mirror of https://github.com/oxen-io/session-ios
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
106 lines
3.5 KiB
Matlab
106 lines
3.5 KiB
Matlab
5 years ago
|
//
|
||
|
// Copyright (c) 2018 Open Whisper Systems. All rights reserved.
|
||
|
//
|
||
|
|
||
|
#import "AES-CBC.h"
|
||
|
#import "AxolotlExceptions.h"
|
||
|
#import "MessageKeys.h"
|
||
|
#import <CommonCrypto/CommonCryptor.h>
|
||
|
#import <CommonCrypto/CommonHMAC.h>
|
||
|
#import <Security/Security.h>
|
||
|
#import <SessionProtocolKit/OWSAsserts.h>
|
||
|
|
||
|
NS_ASSUME_NONNULL_BEGIN
|
||
|
|
||
|
@implementation AES_CBC
|
||
|
|
||
|
#pragma mark AESCBC Mode
|
||
|
|
||
|
+ (NSData *)throws_encryptCBCMode:(NSData *)data withKey:(NSData *)key withIV:(NSData *)iv
|
||
|
{
|
||
|
if (!data) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"Missing data to encrypt." userInfo:nil];
|
||
|
}
|
||
|
if (data.length >= SIZE_MAX - kCCBlockSizeAES128) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"Oversize data." userInfo:nil];
|
||
|
}
|
||
|
if (key.length != 32) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"AES key should be 256 bits." userInfo:nil];
|
||
|
}
|
||
|
if (iv.length != 16) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"AES-CBC IV should be 128 bits." userInfo:nil];
|
||
|
}
|
||
|
|
||
|
size_t bufferSize;
|
||
|
ows_add_overflow(data.length, kCCBlockSizeAES128, &bufferSize);
|
||
|
NSMutableData *_Nullable bufferData = [NSMutableData dataWithLength:bufferSize];
|
||
|
OWSAssert(bufferData != nil);
|
||
|
|
||
|
size_t bytesEncrypted = 0;
|
||
|
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt,
|
||
|
kCCAlgorithmAES128,
|
||
|
kCCOptionPKCS7Padding,
|
||
|
[key bytes],
|
||
|
[key length],
|
||
|
[iv bytes],
|
||
|
[data bytes],
|
||
|
[data length],
|
||
|
bufferData.mutableBytes,
|
||
|
bufferSize,
|
||
|
&bytesEncrypted);
|
||
|
|
||
|
if (cryptStatus == kCCSuccess) {
|
||
|
return [bufferData subdataWithRange:NSMakeRange(0, bytesEncrypted)];
|
||
|
} else {
|
||
|
@throw [NSException exceptionWithName:CipherException
|
||
|
reason:@"We encountered an issue while encrypting."
|
||
|
userInfo:nil];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
+ (NSData *)throws_decryptCBCMode:(NSData *)data withKey:(NSData *)key withIV:(NSData *)iv
|
||
|
{
|
||
|
if (!data) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"Missing data to decrypt." userInfo:nil];
|
||
|
}
|
||
|
if (data.length >= SIZE_MAX - kCCBlockSizeAES128) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"Oversize data." userInfo:nil];
|
||
|
}
|
||
|
if (key.length != 32) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"AES key should be 256 bits." userInfo:nil];
|
||
|
}
|
||
|
if (iv.length != 16) {
|
||
|
@throw [NSException exceptionWithName:CipherException reason:@"AES-CBC IV should be 128 bits." userInfo:nil];
|
||
|
}
|
||
|
|
||
|
size_t bufferSize;
|
||
|
ows_add_overflow(data.length, kCCBlockSizeAES128, &bufferSize);
|
||
|
NSMutableData *_Nullable bufferData = [NSMutableData dataWithLength:bufferSize];
|
||
|
OWSAssert(bufferData != nil);
|
||
|
|
||
|
size_t bytesDecrypted = 0;
|
||
|
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt,
|
||
|
kCCAlgorithmAES128,
|
||
|
kCCOptionPKCS7Padding,
|
||
|
[key bytes],
|
||
|
[key length],
|
||
|
[iv bytes],
|
||
|
[data bytes],
|
||
|
[data length],
|
||
|
bufferData.mutableBytes,
|
||
|
bufferSize,
|
||
|
&bytesDecrypted);
|
||
|
|
||
|
if (cryptStatus == kCCSuccess) {
|
||
|
return [bufferData subdataWithRange:NSMakeRange(0, bytesDecrypted)];
|
||
|
} else {
|
||
|
@throw [NSException exceptionWithName:CipherException
|
||
|
reason:@"We encountered an issue while decrypting."
|
||
|
userInfo:nil];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
@end
|
||
|
|
||
|
NS_ASSUME_NONNULL_END
|