use std::io;
use std::convert::TryFrom;
use rand::{ Rand, Rng };
use seckey::Bytes;
use ::aead::{ AeadCipher, DecryptFail };
use ::kex::KeyExchange;
pub trait SealedBox {
fn seal<K, R>(pka: &K::PublicKey, data: &[u8])
-> Vec<u8>
where
K: KeyExchange,
K::Reconciliation: Into<Vec<u8>>,
R: Rand + Rng;
fn open<K>(ska: &K::PrivateKey, data: &[u8])
-> Result<Vec<u8>, DecryptFail>
where
K: KeyExchange,
for<'a> K::Reconciliation: TryFrom<&'a [u8], Error=io::Error>;
}
impl<T> SealedBox for T where T: AeadCipher {
fn seal<K, R>(pka: &K::PublicKey, data: &[u8])
-> Vec<u8>
where
K: KeyExchange,
K::Reconciliation: Into<Vec<u8>>,
R: Rand + Rng
{
let mut key = Bytes::from(vec![0; Self::KEY_LENGTH + Self::NONCE_LENGTH]);
let mut rec = K::exchange::<R>(&mut key, pka).into();
let (key, nonce) = key.split_at(Self::KEY_LENGTH);
let mut output = Self::new(key)
.with_aad(&rec)
.encrypt(nonce, data);
output.append(&mut rec);
output
}
fn open<K>(ska: &K::PrivateKey, data: &[u8])
-> Result<Vec<u8>, DecryptFail>
where
K: KeyExchange,
for<'a> K::Reconciliation: TryFrom<&'a [u8], Error=io::Error>
{
if data.len() < K::REC_LENGTH { Err(DecryptFail::LengthError)? };
let mut key = Bytes::from(vec![0; Self::KEY_LENGTH + Self::NONCE_LENGTH]);
let (data, rec) = data.split_at(data.len() - K::REC_LENGTH);
K::exchange_from(&mut key, ska, &K::Reconciliation::try_from(rec)?);
let (key, nonce) = key.split_at(Self::KEY_LENGTH);
Self::new(key)
.with_aad(rec)
.decrypt(nonce, data)
}
}