-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
126 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
/target | ||
Cargo.lock |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
[package] | ||
name = "eme" | ||
license = "MIT" | ||
version = "0.1.0" | ||
edition = "2021" | ||
homepage = "https://github.com/Barquadd/eme" | ||
|
||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html | ||
|
||
[profile.release] | ||
strip = true | ||
|
||
[dependencies] | ||
aes-gcm = "0.10.1" | ||
clap = {version="4.0.32", features=["derive"]} | ||
rand = "0.8.5" | ||
sha2 = "0.10.6" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
# 🔒 eme: *Encryption Made Easy* | ||
*an extremely simple encryption tool written in Rust* | ||
|
||
## Usage: | ||
```bash | ||
# To encrypt: | ||
eme --encrypt secret.png | ||
# To decrypt: | ||
eme --decrypt secret.png | ||
``` | ||
|
||
### ⚠️ Warning! This encrypts files in-place! ⚠️ | ||
Do not lose the password that you encrypt your files with! |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,94 @@ | ||
use std::{fs::write, io::Write}; | ||
use aes_gcm::aead::consts::U32; | ||
use clap::Parser; | ||
use aes_gcm::{ | ||
aead::{AeadInPlace, KeyInit, generic_array::GenericArray}, | ||
Aes256Gcm, Nonce | ||
}; | ||
use std::io; | ||
use sha2::{Digest, Sha256}; | ||
|
||
|
||
#[derive(Parser)] | ||
struct Cli { | ||
#[arg(short, long)] | ||
encrypt: bool, | ||
#[arg(short, long)] | ||
decrypt: bool, | ||
path: std::path::PathBuf, | ||
} | ||
|
||
fn hash_string_n_times(s: &str, n: u32) -> Vec<u8> { | ||
let mut hasher = Sha256::new(); | ||
let mut result = s.as_bytes().to_vec(); | ||
for _ in 0..n { | ||
let mut hasher_clone = hasher.clone(); | ||
hasher_clone.update(&result); | ||
result = hasher_clone.finalize().to_vec(); | ||
hasher.reset(); | ||
} | ||
result | ||
} | ||
|
||
fn main() { | ||
let args = Cli::parse(); | ||
if args.encrypt { | ||
println!("--> ENCRYPTING <--"); | ||
print!("Enter the password: "); | ||
// getting user password | ||
std::io::stdout().flush().unwrap(); | ||
let mut password = String::new(); | ||
io::stdin().read_line(&mut password).unwrap(); | ||
let password = password.trim(); | ||
|
||
let key: Vec<u8> = hash_string_n_times(&password, 100_000); | ||
|
||
let key_g: GenericArray<_, U32> = GenericArray::clone_from_slice(&key); | ||
|
||
let cipher = Aes256Gcm::new(&key_g); | ||
// there's certainly a better way to do this | ||
let mut nonce_vec: Vec<u8> = vec![]; | ||
for _ in 0..12 { | ||
nonce_vec.push(rand::random::<u8>()); | ||
} | ||
let nonce_vec_2 = nonce_vec.clone(); | ||
let nonce = Nonce::from_slice(&nonce_vec_2); | ||
|
||
println!("Reading file..."); | ||
let mut buffer: Vec<u8> = std::fs::read(args.path.clone()).expect("Failed to read file."); | ||
println!("Encrypting..."); | ||
cipher.encrypt_in_place(nonce, b"", &mut buffer).expect("Encryption failed."); | ||
nonce_vec.append(&mut buffer); // we want the nonce to be the first 96 bits in the file | ||
println!("Writing file..."); | ||
write(args.path, nonce_vec).expect("Failed to write file."); | ||
} | ||
else if args.decrypt { | ||
println!("--> DECRYPTING <--"); | ||
print!("Enter the password: "); | ||
std::io::stdout().flush().unwrap(); | ||
let mut password = String::new(); | ||
io::stdin().read_line(&mut password).unwrap(); | ||
let password = password.trim(); | ||
|
||
let key: Vec<u8> = hash_string_n_times(&password, 100_000); | ||
|
||
let key_g: GenericArray<_, U32> = GenericArray::clone_from_slice(&key); | ||
|
||
let cipher = Aes256Gcm::new(&key_g); | ||
|
||
println!("Reading file..."); | ||
let buffer: Vec<u8> = std::fs::read(args.path.clone()).expect("Failed to read file."); | ||
// the first 12 bytes of the buffer is (should be) the nonce | ||
let (nonce_bytes, buffer) = buffer.split_at(12); | ||
let nonce = Nonce::from_slice(&nonce_bytes); | ||
|
||
let mut buffer = buffer.to_vec(); | ||
println!("Decrypting..."); | ||
cipher.decrypt_in_place(nonce, b"", &mut buffer).expect("Decryption failed."); | ||
println!("Writing file..."); | ||
write(args.path, buffer).expect("Failed to write file."); | ||
} | ||
else { | ||
eprintln!("Please select a flag to use! Ex. -e") | ||
} | ||
} |