use alloc::string::{String, ToString};
use bip39::{Language, Mnemonic};
use hmac::Hmac;
use sha2::Sha256;
use zeroize::Zeroizing;
use crate::Error;
const PBKDF2_ITERATIONS: u32 = 600_000;
const PBKDF2_SALT: &[u8] = b"kobe-mnemonic-camouflage-v1";
const MAX_ENTROPY_LEN: usize = 32;
pub fn encrypt(phrase: &str, password: &str) -> Result<Zeroizing<String>, Error> {
transform(Language::English, phrase, password)
}
pub fn encrypt_in(
language: Language,
phrase: &str,
password: &str,
) -> Result<Zeroizing<String>, Error> {
transform(language, phrase, password)
}
pub fn decrypt(camouflaged: &str, password: &str) -> Result<Zeroizing<String>, Error> {
transform(Language::English, camouflaged, password)
}
pub fn decrypt_in(
language: Language,
camouflaged: &str,
password: &str,
) -> Result<Zeroizing<String>, Error> {
transform(language, camouflaged, password)
}
fn transform(language: Language, phrase: &str, password: &str) -> Result<Zeroizing<String>, Error> {
if password.is_empty() {
return Err(Error::EmptyPassword);
}
let mnemonic = Mnemonic::parse_in(language, phrase)?;
let entropy = Zeroizing::new(mnemonic.to_entropy());
let entropy_len = entropy.len();
let key = derive_key(password, entropy_len)?;
let mut new_entropy = Zeroizing::new([0u8; MAX_ENTROPY_LEN]);
for i in 0..entropy_len {
new_entropy[i] = entropy[i] ^ key[i];
}
let new_mnemonic = Mnemonic::from_entropy_in(language, &new_entropy[..entropy_len])?;
Ok(Zeroizing::new(new_mnemonic.to_string()))
}
fn derive_key(password: &str, len: usize) -> Result<Zeroizing<[u8; MAX_ENTROPY_LEN]>, Error> {
let mut key = Zeroizing::new([0u8; MAX_ENTROPY_LEN]);
pbkdf2::pbkdf2::<Hmac<Sha256>>(
password.as_bytes(),
PBKDF2_SALT,
PBKDF2_ITERATIONS,
&mut key[..len],
)
.map_err(|_| Error::KeyDerivation)?;
Ok(key)
}
#[cfg(test)]
#[allow(clippy::unwrap_used)]
mod tests {
use super::*;
const TEST_12: &str = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
const TEST_15: &str = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon address";
const TEST_18: &str = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent";
const TEST_21: &str = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon admit";
const TEST_24: &str = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art";
const PASSWORD: &str = "my-secret-password-2024";
#[test]
fn roundtrip_24_words() {
let camouflaged = encrypt(TEST_24, PASSWORD).unwrap();
assert_ne!(camouflaged.as_str(), TEST_24);
assert!(Mnemonic::parse_in(Language::English, camouflaged.as_str()).is_ok());
let recovered = decrypt(&camouflaged, PASSWORD).unwrap();
assert_eq!(recovered.as_str(), TEST_24);
}
#[test]
fn roundtrip_12_words() {
let camouflaged = encrypt(TEST_12, PASSWORD).unwrap();
assert_ne!(camouflaged.as_str(), TEST_12);
let recovered = decrypt(&camouflaged, PASSWORD).unwrap();
assert_eq!(recovered.as_str(), TEST_12);
}
#[test]
fn roundtrip_15_words() {
let camouflaged = encrypt(TEST_15, PASSWORD).unwrap();
assert_ne!(camouflaged.as_str(), TEST_15);
assert!(Mnemonic::parse_in(Language::English, camouflaged.as_str()).is_ok());
let recovered = decrypt(&camouflaged, PASSWORD).unwrap();
assert_eq!(recovered.as_str(), TEST_15);
}
#[test]
fn roundtrip_18_words() {
let camouflaged = encrypt(TEST_18, PASSWORD).unwrap();
assert_ne!(camouflaged.as_str(), TEST_18);
assert!(Mnemonic::parse_in(Language::English, camouflaged.as_str()).is_ok());
let recovered = decrypt(&camouflaged, PASSWORD).unwrap();
assert_eq!(recovered.as_str(), TEST_18);
}
#[test]
fn roundtrip_21_words() {
let camouflaged = encrypt(TEST_21, PASSWORD).unwrap();
assert_ne!(camouflaged.as_str(), TEST_21);
assert!(Mnemonic::parse_in(Language::English, camouflaged.as_str()).is_ok());
let recovered = decrypt(&camouflaged, PASSWORD).unwrap();
assert_eq!(recovered.as_str(), TEST_21);
}
#[test]
fn different_passwords_produce_different_results() {
let c1 = encrypt(TEST_24, "password-alpha").unwrap();
let c2 = encrypt(TEST_24, "password-beta").unwrap();
assert_ne!(c1.as_str(), c2.as_str());
}
#[test]
fn wrong_password_does_not_recover() {
let camouflaged = encrypt(TEST_24, PASSWORD).unwrap();
let wrong = decrypt(&camouflaged, "wrong-password").unwrap();
assert_ne!(wrong.as_str(), TEST_24);
}
#[test]
fn deterministic_output() {
let c1 = encrypt(TEST_24, PASSWORD).unwrap();
let c2 = encrypt(TEST_24, PASSWORD).unwrap();
assert_eq!(c1.as_str(), c2.as_str());
}
#[test]
fn camouflaged_is_valid_mnemonic() {
let camouflaged = encrypt(TEST_24, PASSWORD).unwrap();
let wallet = crate::Wallet::from_mnemonic(&camouflaged, None);
assert!(
wallet.is_ok(),
"camouflaged mnemonic must produce a valid wallet"
);
}
#[test]
fn empty_password_rejected() {
let result = encrypt(TEST_24, "");
assert!(result.is_err());
}
#[test]
fn preserves_word_count() {
for (phrase, expected_words) in [
(TEST_12, 12),
(TEST_15, 15),
(TEST_18, 18),
(TEST_21, 21),
(TEST_24, 24),
] {
let camouflaged = encrypt(phrase, PASSWORD).unwrap();
let word_count = camouflaged.split_whitespace().count();
assert_eq!(word_count, expected_words);
}
}
}