public static String getPlainToken(String encryptedToken) throws CryptoException { CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); String token = ""; if (encryptedToken != null) { token = new String(cryptoUtil.base64DecodeAndDecrypt(encryptedToken)); } return token; }
private String decrypt(String cipherText) throws CryptoException { return new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt( cipherText), Charsets.UTF_8); } }
private String decryptPassword(String encryptedPassword) throws CryptoException { String decryptedPassword=null; if(encryptedPassword!=null){ decryptedPassword=new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt(encryptedPassword)); } return decryptedPassword; }
public static String getPlainToken(String encryptedToken) throws CryptoException { CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); String token = ""; if (encryptedToken != null) { token = new String(cryptoUtil.base64DecodeAndDecrypt(encryptedToken)); } return token; }
private String decrypt(String cipherText) throws CryptoException { return new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt( cipherText), Charsets.UTF_8); } }
private String getDecryptedPassword(String encryptedString) throws SecurityConfigException { CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { return new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString)); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.error(msg, e); throw new SecurityConfigException(msg, e); } }
private String getDecryptedPassword(String encryptedString) throws SecurityConfigException { CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { return new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString)); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.error(msg, e); throw new SecurityConfigException(msg, e); } }
private String getDecryptedPassword(String encryptedString) throws SecurityConfigException { CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { return new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString)); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.error(msg, e); throw new SecurityConfigException(msg, e); } }
private void decodeProperty(Resource resource, String propKey) { try { if(resource.getProperty(propKey)!=null){ resource.setProperty(propKey, new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt( resource.getProperty(propKey)))); } } catch (CryptoException e) { log.error("Unable to decrypt property key: " + propKey + " for resource " + "path: " + resource.getPath(), e); } } }
/** * Decrypt the encrypted username using Carbon server's private key. * * @param encryptedAndBase64EncodedUsername Encrypted username which is encrypted by Carbon server's private key * @return Decrypted username if usernameEncryptionInUrl property is set to true user-mgt.xml, else return the * provided input parameter as it is. * @throws UserManagementUIException */ public static String getDecryptedUsername(String encryptedAndBase64EncodedUsername) throws UserManagementUIException { try { boolean isUsernameEncryptionEnabled = isUsernameEncryptionEnabled(); if (isUsernameEncryptionEnabled) { return new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt(encryptedAndBase64EncodedUsername)); } else { return encryptedAndBase64EncodedUsername; } } catch (CryptoException e) { String message = String.format("Error while trying to decrypt the username : '%s' ", encryptedAndBase64EncodedUsername); log.error(message, e); throw new UserManagementUIException(message, e); } catch (CarbonException | UserStoreException e) { String message = "Error while trying to get User Realm"; log.error(message, e); throw new UserManagementUIException(message, e); } }
/** * Decrypt the encrypted username using Carbon server's private key. * * @param encryptedAndBase64EncodedUsername Encrypted username which is encrypted by Carbon server's private key * @return Decrypted username if usernameEncryptionInUrl property is set to true user-mgt.xml, else return the * provided input parameter as it is. * @throws UserManagementUIException */ public static String getDecryptedUsername(String encryptedAndBase64EncodedUsername) throws UserManagementUIException { try { boolean isUsernameEncryptionEnabled = isUsernameEncryptionEnabled(); if (isUsernameEncryptionEnabled) { return new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt(encryptedAndBase64EncodedUsername)); } else { return encryptedAndBase64EncodedUsername; } } catch (CryptoException e) { String message = String.format("Error while trying to decrypt the username : '%s' ", encryptedAndBase64EncodedUsername); log.error(message, e); throw new UserManagementUIException(message, e); } catch (CarbonException | UserStoreException e) { String message = "Error while trying to get User Realm"; log.error(message, e); throw new UserManagementUIException(message, e); } }
/** * Decrypt the encrypted username using Carbon server's private key. * * @param encryptedAndBase64EncodedUsername Encrypted username which is encrypted by Carbon server's private key * @return Decrypted username if usernameEncryptionInUrl property is set to true user-mgt.xml, else return the * provided input parameter as it is. * @throws UserProfileUIException */ public static String getDecryptedUsername(String encryptedAndBase64EncodedUsername) throws UserProfileUIException { try { boolean isUsernameEncryptionEnabled = isUsernameEncryptionEnabled(); if (isUsernameEncryptionEnabled) { return new String(CryptoUtil.getDefaultCryptoUtil(). base64DecodeAndDecrypt(encryptedAndBase64EncodedUsername)); } else { return encryptedAndBase64EncodedUsername; } } catch (CryptoException e) { String message = String.format("Error while trying to decrypt the username : '%s' ", encryptedAndBase64EncodedUsername); log.error(message, e); throw new UserProfileUIException(message, e); } catch (CarbonException | UserStoreException e) { String message = "Error while trying to get UserRealm"; log.error(message, e); throw new UserProfileUIException(message, e); } }
private KerberosConfigData readKerberosConfigurations(OMElement carbonSecConfig) throws SecurityConfigException { KerberosConfigData kerberosConfigData = null; if (carbonSecConfig != null) { if (log.isDebugEnabled()) { log.debug("Reading kerberos configurations from carbonSecConfig : " + carbonSecConfig.toString()); } OMElement kerberosElement = carbonSecConfig.getFirstChildWithName(new QName(SecurityConstants .SECURITY_NAMESPACE, SecurityConstants.KERBEROS)); if (kerberosElement != null) { kerberosConfigData = new KerberosConfigData(); Map<String, String> kerberosProperties = getProperties(kerberosElement); if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_NAME) != null) { kerberosConfigData.setServicePrincipleName(kerberosProperties.get(KerberosConfig .SERVICE_PRINCIPLE_NAME)); } if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD) != null) { String encryptedString = kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD); CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { kerberosConfigData.setServicePrinciplePassword (new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString))); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.warn(msg, e); } } } } return kerberosConfigData; }
/** * * @param token * @return */ public static String decryptToken(String token) throws CryptoException { AppManagerConfiguration config = ServiceReferenceHolder.getInstance() .getAPIManagerConfigurationService() .getAPIManagerConfiguration(); if (Boolean.parseBoolean(config.getFirstProperty(AppMConstants.API_KEY_MANAGER_ENCRYPT_TOKENS))) { return new String(CryptoUtil.getDefaultCryptoUtil().base64DecodeAndDecrypt(token)); } return token; }
private KerberosConfigData readKerberosConfigurations(OMElement carbonSecConfig) throws SecurityConfigException { KerberosConfigData kerberosConfigData = null; if (carbonSecConfig != null) { if (log.isDebugEnabled()) { log.debug("Reading kerberos configurations from carbonSecConfig : " + carbonSecConfig.toString()); } OMElement kerberosElement = carbonSecConfig.getFirstChildWithName(new QName(SecurityConstants .SECURITY_NAMESPACE, SecurityConstants.KERBEROS)); if (kerberosElement != null) { kerberosConfigData = new KerberosConfigData(); Map<String, String> kerberosProperties = getProperties(kerberosElement); if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_NAME) != null) { kerberosConfigData.setServicePrincipleName(kerberosProperties.get(KerberosConfig .SERVICE_PRINCIPLE_NAME)); } if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD) != null) { String encryptedString = kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD); CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { kerberosConfigData.setServicePrinciplePassword (new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString))); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.warn(msg, e); } } } } return kerberosConfigData; }
private KerberosConfigData readKerberosConfigurations(OMElement carbonSecConfig) throws SecurityConfigException { KerberosConfigData kerberosConfigData = null; if (carbonSecConfig != null) { if (log.isDebugEnabled()) { log.debug("Reading kerberos configurations from carbonSecConfig : " + carbonSecConfig.toString()); } OMElement kerberosElement = carbonSecConfig.getFirstChildWithName(new QName(SecurityConstants .SECURITY_NAMESPACE, SecurityConstants.KERBEROS)); if (kerberosElement != null) { kerberosConfigData = new KerberosConfigData(); Map<String, String> kerberosProperties = getProperties(kerberosElement); if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_NAME) != null) { kerberosConfigData.setServicePrincipleName(kerberosProperties.get(KerberosConfig .SERVICE_PRINCIPLE_NAME)); } if (kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD) != null) { String encryptedString = kerberosProperties.get(KerberosConfig.SERVICE_PRINCIPLE_PASSWORD); CryptoUtil cryptoUtil = CryptoUtil.getDefaultCryptoUtil(); try { kerberosConfigData.setServicePrinciplePassword (new String(cryptoUtil.base64DecodeAndDecrypt(encryptedString))); } catch (CryptoException e) { String msg = "Unable to decode and decrypt password string."; log.warn(msg, e); } } } } return kerberosConfigData; }
try { password = new String(CryptoUtil.getDefaultCryptoUtil(). base64DecodeAndDecrypt(dto.getValue())); } catch (CryptoException e) { log.error(e);
"TRUE".equals(encryptPasswordAttr.getAttributeValue().trim().toUpperCase())) { analyticsServerProfile.setPassword(new String(CryptoUtil.getDefaultCryptoUtil(). base64DecodeAndDecrypt(passwordAttr.getAttributeValue()))); } else { analyticsServerProfile.setPassword(passwordAttr.getAttributeValue().trim());
if (cipherTextPassword != null) { byte[] passwordBytes = cryptoUtil. base64DecodeAndDecrypt(cipherTextPassword); password = new String(passwordBytes); } else {
if (cipherTextPassword != null) { byte[] passwordBytes = cryptoUtil. base64DecodeAndDecrypt(cipherTextPassword); password = new String(passwordBytes); } else {