195 lines
5.5 KiB
Rust
195 lines
5.5 KiB
Rust
use crate::server::HistorySegment;
|
|
use byteorder::{NetworkEndian, ReadBytesExt, WriteBytesExt};
|
|
use std::io::{Cursor, Read};
|
|
use tindercrypt::cryptors::RingCryptor;
|
|
use uuid::Uuid;
|
|
|
|
pub(super) struct Secret(pub(super) Vec<u8>);
|
|
|
|
impl From<Vec<u8>> for Secret {
|
|
fn from(bytes: Vec<u8>) -> Self {
|
|
Self(bytes)
|
|
}
|
|
}
|
|
|
|
impl AsRef<[u8]> for Secret {
|
|
fn as_ref(&self) -> &[u8] {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
const PBKDF2_SALT_SIZE: usize = 32;
|
|
const NONCE_SIZE: usize = 12;
|
|
const ENVELOPE_VERSION: u32 = 1;
|
|
|
|
/// Envelope for the data stored on the server, containing the information
|
|
/// required to decrypt.
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
struct Envelope {
|
|
kdf_iterations: u32,
|
|
kdf_salt: [u8; PBKDF2_SALT_SIZE],
|
|
nonce: [u8; NONCE_SIZE],
|
|
}
|
|
|
|
impl Envelope {
|
|
const SIZE: usize = 4 + 4 + PBKDF2_SALT_SIZE + NONCE_SIZE;
|
|
|
|
fn from_bytes(buf: &[u8]) -> anyhow::Result<Self> {
|
|
if buf.len() < 4 {
|
|
anyhow::bail!("envelope is too small");
|
|
}
|
|
|
|
let mut rdr = Cursor::new(buf);
|
|
let version = rdr.read_u32::<NetworkEndian>().unwrap();
|
|
if version != 1 {
|
|
anyhow::bail!("unrecognized envelope version {}", version);
|
|
}
|
|
if buf.len() != Envelope::SIZE {
|
|
anyhow::bail!("envelope size {} is not {}", buf.len(), Envelope::SIZE);
|
|
}
|
|
|
|
let kdf_iterations = rdr.read_u32::<NetworkEndian>().unwrap();
|
|
|
|
let mut env = Envelope {
|
|
kdf_iterations,
|
|
kdf_salt: [0; PBKDF2_SALT_SIZE],
|
|
nonce: [0; NONCE_SIZE],
|
|
};
|
|
env.kdf_salt.clone_from_slice(&buf[8..8 + PBKDF2_SALT_SIZE]);
|
|
env.nonce
|
|
.clone_from_slice(&buf[8 + PBKDF2_SALT_SIZE..8 + PBKDF2_SALT_SIZE + NONCE_SIZE]);
|
|
Ok(env) // TODO: test
|
|
}
|
|
|
|
fn to_bytes(&self) -> Vec<u8> {
|
|
let mut buf = Vec::with_capacity(Envelope::SIZE);
|
|
|
|
buf.write_u32::<NetworkEndian>(ENVELOPE_VERSION).unwrap();
|
|
buf.write_u32::<NetworkEndian>(self.kdf_iterations).unwrap();
|
|
buf.extend_from_slice(&self.kdf_salt);
|
|
buf.extend_from_slice(&self.nonce);
|
|
buf // TODO: test
|
|
}
|
|
}
|
|
|
|
/// A cleartext payload with an attached version_id. The version_id is used to
|
|
/// validate the context of the payload.
|
|
pub(super) struct Cleartext {
|
|
pub(super) version_id: Uuid,
|
|
pub(super) payload: HistorySegment,
|
|
}
|
|
|
|
impl Cleartext {
|
|
/// Seal the payload into its ciphertext
|
|
pub(super) fn seal(self, secret: &Secret) -> anyhow::Result<Ciphertext> {
|
|
let cryptor = RingCryptor::new().with_aad(self.version_id.as_bytes());
|
|
let ciphertext = cryptor.seal_with_passphrase(secret.as_ref(), &self.payload)?;
|
|
Ok(Ciphertext(ciphertext))
|
|
}
|
|
}
|
|
|
|
/// An ecrypted payload
|
|
pub(super) struct Ciphertext(pub(super) Vec<u8>);
|
|
|
|
impl Ciphertext {
|
|
pub(super) fn from_resp(
|
|
resp: ureq::Response,
|
|
content_type: &str,
|
|
) -> Result<Ciphertext, anyhow::Error> {
|
|
if resp.header("Content-Type") == Some(content_type) {
|
|
let mut reader = resp.into_reader();
|
|
let mut bytes = vec![];
|
|
reader.read_to_end(&mut bytes)?;
|
|
Ok(Self(bytes))
|
|
} else {
|
|
Err(anyhow::anyhow!(
|
|
"Response did not have expected content-type"
|
|
))
|
|
}
|
|
}
|
|
|
|
pub(super) fn open(self, secret: &Secret, version_id: Uuid) -> anyhow::Result<Cleartext> {
|
|
let cryptor = RingCryptor::new().with_aad(version_id.as_bytes());
|
|
let plaintext = cryptor.open(secret.as_ref(), &self.0)?;
|
|
|
|
Ok(Cleartext {
|
|
version_id,
|
|
payload: plaintext,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl AsRef<[u8]> for Ciphertext {
|
|
fn as_ref(&self) -> &[u8] {
|
|
self.0.as_ref()
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod test {
|
|
use super::*;
|
|
use pretty_assertions::assert_eq;
|
|
|
|
#[test]
|
|
fn envelope_round_trip() {
|
|
let env = Envelope {
|
|
kdf_iterations: 100,
|
|
kdf_salt: [1; 32],
|
|
nonce: [2; 12],
|
|
};
|
|
|
|
let bytes = env.to_bytes();
|
|
let env2 = Envelope::from_bytes(&bytes).unwrap();
|
|
assert_eq!(env, env2);
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip() {
|
|
let version_id = Uuid::new_v4();
|
|
let payload = b"HISTORY REPEATS ITSELF".to_vec();
|
|
let secret = Secret(b"SEKRIT".to_vec());
|
|
|
|
let cleartext = Cleartext {
|
|
version_id,
|
|
payload: payload.clone(),
|
|
};
|
|
let ciphertext = cleartext.seal(&secret).unwrap();
|
|
let cleartext = ciphertext.open(&secret, version_id).unwrap();
|
|
|
|
assert_eq!(cleartext.payload, payload);
|
|
assert_eq!(cleartext.version_id, version_id);
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip_bad_key() {
|
|
let version_id = Uuid::new_v4();
|
|
let payload = b"HISTORY REPEATS ITSELF".to_vec();
|
|
let secret = Secret(b"SEKRIT".to_vec());
|
|
|
|
let cleartext = Cleartext {
|
|
version_id,
|
|
payload: payload.clone(),
|
|
};
|
|
let ciphertext = cleartext.seal(&secret).unwrap();
|
|
|
|
let secret = Secret(b"BADSEKRIT".to_vec());
|
|
assert!(ciphertext.open(&secret, version_id).is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip_bad_version() {
|
|
let version_id = Uuid::new_v4();
|
|
let payload = b"HISTORY REPEATS ITSELF".to_vec();
|
|
let secret = Secret(b"SEKRIT".to_vec());
|
|
|
|
let cleartext = Cleartext {
|
|
version_id,
|
|
payload: payload.clone(),
|
|
};
|
|
let ciphertext = cleartext.seal(&secret).unwrap();
|
|
|
|
let bad_version_id = Uuid::new_v4();
|
|
assert!(ciphertext.open(&secret, bad_version_id).is_err());
|
|
}
|
|
}
|