-
Moemoea Fierin authored
- in all files with a drawString function, this function was modified and changed to my own created function which will make the text disappear if its too small - some missing override were added too
Moemoea Fierin authored- in all files with a drawString function, this function was modified and changed to my own created function which will make the text disappear if its too small - some missing override were added too
TMLADEncrypt.java 16.82 KiB
/* Copyright or (C) or Copr. GET / ENST, Telecom-Paris, Ludovic Apvrille
*
* ludovic.apvrille AT enst.fr
*
* This software is a computer program whose purpose is to allow the
* edition of TURTLE analysis, design and deployment diagrams, to
* allow the generation of RT-LOTOS or Java code from this diagram,
* and at last to allow the analysis of formal validation traces
* obtained from external tools, e.g. RTL from LAAS-CNRS and CADP
* from INRIA Rhone-Alpes.
*
* This software is governed by the CeCILL license under French law and
* abiding by the rules of distribution of free software. You can use,
* modify and/ or redistribute the software under the terms of the CeCILL
* license as circulated by CEA, CNRS and INRIA at the following URL
* "http://www.cecill.info".
*
* As a counterpart to the access to the source code and rights to copy,
* modify and redistribute granted by the license, users are provided only
* with a limited warranty and the software's author, the holder of the
* economic rights, and the successive licensors have only limited
* liability.
*
* In this respect, the user's attention is drawn to the risks associated
* with loading, using, modifying and/or developing or reproducing the
* software by the user in light of its specific status of free software,
* that may mean that it is complicated to manipulate, and that also
* therefore means that it is reserved for developers and experienced
* professionals having in-depth computer knowledge. Users are therefore
* encouraged to load and test the software's suitability as regards their
* requirements in conditions enabling the security of their systems and/or
* data to be ensured and, more generally, to use and operate it in the
* same conditions as regards security.
*
* The fact that you are presently reading this means that you have had
* knowledge of the CeCILL license and that you accept its terms.
*/
package ui.tmlad;
import myutil.GraphicLib;
import org.w3c.dom.Element;
import org.w3c.dom.Node;
import org.w3c.dom.NodeList;
import ui.*;
import ui.ad.TADComponentWithoutSubcomponents;
import ui.util.IconManager;
import ui.window.JDialogCryptographicConfiguration;
import javax.swing.*;
import java.awt.*;
import java.awt.geom.Line2D;
/**
* Class TMLADEncrypt
* Create security pattern and encrypt. To be used in TML activity diagrams
* Creation: 21/11/2005
*
* @author Ludovic APVRILLE
* @version 1.0 21/11/2005
*/
public class TMLADEncrypt extends TADComponentWithoutSubcomponents/* Issue #69 TGCWithoutInternalComponent*/ implements EmbeddedComment, AllowedBreakpoint, BasicErrorHighlight {
// Issue #31
// private int lineLength = 5;
// private int textX, textY;
// private int ex = 5;
// private int textHeight = 8;
//
// private double dlength = 12;
// private double dlineLength1 = 3;
private static final int MARGIN = 5;
private static final int ENC_SYMBOL_HEIGHT = 12;
private static final int ENC_SYMBOL_MARGIN = 3;
private static final int SEC_ICON_HIGHT = 8;
public String type = "";
public String message_overhead = "";
public String size = "";
public String securityContext = "";
public String encTime = "100";
public String decTime = "100";
public String key = "";
public String nonce = "";
public String formula = "";
public String algorithm = "";
protected int stateOfError = 0; // Not yet checked
public TMLADEncrypt(int _x, int _y, int _minX, int _maxX, int _minY, int _maxY, boolean _pos, TGComponent _father, TDiagramPanel _tdp) {
super(_x, _y, _minX, _maxX, _minY, _maxY, _pos, _father, _tdp);
// Issue #31
nbConnectingPoint = 2;
connectingPoint = new TGConnectingPoint[2];
connectingPoint[0] = new TGConnectingPointTMLAD(this, 0, -lineLength, true, false, 0.5, 0.0);
connectingPoint[1] = new TGConnectingPointTMLAD(this, 0, +lineLength + MARGIN, false, true, 0.5, 1.0);
// width = 15;
// height = 35;
// textX = width + 5;
// textY = height/2 + 5;
initScaling( 15, 35 );
moveable = true;
editable = true;
removable = true;
name = "encrypt";
myImageIcon = IconManager.imgic214;
}
@Override
protected void internalDrawing(Graphics g) {
final int scaledMargin = scale( MARGIN );
if (stateOfError > 0) {
Color c = g.getColor();
switch (stateOfError) {
case ErrorHighlight.OK:
g.setColor(ColorManager.EXEC);
break;
default:
g.setColor(ColorManager.UNKNOWN_BOX_ACTION);
}
g.fillRect(x, y, width, height);
int[] xP = new int[]{x, x + width, x + width / 2};
int[] yP = new int[]{ y + height, y + height, y + height + scaledMargin };
g.fillPolygon(xP, yP, 3);
g.setColor(c);
}
g.drawLine(x, y, x + width, y);
g.drawLine(x, y, x, y + height);
g.drawLine(x + width, y, x + width, y + height);
g.drawLine(x, y + height, x + width / 2, y + height + scaledMargin );
g.drawLine(x + width / 2, y + height + scaledMargin, x + width, y + height);
g.drawLine(x + (width / 2), y, x + (width / 2), y - lineLength);
g.drawLine(x + (width / 2), y + height + scaledMargin, x + (width / 2), y + lineLength + height + scaledMargin);
// Issue #31
final int scaledSymbolHeight = scale( ENC_SYMBOL_HEIGHT );
final int scaledSymbolMargin = scale( ENC_SYMBOL_MARGIN );
if (type.equals("Symmetric Encryption")) {
//S
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4, x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2);
g.drawLine(x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight);
//E
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2, x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2);
} else if (type.equals("Asymmetric Encryption")) {
//A
g.drawLine(x + (width / 2), y + (height - scaledSymbolHeight) / 4, x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight);
g.drawLine(x + (width / 2), y + (height - scaledSymbolHeight) / 4, x + (width) - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight);
g.drawLine(x + 3 * scaledMargin / 2, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + scaledMargin / 2, x + width - 3 * scaledMargin / 2, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + scaledMargin / 2);
//E
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + height / 2 - scaledMargin / 2, x + width - scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight / 2 + height / 2 - scaledMargin / 2);
g.drawLine(x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + height / 2 - scaledMargin / 2, x + scaledMargin, y + (height - scaledSymbolHeight) / 4 + scaledSymbolHeight + height / 2 - scaledMargin / 2);
} else if (type.equals("Nonce")) {
//N
g.drawLine(x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2, x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2, x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2, x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
} else if (type.equals("MAC")) {
//M
g.drawLine(x + scaledMargin / 2 + 1, y + (height - scaledSymbolHeight) / 2, x + scaledMargin / 2 + 1, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + width - scaledMargin / 2 - 1, y + (height - scaledSymbolHeight) / 2, x + width - scaledMargin / 2 - 1, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + scaledMargin / 2 + 1, y + (height - scaledSymbolHeight) / 2, x + width / 2, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + width - scaledMargin / 2 - 1, y + (height - scaledSymbolHeight) / 2, x + width / 2, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
} else if (type.equals("Hash")) {
//H
g.drawLine(x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2, x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2, x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + (width / 2) - scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight / 2, x + (width / 2) + scaledSymbolMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight / 2);
} else if (type.equals("Advanced")) {
//A
g.drawLine(x + (width / 2), y + (height - scaledSymbolHeight) / 2, x + scaledMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + (width / 2), y + (height - scaledSymbolHeight) / 2, x + (width) - scaledMargin, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight);
g.drawLine(x + 3 * scaledMargin / 2, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight / 2 + scaledMargin / 2, x + width - 3 * scaledMargin / 2, y + (height - scaledSymbolHeight) / 2 + scaledSymbolHeight / 2 + scaledMargin / 2);
}
//Draw security pattern
drawSingleString(g,"sec:" + securityContext, x + 3 * width / 2, y + height / 2);
final int scaledSecIconHeight = scale( SEC_ICON_HIGHT );
//Draw nonce if it exists
if (!nonce.isEmpty()) {
drawSingleString(g,"nonce:" + nonce, x + 3 * width / 2, y + height / 2 + scaledSecIconHeight );
}
//Draw key if it exists
if (!key.isEmpty()) {
drawSingleString(g,"key:" + key, x + 3 * width / 2, y + height / 2 + 2 * scaledSecIconHeight );
}
g.drawImage( scale( IconManager.imgic7000.getImage() ), x - scale( 22 ), y + height / 2, null );
}
@Override
public boolean editOndoubleClick(JFrame frame) {
String[] values = new String[]{securityContext, type, message_overhead, encTime, size, nonce, formula, decTime, key, algorithm};
String[] nonces = tdp.getMGUI().getAllNonce();
String[] keys = tdp.getMGUI().getAllKeys().toArray(new String[0]);
JDialogCryptographicConfiguration jdms = new JDialogCryptographicConfiguration(frame, "Setting Cryptographic Configuration properties", values, nonces, keys);
// jdms.setSize(650, 300);
GraphicLib.centerOnParent(jdms, 650, 450);
jdms.setVisible(true); // blocked until dialog has been closed
if (jdms.hasBeenSet() && (jdms.hasValidString(0))) {
securityContext = jdms.getString(0);
type = jdms.getString(1);
message_overhead = jdms.getString(2);
encTime = jdms.getString(3);
size = jdms.getString(4);
nonce = jdms.getString(5);
formula = jdms.getString(6);
decTime = jdms.getString(7);
key = jdms.getString(8);
algorithm = jdms.getString(9);
return true;
}
return false;
}
@Override
public TGComponent isOnMe(int _x, int _y) {
if (GraphicLib.isInRectangle(_x, _y, x, y, width, height)) {
return this;
}
if ((int) (Line2D.ptSegDistSq(x + (width / 2), y - lineLength, x + (width / 2), y + lineLength + height, _x, _y)) < distanceSelected) {
return this;
}
if ((int) (Line2D.ptSegDistSq(x + width, y + height / 2, x + width + lineLength, y + height / 2, _x, _y)) < distanceSelected) {
return this;
}
return null;
}
@Override
protected String translateExtraParam() {
StringBuffer sb = new StringBuffer("<extraparam>\n");
sb.append("<Data secContext=\"");
sb.append(securityContext);
sb.append("\" type=\"");
sb.append(type);
sb.append("\" overhead=\"");
sb.append(message_overhead);
sb.append("\" size=\"");
sb.append(size);
sb.append("\" encTime=\"");
sb.append(encTime);
sb.append("\" decTime=\"");
sb.append(decTime);
sb.append("\" nonce=\"");
sb.append(nonce);
sb.append("\" key=\"");
sb.append(key);
sb.append("\" algorithm=\"");
sb.append(algorithm);
sb.append("\" />\n");
sb.append("</extraparam>\n");
return new String(sb);
}
@Override
public void loadExtraParam(NodeList nl, int decX, int decY, int decId) throws MalformedModelingException {
try {
NodeList nli;
Node n1, n2;
Element elt;
// int k;
// String s;
for (int i = 0; i < nl.getLength(); i++) {
n1 = nl.item(i);
//
if (n1.getNodeType() == Node.ELEMENT_NODE) {
nli = n1.getChildNodes();
for (int j = 0; j < nli.getLength(); j++) {
n2 = nli.item(j);
//
if (n2.getNodeType() == Node.ELEMENT_NODE) {
elt = (Element) n2;
if (elt.getTagName().equals("Data")) {
securityContext = elt.getAttribute("secContext");
type = elt.getAttribute("type");
message_overhead = elt.getAttribute("overhead");
size = elt.getAttribute("size");
encTime = elt.getAttribute("encTime");
decTime = elt.getAttribute("decTime");
nonce = elt.getAttribute("nonce");
key = elt.getAttribute("key");
algorithm = elt.getAttribute("algorithm");
//
}
}
}
}
}
} catch (Exception e) {
throw new MalformedModelingException( e );
}
}
@Override
public int getType() {
return TGComponentManager.TMLAD_ENCRYPT;
}
@Override
public int getDefaultConnector() {
return TGComponentManager.CONNECTOR_TMLAD;
}
@Override
public void setStateAction(int _stateAction) {
stateOfError = _stateAction;
}
}