1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
#[cfg(feature = "deprecated-aes-cbc")]
mod aes_cbc;
mod aes_ctr;
mod chacha20_poly1305_openssh;
#[cfg(feature = "deprecated-des-cbc")]
mod des_cbc;

use crate::algorithm::hash::Hash;
use crate::algorithm::mac::Mac;
use crate::SshResult;

use super::{hash::HashCtx, mac::MacNone, Enc};

/// <https://www.rfc-editor.org/rfc/rfc4253#section-6.3>
pub(crate) trait Encryption: Send + Sync {
    fn bsize(&self) -> usize;
    fn iv_size(&self) -> usize;
    fn new(hash: Hash, mac: Box<dyn Mac>) -> Self
    where
        Self: Sized;
    fn encrypt(&mut self, client_sequence_num: u32, buf: &mut Vec<u8>);
    fn decrypt(&mut self, sequence_number: u32, buf: &mut [u8]) -> SshResult<Vec<u8>>;
    fn packet_len(&mut self, sequence_number: u32, buf: &[u8]) -> usize;
    fn data_len(&mut self, sequence_number: u32, buf: &[u8]) -> usize;
    fn no_pad(&self) -> bool;
}

pub(crate) fn from(s: &Enc, hash: Hash, mac: Box<dyn Mac>) -> Box<dyn Encryption> {
    match s {
        Enc::Chacha20Poly1305Openssh => {
            Box::new(chacha20_poly1305_openssh::ChaCha20Poly1305::new(hash, mac))
        }
        Enc::Aes128Ctr => Box::new(aes_ctr::Ctr128::new(hash, mac)),
        Enc::Aes192Ctr => Box::new(aes_ctr::Ctr192::new(hash, mac)),
        Enc::Aes256Ctr => Box::new(aes_ctr::Ctr256::new(hash, mac)),
        #[cfg(feature = "deprecated-aes-cbc")]
        Enc::Aes128Cbc => Box::new(aes_cbc::Cbc128::new(hash, mac)),
        #[cfg(feature = "deprecated-aes-cbc")]
        Enc::Aes192Cbc => Box::new(aes_cbc::Cbc192::new(hash, mac)),
        #[cfg(feature = "deprecated-aes-cbc")]
        Enc::Aes256Cbc => Box::new(aes_cbc::Cbc256::new(hash, mac)),
        #[cfg(feature = "deprecated-des-cbc")]
        Enc::TripleDesCbc => Box::new(des_cbc::Cbc::new(hash, mac)),
    }
}

pub(crate) struct EncryptionNone {}

impl Encryption for EncryptionNone {
    fn bsize(&self) -> usize {
        8
    }
    fn iv_size(&self) -> usize {
        8
    }

    fn new(_hash: Hash, _mac: Box<dyn Mac>) -> Self
    where
        Self: Sized,
    {
        Self {}
    }
    fn encrypt(&mut self, _client_sequence_num: u32, _buf: &mut Vec<u8>) {
        // do nothing
    }
    fn decrypt(&mut self, _sequence_number: u32, buf: &mut [u8]) -> SshResult<Vec<u8>> {
        Ok(buf.to_vec())
    }
    fn packet_len(&mut self, _sequence_number: u32, buf: &[u8]) -> usize {
        u32::from_be_bytes(buf[0..4].try_into().unwrap()) as usize
    }
    fn data_len(&mut self, sequence_number: u32, buf: &[u8]) -> usize {
        self.packet_len(sequence_number, buf) + 4
    }
    fn no_pad(&self) -> bool {
        false
    }
}

impl Default for EncryptionNone {
    fn default() -> Self {
        let hash = Hash::new(HashCtx::new(), &[], super::hash::HashType::None);
        let mac = Box::new(MacNone::new());
        Self::new(hash, mac)
    }
}