|
@@ -20,9 +20,13 @@ import java.security.GeneralSecurityException;
|
|
|
import javax.crypto.SecretKeyFactory;
|
|
|
import javax.crypto.spec.PBEKeySpec;
|
|
|
|
|
|
+import org.springframework.security.crypto.codec.Hex;
|
|
|
import org.springframework.security.crypto.codec.Utf8;
|
|
|
+import org.springframework.security.crypto.keygen.BytesKeyGenerator;
|
|
|
+import org.springframework.security.crypto.keygen.KeyGenerators;
|
|
|
|
|
|
import static org.springframework.security.crypto.util.EncodingUtils.concatenate;
|
|
|
+import static org.springframework.security.crypto.util.EncodingUtils.subArray;
|
|
|
|
|
|
/**
|
|
|
* A {@code PasswordEncoder} implementation that uses PBKDF2 with a configurable number of
|
|
@@ -33,11 +37,15 @@ import static org.springframework.security.crypto.util.EncodingUtils.concatenate
|
|
|
* The algorithm is invoked on the concatenated bytes of the salt, secret and password.
|
|
|
*
|
|
|
* @author Rob Worsnop
|
|
|
+ * @author Rob Winch
|
|
|
+ * @since 4.1
|
|
|
*/
|
|
|
-public class PBKDF2PasswordEncoder extends AbstractPasswordEncoder {
|
|
|
+public class Pbkdf2PasswordEncoder implements PasswordEncoder {
|
|
|
private static final String PBKDF2_ALGORITHM = "PBKDF2WithHmacSHA1";
|
|
|
- private static final int DEFAULT_HASH_WIDTH = 160;
|
|
|
- private static final int DEFAULT_ITERATIONS = 1024;
|
|
|
+ private static final int DEFAULT_HASH_WIDTH = 256;
|
|
|
+ private static final int DEFAULT_ITERATIONS = 185000;
|
|
|
+
|
|
|
+ private final BytesKeyGenerator saltGenerator = KeyGenerators.secureRandom();
|
|
|
|
|
|
private final byte[] secret;
|
|
|
private final int hashWidth;
|
|
@@ -45,9 +53,11 @@ public class PBKDF2PasswordEncoder extends AbstractPasswordEncoder {
|
|
|
|
|
|
/**
|
|
|
* Constructs a PBKDF2 password encoder with no additional secret value. There will be
|
|
|
- * 1024 iterations and a hash width of 160.
|
|
|
+ * 360000 iterations and a hash width of 160. The default is based upon aiming for .5
|
|
|
+ * seconds to validate the password when this class was added.. Users should tune
|
|
|
+ * password verification to their own systems.
|
|
|
*/
|
|
|
- public PBKDF2PasswordEncoder() {
|
|
|
+ public Pbkdf2PasswordEncoder() {
|
|
|
this("");
|
|
|
}
|
|
|
|
|
@@ -57,7 +67,7 @@ public class PBKDF2PasswordEncoder extends AbstractPasswordEncoder {
|
|
|
*
|
|
|
* @param secret the secret key used in the encoding process (should not be shared)
|
|
|
*/
|
|
|
- public PBKDF2PasswordEncoder(CharSequence secret) {
|
|
|
+ public Pbkdf2PasswordEncoder(CharSequence secret) {
|
|
|
this(secret, DEFAULT_ITERATIONS, DEFAULT_HASH_WIDTH);
|
|
|
}
|
|
|
|
|
@@ -65,18 +75,51 @@ public class PBKDF2PasswordEncoder extends AbstractPasswordEncoder {
|
|
|
* Constructs a standard password encoder with a secret value as well as iterations
|
|
|
* and hash.
|
|
|
*
|
|
|
- * @param secret
|
|
|
- * @param iterations
|
|
|
- * @param hashWidth
|
|
|
+ * @param secret the secret
|
|
|
+ * @param iterations the number of iterations. Users should aim for taking about .5
|
|
|
+ * seconds on their own system.
|
|
|
+ * @param hashWidth the size of the hash
|
|
|
*/
|
|
|
- public PBKDF2PasswordEncoder(CharSequence secret, int iterations, int hashWidth) {
|
|
|
+ public Pbkdf2PasswordEncoder(CharSequence secret, int iterations, int hashWidth) {
|
|
|
this.secret = Utf8.encode(secret);
|
|
|
this.iterations = iterations;
|
|
|
this.hashWidth = hashWidth;
|
|
|
}
|
|
|
|
|
|
@Override
|
|
|
- protected byte[] encode(CharSequence rawPassword, byte[] salt) {
|
|
|
+ public String encode(CharSequence rawPassword) {
|
|
|
+ byte[] salt = this.saltGenerator.generateKey();
|
|
|
+ byte[] encoded = encodeAndConcatenate(rawPassword, salt);
|
|
|
+ return String.valueOf(Hex.encode(encoded));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Override
|
|
|
+ public boolean matches(CharSequence rawPassword, String encodedPassword) {
|
|
|
+ byte[] digested = Hex.decode(encodedPassword);
|
|
|
+ byte[] salt = subArray(digested, 0, this.saltGenerator.getKeyLength());
|
|
|
+ return matches(digested, encodeAndConcatenate(rawPassword, salt));
|
|
|
+ }
|
|
|
+
|
|
|
+ private byte[] encodeAndConcatenate(CharSequence rawPassword, byte[] salt) {
|
|
|
+ return concatenate(salt, encode(rawPassword, salt));
|
|
|
+ }
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Constant time comparison to prevent against timing attacks.
|
|
|
+ */
|
|
|
+ private static boolean matches(byte[] expected, byte[] actual) {
|
|
|
+ if (expected.length != actual.length) {
|
|
|
+ return false;
|
|
|
+ }
|
|
|
+
|
|
|
+ int result = 0;
|
|
|
+ for (int i = 0; i < expected.length; i++) {
|
|
|
+ result |= expected[i] ^ actual[i];
|
|
|
+ }
|
|
|
+ return result == 0;
|
|
|
+ }
|
|
|
+
|
|
|
+ private byte[] encode(CharSequence rawPassword, byte[] salt) {
|
|
|
try {
|
|
|
PBEKeySpec spec = new PBEKeySpec(rawPassword.toString().toCharArray(),
|
|
|
concatenate(salt, this.secret), this.iterations, this.hashWidth);
|
|
@@ -87,4 +130,4 @@ public class PBKDF2PasswordEncoder extends AbstractPasswordEncoder {
|
|
|
throw new IllegalStateException("Could not create hash", e);
|
|
|
}
|
|
|
}
|
|
|
-}
|
|
|
+}
|