summaryrefslogtreecommitdiff
path: root/src/mesh/assimp-master/contrib/unzip/crypt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/mesh/assimp-master/contrib/unzip/crypt.c')
-rw-r--r--src/mesh/assimp-master/contrib/unzip/crypt.c171
1 files changed, 171 insertions, 0 deletions
diff --git a/src/mesh/assimp-master/contrib/unzip/crypt.c b/src/mesh/assimp-master/contrib/unzip/crypt.c
new file mode 100644
index 0000000..299ce03
--- /dev/null
+++ b/src/mesh/assimp-master/contrib/unzip/crypt.c
@@ -0,0 +1,171 @@
+/* crypt.c -- base code for traditional PKWARE encryption
+ Version 1.01e, February 12th, 2005
+
+ Copyright (C) 1998-2005 Gilles Vollant
+ Modifications for Info-ZIP crypting
+ Copyright (C) 2003 Terry Thorsen
+
+ This code is a modified version of crypting code in Info-ZIP distribution
+
+ Copyright (C) 1990-2000 Info-ZIP. All rights reserved.
+
+ This program is distributed under the terms of the same license as zlib.
+ See the accompanying LICENSE file for the full text of the license.
+
+ This encryption code is a direct transcription of the algorithm from
+ Roger Schlafly, described by Phil Katz in the file appnote.txt. This
+ file (appnote.txt) is distributed with the PKZIP program (even in the
+ version without encryption capabilities).
+
+ If you don't need crypting in your application, just define symbols
+ NOCRYPT and NOUNCRYPT.
+*/
+
+#if defined(WIN32) || defined(_WIN32) || defined(__WIN32) && !defined(__CYGWIN__)
+ #define MICROSOFT_WINDOWS_WINBASE_H_DEFINE_INTERLOCKED_CPLUSPLUS_OVERLOADS 0
+#endif
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <stdint.h>
+#include <time.h>
+
+#ifdef _WIN32
+# include <windows.h>
+# include <wincrypt.h>
+#else
+# include <sys/stat.h>
+# include <fcntl.h>
+# include <unistd.h>
+#endif
+
+#include "zlib.h"
+
+#include "crypt.h"
+
+#ifdef _WIN32
+# pragma warning(push)
+# pragma warning(disable : 4244)
+#endif // _WIN32
+
+/***************************************************************************/
+
+#define CRC32(c, b) ((*(pcrc_32_tab+(((uint32_t)(c) ^ (b)) & 0xff))) ^ ((c) >> 8))
+
+#ifndef ZCR_SEED2
+# define ZCR_SEED2 3141592654UL /* use PI as default pattern */
+#endif
+
+/***************************************************************************/
+
+uint8_t decrypt_byte(uint32_t *pkeys)
+{
+ unsigned temp; /* POTENTIAL BUG: temp*(temp^1) may overflow in an
+ * unpredictable manner on 16-bit systems; not a problem
+ * with any known compiler so far, though */
+
+ temp = ((uint32_t)(*(pkeys+2)) & 0xffff) | 2;
+ return (uint8_t)(((temp * (temp ^ 1)) >> 8) & 0xff);
+}
+
+uint8_t update_keys(uint32_t *pkeys, const z_crc_t *pcrc_32_tab, int32_t c)
+{
+ (*(pkeys+0)) = (uint32_t)CRC32((*(pkeys+0)), c);
+ (*(pkeys+1)) += (*(pkeys+0)) & 0xff;
+ (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1;
+ {
+ register int32_t keyshift = (int32_t)((*(pkeys + 1)) >> 24);
+ (*(pkeys+2)) = (uint32_t)CRC32((*(pkeys+2)), keyshift);
+ }
+ return c;
+}
+
+void init_keys(const char *passwd, uint32_t *pkeys, const z_crc_t *pcrc_32_tab)
+{
+ *(pkeys+0) = 305419896L;
+ *(pkeys+1) = 591751049L;
+ *(pkeys+2) = 878082192L;
+ while (*passwd != 0)
+ {
+ update_keys(pkeys, pcrc_32_tab, *passwd);
+ passwd += 1;
+ }
+}
+
+/***************************************************************************/
+
+int cryptrand(unsigned char *buf, unsigned int len)
+{
+ static unsigned calls = 0;
+ int rlen = 0;
+#ifdef _WIN32
+ HCRYPTPROV provider;
+ unsigned __int64 pentium_tsc[1];
+ int result = 0;
+
+
+ if (CryptAcquireContext(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT))
+ {
+ result = CryptGenRandom(provider, len, buf);
+ CryptReleaseContext(provider, 0);
+ if (result)
+ return len;
+ }
+
+ for (rlen = 0; rlen < (int)len; ++rlen)
+ {
+ if (rlen % 8 == 0)
+ QueryPerformanceCounter((LARGE_INTEGER *)pentium_tsc);
+ buf[rlen] = ((unsigned char*)pentium_tsc)[rlen % 8];
+ }
+#else
+ int frand = open("/dev/urandom", O_RDONLY);
+ if (frand != -1)
+ {
+ rlen = (int)read(frand, buf, len);
+ close(frand);
+ }
+#endif
+ if (rlen < (int)len)
+ {
+ /* Ensure different random header each time */
+ if (++calls == 1)
+ srand((unsigned)(time(NULL) ^ ZCR_SEED2));
+
+ while (rlen < (int)len)
+ buf[rlen++] = (rand() >> 7) & 0xff;
+ }
+ return rlen;
+}
+
+int crypthead(const char *passwd, uint8_t *buf, int buf_size, uint32_t *pkeys,
+ const z_crc_t *pcrc_32_tab, uint8_t verify1, uint8_t verify2)
+{
+ uint8_t n = 0; /* index in random header */
+ uint8_t header[RAND_HEAD_LEN-2]; /* random header */
+ uint16_t t = 0; /* temporary */
+
+ if (buf_size < RAND_HEAD_LEN)
+ return 0;
+
+ init_keys(passwd, pkeys, pcrc_32_tab);
+
+ /* First generate RAND_HEAD_LEN-2 random bytes. */
+ cryptrand(header, RAND_HEAD_LEN-2);
+
+ /* Encrypt random header (last two bytes is high word of crc) */
+ init_keys(passwd, pkeys, pcrc_32_tab);
+
+ for (n = 0; n < RAND_HEAD_LEN-2; n++)
+ buf[n] = (uint8_t)zencode(pkeys, pcrc_32_tab, header[n], t);
+
+ buf[n++] = (uint8_t)zencode(pkeys, pcrc_32_tab, verify1, t);
+ buf[n++] = (uint8_t)zencode(pkeys, pcrc_32_tab, verify2, t);
+ return n;
+}
+
+#ifdef _WIN32
+# pragma warning(pop)
+#endif // _WIN32
+
+/***************************************************************************/