001/*
002 * Licensed to the Apache Software Foundation (ASF) under one or more
003 * contributor license agreements.  See the NOTICE file distributed with
004 * this work for additional information regarding copyright ownership.
005 * The ASF licenses this file to You under the Apache License, Version 2.0
006 * (the "License"); you may not use this file except in compliance with
007 * the License.  You may obtain a copy of the License at
008 *
009 *      https://www.apache.org/licenses/LICENSE-2.0
010 *
011 * Unless required by applicable law or agreed to in writing, software
012 * distributed under the License is distributed on an "AS IS" BASIS,
013 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
014 * See the License for the specific language governing permissions and
015 * limitations under the License.
016 */
017package org.apache.commons.codec.digest;
018
019import java.nio.charset.StandardCharsets;
020import java.security.MessageDigest;
021import java.security.SecureRandom;
022import java.util.Arrays;
023import java.util.Objects;
024import java.util.Random;
025import java.util.regex.Matcher;
026import java.util.regex.Pattern;
027
028/**
029 * The libc crypt() "$1$" and Apache "$apr1$" MD5-based hash algorithm.
030 * <p>
031 * Based on the public domain ("beer-ware") C implementation from Poul-Henning Kamp which was found at: <a
032 * href="https://www.freebsd.org/cgi/cvsweb.cgi/src/lib/libcrypt/crypt-md5.c?rev=1.1;content-type=text%2Fplain">
033 * crypt-md5.c @ freebsd.org</a>
034 * </p>
035 * <p>
036 * Source:
037 * </p>
038 * <pre>
039 * $FreeBSD: src/lib/libcrypt/crypt-md5.c,v 1.1 1999/01/21 13:50:09 brandon Exp $
040 * </pre>
041 * <p>
042 * Conversion to Kotlin and from there to Java in 2012.
043 * </p>
044 * <p>
045 * The C style comments are from the original C code, the ones with "//" from the port.
046 * </p>
047 * <p>
048 * This class is immutable and thread-safe.
049 * </p>
050 *
051 * @since 1.7
052 */
053public class Md5Crypt {
054
055    /** The Identifier of the Apache variant. */
056    static final String APR1_PREFIX = "$apr1$";
057
058    /** The number of bytes of the final hash. */
059    private static final int BLOCKSIZE = 16;
060
061    /** The Identifier of this crypt() variant. */
062    static final String MD5_PREFIX = "$1$";
063
064    /** The number of rounds of the big loop. */
065    private static final int ROUNDS = 1000;
066
067    /**
068     * See {@link #apr1Crypt(byte[], String)} for details.
069     * <p>
070     * A salt is generated for you using {@link SecureRandom}; your own {@link Random} in
071     * {@link #apr1Crypt(byte[], Random)}.
072     * </p>
073     *
074     * @param keyBytes plaintext string to hash. Each array element is set to {@code 0} before returning.
075     * @return the hash value.
076     * @throws IllegalArgumentException when a {@link java.security.NoSuchAlgorithmException} is caught.
077     * @see #apr1Crypt(byte[], String)
078     */
079    public static String apr1Crypt(final byte[] keyBytes) {
080        return apr1Crypt(keyBytes, APR1_PREFIX + B64.getRandomSalt(8));
081    }
082
083    /**
084     * See {@link #apr1Crypt(byte[], String)} for details.
085     * <p>
086     * A salt is generated for you using the user provided {@link Random}.
087     * </p>
088     *
089     * @param keyBytes plaintext string to hash. Each array element is set to {@code 0} before returning.
090     * @param random the instance of {@link Random} to use for generating the salt.
091     *              Consider using {@link SecureRandom} for more secure salts.
092     * @return the hash value.
093     * @throws IllegalArgumentException when a {@link java.security.NoSuchAlgorithmException} is caught.
094     * @see #apr1Crypt(byte[], String)
095     * @since 1.12
096     */
097    public static String apr1Crypt(final byte[] keyBytes, final Random random) {
098        return apr1Crypt(keyBytes, APR1_PREFIX + B64.getRandomSalt(8, random));
099    }
100
101    /**
102     * See {@link #apr1Crypt(String, String)} for details.
103     * <p>
104     * A salt is generated for you using {@link SecureRandom}
105     * </p>
106     *
107     * @param keyBytes
108     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
109     * @param salt
110     *            An APR1 salt. The salt may be null, in which case a salt is generated for you using
111     *            {@link SecureRandom}.
112     * @return the hash value.
113     * @throws IllegalArgumentException
114     *             if the salt does not match the allowed pattern.
115     * @throws IllegalArgumentException
116     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
117     */
118    public static String apr1Crypt(final byte[] keyBytes, String salt) {
119        // to make the md5Crypt regex happy
120        if (salt != null && !salt.startsWith(APR1_PREFIX)) {
121            salt = APR1_PREFIX + salt;
122        }
123        return md5Crypt(keyBytes, salt, APR1_PREFIX);
124    }
125
126    /**
127     * See {@link #apr1Crypt(String, String)} for details.
128     * <p>
129     * A salt is generated for you using {@link SecureRandom}.
130     * </p>
131     *
132     * @param keyBytes
133     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
134     * @return the hash value.
135     * @throws IllegalArgumentException
136     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
137     * @see #apr1Crypt(byte[], String)
138     */
139    public static String apr1Crypt(final String keyBytes) {
140        return apr1Crypt(keyBytes.getBytes(StandardCharsets.UTF_8));
141    }
142
143    /**
144     * Generates an Apache htpasswd compatible "$apr1$" MD5 based hash value.
145     * <p>
146     * The algorithm is identical to the crypt(3) "$1$" one but produces different outputs due to the different salt
147     * prefix.
148     * </p>
149     *
150     * @param keyBytes
151     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
152     * @param salt
153     *            salt string including the prefix and optionally garbage at the end. The salt may be null, in which
154     *            case a salt is generated for you using {@link SecureRandom}.
155     * @return the hash value.
156     * @throws IllegalArgumentException
157     *             if the salt does not match the allowed pattern.
158     * @throws IllegalArgumentException
159     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
160     */
161    public static String apr1Crypt(final String keyBytes, final String salt) {
162        return apr1Crypt(keyBytes.getBytes(StandardCharsets.UTF_8), salt);
163    }
164
165    /**
166     * Generates a libc6 crypt() compatible "$1$" hash value.
167     * <p>
168     * See {@link #md5Crypt(byte[], String)} for details.
169     * </p>
170     * <p>
171     * A salt is generated for you using {@link SecureRandom}.
172     * </p>
173     *
174     * @param keyBytes
175     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
176     * @return the hash value.
177     * @throws IllegalArgumentException
178     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
179     * @see #md5Crypt(byte[], String)
180     */
181    public static String md5Crypt(final byte[] keyBytes) {
182        return md5Crypt(keyBytes, MD5_PREFIX + B64.getRandomSalt(8));
183    }
184
185    /**
186     * Generates a libc6 crypt() compatible "$1$" hash value.
187     * <p>
188     * See {@link #md5Crypt(byte[], String)} for details.
189     * </p>
190     * <p>
191     * A salt is generated for you using the instance of {@link Random} you supply.
192     * </p>
193     *
194     * @param keyBytes
195     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
196     * @param random
197     *            the instance of {@link Random} to use for generating the salt.
198     *            Consider using {@link SecureRandom} for more secure salts.
199     * @return the hash value.
200     * @throws IllegalArgumentException
201     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
202     * @see #md5Crypt(byte[], String)
203     * @since 1.12
204     */
205    public static String md5Crypt(final byte[] keyBytes, final Random random) {
206        return md5Crypt(keyBytes, MD5_PREFIX + B64.getRandomSalt(8, random));
207    }
208
209    /**
210     * Generates a libc crypt() compatible "$1$" MD5 based hash value.
211     * <p>
212     * See {@link Crypt#crypt(String, String)} for details. We use {@link SecureRandom} for seed generation by
213     * default.
214     * </p>
215     *
216     * @param keyBytes
217     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
218     * @param salt
219     *            salt string including the prefix and optionally garbage at the end. The salt may be null, in which
220     *            case a salt is generated for you using {@link SecureRandom}.
221     * @return the hash value.
222     * @throws IllegalArgumentException
223     *             if the salt does not match the allowed pattern.
224     * @throws IllegalArgumentException
225     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
226     */
227    public static String md5Crypt(final byte[] keyBytes, final String salt) {
228        return md5Crypt(keyBytes, salt, MD5_PREFIX);
229    }
230
231    /**
232     * Generates a libc6 crypt() "$1$" or Apache htpasswd "$apr1$" hash value.
233     * <p>
234     * See {@link Crypt#crypt(String, String)} or {@link #apr1Crypt(String, String)} for details. We use
235     * {@link SecureRandom by default}.
236     * </p>
237     *
238     * @param keyBytes
239     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
240     * @param salt
241     *            real salt value without prefix or "rounds=". The salt may be null, in which case a salt
242     *            is generated for you using {@link SecureRandom}.
243     * @param prefix
244     *            The salt prefix {@value #APR1_PREFIX}, {@value #MD5_PREFIX}.
245     * @return the hash value.
246     * @throws IllegalArgumentException
247     *             if the salt does not match the allowed pattern.
248     * @throws IllegalArgumentException
249     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
250     */
251    public static String md5Crypt(final byte[] keyBytes, final String salt, final String prefix) {
252        return md5Crypt(keyBytes, salt, prefix, new SecureRandom());
253    }
254
255    /**
256     * Generates a libc6 crypt() "$1$" or Apache htpasswd "$apr1$" hash value.
257     * <p>
258     * See {@link Crypt#crypt(String, String)} or {@link #apr1Crypt(String, String)} for details.
259     * </p>
260     *
261     * @param keyBytes
262     *            plaintext string to hash. Each array element is set to {@code 0} before returning.
263     * @param salt
264     *            real salt value without prefix or "rounds=". The salt may be null, in which case a salt
265     *            is generated for you using {@link SecureRandom}.
266     * @param prefix
267     *            The salt prefix {@value #APR1_PREFIX}, {@value #MD5_PREFIX}.
268     * @param random
269     *            the instance of {@link Random} to use for generating the salt.
270     *            Consider using {@link SecureRandom} for more secure salts.
271     * @return the hash value.
272     * @throws IllegalArgumentException
273     *             if the salt or prefix does not match the allowed pattern.
274     * @throws IllegalArgumentException
275     *             when a {@link java.security.NoSuchAlgorithmException} is caught.
276     * @since 1.12
277     */
278    public static String md5Crypt(final byte[] keyBytes, final String salt, final String prefix, final Random random) {
279        final int keyLen = keyBytes.length;
280
281        // Extract the real salt from the given string which can be a complete hash string.
282        final String saltString;
283        if (salt == null) {
284            saltString = B64.getRandomSalt(8, random);
285        } else {
286            Objects.requireNonNull(prefix, "prefix");
287            if (prefix.length() < 3) {
288                throw new IllegalArgumentException("Invalid prefix value: " + prefix);
289            }
290            if (prefix.charAt(0) != '$' && prefix.charAt(prefix.length() - 1) != '$') {
291                throw new IllegalArgumentException("Invalid prefix value: " + prefix);
292            }
293            final Pattern p = Pattern.compile("^" + prefix.replace("$", "\\$") + "([\\.\\/a-zA-Z0-9]{1,8}).*");
294            final Matcher m = p.matcher(salt);
295            if (!m.find()) {
296                throw new IllegalArgumentException("Invalid salt value: " + salt);
297            }
298            saltString = m.group(1);
299        }
300        final byte[] saltBytes = saltString.getBytes(StandardCharsets.UTF_8);
301
302        final MessageDigest ctx = DigestUtils.getMd5Digest();
303
304        /*
305         * The password first, since that is what is most unknown
306         */
307        ctx.update(keyBytes);
308
309        /*
310         * Then our magic string
311         */
312        ctx.update(prefix.getBytes(StandardCharsets.UTF_8));
313
314        /*
315         * Then the raw salt
316         */
317        ctx.update(saltBytes);
318
319        /*
320         * Then just as many characters of the MD5(pw,salt,pw)
321         */
322        MessageDigest ctx1 = DigestUtils.getMd5Digest();
323        ctx1.update(keyBytes);
324        ctx1.update(saltBytes);
325        ctx1.update(keyBytes);
326        byte[] finalb = ctx1.digest();
327        int ii = keyLen;
328        while (ii > 0) {
329            ctx.update(finalb, 0, Math.min(ii, 16));
330            ii -= 16;
331        }
332
333        /*
334         * Don't leave anything around in JVM they could use.
335         */
336        Arrays.fill(finalb, (byte) 0);
337
338        /*
339         * Then something really weird...
340         */
341        ii = keyLen;
342        final int j = 0;
343        while (ii > 0) {
344            if ((ii & 1) == 1) {
345                ctx.update(finalb[j]);
346            } else {
347                ctx.update(keyBytes[j]);
348            }
349            ii >>= 1;
350        }
351
352        /*
353         * Now make the output string
354         */
355        final StringBuilder passwd = new StringBuilder(prefix + saltString + "$");
356        finalb = ctx.digest();
357
358        /*
359         * and now, just to make sure things don't run too fast On a 60 Mhz Pentium this takes 34 milliseconds, so you
360         * would need 30 seconds to build a 1000 entry dictionary...
361         */
362        for (int i = 0; i < ROUNDS; i++) {
363            ctx1 = DigestUtils.getMd5Digest();
364            if ((i & 1) != 0) {
365                ctx1.update(keyBytes);
366            } else {
367                ctx1.update(finalb, 0, BLOCKSIZE);
368            }
369
370            if (i % 3 != 0) {
371                ctx1.update(saltBytes);
372            }
373
374            if (i % 7 != 0) {
375                ctx1.update(keyBytes);
376            }
377
378            if ((i & 1) != 0) {
379                ctx1.update(finalb, 0, BLOCKSIZE);
380            } else {
381                ctx1.update(keyBytes);
382            }
383            finalb = ctx1.digest();
384        }
385
386        // The following was nearly identical to the Sha2Crypt code.
387        // Again, the buflen is not really needed.
388        // int buflen = MD5_PREFIX.length() - 1 + salt_string.length() + 1 + BLOCKSIZE + 1;
389        B64.b64from24bit(finalb[0], finalb[6], finalb[12], 4, passwd);
390        B64.b64from24bit(finalb[1], finalb[7], finalb[13], 4, passwd);
391        B64.b64from24bit(finalb[2], finalb[8], finalb[14], 4, passwd);
392        B64.b64from24bit(finalb[3], finalb[9], finalb[15], 4, passwd);
393        B64.b64from24bit(finalb[4], finalb[10], finalb[5], 4, passwd);
394        B64.b64from24bit((byte) 0, (byte) 0, finalb[11], 2, passwd);
395
396        /*
397         * Don't leave anything around in JVM they could use.
398         */
399        // Is there a better way to do this with the JVM?
400        ctx.reset();
401        ctx1.reset();
402        Arrays.fill(keyBytes, (byte) 0);
403        Arrays.fill(saltBytes, (byte) 0);
404        Arrays.fill(finalb, (byte) 0);
405
406        return passwd.toString();
407    }
408
409    /**
410     * TODO Make private in 2.0.
411     *
412     * @deprecated TODO Make private in 2.0.
413     */
414    @Deprecated
415    public Md5Crypt() {
416        // empty
417    }
418}