01: /*
02: * Copyright (c) 2007, intarsys consulting GmbH
03: *
04: * Redistribution and use in source and binary forms, with or without
05: * modification, are permitted provided that the following conditions are met:
06: *
07: * - Redistributions of source code must retain the above copyright notice,
08: * this list of conditions and the following disclaimer.
09: *
10: * - Redistributions in binary form must reproduce the above copyright notice,
11: * this list of conditions and the following disclaimer in the documentation
12: * and/or other materials provided with the distribution.
13: *
14: * - Neither the name of intarsys nor the names of its contributors may be used
15: * to endorse or promote products derived from this software without specific
16: * prior written permission.
17: *
18: * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19: * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21: * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
22: * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23: * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24: * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25: * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26: * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27: * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28: * POSSIBILITY OF SUCH DAMAGE.
29: */
30: package de.intarsys.pdf.crypt;
31:
32: import de.intarsys.pdf.cos.COSObjectKey;
33:
34: /**
35: * The encryption/decryption algorithm for a PDF document. This object does the
36: * real crypt work, whereas the context like initialization steps,
37: * authenthication, authorization is done by the {@link ISecurityHandler} and
38: * {@link ISystemSecurityHandler}.
39: * <p>
40: * PDF security /V4 defines two standard algorithms, RC4 and AES based.
41: * Additionally a transparent algorithm provided by a {@link ISecurityHandler}
42: * can be used.
43: */
44: public interface ICryptHandler {
45: /**
46: * Decrypt any bytes in the context of COSObject referenced by the provided
47: * key.
48: *
49: * @param key
50: * of the object which provides the context
51: * @param bytes
52: * to decrypt
53: * @return the decrypted bytes
54: * @throws COSSecurityException
55: */
56: public byte[] decrypt(COSObjectKey key, byte[] bytes)
57: throws COSSecurityException;
58:
59: /**
60: * Encrypt any bytes in the context of COSObject referenced by the provided
61: * key.
62: *
63: * @param key
64: * of the object which provides the context
65: * @param bytes
66: * to decrypt
67: * @return the encrypted bytes
68: * @throws COSSecurityException
69: */
70: public byte[] encrypt(COSObjectKey key, byte[] bytes)
71: throws COSSecurityException;
72:
73: }
|