forked from trustwallet/wallet-core
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathTWAES.cpp
More file actions
73 lines (57 loc) · 2.59 KB
/
TWAES.cpp
File metadata and controls
73 lines (57 loc) · 2.59 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
// Copyright © 2017-2020 Trust Wallet.
//
// This file is part of Trust. The full Trust copyright notice, including
// terms governing use, modification, and redistribution, is contained in the
// file LICENSE at the root of the source code distribution tree.
#include <TrustWalletCore/TWAES.h>
#include <TrezorCrypto/aes.h>
#include <cassert>
#include <cstring>
TWData *_Nullable TWAESCBCEncrypt(TWData *_Nonnull key, TWData *_Nonnull data, TWData *_Nonnull iv) {
aes_encrypt_ctx ctx;
if (aes_encrypt_key(TWDataBytes(key), static_cast<int>(TWDataSize(key)), &ctx) == EXIT_FAILURE) {
return nullptr;
}
const auto resultSize = 16 * ((TWDataSize(data) + 15) / 16);
TWData *result = TWDataCreateWithSize(resultSize);
size_t i;
for (i = 0; i <= TWDataSize(data) - 16; i += 16) {
aes_cbc_encrypt(TWDataBytes(data) + i, TWDataBytes(result) + i, 16, TWDataBytes(iv), &ctx);
}
if (i < TWDataSize(data)) {
uint8_t padded[16] = {0};
std::memcpy(padded, TWDataBytes(data) + i, TWDataSize(data) - i);
aes_cbc_encrypt(padded, TWDataBytes(result) + i, 16, TWDataBytes(iv), &ctx);
}
return result;
}
TWData *_Nullable TWAESCBCDecrypt(TWData *_Nonnull key, TWData *_Nonnull data, TWData *_Nonnull iv) {
assert((TWDataSize(data) % 16) == 0);
aes_decrypt_ctx ctx;
if (aes_decrypt_key(TWDataBytes(key), static_cast<int>(TWDataSize(key)), &ctx) == EXIT_FAILURE) {
return nullptr;
}
TWData *result = TWDataCreateWithSize(TWDataSize(data));
for (std::size_t i = 0; i < TWDataSize(data); i += 16) {
aes_cbc_decrypt(TWDataBytes(data) + i, TWDataBytes(result) + i, 16, TWDataBytes(iv), &ctx);
}
return result;
}
TWData *_Nullable TWAESCTREncrypt(TWData *_Nonnull key, TWData *_Nonnull data, TWData *_Nonnull iv) {
aes_encrypt_ctx ctx;
if (aes_encrypt_key(TWDataBytes(key), static_cast<int>(TWDataSize(key)), &ctx) == EXIT_FAILURE) {
return nullptr;
}
TWData *result = TWDataCreateWithSize(TWDataSize(data));
aes_ctr_encrypt(TWDataBytes(data), TWDataBytes(result), TWDataSize(data), TWDataBytes(iv), aes_ctr_cbuf_inc, &ctx);
return result;
}
TWData *_Nullable TWAESCTRDecrypt(TWData *_Nonnull key, TWData *_Nonnull data, TWData *_Nonnull iv) {
aes_encrypt_ctx ctx;
if (aes_encrypt_key(TWDataBytes(key), static_cast<int>(TWDataSize(key)), &ctx) == EXIT_FAILURE) {
return nullptr;
}
TWData *result = TWDataCreateWithSize(TWDataSize(data));
aes_ctr_decrypt(TWDataBytes(data), TWDataBytes(result), TWDataSize(data), TWDataBytes(iv), aes_ctr_cbuf_inc, &ctx);
return result;
}