Author: schultz
Date: Sat Jan  5 20:52:28 2019
New Revision: 1850508

URL: http://svn.apache.org/viewvc?rev=1850508&view=rev
Log:
Back-port EncryptInterceptor from Tomcat 9.0.x/trunk.

Added:
    
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
   (contents, props changed)
      - copied, changed from r1845157, 
tomcat/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
    
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptorMBean.java
   (props changed)
      - copied unchanged from r1845157, 
tomcat/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptorMBean.java
    
tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
   (contents, props changed)
      - copied, changed from r1845157, 
tomcat/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
Modified:
    tomcat/tc8.5.x/trunk/   (props changed)
    
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/LocalStrings.properties
    tomcat/tc8.5.x/trunk/webapps/docs/changelog.xml
    tomcat/tc8.5.x/trunk/webapps/docs/config/cluster-interceptor.xml

Propchange: tomcat/tc8.5.x/trunk/
------------------------------------------------------------------------------
--- svn:mergeinfo (original)
+++ svn:mergeinfo Sat Jan  5 20:52:28 2019
@@ -1,2 +1,2 @@
 /tomcat/tc8.0.x/trunk:1809644
-/tomcat/trunk:1734785,1734799,1734845,1734928,1735041,1735044,1735480,1735577,1735597,1735599-1735600,1735615,1736145,1736162,1736209,1736280,1736297,1736299,1736489,1736646,1736703,1736836,1736849,1737104-1737105,1737112,1737117,1737119-1737120,1737155,1737157,1737192,1737280,1737339,1737632,1737664,1737715,1737748,1737785,1737834,1737860,1737903,1737959,1738005,1738007,1738014-1738015,1738018,1738022,1738039,1738043,1738059-1738060,1738147,1738149,1738174-1738175,1738261,1738589,1738623-1738625,1738643,1738816,1738850,1738855,1738946-1738948,1738953-1738954,1738979,1738982,1739079-1739081,1739087,1739113,1739153,1739172,1739176,1739191,1739474,1739492,1739726,1739762,1739775,1739814,1739817-1739818,1739975,1740131,1740324,1740465,1740495,1740508-1740509,1740520,1740535,1740707,1740803,1740810,1740969,1740980,1740991,1740997,1741015,1741033,1741036,1741058,1741060,1741080,1741147,1741159,1741164,1741173,1741181,1741190,1741197,1741202,1741208,1741213,1741221,1741225,1741232,1741409
 
,1741501,1741677,1741892,1741896,1741984,1742023,1742042,1742071,1742090,1742093,1742101,1742105,1742111,1742139,1742146,1742148,1742166,1742181,1742184,1742187,1742246,1742248-1742251,1742263-1742264,1742268,1742276,1742369,1742387,1742448,1742509-1742512,1742917,1742919,1742933,1742975-1742976,1742984,1742986,1743019,1743115,1743117,1743124-1743125,1743134,1743425,1743554,1743679,1743696-1743698,1743700-1743701,1744058,1744064-1744065,1744125,1744149,1744194,1744229,1744270,1744323,1744432,1744684,1744697,1744705,1744713,1744760,1744786,1745083,1745142-1745143,1745145,1745177,1745179-1745180,1745227,1745248,1745254,1745337,1745467,1745473,1745535,1745576,1745735,1745744,1746304,1746306-1746307,1746319,1746327,1746338,1746340-1746341,1746344,1746427,1746441,1746473,1746490,1746492,1746495-1746496,1746499-1746501,1746503-1746507,1746509,1746549,1746551,1746554,1746556,1746558,1746584,1746620,1746649,1746724,1746939,1746989,1747014,1747028,1747035,1747210,1747225,1747234,1747253,1747
 
404,1747506,1747536,1747924,1747980,1747993,1748001,1748253,1748452,1748547,1748629,1748676,1748715,1749287,1749296,1749328,1749373,1749465,1749506,1749508,1749665-1749666,1749763,1749865-1749866,1749898,1749978,1749980,1750011,1750015,1750056,1750480,1750617,1750634,1750692,1750697,1750700,1750703,1750707,1750714,1750718,1750723,1750774,1750899,1750975,1750995,1751061,1751097,1751173,1751438,1751447,1751463,1751702,1752212,1752737,1752745,1753078,1753080,1753358,1753363,1754111,1754140-1754141,1754281,1754310,1754445,1754467,1754494,1754496,1754528,1754532-1754533,1754613,1754714,1754874,1754941,1754944,1754950-1754951,1755005,1755007,1755009,1755132,1755180-1755181,1755185,1755190,1755204-1755206,1755208,1755214,1755224,1755227,1755230,1755629,1755646-1755647,1755650,1755653,1755675,1755680,1755683,1755693,1755717,1755731-1755737,1755812,1755828,1755884,1755890,1755918-1755919,1755942,1755958,1755960,1755970,1755993,1756013,1756019,1756039,1756056,1756083-1756114,1756175,1756288-1
 
756289,1756408-1756410,1756778,1756798,1756878,1756898,1756939,1757123-1757124,1757126,1757128,1757132-1757133,1757136,1757145,1757167-1757168,1757175,1757180,1757182,1757195,1757271,1757278,1757347,1757353-1757354,1757363,1757374,1757399,1757406,1757408,1757485,1757495,1757499,1757527,1757578,1757684,1757722,1757727,1757790,1757799,1757813,1757853,1757883,1757903,1757976,1757997,1758000,1758058,1758072-1758075,1758078-1758079,1758223,1758257,1758261,1758276,1758292,1758369,1758378-1758383,1758421,1758423,1758425-1758427,1758430,1758443,1758448,1758459,1758483,1758486-1758487,1758499,1758525,1758556,1758580,1758582,1758584,1758588,1758842,1759019,1759212,1759224,1759227,1759252,1759274,1759513-1759516,1759611,1759757,1759785-1759790,1760005,1760022,1760109-1760110,1760135,1760200-1760201,1760227,1760300,1760397,1760446,1760454,1760640,1760648,1761057,1761422,1761491,1761498,1761500-1761501,1761550,1761553,1761572,1761574,1761625-1761626,1761628,1761682,1761740,1761752,1762051-176205
 
3,1762123,1762168,1762172,1762182,1762201-1762202,1762204,1762208,1762288,1762296,1762324,1762348,1762353,1762362,1762374,1762492,1762503,1762505,1762541,1762608,1762710,1762753,1762766,1762769,1762944,1762947,1762953,1763167,1763179,1763232,1763259,1763271-1763272,1763276-1763277,1763319-1763320,1763370,1763372,1763375,1763377,1763393,1763412,1763430,1763450,1763462,1763505,1763511-1763512,1763516,1763518,1763520,1763529,1763559,1763565,1763568,1763574,1763619,1763634-1763635,1763718,1763748,1763786,1763798-1763799,1763810,1763813,1763815,1763819,1763831,1764083,1764425,1764646,1764648-1764649,1764659,1764663,1764682,1764862,1764866-1764867,1764870,1764897,1765133,1765299,1765358,1765439,1765447,1765495,1765502,1765569-1765571,1765579,1765582,1765589-1765590,1765794,1765801,1765813,1765815,1766276,1766514,1766533,1766535,1766664,1766675,1766698,1766700,1766822,1766834,1766840,1767047,1767328,1767362,1767368,1767429,1767471,1767505,1767636,1767641-1767644,1767903,1767945-1767946,176
 
8123,1768283,1768520,1768569,1768651,1768762,1768922,1769191,1769263,1769630,1769833,1769975,1770047,1770140,1770180,1770258,1770389,1770656,1770666,1770718,1770762,1770952,1770954,1770956,1770961,1771087,1771126,1771139,1771143,1771149,1771156,1771226,1771266,1771316,1771386,1771611,1771613,1771711,1771718,1771723-1771724,1771730,1771743,1771752,1771853,1771963,1772170,1772174,1772223,1772229,1772318-1772319,1772353,1772355,1772554,1772603-1772609,1772849,1772865,1772870,1772872,1772875-1772876,1772881,1772886,1772947,1773306,1773344,1773418,1773756,1773813-1773814,1774052,1774102,1774131,1774161,1774164,1774248,1774253,1774257,1774259,1774262,1774267,1774271,1774303,1774340,1774406,1774412,1774426,1774433,1774522-1774523,1774526,1774528-1774529,1774531,1774732-1774736,1774738-1774739,1774741-1774742,1774749,1774755,1774789,1774858,1774867,1775596,1775985-1775986,1776540,1776937,1776954,1777011,1777173,1777189,1777211,1777524,1777546,1777605,1777619,1777647,1777721-1777722,1777967,
 
1778061,1778138-1778139,1778141-1778150,1778154,1778275-1778276,1778295,1778342,1778348,1778404,1778424,1778426,1778575,1778582,1778600,1778603,1779312,1779370,1779545,1779612,1779622,1779641,1779654,1779708,1779718,1779897,1779899,1779932,1780109,1780120,1780189,1780196,1780488,1780514-1780516,1780601,1780606,1780609-1780610,1780652,1780991,1780995-1780996,1781174,1781569,1781975,1781986,1782116,1782383-1782384,1782566,1782572,1782775,1782779,1782814,1782857,1782868,1782934,1782946-1782947,1782956,1783144-1783147,1783155,1783408,1784182,1784565,1784583,1784657,1784669,1784712,1784723,1784751,1784767,1784806,1784818,1784911,1784926,1784956,1784963,1785032,1785037,1785245,1785271,1785310,1785317,1785643,1785667,1785762,1785774,1785823,1785935,1786051,1786070,1786123-1786124,1786127,1786129,1786341,1786378,1786844,1787200,1787250,1787405,1787662,1787701,1787703,1787938,1787959,1787973,1788223-1788224,1788228,1788232,1788241-1788242,1788248,1788323,1788328,1788455,1788460,1788473,17885
 
43-1788544,1788548,1788550,1788554,1788558,1788560,1788567,1788569,1788572,1788647,1788732,1788741,1788747,1788753,1788764,1788771,1788834,1788841,1788852,1788860,1788883,1788890,1789051,1789400,1789415,1789442-1789443,1789447,1789453,1789456,1789458,1789461-1789463,1789465-1789467,1789470,1789472,1789474,1789476,1789479-1789480,1789685,1789733,1789735,1789744-1789745,1789937,1789984,1790119,1790180,1790183,1790213,1790376,1790443,1790614,1790983,1790991,1791027-1791028,1791050,1791090,1791095-1791096,1791099,1791101-1791103,1791124,1791129,1791134,1791137,1791298,1791527,1791557,1791970,1792033,1792038,1792055,1792093,1792140,1792460,1792468,1792791,1792957,1793095,1793121,1793123,1793127,1793136,1793139,1793147-1793148,1793266,1793437,1793449,1793460,1793468,1793487,1793498,1793502,1793514,1793682-1793683,1793711-1793712,1793716,1793719,1793736,1793746,1793758,1793771,1793776,1793798,1793802,1793812,1793819,1793844,1793854,1793887,1793891,1793898,1793901-1793902,1793907,1793910,17
 
93980,1794556,1794674,1794684,1794752,1794941-1794942,1795278,1795289,1795298,1795305,1795813,1795893,1796090,1796275,1796693-1796695,1796729,1796806,1796836,1796873,1796878,1797197,1797338,1797344,1797354-1797355,1797516,1797528,1797532,1797536,1797540,1797543,1797677-1797678,1797692,1797694,1797748,1797828,1798126,1798238,1798280,1798371,1798379,1798384,1798390,1798395,1798419,1798505,1798507,1798509,1798533,1798546,1798561,1798977,1799115,1799126,1799164,1799190,1799194,1799216,1799231,1799250,1799253,1799285,1799368,1799412,1799498,1799514-1799515,1799677,1799701-1799702,1799704,1799709,1799885,1799893,1799895,1799916,1800136-1800138,1800202,1800309,1800390,1800617,1800629,1800791,1800816,1800850,1800864,1800867,1800874,1800885,1800980-1800981,1800984,1800988,1800992,1801195,1801686,1801688,1801709,1801717,1801774,1801778,1802083,1802195,1802204-1802205,1802210,1802225-1802226,1802229,1802403,1802475,1802490,1802788,1802796,1802803,1802820,1802828,1802833,1802836,1803030,1803038
 
,1803055,1803135,1803165,1803174,1803193,1803205,1803224,1803278,1803281,1803295,1803297,1803446,1803451,1803456,1803459,1803616,1803636,1803828,1803901,1803972,1804040,1804094,1804306,1804407,1804461-1804463,1804501,1804506-1804507,1804754,1804813,1804856,1804888,1804890,1804903-1804908,1804915,1804917,1805523-1805530,1805550,1805612-1805613,1805637,1805645,1805652,1805726,1805752,1805782,1805826,1806307,1806356,1806445,1806736,1806794,1806798,1806801,1806807,1806873,1806966,1806973,1807004,1807093,1807135,1807205-1807206,1807237,1807242,1807251,1807282,1807455,1807686,1807698,1807713,1807715,1807729,1807742,1807747,1807751,1807755,1808116,1808156,1808266,1808433,1808438-1808439,1808466,1808481-1808482,1808695,1808701,1808761,1808766,1809011,1809025,1809141,1809143-1809144,1809146,1809158,1809212,1809214,1809239,1809248,1809263,1809265,1809317,1809434,1809669,1809671,1809674,1809684,1809711,1809828,1809830,1809908-1809909,1809922,1810106,1810110,1810280,1810300,1811031,1811119,1811
 
122,1811132,1811137,1811139,1811174,1811176,1811198-1811201,1811203-1811206,1811220,1811235,1811246,1811327-1811329,1811350,1811560,1811704,1811837-1811839,1811861,1811932,1812087-1812088,1812092,1812094,1812103,1812107,1812113,1812129,1812134-1812136,1812184,1812315,1812401,1812489,1812513,1812617,1813919,1814192,1814195,1814567,1814825,1814973,1814980,1815066,1815069,1815208,1815215,1815318-1815319,1815325,1815385,1815429,1815441-1815442,1815451,1815459,1815465,1815505,1815615,1815778,1815786,1815790,1815793,1815800,1815802,1815806,1815826,1815829,1815834,1815840,1815903,1815944,1815954,1816076,1816078,1816083,1816087,1816120,1816128,1816140,1816147,1816157,1816338,1816431,1816443,1816538,1816541,1816545,1816549-1816550,1816563,1816570,1816647,1816695-1816704,1816716,1816780,1816887,1817089,1817092,1817096,1817104,1817126,1817136-1817137,1817196,1817223,1817298,1817305,1817495,1817517,1817520,1817965,1817997,1817999-1818001,1818004,1818127,1818179,1818184,1818438,1818711,1818919,1
 
818976,1819054,1819057,1819061,1819063,1819068,1819070-1819071,1819074,1819077,1819148,1819903,1820003,1820005,1820138,1820153,1820194,1820196-1820197,1820202,1820206,1820222,1820265,1820272,1820276,1820279,1820281,1820302,1820634,1820701,1820705,1820932,1820981,1820994,1821157,1821167,1821197-1821203,1821225,1821234-1821235,1821251-1821252,1821293,1821328,1821381,1821490,1821708,1821932,1822001,1822016,1822109,1822111,1822116,1822150,1822232,1822524,1822644,1822775,1822945-1822946,1823006-1823007,1823102,1823111,1823150,1823161,1823262,1823306,1823310,1823337,1823481,1823483,1823492,1823495,1823540,1823620,1824154,1824201,1824228,1824254,1824263,1824297,1824301,1824311,1824323,1824357,1824766,1824774,1824892,1824901,1824959,1825054,1825516,1825519,1825713,1825738,1825872,1825909,1825943,1825987,1826048,1826111,1826115,1826209,1826361,1826375,1826688,1826731,1826794,1826812,1826817,1826825,1826867,1826869,1826958,1826975,1826977,1826979,1826985-1826986,1827150,1827203-1827204,182722
 
3,1827297,1827299,1827363,1827368,1827396,1827408,1827428,1827479,1827491,1827498,1827860,1828016,1828223-1828239,1828253,1828262,1828545,1828551,1828565,1828946,1829082,1829084,1829086,1829276,1829355,1829364,1829366,1829830,1829879,1829915,1829924,1829934,1829990-1829991,1830013,1830051,1830068,1830087,1830325,1830336,1830341,1830367,1830373,1830378,1830549,1830669-1830670,1830764-1830765,1830772,1830802,1830861,1830864,1830989,1830999-1831001,1831251,1831256,1831262,1831333,1831338,1831341-1831342,1831389,1831410,1831439,1831483,1831486,1831556,1831568,1831573,1831691,1831718,1831726,1831763,1831828,1831985,1832017,1832124-1832125,1832127,1832129,1832160,1832163,1832193,1832262,1832455,1832518-1832519,1832525-1832526,1832545,1832554,1832572,1832592,1832596,1832602,1832619,1832665,1832692,1832696,1832704,1832707,1832744,1832843,1832856,1832882,1832925,1832965,1833001,1833016,1833062,1833071,1833737,1833757,1833768-1833770,1833794-1833800,1833825,1833831,1833906,1833915,1833918,183
 
3982,1833989,1833994,1834001,1834003,1834011,1834020,1834058,1834080,1834195,1834197-1834198,1834354,1834356,1834411,1834542,1834548,1834550,1834559,1834672,1834689,1834703,1834860,1834877,1835085,1835193-1835194,1835229,1835246,1835261,1835263-1835264,1835269-1835271,1835413,1835416,1835421,1835427,1835429,1835431,1835435,1835438,1835458,1835465,1835543,1835622,1835639,1835831,1835844,1836102,1836738,1836949,1837044,1837133,1837156,1837176,1837300,1837510-1837511,1837520,1837523,1837530,1837551,1837554,1837581,1837613,1837637,1837726,1837731,1837734-1837737,1837746,1837786-1837788,1837809-1837810,1837818,1837865,1837871-1837872,1837878,1837895,1838028,1838100,1838104,1838106-1838107,1838155,1838163,1838188,1838243,1838275,1838277,1838279,1838281,1838286,1838400,1838433,1838473,1838492,1838494,1838502,1838925,1838942,1839057,1839237,1839239,1839575,1839604,1839737,1839741,1839752,1839765,1839922,1839955,1839960,1839977,1839983-1839984,1840055,1840059,1840062,1840099,1840264,1840279,
 
1840535,1840634,1840641,1840653,1840655,1840681,1840706-1840707,1840709,1840712,1840737,1840747,1840759,1840763-1840764,1840812,1840817,1840922,1841069,1841347,1841445,1841746,1841757,1841893,1842203,1842656,1842658-1842659,1842691,1842702,1842706,1842725,1842809,1842816-1842817,1842878,1842950,1843048,1843142,1843314,1843404-1843405,1843428-1843429,1843474,1843536,1843542,1843601,1843630,1843657,1843900,1843991,1844065,1844161-1844162,1844493,1844496-1844497,1844502,1845099,1845210,1845249-1845250,1845338,1845462-1845463,1845465,1845469,1845472,1845489,1845495,1845519,1845573,1845770,1845799,1845893,1845903,1845923,1846236,1846430,1846545,1846551,1846716,1846750,1846753,1846900,1846928,1847015,1847022,1847028,1847097,1847102,1847104,1847472,1847474,1847853,1848046,1848071,1848195,1848240,1848320-1848322,1848330,1848347-1848348,1848415,1848419,1848670,1848675,1848682,1848709,1848795,1848868,1848935,1848959,1848966,1849281,1849310-1849311,1849316,1849473,1850127,1850400,1850403
+/tomcat/trunk:1734785,1734799,1734845,1734928,1735041,1735044,1735480,1735577,1735597,1735599-1735600,1735615,1736145,1736162,1736209,1736280,1736297,1736299,1736489,1736646,1736703,1736836,1736849,1737104-1737105,1737112,1737117,1737119-1737120,1737155,1737157,1737192,1737280,1737339,1737632,1737664,1737715,1737748,1737785,1737834,1737860,1737903,1737959,1738005,1738007,1738014-1738015,1738018,1738022,1738039,1738043,1738059-1738060,1738147,1738149,1738174-1738175,1738261,1738589,1738623-1738625,1738643,1738816,1738850,1738855,1738946-1738948,1738953-1738954,1738979,1738982,1739079-1739081,1739087,1739113,1739153,1739172,1739176,1739191,1739474,1739492,1739726,1739762,1739775,1739814,1739817-1739818,1739975,1740131,1740324,1740465,1740495,1740508-1740509,1740520,1740535,1740707,1740803,1740810,1740969,1740980,1740991,1740997,1741015,1741033,1741036,1741058,1741060,1741080,1741147,1741159,1741164,1741173,1741181,1741190,1741197,1741202,1741208,1741213,1741221,1741225,1741232,1741409
 
,1741501,1741677,1741892,1741896,1741984,1742023,1742042,1742071,1742090,1742093,1742101,1742105,1742111,1742139,1742146,1742148,1742166,1742181,1742184,1742187,1742246,1742248-1742251,1742263-1742264,1742268,1742276,1742369,1742387,1742448,1742509-1742512,1742917,1742919,1742933,1742975-1742976,1742984,1742986,1743019,1743115,1743117,1743124-1743125,1743134,1743425,1743554,1743679,1743696-1743698,1743700-1743701,1744058,1744064-1744065,1744125,1744149,1744194,1744229,1744270,1744323,1744432,1744684,1744697,1744705,1744713,1744760,1744786,1745083,1745142-1745143,1745145,1745177,1745179-1745180,1745227,1745248,1745254,1745337,1745467,1745473,1745535,1745576,1745735,1745744,1746304,1746306-1746307,1746319,1746327,1746338,1746340-1746341,1746344,1746427,1746441,1746473,1746490,1746492,1746495-1746496,1746499-1746501,1746503-1746507,1746509,1746549,1746551,1746554,1746556,1746558,1746584,1746620,1746649,1746724,1746939,1746989,1747014,1747028,1747035,1747210,1747225,1747234,1747253,1747
 
404,1747506,1747536,1747924,1747980,1747993,1748001,1748253,1748452,1748547,1748629,1748676,1748715,1749287,1749296,1749328,1749373,1749465,1749506,1749508,1749665-1749666,1749763,1749865-1749866,1749898,1749978,1749980,1750011,1750015,1750056,1750480,1750617,1750634,1750692,1750697,1750700,1750703,1750707,1750714,1750718,1750723,1750774,1750899,1750975,1750995,1751061,1751097,1751173,1751438,1751447,1751463,1751702,1752212,1752737,1752745,1753078,1753080,1753358,1753363,1754111,1754140-1754141,1754281,1754310,1754445,1754467,1754494,1754496,1754528,1754532-1754533,1754613,1754714,1754874,1754941,1754944,1754950-1754951,1755005,1755007,1755009,1755132,1755180-1755181,1755185,1755190,1755204-1755206,1755208,1755214,1755224,1755227,1755230,1755629,1755646-1755647,1755650,1755653,1755675,1755680,1755683,1755693,1755717,1755731-1755737,1755812,1755828,1755884,1755890,1755918-1755919,1755942,1755958,1755960,1755970,1755993,1756013,1756019,1756039,1756056,1756083-1756114,1756175,1756288-1
 
756289,1756408-1756410,1756778,1756798,1756878,1756898,1756939,1757123-1757124,1757126,1757128,1757132-1757133,1757136,1757145,1757167-1757168,1757175,1757180,1757182,1757195,1757271,1757278,1757347,1757353-1757354,1757363,1757374,1757399,1757406,1757408,1757485,1757495,1757499,1757527,1757578,1757684,1757722,1757727,1757790,1757799,1757813,1757853,1757883,1757903,1757976,1757997,1758000,1758058,1758072-1758075,1758078-1758079,1758223,1758257,1758261,1758276,1758292,1758369,1758378-1758383,1758421,1758423,1758425-1758427,1758430,1758443,1758448,1758459,1758483,1758486-1758487,1758499,1758525,1758556,1758580,1758582,1758584,1758588,1758842,1759019,1759212,1759224,1759227,1759252,1759274,1759513-1759516,1759611,1759757,1759785-1759790,1760005,1760022,1760109-1760110,1760135,1760200-1760201,1760227,1760300,1760397,1760446,1760454,1760640,1760648,1761057,1761422,1761491,1761498,1761500-1761501,1761550,1761553,1761572,1761574,1761625-1761626,1761628,1761682,1761740,1761752,1762051-176205
 
3,1762123,1762168,1762172,1762182,1762201-1762202,1762204,1762208,1762288,1762296,1762324,1762348,1762353,1762362,1762374,1762492,1762503,1762505,1762541,1762608,1762710,1762753,1762766,1762769,1762944,1762947,1762953,1763167,1763179,1763232,1763259,1763271-1763272,1763276-1763277,1763319-1763320,1763370,1763372,1763375,1763377,1763393,1763412,1763430,1763450,1763462,1763505,1763511-1763512,1763516,1763518,1763520,1763529,1763559,1763565,1763568,1763574,1763619,1763634-1763635,1763718,1763748,1763786,1763798-1763799,1763810,1763813,1763815,1763819,1763831,1764083,1764425,1764646,1764648-1764649,1764659,1764663,1764682,1764862,1764866-1764867,1764870,1764897,1765133,1765299,1765358,1765439,1765447,1765495,1765502,1765569-1765571,1765579,1765582,1765589-1765590,1765794,1765801,1765813,1765815,1766276,1766514,1766533,1766535,1766664,1766675,1766698,1766700,1766822,1766834,1766840,1767047,1767328,1767362,1767368,1767429,1767471,1767505,1767636,1767641-1767644,1767903,1767945-1767946,176
 
8123,1768283,1768520,1768569,1768651,1768762,1768922,1769191,1769263,1769630,1769833,1769975,1770047,1770140,1770180,1770258,1770389,1770656,1770666,1770718,1770762,1770952,1770954,1770956,1770961,1771087,1771126,1771139,1771143,1771149,1771156,1771226,1771266,1771316,1771386,1771611,1771613,1771711,1771718,1771723-1771724,1771730,1771743,1771752,1771853,1771963,1772170,1772174,1772223,1772229,1772318-1772319,1772353,1772355,1772554,1772603-1772609,1772849,1772865,1772870,1772872,1772875-1772876,1772881,1772886,1772947,1773306,1773344,1773418,1773756,1773813-1773814,1774052,1774102,1774131,1774161,1774164,1774248,1774253,1774257,1774259,1774262,1774267,1774271,1774303,1774340,1774406,1774412,1774426,1774433,1774522-1774523,1774526,1774528-1774529,1774531,1774732-1774736,1774738-1774739,1774741-1774742,1774749,1774755,1774789,1774858,1774867,1775596,1775985-1775986,1776540,1776937,1776954,1777011,1777173,1777189,1777211,1777524,1777546,1777605,1777619,1777647,1777721-1777722,1777967,
 
1778061,1778138-1778139,1778141-1778150,1778154,1778275-1778276,1778295,1778342,1778348,1778404,1778424,1778426,1778575,1778582,1778600,1778603,1779312,1779370,1779545,1779612,1779622,1779641,1779654,1779708,1779718,1779897,1779899,1779932,1780109,1780120,1780189,1780196,1780488,1780514-1780516,1780601,1780606,1780609-1780610,1780652,1780991,1780995-1780996,1781174,1781569,1781975,1781986,1782116,1782383-1782384,1782566,1782572,1782775,1782779,1782814,1782857,1782868,1782934,1782946-1782947,1782956,1783144-1783147,1783155,1783408,1784182,1784565,1784583,1784657,1784669,1784712,1784723,1784751,1784767,1784806,1784818,1784911,1784926,1784956,1784963,1785032,1785037,1785245,1785271,1785310,1785317,1785643,1785667,1785762,1785774,1785823,1785935,1786051,1786070,1786123-1786124,1786127,1786129,1786341,1786378,1786844,1787200,1787250,1787405,1787662,1787701,1787703,1787938,1787959,1787973,1788223-1788224,1788228,1788232,1788241-1788242,1788248,1788323,1788328,1788455,1788460,1788473,17885
 
43-1788544,1788548,1788550,1788554,1788558,1788560,1788567,1788569,1788572,1788647,1788732,1788741,1788747,1788753,1788764,1788771,1788834,1788841,1788852,1788860,1788883,1788890,1789051,1789400,1789415,1789442-1789443,1789447,1789453,1789456,1789458,1789461-1789463,1789465-1789467,1789470,1789472,1789474,1789476,1789479-1789480,1789685,1789733,1789735,1789744-1789745,1789937,1789984,1790119,1790180,1790183,1790213,1790376,1790443,1790614,1790983,1790991,1791027-1791028,1791050,1791090,1791095-1791096,1791099,1791101-1791103,1791124,1791129,1791134,1791137,1791298,1791527,1791557,1791970,1792033,1792038,1792055,1792093,1792140,1792460,1792468,1792791,1792957,1793095,1793121,1793123,1793127,1793136,1793139,1793147-1793148,1793266,1793437,1793449,1793460,1793468,1793487,1793498,1793502,1793514,1793682-1793683,1793711-1793712,1793716,1793719,1793736,1793746,1793758,1793771,1793776,1793798,1793802,1793812,1793819,1793844,1793854,1793887,1793891,1793898,1793901-1793902,1793907,1793910,17
 
93980,1794556,1794674,1794684,1794752,1794941-1794942,1795278,1795289,1795298,1795305,1795813,1795893,1796090,1796275,1796693-1796695,1796729,1796806,1796836,1796873,1796878,1797197,1797338,1797344,1797354-1797355,1797516,1797528,1797532,1797536,1797540,1797543,1797677-1797678,1797692,1797694,1797748,1797828,1798126,1798238,1798280,1798371,1798379,1798384,1798390,1798395,1798419,1798505,1798507,1798509,1798533,1798546,1798561,1798977,1799115,1799126,1799164,1799190,1799194,1799216,1799231,1799250,1799253,1799285,1799368,1799412,1799498,1799514-1799515,1799677,1799701-1799702,1799704,1799709,1799885,1799893,1799895,1799916,1800136-1800138,1800202,1800309,1800390,1800617,1800629,1800791,1800816,1800850,1800864,1800867,1800874,1800885,1800980-1800981,1800984,1800988,1800992,1801195,1801686,1801688,1801709,1801717,1801774,1801778,1802083,1802195,1802204-1802205,1802210,1802225-1802226,1802229,1802403,1802475,1802490,1802788,1802796,1802803,1802820,1802828,1802833,1802836,1803030,1803038
 
,1803055,1803135,1803165,1803174,1803193,1803205,1803224,1803278,1803281,1803295,1803297,1803446,1803451,1803456,1803459,1803616,1803636,1803828,1803901,1803972,1804040,1804094,1804306,1804407,1804461-1804463,1804501,1804506-1804507,1804754,1804813,1804856,1804888,1804890,1804903-1804908,1804915,1804917,1805523-1805530,1805550,1805612-1805613,1805637,1805645,1805652,1805726,1805752,1805782,1805826,1806307,1806356,1806445,1806736,1806794,1806798,1806801,1806807,1806873,1806966,1806973,1807004,1807093,1807135,1807205-1807206,1807237,1807242,1807251,1807282,1807455,1807686,1807698,1807713,1807715,1807729,1807742,1807747,1807751,1807755,1808116,1808156,1808266,1808433,1808438-1808439,1808466,1808481-1808482,1808695,1808701,1808761,1808766,1809011,1809025,1809141,1809143-1809144,1809146,1809158,1809212,1809214,1809239,1809248,1809263,1809265,1809317,1809434,1809669,1809671,1809674,1809684,1809711,1809828,1809830,1809908-1809909,1809922,1810106,1810110,1810280,1810300,1811031,1811119,1811
 
122,1811132,1811137,1811139,1811174,1811176,1811198-1811201,1811203-1811206,1811220,1811235,1811246,1811327-1811329,1811350,1811560,1811704,1811837-1811839,1811861,1811932,1812087-1812088,1812092,1812094,1812103,1812107,1812113,1812129,1812134-1812136,1812184,1812315,1812401,1812489,1812513,1812617,1813919,1814192,1814195,1814567,1814825,1814973,1814980,1815066,1815069,1815208,1815215,1815318-1815319,1815325,1815385,1815429,1815441-1815442,1815451,1815459,1815465,1815505,1815615,1815778,1815786,1815790,1815793,1815800,1815802,1815806,1815826,1815829,1815834,1815840,1815903,1815944,1815954,1816076,1816078,1816083,1816087,1816120,1816128,1816140,1816147,1816157,1816338,1816431,1816443,1816538,1816541,1816545,1816549-1816550,1816563,1816570,1816647,1816695-1816704,1816716,1816780,1816887,1817089,1817092,1817096,1817104,1817126,1817136-1817137,1817196,1817223,1817298,1817305,1817495,1817517,1817520,1817965,1817997,1817999-1818001,1818004,1818127,1818179,1818184,1818438,1818711,1818919,1
 
818976,1819054,1819057,1819061,1819063,1819068,1819070-1819071,1819074,1819077,1819148,1819903,1820003,1820005,1820138,1820153,1820194,1820196-1820197,1820202,1820206,1820222,1820265,1820272,1820276,1820279,1820281,1820302,1820634,1820701,1820705,1820932,1820981,1820994,1821157,1821167,1821197-1821203,1821225,1821234-1821235,1821251-1821252,1821293,1821328,1821381,1821490,1821708,1821932,1822001,1822016,1822109,1822111,1822116,1822150,1822232,1822524,1822644,1822775,1822945-1822946,1823006-1823007,1823102,1823111,1823150,1823161,1823262,1823306,1823310,1823337,1823481,1823483,1823492,1823495,1823540,1823620,1824154,1824201,1824228,1824254,1824263,1824297,1824301,1824311,1824323,1824357,1824766,1824774,1824892,1824901,1824959,1825054,1825516,1825519,1825713,1825738,1825872,1825909,1825943,1825987,1826048,1826111,1826115,1826209,1826361,1826375,1826688,1826731,1826794,1826812,1826817,1826825,1826867,1826869,1826958,1826975,1826977,1826979,1826985-1826986,1827150,1827203-1827204,182722
 
3,1827297,1827299,1827363,1827368,1827396,1827408,1827428,1827479,1827491,1827498,1827860,1828016,1828223-1828239,1828253,1828262,1828545,1828551,1828565,1828946,1829082,1829084,1829086,1829276,1829355,1829364,1829366,1829830,1829879,1829915,1829924,1829934,1829990-1829991,1830013,1830051,1830068,1830087,1830325,1830336,1830341,1830367,1830373,1830378,1830549,1830669-1830670,1830764-1830765,1830772,1830802,1830861,1830864,1830989,1830999-1831001,1831251,1831256,1831262,1831333,1831338,1831341-1831342,1831389,1831410,1831439,1831483,1831486,1831556,1831568,1831573,1831691,1831718,1831726,1831763,1831828,1831985,1832017,1832124-1832125,1832127,1832129,1832160,1832163,1832193,1832262,1832455,1832518-1832519,1832525-1832526,1832545,1832554,1832572,1832592,1832596,1832602,1832619,1832665,1832692,1832696,1832704,1832707,1832744,1832843,1832856,1832882,1832925,1832965,1833001,1833016,1833062,1833071,1833737,1833757,1833768-1833770,1833794-1833800,1833825,1833831,1833906,1833915,1833918,183
 
3982,1833989,1833994,1834001,1834003,1834011,1834020,1834058,1834080,1834195,1834197-1834198,1834354,1834356,1834411,1834542,1834548,1834550,1834559,1834672,1834689,1834703,1834860,1834877,1835085,1835193-1835194,1835229,1835246,1835261,1835263-1835264,1835269-1835271,1835413,1835416,1835421,1835427,1835429,1835431,1835435,1835438,1835458,1835465,1835543,1835622,1835639,1835831,1835844,1836102,1836738,1836949,1837044,1837133,1837156,1837176,1837300,1837510-1837511,1837520,1837523,1837530,1837551,1837554,1837581,1837613,1837637,1837726,1837731,1837734-1837737,1837746,1837786-1837788,1837809-1837810,1837818,1837865,1837871-1837872,1837878,1837895,1838028,1838100,1838104,1838106-1838107,1838155,1838163,1838188,1838243,1838275,1838277,1838279,1838281,1838286,1838400,1838433,1838473,1838492,1838494,1838502,1838925,1838942,1839057,1839237,1839239,1839575,1839604,1839737,1839741,1839752,1839765,1839922,1839955,1839960,1839977,1839983-1839984,1840055,1840059,1840062,1840099,1840264,1840279,
 
1840535,1840634,1840641,1840653,1840655,1840681,1840706-1840707,1840709,1840712,1840737,1840747,1840759,1840763-1840764,1840812,1840817,1840922,1841069,1841347,1841445,1841746,1841757,1841893,1842203,1842656,1842658-1842659,1842691,1842702,1842706,1842725,1842809,1842816-1842817,1842878,1842950,1843048,1843142,1843314,1843404-1843405,1843428-1843429,1843474,1843536,1843542,1843601,1843630,1843657,1843900,1843991,1844065,1844161-1844162,1844493,1844496-1844497,1844502,1845099,1845157-1845163,1845203,1845205,1845210,1845249-1845250,1845257,1845338,1845462-1845463,1845465,1845469,1845472,1845489,1845495,1845519,1845573,1845770,1845799,1845893,1845903,1845923,1846058,1846236,1846430,1846545,1846551,1846716,1846750,1846753,1846900,1846928,1847015,1847022,1847028,1847041,1847097,1847102,1847104,1847107,1847118,1847123,1847144,1847153,1847318,1847320,1847323,1847326,1847412,1847414-1847417,1847472,1847474,1847504,1847853-1847854,1848046,1848071,1848195,1848240,1848320-1848322,1848330,18483
 
47-1848348,1848415,1848419,1848670,1848675,1848682,1848709,1848795,1848868,1848935,1848959,1848966,1849281,1849310-1849311,1849316,1849473,1850127,1850400,1850403,1850506

Copied: 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
 (from r1845157, 
tomcat/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java)
URL: 
http://svn.apache.org/viewvc/tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java?p2=tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java&p1=tomcat/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java&r1=1845157&r2=1850508&rev=1850508&view=diff
==============================================================================
--- 
tomcat/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
 (original)
+++ 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
 Sat Jan  5 20:52:28 2019
@@ -17,16 +17,21 @@
 package org.apache.catalina.tribes.group.interceptors;
 
 import java.security.GeneralSecurityException;
+import java.security.NoSuchAlgorithmException;
+import java.security.NoSuchProviderException;
 import java.security.SecureRandom;
+import java.security.spec.AlgorithmParameterSpec;
+import java.util.concurrent.ConcurrentLinkedQueue;
 
-import javax.crypto.BadPaddingException;
 import javax.crypto.Cipher;
-import javax.crypto.IllegalBlockSizeException;
+import javax.crypto.NoSuchPaddingException;
+import javax.crypto.spec.GCMParameterSpec;
 import javax.crypto.spec.IvParameterSpec;
 import javax.crypto.spec.SecretKeySpec;
 
 import org.apache.catalina.tribes.Channel;
 import org.apache.catalina.tribes.ChannelException;
+import org.apache.catalina.tribes.ChannelInterceptor;
 import org.apache.catalina.tribes.ChannelMessage;
 import org.apache.catalina.tribes.Member;
 import org.apache.catalina.tribes.group.ChannelInterceptorBase;
@@ -35,7 +40,7 @@ import org.apache.catalina.tribes.io.XBy
 import org.apache.catalina.tribes.util.StringManager;
 import org.apache.juli.logging.Log;
 import org.apache.juli.logging.LogFactory;
-import org.apache.tomcat.util.buf.HexUtils;
+
 
 /**
  * Adds encryption using a pre-shared key.
@@ -58,20 +63,24 @@ public class EncryptInterceptor extends
     private String providerName;
     private String encryptionAlgorithm = DEFAULT_ENCRYPTION_ALGORITHM;
     private byte[] encryptionKeyBytes;
+    private String encryptionKeyString;
+
 
-    private Cipher encryptionCipher;
-    private Cipher decryptionCipher;
+    private BaseEncryptionManager encryptionManager;
 
     public EncryptInterceptor() {
     }
 
     @Override
     public void start(int svc) throws ChannelException {
+        validateChannelChain();
+
         if(Channel.SND_TX_SEQ == (svc & Channel.SND_TX_SEQ)) {
             try {
-                initCiphers();
+                encryptionManager = 
createEncryptionManager(getEncryptionAlgorithm(),
+                        getEncryptionKeyInternal(),
+                        getProviderName());
             } catch (GeneralSecurityException gse) {
-                log.fatal(sm.getString("encryptInterceptor.init.failed"));
                 throw new 
ChannelException(sm.getString("encryptInterceptor.init.failed"), gse);
             }
         }
@@ -79,6 +88,25 @@ public class EncryptInterceptor extends
         super.start(svc);
     }
 
+    private void validateChannelChain() throws ChannelException {
+        ChannelInterceptor interceptor = getPrevious();
+        while(null != interceptor) {
+            if(interceptor instanceof TcpFailureDetector)
+                throw new 
ChannelConfigException(sm.getString("encryptInterceptor.tcpFailureDetector.ordering"));
+
+            interceptor = interceptor.getPrevious();
+        }
+    }
+
+    @Override
+    public void stop(int svc) throws ChannelException {
+        if(Channel.SND_TX_SEQ == (svc & Channel.SND_TX_SEQ)) {
+            encryptionManager.shutdown();
+        }
+
+        super.stop(svc);
+    }
+
     @Override
     public void sendMessage(Member[] destination, ChannelMessage msg, 
InterceptorPayload payload)
             throws ChannelException {
@@ -86,23 +114,20 @@ public class EncryptInterceptor extends
             byte[] data = msg.getMessage().getBytes();
 
             // See #encrypt(byte[]) for an explanation of the return value
-            byte[][] bytes = encrypt(data);
+            byte[][] bytes = encryptionManager.encrypt(data);
 
             XByteBuffer xbb = msg.getMessage();
 
             // Completely replace the message
-            xbb.setLength(0);
+            xbb.clear();
             xbb.append(bytes[0], 0, bytes[0].length);
             xbb.append(bytes[1], 0, bytes[1].length);
 
             super.sendMessage(destination, msg, payload);
 
-        } catch (IllegalBlockSizeException ibse) {
-            log.error(sm.getString("encryptInterceptor.encrypt.failed"));
-            throw new ChannelException(ibse);
-        } catch (BadPaddingException bpe) {
+        } catch (GeneralSecurityException gse) {
             log.error(sm.getString("encryptInterceptor.encrypt.failed"));
-            throw new ChannelException(bpe);
+            throw new ChannelException(gse);
         }
     }
 
@@ -111,40 +136,32 @@ public class EncryptInterceptor extends
         try {
             byte[] data = msg.getMessage().getBytes();
 
-            data = decrypt(data);
-
-            // Remove the decrypted IV/nonce block from the front of the 
message
-            int blockSize = getDecryptionCipher().getBlockSize();
-            int trimmedSize = data.length - blockSize;
-            if(trimmedSize < 0) {
-                
log.error(sm.getString("encryptInterceptor.decrypt.error.short-message"));
-                throw new 
IllegalStateException(sm.getString("encryptInterceptor.decrypt.error.short-message"));
-            }
+            data = encryptionManager.decrypt(data);
 
             XByteBuffer xbb = msg.getMessage();
 
             // Completely replace the message with the decrypted one
-            xbb.setLength(0);
-            xbb.append(data, blockSize, data.length - blockSize);
+            xbb.clear();
+            xbb.append(data, 0, data.length);
 
             super.messageReceived(msg);
-        } catch (IllegalBlockSizeException ibse) {
-            log.error(sm.getString("encryptInterceptor.decrypt.failed"), ibse);
-        } catch (BadPaddingException bpe) {
-            log.error(sm.getString("encryptInterceptor.decrypt.failed"), bpe);
+        } catch (GeneralSecurityException gse) {
+            log.error(sm.getString("encryptInterceptor.decrypt.failed"), gse);
         }
     }
 
     /**
      * Sets the encryption algorithm to be used for encrypting and decrypting
      * channel messages. You must specify the 
<code>algorithm/mode/padding</code>.
-     * Information on what standard algorithm names are, please see
-     * {@link 
https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html}.
+     * Information on standard algorithm names may be found in the
+     * <a 
href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html";>Java
+     * documentation</a>.
      *
      * Default is <code>AES/CBC/PKCS5Padding</code>.
      *
      * @param algorithm The algorithm to use.
      */
+    @Override
     public void setEncryptionAlgorithm(String algorithm) {
         if(null == getEncryptionAlgorithm())
             throw new 
IllegalStateException(sm.getString("encryptInterceptor.algorithm.required"));
@@ -165,6 +182,7 @@ public class EncryptInterceptor extends
      *
      * @return The algorithm being used, including the algorithm mode and 
padding.
      */
+    @Override
     public String getEncryptionAlgorithm() {
         return encryptionAlgorithm;
     }
@@ -175,11 +193,13 @@ public class EncryptInterceptor extends
      *
      * @param key The encryption key.
      */
+    @Override
     public void setEncryptionKey(byte[] key) {
-        if(null == key)
-            key = null;
-        else
+        if (null == key) {
+            encryptionKeyBytes = null;
+        } else {
             encryptionKeyBytes = key.clone();
+        }
     }
 
     /**
@@ -188,13 +208,15 @@ public class EncryptInterceptor extends
      * will be shown as "ab". The length of the string in characters will
      * be twice the length of the key in bytes.
      *
-     * @return The encryption key.
+     * @param keyBytes The encryption key.
      */
     public void setEncryptionKey(String keyBytes) {
-        if(null == keyBytes)
+        this.encryptionKeyString = keyBytes;
+        if (null == keyBytes) {
             setEncryptionKey((byte[])null);
-        else
-            setEncryptionKey(HexUtils.fromHexString(keyBytes.trim()));
+        } else {
+            setEncryptionKey(fromHexString(keyBytes.trim()));
+        }
     }
 
     /**
@@ -202,6 +224,7 @@ public class EncryptInterceptor extends
      *
      * @return The encryption key.
      */
+    @Override
     public byte[] getEncryptionKey() {
         byte[] key = getEncryptionKeyInternal();
 
@@ -215,6 +238,14 @@ public class EncryptInterceptor extends
         return encryptionKeyBytes;
     }
 
+    public String getEncryptionKeyString() {
+        return encryptionKeyString;
+    }
+
+    public void setEncryptionKeyString(String encryptionKeyString) {
+        setEncryptionKey(encryptionKeyString);
+    }
+
     /**
      * Sets the JCA provider name used for cryptographic activities.
      *
@@ -222,6 +253,7 @@ public class EncryptInterceptor extends
      *
      * @param provider The name of the JCA provider.
      */
+    @Override
     public void setProviderName(String provider) {
         providerName = provider;
     }
@@ -233,124 +265,375 @@ public class EncryptInterceptor extends
      *
      * @return The name of the JCA provider.
      */
+    @Override
     public String getProviderName() {
         return providerName;
     }
 
-    private void initCiphers() throws GeneralSecurityException {
-        if(null == getEncryptionKey())
-            throw new 
IllegalStateException(sm.getString("encryptInterceptor.key.required"));
+    // Copied from org.apache.tomcat.util.buf.HexUtils
 
-        String algorithm = getEncryptionAlgorithm();
+    private static final int[] DEC = {
+        00, 01, 02, 03, 04, 05, 06, 07,  8,  9, -1, -1, -1, -1, -1, -1,
+        -1, 10, 11, 12, 13, 14, 15, -1, -1, -1, -1, -1, -1, -1, -1, -1,
+        -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
+        -1, 10, 11, 12, 13, 14, 15,
+    };
 
-        String mode = getAlgorithmMode(algorithm);
 
-        if(!"CBC".equalsIgnoreCase(mode))
-            throw new 
IllegalArgumentException(sm.getString("encryptInterceptor.algorithm.requires-cbc-mode",
 mode));
+    private static int getDec(int index) {
+        // Fast for correct values, slower for incorrect ones
+        try {
+            return DEC[index - '0'];
+        } catch (ArrayIndexOutOfBoundsException ex) {
+            return -1;
+        }
+    }
 
-        Cipher cipher;
 
-        String providerName = getProviderName();
-        if(null == providerName) {
-            cipher = Cipher.getInstance(algorithm);
-        } else {
-            cipher = Cipher.getInstance(algorithm, getProviderName());
+    private static byte[] fromHexString(String input) {
+        if (input == null) {
+            return null;
         }
 
-        byte[] iv = new byte[cipher.getBlockSize()];
+        if ((input.length() & 1) == 1) {
+            // Odd number of characters
+            throw new 
IllegalArgumentException(sm.getString("hexUtils.fromHex.oddDigits"));
+        }
 
-        // Always use a random IV For cipher setup.
-        // The recipient doesn't need the (matching) IV because we will always
-        // pre-pad messages with the IV as a nonce.
-        new SecureRandom().nextBytes(iv);
+        char[] inputChars = input.toCharArray();
+        byte[] result = new byte[input.length() >> 1];
+        for (int i = 0; i < result.length; i++) {
+            int upperNibble = getDec(inputChars[2*i]);
+            int lowerNibble =  getDec(inputChars[2*i + 1]);
+            if (upperNibble < 0 || lowerNibble < 0) {
+                // Non hex character
+                throw new 
IllegalArgumentException(sm.getString("hexUtils.fromHex.nonHex"));
+            }
+            result[i] = (byte) ((upperNibble << 4) + lowerNibble);
+        }
+        return result;
+    }
 
-        IvParameterSpec IV = new IvParameterSpec(iv);
+    private static BaseEncryptionManager createEncryptionManager(String 
algorithm,
+            byte[] encryptionKey, String providerName)
+        throws NoSuchAlgorithmException, NoSuchPaddingException, 
NoSuchProviderException {
+        if(null == encryptionKey)
+            throw new 
IllegalStateException(sm.getString("encryptInterceptor.key.required"));
+
+        String algorithmName;
+        String algorithmMode;
 
-        // If this is a cipher transform of the form ALGO/MODE/PAD,
+        // We need to break-apart the algorithm name e.g. AES/CBC/PKCS5Padding
         // take just the algorithm part.
         int pos = algorithm.indexOf('/');
 
-        String bareAlgorithm;
         if(pos >= 0) {
-            bareAlgorithm = algorithm.substring(0, pos);
+            algorithmName = algorithm.substring(0, pos);
+            int pos2 = algorithm.indexOf('/', pos+1);
+
+            if(pos2 >= 0) {
+                algorithmMode = algorithm.substring(pos + 1, pos2);
+            } else {
+                algorithmMode = "CBC";
+            }
         } else {
-            bareAlgorithm = algorithm;
+            algorithmName  = algorithm;
+            algorithmMode = "CBC";
         }
 
-        SecretKeySpec encryptionKey = new SecretKeySpec(getEncryptionKey(), 
bareAlgorithm);
+        if("GCM".equalsIgnoreCase(algorithmMode))
+            return new GCMEncryptionManager(algorithm, new 
SecretKeySpec(encryptionKey, algorithmName), providerName);
+        else if("CBC".equalsIgnoreCase(algorithmMode)
+                || "OFB".equalsIgnoreCase(algorithmMode)
+                || "CFB".equalsIgnoreCase(algorithmMode))
+            return new BaseEncryptionManager(algorithm,
+                    new SecretKeySpec(encryptionKey, algorithmName),
+                    providerName);
+//        else if("ECB".equalsIgnoreCase(algorithmMode)) {
+            // Note: ECB is not an appropriate mode for secure communications.
+//            return new ECBEncryptionManager(algorithm, new 
SecretKeySpec(encryptionKey, algorithmName), providerName);
+        else
+            throw new 
IllegalArgumentException(sm.getString("encryptInterceptor.algorithm.unsupported-mode",
 algorithmMode));
+    }
 
-        cipher.init(Cipher.ENCRYPT_MODE, encryptionKey, IV);
+    private static class BaseEncryptionManager {
+        /**
+         * The fully-specified algorithm e.g. AES/CBC/PKCS5Padding.
+         */
+        private final String algorithm;
+
+        /**
+         * The block size of the cipher.
+         */
+        private final int blockSize;
+
+        /**
+         * The cryptographic provider name.
+         */
+        private final String providerName;
+
+        /**
+         * The secret key to use for encryption and decryption operations.
+         */
+        private final SecretKeySpec secretKey;
+
+        /**
+         * A pool of Cipher objects. Ciphers are expensive to create, but not
+         * to re-initialize, so we use a pool of them which grows as necessary.
+         */
+        private final ConcurrentLinkedQueue<Cipher> cipherPool;
+
+        /**
+         * A pool of SecureRandom objects. Each encrypt operation requires 
access
+         * to a source of randomness. SecureRandom is thread-safe, but sharing 
a
+         * single instance will likely be a bottleneck.
+         */
+        private final ConcurrentLinkedQueue<SecureRandom> randomPool;
+
+        public BaseEncryptionManager(String algorithm, SecretKeySpec 
secretKey, String providerName)
+            throws NoSuchAlgorithmException, NoSuchPaddingException, 
NoSuchProviderException {
+            this.algorithm = algorithm;
+            this.providerName = providerName;
+            this.secretKey = secretKey;
+
+            cipherPool = new ConcurrentLinkedQueue<>();
+            Cipher cipher = createCipher();
+            blockSize = cipher.getBlockSize();
+            cipherPool.offer(cipher);
+            randomPool = new ConcurrentLinkedQueue<>();
+        }
 
-        encryptionCipher = cipher;
+        public void shutdown() {
+            // Individual Cipher and SecureRandom objects need no explicit 
teardown
+            cipherPool.clear();
+            randomPool.clear();
+        }
 
-        if(null == providerName) {
-            cipher = Cipher.getInstance(algorithm);
-        } else {
-            cipher = Cipher.getInstance(algorithm, getProviderName());
+        private String getAlgorithm() {
+            return algorithm;
         }
 
-        cipher.init(Cipher.DECRYPT_MODE, encryptionKey, new 
IvParameterSpec(iv));
+        private SecretKeySpec getSecretKey() {
+            return secretKey;
+        }
 
-        decryptionCipher = cipher;
-    }
+        /**
+         * Gets the size, in bytes, of the initialization vector for the
+         * cipher being used. The IV size is often, but not always, the block
+         * size for the cipher.
+         *
+         * @return The size of the initialization vector for this algorithm.
+         */
+        protected int getIVSize() {
+            return blockSize;
+        }
 
-    private Cipher getEncryptionCipher() {
-        return encryptionCipher;
-    }
+        private String getProviderName() {
+            return providerName;
+        }
 
-    private Cipher getDecryptionCipher() {
-        return decryptionCipher;
-    }
+        private Cipher createCipher()
+            throws NoSuchAlgorithmException, NoSuchPaddingException, 
NoSuchProviderException {
+            String providerName = getProviderName();
+
+            if(null == providerName) {
+                return Cipher.getInstance(getAlgorithm());
+            } else {
+                return Cipher.getInstance(getAlgorithm(), providerName);
+            }
+        }
 
-    private static String getAlgorithmMode(String algorithm) {
-        int start = algorithm.indexOf('/');
-        if(start < 0)
-            throw new 
IllegalArgumentException(sm.getString("encryptInterceptor.algorithm.required"));
-        int end = algorithm.indexOf('/', start + 1);
-        if(start < 0)
-            throw new 
IllegalArgumentException(sm.getString("encryptInterceptor.algorithm.required"));
+        private Cipher getCipher() throws GeneralSecurityException {
+            Cipher cipher = cipherPool.poll();
+
+            if(null == cipher) {
+                cipher = createCipher();
+            }
+
+            return cipher;
+        }
+
+        private void returnCipher(Cipher cipher) {
+            cipherPool.offer(cipher);
+        }
+
+        private SecureRandom getRandom() {
+            SecureRandom random = randomPool.poll();
+
+            if(null == random) {
+                random = new SecureRandom();
+            }
+
+            return random;
+        }
+
+        private void returnRandom(SecureRandom random) {
+            randomPool.offer(random);
+        }
+
+        /**
+         * Encrypts the input <code>bytes</code> into two separate byte arrays:
+         * one for the random initialization vector (IV) used for this message,
+         * and the second one containing the actual encrypted payload.
+         *
+         * This method returns a pair of byte arrays instead of a single
+         * concatenated one to reduce the number of byte buffers created
+         * and copied during the whole operation -- including message 
re-building.
+         *
+         * @param bytes The data to encrypt.
+         *
+         * @return The IV in [0] and the encrypted data in [1].
+         *
+         * @throws GeneralSecurityException If the input data cannot be 
encrypted.
+         */
+        private byte[][] encrypt(byte[] bytes) throws GeneralSecurityException 
{
+            Cipher cipher = null;
+
+            // Always use a random IV For cipher setup.
+            // The recipient doesn't need the (matching) IV because we will 
always
+            // pre-pad messages with the IV as a nonce.
+            byte[] iv = generateIVBytes();
+
+            try {
+                cipher = getCipher();
+                cipher.init(Cipher.ENCRYPT_MODE, getSecretKey(), 
generateIV(iv, 0, getIVSize()));
+
+                // Prepend the IV to the beginning of the encrypted data
+                byte[][] data = new byte[2][];
+                data[0] = iv;
+                data[1] = cipher.doFinal(bytes);
+
+                return data;
+            } finally {
+                if(null != cipher)
+                    returnCipher(cipher);
+            }
+        }
+
+        /**
+         * Decrypts the input <code>bytes</code>.
+         *
+         * @param bytes The data to decrypt.
+         *
+         * @return The decrypted data.
+         *
+         * @throws GeneralSecurityException If the input data cannot be 
decrypted.
+         */
+        private byte[] decrypt(byte[] bytes) throws GeneralSecurityException {
+            Cipher cipher = null;
+
+            int ivSize = getIVSize();
+            AlgorithmParameterSpec IV = generateIV(bytes, 0, ivSize);
+
+            try {
+                cipher = getCipher();
+
+                cipher.init(Cipher.DECRYPT_MODE, getSecretKey(), IV);
+
+                // Decrypt remainder of the message.
+                return cipher.doFinal(bytes, ivSize, bytes.length - ivSize);
+            } finally {
+                if(null != cipher)
+                    returnCipher(cipher);
+            }
+        }
+
+        protected byte[] generateIVBytes() {
+            byte[] ivBytes = new byte[getIVSize()];
 
-        return algorithm.substring(start + 1, end);
+            SecureRandom random = null;
+
+            try {
+                random = getRandom();
+
+                // Always use a random IV For cipher setup.
+                // The recipient doesn't need the (matching) IV because we 
will always
+                // pre-pad messages with the IV as a nonce.
+                random.nextBytes(ivBytes);
+
+                return ivBytes;
+            } finally {
+                if(null != random)
+                    returnRandom(random);
+            }
+        }
+
+        protected AlgorithmParameterSpec generateIV(byte[] ivBytes, int 
offset, int length) {
+            return new IvParameterSpec(ivBytes, offset, length);
+        }
     }
 
     /**
-     * Encrypts the input <code>bytes</code> into two separate byte arrays:
-     * one for the initial block (which will be the encrypted random IV)
-     * and the second one containing the actual encrypted payload.
-     *
-     * This method returns a pair of byte arrays instead of a single
-     * concatenated one to reduce the number of byte buffers created
-     * and copied during the whole operation -- including message re-building.
+     * Implements an EncryptionManager for using GCM block cipher modes.
      *
-     * @param bytes The data to encrypt.
-     *
-     * @return The encrypted IV block in [0] and the encrypted data in [1].
-     *
-     * @throws GeneralSecurityException If there is a problem performing the 
encryption.
+     * GCM works a little differently than some of the other block cipher modes
+     * supported by EncryptInterceptor. First of all, it requires a different
+     * kind of AlgorithmParameterSpec object to be used, and second, it
+     * requires a slightly different initialization vector and something called
+     * an "authentication tag".
+     *
+     * The choice of IV length can be somewhat arbitrary, but there is 
consensus
+     * that 96-bit (12-byte) IVs for GCM are the best trade-off between 
security
+     * and performance. For other block cipher modes, IV length is the same as
+     * the block size.
+     *
+     * The "authentication tag" is a computed authentication value based upon
+     * the message and the encryption process. GCM defines these tags as the
+     * number of bits to use for the authentication tag, and it's clear that
+     * the highest number of bits supported 128-bit provide the best security.
      */
-    private byte[][] encrypt(byte[] bytes) throws IllegalBlockSizeException, 
BadPaddingException {
-        Cipher cipher = getEncryptionCipher();
+    private static class GCMEncryptionManager extends BaseEncryptionManager
+    {
+        public GCMEncryptionManager(String algorithm, SecretKeySpec secretKey, 
String providerName)
+                throws NoSuchAlgorithmException, NoSuchPaddingException, 
NoSuchProviderException {
+            super(algorithm, secretKey, providerName);
+        }
 
-        // Adding the IV to the beginning of the encrypted data
-        byte[] iv = cipher.getIV();
+        @Override
+        protected int getIVSize() {
+            return 12; // See class javadoc for explanation of this magic 
number (12)
+        }
 
-        byte[][] data = new byte[2][];
-        data[0] = cipher.update(iv, 0, iv.length);
-        data[1] = cipher.doFinal(bytes);
+        @Override
+        protected AlgorithmParameterSpec generateIV(byte[] bytes, int offset, 
int length) {
+            // See class javadoc for explanation of this magic number (128)
+            return new GCMParameterSpec(128, bytes, offset, length);
+        }
+    }
 
-        return data;
+    @SuppressWarnings("unused")
+    private static class ECBEncryptionManager extends BaseEncryptionManager
+    {
+        public ECBEncryptionManager(String algorithm, SecretKeySpec secretKey, 
String providerName)
+                throws NoSuchAlgorithmException, NoSuchPaddingException, 
NoSuchProviderException {
+            super(algorithm, secretKey, providerName);
+        }
+
+        private static final byte[] EMPTY_IV = new byte[0];
+
+        @Override
+        protected int getIVSize() {
+            return 0;
+        }
+
+        @Override
+        protected byte[] generateIVBytes() {
+            return EMPTY_IV;
+        }
+
+        @Override
+        protected AlgorithmParameterSpec generateIV(byte[] bytes, int offset, 
int length) {
+            return null;
+        }
     }
 
-    /**
-     * Decrypts the input <code>bytes</code>.
-     *
-     * @param bytes The data to decrypt.
-     *
-     * @return The decrypted data.
-     *
-     * @throws GeneralSecurityException If there is a problem performing the 
decryption.
-     */
-    private byte[] decrypt(byte[] bytes) throws IllegalBlockSizeException, 
BadPaddingException {
-        return getDecryptionCipher().doFinal(bytes);
+    static class ChannelConfigException
+        extends ChannelException
+    {
+        private static final long serialVersionUID = 1L;
+
+        public ChannelConfigException(String message) {
+            super(message);
+        }
     }
 }

Propchange: 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptor.java
------------------------------------------------------------------------------
    svn:eol-style = native

Propchange: 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/EncryptInterceptorMBean.java
------------------------------------------------------------------------------
    svn:eol-style = native

Modified: 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/LocalStrings.properties
URL: 
http://svn.apache.org/viewvc/tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/LocalStrings.properties?rev=1850508&r1=1850507&r2=1850508&view=diff
==============================================================================
--- 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/LocalStrings.properties
 (original)
+++ 
tomcat/tc8.5.x/trunk/java/org/apache/catalina/tribes/group/interceptors/LocalStrings.properties
 Sat Jan  5 20:52:28 2019
@@ -15,6 +15,14 @@
 
 domainFilterInterceptor.message.refused=Received message from cluster[{0}] was 
refused.
 domainFilterInterceptor.member.refused=Member was refused to join cluster[{0}]
+encryptInterceptor.algorithm.required=Encryption algorithm is required, 
fully-specified e.g. AES/CBC/PKCS5Padding
+encryptInterceptor.algorithm.unsupported-mode=EncryptInterceptor does not 
support block cipher mode [{0}]
+encryptInterceptor.decrypt.error.short-message=Failed to decrypt message: 
premature end-of-message
+encryptInterceptor.decrypt.failed=Failed to decrypt message
+encryptInterceptor.encrypt.failed=Failed to encrypt message
+encryptInterceptor.init.failed=Failed to initialize EncryptInterceptor
+encryptInterceptor.key.required=Encryption key is required
+encryptInterceptor.tcpFailureDetector.ordering=EncryptInterceptor must be 
upstream of TcpFailureDetector. Please re-order EncryptInterceptor to be listed 
before TcpFailureDetector in your channel interceptor pipeline. 
 fragmentationInterceptor.heartbeat.failed=Unable to perform heartbeat clean up 
in the frag interceptor
 fragmentationInterceptor.fragments.missing=Fragments are missing.
 gzipInterceptor.compress.failed=Unable to compress byte contents
@@ -60,4 +68,4 @@ throughputInterceptor.report=ThroughputI
   \n\tRx Speed:{8} MB/sec (since 1st msg)\
   \n\tReceived:{9} MB]\n
 twoPhaseCommitInterceptor.originalMessage.missing=Received a confirmation, but 
original message is missing. Id:[{0}]
-twoPhaseCommitInterceptor.heartbeat.failed=Unable to perform heartbeat on the 
TwoPhaseCommit interceptor.
\ No newline at end of file
+twoPhaseCommitInterceptor.heartbeat.failed=Unable to perform heartbeat on the 
TwoPhaseCommit interceptor.

Copied: 
tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
 (from r1845157, 
tomcat/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java)
URL: 
http://svn.apache.org/viewvc/tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java?p2=tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java&p1=tomcat/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java&r1=1845157&r2=1850508&rev=1850508&view=diff
==============================================================================
--- 
tomcat/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
 (original)
+++ 
tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
 Sat Jan  5 20:52:28 2019
@@ -1,8 +1,38 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
 package org.apache.catalina.tribes.group.interceptors;
 
-import static org.junit.Assert.*;
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
+import java.util.ArrayList;
+import java.util.Collection;
+
+import org.hamcrest.core.IsEqual;
+import org.hamcrest.core.IsNot;
+
+import org.junit.AfterClass;
+import org.junit.Assert;
+import org.junit.Before;
+import org.junit.FixMethodOrder;
+import org.junit.Ignore;
+import org.junit.Test;
+import org.junit.runners.MethodSorters;
 
-import java.nio.charset.StandardCharsets;
 import org.apache.catalina.tribes.Channel;
 import org.apache.catalina.tribes.ChannelException;
 import org.apache.catalina.tribes.ChannelInterceptor;
@@ -12,9 +42,6 @@ import org.apache.catalina.tribes.group.
 import org.apache.catalina.tribes.group.InterceptorPayload;
 import org.apache.catalina.tribes.io.ChannelData;
 import org.apache.catalina.tribes.io.XByteBuffer;
-import org.apache.tomcat.util.buf.HexUtils;
-import org.junit.Before;
-import org.junit.Test;
 
 /**
  * Tests the EncryptInterceptor.
@@ -23,14 +50,26 @@ import org.junit.Test;
  * though the interceptor actually operates on byte arrays. This is done
  * for readability for the tests and their outputs.
  */
+@FixMethodOrder(MethodSorters.NAME_ASCENDING)
 public class TestEncryptInterceptor {
-    private static final String encryptionKey128 = 
HexUtils.toHexString("cafebabedeadbeef".getBytes(StandardCharsets.UTF_8));
-    private static final String encryptionKey192 = 
HexUtils.toHexString("cafebabedeadbeefbeefcafe".getBytes(StandardCharsets.UTF_8));
-    private static final String encryptionKey256 = 
HexUtils.toHexString("cafebabedeadbeefcafebabedeadbeef".getBytes(StandardCharsets.UTF_8));
+    private static final String MESSAGE_FILE = "message.bin";
+
+    private static final String encryptionKey128 = 
"cafebabedeadbeefbeefcafecafebabe";
+    private static final String encryptionKey192 = 
"cafebabedeadbeefbeefcafecafebabedeadbeefbeefcafe";
+    private static final String encryptionKey256 = 
"cafebabedeadbeefcafebabedeadbeefcafebabedeadbeefcafebabedeadbeef";
 
     EncryptInterceptor src;
     EncryptInterceptor dest;
 
+
+    @AfterClass
+    public static void cleanup() {
+        File f = new File(MESSAGE_FILE);
+        if (f.isFile()) {
+            Assert.assertTrue(f.delete());
+        }
+    }
+
     @Before
     public void setup() {
         src = new EncryptInterceptor();
@@ -50,9 +89,37 @@ public class TestEncryptInterceptor {
 
         String testInput = "The quick brown fox jumps over the lazy dog.";
 
-        assertEquals("Basic roundtrip failed",
+        Assert.assertEquals("Basic roundtrip failed",
+                     testInput,
+                     roundTrip(testInput, src, dest));
+    }
+
+    @Test
+    public void testMultipleMessages() throws Exception {
+        src.start(Channel.SND_TX_SEQ);
+        dest.start(Channel.SND_TX_SEQ);
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        Assert.assertEquals("Basic roundtrip failed",
                      testInput,
                      roundTrip(testInput, src, dest));
+
+        Assert.assertEquals("Second roundtrip failed",
+                testInput,
+                roundTrip(testInput, src, dest));
+
+        Assert.assertEquals("Third roundtrip failed",
+                testInput,
+                roundTrip(testInput, src, dest));
+
+        Assert.assertEquals("Fourth roundtrip failed",
+                testInput,
+                roundTrip(testInput, src, dest));
+
+        Assert.assertEquals("Fifth roundtrip failed",
+                testInput,
+                roundTrip(testInput, src, dest));
     }
 
     @Test
@@ -62,19 +129,32 @@ public class TestEncryptInterceptor {
 
         String testInput = "x";
 
-        assertEquals("Tiny payload roundtrip failed",
+        Assert.assertEquals("Tiny payload roundtrip failed",
                      testInput,
                      roundTrip(testInput, src, dest));
     }
 
     @Test
+    public void testLargePayload() throws Exception {
+        src.start(Channel.SND_TX_SEQ);
+        dest.start(Channel.SND_TX_SEQ);
+
+        byte[] bytes = new byte[1024*1024];
+
+        Assert.assertArrayEquals("Huge payload roundtrip failed",
+                          bytes,
+                          roundTrip(bytes, src, dest));
+    }
+
+    @Test
+    @Ignore("Too big for default settings. Breaks Gump, Eclipse, ...")
     public void testHugePayload() throws Exception {
         src.start(Channel.SND_TX_SEQ);
         dest.start(Channel.SND_TX_SEQ);
 
-        byte[] bytes = new byte[1073741824]; // 1MiB, all zeros
+        byte[] bytes = new byte[1024*1024*1024];
 
-        assertArrayEquals("Tiny payload roundtrip failed",
+        Assert.assertArrayEquals("Huge payload roundtrip failed",
                           bytes,
                           roundTrip(bytes, src, dest));
     }
@@ -88,7 +168,7 @@ public class TestEncryptInterceptor {
 
         String testInput = "The quick brown fox jumps over the lazy dog.";
 
-        assertEquals("Failed to set custom provider name",
+        Assert.assertEquals("Failed to set custom provider name",
                      testInput,
                      roundTrip(testInput, src, dest));
     }
@@ -102,7 +182,7 @@ public class TestEncryptInterceptor {
 
         String testInput = "The quick brown fox jumps over the lazy dog.";
 
-        assertEquals("Failed to set custom provider name",
+        Assert.assertEquals("Failed to set custom provider name",
                      testInput,
                      roundTrip(testInput, src, dest));
     }
@@ -116,7 +196,7 @@ public class TestEncryptInterceptor {
 
         String testInput = "The quick brown fox jumps over the lazy dog.";
 
-        assertEquals("Failed to set custom provider name",
+        Assert.assertEquals("Failed to set custom provider name",
                      testInput,
                      roundTrip(testInput, src, dest));
     }
@@ -129,7 +209,7 @@ public class TestEncryptInterceptor {
 
         bytes = roundTrip(bytes, src, dest);
 
-        return new 
String(((ValueCaptureInterceptor)dest.getPrevious()).getValue(), "UTF-8");
+        return new String(bytes, "UTF-8");
     }
 
     /**
@@ -143,6 +223,229 @@ public class TestEncryptInterceptor {
         return ((ValueCaptureInterceptor)dest.getPrevious()).getValue();
     }
 
+    @Test
+    @Ignore("ECB mode isn't implemented because it's insecure")
+    public void testECB() throws Exception {
+        src.setEncryptionAlgorithm("AES/ECB/PKCS5Padding");
+        src.start(Channel.SND_TX_SEQ);
+        dest.setEncryptionAlgorithm("AES/ECB/PKCS5Padding");
+        dest.start(Channel.SND_TX_SEQ);
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        Assert.assertEquals("Failed in ECB mode",
+                     testInput,
+                     roundTrip(testInput, src, dest));
+    }
+
+    @Test
+    public void testOFB() throws Exception {
+        src.setEncryptionAlgorithm("AES/OFB/PKCS5Padding");
+        src.start(Channel.SND_TX_SEQ);
+        dest.setEncryptionAlgorithm("AES/OFB/PKCS5Padding");
+        dest.start(Channel.SND_TX_SEQ);
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        Assert.assertEquals("Failed in OFB mode",
+                     testInput,
+                     roundTrip(testInput, src, dest));
+    }
+
+    @Test
+    public void testCFB() throws Exception {
+        src.setEncryptionAlgorithm("AES/CFB/PKCS5Padding");
+        src.start(Channel.SND_TX_SEQ);
+        dest.setEncryptionAlgorithm("AES/CFB/PKCS5Padding");
+        dest.start(Channel.SND_TX_SEQ);
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        Assert.assertEquals("Failed in CFB mode",
+                     testInput,
+                     roundTrip(testInput, src, dest));
+    }
+
+    @Test
+    public void testGCM() throws Exception {
+        src.setEncryptionAlgorithm("AES/GCM/PKCS5Padding");
+        src.start(Channel.SND_TX_SEQ);
+        dest.setEncryptionAlgorithm("AES/GCM/PKCS5Padding");
+        dest.start(Channel.SND_TX_SEQ);
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        Assert.assertEquals("Failed in GCM mode",
+                     testInput,
+                     roundTrip(testInput, src, dest));
+    }
+
+    @Test
+    public void testIllegalECB() throws Exception {
+        try {
+            src.setEncryptionAlgorithm("AES/ECB/PKCS5Padding");
+            src.start(Channel.SND_TX_SEQ);
+
+            // start() should trigger IllegalArgumentException
+            Assert.fail("ECB mode is not being refused");
+        } catch (IllegalArgumentException iae) {
+            // Expected
+        }
+    }
+
+    @Test
+    public void testViaFile() throws Exception {
+        src.start(Channel.SND_TX_SEQ);
+        src.setNext(new ValueCaptureInterceptor());
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        ChannelData msg = new ChannelData(false);
+        msg.setMessage(new XByteBuffer(testInput.getBytes("UTF-8"), false));
+        src.sendMessage(null, msg, null);
+
+        byte[] bytes = ((ValueCaptureInterceptor)src.getNext()).getValue();
+
+        try (FileOutputStream out = new FileOutputStream(MESSAGE_FILE)) {
+            out.write(bytes);
+        }
+
+        dest.start(Channel.SND_TX_SEQ);
+
+        bytes = new byte[8192];
+        int read;
+
+        try (FileInputStream in = new FileInputStream(MESSAGE_FILE)) {
+            read = in.read(bytes);
+        }
+
+        msg = new ChannelData(false);
+        XByteBuffer xbb = new XByteBuffer(read, false);
+        xbb.append(bytes, 0, read);
+        msg.setMessage(xbb);
+
+        dest.messageReceived(msg);
+    }
+
+    @Test
+    public void testMessageUniqueness() throws Exception {
+        src.start(Channel.SND_TX_SEQ);
+        src.setNext(new ValueCaptureInterceptor());
+
+        String testInput = "The quick brown fox jumps over the lazy dog.";
+
+        ChannelData msg = new ChannelData(false);
+        msg.setMessage(new XByteBuffer(testInput.getBytes("UTF-8"), false));
+        src.sendMessage(null, msg, null);
+
+        byte[] cipherText1 = 
((ValueCaptureInterceptor)src.getNext()).getValue();
+
+        msg.setMessage(new XByteBuffer(testInput.getBytes("UTF-8"), false));
+        src.sendMessage(null, msg, null);
+
+        byte[] cipherText2 = 
((ValueCaptureInterceptor)src.getNext()).getValue();
+
+        Assert.assertThat("Two identical cleartexts encrypt to the same 
ciphertext",
+                cipherText1, IsNot.not(IsEqual.equalTo(cipherText2)));
+    }
+
+    @Test
+    public void testPickup() throws Exception {
+        File file = new File(MESSAGE_FILE);
+        if(!file.exists()) {
+            System.err.println("File message.bin does not exist. Skipping 
test.");
+            return;
+        }
+
+        dest.start(Channel.SND_TX_SEQ);
+
+        byte[] bytes = new byte[8192];
+        int read;
+
+        try (FileInputStream in = new FileInputStream(file)) {
+            read = in.read(bytes);
+        }
+
+        ChannelData msg = new ChannelData(false);
+        XByteBuffer xbb = new XByteBuffer(read, false);
+        xbb.append(bytes, 0, read);
+        msg.setMessage(xbb);
+
+        dest.messageReceived(msg);
+    }
+
+    /*
+     * This test isn't guaranteed to catch any multithreaded issues, but it
+     * gives a good exercise.
+     */
+    @Test
+    public void testMultithreaded() throws Exception {
+        String inputValue = "A test string to fight over.";
+        final byte[] bytes = inputValue.getBytes("UTF-8");
+        int numThreads = 100;
+        final int messagesPerThread = 10;
+
+        dest.setPrevious(new ValuesCaptureInterceptor());
+
+        src.start(Channel.SND_TX_SEQ);
+        dest.start(Channel.SND_TX_SEQ);
+
+        Runnable job = new Runnable() {
+            @Override
+            public void run() {
+                try {
+                    ChannelData msg = new ChannelData(false);
+                    XByteBuffer xbb = new XByteBuffer(1024, false);
+                    xbb.append(bytes, 0, bytes.length);
+                    msg.setMessage(xbb);
+
+                    for(int i=0; i<messagesPerThread; ++i)
+                        src.sendMessage(null, msg, null);
+                } catch (ChannelException e) {
+                    Assert.fail("Encountered exception sending messages: " + 
e.getMessage());
+                }
+            }
+        };
+
+        Thread[] threads = new Thread[numThreads];
+        for(int i=0; i<numThreads; ++i) {
+            threads[i] = new Thread(job);
+            threads[i].setName("Message-Thread-" + i);
+        }
+
+        for(int i=0; i<numThreads; ++i)
+            threads[i].start();
+
+        for(int i=0; i<numThreads; ++i)
+            threads[i].join();
+
+        // Check all received messages to make sure they are not corrupted
+        Collection<byte[]> messages = 
((ValuesCaptureInterceptor)dest.getPrevious()).getValues();
+
+        Assert.assertEquals("Did not receive all expected messages",
+                numThreads * messagesPerThread, messages.size());
+
+        for(byte[] message : messages)
+            Assert.assertArrayEquals("Message is corrupted", message, bytes);
+    }
+
+    @Test
+    public void testTcpFailureDetectorDetection() {
+        src.setPrevious(new TcpFailureDetector());
+
+        try {
+            src.start(Channel.SND_TX_SEQ);
+            Assert.fail("EncryptInterceptor should detect TcpFailureDetector 
and throw an error");
+        } catch (EncryptInterceptor.ChannelConfigException cce) {
+            // Expected behavior
+        } catch (AssertionError ae) {
+            // This is the junit assertion being thrown
+            throw ae;
+        } catch (Throwable t) {
+            Assert.fail("EncryptionInterceptor should throw 
ChannelConfigException, not " + t.getClass().getName());
+        }
+    }
+
     /**
      * Interceptor that delivers directly to a destination.
      */
@@ -188,4 +491,33 @@ public class TestEncryptInterceptor {
             return value;
         }
     }
+
+    /**
+     * Interceptor that simply captures all messages sent to or received by it.
+     */
+    private static class ValuesCaptureInterceptor
+        extends ChannelInterceptorBase
+    {
+        private ArrayList<byte[]> messages = new ArrayList<>();
+
+        @Override
+        public void sendMessage(Member[] destination, ChannelMessage msg, 
InterceptorPayload payload)
+                throws ChannelException {
+            synchronized(messages) {
+                messages.add(msg.getMessage().getBytes());
+            }
+        }
+
+        @Override
+        public void messageReceived(ChannelMessage msg) {
+            synchronized(messages) {
+                messages.add(msg.getMessage().getBytes());
+            }
+        }
+
+        @SuppressWarnings("unchecked")
+        public Collection<byte[]> getValues() {
+            return (Collection<byte[]>)messages.clone();
+        }
+    }
 }

Propchange: 
tomcat/tc8.5.x/trunk/test/org/apache/catalina/tribes/group/interceptors/TestEncryptInterceptor.java
------------------------------------------------------------------------------
    svn:eol-style = native

Modified: tomcat/tc8.5.x/trunk/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc8.5.x/trunk/webapps/docs/changelog.xml?rev=1850508&r1=1850507&r2=1850508&view=diff
==============================================================================
--- tomcat/tc8.5.x/trunk/webapps/docs/changelog.xml (original)
+++ tomcat/tc8.5.x/trunk/webapps/docs/changelog.xml Sat Jan  5 20:52:28 2019
@@ -214,6 +214,16 @@
       </fix>
     </changelog>
   </subsection>
+  <subsection name="Tribes">
+    <changelog>
+      <add>
+        Add EncryptInterceptor to the portfolio of available clustering
+        interceptors. This adds symmetric encryption of session data
+        to Tomcat clustering regardless of the type of cluster manager
+        or membership being used. (schultz)
+      </add>
+    </changelog>
+  </subsection>
   <subsection name="Other">
     <changelog>
       <fix>

Modified: tomcat/tc8.5.x/trunk/webapps/docs/config/cluster-interceptor.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc8.5.x/trunk/webapps/docs/config/cluster-interceptor.xml?rev=1850508&r1=1850507&r2=1850508&view=diff
==============================================================================
--- tomcat/tc8.5.x/trunk/webapps/docs/config/cluster-interceptor.xml (original)
+++ tomcat/tc8.5.x/trunk/webapps/docs/config/cluster-interceptor.xml Sat Jan  5 
20:52:28 2019
@@ -36,7 +36,7 @@
 <section name="Introduction">
   <p>
   Apache Tribes supports an interceptor architecture to intercept both 
messages and membership notifications.
-  This architecture allows decoupling of logic and opens the way for some very 
kewl feature add ons.
+  This architecture allows decoupling of logic and opens the way for some very 
useful feature add ons.
   </p>
 </section>
 
@@ -54,6 +54,7 @@
     
<li><code>org.apache.catalina.tribes.group.interceptors.FragmentationInterceptor</code></li>
     
<li><code>org.apache.catalina.tribes.group.interceptors.GzipInterceptor</code></li>
     
<li><code>org.apache.catalina.tribes.group.interceptors.TcpPingInterceptor</code></li>
+    
<li><code>org.apache.catalina.tribes.group.interceptors.EncryptInterceptor</code></li>
    </ul>
 </section>
 
@@ -196,6 +197,44 @@
      </attribute>
    </attributes>
   </subsection>
+  <subsection 
name="org.apache.catalina.tribes.group.interceptors.EncryptInterceptor 
Attributes">
+   <p>
+     The EncryptInterceptor adds encryption to the channel messages carrying
+     session data between nodes. Added in Tomcat 9.0.13.
+   </p>
+   <p>
+     If using the <code>TcpFailureDetector</code>, the 
<code>EncryptInterceptor</code>
+     <i>must</i> be inserted into the interceptor chain <i>before</i> the
+     <code>TcpFailureDetector</code>. This is becuase when validating cluster
+     members, <code>TcpFailureDetector</code> writes channel data directly
+     to the other members without using the remainder of the interceptor chain,
+     but on the receiving side, the message still goes through the chain (in 
reverse).
+     Because of this asymmetry, the <code>EncryptInterceptor</code> must 
execute
+     <i>before</i> the <code>TcpFailureDetector</code> on the sender and 
<i>after</i>
+     it on the receiver, otherwise message corruption will occur.
+   </p>
+   <attributes>
+     <attribute name="encryptionAlgorithm" required="false">
+       The encryption algorithm to be used, including the mode and padding. 
Please see
+       <a 
href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html";>https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html</a>
+       for the standard JCA names that can be used.
+
+       The <i>mode</i> is currently required to be <code>CBC</code>.
+
+       The length of the key will specify the flavor of the encryption 
algorithm
+       to be used, if applicable (e.g. AES-128 versus AES-256).
+
+       The default algorithm is <code>AES/CBC/PKCS5Padding</code>. 
+     </attribute>
+     <attribute name="encryptionKey" required="true">
+       The key to be used with the encryption algorithm.
+       
+       The key should be specified as hex-encoded bytes of the appropriate
+       length for the algorithm (e.g. 16 bytes / 32 characters / 128 bits for
+       AES-128, 32 bytes / 64 characters / 256 bits for AES-256, etc.).
+     </attribute>
+   </attributes>
+  </subsection>
 </section>
 
 <section name="Nested Components">



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to