Aegis/app/src/main/java/com/beemdevelopment/aegis/crypto
Alexander Bakker 8c658ac930 Use the old encode method for passwords over 64 bytes and repair the slot (#98)
Commit afb9e59711 fixed a bug where the password
encode function would add null bytes to the end of the output. Luckily (I
thought), PBKDF2 produces collisions for inputs with trailing null bytes and
thus scrypt does this as well, so we could safely change that function to remove
the null bytes without any impact. Unfortunately, that doesn't hold up if the
password is over 64 bytes in size. So after that change, the KDF started
producing different keys than before for such passwords and thus some users
could no longer unlock their vault.

This patch addresses the issue by using the old password encode function for
passwords over 64 bytes and repairing the affected password slot.
2019-05-26 23:52:20 +02:00
..
otp Normalize formatting and 'optimize' imports 2019-04-04 14:07:36 +02:00
CryptoUtils.java Use the old encode method for passwords over 64 bytes and repair the slot (#98) 2019-05-26 23:52:20 +02:00
CryptParameters.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00
CryptResult.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00
KeyStoreHandle.java Fix a crash on KitKat when clearing the KeyStore 2019-04-04 18:49:57 +02:00
KeyStoreHandleException.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00
MasterKey.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00
MasterKeyException.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00
SCryptParameters.java Rename package to com.beemdevelopment.aegis 2019-02-07 22:39:33 +01:00