All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.jasypt.acegisecurity.PasswordEncoder Maven / Gradle / Ivy

/*
 * =============================================================================
 * 
 *   Copyright (c) 2007-2010, The JASYPT team (http://www.jasypt.org)
 * 
 *   Licensed under the Apache License, Version 2.0 (the "License");
 *   you may not use this file except in compliance with the License.
 *   You may obtain a copy of the License at
 * 
 *       http://www.apache.org/licenses/LICENSE-2.0
 * 
 *   Unless required by applicable law or agreed to in writing, software
 *   distributed under the License is distributed on an "AS IS" BASIS,
 *   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *   See the License for the specific language governing permissions and
 *   limitations under the License.
 * 
 * =============================================================================
 */
package org.jasypt.acegisecurity;

import org.jasypt.digest.StringDigester;
import org.jasypt.exceptions.EncryptionInitializationException;
import org.jasypt.util.password.BasicPasswordEncryptor;
import org.jasypt.util.password.PasswordEncryptor;

/**
 * 

* This class implements the Spring Security (ACEGI) * org.acegisecurity.providers.encoding.PasswordEncoder * interface, allowing Spring Security-enabled applications to use JASYPT * for password encryption. *

*

* Objects of this class will internally hold either an object of type * org.jasypt.util.password.PasswordEncryptor or an object of type * org.jasypt.digest.StringDigester (only one of them), * which should be set by respectively calling * {@link #setPasswordEncryptor(PasswordEncryptor)} or * {@link #setStringDigester(StringDigester)} * after creation. If neither a PasswordEncryptor nor * a StringDigester are set, a new * org.jasypt.util.password.BasicPasswordEncryptor object is * created and internally used. *

*

* Important: This implementation ignores any salt provided through * the interface methods, as the internal Jasypt * PasswordEncryptor or StringDigester objects normally use a * random one. This means that salt can be safely passed as * null. *

*

* Usage with a PasswordEncryptor *

*

* This class can be used like this from your Spring XML resource files: *

*
 *  ...
 *  <!-- Your application may use the PasswordEncryptor in several places, --> 
 *  <!-- like for example at new user sign-up.                             --> 
 *  <bean id="jasyptPasswordEncryptor" class="org.jasypt.util.password.StrongPasswordEncryptor" />
 *  ...
 *  ...
 *  <!-- This Spring Security-friendly PasswordEncoder implementation will -->
 *  <!-- wrap the PasswordEncryptor instance so that it can be used from   -->
 *  <!-- the security framework.                                           -->
 *  <bean id="passwordEncoder" class="org.jasypt.spring.security.PasswordEncoder">
 *    <property name="passwordEncryptor">
 *      <ref bean="jasyptPasswordEncryptor" />
 *    </property>
 *  </bean>
 *  ...
 *  ...
 *  <!-- Your DaoAuthenticationProvider will then use it like with any     -->
 *  <!-- other implementation of the PasswordEncoder interface.            -->
 *  <bean id="daoAuthenticationProvider" class="org.acegisecurity.providers.dao.DaoAuthenticationProvider">
 *      <property name="userDetailsService" ref="userDetailsService"/>
 *      <property name="passwordEncoder">
 *        <ref bean="passwordEncoder" />
 *      </property>
 *  </bean>
 *  ...
 * 
*

* Usage with a StringDigester *

*

* This class can be used like this from your Spring XML resource files: *

*
 *  ...
 *  <!-- Your application may use the StringDigester in several places,    --> 
 *  <!-- like for example at new user sign-up.                             --> 
 *  <bean id="jasyptStringDigester" class="org.jasypt.digest.StandardStringDigester" >
 *    <property name="algorithm" value="SHA-1" />
 *    <property name="iterations" value="100000" />
 *  </bean>
 *  ...
 *  ...
 *  <!-- This Spring Security-friendly PasswordEncoder implementation will -->
 *  <!-- wrap the StringDigester instance so that it can be used from      -->
 *  <!-- the security framework.                                           -->
 *  <bean id="passwordEncoder" class="org.jasypt.spring.security.PasswordEncoder">
 *    <property name="stringDigester">
 *      <ref bean="jasyptStringDigester" />
 *    </property>
 *  </bean>
 *  ...
 *  ...
 *  <!-- Your DaoAuthenticationProvider will then use it like with any     -->
 *  <!-- other implementation of the PasswordEncoder interface.            -->
 *  <bean id="daoAuthenticationProvider" class="org.acegisecurity.providers.dao.DaoAuthenticationProvider">
 *      <property name="userDetailsService" ref="userDetailsService"/>
 *      <property name="passwordEncoder">
 *        <ref bean="passwordEncoder" />
 *      </property>
 *  </bean>
 *  ...
 * 
*

* This class is thread-safe *

* * @since 1.9.0 (existed as org.jasypt.spring.security.PasswordEncoder since 1.4) * * @author Daniel Fernández * */ public final class PasswordEncoder implements org.acegisecurity.providers.encoding.PasswordEncoder { // The password encryptor or string digester to be internally used private PasswordEncryptor passwordEncryptor = null; private StringDigester stringDigester = null; private Boolean useEncryptor = null; /** * Creates a new instance of PasswordEncoder */ public PasswordEncoder() { super(); } /** * Sets a password encryptor to be used. Only one of * setPasswordEncryptor or setStringDigester should be * called. If both are, the last call will define which method will be * used. * * @param passwordEncryptor the password encryptor instance to be used. */ public void setPasswordEncryptor(final PasswordEncryptor passwordEncryptor) { this.passwordEncryptor = passwordEncryptor; this.useEncryptor = Boolean.TRUE; } /** * Sets a string digester to be used. Only one of * setPasswordEncryptor or setStringDigester should be * called. If both are, the last call will define which method will be * used. * * @param stringDigester the string digester instance to be used. */ public void setStringDigester(final StringDigester stringDigester) { this.stringDigester = stringDigester; this.useEncryptor = Boolean.FALSE; } /** * Encodes a password. This implementation completely ignores salt, * as jasypt's PasswordEncryptor and StringDigester * normally use a random one. Thus, it can be safely passed as null. * * @param rawPass The password to be encoded. * @param salt The salt, which will be ignored. It can be null. */ public String encodePassword(final String rawPass, final Object salt) { checkInitialization(); if (this.useEncryptor.booleanValue()) { return this.passwordEncryptor.encryptPassword(rawPass); } return this.stringDigester.digest(rawPass); } /** * Checks a password's validity. This implementation completely ignores * salt, as jasypt's PasswordEncryptor and StringDigester * normally use a random one. Thus, it can be safely passed as null. * * @param encPass The encrypted password (digest) against which to check. * @param rawPass The password to be checked. * @param salt The salt, which will be ignored. It can be null. */ public boolean isPasswordValid(final String encPass, final String rawPass, final Object salt) { checkInitialization(); if (this.useEncryptor.booleanValue()) { return this.passwordEncryptor.checkPassword(rawPass, encPass); } return this.stringDigester.matches(rawPass, encPass); } /* * Checks that the PasswordEncoder has been correctly initialized * (either a password encryptor or a string digester has been set). */ private synchronized void checkInitialization() { if (this.useEncryptor == null) { this.passwordEncryptor = new BasicPasswordEncryptor(); this.useEncryptor = Boolean.TRUE; } else { if (this.useEncryptor.booleanValue()) { if (this.passwordEncryptor == null) { throw new EncryptionInitializationException( "Password encoder not initialized: password " + "encryptor is null"); } } else { if (this.stringDigester == null) { throw new EncryptionInitializationException( "Password encoder not initialized: string " + "digester is null"); } } } } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy