Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions .github/workflows/ssh-key.yml
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,9 @@ jobs:
with:
toolchain: ${{ matrix.rust }}
- uses: RustCrypto/actions/cargo-hack-install@master
- run: cargo hack test --feature-powerset --exclude-features default,std
- run: cargo test
- run: cargo hack test --feature-powerset --exclude-features aes-gcm,default,encryption,getrandom,std
- run: cargo test --features aes-gcm
- run: cargo test --features encryption
- run: cargo test --features getrandom
- run: cargo test --features std
- run: cargo test --all-features
63 changes: 63 additions & 0 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions ssh-key/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ zeroize = { version = "1", default-features = false }

# optional dependencies
aes = { version = "0.8", optional = true, default-features = false }
aes-gcm = { version = "0.10", optional = true, default-features = false, features = ["aes"] }
ctr = { version = "0.9", optional = true, default-features = false }
bcrypt-pbkdf = { version = "0.10", optional = true, default-features = false, features = ["alloc"] }
bigint = { package = "num-bigint-dig", version = "0.8", optional = true, default-features = false }
Expand Down Expand Up @@ -61,6 +62,7 @@ std = [
"signature/std"
]

aes-gcm = ["dep:aes-gcm", "encryption"]
dsa = ["dep:bigint", "dep:dsa", "dep:sha1", "alloc", "signature/rand_core"]
ecdsa = ["dep:sec1"]
ed25519 = ["dep:ed25519-dalek", "rand_core"]
Expand Down
74 changes: 63 additions & 11 deletions ssh-key/src/cipher.rs
Original file line number Diff line number Diff line change
Expand Up @@ -12,9 +12,24 @@ use aes::{
Aes256,
};

#[cfg(feature = "aes-gcm")]
use aes_gcm::{aead::AeadInPlace, Aes256Gcm};

/// AES-256 in counter (CTR) mode
const AES256_CTR: &str = "aes256-ctr";

/// AES-256 in Galois/Counter Mode (GCM).
const AES256_GCM: &str = "aes256-gcm@openssh.com";

/// Nonces for AEAD modes.
#[cfg(feature = "aes-gcm")]
type AeadNonce = [u8; 12];

/// Authentication tag for ciphertext data.
///
/// This is used by e.g. `aes256-gcm@openssh.com`
pub(crate) type Tag = [u8; 16];

/// Counter mode with a 32-bit big endian counter.
#[cfg(feature = "encryption")]
type Ctr128BE<Cipher> = ctr::CtrCore<Cipher, ctr::flavors::Ctr128BE>;
Expand All @@ -28,6 +43,9 @@ pub enum Cipher {

/// AES-256 in counter (CTR) mode.
Aes256Ctr,

/// AES-256 in Galois/Counter Mode (GCM).
Aes256Gcm,
}

impl Cipher {
Expand All @@ -39,6 +57,7 @@ impl Cipher {
match ciphername {
"none" => Ok(Self::None),
AES256_CTR => Ok(Self::Aes256Ctr),
AES256_GCM => Ok(Self::Aes256Gcm),
_ => Err(Error::Algorithm),
}
}
Expand All @@ -48,6 +67,7 @@ impl Cipher {
match self {
Self::None => "none",
Self::Aes256Ctr => AES256_CTR,
Self::Aes256Gcm => AES256_GCM,
}
}

Expand All @@ -56,14 +76,15 @@ impl Cipher {
match self {
Self::None => None,
Self::Aes256Ctr => Some((32, 16)),
Self::Aes256Gcm => Some((32, 12)),
}
}

/// Get the block size for this cipher in bytes.
pub fn block_size(self) -> usize {
match self {
Self::None => 8,
Self::Aes256Ctr => 16,
Self::Aes256Ctr | Self::Aes256Gcm => 16,
}
}

Expand All @@ -77,6 +98,11 @@ impl Cipher {
}
}

/// Does this cipher have an authentication tag? (i.e. is it an AEAD mode?)
pub fn has_tag(self) -> bool {
matches!(self, Self::Aes256Gcm)
}

/// Is this cipher `none`?
pub fn is_none(self) -> bool {
self == Self::None
Expand All @@ -89,21 +115,36 @@ impl Cipher {

/// Decrypt the ciphertext in the `buffer` in-place using this cipher.
#[cfg(feature = "encryption")]
pub fn decrypt(self, key: &[u8], iv: &[u8], buffer: &mut [u8]) -> Result<()> {
pub fn decrypt(self, key: &[u8], iv: &[u8], buffer: &mut [u8], tag: Option<Tag>) -> Result<()> {
match self {
Self::None => return Err(Error::Crypto),
// Counter mode encryption and decryption are the same operation
Self::Aes256Ctr => self.encrypt(key, iv, buffer)?,
}
Self::Aes256Ctr => {
if tag.is_some() {
return Err(Error::Crypto);
}

// Counter mode encryption and decryption are the same operation
self.encrypt(key, iv, buffer)?;
Ok(())
}
#[cfg(feature = "aes-gcm")]
Self::Aes256Gcm => {
let cipher = Aes256Gcm::new_from_slice(key).map_err(|_| Error::Crypto)?;
let nonce = AeadNonce::try_from(iv).map_err(|_| Error::Crypto)?;
let tag = tag.ok_or(Error::Crypto)?;
cipher
.decrypt_in_place_detached(&nonce.into(), &[], buffer, &tag.into())
.map_err(|_| Error::Crypto)?;

Ok(())
Ok(())
}
_ => Err(Error::Crypto),
}
}

/// Encrypt the ciphertext in the `buffer` in-place using this cipher.
#[cfg(feature = "encryption")]
pub fn encrypt(self, key: &[u8], iv: &[u8], buffer: &mut [u8]) -> Result<()> {
pub fn encrypt(self, key: &[u8], iv: &[u8], buffer: &mut [u8]) -> Result<Option<Tag>> {
match self {
Self::None => return Err(Error::Crypto),
Self::Aes256Ctr => {
let cipher = Aes256::new_from_slice(key)
.and_then(|aes| Ctr128BE::inner_iv_slice_init(aes, iv))
Expand All @@ -112,10 +153,21 @@ impl Cipher {
cipher
.try_apply_keystream_partial(buffer.into())
.map_err(|_| Error::Crypto)?;

Ok(None)
}
}
#[cfg(feature = "aes-gcm")]
Self::Aes256Gcm => {
let cipher = Aes256Gcm::new_from_slice(key).map_err(|_| Error::Crypto)?;
let nonce = AeadNonce::try_from(iv).map_err(|_| Error::Crypto)?;
let tag = cipher
.encrypt_in_place_detached(&nonce.into(), &[], buffer)
.map_err(|_| Error::Crypto)?;

Ok(())
Ok(Some(tag.into()))
}
_ => Err(Error::Crypto),
}
}
}

Expand Down
Loading