mirror of
https://github.com/logos-messaging/logos-delivery-rust-bindings.git
synced 2026-03-03 15:43:07 +00:00
92 lines
2.9 KiB
Rust
92 lines
2.9 KiB
Rust
//! Symmetric and asymmetric waku messages [decrypting](https://rfc.vac.dev/spec/36/#decrypting-messages) methods
|
|
|
|
// std
|
|
use std::ffi::CString;
|
|
// crates
|
|
use aes_gcm::{Aes256Gcm, Key};
|
|
use libc::*;
|
|
use secp256k1::SecretKey;
|
|
// internal
|
|
use crate::general::{DecodedPayload, Result, WakuMessage};
|
|
use crate::utils::{get_trampoline, handle_json_response};
|
|
|
|
/// Decrypt a message using a symmetric key
|
|
///
|
|
/// As per the [specification](https://rfc.vac.dev/spec/36/#extern-char-waku_decode_symmetricchar-messagejson-char-symmetrickey)
|
|
pub fn waku_decode_symmetric(
|
|
message: &WakuMessage,
|
|
symmetric_key: &Key<Aes256Gcm>,
|
|
) -> Result<DecodedPayload> {
|
|
let symk = hex::encode(symmetric_key.as_slice());
|
|
|
|
let message_ptr = CString::new(
|
|
serde_json::to_string(&message)
|
|
.expect("WakuMessages should always be able to success serializing"),
|
|
)
|
|
.expect("CString should build properly from the serialized waku message")
|
|
.into_raw();
|
|
let symk_ptr = CString::new(symk)
|
|
.expect("CString should build properly from hex encoded symmetric key")
|
|
.into_raw();
|
|
|
|
let mut result: String = Default::default();
|
|
let result_cb = |v: &str| result = v.to_string();
|
|
let code = unsafe {
|
|
let mut closure = result_cb;
|
|
let cb = get_trampoline(&closure);
|
|
let out = waku_sys::waku_decode_symmetric(
|
|
message_ptr,
|
|
symk_ptr,
|
|
cb,
|
|
&mut closure as *mut _ as *mut c_void,
|
|
);
|
|
|
|
drop(CString::from_raw(message_ptr));
|
|
drop(CString::from_raw(symk_ptr));
|
|
|
|
out
|
|
};
|
|
|
|
handle_json_response(code, &result)
|
|
}
|
|
|
|
/// Decrypt a message using a symmetric key
|
|
///
|
|
/// As per the [specification](https://rfc.vac.dev/spec/36/#extern-char-waku_decode_asymmetricchar-messagejson-char-privatekey)
|
|
pub fn waku_decode_asymmetric(
|
|
message: &WakuMessage,
|
|
asymmetric_key: &SecretKey,
|
|
) -> Result<DecodedPayload> {
|
|
let sk = hex::encode(asymmetric_key.secret_bytes());
|
|
|
|
let message_ptr = CString::new(
|
|
serde_json::to_string(&message)
|
|
.expect("WakuMessages should always be able to success serializing"),
|
|
)
|
|
.expect("CString should build properly from the serialized waku message")
|
|
.into_raw();
|
|
let sk_ptr = CString::new(sk)
|
|
.expect("CString should build properly from hex encoded symmetric key")
|
|
.into_raw();
|
|
|
|
let mut result: String = Default::default();
|
|
let result_cb = |v: &str| result = v.to_string();
|
|
let code = unsafe {
|
|
let mut closure = result_cb;
|
|
let cb = get_trampoline(&closure);
|
|
let out = waku_sys::waku_decode_asymmetric(
|
|
message_ptr,
|
|
sk_ptr,
|
|
cb,
|
|
&mut closure as *mut _ as *mut c_void,
|
|
);
|
|
|
|
drop(CString::from_raw(message_ptr));
|
|
drop(CString::from_raw(sk_ptr));
|
|
|
|
out
|
|
};
|
|
|
|
handle_json_response(code, &result)
|
|
}
|