All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.blade.kit.PasswordKit Maven / Gradle / Ivy

There is a newer version: 2.0.15.RELEASE
Show newest version
/**
 * Copyright (c) 2017, biezhi 王爵 ([email protected])
 * 

* Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at *

* http://www.apache.org/licenses/LICENSE-2.0 *

* Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.blade.kit; import lombok.experimental.UtilityClass; /** * 加解密类 * * @author biezhi * @since 1.0 */ @UtilityClass public class PasswordKit { // Define the BCrypt workload to use when generating password hashes. 10-31 is a valid value. private static final int workload = 12; /** * This method can be used to generate a string representing an account password * suitable for storing in a database. It will be an OpenBSD-style crypt(3) formatted * hash string of length=60 * The bcrypt workload is specified in the above static variable, a value from 10 to 31. * A workload of 12 is a very reasonable safe default as of 2013. * This automatically handles secure 128-bit salt generation and storage within the hash. * * @param plaintext The account's plaintext password as provided during account creation, * or when changing an account's password. * @return String - a string of length 60 that is the bcrypt hashed password in crypt(3) format. */ public static String hashPassword(String plaintext) { String salt = BCrypt.gensalt(workload); return BCrypt.hashpw(plaintext, salt); } /** * This method can be used to verify a computed hash from a plaintext (e.g. during a login * request) with that of a stored hash from a database. The password hash from the database * must be passed as the second variable. * * @param plaintext The account's plaintext password, as provided during a login request * @param storedHash The account's stored password hash, retrieved from the authorization database * @return boolean - true if the password matches the password of the stored hash, false otherwise */ public static boolean checkPassword(String plaintext, String storedHash) { boolean password_verified; if (null == storedHash || !storedHash.startsWith("$2a$")) throw new IllegalArgumentException("Invalid hash provided for comparison"); password_verified = BCrypt.checkpw(plaintext, storedHash); return (password_verified); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy