devolutions-crypto 0.5.1

An abstraction layer for the cryptography used by Devolutions
Documentation
/// Ciphertext V1: AES256-CBC with HMAC-SHA256
use super::Error;
use super::Header;
use super::Result;

use super::Ciphertext;

use std::convert::TryFrom;

use aes::Aes256;
use block_modes::{block_padding::Pkcs7, BlockMode, Cbc};
use hmac::{Hmac, Mac};
use pbkdf2::pbkdf2;
use rand::{rngs::OsRng, RngCore};
use sha2::Sha256;
use zeroize::Zeroize;

#[derive(Zeroize, Clone, Debug)]
#[cfg_attr(feature = "fuzz", derive(arbitrary::Arbitrary))]
#[zeroize(drop)]
pub struct CiphertextV1 {
    iv: [u8; 16],
    ciphertext: Vec<u8>,
    hmac: [u8; 32],
}

impl From<CiphertextV1> for Vec<u8> {
    fn from(mut cipher: CiphertextV1) -> Vec<u8> {
        let mut data = Vec::new();
        data.extend_from_slice(&cipher.iv);
        data.append(&mut cipher.ciphertext);
        data.extend_from_slice(&cipher.hmac);
        data
    }
}

impl TryFrom<&[u8]> for CiphertextV1 {
    type Error = Error;
    fn try_from(data: &[u8]) -> Result<CiphertextV1> {
        if data.len() <= 48 {
            return Err(Error::InvalidLength);
        };

        let mut iv = [0u8; 16];
        let mut ciphertext = vec![0u8; data.len() - 16 - 32];
        let mut hmac = [0u8; 32];

        iv.copy_from_slice(&data[0..16]);
        ciphertext.copy_from_slice(&data[16..data.len() - 32]);
        hmac.copy_from_slice(&data[data.len() - 32..]);

        Ok(CiphertextV1 {
            iv,
            ciphertext,
            hmac,
        })
    }
}

impl CiphertextV1 {
    fn split_key(secret: &[u8], encryption_key: &mut [u8], signature_key: &mut [u8]) {
        let salt = b"\x00";
        pbkdf2::<Hmac<Sha256>>(secret, &salt[0..1], 1, encryption_key);

        let salt = b"\x01";
        pbkdf2::<Hmac<Sha256>>(secret, &salt[0..1], 1, signature_key);
    }

    pub fn encrypt(data: &[u8], key: &[u8], header: &Header<Ciphertext>) -> Result<CiphertextV1> {
        // Split keys
        let mut encryption_key = vec![0u8; 32];
        let mut signature_key = vec![0u8; 32];
        CiphertextV1::split_key(key, &mut encryption_key, &mut signature_key);

        // Generate IV
        let mut iv = [0u8; 16];
        OsRng.fill_bytes(&mut iv);

        // Create cipher object
        let cipher = Cbc::<Aes256, Pkcs7>::new_var(&encryption_key, &iv)?;
        let ciphertext = cipher.encrypt_vec(data);

        // Zero out the key
        encryption_key.zeroize();

        // Append MAC data
        let mut mac_data: Vec<u8> = (*header).clone().into();
        mac_data.extend_from_slice(&iv);
        mac_data.append(&mut ciphertext.clone());

        // HMAC
        let mut mac = Hmac::<Sha256>::new_varkey(&signature_key)?;
        mac.input(&mac_data);

        let hmac: [u8; 32] = mac.result().code().into();

        // Zero out the key
        signature_key.zeroize();

        Ok(CiphertextV1 {
            iv,
            ciphertext,
            hmac,
        })
    }

    pub fn decrypt(&self, key: &[u8], header: &Header<Ciphertext>) -> Result<Vec<u8>> {
        // Split keys
        let mut encryption_key = vec![0u8; 32];
        let mut signature_key = vec![0u8; 32];
        CiphertextV1::split_key(key, &mut encryption_key, &mut signature_key);

        // Verify HMAC
        let mut mac_data: Vec<u8> = (*header).clone().into();
        mac_data.extend_from_slice(&self.iv);
        mac_data.append(&mut self.ciphertext.clone());

        let mut mac = Hmac::<Sha256>::new_varkey(&signature_key)?;
        mac.input(&mac_data);
        mac.verify(&self.hmac)?;

        // Zeroize the key
        signature_key.zeroize();
        mac_data.zeroize();

        let cipher = Cbc::<Aes256, Pkcs7>::new_var(&encryption_key, &self.iv)?;
        let result = cipher.decrypt_vec(&self.ciphertext)?;

        // Zeroize the key
        encryption_key.zeroize();

        Ok(result)
    }
}