java Pbkdf2 校验密码是否正确

需求是 会员从C#迁移到了JAVA
校验密码(例如:hash:lfN29w3wkGrrbSbnWxcm0Ua6Mr1mqfUkDGuw/AGI5GI=,salt=iddGZ02+78kjQAlnGDoD6A==,密码=123qwe)
c#: PBKDF2 10000 次迭代, 密钥长度 32
那java 也要写一套,但是我校验不成功,咋回事
我执行main 获取的encryptedAttemptedPassword ="c5d401d3",和我的hash("lfN29w3wkGrrbSbnWxcm0Ua6Mr1mqfUkDGuw/AGI5GI=")也差太多了

import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import java.math.BigInteger;
import java.security.NoSuchAlgorithmException;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.KeySpec;

public class PBKDF2Util {


    public static final String PBKDF2_ALGORITHM = "PBKDF2WithHmacSHA512";
    public static final int SALT_BYTE_SIZE = 32 / 2;         //盐的长度
    public static final int HASH_BIT_SIZE = 32;         //生成密文的长度
    public static final int PBKDF2_ITERATIONS = 10000;        //迭代次数


    /**
     * @auther: Ragty
     * @describe: 对输入的密码进行验证
     * @param: [attemptedPassword(待验证密码), encryptedPassword(密文), salt(盐值)](前端传回来的东西)
     * @return: boolean
     * @date: 2018/11/2
     */
    public static boolean authenticate(String attemptedPassword, String encryptedPassword, String salt)
            throws NoSuchAlgorithmException, InvalidKeySpecException {
        // 用相同的盐值对用户输入的密码进行加密
        String encryptedAttemptedPassword = getEncryptedPassword(attemptedPassword, salt);
        // 把加密后的密文和原密文进行比较,相同则验证成功,否则失败
        return encryptedAttemptedPassword.equals(encryptedPassword);

    }

    public static void main(String[] args) throws InvalidKeySpecException, NoSuchAlgorithmException {
        boolean authenticate = authenticate("123qwe", "lfN29w3wkGrrbSbnWxcm0Ua6Mr1mqfUkDGuw/AGI5GI=", "iddGZ02+78kjQAlnGDoD6A==");
        System.out.println(authenticate);
    }

    /**
     * @auther: Ragty
     * @describe: 生成密文
     * @param: [password(明文密码), salt(盐值)]
     * @return: java.lang.String
     * @date: 2018/11/2
     */

    public static String getEncryptedPassword(String password, String salt) throws NoSuchAlgorithmException,
            InvalidKeySpecException {
        KeySpec spec = new PBEKeySpec(password.toCharArray(), fromHex(salt), PBKDF2_ITERATIONS, HASH_BIT_SIZE);
        SecretKeyFactory f = SecretKeyFactory.getInstance(PBKDF2_ALGORITHM);
        return toHex(f.generateSecret(spec).getEncoded());

    }




    /**
     * @auther: Ragty
     * @describe: 十六进制字符串转二进制字符串
     * @param: [hex]
     * @return: byte[]
     * @date: 2018/11/2
     */

    private static byte[] fromHex(String hex) {
        int len = s.length();
    byte[] data = new byte[len / 2];
    for (int i = 0; i < len; i += 2) {
        data[i / 2] = (byte) ((Character.digit(s.charAt(i), 16) << 4)
                + Character.digit(s.charAt(i+1), 16));
    }
    return data;
    }


    /**
     * @auther: Ragty
     * @describe: 二进制字符串转十六进制字符串
     * @param: [array]
     * @return: java.lang.String
     * @date: 2018/11/2
     */

    private static String toHex(byte[] array) {
        BigInteger bi = new BigInteger(1, array);
        String hex = bi.toString(16);
        int paddingLength = (array.length * 2) - hex.length();
        if (paddingLength > 0) {
            return String.format("%0" + paddingLength + "d", 0) + hex;
        } else {
            return hex;
        }
    }

}

阅读 1.8k
撰写回答
你尚未登录,登录后可以
  • 和开发者交流问题的细节
  • 关注并接收问题和回答的更新提醒
  • 参与内容的编辑和改进,让解决方法与时俱进
推荐问题