crypto module with EDH & AES-GCM
This commit is contained in:
parent
5ecb1676ea
commit
7e056f2711
70
src/crypto.rs
Normal file
70
src/crypto.rs
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
use super::comms;
|
||||||
|
use aes_gcm::{
|
||||||
|
aead::{consts::U12, AeadMut},
|
||||||
|
aes::Aes256,
|
||||||
|
Aes256Gcm, AesGcm, KeyInit, Nonce,
|
||||||
|
};
|
||||||
|
use rand::{rngs::OsRng, RngCore};
|
||||||
|
use std::error::Error;
|
||||||
|
use tokio::{
|
||||||
|
io::{BufReader, BufWriter},
|
||||||
|
net::tcp::{ReadHalf, WriteHalf},
|
||||||
|
};
|
||||||
|
use x25519_dalek::{EphemeralSecret, PublicKey, SharedSecret};
|
||||||
|
|
||||||
|
const AES_NONCE_SIZE: usize = 12;
|
||||||
|
|
||||||
|
async fn ephemeral_dh(
|
||||||
|
reader: &mut BufReader<ReadHalf<'_>>,
|
||||||
|
writer: &mut BufWriter<WriteHalf<'_>>,
|
||||||
|
buf: &mut Vec<u8>,
|
||||||
|
go_first: bool,
|
||||||
|
) -> Result<SharedSecret, Box<dyn Error>> {
|
||||||
|
let own_sec = EphemeralSecret::new(OsRng);
|
||||||
|
let own_pbk = PublicKey::from(&own_sec);
|
||||||
|
|
||||||
|
if go_first {
|
||||||
|
comms::send_bytes(writer, own_pbk.as_bytes()).await?;
|
||||||
|
comms::recv_bytes(reader, buf).await?;
|
||||||
|
} else {
|
||||||
|
comms::recv_bytes(reader, buf).await?;
|
||||||
|
comms::send_bytes(writer, own_pbk.as_bytes()).await?;
|
||||||
|
}
|
||||||
|
|
||||||
|
let sliced_buf: [u8; 32] = buf[..32].try_into()?;
|
||||||
|
let recv_pbk = PublicKey::from(sliced_buf);
|
||||||
|
buf.clear();
|
||||||
|
Ok(own_sec.diffie_hellman(&recv_pbk))
|
||||||
|
}
|
||||||
|
|
||||||
|
fn aes_cipher(secret: SharedSecret) -> Result<AesGcm<Aes256, U12>, Box<dyn Error>> {
|
||||||
|
Ok(Aes256Gcm::new(secret.as_bytes().into()))
|
||||||
|
}
|
||||||
|
|
||||||
|
fn generate_nonce(rng: &mut impl RngCore) -> Nonce<U12> {
|
||||||
|
let mut nonce = Nonce::default();
|
||||||
|
rng.fill_bytes(&mut nonce);
|
||||||
|
nonce
|
||||||
|
}
|
||||||
|
|
||||||
|
fn aes_encrypt(
|
||||||
|
data: Vec<u8>,
|
||||||
|
cipher: &mut AesGcm<Aes256, U12>,
|
||||||
|
rng: &mut impl RngCore,
|
||||||
|
) -> Result<Vec<u8>, Box<dyn Error>> {
|
||||||
|
let nonce = generate_nonce(rng);
|
||||||
|
let encrypted = cipher.encrypt(&nonce, data.as_ref()).unwrap(); // TODO: handle error types
|
||||||
|
Ok(encrypted)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn aes_decrypt(
|
||||||
|
data: Vec<u8>,
|
||||||
|
cipher: &mut AesGcm<Aes256, U12>,
|
||||||
|
rng: &mut impl RngCore,
|
||||||
|
) -> Result<Vec<u8>, Box<dyn Error>> {
|
||||||
|
let (nonce_bytes, data) = data.split_at(AES_NONCE_SIZE);
|
||||||
|
let decrypted = cipher
|
||||||
|
.decrypt(Nonce::from_slice(nonce_bytes), data.as_ref())
|
||||||
|
.unwrap(); // TODO: handle error types
|
||||||
|
Ok(decrypted)
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user