Best Cerberus-source code snippet using org.cerberus.service.encryption.EncryptionService.EncryptionService
Source:EncryptionServiceTest.java  
...13 * See the License for the specific language governing permissions and14 * limitations under the License.15 */16package com.nike.cerberus.service;17import static com.nike.cerberus.service.EncryptionService.SDB_PATH_PROPERTY_NAME;18import static org.junit.Assert.assertEquals;19import static org.junit.Assert.assertTrue;20import com.amazonaws.encryptionsdk.AwsCrypto;21import com.amazonaws.encryptionsdk.CryptoAlgorithm;22import com.amazonaws.encryptionsdk.CryptoMaterialsManager;23import com.amazonaws.encryptionsdk.CryptoResult;24import com.amazonaws.encryptionsdk.MasterKeyProvider;25import com.amazonaws.encryptionsdk.ParsedCiphertext;26import com.amazonaws.encryptionsdk.kms.KmsMasterKey;27import com.amazonaws.encryptionsdk.model.CiphertextType;28import com.amazonaws.encryptionsdk.model.ContentType;29import com.amazonaws.regions.Region;30import com.amazonaws.regions.Regions;31import com.google.common.collect.Lists;32import java.nio.charset.StandardCharsets;33import java.util.HashMap;34import java.util.List;35import java.util.Map;36import org.apache.commons.lang3.StringUtils;37import org.junit.Assert;38import org.junit.Before;39import org.junit.Test;40import org.mockito.Mock;41import org.mockito.Mockito;42import org.mockito.MockitoAnnotations;43public class EncryptionServiceTest {44  @Mock private Region currentRegion;45  @Mock private CryptoMaterialsManager decryptCryptoMaterialsManager;46  @Mock private CryptoMaterialsManager encryptCryptoMaterialsManager;47  @Mock private AwsCrypto awsCrypto;48  @Before49  public void setup() {50    MockitoAnnotations.initMocks(this);51  }52  @Test53  public void testArnFormatIsWrong() {54    String exceptionMessage = "";55    try {56      new EncryptionService(57          awsCrypto,58          "cmk",59          decryptCryptoMaterialsManager,60          encryptCryptoMaterialsManager,61          Region.getRegion(Regions.US_WEST_2));62    } catch (IllegalArgumentException illegalArgumentException) {63      exceptionMessage = illegalArgumentException.getMessage();64    }65    Assert.assertEquals(66        "At least 2 CMK ARNs are required for high availability, size:1", exceptionMessage);67  }68  @Test69  public void testEncryptWithString() {70    String expectedEncryptedValue = "encryptedValue";71    EncryptionService encryptionService = getEncryptionService();72    CryptoResult<String, ?> cryptoResult = getCryptoResult(expectedEncryptedValue);73    Mockito.when(74            awsCrypto.encryptString(75                Mockito.eq(encryptCryptoMaterialsManager),76                Mockito.eq("plainText"),77                Mockito.anyMap()))78        .thenReturn(cryptoResult);79    String encryptedValue = encryptionService.encrypt("plainText", "sdbPath");80    Assert.assertEquals(expectedEncryptedValue, encryptedValue);81  }82  @Test83  public void testEncryptWithBytes() {84    String expectedEncryptedValue = "encryptedValue";85    EncryptionService encryptionService = getEncryptionService();86    CryptoResult<byte[], ?> cryptoResult = getCryptoResultBytes(expectedEncryptedValue);87    Mockito.when(88            awsCrypto.encryptData(89                Mockito.eq(encryptCryptoMaterialsManager),90                Mockito.eq("plainText".getBytes(StandardCharsets.UTF_8)),91                Mockito.anyMap()))92        .thenReturn(cryptoResult);93    byte[] encryptedBytes =94        encryptionService.encrypt("plainText".getBytes(StandardCharsets.UTF_8), "sdbPath");95    Assert.assertEquals(expectedEncryptedValue, new String(encryptedBytes, StandardCharsets.UTF_8));96  }97  @Test98  public void testDecryptWhenEncryptionContentDidNotHaveExpectedPath() {99    EncryptionService encryptionService = Mockito.spy(getEncryptionService());100    ParsedCiphertext parsedCiphertext = getParsedCipherText();101    Mockito.doReturn(parsedCiphertext)102        .when(encryptionService)103        .getParsedCipherText("encryptedPayload");104    Map<String, String> contextMap = new HashMap<>();105    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);106    String exceptionMessage = "";107    try {108      encryptionService.decrypt("encryptedPayload", "sdbPath");109    } catch (IllegalArgumentException illegalArgumentException) {110      exceptionMessage = illegalArgumentException.getMessage();111    }112    assertEquals(113        "EncryptionContext did not have expected path, possible tampering: sdbPath",114        exceptionMessage);115  }116  @Test117  public void testDecryptWhenEncryptionContent() {118    EncryptionService encryptionService = Mockito.spy(getEncryptionService());119    ParsedCiphertext parsedCiphertext = getParsedCipherText();120    Mockito.doReturn(parsedCiphertext)121        .when(encryptionService)122        .getParsedCipherText("encryptedPayload");123    Map<String, String> contextMap = new HashMap<>();124    contextMap.put(SDB_PATH_PROPERTY_NAME, "sdbPath");125    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);126    CryptoResult cryptoResult = getCryptoResultBytes("decryptedData");127    Mockito.when(128            awsCrypto.decryptData(129                Mockito.any(CryptoMaterialsManager.class), Mockito.any(ParsedCiphertext.class)))130        .thenReturn(cryptoResult);131    String decryptedData = encryptionService.decrypt("encryptedPayload", "sdbPath");132    Assert.assertEquals("decryptedData", decryptedData);133  }134  @Test135  public void testDecryptBytesWhenEncryptionContentDidNotHaveExpectedPath() {136    EncryptionService encryptionService = Mockito.spy(getEncryptionService());137    ParsedCiphertext parsedCiphertext = getParsedCipherText();138    Mockito.doReturn(parsedCiphertext)139        .when(encryptionService)140        .getParsedCipherText("encryptedPayload".getBytes(StandardCharsets.UTF_8));141    Map<String, String> contextMap = new HashMap<>();142    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);143    String exceptionMessage = "";144    try {145      encryptionService.decrypt("encryptedPayload".getBytes(StandardCharsets.UTF_8), "sdbPath");146    } catch (IllegalArgumentException illegalArgumentException) {147      exceptionMessage = illegalArgumentException.getMessage();148    }149    assertEquals(150        "EncryptionContext did not have expected path, possible tampering: sdbPath",151        exceptionMessage);152  }153  @Test154  public void testDecryptBytesWhenEncryptionContent() {155    EncryptionService encryptionService = Mockito.spy(getEncryptionService());156    ParsedCiphertext parsedCiphertext = getParsedCipherText();157    Mockito.doReturn(parsedCiphertext)158        .when(encryptionService)159        .getParsedCipherText("encryptedPayload".getBytes(StandardCharsets.UTF_8));160    Map<String, String> contextMap = new HashMap<>();161    contextMap.put(SDB_PATH_PROPERTY_NAME, "sdbPath");162    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);163    CryptoResult cryptoResult = getCryptoResultBytes("decryptedData");164    Mockito.when(165            awsCrypto.decryptData(166                Mockito.any(CryptoMaterialsManager.class), Mockito.any(ParsedCiphertext.class)))167        .thenReturn(cryptoResult);168    byte[] decryptedData =169        encryptionService.decrypt("encryptedPayload".getBytes(StandardCharsets.UTF_8), "sdbPath");170    Assert.assertEquals("decryptedData", new String(decryptedData, StandardCharsets.UTF_8));171  }172  @Test173  public void testReEncryptWhenEncryptionContentDidNotHaveExpectedPath() {174    EncryptionService encryptionService = Mockito.spy(getEncryptionService());175    ParsedCiphertext parsedCiphertext = getParsedCipherText();176    Mockito.doReturn(parsedCiphertext)177        .when(encryptionService)178        .getParsedCipherText("encryptedPayload");179    Map<String, String> contextMap = new HashMap<>();180    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);181    String exceptionMessage = "";182    try {183      encryptionService.reencrypt("encryptedPayload", "sdbPath");184    } catch (IllegalArgumentException illegalArgumentException) {185      exceptionMessage = illegalArgumentException.getMessage();186    }187    assertEquals(188        "EncryptionContext did not have expected path, possible tampering: sdbPath",189        exceptionMessage);190  }191  @Test192  public void testReEncryptWithBytes() {193    EncryptionService encryptionService = Mockito.spy(getEncryptionService());194    ParsedCiphertext parsedCiphertext = getParsedCipherText();195    Mockito.doReturn(parsedCiphertext)196        .when(encryptionService)197        .getParsedCipherText("encryptedPayload".getBytes(StandardCharsets.UTF_8));198    Map<String, String> contextMap = new HashMap<>();199    contextMap.put(SDB_PATH_PROPERTY_NAME, "sdbPath");200    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);201    CryptoResult cryptoResult = getCryptoResultBytes("decryptedData");202    Mockito.when(203            awsCrypto.decryptData(204                Mockito.any(CryptoMaterialsManager.class), Mockito.any(ParsedCiphertext.class)))205        .thenReturn(cryptoResult);206    CryptoResult<byte[], ?> encryptedCryptoResult = getCryptoResultBytes("encryptedData");207    Mockito.when(208            awsCrypto.encryptData(209                Mockito.eq(encryptCryptoMaterialsManager),210                Mockito.eq("decryptedData".getBytes(StandardCharsets.UTF_8)),211                Mockito.anyMap()))212        .thenReturn(encryptedCryptoResult);213    byte[] reEncryptedData =214        encryptionService.reencrypt("encryptedPayload".getBytes(StandardCharsets.UTF_8), "sdbPath");215    Assert.assertEquals("encryptedData", new String(reEncryptedData, StandardCharsets.UTF_8));216  }217  @Test218  public void testReEncryptWithString() {219    EncryptionService encryptionService = Mockito.spy(getEncryptionService());220    ParsedCiphertext parsedCiphertext = getParsedCipherText();221    Mockito.doReturn(parsedCiphertext)222        .when(encryptionService)223        .getParsedCipherText("encryptedPayload");224    Map<String, String> contextMap = new HashMap<>();225    contextMap.put(SDB_PATH_PROPERTY_NAME, "sdbPath");226    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);227    CryptoResult cryptoResult = getCryptoResultBytes("decryptedData");228    Mockito.when(229            awsCrypto.decryptData(230                Mockito.any(CryptoMaterialsManager.class), Mockito.any(ParsedCiphertext.class)))231        .thenReturn(cryptoResult);232    CryptoResult<String, ?> encryptedCryptoResult = getCryptoResult("encryptedData");233    Mockito.when(234            awsCrypto.encryptString(235                Mockito.eq(encryptCryptoMaterialsManager),236                Mockito.eq("decryptedData"),237                Mockito.anyMap()))238        .thenReturn(encryptedCryptoResult);239    String reEncryptedData = encryptionService.reencrypt("encryptedPayload", "sdbPath");240    Assert.assertEquals("encryptedData", reEncryptedData);241  }242  @Test243  public void testReEncryptBytesWhenEncryptionContentDidNotHaveExpectedPath() {244    EncryptionService encryptionService = Mockito.spy(getEncryptionService());245    ParsedCiphertext parsedCiphertext = getParsedCipherText();246    Mockito.doReturn(parsedCiphertext)247        .when(encryptionService)248        .getParsedCipherText("encryptedPayload".getBytes(StandardCharsets.UTF_8));249    Map<String, String> contextMap = new HashMap<>();250    Mockito.when(parsedCiphertext.getEncryptionContextMap()).thenReturn(contextMap);251    String exceptionMessage = "";252    try {253      encryptionService.reencrypt("encryptedPayload".getBytes(StandardCharsets.UTF_8), "sdbPath");254    } catch (IllegalArgumentException illegalArgumentException) {255      exceptionMessage = illegalArgumentException.getMessage();256    }257    assertEquals(258        "EncryptionContext did not have expected path, possible tampering: sdbPath",259        exceptionMessage);260  }261  private ParsedCiphertext getParsedCipherText() {262    ParsedCiphertext parsedCiphertext = Mockito.mock(ParsedCiphertext.class);263    byte b = 0;264    Mockito.when(parsedCiphertext.getVersion()).thenReturn(b);265    Mockito.when(parsedCiphertext.getType())266        .thenReturn(CiphertextType.CUSTOMER_AUTHENTICATED_ENCRYPTED_DATA);267    Mockito.when(parsedCiphertext.getCryptoAlgoId())268        .thenReturn(CryptoAlgorithm.ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384);269    Mockito.when(parsedCiphertext.getMessageId())270        .thenReturn("messageId".getBytes(StandardCharsets.UTF_8));271    Mockito.when(parsedCiphertext.getEncryptedKeyBlobCount()).thenReturn(1);272    Mockito.when(parsedCiphertext.getContentType()).thenReturn(ContentType.SINGLEBLOCK);273    return parsedCiphertext;274  }275  private EncryptionService getEncryptionService() {276    EncryptionService encryptionService =277        new EncryptionService(278            awsCrypto,279            "cmk,Arns,cmk",280            decryptCryptoMaterialsManager,281            encryptCryptoMaterialsManager,282            Region.getRegion(Regions.US_WEST_2));283    return encryptionService;284  }285  private CryptoResult<String, ?> getCryptoResult(String value) {286    CryptoResult<String, ?> cryptoResult = Mockito.mock(CryptoResult.class);287    Mockito.when(cryptoResult.getResult()).thenReturn(value);288    return cryptoResult;289  }290  private CryptoResult<byte[], ?> getCryptoResultBytes(String value) {291    CryptoResult<byte[], ?> cryptoResult = Mockito.mock(CryptoResult.class);292    Mockito.when(cryptoResult.getResult()).thenReturn(value.getBytes(StandardCharsets.UTF_8));293    return cryptoResult;294  }295  @Test296  public void test_that_provider_has_current_region_first() {297    String arns =298        "arn:aws:kms:us-east-1:11111111:key/1111111-1d89-43ce-957b-0f705990e9d0,arn:aws:kms:us-west-2:11111111:key/11111111-aecd-4089-85e0-18536efa5c90";299    List<String> list =300        EncryptionService.getSortedArnListByCurrentRegion(301            Lists.newArrayList(StringUtils.split(arns, ",")), Region.getRegion(Regions.US_WEST_2));302    assertTrue(list.get(0).contains(Regions.US_WEST_2.getName()));303  }304  @Test305  public void testInitializeKeyProvider() {306    String arns =307        "arn:aws:kms:us-east-1:11111111:key/1111111-1d89-43ce-957b-0f705990e9d0,arn:aws:kms:us-west-2:11111111:key/11111111-aecd-4089-85e0-18536efa5c90";308    MasterKeyProvider<KmsMasterKey> kmsMasterKeyMasterKeyProvider =309        EncryptionService.initializeKeyProvider(arns, Region.getRegion(Regions.US_WEST_2));310    Assert.assertNotNull(kmsMasterKeyMasterKeyProvider);311  }312}...Source:AESGCMCipher.java  
...60    }61    @Override62    public byte[] encrypt(byte[] value, int offset, int length) {63        try {64            byte[] gcmBytes = getEncryptionService().randomIV(TLByteLength);65            encrypt.init(Cipher.ENCRYPT_MODE, key, new GCMParameterSpec(TLLength, gcmBytes));66            ByteArrayOutputStream outputStream = new ByteArrayOutputStream(1 + TLByteLength + length);67            outputStream.write((byte) TLByteLength);68            outputStream.write(gcmBytes);69            CipherOutputStream cipherStream = new CipherOutputStream(outputStream, encrypt);70            cipherStream.write(value, offset, length);71            cipherStream.flush();72            cipherStream.close();73            Arrays.fill(gcmBytes, (byte) 0); // wipe gcm from memory74            return outputStream.toByteArray();75        } catch (InvalidKeyException | InvalidAlgorithmParameterException | IOException e) {76            CerberusRegistry.getInstance().warning("Failed to encrypt AES/GCM data!");77            CerberusRegistry.getInstance().getService(CerberusEvent.class)78                    .executeFullEIF(new ExceptionEvent(CerberusEncrypt.class, e));79        }80        return null;81    }82    @Override83    public byte[] encrypt(byte[] value) {84        return encrypt(value, 0, value.length);85    }86    @Override87    public byte[] decrypt(byte[] value, int offset, int length) {88        try {89            ByteArrayInputStream inputStream = new ByteArrayInputStream(value, offset, length);90            int gcmLength = Byte.toUnsignedInt((byte) inputStream.read());91            byte[] gcmBytes = new byte[gcmLength];92            int read = inputStream.read(gcmBytes);93            if (read < gcmLength)94                throw new IllegalStateException("Invalid gcm head size AES stream!");95            GCMParameterSpec gcm = new GCMParameterSpec(TLLength, gcmBytes);96            decrypt.init(Cipher.DECRYPT_MODE, key, gcm);97            CipherInputStream cipherStream = new CipherInputStream(inputStream, decrypt);98            byte[] data = new byte[length - 1 - gcmLength];99            read = cipherStream.read(data);100            inputStream.close();101            if (read < 0)102                throw new IllegalStateException("Invalid data set length!");103            byte[] finalBytes = new byte[read];104            System.arraycopy(data, 0, finalBytes, 0, read);105            return finalBytes;106        } catch (InvalidAlgorithmParameterException | InvalidKeyException | IOException e) {107            e.printStackTrace();108        }109        return null;110    }111    @Override112    public byte[] decrypt(byte[] value) {113        return decrypt(value, 0, value.length);114    }115    private CerberusEncrypt getEncryptionService() {116        if (encryptionService == null)117            encryptionService = CerberusRegistry.getInstance().getService(CerberusEncrypt.class);118        return encryptionService;119    }120}...Source:ConfigStoreTest.java  
...19import com.google.common.collect.ImmutableSet;20import com.nike.cerberus.domain.environment.EnvironmentData;21import com.nike.cerberus.domain.environment.RegionData;22import com.nike.cerberus.module.CerberusModule;23import com.nike.cerberus.service.EncryptionService;24import com.nike.cerberus.service.KeyGenerator;25import com.nike.cerberus.service.StoreService;26import com.nike.cerberus.util.UuidSupplier;27import org.junit.Before;28import org.junit.Test;29import org.mockito.Mock;30import org.mockito.Spy;31import java.util.Arrays;32import java.util.List;33import java.util.Optional;34import static org.junit.Assert.assertFalse;35import static org.junit.Assert.assertTrue;36import static org.mockito.ArgumentMatchers.any;37import static org.mockito.Matchers.argThat;38import static org.mockito.Mockito.doReturn;39import static org.mockito.Mockito.spy;40import static org.mockito.MockitoAnnotations.initMocks;41public class ConfigStoreTest {42    @Mock43    private EncryptionService encryptionService;44    @Spy45    private StoreService storeServiceUswest2;46    @Spy47    private StoreService storeServiceUseast1;48    @Spy49    private StoreService storeServiceUseast2;50    @Mock51    private KeyGenerator keyGenerator;52    @Mock53    private UuidSupplier uuidSupplier;54    private ObjectMapper objectMapper;55    private ConfigStore configStore;56    private EnvironmentData initEnvironmentdata = new EnvironmentData();57    private List<StoreService> storeServices;...EncryptionService
Using AI Code Generation
1import org.cerberus.service.encryption.EncryptionService;2import org.cerberus.service.encryption.IEncryptionService;3import org.springframework.context.ApplicationContext;4import org.springframework.context.support.ClassPathXmlApplicationContext;5public class EncryptionServiceTest {6    public static void main(String[] args) {7        ApplicationContext context = new ClassPathXmlApplicationContext("applicationContext.xml");8        IEncryptionService service = (IEncryptionService) context.getBean("EncryptionService");9        System.out.println(service.encrypt("Hello World"));10    }11}12package org.cerberus.service.encryption;13import org.apache.log4j.Logger;14import org.jasypt.util.text.BasicTextEncryptor;15import org.springframework.stereotype.Service;16public class EncryptionService implements IEncryptionService {17    private static final Logger LOG = Logger.getLogger(EncryptionService.class);18    public String encrypt(String text) {19        BasicTextEncryptor textEncryptor = new BasicTextEncryptor();20        textEncryptor.setPassword("password");21        return textEncryptor.encrypt(text);22    }23    public String decrypt(String encryptedText) {24        BasicTextEncryptor textEncryptor = new BasicTextEncryptor();25        textEncryptor.setPassword("password");26        return textEncryptor.decrypt(encryptedText);27    }28}29package org.cerberus.service.encryption;30public interface IEncryptionService {31    String encrypt(String text);32    String decrypt(String encryptedText);33}EncryptionService
Using AI Code Generation
1package org.cerberus.service.encryption;2import org.springframework.beans.factory.annotation.Autowired;3import org.springframework.stereotype.Service;4public class EncryptionService {5    private org.cerberus.service.encryption.IEncryptionService encryptionService;6    public String encrypt(String text) {7        return encryptionService.encrypt(text);8    }9    public String decrypt(String text) {10        return encryptionService.decrypt(text);11    }12}13package org.cerberus.service.encryption;14import org.springframework.beans.factory.annotation.Autowired;15import org.springframework.stereotype.Service;16public class EncryptionService {17    private org.cerberus.service.encryption.IEncryptionService encryptionService;18    public String encrypt(String text) {19        return encryptionService.encrypt(text);20    }21    public String decrypt(String text) {22        return encryptionService.decrypt(text);23    }24}25package org.cerberus.service.encryption;26import org.springframework.beans.factory.annotation.Autowired;27import org.springframework.stereotype.Service;28public class EncryptionService {29    private org.cerberus.service.encryption.IEncryptionService encryptionService;30    public String encrypt(String text) {31        return encryptionService.encrypt(text);32    }33    public String decrypt(String text) {34        return encryptionService.decrypt(text);35    }36}37package org.cerberus.service.encryption;38import org.springframework.beans.factory.annotation.Autowired;39import org.springframework.stereotype.Service;40public class EncryptionService {41    private org.cerberus.service.encryption.IEncryptionService encryptionService;42    public String encrypt(String text) {43        return encryptionService.encrypt(text);44    }45    public String decrypt(String text) {46        return encryptionService.decrypt(text);47    }48}49package org.cerberus.service.encryption;50import org.springframework.beans.factory.annotation.Autowired;51import org.springframework.stereotype.Service;52public class EncryptionService {EncryptionService
Using AI Code Generation
1package org.cerberus.service.encryption;2import org.springframework.context.ApplicationContext;3import org.springframework.context.support.ClassPathXmlApplicationContext;4import org.springframework.context.support.FileSystemXmlApplicationContext;5public class EncryptionServiceTest {6    public static void main(String[] args) {7        ApplicationContext context = new ClassPathXmlApplicationContext("applicationContext.xml");8        EncryptionService encryptionService = (EncryptionService) context.getBean("encryptionService");9        String encrypted = encryptionService.encrypt("test");10        System.out.println(encrypted);11    }12}EncryptionService
Using AI Code Generation
1package org.cerberus.service.encryption;2import org.cerberus.service.encryption.EncryptionService;3public class 3 {4public static void main(String[] args) {5EncryptionService encryptionService = new EncryptionService();6String encryptedValue = encryptionService.encrypt("password");7System.out.println(encryptedValue);8String decryptedValue = encryptionService.decrypt(encryptedValue);9System.out.println(decryptedValue);10}11}12package org.cerberus.service.encryption;13import org.cerberus.service.encryption.EncryptionService;14public class 4 {15public static void main(String[] args) {16EncryptionService encryptionService = new EncryptionService();17String encryptedValue = encryptionService.encrypt("password");18System.out.println(encryptedValue);19String decryptedValue = encryptionService.decrypt(encryptedValue);20System.out.println(decryptedValue);21}22}23package org.cerberus.service.encryption;24import org.cerberus.service.encryption.EncryptionService;25public class 5 {26public static void main(String[] args) {27EncryptionService encryptionService = new EncryptionService();28String encryptedValue = encryptionService.encrypt("password");29System.out.println(encryptedValue);30String decryptedValue = encryptionService.decrypt(encryptedValue);31System.out.println(decryptedValue);32}33}EncryptionService
Using AI Code Generation
1package org.cerberus.service.encryption;2import org.cerberus.util.StringUtil;3import org.springframework.beans.factory.annotation.Autowired;4import org.springframework.stereotype.Service;5public class EncryptionService {6    private org.cerberus.service.encryption.IEncryptionService encryptionService;7    public String encryptPassword(String password) {8        String encryptedPassword = null;9        if (!StringUtil.isNullOrEmpty(password)) {10            encryptedPassword = encryptionService.encrypt(password);11        }12        return encryptedPassword;13    }14    public String decryptPassword(String password) {15        String decryptedPassword = null;16        if (!StringUtil.isNullOrEmpty(password)) {17            decryptedPassword = encryptionService.decrypt(password);18        }19        return decryptedPassword;20    }21}22package org.cerberus.service.encryption;23import org.cerberus.util.StringUtil;24import org.springframework.beans.factory.annotation.Autowired;25import org.springframework.stereotype.Service;26public class EncryptionService {27    private org.cerberus.service.encryption.IEncryptionService encryptionService;28    public String encryptPassword(String password) {29        String encryptedPassword = null;30        if (!StringUtil.isNullOrEmpty(password)) {31            encryptedPassword = encryptionService.encrypt(password);32        }33        return encryptedPassword;34    }35    public String decryptPassword(String password) {36        String decryptedPassword = null;37        if (!StringUtil.isNullOrEmpty(password)) {38            decryptedPassword = encryptionService.decrypt(password);39        }40        return decryptedPassword;41    }42}Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!
