392 lines
16 KiB
Java
392 lines
16 KiB
Java
|
|
/*
|
||
|
|
* Copyright (C) 2012 Dominik Schürmann <dominik@dominikschuermann.de>
|
||
|
|
*
|
||
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
|
* you may not use this file except in compliance with the License.
|
||
|
|
* You may obtain a copy of the License at
|
||
|
|
*
|
||
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
*
|
||
|
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
|
* See the License for the specific language governing permissions and
|
||
|
|
* limitations under the License.
|
||
|
|
*/
|
||
|
|
|
||
|
|
package org.sufficientlysecure.keychain.crypto_provider;
|
||
|
|
|
||
|
|
import java.io.ByteArrayInputStream;
|
||
|
|
import java.io.ByteArrayOutputStream;
|
||
|
|
import java.io.IOException;
|
||
|
|
import java.io.InputStream;
|
||
|
|
import java.io.OutputStream;
|
||
|
|
import java.security.NoSuchAlgorithmException;
|
||
|
|
import java.security.NoSuchProviderException;
|
||
|
|
import java.security.SignatureException;
|
||
|
|
|
||
|
|
import org.spongycastle.openpgp.PGPException;
|
||
|
|
import org.sufficientlysecure.keychain.Constants;
|
||
|
|
import org.sufficientlysecure.keychain.Id;
|
||
|
|
import org.sufficientlysecure.keychain.helper.PgpMain;
|
||
|
|
import org.sufficientlysecure.keychain.helper.PgpMain.PgpGeneralException;
|
||
|
|
import org.sufficientlysecure.keychain.util.InputData;
|
||
|
|
import org.sufficientlysecure.keychain.util.Log;
|
||
|
|
import org.sufficientlysecure.keychain.R;
|
||
|
|
import org.sufficientlysecure.keychain.service.IKeychainApiService;
|
||
|
|
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
||
|
|
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
||
|
|
import org.sufficientlysecure.keychain.service.handler.IKeychainDecryptHandler;
|
||
|
|
import org.sufficientlysecure.keychain.service.handler.IKeychainEncryptHandler;
|
||
|
|
import org.sufficientlysecure.keychain.service.handler.IKeychainGetDecryptionKeyIdHandler;
|
||
|
|
|
||
|
|
import com.android.crypto.CryptoError;
|
||
|
|
import com.android.crypto.ICryptoCallback;
|
||
|
|
import com.android.crypto.ICryptoService;
|
||
|
|
import com.android.crypto.CryptoSignatureResult;
|
||
|
|
|
||
|
|
import android.app.Service;
|
||
|
|
import android.content.Context;
|
||
|
|
import android.content.Intent;
|
||
|
|
import android.os.Bundle;
|
||
|
|
import android.os.IBinder;
|
||
|
|
import android.os.RemoteException;
|
||
|
|
|
||
|
|
public class CryptoService extends Service {
|
||
|
|
Context mContext;
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void onCreate() {
|
||
|
|
super.onCreate();
|
||
|
|
mContext = this;
|
||
|
|
Log.d(Constants.TAG, "KeychainApiService, onCreate()");
|
||
|
|
}
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void onDestroy() {
|
||
|
|
super.onDestroy();
|
||
|
|
Log.d(Constants.TAG, "KeychainApiService, onDestroy()");
|
||
|
|
}
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public IBinder onBind(Intent intent) {
|
||
|
|
return mBinder;
|
||
|
|
}
|
||
|
|
|
||
|
|
private synchronized void encryptAndSignSafe(byte[] inputBytes, String inputUri,
|
||
|
|
boolean useAsciiArmor, int compression, long[] encryptionKeyIds,
|
||
|
|
String encryptionPassphrase, int symmetricEncryptionAlgorithm, long signatureKeyId,
|
||
|
|
int signatureHashAlgorithm, boolean signatureForceV3, String signaturePassphrase,
|
||
|
|
IKeychainEncryptHandler handler) throws RemoteException {
|
||
|
|
|
||
|
|
try {
|
||
|
|
|
||
|
|
// build InputData and write into OutputStream
|
||
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
||
|
|
long inputLength = inputBytes.length;
|
||
|
|
InputData input = new InputData(inputStream, inputLength);
|
||
|
|
|
||
|
|
OutputStream output = new ByteArrayOutputStream();
|
||
|
|
|
||
|
|
PgpMain.encryptAndSign(mContext, null, input, output, useAsciiArmor, compression,
|
||
|
|
encryptionKeyIds, encryptionPassphrase, symmetricEncryptionAlgorithm,
|
||
|
|
signatureKeyId, signatureHashAlgorithm, signatureForceV3, signaturePassphrase);
|
||
|
|
|
||
|
|
output.close();
|
||
|
|
|
||
|
|
// start activity from service, TOOD: Test!
|
||
|
|
// Intent dialogIntent = new Intent(getBaseContext(), myActivity.class);
|
||
|
|
// dialogIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
||
|
|
// getApplication().startActivity(dialogIntent);
|
||
|
|
|
||
|
|
byte[] outputBytes = ((ByteArrayOutputStream) output).toByteArray();
|
||
|
|
|
||
|
|
// return over handler on client side
|
||
|
|
handler.onSuccess(outputBytes, null);
|
||
|
|
} catch (Exception e) {
|
||
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
||
|
|
|
||
|
|
try {
|
||
|
|
handler.onException(getExceptionId(e), e.getMessage());
|
||
|
|
} catch (Exception t) {
|
||
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
private synchronized void decryptAndVerifySafe(byte[] inputBytes, String passphrase,
|
||
|
|
boolean assumeSymmetric, IKeychainDecryptHandler handler) throws RemoteException {
|
||
|
|
|
||
|
|
try {
|
||
|
|
// build InputData and write into OutputStream
|
||
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
||
|
|
long inputLength = inputBytes.length;
|
||
|
|
InputData inputData = new InputData(inputStream, inputLength);
|
||
|
|
|
||
|
|
OutputStream outputStream = new ByteArrayOutputStream();
|
||
|
|
|
||
|
|
Bundle outputBundle = PgpMain.decryptAndVerify(mContext, null, inputData, outputStream,
|
||
|
|
passphrase, assumeSymmetric);
|
||
|
|
|
||
|
|
outputStream.close();
|
||
|
|
|
||
|
|
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
||
|
|
|
||
|
|
// get signature informations from bundle
|
||
|
|
boolean signature = outputBundle.getBoolean(KeychainIntentService.RESULT_SIGNATURE);
|
||
|
|
long signatureKeyId = outputBundle
|
||
|
|
.getLong(KeychainIntentService.RESULT_SIGNATURE_KEY_ID);
|
||
|
|
String signatureUserId = outputBundle
|
||
|
|
.getString(KeychainIntentService.RESULT_SIGNATURE_USER_ID);
|
||
|
|
boolean signatureSuccess = outputBundle
|
||
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_SUCCESS);
|
||
|
|
boolean signatureUnknown = outputBundle
|
||
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
||
|
|
|
||
|
|
// return over handler on client side
|
||
|
|
handler.onSuccess(outputBytes, null, signature, signatureKeyId, signatureUserId,
|
||
|
|
signatureSuccess, signatureUnknown);
|
||
|
|
} catch (Exception e) {
|
||
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
||
|
|
|
||
|
|
try {
|
||
|
|
handler.onException(getExceptionId(e), e.getMessage());
|
||
|
|
} catch (Exception t) {
|
||
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
private synchronized void getDecryptionKeySafe(byte[] inputBytes, String inputUri,
|
||
|
|
IKeychainGetDecryptionKeyIdHandler handler) {
|
||
|
|
|
||
|
|
// TODO: implement inputUri
|
||
|
|
|
||
|
|
try {
|
||
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
||
|
|
|
||
|
|
long secretKeyId = Id.key.none;
|
||
|
|
boolean symmetric;
|
||
|
|
|
||
|
|
try {
|
||
|
|
secretKeyId = PgpMain.getDecryptionKeyId(CryptoService.this, inputStream);
|
||
|
|
if (secretKeyId == Id.key.none) {
|
||
|
|
throw new PgpGeneralException(getString(R.string.error_noSecretKeyFound));
|
||
|
|
}
|
||
|
|
symmetric = false;
|
||
|
|
} catch (PgpMain.NoAsymmetricEncryptionException e) {
|
||
|
|
secretKeyId = Id.key.symmetric;
|
||
|
|
if (!PgpMain.hasSymmetricEncryption(CryptoService.this, inputStream)) {
|
||
|
|
throw new PgpGeneralException(getString(R.string.error_noKnownEncryptionFound));
|
||
|
|
}
|
||
|
|
symmetric = true;
|
||
|
|
}
|
||
|
|
|
||
|
|
handler.onSuccess(secretKeyId, symmetric);
|
||
|
|
|
||
|
|
} catch (Exception e) {
|
||
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
||
|
|
|
||
|
|
try {
|
||
|
|
handler.onException(getExceptionId(e), e.getMessage());
|
||
|
|
} catch (Exception t) {
|
||
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
private final ICryptoService.Stub mBinder = new ICryptoService.Stub() {
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void encrypt(byte[] inputBytes, String[] encryptionUserIds, ICryptoCallback callback)
|
||
|
|
throws RemoteException {
|
||
|
|
// TODO Auto-generated method stub
|
||
|
|
|
||
|
|
}
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void encryptAndSign(byte[] inputBytes, String[] encryptionUserIds,
|
||
|
|
String signatureUserId, ICryptoCallback callback) throws RemoteException {
|
||
|
|
// TODO Auto-generated method stub
|
||
|
|
|
||
|
|
}
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void sign(byte[] inputBytes, String signatureUserId, ICryptoCallback callback)
|
||
|
|
throws RemoteException {
|
||
|
|
// TODO Auto-generated method stub
|
||
|
|
|
||
|
|
}
|
||
|
|
|
||
|
|
@Override
|
||
|
|
public void decryptAndVerify(byte[] inputBytes, ICryptoCallback callback)
|
||
|
|
throws RemoteException {
|
||
|
|
|
||
|
|
try {
|
||
|
|
// build InputData and write into OutputStream
|
||
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
||
|
|
long inputLength = inputBytes.length;
|
||
|
|
InputData inputData = new InputData(inputStream, inputLength);
|
||
|
|
|
||
|
|
OutputStream outputStream = new ByteArrayOutputStream();
|
||
|
|
|
||
|
|
// String passphrase = "";
|
||
|
|
|
||
|
|
long secretKeyId = PgpMain.getDecryptionKeyId(mContext, inputStream);
|
||
|
|
if (secretKeyId == Id.key.none) {
|
||
|
|
throw new PgpMain.PgpGeneralException(
|
||
|
|
getString(R.string.error_noSecretKeyFound));
|
||
|
|
}
|
||
|
|
|
||
|
|
String passphrase = PassphraseCacheService.getCachedPassphrase(mContext,
|
||
|
|
secretKeyId);
|
||
|
|
|
||
|
|
if (passphrase == null) {
|
||
|
|
// No passphrase cached for this ciphertext! Intent required to cache
|
||
|
|
// passphrase!
|
||
|
|
Intent intent = new Intent(CryptoActivity.ACTION_CACHE_PASSPHRASE);
|
||
|
|
intent.putExtra(CryptoActivity.EXTRA_SECRET_KEY_ID, secretKeyId);
|
||
|
|
callback.onActivityRequired(intent);
|
||
|
|
return;
|
||
|
|
}
|
||
|
|
|
||
|
|
// if (signedOnly) {
|
||
|
|
// resultData = PgpMain.verifyText(this, this, inputData, outStream,
|
||
|
|
// lookupUnknownKey);
|
||
|
|
// } else {
|
||
|
|
// resultData = PgpMain.decryptAndVerify(this, this, inputData, outStream,
|
||
|
|
// PassphraseCacheService.getCachedPassphrase(this, secretKeyId),
|
||
|
|
// assumeSymmetricEncryption);
|
||
|
|
// }
|
||
|
|
|
||
|
|
Bundle outputBundle = PgpMain.decryptAndVerify(mContext, null, inputData,
|
||
|
|
outputStream, passphrase, false);
|
||
|
|
|
||
|
|
outputStream.close();
|
||
|
|
|
||
|
|
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
||
|
|
|
||
|
|
// get signature informations from bundle
|
||
|
|
boolean signature = outputBundle.getBoolean(KeychainIntentService.RESULT_SIGNATURE);
|
||
|
|
long signatureKeyId = outputBundle
|
||
|
|
.getLong(KeychainIntentService.RESULT_SIGNATURE_KEY_ID);
|
||
|
|
String signatureUserId = outputBundle
|
||
|
|
.getString(KeychainIntentService.RESULT_SIGNATURE_USER_ID);
|
||
|
|
boolean signatureSuccess = outputBundle
|
||
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_SUCCESS);
|
||
|
|
boolean signatureUnknown = outputBundle
|
||
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
||
|
|
|
||
|
|
CryptoSignatureResult sigResult = new CryptoSignatureResult(signatureUserId,
|
||
|
|
signature, signatureSuccess, signatureUnknown);
|
||
|
|
|
||
|
|
// return over handler on client side
|
||
|
|
callback.onDecryptVerifySuccess(outputBytes, sigResult);
|
||
|
|
// handler.onSuccess(outputBytes, null, signature, signatureKeyId, signatureUserId,
|
||
|
|
// signatureSuccess, signatureUnknown);
|
||
|
|
} catch (Exception e) {
|
||
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
||
|
|
|
||
|
|
try {
|
||
|
|
callback.onError(new CryptoError(getExceptionId(e), e.getMessage()));
|
||
|
|
} catch (Exception t) {
|
||
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
}
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void encryptAsymmetric(byte[] inputBytes, String inputUri, boolean useAsciiArmor,
|
||
|
|
// int compression, long[] encryptionKeyIds, int symmetricEncryptionAlgorithm,
|
||
|
|
// IKeychainEncryptHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, encryptionKeyIds,
|
||
|
|
// null, symmetricEncryptionAlgorithm, Id.key.none, 0, false, null, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void encryptSymmetric(byte[] inputBytes, String inputUri, boolean useAsciiArmor,
|
||
|
|
// int compression, String encryptionPassphrase, int symmetricEncryptionAlgorithm,
|
||
|
|
// IKeychainEncryptHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, null,
|
||
|
|
// encryptionPassphrase, symmetricEncryptionAlgorithm, Id.key.none, 0, false,
|
||
|
|
// null, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void encryptAndSignAsymmetric(byte[] inputBytes, String inputUri,
|
||
|
|
// boolean useAsciiArmor, int compression, long[] encryptionKeyIds,
|
||
|
|
// int symmetricEncryptionAlgorithm, long signatureKeyId, int signatureHashAlgorithm,
|
||
|
|
// boolean signatureForceV3, String signaturePassphrase,
|
||
|
|
// IKeychainEncryptHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, encryptionKeyIds,
|
||
|
|
// null, symmetricEncryptionAlgorithm, signatureKeyId, signatureHashAlgorithm,
|
||
|
|
// signatureForceV3, signaturePassphrase, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void encryptAndSignSymmetric(byte[] inputBytes, String inputUri,
|
||
|
|
// boolean useAsciiArmor, int compression, String encryptionPassphrase,
|
||
|
|
// int symmetricEncryptionAlgorithm, long signatureKeyId, int signatureHashAlgorithm,
|
||
|
|
// boolean signatureForceV3, String signaturePassphrase,
|
||
|
|
// IKeychainEncryptHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// encryptAndSignSafe(inputBytes, inputUri, useAsciiArmor, compression, null,
|
||
|
|
// encryptionPassphrase, symmetricEncryptionAlgorithm, signatureKeyId,
|
||
|
|
// signatureHashAlgorithm, signatureForceV3, signaturePassphrase, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void decryptAndVerifyAsymmetric(byte[] inputBytes, String inputUri,
|
||
|
|
// String keyPassphrase, IKeychainDecryptHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// decryptAndVerifySafe(inputBytes, inputUri, keyPassphrase, false, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void decryptAndVerifySymmetric(byte[] inputBytes, String inputUri,
|
||
|
|
// String encryptionPassphrase, IKeychainDecryptHandler handler)
|
||
|
|
// throws RemoteException {
|
||
|
|
//
|
||
|
|
// decryptAndVerifySafe(inputBytes, inputUri, encryptionPassphrase, true, handler);
|
||
|
|
// }
|
||
|
|
//
|
||
|
|
// @Override
|
||
|
|
// public void getDecryptionKeyId(byte[] inputBytes, String inputUri,
|
||
|
|
// IKeychainGetDecryptionKeyIdHandler handler) throws RemoteException {
|
||
|
|
//
|
||
|
|
// getDecryptionKeySafe(inputBytes, inputUri, handler);
|
||
|
|
// }
|
||
|
|
|
||
|
|
};
|
||
|
|
|
||
|
|
/**
|
||
|
|
* As we can not throw an exception through Android RPC, we assign identifiers to the exception
|
||
|
|
* types.
|
||
|
|
*
|
||
|
|
* @param e
|
||
|
|
* @return
|
||
|
|
*/
|
||
|
|
private int getExceptionId(Exception e) {
|
||
|
|
if (e instanceof NoSuchProviderException) {
|
||
|
|
return 0;
|
||
|
|
} else if (e instanceof NoSuchAlgorithmException) {
|
||
|
|
return 1;
|
||
|
|
} else if (e instanceof SignatureException) {
|
||
|
|
return 2;
|
||
|
|
} else if (e instanceof IOException) {
|
||
|
|
return 3;
|
||
|
|
} else if (e instanceof PgpGeneralException) {
|
||
|
|
return 4;
|
||
|
|
} else if (e instanceof PGPException) {
|
||
|
|
return 5;
|
||
|
|
} else {
|
||
|
|
return -1;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
}
|