Commit ea29ea4
committed
Fix issue #226: raw key+salt not handled properly
In case a database is encrypted with the _SQLCipher_ scheme using _raw key and salt material_ and the _plaintext header_ feature, opening an existing database failed. The reason was that the salt part was erroneously ignored on reading the raw key and salt material. This has been fixed.
The same fix has been applied to other cipher schemes, namely AEGIS, Ascon, and ChaCha20. Actually, this fix is currently not absolutely required for these schemes, because the salt is only used for key derivation, which is not performed when raw key and salt material is used. However, behaviour of the schemes may change in the future.1 parent c519b34 commit ea29ea4
File tree
4 files changed
+8
-0
lines changed- src
4 files changed
+8
-0
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
262 | 262 | | |
263 | 263 | | |
264 | 264 | | |
| 265 | + | |
| 266 | + | |
265 | 267 | | |
266 | 268 | | |
267 | 269 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
131 | 131 | | |
132 | 132 | | |
133 | 133 | | |
| 134 | + | |
| 135 | + | |
134 | 136 | | |
135 | 137 | | |
136 | 138 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
157 | 157 | | |
158 | 158 | | |
159 | 159 | | |
| 160 | + | |
| 161 | + | |
160 | 162 | | |
161 | 163 | | |
162 | 164 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
252 | 252 | | |
253 | 253 | | |
254 | 254 | | |
| 255 | + | |
| 256 | + | |
255 | 257 | | |
256 | 258 | | |
257 | 259 | | |
| |||
0 commit comments