From 7c1e21403fa813877b943bb796a675d5cbd4d7c2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Johannes=20L=C3=B6thberg?= Date: Mon, 8 May 2023 17:02:29 +0200 Subject: [PATCH] Wrap AesCtrZipKeyStream in inner Cipher enum MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Boxing it as we were doing previously lead to the writer not being Send anymore. Signed-off-by: Johannes Löthberg --- src/aes.rs | 50 +++++++++++++++++++++++++++++++++++--------------- 1 file changed, 35 insertions(+), 15 deletions(-) diff --git a/src/aes.rs b/src/aes.rs index 985a3bbc..b28df02e 100644 --- a/src/aes.rs +++ b/src/aes.rs @@ -5,6 +5,7 @@ //! If the file is marked as encrypted with AE-2 the CRC field is ignored, even if it isn't set to 0. use crate::aes_ctr; +use crate::aes_ctr::AesCipher; use crate::types::AesMode; use constant_time_eq::constant_time_eq; use hmac::{Hmac, Mac}; @@ -18,19 +19,38 @@ const AUTH_CODE_LENGTH: usize = 10; /// The number of iterations used with PBKDF2 const ITERATION_COUNT: u32 = 1000; -/// Create a AesCipher depending on the used `AesMode` and the given `key`. -/// -/// # Panics -/// -/// This panics if `key` doesn't have the correct size for the chosen aes mode. -fn cipher_from_mode(aes_mode: AesMode, key: &[u8]) -> Box { - match aes_mode { - AesMode::Aes128 => Box::new(aes_ctr::AesCtrZipKeyStream::::new(key)) - as Box, - AesMode::Aes192 => Box::new(aes_ctr::AesCtrZipKeyStream::::new(key)) - as Box, - AesMode::Aes256 => Box::new(aes_ctr::AesCtrZipKeyStream::::new(key)) - as Box, +enum Cipher { + Aes128(Box>), + Aes192(Box>), + Aes256(Box>), +} + +impl Cipher { + /// Create a `Cipher` depending on the used `AesMode` and the given `key`. + /// + /// # Panics + /// + /// This panics if `key` doesn't have the correct size for the chosen aes mode. + fn from_mode(aes_mode: AesMode, key: &[u8]) -> Self { + match aes_mode { + AesMode::Aes128 => Cipher::Aes128(Box::new(aes_ctr::AesCtrZipKeyStream::< + aes_ctr::Aes128, + >::new(key))), + AesMode::Aes192 => Cipher::Aes192(Box::new(aes_ctr::AesCtrZipKeyStream::< + aes_ctr::Aes192, + >::new(key))), + AesMode::Aes256 => Cipher::Aes256(Box::new(aes_ctr::AesCtrZipKeyStream::< + aes_ctr::Aes256, + >::new(key))), + } + } + + fn crypt_in_place(&mut self, target: &mut [u8]) { + match self { + Self::Aes128(cipher) => cipher.crypt_in_place(target), + Self::Aes192(cipher) => cipher.crypt_in_place(target), + Self::Aes256(cipher) => cipher.crypt_in_place(target), + } } } @@ -96,7 +116,7 @@ impl AesReader { return Ok(None); } - let cipher = cipher_from_mode(self.aes_mode, decrypt_key); + let cipher = Cipher::from_mode(self.aes_mode, decrypt_key); let hmac = Hmac::::new_from_slice(hmac_key).unwrap(); Ok(Some(AesReaderValid { @@ -117,7 +137,7 @@ impl AesReader { pub struct AesReaderValid { reader: R, data_remaining: u64, - cipher: Box, + cipher: Cipher, hmac: Hmac, finalized: bool, }