/* Copyright (c) 2001-2009, The HSQL Development Group * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * Neither the name of the HSQL Development Group nor the names of its * contributors may be used to endorse or promote products derived from this * software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL HSQL DEVELOPMENT GROUP, HSQLDB.ORG, * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package org.hsqldb.persist; import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.CipherInputStream; import javax.crypto.CipherOutputStream; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.SecretKey; import javax.crypto.ShortBufferException; import javax.crypto.spec.SecretKeySpec; import org.hsqldb.error.Error; import org.hsqldb.error.ErrorCode; import org.hsqldb.lib.StringConverter; public class Crypto { SecretKeySpec key; Cipher outCipher; Cipher inCipher; public Crypto(String keyString, String cipherName, String provider) { try { byte[] encodedKey = StringConverter.hexStringToByteArray(keyString); key = new SecretKeySpec(encodedKey, cipherName); outCipher = provider == null ? Cipher.getInstance(cipherName) : Cipher.getInstance(cipherName, provider); outCipher.init(Cipher.ENCRYPT_MODE, key); inCipher = provider == null ? Cipher.getInstance(cipherName) : Cipher.getInstance(cipherName, provider); inCipher.init(Cipher.DECRYPT_MODE, key); return; } catch (NoSuchPaddingException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (NoSuchAlgorithmException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (NoSuchProviderException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (IOException e) { throw Error.error(ErrorCode.X_S0531, e); } } public synchronized InputStream getInputStream(InputStream in) { if (inCipher == null) { return in; } try { inCipher.init(Cipher.DECRYPT_MODE, key); return new CipherInputStream(in, inCipher); } catch (java.security.InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } } public synchronized OutputStream getOutputStream(OutputStream out) { if (outCipher == null) { return out; } try { outCipher.init(Cipher.ENCRYPT_MODE, key); return new CipherOutputStream(out, outCipher); } catch (java.security.InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } } public synchronized int decode(byte[] source, int sourceOffset, int length, byte[] dest, int destOffset) { if (inCipher == null) { return length; } try { inCipher.init(Cipher.DECRYPT_MODE, key); return inCipher.doFinal(source, sourceOffset, length, dest, destOffset); } catch (java.security.InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (BadPaddingException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (IllegalBlockSizeException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (ShortBufferException e) { throw Error.error(ErrorCode.X_S0531, e); } } public synchronized int encode(byte[] source, int sourceOffset, int length, byte[] dest, int destOffset) { if (outCipher == null) { return length; } try { outCipher.init(Cipher.ENCRYPT_MODE, key); return outCipher.doFinal(source, sourceOffset, length, dest, destOffset); } catch (java.security.InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (BadPaddingException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (IllegalBlockSizeException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (ShortBufferException e) { throw Error.error(ErrorCode.X_S0531, e); } } public static byte[] getNewKey(String cipherName, String provider) { try { KeyGenerator generator = provider == null ? KeyGenerator.getInstance(cipherName) : KeyGenerator.getInstance(cipherName, provider); SecretKey key = generator.generateKey(); byte[] raw = key.getEncoded(); return raw; } catch (java.security.NoSuchAlgorithmException e) { throw Error.error(ErrorCode.X_S0531, e); } catch (NoSuchProviderException e) { throw Error.error(ErrorCode.X_S0531, e); } } public synchronized int getEncodedSize(int size) { try { return outCipher.getOutputSize(size); } catch (IllegalStateException ex) { try { outCipher.init(Cipher.ENCRYPT_MODE, key); return outCipher.getOutputSize(size); } catch (java.security.InvalidKeyException e) { throw Error.error(ErrorCode.X_S0531, e); } } } }