1 changed files with 0 additions and 166 deletions
@ -1,166 +0,0 @@
@@ -1,166 +0,0 @@
|
||||
/* |
||||
* Copyright 2002-2017 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.springframework.security.authentication.encoding; |
||||
|
||||
import java.security.MessageDigest; |
||||
import java.security.NoSuchAlgorithmException; |
||||
import java.util.Base64; |
||||
|
||||
import org.springframework.security.crypto.codec.Hex; |
||||
import org.springframework.security.crypto.codec.Utf8; |
||||
import org.springframework.util.Assert; |
||||
|
||||
/** |
||||
* Base for digest password encoders. |
||||
* <p> |
||||
* This class can be used stand-alone, or one of the subclasses can be used for |
||||
* compatiblity and convenience. When using this class directly you must specify a |
||||
* <a href="http://java.sun.com/j2se/1.5.0/docs/guide/security/CryptoSpec.html#AppA"> |
||||
* Message Digest Algorithm</a> to use as a constructor arg. |
||||
* <p> |
||||
* The encoded password hash is normally returned as Hex (32 char) version of the hash |
||||
* bytes. Setting the <tt>encodeHashAsBase64</tt> property to <tt>true</tt> will cause the |
||||
* encoded pass to be returned as Base64 text, which will consume 24 characters. See |
||||
* {@link BaseDigestPasswordEncoder#setEncodeHashAsBase64(boolean)} |
||||
* <p> |
||||
* This {@code PasswordEncoder} can be used directly as in the following example: |
||||
* |
||||
* <pre> |
||||
* <bean id="passwordEncoder" class="org.springframework.security.authentication.encoding.MessageDigestPasswordEncoder"> |
||||
* <constructor-arg value="MD5"/> |
||||
* </bean> |
||||
* </pre> |
||||
* <p> |
||||
* If desired, the {@link #setIterations iterations} property can be set to enable |
||||
* "<a href="http://en.wikipedia.org/wiki/Key_strengthening">password stretching</a>" for
|
||||
* the digest calculation. |
||||
* |
||||
* @author Ray Krueger |
||||
* @author Luke Taylor |
||||
* @since 1.0.1 |
||||
*/ |
||||
public class MessageDigestPasswordEncoder extends BaseDigestPasswordEncoder { |
||||
|
||||
private final String algorithm; |
||||
private int iterations = 1; |
||||
|
||||
/** |
||||
* The digest algorithm to use Supports the named |
||||
* <a href="http://java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html#AppA"> |
||||
* Message Digest Algorithms</a> in the Java environment. |
||||
* |
||||
* @param algorithm |
||||
*/ |
||||
public MessageDigestPasswordEncoder(String algorithm) { |
||||
this(algorithm, false); |
||||
} |
||||
|
||||
/** |
||||
* Convenience constructor for specifying the algorithm and whether or not to enable |
||||
* base64 encoding |
||||
* |
||||
* @param algorithm |
||||
* @param encodeHashAsBase64 |
||||
* @throws IllegalArgumentException if an unknown |
||||
*/ |
||||
public MessageDigestPasswordEncoder(String algorithm, boolean encodeHashAsBase64) |
||||
throws IllegalArgumentException { |
||||
this.algorithm = algorithm; |
||||
setEncodeHashAsBase64(encodeHashAsBase64); |
||||
// Validity Check
|
||||
getMessageDigest(); |
||||
} |
||||
|
||||
/** |
||||
* Encodes the rawPass using a MessageDigest. If a salt is specified it will be merged |
||||
* with the password before encoding. |
||||
* |
||||
* @param rawPass The plain text password |
||||
* @param salt The salt to sprinkle |
||||
* @return Hex string of password digest (or base64 encoded string if |
||||
* encodeHashAsBase64 is enabled. |
||||
*/ |
||||
public String encodePassword(String rawPass, Object salt) { |
||||
String saltedPass = mergePasswordAndSalt(rawPass, salt, false); |
||||
|
||||
MessageDigest messageDigest = getMessageDigest(); |
||||
|
||||
byte[] digest = messageDigest.digest(Utf8.encode(saltedPass)); |
||||
|
||||
// "stretch" the encoded value if configured to do so
|
||||
for (int i = 1; i < this.iterations; i++) { |
||||
digest = messageDigest.digest(digest); |
||||
} |
||||
|
||||
if (getEncodeHashAsBase64()) { |
||||
return Utf8.decode(Base64.getEncoder().encode(digest)); |
||||
} |
||||
else { |
||||
return new String(Hex.encode(digest)); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Get a MessageDigest instance for the given algorithm. Throws an |
||||
* IllegalArgumentException if <i>algorithm</i> is unknown |
||||
* |
||||
* @return MessageDigest instance |
||||
* @throws IllegalArgumentException if NoSuchAlgorithmException is thrown |
||||
*/ |
||||
protected final MessageDigest getMessageDigest() throws IllegalArgumentException { |
||||
try { |
||||
return MessageDigest.getInstance(this.algorithm); |
||||
} |
||||
catch (NoSuchAlgorithmException e) { |
||||
throw new IllegalArgumentException( |
||||
"No such algorithm [" + this.algorithm + "]"); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Takes a previously encoded password and compares it with a rawpassword after mixing |
||||
* in the salt and encoding that value |
||||
* |
||||
* @param encPass previously encoded password |
||||
* @param rawPass plain text password |
||||
* @param salt salt to mix into password |
||||
* @return true or false |
||||
*/ |
||||
public boolean isPasswordValid(String encPass, String rawPass, Object salt) { |
||||
String pass1 = "" + encPass; |
||||
String pass2 = encodePassword(rawPass, salt); |
||||
|
||||
return PasswordEncoderUtils.equals(pass1, pass2); |
||||
} |
||||
|
||||
public String getAlgorithm() { |
||||
return this.algorithm; |
||||
} |
||||
|
||||
/** |
||||
* Sets the number of iterations for which the calculated hash value should be |
||||
* "stretched". If this is greater than one, the initial digest is calculated, the |
||||
* digest function will be called repeatedly on the result for the additional number |
||||
* of iterations. |
||||
* |
||||
* @param iterations the number of iterations which will be executed on the hashed |
||||
* password/salt value. Defaults to 1. |
||||
*/ |
||||
public void setIterations(int iterations) { |
||||
Assert.isTrue(iterations > 0, "Iterations value must be greater than zero"); |
||||
this.iterations = iterations; |
||||
} |
||||
} |
||||
Loading…
Reference in new issue