1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
|
// WzAES.h
/*
This code implements Brian Gladman's scheme
specified in password Based File Encryption Utility:
- AES encryption (128,192,256-bit) in Counter (CTR) mode.
- HMAC-SHA1 authentication for encrypted data (10 bytes)
- Keys are derived by PPKDF2(RFC2898)-HMAC-SHA1 from ASCII password and
Salt (saltSize = aesKeySize / 2).
- 2 bytes contain Password Verifier's Code
*/
#ifndef __CRYPTO_WZ_AES_H
#define __CRYPTO_WZ_AES_H
#include "../Hash/HmacSha1.h"
#include "Common/MyCom.h"
#include "Common/Buffer.h"
#include "Common/Vector.h"
#include "../../ICoder.h"
#include "../../IPassword.h"
namespace NCrypto {
namespace NWzAES {
const unsigned int kAesBlockSize = 16;
const unsigned int kSaltSizeMax = 16;
const unsigned int kMacSize = 10;
const UInt32 kPasswordSizeMax = 99; // 128;
// Password Verification Code Size
const unsigned int kPwdVerifCodeSize = 2;
class CKeyInfo
{
public:
Byte KeySizeMode; // 1 - 128-bit , 2 - 192-bit , 3 - 256-bit
Byte Salt[kSaltSizeMax];
Byte PwdVerifComputed[kPwdVerifCodeSize];
CByteBuffer Password;
UInt32 GetKeySize() const { return (8 * (KeySizeMode & 3) + 8); }
UInt32 GetSaltSize() const { return (4 * (KeySizeMode & 3) + 4); }
CKeyInfo() { Init(); }
void Init() { KeySizeMode = 3; }
};
class CBaseCoder:
public ICompressFilter,
public ICryptoSetPassword,
public CMyUnknownImp
{
protected:
CKeyInfo _key;
Byte _counter[8];
Byte _buffer[kAesBlockSize];
NSha1::CHmac _hmac;
unsigned int _blockPos;
Byte _pwdVerifFromArchive[kPwdVerifCodeSize];
void EncryptData(Byte *data, UInt32 size);
CMyComPtr<ICompressFilter> _aesFilter;
HRESULT CreateFilters();
public:
STDMETHOD(Init)();
STDMETHOD_(UInt32, Filter)(Byte *data, UInt32 size) = 0;
STDMETHOD(CryptoSetPassword)(const Byte *data, UInt32 size);
UInt32 GetHeaderSize() const { return _key.GetSaltSize() + kPwdVerifCodeSize; }
};
class CEncoder:
public CBaseCoder
// public ICompressWriteCoderProperties
{
public:
MY_UNKNOWN_IMP1(ICryptoSetPassword)
// ICompressWriteCoderProperties
// STDMETHOD(WriteCoderProperties)(ISequentialOutStream *outStream);
STDMETHOD_(UInt32, Filter)(Byte *data, UInt32 size);
HRESULT WriteHeader(ISequentialOutStream *outStream);
HRESULT WriteFooter(ISequentialOutStream *outStream);
bool SetKeyMode(Byte mode)
{
if (mode < 1 || mode > 3)
return false;
_key.KeySizeMode = mode;
return true;
}
};
class CDecoder:
public CBaseCoder,
public ICompressSetDecoderProperties2
{
public:
MY_UNKNOWN_IMP2(
ICryptoSetPassword,
ICompressSetDecoderProperties2)
STDMETHOD_(UInt32, Filter)(Byte *data, UInt32 size);
STDMETHOD(SetDecoderProperties2)(const Byte *data, UInt32 size);
HRESULT ReadHeader(ISequentialInStream *inStream);
bool CheckPasswordVerifyCode();
HRESULT CheckMac(ISequentialInStream *inStream, bool &isOK);
};
}}
#endif
|