1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
use block_modes::{block_padding::Pkcs7, BlockMode, Cbc};
use sm4::Sm4;
use rand::RngCore;
use std::borrow::BorrowMut;
use wedpr_l_utils::{error::WedprError, traits::BlockCipher};
#[derive(Default, Debug, Clone)]
pub struct WedprBlockCipherSm4 {}
type Sm4Cbc = Cbc<Sm4, Pkcs7>;
const BLOCK_SIZE: usize = 16;
const KEY_SIZE: usize = 16;
impl BlockCipher for WedprBlockCipherSm4 {
fn encrypt<T: ?Sized + AsRef<[u8]>>(
&self,
message: &T,
key: &T,
iv: &T,
) -> Result<Vec<u8>, WedprError> {
let cipher = match Sm4Cbc::new_var(key.as_ref(), iv.as_ref()) {
Ok(v) => v,
Err(_) => return Err(WedprError::FormatError),
};
let input_length = message.as_ref().len();
let padding_length =
(input_length / BLOCK_SIZE + 1) * BLOCK_SIZE - input_length;
let mut buffer_vec = message.as_ref().to_vec();
buffer_vec.append([0u8].repeat(padding_length).borrow_mut());
return match cipher.encrypt(buffer_vec.as_mut_slice(), input_length) {
Ok(v) => Ok(v.to_vec()),
Err(_) => Err(WedprError::FormatError),
};
}
fn decrypt<T: ?Sized + AsRef<[u8]>>(
&self,
ciphertext: &T,
key: &T,
iv: &T,
) -> Result<Vec<u8>, WedprError> {
let cipher = match Sm4Cbc::new_var(key.as_ref(), iv.as_ref()) {
Ok(v) => v,
Err(_) => return Err(WedprError::FormatError),
};
return match cipher.decrypt(ciphertext.as_ref().to_vec().as_mut_slice())
{
Ok(v) => Ok(v.to_vec()),
Err(_) => Err(WedprError::FormatError),
};
}
fn generate_key(&self) -> Vec<u8> {
let mut rng = rand::rngs::OsRng::default();
let mut key = [0u8; KEY_SIZE];
rng.fill_bytes(&mut key);
key.to_vec()
}
fn generate_iv(&self) -> Vec<u8> {
let mut rng = rand::rngs::OsRng::default();
let mut iv = [0u8; BLOCK_SIZE];
rng.fill_bytes(&mut iv);
iv.to_vec()
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_sm4_long_message() {
let sm4 = WedprBlockCipherSm4::default();
let key = sm4.generate_key();
let iv = sm4.generate_iv();
let msg = b"helloworld1 helloworld2 helloworld3 helloworld4";
let ciphertext = sm4.encrypt(&msg.to_vec(), &key, &iv).unwrap();
let decrypted_msg = sm4.decrypt(&ciphertext, &key, &iv).unwrap();
assert_eq!(decrypted_msg, msg);
}
#[test]
fn test_sm4_short_message() {
let sm4 = WedprBlockCipherSm4::default();
let key = sm4.generate_key();
let iv = sm4.generate_iv();
let msg = b"hello";
let ciphertext = sm4.encrypt(&msg.to_vec(), &key, &iv).unwrap();
let decrypted_msg = sm4.decrypt(&ciphertext, &key, &iv).unwrap();
assert_eq!(decrypted_msg, msg);
}
}