From 4a51a8f96715ffb2a42189b93b9fa91b453b8530 Mon Sep 17 00:00:00 2001 From: sg481n Date: Thu, 3 Aug 2017 17:39:12 -0400 Subject:  [AAF-21] Initial code import MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Change-Id: Ia1dd196befd061f6ba0c2be6bf4456a30ea50f97 Signed-off-by: sg481n --- core/src/main/java/com/att/cadi/AES.java | 128 +++++++++++++++++++++++++++++++ 1 file changed, 128 insertions(+) create mode 100644 core/src/main/java/com/att/cadi/AES.java (limited to 'core/src/main/java/com/att/cadi/AES.java') diff --git a/core/src/main/java/com/att/cadi/AES.java b/core/src/main/java/com/att/cadi/AES.java new file mode 100644 index 0000000..4041ae5 --- /dev/null +++ b/core/src/main/java/com/att/cadi/AES.java @@ -0,0 +1,128 @@ +/******************************************************************************* + * ============LICENSE_START==================================================== + * * org.onap.aai + * * =========================================================================== + * * Copyright © 2017 AT&T Intellectual Property. All rights reserved. + * * Copyright © 2017 Amdocs + * * =========================================================================== + * * Licensed under the Apache License, Version 2.0 (the "License"); + * * you may not use this file except in compliance with the License. + * * You may obtain a copy of the License at + * * + * * http://www.apache.org/licenses/LICENSE-2.0 + * * + * * Unless required by applicable law or agreed to in writing, software + * * distributed under the License is distributed on an "AS IS" BASIS, + * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * * See the License for the specific language governing permissions and + * * limitations under the License. + * * ============LICENSE_END==================================================== + * * + * * ECOMP is a trademark and service mark of AT&T Intellectual Property. + * * + ******************************************************************************/ +package com.att.cadi; + +import java.io.File; +import java.io.FileInputStream; +import java.io.FileOutputStream; +import java.io.IOException; +import java.io.InputStream; +import java.io.OutputStream; +import java.security.InvalidKeyException; +import java.security.NoSuchAlgorithmException; + +import javax.crypto.BadPaddingException; +import javax.crypto.Cipher; +import javax.crypto.CipherInputStream; +import javax.crypto.CipherOutputStream; +import javax.crypto.IllegalBlockSizeException; +import javax.crypto.KeyGenerator; +import javax.crypto.NoSuchPaddingException; +import javax.crypto.SecretKey; +import javax.crypto.spec.SecretKeySpec; + +import com.att.cadi.util.Chmod; + +public class AES { + public static final String AES = AES.class.getSimpleName(); + public static final int AES_KEY_SIZE = 128; // 256 isn't supported on all JDKs. + + private Cipher aesCipher; + private SecretKeySpec aeskeySpec; + + public AES() throws IOException, NoSuchAlgorithmException, NoSuchPaddingException { + aesCipher = Cipher.getInstance(AES); + aeskeySpec = new SecretKeySpec(newKey().getEncoded(), AES); + } + + public static SecretKey newKey() throws NoSuchAlgorithmException { + KeyGenerator kgen = KeyGenerator.getInstance(AES); + kgen.init(AES_KEY_SIZE); + return kgen.generateKey(); + } + + public AES(File keyfile) throws IOException, NoSuchAlgorithmException, NoSuchPaddingException { + aesCipher = Cipher.getInstance(AES); + byte[] aesKey = new byte[AES_KEY_SIZE/8]; + FileInputStream fis = new FileInputStream(keyfile); + try { + fis.read(aesKey); + } finally { + fis.close(); + } + aeskeySpec = new SecretKeySpec(aesKey,AES); + } + + public AES(byte[] aeskey, int offset, int len) throws IOException, NoSuchAlgorithmException, NoSuchPaddingException { + aesCipher = Cipher.getInstance(AES); + aeskeySpec = new SecretKeySpec(aeskey,offset,len,AES); + } + + public byte[] encrypt(byte[] in) throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException { + aesCipher.init(Cipher.ENCRYPT_MODE,aeskeySpec); + return aesCipher.doFinal(in); + } + + public byte[] decrypt(byte[] in) throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException { + aesCipher.init(Cipher.DECRYPT_MODE,aeskeySpec); + return aesCipher.doFinal(in); + } + + public void save(File keyfile) throws IOException { + FileOutputStream fis = new FileOutputStream(keyfile); + try { + fis.write(aeskeySpec.getEncoded()); + } finally { + fis.close(); + } + Chmod.to400.chmod(keyfile); + } + + public CipherOutputStream outputStream(OutputStream os, boolean encrypt) { + try { + if(encrypt) { + aesCipher.init(Cipher.ENCRYPT_MODE,aeskeySpec); + } else { + aesCipher.init(Cipher.DECRYPT_MODE,aeskeySpec); + } + } catch (InvalidKeyException e) { + // KeySpec created earlier... no chance being wrong. + } + return new CipherOutputStream(os,aesCipher); + } + + public CipherInputStream inputStream(InputStream is, boolean encrypt) { + try { + if(encrypt) { + aesCipher.init(Cipher.ENCRYPT_MODE,aeskeySpec); + } else { + aesCipher.init(Cipher.DECRYPT_MODE,aeskeySpec); + } + } catch (InvalidKeyException e) { + // KeySpec created earlier... no chance being wrong. + } + + return new CipherInputStream(is,aesCipher); + } +} -- cgit 1.2.3-korg