001    /**
002     *  Licensed to the Apache Software Foundation (ASF) under one or more
003     *  contributor license agreements.  See the NOTICE file distributed with
004     *  this work for additional information regarding copyright ownership.
005     *  The ASF licenses this file to You under the Apache License, Version 2.0
006     *  (the "License"); you may not use this file except in compliance with
007     *  the License.  You may obtain a copy of the License at
008     *
009     *     http://www.apache.org/licenses/LICENSE-2.0
010     *
011     *  Unless required by applicable law or agreed to in writing, software
012     *  distributed under the License is distributed on an "AS IS" BASIS,
013     *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
014     *  See the License for the specific language governing permissions and
015     *  limitations under the License.
016     */
017    package org.apache.geronimo.util;
018    
019    import java.io.ByteArrayOutputStream;
020    import java.io.ObjectOutputStream;
021    import java.io.Serializable;
022    import java.io.ObjectInputStream;
023    import java.io.ByteArrayInputStream;
024    import javax.crypto.spec.SecretKeySpec;
025    import javax.crypto.Cipher;
026    import javax.crypto.SealedObject;
027    import org.apache.geronimo.util.encoders.Base64;
028    import org.apache.commons.logging.Log;
029    import org.apache.commons.logging.LogFactory;
030    
031    /**
032     * This class protects some value BY ENCRYPTING WITH A KNOWN KEY.  That is
033     * to say, it's only safe against anyone who can't read the source code.
034     * So the main idea is to protect against casual observers.
035     *
036     * If someone has a better idea for how to implement encryption with a
037     * non-obvious key that the user isn't likely to change during the normal
038     * course of working with the server, I'd be happy to hear it.  (But I
039     * assume the SSL keystore is likely to be changed, which would result
040     * in losing all the "encrypted" data.
041     *
042     * @version $Rev: 476049 $ $Date: 2006-11-16 23:35:17 -0500 (Thu, 16 Nov 2006) $
043     */
044    public class SimpleEncryption {
045        private final static Log log = LogFactory.getLog(SimpleEncryption.class);
046        private final static SecretKeySpec SECRET_KEY = new SecretKeySpec(new byte[]{(byte)-45,(byte)-15,(byte)100,(byte)-34,(byte)70,(byte)83,(byte)75,(byte)-100,(byte)-75,(byte)61,(byte)26,(byte)114,(byte)-20,(byte)-58,(byte)114,(byte)77}, "AES");
047    
048    
049        /**
050         * Gets a String which contains the Base64-encoded form of the source,
051         * encrypted with the known key.
052         */
053        public static String encrypt(Serializable source) {
054            try {
055                Cipher c = Cipher.getInstance("AES");
056                c.init(Cipher.ENCRYPT_MODE, SECRET_KEY);
057                SealedObject so = new SealedObject(source, c);
058                ByteArrayOutputStream store = new ByteArrayOutputStream();
059                ObjectOutputStream out = new ObjectOutputStream(store);
060                out.writeObject(so);
061                out.close();
062                byte[] data = store.toByteArray();
063                byte[] textData = Base64.encode(data);
064                return new String(textData, "US-ASCII");
065            } catch (Exception e) {
066                log.error("Unable to encrypt", e);
067                return null;
068            }
069        }
070    
071        /**
072         * Given a String which is the Base64-encoded encrypted data, retrieve
073         * the original Object.
074         */
075        public static Object decrypt(String source) {
076            try {
077                byte[] data = Base64.decode(source);
078                Cipher c = Cipher.getInstance("AES");
079                c.init(Cipher.DECRYPT_MODE, SECRET_KEY);
080                ObjectInputStream in = new ObjectInputStream(new ByteArrayInputStream(data));
081                SealedObject so = (SealedObject) in.readObject();
082                return so.getObject(c);
083            } catch (Exception e) {
084                log.error("Unable to decrypt", e);
085                return null;
086            }
087        }
088    }