Mercurial > 510Connectbot
comparison src/com/five_ten_sg/connectbot/util/Encryptor.java @ 0:0ce5cc452d02
initial version
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Thu, 22 May 2014 10:41:19 -0700 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:0ce5cc452d02 |
---|---|
1 /* | |
2 * ConnectBot: simple, powerful, open-source SSH client for Android | |
3 * Copyright 2007 Kenny Root, Jeffrey Sharkey | |
4 * | |
5 * Licensed under the Apache License, Version 2.0 (the "License"); | |
6 * you may not use this file except in compliance with the License. | |
7 * You may obtain a copy of the License at | |
8 * | |
9 * http://www.apache.org/licenses/LICENSE-2.0 | |
10 * | |
11 * Unless required by applicable law or agreed to in writing, software | |
12 * distributed under the License is distributed on an "AS IS" BASIS, | |
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
14 * See the License for the specific language governing permissions and | |
15 * limitations under the License. | |
16 */ | |
17 | |
18 package com.five_ten_sg.connectbot.util; | |
19 | |
20 /** | |
21 * This class is from: | |
22 * | |
23 * Encryptor.java | |
24 * Copyright 2008 Zach Scrivena | |
25 * zachscrivena@gmail.com | |
26 * http://zs.freeshell.org/ | |
27 */ | |
28 | |
29 import java.security.MessageDigest; | |
30 import java.security.SecureRandom; | |
31 import java.util.Arrays; | |
32 | |
33 import javax.crypto.Cipher; | |
34 import javax.crypto.spec.IvParameterSpec; | |
35 import javax.crypto.spec.SecretKeySpec; | |
36 | |
37 | |
38 /** | |
39 * Perform AES-128 encryption. | |
40 */ | |
41 public final class Encryptor { | |
42 /** name of the character set to use for converting between characters and bytes */ | |
43 private static final String CHARSET_NAME = "UTF-8"; | |
44 | |
45 /** random number generator algorithm */ | |
46 private static final String RNG_ALGORITHM = "SHA1PRNG"; | |
47 | |
48 /** message digest algorithm (must be sufficiently long to provide the key and initialization vector) */ | |
49 private static final String DIGEST_ALGORITHM = "SHA-256"; | |
50 | |
51 /** key algorithm (must be compatible with CIPHER_ALGORITHM) */ | |
52 private static final String KEY_ALGORITHM = "AES"; | |
53 | |
54 /** cipher algorithm (must be compatible with KEY_ALGORITHM) */ | |
55 private static final String CIPHER_ALGORITHM = "AES/CBC/PKCS5Padding"; | |
56 | |
57 | |
58 /** | |
59 * Private constructor that should never be called. | |
60 */ | |
61 private Encryptor() | |
62 {} | |
63 | |
64 | |
65 /** | |
66 * Encrypt the specified cleartext using the given password. | |
67 * With the correct salt, number of iterations, and password, the decrypt() method reverses | |
68 * the effect of this method. | |
69 * This method generates and uses a random salt, and the user-specified number of iterations | |
70 * and password to create a 16-byte secret key and 16-byte initialization vector. | |
71 * The secret key and initialization vector are then used in the AES-128 cipher to encrypt | |
72 * the given cleartext. | |
73 * | |
74 * @param salt | |
75 * salt that was used in the encryption (to be populated) | |
76 * @param iterations | |
77 * number of iterations to use in salting | |
78 * @param password | |
79 * password to be used for encryption | |
80 * @param cleartext | |
81 * cleartext to be encrypted | |
82 * @return | |
83 * ciphertext | |
84 * @throws Exception | |
85 * on any error encountered in encryption | |
86 */ | |
87 public static byte[] encrypt( | |
88 final byte[] salt, | |
89 final int iterations, | |
90 final String password, | |
91 final byte[] cleartext) | |
92 throws Exception { | |
93 /* generate salt randomly */ | |
94 SecureRandom.getInstance(RNG_ALGORITHM).nextBytes(salt); | |
95 /* compute key and initialization vector */ | |
96 final MessageDigest shaDigest = MessageDigest.getInstance(DIGEST_ALGORITHM); | |
97 byte[] pw = password.getBytes(CHARSET_NAME); | |
98 | |
99 for (int i = 0; i < iterations; i++) { | |
100 /* add salt */ | |
101 final byte[] salted = new byte[pw.length + salt.length]; | |
102 System.arraycopy(pw, 0, salted, 0, pw.length); | |
103 System.arraycopy(salt, 0, salted, pw.length, salt.length); | |
104 Arrays.fill(pw, (byte) 0x00); | |
105 /* compute SHA-256 digest */ | |
106 shaDigest.reset(); | |
107 pw = shaDigest.digest(salted); | |
108 Arrays.fill(salted, (byte) 0x00); | |
109 } | |
110 | |
111 /* extract the 16-byte key and initialization vector from the SHA-256 digest */ | |
112 final byte[] key = new byte[16]; | |
113 final byte[] iv = new byte[16]; | |
114 System.arraycopy(pw, 0, key, 0, 16); | |
115 System.arraycopy(pw, 16, iv, 0, 16); | |
116 Arrays.fill(pw, (byte) 0x00); | |
117 /* perform AES-128 encryption */ | |
118 final Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM); | |
119 cipher.init( | |
120 Cipher.ENCRYPT_MODE, | |
121 new SecretKeySpec(key, KEY_ALGORITHM), | |
122 new IvParameterSpec(iv)); | |
123 Arrays.fill(key, (byte) 0x00); | |
124 Arrays.fill(iv, (byte) 0x00); | |
125 return cipher.doFinal(cleartext); | |
126 } | |
127 | |
128 | |
129 /** | |
130 * Decrypt the specified ciphertext using the given password. | |
131 * With the correct salt, number of iterations, and password, this method reverses the effect | |
132 * of the encrypt() method. | |
133 * This method uses the user-specified salt, number of iterations, and password | |
134 * to recreate the 16-byte secret key and 16-byte initialization vector. | |
135 * The secret key and initialization vector are then used in the AES-128 cipher to decrypt | |
136 * the given ciphertext. | |
137 * | |
138 * @param salt | |
139 * salt to be used in decryption | |
140 * @param iterations | |
141 * number of iterations to use in salting | |
142 * @param password | |
143 * password to be used for decryption | |
144 * @param ciphertext | |
145 * ciphertext to be decrypted | |
146 * @return | |
147 * cleartext | |
148 * @throws Exception | |
149 * on any error encountered in decryption | |
150 */ | |
151 public static byte[] decrypt( | |
152 final byte[] salt, | |
153 final int iterations, | |
154 final String password, | |
155 final byte[] ciphertext) | |
156 throws Exception { | |
157 /* compute key and initialization vector */ | |
158 final MessageDigest shaDigest = MessageDigest.getInstance(DIGEST_ALGORITHM); | |
159 byte[] pw = password.getBytes(CHARSET_NAME); | |
160 | |
161 for (int i = 0; i < iterations; i++) { | |
162 /* add salt */ | |
163 final byte[] salted = new byte[pw.length + salt.length]; | |
164 System.arraycopy(pw, 0, salted, 0, pw.length); | |
165 System.arraycopy(salt, 0, salted, pw.length, salt.length); | |
166 Arrays.fill(pw, (byte) 0x00); | |
167 /* compute SHA-256 digest */ | |
168 shaDigest.reset(); | |
169 pw = shaDigest.digest(salted); | |
170 Arrays.fill(salted, (byte) 0x00); | |
171 } | |
172 | |
173 /* extract the 16-byte key and initialization vector from the SHA-256 digest */ | |
174 final byte[] key = new byte[16]; | |
175 final byte[] iv = new byte[16]; | |
176 System.arraycopy(pw, 0, key, 0, 16); | |
177 System.arraycopy(pw, 16, iv, 0, 16); | |
178 Arrays.fill(pw, (byte) 0x00); | |
179 /* perform AES-128 decryption */ | |
180 final Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM); | |
181 cipher.init( | |
182 Cipher.DECRYPT_MODE, | |
183 new SecretKeySpec(key, KEY_ALGORITHM), | |
184 new IvParameterSpec(iv)); | |
185 Arrays.fill(key, (byte) 0x00); | |
186 Arrays.fill(iv, (byte) 0x00); | |
187 return cipher.doFinal(ciphertext); | |
188 } | |
189 } |