1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
#![no_std]
#![doc(html_logo_url =
"https://raw.githubusercontent.com/RustCrypto/meta/master/logo_small.png")]
pub extern crate generic_array;
#[cfg(feature = "dev")]
pub extern crate blobby;
#[cfg(feature = "std")]
extern crate std;
use generic_array::{GenericArray, ArrayLength};
use generic_array::typenum::Unsigned;
#[cfg(feature = "dev")]
pub mod dev;
mod errors;
pub use errors::{LoopError, InvalidKeyNonceLength};
pub trait StreamCipherCore {
#[inline]
fn apply_keystream(&mut self, data: &mut [u8]) {
self.try_apply_keystream(data)
.expect("stream cipher loop detected")
}
fn try_apply_keystream(&mut self, data: &mut [u8]) -> Result<(), LoopError>;
}
pub trait StreamCipherSeek {
fn current_pos(&self) -> u64;
fn seek(&mut self, pos: u64);
}
pub trait NewFixStreamCipher: Sized {
type KeySize: ArrayLength<u8>;
type NonceSize: ArrayLength<u8>;
fn new(
key: &GenericArray<u8, Self::KeySize>,
nonce: &GenericArray<u8, Self::NonceSize>,
) -> Self;
fn new_var(key: &[u8], nonce: &[u8]) -> Result<Self, InvalidKeyNonceLength> {
let kl = Self::KeySize::to_usize();
let nl = Self::NonceSize::to_usize();
if key.len() != kl || nonce.len() != nl {
Err(InvalidKeyNonceLength)
} else {
let key = GenericArray::from_slice(key);
let nonce = GenericArray::from_slice(nonce);
Ok(Self::new(key, nonce))
}
}
}