2014-10-22 16:38:44 +00:00
|
|
|
package eu.siacs.conversations.utils;
|
|
|
|
|
2015-12-23 18:18:53 +00:00
|
|
|
import android.os.Bundle;
|
2015-10-11 13:48:58 +00:00
|
|
|
import android.util.Pair;
|
|
|
|
|
|
|
|
import org.bouncycastle.asn1.x500.X500Name;
|
|
|
|
import org.bouncycastle.asn1.x500.style.BCStyle;
|
|
|
|
import org.bouncycastle.asn1.x500.style.IETFUtils;
|
|
|
|
import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
|
|
|
|
|
2015-12-23 18:18:53 +00:00
|
|
|
import java.security.MessageDigest;
|
2015-10-11 13:48:58 +00:00
|
|
|
import java.security.cert.CertificateEncodingException;
|
2015-10-16 21:48:42 +00:00
|
|
|
import java.security.cert.CertificateParsingException;
|
2015-10-11 13:48:58 +00:00
|
|
|
import java.security.cert.X509Certificate;
|
2014-11-12 20:35:44 +00:00
|
|
|
import java.text.Normalizer;
|
2015-10-16 21:48:42 +00:00
|
|
|
import java.util.ArrayList;
|
2015-01-14 17:20:02 +00:00
|
|
|
import java.util.Arrays;
|
|
|
|
import java.util.Collection;
|
2015-03-07 14:36:31 +00:00
|
|
|
import java.util.Iterator;
|
2015-01-14 17:20:02 +00:00
|
|
|
import java.util.LinkedHashSet;
|
2015-02-02 13:33:55 +00:00
|
|
|
import java.util.List;
|
2014-10-22 16:38:44 +00:00
|
|
|
|
2015-01-14 17:20:02 +00:00
|
|
|
import eu.siacs.conversations.Config;
|
2015-10-28 21:40:09 +00:00
|
|
|
import eu.siacs.conversations.R;
|
|
|
|
import eu.siacs.conversations.entities.Message;
|
2015-10-11 13:48:58 +00:00
|
|
|
import eu.siacs.conversations.xmpp.jid.InvalidJidException;
|
|
|
|
import eu.siacs.conversations.xmpp.jid.Jid;
|
2015-01-14 17:20:02 +00:00
|
|
|
|
|
|
|
public final class CryptoHelper {
|
2014-10-22 16:38:44 +00:00
|
|
|
public static final String FILETRANSFER = "?FILETRANSFERv1:";
|
2015-01-14 17:20:02 +00:00
|
|
|
private final static char[] hexArray = "0123456789abcdef".toCharArray();
|
2014-11-12 20:35:44 +00:00
|
|
|
final public static byte[] ONE = new byte[] { 0, 0, 0, 1 };
|
2014-10-22 16:38:44 +00:00
|
|
|
|
|
|
|
public static String bytesToHex(byte[] bytes) {
|
|
|
|
char[] hexChars = new char[bytes.length * 2];
|
|
|
|
for (int j = 0; j < bytes.length; j++) {
|
|
|
|
int v = bytes[j] & 0xFF;
|
|
|
|
hexChars[j * 2] = hexArray[v >>> 4];
|
|
|
|
hexChars[j * 2 + 1] = hexArray[v & 0x0F];
|
|
|
|
}
|
|
|
|
return new String(hexChars);
|
|
|
|
}
|
|
|
|
|
|
|
|
public static byte[] hexToBytes(String hexString) {
|
|
|
|
int len = hexString.length();
|
|
|
|
byte[] array = new byte[len / 2];
|
|
|
|
for (int i = 0; i < len; i += 2) {
|
|
|
|
array[i / 2] = (byte) ((Character.digit(hexString.charAt(i), 16) << 4) + Character
|
|
|
|
.digit(hexString.charAt(i + 1), 16));
|
|
|
|
}
|
|
|
|
return array;
|
|
|
|
}
|
|
|
|
|
2014-11-15 17:57:36 +00:00
|
|
|
public static String hexToString(final String hexString) {
|
|
|
|
return new String(hexToBytes(hexString));
|
|
|
|
}
|
|
|
|
|
2014-11-12 15:15:38 +00:00
|
|
|
public static byte[] concatenateByteArrays(byte[] a, byte[] b) {
|
2014-10-22 16:38:44 +00:00
|
|
|
byte[] result = new byte[a.length + b.length];
|
|
|
|
System.arraycopy(a, 0, result, 0, a.length);
|
|
|
|
System.arraycopy(b, 0, result, a.length, b.length);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2014-11-12 20:35:44 +00:00
|
|
|
/**
|
|
|
|
* Escapes usernames or passwords for SASL.
|
|
|
|
*/
|
|
|
|
public static String saslEscape(final String s) {
|
|
|
|
final StringBuilder sb = new StringBuilder((int) (s.length() * 1.1));
|
|
|
|
for (int i = 0; i < s.length(); i++) {
|
|
|
|
char c = s.charAt(i);
|
|
|
|
switch (c) {
|
|
|
|
case ',':
|
|
|
|
sb.append("=2C");
|
|
|
|
break;
|
|
|
|
case '=':
|
|
|
|
sb.append("=3D");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
sb.append(c);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return sb.toString();
|
|
|
|
}
|
|
|
|
|
|
|
|
public static String saslPrep(final String s) {
|
2014-11-16 02:09:51 +00:00
|
|
|
return Normalizer.normalize(s, Normalizer.Form.NFKC);
|
2014-11-12 20:35:44 +00:00
|
|
|
}
|
2014-11-15 23:20:20 +00:00
|
|
|
|
|
|
|
public static String prettifyFingerprint(String fingerprint) {
|
2015-07-11 19:23:58 +00:00
|
|
|
if (fingerprint==null) {
|
|
|
|
return "";
|
|
|
|
} else if (fingerprint.length() < 40) {
|
2015-04-25 12:42:32 +00:00
|
|
|
return fingerprint;
|
|
|
|
}
|
2015-07-07 17:28:35 +00:00
|
|
|
StringBuilder builder = new StringBuilder(fingerprint.replaceAll("\\s",""));
|
|
|
|
for(int i=8;i<builder.length();i+=9) {
|
|
|
|
builder.insert(i, ' ');
|
|
|
|
}
|
2014-11-15 23:20:20 +00:00
|
|
|
return builder.toString();
|
|
|
|
}
|
2015-01-14 17:20:02 +00:00
|
|
|
|
2015-12-23 18:18:53 +00:00
|
|
|
public static String prettifyFingerprintCert(String fingerprint) {
|
|
|
|
StringBuilder builder = new StringBuilder(fingerprint);
|
|
|
|
for(int i=2;i < builder.length(); i+=3) {
|
|
|
|
builder.insert(i,':');
|
|
|
|
}
|
|
|
|
return builder.toString();
|
|
|
|
}
|
|
|
|
|
2015-02-02 13:33:55 +00:00
|
|
|
public static String[] getOrderedCipherSuites(final String[] platformSupportedCipherSuites) {
|
|
|
|
final Collection<String> cipherSuites = new LinkedHashSet<>(Arrays.asList(Config.ENABLED_CIPHERS));
|
|
|
|
final List<String> platformCiphers = Arrays.asList(platformSupportedCipherSuites);
|
|
|
|
cipherSuites.retainAll(platformCiphers);
|
|
|
|
cipherSuites.addAll(platformCiphers);
|
2015-03-07 14:36:31 +00:00
|
|
|
filterWeakCipherSuites(cipherSuites);
|
2015-02-02 13:33:55 +00:00
|
|
|
return cipherSuites.toArray(new String[cipherSuites.size()]);
|
2015-01-14 17:20:02 +00:00
|
|
|
}
|
2015-03-07 14:36:31 +00:00
|
|
|
|
|
|
|
private static void filterWeakCipherSuites(final Collection<String> cipherSuites) {
|
|
|
|
final Iterator<String> it = cipherSuites.iterator();
|
|
|
|
while (it.hasNext()) {
|
|
|
|
String cipherName = it.next();
|
|
|
|
// remove all ciphers with no or very weak encryption or no authentication
|
|
|
|
for (String weakCipherPattern : Config.WEAK_CIPHER_PATTERNS) {
|
|
|
|
if (cipherName.contains(weakCipherPattern)) {
|
|
|
|
it.remove();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-10-11 13:48:58 +00:00
|
|
|
|
2015-10-16 21:48:42 +00:00
|
|
|
public static Pair<Jid,String> extractJidAndName(X509Certificate certificate) throws CertificateEncodingException, InvalidJidException, CertificateParsingException {
|
|
|
|
Collection<List<?>> alternativeNames = certificate.getSubjectAlternativeNames();
|
|
|
|
List<String> emails = new ArrayList<>();
|
|
|
|
if (alternativeNames != null) {
|
|
|
|
for(List<?> san : alternativeNames) {
|
|
|
|
Integer type = (Integer) san.get(0);
|
|
|
|
if (type == 1) {
|
|
|
|
emails.add((String) san.get(1));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-10-11 13:48:58 +00:00
|
|
|
X500Name x500name = new JcaX509CertificateHolder(certificate).getSubject();
|
2015-10-16 21:48:42 +00:00
|
|
|
if (emails.size() == 0) {
|
|
|
|
emails.add(IETFUtils.valueToString(x500name.getRDNs(BCStyle.EmailAddress)[0].getFirst().getValue()));
|
|
|
|
}
|
2015-10-11 13:48:58 +00:00
|
|
|
String name = IETFUtils.valueToString(x500name.getRDNs(BCStyle.CN)[0].getFirst().getValue());
|
2015-10-16 21:48:42 +00:00
|
|
|
if (emails.size() >= 1) {
|
|
|
|
return new Pair<>(Jid.fromString(emails.get(0)), name);
|
|
|
|
} else {
|
|
|
|
return null;
|
|
|
|
}
|
2015-10-11 13:48:58 +00:00
|
|
|
}
|
2015-10-28 21:40:09 +00:00
|
|
|
|
2015-12-23 18:18:53 +00:00
|
|
|
public static Bundle extractCertificateInformation(X509Certificate certificate) {
|
|
|
|
Bundle information = new Bundle();
|
|
|
|
try {
|
|
|
|
JcaX509CertificateHolder holder = new JcaX509CertificateHolder(certificate);
|
|
|
|
X500Name subject = holder.getSubject();
|
|
|
|
try {
|
|
|
|
information.putString("subject_cn", subject.getRDNs(BCStyle.CN)[0].getFirst().getValue().toString());
|
|
|
|
} catch (Exception e) {
|
|
|
|
//ignored
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
information.putString("subject_o",subject.getRDNs(BCStyle.O)[0].getFirst().getValue().toString());
|
|
|
|
} catch (Exception e) {
|
|
|
|
//ignored
|
|
|
|
}
|
|
|
|
|
|
|
|
X500Name issuer = holder.getIssuer();
|
|
|
|
try {
|
|
|
|
information.putString("issuer_cn", issuer.getRDNs(BCStyle.CN)[0].getFirst().getValue().toString());
|
|
|
|
} catch (Exception e) {
|
|
|
|
//ignored
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
information.putString("issuer_o", issuer.getRDNs(BCStyle.O)[0].getFirst().getValue().toString());
|
|
|
|
} catch (Exception e) {
|
|
|
|
//ignored
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
MessageDigest md = MessageDigest.getInstance("SHA-1");
|
|
|
|
byte[] fingerprint = md.digest(certificate.getEncoded());
|
|
|
|
information.putString("sha1", prettifyFingerprintCert(bytesToHex(fingerprint)));
|
|
|
|
} catch (Exception e) {
|
|
|
|
|
|
|
|
}
|
|
|
|
return information;
|
|
|
|
} catch (CertificateEncodingException e) {
|
|
|
|
return information;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-28 21:40:09 +00:00
|
|
|
public static int encryptionTypeToText(int encryption) {
|
|
|
|
switch (encryption) {
|
|
|
|
case Message.ENCRYPTION_OTR:
|
|
|
|
return R.string.encryption_choice_otr;
|
|
|
|
case Message.ENCRYPTION_AXOLOTL:
|
|
|
|
return R.string.encryption_choice_omemo;
|
|
|
|
case Message.ENCRYPTION_NONE:
|
|
|
|
return R.string.encryption_choice_unencrypted;
|
|
|
|
default:
|
|
|
|
return R.string.encryption_choice_pgp;
|
|
|
|
}
|
|
|
|
}
|
2014-10-22 16:38:44 +00:00
|
|
|
}
|