mirror of https://github.com/M66B/FairEmail.git
parent
89bb923ad5
commit
1258569281
@ -1,407 +0,0 @@
|
|||||||
package eu.faircode.email;
|
|
||||||
|
|
||||||
/*
|
|
||||||
This file is part of FairEmail.
|
|
||||||
|
|
||||||
FairEmail is free software: you can redistribute it and/or modify
|
|
||||||
it under the terms of the GNU General Public License as published by
|
|
||||||
the Free Software Foundation, either version 3 of the License, or
|
|
||||||
(at your option) any later version.
|
|
||||||
|
|
||||||
FairEmail is distributed in the hope that it will be useful,
|
|
||||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
GNU General Public License for more details.
|
|
||||||
|
|
||||||
You should have received a copy of the GNU General Public License
|
|
||||||
along with FairEmail. If not, see <http://www.gnu.org/licenses/>.
|
|
||||||
|
|
||||||
Copyright 2018-2023 by Marcel Bokhorst (M66B)
|
|
||||||
*/
|
|
||||||
|
|
||||||
import android.content.Context;
|
|
||||||
import android.content.SharedPreferences;
|
|
||||||
import android.os.Bundle;
|
|
||||||
import android.security.KeyChain;
|
|
||||||
import android.text.TextUtils;
|
|
||||||
|
|
||||||
import androidx.preference.PreferenceManager;
|
|
||||||
|
|
||||||
import org.apache.poi.ss.formula.eval.NotImplementedException;
|
|
||||||
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
|
|
||||||
import org.bouncycastle.cert.jcajce.JcaCertStore;
|
|
||||||
import org.bouncycastle.cms.CMSAlgorithm;
|
|
||||||
import org.bouncycastle.cms.CMSEnvelopedData;
|
|
||||||
import org.bouncycastle.cms.CMSEnvelopedDataGenerator;
|
|
||||||
import org.bouncycastle.cms.CMSProcessableFile;
|
|
||||||
import org.bouncycastle.cms.CMSSignedData;
|
|
||||||
import org.bouncycastle.cms.CMSSignedDataGenerator;
|
|
||||||
import org.bouncycastle.cms.CMSTypedData;
|
|
||||||
import org.bouncycastle.cms.RecipientInfoGenerator;
|
|
||||||
import org.bouncycastle.cms.SignerInfoGenerator;
|
|
||||||
import org.bouncycastle.cms.jcajce.JcaSignerInfoGeneratorBuilder;
|
|
||||||
import org.bouncycastle.cms.jcajce.JceCMSContentEncryptorBuilder;
|
|
||||||
import org.bouncycastle.cms.jcajce.JceKeyAgreeRecipientInfoGenerator;
|
|
||||||
import org.bouncycastle.cms.jcajce.JceKeyTransRecipientInfoGenerator;
|
|
||||||
import org.bouncycastle.operator.ContentSigner;
|
|
||||||
import org.bouncycastle.operator.DigestCalculatorProvider;
|
|
||||||
import org.bouncycastle.operator.OutputEncryptor;
|
|
||||||
import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder;
|
|
||||||
import org.bouncycastle.operator.jcajce.JcaDigestCalculatorProviderBuilder;
|
|
||||||
import org.bouncycastle.util.Store;
|
|
||||||
|
|
||||||
import java.io.BufferedOutputStream;
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FileOutputStream;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.io.OutputStream;
|
|
||||||
import java.security.PrivateKey;
|
|
||||||
import java.security.cert.CertificateException;
|
|
||||||
import java.security.cert.X509Certificate;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Locale;
|
|
||||||
import java.util.Properties;
|
|
||||||
|
|
||||||
import javax.activation.DataHandler;
|
|
||||||
import javax.mail.Address;
|
|
||||||
import javax.mail.BodyPart;
|
|
||||||
import javax.mail.MessageRemovedException;
|
|
||||||
import javax.mail.MessagingException;
|
|
||||||
import javax.mail.Multipart;
|
|
||||||
import javax.mail.Part;
|
|
||||||
import javax.mail.Session;
|
|
||||||
import javax.mail.internet.ContentType;
|
|
||||||
import javax.mail.internet.InternetAddress;
|
|
||||||
import javax.mail.internet.MimeBodyPart;
|
|
||||||
import javax.mail.internet.MimeMessage;
|
|
||||||
import javax.mail.internet.MimeMultipart;
|
|
||||||
import javax.mail.util.ByteArrayDataSource;
|
|
||||||
|
|
||||||
public class LoaderComposeSMime extends SimpleTask<Void> {
|
|
||||||
@Override
|
|
||||||
protected Void onExecute(Context context, Bundle args) throws Throwable {
|
|
||||||
long id = args.getLong("id");
|
|
||||||
int type = args.getInt("type");
|
|
||||||
String alias = args.getString("alias");
|
|
||||||
|
|
||||||
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
|
|
||||||
boolean check_certificate = prefs.getBoolean("check_certificate", true);
|
|
||||||
|
|
||||||
File tmp = Helper.ensureExists(new File(context.getFilesDir(), "encryption"));
|
|
||||||
|
|
||||||
DB db = DB.getInstance(context);
|
|
||||||
|
|
||||||
// Get data
|
|
||||||
EntityMessage draft = db.message().getMessage(id);
|
|
||||||
if (draft == null)
|
|
||||||
throw new MessageRemovedException("S/MIME");
|
|
||||||
EntityIdentity identity = db.identity().getIdentity(draft.identity);
|
|
||||||
if (identity == null)
|
|
||||||
throw new IllegalArgumentException(context.getString(R.string.title_from_missing));
|
|
||||||
|
|
||||||
// Get/clean attachments
|
|
||||||
List<EntityAttachment> attachments = db.attachment().getAttachments(id);
|
|
||||||
for (EntityAttachment attachment : new ArrayList<>(attachments))
|
|
||||||
if (attachment.encryption != null) {
|
|
||||||
db.attachment().deleteAttachment(attachment.id);
|
|
||||||
attachments.remove(attachment);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Build message to sign
|
|
||||||
// openssl smime -verify <xxx.eml
|
|
||||||
Properties props = MessageHelper.getSessionProperties(true);
|
|
||||||
Session isession = Session.getInstance(props, null);
|
|
||||||
MimeMessage imessage = new MimeMessage(isession);
|
|
||||||
MessageHelper.build(context, draft, attachments, identity, true, imessage);
|
|
||||||
imessage.saveChanges();
|
|
||||||
BodyPart bpContent = new MimeBodyPart() {
|
|
||||||
@Override
|
|
||||||
public void setContent(Object content, String type) throws MessagingException {
|
|
||||||
super.setContent(content, type);
|
|
||||||
|
|
||||||
// https://javaee.github.io/javamail/FAQ#howencode
|
|
||||||
updateHeaders();
|
|
||||||
if (content instanceof Multipart) {
|
|
||||||
try {
|
|
||||||
MessageHelper.overrideContentTransferEncoding((Multipart) content);
|
|
||||||
} catch (IOException ex) {
|
|
||||||
Log.e(ex);
|
|
||||||
}
|
|
||||||
} else
|
|
||||||
setHeader("Content-Transfer-Encoding", "base64");
|
|
||||||
}
|
|
||||||
};
|
|
||||||
bpContent.setContent(imessage.getContent(), imessage.getContentType());
|
|
||||||
|
|
||||||
if (alias == null)
|
|
||||||
throw new IllegalArgumentException("Key alias missing");
|
|
||||||
|
|
||||||
// Get private key
|
|
||||||
PrivateKey privkey = KeyChain.getPrivateKey(context, alias);
|
|
||||||
if (privkey == null)
|
|
||||||
throw new IllegalArgumentException("Private key missing");
|
|
||||||
|
|
||||||
// Get public key
|
|
||||||
X509Certificate[] chain = KeyChain.getCertificateChain(context, alias);
|
|
||||||
if (chain == null || chain.length == 0)
|
|
||||||
throw new IllegalArgumentException("Certificate missing");
|
|
||||||
|
|
||||||
if (check_certificate) {
|
|
||||||
// Check public key validity
|
|
||||||
try {
|
|
||||||
chain[0].checkValidity();
|
|
||||||
// TODO: check digitalSignature/nonRepudiation key usage
|
|
||||||
// https://datatracker.ietf.org/doc/html/rfc3850#section-4.4.2
|
|
||||||
} catch (CertificateException ex) {
|
|
||||||
String msg = ex.getMessage();
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
TextUtils.isEmpty(msg) ? Log.formatThrowable(ex) : msg);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check public key email
|
|
||||||
boolean known = false;
|
|
||||||
List<String> emails = EntityCertificate.getEmailAddresses(chain[0]);
|
|
||||||
for (String email : emails)
|
|
||||||
if (email.equalsIgnoreCase(identity.email)) {
|
|
||||||
known = true;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!known && emails.size() > 0) {
|
|
||||||
String message = identity.email + " (" + TextUtils.join(", ", emails) + ")";
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
context.getString(R.string.title_certificate_missing, message),
|
|
||||||
new CertificateException());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Store selected alias
|
|
||||||
db.identity().setIdentitySignKeyAlias(identity.id, alias);
|
|
||||||
|
|
||||||
// Build content
|
|
||||||
File sinput = new File(tmp, draft.id + ".smime_sign");
|
|
||||||
if (EntityMessage.SMIME_SIGNONLY.equals(type))
|
|
||||||
try (OutputStream os = new MessageHelper.CanonicalizingStream(
|
|
||||||
new BufferedOutputStream(new FileOutputStream(sinput)), EntityAttachment.SMIME_CONTENT, null)) {
|
|
||||||
bpContent.writeTo(os);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
try (FileOutputStream fos = new FileOutputStream(sinput)) {
|
|
||||||
bpContent.writeTo(fos);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (EntityMessage.SMIME_SIGNONLY.equals(type)) {
|
|
||||||
EntityAttachment cattachment = new EntityAttachment();
|
|
||||||
cattachment.message = draft.id;
|
|
||||||
cattachment.sequence = db.attachment().getAttachmentSequence(draft.id) + 1;
|
|
||||||
cattachment.name = "content.asc";
|
|
||||||
cattachment.type = "text/plain";
|
|
||||||
cattachment.disposition = Part.INLINE;
|
|
||||||
cattachment.encryption = EntityAttachment.SMIME_CONTENT;
|
|
||||||
cattachment.id = db.attachment().insertAttachment(cattachment);
|
|
||||||
|
|
||||||
File content = cattachment.getFile(context);
|
|
||||||
Helper.copy(sinput, content);
|
|
||||||
|
|
||||||
db.attachment().setDownloaded(cattachment.id, content.length());
|
|
||||||
}
|
|
||||||
|
|
||||||
// Sign
|
|
||||||
Store store = new JcaCertStore(Arrays.asList(chain));
|
|
||||||
CMSSignedDataGenerator cmsGenerator = new CMSSignedDataGenerator();
|
|
||||||
cmsGenerator.addCertificates(store);
|
|
||||||
|
|
||||||
String signAlgorithm = prefs.getString("sign_algo_smime", "SHA-256");
|
|
||||||
|
|
||||||
String algorithm = privkey.getAlgorithm();
|
|
||||||
if (TextUtils.isEmpty(algorithm) || "RSA".equals(algorithm))
|
|
||||||
Log.i("Private key algorithm=" + algorithm);
|
|
||||||
else
|
|
||||||
Log.e("Private key algorithm=" + algorithm);
|
|
||||||
|
|
||||||
if (TextUtils.isEmpty(algorithm))
|
|
||||||
algorithm = "RSA";
|
|
||||||
else if ("EC".equals(algorithm))
|
|
||||||
algorithm = "ECDSA";
|
|
||||||
|
|
||||||
algorithm = signAlgorithm.replace("-", "") + "with" + algorithm;
|
|
||||||
Log.i("Sign algorithm=" + algorithm);
|
|
||||||
|
|
||||||
ContentSigner contentSigner = new JcaContentSignerBuilder(algorithm)
|
|
||||||
.build(privkey);
|
|
||||||
DigestCalculatorProvider digestCalculator = new JcaDigestCalculatorProviderBuilder()
|
|
||||||
.build();
|
|
||||||
SignerInfoGenerator signerInfoGenerator = new JcaSignerInfoGeneratorBuilder(digestCalculator)
|
|
||||||
.build(contentSigner, chain[0]);
|
|
||||||
cmsGenerator.addSignerInfoGenerator(signerInfoGenerator);
|
|
||||||
|
|
||||||
CMSTypedData cmsData = new CMSProcessableFile(sinput);
|
|
||||||
CMSSignedData cmsSignedData = cmsGenerator.generate(cmsData);
|
|
||||||
byte[] signedMessage = cmsSignedData.getEncoded();
|
|
||||||
|
|
||||||
Helper.secureDelete(sinput);
|
|
||||||
|
|
||||||
// Build signature
|
|
||||||
if (EntityMessage.SMIME_SIGNONLY.equals(type)) {
|
|
||||||
ContentType ct = new ContentType("application/pkcs7-signature");
|
|
||||||
ct.setParameter("micalg", signAlgorithm.toLowerCase(Locale.ROOT));
|
|
||||||
|
|
||||||
EntityAttachment sattachment = new EntityAttachment();
|
|
||||||
sattachment.message = draft.id;
|
|
||||||
sattachment.sequence = db.attachment().getAttachmentSequence(draft.id) + 1;
|
|
||||||
sattachment.name = "smime.p7s";
|
|
||||||
sattachment.type = ct.toString();
|
|
||||||
sattachment.disposition = Part.INLINE;
|
|
||||||
sattachment.encryption = EntityAttachment.SMIME_SIGNATURE;
|
|
||||||
sattachment.id = db.attachment().insertAttachment(sattachment);
|
|
||||||
|
|
||||||
File file = sattachment.getFile(context);
|
|
||||||
try (OutputStream os = new FileOutputStream(file)) {
|
|
||||||
os.write(signedMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
db.attachment().setDownloaded(sattachment.id, file.length());
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
List<Address> addresses = new ArrayList<>();
|
|
||||||
if (draft.to != null)
|
|
||||||
addresses.addAll(Arrays.asList(draft.to));
|
|
||||||
if (draft.cc != null)
|
|
||||||
addresses.addAll(Arrays.asList(draft.cc));
|
|
||||||
if (draft.bcc != null)
|
|
||||||
addresses.addAll(Arrays.asList(draft.bcc));
|
|
||||||
|
|
||||||
List<X509Certificate> certs = new ArrayList<>();
|
|
||||||
|
|
||||||
boolean own = true;
|
|
||||||
for (Address address : addresses) {
|
|
||||||
boolean found = false;
|
|
||||||
Throwable cex = null;
|
|
||||||
String email = ((InternetAddress) address).getAddress();
|
|
||||||
List<EntityCertificate> acertificates = db.certificate().getCertificateByEmail(email);
|
|
||||||
if (acertificates != null)
|
|
||||||
for (EntityCertificate acertificate : acertificates) {
|
|
||||||
X509Certificate cert = acertificate.getCertificate();
|
|
||||||
try {
|
|
||||||
cert.checkValidity();
|
|
||||||
certs.add(cert);
|
|
||||||
found = true;
|
|
||||||
if (cert.equals(chain[0]))
|
|
||||||
own = false;
|
|
||||||
} catch (CertificateException ex) {
|
|
||||||
Log.w(ex);
|
|
||||||
cex = ex;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!found)
|
|
||||||
if (cex == null)
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
context.getString(R.string.title_certificate_missing, email));
|
|
||||||
else
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
context.getString(R.string.title_certificate_invalid, email), cex);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Allow sender to decrypt own message
|
|
||||||
if (own)
|
|
||||||
certs.add(chain[0]);
|
|
||||||
|
|
||||||
// Build signature
|
|
||||||
BodyPart bpSignature = new MimeBodyPart();
|
|
||||||
bpSignature.setFileName("smime.p7s");
|
|
||||||
bpSignature.setDataHandler(new DataHandler(new ByteArrayDataSource(signedMessage, "application/pkcs7-signature")));
|
|
||||||
bpSignature.setDisposition(Part.INLINE);
|
|
||||||
|
|
||||||
// Build message
|
|
||||||
ContentType ct = new ContentType("multipart/signed");
|
|
||||||
ct.setParameter("micalg", signAlgorithm.toLowerCase(Locale.ROOT));
|
|
||||||
ct.setParameter("protocol", "application/pkcs7-signature");
|
|
||||||
ct.setParameter("smime-type", "signed-data");
|
|
||||||
String ctx = ct.toString();
|
|
||||||
int slash = ctx.indexOf("/");
|
|
||||||
Multipart multipart = new MimeMultipart(ctx.substring(slash + 1));
|
|
||||||
multipart.addBodyPart(bpContent);
|
|
||||||
multipart.addBodyPart(bpSignature);
|
|
||||||
imessage.setContent(multipart);
|
|
||||||
imessage.saveChanges();
|
|
||||||
|
|
||||||
// Encrypt
|
|
||||||
CMSEnvelopedDataGenerator cmsEnvelopedDataGenerator = new CMSEnvelopedDataGenerator();
|
|
||||||
if ("EC".equals(privkey.getAlgorithm())) {
|
|
||||||
// https://datatracker.ietf.org/doc/html/draft-ietf-smime-3278bis
|
|
||||||
JceKeyAgreeRecipientInfoGenerator gen = new JceKeyAgreeRecipientInfoGenerator(
|
|
||||||
CMSAlgorithm.ECCDH_SHA256KDF,
|
|
||||||
privkey,
|
|
||||||
chain[0].getPublicKey(),
|
|
||||||
CMSAlgorithm.AES128_WRAP);
|
|
||||||
for (X509Certificate cert : certs)
|
|
||||||
gen.addRecipient(cert);
|
|
||||||
cmsEnvelopedDataGenerator.addRecipientInfoGenerator(gen);
|
|
||||||
// https://security.stackexchange.com/a/53960
|
|
||||||
// throw new IllegalArgumentException("ECDSA cannot be used for encryption");
|
|
||||||
} else {
|
|
||||||
for (X509Certificate cert : certs) {
|
|
||||||
RecipientInfoGenerator gen = new JceKeyTransRecipientInfoGenerator(cert);
|
|
||||||
cmsEnvelopedDataGenerator.addRecipientInfoGenerator(gen);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
File einput = new File(tmp, draft.id + ".smime_encrypt");
|
|
||||||
try (FileOutputStream fos = new FileOutputStream(einput)) {
|
|
||||||
imessage.writeTo(fos);
|
|
||||||
}
|
|
||||||
CMSTypedData msg = new CMSProcessableFile(einput);
|
|
||||||
|
|
||||||
ASN1ObjectIdentifier encryptionOID;
|
|
||||||
String encryptAlgorithm = prefs.getString("encrypt_algo_smime", "AES-128");
|
|
||||||
switch (encryptAlgorithm) {
|
|
||||||
case "AES-128":
|
|
||||||
encryptionOID = CMSAlgorithm.AES128_CBC;
|
|
||||||
break;
|
|
||||||
case "AES-192":
|
|
||||||
encryptionOID = CMSAlgorithm.AES192_CBC;
|
|
||||||
break;
|
|
||||||
case "AES-256":
|
|
||||||
encryptionOID = CMSAlgorithm.AES256_CBC;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
encryptionOID = CMSAlgorithm.AES128_CBC;
|
|
||||||
}
|
|
||||||
Log.i("Encryption algorithm=" + encryptAlgorithm + " OID=" + encryptionOID);
|
|
||||||
|
|
||||||
OutputEncryptor encryptor = new JceCMSContentEncryptorBuilder(encryptionOID)
|
|
||||||
.build();
|
|
||||||
CMSEnvelopedData cmsEnvelopedData = cmsEnvelopedDataGenerator
|
|
||||||
.generate(msg, encryptor);
|
|
||||||
|
|
||||||
EntityAttachment attachment = new EntityAttachment();
|
|
||||||
attachment.message = draft.id;
|
|
||||||
attachment.sequence = db.attachment().getAttachmentSequence(draft.id) + 1;
|
|
||||||
attachment.name = "smime.p7m";
|
|
||||||
attachment.type = "application/pkcs7-mime";
|
|
||||||
attachment.disposition = Part.INLINE;
|
|
||||||
attachment.encryption = EntityAttachment.SMIME_MESSAGE;
|
|
||||||
attachment.id = db.attachment().insertAttachment(attachment);
|
|
||||||
|
|
||||||
File encrypted = attachment.getFile(context);
|
|
||||||
try (OutputStream os = new FileOutputStream(encrypted)) {
|
|
||||||
cmsEnvelopedData.toASN1Structure().encodeTo(os);
|
|
||||||
}
|
|
||||||
|
|
||||||
Helper.secureDelete(einput);
|
|
||||||
|
|
||||||
db.attachment().setDownloaded(attachment.id, encrypted.length());
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected void onException(Bundle args, Throwable ex) {
|
|
||||||
throw new NotImplementedException("LoaderDraft");
|
|
||||||
}
|
|
||||||
}
|
|
Loading…
Reference in new issue