coffio/src/scheme.rs

124 lines
4.4 KiB
Rust
Raw Normal View History

2024-03-02 14:55:14 +01:00
#[cfg(feature = "encryption")]
use crate::encrypted_data::EncryptedData;
#[cfg(feature = "encryption")]
use crate::error::Result;
2024-03-02 14:55:14 +01:00
#[cfg(feature = "encryption")]
2024-02-17 16:29:54 +01:00
use crate::kdf::KdfFunction;
2024-02-15 10:56:21 +01:00
use crate::Error;
#[cfg(feature = "encryption")]
mod aes;
2024-03-02 14:55:14 +01:00
#[cfg(feature = "encryption")]
mod blake3;
2024-03-02 14:55:14 +01:00
#[cfg(feature = "encryption")]
mod sha2;
#[cfg(feature = "encryption")]
mod xchacha20poly1305;
#[cfg(feature = "encryption")]
pub(crate) type DecryptionFunction = dyn Fn(&[u8], &EncryptedData, &str) -> Result<Vec<u8>>;
#[cfg(feature = "encryption")]
pub(crate) type EncryptionFunction = dyn Fn(&[u8], &[u8], &[u8], &str) -> Result<EncryptedData>;
#[cfg(feature = "encryption")]
pub(crate) type GenNonceFunction = dyn Fn() -> Result<Vec<u8>>;
pub(crate) type SchemeSerializeType = u32;
2024-04-05 00:17:01 +02:00
/// The cryptographic primitives used to encrypt the data.
///
/// Coffio does not impose an unique way to encrypt data. You can therefore choose between one of
/// the supported scheme. Each scheme has advantages and drawbacks.
///
/// Before choosing a scheme, you should run the benchmark on the hardware where the encryption and
/// decryption process will take place. Some scheme may have hardware optimizations that you want
/// to take advantage of. Regarding the key length, the following website may help you choose one
/// that suits your requirements: [https://www.keylength.com/](https://www.keylength.com/)
///
/// In the following scheme description, the following terms are used:
/// - `Max data size` describes the maximal size of data that can safely be encrypted using a
/// single key and nonce, which means you should never pass a `data` parameter to
/// [encrypt][crate::CipherBox::encrypt] that has a higher size. Coffio will not enforce this
/// limit, it is your responsibility to do so.
/// - `Max invocations` describes the maximal number of times you can safely call
/// [encrypt][crate::CipherBox::encrypt] with a single key, which means you should either rotate
/// your IKM or use an appropriate key periodicity before reaching this number. Coffio will neither
/// enforce this limit nor count the number of invocations, it is your responsibility to do so.
2024-02-15 10:00:06 +01:00
#[derive(Copy, Clone, Debug, PartialEq)]
pub enum Scheme {
2024-04-05 00:17:01 +02:00
/// `default`
/// - Key derivation: BLAKE3 derive_key mode
/// - Encryption: XChaCha20-Poly1305
/// - Key size: 256 bits
/// - Nonce size: 192 bits
/// - Max data size: 256 GB
/// - Max invocations: no limitation
2024-04-07 11:01:46 +02:00
/// - Resources: [RFC 7539](https://doi.org/10.17487/RFC7539)
2024-04-05 00:17:01 +02:00
/// [draft-irtf-cfrg-xchacha](https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha)
2024-02-15 10:00:06 +01:00
XChaCha20Poly1305WithBlake3 = 1,
2024-04-05 00:17:01 +02:00
/// - Key derivation: HKDF-SHA256
/// - Encryption: AES-GCM
/// - Key size: 128 bits
/// - Nonce size: 96 bits
/// - Max data size: 64 GB
/// - Max invocations: 2<sup>32</sup>
/// - Resources: [NIST SP 800-38D](https://doi.org/10.6028/NIST.SP.800-38D)
Aes128GcmWithSha256 = 2,
2024-02-15 10:00:06 +01:00
}
2024-02-15 23:45:21 +01:00
impl Scheme {
2024-03-02 11:00:59 +01:00
pub(crate) fn get_ikm_size(&self) -> usize {
match self {
Scheme::XChaCha20Poly1305WithBlake3 => 32,
Scheme::Aes128GcmWithSha256 => 32,
2024-03-02 11:00:59 +01:00
}
}
2024-03-16 11:22:08 +01:00
}
2024-03-02 11:00:59 +01:00
2024-03-16 11:22:08 +01:00
#[cfg(feature = "encryption")]
impl Scheme {
2024-02-17 16:29:54 +01:00
pub(crate) fn get_kdf(&self) -> Box<KdfFunction> {
2024-02-15 23:45:21 +01:00
match self {
Scheme::XChaCha20Poly1305WithBlake3 => Box::new(blake3::blake3_derive),
Scheme::Aes128GcmWithSha256 => Box::new(sha2::sha256_derive),
2024-02-15 23:45:21 +01:00
}
}
2024-02-17 20:26:45 +01:00
2024-02-25 13:40:19 +01:00
pub(crate) fn get_decryption(&self) -> Box<DecryptionFunction> {
match self {
Scheme::XChaCha20Poly1305WithBlake3 => {
Box::new(xchacha20poly1305::xchacha20poly1305_decrypt)
2024-02-25 13:40:19 +01:00
}
Scheme::Aes128GcmWithSha256 => Box::new(aes::aes128gcm_decrypt),
2024-02-25 13:40:19 +01:00
}
}
2024-02-17 20:26:45 +01:00
pub(crate) fn get_encryption(&self) -> Box<EncryptionFunction> {
match self {
Scheme::XChaCha20Poly1305WithBlake3 => {
Box::new(xchacha20poly1305::xchacha20poly1305_encrypt)
2024-02-17 20:26:45 +01:00
}
Scheme::Aes128GcmWithSha256 => Box::new(aes::aes128gcm_encrypt),
2024-02-17 20:26:45 +01:00
}
}
pub(crate) fn get_gen_nonce(&self) -> Box<GenNonceFunction> {
match self {
Scheme::XChaCha20Poly1305WithBlake3 => {
Box::new(xchacha20poly1305::xchacha20poly1305_gen_nonce)
}
Scheme::Aes128GcmWithSha256 => Box::new(aes::aes128gcm_gen_nonce),
}
}
2024-02-15 23:45:21 +01:00
}
impl TryFrom<SchemeSerializeType> for Scheme {
2024-02-15 10:56:21 +01:00
type Error = Error;
2024-02-15 10:00:06 +01:00
fn try_from(value: SchemeSerializeType) -> Result<Self, Self::Error> {
2024-02-15 10:00:06 +01:00
match value {
1 => Ok(Scheme::XChaCha20Poly1305WithBlake3),
2 => Ok(Scheme::Aes128GcmWithSha256),
_ => Err(Error::ParsingSchemeUnknownScheme(value)),
2024-02-15 10:00:06 +01:00
}
}
}