/hornetq-commons/src/main/java/org/hornetq/utils/DefaultSensitiveStringCodec.java

https://github.com/clebertsuconic/hornetq · Java · 107 lines · 65 code · 14 blank · 28 comment · 5 complexity · 6e5551c845438bba14d802345b098644 MD5 · raw file

  1. /*
  2. * Copyright 2005-2014 Red Hat, Inc.
  3. * Red Hat licenses this file to you under the Apache License, version
  4. * 2.0 (the "License"); you may not use this file except in compliance
  5. * with the License. You may obtain a copy of the License at
  6. * http://www.apache.org/licenses/LICENSE-2.0
  7. * Unless required by applicable law or agreed to in writing, software
  8. * distributed under the License is distributed on an "AS IS" BASIS,
  9. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
  10. * implied. See the License for the specific language governing
  11. * permissions and limitations under the License.
  12. */
  13. package org.hornetq.utils;
  14. import java.math.BigInteger;
  15. import java.security.InvalidKeyException;
  16. import java.security.NoSuchAlgorithmException;
  17. import java.util.Map;
  18. import javax.crypto.BadPaddingException;
  19. import javax.crypto.Cipher;
  20. import javax.crypto.IllegalBlockSizeException;
  21. import javax.crypto.NoSuchPaddingException;
  22. import javax.crypto.spec.SecretKeySpec;
  23. /**
  24. * A DefaultSensitiveDataCodec
  25. *
  26. * The default implementation of SensitiveDataCodec.
  27. * This class is used when the user indicates in the config
  28. * file to use a masked password but doesn't give a
  29. * codec implementation.
  30. *
  31. * The decode() and encode() method is copied originally from
  32. * JBoss AS code base.
  33. *
  34. * @author <a href="mailto:hgao@redhat.com">Howard Gao</a>
  35. *
  36. *
  37. */
  38. public class DefaultSensitiveStringCodec implements SensitiveDataCodec<String>
  39. {
  40. private byte[] internalKey = "clusterpassword".getBytes();
  41. public String decode(Object secret) throws NoSuchPaddingException,
  42. NoSuchAlgorithmException,
  43. InvalidKeyException,
  44. BadPaddingException,
  45. IllegalBlockSizeException
  46. {
  47. SecretKeySpec key = new SecretKeySpec(internalKey, "Blowfish");
  48. BigInteger n = new BigInteger((String)secret, 16);
  49. byte[] encoding = n.toByteArray();
  50. // JBAS-3457: fix leading zeros
  51. if (encoding.length % 8 != 0)
  52. {
  53. int length = encoding.length;
  54. int newLength = ((length / 8) + 1) * 8;
  55. int pad = newLength - length; // number of leading zeros
  56. byte[] old = encoding;
  57. encoding = new byte[newLength];
  58. for (int i = old.length - 1; i >= 0; i--)
  59. {
  60. encoding[i + pad] = old[i];
  61. }
  62. }
  63. Cipher cipher = Cipher.getInstance("Blowfish");
  64. cipher.init(Cipher.DECRYPT_MODE, key);
  65. byte[] decode = cipher.doFinal(encoding);
  66. return new String(decode);
  67. }
  68. public Object encode(String secret) throws NoSuchPaddingException,
  69. NoSuchAlgorithmException,
  70. InvalidKeyException,
  71. BadPaddingException,
  72. IllegalBlockSizeException
  73. {
  74. SecretKeySpec key = new SecretKeySpec(internalKey, "Blowfish");
  75. Cipher cipher = Cipher.getInstance("Blowfish");
  76. cipher.init(Cipher.ENCRYPT_MODE, key);
  77. byte[] encoding = cipher.doFinal(secret.getBytes());
  78. BigInteger n = new BigInteger(encoding);
  79. return n.toString(16);
  80. }
  81. public void init(Map<String, String> params)
  82. {
  83. String key = params.get("key");
  84. if (key != null)
  85. {
  86. updateKey(key);
  87. }
  88. }
  89. private void updateKey(String key)
  90. {
  91. this.internalKey = key.getBytes();
  92. }
  93. }