new();
|
self.stats.hasher = Hasher::new();
|
||||||
|
@ -537,7 +538,7 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
||||||
self.start_entry(name, options, None)?;
|
self.start_entry(name, options, None)?;
|
||||||
self.writing_to_file = true;
|
self.writing_to_file = true;
|
||||||
self.writing_to_extra_field = true;
|
self.writing_to_extra_field = true;
|
||||||
Ok(self.files.last().unwrap().data_start)
|
Ok(self.files.last().unwrap().data_start.load())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// End local and start central extra data. Requires [`ZipWriter::start_file_with_extra_data`].
|
/// End local and start central extra data. Requires [`ZipWriter::start_file_with_extra_data`].
|
||||||
|
@ -566,6 +567,8 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
||||||
|
|
||||||
validate_extra_data(file)?;
|
validate_extra_data(file)?;
|
||||||
|
|
||||||
|
let data_start = file.data_start.get_mut();
|
||||||
|
|
||||||
if !self.writing_to_central_extra_field_only {
|
if !self.writing_to_central_extra_field_only {
|
||||||
let writer = self.inner.get_plain();
|
let writer = self.inner.get_plain();
|
||||||
|
|
||||||
|
@ -573,9 +576,9 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
||||||
writer.write_all(&file.extra_field)?;
|
writer.write_all(&file.extra_field)?;
|
||||||
|
|
||||||
// Update final `data_start`.
|
// Update final `data_start`.
|
||||||
let header_end = file.data_start + file.extra_field.len() as u64;
|
let header_end = *data_start + file.extra_field.len() as u64;
|
||||||
self.stats.start = header_end;
|
self.stats.start = header_end;
|
||||||
file.data_start = header_end;
|
*data_start = header_end;
|
||||||
|
|
||||||
// Update extra field length in local file header.
|
// Update extra field length in local file header.
|
||||||
let extra_field_length =
|
let extra_field_length =
|
||||||
|
@ -589,7 +592,7 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
||||||
|
|
||||||
self.writing_to_extra_field = false;
|
self.writing_to_extra_field = false;
|
||||||
self.writing_to_central_extra_field_only = false;
|
self.writing_to_central_extra_field_only = false;
|
||||||
Ok(file.data_start)
|
Ok(*data_start)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Add a new file using the already compressed data from a ZIP file being read and renames it, this
|
/// Add a new file using the already compressed data from a ZIP file being read and renames it, this
|
||||||
|
@ -793,7 +796,7 @@ impl<W: Write + io::Seek> Drop for ZipWriter<W> {
|
||||||
fn drop(&mut self) {
|
fn drop(&mut self) {
|
||||||
if !self.inner.is_closed() {
|
if !self.inner.is_closed() {
|
||||||
if let Err(e) = self.finalize() {
|
if let Err(e) = self.finalize() {
|
||||||
let _ = write!(&mut io::stderr(), "ZipWriter drop failed: {:?}", e);
|
let _ = write!(io::stderr(), "ZipWriter drop failed: {:?}", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -851,6 +854,11 @@ impl<W: Write + io::Seek> GenericZipWriter<W> {
|
||||||
CompressionMethod::Bzip2 => {
|
CompressionMethod::Bzip2 => {
|
||||||
GenericZipWriter::Bzip2(BzEncoder::new(bare, bzip2::Compression::default()))
|
GenericZipWriter::Bzip2(BzEncoder::new(bare, bzip2::Compression::default()))
|
||||||
}
|
}
|
||||||
|
CompressionMethod::AES => {
|
||||||
|
return Err(ZipError::UnsupportedArchive(
|
||||||
|
"AES compression is not supported for writing",
|
||||||
|
))
|
||||||
|
}
|
||||||
#[cfg(feature = "zstd")]
|
#[cfg(feature = "zstd")]
|
||||||
CompressionMethod::Zstd => {
|
CompressionMethod::Zstd => {
|
||||||
GenericZipWriter::Zstd(ZstdEncoder::new(bare, 0).unwrap())
|
GenericZipWriter::Zstd(ZstdEncoder::new(bare, 0).unwrap())
|
||||||
|
|
80
tests/aes_encryption.rs
Normal file
80
tests/aes_encryption.rs
Normal file
|
@ -0,0 +1,80 @@
|
||||||
|
#![cfg(feature = "aes-crypto")]
|
||||||
|
|
||||||
|
use std::io::{self, Read};
|
||||||
|
use zip::ZipArchive;
|
||||||
|
|
||||||
|
const SECRET_CONTENT: &str = "Lorem ipsum dolor sit amet";
|
||||||
|
|
||||||
|
const PASSWORD: &[u8] = b"helloworld";
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn aes256_encrypted_uncompressed_file() {
|
||||||
|
let mut v = Vec::new();
|
||||||
|
v.extend_from_slice(include_bytes!("data/aes_archive.zip"));
|
||||||
|
let mut archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file");
|
||||||
|
|
||||||
|
let mut file = archive
|
||||||
|
.by_name_decrypt("secret_data_256_uncompressed", PASSWORD)
|
||||||
|
.expect("couldn't find file in archive")
|
||||||
|
.expect("invalid password");
|
||||||
|
assert_eq!("secret_data_256_uncompressed", file.name());
|
||||||
|
|
||||||
|
let mut content = String::new();
|
||||||
|
file.read_to_string(&mut content)
|
||||||
|
.expect("couldn't read encrypted file");
|
||||||
|
assert_eq!(SECRET_CONTENT, content);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn aes256_encrypted_file() {
|
||||||
|
let mut v = Vec::new();
|
||||||
|
v.extend_from_slice(include_bytes!("data/aes_archive.zip"));
|
||||||
|
let mut archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file");
|
||||||
|
|
||||||
|
let mut file = archive
|
||||||
|
.by_name_decrypt("secret_data_256", PASSWORD)
|
||||||
|
.expect("couldn't find file in archive")
|
||||||
|
.expect("invalid password");
|
||||||
|
assert_eq!("secret_data_256", file.name());
|
||||||
|
|
||||||
|
let mut content = String::new();
|
||||||
|
file.read_to_string(&mut content)
|
||||||
|
.expect("couldn't read encrypted and compressed file");
|
||||||
|
assert_eq!(SECRET_CONTENT, content);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn aes192_encrypted_file() {
|
||||||
|
let mut v = Vec::new();
|
||||||
|
v.extend_from_slice(include_bytes!("data/aes_archive.zip"));
|
||||||
|
let mut archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file");
|
||||||
|
|
||||||
|
let mut file = archive
|
||||||
|
.by_name_decrypt("secret_data_192", PASSWORD)
|
||||||
|
.expect("couldn't find file in archive")
|
||||||
|
.expect("invalid password");
|
||||||
|
assert_eq!("secret_data_192", file.name());
|
||||||
|
|
||||||
|
let mut content = String::new();
|
||||||
|
file.read_to_string(&mut content)
|
||||||
|
.expect("couldn't read encrypted file");
|
||||||
|
assert_eq!(SECRET_CONTENT, content);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn aes128_encrypted_file() {
|
||||||
|
let mut v = Vec::new();
|
||||||
|
v.extend_from_slice(include_bytes!("data/aes_archive.zip"));
|
||||||
|
let mut archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file");
|
||||||
|
|
||||||
|
let mut file = archive
|
||||||
|
.by_name_decrypt("secret_data_128", PASSWORD)
|
||||||
|
.expect("couldn't find file in archive")
|
||||||
|
.expect("invalid password");
|
||||||
|
assert_eq!("secret_data_128", file.name());
|
||||||
|
|
||||||
|
let mut content = String::new();
|
||||||
|
file.read_to_string(&mut content)
|
||||||
|
.expect("couldn't read encrypted file");
|
||||||
|
assert_eq!(SECRET_CONTENT, content);
|
||||||
|
}
|
BIN
tests/data/aes_archive.zip
Normal file
BIN
tests/data/aes_archive.zip
Normal file
Binary file not shown.
|
@ -4,106 +4,135 @@ use std::io::prelude::*;
|
||||||
use std::io::{Cursor, Seek};
|
use std::io::{Cursor, Seek};
|
||||||
use std::iter::FromIterator;
|
use std::iter::FromIterator;
|
||||||
use zip::write::FileOptions;
|
use zip::write::FileOptions;
|
||||||
use zip::CompressionMethod;
|
use zip::{CompressionMethod, SUPPORTED_COMPRESSION_METHODS};
|
||||||
|
|
||||||
// This test asserts that after creating a zip file, then reading its contents back out,
|
// This test asserts that after creating a zip file, then reading its contents back out,
|
||||||
// the extracted data will *always* be exactly the same as the original data.
|
// the extracted data will *always* be exactly the same as the original data.
|
||||||
#[test]
|
#[test]
|
||||||
fn end_to_end() {
|
fn end_to_end() {
|
||||||
let file = &mut Cursor::new(Vec::new());
|
for &method in SUPPORTED_COMPRESSION_METHODS {
|
||||||
|
let file = &mut Cursor::new(Vec::new());
|
||||||
|
|
||||||
write_to_zip(file).expect("file written");
|
println!("Writing file with {} compression", method);
|
||||||
|
write_test_archive(file, method).expect("Couldn't write test zip archive");
|
||||||
|
|
||||||
check_zip_contents(file, ENTRY_NAME);
|
println!("Checking file contents");
|
||||||
|
check_archive_file(file, ENTRY_NAME, Some(method), LOREM_IPSUM);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// This test asserts that after copying a `ZipFile` to a new `ZipWriter`, then reading its
|
// This test asserts that after copying a `ZipFile` to a new `ZipWriter`, then reading its
|
||||||
// contents back out, the extracted data will *always* be exactly the same as the original data.
|
// contents back out, the extracted data will *always* be exactly the same as the original data.
|
||||||
#[test]
|
#[test]
|
||||||
fn copy() {
|
fn copy() {
|
||||||
let src_file = &mut Cursor::new(Vec::new());
|
for &method in SUPPORTED_COMPRESSION_METHODS {
|
||||||
write_to_zip(src_file).expect("file written");
|
let src_file = &mut Cursor::new(Vec::new());
|
||||||
|
write_test_archive(src_file, method).expect("Couldn't write to test file");
|
||||||
|
|
||||||
let mut tgt_file = &mut Cursor::new(Vec::new());
|
let mut tgt_file = &mut Cursor::new(Vec::new());
|
||||||
|
|
||||||
{
|
|
||||||
let mut src_archive = zip::ZipArchive::new(src_file).unwrap();
|
|
||||||
let mut zip = zip::ZipWriter::new(&mut tgt_file);
|
|
||||||
|
|
||||||
{
|
{
|
||||||
let file = src_archive.by_name(ENTRY_NAME).expect("file found");
|
let mut src_archive = zip::ZipArchive::new(src_file).unwrap();
|
||||||
zip.raw_copy_file(file).unwrap();
|
let mut zip = zip::ZipWriter::new(&mut tgt_file);
|
||||||
|
|
||||||
|
{
|
||||||
|
let file = src_archive
|
||||||
|
.by_name(ENTRY_NAME)
|
||||||
|
.expect("Missing expected file");
|
||||||
|
|
||||||
|
zip.raw_copy_file(file).expect("Couldn't copy file");
|
||||||
|
}
|
||||||
|
|
||||||
|
{
|
||||||
|
let file = src_archive
|
||||||
|
.by_name(ENTRY_NAME)
|
||||||
|
.expect("Missing expected file");
|
||||||
|
|
||||||
|
zip.raw_copy_file_rename(file, COPY_ENTRY_NAME)
|
||||||
|
.expect("Couldn't copy and rename file");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
{
|
let mut tgt_archive = zip::ZipArchive::new(tgt_file).unwrap();
|
||||||
let file = src_archive.by_name(ENTRY_NAME).expect("file found");
|
|
||||||
zip.raw_copy_file_rename(file, COPY_ENTRY_NAME).unwrap();
|
check_archive_file_contents(&mut tgt_archive, ENTRY_NAME, LOREM_IPSUM);
|
||||||
}
|
check_archive_file_contents(&mut tgt_archive, COPY_ENTRY_NAME, LOREM_IPSUM);
|
||||||
}
|
}
|
||||||
|
|
||||||
let mut tgt_archive = zip::ZipArchive::new(tgt_file).unwrap();
|
|
||||||
|
|
||||||
check_zip_file_contents(&mut tgt_archive, ENTRY_NAME);
|
|
||||||
check_zip_file_contents(&mut tgt_archive, COPY_ENTRY_NAME);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// This test asserts that after appending to a `ZipWriter`, then reading its contents back out,
|
// This test asserts that after appending to a `ZipWriter`, then reading its contents back out,
|
||||||
// both the prior data and the appended data will be exactly the same as their originals.
|
// both the prior data and the appended data will be exactly the same as their originals.
|
||||||
#[test]
|
#[test]
|
||||||
fn append() {
|
fn append() {
|
||||||
let mut file = &mut Cursor::new(Vec::new());
|
for &method in SUPPORTED_COMPRESSION_METHODS {
|
||||||
write_to_zip(file).expect("file written");
|
let mut file = &mut Cursor::new(Vec::new());
|
||||||
|
write_test_archive(file, method).expect("Couldn't write to test file");
|
||||||
|
|
||||||
{
|
{
|
||||||
let mut zip = zip::ZipWriter::new_append(&mut file).unwrap();
|
let mut zip = zip::ZipWriter::new_append(&mut file).unwrap();
|
||||||
zip.start_file(COPY_ENTRY_NAME, Default::default()).unwrap();
|
zip.start_file(
|
||||||
zip.write_all(LOREM_IPSUM).unwrap();
|
COPY_ENTRY_NAME,
|
||||||
zip.finish().unwrap();
|
FileOptions::default().compression_method(method),
|
||||||
|
)
|
||||||
|
.unwrap();
|
||||||
|
zip.write_all(LOREM_IPSUM).unwrap();
|
||||||
|
zip.finish().unwrap();
|
||||||
|
}
|
||||||
|
|
||||||
|
let mut zip = zip::ZipArchive::new(&mut file).unwrap();
|
||||||
|
check_archive_file_contents(&mut zip, ENTRY_NAME, LOREM_IPSUM);
|
||||||
|
check_archive_file_contents(&mut zip, COPY_ENTRY_NAME, LOREM_IPSUM);
|
||||||
}
|
}
|
||||||
|
|
||||||
let mut zip = zip::ZipArchive::new(&mut file).unwrap();
|
|
||||||
check_zip_file_contents(&mut zip, ENTRY_NAME);
|
|
||||||
check_zip_file_contents(&mut zip, COPY_ENTRY_NAME);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fn write_to_zip(file: &mut Cursor<Vec<u8>>) -> zip::result::ZipResult<()> {
|
// Write a test zip archive to buffer.
|
||||||
|
fn write_test_archive(
|
||||||
|
file: &mut Cursor<Vec<u8>>,
|
||||||
|
method: CompressionMethod,
|
||||||
|
) -> zip::result::ZipResult<()> {
|
||||||
let mut zip = zip::ZipWriter::new(file);
|
let mut zip = zip::ZipWriter::new(file);
|
||||||
|
|
||||||
zip.add_directory("test/", Default::default())?;
|
zip.add_directory("test/", Default::default())?;
|
||||||
|
|
||||||
let options = FileOptions::default()
|
let options = FileOptions::default()
|
||||||
.compression_method(CompressionMethod::Stored)
|
.compression_method(method)
|
||||||
.unix_permissions(0o755);
|
.unix_permissions(0o755);
|
||||||
|
|
||||||
zip.start_file("test/☃.txt", options)?;
|
zip.start_file("test/☃.txt", options)?;
|
||||||
zip.write_all(b"Hello, World!\n")?;
|
zip.write_all(b"Hello, World!\n")?;
|
||||||
|
|
||||||
zip.start_file_with_extra_data("test_with_extra_data/🐢.txt", Default::default())?;
|
zip.start_file_with_extra_data("test_with_extra_data/🐢.txt", options)?;
|
||||||
zip.write_u16::<LittleEndian>(0xbeef)?;
|
zip.write_u16::<LittleEndian>(0xbeef)?;
|
||||||
zip.write_u16::<LittleEndian>(EXTRA_DATA.len() as u16)?;
|
zip.write_u16::<LittleEndian>(EXTRA_DATA.len() as u16)?;
|
||||||
zip.write_all(EXTRA_DATA)?;
|
zip.write_all(EXTRA_DATA)?;
|
||||||
zip.end_extra_data()?;
|
zip.end_extra_data()?;
|
||||||
zip.write_all(b"Hello, World! Again.\n")?;
|
zip.write_all(b"Hello, World! Again.\n")?;
|
||||||
|
|
||||||
zip.start_file(ENTRY_NAME, Default::default())?;
|
zip.start_file(ENTRY_NAME, options)?;
|
||||||
zip.write_all(LOREM_IPSUM)?;
|
zip.write_all(LOREM_IPSUM)?;
|
||||||
|
|
||||||
zip.finish()?;
|
zip.finish()?;
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_zip<R: Read + Seek>(zip_file: R) -> zip::result::ZipResult<zip::ZipArchive<R>> {
|
// Load an archive from buffer and check for test data.
|
||||||
|
fn check_test_archive<R: Read + Seek>(zip_file: R) -> zip::result::ZipResult<zip::ZipArchive<R>> {
|
||||||
let mut archive = zip::ZipArchive::new(zip_file).unwrap();
|
let mut archive = zip::ZipArchive::new(zip_file).unwrap();
|
||||||
|
|
||||||
let expected_file_names = [
|
// Check archive contains expected file names.
|
||||||
"test/",
|
{
|
||||||
"test/☃.txt",
|
let expected_file_names = [
|
||||||
"test_with_extra_data/🐢.txt",
|
"test/",
|
||||||
ENTRY_NAME,
|
"test/☃.txt",
|
||||||
];
|
"test_with_extra_data/🐢.txt",
|
||||||
let expected_file_names = HashSet::from_iter(expected_file_names.iter().copied());
|
ENTRY_NAME,
|
||||||
let file_names = archive.file_names().collect::<HashSet<_>>();
|
];
|
||||||
assert_eq!(file_names, expected_file_names);
|
let expected_file_names = HashSet::from_iter(expected_file_names.iter().copied());
|
||||||
|
let file_names = archive.file_names().collect::<HashSet<_>>();
|
||||||
|
assert_eq!(file_names, expected_file_names);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check an archive file for extra data field contents.
|
||||||
{
|
{
|
||||||
let file_with_extra_data = archive.by_name("test_with_extra_data/🐢.txt")?;
|
let file_with_extra_data = archive.by_name("test_with_extra_data/🐢.txt")?;
|
||||||
let mut extra_data = Vec::new();
|
let mut extra_data = Vec::new();
|
||||||
|
@ -116,7 +145,8 @@ fn read_zip<R: Read + Seek>(zip_file: R) -> zip::result::ZipResult<zip::ZipArchi
|
||||||
Ok(archive)
|
Ok(archive)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_zip_file<R: Read + Seek>(
|
// Read a file in the archive as a string.
|
||||||
|
fn read_archive_file<R: Read + Seek>(
|
||||||
archive: &mut zip::ZipArchive<R>,
|
archive: &mut zip::ZipArchive<R>,
|
||||||
name: &str,
|
name: &str,
|
||||||
) -> zip::result::ZipResult<String> {
|
) -> zip::result::ZipResult<String> {
|
||||||
|
@ -124,17 +154,41 @@ fn read_zip_file<R: Read + Seek>(
|
||||||
|
|
||||||
let mut contents = String::new();
|
let mut contents = String::new();
|
||||||
file.read_to_string(&mut contents).unwrap();
|
file.read_to_string(&mut contents).unwrap();
|
||||||
|
|
||||||
Ok(contents)
|
Ok(contents)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn check_zip_contents(zip_file: &mut Cursor<Vec<u8>>, name: &str) {
|
// Check a file in the archive contains expected data and properties.
|
||||||
let mut archive = read_zip(zip_file).unwrap();
|
fn check_archive_file(
|
||||||
check_zip_file_contents(&mut archive, name);
|
zip_file: &mut Cursor<Vec<u8>>,
|
||||||
|
name: &str,
|
||||||
|
expected_method: Option<CompressionMethod>,
|
||||||
|
expected_data: &[u8],
|
||||||
|
) {
|
||||||
|
let mut archive = check_test_archive(zip_file).unwrap();
|
||||||
|
|
||||||
|
if let Some(expected_method) = expected_method {
|
||||||
|
// Check the file's compression method.
|
||||||
|
let file = archive.by_name(name).unwrap();
|
||||||
|
let real_method = file.compression();
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
expected_method, real_method,
|
||||||
|
"File does not have expected compression method"
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
check_archive_file_contents(&mut archive, name, expected_data);
|
||||||
}
|
}
|
||||||
|
|
||||||
fn check_zip_file_contents<R: Read + Seek>(archive: &mut zip::ZipArchive<R>, name: &str) {
|
// Check a file in the archive contains the given data.
|
||||||
let file_contents: String = read_zip_file(archive, name).unwrap();
|
fn check_archive_file_contents<R: Read + Seek>(
|
||||||
assert_eq!(file_contents.as_bytes(), LOREM_IPSUM);
|
archive: &mut zip::ZipArchive<R>,
|
||||||
|
name: &str,
|
||||||
|
expected: &[u8],
|
||||||
|
) {
|
||||||
|
let file_contents: String = read_archive_file(archive, name).unwrap();
|
||||||
|
assert_eq!(file_contents.as_bytes(), expected);
|
||||||
}
|
}
|
||||||
|
|
||||||
const LOREM_IPSUM : &[u8] = b"Lorem ipsum dolor sit amet, consectetur adipiscing elit. In tellus elit, tristique vitae mattis egestas, ultricies vitae risus. Quisque sit amet quam ut urna aliquet
|
const LOREM_IPSUM : &[u8] = b"Lorem ipsum dolor sit amet, consectetur adipiscing elit. In tellus elit, tristique vitae mattis egestas, ultricies vitae risus. Quisque sit amet quam ut urna aliquet
|
||||||
|
|
Loading…
Add table
Reference in a new issue