soiz1's picture
Upload folder using huggingface_hub
d46f4a3 verified
package net.minecraft.util;
import com.google.common.primitives.Longs;
import com.mojang.serialization.Codec;
import com.mojang.serialization.DataResult;
import it.unimi.dsi.fastutil.bytes.ByteArrays;
import java.nio.charset.StandardCharsets;
import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.MessageDigest;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.SecureRandom;
import java.security.spec.EncodedKeySpec;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.Base64;
import java.util.Base64.Encoder;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import net.minecraft.network.FriendlyByteBuf;
public class Crypt {
private static final String SYMMETRIC_ALGORITHM = "AES";
private static final int SYMMETRIC_BITS = 128;
private static final String ASYMMETRIC_ALGORITHM = "RSA";
private static final int ASYMMETRIC_BITS = 1024;
private static final String BYTE_ENCODING = "ISO_8859_1";
private static final String HASH_ALGORITHM = "SHA-1";
public static final String SIGNING_ALGORITHM = "SHA256withRSA";
public static final int SIGNATURE_BYTES = 256;
private static final String PEM_RSA_PRIVATE_KEY_HEADER = "-----BEGIN RSA PRIVATE KEY-----";
private static final String PEM_RSA_PRIVATE_KEY_FOOTER = "-----END RSA PRIVATE KEY-----";
public static final String RSA_PUBLIC_KEY_HEADER = "-----BEGIN RSA PUBLIC KEY-----";
private static final String RSA_PUBLIC_KEY_FOOTER = "-----END RSA PUBLIC KEY-----";
public static final String MIME_LINE_SEPARATOR = "\n";
public static final Encoder MIME_ENCODER = Base64.getMimeEncoder(76, "\n".getBytes(StandardCharsets.UTF_8));
public static final Codec<PublicKey> PUBLIC_KEY_CODEC = Codec.STRING.comapFlatMap(p_274846_ -> {
try {
return DataResult.success(stringToRsaPublicKey(p_274846_));
} catch (CryptException cryptexception) {
return DataResult.error(cryptexception::getMessage);
}
}, Crypt::rsaPublicKeyToString);
public static final Codec<PrivateKey> PRIVATE_KEY_CODEC = Codec.STRING.comapFlatMap(p_274845_ -> {
try {
return DataResult.success(stringToPemRsaPrivateKey(p_274845_));
} catch (CryptException cryptexception) {
return DataResult.error(cryptexception::getMessage);
}
}, Crypt::pemRsaPrivateKeyToString);
public static SecretKey generateSecretKey() throws CryptException {
try {
KeyGenerator keygenerator = KeyGenerator.getInstance("AES");
keygenerator.init(128);
return keygenerator.generateKey();
} catch (Exception exception) {
throw new CryptException(exception);
}
}
public static KeyPair generateKeyPair() throws CryptException {
try {
KeyPairGenerator keypairgenerator = KeyPairGenerator.getInstance("RSA");
keypairgenerator.initialize(1024);
return keypairgenerator.generateKeyPair();
} catch (Exception exception) {
throw new CryptException(exception);
}
}
public static byte[] digestData(String p_13591_, PublicKey p_13592_, SecretKey p_13593_) throws CryptException {
try {
return digestData(p_13591_.getBytes("ISO_8859_1"), p_13593_.getEncoded(), p_13592_.getEncoded());
} catch (Exception exception) {
throw new CryptException(exception);
}
}
private static byte[] digestData(byte[]... p_13603_) throws Exception {
MessageDigest messagedigest = MessageDigest.getInstance("SHA-1");
for (byte[] abyte : p_13603_) {
messagedigest.update(abyte);
}
return messagedigest.digest();
}
private static <T extends Key> T rsaStringToKey(String p_216072_, String p_216073_, String p_216074_, Crypt.ByteArrayToKeyFunction<T> p_216075_) throws CryptException {
int i = p_216072_.indexOf(p_216073_);
if (i != -1) {
i += p_216073_.length();
int j = p_216072_.indexOf(p_216074_, i);
p_216072_ = p_216072_.substring(i, j + 1);
}
try {
return p_216075_.apply(Base64.getMimeDecoder().decode(p_216072_));
} catch (IllegalArgumentException illegalargumentexception) {
throw new CryptException(illegalargumentexception);
}
}
public static PrivateKey stringToPemRsaPrivateKey(String p_216070_) throws CryptException {
return rsaStringToKey(p_216070_, "-----BEGIN RSA PRIVATE KEY-----", "-----END RSA PRIVATE KEY-----", Crypt::byteToPrivateKey);
}
public static PublicKey stringToRsaPublicKey(String p_216081_) throws CryptException {
return rsaStringToKey(p_216081_, "-----BEGIN RSA PUBLIC KEY-----", "-----END RSA PUBLIC KEY-----", Crypt::byteToPublicKey);
}
public static String rsaPublicKeyToString(PublicKey p_216079_) {
if (!"RSA".equals(p_216079_.getAlgorithm())) {
throw new IllegalArgumentException("Public key must be RSA");
} else {
return "-----BEGIN RSA PUBLIC KEY-----\n" + MIME_ENCODER.encodeToString(p_216079_.getEncoded()) + "\n-----END RSA PUBLIC KEY-----\n";
}
}
public static String pemRsaPrivateKeyToString(PrivateKey p_216077_) {
if (!"RSA".equals(p_216077_.getAlgorithm())) {
throw new IllegalArgumentException("Private key must be RSA");
} else {
return "-----BEGIN RSA PRIVATE KEY-----\n" + MIME_ENCODER.encodeToString(p_216077_.getEncoded()) + "\n-----END RSA PRIVATE KEY-----\n";
}
}
private static PrivateKey byteToPrivateKey(byte[] p_216083_) throws CryptException {
try {
EncodedKeySpec encodedkeyspec = new PKCS8EncodedKeySpec(p_216083_);
KeyFactory keyfactory = KeyFactory.getInstance("RSA");
return keyfactory.generatePrivate(encodedkeyspec);
} catch (Exception exception) {
throw new CryptException(exception);
}
}
public static PublicKey byteToPublicKey(byte[] p_13601_) throws CryptException {
try {
EncodedKeySpec encodedkeyspec = new X509EncodedKeySpec(p_13601_);
KeyFactory keyfactory = KeyFactory.getInstance("RSA");
return keyfactory.generatePublic(encodedkeyspec);
} catch (Exception exception) {
throw new CryptException(exception);
}
}
public static SecretKey decryptByteToSecretKey(PrivateKey p_13598_, byte[] p_13599_) throws CryptException {
byte[] abyte = decryptUsingKey(p_13598_, p_13599_);
try {
return new SecretKeySpec(abyte, "AES");
} catch (Exception exception) {
throw new CryptException(exception);
}
}
public static byte[] encryptUsingKey(Key p_13595_, byte[] p_13596_) throws CryptException {
return cipherData(1, p_13595_, p_13596_);
}
public static byte[] decryptUsingKey(Key p_13606_, byte[] p_13607_) throws CryptException {
return cipherData(2, p_13606_, p_13607_);
}
private static byte[] cipherData(int p_13587_, Key p_13588_, byte[] p_13589_) throws CryptException {
try {
return setupCipher(p_13587_, p_13588_.getAlgorithm(), p_13588_).doFinal(p_13589_);
} catch (Exception exception) {
throw new CryptException(exception);
}
}
private static Cipher setupCipher(int p_13580_, String p_13581_, Key p_13582_) throws Exception {
Cipher cipher = Cipher.getInstance(p_13581_);
cipher.init(p_13580_, p_13582_);
return cipher;
}
public static Cipher getCipher(int p_13584_, Key p_13585_) throws CryptException {
try {
Cipher cipher = Cipher.getInstance("AES/CFB8/NoPadding");
cipher.init(p_13584_, p_13585_, new IvParameterSpec(p_13585_.getEncoded()));
return cipher;
} catch (Exception exception) {
throw new CryptException(exception);
}
}
interface ByteArrayToKeyFunction<T extends Key> {
T apply(byte[] p_216089_) throws CryptException;
}
public static record SaltSignaturePair(long salt, byte[] signature) {
public static final Crypt.SaltSignaturePair EMPTY = new Crypt.SaltSignaturePair(0L, ByteArrays.EMPTY_ARRAY);
public SaltSignaturePair(FriendlyByteBuf p_216098_) {
this(p_216098_.readLong(), p_216098_.readByteArray());
}
public boolean isValid() {
return this.signature.length > 0;
}
public static void write(FriendlyByteBuf p_216101_, Crypt.SaltSignaturePair p_216102_) {
p_216101_.writeLong(p_216102_.salt);
p_216101_.writeByteArray(p_216102_.signature);
}
public byte[] saltAsBytes() {
return Longs.toByteArray(this.salt);
}
}
public static class SaltSupplier {
private static final SecureRandom secureRandom = new SecureRandom();
public static long getLong() {
return secureRandom.nextLong();
}
}
}