public class BCrypt extends Object
This password hashing system tries to thwart off-line password cracking using a computationally-intensive hashing algorithm, based on Bruce Schneier's Blowfish cipher. The work factor of the algorithm is parameterised, so it can be increased as computers get faster.
Usage is really simple. To hash a password for the first time, call the hashpw method with a random salt, like this:
String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
To check whether a plaintext password matches one that has been hashed previously, use the checkpw method:
if (BCrypt.checkpw(candidate_password, stored_hash))
System.out.println("It matches");
else
System.out.println("It does not match");
The gensalt() method takes an optional parameter (log_rounds) that determines the computational complexity of the hashing:
String strong_salt = BCrypt.gensalt(10)
String stronger_salt = BCrypt.gensalt(12)
The amount of work increases exponentially (2**log_rounds), so each increment is twice as much work. The default log_rounds is 10, and the valid range is 4 to 30.
| Modifier and Type | Field and Description |
|---|---|
static int |
BCRYPT_SALT_LEN |
static int |
GENSALT_DEFAULT_LOG2_ROUNDS |
| Constructor and Description |
|---|
BCrypt() |
| Modifier and Type | Method and Description |
|---|---|
static boolean |
checkpw(String sPlaintext,
String sHashed)
Check that a plaintext password matches a previously hashed one
|
byte[] |
crypt_raw(byte[] password,
byte[] salt,
int nLogRounds,
int[] cdata)
Perform the central password hashing step in the bcrypt scheme
|
static String |
gensalt()
Generate a salt for use with the BCrypt.hashpw() method, selecting a
reasonable default for the number of hashing rounds to apply
|
static String |
gensalt(int log_rounds)
Generate a salt for use with the BCrypt.hashpw() method
|
static String |
gensalt(int nLogRounds,
SecureRandom aRandom)
Generate a salt for use with the BCrypt.hashpw() method
|
static String |
hashpw(String sPassword,
String sSalt)
Hash a password using the OpenBSD bcrypt scheme
|
public static final int GENSALT_DEFAULT_LOG2_ROUNDS
public static final int BCRYPT_SALT_LEN
@Nonnull public byte[] crypt_raw(byte[] password, byte[] salt, int nLogRounds, int[] cdata)
password - the password to hashsalt - the binary salt to hash with the passwordnLogRounds - the binary logarithm of the number of rounds of hashing to applycdata - the plaintext to encrypt@Nonnull public static String hashpw(@Nonnull String sPassword, @Nonnull String sSalt)
sPassword - the password to hashsSalt - the salt to hash with (perhaps generated using BCrypt.gensalt)@Nonnull public static String gensalt(@Nonnegative int nLogRounds, @Nonnull SecureRandom aRandom)
nLogRounds - the log2 of the number of rounds of hashing to apply - the work
factor therefore increases as 2**log_rounds.aRandom - an instance of SecureRandom to use@Nonnull public static String gensalt(@Nonnegative int log_rounds)
log_rounds - the log2 of the number of rounds of hashing to apply - the work
factor therefore increases as 2**log_rounds.@Nonnull public static String gensalt()
public static boolean checkpw(@Nonnull String sPlaintext, @Nonnull String sHashed)
sPlaintext - the plaintext password to verifysHashed - the previously-hashed passwordtrue if the passwords match, false
otherwiseCopyright © 2016–2021 Philip Helger. All rights reserved.