AES解密iOS

AES解密iOS,ios,objective-c,security,encryption,aes,Ios,Objective C,Security,Encryption,Aes,我尝试用AES解密来解密字符串消息 - (NSData *)AES256DecryptWithKey:(NSString *)key andIV:(NSString*)iv{ // 'key' should be 32 bytes for AES256, will be null-padded otherwise char keyPtr[kCCKeySizeAES256+1]; // room for terminator (unused) bzero( keyPtr, sizeof( key

我尝试用AES解密来解密字符串消息

- (NSData *)AES256DecryptWithKey:(NSString *)key andIV:(NSString*)iv{

// 'key' should be 32 bytes for AES256, will be null-padded otherwise
char keyPtr[kCCKeySizeAES256+1]; // room for terminator (unused)
bzero( keyPtr, sizeof( keyPtr ) ); // fill with zeroes (for padding)

// fetch key data
[key getCString:keyPtr maxLength:sizeof( keyPtr ) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [self length];

//See the doc: For block ciphers, the output size will always be less than or
//equal to the input size plus the size of one block.
//That's why we need to add the size of one block here
size_t bufferSize = dataLength + kCCBlockSizeAES128;
void *buffer = malloc( bufferSize );

size_t numBytesDecrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt( kCCDecrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding,
                                      keyPtr, kCCKeySizeAES256,
                                      //[iv cStringUsingEncoding:NSUTF8StringEncoding] /* initialization vector (optional) */,
                                      NULL,
                                      [self bytes], dataLength, /* input */
                                      buffer, bufferSize, /* output */
                                      &numBytesDecrypted );

if( cryptStatus == kCCSuccess )
{
    NSLog(@"CRYPTSTATUS %d",cryptStatus);

    //the returned NSData takes ownership of the buffer and will free it on deallocation
    return [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted];

}

NSLog(@"CRYPTSTATUS %d",cryptStatus);


free( buffer ); //free the buffer
return nil;
}

但是结果被截断了,有人有什么建议吗?这似乎是填充物的问题,但我不知道。稍后将发送AES密钥(RSA加密)

如果你能给我一些建议就好了

编辑:输入(base64编码)


输入也应填充到最近的块。如果输入在块边界上结束,实际上仍然会添加整个其他块,以便始终具有填充(稍后将删除)


您必须知道解密文本的结尾和填充的起始位置。通常,这是通过填充来处理的,例如。由于您将知道填充的字节数,因此稍后很容易剥离。

请向我们提供一些输入/输出示例。请注意,您如何创建密钥以及如何处理IV似乎存在问题。还请注意,解密大小将始终小于密文(它是密文长度减去填充)。我添加了输入,以获取更多信息。最终解密的字符串应该是“so-ein-ander-string”,但它被截断为“so-ein-ander-s”。它被精确截断为一个块,但我不明白为什么会发生这种情况。嗨,谢谢你的回答。我所能看到的代码都是按照你描述的那样完成的,不是吗?实际上我看不出代码中有错误。@AngeloWalczak,似乎输入是
[self bytes]
。我看不出你在哪儿填的。
NSData *keydata = [[NSData alloc]initWithBase64EncodedString:@"QUFBQUE5MThEOTMyOEJCQkJCQkJCODhFMTM3MURFREQ="];
NSString *key = [[NSString alloc]initWithData:keydata encoding:NSUTF8StringEncoding];

NSData *msgnormal = [[NSData alloc]initWithBase64EncodedString:@"oE4LOCjOfjPeggXsDbLQ4ko+57kdb/5EBUcmlTBvaaI="];
NSData *decrypted = [msgnormal AES256DecryptWithKey:key andIV:@""];

NSLog(@"DECRYPTED: %@",[[NSString alloc]initWithData:decrypted encoding:NSUTF8StringEncoding]);