All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.flume.channel.file.encryption.AESCTRNoPaddingProvider Maven / Gradle / Ivy

There is a newer version: 1.11.0
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied.  See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */
package org.apache.flume.channel.file.encryption;

import java.nio.ByteBuffer;
import java.security.Key;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;

import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;

import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import com.google.common.base.Throwables;

public class AESCTRNoPaddingProvider extends CipherProvider {
  private static final Logger LOG = LoggerFactory
      .getLogger(AESCTRNoPaddingProvider.class);
  static final String TYPE = "AES/CTR/NoPadding";


  public Encryptor.Builder newEncryptorBuilder() {
    return new EncryptorBuilder();
  }
  public Decryptor.Builder newDecryptorBuilder() {
    return new DecryptorBuilder();
  }

  public static class EncryptorBuilder
    extends CipherProvider.Encryptor.Builder {
    @Override
    public AESCTRNoPaddingEncryptor build() {
      ByteBuffer buffer = ByteBuffer.allocate(16);
      byte[] seed = new byte[12];
      SecureRandom random = new SecureRandom();
      random.nextBytes(seed);
      buffer.put(seed).putInt(1);
      return new AESCTRNoPaddingEncryptor(key, buffer.array());
    }
  }


  public static class DecryptorBuilder
    extends CipherProvider.Decryptor.Builder {
    @Override
    public AESCTRNoPaddingDecryptor build() {
      return new AESCTRNoPaddingDecryptor(key, parameters);
    }
  }

  private static class AESCTRNoPaddingEncryptor extends Encryptor {
    private byte[] parameters;
    private Cipher cipher;
    private AESCTRNoPaddingEncryptor(Key key, byte[] parameters) {
      this.parameters = parameters;
      cipher = getCipher(key, Cipher.ENCRYPT_MODE, parameters);
    }
    @Override
    public byte[] getParameters() {
      return parameters;
    }
    @Override
    public String getCodec() {
      return TYPE;
    }
    @Override
    public byte[] encrypt(byte[] clearText) {
      return doFinal(cipher, clearText);
    }
  }

  private static class AESCTRNoPaddingDecryptor extends Decryptor {
    private Cipher cipher;
    private AESCTRNoPaddingDecryptor(Key key, byte[] parameters) {
      cipher = getCipher(key, Cipher.DECRYPT_MODE, parameters);
    }
    @Override
    public byte[] decrypt(byte[] cipherText) {
      return doFinal(cipher, cipherText);
    }
    @Override
    public String getCodec() {
      return TYPE;
    }
  }

  private static byte[] doFinal(Cipher cipher, byte[] input)
    throws DecryptionFailureException{
    try {
      return cipher.doFinal(input);
    } catch (Exception e) {
      String msg = "Unable to encrypt or decrypt data " + TYPE
          + " input.length " + input.length;
      LOG.error(msg, e);
      throw new DecryptionFailureException(msg, e);
    }
  }

  private static Cipher getCipher(Key key, int mode, byte[] parameters) {
    try {
      Cipher cipher = Cipher.getInstance(TYPE);
      cipher.init(mode, key, new IvParameterSpec(parameters));
      return cipher;
    } catch (Exception e) {
      String msg = "Unable to load key using transformation: " + TYPE;
      if (e instanceof InvalidKeyException) {
        try {
          int maxAllowedLen = Cipher.getMaxAllowedKeyLength(TYPE);
          if (maxAllowedLen < 256) {
            msg += "; Warning: Maximum allowed key length = " + maxAllowedLen
                + " with the available JCE security policy files. Have you"
                + " installed the JCE unlimited strength jurisdiction policy"
                + " files?";
          }
        } catch (NoSuchAlgorithmException ex) {
          msg += "; Unable to find specified algorithm?";
        }
      }
      LOG.error(msg, e);
      throw Throwables.propagate(e);
    }
  }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy