| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.shiro.authc.credential; |
| |
| import java.security.MessageDigest; |
| |
| import org.apache.shiro.crypto.hash.DefaultHashService; |
| import org.apache.shiro.crypto.hash.Hash; |
| import org.apache.shiro.crypto.hash.HashRequest; |
| import org.apache.shiro.crypto.hash.HashService; |
| import org.apache.shiro.crypto.hash.format.*; |
| import org.apache.shiro.util.ByteSource; |
| import org.slf4j.Logger; |
| import org.slf4j.LoggerFactory; |
| |
| /** |
| * Default implementation of the {@link PasswordService} interface that relies on an internal |
| * {@link HashService}, {@link HashFormat}, and {@link HashFormatFactory} to function: |
| * <h2>Hashing Passwords</h2> |
| * |
| * <h2>Comparing Passwords</h2> |
| * All hashing operations are performed by the internal {@link #getHashService() hashService}. After the hash |
| * is computed, it is formatted into a String value via the internal {@link #getHashFormat() hashFormat}. |
| * |
| * @since 1.2 |
| */ |
| public class DefaultPasswordService implements HashingPasswordService { |
| |
| public static final String DEFAULT_HASH_ALGORITHM = "SHA-256"; |
| public static final int DEFAULT_HASH_ITERATIONS = 500000; //500,000 |
| |
| private static final Logger log = LoggerFactory.getLogger(DefaultPasswordService.class); |
| |
| private HashService hashService; |
| private HashFormat hashFormat; |
| private HashFormatFactory hashFormatFactory; |
| |
| private volatile boolean hashFormatWarned; //used to avoid excessive log noise |
| |
| public DefaultPasswordService() { |
| this.hashFormatWarned = false; |
| |
| DefaultHashService hashService = new DefaultHashService(); |
| hashService.setHashAlgorithmName(DEFAULT_HASH_ALGORITHM); |
| hashService.setHashIterations(DEFAULT_HASH_ITERATIONS); |
| hashService.setGeneratePublicSalt(true); //always want generated salts for user passwords to be most secure |
| this.hashService = hashService; |
| |
| this.hashFormat = new Shiro1CryptFormat(); |
| this.hashFormatFactory = new DefaultHashFormatFactory(); |
| } |
| |
| public String encryptPassword(Object plaintext) { |
| Hash hash = hashPassword(plaintext); |
| checkHashFormatDurability(); |
| return this.hashFormat.format(hash); |
| } |
| |
| public Hash hashPassword(Object plaintext) { |
| ByteSource plaintextBytes = createByteSource(plaintext); |
| if (plaintextBytes == null || plaintextBytes.isEmpty()) { |
| return null; |
| } |
| HashRequest request = createHashRequest(plaintextBytes); |
| return hashService.computeHash(request); |
| } |
| |
| public boolean passwordsMatch(Object plaintext, Hash saved) { |
| ByteSource plaintextBytes = createByteSource(plaintext); |
| |
| if (saved == null || saved.isEmpty()) { |
| return plaintextBytes == null || plaintextBytes.isEmpty(); |
| } else { |
| if (plaintextBytes == null || plaintextBytes.isEmpty()) { |
| return false; |
| } |
| } |
| |
| HashRequest request = buildHashRequest(plaintextBytes, saved); |
| |
| Hash computed = this.hashService.computeHash(request); |
| |
| return constantEquals(saved.toString(), computed.toString()); |
| } |
| |
| private boolean constantEquals(String savedHash, String computedHash) { |
| |
| byte[] savedHashByteArray = savedHash.getBytes(); |
| byte[] computedHashByteArray = computedHash.getBytes(); |
| |
| return MessageDigest.isEqual(savedHashByteArray, computedHashByteArray); |
| } |
| |
| protected void checkHashFormatDurability() { |
| |
| if (!this.hashFormatWarned) { |
| |
| HashFormat format = this.hashFormat; |
| |
| if (!(format instanceof ParsableHashFormat) && log.isWarnEnabled()) { |
| String msg = "The configured hashFormat instance [" + format.getClass().getName() + "] is not a " + |
| ParsableHashFormat.class.getName() + " implementation. This is " + |
| "required if you wish to support backwards compatibility for saved password checking (almost " + |
| "always desirable). Without a " + ParsableHashFormat.class.getSimpleName() + " instance, " + |
| "any hashService configuration changes will break previously hashed/saved passwords."; |
| log.warn(msg); |
| this.hashFormatWarned = true; |
| } |
| } |
| } |
| |
| protected HashRequest createHashRequest(ByteSource plaintext) { |
| return new HashRequest.Builder().setSource(plaintext).build(); |
| } |
| |
| protected ByteSource createByteSource(Object o) { |
| return ByteSource.Util.bytes(o); |
| } |
| |
| public boolean passwordsMatch(Object submittedPlaintext, String saved) { |
| ByteSource plaintextBytes = createByteSource(submittedPlaintext); |
| |
| if (saved == null || saved.length() == 0) { |
| return plaintextBytes == null || plaintextBytes.isEmpty(); |
| } else { |
| if (plaintextBytes == null || plaintextBytes.isEmpty()) { |
| return false; |
| } |
| } |
| |
| //First check to see if we can reconstitute the original hash - this allows us to |
| //perform password hash comparisons even for previously saved passwords that don't |
| //match the current HashService configuration values. This is a very nice feature |
| //for password comparisons because it ensures backwards compatibility even after |
| //configuration changes. |
| HashFormat discoveredFormat = this.hashFormatFactory.getInstance(saved); |
| |
| if (discoveredFormat != null && discoveredFormat instanceof ParsableHashFormat) { |
| |
| ParsableHashFormat parsableHashFormat = (ParsableHashFormat)discoveredFormat; |
| Hash savedHash = parsableHashFormat.parse(saved); |
| |
| return passwordsMatch(submittedPlaintext, savedHash); |
| } |
| |
| //If we're at this point in the method's execution, We couldn't reconstitute the original hash. |
| //So, we need to hash the submittedPlaintext using current HashService configuration and then |
| //compare the formatted output with the saved string. This will correctly compare passwords, |
| //but does not allow changing the HashService configuration without breaking previously saved |
| //passwords: |
| |
| //The saved text value can't be reconstituted into a Hash instance. We need to format the |
| //submittedPlaintext and then compare this formatted value with the saved value: |
| HashRequest request = createHashRequest(plaintextBytes); |
| Hash computed = this.hashService.computeHash(request); |
| String formatted = this.hashFormat.format(computed); |
| |
| return constantEquals(saved, formatted); |
| } |
| |
| protected HashRequest buildHashRequest(ByteSource plaintext, Hash saved) { |
| //keep everything from the saved hash except for the source: |
| return new HashRequest.Builder().setSource(plaintext) |
| //now use the existing saved data: |
| .setAlgorithmName(saved.getAlgorithmName()) |
| .setSalt(saved.getSalt()) |
| .setIterations(saved.getIterations()) |
| .build(); |
| } |
| |
| public HashService getHashService() { |
| return hashService; |
| } |
| |
| public void setHashService(HashService hashService) { |
| this.hashService = hashService; |
| } |
| |
| public HashFormat getHashFormat() { |
| return hashFormat; |
| } |
| |
| public void setHashFormat(HashFormat hashFormat) { |
| this.hashFormat = hashFormat; |
| } |
| |
| public HashFormatFactory getHashFormatFactory() { |
| return hashFormatFactory; |
| } |
| |
| public void setHashFormatFactory(HashFormatFactory hashFormatFactory) { |
| this.hashFormatFactory = hashFormatFactory; |
| } |
| } |