mirror of
https://github.com/tachiyomiorg/extensions.git
synced 2024-06-02 02:28:44 +02:00
134 lines
5.2 KiB
Kotlin
134 lines
5.2 KiB
Kotlin
package eu.kanade.tachiyomi.lib.cryptoaes
|
|
// Thanks to Vlad on Stackoverflow: https://stackoverflow.com/a/63701411
|
|
|
|
import android.util.Base64
|
|
import java.security.MessageDigest
|
|
import java.util.Arrays
|
|
import javax.crypto.Cipher
|
|
import javax.crypto.spec.IvParameterSpec
|
|
import javax.crypto.spec.SecretKeySpec
|
|
|
|
/**
|
|
* Conforming with CryptoJS AES method
|
|
*/
|
|
object CryptoAES {
|
|
|
|
private const val KEY_SIZE = 256
|
|
private const val IV_SIZE = 128
|
|
private const val HASH_CIPHER = "AES/CBC/PKCS7PADDING"
|
|
private const val AES = "AES"
|
|
private const val KDF_DIGEST = "MD5"
|
|
|
|
/**
|
|
* Decrypt using CryptoJS defaults compatible method.
|
|
* Uses KDF equivalent to OpenSSL's EVP_BytesToKey function
|
|
*
|
|
* http://stackoverflow.com/a/29152379/4405051
|
|
* @param cipherText base64 encoded ciphertext
|
|
* @param password passphrase
|
|
*/
|
|
fun decrypt(cipherText: String, password: String): String {
|
|
return try {
|
|
val ctBytes = Base64.decode(cipherText, Base64.DEFAULT)
|
|
val saltBytes = Arrays.copyOfRange(ctBytes, 8, 16)
|
|
val cipherTextBytes = Arrays.copyOfRange(ctBytes, 16, ctBytes.size)
|
|
val md5: MessageDigest = MessageDigest.getInstance("MD5")
|
|
val keyAndIV = generateKeyAndIV(32, 16, 1, saltBytes, password.toByteArray(Charsets.UTF_8), md5)
|
|
decryptAES(cipherTextBytes,
|
|
keyAndIV?.get(0) ?: ByteArray(32),
|
|
keyAndIV?.get(1) ?: ByteArray(16))
|
|
} catch (e: Exception) {
|
|
""
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Decrypt using CryptoJS defaults compatible method.
|
|
*
|
|
* @param cipherText base64 encoded ciphertext
|
|
* @param keyBytes key as a bytearray
|
|
* @param ivBytes iv as a bytearray
|
|
*/
|
|
fun decrypt(cipherText: String, keyBytes: ByteArray, ivBytes: ByteArray): String {
|
|
return try {
|
|
val cipherTextBytes = Base64.decode(cipherText, Base64.DEFAULT)
|
|
decryptAES(cipherTextBytes, keyBytes, ivBytes)
|
|
} catch (e: Exception) {
|
|
""
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Decrypt using CryptoJS defaults compatible method.
|
|
*
|
|
* @param cipherTextBytes encrypted text as a bytearray
|
|
* @param keyBytes key as a bytearray
|
|
* @param ivBytes iv as a bytearray
|
|
*/
|
|
private fun decryptAES(cipherTextBytes: ByteArray, keyBytes: ByteArray, ivBytes: ByteArray): String {
|
|
return try {
|
|
val cipher = Cipher.getInstance(HASH_CIPHER)
|
|
val keyS = SecretKeySpec(keyBytes, AES)
|
|
cipher.init(Cipher.DECRYPT_MODE, keyS, IvParameterSpec(ivBytes))
|
|
cipher.doFinal(cipherTextBytes).toString(Charsets.UTF_8)
|
|
} catch (e: Exception) {
|
|
""
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Generates a key and an initialization vector (IV) with the given salt and password.
|
|
*
|
|
* https://stackoverflow.com/a/41434590
|
|
* This method is equivalent to OpenSSL's EVP_BytesToKey function
|
|
* (see https://github.com/openssl/openssl/blob/main/crypto/evp/evp_key.c).
|
|
* By default, OpenSSL uses a single iteration, MD5 as the algorithm and UTF-8 encoded password data.
|
|
*
|
|
* @param keyLength the length of the generated key (in bytes)
|
|
* @param ivLength the length of the generated IV (in bytes)
|
|
* @param iterations the number of digestion rounds
|
|
* @param salt the salt data (8 bytes of data or `null`)
|
|
* @param password the password data (optional)
|
|
* @param md the message digest algorithm to use
|
|
* @return an two-element array with the generated key and IV
|
|
*/
|
|
@Suppress("SameParameterValue")
|
|
private fun generateKeyAndIV(keyLength: Int, ivLength: Int, iterations: Int, salt: ByteArray, password: ByteArray, md: MessageDigest): Array<ByteArray?>? {
|
|
val digestLength = md.digestLength
|
|
val requiredLength = (keyLength + ivLength + digestLength - 1) / digestLength * digestLength
|
|
val generatedData = ByteArray(requiredLength)
|
|
var generatedLength = 0
|
|
return try {
|
|
md.reset()
|
|
|
|
// Repeat process until sufficient data has been generated
|
|
while (generatedLength < keyLength + ivLength) {
|
|
|
|
// Digest data (last digest if available, password data, salt if available)
|
|
if (generatedLength > 0) md.update(generatedData, generatedLength - digestLength, digestLength)
|
|
md.update(password)
|
|
md.update(salt, 0, 8)
|
|
md.digest(generatedData, generatedLength, digestLength)
|
|
|
|
// additional rounds
|
|
for (i in 1 until iterations) {
|
|
md.update(generatedData, generatedLength, digestLength)
|
|
md.digest(generatedData, generatedLength, digestLength)
|
|
}
|
|
generatedLength += digestLength
|
|
}
|
|
|
|
// Copy key and IV into separate byte arrays
|
|
val result = arrayOfNulls<ByteArray>(2)
|
|
result[0] = generatedData.copyOfRange(0, keyLength)
|
|
if (ivLength > 0) result[1] = generatedData.copyOfRange(keyLength, keyLength + ivLength)
|
|
result
|
|
} catch (e: Exception) {
|
|
throw e
|
|
} finally {
|
|
// Clean out temporary data
|
|
Arrays.fill(generatedData, 0.toByte())
|
|
}
|
|
}
|
|
}
|