aboutsummaryrefslogtreecommitdiff
path: root/lockchain-crypto/src/engine.rs
blob: e80c84618695a1c9fed8db66425a8bfe2e867900 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
//! Implements an Aes256Siv encryption engine
//!
//! Can be initialised from scratch or with a pw/salt
//! combintaion which derives a key via the `keybob` crate.

use lcc::traits::{AutoEncoder, Encryptable, EncryptionHandler};
use lcc::{EncryptedBody, PackedData};

use miscreant::aead::{Aes256Siv, Algorithm};

use super::databody::DataBody;

use lcc::crypto::random;
use lcc::crypto::{Key, KeyType};

impl Encryptable for DataBody {}

pub struct AesEngine {
    ctx: Aes256Siv,
    _key: Option<Key>,
    iv: Vec<u8>,
}

impl AesEngine {
    /// Initialise an AesEngine and take ownership of a raw key
    pub fn new(key: Key) -> Self {
        assert!(key.len() == 64);

        Self {
            ctx: Aes256Siv::new(&key.as_slice()),
            _key: Some(key),
            iv: random::bytes(64),
        }
    }

    /// Generate new key and encryption engine
    #[deprecated]
    pub fn generate() -> Self {
        // let key = Key::new(KeyType::Aes256);
        // let len = key.len();
        // Self {
        //     ctx: Aes256Siv::new(&key.as_slice()),
        //     _key: key,
        //     new_key: None,
        //     iv: random::bytes(len),
        // }
        unimplemented!()
    }

    /// Generate an Aes context from password
    #[deprecated]
    pub fn from_pw(pw: &str, salt: &str) -> Self {
        // let key = Key::from_pw(KeyType::Aes256, pw, salt);
        // let len = key.len();
        // Self {
        //     ctx: Aes256Siv::new(&key.as_slice()),
        //     _key: key,
        //     new_key: None,
        //     iv: random::bytes(len),
        // }
        unimplemented!()
    }

    /// Load a packed data object which contains an Aes context
    #[deprecated]
    pub fn load(packed: PackedData, pw: &str, salt: &str) -> Option<Self> {
        // let mut temp = Self::from_pw(pw, salt);
        // let k: Key = Key::decode(&String::from_utf8(temp.decrypt_primitive(&packed)?).ok()?).ok()?;

        // Some(Self {
        //     ctx: Aes256Siv::new(&k.as_slice()),
        //     _key: k,
        //     new_key: None,
        //     iv: packed.iv,
        // })
        unimplemented!()
    }

    /// Serialise the current context to save it somewhere
    #[deprecated]
    pub fn save(&mut self) -> PackedData {
        // let k = self._key.as_slice().into();
        // self.encrypt_primitive(&k)
        unimplemented!()
    }

    fn encrypt_primitive(&mut self, data: &Vec<u8>) -> PackedData {
        let nonce = random::bytes(64);
        let iv = &self.iv.as_slice();
        let encrypted = self.ctx.seal(nonce.as_slice(), iv, data.as_slice());

        PackedData {
            iv: self.iv.clone(),
            data: encrypted,
            nonce: nonce,
        }
    }

    fn decrypt_primitive(&mut self, packed: &PackedData) -> Option<Vec<u8>> {
        let iv = &self.iv.as_slice();
        Some(
            self.ctx
                .open(packed.nonce.as_slice(), iv, packed.data.as_slice())
                .ok()?,
        )
    }
}

impl EncryptionHandler<DataBody> for AesEngine {
    fn encrypt(&mut self, item: DataBody) -> EncryptedBody {
        let ser = item.encode().unwrap();
        let data = self
            .encrypt_primitive(&ser.as_bytes().to_vec())
            .encode()
            .unwrap();
        EncryptedBody { data }
    }

    fn decrypt(&mut self, item: EncryptedBody) -> Option<DataBody> {
        let packed = PackedData::decode(&item.data).ok()?;
        Some(DataBody::decode(&String::from_utf8(self.decrypt_primitive(&packed)?).ok()?).ok()?)
    }
}