1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
use libaes::Cipher;
use rand::{rngs, RngCore};
use rsa::{PaddingScheme, PublicKey, RsaPublicKey};
use serde::{Deserialize, Serialize};
#[repr(u32)]
#[derive(Debug, Serialize, Deserialize, Copy, Clone)]
pub enum EncryptType {
AesCfb128 = 2,
}
#[repr(u32)]
#[derive(Debug, Serialize, Deserialize, Copy, Clone)]
pub enum KeyEncryptType {
RsaOaepSha1Mgf1Sha1 = 12,
}
#[derive(Debug)]
pub enum CryptoError {
CorruptedData,
}
#[derive(Debug)]
pub struct CryptoStore {
aes_key: [u8; 16],
}
impl CryptoStore {
pub fn new() -> Self {
let mut aes_key = [0_u8; 16];
Self::gen_random(&mut aes_key);
Self::new_with_key(aes_key)
}
pub fn new_with_key(aes_key: [u8; 16]) -> Self {
Self { aes_key }
}
pub fn encrypt_aes(&self, data: &[u8], iv: &[u8; 16]) -> Result<Vec<u8>, CryptoError> {
let cipher = Cipher::new_128(&self.aes_key);
Ok(cipher.cfb128_encrypt(iv, data))
}
pub fn decrypt_aes(&self, data: &[u8], iv: &[u8; 16]) -> Result<Vec<u8>, CryptoError> {
let cipher = Cipher::new_128(&self.aes_key);
Ok(cipher.cfb128_decrypt(iv, data))
}
pub fn encrypt_key(&self, key: &RsaPublicKey) -> Result<Vec<u8>, CryptoError> {
Ok(key
.encrypt(
&mut rngs::OsRng,
PaddingScheme::new_oaep::<sha1::Sha1>(),
&self.aes_key,
)
.unwrap())
}
pub fn gen_random(data: &mut [u8]) {
rngs::OsRng.fill_bytes(data)
}
}