diff --git a/Cargo.toml b/Cargo.toml index e4e09aad..b6c2fc3b 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -14,6 +14,7 @@ edition = "2018" aes = "0.5.0" byteorder = "1.3" bzip2 = { version = "0.4", optional = true } +constant_time_eq = "0.1.5" crc32fast = "1.0" flate2 = { version = "1.0.0", default-features = false, optional = true } hmac = "0.9.0" diff --git a/src/aes.rs b/src/aes.rs index d4df982b..e727285a 100644 --- a/src/aes.rs +++ b/src/aes.rs @@ -1,8 +1,9 @@ use crate::aes_ctr; use crate::types::AesMode; +use constant_time_eq::constant_time_eq; use hmac::{Hmac, Mac, NewMac}; use sha1::Sha1; -use std::io::{Error, Read}; +use std::io::{self, Read}; /// The length of the password verifcation value in bytes const PWD_VERIFY_LENGTH: usize = 2; @@ -50,8 +51,7 @@ impl AesReader { /// password was provided. /// It isn't possible to check the authentication code in this step. This will be done after /// reading and decrypting the file. - pub fn validate(mut self, password: &[u8]) -> Result>, Error> { - + pub fn validate(mut self, password: &[u8]) -> io::Result>> { let salt_length = self.aes_mode.salt_length(); let key_length = self.aes_mode.key_length(); @@ -99,27 +99,40 @@ pub struct AesReaderValid { } impl Read for AesReaderValid { - fn read(&mut self, buf: &mut [u8]) -> std::io::Result { + fn read(&mut self, buf: &mut [u8]) -> io::Result { + if self.data_remaining == 0 { + return Ok(0); + } + // get the number of bytes to read, compare as u64 to make sure we can read more than // 2^32 bytes even on 32 bit systems. let bytes_to_read = self.data_remaining.min(buf.len() as u64) as usize; let read = self.reader.read(&mut buf[0..bytes_to_read])?; + // Update the hmac with the encrypted data + self.hmac.update(&buf[0..read]); + + // decrypt the data self.cipher.crypt_in_place(&mut buf[0..read]); self.data_remaining -= read as u64; - // Update the hmac with the decrypted data - self.hmac.update(&buf[0..read]); - if self.data_remaining <= 0 { - // if there is no data left to read, check the integrity of the data - let mut read_auth = [0; 10]; - self.reader.read_exact(&mut read_auth)?; - let computed_auth = self.hmac.finalize_reset(); - // FIXME: The mac uses the whole sha1 hash each step - // Zip uses HMAC-Sha1-80, which throws away the second half each time - // see https://www.winzip.com/win/en/aes_info.html#auth-faq - // if computed_auth.into_bytes().as_slice() != &read_auth { - // } + // if there is no data left to read, check the integrity of the data + if self.data_remaining == 0 { + // Zip uses HMAC-Sha1-80, which only uses the first half of the hash + // see https://www.winzip.com/win/en/aes_info.html#auth-faq + let mut read_auth_code = [0; AUTH_CODE_LENGTH]; + self.reader.read_exact(&mut read_auth_code)?; + let computed_auth_code = &self.hmac.finalize_reset().into_bytes()[0..AUTH_CODE_LENGTH]; + + // use constant time comparison to mitigate timing attacks + if !constant_time_eq(computed_auth_code, &read_auth_code) { + return Err( + io::Error::new( + io::ErrorKind::InvalidData, + "Invalid authentication code, this could be due to an invalid password or errors in the data" + ) + ); + } } Ok(read)