org.wildfly.security.password.interfaces.UnixSHACryptPassword Maven / Gradle / Ivy
/*
* JBoss, Home of Professional Open Source.
* Copyright 2014 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.wildfly.security.password.interfaces;
import java.security.spec.AlgorithmParameterSpec;
import java.util.Arrays;
import org.wildfly.common.Assert;
import org.wildfly.security.password.OneWayPassword;
import org.wildfly.security.password.Password;
import org.wildfly.security.password.PasswordFactory;
import org.wildfly.security.password.spec.IteratedPasswordAlgorithmSpec;
import org.wildfly.security.password.spec.IteratedSaltedPasswordAlgorithmSpec;
import org.wildfly.security.password.spec.SaltedPasswordAlgorithmSpec;
/**
* The UNIX modular-crypt SHA crypt algorithm.
*
* @author David M. Lloyd
*/
public interface UnixSHACryptPassword extends OneWayPassword {
/**
* The algorithm name "crypt-sha-256".
*/
String ALGORITHM_CRYPT_SHA_256 = "crypt-sha-256";
/**
* The algorithm name "crypt-sha-512".
*/
String ALGORITHM_CRYPT_SHA_512 = "crypt-sha-512";
/**
* The maximum salt size of this algorithm.
*/
int SALT_SIZE = 16;
/**
* The default iteration count of this algorithm.
*/
int DEFAULT_ITERATION_COUNT = 5000;
/**
* The salt used during the hashing of this password. Should have at most 16 bytes.
* @return the salt
*/
byte[] getSalt();
/**
* The final hash, based on the password, salt and iteration count
* @return the hash
*/
byte[] getHash();
/**
* The number of iterations to perform when hashing the password. Should be bigger than 1,000 and lower than 999,999,999.
* The default value is 5,000
* @return the number of iterations to perform
*/
int getIterationCount();
default IteratedSaltedPasswordAlgorithmSpec getParameterSpec() {
return new IteratedSaltedPasswordAlgorithmSpec(getIterationCount(), getSalt());
}
default boolean impliesParameters(AlgorithmParameterSpec parameterSpec) {
Assert.checkNotNullParam("parameterSpec", parameterSpec);
if (parameterSpec instanceof IteratedSaltedPasswordAlgorithmSpec) {
final IteratedSaltedPasswordAlgorithmSpec spec = (IteratedSaltedPasswordAlgorithmSpec) parameterSpec;
return getIterationCount() <= spec.getIterationCount() && Arrays.equals(getSalt(), spec.getSalt());
} else if (parameterSpec instanceof SaltedPasswordAlgorithmSpec) {
return Arrays.equals(getSalt(), ((SaltedPasswordAlgorithmSpec) parameterSpec).getSalt());
} else if (parameterSpec instanceof IteratedPasswordAlgorithmSpec) {
return getIterationCount() <= ((IteratedPasswordAlgorithmSpec) parameterSpec).getIterationCount();
} else {
return false;
}
}
/**
* Creates and returns a copy of this {@link Password}.
*
* @return a copy of this {@link Password}.
*/
UnixSHACryptPassword clone();
/**
* Create a raw implementation of this password type. No validation of the content is performed, and the password
* must be "adopted" in to a {@link PasswordFactory} (via the {@link PasswordFactory#translate(Password)} method)
* before it can be validated and used to verify guesses.
*
* @param algorithm the algorithm name
* @param salt the salt
* @param hash the hash
* @param iterationCount the iteration count
* @return the raw password implementation
*/
static UnixSHACryptPassword createRaw(String algorithm, byte[] salt, byte[] hash, int iterationCount) {
Assert.checkNotNullParam("algorithm", algorithm);
Assert.checkNotNullParam("salt", salt);
Assert.checkNotNullParam("hash", hash);
return new RawUnixSHACryptPassword(algorithm, salt, hash, iterationCount);
}
}