de.tsenger.animamea.crypto.AmCryptoProvider.java Source code

Java tutorial

Introduction

Here is the source code for de.tsenger.animamea.crypto.AmCryptoProvider.java

Source

/**
 *  Copyright 2011, Tobias Senger
 *  
 *  This file is part of animamea.
 *
 *  Animamea is free software: you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation, either version 3 of the License, or
 *  (at your option) any later version.
 *
 *  Animamea is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License   
 *  along with animamea.  If not, see <http://www.gnu.org/licenses/>.
 */

package de.tsenger.animamea.crypto;

import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.security.Security;

import org.bouncycastle.crypto.DataLengthException;
import org.bouncycastle.crypto.InvalidCipherTextException;
import org.bouncycastle.crypto.paddings.ISO7816d4Padding;
import org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher;
import org.bouncycastle.jce.provider.BouncyCastleProvider;

/**
 * @author Tobias Senger (tobias@t-senger.de)
 * 
 */
public abstract class AmCryptoProvider {

    protected PaddedBufferedBlockCipher encryptCipher = null;
    protected PaddedBufferedBlockCipher decryptCipher = null;

    // Buffer are used to transport the bytes from one stream to another
    byte[] buf = new byte[16]; // input buffer
    byte[] obuf = new byte[512]; // output buffer

    public AmCryptoProvider() {
        Security.addProvider(new BouncyCastleProvider());
    }

    /**
     * Initialisiert die Crypto-Engine mit dem angegebenen Schlssel und dem
     * Send Sequence Counter (SSC)
     * 
     * @param key
     *            Schlssel
     * @param sendSequenceCounter
     *            Send Sequence Counter
     */
    public abstract void init(byte[] key, byte[] sendSequenceCounter);

    public abstract int getBlockSize();

    public abstract byte[] decryptBlock(byte[] key, byte[] z);

    /**
     * Berechnet den Mac der bergebenen Daten ohne vorherige Initialisierung
     * (@see #init(byte[], long). Es wird daher kein SSC bentigt.
     * 
     * @param key
     *            Schlssel
     * @param data
     *            Die Daten ber die der MAC gebildet werden soll.
     * @return MAC
     */
    public abstract byte[] getMAC(byte[] key, byte[] data);

    /**
     * Berechnet den Message Authentication Code (MAC) aus dem bergebenen
     * ByteArray. Die Parametern werden vorher mit der Methode @see
     * #init(byte[], long) eingestellt.
     * 
     * @param data
     *            Die Daten ber die der MAC gebildet werden soll.
     * @return MAC
     */
    public abstract byte[] getMAC(byte[] data);

    /**
     * Verschlsselt das bergebene ByteArray mit den Parametern die beim @see
     * #init(byte[], long) eingestellt wurden.
     * 
     * @param in
     *            ByteArray mit den zu verschlsselnden Daten
     * @return ByteArray mit den entschlsselten Daten.
     * @throws AmCryptoException 
     */
    public byte[] encrypt(byte[] in) throws AmCryptoException {

        ByteArrayInputStream bin = new ByteArrayInputStream(in);
        ByteArrayOutputStream bout = new ByteArrayOutputStream();

        int noBytesRead = 0; // number of bytes read from input
        int noBytesProcessed = 0; // number of bytes processed

        try {
            while ((noBytesRead = bin.read(buf)) >= 0) {
                noBytesProcessed = encryptCipher.processBytes(buf, 0, noBytesRead, obuf, 0);
                bout.write(obuf, 0, noBytesProcessed);
            }
        } catch (DataLengthException e) {
            throw new AmCryptoException(e);
        } catch (IllegalStateException e) {
            throw new AmCryptoException(e);
        } catch (IOException e) {
            throw new AmCryptoException(e);
        }

        try {
            noBytesProcessed = encryptCipher.doFinal(obuf, 0);
            bout.write(obuf, 0, noBytesProcessed);

            bout.flush();

            bin.close();
            bout.close();
            return bout.toByteArray();
        } catch (DataLengthException e) {
            throw new AmCryptoException(e);
        } catch (IllegalStateException e) {
            throw new AmCryptoException(e);
        } catch (InvalidCipherTextException e) {
            throw new AmCryptoException(e);
        } catch (IOException e) {
            throw new AmCryptoException(e);
        }

    }

    /**
     * Entschlsselt das bergebene ByteArray mit den Parametern die beim @see
     * #init(byte[], long) eingestellt wurden.
     * 
     * @param in
     *            BytrArray mit den verschlsselten Daten
     * @return ByteArray mit den entschlsselten Daten
     * @throws AmCryptoException 
     */
    public byte[] decrypt(byte[] in) throws AmCryptoException {

        ByteArrayInputStream bin = new ByteArrayInputStream(in);
        ByteArrayOutputStream bout = new ByteArrayOutputStream();

        int noBytesRead = 0; // number of bytes read from input
        int noBytesProcessed = 0; // number of bytes processed

        try {
            while ((noBytesRead = bin.read(buf)) >= 0) {
                noBytesProcessed = decryptCipher.processBytes(buf, 0, noBytesRead, obuf, 0);
                bout.write(obuf, 0, noBytesProcessed);
            }
        } catch (DataLengthException e) {
            throw new AmCryptoException(e);
        } catch (IllegalStateException e) {
            throw new AmCryptoException(e);
        } catch (IOException e) {
            throw new AmCryptoException(e);
        }

        try {
            noBytesProcessed = decryptCipher.doFinal(obuf, 0);

            bout.write(obuf, 0, noBytesProcessed);

            bout.flush();

            bin.close();
            bout.close();
            return bout.toByteArray();
        } catch (DataLengthException e) {
            throw new AmCryptoException(e);
        } catch (IllegalStateException e) {
            throw new AmCryptoException(e);
        } catch (InvalidCipherTextException e) {
            throw new AmCryptoException(e);
        } catch (IOException e) {
            throw new AmCryptoException(e);
        }

    }

    /**
     * Diese Methode fllt ein Byte-Array mit dem Wert 0x80 und mehreren 0x00
     * bis die Lnge des bergebenen Byte-Array ein Vielfaches der Blocklnge
     * ist. Dies ist die ISO9797-1 Padding-Methode 2 bzw. ISO7816d4-Padding
     * 
     * @param data
     *            Das Byte-Array welches aufgefllt werden soll.
     * @return Das gefllte Byte-Array.
     */
    public byte[] addPadding(byte[] data) {

        int len = data.length;
        int nLen = ((len / getBlockSize()) + 1) * getBlockSize();
        byte[] n = new byte[nLen];
        System.arraycopy(data, 0, n, 0, data.length);
        new ISO7816d4Padding().addPadding(n, len);
        return n;
    }

    /**
     * Entfernt aus dem bergebenen Byte-Array das Padding nach ISO9797-1
     * Padding-Methode 2 bzw. ISO7816d4-Padding.
     * 
     * @param b
     *            Byte-Array aus dem das Padding entfernt werden soll
     * @return Padding-bereinigtes Byte-Array
     */
    public byte[] removePadding(byte[] b) {
        byte[] rd = null;
        int i = b.length - 1;
        do {
            i--;
        } while (b[i] == (byte) 0x00);

        if (b[i] == (byte) 0x80) {
            rd = new byte[i];
            System.arraycopy(b, 0, rd, 0, rd.length);
            return rd;
        }
        return b;
    }
}