|
|
@ -1,6 +1,8 @@
|
|
|
|
package org.thoughtcrime.securesms.crypto;
|
|
|
|
package org.thoughtcrime.securesms.crypto;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
import static org.session.libsignal.crypto.CipherUtil.CIPHER_LOCK;
|
|
|
|
|
|
|
|
|
|
|
|
import android.os.Build;
|
|
|
|
import android.os.Build;
|
|
|
|
import android.security.keystore.KeyGenParameterSpec;
|
|
|
|
import android.security.keystore.KeyGenParameterSpec;
|
|
|
|
import android.security.keystore.KeyProperties;
|
|
|
|
import android.security.keystore.KeyProperties;
|
|
|
@ -45,44 +47,44 @@ public final class KeyStoreHelper {
|
|
|
|
private static final String ANDROID_KEY_STORE = "AndroidKeyStore";
|
|
|
|
private static final String ANDROID_KEY_STORE = "AndroidKeyStore";
|
|
|
|
private static final String KEY_ALIAS = "SignalSecret";
|
|
|
|
private static final String KEY_ALIAS = "SignalSecret";
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
public static SealedData seal(@NonNull byte[] input) {
|
|
|
|
public static SealedData seal(@NonNull byte[] input) {
|
|
|
|
SecretKey secretKey = getOrCreateKeyStoreEntry();
|
|
|
|
SecretKey secretKey = getOrCreateKeyStoreEntry();
|
|
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
try {
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
|
|
|
|
synchronized (CIPHER_LOCK) {
|
|
|
|
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
|
|
|
|
|
|
|
|
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
|
|
|
|
|
|
|
|
|
|
|
|
byte[] iv = cipher.getIV();
|
|
|
|
byte[] iv = cipher.getIV();
|
|
|
|
byte[] data = cipher.doFinal(input);
|
|
|
|
byte[] data = cipher.doFinal(input);
|
|
|
|
|
|
|
|
|
|
|
|
return new SealedData(iv, data);
|
|
|
|
return new SealedData(iv, data);
|
|
|
|
|
|
|
|
}
|
|
|
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException e) {
|
|
|
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException e) {
|
|
|
|
throw new AssertionError(e);
|
|
|
|
throw new AssertionError(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
public static byte[] unseal(@NonNull SealedData sealedData) {
|
|
|
|
public static byte[] unseal(@NonNull SealedData sealedData) {
|
|
|
|
SecretKey secretKey = getKeyStoreEntry();
|
|
|
|
SecretKey secretKey = getKeyStoreEntry();
|
|
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
try {
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
|
|
|
|
synchronized (CIPHER_LOCK) {
|
|
|
|
cipher.init(Cipher.DECRYPT_MODE, secretKey, new GCMParameterSpec(128, sealedData.iv));
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
|
|
|
|
|
|
|
|
cipher.init(Cipher.DECRYPT_MODE, secretKey, new GCMParameterSpec(128, sealedData.iv));
|
|
|
|
|
|
|
|
|
|
|
|
return cipher.doFinal(sealedData.data);
|
|
|
|
return cipher.doFinal(sealedData.data);
|
|
|
|
|
|
|
|
}
|
|
|
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException e) {
|
|
|
|
} catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException e) {
|
|
|
|
throw new AssertionError(e);
|
|
|
|
throw new AssertionError(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
private static SecretKey getOrCreateKeyStoreEntry() {
|
|
|
|
private static SecretKey getOrCreateKeyStoreEntry() {
|
|
|
|
if (hasKeyStoreEntry()) return getKeyStoreEntry();
|
|
|
|
if (hasKeyStoreEntry()) return getKeyStoreEntry();
|
|
|
|
else return createKeyStoreEntry();
|
|
|
|
else return createKeyStoreEntry();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
private static SecretKey createKeyStoreEntry() {
|
|
|
|
private static SecretKey createKeyStoreEntry() {
|
|
|
|
try {
|
|
|
|
try {
|
|
|
|
KeyGenerator keyGenerator = KeyGenerator.getInstance(KeyProperties.KEY_ALGORITHM_AES, ANDROID_KEY_STORE);
|
|
|
|
KeyGenerator keyGenerator = KeyGenerator.getInstance(KeyProperties.KEY_ALGORITHM_AES, ANDROID_KEY_STORE);
|
|
|
@ -99,7 +101,6 @@ public final class KeyStoreHelper {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
private static SecretKey getKeyStoreEntry() {
|
|
|
|
private static SecretKey getKeyStoreEntry() {
|
|
|
|
KeyStore keyStore = getKeyStore();
|
|
|
|
KeyStore keyStore = getKeyStore();
|
|
|
|
|
|
|
|
|
|
|
@ -137,7 +138,6 @@ public final class KeyStoreHelper {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@RequiresApi(Build.VERSION_CODES.M)
|
|
|
|
|
|
|
|
private static boolean hasKeyStoreEntry() {
|
|
|
|
private static boolean hasKeyStoreEntry() {
|
|
|
|
try {
|
|
|
|
try {
|
|
|
|
KeyStore ks = KeyStore.getInstance(ANDROID_KEY_STORE);
|
|
|
|
KeyStore ks = KeyStore.getInstance(ANDROID_KEY_STORE);
|
|
|
@ -202,7 +202,5 @@ public final class KeyStoreHelper {
|
|
|
|
return Base64.decode(p.getValueAsString(), Base64.NO_WRAP | Base64.NO_PADDING);
|
|
|
|
return Base64.decode(p.getValueAsString(), Base64.NO_WRAP | Base64.NO_PADDING);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|