forked from actframework/actframework
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathAppCrypto.java
More file actions
175 lines (145 loc) · 5.3 KB
/
AppCrypto.java
File metadata and controls
175 lines (145 loc) · 5.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
package act.crypto;
/*-
* #%L
* ACT Framework
* %%
* Copyright (C) 2014 - 2017 ActFramework
* %%
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* #L%
*/
import act.conf.AppConfig;
import org.mindrot.jbcrypt.BCrypt;
import org.osgl.exception.UnexpectedException;
import org.osgl.logging.LogManager;
import org.osgl.logging.Logger;
import org.osgl.util.*;
import java.io.InputStream;
import java.nio.charset.StandardCharsets;
import java.security.InvalidKeyException;
import java.security.MessageDigest;
import java.security.SecureRandom;
public class AppCrypto {
protected static final Logger LOGGER = LogManager.get(AppCrypto.class);
private byte[] secret;
private SecureRandom secureRandom = new SecureRandom();
protected AppCrypto() {}
public AppCrypto(String secret) {
this.secret = secret.getBytes(StandardCharsets.UTF_8);
}
public AppCrypto(AppConfig config) {
secret = config.secret().getBytes(StandardCharsets.UTF_8);
}
public String sign(String message) {
return Crypto.sign(message, secret);
}
/**
* Generate crypted hash of given password. This method is more secure than
* {@link #passwordHash(String)} as it will fill the password char array
* with `\0` once used.
*
* See <a href="http://stackoverflow.com/questions/8881291/why-is-char-preferred-over-string-for-passwords-in-java">This SO for more detail</a>
* @param password the password
* @return the password hash
*/
public char[] passwordHash(char[] password) {
return BCrypt.hashpw(password, BCrypt.gensalt());
}
/**
* Generate crypted hash of give password
* @param password the password
* @return the password hash
*/
public String passwordHash(String password) {
return BCrypt.hashpw(password, BCrypt.gensalt());
}
public boolean verifyPassword(String password, String hash) {
try {
return BCrypt.checkpw(password, hash);
} catch (Exception e) {
return false;
}
}
public boolean verifyPassword(char[] password, String hash) {
try {
return BCrypt.checkpw(password, hash);
} catch (Exception e) {
return false;
}
}
public boolean verifyPassword(char[] password, char[] hash) {
try {
return BCrypt.checkpw(password, new String(hash));
} catch (Exception e) {
return false;
}
}
public String encrypt(String message) {
try {
return Crypto.encryptAES(message, secret);
} catch (UnexpectedException e) {
Throwable cause = e.getCause();
if (cause instanceof InvalidKeyException) {
LOGGER.error("Cannot encrypt/decrypt! Please download Java Crypto Extension pack from Oracle: http://www.oracle.com/technetwork/java/javase/tech/index-jsp-136007.html");
}
throw e;
}
}
public String decrypt(String message) {
try {
return Crypto.decryptAES(message, secret);
} catch (UnexpectedException e) {
Throwable cause = e.getCause();
if (cause instanceof InvalidKeyException) {
LOGGER.error("Cannot encrypt/decrypt! Please download Java Crypto Extension pack from Oracle: http://www.oracle.com/technetwork/java/javase/tech/index-jsp-136007.html");
}
throw e;
}
}
public String checksum(InputStream is) {
try {
MessageDigest md = MessageDigest.getInstance("SHA1");
byte[] dataBytes = new byte[1024];
int nread;
while ((nread = is.read(dataBytes)) != -1) {
md.update(dataBytes, 0, nread);
}
byte[] mdbytes = md.digest();
S.Buffer sb = S.buffer();
for (int i = 0; i < mdbytes.length; i++) {
sb.append(Integer.toString((mdbytes[i] & 0xff) + 0x100, 16).substring(1));
}
return sb.toString();
} catch (Exception e) {
throw E.unexpected(e);
}
}
public int generateRandomInt(int max) {
return secureRandom.nextInt(max);
}
public int generateRandomInt() {
return secureRandom.nextInt(Integer.MAX_VALUE);
}
public String generateToken(String id, String... payload) {
return Token.generateToken(secret, id, payload);
}
public String generateToken(Token.Life expiration, String id, String ... payload) {
return Token.generateToken(secret, expiration, id, payload);
}
public String generateToken(int seconds, String id, String ... payload) {
return Token.generateToken(secret, seconds, id, payload);
}
public Token parseToken(String tokenString) {
return Token.parseToken(secret, tokenString);
}
}