mod kdf;
#[cfg(feature = "pbes2")]
mod encryption;
pub use self::kdf::{
Kdf, Pbkdf2Params, Pbkdf2Prf, ScryptParams, HMAC_WITH_SHA1_OID, HMAC_WITH_SHA256_OID,
PBKDF2_OID, SCRYPT_OID,
};
use crate::{AlgorithmIdentifierRef, Error, Result};
use der::{
asn1::{AnyRef, ObjectIdentifier, OctetStringRef},
Decode, DecodeValue, Encode, EncodeValue, ErrorKind, Length, Reader, Sequence, Tag, Writer,
};
#[cfg(all(feature = "alloc", feature = "pbes2"))]
use alloc::vec::Vec;
pub const AES_128_CBC_OID: ObjectIdentifier =
ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.1.2");
pub const AES_192_CBC_OID: ObjectIdentifier =
ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.1.22");
pub const AES_256_CBC_OID: ObjectIdentifier =
ObjectIdentifier::new_unwrap("2.16.840.1.101.3.4.1.42");
#[cfg(feature = "des-insecure")]
pub const DES_CBC_OID: ObjectIdentifier = ObjectIdentifier::new_unwrap("1.3.14.3.2.7");
#[cfg(feature = "3des")]
pub const DES_EDE3_CBC_OID: ObjectIdentifier = ObjectIdentifier::new_unwrap("1.2.840.113549.3.7");
pub const PBES2_OID: ObjectIdentifier = ObjectIdentifier::new_unwrap("1.2.840.113549.1.5.13");
const AES_BLOCK_SIZE: usize = 16;
#[cfg(any(feature = "3des", feature = "des-insecure"))]
const DES_BLOCK_SIZE: usize = 8;
#[derive(Clone, Debug, Eq, PartialEq)]
pub struct Parameters<'a> {
pub kdf: Kdf<'a>,
pub encryption: EncryptionScheme<'a>,
}
impl<'a> Parameters<'a> {
pub fn pbkdf2_sha256_aes128cbc(
pbkdf2_iterations: u32,
pbkdf2_salt: &'a [u8],
aes_iv: &'a [u8; AES_BLOCK_SIZE],
) -> Result<Self> {
let kdf = Pbkdf2Params::hmac_with_sha256(pbkdf2_iterations, pbkdf2_salt)?.into();
let encryption = EncryptionScheme::Aes128Cbc { iv: aes_iv };
Ok(Self { kdf, encryption })
}
pub fn pbkdf2_sha256_aes256cbc(
pbkdf2_iterations: u32,
pbkdf2_salt: &'a [u8],
aes_iv: &'a [u8; AES_BLOCK_SIZE],
) -> Result<Self> {
let kdf = Pbkdf2Params::hmac_with_sha256(pbkdf2_iterations, pbkdf2_salt)?.into();
let encryption = EncryptionScheme::Aes256Cbc { iv: aes_iv };
Ok(Self { kdf, encryption })
}
#[cfg(feature = "pbes2")]
pub fn scrypt_aes128cbc(
params: scrypt::Params,
salt: &'a [u8],
aes_iv: &'a [u8; AES_BLOCK_SIZE],
) -> Result<Self> {
let kdf = ScryptParams::from_params_and_salt(params, salt)?.into();
let encryption = EncryptionScheme::Aes128Cbc { iv: aes_iv };
Ok(Self { kdf, encryption })
}
#[cfg(feature = "pbes2")]
pub fn scrypt_aes256cbc(
params: scrypt::Params,
salt: &'a [u8],
aes_iv: &'a [u8; AES_BLOCK_SIZE],
) -> Result<Self> {
let kdf = ScryptParams::from_params_and_salt(params, salt)?.into();
let encryption = EncryptionScheme::Aes256Cbc { iv: aes_iv };
Ok(Self { kdf, encryption })
}
#[cfg(all(feature = "alloc", feature = "pbes2"))]
pub fn decrypt(&self, password: impl AsRef<[u8]>, ciphertext: &[u8]) -> Result<Vec<u8>> {
let mut buffer = ciphertext.to_vec();
let pt_len = self.decrypt_in_place(password, &mut buffer)?.len();
buffer.truncate(pt_len);
Ok(buffer)
}
#[cfg(feature = "pbes2")]
pub fn decrypt_in_place<'b>(
&self,
password: impl AsRef<[u8]>,
buffer: &'b mut [u8],
) -> Result<&'b [u8]> {
encryption::decrypt_in_place(self, password, buffer)
}
#[cfg(all(feature = "alloc", feature = "pbes2"))]
pub fn encrypt(&self, password: impl AsRef<[u8]>, plaintext: &[u8]) -> Result<Vec<u8>> {
let mut buffer = Vec::with_capacity(plaintext.len() + AES_BLOCK_SIZE);
buffer.extend_from_slice(plaintext);
buffer.extend_from_slice(&[0u8; AES_BLOCK_SIZE]);
let ct_len = self
.encrypt_in_place(password, &mut buffer, plaintext.len())?
.len();
buffer.truncate(ct_len);
Ok(buffer)
}
#[cfg(feature = "pbes2")]
pub fn encrypt_in_place<'b>(
&self,
password: impl AsRef<[u8]>,
buffer: &'b mut [u8],
pos: usize,
) -> Result<&'b [u8]> {
encryption::encrypt_in_place(self, password, buffer, pos)
}
}
impl<'a> DecodeValue<'a> for Parameters<'a> {
fn decode_value<R: Reader<'a>>(reader: &mut R, header: der::Header) -> der::Result<Self> {
AnyRef::decode_value(reader, header)?.try_into()
}
}
impl EncodeValue for Parameters<'_> {
fn value_len(&self) -> der::Result<Length> {
self.kdf.encoded_len()? + self.encryption.encoded_len()?
}
fn encode_value(&self, writer: &mut impl Writer) -> der::Result<()> {
self.kdf.encode(writer)?;
self.encryption.encode(writer)?;
Ok(())
}
}
impl<'a> Sequence<'a> for Parameters<'a> {}
impl<'a> TryFrom<AnyRef<'a>> for Parameters<'a> {
type Error = der::Error;
fn try_from(any: AnyRef<'a>) -> der::Result<Self> {
any.sequence(|params| {
let kdf = AlgorithmIdentifierRef::decode(params)?;
let encryption = AlgorithmIdentifierRef::decode(params)?;
Ok(Self {
kdf: kdf.try_into()?,
encryption: encryption.try_into()?,
})
})
}
}
#[derive(Copy, Clone, Debug, Eq, PartialEq)]
#[non_exhaustive]
pub enum EncryptionScheme<'a> {
Aes128Cbc {
iv: &'a [u8; AES_BLOCK_SIZE],
},
Aes192Cbc {
iv: &'a [u8; AES_BLOCK_SIZE],
},
Aes256Cbc {
iv: &'a [u8; AES_BLOCK_SIZE],
},
#[cfg(feature = "3des")]
DesEde3Cbc {
iv: &'a [u8; DES_BLOCK_SIZE],
},
#[cfg(feature = "des-insecure")]
DesCbc {
iv: &'a [u8; DES_BLOCK_SIZE],
},
}
impl<'a> EncryptionScheme<'a> {
pub fn key_size(&self) -> usize {
match self {
Self::Aes128Cbc { .. } => 16,
Self::Aes192Cbc { .. } => 24,
Self::Aes256Cbc { .. } => 32,
#[cfg(feature = "des-insecure")]
Self::DesCbc { .. } => 8,
#[cfg(feature = "3des")]
Self::DesEde3Cbc { .. } => 24,
}
}
pub fn oid(&self) -> ObjectIdentifier {
match self {
Self::Aes128Cbc { .. } => AES_128_CBC_OID,
Self::Aes192Cbc { .. } => AES_192_CBC_OID,
Self::Aes256Cbc { .. } => AES_256_CBC_OID,
#[cfg(feature = "des-insecure")]
Self::DesCbc { .. } => DES_CBC_OID,
#[cfg(feature = "3des")]
Self::DesEde3Cbc { .. } => DES_EDE3_CBC_OID,
}
}
pub fn to_alg_params_invalid(&self) -> Error {
Error::AlgorithmParametersInvalid { oid: self.oid() }
}
}
impl<'a> Decode<'a> for EncryptionScheme<'a> {
fn decode<R: Reader<'a>>(reader: &mut R) -> der::Result<Self> {
AlgorithmIdentifierRef::decode(reader).and_then(TryInto::try_into)
}
}
impl<'a> TryFrom<AlgorithmIdentifierRef<'a>> for EncryptionScheme<'a> {
type Error = der::Error;
fn try_from(alg: AlgorithmIdentifierRef<'a>) -> der::Result<Self> {
let iv = match alg.parameters {
Some(params) => params.decode_as::<OctetStringRef<'a>>()?.as_bytes(),
None => return Err(Tag::OctetString.value_error()),
};
match alg.oid {
AES_128_CBC_OID => Ok(Self::Aes128Cbc {
iv: iv
.try_into()
.map_err(|_| der::Tag::OctetString.value_error())?,
}),
AES_192_CBC_OID => Ok(Self::Aes192Cbc {
iv: iv
.try_into()
.map_err(|_| der::Tag::OctetString.value_error())?,
}),
AES_256_CBC_OID => Ok(Self::Aes256Cbc {
iv: iv
.try_into()
.map_err(|_| der::Tag::OctetString.value_error())?,
}),
#[cfg(feature = "des-insecure")]
DES_CBC_OID => Ok(Self::DesCbc {
iv: iv[0..DES_BLOCK_SIZE]
.try_into()
.map_err(|_| der::Tag::OctetString.value_error())?,
}),
#[cfg(feature = "3des")]
DES_EDE3_CBC_OID => Ok(Self::DesEde3Cbc {
iv: iv[0..DES_BLOCK_SIZE]
.try_into()
.map_err(|_| der::Tag::OctetString.value_error())?,
}),
oid => Err(ErrorKind::OidUnknown { oid }.into()),
}
}
}
impl<'a> TryFrom<EncryptionScheme<'a>> for AlgorithmIdentifierRef<'a> {
type Error = der::Error;
fn try_from(scheme: EncryptionScheme<'a>) -> der::Result<Self> {
let parameters = OctetStringRef::new(match scheme {
EncryptionScheme::Aes128Cbc { iv } => iv,
EncryptionScheme::Aes192Cbc { iv } => iv,
EncryptionScheme::Aes256Cbc { iv } => iv,
#[cfg(feature = "des-insecure")]
EncryptionScheme::DesCbc { iv } => iv,
#[cfg(feature = "3des")]
EncryptionScheme::DesEde3Cbc { iv } => iv,
})?;
Ok(AlgorithmIdentifierRef {
oid: scheme.oid(),
parameters: Some(parameters.into()),
})
}
}
impl<'a> Encode for EncryptionScheme<'a> {
fn encoded_len(&self) -> der::Result<Length> {
AlgorithmIdentifierRef::try_from(*self)?.encoded_len()
}
fn encode(&self, writer: &mut impl Writer) -> der::Result<()> {
AlgorithmIdentifierRef::try_from(*self)?.encode(writer)
}
}