2011-12-20 10:20:44 -08:00
|
|
|
/**
|
2013-11-10 04:15:29 -08:00
|
|
|
* Copyright (C) 2013 Open Whisper Systems
|
2011-12-20 10:20:44 -08:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2013-08-17 18:37:18 -07:00
|
|
|
package org.whispersystems.textsecure.crypto;
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-08-17 18:37:18 -07:00
|
|
|
import android.content.Context;
|
|
|
|
import android.util.Log;
|
|
|
|
|
2013-11-10 04:15:29 -08:00
|
|
|
import org.whispersystems.textsecure.crypto.ecc.ECPublicKey;
|
2013-11-01 13:52:41 -07:00
|
|
|
import org.whispersystems.textsecure.crypto.kdf.DerivedSecrets;
|
2013-10-31 17:23:45 -07:00
|
|
|
import org.whispersystems.textsecure.crypto.protocol.CiphertextMessage;
|
2013-08-17 18:37:18 -07:00
|
|
|
import org.whispersystems.textsecure.storage.CanonicalRecipientAddress;
|
|
|
|
import org.whispersystems.textsecure.storage.InvalidKeyIdException;
|
|
|
|
import org.whispersystems.textsecure.storage.LocalKeyRecord;
|
|
|
|
import org.whispersystems.textsecure.storage.RemoteKeyRecord;
|
|
|
|
import org.whispersystems.textsecure.storage.SessionKey;
|
|
|
|
import org.whispersystems.textsecure.storage.SessionRecord;
|
|
|
|
import org.whispersystems.textsecure.util.Conversions;
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-11-10 04:15:29 -08:00
|
|
|
import java.security.InvalidAlgorithmParameterException;
|
|
|
|
import java.security.NoSuchAlgorithmException;
|
|
|
|
import java.util.Arrays;
|
|
|
|
|
2011-12-20 10:20:44 -08:00
|
|
|
import javax.crypto.BadPaddingException;
|
|
|
|
import javax.crypto.Cipher;
|
|
|
|
import javax.crypto.IllegalBlockSizeException;
|
|
|
|
import javax.crypto.NoSuchPaddingException;
|
|
|
|
import javax.crypto.spec.IvParameterSpec;
|
|
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This is where the session encryption magic happens. Implements a compressed version of the OTR protocol.
|
|
|
|
*
|
|
|
|
* @author Moxie Marlinspike
|
|
|
|
*/
|
|
|
|
|
|
|
|
public class SessionCipher {
|
|
|
|
|
2013-03-10 15:47:13 -07:00
|
|
|
public static final Object CIPHER_LOCK = new Object();
|
2011-12-20 10:20:44 -08:00
|
|
|
|
|
|
|
public static final int CIPHER_KEY_LENGTH = 16;
|
|
|
|
public static final int MAC_KEY_LENGTH = 20;
|
2013-08-19 17:31:34 -07:00
|
|
|
|
2013-08-21 17:25:19 -07:00
|
|
|
public SessionCipherContext getEncryptionContext(Context context,
|
|
|
|
MasterSecret masterSecret,
|
|
|
|
IdentityKeyPair localIdentityKey,
|
2013-08-19 17:31:34 -07:00
|
|
|
CanonicalRecipientAddress recipient)
|
|
|
|
{
|
|
|
|
try {
|
2013-11-10 04:15:29 -08:00
|
|
|
KeyRecords records = getKeyRecords(context, masterSecret, recipient);
|
|
|
|
int localKeyId = records.getLocalKeyRecord().getCurrentKeyPair().getId();
|
|
|
|
int remoteKeyId = records.getRemoteKeyRecord().getCurrentRemoteKey().getId();
|
|
|
|
int sessionVersion = records.getSessionRecord().getSessionVersion();
|
|
|
|
SessionKey sessionKey = getSessionKey(masterSecret, Cipher.ENCRYPT_MODE, sessionVersion, localIdentityKey, records, localKeyId, remoteKeyId);
|
|
|
|
PublicKey nextKey = records.getLocalKeyRecord().getNextKeyPair().getPublicKey();
|
|
|
|
int counter = records.getSessionRecord().getCounter();
|
2013-08-19 17:31:34 -07:00
|
|
|
|
2013-08-21 17:25:19 -07:00
|
|
|
|
|
|
|
return new SessionCipherContext(records, sessionKey, localKeyId, remoteKeyId,
|
2013-11-10 04:15:29 -08:00
|
|
|
nextKey, counter, sessionVersion);
|
2013-08-19 17:31:34 -07:00
|
|
|
} catch (InvalidKeyIdException e) {
|
|
|
|
throw new IllegalArgumentException(e);
|
2013-11-10 04:15:29 -08:00
|
|
|
} catch (InvalidKeyException e) {
|
|
|
|
throw new IllegalArgumentException(e);
|
2013-08-19 17:31:34 -07:00
|
|
|
}
|
2011-12-20 10:20:44 -08:00
|
|
|
}
|
2013-08-19 17:31:34 -07:00
|
|
|
|
|
|
|
public SessionCipherContext getDecryptionContext(Context context, MasterSecret masterSecret,
|
2013-08-21 17:25:19 -07:00
|
|
|
IdentityKeyPair localIdentityKey,
|
2013-08-19 17:31:34 -07:00
|
|
|
CanonicalRecipientAddress recipient,
|
|
|
|
int senderKeyId, int recipientKeyId,
|
|
|
|
PublicKey nextKey, int counter,
|
2013-11-10 04:15:29 -08:00
|
|
|
int messageVersion)
|
2013-08-19 17:31:34 -07:00
|
|
|
throws InvalidMessageException
|
|
|
|
{
|
|
|
|
try {
|
2013-09-14 13:33:23 -07:00
|
|
|
KeyRecords records = getKeyRecords(context, masterSecret, recipient);
|
|
|
|
|
|
|
|
if (messageVersion < records.getSessionRecord().getNegotiatedSessionVersion()) {
|
|
|
|
throw new InvalidMessageException("Message version: " + messageVersion +
|
|
|
|
" but negotiated session version: " +
|
|
|
|
records.getSessionRecord().getNegotiatedSessionVersion());
|
|
|
|
}
|
|
|
|
|
2013-11-10 04:15:29 -08:00
|
|
|
SessionKey sessionKey = getSessionKey(masterSecret, Cipher.DECRYPT_MODE, messageVersion,
|
|
|
|
localIdentityKey, records, recipientKeyId, senderKeyId);
|
|
|
|
|
2013-08-21 17:25:19 -07:00
|
|
|
return new SessionCipherContext(records, sessionKey, senderKeyId,
|
|
|
|
recipientKeyId, nextKey, counter,
|
2013-11-10 04:15:29 -08:00
|
|
|
messageVersion);
|
2013-08-19 17:31:34 -07:00
|
|
|
} catch (InvalidKeyIdException e) {
|
|
|
|
throw new InvalidMessageException(e);
|
2013-11-10 04:15:29 -08:00
|
|
|
} catch (InvalidKeyException e) {
|
|
|
|
throw new InvalidMessageException(e);
|
2013-08-19 17:31:34 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public byte[] encrypt(SessionCipherContext context, byte[] paddedMessageBody) {
|
2011-12-20 10:20:44 -08:00
|
|
|
Log.w("SessionCipher", "Encrypting message...");
|
|
|
|
try {
|
2013-08-19 17:31:34 -07:00
|
|
|
byte[]cipherText = getCiphertext(paddedMessageBody, context.getSessionKey().getCipherKey(), context.getSessionRecord().getCounter());
|
|
|
|
|
|
|
|
context.getSessionRecord().setSessionKey(context.getSessionKey());
|
|
|
|
context.getSessionRecord().incrementCounter();
|
|
|
|
context.getSessionRecord().save();
|
|
|
|
|
|
|
|
return cipherText;
|
2011-12-20 10:20:44 -08:00
|
|
|
} catch (IllegalBlockSizeException e) {
|
|
|
|
throw new IllegalArgumentException(e);
|
|
|
|
} catch (BadPaddingException e) {
|
|
|
|
throw new IllegalArgumentException(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
public byte[] decrypt(SessionCipherContext context, byte[] decodedCiphertext)
|
|
|
|
throws InvalidMessageException
|
|
|
|
{
|
2011-12-20 10:20:44 -08:00
|
|
|
Log.w("SessionCipher", "Decrypting message...");
|
|
|
|
try {
|
2013-11-10 04:15:29 -08:00
|
|
|
byte[] plaintextWithPadding = getPlaintext(decodedCiphertext,
|
|
|
|
context.getSessionKey().getCipherKey(),
|
|
|
|
context.getCounter());
|
2013-08-19 17:31:34 -07:00
|
|
|
|
|
|
|
context.getRemoteKeyRecord().updateCurrentRemoteKey(context.getNextKey());
|
|
|
|
context.getRemoteKeyRecord().save();
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
context.getLocalKeyRecord().advanceKeyIfNecessary(context.getRecipientKeyId());
|
|
|
|
context.getLocalKeyRecord().save();
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
context.getSessionRecord().setSessionKey(context.getSessionKey());
|
2013-08-21 19:34:11 -07:00
|
|
|
context.getSessionRecord().setPrekeyBundleRequired(false);
|
2013-08-19 17:31:34 -07:00
|
|
|
context.getSessionRecord().save();
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
return plaintextWithPadding;
|
2011-12-20 10:20:44 -08:00
|
|
|
} catch (IllegalBlockSizeException e) {
|
|
|
|
throw new InvalidMessageException("assert", e);
|
|
|
|
} catch (BadPaddingException e) {
|
|
|
|
throw new InvalidMessageException("assert", e);
|
|
|
|
}
|
|
|
|
}
|
2013-08-19 17:31:34 -07:00
|
|
|
|
2013-11-01 13:52:41 -07:00
|
|
|
private byte[] getPlaintext(byte[] cipherText, SecretKeySpec key, int counter)
|
|
|
|
throws IllegalBlockSizeException, BadPaddingException
|
|
|
|
{
|
2011-12-20 10:20:44 -08:00
|
|
|
Cipher cipher = getCipher(Cipher.DECRYPT_MODE, key, counter);
|
|
|
|
return cipher.doFinal(cipherText);
|
|
|
|
}
|
|
|
|
|
2013-11-01 13:52:41 -07:00
|
|
|
private byte[] getCiphertext(byte[] message, SecretKeySpec key, int counter)
|
|
|
|
throws IllegalBlockSizeException, BadPaddingException
|
|
|
|
{
|
2013-08-19 17:31:34 -07:00
|
|
|
Cipher cipher = getCipher(Cipher.ENCRYPT_MODE, key, counter);
|
2011-12-20 10:20:44 -08:00
|
|
|
return cipher.doFinal(message);
|
|
|
|
}
|
|
|
|
|
|
|
|
private Cipher getCipher(int mode, SecretKeySpec key, int counter) {
|
|
|
|
try {
|
|
|
|
Cipher cipher = Cipher.getInstance("AES/CTR/NoPadding");
|
|
|
|
|
|
|
|
byte[] ivBytes = new byte[16];
|
|
|
|
Conversions.mediumToByteArray(ivBytes, 0, counter);
|
|
|
|
|
|
|
|
IvParameterSpec iv = new IvParameterSpec(ivBytes);
|
|
|
|
cipher.init(mode, key, iv);
|
|
|
|
|
|
|
|
return cipher;
|
|
|
|
} catch (NoSuchAlgorithmException e) {
|
|
|
|
throw new IllegalArgumentException("AES Not Supported!");
|
|
|
|
} catch (NoSuchPaddingException e) {
|
|
|
|
throw new IllegalArgumentException("NoPadding Not Supported!");
|
2013-11-10 04:15:29 -08:00
|
|
|
} catch (java.security.InvalidKeyException e) {
|
2011-12-20 10:20:44 -08:00
|
|
|
Log.w("SessionCipher", e);
|
|
|
|
throw new IllegalArgumentException("Invaid Key?");
|
|
|
|
} catch (InvalidAlgorithmParameterException e) {
|
|
|
|
Log.w("SessionCipher", e);
|
|
|
|
throw new IllegalArgumentException("Bad IV?");
|
|
|
|
}
|
|
|
|
}
|
2013-08-21 17:25:19 -07:00
|
|
|
|
|
|
|
private SessionKey getSessionKey(MasterSecret masterSecret, int mode,
|
|
|
|
int messageVersion,
|
|
|
|
IdentityKeyPair localIdentityKey,
|
|
|
|
KeyRecords records,
|
2013-08-19 17:31:34 -07:00
|
|
|
int localKeyId, int remoteKeyId)
|
2013-11-10 04:15:29 -08:00
|
|
|
throws InvalidKeyIdException, InvalidKeyException
|
2013-08-19 17:31:34 -07:00
|
|
|
{
|
2011-12-20 10:20:44 -08:00
|
|
|
Log.w("SessionCipher", "Getting session key for local: " + localKeyId + " remote: " + remoteKeyId);
|
2013-11-01 13:52:41 -07:00
|
|
|
SessionKey sessionKey = records.getSessionRecord().getSessionKey(mode, localKeyId, remoteKeyId);
|
2013-08-19 17:31:34 -07:00
|
|
|
|
|
|
|
if (sessionKey != null)
|
|
|
|
return sessionKey;
|
2011-12-20 10:20:44 -08:00
|
|
|
|
2013-11-01 13:52:41 -07:00
|
|
|
DerivedSecrets derivedSecrets = calculateSharedSecret(messageVersion, mode, localIdentityKey,
|
|
|
|
records, localKeyId, remoteKeyId);
|
|
|
|
|
|
|
|
return new SessionKey(mode, localKeyId, remoteKeyId, derivedSecrets.getCipherKey(),
|
|
|
|
derivedSecrets.getMacKey(), masterSecret);
|
2011-12-20 10:20:44 -08:00
|
|
|
}
|
|
|
|
|
2013-11-01 13:52:41 -07:00
|
|
|
private DerivedSecrets calculateSharedSecret(int messageVersion, int mode,
|
|
|
|
IdentityKeyPair localIdentityKey,
|
|
|
|
KeyRecords records,
|
|
|
|
int localKeyId, int remoteKeyId)
|
2013-11-10 04:15:29 -08:00
|
|
|
throws InvalidKeyIdException, InvalidKeyException
|
2013-08-19 17:31:34 -07:00
|
|
|
{
|
2013-11-10 04:15:29 -08:00
|
|
|
KeyPair localKeyPair = records.getLocalKeyRecord().getKeyPairForId(localKeyId);
|
|
|
|
ECPublicKey remoteKey = records.getRemoteKeyRecord().getKeyForId(remoteKeyId).getKey();
|
|
|
|
IdentityKey remoteIdentityKey = records.getSessionRecord().getIdentityKey();
|
|
|
|
boolean isLowEnd = isLowEnd(records, localKeyId, remoteKeyId);
|
2013-11-01 13:52:41 -07:00
|
|
|
|
|
|
|
isLowEnd = (mode == Cipher.ENCRYPT_MODE ? isLowEnd : !isLowEnd);
|
2013-08-21 17:25:19 -07:00
|
|
|
|
|
|
|
if (isInitiallyExchangedKeys(records, localKeyId, remoteKeyId) &&
|
2013-11-01 13:52:41 -07:00
|
|
|
messageVersion >= CiphertextMessage.DHE3_INTRODUCED_VERSION)
|
2013-08-21 17:25:19 -07:00
|
|
|
{
|
2013-11-01 13:52:41 -07:00
|
|
|
return SharedSecretCalculator.calculateSharedSecret(isLowEnd,
|
|
|
|
localKeyPair, localKeyId, localIdentityKey,
|
|
|
|
remoteKey, remoteKeyId, remoteIdentityKey);
|
2013-08-21 17:25:19 -07:00
|
|
|
} else {
|
2013-11-01 13:52:41 -07:00
|
|
|
return SharedSecretCalculator.calculateSharedSecret(messageVersion, isLowEnd,
|
|
|
|
localKeyPair, localKeyId,
|
|
|
|
remoteKey, remoteKeyId);
|
2013-08-21 17:25:19 -07:00
|
|
|
}
|
|
|
|
}
|
2013-08-19 17:31:34 -07:00
|
|
|
|
2013-11-01 13:52:41 -07:00
|
|
|
private boolean isLowEnd(KeyRecords records, int localKeyId, int remoteKeyId)
|
|
|
|
throws InvalidKeyIdException
|
|
|
|
{
|
2013-11-10 04:15:29 -08:00
|
|
|
ECPublicKey localPublic = records.getLocalKeyRecord().getKeyPairForId(localKeyId).getPublicKey().getKey();
|
|
|
|
ECPublicKey remotePublic = records.getRemoteKeyRecord().getKeyForId(remoteKeyId).getKey();
|
2013-11-01 13:52:41 -07:00
|
|
|
|
2013-11-10 04:15:29 -08:00
|
|
|
return localPublic.compareTo(remotePublic) < 0;
|
2013-11-01 13:52:41 -07:00
|
|
|
}
|
|
|
|
|
2013-08-21 17:25:19 -07:00
|
|
|
private boolean isInitiallyExchangedKeys(KeyRecords records, int localKeyId, int remoteKeyId)
|
|
|
|
throws InvalidKeyIdException
|
|
|
|
{
|
|
|
|
byte[] localFingerprint = records.getSessionRecord().getLocalFingerprint();
|
|
|
|
byte[] remoteFingerprint = records.getSessionRecord().getRemoteFingerprint();
|
|
|
|
|
|
|
|
return Arrays.equals(localFingerprint, records.getLocalKeyRecord().getKeyPairForId(localKeyId).getPublicKey().getFingerprintBytes()) &&
|
|
|
|
Arrays.equals(remoteFingerprint, records.getRemoteKeyRecord().getKeyForId(remoteKeyId).getFingerprintBytes());
|
2013-08-19 17:31:34 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
private KeyRecords getKeyRecords(Context context, MasterSecret masterSecret,
|
|
|
|
CanonicalRecipientAddress recipient)
|
|
|
|
{
|
|
|
|
LocalKeyRecord localKeyRecord = new LocalKeyRecord(context, masterSecret, recipient);
|
|
|
|
RemoteKeyRecord remoteKeyRecord = new RemoteKeyRecord(context, recipient);
|
|
|
|
SessionRecord sessionRecord = new SessionRecord(context, masterSecret, recipient);
|
|
|
|
return new KeyRecords(localKeyRecord, remoteKeyRecord, sessionRecord);
|
|
|
|
}
|
|
|
|
|
|
|
|
private static class KeyRecords {
|
2013-08-21 17:25:19 -07:00
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
private final LocalKeyRecord localKeyRecord;
|
|
|
|
private final RemoteKeyRecord remoteKeyRecord;
|
|
|
|
private final SessionRecord sessionRecord;
|
|
|
|
|
|
|
|
public KeyRecords(LocalKeyRecord localKeyRecord, RemoteKeyRecord remoteKeyRecord, SessionRecord sessionRecord) {
|
|
|
|
this.localKeyRecord = localKeyRecord;
|
|
|
|
this.remoteKeyRecord = remoteKeyRecord;
|
|
|
|
this.sessionRecord = sessionRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
private LocalKeyRecord getLocalKeyRecord() {
|
|
|
|
return localKeyRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
private RemoteKeyRecord getRemoteKeyRecord() {
|
|
|
|
return remoteKeyRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
private SessionRecord getSessionRecord() {
|
|
|
|
return sessionRecord;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public static class SessionCipherContext {
|
2013-08-21 17:25:19 -07:00
|
|
|
|
2013-08-19 17:31:34 -07:00
|
|
|
private final LocalKeyRecord localKeyRecord;
|
|
|
|
private final RemoteKeyRecord remoteKeyRecord;
|
|
|
|
private final SessionRecord sessionRecord;
|
|
|
|
private final SessionKey sessionKey;
|
|
|
|
private final int senderKeyId;
|
|
|
|
private final int recipientKeyId;
|
|
|
|
private final PublicKey nextKey;
|
|
|
|
private final int counter;
|
2013-08-21 17:25:19 -07:00
|
|
|
private final int messageVersion;
|
2013-08-19 17:31:34 -07:00
|
|
|
|
|
|
|
public SessionCipherContext(KeyRecords records,
|
|
|
|
SessionKey sessionKey,
|
|
|
|
int senderKeyId,
|
|
|
|
int receiverKeyId,
|
|
|
|
PublicKey nextKey,
|
|
|
|
int counter,
|
2013-11-10 04:15:29 -08:00
|
|
|
int messageVersion)
|
2013-08-19 17:31:34 -07:00
|
|
|
{
|
|
|
|
this.localKeyRecord = records.getLocalKeyRecord();
|
|
|
|
this.remoteKeyRecord = records.getRemoteKeyRecord();
|
|
|
|
this.sessionRecord = records.getSessionRecord();
|
|
|
|
this.sessionKey = sessionKey;
|
|
|
|
this.senderKeyId = senderKeyId;
|
|
|
|
this.recipientKeyId = receiverKeyId;
|
|
|
|
this.nextKey = nextKey;
|
|
|
|
this.counter = counter;
|
2013-08-21 17:25:19 -07:00
|
|
|
this.messageVersion = messageVersion;
|
2013-08-19 17:31:34 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
public LocalKeyRecord getLocalKeyRecord() {
|
|
|
|
return localKeyRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
public RemoteKeyRecord getRemoteKeyRecord() {
|
|
|
|
return remoteKeyRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
public SessionRecord getSessionRecord() {
|
|
|
|
return sessionRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
public SessionKey getSessionKey() {
|
|
|
|
return sessionKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
public PublicKey getNextKey() {
|
|
|
|
return nextKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
public int getCounter() {
|
|
|
|
return counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
public int getSenderKeyId() {
|
|
|
|
return senderKeyId;
|
|
|
|
}
|
|
|
|
|
|
|
|
public int getRecipientKeyId() {
|
|
|
|
return recipientKeyId;
|
|
|
|
}
|
|
|
|
|
2013-08-21 17:25:19 -07:00
|
|
|
public int getMessageVersion() {
|
|
|
|
return messageVersion;
|
|
|
|
}
|
2011-12-20 10:20:44 -08:00
|
|
|
}
|
2013-08-19 17:31:34 -07:00
|
|
|
|
2011-12-20 10:20:44 -08:00
|
|
|
}
|