1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
use aes::{
cipher::{generic_array::GenericArray, IvSizeUser, KeySizeUser},
Aes256,
};
use hkdf::Hkdf;
use sha2::Sha256;
use zeroize::Zeroize;
use super::Aes256CbcEnc;
type Aes256Key = GenericArray<u8, <Aes256 as KeySizeUser>::KeySize>;
type Aes256Iv = GenericArray<u8, <Aes256CbcEnc as IvSizeUser>::IvSize>;
type HmacSha256Key = [u8; 32];
#[derive(Zeroize)]
#[zeroize(drop)]
struct ExpandedKeys(Box<[u8; 80]>);
impl ExpandedKeys {
const OLM_HKDF_INFO: &'static [u8] = b"OLM_KEYS";
const MEGOLM_HKDF_INFO: &'static [u8] = b"MEGOLM_KEYS";
fn new(message_key: &[u8; 32]) -> Self {
Self::new_helper(message_key, Self::OLM_HKDF_INFO)
}
fn new_megolm(message_key: &[u8; 128]) -> Self {
Self::new_helper(message_key, Self::MEGOLM_HKDF_INFO)
}
#[cfg(feature = "libolm-compat")]
fn new_pickle(pickle_key: &[u8]) -> Self {
Self::new_helper(pickle_key, b"Pickle")
}
fn new_helper(message_key: &[u8], info: &[u8]) -> Self {
let mut expanded_keys = [0u8; 80];
let hkdf: Hkdf<Sha256> = Hkdf::new(Some(&[0]), message_key);
hkdf.expand(info, &mut expanded_keys).expect("Can't expand message key");
Self(Box::new(expanded_keys))
}
}
#[derive(Zeroize)]
#[zeroize(drop)]
pub(super) struct CipherKeys {
aes_key: Box<[u8; 32]>,
aes_iv: Box<[u8; 16]>,
mac_key: Box<[u8; 32]>,
}
impl CipherKeys {
pub fn new(message_key: &[u8; 32]) -> Self {
let expanded_keys = ExpandedKeys::new(message_key);
Self::from_expanded_keys(expanded_keys)
}
pub fn new_megolm(message_key: &[u8; 128]) -> Self {
let expanded_keys = ExpandedKeys::new_megolm(message_key);
Self::from_expanded_keys(expanded_keys)
}
#[cfg(feature = "libolm-compat")]
pub fn new_pickle(pickle_key: &[u8]) -> Self {
let expanded_keys = ExpandedKeys::new_pickle(pickle_key);
Self::from_expanded_keys(expanded_keys)
}
fn from_expanded_keys(expanded_keys: ExpandedKeys) -> Self {
let mut aes_key = Box::new([0u8; 32]);
let mut mac_key = Box::new([0u8; 32]);
let mut aes_iv = Box::new([0u8; 16]);
aes_key.copy_from_slice(&expanded_keys.0[0..32]);
mac_key.copy_from_slice(&expanded_keys.0[32..64]);
aes_iv.copy_from_slice(&expanded_keys.0[64..80]);
Self { aes_key, aes_iv, mac_key }
}
pub fn aes_key(&self) -> &Aes256Key {
Aes256Key::from_slice(self.aes_key.as_slice())
}
pub fn mac_key(&self) -> &HmacSha256Key {
&self.mac_key
}
pub fn iv(&self) -> &Aes256Iv {
Aes256Iv::from_slice(self.aes_iv.as_slice())
}
}