2018-12-30 22:34:31 +00:00
|
|
|
//
|
|
|
|
// PBKDF2 derivation
|
|
|
|
//
|
2020-07-14 16:00:09 +00:00
|
|
|
use std::num::NonZeroU32;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2021-05-25 10:48:57 +00:00
|
|
|
use data_encoding::HEXLOWER;
|
2019-04-26 20:08:26 +00:00
|
|
|
use ring::{digest, hmac, pbkdf2};
|
2020-07-14 16:00:09 +00:00
|
|
|
|
2020-03-16 15:39:20 +00:00
|
|
|
static DIGEST_ALG: pbkdf2::Algorithm = pbkdf2::PBKDF2_HMAC_SHA256;
|
2018-02-10 00:00:55 +00:00
|
|
|
const OUTPUT_LEN: usize = digest::SHA256_OUTPUT_LEN;
|
|
|
|
|
|
|
|
pub fn hash_password(secret: &[u8], salt: &[u8], iterations: u32) -> Vec<u8> {
|
|
|
|
let mut out = vec![0u8; OUTPUT_LEN]; // Initialize array with zeros
|
|
|
|
|
2019-03-09 13:42:16 +00:00
|
|
|
let iterations = NonZeroU32::new(iterations).expect("Iterations can't be zero");
|
2018-02-10 00:00:55 +00:00
|
|
|
pbkdf2::derive(DIGEST_ALG, iterations, salt, secret, &mut out);
|
|
|
|
|
|
|
|
out
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_password_hash(secret: &[u8], salt: &[u8], previous: &[u8], iterations: u32) -> bool {
|
2019-03-09 13:42:16 +00:00
|
|
|
let iterations = NonZeroU32::new(iterations).expect("Iterations can't be zero");
|
2018-02-10 00:00:55 +00:00
|
|
|
pbkdf2::verify(DIGEST_ALG, iterations, salt, secret, previous).is_ok()
|
|
|
|
}
|
|
|
|
|
2019-04-05 20:09:53 +00:00
|
|
|
//
|
|
|
|
// HMAC
|
|
|
|
//
|
2019-04-26 20:08:26 +00:00
|
|
|
pub fn hmac_sign(key: &str, data: &str) -> String {
|
2020-03-16 15:39:20 +00:00
|
|
|
let key = hmac::Key::new(hmac::HMAC_SHA1_FOR_LEGACY_USE_ONLY, key.as_bytes());
|
2019-04-05 20:09:53 +00:00
|
|
|
let signature = hmac::sign(&key, data.as_bytes());
|
|
|
|
|
|
|
|
HEXLOWER.encode(signature.as_ref())
|
|
|
|
}
|
|
|
|
|
2018-12-30 22:34:31 +00:00
|
|
|
//
|
|
|
|
// Random values
|
|
|
|
//
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
pub fn get_random_64() -> Vec<u8> {
|
|
|
|
get_random(vec![0u8; 64])
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn get_random(mut array: Vec<u8>) -> Vec<u8> {
|
|
|
|
use ring::rand::{SecureRandom, SystemRandom};
|
|
|
|
|
2021-04-06 20:54:42 +00:00
|
|
|
SystemRandom::new().fill(&mut array).expect("Error generating random values");
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
array
|
|
|
|
}
|
2019-02-11 22:45:55 +00:00
|
|
|
|
2022-01-19 10:51:26 +00:00
|
|
|
/// Generates a random string over a specified alphabet.
|
|
|
|
pub fn get_random_string(alphabet: &[u8], num_chars: usize) -> String {
|
|
|
|
// Ref: https://rust-lang-nursery.github.io/rust-cookbook/algorithms/randomness.html
|
|
|
|
use rand::Rng;
|
|
|
|
let mut rng = rand::thread_rng();
|
|
|
|
|
|
|
|
(0..num_chars)
|
|
|
|
.map(|_| {
|
|
|
|
let i = rng.gen_range(0..alphabet.len());
|
|
|
|
alphabet[i] as char
|
|
|
|
})
|
|
|
|
.collect()
|
|
|
|
}
|
|
|
|
|
2022-01-24 09:17:00 +00:00
|
|
|
/// Generates a random numeric string.
|
|
|
|
pub fn get_random_string_numeric(num_chars: usize) -> String {
|
|
|
|
const ALPHABET: &[u8] = b"0123456789";
|
|
|
|
get_random_string(ALPHABET, num_chars)
|
|
|
|
}
|
|
|
|
|
2022-01-19 10:51:26 +00:00
|
|
|
/// Generates a random alphanumeric string.
|
|
|
|
pub fn get_random_string_alphanum(num_chars: usize) -> String {
|
|
|
|
const ALPHABET: &[u8] = b"ABCDEFGHIJKLMNOPQRSTUVWXYZ\
|
|
|
|
abcdefghijklmnopqrstuvwxyz\
|
|
|
|
0123456789";
|
|
|
|
get_random_string(ALPHABET, num_chars)
|
|
|
|
}
|
|
|
|
|
2021-05-26 06:15:24 +00:00
|
|
|
pub fn generate_id(num_bytes: usize) -> String {
|
|
|
|
HEXLOWER.encode(&get_random(vec![0; num_bytes]))
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_send_id() -> String {
|
|
|
|
// Send IDs are globally scoped, so make them longer to avoid collisions.
|
|
|
|
generate_id(32) // 256 bits
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_attachment_id() -> String {
|
|
|
|
// Attachment IDs are scoped to a cipher, so they can be smaller.
|
|
|
|
generate_id(10) // 80 bits
|
2021-05-25 10:48:57 +00:00
|
|
|
}
|
|
|
|
|
2022-01-24 09:17:00 +00:00
|
|
|
/// Generates a numeric token for email-based verifications.
|
|
|
|
pub fn generate_email_token(token_size: u8) -> String {
|
|
|
|
get_random_string_numeric(token_size as usize)
|
2019-11-25 05:28:49 +00:00
|
|
|
}
|
|
|
|
|
2022-01-19 10:51:26 +00:00
|
|
|
/// Generates a personal API key.
|
|
|
|
/// Upstream uses 30 chars, which is ~178 bits of entropy.
|
|
|
|
pub fn generate_api_key() -> String {
|
|
|
|
get_random_string_alphanum(30)
|
|
|
|
}
|
|
|
|
|
2019-02-11 22:45:55 +00:00
|
|
|
//
|
|
|
|
// Constant time compare
|
|
|
|
//
|
|
|
|
pub fn ct_eq<T: AsRef<[u8]>, U: AsRef<[u8]>>(a: T, b: U) -> bool {
|
|
|
|
use ring::constant_time::verify_slices_are_equal;
|
|
|
|
|
|
|
|
verify_slices_are_equal(a.as_ref(), b.as_ref()).is_ok()
|
|
|
|
}
|