From 091a1e0179cb264cc2cab6e3b11ea31045c8536d Mon Sep 17 00:00:00 2001 From: kitfox Date: Tue, 29 May 2007 23:33:23 +0000 Subject: Restoring SVG Salamander to it's original code base, and updating build scripts. git-svn-id: https://svn.java.net/svn/svgsalamander~svn/trunk/svg-core@36 7dc7fa77-23fb-e6ad-8e2e-c86bd48ed22b --- .../com/kitfox/svg/xml/cpx/CPXInputStream.java | 293 +++++++++++++++++++++ 1 file changed, 293 insertions(+) create mode 100644 src/main/java/com/kitfox/svg/xml/cpx/CPXInputStream.java (limited to 'src/main/java/com/kitfox/svg/xml/cpx/CPXInputStream.java') diff --git a/src/main/java/com/kitfox/svg/xml/cpx/CPXInputStream.java b/src/main/java/com/kitfox/svg/xml/cpx/CPXInputStream.java new file mode 100644 index 0000000..1e6ee36 --- /dev/null +++ b/src/main/java/com/kitfox/svg/xml/cpx/CPXInputStream.java @@ -0,0 +1,293 @@ +/* + * CPXInputStream.java + * + * + * The Salamander Project - 2D and 3D graphics libraries in Java + * Copyright (C) 2004 Mark McKay + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * + * Mark McKay can be contacted at mark@kitfox.com. Salamander and other + * projects can be found at http://www.kitfox.com + * + * Created on February 12, 2004, 10:34 AM + */ + +package com.kitfox.svg.xml.cpx; + +import java.io.*; +import java.util.*; +import java.util.zip.*; +import java.security.*; +import javax.crypto.*; + +/** + * This class reads/decodes the CPX file format. This format is a simple + * compression/encryption transformer for XML data. This stream takes in + * encrypted XML and outputs decrypted. It does this by checking for a magic + * number at the start of the stream. If absent, it treats the stream as + * raw XML data and passes it through unaltered. This is to aid development + * in debugging versions, where the XML files will not be in CPX format. + * + * See http://java.sun.com/developer/technicalArticles/Security/Crypto/ + * + * @author Mark McKay + * @author Mark McKay + */ +public class CPXInputStream extends FilterInputStream implements CPXConsts { + + + SecureRandom sec = new SecureRandom(); + + Inflater inflater = new Inflater(); + + int xlateMode; + + //Keep header bytes in case this stream turns out to be plain text + byte[] head = new byte[4]; + int headSize = 0; + int headPtr = 0; + + boolean reachedEOF = false; + byte[] inBuffer = new byte[2048]; + byte[] decryptBuffer = new byte[2048]; + + /** Creates a new instance of CPXInputStream */ + public CPXInputStream(InputStream in) throws IOException { + super(in); + + //Determine processing type + for (int i = 0; i < 4; i++) + { + int val = in.read(); + head[i] = (byte)val; + if (val == -1 || head[i] != MAGIC_NUMBER[i]) + { + headSize = i + 1; + xlateMode = XL_PLAIN; + return; + } + } + + xlateMode = XL_ZIP_CRYPT; + } + + /** + * We do not allow marking + */ + public boolean markSupported() { return false; } + + /** + * Closes this input stream and releases any system resources + * associated with the stream. + * This + * method simply performs in.close(). + * + * @exception IOException if an I/O error occurs. + * @see java.io.FilterInputStream#in + */ + public void close() throws IOException { + reachedEOF = true; + in.close(); + } + + /** + * Reads the next byte of data from this input stream. The value + * byte is returned as an int in the range + * 0 to 255. If no byte is available + * because the end of the stream has been reached, the value + * -1 is returned. This method blocks until input data + * is available, the end of the stream is detected, or an exception + * is thrown. + *

+ * This method + * simply performs in.read() and returns the result. + * + * @return the next byte of data, or -1 if the end of the + * stream is reached. + * @exception IOException if an I/O error occurs. + * @see java.io.FilterInputStream#in + */ + public int read() throws IOException + { + final byte[] b = new byte[1]; + int retVal = read(b, 0, 1); + if (retVal == -1) return -1; + return b[0]; + } + + /** + * Reads up to byte.length bytes of data from this + * input stream into an array of bytes. This method blocks until some + * input is available. + *

+ * This method simply performs the call + * read(b, 0, b.length) and returns + * the result. It is important that it does + * not do in.read(b) instead; + * certain subclasses of FilterInputStream + * depend on the implementation strategy actually + * used. + * + * @param b the buffer into which the data is read. + * @return the total number of bytes read into the buffer, or + * -1 if there is no more data because the end of + * the stream has been reached. + * @exception IOException if an I/O error occurs. + * @see java.io.FilterInputStream#read(byte[], int, int) + */ + public int read(byte[] b) throws IOException + { + return read(b, 0, b.length); + } + + /** + * Reads up to len bytes of data from this input stream + * into an array of bytes. This method blocks until some input is + * available. + *

+ * This method simply performs in.read(b, off, len) + * and returns the result. + * + * @param b the buffer into which the data is read. + * @param off the start offset of the data. + * @param len the maximum number of bytes read. + * @return the total number of bytes read into the buffer, or + * -1 if there is no more data because the end of + * the stream has been reached. + * @exception IOException if an I/O error occurs. + * @see java.io.FilterInputStream#in + */ + public int read(byte[] b, int off, int len) throws IOException + { + if (reachedEOF) return -1; + + if (xlateMode == XL_PLAIN) + { + int count = 0; + //Write header if appropriate + while (headPtr < headSize && len > 0) + { + b[off++] = head[headPtr++]; + count++; + len--; + } + + return (len == 0) ? count : count + in.read(b, off, len); + } + + //Decrypt and inflate + if (inflater.needsInput() && !decryptChunk()) + { + reachedEOF = true; + + //Read remaining bytes + int numRead; + try { + numRead = inflater.inflate(b, off, len); + } + catch (Exception e) + { + e.printStackTrace(); + return -1; + } + + if (!inflater.finished()) + { + new Exception("Inflation incomplete").printStackTrace(); + } + + return numRead == 0 ? -1 : numRead; + } + + try { + return inflater.inflate(b, off, len); + } + catch (DataFormatException e) + { + e.printStackTrace(); + return -1; + } + } + + + /** + * Call when inflater indicates that it needs more bytes. + * @return - true if we decrypted more bytes to deflate, false if we + * encountered the end of stream + */ + protected boolean decryptChunk() throws IOException + { + while (inflater.needsInput()) + { + int numInBytes = in.read(inBuffer); + if (numInBytes == -1) return false; +// int numDecryptBytes = cipher.update(inBuffer, 0, numInBytes, decryptBuffer); +// inflater.setInput(decryptBuffer, 0, numDecryptBytes); +inflater.setInput(inBuffer, 0, numInBytes); + } + + return true; + } + + /** + * This method returns 1 if we've not reached EOF, 0 if we have. Programs + * should not rely on this to determine the number of bytes that can be + * read without blocking. + */ + public int available() { return reachedEOF ? 0 : 1; } + + /** + * Skips bytes by reading them into a cached buffer + */ + public long skip(long n) throws IOException + { + int skipSize = (int)n; + if (skipSize > inBuffer.length) skipSize = inBuffer.length; + return read(inBuffer, 0, skipSize); + } + +} + +/* + import java.security.KeyPairGenerator; + import java.security.KeyPair; + import java.security.KeyPairGenerator; + import java.security.PrivateKey; + import java.security.PublicKey; + import java.security.SecureRandom; + import java.security.Cipher; + + .... + + java.security.Security.addProvider(new cryptix.provider.Cryptix()); + + SecureRandom random = new SecureRandom(SecureRandom.getSeed(30)); + KeyPairGenerator keygen = KeyPairGenerator.getInstance("RSA"); + keygen.initialize(1024, random); + keypair = keygen.generateKeyPair(); + + PublicKey pubkey = keypair.getPublic(); + PrivateKey privkey = keypair.getPrivate(); + */ + +/* + * + *Generate key pairs +KeyPairGenerator keyGen = + KeyPairGenerator.getInstance("DSA"); +KeyGen.initialize(1024, new SecureRandom(userSeed)); +KeyPair pair = KeyGen.generateKeyPair(); + */ \ No newline at end of file -- cgit v1.2.3-55-g7522