Skip to content

Commit b415cf6

Browse files
author
Andreas Auernhammer
committed
implement close-semantic for EncWriter / DecWriter
This commit implements the close-semantic for `EncWriter` and `DecWriter` such that both implement the internal `Close` trait but not the public/exported `Close` trait. Instead both provide a `close(mut self)` method that has the same semantics as the `close` method defined by (both) `Close` traits but takes ownership of the `EncWriter` / `DecWriter`. Further any type (`std::io::Write`) that should be wrapped with an `EncWriter` / `DecWriter` must implement the (internal) `Close` trait. Since this is not possible (the trait is private), we implement the internal `Close` trait for any type that implements the public/exported `Close` trait. For further details see issue: #17. Further this commit adds the `NopCloser` type that can wrap any `std::io::Write` and implements `Close`. This commit also adds some documentation. Update #17
1 parent f7928b0 commit b415cf6

File tree

4 files changed

+355
-123
lines changed

4 files changed

+355
-123
lines changed

src/lib.rs

+31-26
Original file line numberDiff line numberDiff line change
@@ -48,23 +48,20 @@
4848
//!
4949
//! There is also an optional fourth parameter (buffer/fragment size) which we will cover later.
5050
//!
51-
//! Now, there are two important rules you have to ensure are never violated by your code:
52-
//! 1. **Correctness:**
53-
//! The parameters (`key'`, `nonce'` `aad'`) for decryption must match exactly the parameters
54-
//! (`key`, `nonce` `aad`) used when encrypting the data.
55-
//! 2. **Freshness:**
56-
//! When encrypting a data stream, you must use a new `key` **or** a new `nonce` value that
57-
//! has **never** been used before.
58-
//!
59-
//! The 1st rule is pretty obvious. If you, for example, use different keys for encryption and
60-
//! decryption then the decryption will fail. The same applies to the nonce and associated data.
61-
//!
62-
//! The 2nd rule may be less obvious but it is at least as important as the 1st one since security
63-
//! crucially depends on it. In general, the authenticated encryption algorithm (used by the
64-
//! channel construction) assumes that, given the same key, the nonce value does never repeat.
65-
//! Violating this assumption breaks the security properties and potentially allows decrypting
66-
//! or forging data without knowing the secret key. But don't worry, there are best practices for
67-
//! dealing with keys and nonce values which can help here.
51+
//! Now, there is one important rule that must never be violated by your code since security
52+
//! crucially depends on it:
53+
//! <p style="margin-left: 40px; margin-right: 50px; border:1px; border-style:solid; border-color:#000000; padding: 0.3em">
54+
//! When encrypting a data stream you must use a new <code>key</code> <b>or</b> a new
55+
//! <code>nonce</code> value such that this particular <code>key</code>-<code>nonce</code>
56+
//! combination has <b>never</b> been used before.
57+
//! </p>
58+
//!
59+
//! In general, the authenticated encryption algorithm (used by the channel construction) assumes
60+
//! that, given the same key, the nonce value does never repeat. Violating this assumption breaks
61+
//! the security properties and potentially allows decrypting or forging data without knowing the
62+
//! secret key. Therefore, you have to make sure that you use a key-nonce combination only once.
63+
//! But don't worry, there are best practices for dealing with keys and nonce values which can help
64+
//! here.
6865
//!
6966
//! Next, we will take a look at some examples for encryption and decryption.
7067
//!
@@ -76,14 +73,14 @@
7673
//! use std::io;
7774
//! use std::io::Write;
7875
//! use std::fs::File;
79-
//! use sio::{EncWriter, Key, Nonce, Aad, AES_256_GCM, Close};
76+
//! use sio::{EncWriter, Key, Nonce, Aad, AES_256_GCM, NopCloser};
8077
//!
8178
//! fn main() -> io::Result<()> {
8279
//! // Obviously, do NOT use this demo key for anything real!
8380
//! let secret_key: Key::<AES_256_GCM> = Key::new([0; Key::<AES_256_GCM>::SIZE]);
8481
//!
8582
//! let mut f = EncWriter::new(
86-
//! File::create("foo.txt")?,
83+
//! NopCloser::wrap(File::create("foo.txt")?),
8784
//! &secret_key,
8885
//! Nonce::new([0; Nonce::<AES_256_GCM>::SIZE]),
8986
//! Aad::empty(),
@@ -96,26 +93,26 @@
9693
//! Here, we try to create and wrap the file `foo.txt` and encrypt the string
9794
//! `"Hello World"` using the [`AES_256_GCM`](https://en.wikipedia.org/wiki/Galois/Counter_Mode)
9895
//! algorithm before writing it to the file. Note that we call a `close` method
99-
//! after writing. This is *very important* and you should take a look at the
100-
//! `Close` trait for a detailed explanation.
96+
//! after writing. This is very important and you should take a look at the
97+
//! `Close` trait for a detailed explanation about why this call is necessary.
10198
//!
10299
//! # Decryption
103100
//!
104-
//! Similarly, you can decrypt data by wrapping a writer with a `DecWriter`. The `DecWriter`
105-
//! is also generic over an authenticated encryption algorithm and expects the same
106-
//! `Key`, `Nonce` and `Aad` used to encrypt the data.
101+
//! Similarly, you can decrypt data by using a `DecWriter` instead of an `EncWriter`. The
102+
//! `DecWriter` is also generic over an authenticated encryption algorithm and expects the
103+
//! same `Key`, `Nonce` and `Aad` used before to encrypt the data.
107104
//! ```norun
108105
//! use std::io;
109106
//! use std::io::{Read, Write};
110107
//! use std::fs::File;
111-
//! use sio::{DecWriter, Key, Nonce, Aad, AES_256_GCM, Close};
108+
//! use sio::{DecWriter, Key, Nonce, Aad, AES_256_GCM, NopCloser};
112109
//!
113110
//! fn main() -> io::Result<()> {
114111
//! // Obviously, do NOT use this demo key for anything real!
115112
//! let secret_key: Key::<AES_256_GCM> = Key::new([0; Key::<AES_256_GCM>::SIZE]);
116113
//!
117114
//! let mut out = DecWriter::new(
118-
//! io::stdout(),
115+
//! NopCloser::wrap(io::stdout()),
119116
//! &secret_key,
120117
//! Nonce::new([0; Nonce::<AES_256_GCM>::SIZE]),
121118
//! Aad::empty(),
@@ -124,13 +121,21 @@
124121
//! io::copy(&mut File::open("foo.txt")?, &mut out)?;
125122
//! out.close()
126123
//! }
124+
//! ```
125+
//! Here, we wrap the standard output file descriptor (STDOUT) with a `DecWriter`
126+
//! such that everything written to `out` gets decrypted and verified before passed to
127+
//! STDOUT. Than, we open the `foo.txt` file again and copy its content to `out`. Observe
128+
//! that we invoke a `close` method at the end again. Refer to the `Close` trait for an
129+
//! explanation about why this call is necessary.
127130
128131
pub use self::aead::{Aad, Algorithm, Key, Nonce};
129132
pub use self::error::{Invalid, NotAuthentic};
133+
pub use self::utils::NopCloser;
130134
pub use self::writer::{Close, DecWriter, EncWriter};
131135

132136
mod aead;
133137
mod error;
138+
mod utils;
134139
mod writer;
135140

136141
#[cfg(feature = "ring")]

src/utils.rs

+136
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
use super::writer::Close;
2+
use std::io;
3+
use std::io::Write;
4+
5+
impl<T: Close + ?Sized> Close for &mut T {
6+
#[inline(always)]
7+
fn close(&mut self) -> io::Result<()> {
8+
Close::close(*self)
9+
}
10+
}
11+
12+
impl Close for Vec<u8> {
13+
#[inline(always)]
14+
fn close(&mut self) -> io::Result<()> {
15+
self.flush()
16+
}
17+
}
18+
19+
impl Close for io::Sink {
20+
#[inline(always)]
21+
fn close(&mut self) -> io::Result<()> {
22+
self.flush()
23+
}
24+
}
25+
26+
impl<W: Close + ?Sized> Close for Box<W> {
27+
#[inline(always)]
28+
fn close(&mut self) -> io::Result<()> {
29+
self.as_mut().close()
30+
}
31+
}
32+
33+
impl<W: Write + Close> Close for io::BufWriter<W> {
34+
#[inline]
35+
fn close(&mut self) -> io::Result<()> {
36+
self.flush().and_then(|_| self.get_mut().close())
37+
}
38+
}
39+
40+
impl<W: Write + Close> Close for io::LineWriter<W> {
41+
#[inline]
42+
fn close(&mut self) -> io::Result<()> {
43+
self.flush().and_then(|_| self.get_mut().close())
44+
}
45+
}
46+
47+
/// NopCloser wraps a writer and implements the `Close` trait by
48+
/// performing a `flush` when the `close` method is called. It should
49+
/// only be used to wrap a writer which does not implement the `Close`
50+
/// trait.
51+
///
52+
/// # Examples
53+
///
54+
/// ```
55+
/// use std::{io, io::Write};
56+
/// use sio::{Key, Nonce, Aad, EncWriter, AES_256_GCM, NopCloser};
57+
///
58+
/// // Load your secret keys from a secure location or derive
59+
/// // them using a secure (password-based) key-derivation-function, like Argon2id.
60+
/// // Obviously, don't use this all-zeros key for anything real.
61+
/// let key: Key<AES_256_GCM> = Key::new([0; Key::<AES_256_GCM>::SIZE]);
62+
///
63+
/// // Make sure you use an unique key-nonce combination!
64+
/// // Reusing a nonce value for the same secret key breaks
65+
/// // the security of the encryption algorithm.
66+
/// let nonce = Nonce::new([0; Nonce::<AES_256_GCM>::SIZE]);
67+
///
68+
/// // You must be able to re-generate this aad to decrypt
69+
/// // the ciphertext again. Usually, it's stored together with
70+
/// // the encrypted data.
71+
/// let aad = Aad::from("Some authenticated but not encrypted data".as_bytes());
72+
///
73+
/// let plaintext = "Some example plaintext".as_bytes();
74+
///
75+
/// let mut ciphertext: Vec<u8> = Vec::default(); // Store the ciphertext in memory.
76+
/// let mut writer = EncWriter::new(
77+
/// NopCloser::wrap(io::stdout()), // Without wrapping STDOUT the code would not compile.
78+
/// &key,
79+
/// nonce,
80+
/// aad,
81+
/// );
82+
///
83+
/// writer.write_all(plaintext).expect("There could be your error handling");
84+
///
85+
/// // Complete the encryption process explicitly.
86+
/// writer.close().expect("There could be your error handling");
87+
/// ```
88+
pub struct NopCloser<W: Write>(W);
89+
90+
impl<W: Write> NopCloser<W> {
91+
/// Wraps a writer.
92+
#[inline(always)]
93+
pub fn wrap(w: W) -> Self {
94+
Self(w)
95+
}
96+
}
97+
98+
impl<W: Write> From<W> for NopCloser<W> {
99+
#[inline(always)]
100+
fn from(w: W) -> Self {
101+
Self::wrap(w)
102+
}
103+
}
104+
105+
impl<W: Write> Write for NopCloser<W> {
106+
#[inline(always)]
107+
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
108+
self.0.write(buf)
109+
}
110+
111+
#[inline(always)]
112+
fn flush(&mut self) -> io::Result<()> {
113+
self.0.flush()
114+
}
115+
}
116+
117+
impl<W: Write> Close for NopCloser<W> {
118+
#[inline(always)]
119+
fn close(&mut self) -> io::Result<()> {
120+
self.flush()
121+
}
122+
}
123+
124+
impl<W: Write> AsRef<W> for NopCloser<W> {
125+
#[inline(always)]
126+
fn as_ref(&self) -> &W {
127+
&self.0
128+
}
129+
}
130+
131+
impl<W: Write> AsMut<W> for NopCloser<W> {
132+
#[inline(always)]
133+
fn as_mut(&mut self) -> &mut W {
134+
&mut self.0
135+
}
136+
}

0 commit comments

Comments
 (0)