pub mod logging;
#[cfg(any(test, feature = "testing"))]
pub mod test_utils;
use crate::errors::CoreError;
use bincode::{deserialize, serialize};
use miscreant::aead::Aead;
use miscreant::Aes128SivAead;
use rand::distributions::{Alphanumeric, Distribution, Standard};
use rand::rngs::OsRng;
use rand::{self, Rng};
use serde::{Deserialize, Serialize};
use tiny_keccak::sha3_512;
pub const SYM_ENC_KEY_LEN: usize = 32;
pub const SYM_ENC_NONCE_LEN: usize = 16;
const SHA3_512_HASH_LEN: usize = 64;
pub type SymEncKey = [u8; SYM_ENC_KEY_LEN];
pub type SymEncNonce = [u8; SYM_ENC_NONCE_LEN];
#[macro_export]
macro_rules! btree_set {
($($item:expr),*) => {{
let mut _set = ::std::collections::BTreeSet::new();
$(
let _ = _set.insert($item);
)*
_set
}};
($($item:expr),*,) => {
btree_set![$($item),*]
};
}
#[macro_export]
macro_rules! btree_map {
() => ({
::std::collections::BTreeMap::new()
});
($($key:expr => $value:expr),*) => {{
let mut _map = ::std::collections::BTreeMap::new();
$(
let _ = _map.insert($key, $value);
)*
_map
}};
($($key:expr => $value:expr),*,) => {
btree_map![$($key => $value),*]
};
}
#[derive(Serialize, Deserialize)]
struct SymmetricEnc {
nonce: SymEncNonce,
cipher_text: Vec<u8>,
}
pub fn generate_sym_enc_key() -> SymEncKey {
rand::random()
}
pub fn generate_nonce() -> SymEncNonce {
rand::random()
}
pub fn symmetric_encrypt(
plain_text: &[u8],
secret_key: &SymEncKey,
nonce: Option<&SymEncNonce>,
) -> Result<Vec<u8>, CoreError> {
let nonce = match nonce {
Some(nonce) => *nonce,
None => generate_nonce(),
};
let mut cipher = Aes128SivAead::new(secret_key);
let cipher_text = cipher.seal(&nonce, &[], plain_text);
Ok(serialize(&SymmetricEnc { nonce, cipher_text })?)
}
pub fn symmetric_decrypt(cipher_text: &[u8], secret_key: &SymEncKey) -> Result<Vec<u8>, CoreError> {
let SymmetricEnc { nonce, cipher_text } = deserialize::<SymmetricEnc>(cipher_text)?;
let mut cipher = Aes128SivAead::new(secret_key);
cipher
.open(&nonce, &[], &cipher_text)
.map_err(|_| CoreError::SymmetricDecipherFailure)
}
pub fn generate_random_string(length: usize) -> Result<String, CoreError> {
let mut os_rng = OsRng;
Ok(generate_random_string_rng(&mut os_rng, length))
}
pub fn generate_random_string_rng<T: Rng>(rng: &mut T, length: usize) -> String {
::std::iter::repeat(())
.map(|()| rng.gen::<char>())
.filter(|c| *c != '\u{0}')
.take(length)
.collect()
}
pub fn generate_readable_string(length: usize) -> Result<String, CoreError> {
let mut os_rng = OsRng;
Ok(generate_readable_string_rng(&mut os_rng, length))
}
pub fn generate_readable_string_rng<T: Rng>(rng: &mut T, length: usize) -> String {
::std::iter::repeat(())
.map(|()| rng.sample(Alphanumeric))
.take(length)
.collect()
}
pub fn generate_random_vector<T>(length: usize) -> Result<Vec<T>, CoreError>
where
Standard: Distribution<T>,
{
let mut os_rng = OsRng;
Ok(generate_random_vector_rng(&mut os_rng, length))
}
pub fn generate_random_vector_rng<T, R: Rng>(rng: &mut R, length: usize) -> Vec<T>
where
Standard: Distribution<T>,
{
::std::iter::repeat(())
.map(|()| rng.gen::<T>())
.take(length)
.collect()
}
pub fn derive_secrets(acc_locator: &[u8], acc_password: &[u8]) -> (Vec<u8>, Vec<u8>, Vec<u8>) {
let locator_hash = sha3_512(acc_locator);
let pin = sha3_512(&locator_hash[SHA3_512_HASH_LEN / 2..]).to_vec();
let keyword = locator_hash.to_vec();
let password = sha3_512(acc_password).to_vec();
(password, keyword, pin)
}
#[inline]
pub fn bin_data_format(data: &[u8]) -> String {
let len = data.len();
if len < 8 {
return format!("[ {:?} ]", data);
}
format!(
"[ {:02x} {:02x} {:02x} {:02x}..{:02x} {:02x} {:02x} {:02x} ]",
data[0],
data[1],
data[2],
data[3],
data[len - 4],
data[len - 3],
data[len - 2],
data[len - 1]
)
}
#[cfg(test)]
mod tests {
use super::*;
use unwrap::unwrap;
const SIZE: usize = 10;
#[test]
fn random_string() {
let str0 = unwrap!(generate_random_string(SIZE));
let str1 = unwrap!(generate_random_string(SIZE));
let str2 = unwrap!(generate_random_string(SIZE));
assert_ne!(str0, str1);
assert_ne!(str0, str2);
assert_ne!(str1, str2);
assert_eq!(str0.chars().count(), SIZE);
assert_eq!(str1.chars().count(), SIZE);
assert_eq!(str2.chars().count(), SIZE);
}
#[test]
fn random_vector() {
let vec0 = unwrap!(generate_random_vector::<u8>(SIZE));
let vec1 = unwrap!(generate_random_vector::<u8>(SIZE));
let vec2 = unwrap!(generate_random_vector::<u8>(SIZE));
assert_ne!(vec0, vec1);
assert_ne!(vec0, vec2);
assert_ne!(vec1, vec2);
assert_eq!(vec0.len(), SIZE);
assert_eq!(vec1.len(), SIZE);
assert_eq!(vec2.len(), SIZE);
}
#[test]
fn secrets_derivation() {
{
let secret_0 = unwrap!(generate_random_string(SIZE));
let secret_1 = unwrap!(generate_random_string(SIZE));
let (password, keyword, pin) = derive_secrets(secret_0.as_bytes(), secret_1.as_bytes());
assert_ne!(pin, keyword);
assert_ne!(password, pin);
assert_ne!(password, keyword);
}
{
let secret_0 = String::new();
let secret_1 = String::new();
let (password, keyword, pin) = derive_secrets(secret_0.as_bytes(), secret_1.as_bytes());
assert_ne!(pin, keyword);
assert_ne!(password, pin);
assert_eq!(password, keyword);
}
}
}