⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 securitytools.java

📁 这是一个法律事务所系统源码
💻 JAVA
字号:
/* * ==================================================================== * * The Apache Software License, Version 1.1 * * Copyright (c) 1999 The Apache Software Foundation.  All rights  * reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer.  * * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in *    the documentation and/or other materials provided with the *    distribution. * * 3. The end-user documentation included with the redistribution, if *    any, must include the following acknowlegement:   *       "This product includes software developed by the  *        Apache Software Foundation (http://www.apache.org/)." *    Alternately, this acknowlegement may appear in the software itself, *    if and wherever such third-party acknowlegements normally appear. * * 4. The names "The Jakarta Project", "Tomcat", and "Apache Software *    Foundation" must not be used to endorse or promote products derived *    from this software without prior written permission. For written  *    permission, please contact apache@apache.org. * * 5. Products derived from this software may not be called "Apache" *    nor may "Apache" appear in their names without prior written *    permission of the Apache Group. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED.  IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the Apache Software Foundation.  For more * information on the Apache Software Foundation, please see * <http://www.apache.org/>. * * [Additional notices, if required by prior licensing conditions] * */ package org.apache.tomcat.util;import org.apache.tomcat.core.*;import org.apache.tomcat.util.*;import org.apache.tomcat.util.xml.*;import javax.servlet.http.HttpSession;import java.io.*;import java.net.*;import java.util.*;import org.xml.sax.*;/** *  Various tools used to implement security. *  */public class SecurityTools {        static int base64[]= {	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 62, 64, 64, 64, 63,	    52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 64, 64, 64, 64, 64, 64,	    64,  0,  1,  2,  3,  4,  5,  6,  7,  8,  9, 10, 11, 12, 13, 14,	    15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 64, 64, 64, 64, 64,	    64, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,	    41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,	    64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64    };    public static String base64Decode( String orig ) {	char chars[]=orig.toCharArray();	StringBuffer sb=new StringBuffer();	int i=0;	int shift = 0;   // # of excess bits stored in accum	int acc = 0;		for (i=0; i<chars.length; i++) {	    int v = base64[ chars[i] & 0xFF ];	    	    if ( v >= 64 ) {		if( chars[i] != '=' )		    System.out.println("Wrong char in base64: " + chars[i]);	    } else {		acc= ( acc << 6 ) | v;		shift += 6;		if ( shift >= 8 ) {		    shift -= 8;		    sb.append( (char) ((acc >> shift) & 0xff));		}	    }	}	return sb.toString();    }    /** Extract the credentails from req     */    public static void credentials( Request req , Hashtable credentials ) {	Context ctx=req.getContext();	String login_type=ctx.getAuthMethod();	if( "BASIC".equals( login_type )) {	    basicCredentials( req, credentials );	}	if( "FORM".equals( login_type )) {	    formCredentials( req, credentials );	}    }	        // XXX use more efficient structures instead of StringBuffer ?    // ( after everything is stable - not very important if web server is used)    /** Extract userName and password from a request using basic authentication.     *  Can be used in a JAAS callback or as it is.      */    public static void basicCredentials( Request req, Hashtable credentials )    {	Context ctx=req.getContext();	String authMethod=ctx.getAuthMethod();	if( authMethod==null || "BASIC".equals(authMethod) ) {	    String authorization = req.getHeader("Authorization");	    if (authorization == null )		return; // no credentials	    if( ! authorization.startsWith("Basic "))		return; // wrong syntax	    authorization = authorization.substring(6).trim();	    String unencoded=SecurityTools.base64Decode( authorization );	    int colon = unencoded.indexOf(':');	    if (colon < 0)		return;	    credentials.put( "username" , unencoded.substring(0, colon));	    credentials.put( "password" , unencoded.substring(colon + 1));	}	return;    }    public static void formCredentials( Request req, Hashtable credentials ) {	Context ctx=req.getContext();	String authMethod=ctx.getAuthMethod();	if( "FORM".equals( authMethod ) ) {	    HttpSession session=req.getSession( false );	    if( session == null )		return; // not authenticated	    // XXX The attributes are set on the first access.	    // It is possible for a servlet to set the attributes and	    // bypass the security checking - but that's ok, since	    // everything happens inside a web application and all servlets	    // are in the same domain.	    String username=(String)session.getAttribute("j_username");	    String password=(String)session.getAttribute("j_password");	    if( username!=null && password!=null) {		credentials.put( "username" , username );		credentials.put( "password", password);	    }	}    }    public static boolean haveRole( String userRoles[], String requiredRoles[] ) {        if ((userRoles == null) || (requiredRoles == null))            return false;	for( int i=0; i< userRoles.length; i ++ ) {	    if( haveRole( userRoles[i], requiredRoles )) return true;	}	return false;    }    public static boolean haveRole( String element, String set[] ) {        if ((element == null) || (set == null))            return false;	for( int i=0; i< set.length; i ++ ) {	    if( element.equals( set[i] ))		return true;	}	return false;    }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -