aboutsummaryrefslogtreecommitdiff
path: root/src/cfb8.rs
blob: 6fc3bb612039241e44b47d242c36c09a7486eaa3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
use aes::{
    cipher::{consts::U16, generic_array::GenericArray, BlockCipherMut, NewBlockCipher},
    Aes128,
};
use thiserror::Error;

pub type CraftCipherResult<T> = Result<T, CipherError>;

#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)]
pub enum CipherComponent {
    Key,
    Iv,
}

#[derive(Debug, Error)]
pub enum CipherError {
    #[error("encryption is already enabled and cannot be enabled again")]
    AlreadyEnabled,
    #[error("bad size '{1}' for '{0:?}'")]
    BadSize(CipherComponent, usize),
}

const BYTES_SIZE: usize = 16;

pub struct CraftCipher {
    iv: GenericArray<u8, U16>,
    tmp: GenericArray<u8, U16>,
    cipher: Aes128,
}

impl CraftCipher {
    pub fn new(key: &[u8], iv: &[u8]) -> CraftCipherResult<Self> {
        if iv.len() != BYTES_SIZE {
            return Err(CipherError::BadSize(CipherComponent::Iv, iv.len()));
        }

        if key.len() != BYTES_SIZE {
            return Err(CipherError::BadSize(CipherComponent::Key, iv.len()));
        }

        let mut iv_out = [0u8; BYTES_SIZE];
        iv_out.copy_from_slice(iv);

        let mut key_out = [0u8; BYTES_SIZE];
        key_out.copy_from_slice(key);

        let tmp = [0u8; BYTES_SIZE];

        Ok(Self {
            iv: GenericArray::from(iv_out),
            tmp: GenericArray::from(tmp),
            cipher: Aes128::new(&GenericArray::from(key_out)),
        })
    }

    pub fn encrypt(&mut self, data: &mut [u8]) {
        unsafe { self.crypt(data, false) }
    }

    pub fn decrypt(&mut self, data: &mut [u8]) {
        unsafe { self.crypt(data, true) }
    }

    unsafe fn crypt(&mut self, data: &mut [u8], decrypt: bool) {
        let iv = &mut self.iv;
        const IV_SIZE: usize = 16;
        const IV_SIZE_MINUS_ONE: usize = IV_SIZE - 1;
        let iv_ptr = iv.as_mut_ptr();
        let iv_end_ptr = iv_ptr.offset(IV_SIZE_MINUS_ONE as isize);
        let tmp_ptr = self.tmp.as_mut_ptr();
        let tmp_offset_one_ptr = tmp_ptr.offset(1);
        let cipher = &mut self.cipher;
        let n = data.len();
        let mut data_ptr = data.as_mut_ptr();
        let data_end_ptr = data_ptr.offset(n as isize);

        while data_ptr != data_end_ptr {
            std::ptr::copy_nonoverlapping(iv_ptr, tmp_ptr, IV_SIZE);
            cipher.encrypt_block(iv);
            let orig = *data_ptr;
            let updated = orig ^ *iv_ptr;
            std::ptr::copy_nonoverlapping(tmp_offset_one_ptr, iv_ptr, IV_SIZE_MINUS_ONE);
            if decrypt {
                *iv_end_ptr = orig;
            } else {
                *iv_end_ptr = updated;
            }
            *data_ptr = updated;
            data_ptr = data_ptr.offset(1);
        }
    }
}

pub(crate) fn setup_craft_cipher(
    target: &mut Option<CraftCipher>,
    key: &[u8],
    iv: &[u8],
) -> Result<(), CipherError> {
    if target.is_some() {
        Err(CipherError::AlreadyEnabled)
    } else {
        *target = Some(CraftCipher::new(key, iv)?);
        Ok(())
    }
}