Deprecated API
Contents
-
Terminally Deprecated ElementsElementDescriptionThis represents a hash using the previous default algorithm, please use
HashedKey(com.aoapps.security.HashedKey.Algorithm, byte[])
instead.This is the value matching the previous default algorithm, please useHashedKey.Algorithm.getAlgorithmName()
instead.Please useHashedKey.Algorithm.hash(com.aoapps.security.Key)
instead.This generates a key for the previous default algorithm, using the previous default of 256-bit length, please useHashedKey.Algorithm.generateKey()
instead.This generates a hash for the previous default algorithm and does not zero the key, please useHashedKey.Algorithm.hash(byte[])
instead.This is the value matching the previous default algorithm, please useHashedKey.Algorithm.getHashBytes()
instead.This represents a hash using the previous default algorithm, please useHashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
, orHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.Please useHashedPassword(com.aoapps.security.Password)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, byte[], int)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useHashedPassword(com.aoapps.security.Password, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useHashedPassword.Algorithm.hash(com.aoapps.security.Password, byte[], int)
so the password may be destroyed.This generates a salt for the previous default algorithm, please useHashedPassword.Algorithm.generateSalt()
,HashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.This generates a hash for the previous default algorithm and does not allow the password to be destroyed, please useHashedPassword.Algorithm.hash(com.aoapps.security.Password, byte[], int)
,HashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getHashBytes()
instead.Please useHashedPassword.matches(com.aoapps.security.Password)
so the password may be destroyed.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getRecommendedIterations()
instead.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getSaltBytes()
instead.This is not secure anymore. We will be removing in a future major version update. If you still require this type of encryption, please useUnixCrypt
.This is not secure anymore. Please useUnixCrypt.crypt(java.lang.String)
This is not secure anymore. Please useUnixCrypt.crypt(java.lang.String, java.lang.String)
This is not secure anymore. Please useUnixCrypt
-
Deprecated ClassesClassDescriptionThis is not secure anymore. We will be removing in a future major version update. If you still require this type of encryption, please use
UnixCrypt
.
-
Deprecated FieldsFieldDescriptionThis is the value matching the previous default algorithm, please use
HashedKey.Algorithm.getAlgorithmName()
instead.This is the value matching the previous default algorithm, please useHashedKey.Algorithm.getHashBytes()
instead.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getHashBytes()
instead.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getRecommendedIterations()
instead.This is the value matching the previous default algorithm, please useHashedPassword.Algorithm.getSaltBytes()
instead.
-
Deprecated MethodsMethodDescriptionPlease use
SecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useHashedKey.Algorithm.hash(com.aoapps.security.Key)
instead.This generates a key for the previous default algorithm, using the previous default of 256-bit length, please useHashedKey.Algorithm.generateKey()
instead.This generates a hash for the previous default algorithm and does not zero the key, please useHashedKey.Algorithm.hash(byte[])
instead.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useHashedPassword.Algorithm.hash(com.aoapps.security.Password, byte[], int)
so the password may be destroyed.This generates a salt for the previous default algorithm, please useHashedPassword.Algorithm.generateSalt()
,HashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.This generates a hash for the previous default algorithm and does not allow the password to be destroyed, please useHashedPassword.Algorithm.hash(com.aoapps.security.Password, byte[], int)
,HashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.Please useHashedPassword.matches(com.aoapps.security.Password)
so the password may be destroyed.This is not secure anymore. Please useUnixCrypt.crypt(java.lang.String)
This is not secure anymore. Please useUnixCrypt.crypt(java.lang.String, java.lang.String)
This is not secure anymore. Please useUnixCrypt
-
Deprecated ConstructorsConstructorDescriptionThis represents a hash using the previous default algorithm, please use
HashedKey(com.aoapps.security.HashedKey.Algorithm, byte[])
instead.Please useHashedKey.valueOf(com.aoapps.security.HashedKey.Algorithm, byte[])
, which is able to automatically return theHashedKey.NO_KEY
singleton.This represents a hash using the previous default algorithm, please useHashedPassword(com.aoapps.security.Password)
,HashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
, orHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
instead.Please useHashedPassword.valueOf(com.aoapps.security.HashedPassword.Algorithm, byte[], int, byte[])
, which is able to automatically return theHashedPassword.NO_PASSWORD
singleton.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useHashedPassword(com.aoapps.security.Password)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, byte[], int)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, int, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, com.aoapps.security.HashedPassword.Algorithm, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useHashedPassword(com.aoapps.security.Password, java.security.SecureRandom)
so the password may be destroyed.Please useHashedPassword(com.aoapps.security.Password, java.util.Random)
so the password may be destroyed.Please use
SecureRandom
. This method should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.Please useSecureRandom
. This method will stay, but will remain deprecated since it should only be used after careful consideration.
-
Deprecated Enum ConstantsEnum ConstantDescriptionMD5 should not be used for any cryptographic purpose.SHA-1 should no longer be used for any cryptographic purpose.Collision resistance of at least 128 bits is requiredCollision resistance of at least 128 bits is requiredCollision resistance of at least 128 bits is required
UnixCrypt
should not be used for any cryptographic purpose, plus this is barely salted and not iterated so is subject to both dictionary and brute-force attacks.MD5 should not be used for any cryptographic purpose, plus this is neither salted nor iterated so is subject to both dictionary and brute-force attacks.This was the previous algorithm used. Please useHashedPassword.Algorithm.PBKDF2WITHHMACSHA512
, which is the currentHashedPassword.RECOMMENDED_ALGORITHM
, for new passwords.Collision resistance of at least 128 bits is requiredSHA-1 should no longer be used for any cryptographic purpose, plus this is neither salted nor iterated so is subject to both dictionary and brute-force attacks.