EncryptionUtils.java 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642
  1. /*
  2. * Nextcloud Android client application
  3. *
  4. * @author Tobias Kaminsky
  5. * Copyright (C) 2017 Tobias Kaminsky
  6. * Copyright (C) 2017 Nextcloud GmbH.
  7. *
  8. * This program is free software: you can redistribute it and/or modify
  9. * it under the terms of the GNU Affero General Public License as published by
  10. * the Free Software Foundation, either version 3 of the License, or
  11. * at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU Affero General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU Affero General Public License
  19. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  20. */
  21. package com.owncloud.android.utils;
  22. import android.accounts.Account;
  23. import android.content.Context;
  24. import android.os.Build;
  25. import android.support.annotation.Nullable;
  26. import android.support.annotation.RequiresApi;
  27. import android.util.Base64;
  28. import com.google.gson.Gson;
  29. import com.google.gson.reflect.TypeToken;
  30. import com.owncloud.android.datamodel.ArbitraryDataProvider;
  31. import com.owncloud.android.datamodel.DecryptedFolderMetadata;
  32. import com.owncloud.android.datamodel.EncryptedFolderMetadata;
  33. import com.owncloud.android.datamodel.OCFile;
  34. import com.owncloud.android.lib.common.OwnCloudClient;
  35. import com.owncloud.android.lib.common.operations.RemoteOperationResult;
  36. import com.owncloud.android.lib.common.utils.Log_OC;
  37. import com.owncloud.android.lib.resources.files.GetMetadataOperation;
  38. import org.apache.commons.codec.binary.Hex;
  39. import java.io.BufferedReader;
  40. import java.io.ByteArrayInputStream;
  41. import java.io.File;
  42. import java.io.FileInputStream;
  43. import java.io.IOException;
  44. import java.io.InputStream;
  45. import java.io.InputStreamReader;
  46. import java.io.RandomAccessFile;
  47. import java.security.InvalidAlgorithmParameterException;
  48. import java.security.InvalidKeyException;
  49. import java.security.Key;
  50. import java.security.KeyFactory;
  51. import java.security.KeyPair;
  52. import java.security.KeyPairGenerator;
  53. import java.security.MessageDigest;
  54. import java.security.NoSuchAlgorithmException;
  55. import java.security.NoSuchProviderException;
  56. import java.security.PrivateKey;
  57. import java.security.PublicKey;
  58. import java.security.SecureRandom;
  59. import java.security.cert.CertificateException;
  60. import java.security.cert.CertificateFactory;
  61. import java.security.cert.X509Certificate;
  62. import java.security.spec.InvalidKeySpecException;
  63. import java.security.spec.InvalidParameterSpecException;
  64. import java.security.spec.KeySpec;
  65. import java.security.spec.PKCS8EncodedKeySpec;
  66. import java.util.ArrayList;
  67. import java.util.Arrays;
  68. import java.util.HashMap;
  69. import java.util.Map;
  70. import javax.crypto.BadPaddingException;
  71. import javax.crypto.Cipher;
  72. import javax.crypto.IllegalBlockSizeException;
  73. import javax.crypto.KeyGenerator;
  74. import javax.crypto.NoSuchPaddingException;
  75. import javax.crypto.SecretKey;
  76. import javax.crypto.SecretKeyFactory;
  77. import javax.crypto.ShortBufferException;
  78. import javax.crypto.spec.GCMParameterSpec;
  79. import javax.crypto.spec.IvParameterSpec;
  80. import javax.crypto.spec.PBEKeySpec;
  81. import javax.crypto.spec.SecretKeySpec;
  82. /**
  83. * Utils for encryption
  84. */
  85. public class EncryptionUtils {
  86. private static String TAG = EncryptionUtils.class.getSimpleName();
  87. public static String PUBLIC_KEY = "PUBLIC_KEY";
  88. public static String PRIVATE_KEY = "PRIVATE_KEY";
  89. public static int ivLength = 16;
  90. public static int saltLength = 40;
  91. private static String ivDelimiter = "fA=="; // "|" base64 encoded
  92. private static int iterationCount = 1024;
  93. private static int keyStrength = 256;
  94. private static String AES_CIPHER = "AES/GCM/NoPadding";
  95. private static String RSA_CIPHER = "RSA/ECB/OAEPWithSHA-256AndMGF1Padding";
  96. /*
  97. JSON
  98. */
  99. public static <T> T deserializeJSON(String json, TypeToken<T> type) {
  100. return new Gson().fromJson(json, type.getType());
  101. }
  102. public static String serializeJSON(Object data) {
  103. return new Gson().toJson(data);
  104. }
  105. /*
  106. METADATA
  107. */
  108. /**
  109. * Encrypt folder metaData
  110. *
  111. * @param decryptedFolderMetadata folder metaData to encrypt
  112. * @return EncryptedFolderMetadata encrypted folder metadata
  113. */
  114. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  115. public static EncryptedFolderMetadata encryptFolderMetadata(DecryptedFolderMetadata decryptedFolderMetadata,
  116. String privateKey)
  117. throws IOException, NoSuchAlgorithmException, ShortBufferException, InvalidKeyException,
  118. InvalidAlgorithmParameterException, NoSuchPaddingException, BadPaddingException,
  119. NoSuchProviderException, IllegalBlockSizeException, InvalidKeySpecException, CertificateException {
  120. HashMap<String, EncryptedFolderMetadata.EncryptedFile> files = new HashMap<>();
  121. EncryptedFolderMetadata encryptedFolderMetadata = new EncryptedFolderMetadata(decryptedFolderMetadata
  122. .getMetadata(), files);
  123. // Encrypt each file in "files"
  124. for (Map.Entry<String, DecryptedFolderMetadata.DecryptedFile> entry : decryptedFolderMetadata
  125. .getFiles().entrySet()) {
  126. String key = entry.getKey();
  127. DecryptedFolderMetadata.DecryptedFile decryptedFile = entry.getValue();
  128. EncryptedFolderMetadata.EncryptedFile encryptedFile = new EncryptedFolderMetadata.EncryptedFile();
  129. encryptedFile.setInitializationVector(decryptedFile.getInitializationVector());
  130. encryptedFile.setMetadataKey(decryptedFile.getMetadataKey());
  131. encryptedFile.setAuthenticationTag(decryptedFile.getAuthenticationTag());
  132. byte[] decryptedMetadataKey = EncryptionUtils.decodeStringToBase64Bytes(EncryptionUtils.decryptStringAsymmetric(
  133. decryptedFolderMetadata.getMetadata().getMetadataKeys().get(encryptedFile.getMetadataKey()),
  134. privateKey));
  135. // encrypt
  136. String dataJson = EncryptionUtils.serializeJSON(decryptedFile.getEncrypted());
  137. encryptedFile.setEncrypted(EncryptionUtils.encryptStringSymmetric(dataJson, decryptedMetadataKey));
  138. files.put(key, encryptedFile);
  139. }
  140. return encryptedFolderMetadata;
  141. }
  142. /*
  143. * decrypt folder metaData with private key
  144. */
  145. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  146. public static DecryptedFolderMetadata decryptFolderMetaData(EncryptedFolderMetadata encryptedFolderMetadata,
  147. String privateKey)
  148. throws IOException, NoSuchAlgorithmException, ShortBufferException, InvalidKeyException,
  149. InvalidAlgorithmParameterException, NoSuchPaddingException, BadPaddingException,
  150. NoSuchProviderException, IllegalBlockSizeException, CertificateException, InvalidKeySpecException {
  151. HashMap<String, DecryptedFolderMetadata.DecryptedFile> files = new HashMap<>();
  152. DecryptedFolderMetadata decryptedFolderMetadata = new DecryptedFolderMetadata(
  153. encryptedFolderMetadata.getMetadata(), files);
  154. for (Map.Entry<String, EncryptedFolderMetadata.EncryptedFile> entry : encryptedFolderMetadata
  155. .getFiles().entrySet()) {
  156. String key = entry.getKey();
  157. EncryptedFolderMetadata.EncryptedFile encryptedFile = entry.getValue();
  158. DecryptedFolderMetadata.DecryptedFile decryptedFile = new DecryptedFolderMetadata.DecryptedFile();
  159. decryptedFile.setInitializationVector(encryptedFile.getInitializationVector());
  160. decryptedFile.setMetadataKey(encryptedFile.getMetadataKey());
  161. decryptedFile.setAuthenticationTag(encryptedFile.getAuthenticationTag());
  162. byte[] decryptedMetadataKey = EncryptionUtils.decodeStringToBase64Bytes(
  163. EncryptionUtils.decryptStringAsymmetric(decryptedFolderMetadata.getMetadata()
  164. .getMetadataKeys().get(encryptedFile.getMetadataKey()), privateKey));
  165. // decrypt
  166. String dataJson = EncryptionUtils.decryptStringSymmetric(encryptedFile.getEncrypted(), decryptedMetadataKey);
  167. decryptedFile.setEncrypted(EncryptionUtils.deserializeJSON(dataJson,
  168. new TypeToken<DecryptedFolderMetadata.Data>() {
  169. }));
  170. files.put(key, decryptedFile);
  171. }
  172. return decryptedFolderMetadata;
  173. }
  174. /**
  175. * Download metadata for folder and decrypt it
  176. *
  177. * @return decrypted metadata or null
  178. */
  179. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  180. public static @Nullable
  181. DecryptedFolderMetadata downloadFolderMetadata(OCFile folder, OwnCloudClient client,
  182. Context context, Account account) {
  183. GetMetadataOperation getMetadataOperation = new GetMetadataOperation(folder.getLocalId());
  184. RemoteOperationResult getMetadataOperationResult = getMetadataOperation.execute(client, true);
  185. if (!getMetadataOperationResult.isSuccess()) {
  186. return null;
  187. }
  188. // decrypt metadata
  189. ArbitraryDataProvider arbitraryDataProvider = new ArbitraryDataProvider(context.getContentResolver());
  190. String serializedEncryptedMetadata = (String) getMetadataOperationResult.getData().get(0);
  191. String privateKey = arbitraryDataProvider.getValue(account.name, EncryptionUtils.PRIVATE_KEY);
  192. EncryptedFolderMetadata encryptedFolderMetadata = EncryptionUtils.deserializeJSON(
  193. serializedEncryptedMetadata, new TypeToken<EncryptedFolderMetadata>() {
  194. });
  195. try {
  196. return EncryptionUtils.decryptFolderMetaData(encryptedFolderMetadata, privateKey);
  197. } catch (Exception e) {
  198. Log_OC.e(TAG, e.getMessage());
  199. return null;
  200. }
  201. }
  202. /*
  203. BASE 64
  204. */
  205. public static byte[] encodeStringToBase64Bytes(String string) {
  206. try {
  207. return Base64.encode(string.getBytes(), Base64.NO_WRAP);
  208. } catch (Exception e) {
  209. return new byte[0];
  210. }
  211. }
  212. public static String decodeBase64BytesToString(byte[] bytes) {
  213. try {
  214. return new String(Base64.decode(bytes, Base64.NO_WRAP));
  215. } catch (Exception e) {
  216. return "";
  217. }
  218. }
  219. public static String encodeBytesToBase64String(byte[] bytes) {
  220. return Base64.encodeToString(bytes, Base64.NO_WRAP);
  221. }
  222. public static byte[] decodeStringToBase64Bytes(String string) {
  223. return Base64.decode(string, Base64.NO_WRAP);
  224. }
  225. /*
  226. ENCRYPTION
  227. */
  228. /**
  229. * @param ocFile file do crypt
  230. * @param encryptionKeyBytes key, either from metadata or {@link EncryptionUtils#generateKey()}
  231. * @param iv initialization vector, either from metadata or {@link EncryptionUtils#randomBytes(int)}
  232. * @return encryptedFile with encryptedBytes and authenticationTag
  233. */
  234. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  235. public static EncryptedFile encryptFile(OCFile ocFile, byte[] encryptionKeyBytes, byte[] iv)
  236. throws NoSuchProviderException, NoSuchAlgorithmException,
  237. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  238. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException {
  239. File file = new File(ocFile.getStoragePath());
  240. return encryptFile(file, encryptionKeyBytes, iv);
  241. }
  242. /**
  243. * @param file file do crypt
  244. * @param encryptionKeyBytes key, either from metadata or {@link EncryptionUtils#generateKey()}
  245. * @param iv initialization vector, either from metadata or {@link EncryptionUtils#randomBytes(int)}
  246. * @return encryptedFile with encryptedBytes and authenticationTag
  247. */
  248. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  249. public static EncryptedFile encryptFile(File file, byte[] encryptionKeyBytes, byte[] iv)
  250. throws NoSuchProviderException, NoSuchAlgorithmException,
  251. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  252. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException {
  253. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  254. Key key = new SecretKeySpec(encryptionKeyBytes, "AES");
  255. GCMParameterSpec spec = new GCMParameterSpec(128, iv);
  256. cipher.init(Cipher.ENCRYPT_MODE, key, spec);
  257. RandomAccessFile randomAccessFile = new RandomAccessFile(file, "r");
  258. byte[] fileBytes = new byte[(int) randomAccessFile.length()];
  259. randomAccessFile.readFully(fileBytes);
  260. byte[] cryptedBytes = cipher.doFinal(fileBytes);
  261. String authenticationTag = encodeBytesToBase64String(Arrays.copyOfRange(cryptedBytes,
  262. cryptedBytes.length - (128 / 8), cryptedBytes.length));
  263. return new EncryptedFile(cryptedBytes, authenticationTag);
  264. }
  265. /**
  266. * @param file encrypted file
  267. * @param encryptionKeyBytes key from metadata
  268. * @param iv initialization vector from metadata
  269. * @param authenticationTag authenticationTag from metadata
  270. * @return decrypted byte[]
  271. */
  272. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  273. public static byte[] decryptFile(File file, byte[] encryptionKeyBytes, byte[] iv, byte[] authenticationTag)
  274. throws NoSuchProviderException, NoSuchAlgorithmException,
  275. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  276. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException {
  277. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  278. Key key = new SecretKeySpec(encryptionKeyBytes, "AES");
  279. GCMParameterSpec spec = new GCMParameterSpec(128, iv);
  280. cipher.init(Cipher.DECRYPT_MODE, key, spec);
  281. RandomAccessFile randomAccessFile = new RandomAccessFile(file, "r");
  282. byte[] fileBytes = new byte[(int) randomAccessFile.length()];
  283. randomAccessFile.readFully(fileBytes);
  284. // check authentication tag
  285. byte[] extractedAuthenticationTag = Arrays.copyOfRange(fileBytes,
  286. fileBytes.length - (128 / 8), fileBytes.length);
  287. if (!Arrays.equals(extractedAuthenticationTag, authenticationTag)) {
  288. throw new SecurityException("Tag not correct");
  289. }
  290. return cipher.doFinal(fileBytes);
  291. }
  292. public static class EncryptedFile {
  293. public byte[] encryptedBytes;
  294. public String authenticationTag;
  295. public EncryptedFile(byte[] encryptedBytes, String authenticationTag) {
  296. this.encryptedBytes = encryptedBytes;
  297. this.authenticationTag = authenticationTag;
  298. }
  299. }
  300. /**
  301. * Encrypt string with RSA algorithm, ECB mode, OAEPWithSHA-256AndMGF1 padding
  302. * Asymmetric encryption, with private and public key
  303. *
  304. * @param string String to encrypt
  305. * @param cert contains public key in it
  306. * @return encrypted string
  307. */
  308. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  309. public static String encryptStringAsymmetric(String string, String cert)
  310. throws NoSuchProviderException, NoSuchAlgorithmException,
  311. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  312. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException, InvalidKeySpecException,
  313. CertificateException {
  314. Cipher cipher = Cipher.getInstance(RSA_CIPHER);
  315. String trimmedCert = cert.replace("-----BEGIN CERTIFICATE-----\n", "")
  316. .replace("-----END CERTIFICATE-----\n", "");
  317. byte[] encodedCert = trimmedCert.getBytes("UTF-8");
  318. byte[] decodedCert = org.apache.commons.codec.binary.Base64.decodeBase64(encodedCert);
  319. CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
  320. InputStream in = new ByteArrayInputStream(decodedCert);
  321. X509Certificate certificate = (X509Certificate) certFactory.generateCertificate(in);
  322. PublicKey realPublicKey = certificate.getPublicKey();
  323. cipher.init(Cipher.ENCRYPT_MODE, realPublicKey);
  324. byte[] bytes = encodeStringToBase64Bytes(string);
  325. byte[] cryptedBytes = cipher.doFinal(bytes);
  326. return encodeBytesToBase64String(cryptedBytes);
  327. }
  328. /**
  329. * Decrypt string with RSA algorithm, ECB mode, OAEPWithSHA-256AndMGF1 padding
  330. * Asymmetric encryption, with private and public key
  331. *
  332. * @param string string to decrypt
  333. * @param privateKeyString private key
  334. * @return decrypted string
  335. */
  336. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  337. public static String decryptStringAsymmetric(String string, String privateKeyString)
  338. throws NoSuchProviderException, NoSuchAlgorithmException,
  339. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  340. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException, CertificateException,
  341. InvalidKeySpecException {
  342. Cipher cipher = Cipher.getInstance(RSA_CIPHER);
  343. byte[] privateKeyBytes = decodeStringToBase64Bytes(privateKeyString);
  344. PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(privateKeyBytes);
  345. KeyFactory kf = KeyFactory.getInstance("RSA");
  346. PrivateKey privateKey = kf.generatePrivate(keySpec);
  347. cipher.init(Cipher.DECRYPT_MODE, privateKey);
  348. byte[] bytes = decodeStringToBase64Bytes(string);
  349. byte[] encodedBytes = cipher.doFinal(bytes);
  350. return decodeBase64BytesToString(encodedBytes);
  351. }
  352. /**
  353. * Encrypt string with RSA algorithm, ECB mode, OAEPWithSHA-256AndMGF1 padding
  354. * Asymmetric encryption, with private and public key
  355. *
  356. * @param string String to encrypt
  357. * @param encryptionKeyBytes key, either from metadata or {@link EncryptionUtils#generateKey()}
  358. * @return encrypted string
  359. */
  360. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  361. public static String encryptStringSymmetric(String string, byte[] encryptionKeyBytes)
  362. throws NoSuchProviderException, NoSuchAlgorithmException,
  363. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  364. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException, InvalidKeySpecException,
  365. CertificateException {
  366. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  367. byte[] iv = randomBytes(ivLength);
  368. Key key = new SecretKeySpec(encryptionKeyBytes, "AES");
  369. GCMParameterSpec spec = new GCMParameterSpec(128, iv);
  370. cipher.init(Cipher.ENCRYPT_MODE, key, spec);
  371. byte[] bytes = encodeStringToBase64Bytes(string);
  372. byte[] cryptedBytes = cipher.doFinal(bytes);
  373. String encodedCryptedBytes = encodeBytesToBase64String(cryptedBytes);
  374. String encodedIV = encodeBytesToBase64String(iv);
  375. return encodedCryptedBytes + ivDelimiter + encodedIV;
  376. }
  377. /**
  378. * Decrypt string with RSA algorithm, ECB mode, OAEPWithSHA-256AndMGF1 padding
  379. * Asymmetric encryption, with private and public key
  380. *
  381. * @param string string to decrypt
  382. * @param encryptionKeyBytes key from metadata
  383. * @return decrypted string
  384. */
  385. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  386. public static String decryptStringSymmetric(String string, byte[] encryptionKeyBytes)
  387. throws NoSuchProviderException, NoSuchAlgorithmException,
  388. InvalidAlgorithmParameterException, NoSuchPaddingException, InvalidKeyException,
  389. BadPaddingException, IllegalBlockSizeException, IOException, ShortBufferException, CertificateException,
  390. InvalidKeySpecException {
  391. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  392. String[] strings = string.split(ivDelimiter);
  393. String cipherString = strings[0];
  394. byte[] iv = new IvParameterSpec(decodeStringToBase64Bytes(strings[1])).getIV();
  395. Key key = new SecretKeySpec(encryptionKeyBytes, "AES");
  396. GCMParameterSpec spec = new GCMParameterSpec(128, iv);
  397. cipher.init(Cipher.DECRYPT_MODE, key, spec);
  398. byte[] bytes = decodeStringToBase64Bytes(cipherString);
  399. byte[] encodedBytes = cipher.doFinal(bytes);
  400. return decodeBase64BytesToString(encodedBytes);
  401. }
  402. /**
  403. * Encrypt private key with symmetric AES encryption, GCM mode mode and no padding
  404. *
  405. * @param privateKey byte64 encoded string representation of private key
  406. * @param keyPhrase key used for encryption, e.g. 12 random words
  407. * {@link EncryptionUtils#getRandomWords(int, Context)}
  408. * @return encrypted string, bytes first encoded base64, IV separated with "|", then to string
  409. */
  410. public static String encryptPrivateKey(String privateKey, String keyPhrase) throws NoSuchPaddingException,
  411. NoSuchAlgorithmException, NoSuchProviderException, InvalidKeyException, BadPaddingException,
  412. IllegalBlockSizeException, InvalidKeySpecException, InvalidParameterSpecException {
  413. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  414. SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
  415. byte[] salt = randomBytes(saltLength);
  416. KeySpec spec = new PBEKeySpec(keyPhrase.toCharArray(), salt, iterationCount, keyStrength);
  417. SecretKey tmp = factory.generateSecret(spec);
  418. SecretKeySpec key = new SecretKeySpec(tmp.getEncoded(), "AES");
  419. cipher.init(Cipher.ENCRYPT_MODE, key);
  420. byte[] bytes = encodeStringToBase64Bytes(privateKey);
  421. byte[] encrypted = cipher.doFinal(bytes);
  422. byte[] iv = cipher.getParameters().getParameterSpec(IvParameterSpec.class).getIV();
  423. String encodedIV = encodeBytesToBase64String(iv);
  424. String encodedSalt = encodeBytesToBase64String(salt);
  425. String encodedEncryptedBytes = encodeBytesToBase64String(encrypted);
  426. return encodedEncryptedBytes + ivDelimiter + encodedIV + ivDelimiter + encodedSalt;
  427. }
  428. /**
  429. * Decrypt private key with symmetric AES encryption, GCM mode mode and no padding
  430. *
  431. * @param privateKey byte64 encoded string representation of private key, IV separated with "|"
  432. * @param keyPhrase key used for encryption, e.g. 12 random words
  433. * {@link EncryptionUtils#getRandomWords(int, Context)}
  434. * @return decrypted string
  435. */
  436. public static String decryptPrivateKey(String privateKey, String keyPhrase) throws NoSuchPaddingException,
  437. NoSuchAlgorithmException, NoSuchProviderException, InvalidKeyException, BadPaddingException,
  438. IllegalBlockSizeException, InvalidKeySpecException, InvalidAlgorithmParameterException {
  439. // split up iv, salt
  440. String[] strings = privateKey.split(ivDelimiter);
  441. String realPrivateKey = strings[0];
  442. byte[] iv = decodeStringToBase64Bytes(strings[1]);
  443. byte[] salt = decodeStringToBase64Bytes(strings[2]);
  444. Cipher cipher = Cipher.getInstance(AES_CIPHER);
  445. SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
  446. KeySpec spec = new PBEKeySpec(keyPhrase.toCharArray(), salt, iterationCount, keyStrength);
  447. SecretKey tmp = factory.generateSecret(spec);
  448. SecretKeySpec key = new SecretKeySpec(tmp.getEncoded(), "AES");
  449. cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(iv));
  450. byte[] bytes = decodeStringToBase64Bytes(realPrivateKey);
  451. byte[] decrypted = cipher.doFinal(bytes);
  452. String pemKey = decodeBase64BytesToString(decrypted);
  453. return pemKey.replaceAll("\n", "").replace("-----BEGIN PRIVATE KEY-----", "")
  454. .replace("-----END PRIVATE KEY-----", "");
  455. }
  456. public static String privateKeyToPEM(PrivateKey privateKey) throws IOException {
  457. String privateKeyString = encodeBytesToBase64String(privateKey.getEncoded());
  458. return "-----BEGIN PRIVATE KEY-----\n" + privateKeyString.replaceAll("(.{65})", "$1\n")
  459. + "\n-----END PRIVATE KEY-----";
  460. }
  461. /*
  462. Helper
  463. */
  464. public static String getMD5Sum(File file) {
  465. try {
  466. FileInputStream fileInputStream = new FileInputStream(file);
  467. MessageDigest md5 = MessageDigest.getInstance("MD5");
  468. byte[] bytes = new byte[2048];
  469. int readBytes;
  470. while ((readBytes = fileInputStream.read(bytes)) != -1) {
  471. md5.update(bytes, 0, readBytes);
  472. }
  473. return new String(Hex.encodeHex(md5.digest()));
  474. } catch (Exception e) {
  475. Log_OC.e(TAG, e.getMessage());
  476. }
  477. return "";
  478. }
  479. public static ArrayList<String> getRandomWords(int count, Context context) throws IOException {
  480. InputStream ins = context.getResources().openRawResource(context.getResources()
  481. .getIdentifier("encryption_key_words", "raw", context.getPackageName()));
  482. InputStreamReader inputStreamReader = new InputStreamReader(ins);
  483. BufferedReader bufferedReader = new BufferedReader(inputStreamReader);
  484. ArrayList<String> lines = new ArrayList<>();
  485. String line;
  486. while ((line = bufferedReader.readLine()) != null) {
  487. lines.add(line);
  488. }
  489. SecureRandom random = new SecureRandom();
  490. ArrayList<String> outputLines = new ArrayList<>();
  491. for (int i = 0; i < count; i++) {
  492. int randomLine = random.nextInt(lines.size());
  493. outputLines.add(lines.get(randomLine));
  494. }
  495. return outputLines;
  496. }
  497. public static KeyPair generateKeyPair() throws NoSuchAlgorithmException {
  498. KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA");
  499. keyGen.initialize(2048, new SecureRandom());
  500. return keyGen.generateKeyPair();
  501. }
  502. public static byte[] generateKey() {
  503. KeyGenerator keyGenerator;
  504. try {
  505. keyGenerator = KeyGenerator.getInstance("AES");
  506. keyGenerator.init(128);
  507. return keyGenerator.generateKey().getEncoded();
  508. } catch (NoSuchAlgorithmException e) {
  509. e.printStackTrace();
  510. }
  511. return null;
  512. }
  513. public static byte[] randomBytes(int size) {
  514. SecureRandom random = new SecureRandom();
  515. final byte[] iv = new byte[size];
  516. random.nextBytes(iv);
  517. return iv;
  518. }
  519. }