All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.jsonwebtoken.security.Password Maven / Gradle / Ivy

There is a newer version: 0.12.6
Show newest version
/*
 * Copyright (C) 2021 jsonwebtoken.io
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package io.jsonwebtoken.security;

import javax.crypto.SecretKey;
import javax.security.auth.Destroyable;

/**
 * A {@code Key} suitable for use with password-based key derivation algorithms.
 *
 * 

Usage Warning

* *

Because raw passwords should never be used as direct inputs for cryptographic operations (such as authenticated * hashing or encryption) - and only for derivation algorithms (like password-based encryption) - {@code Password} * instances will throw an exception when used in these invalid contexts. Specifically, calling a * {@code Password}'s {@link Password#getEncoded() getEncoded()} method (as would be done automatically by the * JCA subsystem during direct cryptographic operations) will throw an * {@link UnsupportedOperationException UnsupportedOperationException}.

* * @see #toCharArray() * @since 0.12.0 */ public interface Password extends SecretKey, Destroyable { /** * Returns a new clone of the underlying password character array for use during derivation algorithms. Like all * {@code SecretKey} implementations, if you wish to clear the backing password character array for * safety/security reasons, call the {@link #destroy()} method, ensuring that both the character array is cleared * and the {@code Password} instance can no longer be used. * *

Usage

* *

Because a new clone is returned from this method each time it is invoked, it is expected that callers will * clear the resulting clone from memory as soon as possible to reduce probability of password exposure. For * example:

* *

     * char[] clonedPassword = aPassword.toCharArray();
     * try {
     *     doSomethingWithPassword(clonedPassword);
     * } finally {
     *     // guarantee clone is cleared regardless of any Exception thrown:
     *     java.util.Arrays.fill(clonedPassword, '\u0000');
     * }
     * 
* * @return a clone of the underlying password character array. */ char[] toCharArray(); }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy