session-ios/SignalServiceKit/src/Devices/OWSProvisioningCipher.m

162 lines
4.9 KiB
Objective-C

//
// Copyright (c) 2018 Open Whisper Systems. All rights reserved.
//
#import "OWSProvisioningCipher.h"
#import <CommonCrypto/CommonCrypto.h>
#import <Curve25519Kit/Curve25519.h>
#import <HKDFKit/HKDFKit.h>
#import <SignalCoreKit/Cryptography.h>
NS_ASSUME_NONNULL_BEGIN
@interface OWSProvisioningCipher ()
@property (nonatomic, readonly) NSData *theirPublicKey;
@property (nonatomic, readonly) ECKeyPair *ourKeyPair;
@property (nonatomic, readonly) NSData *initializationVector;
@end
#pragma mark -
@implementation OWSProvisioningCipher
- (instancetype)initWithTheirPublicKey:(NSData *)theirPublicKey
{
return [self initWithTheirPublicKey:theirPublicKey
ourKeyPair:[Curve25519 generateKeyPair]
initializationVector:[Cryptography generateRandomBytes:kCCBlockSizeAES128]];
}
// Private method which exposes dependencies for testing
- (instancetype)initWithTheirPublicKey:(NSData *)theirPublicKey
ourKeyPair:(ECKeyPair *)ourKeyPair
initializationVector:(NSData *)initializationVector
{
self = [super init];
if (!self) {
return self;
}
_theirPublicKey = theirPublicKey;
_ourKeyPair = ourKeyPair;
_initializationVector = initializationVector;
return self;
}
- (NSData *)ourPublicKey
{
return self.ourKeyPair.publicKey;
}
- (nullable NSData *)encrypt:(NSData *)dataToEncrypt
{
@try {
// Exceptions can be thrown in a number of places in encryptUnsafe, e.g.:
//
// * Curve25519's generateSharedSecretFromPublicKey.
// * [HKDFKit deriveKey].
return [self encryptUnsafe:dataToEncrypt];
} @catch (NSException *exception) {
OWSFailDebug(@"exception: %@ of type: %@ with reason: %@, user info: %@.",
exception.description,
exception.name,
exception.reason,
exception.userInfo);
return nil;
}
}
- (nullable NSData *)encryptUnsafe:(NSData *)dataToEncrypt
{
NSData *sharedSecret =
[Curve25519 generateSharedSecretFromPublicKey:self.theirPublicKey andKeyPair:self.ourKeyPair];
NSData *infoData = [@"TextSecure Provisioning Message" dataUsingEncoding:NSASCIIStringEncoding];
NSData *nullSalt = [[NSMutableData dataWithLength:32] copy];
NSData *derivedSecret = [HKDFKit deriveKey:sharedSecret info:infoData salt:nullSalt outputSize:64];
NSData *cipherKey = [derivedSecret subdataWithRange:NSMakeRange(0, 32)];
NSData *macKey = [derivedSecret subdataWithRange:NSMakeRange(32, 32)];
if (cipherKey.length != 32) {
OWSFailDebug(@"Cipher Key must be 32 bytes");
return nil;
}
if (macKey.length != 32) {
OWSFailDebug(@"Mac Key must be 32 bytes");
return nil;
}
u_int8_t versionByte[] = { 0x01 };
NSMutableData *message = [NSMutableData dataWithBytes:&versionByte length:1];
NSData *_Nullable cipherText = [self encrypt:dataToEncrypt withKey:cipherKey];
if (cipherText == nil) {
OWSFailDebug(@"Provisioning cipher failed.");
return nil;
}
[message appendData:cipherText];
NSData *_Nullable mac = [self macForMessage:message withKey:macKey];
if (mac == nil) {
OWSFailDebug(@"mac failed.");
return nil;
}
[message appendData:mac];
return [message copy];
}
- (nullable NSData *)encrypt:(NSData *)dataToEncrypt withKey:(NSData *)cipherKey
{
NSData *iv = self.initializationVector;
if (iv.length != kCCBlockSizeAES128) {
OWSFailDebug(@"Unexpected length for iv");
return nil;
}
if (dataToEncrypt.length >= SIZE_MAX - (kCCBlockSizeAES128 + iv.length)) {
OWSFailDebug(@"data is too long to encrypt.");
return nil;
}
// allow space for message + padding any incomplete block. PKCS7 padding will always add at least one byte.
size_t ciphertextBufferSize = dataToEncrypt.length + kCCBlockSizeAES128;
NSMutableData *ciphertextData = [[NSMutableData alloc] initWithLength:ciphertextBufferSize];
size_t bytesEncrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt,
kCCAlgorithmAES,
kCCOptionPKCS7Padding,
cipherKey.bytes,
cipherKey.length,
iv.bytes,
dataToEncrypt.bytes,
dataToEncrypt.length,
ciphertextData.mutableBytes,
ciphertextBufferSize,
&bytesEncrypted);
if (cryptStatus != kCCSuccess) {
OWSFailDebug(@"Encryption failed with status: %d", cryptStatus);
return nil;
}
// message format is (iv || ciphertext)
NSMutableData *encryptedMessage = [NSMutableData new];
[encryptedMessage appendData:iv];
[encryptedMessage appendData:[ciphertextData subdataWithRange:NSMakeRange(0, bytesEncrypted)]];
return [encryptedMessage copy];
}
- (nullable NSData *)macForMessage:(NSData *)message withKey:(NSData *)macKey
{
return [Cryptography computeSHA256HMAC:message withHMACKey:macKey];
}
@end
NS_ASSUME_NONNULL_END