I am using the following in perl to encrypt the body of a http:// response.
use Crypt::CBC;
my $cipher = Crypt::CBC->new(
-key => 'testpasswordof32Charlength',
-cipher => "Crypt::OpenSSL::AES"
);
print $cipher->encrypt($data);
and in iOS, using the following to unencrypt:
- (NSData *)AES256DecryptWithKey:(NSString *)key {
// 'key' should be 32 bytes for AES256, will be null-padded otherwise
char keyPtr[kCCKeySizeAES256+1]; // room for terminator (unused)
bzero(keyPtr, sizeof(keyPtr)); // fill with zeroes (for padding)
// fetch key data
[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];
NSUInteger dataLength = [self length];
//See the doc: For block ciphers, the output size will always be less than or
//equal to the input size plus the size of one block.
//That's why we need to add the size of one block here
size_t bufferSize = dataLength + kCCBlockSizeAES128;
void *buffer = malloc(bufferSize);
size_t numBytesDecrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding,
keyPtr, kCCKeySizeAES256,
NULL /* initialization vector (optional) */,
[self bytes], dataLength, /* input */
buffer, bufferSize, /* output */
&numBytesDecrypted);
if (cryptStatus == kCCSuccess) {
//the returned NSData takes ownership of the buffer and will free it on deallocation
return [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted];
}
free(buffer); //free the buffer;
return nil;
}
I then do the following to call the perl routine on the server
NSData *receivedData = [NSURLConnection
sendSynchronousRequest:theRequest
returningResponse:&theResponse
error:&theError];
[receivedData AES256DecryptWithKey:@"testpasswordof32Charlength"];
I get garbage in the receivedData NSData ... any idea why? I am probably missing something plain and (non-simple in decryption)... I ensured that I was using CBC on iOS by using kCCOptionPKCS7Padding
. Any ideas?
Pulling (what little is left of my) hair out!