mirror of https://github.com/oxen-io/session-ios
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
42 lines
2.4 KiB
Swift
42 lines
2.4 KiB
Swift
import CryptoSwift
|
|
import SessionProtocolKit
|
|
import SessionUtilities
|
|
|
|
public extension MessageReceiver {
|
|
|
|
static func decryptWithSharedSenderKeys(envelope: SNProtoEnvelope, using transaction: Any) throws -> (plaintext: Data, senderPublicKey: String) {
|
|
// 1. ) Check preconditions
|
|
guard let groupPublicKey = envelope.source, Configuration.shared.storage.isClosedGroup(groupPublicKey) else {
|
|
throw Error.invalidGroupPublicKey
|
|
}
|
|
guard let data = envelope.content else {
|
|
throw Error.noData
|
|
}
|
|
guard let hexEncodedGroupPrivateKey = Configuration.shared.storage.getClosedGroupPrivateKey(for: groupPublicKey) else {
|
|
throw Error.noGroupPrivateKey
|
|
}
|
|
let groupPrivateKey = Data(hex: hexEncodedGroupPrivateKey)
|
|
let groupKeyPair = ECKeyPair(publicKey: Data(hex: groupPublicKey), privateKey: groupPrivateKey)
|
|
// 2. ) Parse the wrapper
|
|
let wrapper = try SNProtoClosedGroupCiphertextMessageWrapper.parseData(data)
|
|
let ivAndCiphertext = wrapper.ciphertext
|
|
let ephemeralPublicKey = wrapper.ephemeralPublicKey
|
|
// 3. ) Decrypt the data inside
|
|
guard let ephemeralSharedSecret = Curve25519.generateSharedSecret(fromPublicKey: ephemeralPublicKey, andKeyPair: groupKeyPair) else {
|
|
throw Error.sharedSecretGenerationFailed
|
|
}
|
|
let salt = "LOKI"
|
|
let symmetricKey = try HMAC(key: salt.bytes, variant: .sha256).authenticate(ephemeralSharedSecret.bytes)
|
|
let closedGroupCiphertextMessageAsData = try AESGCM.decrypt(ivAndCiphertext, with: Data(symmetricKey))
|
|
// 4. ) Parse the closed group ciphertext message
|
|
let closedGroupCiphertextMessage = ClosedGroupCiphertextMessage(_throws_with: closedGroupCiphertextMessageAsData)
|
|
let senderPublicKey = closedGroupCiphertextMessage.senderPublicKey.toHexString()
|
|
guard senderPublicKey != Configuration.shared.storage.getUserPublicKey() else { throw Error.selfSend }
|
|
// 5. ) Use the info inside the closed group ciphertext message to decrypt the actual message content
|
|
let plaintext = try SharedSenderKeys.decrypt(closedGroupCiphertextMessage.ivAndCiphertext, for: groupPublicKey,
|
|
senderPublicKey: senderPublicKey, keyIndex: UInt(closedGroupCiphertextMessage.keyIndex), using: transaction)
|
|
// 6. ) Return
|
|
return (plaintext, senderPublicKey)
|
|
}
|
|
}
|