xref: /vim-8.2.3635/src/crypt_zip.c (revision f573c6e1)
1edf3f97aSBram Moolenaar /* vi:set ts=8 sts=4 sw=4 noet:
28f4ac015SBram Moolenaar  *
38f4ac015SBram Moolenaar  * VIM - Vi IMproved	by Bram Moolenaar
48f4ac015SBram Moolenaar  *
58f4ac015SBram Moolenaar  * Do ":help uganda"  in Vim to read copying and usage conditions.
68f4ac015SBram Moolenaar  * Do ":help credits" in Vim to see a list of people who contributed.
78f4ac015SBram Moolenaar  * See README.txt for an overview of the Vim source code.
88f4ac015SBram Moolenaar  */
98f4ac015SBram Moolenaar 
108f4ac015SBram Moolenaar /*
118f4ac015SBram Moolenaar  * crypt_zip.c: Zip encryption support.
128f4ac015SBram Moolenaar  */
138f4ac015SBram Moolenaar #include "vim.h"
148f4ac015SBram Moolenaar 
158f4ac015SBram Moolenaar #if defined(FEAT_CRYPT) || defined(PROTO)
168f4ac015SBram Moolenaar /*
178f4ac015SBram Moolenaar  * Optional encryption support.
188f4ac015SBram Moolenaar  * Mohsin Ahmed, [email protected], 98-09-24
198f4ac015SBram Moolenaar  * Based on zip/crypt sources.
208f4ac015SBram Moolenaar  *
218f4ac015SBram Moolenaar  * NOTE FOR USA: Since 2000 exporting this code from the USA is allowed to
228f4ac015SBram Moolenaar  * most countries.  There are a few exceptions, but that still should not be a
238f4ac015SBram Moolenaar  * problem since this code was originally created in Europe and India.
248f4ac015SBram Moolenaar  */
258f4ac015SBram Moolenaar 
26c667da51SBram Moolenaar // Need a type that should be 32 bits. 64 also works but wastes space.
27c667da51SBram Moolenaar typedef unsigned int u32_T;	// int is at least 32 bits
288f4ac015SBram Moolenaar 
29c667da51SBram Moolenaar // The state of encryption, referenced by cryptstate_T.
308f4ac015SBram Moolenaar typedef struct {
318f4ac015SBram Moolenaar     u32_T keys[3];
328f4ac015SBram Moolenaar } zip_state_T;
338f4ac015SBram Moolenaar 
348f4ac015SBram Moolenaar 
358f4ac015SBram Moolenaar static u32_T crc_32_table[256];
368f4ac015SBram Moolenaar 
378f4ac015SBram Moolenaar /*
388f4ac015SBram Moolenaar  * Fill the CRC table, if not done already.
398f4ac015SBram Moolenaar  */
408f4ac015SBram Moolenaar     static void
make_crc_tab(void)417454a06eSBram Moolenaar make_crc_tab(void)
428f4ac015SBram Moolenaar {
438f4ac015SBram Moolenaar     u32_T	s, t, v;
448f4ac015SBram Moolenaar     static int	done = FALSE;
458f4ac015SBram Moolenaar 
468f4ac015SBram Moolenaar     if (done)
478f4ac015SBram Moolenaar 	return;
488f4ac015SBram Moolenaar     for (t = 0; t < 256; t++)
498f4ac015SBram Moolenaar     {
508f4ac015SBram Moolenaar 	v = t;
518f4ac015SBram Moolenaar 	for (s = 0; s < 8; s++)
528f4ac015SBram Moolenaar 	    v = (v >> 1) ^ ((v & 1) * (u32_T)0xedb88320L);
538f4ac015SBram Moolenaar 	crc_32_table[t] = v;
548f4ac015SBram Moolenaar     }
558f4ac015SBram Moolenaar     done = TRUE;
568f4ac015SBram Moolenaar }
578f4ac015SBram Moolenaar 
588f4ac015SBram Moolenaar #define CRC32(c, b) (crc_32_table[((int)(c) ^ (b)) & 0xff] ^ ((c) >> 8))
598f4ac015SBram Moolenaar 
608f4ac015SBram Moolenaar /*
618f4ac015SBram Moolenaar  * Return the next byte in the pseudo-random sequence.
628f4ac015SBram Moolenaar  */
638f4ac015SBram Moolenaar #define DECRYPT_BYTE_ZIP(keys, t) { \
648f4ac015SBram Moolenaar     short_u temp = (short_u)keys[2] | 2; \
658f4ac015SBram Moolenaar     t = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff); \
668f4ac015SBram Moolenaar }
678f4ac015SBram Moolenaar 
688f4ac015SBram Moolenaar /*
698f4ac015SBram Moolenaar  * Update the encryption keys with the next byte of plain text.
708f4ac015SBram Moolenaar  */
71abab0b0fSBram Moolenaar #define UPDATE_KEYS_ZIP(keys, c) do { \
728f4ac015SBram Moolenaar     keys[0] = CRC32(keys[0], (c)); \
738f4ac015SBram Moolenaar     keys[1] += keys[0] & 0xff; \
748f4ac015SBram Moolenaar     keys[1] = keys[1] * 134775813L + 1; \
758f4ac015SBram Moolenaar     keys[2] = CRC32(keys[2], (int)(keys[1] >> 24)); \
76abab0b0fSBram Moolenaar } while (0)
778f4ac015SBram Moolenaar 
788f4ac015SBram Moolenaar /*
798f4ac015SBram Moolenaar  * Initialize for encryption/decryption.
808f4ac015SBram Moolenaar  */
816ee96587SBram Moolenaar     int
crypt_zip_init(cryptstate_T * state,char_u * key,char_u * salt UNUSED,int salt_len UNUSED,char_u * seed UNUSED,int seed_len UNUSED)827454a06eSBram Moolenaar crypt_zip_init(
837454a06eSBram Moolenaar     cryptstate_T    *state,
847454a06eSBram Moolenaar     char_u	    *key,
857454a06eSBram Moolenaar     char_u	    *salt UNUSED,
867454a06eSBram Moolenaar     int		    salt_len UNUSED,
877454a06eSBram Moolenaar     char_u	    *seed UNUSED,
887454a06eSBram Moolenaar     int		    seed_len UNUSED)
898f4ac015SBram Moolenaar {
908f4ac015SBram Moolenaar     char_u	*p;
918f4ac015SBram Moolenaar     zip_state_T	*zs;
928f4ac015SBram Moolenaar 
93c799fe20SBram Moolenaar     zs = ALLOC_ONE(zip_state_T);
946ee96587SBram Moolenaar     if (zs == NULL)
956ee96587SBram Moolenaar 	return FAIL;
968f4ac015SBram Moolenaar     state->method_state = zs;
978f4ac015SBram Moolenaar 
988f4ac015SBram Moolenaar     make_crc_tab();
998f4ac015SBram Moolenaar     zs->keys[0] = 305419896L;
1008f4ac015SBram Moolenaar     zs->keys[1] = 591751049L;
1018f4ac015SBram Moolenaar     zs->keys[2] = 878082192L;
1028f4ac015SBram Moolenaar     for (p = key; *p != NUL; ++p)
1038f4ac015SBram Moolenaar 	UPDATE_KEYS_ZIP(zs->keys, (int)*p);
1046ee96587SBram Moolenaar 
1056ee96587SBram Moolenaar     return OK;
1068f4ac015SBram Moolenaar }
1078f4ac015SBram Moolenaar 
1088f4ac015SBram Moolenaar /*
1098f4ac015SBram Moolenaar  * Encrypt "from[len]" into "to[len]".
1108f4ac015SBram Moolenaar  * "from" and "to" can be equal to encrypt in place.
1118f4ac015SBram Moolenaar  */
1128f4ac015SBram Moolenaar     void
crypt_zip_encode(cryptstate_T * state,char_u * from,size_t len,char_u * to,int last UNUSED)1137454a06eSBram Moolenaar crypt_zip_encode(
1147454a06eSBram Moolenaar     cryptstate_T *state,
1157454a06eSBram Moolenaar     char_u	*from,
1167454a06eSBram Moolenaar     size_t	len,
117*f573c6e1SChristian Brabandt     char_u	*to,
118*f573c6e1SChristian Brabandt     int		last UNUSED)
1198f4ac015SBram Moolenaar {
1208f4ac015SBram Moolenaar     zip_state_T *zs = state->method_state;
1218f4ac015SBram Moolenaar     size_t	i;
1228f4ac015SBram Moolenaar     int		ztemp, t;
1238f4ac015SBram Moolenaar 
1248f4ac015SBram Moolenaar     for (i = 0; i < len; ++i)
1258f4ac015SBram Moolenaar     {
1268f4ac015SBram Moolenaar 	ztemp = from[i];
1278f4ac015SBram Moolenaar 	DECRYPT_BYTE_ZIP(zs->keys, t);
1288f4ac015SBram Moolenaar 	UPDATE_KEYS_ZIP(zs->keys, ztemp);
1298f4ac015SBram Moolenaar 	to[i] = t ^ ztemp;
1308f4ac015SBram Moolenaar     }
1318f4ac015SBram Moolenaar }
1328f4ac015SBram Moolenaar 
1338f4ac015SBram Moolenaar /*
1348f4ac015SBram Moolenaar  * Decrypt "from[len]" into "to[len]".
1358f4ac015SBram Moolenaar  */
1368f4ac015SBram Moolenaar     void
crypt_zip_decode(cryptstate_T * state,char_u * from,size_t len,char_u * to,int last UNUSED)1377454a06eSBram Moolenaar crypt_zip_decode(
1387454a06eSBram Moolenaar     cryptstate_T *state,
1397454a06eSBram Moolenaar     char_u	*from,
1407454a06eSBram Moolenaar     size_t	len,
141*f573c6e1SChristian Brabandt     char_u	*to,
142*f573c6e1SChristian Brabandt     int		last UNUSED)
1438f4ac015SBram Moolenaar {
1448f4ac015SBram Moolenaar     zip_state_T *zs = state->method_state;
1458f4ac015SBram Moolenaar     size_t	i;
1468f4ac015SBram Moolenaar     short_u	temp;
1478f4ac015SBram Moolenaar 
1488f4ac015SBram Moolenaar     for (i = 0; i < len; ++i)
1498f4ac015SBram Moolenaar     {
1508f4ac015SBram Moolenaar 	temp = (short_u)zs->keys[2] | 2;
1518f4ac015SBram Moolenaar 	temp = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff);
1528f4ac015SBram Moolenaar 	UPDATE_KEYS_ZIP(zs->keys, to[i] = from[i] ^ temp);
1538f4ac015SBram Moolenaar     }
1548f4ac015SBram Moolenaar }
1558f4ac015SBram Moolenaar 
156c667da51SBram Moolenaar #endif // FEAT_CRYPT
157