1use crate::{aes, sha256};
17use num_bigint::BigUint;
18
19pub struct Key {
21 n: BigUint,
22 e: BigUint,
23}
24
25impl Key {
26 pub fn new(n: &str, e: &str) -> Option<Self> {
28 Some(Self {
29 n: BigUint::parse_bytes(n.as_bytes(), 10)?,
30 e: BigUint::parse_bytes(e.as_bytes(), 10)?,
31 })
32 }
33}
34
35fn increment(data: &mut [u8]) {
36 let mut i = data.len() - 1;
37 loop {
38 let (n, overflow) = data[i].overflowing_add(1);
39 data[i] = n;
40 if overflow {
41 i = i.checked_sub(1).unwrap_or(data.len() - 1);
42 } else {
43 break;
44 }
45 }
46}
47
48pub fn encrypt_hashed(data: &[u8], key: &Key, random_bytes: &[u8; 224]) -> Vec<u8> {
53 assert!(data.len() <= 144, "data too large for RSA-PAD");
54
55 let mut data_with_padding = Vec::with_capacity(192);
57 data_with_padding.extend_from_slice(data);
58 data_with_padding.extend_from_slice(&random_bytes[..192 - data.len()]);
59
60 let data_pad_reversed: Vec<u8> = data_with_padding.iter().copied().rev().collect();
62
63 let mut temp_key: [u8; 32] = random_bytes[192..].try_into().unwrap();
64
65 let key_aes_encrypted = loop {
66 let mut data_with_hash = Vec::with_capacity(224);
68 data_with_hash.extend_from_slice(&data_pad_reversed);
69 data_with_hash.extend_from_slice(&sha256!(&temp_key, &data_with_padding));
70
71 aes::ige_encrypt(&mut data_with_hash, &temp_key, &[0u8; 32]);
72
73 let hash = sha256!(&data_with_hash);
75 let mut xored = temp_key;
76 for (a, b) in xored.iter_mut().zip(hash.iter()) {
77 *a ^= b;
78 }
79
80 let mut candidate = Vec::with_capacity(256);
81 candidate.extend_from_slice(&xored);
82 candidate.extend_from_slice(&data_with_hash);
83
84 if BigUint::from_bytes_be(&candidate) < key.n {
85 break candidate;
86 }
87 increment(&mut temp_key);
88 };
89
90 let payload = BigUint::from_bytes_be(&key_aes_encrypted);
91 let encrypted = payload.modpow(&key.e, &key.n);
92 let mut block = encrypted.to_bytes_be();
93 while block.len() < 256 {
94 block.insert(0, 0);
95 }
96 block
97}