/src/net/rizon/BlowfishCrypt.java

https://gitlab.com/rizon/bncbot · Java · 174 lines · 136 code · 33 blank · 5 comment · 13 complexity · 0aa3e0af45e6fd84230d80200a7608f1 MD5 · raw file

  1. package net.rizon;
  2. import java.io.ByteArrayOutputStream;
  3. import java.nio.ByteBuffer;
  4. import java.nio.charset.Charset;
  5. import java.util.Iterator;
  6. import javax.crypto.Cipher;
  7. import javax.crypto.CipherOutputStream;
  8. import javax.crypto.spec.IvParameterSpec;
  9. import javax.crypto.spec.SecretKeySpec;
  10. import net.rizon.bncbot.BncBot;
  11. import com.martiansoftware.jsap.FlaggedOption;
  12. import com.martiansoftware.jsap.JSAP;
  13. import com.martiansoftware.jsap.JSAPException;
  14. import com.martiansoftware.jsap.JSAPResult;
  15. import com.martiansoftware.jsap.Switch;
  16. import com.martiansoftware.jsap.UnflaggedOption;
  17. import com.martiansoftware.jsap.stringparsers.StringStringParser;
  18. public final class BlowfishCrypt {
  19. private static final BlowfishCrypt instance = new BlowfishCrypt();
  20. private BlowfishCrypt() {
  21. }
  22. public byte[] encrypt(byte[] input, byte[] key) throws Exception {
  23. return crypt(input, key, Cipher.ENCRYPT_MODE);
  24. }
  25. public byte[] encrypt(String input, String key) throws Exception {
  26. return crypt(input.getBytes("UTF-8"), key.getBytes("UTF-8"), Cipher.ENCRYPT_MODE);
  27. }
  28. public String encryptToBase64(byte[] input, byte[] key) throws Exception {
  29. return Base64.encode(encrypt(input, key));
  30. }
  31. public String encryptToBase64(String input, String key) throws Exception {
  32. return Base64.encode(encrypt(input, key));
  33. }
  34. public byte[] decrypt(byte[] input, byte[] key) throws Exception {
  35. return crypt(input, key, Cipher.DECRYPT_MODE);
  36. }
  37. public byte[] decrypt(String input, String key) throws Exception {
  38. return crypt(input.getBytes("UTF-8"), key.getBytes("UTF-8"), Cipher.DECRYPT_MODE);
  39. }
  40. public byte[] decryptFromBase64(String input, String key) throws Exception {
  41. return decrypt(Base64.decode(input), key.getBytes("UTF-8"));
  42. }
  43. public byte[] decryptFromBase64(String input, byte[] key) throws Exception {
  44. return decrypt(Base64.decode(input), key);
  45. }
  46. public String decryptFromBase64AsString(String input, String key) throws Exception {
  47. return Charset.forName("UTF-8").decode(ByteBuffer.wrap(decrypt(Base64.decode(input), key.getBytes("UTF-8")))).toString();
  48. }
  49. public String decryptFromBase64AsString(String input, byte[] key) throws Exception {
  50. return Charset.forName("UTF-8").decode(ByteBuffer.wrap(decrypt(Base64.decode(input), key))).toString();
  51. }
  52. private byte[] crypt(byte[] input, byte[] key, int mode) throws Exception {
  53. SecretKeySpec skeySpec = new SecretKeySpec(key, "Blowfish");
  54. IvParameterSpec ivSpec = new IvParameterSpec(deriveIv(key));
  55. Cipher cipher = Cipher.getInstance("Blowfish/CBC/PKCS5Padding");
  56. ByteArrayOutputStream bos;
  57. CipherOutputStream cos;
  58. byte[] output;
  59. cipher.init(mode, skeySpec, ivSpec);
  60. bos = new ByteArrayOutputStream();
  61. cos = new CipherOutputStream(bos, cipher);
  62. cos.write(input);
  63. cos.close();
  64. output = bos.toByteArray();
  65. bos.close();
  66. return output;
  67. }
  68. private byte[] deriveIv(byte[] key) {
  69. // 8-byte IV base. 3.14159265358979
  70. byte[] iv = new byte[] { 0x30, 0x14, 0x15, (byte) 0x92, 0x65, 0x35, (byte) 0x89, 0x79 };
  71. // XOR the key into the IV block.
  72. int ivP = 0;
  73. for (int kP = 0; kP < key.length; kP++) {
  74. iv[ivP++] ^= key[kP];
  75. ivP = ivP % 8;
  76. }
  77. // Voodoo.
  78. for (int i = 0; i < 3; i++) {
  79. // Randomize the IV.
  80. iv[0] <<= 3;
  81. iv[1] >>= 2;
  82. iv[2] ^= iv[1] + iv[2];
  83. iv[3] &= iv[2];
  84. iv[4] |= iv[0];
  85. iv[5] ^= iv[2] - iv[4];
  86. iv[6] &= iv[3] + iv[5];
  87. iv[7] ^= iv[0] + iv[2] + iv[4];
  88. // XOR it again with the key.
  89. ivP = 0;
  90. for (int kP = 0; kP < key.length; kP++) {
  91. iv[ivP++] ^= key[kP];
  92. ivP = ivP % 8;
  93. }
  94. }
  95. return new byte[] { iv[1], iv[4], iv[2], iv[7], iv[0], iv[3], iv[6], iv[5] };
  96. }
  97. public static BlowfishCrypt getInstance() {
  98. return BlowfishCrypt.instance;
  99. }
  100. public static void main(String[] args) {
  101. try {
  102. JSAP jsap = new JSAP();
  103. jsap.registerParameter(new Switch("encrypt").setShortFlag('e').setLongFlag("encrypt").setHelp("Set program to encrypt mode. (Mutually exclusive with decrypt.)"));
  104. jsap.registerParameter(new Switch("decrypt").setShortFlag('d').setLongFlag("decrypt").setHelp("Set program to decrypt mode. (Mutually exclusive with encrypt.)"));
  105. jsap.registerParameter(new Switch("help").setShortFlag('h').setLongFlag("help").setHelp("Show this help information."));
  106. jsap.registerParameter(new FlaggedOption("key").setStringParser(StringStringParser.getParser()).setRequired(true).setShortFlag('k').setLongFlag("key").setHelp("Key to encrypt with."));
  107. jsap.registerParameter(new UnflaggedOption("text").setStringParser(StringStringParser.getParser()).setRequired(true).setGreedy(true).setHelp("Text to encrypt/decrypt."));
  108. JSAPResult cmdconf = jsap.parse(args);
  109. if (cmdconf.success() && !cmdconf.getBoolean("help")) {
  110. if ((cmdconf.getBoolean("encrypt") && cmdconf.getBoolean("decrypt")) || !(cmdconf.getBoolean("encrypt") || cmdconf.getBoolean("decrypt"))) {
  111. System.err.println();
  112. System.err.println("Error: You must specify exactly one of either -e or -d");
  113. } else {
  114. try {
  115. if (cmdconf.getBoolean("encrypt"))
  116. System.out.println(BlowfishCrypt.getInstance().encryptToBase64(cmdconf.getString("text"), cmdconf.getString("key")));
  117. else
  118. System.out.println(BlowfishCrypt.getInstance().decryptFromBase64AsString(cmdconf.getString("text"), cmdconf.getString("key")));
  119. } catch (Exception e) {
  120. e.printStackTrace();
  121. }
  122. }
  123. } else {
  124. System.err.println();
  125. for (@SuppressWarnings("rawtypes")
  126. Iterator iter = cmdconf.getErrorMessageIterator(); iter.hasNext();) {
  127. System.err.println("Error: " + iter.next());
  128. }
  129. System.err.println();
  130. System.err.println("Usage: java " + BncBot.class.getName());
  131. System.err.println(" " + jsap.getUsage());
  132. System.err.println();
  133. System.err.println(jsap.getHelp());
  134. System.exit(1);
  135. }
  136. } catch (JSAPException e) {
  137. System.err.println("Error parsing command-line arguments: " + e.getMessage());
  138. e.printStackTrace();
  139. }
  140. }
  141. }