数据库密码加密公用秘要生成器,数据库密码加密解密入口

public class Encryptor {
    public static final String  HUNDSUN_VERSION="@system  管理平台  @version 2.0.1 @lastModiDate @describe ";
    protected static final int BLOCK_SIZE = 8;

    private int[] workingKey = null;

    private byte[] userkey = null;

    /**
     * standard constructor.
     */
    public Encryptor(byte[] userkey) {
        this.userkey = userkey;
    }

    /**
     * initialise a DES cipher.
     *
     * @param forEncryption whether or not we are for encryption.
     * @param params the parameters required to set up the cipher.
     * @exception IllegalArgumentException if the params argument is
     * inappropriate.
     */
    public void init(boolean encrypting, byte[] key) {
        if (key != null) {
            workingKey = generateWorkingKey(encrypting, key);
            return;
        }

        else {
            throw new IllegalArgumentException(
                "invalid parameter passed to DES init - ");
        }
    }

    public int getBlockSize() {
        return BLOCK_SIZE;
    }

    /**
     * <p>it used to check the parameters and then call desfun()</p>
     */
    public int processBlock(
        byte[] in,
        int inOff,
        byte[] out,
        int outOff) {
        if (workingKey == null) {
            throw new IllegalStateException("DES engine not initialised");
        }

        if ( (inOff + BLOCK_SIZE) > in.length) {
            throw new IllegalStateException("input buffer too short");
        }

        if ( (outOff + BLOCK_SIZE) > out.length) {
            throw new IllegalStateException("output buffer too short");
        }

        desFunc(workingKey, in, inOff, out, outOff);

        return BLOCK_SIZE;
    }

    /**
     * what follows is mainly taken from "Applied Cryptography", by
     * Bruce Schneier, however it also bears great resemblance to Richard
     * Outerbridge‘s D3DES...
     */

    static short[] Df_Key = {
        0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
        0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
        0x89, 0xab, 0xcd, 0xef, 0x01, 0x23, 0x45, 0x67
    };

    static short[] bytebit = {
        0200, 0100, 040, 020, 010, 04, 02, 01
    };

    static int[] bigbyte = {
        0x800000, 0x400000, 0x200000, 0x100000,
        0x80000, 0x40000, 0x20000, 0x10000,
        0x8000, 0x4000, 0x2000, 0x1000,
        0x800, 0x400, 0x200, 0x100,
        0x80, 0x40, 0x20, 0x10,
        0x8, 0x4, 0x2, 0x1
    };

    /*
     * Use the key schedule specified in the Standard (ANSI X3.92-1981).
     */

    static byte[] pc1 = {
        56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17,
        9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35,
        62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21,
        13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3
    };

    static byte[] totrot = {
        1, 2, 4, 6, 8, 10, 12, 14,
        15, 17, 19, 21, 23, 25, 27, 28
    };

    static byte[] pc2 = {
        13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9,
        22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1,
        40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47,
        43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31
    };

    static int[] SP1 = {
        0x01010400, 0x00000000, 0x00010000, 0x01010404,
        0x01010004, 0x00010404, 0x00000004, 0x00010000,
        0x00000400, 0x01010400, 0x01010404, 0x00000400,
        0x01000404, 0x01010004, 0x01000000, 0x00000004,
        0x00000404, 0x01000400, 0x01000400, 0x00010400,
        0x00010400, 0x01010000, 0x01010000, 0x01000404,
        0x00010004, 0x01000004, 0x01000004, 0x00010004,
        0x00000000, 0x00000404, 0x00010404, 0x01000000,
        0x00010000, 0x01010404, 0x00000004, 0x01010000,
        0x01010400, 0x01000000, 0x01000000, 0x00000400,
        0x01010004, 0x00010000, 0x00010400, 0x01000004,
        0x00000400, 0x00000004, 0x01000404, 0x00010404,
        0x01010404, 0x00010004, 0x01010000, 0x01000404,
        0x01000004, 0x00000404, 0x00010404, 0x01010400,
        0x00000404, 0x01000400, 0x01000400, 0x00000000,
        0x00010004, 0x00010400, 0x00000000, 0x01010004
    };

    static int[] SP2 = {
        0x80108020, 0x80008000, 0x00008000, 0x00108020,
        0x00100000, 0x00000020, 0x80100020, 0x80008020,
        0x80000020, 0x80108020, 0x80108000, 0x80000000,
        0x80008000, 0x00100000, 0x00000020, 0x80100020,
        0x00108000, 0x00100020, 0x80008020, 0x00000000,
        0x80000000, 0x00008000, 0x00108020, 0x80100000,
        0x00100020, 0x80000020, 0x00000000, 0x00108000,
        0x00008020, 0x80108000, 0x80100000, 0x00008020,
        0x00000000, 0x00108020, 0x80100020, 0x00100000,
        0x80008020, 0x80100000, 0x80108000, 0x00008000,
        0x80100000, 0x80008000, 0x00000020, 0x80108020,
        0x00108020, 0x00000020, 0x00008000, 0x80000000,
        0x00008020, 0x80108000, 0x00100000, 0x80000020,
        0x00100020, 0x80008020, 0x80000020, 0x00100020,
        0x00108000, 0x00000000, 0x80008000, 0x00008020,
        0x80000000, 0x80100020, 0x80108020, 0x00108000
    };

    static int[] SP3 = {
        0x00000208, 0x08020200, 0x00000000, 0x08020008,
        0x08000200, 0x00000000, 0x00020208, 0x08000200,
        0x00020008, 0x08000008, 0x08000008, 0x00020000,
        0x08020208, 0x00020008, 0x08020000, 0x00000208,
        0x08000000, 0x00000008, 0x08020200, 0x00000200,
        0x00020200, 0x08020000, 0x08020008, 0x00020208,
        0x08000208, 0x00020200, 0x00020000, 0x08000208,
        0x00000008, 0x08020208, 0x00000200, 0x08000000,
        0x08020200, 0x08000000, 0x00020008, 0x00000208,
        0x00020000, 0x08020200, 0x08000200, 0x00000000,
        0x00000200, 0x00020008, 0x08020208, 0x08000200,
        0x08000008, 0x00000200, 0x00000000, 0x08020008,
        0x08000208, 0x00020000, 0x08000000, 0x08020208,
        0x00000008, 0x00020208, 0x00020200, 0x08000008,
        0x08020000, 0x08000208, 0x00000208, 0x08020000,
        0x00020208, 0x00000008, 0x08020008, 0x00020200
    };

    static int[] SP4 = {
        0x00802001, 0x00002081, 0x00002081, 0x00000080,
        0x00802080, 0x00800081, 0x00800001, 0x00002001,
        0x00000000, 0x00802000, 0x00802000, 0x00802081,
        0x00000081, 0x00000000, 0x00800080, 0x00800001,
        0x00000001, 0x00002000, 0x00800000, 0x00802001,
        0x00000080, 0x00800000, 0x00002001, 0x00002080,
        0x00800081, 0x00000001, 0x00002080, 0x00800080,
        0x00002000, 0x00802080, 0x00802081, 0x00000081,
        0x00800080, 0x00800001, 0x00802000, 0x00802081,
        0x00000081, 0x00000000, 0x00000000, 0x00802000,
        0x00002080, 0x00800080, 0x00800081, 0x00000001,
        0x00802001, 0x00002081, 0x00002081, 0x00000080,
        0x00802081, 0x00000081, 0x00000001, 0x00002000,
        0x00800001, 0x00002001, 0x00802080, 0x00800081,
        0x00002001, 0x00002080, 0x00800000, 0x00802001,
        0x00000080, 0x00800000, 0x00002000, 0x00802080
    };

    static int[] SP5 = {
        0x00000100, 0x02080100, 0x02080000, 0x42000100,
        0x00080000, 0x00000100, 0x40000000, 0x02080000,
        0x40080100, 0x00080000, 0x02000100, 0x40080100,
        0x42000100, 0x42080000, 0x00080100, 0x40000000,
        0x02000000, 0x40080000, 0x40080000, 0x00000000,
        0x40000100, 0x42080100, 0x42080100, 0x02000100,
        0x42080000, 0x40000100, 0x00000000, 0x42000000,
        0x02080100, 0x02000000, 0x42000000, 0x00080100,
        0x00080000, 0x42000100, 0x00000100, 0x02000000,
        0x40000000, 0x02080000, 0x42000100, 0x40080100,
        0x02000100, 0x40000000, 0x42080000, 0x02080100,
        0x40080100, 0x00000100, 0x02000000, 0x42080000,
        0x42080100, 0x00080100, 0x42000000, 0x42080100,
        0x02080000, 0x00000000, 0x40080000, 0x42000000,
        0x00080100, 0x02000100, 0x40000100, 0x00080000,
        0x00000000, 0x40080000, 0x02080100, 0x40000100
    };

    static int[] SP6 = {
        0x20000010, 0x20400000, 0x00004000, 0x20404010,
        0x20400000, 0x00000010, 0x20404010, 0x00400000,
        0x20004000, 0x00404010, 0x00400000, 0x20000010,
        0x00400010, 0x20004000, 0x20000000, 0x00004010,
        0x00000000, 0x00400010, 0x20004010, 0x00004000,
        0x00404000, 0x20004010, 0x00000010, 0x20400010,
        0x20400010, 0x00000000, 0x00404010, 0x20404000,
        0x00004010, 0x00404000, 0x20404000, 0x20000000,
        0x20004000, 0x00000010, 0x20400010, 0x00404000,
        0x20404010, 0x00400000, 0x00004010, 0x20000010,
        0x00400000, 0x20004000, 0x20000000, 0x00004010,
        0x20000010, 0x20404010, 0x00404000, 0x20400000,
        0x00404010, 0x20404000, 0x00000000, 0x20400010,
        0x00000010, 0x00004000, 0x20400000, 0x00404010,
        0x00004000, 0x00400010, 0x20004010, 0x00000000,
        0x20404000, 0x20000000, 0x00400010, 0x20004010
    };

    static int[] SP7 = {
        0x00200000, 0x04200002, 0x04000802, 0x00000000,
        0x00000800, 0x04000802, 0x00200802, 0x04200800,
        0x04200802, 0x00200000, 0x00000000, 0x04000002,
        0x00000002, 0x04000000, 0x04200002, 0x00000802,
        0x04000800, 0x00200802, 0x00200002, 0x04000800,
        0x04000002, 0x04200000, 0x04200800, 0x00200002,
        0x04200000, 0x00000800, 0x00000802, 0x04200802,
        0x00200800, 0x00000002, 0x04000000, 0x00200800,
        0x04000000, 0x00200800, 0x00200000, 0x04000802,
        0x04000802, 0x04200002, 0x04200002, 0x00000002,
        0x00200002, 0x04000000, 0x04000800, 0x00200000,
        0x04200800, 0x00000802, 0x00200802, 0x04200800,
        0x00000802, 0x04000002, 0x04200802, 0x04200000,
        0x00200800, 0x00000000, 0x00000002, 0x04200802,
        0x00000000, 0x00200802, 0x04200000, 0x00000800,
        0x04000002, 0x04000800, 0x00000800, 0x00200002
    };

    static int[] SP8 = {
        0x10001040, 0x00001000, 0x00040000, 0x10041040,
        0x10000000, 0x10001040, 0x00000040, 0x10000000,
        0x00040040, 0x10040000, 0x10041040, 0x00041000,
        0x10041000, 0x00041040, 0x00001000, 0x00000040,
        0x10040000, 0x10000040, 0x10001000, 0x00001040,
        0x00041000, 0x00040040, 0x10040040, 0x10041000,
        0x00001040, 0x00000000, 0x00000000, 0x10040040,
        0x10000040, 0x10001000, 0x00041040, 0x00040000,
        0x00041040, 0x00040000, 0x10041000, 0x00001000,
        0x00000040, 0x10040040, 0x00001000, 0x00041040,
        0x10001000, 0x00000040, 0x10000040, 0x10040000,
        0x10040040, 0x10000000, 0x00040000, 0x10001040,
        0x00000000, 0x10041040, 0x00040040, 0x10000040,
        0x10040000, 0x10001000, 0x10001040, 0x00000000,
        0x10041040, 0x00041000, 0x00041000, 0x00001040,
        0x00001040, 0x00040040, 0x10000000, 0x10041000
    };

    /**
     * generate an integer based working key based on our secret key
     * and what we processing we are planning to do.
     *
     * Acknowledgements for this routine go to James Gillogly & Phil Karn.
     *         (whoever, and wherever they are!).
     */
    protected int[] generateWorkingKey(
        boolean encrypting,
        byte[] key) {
        int[] newKey = new int[32];
        boolean[] pc1m = new boolean[56],
            pcr = new boolean[56];

        for (int j = 0; j < 56; j++) {
            int l = pc1[j];

            pc1m[j] = ( (key[l >>> 3] & bytebit[l & 07]) != 0);
        }

        for (int i = 0; i < 16; i++) {
            int l, m, n;

            if (encrypting) {
                m = i << 1;
            }
            else {
                m = (15 - i) << 1;
            }

            n = m + 1;
            newKey[m] = newKey[n] = 0;

            for (int j = 0; j < 28; j++) {
                l = j + totrot[i];
                if (l < 28) {
                    pcr[j] = pc1m[l];
                }
                else {
                    pcr[j] = pc1m[l - 28];
                }
            }

            for (int j = 28; j < 56; j++) {
                l = j + totrot[i];
                if (l < 56) {
                    pcr[j] = pc1m[l];
                }
                else {
                    pcr[j] = pc1m[l - 28];
                }
            }

            for (int j = 0; j < 24; j++) {
                if (pcr[pc2[j]]) {
                    newKey[m] |= bigbyte[j];
                }

                if (pcr[pc2[j + 24]]) {
                    newKey[n] |= bigbyte[j];
                }
            }
        }

        //
        // store the processed key
        //
        for (int i = 0; i != 32; i += 2) {
            int i1, i2;

            i1 = newKey[i];
            i2 = newKey[i + 1];

            newKey[i] = ( (i1 & 0x00fc0000) << 6) | ( (i1 & 0x00000fc0) << 10)
                | ( (i2 & 0x00fc0000) >>> 10) | ( (i2 & 0x00000fc0) >>> 6);

            newKey[i + 1] = ( (i1 & 0x0003f000) << 12) |
                ( (i1 & 0x0000003f) << 16)
                | ( (i2 & 0x0003f000) >>> 4) | (i2 & 0x0000003f);
        }

        return newKey;
    }

    /**
     * the DES engine.
     */
    protected void desFunc(
        int[] wKey,
        byte[] in,
        int inOff,
        byte[] out,
        int outOff) {
        int work, right, left;

        left = (in[inOff + 0] & 0xff) << 24;
        left |= (in[inOff + 1] & 0xff) << 16;
        left |= (in[inOff + 2] & 0xff) << 8;
        left |= (in[inOff + 3] & 0xff);

        right = (in[inOff + 4] & 0xff) << 24;
        right |= (in[inOff + 5] & 0xff) << 16;
        right |= (in[inOff + 6] & 0xff) << 8;
        right |= (in[inOff + 7] & 0xff);

        work = ( (left >>> 4) ^ right) & 0x0f0f0f0f;
        right ^= work;
        left ^= (work << 4);
        work = ( (left >>> 16) ^ right) & 0x0000ffff;
        right ^= work;
        left ^= (work << 16);
        work = ( (right >>> 2) ^ left) & 0x33333333;
        left ^= work;
        right ^= (work << 2);
        work = ( (right >>> 8) ^ left) & 0x00ff00ff;
        left ^= work;
        right ^= (work << 8);
        right = ( (right << 1) | ( (right >>> 31) & 1)) & 0xffffffff;
        work = (left ^ right) & 0xaaaaaaaa;
        left ^= work;
        right ^= work;
        left = ( (left << 1) | ( (left >>> 31) & 1)) & 0xffffffff;

        for (int round = 0; round < 8; round++) {
            int fval;

            work = (right << 28) | (right >>> 4);
            work ^= wKey[round * 4 + 0];
            fval = SP7[work & 0x3f];
            fval |= SP5[ (work >>> 8) & 0x3f];
            fval |= SP3[ (work >>> 16) & 0x3f];
            fval |= SP1[ (work >>> 24) & 0x3f];
            work = right ^ wKey[round * 4 + 1];
            fval |= SP8[work & 0x3f];
            fval |= SP6[ (work >>> 8) & 0x3f];
            fval |= SP4[ (work >>> 16) & 0x3f];
            fval |= SP2[ (work >>> 24) & 0x3f];
            left ^= fval;
            work = (left << 28) | (left >>> 4);
            work ^= wKey[round * 4 + 2];
            fval = SP7[work & 0x3f];
            fval |= SP5[ (work >>> 8) & 0x3f];
            fval |= SP3[ (work >>> 16) & 0x3f];
            fval |= SP1[ (work >>> 24) & 0x3f];
            work = left ^ wKey[round * 4 + 3];
            fval |= SP8[work & 0x3f];
            fval |= SP6[ (work >>> 8) & 0x3f];
            fval |= SP4[ (work >>> 16) & 0x3f];
            fval |= SP2[ (work >>> 24) & 0x3f];
            right ^= fval;
        }

        right = (right << 31) | (right >>> 1);
        work = (left ^ right) & 0xaaaaaaaa;
        left ^= work;
        right ^= work;
        left = (left << 31) | (left >>> 1);
        work = ( (left >>> 8) ^ right) & 0x00ff00ff;
        right ^= work;
        left ^= (work << 8);
        work = ( (left >>> 2) ^ right) & 0x33333333;
        right ^= work;
        left ^= (work << 2);
        work = ( (right >>> 16) ^ left) & 0x0000ffff;
        left ^= work;
        right ^= (work << 16);
        work = ( (right >>> 4) ^ left) & 0x0f0f0f0f;
        left ^= work;
        right ^= (work << 4);

        out[outOff + 0] = (byte) ( (right >>> 24) & 0xff);
        out[outOff + 1] = (byte) ( (right >>> 16) & 0xff);
        out[outOff + 2] = (byte) ( (right >>> 8) & 0xff);
        out[outOff + 3] = (byte) (right & 0xff);
        out[outOff + 4] = (byte) ( (left >>> 24) & 0xff);
        out[outOff + 5] = (byte) ( (left >>> 16) & 0xff);
        out[outOff + 6] = (byte) ( (left >>> 8) & 0xff);
        out[outOff + 7] = (byte) (left & 0xff);
    }

    /**
     *    encrypt the data
     *    @param byte[]
     *    @return byte[]
     */
    public byte[] encrypt(byte[] idata) {
        if(idata == null || idata.length == 0) {
            return null;
        }

        init(true, userkey);

        int processTimes = idata.length / BLOCK_SIZE;
        int leftdata = idata.length % BLOCK_SIZE;
        int olen = 0;
        byte[] buf = new byte[BLOCK_SIZE * (processTimes + 1)];

        for (int i = 0; i < processTimes; i++) {
            olen = i * BLOCK_SIZE;
            processBlock(idata, olen, buf, olen);
        }

        if(processTimes>0)    //modified by  jyh 20071211
        olen += BLOCK_SIZE;

        if (leftdata != 0) {

            byte[] temp = new byte[BLOCK_SIZE];
            for (int j = 0; j < leftdata; j++) {
                temp[j] = idata[j + olen];
            }
            for (int k = leftdata; k < BLOCK_SIZE; k++) {
                //temp[k] = (byte) (BLOCK_SIZE - leftdata);  //MODIFIED BY JYH 20080610  发现与后台unix端的加密算法不一致
                temp[k] = ‘\0‘;
            }
            processBlock(temp, 0, buf, olen);
            olen += BLOCK_SIZE;
        }

        byte[] result = new byte[olen];
        for (int j = 0; j < olen; j++) {
            result[j] = buf[j];
        }
        return result;
    }

    /**
     *     decrypt the data
     *    @param byte[]
     *    @return byte[]
     */
    public byte[] decrypt(byte[] idata) {
        if (idata == null || idata.length == 0) {
            return null;
        }
        init(false, userkey);

        int processTimes = idata.length / BLOCK_SIZE;
        int leftdata = idata.length % BLOCK_SIZE;

        if (leftdata != 0) {
            throw new IllegalStateException("input not BLOCK_SIZE times");
        }

        int olen = 0;
        byte[] buf = new byte[idata.length];

        for (int i = 0; i < processTimes; i++) {
            olen = i * BLOCK_SIZE;
            processBlock(idata, olen, buf, olen);
        }

        byte bt;
        for (int j = 1; j < BLOCK_SIZE; j++) {
            bt = buf[olen + j];
            int k = j;
            for (; k < BLOCK_SIZE; k++) {
                if (bt != buf[olen + k]) {
                    break;
                }
            }
            if (k == BLOCK_SIZE) {
                if (j == BLOCK_SIZE - bt) {

                    olen = olen + j;
                    break;
                }
                else if (j == BLOCK_SIZE - 1) {
                    olen += BLOCK_SIZE;
                }
            }
        }

        byte[] odata = new byte[olen];

        for (int k = 0; k < olen; k++) {
            odata[k] = buf[k];
        }
        return odata;
    }
}
public class HsDes {

    /**
     * des加密
     * @param arg
     * @return
     */
    public static final String   HUNDSUN_VERSION="@system  管理平台  @version 2.0.1 @lastModiDate @describe ";
      public static String enc(String arg){    //加密一段文本串

          if(arg==null || arg.length()==0){   //如果为null或者空则加密对0x00处理

              byte [] b={0x00};
              arg =new String(new String(b));        //如果为空则返回空

          }
        Encryptor  enc=new Encryptor("HsAndMoe".getBytes());
        return byte2hex( enc.encrypt(arg.getBytes()));

      }
      /**
       * des解密
       * @param arg
       * @return
       */
      public static String dec(String arg){    //加密一段文本串

         if(arg==null || arg.length()==0){   //如果为null或者空则返回空串
            return new String();             //跟unix端c一致
         }

         Encryptor  dec=new Encryptor("HsAndMoe".getBytes());
         byte decByte[]=dec.decrypt(hex2byte(arg));

         return byte2string(decByte);

      }

      /**
       * 由于java字符串没有结束符号,去掉0x00后转换成字符串
       * @param decByte
       * @return
       */
      public  static String  byte2string(byte[] decByte){
         int len=0;
          for(int i=0;i<decByte.length;i++,len++){  //将结束符号0x00的去掉,然后再转成字符串,

              if(decByte[i]==0x00){
                  len=i;
                  break;
              }
          }
          return   len==0?new String():new String(decByte,0,len);
      }

     /**
      * 字节数组转换成16进制字符串
      * @param b
      * @return
      */
      public static String byte2hex(byte[] b) {//二行制转字符串
            String hs="";
            String stmp="";

            for (int n=0;n<b.length;n++) {
                stmp=byteHEX(b[n]);
                hs=hs+stmp;
            }
            return hs;
        }

      public static String byteHEX(byte ib) {
          char[] Digit = { ‘0‘,‘1‘,‘2‘,‘3‘,‘4‘,‘5‘,‘6‘,‘7‘,‘8‘,‘9‘,
          ‘A‘,‘B‘,‘C‘,‘D‘,‘E‘,‘F‘ };
          char [] ob = new char[2];
          ob[0] = Digit[(ib >>> 4) & 0X0F];
          ob[1] = Digit[ib & 0X0F];
          String s = new String(ob);
          return s;
      }

      /**
       * 16进制字符串转换成字节数组
       * @param hex
       * @return
       */
      public static byte[] hex2byte(String hex) {
            int len = (hex.length() / 2);
            byte[] result = new byte[len];
            char[] achar = hex.toCharArray();
            for (int i = 0; i < len; i++) {
             int pos = i * 2;
             result[i] = (byte) (toByte(achar[pos]) << 4 | toByte(achar[pos + 1]));
            }
            return result;
        }

        private static byte toByte(char c) {
            byte b = (byte) "0123456789ABCDEF".indexOf(c);
            return b;
        }

}
时间: 2024-11-06 09:44:08

数据库密码加密公用秘要生成器,数据库密码加密解密入口的相关文章

数据库——环境初建改端口和密码(转)

一.修改APACHE的监听端口 2.在界面中选apache,弹出隐藏菜单选项,打开配置文件httpd.conf; 2.找到Listen 80 和 ServerName localhost:80; 3.将80改成801(当然自己也可以设定别的不使用的端口,例如8000等); 4.保存,待重启WAMP服务后即可. PHP Parse Error: syntax error, unexpected $end 错误的解决办法 可以在php.ini中设置short_open_tag = On 第一步,登录

SharePoint 服务器修改密码(前端服务器与数据库服务器分开)

环境:Windows Server 2008 r2+SP1, SQL Server 2008 r2, SharePoint Server 2013, 前端服务器与数据库服务器分开 步骤: 1.在域控中重置管理员的密码 2.在SharePoint前端服务器SharePoint Mangement Shell中输入如下命令: stsadm -o updateaccountpassword -userlogin <域\用户名> -password <新密码> -noadmin 3.在数据

各版本数据库初次登录时,强制修改密码

说明: 因为新版本的数据库加强了安全性,所以每次登录时都强制要求修改密码.'root'@'localhost'这个用户的初始密码会在安装 数据库时记录到/var/log/mysqld.log文件中,所以首次登录时,需要找到这个密码,然后登录. mysql 5.6版本登录后修改密码: mysql> SET PASSWORD = PASSWORD('mypass'); mysql 5.7版本登录后修改密码:(二进制版本数据库,非yum安装和源码安装) mysql> alter user 'root

Oracle 数据库登录、用户解锁、改密码、创建用户授权操作

一.数据库登录1.常用账户: 管理员: sys主要练习操作用户: scott2.测试环境是否配置成功: 1.命令窗口 win+R -> cmd(以管理员身份运行) - > sqlplus ->输入用户名与密码 用户名:sys 口令: 自己设置的密码 as sysdba(as sysdba 是给它管理员权限),(输入密码时看不见的) 2.或找到 下面的文件夹,打开SQL Plus 二.一些基本操作切换用户登陆命令: 重新登录scott用户,并指定登录的数据库名称 conn scott/ 密

如何安全的存储用户密码?(下)代码实现pbkdf2算法加密

这辈子没办法做太多事情,所以每一件都要做到精彩绝伦! People can't do too many things in my life,so everything will be wonderful   乔布斯 本文参考博客: http://wyait.blog.51cto.com/12674066/1918470和 http://wyait.blog.51cto.com/12674066/1918474 参考资料:java API6.0中文版.chm 本文以java为例,进行实际加解密操作

实体字符转换,同样变量密码加盐MD5后生成的加密字符串不同解决办法 (原)

我是首次登录系统自动生成一个密码,格式大概是:   abcd1234&  这种格式 , 比如加密规则就是一个 MD5() 然后,首次账号密码登录,输入密码 abcd1234&,一直提示密码错误,我输出了一下MD5('bacd1234&')值,然后拿出数据库MD5的字符串比较,就是不一样,但是我生成随机密码后加密是没问题的. 问题出在: var_dump() 一下,我们登录表单提交的密码,和我们系统生成的密码字符串,会发现一模一样的字符串,类型也都是string,但是长度不一样,因为

项目记录:登陆( 保存用户名密码 kaptcha验证码 shiro权限管理 RSA加密 非明文保存)

1.登陆页代码 1)引入js <script type="text/javascript" src="${base}/resources/admin/js/jquery.js"></script> <script type="text/javascript" src="${base}/resources/admin/js/jquery.validate.js"></script>

密码、文件MD5加密,密码sha256、sha384、sha512Hex等加密

package encryption; import java.io.FileInputStream; import java.io.FileOutputStream; import java.io.OutputStream; import java.io.UnsupportedEncodingException; import java.security.MessageDigest; import java.util.Arrays; import org.apache.commons.code

忘记Zabbix管理页面登陆密码清理况下,修改密码!!

相信有很多人由于文档的缺失,或者工作交接的某些原因导致密码丢失,从而无法登录Zabbix管理界面,现在我发现了一个方法可以修改密码(直接在数据库修改表内容) 废话不多说,直接入主题: 1.进入数据库,修改zabbix的数据库下面的user表,不要告诉我数据库密码也忘了. MariaDB [(none)]> show databases; +--------------------+ | Database           | +--------------------+ | informati