/*
 * Copyright 2002-2011 the original author or authors.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.springframework.security.crypto.bcrypt;

import java.security.SecureRandom;
import java.util.regex.Matcher;
import java.util.regex.Pattern;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

import org.springframework.security.crypto.password.PasswordEncoder;

Implementation of PasswordEncoder that uses the BCrypt strong hashing function. Clients can optionally supply a "version" ($2a, $2b, $2y) and a "strength" (a.k.a. log rounds in BCrypt) and a SecureRandom instance. The larger the strength parameter the more work will have to be done (exponentially) to hash the passwords. The default value is 10.
Author:Dave Syer
/** * Implementation of PasswordEncoder that uses the BCrypt strong hashing function. Clients * can optionally supply a "version" ($2a, $2b, $2y) and a "strength" (a.k.a. log rounds * in BCrypt) and a SecureRandom instance. The larger the strength parameter the more work * will have to be done (exponentially) to hash the passwords. The default value is 10. * * @author Dave Syer */
public class BCryptPasswordEncoder implements PasswordEncoder { private Pattern BCRYPT_PATTERN = Pattern.compile("\\A\\$2(a|y|b)?\\$(\\d\\d)\\$[./0-9A-Za-z]{53}"); private final Log logger = LogFactory.getLog(getClass()); private final int strength; private final BCryptVersion version; private final SecureRandom random; public BCryptPasswordEncoder() { this(-1); }
Params:
  • strength – the log rounds to use, between 4 and 31
/** * @param strength the log rounds to use, between 4 and 31 */
public BCryptPasswordEncoder(int strength) { this(strength, null); }
Params:
  • version – the version of bcrypt, can be 2a,2b,2y
/** * @param version the version of bcrypt, can be 2a,2b,2y */
public BCryptPasswordEncoder(BCryptVersion version) { this(version, null); }
Params:
  • version – the version of bcrypt, can be 2a,2b,2y
  • random – the secure random instance to use
/** * @param version the version of bcrypt, can be 2a,2b,2y * @param random the secure random instance to use */
public BCryptPasswordEncoder(BCryptVersion version, SecureRandom random) { this(version, -1, random); }
Params:
  • strength – the log rounds to use, between 4 and 31
  • random – the secure random instance to use
/** * @param strength the log rounds to use, between 4 and 31 * @param random the secure random instance to use */
public BCryptPasswordEncoder(int strength, SecureRandom random) { this(BCryptVersion.$2A, strength, random); }
Params:
  • version – the version of bcrypt, can be 2a,2b,2y
  • strength – the log rounds to use, between 4 and 31
/** * @param version the version of bcrypt, can be 2a,2b,2y * @param strength the log rounds to use, between 4 and 31 */
public BCryptPasswordEncoder(BCryptVersion version, int strength) { this(version, strength, null); }
Params:
  • version – the version of bcrypt, can be 2a,2b,2y
  • strength – the log rounds to use, between 4 and 31
  • random – the secure random instance to use
/** * @param version the version of bcrypt, can be 2a,2b,2y * @param strength the log rounds to use, between 4 and 31 * @param random the secure random instance to use */
public BCryptPasswordEncoder(BCryptVersion version, int strength, SecureRandom random) { if (strength != -1 && (strength < BCrypt.MIN_LOG_ROUNDS || strength > BCrypt.MAX_LOG_ROUNDS)) { throw new IllegalArgumentException("Bad strength"); } this.version = version; this.strength = (strength == -1) ? 10 : strength; this.random = random; } @Override public String encode(CharSequence rawPassword) { if (rawPassword == null) { throw new IllegalArgumentException("rawPassword cannot be null"); } String salt = getSalt(); return BCrypt.hashpw(rawPassword.toString(), salt); } private String getSalt() { if (this.random != null) { return BCrypt.gensalt(this.version.getVersion(), this.strength, this.random); } return BCrypt.gensalt(this.version.getVersion(), this.strength); } @Override public boolean matches(CharSequence rawPassword, String encodedPassword) { if (rawPassword == null) { throw new IllegalArgumentException("rawPassword cannot be null"); } if (encodedPassword == null || encodedPassword.length() == 0) { this.logger.warn("Empty encoded password"); return false; } if (!this.BCRYPT_PATTERN.matcher(encodedPassword).matches()) { this.logger.warn("Encoded password does not look like BCrypt"); return false; } return BCrypt.checkpw(rawPassword.toString(), encodedPassword); } @Override public boolean upgradeEncoding(String encodedPassword) { if (encodedPassword == null || encodedPassword.length() == 0) { this.logger.warn("Empty encoded password"); return false; } Matcher matcher = this.BCRYPT_PATTERN.matcher(encodedPassword); if (!matcher.matches()) { throw new IllegalArgumentException("Encoded password does not look like BCrypt: " + encodedPassword); } int strength = Integer.parseInt(matcher.group(2)); return strength < this.strength; }
Stores the default bcrypt version for use in configuration.
Author:Lin Feng
/** * Stores the default bcrypt version for use in configuration. * * @author Lin Feng */
public enum BCryptVersion { $2A("$2a"), $2Y("$2y"), $2B("$2b"); private final String version; BCryptVersion(String version) { this.version = version; } public String getVersion() { return this.version; } } }