use aes_gcm::{Key};
use hkdf::Hkdf;
use rand::{RngCore, rngs::OsRng};
use aes_gcm::{
aead::{Aead},
Aes128Gcm, Aes256Gcm, KeyInit, Nonce,
};
use sha2::Sha256;
use super::cas_symmetric_encryption::{CASAES128Encryption, CASAES256Encryption};
pub struct CASAES128;
pub struct CASAES256;
impl CASAES256Encryption for CASAES256 {
fn key_from_vec(key_slice: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes256Gcm>::from_slice(key_slice.as_slice());
key.to_vec()
}
fn generate_key() -> Vec<u8> {
let mut os_rng = OsRng;
return Aes256Gcm::generate_key(&mut os_rng).to_vec();
}
fn encrypt_plaintext(aes_key: Vec<u8>, nonce: Vec<u8>, plaintext: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes256Gcm>::from_slice(aes_key.as_slice());
let cipher = Aes256Gcm::new(key);
let nonce = Nonce::from_slice(nonce.as_slice());
let ciphertext = cipher.encrypt(nonce, plaintext.as_ref()).unwrap();
ciphertext
}
fn decrypt_ciphertext(aes_key: Vec<u8>, nonce: Vec<u8>, ciphertext: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes256Gcm>::from_slice(aes_key.as_slice());
let cipher = Aes256Gcm::new(key);
let nonce = Nonce::from_slice(nonce.as_slice());
let plaintext = cipher.decrypt(nonce, ciphertext.as_ref()).unwrap();
plaintext
}
fn key_from_x25519_shared_secret(shared_secret: Vec<u8>) -> Vec<u8> {
let hk = Hkdf::<Sha256>::new(None, &shared_secret);
let mut aes_key: Box<[u8; 32]> = Box::new([0u8; 32]);
hk.expand(b"aes key", &mut *aes_key).unwrap();
aes_key.to_vec()
}
fn generate_nonce() -> Vec<u8> {
let mut os_rng = OsRng;
let mut nonce = [0u8; 12];
os_rng.fill_bytes(&mut nonce);
nonce.to_vec()
}
}
impl CASAES128Encryption for CASAES128 {
fn key_from_vec(key_slice: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes128Gcm>::from_slice(key_slice.as_slice());
key.to_vec()
}
fn generate_key() -> Vec<u8> {
let mut os_rng = OsRng;
return Aes128Gcm::generate_key(&mut os_rng).to_vec();
}
fn encrypt_plaintext(aes_key: Vec<u8>, nonce: Vec<u8>, plaintext: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes128Gcm>::from_slice(aes_key.as_slice());
let cipher = Aes128Gcm::new(key);
let nonce = Nonce::from_slice(nonce.as_slice());
let ciphertext = cipher.encrypt(nonce, plaintext.as_ref()).unwrap();
ciphertext
}
fn decrypt_ciphertext(aes_key: Vec<u8>, nonce: Vec<u8>, ciphertext: Vec<u8>) -> Vec<u8> {
let key = Key::<Aes128Gcm>::from_slice(aes_key.as_slice());
let cipher = Aes128Gcm::new(key);
let nonce = Nonce::from_slice(nonce.as_slice());
let plaintext = cipher.decrypt(nonce, ciphertext.as_ref()).unwrap();
plaintext
}
fn key_from_x25519_shared_secret(shared_secret: Vec<u8>) -> Vec<u8> {
let hk = Hkdf::<Sha256>::new(None, &shared_secret);
let mut aes_key = Box::new([0u8; 16]);
hk.expand(b"aes key", &mut *aes_key).unwrap();
aes_key.to_vec()
}
fn generate_nonce() -> Vec<u8> {
let mut os_rng = OsRng;
let mut nonce = [0u8; 12];
os_rng.fill_bytes(&mut nonce);
nonce.to_vec()
}
}