Rename PublicKey to RecipientKey

This commit is contained in:
Jack Grigg 2019-10-09 07:36:11 +13:00
parent 91130366c1
commit cd407fc468
No known key found for this signature in database
GPG key ID: 9E8255172BBF9898
3 changed files with 25 additions and 22 deletions

View file

@ -5,7 +5,7 @@ use std::io::{self, Read, Write};
use x25519_dalek::{x25519, X25519_BASEPOINT_BYTES}; use x25519_dalek::{x25519, X25519_BASEPOINT_BYTES};
use crate::{ use crate::{
keys::{PublicKey, SecretKey}, keys::{RecipientKey, SecretKey},
primitives::{aead_decrypt, aead_encrypt, hkdf, HmacWriter, Stream}, primitives::{aead_decrypt, aead_encrypt, hkdf, HmacWriter, Stream},
}; };
@ -36,9 +36,9 @@ enum Recipient {
} }
impl Recipient { impl Recipient {
fn encrypt(file_key: &[u8; 16], pubkey: &PublicKey) -> Self { fn encrypt(file_key: &[u8; 16], pubkey: &RecipientKey) -> Self {
match pubkey { match pubkey {
PublicKey::X25519(pk) => { RecipientKey::X25519(pk) => {
let mut esk = [0; 32]; let mut esk = [0; 32];
getrandom(&mut esk).expect("Should not fail"); getrandom(&mut esk).expect("Should not fail");
let epk = x25519(esk, X25519_BASEPOINT_BYTES); let epk = x25519(esk, X25519_BASEPOINT_BYTES);
@ -90,11 +90,14 @@ pub struct Header {
/// Creates a wrapper around a writer that will encrypt its input to the given recipients. /// Creates a wrapper around a writer that will encrypt its input to the given recipients.
/// ///
/// Returns errors from the underlying writer while writing the header. /// Returns errors from the underlying writer while writing the header.
pub fn encrypt_message<W: Write>(mut output: W, pubkeys: &[PublicKey]) -> io::Result<impl Write> { pub fn encrypt_message<W: Write>(
mut output: W,
recipients: &[RecipientKey],
) -> io::Result<impl Write> {
let mut file_key = [0; 16]; let mut file_key = [0; 16];
getrandom(&mut file_key).expect("Should not fail"); getrandom(&mut file_key).expect("Should not fail");
let recipients = pubkeys let recipients = recipients
.iter() .iter()
.map(|pk| Recipient::encrypt(&file_key, pk)) .map(|pk| Recipient::encrypt(&file_key, pk))
.collect(); .collect();

View file

@ -44,18 +44,18 @@ impl SecretKey {
} }
} }
pub fn to_public(&self) -> PublicKey { pub fn to_public(&self) -> RecipientKey {
match self { match self {
SecretKey::X25519(sk) => PublicKey::X25519(x25519(*sk, X25519_BASEPOINT_BYTES)), SecretKey::X25519(sk) => RecipientKey::X25519(x25519(*sk, X25519_BASEPOINT_BYTES)),
} }
} }
} }
pub enum PublicKey { pub enum RecipientKey {
X25519([u8; 32]), X25519([u8; 32]),
} }
impl PublicKey { impl RecipientKey {
pub fn from_str(s: &str) -> Option<Self> { pub fn from_str(s: &str) -> Option<Self> {
match s.find(PUBLIC_KEY_PREFIX) { match s.find(PUBLIC_KEY_PREFIX) {
Some(0) => (), Some(0) => (),
@ -68,7 +68,7 @@ impl PublicKey {
if buf.len() == 32 { if buf.len() == 32 {
let mut pk = [0; 32]; let mut pk = [0; 32];
pk.copy_from_slice(&buf); pk.copy_from_slice(&buf);
Some(PublicKey::X25519(pk)) Some(RecipientKey::X25519(pk))
} else { } else {
println!("Invalid decoded length"); println!("Invalid decoded length");
None None
@ -78,7 +78,7 @@ impl PublicKey {
pub fn to_str(&self) -> String { pub fn to_str(&self) -> String {
match self { match self {
PublicKey::X25519(pk) => format!( RecipientKey::X25519(pk) => format!(
"{}{}", "{}{}",
PUBLIC_KEY_PREFIX, PUBLIC_KEY_PREFIX,
base64::encode_config(&pk, base64::URL_SAFE_NO_PAD) base64::encode_config(&pk, base64::URL_SAFE_NO_PAD)
@ -89,7 +89,7 @@ impl PublicKey {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::{PublicKey, SecretKey}; use super::{RecipientKey, SecretKey};
const TEST_SK: &str = "AGE_SECRET_KEY_RQvvHYA29yZk8Lelpiz8lW7QdlxkE4djb1NOjLgeUFg"; const TEST_SK: &str = "AGE_SECRET_KEY_RQvvHYA29yZk8Lelpiz8lW7QdlxkE4djb1NOjLgeUFg";
const TEST_PK: &str = "pubkey:X4ZiZYoURuOqC2_GPISYiWbJn1-j_HECyac7BpD6kHU"; const TEST_PK: &str = "pubkey:X4ZiZYoURuOqC2_GPISYiWbJn1-j_HECyac7BpD6kHU";
@ -101,7 +101,7 @@ mod tests {
#[test] #[test]
fn pubkey_encoding() { fn pubkey_encoding() {
assert_eq!(PublicKey::from_str(TEST_PK).unwrap().to_str(), TEST_PK); assert_eq!(RecipientKey::from_str(TEST_PK).unwrap().to_str(), TEST_PK);
} }
#[test] #[test]

View file

@ -6,9 +6,9 @@ mod format;
mod keys; mod keys;
mod primitives; mod primitives;
/// Reads a pubkey from a command-line argument. /// Reads a recipient from a command-line argument.
fn read_pubkey(arg: String) -> io::Result<keys::PublicKey> { fn read_recipient(arg: String) -> io::Result<keys::RecipientKey> {
if let Some(pk) = keys::PublicKey::from_str(&arg) { if let Some(pk) = keys::RecipientKey::from_str(&arg) {
Ok(pk) Ok(pk)
} else { } else {
Err(io::Error::new( Err(io::Error::new(
@ -18,8 +18,8 @@ fn read_pubkey(arg: String) -> io::Result<keys::PublicKey> {
} }
} }
/// Reads pubkeys from the provided arguments. /// Reads recipients from the provided arguments.
fn read_pubkeys(arguments: Vec<String>) -> io::Result<Vec<keys::PublicKey>> { fn read_recipients(arguments: Vec<String>) -> io::Result<Vec<keys::RecipientKey>> {
if arguments.is_empty() { if arguments.is_empty() {
return Err(io::Error::new( return Err(io::Error::new(
io::ErrorKind::InvalidInput, io::ErrorKind::InvalidInput,
@ -29,7 +29,7 @@ fn read_pubkeys(arguments: Vec<String>) -> io::Result<Vec<keys::PublicKey>> {
arguments arguments
.into_iter() .into_iter()
.map(read_pubkey) .map(read_recipient)
.collect::<Result<_, _>>() .collect::<Result<_, _>>()
} }
@ -128,8 +128,8 @@ struct AgeOptions {
} }
fn encrypt(opts: AgeOptions) { fn encrypt(opts: AgeOptions) {
let pubkeys = match read_pubkeys(opts.arguments) { let recipients = match read_recipients(opts.arguments) {
Ok(pubkeys) => pubkeys, Ok(recipients) => recipients,
Err(e) => { Err(e) => {
eprintln!("Error while reading recipients: {}", e); eprintln!("Error while reading recipients: {}", e);
return; return;
@ -145,7 +145,7 @@ fn encrypt(opts: AgeOptions) {
}; };
let mut encrypted = vec![]; let mut encrypted = vec![];
match format::encrypt_message(&mut encrypted, &pubkeys) { match format::encrypt_message(&mut encrypted, &recipients) {
Ok(mut w) => { Ok(mut w) => {
if let Err(e) = w.write_all(&plaintext) { if let Err(e) = w.write_all(&plaintext) {
eprintln!("Error while encrypting: {}", e); eprintln!("Error while encrypting: {}", e);