doby/src/main.rs

77 lines
3.3 KiB
Rust
Raw Normal View History

2021-07-04 18:33:59 +02:00
use std::{process, io::{BufWriter, BufReader, Read}};
2021-06-25 23:01:50 +02:00
use doby::{
cli,
2021-06-27 20:35:23 +02:00
crypto::{EncryptionParams, DobyCipher},
2021-06-25 23:01:50 +02:00
MAGIC_BYTES,
decrypt,
encrypt,
};
2021-11-13 19:08:28 +01:00
use zeroize::Zeroize;
2021-06-25 23:01:50 +02:00
2021-07-04 18:33:59 +02:00
fn run() -> bool {
let mut success = false;
2021-07-04 16:24:44 +02:00
if let Some(cli_args) = cli::parse() {
2021-06-25 23:01:50 +02:00
let mut reader = BufReader::with_capacity(cli_args.block_size, cli_args.reader);
let mut writer = BufWriter::with_capacity(cli_args.block_size, cli_args.writer);
2021-07-04 16:24:44 +02:00
2021-06-25 23:01:50 +02:00
let mut magic_bytes = vec![0; MAGIC_BYTES.len()];
match reader.read(&mut magic_bytes) {
Ok(n) => {
if magic_bytes == MAGIC_BYTES && !cli_args.force_encrypt { //we probably want to decrypt
match EncryptionParams::read(&mut reader) {
Ok(params) => {
2021-06-27 20:35:23 +02:00
match params {
Some(params) => {
2021-11-13 19:08:28 +01:00
if let Some(mut password) = cli_args.password.get(false) {
let cipher = DobyCipher::new(password.as_bytes(), &params);
password.zeroize();
match decrypt(&mut reader, &mut writer, cipher, cli_args.block_size) {
Ok(verified) => {
if verified {
success = true
} else {
eprintln!("WARNING: HMAC verification failed !\nEither your password is incorrect or the ciphertext has been corrupted.\nBe careful, the data could have been altered by an attacker.");
2021-06-27 20:35:23 +02:00
}
2021-06-25 23:01:50 +02:00
}
2021-11-13 19:08:28 +01:00
Err(e) => eprintln!("I/O error while decrypting: {}", e)
2021-06-25 23:01:50 +02:00
}
}
}
2021-11-13 19:08:28 +01:00
None => eprintln!("Invalid parameters")
2021-06-25 23:01:50 +02:00
}
}
Err(e) => eprintln!("I/O error while reading headers: {}", e)
}
} else { //otherwise, encrypt
2021-06-27 20:35:23 +02:00
let params = EncryptionParams::new(cli_args.argon2_params, cli_args.cipher);
2021-11-13 19:08:28 +01:00
if let Some(mut password) = cli_args.password.get(true) {
let cipher = DobyCipher::new(password.as_bytes(), &params);
password.zeroize();
match encrypt(
&mut reader,
&mut writer,
&params,
cipher,
cli_args.block_size,
Some(&magic_bytes[..n])
) {
Ok(_) => success = true,
Err(e) => eprintln!("I/O error while encrypting: {}", e)
2021-06-25 23:01:50 +02:00
}
}
}
}
Err(e) => eprintln!("I/O error while reading magic bytes: {}", e),
}
}
2021-07-04 18:33:59 +02:00
success
}
fn main() {
process::exit(if run() {
0
} else {
1
});
2021-06-25 23:01:50 +02:00
}