blob: 8ca94459c3519004bf81085597a24dc6223fb6dc [file] [log] [blame]
package org.apache.fulcrum.crypto.provider;
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
import java.security.MessageDigest;
import org.apache.commons.codec.binary.Base64;
import org.apache.fulcrum.crypto.CryptoAlgorithm;
/**
* This is the Message Digest Implementation of Turbine 2.1. It does not pad the
* Base64 encryption of the Message Digests correctly but truncates after 20
* chars. This leads to interoperability problems if you want to use e.g.
* database columns between two languages.
*
* If you upgrade an application from Turbine 2.1 and have already used the
* Security Service with encrypted passwords and no way to rebuild your
* databases, use this provider. It is bug-compatible.
*
* DO NOT USE THIS PROVIDER FOR ANY NEW APPLICATION!
*
* Nevertheless it can be used as the default crypto algorithm .
*
* @author <a href="mailto:hps@intermeta.de">Henning P. Schmiedehausen</a>
* @version $Id$
*/
public class OldJavaCrypt implements CryptoAlgorithm {
/** The default cipher */
public static final String DEFAULT_CIPHER = "SHA";
/** The cipher to use for encryption */
private String cipher = null;
/**
* Constructor
*/
public OldJavaCrypt()
{
this.cipher = DEFAULT_CIPHER;
}
/**
* Setting the actual cipher requested. If not called, then the default cipher
* (SHA) is used.
*
* This will never throw an error even if there is no provider for this cipher.
* The error will be thrown by encrypt() (Fixme?)
*
* @param cipher The cipher to use.
*
*/
public void setCipher(String cipher)
{
this.cipher = cipher;
}
/**
* This class never uses a seed, so this is just a dummy.
*
* @param seed Seed (ignored)
*
*/
public void setSeed(String seed)
{
/* dummy */
}
/**
* encrypt the supplied string with the requested cipher
*
* @param value The value to be encrypted
* @return The encrypted value
* @throws Exception An Exception of the underlying implementation.
*/
public String encrypt(String value) throws Exception
{
MessageDigest md = MessageDigest.getInstance(cipher);
byte[] digest = md.digest(value.getBytes("UTF-8"));
byte[] base64 = Base64.encodeBase64(digest);
// from MD5 the digest has 16 bytes but for SHA1 it contains 20 bytes
// depending on the digest lenght the result is truncated
int len = (digest.length == 16 ? 20 : 24);
byte[] result = new byte[len];
System.arraycopy(base64, 0, result, 0, result.length);
return new String(result, "UTF-8");
}
}