mirror of https://github.com/oxen-io/session-ios
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
106 lines
3.5 KiB
Objective-C
106 lines
3.5 KiB
Objective-C
//
|
|
// Copyright (c) 2018 Open Whisper Systems. All rights reserved.
|
|
//
|
|
|
|
#import "AES-CBC.h"
|
|
#import "AxolotlExceptions.h"
|
|
#import "MessageKeys.h"
|
|
#import <CommonCrypto/CommonCryptor.h>
|
|
#import <CommonCrypto/CommonHMAC.h>
|
|
#import <Security/Security.h>
|
|
#import <SignalCoreKit/OWSAsserts.h>
|
|
|
|
NS_ASSUME_NONNULL_BEGIN
|
|
|
|
@implementation AES_CBC
|
|
|
|
#pragma mark AESCBC Mode
|
|
|
|
+ (NSData *)throws_encryptCBCMode:(NSData *)data withKey:(NSData *)key withIV:(NSData *)iv
|
|
{
|
|
if (!data) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"Missing data to encrypt." userInfo:nil];
|
|
}
|
|
if (data.length >= SIZE_MAX - kCCBlockSizeAES128) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"Oversize data." userInfo:nil];
|
|
}
|
|
if (key.length != 32) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"AES key should be 256 bits." userInfo:nil];
|
|
}
|
|
if (iv.length != 16) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"AES-CBC IV should be 128 bits." userInfo:nil];
|
|
}
|
|
|
|
size_t bufferSize;
|
|
ows_add_overflow(data.length, kCCBlockSizeAES128, &bufferSize);
|
|
NSMutableData *_Nullable bufferData = [NSMutableData dataWithLength:bufferSize];
|
|
OWSAssert(bufferData != nil);
|
|
|
|
size_t bytesEncrypted = 0;
|
|
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt,
|
|
kCCAlgorithmAES128,
|
|
kCCOptionPKCS7Padding,
|
|
[key bytes],
|
|
[key length],
|
|
[iv bytes],
|
|
[data bytes],
|
|
[data length],
|
|
bufferData.mutableBytes,
|
|
bufferSize,
|
|
&bytesEncrypted);
|
|
|
|
if (cryptStatus == kCCSuccess) {
|
|
return [bufferData subdataWithRange:NSMakeRange(0, bytesEncrypted)];
|
|
} else {
|
|
@throw [NSException exceptionWithName:CipherException
|
|
reason:@"We encountered an issue while encrypting."
|
|
userInfo:nil];
|
|
}
|
|
}
|
|
|
|
+ (NSData *)throws_decryptCBCMode:(NSData *)data withKey:(NSData *)key withIV:(NSData *)iv
|
|
{
|
|
if (!data) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"Missing data to decrypt." userInfo:nil];
|
|
}
|
|
if (data.length >= SIZE_MAX - kCCBlockSizeAES128) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"Oversize data." userInfo:nil];
|
|
}
|
|
if (key.length != 32) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"AES key should be 256 bits." userInfo:nil];
|
|
}
|
|
if (iv.length != 16) {
|
|
@throw [NSException exceptionWithName:CipherException reason:@"AES-CBC IV should be 128 bits." userInfo:nil];
|
|
}
|
|
|
|
size_t bufferSize;
|
|
ows_add_overflow(data.length, kCCBlockSizeAES128, &bufferSize);
|
|
NSMutableData *_Nullable bufferData = [NSMutableData dataWithLength:bufferSize];
|
|
OWSAssert(bufferData != nil);
|
|
|
|
size_t bytesDecrypted = 0;
|
|
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt,
|
|
kCCAlgorithmAES128,
|
|
kCCOptionPKCS7Padding,
|
|
[key bytes],
|
|
[key length],
|
|
[iv bytes],
|
|
[data bytes],
|
|
[data length],
|
|
bufferData.mutableBytes,
|
|
bufferSize,
|
|
&bytesDecrypted);
|
|
|
|
if (cryptStatus == kCCSuccess) {
|
|
return [bufferData subdataWithRange:NSMakeRange(0, bytesDecrypted)];
|
|
} else {
|
|
@throw [NSException exceptionWithName:CipherException
|
|
reason:@"We encountered an issue while decrypting."
|
|
userInfo:nil];
|
|
}
|
|
}
|
|
|
|
@end
|
|
|
|
NS_ASSUME_NONNULL_END
|