X-Git-Url: http://git.euphorik.ch/?p=crypto_lab1.git;a=blobdiff_plain;f=lab1_rust%2Fsrc%2Fpacket.rs;fp=lab1_rust%2Fsrc%2Fpacket.rs;h=f45332434fb620744ffe5ddb8b834822ec712857;hp=fa13191609899578b0dd60b4d5e56b41c40ab5e3;hb=4d892f864a1f47eb1aab23f1c70ccb143081849c;hpb=e389f9aabe1585c2e5111e4bf874e7dbc29935b3 diff --git a/lab1_rust/src/packet.rs b/lab1_rust/src/packet.rs index fa13191..f453324 100644 --- a/lab1_rust/src/packet.rs +++ b/lab1_rust/src/packet.rs @@ -3,6 +3,7 @@ use std::fmt; use std::rand::{ Rng, StdRng, SeedableRng, distributions }; use std::rand::distributions::IndependentSample; use serialize::hex::{ ToHex }; +use self::PacketType::{ Command, Answer, Error }; use crypto; pub enum Variant { @@ -13,32 +14,32 @@ pub enum Variant { // There are all the errors that may occur when reading an encrypted and authenticated packet. #[deriving(Show)] pub enum ReadingError { - IOReadError(io::IoError), - UnknownPacketTypeError, // If the first byte is unknown. - UnconsistentEncryptedSizeError, - UnconsistentDataSizeError, // The data size is not valid. - UnconsistentMACSizeError, // The MAC hasn't the correct size. - MACMismatchError, // The uncrypted received data doesn't match to the received MAC. - PaddingError, // Padding format error. - DataError, // The data are invalid. - InvalidTimestampError + IO(io::IoError), + UnknownPacketType, // If the first byte is unknown. + UnconsistentEncryptedSize, + UnconsistentDataSize, // The data size is not valid. + UnconsistentMACSize, // The MAC hasn't the correct size. + MACMismatch, // The uncrypted received data doesn't match to the received MAC. + Padding, // Padding format error. + Data, // The data are invalid. + InvalidTimestamp } -// A macro to return a 'IOReadError' in case of error. +// A macro to return a 'Err(ReadingError::IO(..))' in case of error. macro_rules! try_read_io( - ($e:expr) => (match $e { Ok(e) => e, Err(e) => return Err(IOReadError(e)) }) + ($e:expr) => (match $e { Ok(e) => e, Err(e) => return Err(ReadingError::IO(e)) }) ) // There are all the errors that may occur when encrypting, authenticating and writing a packet. #[deriving(Show)] pub enum WritingError { - WriteIOError(io::IoError), - EncryptError, + IO(io::IoError), + Encrypt, } -// A macro to return a 'IOWritingError' in case of error. +// A macro to return a 'Err(WritingError::IO(..))' in case of error. macro_rules! try_write_io( - ($e:expr) => (match $e { Ok(e) => e, Err(e) => return Err(WriteIOError(e)) }) + ($e:expr) => (match $e { Ok(e) => e, Err(e) => return Err(WritingError::IO(e)) }) ) pub type ReadingResult = Result; @@ -56,8 +57,8 @@ pub struct PacketData { #[deriving(Show, Clone)] pub enum ErrorType { - CryptError, - AuthError + Crypt, + Auth } #[deriving(Clone)] @@ -159,12 +160,12 @@ impl Packet { } // Computes the MAC. It depends of the choosen variant. - let mac = crypto::compute_mac(data.slice_to(match variant { Weak => data_size, _ => data.len() })); + let mac = crypto::compute_mac(data.slice_to(match variant { Variant::Weak => data_size, _ => data.len() })); // Encrypts. let encrypted_data = match crypto::encrypt(data.as_slice(), iv_from_timestamp(self.timestamp).as_slice()) { Some(d) => d, - _ => return Err(EncryptError) + _ => return Err(WritingError::Encrypt) }; // Writes packet length. @@ -175,8 +176,8 @@ impl Packet { match self.t { Command(_) => 0x00, Answer(_) => 0xFF, - Error(CryptError) => 0x0A, - Error(AuthError) => 0x0B + Error(ErrorType::Crypt) => 0x0A, + Error(ErrorType::Auth) => 0x0B } )); @@ -187,7 +188,7 @@ impl Packet { try_write_io!(output.write(encrypted_data.as_slice())); // Writes the MAC. - try_write_io!(output.write(mac)); + try_write_io!(output.write(&mac)); Ok(()) } @@ -203,51 +204,51 @@ impl Packet { let packet_type = try_read_io!(input.read_u8()); if ![0x00, 0xFF, 0x0A, 0x0B].iter().any(|p| *p == packet_type) { consume(input, data_size as uint - 1); - return Err(UnknownPacketTypeError) + return Err(ReadingError::UnknownPacketType) } let timestamp = try_read_io!(input.read_be_u64()); let mut encrypted_data = Vec::from_elem(data_size as uint - FIXED_PACKET_SIZE, 0u8); if try_read_io!(input.read(encrypted_data.as_mut_slice_())) != encrypted_data.len() { - return Err(UnconsistentEncryptedSizeError) + return Err(ReadingError::UnconsistentEncryptedSize) } let mut data = match crypto::decrypt(encrypted_data.as_slice(), iv_from_timestamp(timestamp).as_slice()) { Some(d) => d, - _ => return Err(UnconsistentEncryptedSizeError) + _ => return Err(ReadingError::UnconsistentEncryptedSize) }; // Reads the MAC. let mut mac_read = [0u8, ..10]; - if try_read_io!(input.read(mac_read)) != mac_read.len() { - return Err(UnconsistentMACSizeError) + if try_read_io!(input.read(&mut mac_read)) != mac_read.len() { + return Err(ReadingError::UnconsistentMACSize) } - match variant { Fixed if mac_read != crypto::compute_mac(data.as_slice()) => return Err(MACMismatchError), _ => () }; + match variant { Variant::Fixed if mac_read != crypto::compute_mac(data.as_slice()) => return Err(ReadingError::MACMismatch), _ => () }; // Controls the size and the content of the padding then removes it. if packet_type == 0x00 || packet_type == 0xFF { match data.last() { Some(&padding_size) => { if padding_size as uint > data.len() || padding_size == 0 || data.slice_from(data.len() - padding_size as uint).iter().any(|b| *b != padding_size) { - return Err(PaddingError) + return Err(ReadingError::Padding) } let data_length = data.len() - padding_size as uint; data.truncate(data_length); }, None => - return Err(PaddingError) + return Err(ReadingError::Padding) } } - match variant { Weak if mac_read != crypto::compute_mac(data.as_slice()) => return Err(MACMismatchError), _ => () }; + match variant { Variant::Weak if mac_read != crypto::compute_mac(data.as_slice()) => return Err(ReadingError::MACMismatch), _ => () }; Ok(Packet { t: match packet_type { // Command or answer. 0x00 | 0xFF => { if data.len() < MIN_PAYLOAD_SIZE + 1 || data.len() > MAX_PAYLOAD_SIZE + 1 { - return Err(UnconsistentDataSizeError) + return Err(ReadingError::UnconsistentDataSize) } let pd = PacketData { id: data[0], payload: data.tail().to_vec() }; // match data.as_slice() { [id, payload..] => PacketData { id: id, payload: payload.to_vec() } }; match packet_type { 0x00 => Command(pd), _ => Answer(pd) } @@ -255,11 +256,11 @@ impl Packet { // Error. _ => { if data.len() != 16 { - return Err(UnconsistentDataSizeError) + return Err(ReadingError::UnconsistentDataSize) } else if data != Vec::from_elem(16, 0) { - return Err(DataError) + return Err(ReadingError::Data) } - match packet_type { 0x0A => Error(CryptError), _ => Error(AuthError) } + match packet_type { 0x0A => Error(ErrorType::Crypt), _ => Error(ErrorType::Auth) } } }, timestamp: timestamp