Upload 12 files
Browse files- .gitattributes +3 -0
- Crypto/AESUtils.class +0 -0
- Crypto/AESUtils.java +182 -0
- Crypto/CustomDataSource.class +0 -0
- Crypto/CustomDataSource.java +59 -0
- Crypto/com.springsource.org.apache.juli.extras-6.0.24.jar +0 -0
- Crypto/commons-codec-1.11.jar +3 -0
- Crypto/commons-core-0.7.1.jar +3 -0
- Crypto/encodeco.sh +6 -0
- Crypto/modules.fileslist.json +26 -0
- Crypto/modules.fileslist.json.1 +26 -0
- Crypto/modules.fileslist.json.2 +26 -0
- Crypto/tomcat-jdbc-8.5.32.jar +3 -0
.gitattributes
CHANGED
|
@@ -57,3 +57,6 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
+
Crypto/commons-codec-1.11.jar filter=lfs diff=lfs merge=lfs -text
|
| 61 |
+
Crypto/commons-core-0.7.1.jar filter=lfs diff=lfs merge=lfs -text
|
| 62 |
+
Crypto/tomcat-jdbc-8.5.32.jar filter=lfs diff=lfs merge=lfs -text
|
Crypto/AESUtils.class
ADDED
|
Binary file (5.25 kB). View file
|
|
|
Crypto/AESUtils.java
ADDED
|
@@ -0,0 +1,182 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.security.SecureRandom;
|
| 3 |
+
|
| 4 |
+
import java.security.spec.KeySpec;
|
| 5 |
+
|
| 6 |
+
import javax.crypto.Cipher;
|
| 7 |
+
import javax.crypto.SecretKeyFactory;
|
| 8 |
+
import javax.crypto.spec.IvParameterSpec;
|
| 9 |
+
import javax.crypto.spec.PBEKeySpec;
|
| 10 |
+
import javax.crypto.spec.SecretKeySpec;
|
| 11 |
+
|
| 12 |
+
import org.apache.commons.codec.binary.Base64;
|
| 13 |
+
import java.security.SecureRandom;
|
| 14 |
+
import java.security.spec.KeySpec;
|
| 15 |
+
import javax.crypto.Cipher;
|
| 16 |
+
import javax.crypto.SecretKeyFactory;
|
| 17 |
+
import javax.crypto.spec.IvParameterSpec;
|
| 18 |
+
import javax.crypto.spec.PBEKeySpec;
|
| 19 |
+
import javax.crypto.spec.SecretKeySpec;
|
| 20 |
+
import org.apache.commons.codec.binary.Base64;
|
| 21 |
+
import java.io.FileNotFoundException;
|
| 22 |
+
import java.io.FileReader;
|
| 23 |
+
import java.io.IOException;
|
| 24 |
+
import java.util.Properties;
|
| 25 |
+
import java.util.Set;
|
| 26 |
+
|
| 27 |
+
/**
|
| 28 |
+
* Encoder/Decoder based on AES.
|
| 29 |
+
*
|
| 30 |
+
* @author Shiv
|
| 31 |
+
*/
|
| 32 |
+
public class AESUtils {
|
| 33 |
+
|
| 34 |
+
// private static final String IV = "F27D5C9927726BCEFE7510B1BDD3D137";
|
| 35 |
+
// private static final String SALT = "3FF2EC019C627B945225DEBAD71A01B6985FE84C95A70EB132882F88C0A59A55";
|
| 36 |
+
// private static final int KEY_SIZE = 128;
|
| 37 |
+
// private static final int ITERATION_COUNT = 10000;
|
| 38 |
+
// private static final String PASSPHRASE = getDecodedPassphrase();
|
| 39 |
+
//
|
| 40 |
+
// private AESUtils() {}
|
| 41 |
+
//
|
| 42 |
+
// protected static String getDecodedPassphrase() {
|
| 43 |
+
// byte[] encodedBytes = { 86, 71, 104, 112, 99, 121, 66, 112, 99, 121, 66, 109, 98, 51, 74, 108, 99, 50, 108, 110, 97,
|
| 44 |
+
// 72, 81, 103, 90, 109, 57, 121, 73, 71, 86, 117, 89, 51, 74, 53, 99, 72, 81, 103, 89, 87, 53, 107, 73, 71, 82,
|
| 45 |
+
// 108, 89, 51, 74, 53, 99, 72, 81, 61 };
|
| 46 |
+
// return new String(Base64.decodeBase64(encodedBytes));
|
| 47 |
+
// }
|
| 48 |
+
//
|
| 49 |
+
// public static String encrypt(String plainText) {
|
| 50 |
+
// AESEncoder util = new AESEncoder(KEY_SIZE, ITERATION_COUNT);
|
| 51 |
+
// return util.encrypt(SALT, IV, PASSPHRASE, plainText);
|
| 52 |
+
// }
|
| 53 |
+
//
|
| 54 |
+
// public static String decrypt(String cipherText) {
|
| 55 |
+
// AESEncoder util = new AESEncoder(KEY_SIZE, ITERATION_COUNT);
|
| 56 |
+
// return util.decrypt(SALT, IV, PASSPHRASE, cipherText);
|
| 57 |
+
// }
|
| 58 |
+
|
| 59 |
+
private static final int KEY_SIZE = 128;
|
| 60 |
+
private static final int ITERATION_COUNT = 10000;
|
| 61 |
+
private static final String CIPHER_ALGORITHM = "AES/CBC/PKCS5Padding";
|
| 62 |
+
private static final String SECRET_KEY_ALGORITHM = "PBKDF2WithHmacSHA256";
|
| 63 |
+
private static final String PASSPHRASE = getDecodedPassphrase();
|
| 64 |
+
|
| 65 |
+
private AESUtils() {}
|
| 66 |
+
|
| 67 |
+
protected static String getDecodedPassphrase() {
|
| 68 |
+
byte[] encodedBytes = { 86, 71, 104, 112, 99, 121, 66, 112, 99, 121, 66, 109, 98, 51, 74, 108, 99, 50, 108, 110, 97,
|
| 69 |
+
72, 81, 103, 90, 109, 57, 121, 73, 71, 86, 117, 89, 51, 74, 53, 99, 72, 81, 103, 89, 87, 53, 107, 73, 71, 82,
|
| 70 |
+
108, 89, 51, 74, 53, 99, 72, 81, 61 };
|
| 71 |
+
return new String(Base64.decodeBase64(encodedBytes));
|
| 72 |
+
}
|
| 73 |
+
|
| 74 |
+
public static String encrypt(String plainText) throws Exception {
|
| 75 |
+
SecureRandom secureRandom = new SecureRandom();
|
| 76 |
+
byte[] iv = new byte[16]; // 16 bytes for a 128-bit AES block size
|
| 77 |
+
byte[] salt = new byte[16];
|
| 78 |
+
secureRandom.nextBytes(iv);
|
| 79 |
+
secureRandom.nextBytes(salt);
|
| 80 |
+
|
| 81 |
+
Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM);
|
| 82 |
+
SecretKeySpec secretKeySpec = generateSecretKeySpec(salt);
|
| 83 |
+
IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
|
| 84 |
+
cipher.init(Cipher.ENCRYPT_MODE, secretKeySpec, ivParameterSpec);
|
| 85 |
+
|
| 86 |
+
byte[] encryptedBytes = cipher.doFinal(plainText.getBytes("UTF-8"));
|
| 87 |
+
|
| 88 |
+
String ivBase64 = Base64.encodeBase64String(iv);
|
| 89 |
+
String saltBase64 = Base64.encodeBase64String(salt);
|
| 90 |
+
String encryptedBase64 = Base64.encodeBase64String(encryptedBytes);
|
| 91 |
+
|
| 92 |
+
// Structuring output as iv:salt:encryptedData
|
| 93 |
+
return ivBase64 + ":" + saltBase64 + ":" + encryptedBase64;
|
| 94 |
+
}
|
| 95 |
+
|
| 96 |
+
public static String decrypt(String cipherText) throws Exception {
|
| 97 |
+
String[] parts = cipherText.split(":");
|
| 98 |
+
if (parts.length != 3) {
|
| 99 |
+
throw new IllegalArgumentException("Invalid encrypted text format");
|
| 100 |
+
}
|
| 101 |
+
|
| 102 |
+
byte[] iv = Base64.decodeBase64(parts[0]);
|
| 103 |
+
byte[] salt = Base64.decodeBase64(parts[1]);
|
| 104 |
+
byte[] encryptedBytes = Base64.decodeBase64(parts[2]);
|
| 105 |
+
|
| 106 |
+
Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM);
|
| 107 |
+
SecretKeySpec secretKeySpec = generateSecretKeySpec(salt);
|
| 108 |
+
IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
|
| 109 |
+
cipher.init(Cipher.DECRYPT_MODE, secretKeySpec, ivParameterSpec);
|
| 110 |
+
|
| 111 |
+
byte[] decryptedBytes = cipher.doFinal(encryptedBytes);
|
| 112 |
+
return new String(decryptedBytes, "UTF-8");
|
| 113 |
+
}
|
| 114 |
+
|
| 115 |
+
private static SecretKeySpec generateSecretKeySpec(byte[] salt) throws Exception {
|
| 116 |
+
KeySpec keySpec = new PBEKeySpec(PASSPHRASE.toCharArray(), salt, ITERATION_COUNT, KEY_SIZE);
|
| 117 |
+
SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance(SECRET_KEY_ALGORITHM);
|
| 118 |
+
byte[] keyBytes = secretKeyFactory.generateSecret(keySpec).getEncoded();
|
| 119 |
+
return new SecretKeySpec(keyBytes, "AES");
|
| 120 |
+
}
|
| 121 |
+
|
| 122 |
+
//public static void main(String[] args) throws Exception
|
| 123 |
+
//{
|
| 124 |
+
//System.out.println("COMMONS_STORAGE_ENDPOINT "+encrypt("jdbc:mysql://mysql-platform-cluster.ansible.svc.cluster.local:6446/PLATFORM?autoReconnect=true&allowPublicKeyRetrieval=true&useSSL=false&noAccessToProcedureBodies=true&disableSslHostnameVerification=true"));
|
| 125 |
+
|
| 126 |
+
//}
|
| 127 |
+
public static void main(String args[]) throws Exception {
|
| 128 |
+
//System.out.println(args.length);
|
| 129 |
+
if (args.length < 2)
|
| 130 |
+
{
|
| 131 |
+
System.out.println("ArrayIndexOutOfBoundsException: 1, For Encrypt use command (sh encodeco.sh e '<input>') | For Decrypt use command (sh encodeco.sh d '<input>') | Note: Input must be in single quote" );
|
| 132 |
+
}
|
| 133 |
+
else if (args[0].toString().equals("e"))
|
| 134 |
+
{
|
| 135 |
+
System.out.println("Encrypted One");
|
| 136 |
+
System.out.println(AESUtils.encrypt(args[1].toString()));
|
| 137 |
+
}
|
| 138 |
+
else if (args[0].toString().equals("d"))
|
| 139 |
+
{
|
| 140 |
+
System.out.println("Decrypted One");
|
| 141 |
+
if(args[1].contains(".properties")) {
|
| 142 |
+
System.out.println("Decrypted file " + args[1]);
|
| 143 |
+
decodePropertiesFile(args[1]);
|
| 144 |
+
}else {
|
| 145 |
+
System.out.println("Decrypted One");
|
| 146 |
+
System.out.println(AESUtils.decrypt(args[1].toString()));
|
| 147 |
+
}
|
| 148 |
+
}
|
| 149 |
+
}
|
| 150 |
+
|
| 151 |
+
|
| 152 |
+
private static void decodePropertiesFile(String file) throws FileNotFoundException, IOException {
|
| 153 |
+
FileReader reader = new FileReader(file);
|
| 154 |
+
|
| 155 |
+
Properties p = new Properties();
|
| 156 |
+
p.load(reader);
|
| 157 |
+
Set s = p.keySet();
|
| 158 |
+
for (Object o : s) {
|
| 159 |
+
String v = (String) p.get(o);
|
| 160 |
+
if (v.contains(",")) {
|
| 161 |
+
String[] s1 = v.split(",");
|
| 162 |
+
for (String s2 : s1) {
|
| 163 |
+
try {
|
| 164 |
+
|
| 165 |
+
|
| 166 |
+
System.out.println(o+"===="+s2+"======="+AESUtils.decrypt(s2.trim()));
|
| 167 |
+
} catch (Exception e) {
|
| 168 |
+
System.out.println(e.getMessage());
|
| 169 |
+
}
|
| 170 |
+
}
|
| 171 |
+
} else {
|
| 172 |
+
|
| 173 |
+
try {
|
| 174 |
+
|
| 175 |
+
System.out.println(o+"===="+v+"========="+AESUtils.decrypt(v.trim()));
|
| 176 |
+
} catch (Exception e) {
|
| 177 |
+
System.out.println(e.getMessage());
|
| 178 |
+
}
|
| 179 |
+
}
|
| 180 |
+
}
|
| 181 |
+
}
|
| 182 |
+
}
|
Crypto/CustomDataSource.class
ADDED
|
Binary file (1.46 kB). View file
|
|
|
Crypto/CustomDataSource.java
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import java.io.IOException;
|
| 2 |
+
|
| 3 |
+
|
| 4 |
+
/**
|
| 5 |
+
* The Class CustomDataSource.
|
| 6 |
+
*/
|
| 7 |
+
public class CustomDataSource extends org.apache.tomcat.jdbc.pool.DataSource {
|
| 8 |
+
|
| 9 |
+
/**
|
| 10 |
+
* Sets the password.
|
| 11 |
+
*
|
| 12 |
+
* @param encodedPassword the new password
|
| 13 |
+
*/
|
| 14 |
+
public synchronized void setPassword(String encodedPassword) {
|
| 15 |
+
this.poolProperties.setPassword(AESUtils.decrypt(encodedPassword));
|
| 16 |
+
}
|
| 17 |
+
|
| 18 |
+
/**
|
| 19 |
+
* Sets the username.
|
| 20 |
+
*
|
| 21 |
+
* @param encodedUsername the new username
|
| 22 |
+
*/
|
| 23 |
+
public synchronized void setUsername(String encodedUsername) {
|
| 24 |
+
this.poolProperties.setUsername(AESUtils.decrypt(encodedUsername));
|
| 25 |
+
}
|
| 26 |
+
|
| 27 |
+
/**
|
| 28 |
+
* Sets the url.
|
| 29 |
+
*
|
| 30 |
+
* @param encodedUrl the new url
|
| 31 |
+
*/
|
| 32 |
+
public synchronized void setUrl(String encodedUrl) {
|
| 33 |
+
this.poolProperties.setUrl(AESUtils.decrypt(encodedUrl));
|
| 34 |
+
}
|
| 35 |
+
|
| 36 |
+
/**
|
| 37 |
+
* The main method.
|
| 38 |
+
*
|
| 39 |
+
* @param args the arguments
|
| 40 |
+
* @throws IOException Signals that an I/O exception has occurred.
|
| 41 |
+
*/
|
| 42 |
+
public static void main(String args[]) throws IOException {
|
| 43 |
+
//System.out.println(args.length);
|
| 44 |
+
if (args.length < 2)
|
| 45 |
+
{
|
| 46 |
+
System.out.println("ArrayIndexOutOfBoundsException: 1, For Encrypt use command (sh encodeco.sh e '<input>') | For Decrypt use command (sh encodeco.sh d '<input>') | Note: Input must be in single quote" );
|
| 47 |
+
}
|
| 48 |
+
else if (args[0].toString().equals("e"))
|
| 49 |
+
{
|
| 50 |
+
System.out.println("Encrypted One");
|
| 51 |
+
System.out.println(AESUtils.encrypt(args[1].toString()));
|
| 52 |
+
}
|
| 53 |
+
else if (args[0].toString().equals("d"))
|
| 54 |
+
{
|
| 55 |
+
System.out.println("Decrypted One");
|
| 56 |
+
System.out.println(AESUtils.decrypt(args[1].toString()));
|
| 57 |
+
}
|
| 58 |
+
}
|
| 59 |
+
}
|
Crypto/com.springsource.org.apache.juli.extras-6.0.24.jar
ADDED
|
Binary file (56.2 kB). View file
|
|
|
Crypto/commons-codec-1.11.jar
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:e599d5318e97aa48f42136a2927e6dfa4e8881dff0e6c8e3109ddbbff51d7b7d
|
| 3 |
+
size 335042
|
Crypto/commons-core-0.7.1.jar
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:4aa1364599e9da6859b50762dd3eda0392f906d7fc9e864e3aaa8a58db4781cd
|
| 3 |
+
size 167397
|
Crypto/encodeco.sh
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
#!/bin/bash
|
| 2 |
+
|
| 3 |
+
JAR_VAR=`echo ./commons-core-0.7.1.jar:./tomcat-jdbc-8.5.32.jar:./com.springsource.org.apache.juli.extras-6.0.24.jar:./commons-codec-1.11.jar:`
|
| 4 |
+
|
| 5 |
+
javac -cp $JAR_VAR AESUtils.java
|
| 6 |
+
java -cp $JAR_VAR AESUtils $1 $2
|
Crypto/modules.fileslist.json
ADDED
|
@@ -0,0 +1,26 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
</head>
|
| 5 |
+
<body onload="document.forms[0].submit()">
|
| 6 |
+
<noscript>
|
| 7 |
+
<p>
|
| 8 |
+
<strong>Note:</strong> Since your browser does not support JavaScript,
|
| 9 |
+
you must press the Continue button once to proceed.
|
| 10 |
+
</p>
|
| 11 |
+
</noscript>
|
| 12 |
+
|
| 13 |
+
<form action="https://fos.rmb-ss.jp/masterAuth/SingleSignOnService?redirectUrl=SP_FORESIGHT" method="post">
|
| 14 |
+
<div>
|
| 15 |
+
|
| 16 |
+
<input type="hidden" name="SAMLRequest" value="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"/>
|
| 17 |
+
|
| 18 |
+
</div>
|
| 19 |
+
<noscript>
|
| 20 |
+
<div>
|
| 21 |
+
<input type="submit" value="Continue"/>
|
| 22 |
+
</div>
|
| 23 |
+
</noscript>
|
| 24 |
+
</form>
|
| 25 |
+
</body>
|
| 26 |
+
</html>
|
Crypto/modules.fileslist.json.1
ADDED
|
@@ -0,0 +1,26 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
</head>
|
| 5 |
+
<body onload="document.forms[0].submit()">
|
| 6 |
+
<noscript>
|
| 7 |
+
<p>
|
| 8 |
+
<strong>Note:</strong> Since your browser does not support JavaScript,
|
| 9 |
+
you must press the Continue button once to proceed.
|
| 10 |
+
</p>
|
| 11 |
+
</noscript>
|
| 12 |
+
|
| 13 |
+
<form action="https://fos.rmb-ss.jp/masterAuth/SingleSignOnService?redirectUrl=SP_FORESIGHT" method="post">
|
| 14 |
+
<div>
|
| 15 |
+
|
| 16 |
+
<input type="hidden" name="SAMLRequest" value="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"/>
|
| 17 |
+
|
| 18 |
+
</div>
|
| 19 |
+
<noscript>
|
| 20 |
+
<div>
|
| 21 |
+
<input type="submit" value="Continue"/>
|
| 22 |
+
</div>
|
| 23 |
+
</noscript>
|
| 24 |
+
</form>
|
| 25 |
+
</body>
|
| 26 |
+
</html>
|
Crypto/modules.fileslist.json.2
ADDED
|
@@ -0,0 +1,26 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
</head>
|
| 5 |
+
<body onload="document.forms[0].submit()">
|
| 6 |
+
<noscript>
|
| 7 |
+
<p>
|
| 8 |
+
<strong>Note:</strong> Since your browser does not support JavaScript,
|
| 9 |
+
you must press the Continue button once to proceed.
|
| 10 |
+
</p>
|
| 11 |
+
</noscript>
|
| 12 |
+
|
| 13 |
+
<form action="https://fos.rmb-ss.jp/masterAuth/SingleSignOnService?redirectUrl=SP_FORESIGHT" method="post">
|
| 14 |
+
<div>
|
| 15 |
+
|
| 16 |
+
<input type="hidden" name="SAMLRequest" value="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"/>
|
| 17 |
+
|
| 18 |
+
</div>
|
| 19 |
+
<noscript>
|
| 20 |
+
<div>
|
| 21 |
+
<input type="submit" value="Continue"/>
|
| 22 |
+
</div>
|
| 23 |
+
</noscript>
|
| 24 |
+
</form>
|
| 25 |
+
</body>
|
| 26 |
+
</html>
|
Crypto/tomcat-jdbc-8.5.32.jar
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:a03117ea3035996400d99e68c80727e774d81c2bbe586ba6919c693450b2f4de
|
| 3 |
+
size 148296
|