#[macro_use]
mod futures;
#[cfg(any(test, feature = "testing"))]
pub mod test_utils;
pub use self::futures::FutureExt;
use errors::CoreError;
use maidsafe_utilities::serialisation::{deserialise, serialise};
use rand::Rng;
use rust_sodium::crypto::hash::sha512::{self, DIGESTBYTES, Digest};
use rust_sodium::crypto::secretbox;
#[macro_export]
macro_rules! btree_set {
($($item:expr),*) => {{
let mut _set = ::std::collections::BTreeSet::new();
$(
let _ = _set.insert($item);
)*
_set
}};
($($item:expr),*,) => {
btree_set![$($item),*]
};
}
#[macro_export]
macro_rules! btree_map {
() => ({
::std::collections::BTreeMap::new()
});
($($key:expr => $value:expr),*) => {{
let mut _map = ::std::collections::BTreeMap::new();
$(
let _ = _map.insert($key, $value);
)*
_map
}};
($($key:expr => $value:expr),*,) => {
btree_map![$($key => $value),*]
};
}
#[derive(Serialize, Deserialize)]
struct SymmetricEnc {
nonce: [u8; secretbox::NONCEBYTES],
cipher_text: Vec<u8>,
}
pub fn symmetric_encrypt(
plain_text: &[u8],
secret_key: &secretbox::Key,
nonce: Option<&secretbox::Nonce>,
) -> Result<Vec<u8>, CoreError> {
let nonce = match nonce {
Some(nonce) => *nonce,
None => secretbox::gen_nonce(),
};
let cipher_text = secretbox::seal(plain_text, &nonce, secret_key);
Ok(serialise(&SymmetricEnc {
nonce: nonce.0,
cipher_text,
})?)
}
pub fn symmetric_decrypt(
cipher_text: &[u8],
secret_key: &secretbox::Key,
) -> Result<Vec<u8>, CoreError> {
let SymmetricEnc { nonce, cipher_text } = deserialise::<SymmetricEnc>(cipher_text)?;
secretbox::open(&cipher_text, &secretbox::Nonce(nonce), secret_key)
.map_err(|_| CoreError::SymmetricDecipherFailure)
}
pub fn generate_random_string(length: usize) -> Result<String, CoreError> {
let mut os_rng = ::rand::OsRng::new().map_err(|error| {
error!("{:?}", error);
CoreError::RandomDataGenerationFailure
})?;
Ok(
os_rng
.gen_iter::<char>()
.filter(|c| *c != '\u{0}')
.take(length)
.collect(),
)
}
pub fn generate_readable_string(length: usize) -> Result<String, CoreError> {
let mut os_rng = ::rand::OsRng::new().map_err(|error| {
error!("{:?}", error);
CoreError::RandomDataGenerationFailure
})?;
Ok(os_rng.gen_ascii_chars().take(length).collect())
}
pub fn generate_random_vector<T>(length: usize) -> Result<Vec<T>, CoreError>
where
T: ::rand::Rand,
{
let mut os_rng = ::rand::OsRng::new().map_err(|error| {
error!("{:?}", error);
CoreError::RandomDataGenerationFailure
})?;
Ok(os_rng.gen_iter().take(length).collect())
}
pub fn derive_secrets(acc_locator: &[u8], acc_password: &[u8]) -> (Vec<u8>, Vec<u8>, Vec<u8>) {
let Digest(locator_hash) = sha512::hash(acc_locator);
let pin = sha512::hash(&locator_hash[DIGESTBYTES / 2..]).0.to_vec();
let keyword = locator_hash.to_vec();
let password = sha512::hash(acc_password).0.to_vec();
(password, keyword, pin)
}
#[cfg(test)]
mod tests {
use super::*;
const SIZE: usize = 10;
#[test]
fn random_string() {
let str0 = unwrap!(generate_random_string(SIZE));
let str1 = unwrap!(generate_random_string(SIZE));
let str2 = unwrap!(generate_random_string(SIZE));
assert_ne!(str0, str1);
assert_ne!(str0, str2);
assert_ne!(str1, str2);
assert_eq!(str0.chars().collect::<Vec<char>>().len(), SIZE);
assert_eq!(str1.chars().collect::<Vec<char>>().len(), SIZE);
assert_eq!(str2.chars().collect::<Vec<char>>().len(), SIZE);
}
#[test]
fn random_vector() {
let vec0 = unwrap!(generate_random_vector::<u8>(SIZE));
let vec1 = unwrap!(generate_random_vector::<u8>(SIZE));
let vec2 = unwrap!(generate_random_vector::<u8>(SIZE));
assert_ne!(vec0, vec1);
assert_ne!(vec0, vec2);
assert_ne!(vec1, vec2);
assert_eq!(vec0.len(), SIZE);
assert_eq!(vec1.len(), SIZE);
assert_eq!(vec2.len(), SIZE);
}
#[test]
fn secrets_derivation() {
{
let secret_0 = unwrap!(generate_random_string(SIZE));
let secret_1 = unwrap!(generate_random_string(SIZE));
let (password, keyword, pin) = derive_secrets(secret_0.as_bytes(), secret_1.as_bytes());
assert_ne!(pin, keyword);
assert_ne!(password, pin);
assert_ne!(password, keyword);
}
{
let secret_0 = String::new();
let secret_1 = String::new();
let (password, keyword, pin) = derive_secrets(secret_0.as_bytes(), secret_1.as_bytes());
assert_ne!(pin, keyword);
assert_ne!(password, pin);
assert_eq!(password, keyword);
}
}
}