Page MenuHomePhabricator

[native][AES] Implement decrypt function on iOS
ClosedPublic

Authored by bartek on Mar 8 2023, 10:09 AM.
Tags
None
Referenced Files
F3373324: D7006.id23842.diff
Tue, Nov 26, 9:01 AM
F3372867: D7006.id23541.diff
Tue, Nov 26, 8:11 AM
Unknown Object (File)
Fri, Nov 22, 5:55 PM
Unknown Object (File)
Fri, Nov 22, 1:37 PM
Unknown Object (File)
Sun, Nov 10, 5:54 PM
Unknown Object (File)
Fri, Nov 8, 3:22 PM
Unknown Object (File)
Sat, Nov 2, 12:28 AM
Unknown Object (File)
Sat, Nov 2, 12:28 AM
Subscribers

Details

Summary
Test Plan

Placed this e.g. in root component render function

import * as AES from './utils/aes-crypto-module.js';

const key = AES.generateKey();
console.log('Key', key);
const plaintextBytes = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8, 9, 10]);
const ciphertext = AES.encrypt(key, plaintextBytes);
console.log('Ciphertext', ciphertext);
const decrypted = AES.decrypt(key, ciphertext);
console.log('Decrypted', decrypted); // should be [1,2,3...9,10]

should display sth like:

LOG  Key [82, 226, 211, 141, 62, 105, 93, 161, 238, 193, 163, 46, 151, 205, 133, 163, 175, 15, 110, 16, 139, 86, 150, 10, 26, 30, 179, 245, 221, 215, 19, 13]
LOG  Ciphertext [74, 52, 31, 132, 80, 213, 246, 255, 188, 231, 18, 27, 222, 224, 91, 53, 204, 198, 109, 53, 40, 194, 198, 149, 181, 34, 131, 102, 228, 246, 171, 190, 89, 232, 36, 74, 173, 211]
LOG  Decrypted [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]

Diff Detail

Repository
rCOMM Comm
Lint
No Lint Coverage
Unit
No Test Coverage

Event Timeline

bartek held this revision as a draft.
bartek published this revision for review.Mar 8 2023, 10:41 AM
atul requested changes to this revision.Mar 9 2023, 2:47 PM

Some questions inline. Definitely feel free to re-request review if there's something I'm missing.

native/expo-modules/aes-crypto/ios/AESCryptoModule.swift
53

Already mentioned in D7005, but it's kind of confusing how ciphertext can mean multiple things. I'm guessing here ciphertext is iv || ciphertext || tag concatenation vs. "just the ciphertext"?

Think some sort of seal(...)/sealedData (where sealedData = iv || ciphertext || tag concatenation) naming convention would make the distinction clearer?

55

It looks like this check handles one specific possible invalid ciphertext case.

Not sure we need this, I'm fairly confident we can trust AES.GCM.SealedBox(...) to throw if ciphertext is invalid (this case + others)?

Let me know if there's something I'm missing

56

Is there a reason we're doing a >= check instead of ==? Seems like elsewhere we expect the sizes to be exact?

62–68

This looks correct, but I'm hesitant about deconstructing cipherText "manually" based on offsets. This case is pretty simple, but still seems like a brittle approach.

Is there a reason we can't use the

init<D>(combined: D) throws where D : DataProtocol

initializer instead?

According to https://developer.apple.com/documentation/cryptokit/aes/gcm/sealedbox/init(combined:):

Creates a sealed box from the combined bytes of an authentication tag, nonce, and encrypted data.

That sounds like exactly what we need? Is there something preventing us from using that initializer?

70

Personal style preference would be to pull nonce out to a separate line.

Totally arbitrary preference, feel free to go with whatever you prefer

This revision now requires changes to proceed.Mar 9 2023, 2:47 PM
native/expo-modules/aes-crypto/ios/AESCryptoModule.swift
53

Done

55

If this check fails, we don't even need to create SealedBox because it's evident that the given input is too short. Anyway, I'll move this check to JS because we cannot even create a buffer with a negative length

62–68

Yes, this looks like what we want. I must have missed this initializer. I'll try and check if it works

Address code review feedback

Nice, glad we could cut code and make it simpler with the combined initializer

This revision is now accepted and ready to land.Mar 13 2023, 4:58 PM