All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.sun.enterprise.security.util.SSHA Maven / Gradle / Ivy

/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 * 
 * Copyright 1997-2007 Sun Microsystems, Inc. All rights reserved.
 * 
 * The contents of this file are subject to the terms of either the GNU
 * General Public License Version 2 only ("GPL") or the Common Development
 * and Distribution License("CDDL") (collectively, the "License").  You
 * may not use this file except in compliance with the License. You can obtain
 * a copy of the License at https://glassfish.dev.java.net/public/CDDL+GPL.html
 * or glassfish/bootstrap/legal/LICENSE.txt.  See the License for the specific
 * language governing permissions and limitations under the License.
 * 
 * When distributing the software, include this License Header Notice in each
 * file and include the License file at glassfish/bootstrap/legal/LICENSE.txt.
 * Sun designates this particular file as subject to the "Classpath" exception
 * as provided by Sun in the GPL Version 2 section of the License file that
 * accompanied this code.  If applicable, add the following below the License
 * Header, with the fields enclosed by brackets [] replaced by your own
 * identifying information: "Portions Copyrighted [year]
 * [name of copyright owner]"
 * 
 * Contributor(s):
 * 
 * If you wish your version of this file to be governed by only the CDDL or
 * only the GPL Version 2, indicate your decision by adding "[Contributor]
 * elects to include this software in this distribution under the [CDDL or GPL
 * Version 2] license."  If you don't indicate a single choice of license, a
 * recipient has the option to distribute your version of this file under
 * either the CDDL, the GPL Version 2 or to extend the choice of license to
 * its licensees as provided above.  However, if you add GPL Version 2 code
 * and therefore, elected the GPL Version 2 license, then the option applies
 * only if the new code is made subject to such option by the copyright
 * holder.
 */

package com.sun.enterprise.security.util;

import java.io.*;
import java.util.*;
import java.security.*;
import java.security.spec.*;

import com.sun.enterprise.util.i18n.StringManager;
import com.sun.enterprise.universal.GFBase64Decoder;
import com.sun.enterprise.universal.GFBase64Encoder;

/**
 * Util class for salted SHA processing.
 *
 * 

Salted SHA (aka SSHA) is computed as follows: *
result = {SSHA}BASE64(SHA(password,salt),salt) * *

Methods are also provided to return partial results, such as * SHA( password , salt) without Base64 encoding. * */ public class SSHA { private static final String SSHA_TAG = "{SSHA}"; //TODO V3 need to check if second arg is correct private static StringManager sm = StringManager.getManager(SSHA.class); private static MessageDigest md = null; /** * Compute a salted SHA hash. * * @param salt Salt bytes. * @param password Password bytes. * @return Byte array of length 20 bytes containing hash result. * @throws IASSecurityExeption Thrown if there is an error. * */ public static byte[] compute(byte[] salt, byte[] password) throws IASSecurityException { byte[] buff = new byte[password.length + salt.length]; System.arraycopy(password, 0, buff, 0, password.length); System.arraycopy(salt, 0, buff, password.length, salt.length); byte[] hash = null; synchronized (SSHA.class) { if (md == null) { try { md = MessageDigest.getInstance("SHA"); } catch (Exception e) { throw new IASSecurityException(e); } } assert (md != null); md.reset(); hash = md.digest(buff); } assert (hash.length==20); // SHA output is 160 bits return hash; } /** * Compute a salted SHA hash. * *

Salt bytes are obtained using SecureRandom. * * @param saltBytes Number of bytes of random salt value to generate. * @param password Password bytes. * @return Byte array of length 20 bytes containing hash result. * @throws IASSecurityExeption Thrown if there is an error. * */ public static byte[] compute(int saltBytes, byte[] password) throws IASSecurityException { SecureRandom rng=new SecureRandom(); byte[] salt=new byte[saltBytes]; rng.nextBytes(salt); return compute(salt, password); } /** * Perform encoding of salt and computed hash. * * @param salt Salt bytes. * @param hash Result of prior compute() operation. * @return String Encoded string, as described in class documentation. * */ public static String encode(byte[] salt, byte[] hash) { assert (hash.length==20); byte[] res = new byte[20+salt.length]; System.arraycopy(hash, 0, res, 0, 20); System.arraycopy(salt, 0, res, 20, salt.length); GFBase64Encoder encoder = new GFBase64Encoder(); String encoded = encoder.encode(res); String out = SSHA_TAG + encoded; return out; } /** * Compute a salted SHA hash and return the encoded result. This is * a convenience method combining compute() and encode(). * * @param salt Salt bytes. * @param password Password bytes. * @return String Encoded string, as described in class documentation. * @throws IASSecurityExeption Thrown if there is an error. * */ public static String computeAndEncode(byte[] salt, byte[] password) throws IASSecurityException { byte[] hash = compute(salt, password); return encode(salt, hash); } /** * Compute a salted SHA hash and return the encoded result. This is * a convenience method combining compute() and encode(). * * @param saltBytes Number of bytes of random salt value to generate. * @param password Password bytes. * @return String Encoded string, as described in class documentation. * @throws IASSecurityExeption Thrown if there is an error. * */ public static String computeAndEncode(int saltBytes, byte[] password) throws IASSecurityException { SecureRandom rng=new SecureRandom(); byte[] salt=new byte[saltBytes]; rng.nextBytes(salt); byte[] hash = compute(salt, password); return encode(salt, hash); } /** * Verifies a password. * *

The given password is verified against the provided encoded SSHA * result string. * * @param encoded Encoded SSHA value (e.g. output of computeAndEncode()) * @param password Password bytes of the password to verify. * @returns True if given password matches encoded SSHA. * @throws IASSecurityExeption Thrown if there is an error. * */ public static boolean verify(String encoded, byte[] password) throws IASSecurityException { byte[] hash = new byte[20]; byte[] salt = decode(encoded, hash); return verify(salt, hash, password); } /** * Verifies a password. * *

The given password is verified against the provided salt and hash * buffers. * * @param salt Salt bytes used in the hash result. * @param hash Hash result to compare against. * @param password Password bytes of the password to verify. * @returns True if given password matches encoded SSHA. * @throws IASSecurityExeption Thrown if there is an error. * */ public static boolean verify(byte[] salt, byte[] hash, byte[] password) throws IASSecurityException { byte[] newHash = compute(salt, password); return Arrays.equals(hash, newHash); } /** * Decodes an encoded SSHA string. * * @param encoded Encoded SSHA value (e.g. output of computeAndEncode()) * @param hashResult A byte array which must contain 20 elements. Upon * succesful return from method, it will be filled by the hash * value decoded from the given SSHA string. Existing values are * not used and will be overwritten. * @returns Byte array containing the salt obtained from the encoded SSHA * string. * @throws IASSecurityExeption Thrown if there is an error. * */ public static byte[] decode(String encoded, byte[] hashResult) throws IASSecurityException { assert (hashResult.length==20); if (!encoded.startsWith(SSHA_TAG)) { String msg = sm.getString("ssha.badformat", encoded); throw new IASSecurityException(msg); } String ssha = encoded.substring(SSHA_TAG.length()); GFBase64Decoder decoder = new GFBase64Decoder(); byte[] result = null; try { result = decoder.decodeBuffer(ssha); } catch (IOException e) { throw new IASSecurityException(e); } assert (result.length > 20); byte[] salt = new byte[result.length - 20]; System.arraycopy(result, 0, hashResult, 0, 20); System.arraycopy(result, 20, salt, 0, result.length-20); return salt; } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy