01: /*
02: * Copyright (c) 2007, intarsys consulting GmbH
03: *
04: * Redistribution and use in source and binary forms, with or without
05: * modification, are permitted provided that the following conditions are met:
06: *
07: * - Redistributions of source code must retain the above copyright notice,
08: * this list of conditions and the following disclaimer.
09: *
10: * - Redistributions in binary form must reproduce the above copyright notice,
11: * this list of conditions and the following disclaimer in the documentation
12: * and/or other materials provided with the distribution.
13: *
14: * - Neither the name of intarsys nor the names of its contributors may be used
15: * to endorse or promote products derived from this software without specific
16: * prior written permission.
17: *
18: * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19: * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21: * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
22: * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23: * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24: * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25: * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26: * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27: * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28: * POSSIBILITY OF SUCH DAMAGE.
29: */
30: package de.intarsys.pdf.crypt;
31:
32: import de.intarsys.pdf.cos.COSDictionary;
33: import de.intarsys.pdf.cos.COSObjectKey;
34: import de.intarsys.tools.authenticate.IPasswordProvider;
35:
36: /**
37: * The {@link ISystemSecurityHandler} implementing /V 1 of the PDF spec.
38: *
39: */
40: public class SystemSecurityHandlerV1 extends SystemSecurityHandler {
41: private StandardCryptHandler handler;
42:
43: protected SystemSecurityHandlerV1(COSEncryption encryption) {
44: super (encryption);
45: }
46:
47: public byte[] decryptFile(COSObjectKey key, COSDictionary dict,
48: byte[] bytes) throws COSSecurityException {
49: return decrypt(key, bytes);
50: }
51:
52: public byte[] decryptStream(COSObjectKey key, COSDictionary dict,
53: byte[] bytes) throws COSSecurityException {
54: return decrypt(key, bytes);
55: }
56:
57: public byte[] decryptString(COSObjectKey key, byte[] bytes)
58: throws COSSecurityException {
59: return decrypt(key, bytes);
60: }
61:
62: public byte[] encryptFile(COSObjectKey key, COSDictionary dict,
63: byte[] bytes) throws COSSecurityException {
64: return encrypt(key, bytes);
65: }
66:
67: public byte[] encryptStream(COSObjectKey key, COSDictionary dict,
68: byte[] bytes) throws COSSecurityException {
69: return encrypt(key, bytes);
70: }
71:
72: public byte[] encryptString(COSObjectKey key, byte[] bytes)
73: throws COSSecurityException {
74: return encrypt(key, bytes);
75: }
76:
77: public void authenticate(IPasswordProvider passwordProvider)
78: throws COSSecurityException {
79: super .authenticate(passwordProvider);
80: handler = new ArcFourCryptHandler();
81: handler.init(getSecurityHandler().getCryptKey());
82: }
83:
84: protected byte[] decrypt(COSObjectKey objectKey, byte[] bytes)
85: throws COSSecurityException {
86: return handler.decrypt(objectKey, bytes);
87: }
88:
89: protected byte[] encrypt(COSObjectKey objectKey, byte[] bytes)
90: throws COSSecurityException {
91: return handler.encrypt(objectKey, bytes);
92: }
93: }
|