| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.catalina.realm; |
| |
| import java.security.NoSuchAlgorithmException; |
| import java.security.spec.InvalidKeySpecException; |
| import java.security.spec.KeySpec; |
| |
| import javax.crypto.SecretKeyFactory; |
| import javax.crypto.spec.PBEKeySpec; |
| |
| import org.apache.juli.logging.Log; |
| import org.apache.juli.logging.LogFactory; |
| import org.apache.tomcat.util.buf.HexUtils; |
| |
| public class SecretKeyCredentialHandler extends DigestCredentialHandlerBase { |
| |
| private static final Log log = LogFactory.getLog(SecretKeyCredentialHandler.class); |
| |
| public static final String DEFAULT_ALGORITHM = "PBKDF2WithHmacSHA1"; |
| public static final int DEFAULT_KEY_LENGTH = 160; |
| public static final int DEFAULT_ITERATIONS = 20000; |
| |
| |
| private SecretKeyFactory secretKeyFactory; |
| private int keyLength = DEFAULT_KEY_LENGTH; |
| |
| |
| public SecretKeyCredentialHandler() throws NoSuchAlgorithmException { |
| setAlgorithm(DEFAULT_ALGORITHM); |
| } |
| |
| |
| @Override |
| public String getAlgorithm() { |
| return secretKeyFactory.getAlgorithm(); |
| } |
| |
| |
| @Override |
| public void setAlgorithm(String algorithm) throws NoSuchAlgorithmException { |
| SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance(algorithm); |
| this.secretKeyFactory = secretKeyFactory; |
| } |
| |
| |
| public int getKeyLength() { |
| return keyLength; |
| } |
| |
| |
| public void setKeyLength(int keyLength) { |
| this.keyLength = keyLength; |
| } |
| |
| |
| @Override |
| public boolean matches(String inputCredentials, String storedCredentials) { |
| return matchesSaltIterationsEncoded(inputCredentials, storedCredentials); |
| } |
| |
| |
| @Override |
| protected String mutate(String inputCredentials, byte[] salt, int iterations) { |
| return mutate(inputCredentials, salt, iterations, getKeyLength()); |
| } |
| |
| |
| @Override |
| protected String mutate(String inputCredentials, byte[] salt, int iterations, int keyLength) { |
| try { |
| KeySpec spec = new PBEKeySpec(inputCredentials.toCharArray(), salt, iterations, keyLength); |
| return HexUtils.toHexString(secretKeyFactory.generateSecret(spec).getEncoded()); |
| } catch (InvalidKeySpecException | IllegalArgumentException e) { |
| log.warn(sm.getString("pbeCredentialHandler.invalidKeySpec"), e); |
| return null; |
| } |
| } |
| |
| |
| @Override |
| protected int getDefaultIterations() { |
| return DEFAULT_ITERATIONS; |
| } |
| |
| |
| @Override |
| protected Log getLog() { |
| return log; |
| } |
| } |