parent
c4d2c8c693
commit
1bb97f00b5
@ -0,0 +1,38 @@
|
|||||||
|
use argon2::Argon2;
|
||||||
|
use rand_chacha::ChaCha20Rng;
|
||||||
|
use rand_core::{RngCore, SeedableRng};
|
||||||
|
use std::path::PathBuf;
|
||||||
|
|
||||||
|
/// NOTE: Hash supplied to Stronghold must be 32bits long.
|
||||||
|
/// This is a current limitation of Stronghold.
|
||||||
|
const HASH_LENGTH: usize = 32;
|
||||||
|
|
||||||
|
pub struct KeyDerivation {}
|
||||||
|
|
||||||
|
impl KeyDerivation {
|
||||||
|
pub fn argon2(password: &str, salt_path: &PathBuf) -> Vec<u8> {
|
||||||
|
let mut salt = [0u8; HASH_LENGTH];
|
||||||
|
create_or_get_salt(&mut salt, salt_path);
|
||||||
|
|
||||||
|
let mut encoded = [0u8; HASH_LENGTH];
|
||||||
|
Argon2::default()
|
||||||
|
.hash_password_into(password.as_bytes(), &salt, &mut encoded)
|
||||||
|
.expect("Failed to generate hash for password");
|
||||||
|
encoded.to_vec()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NOTE: this is not ideal as we produce a single salt per application
|
||||||
|
// rather than having different salt for each Stronghold snapshot
|
||||||
|
fn create_or_get_salt(salt: &mut [u8], salt_path: &PathBuf) {
|
||||||
|
if salt_path.is_file() {
|
||||||
|
// Get existing salt
|
||||||
|
let tmp = std::fs::read(&salt_path).unwrap();
|
||||||
|
salt.clone_from_slice(&tmp);
|
||||||
|
} else {
|
||||||
|
// Generate new salt
|
||||||
|
let mut gen = ChaCha20Rng::from_entropy();
|
||||||
|
gen.fill_bytes(salt);
|
||||||
|
std::fs::write(salt_path, salt).expect("Failed to write salt for Stronghold")
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in new issue