Skip to content
This repository has been archived by the owner on Jun 17, 2020. It is now read-only.

brodycj/android-database-sqlcipher-crypto-connection-core-glue-jar-pro-free-build-unstable-0x

Repository files navigation

android-database-sqlcipher crypto connection core glue PRO-FREE JAR build

LICENSING NOTE: BUILD INCLUDES github:brodybits/sqlite-fake-crypto-batch-connection-core-pro-free-2020-01 under GPL v3 or COMMERCIAL LICENSE OPTIONS

based on https://github.com/brodybits/android-database-sqlcipher-crypto-connection-core-glue-jar-build, which is in turn based on github:sqlcipher/android-database-sqlcipher, with android.database.sqlite C++ and Java classes removed

with SCCoreGlue API pro-free support built from the JNI/NDK source in: github:brodybits/sqlite-fake-crypto-batch-connection-core-pro-free-2020-01

with additional enhancment(s) by @brodybits from github:brodybits/android-database-sqlcipher#v4.x-extra-durable-jar-build:

  • able to build JAR, as documented below
  • extra durable with -DSQLITE_DEFAULT_SYNCHRONOUS=3 build setting in build.gradle

Compatibility

SQLCipher for Android runs on Android 4.1–Android 10, for armeabi-v7a, x86, x86_64, and arm64_v8a architectures.

An Illustrative Terminal Listing

A typical SQLite database in unencrypted, and visually parseable even as encoded text. The following example shows the difference between hexdumps of a standard SQLite database and one implementing SQLCipher.

~ sjlombardo$ hexdump -C sqlite.db
00000000 53 51 4c 69 74 65 20 66 6f 72 6d 61 74 20 33 00 |SQLite format 3.|
…
000003c0 65 74 32 74 32 03 43 52 45 41 54 45 20 54 41 42 |et2t2.CREATE TAB|
000003d0 4c 45 20 74 32 28 61 2c 62 29 24 01 06 17 11 11 |LE t2(a,b)$…..|
…
000007e0 20 74 68 65 20 73 68 6f 77 15 01 03 01 2f 01 6f | the show…./.o|
000007f0 6e 65 20 66 6f 72 20 74 68 65 20 6d 6f 6e 65 79 |ne for the money|

~ $ sqlite3 sqlcipher.db
sqlite> PRAGMA KEY=’test123′;
sqlite> CREATE TABLE t1(a,b);
sqlite> INSERT INTO t1(a,b) VALUES (‘one for the money’, ‘two for the show’);
sqlite> .quit

~ $ hexdump -C sqlcipher.db
00000000 84 d1 36 18 eb b5 82 90 c4 70 0d ee 43 cb 61 87 |.?6.?..?p.?C?a.|
00000010 91 42 3c cd 55 24 ab c6 c4 1d c6 67 b4 e3 96 bb |.B?..?|
00000bf0 8e 99 ee 28 23 43 ab a4 97 cd 63 42 8a 8e 7c c6 |..?(#C??.?cB..|?|

~ $ sqlite3 sqlcipher.db
sqlite> SELECT * FROM t1;
Error: file is encrypted or is not a database

(example courtesy of SQLCipher)

Using SQLCipher for Android With Room

SQLCipher for Android has a SupportFactory class in the net.sqlcipher.database package that can be used to configure Room to use SQLCipher for Android.

There are three SupportFactory constructors:

  • SupportFactory(byte[] passphrase)
  • SupportFactory(byte[] passphrase, SQLiteDatabaseHook hook)
  • SupportFactory(byte[] passphrase, SQLiteDatabaseHook hook, boolean clearPassphrase)

All three take a byte[] to use as the passphrase (if you have a char[], use SQLiteDatabase.getBytes() to get a suitable byte[] to use).

Two offer a SQLiteDatabaseHook parameter that you can use for executing SQL statements before or after the passphrase is used to key the database.

The three-parameter constructor also offers clearPassphrase, which defaults to true in the other two constructors. If clearPassphrase is set to true, this will zero out the bytes of the byte[] after we open the database. This is safest from a security standpoint, but it does mean that the SupportFactory instance is a single-use object. Attempting to reuse the SupportFactory instance later will result in being unable to open the database, because the passphrase will be wrong. If you think that you might need to reuse the SupportFactory instance, pass false for clearPassphrase.

Then, pass your SupportFactory to openHelperFactory() on your RoomDatabase.Builder:

final byte[] passphrase = SQLiteDatabase.getBytes(userEnteredPassphrase);
final SupportFactory factory = new SupportFactory(passphrase);
final SomeDatabase room = Room.databaseBuilder(activity, SomeDatabase.class, DB_NAME)
  .openHelperFactory(factory)
  .build();

Now, Room will make all of its database requests using SQLCipher for Android instead of the framework copy of SQLCipher.

Note that SupportFactory should work with other consumers of the androidx.sqlite API; Room is merely a prominent example.

Using SQLCipher for Android's Native API

If you have existing SQLite code using classes like SQLiteDatabase and SQLiteOpenHelper, converting your code to use SQLCipher for Android mostly is a three-step process:

  1. Replace all android.database.sqlite.* import statements with ones that use net.sqlcipher.database.* (e.g., convert android.database.sqlite.SQLiteDatabase to net.sqlcipher.database.SQLiteDatabase)

  2. Before attempting to open a database, call SQLiteDatabase.loadLibs(), passing in a Context (e.g., add this to onCreate() of your Application subclass, using the Application itself as the Context)

  3. When opening a database (e.g., SQLiteDatabase.openOrCreateDatabase()), pass in the passphrase as a char[] or byte[]

The rest of your code may not need any changes.

An article covering both integration of SQLCipher into an Android application as well as building the source can be found here.

  • -->

Building

In order to build android-database-sqlcipher from source you will need both the Android SDK, Gradle, and the Android NDK. We currently recommend using Android NDK version r20. To complete the make command, the ANDROID_NDK_HOME environment variable must be defined which should point to your NDK root. Once you have cloned the repo, change directory into the root of the repository and run the following commands:

# this only needs to be done once
make init

# to build the source for debug:
make build-debug
# or for a release build:
make build-release

JAR build

to build as a single JAR: make jar

Testing in sqlcipher/sqlcipher-android-tests:

In a clone of github:sqlcipher/sqlcipher-android-tests:

  • mkdir -p app/libs
  • copy the JAR files into app/libs
  • apply the following updates to app/build.gradle:
diff --git a/app/build.gradle b/app/build.gradle
index 275371a..dcdbfe4 100644
--- a/app/build.gradle
+++ b/app/build.gradle
@@ -20,13 +20,14 @@ android {
 
 dependencies {
   // For testing JAR-based distribution:
-  // implementation files('libs/sqlcipher.jar')
+  implementation files('libs/android-database-sqlcipher-classes.jar')
+  implementation files('libs/android-database-sqlcipher-ndk.jar')
 
   // For testing local AAR package:
   // implementation (name: 'android-database-sqlcipher-4.4.0-release', ext: 'aar')
 
   // For testing on remote AAR reference:
-  implementation 'net.zetetic:android-database-sqlcipher:4.4.0@aar'
+  // implementation 'net.zetetic:android-database-sqlcipher:4.4.0@aar'
 
   // Mandatory dependency:
   implementation "androidx.sqlite:sqlite:2.0.1"

then build and run the clone using Android Studio or according to the instructions here

License

SEE BUILD LICENSE NOTE ABOVE - BUILD INCLUDES github:brodybits/sqlite-fake-crypto-batch-connection-core-pro-free-2020-01 with GPL v3 or COMMERCIAL LICENSE OPTIONS

for SQLCipher:

The Android support libraries build scripts are licensed under Apache 2.0, in line with the Android OS code on which they are based. The SQLCipher code itself is licensed under a BSD-style license from Zetetic LLC. Finally, the original SQLite code itself is in the public domain.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published