1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
use crate::Result;
pub trait KerberosCipher {
fn etype(&self) -> i32;
fn generate_salt(&self, realm: &str, client_name: &str) -> Vec<u8>;
fn generate_key(&self, raw_key: &[u8], salt: &[u8]) -> Vec<u8>;
fn generate_key_from_string(
&self,
password: &str,
salt: &[u8],
) -> Vec<u8>;
fn decrypt(
&self,
key: &[u8],
key_usage: i32,
ciphertext: &[u8],
) -> Result<Vec<u8>>;
fn generate_key_and_decrypt(
&self,
raw_key: &[u8],
salt: &[u8],
key_usage: i32,
ciphertext: &[u8],
) -> Result<Vec<u8>> {
let key = self.generate_key(raw_key, salt);
return self.decrypt(&key, key_usage, ciphertext);
}
fn generate_key_from_string_and_decrypt(
&self,
password: &str,
salt: &[u8],
key_usage: i32,
ciphertext: &[u8],
) -> Result<Vec<u8>> {
let key = self.generate_key_from_string(password, salt);
return self.decrypt(&key, key_usage, ciphertext);
}
fn encrypt(&self, key: &[u8], key_usage: i32, plaintext: &[u8]) -> Vec<u8>;
fn generate_key_and_encrypt(
&self,
raw_key: &[u8],
salt: &[u8],
key_usage: i32,
ciphertext: &[u8],
) -> Vec<u8> {
let key = self.generate_key(raw_key, salt);
return self.encrypt(&key, key_usage, ciphertext);
}
fn generate_key_from_string_and_encrypt(
&self,
password: &str,
salt: &[u8],
key_usage: i32,
ciphertext: &[u8],
) -> Vec<u8> {
let key = self.generate_key_from_string(password, salt);
return self.encrypt(&key, key_usage, ciphertext);
}
}