SQLCipher for Android provides a library replacement for android.database.sqlite on the Android platform for use on SQLCipher databases. This library is based on the upstream Android Bindings project and aims to be a long-term replacement for the original SQLCipher for Android library.
SQLCipher for Android supports Android API 23 and up on armeabi-v7a, x86, x86_64, and arm64-v8a architectures.
We welcome contributions, to contribute to SQLCipher for Android, a contributor agreement needs to be submitted. All submissions should be based on the master branch.
Add a local reference to the local library and dependency:
implementation files('libs/sqlcipher-android-4.14.0-release.aar')
implementation 'androidx.sqlite:sqlite:2.6.2'or source a Community edition build from Maven Central:
implementation 'net.zetetic:sqlcipher-android:4.14.0@aar'
implementation 'androidx.sqlite:sqlite:2.6.2'import net.zetetic.database.sqlcipher.SQLiteDatabase;
System.loadLibrary("sqlcipher");
SQLiteDatabase database = SQLiteDatabase.openOrCreateDatabase(databaseFile, password, null, null, null);To perform operations on the database instance immediately before or after the keying operation is performed, provide a SQLiteDatabaseHook instance when creating your database connection:
SQLiteDatabaseHook hook = new SQLiteDatabaseHook() {
public void preKey(SQLiteConnection connection) { }
public void postKey(SQLiteConnection connection) { }
};There are two main options for using SQLCipher for Android within an Application:
- Using the SQLCipher for Android classes
- Using SQLCipher for Android in conjunction with the Android Room API
In both cases, prior to using any portion of the SQLCipher for Android library, the native SQLCipher core library must be loaded into the running application process. The SQLCipher core library is bundled within the AAR of SQLCipher for Android, however, the developer must load this library explicitly. An example below:
System.loadLibrary("sqlcipher");SQLCipher for Android provides two classes for opening and access database files. The SQLiteDatabase provides static methods for opening/creating database files and general data access.
Additionally, applications may choose to subclass the SQLiteOpenHelper class which provides mechanisms for performing database migrations, as well as general data access.
SQLCipher for Android may also integrate with the Room API via the SupportOpenHelperFactory, an example is given below:
System.loadLibrary("sqlcipher");
String password = "Password1!";
File databaseFile = context.getDatabasePath("demo.db");
SupportOpenHelperFactory factory = new SupportOpenHelperFactory(password.getBytes(StandardCharsets.UTF_8));
db = Room.databaseBuilder(context, AppDatabase.class, databaseFile.getAbsolutePath())
.openHelperFactory(factory).build();Logging may occur in 3 distinct areas within this library:
- Within the Java client library
- Within the JNI interop layer
- Within SQLCipher core
By default, logging within the Java client library is routed to Logcat. If you wish to disable this logging entirely, you may utilize
the NoopTarget instead:
Logger.setTarget(new NoopTarget());You can instead provide a custom logging target by registering a different target that implements the LogTarget interface.
There are two different compile-specific options available to alter the logging output from the JNI layer. To remove INFO, DEBUG, and VERBOSE log messages from the JNI layer, include -DNDEBUG with CFLAGS; this will allow WARN and ERROR logs to output to logcat. Alternatively, to exclude all log output from JNI, build the library using -DSQLCIPHER_OMIT_LOG.
To manage the logging produced from SQLCipher core, please review the runtime configurations: PRAGMA cipher_log,
PRAGMA cipher_log_level, and PRAGMA cipher_log_source.
This project and it's dependencies can be built directly within Android Studio. Currently, SQLCipher for Android uses NDK version "25.2.9519653". The repository includes a submodule for SQLCipher core, and LibTomCrypt as external dependencies. When cloning the repository, please execute the following command at the root of the project (the build phase will check for this on your behalf):
git submodule update --init
To build the AAR package, either build directly within Android Studio, or from the command line:
./gradlew assembleRelease
By default, SQLCipher for Android uses LibTomCrypt as the default crypto provider. Alternatively, you may build SQLCipher for Android linked with OpenSSL. Instructions for building OpenSSL to target Android-specific ABI's are outside the scope of this project. Below are the integration steps necessary for the project to utilize the OpenSSL libraries during the build phase.
- Place your ABI-specific
libcrypto.afiles andincludedirectory insqlcipher/src/main/jni/sqlcipher/android-libs - Specify all required SQLCipher Core
CFLAGSwithin the environment variableSQLCIPHER_CFLAGSincluding-DSQLCIPHER_CRYPTO_OPENSSLand-DSQLITE_HAS_CODEC