1edf3f97aSBram Moolenaar /* vi:set ts=8 sts=4 sw=4 noet:
28f4ac015SBram Moolenaar *
38f4ac015SBram Moolenaar * VIM - Vi IMproved by Bram Moolenaar
48f4ac015SBram Moolenaar *
58f4ac015SBram Moolenaar * Do ":help uganda" in Vim to read copying and usage conditions.
68f4ac015SBram Moolenaar * Do ":help credits" in Vim to see a list of people who contributed.
78f4ac015SBram Moolenaar * See README.txt for an overview of the Vim source code.
88f4ac015SBram Moolenaar */
98f4ac015SBram Moolenaar
108f4ac015SBram Moolenaar /*
118f4ac015SBram Moolenaar * crypt_zip.c: Zip encryption support.
128f4ac015SBram Moolenaar */
138f4ac015SBram Moolenaar #include "vim.h"
148f4ac015SBram Moolenaar
158f4ac015SBram Moolenaar #if defined(FEAT_CRYPT) || defined(PROTO)
168f4ac015SBram Moolenaar /*
178f4ac015SBram Moolenaar * Optional encryption support.
188f4ac015SBram Moolenaar * Mohsin Ahmed, [email protected], 98-09-24
198f4ac015SBram Moolenaar * Based on zip/crypt sources.
208f4ac015SBram Moolenaar *
218f4ac015SBram Moolenaar * NOTE FOR USA: Since 2000 exporting this code from the USA is allowed to
228f4ac015SBram Moolenaar * most countries. There are a few exceptions, but that still should not be a
238f4ac015SBram Moolenaar * problem since this code was originally created in Europe and India.
248f4ac015SBram Moolenaar */
258f4ac015SBram Moolenaar
26c667da51SBram Moolenaar // Need a type that should be 32 bits. 64 also works but wastes space.
27c667da51SBram Moolenaar typedef unsigned int u32_T; // int is at least 32 bits
288f4ac015SBram Moolenaar
29c667da51SBram Moolenaar // The state of encryption, referenced by cryptstate_T.
308f4ac015SBram Moolenaar typedef struct {
318f4ac015SBram Moolenaar u32_T keys[3];
328f4ac015SBram Moolenaar } zip_state_T;
338f4ac015SBram Moolenaar
348f4ac015SBram Moolenaar
358f4ac015SBram Moolenaar static u32_T crc_32_table[256];
368f4ac015SBram Moolenaar
378f4ac015SBram Moolenaar /*
388f4ac015SBram Moolenaar * Fill the CRC table, if not done already.
398f4ac015SBram Moolenaar */
408f4ac015SBram Moolenaar static void
make_crc_tab(void)417454a06eSBram Moolenaar make_crc_tab(void)
428f4ac015SBram Moolenaar {
438f4ac015SBram Moolenaar u32_T s, t, v;
448f4ac015SBram Moolenaar static int done = FALSE;
458f4ac015SBram Moolenaar
468f4ac015SBram Moolenaar if (done)
478f4ac015SBram Moolenaar return;
488f4ac015SBram Moolenaar for (t = 0; t < 256; t++)
498f4ac015SBram Moolenaar {
508f4ac015SBram Moolenaar v = t;
518f4ac015SBram Moolenaar for (s = 0; s < 8; s++)
528f4ac015SBram Moolenaar v = (v >> 1) ^ ((v & 1) * (u32_T)0xedb88320L);
538f4ac015SBram Moolenaar crc_32_table[t] = v;
548f4ac015SBram Moolenaar }
558f4ac015SBram Moolenaar done = TRUE;
568f4ac015SBram Moolenaar }
578f4ac015SBram Moolenaar
588f4ac015SBram Moolenaar #define CRC32(c, b) (crc_32_table[((int)(c) ^ (b)) & 0xff] ^ ((c) >> 8))
598f4ac015SBram Moolenaar
608f4ac015SBram Moolenaar /*
618f4ac015SBram Moolenaar * Return the next byte in the pseudo-random sequence.
628f4ac015SBram Moolenaar */
638f4ac015SBram Moolenaar #define DECRYPT_BYTE_ZIP(keys, t) { \
648f4ac015SBram Moolenaar short_u temp = (short_u)keys[2] | 2; \
658f4ac015SBram Moolenaar t = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff); \
668f4ac015SBram Moolenaar }
678f4ac015SBram Moolenaar
688f4ac015SBram Moolenaar /*
698f4ac015SBram Moolenaar * Update the encryption keys with the next byte of plain text.
708f4ac015SBram Moolenaar */
71abab0b0fSBram Moolenaar #define UPDATE_KEYS_ZIP(keys, c) do { \
728f4ac015SBram Moolenaar keys[0] = CRC32(keys[0], (c)); \
738f4ac015SBram Moolenaar keys[1] += keys[0] & 0xff; \
748f4ac015SBram Moolenaar keys[1] = keys[1] * 134775813L + 1; \
758f4ac015SBram Moolenaar keys[2] = CRC32(keys[2], (int)(keys[1] >> 24)); \
76abab0b0fSBram Moolenaar } while (0)
778f4ac015SBram Moolenaar
788f4ac015SBram Moolenaar /*
798f4ac015SBram Moolenaar * Initialize for encryption/decryption.
808f4ac015SBram Moolenaar */
816ee96587SBram Moolenaar int
crypt_zip_init(cryptstate_T * state,char_u * key,char_u * salt UNUSED,int salt_len UNUSED,char_u * seed UNUSED,int seed_len UNUSED)827454a06eSBram Moolenaar crypt_zip_init(
837454a06eSBram Moolenaar cryptstate_T *state,
847454a06eSBram Moolenaar char_u *key,
857454a06eSBram Moolenaar char_u *salt UNUSED,
867454a06eSBram Moolenaar int salt_len UNUSED,
877454a06eSBram Moolenaar char_u *seed UNUSED,
887454a06eSBram Moolenaar int seed_len UNUSED)
898f4ac015SBram Moolenaar {
908f4ac015SBram Moolenaar char_u *p;
918f4ac015SBram Moolenaar zip_state_T *zs;
928f4ac015SBram Moolenaar
93c799fe20SBram Moolenaar zs = ALLOC_ONE(zip_state_T);
946ee96587SBram Moolenaar if (zs == NULL)
956ee96587SBram Moolenaar return FAIL;
968f4ac015SBram Moolenaar state->method_state = zs;
978f4ac015SBram Moolenaar
988f4ac015SBram Moolenaar make_crc_tab();
998f4ac015SBram Moolenaar zs->keys[0] = 305419896L;
1008f4ac015SBram Moolenaar zs->keys[1] = 591751049L;
1018f4ac015SBram Moolenaar zs->keys[2] = 878082192L;
1028f4ac015SBram Moolenaar for (p = key; *p != NUL; ++p)
1038f4ac015SBram Moolenaar UPDATE_KEYS_ZIP(zs->keys, (int)*p);
1046ee96587SBram Moolenaar
1056ee96587SBram Moolenaar return OK;
1068f4ac015SBram Moolenaar }
1078f4ac015SBram Moolenaar
1088f4ac015SBram Moolenaar /*
1098f4ac015SBram Moolenaar * Encrypt "from[len]" into "to[len]".
1108f4ac015SBram Moolenaar * "from" and "to" can be equal to encrypt in place.
1118f4ac015SBram Moolenaar */
1128f4ac015SBram Moolenaar void
crypt_zip_encode(cryptstate_T * state,char_u * from,size_t len,char_u * to,int last UNUSED)1137454a06eSBram Moolenaar crypt_zip_encode(
1147454a06eSBram Moolenaar cryptstate_T *state,
1157454a06eSBram Moolenaar char_u *from,
1167454a06eSBram Moolenaar size_t len,
117*f573c6e1SChristian Brabandt char_u *to,
118*f573c6e1SChristian Brabandt int last UNUSED)
1198f4ac015SBram Moolenaar {
1208f4ac015SBram Moolenaar zip_state_T *zs = state->method_state;
1218f4ac015SBram Moolenaar size_t i;
1228f4ac015SBram Moolenaar int ztemp, t;
1238f4ac015SBram Moolenaar
1248f4ac015SBram Moolenaar for (i = 0; i < len; ++i)
1258f4ac015SBram Moolenaar {
1268f4ac015SBram Moolenaar ztemp = from[i];
1278f4ac015SBram Moolenaar DECRYPT_BYTE_ZIP(zs->keys, t);
1288f4ac015SBram Moolenaar UPDATE_KEYS_ZIP(zs->keys, ztemp);
1298f4ac015SBram Moolenaar to[i] = t ^ ztemp;
1308f4ac015SBram Moolenaar }
1318f4ac015SBram Moolenaar }
1328f4ac015SBram Moolenaar
1338f4ac015SBram Moolenaar /*
1348f4ac015SBram Moolenaar * Decrypt "from[len]" into "to[len]".
1358f4ac015SBram Moolenaar */
1368f4ac015SBram Moolenaar void
crypt_zip_decode(cryptstate_T * state,char_u * from,size_t len,char_u * to,int last UNUSED)1377454a06eSBram Moolenaar crypt_zip_decode(
1387454a06eSBram Moolenaar cryptstate_T *state,
1397454a06eSBram Moolenaar char_u *from,
1407454a06eSBram Moolenaar size_t len,
141*f573c6e1SChristian Brabandt char_u *to,
142*f573c6e1SChristian Brabandt int last UNUSED)
1438f4ac015SBram Moolenaar {
1448f4ac015SBram Moolenaar zip_state_T *zs = state->method_state;
1458f4ac015SBram Moolenaar size_t i;
1468f4ac015SBram Moolenaar short_u temp;
1478f4ac015SBram Moolenaar
1488f4ac015SBram Moolenaar for (i = 0; i < len; ++i)
1498f4ac015SBram Moolenaar {
1508f4ac015SBram Moolenaar temp = (short_u)zs->keys[2] | 2;
1518f4ac015SBram Moolenaar temp = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff);
1528f4ac015SBram Moolenaar UPDATE_KEYS_ZIP(zs->keys, to[i] = from[i] ^ temp);
1538f4ac015SBram Moolenaar }
1548f4ac015SBram Moolenaar }
1558f4ac015SBram Moolenaar
156c667da51SBram Moolenaar #endif // FEAT_CRYPT
157