All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.wildfly.security.password.interfaces.UnixSHACryptPassword Maven / Gradle / Ivy

There is a newer version: 2.4.1.Final
Show newest version
/*
 * JBoss, Home of Professional Open Source.
 * Copyright 2014 Red Hat, Inc., and individual contributors
 * as indicated by the @author tags.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.wildfly.security.password.interfaces;

import java.security.spec.AlgorithmParameterSpec;
import java.util.Arrays;

import org.wildfly.common.Assert;
import org.wildfly.security.password.OneWayPassword;
import org.wildfly.security.password.Password;
import org.wildfly.security.password.PasswordFactory;
import org.wildfly.security.password.spec.IteratedPasswordAlgorithmSpec;
import org.wildfly.security.password.spec.IteratedSaltedPasswordAlgorithmSpec;
import org.wildfly.security.password.spec.SaltedPasswordAlgorithmSpec;

/**
 * The UNIX modular-crypt SHA crypt algorithm.
 *
 * @author David M. Lloyd
 */
public interface UnixSHACryptPassword extends OneWayPassword {

    /**
     * The algorithm name "crypt-sha-256".
     */
    String ALGORITHM_CRYPT_SHA_256 = "crypt-sha-256";

    /**
     * The algorithm name "crypt-sha-512".
     */
    String ALGORITHM_CRYPT_SHA_512 = "crypt-sha-512";

    /**
     * The maximum salt size of this algorithm.
     */
    int SALT_SIZE = 16;

    /**
     * The default iteration count of this algorithm.
     */
    int DEFAULT_ITERATION_COUNT = 5000;

    /**
     * The salt used during the hashing of this password. Should have at most 16 bytes.
     * @return the salt
     */
    byte[] getSalt();

    /**
     * The final hash, based on the password, salt and iteration count
     * @return the hash
     */
    byte[] getHash();

    /**
     * The number of iterations to perform when hashing the password. Should be bigger than 1,000 and lower than 999,999,999.
     * The default value is 5,000
     * @return  the number of iterations to perform
     */
    int getIterationCount();

    default IteratedSaltedPasswordAlgorithmSpec getParameterSpec() {
        return new IteratedSaltedPasswordAlgorithmSpec(getIterationCount(), getSalt());
    }

    default boolean impliesParameters(AlgorithmParameterSpec parameterSpec) {
        Assert.checkNotNullParam("parameterSpec", parameterSpec);
        if (parameterSpec instanceof IteratedSaltedPasswordAlgorithmSpec) {
            final IteratedSaltedPasswordAlgorithmSpec spec = (IteratedSaltedPasswordAlgorithmSpec) parameterSpec;
            return getIterationCount() <= spec.getIterationCount() && Arrays.equals(getSalt(), spec.getSalt());
        } else if (parameterSpec instanceof SaltedPasswordAlgorithmSpec) {
            return Arrays.equals(getSalt(), ((SaltedPasswordAlgorithmSpec) parameterSpec).getSalt());
        } else if (parameterSpec instanceof IteratedPasswordAlgorithmSpec) {
            return getIterationCount() <= ((IteratedPasswordAlgorithmSpec) parameterSpec).getIterationCount();
        } else {
            return false;
        }
    }

    /**
     * Creates and returns a copy of this {@link Password}.
     *
     * @return a copy of this {@link Password}.
     */
    UnixSHACryptPassword clone();

    /**
     * Create a raw implementation of this password type.  No validation of the content is performed, and the password
     * must be "adopted" in to a {@link PasswordFactory} (via the {@link PasswordFactory#translate(Password)} method)
     * before it can be validated and used to verify guesses.
     *
     * @param algorithm the algorithm name
     * @param salt the salt
     * @param hash the hash
     * @param iterationCount the iteration count
     * @return the raw password implementation
     */
    static UnixSHACryptPassword createRaw(String algorithm, byte[] salt, byte[] hash, int iterationCount) {
        Assert.checkNotNullParam("algorithm", algorithm);
        Assert.checkNotNullParam("salt", salt);
        Assert.checkNotNullParam("hash", hash);
        return new RawUnixSHACryptPassword(algorithm, salt, hash, iterationCount);
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy