diff options
author | metamuffin <metamuffin@disroot.org> | 2022-09-14 20:11:23 +0200 |
---|---|---|
committer | metamuffin <metamuffin@disroot.org> | 2022-09-14 20:11:23 +0200 |
commit | c752fe962df841b0cb811b09f155568735e7380c (patch) | |
tree | 1ee5ea82899a517a3ad841072e7b094836613e9e /client-native-lib/src/crypto.rs | |
parent | a8de400e17bd3eb7892cac5a0bef02b35482e946 (diff) | |
download | keks-meet-c752fe962df841b0cb811b09f155568735e7380c.tar keks-meet-c752fe962df841b0cb811b09f155568735e7380c.tar.bz2 keks-meet-c752fe962df841b0cb811b09f155568735e7380c.tar.zst |
rename crate
Diffstat (limited to 'client-native-lib/src/crypto.rs')
-rw-r--r-- | client-native-lib/src/crypto.rs | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/client-native-lib/src/crypto.rs b/client-native-lib/src/crypto.rs new file mode 100644 index 0000000..9bd8908 --- /dev/null +++ b/client-native-lib/src/crypto.rs @@ -0,0 +1,39 @@ +use aes_gcm::{ + aead::{generic_array::sequence::GenericSequence, Aead}, + Aes256Gcm, KeyInit, Nonce, +}; +use log::info; + +pub struct Key(Aes256Gcm); + +impl Key { + pub fn derive(secret: &str) -> Self { + info!("running key generation... this might take some⢠time"); + let salt = base64::decode("thisisagoodsaltAAAAAAA==").unwrap(); + let mut key = [0u8; 32]; + fastpbkdf2::pbkdf2_hmac_sha256(secret.as_bytes(), salt.as_slice(), 250000, &mut key); + + let key = Aes256Gcm::new_from_slice(key.as_slice()).unwrap(); + + info!("done"); + Self(key) + } + pub fn encrypt(&self, s: &str) -> String { + let iv = Nonce::generate(|_| rand::random()); // TODO check if this is secure randomness + let ciphertext = self.0.encrypt(&iv, s.as_bytes()).unwrap(); + let mut packet = iv.to_vec(); // TODO this could be doing less allocations + packet.extend(ciphertext); + base64::encode(packet) + } + pub fn decrypt(&self, s: &str) -> String { + let r = base64::decode(s).unwrap(); + let iv = &r[0..12]; + let ciphertext = &r[12..]; + let plaintext = self.0.decrypt(Nonce::from_slice(iv), ciphertext).unwrap(); + String::from_utf8(plaintext).unwrap() + } +} + +pub fn hash(secret: &str) -> String { + sha256::digest(format!("also-a-very-good-salt{}", secret)) +} |