📄 securitytools.java
字号:
/* * ==================================================================== * * The Apache Software License, Version 1.1 * * Copyright (c) 1999 The Apache Software Foundation. All rights * reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. The end-user documentation included with the redistribution, if * any, must include the following acknowlegement: * "This product includes software developed by the * Apache Software Foundation (http://www.apache.org/)." * Alternately, this acknowlegement may appear in the software itself, * if and wherever such third-party acknowlegements normally appear. * * 4. The names "The Jakarta Project", "Tomcat", and "Apache Software * Foundation" must not be used to endorse or promote products derived * from this software without prior written permission. For written * permission, please contact apache@apache.org. * * 5. Products derived from this software may not be called "Apache" * nor may "Apache" appear in their names without prior written * permission of the Apache Group. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the Apache Software Foundation. For more * information on the Apache Software Foundation, please see * <http://www.apache.org/>. * * [Additional notices, if required by prior licensing conditions] * */ package org.apache.tomcat.util;import org.apache.tomcat.core.*;import org.apache.tomcat.util.*;import org.apache.tomcat.util.xml.*;import javax.servlet.http.HttpSession;import java.io.*;import java.net.*;import java.util.*;import org.xml.sax.*;/** * Various tools used to implement security. * */public class SecurityTools { static int base64[]= { 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 62, 64, 64, 64, 63, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 64, 64, 64, 64, 64, 64, 64, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 64, 64, 64, 64, 64, 64, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64 }; public static String base64Decode( String orig ) { char chars[]=orig.toCharArray(); StringBuffer sb=new StringBuffer(); int i=0; int shift = 0; // # of excess bits stored in accum int acc = 0; for (i=0; i<chars.length; i++) { int v = base64[ chars[i] & 0xFF ]; if ( v >= 64 ) { if( chars[i] != '=' ) System.out.println("Wrong char in base64: " + chars[i]); } else { acc= ( acc << 6 ) | v; shift += 6; if ( shift >= 8 ) { shift -= 8; sb.append( (char) ((acc >> shift) & 0xff)); } } } return sb.toString(); } /** Extract the credentails from req */ public static void credentials( Request req , Hashtable credentials ) { Context ctx=req.getContext(); String login_type=ctx.getAuthMethod(); if( "BASIC".equals( login_type )) { basicCredentials( req, credentials ); } if( "FORM".equals( login_type )) { formCredentials( req, credentials ); } } // XXX use more efficient structures instead of StringBuffer ? // ( after everything is stable - not very important if web server is used) /** Extract userName and password from a request using basic authentication. * Can be used in a JAAS callback or as it is. */ public static void basicCredentials( Request req, Hashtable credentials ) { Context ctx=req.getContext(); String authMethod=ctx.getAuthMethod(); if( authMethod==null || "BASIC".equals(authMethod) ) { String authorization = req.getHeader("Authorization"); if (authorization == null ) return; // no credentials if( ! authorization.startsWith("Basic ")) return; // wrong syntax authorization = authorization.substring(6).trim(); String unencoded=SecurityTools.base64Decode( authorization ); int colon = unencoded.indexOf(':'); if (colon < 0) return; credentials.put( "username" , unencoded.substring(0, colon)); credentials.put( "password" , unencoded.substring(colon + 1)); } return; } public static void formCredentials( Request req, Hashtable credentials ) { Context ctx=req.getContext(); String authMethod=ctx.getAuthMethod(); if( "FORM".equals( authMethod ) ) { HttpSession session=req.getSession( false ); if( session == null ) return; // not authenticated // XXX The attributes are set on the first access. // It is possible for a servlet to set the attributes and // bypass the security checking - but that's ok, since // everything happens inside a web application and all servlets // are in the same domain. String username=(String)session.getAttribute("j_username"); String password=(String)session.getAttribute("j_password"); if( username!=null && password!=null) { credentials.put( "username" , username ); credentials.put( "password", password); } } } public static boolean haveRole( String userRoles[], String requiredRoles[] ) { if ((userRoles == null) || (requiredRoles == null)) return false; for( int i=0; i< userRoles.length; i ++ ) { if( haveRole( userRoles[i], requiredRoles )) return true; } return false; } public static boolean haveRole( String element, String set[] ) { if ((element == null) || (set == null)) return false; for( int i=0; i< set.length; i ++ ) { if( element.equals( set[i] )) return true; } return false; }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -