-
-
Save Anjireddy4246/fdc7eb2c2756d1b693f2e5096b22fb30 to your computer and use it in GitHub Desktop.
Generate a SALT in Java for Salted-Hash.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package com.pwxcoo.github.utils; | |
import javax.crypto.SecretKeyFactory; | |
import javax.crypto.spec.PBEKeySpec; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
import java.security.spec.InvalidKeySpecException; | |
import java.util.Arrays; | |
import java.util.Base64; | |
import java.util.Random; | |
/** | |
* @author pwxcoo | |
* @package com.pwxcoo.github.utils | |
* @email [email protected] | |
* @time 2018/10/01 13:24 | |
* @description password util | |
* @from https://stackoverflow.com/questions/18142745/how-do-i-generate-a-salt-in-java-for-salted-hash | |
*/ | |
public class PasswordUtil { | |
private static final Random RANDOM = new SecureRandom(); | |
private static final int ITERATIONS = 10000; | |
private static final int KEY_LENGTH = 256; | |
/** | |
* static utility class | |
*/ | |
private PasswordUtil() { } | |
/** | |
* Returns a random salt to be used to hash a password. | |
* | |
* @return a 16 bytes random salt | |
*/ | |
public static String getNextSalt() { | |
byte[] salt = new byte[16]; | |
RANDOM.nextBytes(salt); | |
// return salt; | |
return Base64.getEncoder().encodeToString(salt); | |
} | |
/** | |
* Returns a salted and hashed password using the provided hash.<br> | |
* Note - side effect: the password is destroyed (the char[] is filled with zeros) | |
* | |
* @param password the password to be hashed | |
* @param salt a 16 bytes salt, ideally obtained with the getNextSalt method | |
* | |
* @return the hashed password with a pinch of salt | |
*/ | |
public static String hash(char[] password, String salt) { | |
PBEKeySpec spec = new PBEKeySpec(password, Base64.getDecoder().decode(salt), ITERATIONS, KEY_LENGTH); | |
Arrays.fill(password, Character.MIN_VALUE); | |
try { | |
SecretKeyFactory skf = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1"); | |
// return skf.generateSecret(spec).getEncoded(); | |
return Base64.getEncoder().encodeToString(skf.generateSecret(spec).getEncoded()); | |
} catch (NoSuchAlgorithmException | InvalidKeySpecException e) { | |
throw new AssertionError("Error while hashing a password: " + e.getMessage(), e); | |
} finally { | |
spec.clearPassword(); | |
} | |
} | |
/** | |
* Returns true if the given password and salt match the hashed value, false otherwise.<br> | |
* Note - side effect: the password is destroyed (the char[] is filled with zeros) | |
* | |
* @param password the password to check | |
* @param salt the salt used to hash the password | |
* @param expectedHash the expected hashed value of the password | |
* | |
* @return true if the given password and salt match the hashed value, false otherwise | |
*/ | |
public static boolean isExpectedPassword(char[] password, String salt, char[] expectedHash) { | |
char[] pwdHash = hash(password, salt).toCharArray(); | |
Arrays.fill(password, Character.MIN_VALUE); | |
if (pwdHash.length != expectedHash.length) return false; | |
for (int i = 0; i < pwdHash.length; i++) { | |
if (pwdHash[i] != expectedHash[i]) return false; | |
} | |
return true; | |
} | |
/** | |
* Generates a random password of a given length, using letters and digits. | |
* | |
* @param length the length of the password | |
* | |
* @return a random password | |
*/ | |
public static String generateRandomPassword(int length) { | |
StringBuilder sb = new StringBuilder(length); | |
for (int i = 0; i < length; i++) { | |
int c = RANDOM.nextInt(62); | |
if (c <= 9) { | |
sb.append(String.valueOf(c)); | |
} else if (c < 36) { | |
sb.append((char) ('a' + c - 10)); | |
} else { | |
sb.append((char) ('A' + c - 36)); | |
} | |
} | |
return sb.toString(); | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package com.pwxcoo.github.utils; | |
import javax.crypto.SecretKeyFactory; | |
import javax.crypto.spec.PBEKeySpec; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
import java.security.spec.InvalidKeySpecException; | |
import java.util.Arrays; | |
import java.util.Random; | |
/** | |
* @author pwxcoo | |
* @package com.pwxcoo.github.utils | |
* @email [email protected] | |
* @time 2018/10/01 13:24 | |
* @description password util | |
* @from https://stackoverflow.com/questions/18142745/how-do-i-generate-a-salt-in-java-for-salted-hash | |
*/ | |
public class PasswordUtil { | |
private static final Random RANDOM = new SecureRandom(); | |
private static final int ITERATIONS = 10000; | |
private static final int KEY_LENGTH = 256; | |
/** | |
* static utility class | |
*/ | |
private PasswordUtil() { } | |
/** | |
* Returns a random salt to be used to hash a password. | |
* | |
* @return a 16 bytes random salt | |
*/ | |
public static byte[] getNextSalt() { | |
byte[] salt = new byte[16]; | |
RANDOM.nextBytes(salt); | |
return salt; | |
} | |
/** | |
* Returns a salted and hashed password using the provided hash.<br> | |
* Note - side effect: the password is destroyed (the char[] is filled with zeros) | |
* | |
* @param password the password to be hashed | |
* @param salt a 16 bytes salt, ideally obtained with the getNextSalt method | |
* | |
* @return the hashed password with a pinch of salt | |
*/ | |
public static byte[] hash(char[] password, byte[] salt) { | |
PBEKeySpec spec = new PBEKeySpec(password, salt, ITERATIONS, KEY_LENGTH); | |
Arrays.fill(password, Character.MIN_VALUE); | |
try { | |
SecretKeyFactory skf = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1"); | |
return skf.generateSecret(spec).getEncoded(); | |
} catch (NoSuchAlgorithmException | InvalidKeySpecException e) { | |
throw new AssertionError("Error while hashing a password: " + e.getMessage(), e); | |
} finally { | |
spec.clearPassword(); | |
} | |
} | |
/** | |
* Returns true if the given password and salt match the hashed value, false otherwise.<br> | |
* Note - side effect: the password is destroyed (the char[] is filled with zeros) | |
* | |
* @param password the password to check | |
* @param salt the salt used to hash the password | |
* @param expectedHash the expected hashed value of the password | |
* | |
* @return true if the given password and salt match the hashed value, false otherwise | |
*/ | |
public static boolean isExpectedPassword(char[] password, byte[] salt, byte[] expectedHash) { | |
byte[] pwdHash = hash(password, salt); | |
Arrays.fill(password, Character.MIN_VALUE); | |
if (pwdHash.length != expectedHash.length) return false; | |
for (int i = 0; i < pwdHash.length; i++) { | |
if (pwdHash[i] != expectedHash[i]) return false; | |
} | |
return true; | |
} | |
/** | |
* Generates a random password of a given length, using letters and digits. | |
* | |
* @param length the length of the password | |
* | |
* @return a random password | |
*/ | |
public static String generateRandomPassword(int length) { | |
StringBuilder sb = new StringBuilder(length); | |
for (int i = 0; i < length; i++) { | |
int c = RANDOM.nextInt(62); | |
if (c <= 9) { | |
sb.append(String.valueOf(c)); | |
} else if (c < 36) { | |
sb.append((char) ('a' + c - 10)); | |
} else { | |
sb.append((char) ('A' + c - 36)); | |
} | |
} | |
return sb.toString(); | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment