/*
* JBoss, Home of Professional Open Source.
* Copyright 2014 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.wildfly.security.password.interfaces;
import java.security.spec.AlgorithmParameterSpec;
import org.wildfly.common.Assert;
import org.wildfly.security.password.OneWayPassword;
import org.wildfly.security.password.Password;
import org.wildfly.security.password.PasswordFactory;
import org.wildfly.security.password.spec.SaltedPasswordAlgorithmSpec;
/**
* A simple password where the generated digest also includes a salt.
*
* @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a>
*/
public interface SaltedSimpleDigestPassword extends OneWayPassword {
/**
* Algorithm name for digest created using MD5 with the password digested first followed by the salt.
*/
String ALGORITHM_PASSWORD_SALT_DIGEST_MD5 = "password-salt-digest-md5";
/**
* Algorithm name for digest created using SHA-1 with the password digested first followed by the salt.
*/
String ALGORITHM_PASSWORD_SALT_DIGEST_SHA_1 = "password-salt-digest-sha-1";
/**
* Algorithm name for digest created using SHA-256 with the password digested first followed by the salt.
*/
String ALGORITHM_PASSWORD_SALT_DIGEST_SHA_256 = "password-salt-digest-sha-256";
/**
* Algorithm name for digest created using SHA-384 with the password digested first followed by the salt.
*/
String ALGORITHM_PASSWORD_SALT_DIGEST_SHA_384 = "password-salt-digest-sha-384";
/**
* Algorithm name for digest created using SHA-512 with the password digested first followed by the salt.
*/
String ALGORITHM_PASSWORD_SALT_DIGEST_SHA_512 = "password-salt-digest-sha-512";
/**
* Algorithm name for digest created using MD5 with the salt digested first followed by the password.
*/
String ALGORITHM_SALT_PASSWORD_DIGEST_MD5 = "salt-password-digest-md5";
/**
* Algorithm name for digest created using SHA-1 with the salt digested first followed by the password.
*/
String ALGORITHM_SALT_PASSWORD_DIGEST_SHA_1 = "salt-password-digest-sha-1";
/**
* Algorithm name for digest created using SHA-256 with the salt digested first followed by the password.
*/
String ALGORITHM_SALT_PASSWORD_DIGEST_SHA_256 = "salt-password-digest-sha-256";
/**
* Algorithm name for digest created using SHA-384 with the salt digested first followed by the password.
*/
String ALGORITHM_SALT_PASSWORD_DIGEST_SHA_384 = "salt-password-digest-sha-384";
/**
* Algorithm name for digest created using SHA-512 with the salt digested first followed by the password.
*/
String ALGORITHM_SALT_PASSWORD_DIGEST_SHA_512 = "salt-password-digest-sha-512";
/**
* The default salt size (in bytes), used when generating a random salt.
*/
int DEFAULT_SALT_SIZE = 12;
/**
* Get the digest represented by this {@linkplain Password password}.
*
* @return the digest represented by this {@linkplain Password password}
*/
byte[] getDigest();
/**
* Get the salt used to generate the digest.
*
* @return the salt used to generate the digest
*/
byte[] getSalt();
default SaltedPasswordAlgorithmSpec getParameterSpec() {
return new SaltedPasswordAlgorithmSpec(getSalt());
}
default boolean impliesParameters(AlgorithmParameterSpec parameterSpec) {
Assert.checkNotNullParam("parameterSpec", parameterSpec);
return parameterSpec.equals(getParameterSpec());
}
/**
* Creates and returns a copy of this {@link Password}.
*
* @return a copy of this {@link Password}.
*/
SaltedSimpleDigestPassword clone();
/**
* Create a raw implementation of this password type. No validation of the content is performed, and the password
* must be "adopted" in to a {@link PasswordFactory} (via the {@link PasswordFactory#translate(Password)} method)
* before it can be validated and used to verify guesses.
*
* @param algorithm the algorithm name
* @param digest the digest
* @param salt the salt
* @return the raw password implementation
*/
static SaltedSimpleDigestPassword createRaw(final String algorithm, final byte[] digest, final byte[] salt) {
return new RawSaltedSimpleDigestPassword(algorithm, digest.clone(), salt.clone());
}
}