/*
 * =============================================================================
 * 
 *   Copyright (c) 2007-2010, The JASYPT team (http://www.jasypt.org)
 * 
 *   Licensed under the Apache License, Version 2.0 (the "License");
 *   you may not use this file except in compliance with the License.
 *   You may obtain a copy of the License at
 * 
 *       http://www.apache.org/licenses/LICENSE-2.0
 * 
 *   Unless required by applicable law or agreed to in writing, software
 *   distributed under the License is distributed on an "AS IS" BASIS,
 *   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *   See the License for the specific language governing permissions and
 *   limitations under the License.
 * 
 * =============================================================================
 */
package org.jasypt.digest.config;

import java.security.Provider;

import org.jasypt.salt.SaltGenerator;

Common interface for config classes applicable to StandardByteDigester, StandardStringDigester, PooledByteDigester or PooledStringDigester objects.

This interface lets the user create new DigesterConfig classes which retrieve values for this parameters from different (and maybe more secure) sources (remote servers, LDAP, other databases...), and do this transparently for the digester object.

The config objects passed to a digester will only be queried once for each configuration parameter, and this will happen during the initialization of the digester object.

For a default implementation, see SimpleDigesterConfig.

Author:Daniel Fernández
Since:1.0
/** * <p> * Common interface for config classes applicable to * {@link org.jasypt.digest.StandardByteDigester}, * {@link org.jasypt.digest.StandardStringDigester}, * {@link org.jasypt.digest.PooledByteDigester} or * {@link org.jasypt.digest.PooledStringDigester} * objects. * </p> * <p> * This interface lets the user create new <tt>DigesterConfig</tt> * classes which retrieve values for this parameters from different * (and maybe more secure) sources (remote servers, LDAP, other databases...), * and do this transparently for the digester object. * </p> * <p> * The config objects passed to a digester <u>will only be queried once</u> * for each configuration parameter, and this will happen * during the initialization of the digester object. * </p> * <p> * For a default implementation, see {@link SimpleDigesterConfig}. * </p> * * @since 1.0 * * @author Daniel Fern&aacute;ndez * */
public interface DigesterConfig {

Returns the name of an algorithm to be used for hashing, like "MD5" or "SHA-1".

This algorithm has to be supported by your Java Virtual Machine, and it should be allowed as an algorithm for creating java.security.MessageDigest instances.

If this method returns null, the digester will ignore the config object when deciding the algorithm to be used.

Returns:the name of the algorithm to be used, or null if this object will not want to set an algorithm. See Appendix A in the Java Cryptography Architecture API Specification & Reference for information about standard algorithm names.
/** * <p> * Returns the name of an algorithm to be used for hashing, like "MD5" or * "SHA-1". * </p> * <p> * This algorithm has to be supported by your Java Virtual Machine, and * it should be allowed as an algorithm for creating * java.security.MessageDigest instances. * </p> * <p> * If this method returns null, the digester will ignore the config object * when deciding the algorithm to be used. * </p> * * @return the name of the algorithm to be used, or null if this object * will not want to set an algorithm. See Appendix A * in the <a target="_blank" * href="http://java.sun.com/j2se/1.5.0/docs/guide/security/CryptoSpec.html#AppA">Java * Cryptography Architecture API Specification & * Reference</a> * for information about standard algorithm names. */
public String getAlgorithm();

Returns the size of the salt to be used to compute the digest. This mechanism is explained in PKCS #5: Password-Based Cryptography Standard.

If salt size is set to zero, then no salt will be used.

If this method returns null, the digester will ignore the config object when deciding the size of the salt to be used.

Returns:the size of the salt to be used, in bytes, or null if this object will not want to set a size for salt.
/** * <p> * Returns the size of the salt to be used to compute the digest. * This mechanism is explained in * <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2127" * target="_blank">PKCS &#035;5: Password-Based Cryptography Standard</a>. * </p> * <p> * If salt size is set to zero, then no salt will be used. * </p> * <p> * If this method returns null, the digester will ignore the config object * when deciding the size of the salt to be used. * </p> * * @return the size of the salt to be used, in bytes, or null if * this object will not want to set a size for salt. */
public Integer getSaltSizeBytes();

Returns the number of times the hash function will be applied recursively.
The hash function will be applied to its own results as many times as specified: h(h(...h(x)...))

This mechanism is explained in PKCS #5: Password-Based Cryptography Standard.

If this method returns null, the digester will ignore the config object when deciding the number of hashing iterations.

Returns:the number of iterations, or null if this object will not want to set the number of iterations.
/** * <p> * Returns the number of times the hash function will be applied recursively. * <br/> * The hash function will be applied to its own results as many times as * specified: <i>h(h(...h(x)...))</i> * </p> * <p> * This mechanism is explained in * <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2127" * target="_blank">PKCS &#035;5: Password-Based Cryptography Standard</a>. * </p> * <p> * If this method returns null, the digester will ignore the config object * when deciding the number of hashing iterations. * </p> * * @return the number of iterations, or null if this object will not want * to set the number of iterations. */
public Integer getIterations();

Returns a SaltGenerator implementation to be used by the digester.

If this method returns null, the digester will ignore the config object when deciding the salt generator to be used.

Since:1.2
Returns:the salt generator, or null if this object will not want to set a specific SaltGenerator implementation.
/** * <p> * Returns a {@link SaltGenerator} implementation to be used by the digester. * </p> * <p> * If this method returns null, the digester will ignore the config object * when deciding the salt generator to be used. * </p> * * @since 1.2 * * @return the salt generator, or null if this object will not want to set * a specific SaltGenerator implementation. */
public SaltGenerator getSaltGenerator();

Returns the name of the java.security.Provider implementation to be used by the digester for obtaining the digest algorithm. This provider must have been registered beforehand.

If this method returns null, the digester will ignore this parameter when deciding the name of the security provider to be used.

If this method does not return null, and neither does getProvider(), providerName will be ignored, and the provider object returned by getProvider() will be used.

Since:1.3
Returns:the name of the security provider to be used.
/** * <p> * Returns the name of the <tt>java.security.Provider</tt> implementation * to be used by the digester for obtaining the digest algorithm. This * provider must have been registered beforehand. * </p> * <p> * If this method returns null, the digester will ignore this parameter * when deciding the name of the security provider to be used. * </p> * <p> * If this method does not return null, and neither does {@link #getProvider()}, * <tt>providerName</tt> will be ignored, and the provider object returned * by <tt>getProvider()</tt> will be used. * </p> * * @since 1.3 * * @return the name of the security provider to be used. */
public String getProviderName();

Returns the java.security.Provider implementation object to be used by the digester for obtaining the digest algorithm.

If this method returns null, the digester will ignore this parameter when deciding the security provider object to be used.

If this method does not return null, and neither does getProviderName(), providerName will be ignored, and the provider object returned by getProvider() will be used.

The provider returned by this method does not need to be registered beforehand, and its use will not result in its being registered.

Since:1.3
Returns:the security provider object to be asked for the digest algorithm.
/** * <p> * Returns the <tt>java.security.Provider</tt> implementation object * to be used by the digester for obtaining the digest algorithm. * </p> * <p> * If this method returns null, the digester will ignore this parameter * when deciding the security provider object to be used. * </p> * <p> * If this method does not return null, and neither does {@link #getProviderName()}, * <tt>providerName</tt> will be ignored, and the provider object returned * by <tt>getProvider()</tt> will be used. * </p> * <p> * The provider returned by this method <b>does not need to be * registered beforehand<b>, and its use will not result in its * being registered. * </p> * * @since 1.3 * * @return the security provider object to be asked for the digest * algorithm. */
public Provider getProvider();

Returns Boolean.TRUE if the salt bytes are to be appended after the message ones before performing the digest operation on the whole. The default behaviour is to insert those bytes before the message bytes, but setting this configuration item to true allows compatibility with some external systems and specifications (e.g. LDAP {SSHA}).

Since:1.7
Returns:whether salt will be appended after the message before applying the digest operation on the whole, instead of inserted before it (which is the default). If null is returned, the default behaviour will be applied.
/** * <p> * Returns <tt>Boolean.TRUE</tt> if the salt bytes are to be appended after the * message ones before performing the digest operation on the whole. The * default behaviour is to insert those bytes before the message bytes, but * setting this configuration item to <tt>true</tt> allows compatibility * with some external systems and specifications (e.g. LDAP {SSHA}). * </p> * * @since 1.7 * * @return whether salt will be appended after the message before applying * the digest operation on the whole, instead of inserted before it * (which is the default). If null is returned, the default * behaviour will be applied. */
public Boolean getInvertPositionOfSaltInMessageBeforeDigesting();

Returns Boolean.TRUE if the plain (not hashed) salt bytes are to be appended after the digest operation result bytes. The default behaviour is to insert them before the digest result, but setting this configuration item to true allows compatibility with some external systems and specifications (e.g. LDAP {SSHA}).

Since:1.7
Returns:whether plain salt will be appended after the digest operation result instead of inserted before it (which is the default). If null is returned, the default behaviour will be applied.
/** * <p> * Returns <tt>Boolean.TRUE</tt> if the plain (not hashed) salt bytes are to * be appended after the digest operation result bytes. The default behaviour is * to insert them before the digest result, but setting this configuration * item to <tt>true</tt> allows compatibility with some external systems * and specifications (e.g. LDAP {SSHA}). * </p> * * @since 1.7 * * @return whether plain salt will be appended after the digest operation * result instead of inserted before it (which is the * default). If null is returned, the default behaviour will be * applied. */
public Boolean getInvertPositionOfPlainSaltInEncryptionResults();

Returns Boolean.TRUE if digest matching operations will allow matching digests with a salt size different to the one configured in the "saltSizeBytes" property. This is possible because digest algorithms will produce a fixed-size result, so the remaining bytes from the hashed input will be considered salt.

This will allow the digester to match digests produced in environments which do not establish a fixed salt size as standard (for example, SSHA password encryption in LDAP systems).

The value of this property will not affect the creation of digests, which will always have a salt of the size established by the "saltSizeBytes" property. It will only affect digest matching.

Setting this property to true is not compatible with SaltGenerator implementations which return false for their SaltGenerator.includePlainSaltInEncryptionResults() property.

Also, be aware that some algorithms or algorithm providers might not support knowing the size of the digests beforehand, which is also incompatible with a lenient behaviour.

Default is FALSE.

Since:1.7
Returns:whether the digester will allow matching of digests with different salt sizes than established or not (default is false).
/** * <p> * Returns <tt>Boolean.TRUE</tt> if digest matching operations will allow matching * digests with a salt size different to the one configured in the "saltSizeBytes" * property. This is possible because digest algorithms will produce a fixed-size * result, so the remaining bytes from the hashed input will be considered salt. * </p> * <p> * This will allow the digester to match digests produced in environments which do not * establish a fixed salt size as standard (for example, SSHA password encryption * in LDAP systems). * </p> * <p> * The value of this property will <b>not</b> affect the creation of digests, * which will always have a salt of the size established by the "saltSizeBytes" * property. It will only affect digest matching. * </p> * <p> * Setting this property to <tt>true</tt> is not compatible with {@link SaltGenerator} * implementations which return false for their * {@link SaltGenerator#includePlainSaltInEncryptionResults()} property. * </p> * <p> * Also, be aware that some algorithms or algorithm providers might not support * knowing the size of the digests beforehand, which is also incompatible with * a lenient behaviour. * </p> * <p> * <b>Default is <tt>FALSE</tt></b>. * </p> * * @since 1.7 * * @return whether the digester will allow matching of digests with different * salt sizes than established or not (default is false). */
public Boolean getUseLenientSaltSizeCheck();

Get the size of the pool of digesters to be created.

This parameter will be ignored if used with a non-pooled digester.

Since:1.7
Returns:the size of the pool to be used if this configuration is used with a pooled digester
/** * <p> * Get the size of the pool of digesters to be created. * </p> * <p> * <b>This parameter will be ignored if used with a non-pooled digester</b>. * </p> * * @since 1.7 * * @return the size of the pool to be used if this configuration is used with a * pooled digester */
public Integer getPoolSize(); }