|
|
@ -31,7 +31,7 @@ impl Encoder { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// TODO: error type
|
|
|
|
// TODO: error type
|
|
|
|
pub fn encrypt(&self, plain_text: &String) -> String { |
|
|
|
pub fn encrypt(&self, plain_text: &String) -> io::Result<String> { |
|
|
|
let key = Key::<Aes256Gcm>::from_slice(self.passphrase.as_bytes());
|
|
|
|
let key = Key::<Aes256Gcm>::from_slice(self.passphrase.as_bytes());
|
|
|
|
let nonce = Aes256Gcm::generate_nonce(&mut OsRng); |
|
|
|
let nonce = Aes256Gcm::generate_nonce(&mut OsRng); |
|
|
|
|
|
|
|
|
|
|
@ -39,49 +39,56 @@ impl Encoder { |
|
|
|
|
|
|
|
|
|
|
|
// TODO: mar error inted of expect
|
|
|
|
// TODO: mar error inted of expect
|
|
|
|
let ciphered_data = cipher.encrypt(&nonce, plain_text.as_bytes()) |
|
|
|
let ciphered_data = cipher.encrypt(&nonce, plain_text.as_bytes()) |
|
|
|
.expect("failed to encrypt"); |
|
|
|
.map_err(|_| io::Error::new( |
|
|
|
|
|
|
|
io::ErrorKind::Other, |
|
|
|
|
|
|
|
"Failed to encrypt" |
|
|
|
|
|
|
|
))?; |
|
|
|
|
|
|
|
|
|
|
|
// combining nonce and encrypted data together
|
|
|
|
// combining nonce and encrypted data together
|
|
|
|
// for storage purpose
|
|
|
|
// for storage purpose
|
|
|
|
let mut encrypted_data: Vec<u8> = nonce.to_vec(); |
|
|
|
let mut encrypted_data: Vec<u8> = nonce.to_vec(); |
|
|
|
encrypted_data.extend_from_slice(&ciphered_data); |
|
|
|
encrypted_data.extend_from_slice(&ciphered_data); |
|
|
|
|
|
|
|
|
|
|
|
hex::encode(encrypted_data) |
|
|
|
Ok(hex::encode(encrypted_data)) |
|
|
|
|
|
|
|
|
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// TODO: review error type
|
|
|
|
// TODO: review error type
|
|
|
|
pub fn decrypt(&self, encrypted_data: String) -> io::Result<String> { |
|
|
|
pub fn decrypt(&self, encrypted_data: String) -> io::Result<String> { |
|
|
|
let encrypted_data = hex::decode(encrypted_data) |
|
|
|
let encrypted_data = hex::decode(encrypted_data) |
|
|
|
.expect("failed to decode hex string into vec"); |
|
|
|
.map_err(|_| io::Error::new( |
|
|
|
|
|
|
|
io::ErrorKind::Other, |
|
|
|
|
|
|
|
"failed to decode hex string into vec" |
|
|
|
|
|
|
|
))?; |
|
|
|
|
|
|
|
|
|
|
|
let key = Key::<Aes256Gcm>::from_slice(self.passphrase.as_bytes()); |
|
|
|
let key = Key::<Aes256Gcm>::from_slice(self.passphrase.as_bytes()); |
|
|
|
|
|
|
|
|
|
|
|
let (nonce_arr, ciphered_data) = encrypted_data.split_at(12); |
|
|
|
let (nonce_arr, ciphered_data) = encrypted_data.split_at(12); |
|
|
|
let nonce = Nonce::from_slice(nonce_arr); |
|
|
|
let nonce = Nonce::from_slice(nonce_arr); |
|
|
|
|
|
|
|
|
|
|
|
let cipher = Aes256Gcm::new(key); |
|
|
|
let cipher = Aes256Gcm::new(key); |
|
|
|
|
|
|
|
|
|
|
|
let plaintext = cipher.decrypt(nonce, ciphered_data) |
|
|
|
let plaintext = cipher.decrypt(nonce, ciphered_data) |
|
|
|
.expect("failed to decrypt data"); |
|
|
|
.map_err(|_| io::Error::new( |
|
|
|
|
|
|
|
io::ErrorKind::InvalidData, |
|
|
|
|
|
|
|
"failed to decrypt data" |
|
|
|
|
|
|
|
))?; |
|
|
|
|
|
|
|
|
|
|
|
let result = String::from_utf8(plaintext) |
|
|
|
let result = String::from_utf8(plaintext) |
|
|
|
.expect("failed to convert vector of bytes to string"); |
|
|
|
.map_err(|_| io::Error::new( |
|
|
|
|
|
|
|
io::ErrorKind::InvalidData, |
|
|
|
//.map_err(|e| io::Error::new(io::ErrorKind::InvalidData, e))?;
|
|
|
|
"failed to convert vector of bytes to string" |
|
|
|
//match String::from_utf8(content) {
|
|
|
|
))?; |
|
|
|
// Ok(s) => Ok(s),
|
|
|
|
|
|
|
|
// Err(e) => Err(io::Error::new(io::ErrorKind::InvalidData, e))
|
|
|
|
|
|
|
|
//}
|
|
|
|
|
|
|
|
Ok(result) |
|
|
|
Ok(result) |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
pub fn test_encoded_passphrase(&self, passphrase_encrypted: String) -> io::Result<bool> { |
|
|
|
pub fn test_encoded_passphrase(&self, passphrase_encrypted: String) -> io::Result<bool> { |
|
|
|
let decrypted = self.decrypt(passphrase_encrypted)?; |
|
|
|
// TODO: better way to check error
|
|
|
|
|
|
|
|
let decrypted = match self.decrypt(passphrase_encrypted) { |
|
|
|
|
|
|
|
Ok(decrypted) => decrypted, |
|
|
|
|
|
|
|
Err(_) => return Ok(false) |
|
|
|
|
|
|
|
}; |
|
|
|
Ok(PASSWORD_TEST == decrypted) |
|
|
|
Ok(PASSWORD_TEST == decrypted) |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
pub fn get_encoded_test_passphrase(&self) -> String { |
|
|
|
pub fn get_encoded_test_passphrase(&self) -> io::Result<String> { |
|
|
|
self.encrypt(&PASSWORD_TEST.to_string()) |
|
|
|
self.encrypt(&PASSWORD_TEST.to_string()) |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|