finalize aes decryption
This commit is contained in:
parent
d25d6f5f57
commit
e69df5cf64
2 changed files with 30 additions and 16 deletions
|
@ -14,6 +14,7 @@ edition = "2018"
|
||||||
aes = "0.5.0"
|
aes = "0.5.0"
|
||||||
byteorder = "1.3"
|
byteorder = "1.3"
|
||||||
bzip2 = { version = "0.4", optional = true }
|
bzip2 = { version = "0.4", optional = true }
|
||||||
|
constant_time_eq = "0.1.5"
|
||||||
crc32fast = "1.0"
|
crc32fast = "1.0"
|
||||||
flate2 = { version = "1.0.0", default-features = false, optional = true }
|
flate2 = { version = "1.0.0", default-features = false, optional = true }
|
||||||
hmac = "0.9.0"
|
hmac = "0.9.0"
|
||||||
|
|
45
src/aes.rs
45
src/aes.rs
|
@ -1,8 +1,9 @@
|
||||||
use crate::aes_ctr;
|
use crate::aes_ctr;
|
||||||
use crate::types::AesMode;
|
use crate::types::AesMode;
|
||||||
|
use constant_time_eq::constant_time_eq;
|
||||||
use hmac::{Hmac, Mac, NewMac};
|
use hmac::{Hmac, Mac, NewMac};
|
||||||
use sha1::Sha1;
|
use sha1::Sha1;
|
||||||
use std::io::{Error, Read};
|
use std::io::{self, Read};
|
||||||
|
|
||||||
/// The length of the password verifcation value in bytes
|
/// The length of the password verifcation value in bytes
|
||||||
const PWD_VERIFY_LENGTH: usize = 2;
|
const PWD_VERIFY_LENGTH: usize = 2;
|
||||||
|
@ -50,8 +51,7 @@ impl<R: Read> AesReader<R> {
|
||||||
/// password was provided.
|
/// password was provided.
|
||||||
/// It isn't possible to check the authentication code in this step. This will be done after
|
/// It isn't possible to check the authentication code in this step. This will be done after
|
||||||
/// reading and decrypting the file.
|
/// reading and decrypting the file.
|
||||||
pub fn validate(mut self, password: &[u8]) -> Result<Option<AesReaderValid<R>>, Error> {
|
pub fn validate(mut self, password: &[u8]) -> io::Result<Option<AesReaderValid<R>>> {
|
||||||
|
|
||||||
let salt_length = self.aes_mode.salt_length();
|
let salt_length = self.aes_mode.salt_length();
|
||||||
let key_length = self.aes_mode.key_length();
|
let key_length = self.aes_mode.key_length();
|
||||||
|
|
||||||
|
@ -99,27 +99,40 @@ pub struct AesReaderValid<R: Read> {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<R: Read> Read for AesReaderValid<R> {
|
impl<R: Read> Read for AesReaderValid<R> {
|
||||||
fn read(&mut self, buf: &mut [u8]) -> std::io::Result<usize> {
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
if self.data_remaining == 0 {
|
||||||
|
return Ok(0);
|
||||||
|
}
|
||||||
|
|
||||||
// get the number of bytes to read, compare as u64 to make sure we can read more than
|
// get the number of bytes to read, compare as u64 to make sure we can read more than
|
||||||
// 2^32 bytes even on 32 bit systems.
|
// 2^32 bytes even on 32 bit systems.
|
||||||
let bytes_to_read = self.data_remaining.min(buf.len() as u64) as usize;
|
let bytes_to_read = self.data_remaining.min(buf.len() as u64) as usize;
|
||||||
let read = self.reader.read(&mut buf[0..bytes_to_read])?;
|
let read = self.reader.read(&mut buf[0..bytes_to_read])?;
|
||||||
|
|
||||||
|
// Update the hmac with the encrypted data
|
||||||
|
self.hmac.update(&buf[0..read]);
|
||||||
|
|
||||||
|
// decrypt the data
|
||||||
self.cipher.crypt_in_place(&mut buf[0..read]);
|
self.cipher.crypt_in_place(&mut buf[0..read]);
|
||||||
self.data_remaining -= read as u64;
|
self.data_remaining -= read as u64;
|
||||||
|
|
||||||
// Update the hmac with the decrypted data
|
// if there is no data left to read, check the integrity of the data
|
||||||
self.hmac.update(&buf[0..read]);
|
if self.data_remaining == 0 {
|
||||||
if self.data_remaining <= 0 {
|
// Zip uses HMAC-Sha1-80, which only uses the first half of the hash
|
||||||
// if there is no data left to read, check the integrity of the data
|
// see https://www.winzip.com/win/en/aes_info.html#auth-faq
|
||||||
let mut read_auth = [0; 10];
|
let mut read_auth_code = [0; AUTH_CODE_LENGTH];
|
||||||
self.reader.read_exact(&mut read_auth)?;
|
self.reader.read_exact(&mut read_auth_code)?;
|
||||||
let computed_auth = self.hmac.finalize_reset();
|
let computed_auth_code = &self.hmac.finalize_reset().into_bytes()[0..AUTH_CODE_LENGTH];
|
||||||
// FIXME: The mac uses the whole sha1 hash each step
|
|
||||||
// Zip uses HMAC-Sha1-80, which throws away the second half each time
|
// use constant time comparison to mitigate timing attacks
|
||||||
// see https://www.winzip.com/win/en/aes_info.html#auth-faq
|
if !constant_time_eq(computed_auth_code, &read_auth_code) {
|
||||||
// if computed_auth.into_bytes().as_slice() != &read_auth {
|
return Err(
|
||||||
// }
|
io::Error::new(
|
||||||
|
io::ErrorKind::InvalidData,
|
||||||
|
"Invalid authentication code, this could be due to an invalid password or errors in the data"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Ok(read)
|
Ok(read)
|
||||||
|
|
Loading…
Add table
Reference in a new issue