Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 17 additions & 1 deletion src/Encrypt.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,10 @@ size_t paddingSize(size_t origSize, size_t blockSize, TWAESPaddingMode paddingMo
}

Data AESCBCEncrypt(const Data& key, const Data& data, Data& iv, TWAESPaddingMode paddingMode) {
if (iv.size() != AES_BLOCK_SIZE) {
throw std::invalid_argument("Invalid iv size");
}

aes_encrypt_ctx ctx;
if (aes_encrypt_key(key.data(), static_cast<int>(key.size()), &ctx) == EXIT_FAILURE) {
throw std::invalid_argument("Invalid key");
Expand Down Expand Up @@ -52,6 +56,10 @@ Data AESCBCEncrypt(const Data& key, const Data& data, Data& iv, TWAESPaddingMode
}

Data AESCBCDecrypt(const Data& key, const Data& data, Data& iv, TWAESPaddingMode paddingMode) {
if (iv.size() != AES_BLOCK_SIZE) {
throw std::invalid_argument("Invalid iv size");
}

const size_t blockSize = AES_BLOCK_SIZE;
if (data.size() % blockSize != 0) {
throw std::invalid_argument("Invalid data size");
Expand Down Expand Up @@ -83,7 +91,11 @@ Data AESCBCDecrypt(const Data& key, const Data& data, Data& iv, TWAESPaddingMode
}

Data AESCTREncrypt(const Data& key, const Data& data, Data& iv) {
aes_encrypt_ctx ctx;
if (iv.size() != AES_BLOCK_SIZE) {
throw std::invalid_argument("Invalid iv size");
}

aes_encrypt_ctx ctx;
if (aes_encrypt_key(key.data(), static_cast<int>(key.size()), &ctx) != EXIT_SUCCESS) {
throw std::invalid_argument("Invalid key");
}
Expand All @@ -94,6 +106,10 @@ Data AESCTREncrypt(const Data& key, const Data& data, Data& iv) {
}

Data AESCTRDecrypt(const Data& key, const Data& data, Data& iv) {
if (iv.size() != AES_BLOCK_SIZE) {
throw std::invalid_argument("Invalid iv size");
}

aes_encrypt_ctx ctx;
if (aes_encrypt_key(key.data(), static_cast<int>(key.size()), &ctx) != EXIT_SUCCESS) {
throw std::invalid_argument("Invalid key");
Expand Down
7 changes: 6 additions & 1 deletion src/Keystore/AESParameters.h
Original file line number Diff line number Diff line change
Expand Up @@ -34,13 +34,18 @@ struct AESParameters {
Data iv;

/// Initializes `AESParameters` with a encryption cipher.
static AESParameters AESParametersFromEncryption(TWStoredKeyEncryption encryption);;
static AESParameters AESParametersFromEncryption(TWStoredKeyEncryption encryption);

/// Initializes `AESParameters` with a JSON object.
static AESParameters AESParametersFromJson(const nlohmann::json& json, const std::string& cipher);

/// Saves `this` as a JSON object.
nlohmann::json json() const;

/// Validates AES parameters.
[[nodiscard]] bool isValid() const {
return iv.size() == static_cast<std::size_t>(mBlockSize);
}
};

} // namespace TW::Keystore
14 changes: 14 additions & 0 deletions src/Keystore/EncryptionParameters.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,10 @@ nlohmann::json EncryptionParameters::json() const {

EncryptedPayload::EncryptedPayload(const Data& password, const Data& data, const EncryptionParameters& params)
: params(std::move(params)), _mac() {
if (!this->params.cipherParams.isValid()) {
throw std::invalid_argument("Invalid cipher params");
}

auto scryptParams = std::get<ScryptParameters>(this->params.kdfParams);
auto derivedKey = Data(scryptParams.desiredKeyLength);
scrypt(reinterpret_cast<const byte*>(password.data()), password.size(), scryptParams.salt.data(),
Expand All @@ -90,6 +94,9 @@ EncryptedPayload::EncryptedPayload(const Data& password, const Data& data, const
assert(result == EXIT_SUCCESS);
if (result == EXIT_SUCCESS) {
Data iv = this->params.cipherParams.iv;
// iv size should have been validated in `AESParameters::isValid()`.
assert(iv.size() == gBlockSize);

encrypted = Data(data.size());
aes_ctr_encrypt(data.data(), encrypted.data(), static_cast<int>(data.size()), iv.data(), aes_ctr_cbuf_inc, &ctx);
_mac = computeMAC(derivedKey.end() - params.getKeyBytesSize(), derivedKey.end(), encrypted);
Expand Down Expand Up @@ -125,6 +132,13 @@ Data EncryptedPayload::decrypt(const Data& password) const {
throw DecryptionError::invalidPassword;
}

// Even though the cipher params should have been validated in `EncryptedPayload` constructor,
// double check them here.
if (!params.cipherParams.isValid()) {
throw DecryptionError::invalidCipher;
}
assert(params.cipherParams.iv.size() == gBlockSize);

Data decrypted(encrypted.size());
Data iv = params.cipherParams.iv;
const auto encryption = params.cipherParams.mCipherEncryption;
Expand Down
Loading