Midea/src/security.rs

65 lines
1.6 KiB
Rust
Raw Normal View History

2023-09-22 10:34:35 +00:00
use aes::{
cipher::{generic_array::GenericArray, BlockDecrypt, KeyInit},
Aes128,
};
use anyhow::Result;
use rand::{self, RngCore};
use crate::hex;
#[allow(non_camel_case_types)]
#[repr(u8)]
#[derive(Debug, PartialEq, Eq, PartialOrd, Ord)]
pub enum MsgType {
HANDSHAKE_REQUEST = 0x0,
ANDSHAKE_RESPONSE = 0x1,
ENCRYPTED_RESPONSE = 0x3,
ENCRYPTED_REQUEST = 0x6,
}
2023-09-22 12:14:46 +00:00
#[derive(Debug, Default)]
pub struct Security {
request_count: u32,
response_count: u32,
}
2023-09-22 10:34:35 +00:00
impl Security {
2023-09-22 12:14:46 +00:00
const N: u128 = 141661095494369103254425781617665632877;
const KEY: [u8; 16] = Self::N.to_be_bytes();
2023-09-22 10:34:35 +00:00
2023-09-22 12:14:46 +00:00
pub fn decrypt(&self, data: &mut [u8]) -> &[u8] {
let array = GenericArray::from(Self::KEY);
2023-09-22 10:34:35 +00:00
let cipher = Aes128::new(&array);
for chunk in data.chunks_mut(16) {
let mut block = GenericArray::from_mut_slice(chunk);
cipher.decrypt_block(&mut block);
}
data
}
2023-09-22 12:14:46 +00:00
pub fn encode_8370(&mut self, msg_type: MsgType) -> Result<String> {
2023-09-22 10:34:35 +00:00
let mut header = hex("83,70")?;
let mut data: Vec<u8> = Vec::new();
let mut size = data.len();
let mut padding = 0;
if msg_type == MsgType::ENCRYPTED_RESPONSE || msg_type == MsgType::ENCRYPTED_REQUEST {
if (size + 2) % 16 != 0 {
padding = 16 - ((size + 2) & 0xf);
size += padding + 32;
data.extend({
let mut d = vec![0; padding];
rand::thread_rng().fill_bytes(&mut d);
d
});
}
}
todo!()
}
}