explicitly use BouncyCastle for file crypto
This commit is contained in:
parent
257de4b51e
commit
00191e2b60
|
@ -54,7 +54,7 @@ dependencies {
|
||||||
compatImplementation "com.android.support:support-emoji-appcompat:$supportLibVersion"
|
compatImplementation "com.android.support:support-emoji-appcompat:$supportLibVersion"
|
||||||
conversationsFreeCompatImplementation "com.android.support:support-emoji-bundled:$supportLibVersion"
|
conversationsFreeCompatImplementation "com.android.support:support-emoji-bundled:$supportLibVersion"
|
||||||
quicksyFreeCompatImplementation "com.android.support:support-emoji-bundled:$supportLibVersion"
|
quicksyFreeCompatImplementation "com.android.support:support-emoji-bundled:$supportLibVersion"
|
||||||
implementation 'org.bouncycastle:bcmail-jdk15on:1.58'
|
implementation 'org.bouncycastle:bcmail-jdk15on:1.64'
|
||||||
//zxing stopped supporting Java 7 so we have to stick with 3.3.3
|
//zxing stopped supporting Java 7 so we have to stick with 3.3.3
|
||||||
//https://github.com/zxing/zxing/issues/1170
|
//https://github.com/zxing/zxing/issues/1170
|
||||||
implementation 'com.google.zxing:core:3.3.3'
|
implementation 'com.google.zxing:core:3.3.3'
|
||||||
|
@ -90,7 +90,7 @@ android {
|
||||||
defaultConfig {
|
defaultConfig {
|
||||||
minSdkVersion 16
|
minSdkVersion 16
|
||||||
targetSdkVersion 28
|
targetSdkVersion 28
|
||||||
versionCode 365
|
versionCode 366
|
||||||
versionName "2.7.1"
|
versionName "2.7.1"
|
||||||
archivesBaseName += "-$versionName"
|
archivesBaseName += "-$versionName"
|
||||||
applicationId "eu.siacs.conversations"
|
applicationId "eu.siacs.conversations"
|
||||||
|
|
|
@ -1157,7 +1157,7 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
||||||
|
|
||||||
@Nullable
|
@Nullable
|
||||||
public XmppAxolotlMessage encrypt(Message message) {
|
public XmppAxolotlMessage encrypt(Message message) {
|
||||||
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId(), true);
|
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId());
|
||||||
final String content;
|
final String content;
|
||||||
if (message.hasFileOnRemoteHost()) {
|
if (message.hasFileOnRemoteHost()) {
|
||||||
content = message.getFileParams().url.toString();
|
content = message.getFileParams().url.toString();
|
||||||
|
@ -1201,7 +1201,7 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
||||||
executor.execute(new Runnable() {
|
executor.execute(new Runnable() {
|
||||||
@Override
|
@Override
|
||||||
public void run() {
|
public void run() {
|
||||||
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId(), false);
|
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId());
|
||||||
if (buildHeader(axolotlMessage, conversation)) {
|
if (buildHeader(axolotlMessage, conversation)) {
|
||||||
onMessageCreatedCallback.run(axolotlMessage);
|
onMessageCreatedCallback.run(axolotlMessage);
|
||||||
} else {
|
} else {
|
||||||
|
@ -1362,7 +1362,7 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
||||||
}
|
}
|
||||||
|
|
||||||
private void completeSession(XmppAxolotlSession session) {
|
private void completeSession(XmppAxolotlSession session) {
|
||||||
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId(), true);
|
final XmppAxolotlMessage axolotlMessage = new XmppAxolotlMessage(account.getJid().asBareJid(), getOwnDeviceId());
|
||||||
axolotlMessage.addDevice(session, true);
|
axolotlMessage.addDevice(session, true);
|
||||||
try {
|
try {
|
||||||
final Jid jid = Jid.of(session.getRemoteAddress().getName());
|
final Jid jid = Jid.of(session.getRemoteAddress().getName());
|
||||||
|
|
|
@ -85,11 +85,11 @@ public class XmppAxolotlMessage {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
XmppAxolotlMessage(Jid from, int sourceDeviceId, final boolean twelveByteIv) {
|
XmppAxolotlMessage(Jid from, int sourceDeviceId) {
|
||||||
this.from = from;
|
this.from = from;
|
||||||
this.sourceDeviceId = sourceDeviceId;
|
this.sourceDeviceId = sourceDeviceId;
|
||||||
this.keys = new ArrayList<>();
|
this.keys = new ArrayList<>();
|
||||||
this.iv = generateIv(twelveByteIv);
|
this.iv = generateIv();
|
||||||
this.innerKey = generateKey();
|
this.innerKey = generateKey();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -119,9 +119,9 @@ public class XmppAxolotlMessage {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static byte[] generateIv(final boolean twelveByteIv) {
|
private static byte[] generateIv() {
|
||||||
final SecureRandom random = new SecureRandom();
|
final SecureRandom random = new SecureRandom();
|
||||||
byte[] iv = new byte[twelveByteIv ? 12 : 16];
|
final byte[] iv = new byte[12];
|
||||||
random.nextBytes(iv);
|
random.nextBytes(iv);
|
||||||
return iv;
|
return iv;
|
||||||
}
|
}
|
||||||
|
|
|
@ -110,15 +110,7 @@ public class HttpUploadConnection implements Transferable {
|
||||||
if (Config.ENCRYPT_ON_HTTP_UPLOADED
|
if (Config.ENCRYPT_ON_HTTP_UPLOADED
|
||||||
|| message.getEncryption() == Message.ENCRYPTION_AXOLOTL
|
|| message.getEncryption() == Message.ENCRYPTION_AXOLOTL
|
||||||
|| message.getEncryption() == Message.ENCRYPTION_OTR) {
|
|| message.getEncryption() == Message.ENCRYPTION_OTR) {
|
||||||
//ok, this is going to sound super crazy but on Android 9+ a 12 byte IV will use the
|
this.key = new byte[44];
|
||||||
//internal conscrypt library (provided by the OS) instead of bounce castle, while 16 bytes
|
|
||||||
//will still 'fallback' to bounce castle even on Android 9+ because conscrypt doesnt
|
|
||||||
//have support for anything but 12.
|
|
||||||
//For large files conscrypt has extremely bad performance; so why not always use 16 you ask?
|
|
||||||
//well the ecosystem was moving and some clients like Monal *only* support 12
|
|
||||||
//so the result of this code is that we can only send 'small' files to Monal.
|
|
||||||
//'small' was relatively arbitrarily choose and correlates to roughly 'small' compressed images
|
|
||||||
this.key = new byte[originalFileSize <= 786432 ? 44 : 48];
|
|
||||||
mXmppConnectionService.getRNG().nextBytes(this.key);
|
mXmppConnectionService.getRNG().nextBytes(this.key);
|
||||||
this.file.setKeyAndIv(this.key);
|
this.file.setKeyAndIv(this.key);
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,6 +5,14 @@ import android.os.PowerManager;
|
||||||
import android.os.SystemClock;
|
import android.os.SystemClock;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
|
import org.bouncycastle.crypto.engines.AESEngine;
|
||||||
|
import org.bouncycastle.crypto.io.CipherInputStream;
|
||||||
|
import org.bouncycastle.crypto.io.CipherOutputStream;
|
||||||
|
import org.bouncycastle.crypto.modes.AEADBlockCipher;
|
||||||
|
import org.bouncycastle.crypto.modes.GCMBlockCipher;
|
||||||
|
import org.bouncycastle.crypto.params.AEADParameters;
|
||||||
|
import org.bouncycastle.crypto.params.KeyParameter;
|
||||||
|
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
import java.io.FileOutputStream;
|
import java.io.FileOutputStream;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
|
@ -15,24 +23,15 @@ import java.security.NoSuchAlgorithmException;
|
||||||
import java.security.NoSuchProviderException;
|
import java.security.NoSuchProviderException;
|
||||||
import java.util.concurrent.atomic.AtomicLong;
|
import java.util.concurrent.atomic.AtomicLong;
|
||||||
|
|
||||||
import javax.crypto.Cipher;
|
|
||||||
import javax.crypto.CipherInputStream;
|
|
||||||
import javax.crypto.CipherOutputStream;
|
|
||||||
import javax.crypto.NoSuchPaddingException;
|
import javax.crypto.NoSuchPaddingException;
|
||||||
import javax.crypto.spec.IvParameterSpec;
|
|
||||||
import javax.crypto.spec.SecretKeySpec;
|
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.entities.DownloadableFile;
|
import eu.siacs.conversations.entities.DownloadableFile;
|
||||||
import eu.siacs.conversations.utils.Compatibility;
|
import eu.siacs.conversations.utils.Compatibility;
|
||||||
import eu.siacs.conversations.utils.CryptoHelper;
|
|
||||||
|
|
||||||
public class AbstractConnectionManager {
|
public class AbstractConnectionManager {
|
||||||
|
|
||||||
private static final String KEYTYPE = "AES";
|
|
||||||
private static final String CIPHERMODE = "AES/GCM/NoPadding";
|
|
||||||
private static final String PROVIDER = "BC";
|
|
||||||
private static final int UI_REFRESH_THRESHOLD = 250;
|
private static final int UI_REFRESH_THRESHOLD = 250;
|
||||||
private static final AtomicLong LAST_UI_UPDATE_CALL = new AtomicLong(0);
|
private static final AtomicLong LAST_UI_UPDATE_CALL = new AtomicLong(0);
|
||||||
protected XmppConnectionService mXmppConnectionService;
|
protected XmppConnectionService mXmppConnectionService;
|
||||||
|
@ -43,10 +42,8 @@ public class AbstractConnectionManager {
|
||||||
|
|
||||||
public static InputStream upgrade(DownloadableFile file, InputStream is) throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, InvalidKeyException, NoSuchPaddingException, NoSuchProviderException {
|
public static InputStream upgrade(DownloadableFile file, InputStream is) throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, InvalidKeyException, NoSuchPaddingException, NoSuchProviderException {
|
||||||
if (file.getKey() != null && file.getIv() != null) {
|
if (file.getKey() != null && file.getIv() != null) {
|
||||||
final Cipher cipher = Compatibility.twentyEight() ? Cipher.getInstance(CIPHERMODE) : Cipher.getInstance(CIPHERMODE, PROVIDER);
|
AEADBlockCipher cipher = new GCMBlockCipher(new AESEngine());
|
||||||
SecretKeySpec keySpec = new SecretKeySpec(file.getKey(), KEYTYPE);
|
cipher.init(true, new AEADParameters(new KeyParameter(file.getKey()), 128, file.getIv()));
|
||||||
IvParameterSpec ivSpec = new IvParameterSpec(file.getIv());
|
|
||||||
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
||||||
return new CipherInputStream(is, cipher);
|
return new CipherInputStream(is, cipher);
|
||||||
} else {
|
} else {
|
||||||
return is;
|
return is;
|
||||||
|
@ -65,10 +62,8 @@ public class AbstractConnectionManager {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
final Cipher cipher = Compatibility.twentyEight() ? Cipher.getInstance(CIPHERMODE) : Cipher.getInstance(CIPHERMODE, PROVIDER);
|
AEADBlockCipher cipher = new GCMBlockCipher(new AESEngine());
|
||||||
SecretKeySpec keySpec = new SecretKeySpec(file.getKey(), KEYTYPE);
|
cipher.init(false, new AEADParameters(new KeyParameter(file.getKey()), 128, file.getIv()));
|
||||||
IvParameterSpec ivSpec = new IvParameterSpec(file.getIv());
|
|
||||||
cipher.init(Cipher.DECRYPT_MODE, keySpec, ivSpec);
|
|
||||||
return new CipherOutputStream(os, cipher);
|
return new CipherOutputStream(os, cipher);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
Log.d(Config.LOGTAG, "unable to create cipher output stream", e);
|
Log.d(Config.LOGTAG, "unable to create cipher output stream", e);
|
||||||
|
|
Loading…
Reference in New Issue