Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* JBoss, Home of Professional Open Source
* Copyright 2005, JBoss Inc., and individual contributors as indicated
* by the @authors tag. See the copyright.txt in the distribution for a
* full listing of individual contributors.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package org.jboss.security.plugins;
import java.io.ByteArrayOutputStream;
import java.io.File;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.io.RandomAccessFile;
import java.net.MalformedURLException;
import java.net.URL;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
import org.jboss.security.PicketBoxMessages;
/** Read a password in opaque form to a file for use with the FilePassword
accessor in conjunction with the JaasSecurityDomain
{CLASS}org.jboss.security.plugins.FilePassword:password-file
format of the KeyStorePass attribute. The password file can also be an URL.
The original opaque password file can be created by running:
java org.jboss.security.plugins.FilePassword salt count password password-file
Running
java org.jboss.security.plugins.FilePassword
will generate a usage message.
Note that this is security by obscurity in that the password is not store
in plaintext, but it can be recovered by simply using the code from this
class.
@see #main(String[])
@author [email protected]
@version $Revison:$
*/
public class FilePassword
{
private File passwordFile;
public FilePassword(String file)
{
URL url = null;
try
{
url = new URL(file);
}
catch (MalformedURLException e)
{
}
if (url == null)
passwordFile = new File(file);
else
{
FileOutputStream fos = null;
InputStream is = null;
try
{
is = url.openStream();
passwordFile = File.createTempFile("temp", null);
passwordFile.deleteOnExit();
fos = new FileOutputStream(passwordFile);
int b;
while ((b = is.read()) >= 0)
fos.write(b);
}
catch (IOException e)
{
}
finally
{
safeClose(fos);
safeClose(is);
}
}
}
public char[] toCharArray()
throws IOException
{
RandomAccessFile raf = null;
try
{
raf = new RandomAccessFile(passwordFile, "r");
char[] password = decode(raf);
return password;
}
catch(Exception e)
{
throw new IOException(e.getMessage());
}
finally
{
safeClose(raf);
}
}
static char[] decode(RandomAccessFile passwordFile)
throws Exception
{
byte[] salt = new byte[8];
passwordFile.readFully(salt);
int count = passwordFile.readInt();
ByteArrayOutputStream baos = new ByteArrayOutputStream();
int b;
while( (b = passwordFile.read()) >= 0 )
baos.write(b);
passwordFile.close();
byte[] secret = baos.toByteArray();
PBEParameterSpec cipherSpec = new PBEParameterSpec(salt, count);
PBEKeySpec keySpec = new PBEKeySpec("78aac249a60a13d5e882927928043ebb".toCharArray());
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBEwithMD5andDES");
SecretKey cipherKey = factory.generateSecret(keySpec);
Cipher cipher = Cipher.getInstance("PBEwithMD5andDES");
cipher.init(Cipher.DECRYPT_MODE, cipherKey, cipherSpec);
byte[] decode = cipher.doFinal(secret);
return new String(decode, "UTF-8").toCharArray();
}
static void encode(RandomAccessFile passwordFile, byte[] salt, int count,
byte[] secret)
throws Exception
{
PBEParameterSpec cipherSpec = new PBEParameterSpec(salt, count);
PBEKeySpec keySpec = new PBEKeySpec("78aac249a60a13d5e882927928043ebb".toCharArray());
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBEwithMD5andDES");
SecretKey cipherKey = factory.generateSecret(keySpec);
Cipher cipher = Cipher.getInstance("PBEwithMD5andDES");
cipher.init(Cipher.ENCRYPT_MODE, cipherKey, cipherSpec);
byte[] encode = cipher.doFinal(secret);
passwordFile.write(salt);
passwordFile.writeInt(count);
passwordFile.write(encode);
passwordFile.close();
}
private static void safeClose(InputStream fis)
{
try
{
if(fis != null)
{
fis.close();
}
}
catch(Exception e)
{}
}
private void safeClose(OutputStream os)
{
try
{
if(os != null)
{
os.close();
}
}
catch(Exception e)
{}
}
private void safeClose(RandomAccessFile raf)
{
try
{
if(raf != null)
{
raf.close();
}
}
catch(Exception e)
{}
}
/** Write a password in opaque form to a file for use with the FilePassword
* accessor in conjunction with the JaasSecurityDomain
* {CLASS}org.jboss.security.plugins.FilePassword:password-file
* format of the KeyStorePass attribute.
*
* @param args
*/
public static void main(String[] args) throws Exception
{
if( args.length != 4 )
{
System.err.println(PicketBoxMessages.MESSAGES.filePasswordUsageMessage());
}
byte[] salt = args[0].substring(0, 8).getBytes();
int count = Integer.parseInt(args[1]);
byte[] passwordBytes = args[2].getBytes("UTF-8");
RandomAccessFile passwordFile = new RandomAccessFile(args[3], "rws");
encode(passwordFile, salt, count, passwordBytes);
}
}