blob: 91bbd7ba100ecbe96d1799e90fb7c9f6694e9a5b [file] [log] [blame]
Bram Moolenaaredf3f972016-08-29 22:49:24 +02001/* vi:set ts=8 sts=4 sw=4 noet:
Bram Moolenaar8f4ac012014-08-10 13:38:34 +02002 *
3 * VIM - Vi IMproved by Bram Moolenaar
4 *
5 * Do ":help uganda" in Vim to read copying and usage conditions.
6 * Do ":help credits" in Vim to see a list of people who contributed.
7 * See README.txt for an overview of the Vim source code.
8 */
9
10/*
11 * crypt_zip.c: Zip encryption support.
12 */
13#include "vim.h"
14
15#if defined(FEAT_CRYPT) || defined(PROTO)
16/*
17 * Optional encryption support.
18 * Mohsin Ahmed, mosh@sasi.com, 98-09-24
19 * Based on zip/crypt sources.
20 *
21 * NOTE FOR USA: Since 2000 exporting this code from the USA is allowed to
22 * most countries. There are a few exceptions, but that still should not be a
23 * problem since this code was originally created in Europe and India.
24 */
25
Bram Moolenaarc667da52019-11-30 20:52:27 +010026// Need a type that should be 32 bits. 64 also works but wastes space.
27typedef unsigned int u32_T; // int is at least 32 bits
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020028
Bram Moolenaarc667da52019-11-30 20:52:27 +010029// The state of encryption, referenced by cryptstate_T.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020030typedef struct {
31 u32_T keys[3];
32} zip_state_T;
33
34
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020035static u32_T crc_32_table[256];
36
37/*
38 * Fill the CRC table, if not done already.
39 */
40 static void
Bram Moolenaar7454a062016-01-30 15:14:10 +010041make_crc_tab(void)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020042{
43 u32_T s, t, v;
44 static int done = FALSE;
45
46 if (done)
47 return;
48 for (t = 0; t < 256; t++)
49 {
50 v = t;
51 for (s = 0; s < 8; s++)
52 v = (v >> 1) ^ ((v & 1) * (u32_T)0xedb88320L);
53 crc_32_table[t] = v;
54 }
55 done = TRUE;
56}
57
58#define CRC32(c, b) (crc_32_table[((int)(c) ^ (b)) & 0xff] ^ ((c) >> 8))
59
60/*
61 * Return the next byte in the pseudo-random sequence.
62 */
Bram Moolenaarebfec1c2023-01-22 21:14:53 +000063#define DECRYPT_BYTE_ZIP(keys, t) \
64{ \
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020065 short_u temp = (short_u)keys[2] | 2; \
66 t = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff); \
67}
68
69/*
70 * Update the encryption keys with the next byte of plain text.
71 */
Bram Moolenaarabab0b02019-03-30 18:47:01 +010072#define UPDATE_KEYS_ZIP(keys, c) do { \
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020073 keys[0] = CRC32(keys[0], (c)); \
74 keys[1] += keys[0] & 0xff; \
75 keys[1] = keys[1] * 134775813L + 1; \
76 keys[2] = CRC32(keys[2], (int)(keys[1] >> 24)); \
Bram Moolenaarabab0b02019-03-30 18:47:01 +010077} while (0)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020078
79/*
80 * Initialize for encryption/decryption.
81 */
Bram Moolenaar6ee96582019-04-27 22:06:37 +020082 int
Bram Moolenaar7454a062016-01-30 15:14:10 +010083crypt_zip_init(
84 cryptstate_T *state,
85 char_u *key,
86 char_u *salt UNUSED,
87 int salt_len UNUSED,
88 char_u *seed UNUSED,
89 int seed_len UNUSED)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020090{
91 char_u *p;
92 zip_state_T *zs;
93
Bram Moolenaarc799fe22019-05-28 23:08:19 +020094 zs = ALLOC_ONE(zip_state_T);
Bram Moolenaar6ee96582019-04-27 22:06:37 +020095 if (zs == NULL)
96 return FAIL;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020097 state->method_state = zs;
98
99 make_crc_tab();
100 zs->keys[0] = 305419896L;
101 zs->keys[1] = 591751049L;
102 zs->keys[2] = 878082192L;
103 for (p = key; *p != NUL; ++p)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200104 UPDATE_KEYS_ZIP(zs->keys, (int)*p);
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200105
106 return OK;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200107}
108
109/*
110 * Encrypt "from[len]" into "to[len]".
111 * "from" and "to" can be equal to encrypt in place.
112 */
113 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100114crypt_zip_encode(
115 cryptstate_T *state,
116 char_u *from,
117 size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200118 char_u *to,
119 int last UNUSED)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200120{
121 zip_state_T *zs = state->method_state;
122 size_t i;
123 int ztemp, t;
124
125 for (i = 0; i < len; ++i)
126 {
127 ztemp = from[i];
128 DECRYPT_BYTE_ZIP(zs->keys, t);
129 UPDATE_KEYS_ZIP(zs->keys, ztemp);
130 to[i] = t ^ ztemp;
131 }
132}
133
134/*
135 * Decrypt "from[len]" into "to[len]".
136 */
137 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100138crypt_zip_decode(
139 cryptstate_T *state,
140 char_u *from,
141 size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200142 char_u *to,
143 int last UNUSED)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200144{
145 zip_state_T *zs = state->method_state;
146 size_t i;
147 short_u temp;
148
149 for (i = 0; i < len; ++i)
150 {
151 temp = (short_u)zs->keys[2] | 2;
152 temp = (int)(((unsigned)(temp * (temp ^ 1U)) >> 8) & 0xff);
153 UPDATE_KEYS_ZIP(zs->keys, to[i] = from[i] ^ temp);
154 }
155}
156
Bram Moolenaarc667da52019-11-30 20:52:27 +0100157#endif // FEAT_CRYPT