gpt4 book ai didi

java - 获取相同密码的不同哈希值(+盐)

转载 作者:行者123 更新时间:2023-12-02 10:30:15 28 4
gpt4 key购买 nike

我试图按照 here. 中的代码获取哈希密码从中,我目前只使用 salt 的代码。方法,hash方法和isExpectedPassword方法。

我从文本字段获取密码:

char[] passCharArray = txtPassword.toString().toCharArray();

然后我调用该类来获取盐值(我将其称为 Encryptor 而不是像原始帖子中那样的 Passwords ):

byte[] salt = Encryptor.getNextSalt();

然后我得到哈希密码:

byte[] hashedPass = Encryptor.hash(passCharArray, salt);

使用以下代码打印结果以查看发生了什么并对结果进行注释:

String saltString = Arrays.toString(salt);
System.out.println("SALT: " + saltString);
//SALT: [18, 117, -98, 41, 92, 124, 118, 17, 107, 14, 0, -81, 110, 70, 10, 42]

String hashedPassString = Arrays.toString(hashedPass);
System.out.println("HASHED PASS: " + hashedPassString);
//HASHED PASS: [44, -127, -43, 84, 40, -16, -46, -71, 109, -44, -41, 47, -61, -119, 21, 99, -23, 101, -13, 116, -12, 118, -66, 44, 104, 5, 4, 18, -55, 47, 59, 116]

System.out.println("Passwords match: " + Encryptor.isExpectedPassword(passCharArray, salt, hashedPass));
//Passwords match: false

下面两个是System.out.print我输入 isExpectedPassword方法来查看被调用时具有什么值。

//Encryptor pwdHash: [-103, -87, 53, -75, 59, 11, 77, 116, 123, 59, 68, -35, 16, -68, 42, 34, -32, 75, 22, -94, -37, -26, 16, 20, 7, -46, -6, -20, -88, 104, -121, 77]
//Encryptor expectedHash: [44, -127, -43, 84, 40, -16, -46, -71, 109, -44, -41, 47, -61, -119, 21, 99, -23, 101, -13, 116, -12, 118, -66, 44, 104, 5, 4, 18, -55, 47, 59, 116]

基本上,hashedPass (和 expectedHash )应与 pwdHash 相同,但事实并非如此。我不明白我做错了什么。我的代码中遗漏了什么吗?在我不知情的情况下是否发生了变化?

这是我的完整代码,如果人们想查看整个代码以防万一:

public class Encryptor {

private static final Random RANDOM = new SecureRandom();
private static final int ITERATIONS = 10000;
private static final int KEY_LENGTH = 256;

private Encryptor(){}

public static byte[] getNextSalt(){
byte[] salt = new byte[16];
RANDOM.nextBytes(salt);
return salt;
}

public static byte[] hash(char[] password, byte[] salt) {
PBEKeySpec spec = new PBEKeySpec(password, salt, ITERATIONS, KEY_LENGTH);
Arrays.fill(password, Character.MIN_VALUE);
try {
SecretKeyFactory skf = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
return skf.generateSecret(spec).getEncoded();
} catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
throw new AssertionError("Error while hashing a password: " + e.getMessage(), e);
} finally {
spec.clearPassword();
}
}

public static boolean isExpectedPassword(char[] password, byte[] salt, byte[] expectedHash) {
byte[] pwdHash = hash(password, salt);

String s = Arrays.toString(pwdHash);
System.out.println("Encryptor pwdHash: " + s);

String s2 = Arrays.toString(expectedHash);
System.out.println("Encryptor expectedHash: " + s2);

Arrays.fill(password, Character.MIN_VALUE);
if (pwdHash.length != expectedHash.length) return false;
for (int i = 0; i < pwdHash.length; i++) {
if (pwdHash[i] != expectedHash[i]) return false;
}
return true;
}


}


public class Controller implements Initializable {
@FXML
private Button btnLogin;
//Some private variables

@FXML
private AnchorPane ancPane;
@FXML
private ImageView imgLogo;
@FXML
private Hyperlink hplRegister;
@FXML
private TextField txtUsername;
@FXML
private TextField txtPassword;

@Override
public void initialize(URL url, ResourceBundle resourceBundle) {
//Some styling

hplRegister.setOnAction(event -> {
//Registering event
});

btnLogin.setOnAction(event -> {
try {

//Loading fxml data
// I've put the code here just for testing purposes
// and will not be the final placement.

char[] passCharArray = txtPassword.toString().toCharArray();

byte[] salt = Encryptor.getNextSalt();
byte[] hashedPass = Encryptor.hash(passCharArray, salt);

String saltString = Arrays.toString(salt);
System.out.println("SALT: " + saltString);

String hashedPassString = Arrays.toString(hashedPass);
System.out.println("HASHED PASS: " + hashedPassString);

System.out.println("Passwords match: " + Encryptor.isExpectedPassword(passCharArray, salt, hashedPass));

}catch (Exception e){
e.printStackTrace();
}
});
}

//Some getter methods.
}

最佳答案

问题是您正在清除密码。当你散列密码时,你会清除字符数组,用空格填充它,这会清除 passCharArray。当您第二次通过它时,它基本上是检查密码的哈希值与空白数组的哈希值。而那些绝对不匹配。

在实际情况下,您将从数据库或其他来源获取盐和散列密码。传入的版本不会被散列,从而被清除,直到传递给 isExpectedPassword

关于java - 获取相同密码的不同哈希值(+盐),我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/53659921/

28 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com