2021-07-03 21:57:53 +02:00
|
|
|
/*
|
|
|
|
Copyright (c) 2021, Grégory Soutadé
|
|
|
|
|
|
|
|
All rights reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions are met:
|
|
|
|
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer.
|
|
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer in the
|
|
|
|
documentation and/or other materials provided with the distribution.
|
|
|
|
* Neither the name of the copyright holder nor the
|
|
|
|
names of its contributors may be used to endorse or promote products
|
|
|
|
derived from this software without specific prior written permission.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
|
|
|
|
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
DISCLAIMED. IN NO EVENT SHALL THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY
|
|
|
|
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
|
|
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <openssl/rand.h>
|
|
|
|
#include <openssl/pkcs12.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
|
|
|
|
#include <QCoreApplication>
|
|
|
|
#include <QNetworkReply>
|
|
|
|
#include <QNetworkRequest>
|
|
|
|
#include <QNetworkAccessManager>
|
|
|
|
#include <QFile>
|
|
|
|
|
2021-08-21 20:57:31 +02:00
|
|
|
#include <zlib.h>
|
2021-11-26 15:01:26 +01:00
|
|
|
#include <zip.h>
|
2021-07-03 21:57:53 +02:00
|
|
|
|
|
|
|
#include <libgourou_common.h>
|
|
|
|
#include <libgourou_log.h>
|
|
|
|
#include "drmprocessorclientimpl.h"
|
|
|
|
|
|
|
|
/* Digest interface */
|
|
|
|
void* DRMProcessorClientImpl::createDigest(const std::string& digestName)
|
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
EVP_MD_CTX *md_ctx = EVP_MD_CTX_new();
|
2021-07-03 21:57:53 +02:00
|
|
|
const EVP_MD* md = EVP_get_digestbyname(digestName.c_str());
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
if (EVP_DigestInit(md_ctx, md) != 1)
|
|
|
|
{
|
|
|
|
EVP_MD_CTX_free(md_ctx);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return md_ctx;
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int DRMProcessorClientImpl::digestUpdate(void* handler, unsigned char* data, unsigned int length)
|
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
return (EVP_DigestUpdate((EVP_MD_CTX *)handler, data, length)) ? 0 : -1;
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int DRMProcessorClientImpl::digestFinalize(void* handler, unsigned char* digestOut)
|
|
|
|
{
|
|
|
|
int res = EVP_DigestFinal((EVP_MD_CTX *)handler, digestOut, NULL);
|
|
|
|
EVP_MD_CTX_free((EVP_MD_CTX *)handler);
|
2021-12-18 17:37:37 +01:00
|
|
|
return (res == 1) ? 0 : -1;
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int DRMProcessorClientImpl::digest(const std::string& digestName, unsigned char* data, unsigned int length, unsigned char* digestOut)
|
|
|
|
{
|
|
|
|
void* handler = createDigest(digestName);
|
|
|
|
if (!handler)
|
|
|
|
return -1;
|
|
|
|
if (digestUpdate(handler, data, length))
|
|
|
|
return -1;
|
|
|
|
return digestFinalize(handler, digestOut);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Random interface */
|
|
|
|
void DRMProcessorClientImpl::randBytes(unsigned char* bytesOut, unsigned int length)
|
|
|
|
{
|
|
|
|
RAND_bytes(bytesOut, length);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* HTTP interface */
|
2021-08-21 20:57:31 +02:00
|
|
|
std::string DRMProcessorClientImpl::sendHTTPRequest(const std::string& URL, const std::string& POSTData, const std::string& contentType, std::map<std::string, std::string>* responseHeaders)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
QNetworkRequest request(QUrl(URL.c_str()));
|
|
|
|
QNetworkAccessManager networkManager;
|
|
|
|
QByteArray replyData;
|
|
|
|
|
|
|
|
GOUROU_LOG(gourou::INFO, "Send request to " << URL);
|
|
|
|
if (POSTData.size())
|
|
|
|
{
|
|
|
|
GOUROU_LOG(gourou::DEBUG, "<<< " << std::endl << POSTData);
|
|
|
|
}
|
|
|
|
|
|
|
|
request.setRawHeader("Accept", "*/*");
|
|
|
|
request.setRawHeader("User-Agent", "book2png");
|
|
|
|
if (contentType.size())
|
|
|
|
request.setRawHeader("Content-Type", contentType.c_str());
|
|
|
|
|
|
|
|
QNetworkReply* reply;
|
|
|
|
|
|
|
|
if (POSTData.size())
|
|
|
|
reply = networkManager.post(request, POSTData.c_str());
|
|
|
|
else
|
|
|
|
reply = networkManager.get(request);
|
|
|
|
|
|
|
|
QCoreApplication* app = QCoreApplication::instance();
|
|
|
|
networkManager.moveToThread(app->thread());
|
|
|
|
while (!reply->isFinished())
|
|
|
|
app->processEvents();
|
|
|
|
|
2021-07-10 12:51:36 +02:00
|
|
|
QByteArray location = reply->rawHeader("Location");
|
|
|
|
if (location.size() != 0)
|
|
|
|
{
|
|
|
|
GOUROU_LOG(gourou::DEBUG, "New location");
|
2021-11-03 13:54:04 +01:00
|
|
|
return sendHTTPRequest(location.constData(), POSTData, contentType, responseHeaders);
|
2021-07-10 12:51:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (reply->error() != QNetworkReply::NoError)
|
2021-07-29 21:14:48 +02:00
|
|
|
EXCEPTION(gourou::CLIENT_NETWORK_ERROR, "Error " << reply->errorString().toStdString());
|
2021-07-10 12:51:36 +02:00
|
|
|
|
2021-08-21 20:57:31 +02:00
|
|
|
QList<QByteArray> headers = reply->rawHeaderList();
|
|
|
|
for (int i = 0; i < headers.size(); ++i) {
|
|
|
|
if (gourou::logLevel >= gourou::DEBUG)
|
2021-07-10 12:51:36 +02:00
|
|
|
std::cout << headers[i].constData() << " : " << reply->rawHeader(headers[i]).constData() << std::endl;
|
2021-08-21 20:57:31 +02:00
|
|
|
if (responseHeaders)
|
|
|
|
(*responseHeaders)[headers[i].constData()] = reply->rawHeader(headers[i]).constData();
|
2021-07-10 12:51:36 +02:00
|
|
|
}
|
|
|
|
|
2021-07-03 21:57:53 +02:00
|
|
|
replyData = reply->readAll();
|
|
|
|
if (reply->rawHeader("Content-Type") == "application/vnd.adobe.adept+xml")
|
|
|
|
{
|
|
|
|
GOUROU_LOG(gourou::DEBUG, ">>> " << std::endl << replyData.data());
|
|
|
|
}
|
|
|
|
|
|
|
|
return std::string(replyData.data(), replyData.length());
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::RSAPrivateEncrypt(const unsigned char* RSAKey, unsigned int RSAKeyLength,
|
|
|
|
const RSA_KEY_TYPE keyType, const std::string& password,
|
|
|
|
const unsigned char* data, unsigned dataLength,
|
|
|
|
unsigned char* res)
|
|
|
|
{
|
|
|
|
PKCS12 * pkcs12;
|
|
|
|
EVP_PKEY* pkey;
|
|
|
|
X509* cert;
|
|
|
|
STACK_OF(X509)* ca;
|
|
|
|
RSA * rsa;
|
|
|
|
|
|
|
|
pkcs12 = d2i_PKCS12(NULL, &RSAKey, RSAKeyLength);
|
|
|
|
if (!pkcs12)
|
|
|
|
EXCEPTION(gourou::CLIENT_INVALID_PKCS12, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
PKCS12_parse(pkcs12, password.c_str(), &pkey, &cert, &ca);
|
|
|
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
|
|
|
|
|
|
|
int ret = RSA_private_encrypt(dataLength, data, res, rsa, RSA_PKCS1_PADDING);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
EXCEPTION(gourou::CLIENT_RSA_ERROR, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
|
|
|
|
if (gourou::logLevel >= gourou::DEBUG)
|
|
|
|
{
|
2021-11-26 15:01:26 +01:00
|
|
|
printf("Encrypted : ");
|
|
|
|
for(int i=0; i<ret; i++)
|
2021-07-03 21:57:53 +02:00
|
|
|
printf("%02x ", res[i]);
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
void DRMProcessorClientImpl::RSAPrivateDecrypt(const unsigned char* RSAKey, unsigned int RSAKeyLength,
|
|
|
|
const RSA_KEY_TYPE keyType, const std::string& password,
|
|
|
|
const unsigned char* data, unsigned dataLength,
|
|
|
|
unsigned char* res)
|
|
|
|
{
|
|
|
|
BIO* mem=BIO_new_mem_buf(RSAKey, RSAKeyLength);
|
|
|
|
PKCS8_PRIV_KEY_INFO* p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(mem, NULL);
|
|
|
|
|
|
|
|
if (!p8inf)
|
|
|
|
EXCEPTION(gourou::CLIENT_INVALID_PKCS12, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
|
|
|
|
EVP_PKEY* pkey = EVP_PKCS82PKEY(p8inf);
|
|
|
|
RSA * rsa;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
|
|
|
|
|
|
|
ret = RSA_private_decrypt(dataLength, data, res, rsa, RSA_NO_PADDING);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
EXCEPTION(gourou::CLIENT_RSA_ERROR, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
|
|
|
|
if (gourou::logLevel >= gourou::DEBUG)
|
|
|
|
{
|
|
|
|
printf("Decrypted : ");
|
|
|
|
for(int i=0; i<ret; i++)
|
|
|
|
printf("%02x ", res[i]);
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-03 21:57:53 +02:00
|
|
|
void DRMProcessorClientImpl::RSAPublicEncrypt(const unsigned char* RSAKey, unsigned int RSAKeyLength,
|
|
|
|
const RSA_KEY_TYPE keyType,
|
|
|
|
const unsigned char* data, unsigned dataLength,
|
|
|
|
unsigned char* res)
|
|
|
|
{
|
|
|
|
X509 * x509 = d2i_X509(0, &RSAKey, RSAKeyLength);
|
|
|
|
if (!x509)
|
|
|
|
EXCEPTION(gourou::CLIENT_INVALID_CERTIFICATE, "Invalid certificate");
|
|
|
|
|
|
|
|
EVP_PKEY * evpKey = X509_get_pubkey(x509);
|
|
|
|
RSA* rsa = EVP_PKEY_get1_RSA(evpKey);
|
|
|
|
EVP_PKEY_free(evpKey);
|
|
|
|
|
|
|
|
if (!rsa)
|
|
|
|
EXCEPTION(gourou::CLIENT_NO_PRIV_KEY, "No private key in certificate");
|
|
|
|
|
|
|
|
int ret = RSA_public_encrypt(dataLength, data, res, rsa, RSA_PKCS1_PADDING);
|
|
|
|
if (ret < 0)
|
|
|
|
EXCEPTION(gourou::CLIENT_RSA_ERROR, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
}
|
|
|
|
|
|
|
|
void* DRMProcessorClientImpl::generateRSAKey(int keyLengthBits)
|
|
|
|
{
|
|
|
|
BIGNUM * bn = BN_new();
|
|
|
|
RSA * rsa = RSA_new();
|
|
|
|
BN_set_word(bn, 0x10001);
|
|
|
|
RSA_generate_key_ex(rsa, keyLengthBits, bn, 0);
|
|
|
|
BN_free(bn);
|
|
|
|
|
|
|
|
return rsa;
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::destroyRSAHandler(void* handler)
|
|
|
|
{
|
|
|
|
RSA_free((RSA*)handler);
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::extractRSAPublicKey(void* handler, unsigned char** keyOut, unsigned int* keyOutLength)
|
|
|
|
{
|
|
|
|
EVP_PKEY * evpKey = EVP_PKEY_new();
|
|
|
|
EVP_PKEY_set1_RSA(evpKey, (RSA*)handler);
|
|
|
|
X509_PUBKEY *x509_pubkey = 0;
|
|
|
|
X509_PUBKEY_set(&x509_pubkey, evpKey);
|
|
|
|
|
|
|
|
*keyOutLength = i2d_X509_PUBKEY(x509_pubkey, keyOut);
|
|
|
|
|
|
|
|
X509_PUBKEY_free(x509_pubkey);
|
|
|
|
EVP_PKEY_free(evpKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::extractRSAPrivateKey(void* handler, unsigned char** keyOut, unsigned int* keyOutLength)
|
|
|
|
{
|
|
|
|
EVP_PKEY * evpKey = EVP_PKEY_new();
|
|
|
|
EVP_PKEY_set1_RSA(evpKey, (RSA*)handler);
|
|
|
|
PKCS8_PRIV_KEY_INFO * privKey = EVP_PKEY2PKCS8(evpKey);
|
|
|
|
|
|
|
|
*keyOutLength = i2d_PKCS8_PRIV_KEY_INFO(privKey, keyOut);
|
|
|
|
|
|
|
|
PKCS8_PRIV_KEY_INFO_free(privKey);
|
|
|
|
EVP_PKEY_free(evpKey);
|
|
|
|
}
|
|
|
|
|
2021-07-09 21:55:39 +02:00
|
|
|
void DRMProcessorClientImpl::extractCertificate(const unsigned char* RSAKey, unsigned int RSAKeyLength,
|
|
|
|
const RSA_KEY_TYPE keyType, const std::string& password,
|
|
|
|
unsigned char** certOut, unsigned int* certOutLength)
|
|
|
|
{
|
|
|
|
PKCS12 * pkcs12;
|
|
|
|
EVP_PKEY* pkey = 0;
|
|
|
|
X509* cert = 0;
|
|
|
|
STACK_OF(X509)* ca;
|
|
|
|
|
|
|
|
pkcs12 = d2i_PKCS12(NULL, &RSAKey, RSAKeyLength);
|
|
|
|
if (!pkcs12)
|
|
|
|
EXCEPTION(gourou::CLIENT_INVALID_PKCS12, ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
PKCS12_parse(pkcs12, password.c_str(), &pkey, &cert, &ca);
|
|
|
|
|
|
|
|
*certOutLength = i2d_X509(cert, certOut);
|
|
|
|
|
|
|
|
EVP_PKEY_free(pkey);
|
|
|
|
}
|
|
|
|
|
2021-07-03 21:57:53 +02:00
|
|
|
/* Crypto interface */
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::Encrypt(CRYPTO_ALGO algo, CHAINING_MODE chaining,
|
|
|
|
const unsigned char* key, unsigned int keyLength,
|
|
|
|
const unsigned char* iv, unsigned int ivLength,
|
|
|
|
const unsigned char* dataIn, unsigned int dataInLength,
|
|
|
|
unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
void* handler = EncryptInit(algo, chaining, key, keyLength, iv, ivLength);
|
|
|
|
EncryptUpdate(handler, dataIn, dataInLength, dataOut, dataOutLength);
|
|
|
|
EncryptFinalize(handler, dataOut+*dataOutLength, dataOutLength);
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void* DRMProcessorClientImpl::EncryptInit(CRYPTO_ALGO algo, CHAINING_MODE chaining,
|
|
|
|
const unsigned char* key, unsigned int keyLength,
|
|
|
|
const unsigned char* iv, unsigned int ivLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
if (algo == ALGO_AES)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
switch(keyLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
case 16:
|
|
|
|
switch(chaining)
|
|
|
|
{
|
|
|
|
case CHAIN_ECB:
|
|
|
|
EVP_EncryptInit(ctx, EVP_aes_128_ecb(), key, iv);
|
|
|
|
break;
|
|
|
|
case CHAIN_CBC:
|
|
|
|
EVP_EncryptInit(ctx, EVP_aes_128_cbc(), key, iv);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_CHAINING, "Unknown chaining mode " << chaining);
|
|
|
|
}
|
2021-07-03 21:57:53 +02:00
|
|
|
break;
|
|
|
|
default:
|
2021-12-18 17:37:37 +01:00
|
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_KEY_SIZE, "Invalid key size " << keyLength);
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
}
|
2021-12-18 17:37:37 +01:00
|
|
|
else if (algo == ALGO_RC4)
|
|
|
|
{
|
|
|
|
if (keyLength != 16)
|
|
|
|
{
|
|
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_KEY_SIZE, "Invalid key size " << keyLength);
|
|
|
|
}
|
|
|
|
EVP_DecryptInit(ctx, EVP_rc4(), key, iv);
|
|
|
|
}
|
2021-07-03 21:57:53 +02:00
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void* DRMProcessorClientImpl::DecryptInit(CRYPTO_ALGO algo, CHAINING_MODE chaining,
|
2021-07-03 21:57:53 +02:00
|
|
|
const unsigned char* key, unsigned int keyLength,
|
|
|
|
const unsigned char* iv, unsigned int ivLength)
|
|
|
|
{
|
|
|
|
EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
if (algo == ALGO_AES)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
switch(keyLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
case 16:
|
|
|
|
switch(chaining)
|
|
|
|
{
|
|
|
|
case CHAIN_ECB:
|
|
|
|
EVP_DecryptInit(ctx, EVP_aes_128_ecb(), key, iv);
|
|
|
|
break;
|
|
|
|
case CHAIN_CBC:
|
|
|
|
EVP_DecryptInit(ctx, EVP_aes_128_cbc(), key, iv);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_CHAINING, "Unknown chaining mode " << chaining);
|
|
|
|
}
|
2021-07-03 21:57:53 +02:00
|
|
|
break;
|
|
|
|
default:
|
2021-12-18 17:37:37 +01:00
|
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_KEY_SIZE, "Invalid key size " << keyLength);
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
}
|
2021-12-18 17:37:37 +01:00
|
|
|
else if (algo == ALGO_RC4)
|
|
|
|
{
|
|
|
|
if (keyLength != 16)
|
|
|
|
{
|
|
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_KEY_SIZE, "Invalid key size " << keyLength);
|
|
|
|
}
|
|
|
|
EVP_DecryptInit(ctx, EVP_rc4(), key, iv);
|
|
|
|
}
|
|
|
|
|
2021-07-03 21:57:53 +02:00
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::EncryptUpdate(void* handler, const unsigned char* dataIn, unsigned int dataInLength,
|
|
|
|
unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
EVP_EncryptUpdate((EVP_CIPHER_CTX*)handler, dataOut, (int*)dataOutLength, dataIn, dataInLength);
|
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::EncryptFinalize(void* handler,
|
|
|
|
unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
int len;
|
|
|
|
EVP_EncryptFinal_ex((EVP_CIPHER_CTX*)handler, dataOut, &len);
|
|
|
|
*dataOutLength += len;
|
|
|
|
EVP_CIPHER_CTX_free((EVP_CIPHER_CTX*)handler);
|
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::Decrypt(CRYPTO_ALGO algo, CHAINING_MODE chaining,
|
|
|
|
const unsigned char* key, unsigned int keyLength,
|
|
|
|
const unsigned char* iv, unsigned int ivLength,
|
|
|
|
const unsigned char* dataIn, unsigned int dataInLength,
|
|
|
|
unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-12-18 17:37:37 +01:00
|
|
|
void* handler = DecryptInit(algo, chaining, key, keyLength, iv, ivLength);
|
|
|
|
DecryptUpdate(handler, dataIn, dataInLength, dataOut, dataOutLength);
|
|
|
|
DecryptFinalize(handler, dataOut+*dataOutLength, dataOutLength);
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::DecryptUpdate(void* handler, const unsigned char* dataIn, unsigned int dataInLength,
|
|
|
|
unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
EVP_DecryptUpdate((EVP_CIPHER_CTX*)handler, dataOut, (int*)dataOutLength, dataIn, dataInLength);
|
|
|
|
}
|
|
|
|
|
2021-12-18 17:37:37 +01:00
|
|
|
void DRMProcessorClientImpl::DecryptFinalize(void* handler, unsigned char* dataOut, unsigned int* dataOutLength)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
int len;
|
|
|
|
EVP_DecryptFinal_ex((EVP_CIPHER_CTX*)handler, dataOut, &len);
|
|
|
|
*dataOutLength += len;
|
|
|
|
EVP_CIPHER_CTX_free((EVP_CIPHER_CTX*)handler);
|
|
|
|
}
|
|
|
|
|
|
|
|
void* DRMProcessorClientImpl::zipOpen(const std::string& path)
|
|
|
|
{
|
|
|
|
zip_t* handler = zip_open(path.c_str(), 0, 0);
|
|
|
|
|
|
|
|
if (!handler)
|
|
|
|
EXCEPTION(gourou::CLIENT_BAD_ZIP_FILE, "Invalid zip file " << path);
|
|
|
|
|
|
|
|
return handler;
|
|
|
|
}
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
void DRMProcessorClientImpl::zipReadFile(void* handler, const std::string& path, gourou::ByteArray& result, bool decompress)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
std::string res;
|
|
|
|
zip_stat_t sb;
|
|
|
|
|
|
|
|
if (zip_stat((zip_t *)handler, path.c_str(), 0, &sb) < 0)
|
2021-11-26 15:01:26 +01:00
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Zip error, no file " << path << ", " << zip_strerror((zip_t *)handler));
|
2021-07-03 21:57:53 +02:00
|
|
|
|
|
|
|
if (!(sb.valid & (ZIP_STAT_INDEX|ZIP_STAT_SIZE)))
|
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Required fields missing");
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
result.resize(sb.size);
|
2021-07-03 21:57:53 +02:00
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
zip_file_t *f = zip_fopen_index((zip_t *)handler, sb.index, (decompress)?0:ZIP_FL_COMPRESSED);
|
|
|
|
zip_fread(f, result.data(), sb.size);
|
|
|
|
zip_fclose(f);
|
2021-07-03 21:57:53 +02:00
|
|
|
}
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
void DRMProcessorClientImpl::zipWriteFile(void* handler, const std::string& path, gourou::ByteArray& content)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
2021-11-26 15:01:26 +01:00
|
|
|
zip_int64_t ret;
|
|
|
|
|
|
|
|
zip_source_t* s = zip_source_buffer((zip_t*)handler, content.takeShadowData(), content.length(), 1);
|
|
|
|
|
|
|
|
zip_int64_t idx = zip_name_locate((zip_t*)handler, path.c_str(), 0);
|
|
|
|
|
|
|
|
// File doesn't exists
|
|
|
|
if (idx == -1)
|
|
|
|
ret = zip_file_add((zip_t*)handler, path.c_str(), s, 0);
|
|
|
|
else
|
|
|
|
ret = zip_file_replace((zip_t*)handler, idx, s, ZIP_FL_OVERWRITE);
|
|
|
|
|
|
|
|
if (ret < 0)
|
2021-07-03 21:57:53 +02:00
|
|
|
{
|
|
|
|
zip_source_free(s);
|
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Zip error " << zip_strerror((zip_t *)handler));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::zipDeleteFile(void* handler, const std::string& path)
|
|
|
|
{
|
|
|
|
zip_int64_t idx = zip_name_locate((zip_t*)handler, path.c_str(), 0);
|
|
|
|
|
|
|
|
if (idx < 0)
|
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "No such file " << path.c_str());
|
|
|
|
|
|
|
|
if (zip_delete((zip_t*)handler, idx))
|
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Zip error " << zip_strerror((zip_t *)handler));
|
|
|
|
}
|
|
|
|
|
|
|
|
void DRMProcessorClientImpl::zipClose(void* handler)
|
|
|
|
{
|
|
|
|
zip_close((zip_t*)handler);
|
|
|
|
}
|
2021-08-21 20:57:31 +02:00
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
void DRMProcessorClientImpl::inflate(gourou::ByteArray& data, gourou::ByteArray& result,
|
2021-08-21 20:57:31 +02:00
|
|
|
int wbits)
|
|
|
|
{
|
|
|
|
unsigned int dataSize = data.size()*2;
|
|
|
|
unsigned char* buffer = new unsigned char[dataSize];
|
|
|
|
|
|
|
|
z_stream infstream;
|
|
|
|
|
|
|
|
infstream.zalloc = Z_NULL;
|
|
|
|
infstream.zfree = Z_NULL;
|
|
|
|
infstream.opaque = Z_NULL;
|
|
|
|
|
|
|
|
infstream.avail_in = (uInt)data.size();
|
2021-11-26 15:01:26 +01:00
|
|
|
infstream.next_in = (Bytef *)data.data(); // input char array
|
2021-08-21 20:57:31 +02:00
|
|
|
infstream.avail_out = (uInt)dataSize; // size of output
|
|
|
|
infstream.next_out = (Bytef *)buffer; // output char array
|
|
|
|
|
|
|
|
int ret = inflateInit2(&infstream, wbits);
|
|
|
|
|
2021-11-29 08:36:45 +01:00
|
|
|
if (ret != Z_OK)
|
2021-12-18 17:39:01 +01:00
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Inflate error, code " << zError(ret) << ", msg " << infstream.msg);
|
2021-11-29 08:36:45 +01:00
|
|
|
|
2021-11-29 15:38:56 +01:00
|
|
|
ret = ::inflate(&infstream, Z_FINISH);
|
2021-12-18 17:39:01 +01:00
|
|
|
while (ret == Z_OK || ret == Z_STREAM_END || ret == Z_BUF_ERROR)
|
2021-08-21 20:57:31 +02:00
|
|
|
{
|
|
|
|
result.append(buffer, dataSize-infstream.avail_out);
|
2021-11-29 08:36:45 +01:00
|
|
|
if ((ret == Z_OK && infstream.avail_out != 0) || ret == Z_STREAM_END)
|
|
|
|
break;
|
2021-08-21 20:57:31 +02:00
|
|
|
infstream.avail_out = (uInt)dataSize; // size of output
|
|
|
|
infstream.next_out = (Bytef *)buffer; // output char array
|
2021-11-29 15:38:56 +01:00
|
|
|
ret = ::inflate(&infstream, Z_FINISH);
|
2021-08-21 20:57:31 +02:00
|
|
|
}
|
|
|
|
|
2021-12-18 17:39:01 +01:00
|
|
|
|
2021-11-29 15:38:56 +01:00
|
|
|
if (ret == Z_STREAM_END)
|
2021-12-18 17:39:01 +01:00
|
|
|
ret = inflateEnd(&infstream);
|
2021-08-21 20:57:31 +02:00
|
|
|
|
|
|
|
delete[] buffer;
|
|
|
|
|
2021-11-29 08:36:45 +01:00
|
|
|
if (ret != Z_OK && ret != Z_STREAM_END)
|
2021-12-18 17:39:01 +01:00
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Inflate error, code " << zError(ret) << ", msg " << infstream.msg);
|
2021-08-21 20:57:31 +02:00
|
|
|
}
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
void DRMProcessorClientImpl::deflate(gourou::ByteArray& data, gourou::ByteArray& result,
|
2021-11-29 15:38:56 +01:00
|
|
|
int wbits, int compressionLevel)
|
2021-08-21 20:57:31 +02:00
|
|
|
{
|
|
|
|
unsigned int dataSize = data.size();
|
|
|
|
unsigned char* buffer = new unsigned char[dataSize];
|
|
|
|
|
|
|
|
z_stream defstream;
|
|
|
|
|
|
|
|
defstream.zalloc = Z_NULL;
|
|
|
|
defstream.zfree = Z_NULL;
|
|
|
|
defstream.opaque = Z_NULL;
|
|
|
|
|
2021-11-26 15:01:26 +01:00
|
|
|
defstream.avail_in = (uInt)dataSize;
|
|
|
|
defstream.next_in = (Bytef *)data.data(); // input char array
|
2021-08-21 20:57:31 +02:00
|
|
|
defstream.avail_out = (uInt)dataSize; // size of output
|
|
|
|
defstream.next_out = (Bytef *)buffer; // output char array
|
|
|
|
|
|
|
|
int ret = deflateInit2(&defstream, Z_DEFAULT_COMPRESSION, Z_DEFLATED, wbits,
|
|
|
|
compressionLevel, Z_DEFAULT_STRATEGY);
|
|
|
|
|
2021-11-29 08:36:45 +01:00
|
|
|
if (ret != Z_OK)
|
2021-12-18 17:39:01 +01:00
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Deflate error, code " << zError(ret) << ", msg " << defstream.msg);
|
|
|
|
|
2021-11-29 15:38:56 +01:00
|
|
|
ret = ::deflate(&defstream, Z_FINISH);
|
2021-08-21 20:57:31 +02:00
|
|
|
while (ret == Z_OK || ret == Z_STREAM_END)
|
|
|
|
{
|
|
|
|
result.append(buffer, dataSize-defstream.avail_out);
|
2021-11-29 08:36:45 +01:00
|
|
|
if ((ret == Z_OK && defstream.avail_out != 0) || ret == Z_STREAM_END)
|
|
|
|
break;
|
2021-08-21 20:57:31 +02:00
|
|
|
defstream.avail_out = (uInt)dataSize; // size of output
|
|
|
|
defstream.next_out = (Bytef *)buffer; // output char array
|
2021-11-29 15:38:56 +01:00
|
|
|
ret = ::deflate(&defstream, Z_FINISH);
|
2021-08-21 20:57:31 +02:00
|
|
|
}
|
2021-11-29 15:38:56 +01:00
|
|
|
|
|
|
|
if (ret == Z_STREAM_END)
|
|
|
|
ret = deflateEnd(&defstream);
|
2021-08-21 20:57:31 +02:00
|
|
|
|
|
|
|
delete[] buffer;
|
|
|
|
|
2021-11-29 08:36:45 +01:00
|
|
|
if (ret != Z_OK && ret != Z_STREAM_END)
|
2021-12-18 17:39:01 +01:00
|
|
|
EXCEPTION(gourou::CLIENT_ZIP_ERROR, "Deflate error, code " << zError(ret) << ", msg " << defstream.msg);
|
2021-08-21 20:57:31 +02:00
|
|
|
}
|