ddblocal/src/encryption.zig

180 lines
7.8 KiB
Zig
Raw Normal View History

2024-01-29 18:27:25 +00:00
const std = @import("std");
const pbkdf2_iterations = 1000000; // https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pbkdf2
pub const salt_length = 256 / 8; // https://crypto.stackexchange.com/a/56132
pub const encoded_salt_length = std.base64.standard.Encoder.calcSize(salt_length);
pub const key_length = std.crypto.aead.salsa_poly.XSalsa20Poly1305.key_length;
pub const encoded_key_length = std.base64.standard.Encoder.calcSize(key_length);
/// Generates a random salt of appropriate length
pub fn randomSalt(salt: *[salt_length]u8) void {
std.crypto.random.bytes(salt);
}
/// Generates a random salt of appropriate length, encoded into ASCII
pub fn randomEncodedSalt(encoded_salt: *[encoded_salt_length]u8) void {
var salt: [salt_length]u8 = undefined;
randomSalt(salt[0..]);
_ = std.base64.standard.Encoder.encode(encoded_salt, salt[0..]);
}
/// Generates a random key of appropriate length
pub fn randomKey(key: *[key_length]u8) void {
std.crypto.random.bytes(key);
}
/// Generates a random key of appropriate length, encoded into ASCII
pub fn randomEncodedKey(encoded_key: *[encoded_key_length]u8) void {
var key: [key_length]u8 = undefined;
randomKey(key[0..]);
_ = std.base64.standard.Encoder.encode(encoded_key, key[0..]);
}
/// Decodes key from encoded version
pub fn decodeKey(key: *[key_length]u8, encoded_key: [encoded_key_length]u8) !void {
try std.base64.standard.Decoder.decode(key, encoded_key[0..]);
}
// Derives key bytes given a plain text password and salt. It is recommended
// to use randomSalt to generate a salt - for storage, recommend a suitable ASCII encoding
pub fn deriveKey(derived_key: *[key_length]u8, password: []const u8, salt: []const u8) !void {
// Derive key using PBKDF2
try std.crypto.pwhash.pbkdf2(derived_key[0..], password, salt, pbkdf2_iterations, std.crypto.auth.hmac.sha2.HmacSha256);
}
// Derives key bytes given a plain text password and ascii encoded salt.
// Enables encryption with a single line of code, e.g.
// data = try encrypt(allocator, try deriveKeyFromEncodedSalt(password, salt), message);
//
// and decryption with:
//
// message = try decrypt(allocator, try deriveKeyFromEncodedSalt(password, salt) data);
pub fn deriveKeyFromEncodedSalt(derived_key: *[key_length]u8, password: []const u8, encoded_salt: []const u8) ![key_length]u8 {
var salt: [salt_length]u8 = undefined;
try std.base64.standard.Decoder.decode(&salt, encoded_salt);
try deriveKey(derived_key, password, salt[0..]);
return derived_key.*;
}
/// Encrypts data. Use deriveKey function to get a key from password/salt
/// Caller owns memory
pub fn encrypt(allocator: std.mem.Allocator, key: [key_length]u8, plaintext: []const u8) ![]const u8 {
var ciphertext = try allocator.alloc(
u8,
std.crypto.aead.salsa_poly.XSalsa20Poly1305.nonce_length + std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length + plaintext.len,
);
errdefer allocator.free(ciphertext);
// Create the nonce
const nonce_length = std.crypto.aead.salsa_poly.XSalsa20Poly1305.nonce_length;
std.crypto.random.bytes(ciphertext[0..nonce_length]); // add nonce to beginning of our ciphertext
const nonce = ciphertext[0..nonce_length];
const tag = ciphertext[nonce_length .. nonce_length + std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length];
const c = ciphertext[nonce_length + std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length ..];
// Do the encryption
std.crypto.aead.salsa_poly.XSalsa20Poly1305.encrypt(
c,
tag,
plaintext,
"ad",
nonce.*,
key,
);
return ciphertext;
}
/// Encrypts data. Use deriveKey function to get a key from password/salt
/// Caller owns memory
pub fn encryptAndEncode(allocator: std.mem.Allocator, key: [key_length]u8, plaintext: []const u8) ![]const u8 {
const ciphertext = try encrypt(allocator, key, plaintext);
defer allocator.free(ciphertext);
const Encoder = std.base64.standard.Encoder;
var encoded_ciphertext = try allocator.alloc(u8, Encoder.calcSize(ciphertext.len));
errdefer allocator.free(encoded_ciphertext);
return Encoder.encode(encoded_ciphertext, ciphertext);
}
/// Decrypts data. Use deriveKey function to get a key from password/salt
pub fn decrypt(allocator: std.mem.Allocator, key: [key_length]u8, ciphertext: []const u8) ![]const u8 {
var plaintext = try allocator.alloc(
u8,
ciphertext.len - std.crypto.aead.salsa_poly.XSalsa20Poly1305.nonce_length - std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length,
);
errdefer allocator.free(plaintext);
const nonce_length = std.crypto.aead.salsa_poly.XSalsa20Poly1305.nonce_length;
const nonce = ciphertext[0..nonce_length].*;
const tag = ciphertext[nonce_length .. nonce_length + std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length].*;
const c = ciphertext[nonce_length + std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length ..];
try std.crypto.aead.salsa_poly.XSalsa20Poly1305.decrypt(
plaintext,
c,
tag,
"ad",
nonce,
key,
);
return plaintext;
}
// This is a pretty long running test...
// test "can encrypt and decrypt data with simpler api" {
// const allocator = std.testing.allocator;
// const plaintext = "Hello, Zig!";
// const password = "mySecurePassword";
// var key: [key_length]u8 = undefined;
// var salt: [encoded_salt_length]u8 = undefined;
// randomEncodedSalt(salt[0..]);
//
// const ciphertext = try encrypt(allocator, try deriveKeyFromEncodedSalt(&key, password, salt[0..]), plaintext);
// defer allocator.free(ciphertext);
// std.log.debug("Ciphertext: {s}\n", .{std.fmt.fmtSliceHexLower(ciphertext)});
// const decrypted_text = try decrypt(allocator, key, ciphertext);
// defer allocator.free(decrypted_text);
// try std.testing.expectEqualStrings(plaintext, decrypted_text[0..]);
// }
test "can encrypt and decrypt data with simpler api but without KDF" {
const allocator = std.testing.allocator;
const plaintext = "Hello, Zig!";
var key: [key_length]u8 = undefined;
var encoded_key: [encoded_key_length]u8 = undefined;
randomEncodedKey(encoded_key[0..]);
// std.testing.log_level = .debug;
std.log.debug("Encoded key: {s}", .{encoded_key});
try decodeKey(&key, encoded_key);
const ciphertext = try encrypt(allocator, key, plaintext);
defer allocator.free(ciphertext);
std.log.debug("Ciphertext: {s}\n", .{std.fmt.fmtSliceHexLower(ciphertext)});
const decrypted_text = try decrypt(allocator, key, ciphertext);
defer allocator.free(decrypted_text);
try std.testing.expectEqualStrings(plaintext, decrypted_text[0..]);
}
// test "can encrypt and decrypt data" {
// var tag: [std.crypto.aead.salsa_poly.XSalsa20Poly1305.tag_length]u8 = undefined;
// const password = "mySecurePassword";
//
// var salt: [salt_length]u8 = undefined;
// randomSalt(salt[0..]);
//
// // Derive key using PBKDF2
// var derived_key: [std.crypto.aead.salsa_poly.XSalsa20Poly1305.key_length]u8 = undefined;
// try std.crypto.pwhash.pbkdf2(&derived_key, password, &salt, pbkdf2_iterations, std.crypto.auth.hmac.sha2.HmacSha256);
//
// var nonce: [std.crypto.aead.salsa_poly.XSalsa20Poly1305.nonce_length]u8 = undefined;
// std.crypto.random.bytes(&nonce);
//
// const plaintext = "Hello, Zig!";
// var ciphertext = [_]u8{0} ** plaintext.len;
// std.crypto.aead.salsa_poly.XSalsa20Poly1305.encrypt(ciphertext[0..], &tag, plaintext, "", nonce, derived_key);
// var decrypted_text = [_]u8{0} ** ciphertext.len;
// try std.crypto.aead.salsa_poly.XSalsa20Poly1305.decrypt(&decrypted_text, ciphertext[0..], tag, "", nonce, derived_key);
//
// std.log.debug("Ciphertext: {s}\n", .{std.fmt.fmtSliceHexLower(&ciphertext)});
//
// try std.testing.expectEqualStrings(plaintext, decrypted_text[0..]);
// }