"Fossies" - the Fresh Open Source Software Archive

Member "libzip-1.5.2/lib/zip_crypto_commoncrypto.c" (12 Mar 2019, 3442 Bytes) of package /linux/misc/libzip-1.5.2.tar.xz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) C and C++ source code syntax highlighting (style: standard) with prefixed line numbers and code folding option. Alternatively you can here view or download the uninterpreted source code file. For more information about "zip_crypto_commoncrypto.c" see the Fossies "Dox" file reference documentation and the latest Fossies "Diffs" side-by-side code changes report: 1.5.1_vs_1.5.2.

    1 /*
    2   zip_crypto_commoncrypto.c -- CommonCrypto wrapper.
    3   Copyright (C) 2018 Dieter Baron and Thomas Klausner
    4 
    5   This file is part of libzip, a library to manipulate ZIP archives.
    6   The authors can be contacted at <libzip@nih.at>
    7 
    8   Redistribution and use in source and binary forms, with or without
    9   modification, are permitted provided that the following conditions
   10   are met:
   11   1. Redistributions of source code must retain the above copyright
   12   notice, this list of conditions and the following disclaimer.
   13   2. Redistributions in binary form must reproduce the above copyright
   14   notice, this list of conditions and the following disclaimer in
   15   the documentation and/or other materials provided with the
   16   distribution.
   17   3. The names of the authors may not be used to endorse or promote
   18   products derived from this software without specific prior
   19   written permission.
   20 
   21   THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
   22   OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
   23   WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   24   ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
   25   DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   26   DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
   27   GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
   28   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
   29   IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
   30   OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
   31   IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   32 */
   33 
   34 #include <stdlib.h>
   35 
   36 #include "zipint.h"
   37 
   38 #include "zip_crypto.h"
   39 
   40 #include <fcntl.h>
   41 #include <unistd.h>
   42 
   43 void
   44 _zip_crypto_aes_free(_zip_crypto_aes_t *aes) {
   45     if (aes == NULL) {
   46     return;
   47     }
   48 
   49     CCCryptorRelease(aes);
   50 }
   51 
   52 
   53 bool
   54 _zip_crypto_aes_encrypt_block(_zip_crypto_aes_t *aes, const zip_uint8_t *in, zip_uint8_t *out) {
   55     size_t len;
   56     CCCryptorUpdate(aes, in, ZIP_CRYPTO_AES_BLOCK_LENGTH, out, ZIP_CRYPTO_AES_BLOCK_LENGTH, &len);
   57     return true;
   58 }
   59 
   60 
   61 _zip_crypto_aes_t *
   62 _zip_crypto_aes_new(const zip_uint8_t *key, zip_uint16_t key_size, zip_error_t *error) {
   63     _zip_crypto_aes_t *aes;
   64     CCCryptorStatus ret;
   65 
   66     ret = CCCryptorCreate(kCCEncrypt, kCCAlgorithmAES, kCCOptionECBMode, key, key_size / 8, NULL, &aes);
   67 
   68     switch (ret) {
   69     case kCCSuccess:
   70     return aes;
   71 
   72     case kCCMemoryFailure:
   73     zip_error_set(error, ZIP_ER_MEMORY, 0);
   74     return NULL;
   75 
   76     case kCCParamError:
   77     zip_error_set(error, ZIP_ER_INVAL, 0);
   78     return NULL;
   79 
   80     default:
   81     zip_error_set(error, ZIP_ER_INTERNAL, 0);
   82     return NULL;
   83     }
   84 }
   85 
   86 
   87 void
   88 _zip_crypto_hmac_free(_zip_crypto_hmac_t *hmac) {
   89     if (hmac == NULL) {
   90     return;
   91     }
   92 
   93     _zip_crypto_clear(hmac, sizeof(*hmac));
   94     free(hmac);
   95 }
   96 
   97 
   98 _zip_crypto_hmac_t *
   99 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) {
  100     _zip_crypto_hmac_t *hmac;
  101 
  102     if ((hmac = (_zip_crypto_hmac_t *)malloc(sizeof(*hmac))) == NULL) {
  103     zip_error_set(error, ZIP_ER_MEMORY, 0);
  104     return NULL;
  105     }
  106 
  107     CCHmacInit(hmac, kCCHmacAlgSHA1, secret, secret_length);
  108 
  109     return hmac;
  110 }
  111 
  112 
  113 ZIP_EXTERN bool
  114 zip_random(zip_uint8_t *buffer, zip_uint16_t length) {
  115     int fd;
  116 
  117     if ((fd = open("/dev/urandom", O_RDONLY)) < 0) {
  118     return false;
  119     }
  120 
  121     if (read(fd, buffer, length) != length) {
  122     close(fd);
  123     return false;
  124     }
  125 
  126     close(fd);
  127     return true;
  128 }