1 /*
2 * Licensed to the Apache Software Foundation (ASF) under one or more
3 * contributor license agreements. See the NOTICE file distributed with
4 * this work for additional information regarding copyright ownership.
5 * The ASF licenses this file to You under the Apache License, Version 2.0
6 * (the "License"); you may not use this file except in compliance with
7 * the License. You may obtain a copy of the License at
8 *
9 * https://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17 package org.apache.commons.codec.digest;
18
19 import java.nio.charset.StandardCharsets;
20 import java.security.SecureRandom;
21
22 /**
23 * GNU libc crypt(3) compatible hash method.
24 * <p>
25 * See {@link #crypt(String, String)} for further details.
26 * </p>
27 * <p>
28 * This class is immutable and thread-safe.
29 * </p>
30 *
31 * @since 1.7
32 */
33 public class Crypt {
34
35 /**
36 * Encrypts a password in a crypt(3) compatible way.
37 * <p>
38 * A random salt and the default algorithm (currently SHA-512) are used. See {@link #crypt(String, String)} for
39 * details.
40 * </p>
41 * <p>
42 * A salt is generated for you using {@link SecureRandom}.
43 * </p>
44 *
45 * @param keyBytes
46 * plaintext password
47 * @return hash value
48 * @throws IllegalArgumentException
49 * when a {@link java.security.NoSuchAlgorithmException} is caught.
50 */
51 public static String crypt(final byte[] keyBytes) {
52 return crypt(keyBytes, null);
53 }
54
55 /**
56 * Encrypts a password in a crypt(3) compatible way.
57 * <p>
58 * If no salt is provided, a random salt and the default algorithm (currently SHA-512) will be used. See
59 * {@link #crypt(String, String)} for details.
60 * </p>
61 *
62 * @param keyBytes
63 * plaintext password
64 * @param salt
65 * the salt, which is used to select the algorithm, see {@link #crypt(String, String)}
66 * The salt may be null,
67 * in which case the method delegates to {@link Sha2Crypt#sha512Crypt(byte[])}
68 *
69 * @return hash value
70 * @throws IllegalArgumentException
71 * if the salt does not match the allowed pattern
72 * @throws IllegalArgumentException
73 * when a {@link java.security.NoSuchAlgorithmException} is caught.
74 */
75 public static String crypt(final byte[] keyBytes, final String salt) {
76 if (salt == null) {
77 return Sha2Crypt.sha512Crypt(keyBytes);
78 }
79 if (salt.startsWith(Sha2Crypt.SHA512_PREFIX)) {
80 return Sha2Crypt.sha512Crypt(keyBytes, salt);
81 }
82 if (salt.startsWith(Sha2Crypt.SHA256_PREFIX)) {
83 return Sha2Crypt.sha256Crypt(keyBytes, salt);
84 }
85 if (salt.startsWith(Md5Crypt.MD5_PREFIX)) {
86 return Md5Crypt.md5Crypt(keyBytes, salt);
87 }
88 return UnixCrypt.crypt(keyBytes, salt);
89 }
90
91 /**
92 * Calculates the digest using the strongest crypt(3) algorithm.
93 * <p>
94 * A random salt and the default algorithm (currently SHA-512) are used.
95 * </p>
96 * <p>
97 * A salt is generated for you using {@link SecureRandom}.
98 * </p>
99 *
100 * @see #crypt(String, String)
101 * @param key
102 * plaintext password
103 * @return hash value
104 * @throws IllegalArgumentException
105 * when a {@link java.security.NoSuchAlgorithmException} is caught.
106 */
107 public static String crypt(final String key) {
108 return crypt(key, null);
109 }
110
111 /**
112 * Encrypts a password in a crypt(3) compatible way.
113 * <p>
114 * The exact algorithm depends on the format of the salt string:
115 * </p>
116 * <ul>
117 * <li>SHA-512 salts start with {@code $6$} and are up to 16 chars long.
118 * <li>SHA-256 salts start with {@code $5$} and are up to 16 chars long
119 * <li>MD5 salts start with {@code $1$} and are up to 8 chars long
120 * <li>DES, the traditional UnixCrypt algorithm is used with only 2 chars
121 * <li>Only the first 8 chars of the passwords are used in the DES algorithm!
122 * </ul>
123 * <p>
124 * The magic strings {@code "$apr1$"} and {@code "$2a$"} are not recognized by this method as its output should be
125 * identical with that of the libc implementation.
126 * </p>
127 * <p>
128 * The rest of the salt string is drawn from the set {@code [a-zA-Z0-9./]} and is cut at the maximum length or if a
129 * {@code "$"} sign is encountered. It is therefore valid to enter a complete hash value as salt to for example verify a
130 * password with:
131 * </p>
132 * <pre>
133 * storedPwd.equals(crypt(enteredPwd, storedPwd))
134 * </pre>
135 * <p>
136 * The resulting string starts with the marker string ({@code $n$}), where n is the same as the input salt.
137 * The salt is then appended, followed by a {@code "$"} sign.
138 * This is followed by the actual hash value.
139 * For DES the string only contains the salt and actual hash.
140 * The total length is dependent on the algorithm used:
141 * </p>
142 * <ul>
143 * <li>SHA-512: 106 chars
144 * <li>SHA-256: 63 chars
145 * <li>MD5: 34 chars
146 * <li>DES: 13 chars
147 * </ul>
148 * <p>
149 * Example:
150 * </p>
151 * <pre>
152 * crypt("secret", "$1$xxxx") => "$1$xxxx$aMkevjfEIpa35Bh3G4bAc."
153 * crypt("secret", "xx") => "xxWAum7tHdIUw"
154 * </pre>
155 * <p>
156 * This method comes in a variation that accepts a byte[] array to support input strings that are not encoded in
157 * UTF-8 but for example in ISO-8859-1 where equal characters result in different byte values.
158 * </p>
159 *
160 * @see "The man page of the libc crypt (3) function."
161 * @param key
162 * plaintext password as entered by the used
163 * @param salt
164 * real salt value without prefix or "rounds=". The salt may be null, in which case a
165 * salt is generated for you using {@link SecureRandom}
166 * @return hash value, i.e. encrypted password including the salt string
167 * @throws IllegalArgumentException
168 * if the salt does not match the allowed pattern
169 * @throws IllegalArgumentException
170 * when a {@link java.security.NoSuchAlgorithmException} is caught. *
171 */
172 public static String crypt(final String key, final String salt) {
173 return crypt(key.getBytes(StandardCharsets.UTF_8), salt);
174 }
175
176 /**
177 * TODO Make private in 2.0.
178 *
179 * @deprecated TODO Make private in 2.0.
180 */
181 @Deprecated
182 public Crypt() {
183 // empty
184 }
185 }