mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-01-02 19:40:57 +00:00
bip32/nem: IV is copied before encryption
This commit is contained in:
parent
b9043659c5
commit
877998fa1a
6
bip32.c
6
bip32.c
@ -490,7 +490,7 @@ int hdnode_get_nem_shared_key(const HDNode *node, const ed25519_public_key peer_
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
int hdnode_nem_encrypt(const HDNode *node, const ed25519_public_key public_key, uint8_t *iv, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer) {
|
int hdnode_nem_encrypt(const HDNode *node, const ed25519_public_key public_key, const uint8_t *iv_immut, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer) {
|
||||||
uint8_t last_block[AES_BLOCK_SIZE];
|
uint8_t last_block[AES_BLOCK_SIZE];
|
||||||
uint8_t remainder = size % AES_BLOCK_SIZE;
|
uint8_t remainder = size % AES_BLOCK_SIZE;
|
||||||
|
|
||||||
@ -501,6 +501,10 @@ int hdnode_nem_encrypt(const HDNode *node, const ed25519_public_key public_key,
|
|||||||
// Pad new last block with number of missing bytes
|
// Pad new last block with number of missing bytes
|
||||||
memset(&last_block[remainder], AES_BLOCK_SIZE - remainder, AES_BLOCK_SIZE - remainder);
|
memset(&last_block[remainder], AES_BLOCK_SIZE - remainder, AES_BLOCK_SIZE - remainder);
|
||||||
|
|
||||||
|
// the IV gets mutated, so we make a copy not to touch the original
|
||||||
|
uint8_t iv[AES_BLOCK_SIZE];
|
||||||
|
memcpy(iv, iv_immut, AES_BLOCK_SIZE);
|
||||||
|
|
||||||
uint8_t shared_key[SHA3_256_DIGEST_LENGTH];
|
uint8_t shared_key[SHA3_256_DIGEST_LENGTH];
|
||||||
if (!hdnode_get_nem_shared_key(node, public_key, salt, NULL, shared_key)) {
|
if (!hdnode_get_nem_shared_key(node, public_key, salt, NULL, shared_key)) {
|
||||||
return 0;
|
return 0;
|
||||||
|
2
bip32.h
2
bip32.h
@ -81,7 +81,7 @@ int hdnode_get_ethereum_pubkeyhash(const HDNode *node, uint8_t *pubkeyhash);
|
|||||||
#if USE_NEM
|
#if USE_NEM
|
||||||
int hdnode_get_nem_address(HDNode *node, uint8_t version, char *address);
|
int hdnode_get_nem_address(HDNode *node, uint8_t version, char *address);
|
||||||
int hdnode_get_nem_shared_key(const HDNode *node, const ed25519_public_key peer_public_key, const uint8_t *salt, ed25519_public_key mul, uint8_t *shared_key);
|
int hdnode_get_nem_shared_key(const HDNode *node, const ed25519_public_key peer_public_key, const uint8_t *salt, ed25519_public_key mul, uint8_t *shared_key);
|
||||||
int hdnode_nem_encrypt(const HDNode *node, const ed25519_public_key public_key, uint8_t *iv, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer);
|
int hdnode_nem_encrypt(const HDNode *node, const ed25519_public_key public_key, const uint8_t *iv, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer);
|
||||||
int hdnode_nem_decrypt(const HDNode *node, const ed25519_public_key public_key, uint8_t *iv, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer);
|
int hdnode_nem_decrypt(const HDNode *node, const ed25519_public_key public_key, uint8_t *iv, const uint8_t *salt, const uint8_t *payload, size_t size, uint8_t *buffer);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user