use cx448::x448;
use hkdf::Hkdf;
use log::debug;
use rand::{CryptoRng, Rng};
use sha2::Sha512;
use zeroize::{Zeroize, ZeroizeOnDrop, Zeroizing};
use crate::pgp::{
crypto::{aes_kw, Decryptor},
errors::{bail, ensure, Result},
ser::Serialize,
types::X448PublicParams,
};
pub const KEY_LEN: usize = 56;
#[derive(Clone, derive_more::Debug, Zeroize, ZeroizeOnDrop)]
pub struct SecretKey {
#[debug("..")]
secret: x448::Secret,
}
impl PartialEq for SecretKey {
fn eq(&self, other: &Self) -> bool {
self.secret.as_bytes().eq(other.secret.as_bytes())
}
}
impl Eq for SecretKey {}
impl From<&SecretKey> for X448PublicParams {
fn from(value: &SecretKey) -> Self {
let secret = value.secret;
let public = x448::PublicKey::from(&secret);
X448PublicParams { key: public }
}
}
impl SecretKey {
pub fn generate<R: Rng + CryptoRng>(mut rng: R) -> Self {
let secret = x448::Secret::new(&mut rng);
SecretKey { secret }
}
pub fn try_from_bytes(secret: [u8; KEY_LEN]) -> Result<Self> {
let secret = x448::Secret::from(secret);
Ok(Self { secret })
}
pub fn as_bytes(&self) -> &[u8; KEY_LEN] {
self.secret.as_bytes()
}
}
impl Serialize for SecretKey {
fn to_writer<W: std::io::Write>(&self, writer: &mut W) -> Result<()> {
let x = self.as_bytes();
writer.write_all(x)?;
Ok(())
}
fn write_len(&self) -> usize {
KEY_LEN
}
}
pub struct EncryptionFields<'a> {
pub ephemeral_public_point: [u8; 56],
pub recipient_public: &'a x448::PublicKey,
pub encrypted_session_key: &'a [u8],
}
impl Decryptor for SecretKey {
type EncryptionFields<'a> = EncryptionFields<'a>;
fn decrypt(&self, data: Self::EncryptionFields<'_>) -> Result<Vec<u8>> {
debug!("X448 decrypt");
let shared_secret = {
let Some(their_public) = x448::PublicKey::from_bytes(&data.ephemeral_public_point)
else {
bail!("x448: invalid public key");
};
let our_secret = self.secret;
let Some(shared_secret) = our_secret.as_diffie_hellman(&their_public) else {
bail!("x448 Secret::as_diffie_hellman returned None");
};
*shared_secret.as_bytes()
};
derive_session_key(
data.ephemeral_public_point,
data.recipient_public.as_bytes(),
shared_secret,
data.encrypted_session_key,
)
}
}
pub fn derive_session_key(
ephemeral: [u8; 56],
recipient_public: &[u8; 56],
shared_secret: [u8; 56],
encrypted_session_key: &[u8],
) -> Result<Vec<u8>> {
let okm = hkdf(&ephemeral, recipient_public, &shared_secret)?;
let decrypted_key = aes_kw::unwrap(&okm, encrypted_session_key)?;
ensure!(!decrypted_key.is_empty(), "empty key is not valid");
Ok(decrypted_key)
}
pub fn hkdf(
ephemeral: &[u8; 56],
recipient_public: &[u8; 56],
shared_secret: &[u8; 56],
) -> Result<[u8; 32]> {
const INFO: &[u8] = b"OpenPGP X448";
let mut input = vec![];
input.extend_from_slice(ephemeral);
input.extend_from_slice(recipient_public);
input.extend_from_slice(shared_secret);
let hk = Hkdf::<Sha512>::new(None, &input);
let mut okm = [0u8; 32];
hk.expand(INFO, &mut okm)
.expect("32 is a valid length for Sha512 to output");
Ok(okm)
}
pub fn encrypt<R: CryptoRng + Rng>(
mut rng: R,
recipient_public: &X448PublicParams,
plain: &[u8],
) -> Result<([u8; 56], Vec<u8>)> {
debug!("X448 encrypt");
const MAX_SIZE: usize = 255;
ensure!(
plain.len() <= MAX_SIZE,
"unable to encrypt larger than {} bytes",
MAX_SIZE
);
let (ephemeral_public, shared_secret) = {
let their_public = &recipient_public.key;
let mut ephemeral_secret_key_bytes = Zeroizing::new([0u8; 56]);
rng.fill_bytes(&mut *ephemeral_secret_key_bytes);
let our_secret = x448::Secret::from(*ephemeral_secret_key_bytes);
let Some(shared_secret) = our_secret.as_diffie_hellman(their_public) else {
bail!("x448 Secret::as_diffie_hellman returned None");
};
let ephemeral_public = x448::PublicKey::from(&our_secret);
(ephemeral_public, shared_secret)
};
let okm = hkdf(
ephemeral_public.as_bytes(),
recipient_public.key.as_bytes(),
shared_secret.as_bytes(),
)?;
let wrapped = aes_kw::wrap(&okm, plain)?;
Ok((*ephemeral_public.as_bytes(), wrapped))
}
#[cfg(test)]
mod tests {
#![allow(clippy::unwrap_used)]
use std::ops::Deref;
use proptest::prelude::*;
use rand::{RngCore, SeedableRng};
use rand_chacha::{ChaCha8Rng, ChaChaRng};
use super::*;
#[test]
fn test_encrypt_decrypt() {
let mut rng = ChaChaRng::from_seed([0u8; 32]);
let skey = SecretKey::generate(&mut rng);
let pub_params: X448PublicParams = (&skey).into();
for text_size in (8..=248).step_by(8) {
for _i in 0..10 {
let mut fingerprint = vec![0u8; 20];
rng.fill_bytes(&mut fingerprint);
let mut plain = vec![0u8; text_size];
rng.fill_bytes(&mut plain);
let (ephemeral, enc_sk) = encrypt(&mut rng, &pub_params, &plain[..]).unwrap();
let data = EncryptionFields {
ephemeral_public_point: ephemeral,
recipient_public: &pub_params.key,
encrypted_session_key: enc_sk.deref(),
};
let decrypted = skey.decrypt(data).unwrap();
assert_eq!(&plain[..], &decrypted[..]);
}
}
}
impl Arbitrary for SecretKey {
type Parameters = ();
type Strategy = BoxedStrategy<Self>;
fn arbitrary_with(_args: Self::Parameters) -> Self::Strategy {
any::<u64>()
.prop_map(|seed| {
let mut rng = ChaCha8Rng::seed_from_u64(seed);
SecretKey::generate(&mut rng)
})
.boxed()
}
}
}