Files
taskwarrior-2.x/taskchampion/src/server/remote/crypto.rs
Dustin J. Mitchell ddfb327292 WIP
2021-10-15 02:56:46 +00:00

195 lines
5.5 KiB
Rust

use crate::server::HistorySegment;
use byteorder::{NetworkEndian, ReadBytesExt, WriteBytesExt};
use std::io::{Cursor, Read};
use tindercrypt::cryptors::RingCryptor;
use uuid::Uuid;
pub(super) struct Secret(pub(super) Vec<u8>);
impl From<Vec<u8>> for Secret {
fn from(bytes: Vec<u8>) -> Self {
Self(bytes)
}
}
impl AsRef<[u8]> for Secret {
fn as_ref(&self) -> &[u8] {
&self.0
}
}
const PBKDF2_SALT_SIZE: usize = 32;
const NONCE_SIZE: usize = 12;
const ENVELOPE_VERSION: u32 = 1;
/// Envelope for the data stored on the server, containing the information
/// required to decrypt.
#[derive(Debug, PartialEq, Eq)]
struct Envelope {
kdf_iterations: u32,
kdf_salt: [u8; PBKDF2_SALT_SIZE],
nonce: [u8; NONCE_SIZE],
}
impl Envelope {
const SIZE: usize = 4 + 4 + PBKDF2_SALT_SIZE + NONCE_SIZE;
fn from_bytes(buf: &[u8]) -> anyhow::Result<Self> {
if buf.len() < 4 {
anyhow::bail!("envelope is too small");
}
let mut rdr = Cursor::new(buf);
let version = rdr.read_u32::<NetworkEndian>().unwrap();
if version != 1 {
anyhow::bail!("unrecognized envelope version {}", version);
}
if buf.len() != Envelope::SIZE {
anyhow::bail!("envelope size {} is not {}", buf.len(), Envelope::SIZE);
}
let kdf_iterations = rdr.read_u32::<NetworkEndian>().unwrap();
let mut env = Envelope {
kdf_iterations,
kdf_salt: [0; PBKDF2_SALT_SIZE],
nonce: [0; NONCE_SIZE],
};
env.kdf_salt.clone_from_slice(&buf[8..8 + PBKDF2_SALT_SIZE]);
env.nonce
.clone_from_slice(&buf[8 + PBKDF2_SALT_SIZE..8 + PBKDF2_SALT_SIZE + NONCE_SIZE]);
Ok(env) // TODO: test
}
fn to_bytes(&self) -> Vec<u8> {
let mut buf = Vec::with_capacity(Envelope::SIZE);
buf.write_u32::<NetworkEndian>(ENVELOPE_VERSION).unwrap();
buf.write_u32::<NetworkEndian>(self.kdf_iterations).unwrap();
buf.extend_from_slice(&self.kdf_salt);
buf.extend_from_slice(&self.nonce);
buf // TODO: test
}
}
/// A cleartext payload with an attached version_id. The version_id is used to
/// validate the context of the payload.
pub(super) struct Cleartext {
pub(super) version_id: Uuid,
pub(super) payload: HistorySegment,
}
impl Cleartext {
/// Seal the payload into its ciphertext
pub(super) fn seal(self, secret: &Secret) -> anyhow::Result<Ciphertext> {
let cryptor = RingCryptor::new().with_aad(self.version_id.as_bytes());
let ciphertext = cryptor.seal_with_passphrase(secret.as_ref(), &self.payload)?;
Ok(Ciphertext(ciphertext))
}
}
/// An ecrypted payload
pub(super) struct Ciphertext(pub(super) Vec<u8>);
impl Ciphertext {
pub(super) fn from_resp(
resp: ureq::Response,
content_type: &str,
) -> Result<Ciphertext, anyhow::Error> {
if resp.header("Content-Type") == Some(content_type) {
let mut reader = resp.into_reader();
let mut bytes = vec![];
reader.read_to_end(&mut bytes)?;
Ok(Self(bytes))
} else {
Err(anyhow::anyhow!(
"Response did not have expected content-type"
))
}
}
pub(super) fn open(self, secret: &Secret, version_id: Uuid) -> anyhow::Result<Cleartext> {
let cryptor = RingCryptor::new().with_aad(version_id.as_bytes());
let plaintext = cryptor.open(secret.as_ref(), &self.0)?;
Ok(Cleartext {
version_id,
payload: plaintext,
})
}
}
impl AsRef<[u8]> for Ciphertext {
fn as_ref(&self) -> &[u8] {
self.0.as_ref()
}
}
#[cfg(test)]
mod test {
use super::*;
use pretty_assertions::assert_eq;
#[test]
fn envelope_round_trip() {
let env = Envelope {
kdf_iterations: 100,
kdf_salt: [1; 32],
nonce: [2; 12],
};
let bytes = env.to_bytes();
let env2 = Envelope::from_bytes(&bytes).unwrap();
assert_eq!(env, env2);
}
#[test]
fn round_trip() {
let version_id = Uuid::new_v4();
let payload = b"HISTORY REPEATS ITSELF".to_vec();
let secret = Secret(b"SEKRIT".to_vec());
let cleartext = Cleartext {
version_id,
payload: payload.clone(),
};
let ciphertext = cleartext.seal(&secret).unwrap();
let cleartext = ciphertext.open(&secret, version_id).unwrap();
assert_eq!(cleartext.payload, payload);
assert_eq!(cleartext.version_id, version_id);
}
#[test]
fn round_trip_bad_key() {
let version_id = Uuid::new_v4();
let payload = b"HISTORY REPEATS ITSELF".to_vec();
let secret = Secret(b"SEKRIT".to_vec());
let cleartext = Cleartext {
version_id,
payload: payload.clone(),
};
let ciphertext = cleartext.seal(&secret).unwrap();
let secret = Secret(b"BADSEKRIT".to_vec());
assert!(ciphertext.open(&secret, version_id).is_err());
}
#[test]
fn round_trip_bad_version() {
let version_id = Uuid::new_v4();
let payload = b"HISTORY REPEATS ITSELF".to_vec();
let secret = Secret(b"SEKRIT".to_vec());
let cleartext = Cleartext {
version_id,
payload: payload.clone(),
};
let ciphertext = cleartext.seal(&secret).unwrap();
let bad_version_id = Uuid::new_v4();
assert!(ciphertext.open(&secret, bad_version_id).is_err());
}
}