10 changed files with 499 additions and 9 deletions
@ -0,0 +1,115 @@
@@ -0,0 +1,115 @@
|
||||
/* Copyright 2004 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.encoding; |
||||
|
||||
/** |
||||
* <p> |
||||
* Convenience base for all password encoders. |
||||
* </p> |
||||
* |
||||
* @author Ben Alex |
||||
* @version $Id$ |
||||
*/ |
||||
public abstract class BasePasswordEncoder implements PasswordEncoder { |
||||
//~ Methods ================================================================
|
||||
|
||||
/** |
||||
* Used by subclasses to extract the password and salt from a merged |
||||
* <code>String</code> created using {@link |
||||
* #mergePasswordAndSalt(String,Object,boolean)}. |
||||
* |
||||
* <P> |
||||
* The first element in the returned array is the password. The second |
||||
* element is the salt. The salt array element will always be present, |
||||
* even if no salt was found in the <code>mergedPasswordSalt</code> |
||||
* argument. |
||||
* </p> |
||||
* |
||||
* @param mergedPasswordSalt as generated by |
||||
* <code>mergePasswordAndSalt</code> |
||||
* |
||||
* @return an array, in which the first element is the password and the |
||||
* second the salt |
||||
* |
||||
* @throws IllegalArgumentException DOCUMENT ME! |
||||
*/ |
||||
protected String[] demergePasswordAndSalt(String mergedPasswordSalt) { |
||||
if ((mergedPasswordSalt == null) || "".equals(mergedPasswordSalt)) { |
||||
throw new IllegalArgumentException( |
||||
"Cannot pass a null or empty String"); |
||||
} |
||||
|
||||
String password = mergedPasswordSalt; |
||||
String salt = ""; |
||||
|
||||
int saltBegins = mergedPasswordSalt.lastIndexOf("{"); |
||||
|
||||
if ((saltBegins != -1) |
||||
&& ((saltBegins + 1) < mergedPasswordSalt.length())) { |
||||
salt = mergedPasswordSalt.substring(saltBegins + 1, |
||||
mergedPasswordSalt.length() - 1); |
||||
password = mergedPasswordSalt.substring(0, saltBegins); |
||||
} |
||||
|
||||
return new String[] {password, salt}; |
||||
} |
||||
|
||||
/** |
||||
* Used by subclasses to generate a merged password and salt |
||||
* <code>String</code>. |
||||
* |
||||
* <P> |
||||
* The generated password will be in the form of |
||||
* <code>password{salt}</code>. |
||||
* </p> |
||||
* |
||||
* <P> |
||||
* A <code>null</code> can be passed to either method, and will be handled |
||||
* correctly. If the <code>salt</code> is <code>null</code> or empty, the |
||||
* resulting generated password will simply be the passed |
||||
* <code>password</code>. The <code>toString</code> method of the |
||||
* <code>salt</code> will be used to represent the salt. |
||||
* </p> |
||||
* |
||||
* @param password the password to be used (can be <code>null</code>) |
||||
* @param salt the salt to be used (can be <code>null</code>) |
||||
* @param strict ensures salt doesn't contain the delimiters |
||||
* |
||||
* @return a merged password and salt <code>String</code> |
||||
* |
||||
* @throws IllegalArgumentException DOCUMENT ME! |
||||
*/ |
||||
protected String mergePasswordAndSalt(String password, Object salt, |
||||
boolean strict) { |
||||
if (password == null) { |
||||
password = ""; |
||||
} |
||||
|
||||
if (strict && (salt != null)) { |
||||
if ((salt.toString().lastIndexOf("{") != -1) |
||||
|| (salt.toString().lastIndexOf("}") != -1)) { |
||||
throw new IllegalArgumentException( |
||||
"Cannot use { or } in salt.toString()"); |
||||
} |
||||
} |
||||
|
||||
if ((salt == null) || "".equals(salt)) { |
||||
return password; |
||||
} else { |
||||
return password + "{" + salt.toString() + "}"; |
||||
} |
||||
} |
||||
} |
||||
@ -0,0 +1,5 @@
@@ -0,0 +1,5 @@
|
||||
<html> |
||||
<body> |
||||
Password encoding implementations. |
||||
</body> |
||||
</html> |
||||
@ -0,0 +1,158 @@
@@ -0,0 +1,158 @@
|
||||
/* Copyright 2004 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.encoding; |
||||
|
||||
import junit.framework.TestCase; |
||||
|
||||
import org.springframework.dao.DataAccessException; |
||||
|
||||
|
||||
/** |
||||
* <p> |
||||
* TestCase for BasePasswordEncoder. |
||||
* </p> |
||||
* |
||||
* @author Ben Alex |
||||
* @version $Id$ |
||||
*/ |
||||
public class BasePasswordEncoderTests extends TestCase { |
||||
//~ Methods ================================================================
|
||||
|
||||
public void testDemergeHandlesEmptyAndNullSalts() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
String merged = pwd.nowMergePasswordAndSalt("password", null, true); |
||||
|
||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged); |
||||
assertEquals("password", demerged[0]); |
||||
assertEquals("", demerged[1]); |
||||
|
||||
merged = pwd.nowMergePasswordAndSalt("password", "", true); |
||||
|
||||
demerged = pwd.nowDemergePasswordAndSalt(merged); |
||||
assertEquals("password", demerged[0]); |
||||
assertEquals("", demerged[1]); |
||||
} |
||||
|
||||
public void testDemergeWithEmptyStringIsRejected() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
try { |
||||
pwd.nowDemergePasswordAndSalt(""); |
||||
fail("Should have thrown IllegalArgumentException"); |
||||
} catch (IllegalArgumentException expected) { |
||||
assertEquals("Cannot pass a null or empty String", |
||||
expected.getMessage()); |
||||
} |
||||
} |
||||
|
||||
public void testDemergeWithNullIsRejected() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
try { |
||||
pwd.nowDemergePasswordAndSalt(null); |
||||
fail("Should have thrown IllegalArgumentException"); |
||||
} catch (IllegalArgumentException expected) { |
||||
assertEquals("Cannot pass a null or empty String", |
||||
expected.getMessage()); |
||||
} |
||||
} |
||||
|
||||
public void testMergeDemerge() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
String merged = pwd.nowMergePasswordAndSalt("password", "foo", true); |
||||
assertEquals("password{foo}", merged); |
||||
|
||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged); |
||||
assertEquals("password", demerged[0]); |
||||
assertEquals("foo", demerged[1]); |
||||
} |
||||
|
||||
public void testMergeDemergeWithDelimitersInPassword() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
String merged = pwd.nowMergePasswordAndSalt("p{ass{w{o}rd", "foo", true); |
||||
assertEquals("p{ass{w{o}rd{foo}", merged); |
||||
|
||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged); |
||||
System.out.println(demerged[0]); |
||||
System.out.println(demerged[1]); |
||||
|
||||
assertEquals("p{ass{w{o}rd", demerged[0]); |
||||
assertEquals("foo", demerged[1]); |
||||
} |
||||
|
||||
public void testMergeDemergeWithNullAsPassword() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
String merged = pwd.nowMergePasswordAndSalt(null, "foo", true); |
||||
assertEquals("{foo}", merged); |
||||
|
||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged); |
||||
assertEquals("", demerged[0]); |
||||
assertEquals("foo", demerged[1]); |
||||
} |
||||
|
||||
public void testStrictMergeRejectsDelimitersInSalt1() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
try { |
||||
pwd.nowMergePasswordAndSalt("password", "f{oo", true); |
||||
fail("Should have thrown IllegalArgumentException"); |
||||
} catch (IllegalArgumentException expected) { |
||||
assertEquals("Cannot use { or } in salt.toString()", |
||||
expected.getMessage()); |
||||
} |
||||
} |
||||
|
||||
public void testStrictMergeRejectsDelimitersInSalt2() { |
||||
MockPasswordEncoder pwd = new MockPasswordEncoder(); |
||||
|
||||
try { |
||||
pwd.nowMergePasswordAndSalt("password", "f}oo", true); |
||||
fail("Should have thrown IllegalArgumentException"); |
||||
} catch (IllegalArgumentException expected) { |
||||
assertEquals("Cannot use { or } in salt.toString()", |
||||
expected.getMessage()); |
||||
} |
||||
} |
||||
|
||||
//~ Inner Classes ==========================================================
|
||||
|
||||
private class MockPasswordEncoder extends BasePasswordEncoder { |
||||
public boolean isPasswordValid(String encPass, String rawPass, |
||||
Object salt) throws DataAccessException { |
||||
throw new UnsupportedOperationException( |
||||
"mock method not implemented"); |
||||
} |
||||
|
||||
public String encodePassword(String rawPass, Object salt) |
||||
throws DataAccessException { |
||||
throw new UnsupportedOperationException( |
||||
"mock method not implemented"); |
||||
} |
||||
|
||||
public String[] nowDemergePasswordAndSalt(String password) { |
||||
return demergePasswordAndSalt(password); |
||||
} |
||||
|
||||
public String nowMergePasswordAndSalt(String password, Object salt, |
||||
boolean strict) { |
||||
return mergePasswordAndSalt(password, salt, strict); |
||||
} |
||||
} |
||||
} |
||||
@ -0,0 +1,50 @@
@@ -0,0 +1,50 @@
|
||||
/* Copyright 2004 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.encoding; |
||||
|
||||
import junit.framework.TestCase; |
||||
|
||||
|
||||
/** |
||||
* <p> |
||||
* TestCase for PlaintextPasswordEncoder. |
||||
* </p> |
||||
* |
||||
* @author colin sampaleanu |
||||
* @author Ben Alex |
||||
* @version $Id$ |
||||
*/ |
||||
public class Md5PasswordEncoderTests extends TestCase { |
||||
//~ Methods ================================================================
|
||||
|
||||
public void testBasicFunctionality() { |
||||
Md5PasswordEncoder pe = new Md5PasswordEncoder(); |
||||
String raw = "abc123"; |
||||
String badRaw = "abc321"; |
||||
String salt = "THIS_IS_A_SALT"; |
||||
String encoded = pe.encodePassword(raw, salt); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
assertTrue(encoded.length() == 32); |
||||
|
||||
// now try Base64
|
||||
pe.setEncodeHashAsBase64(true); |
||||
encoded = pe.encodePassword(raw, salt); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
assertTrue(encoded.length() != 32); |
||||
} |
||||
} |
||||
@ -0,0 +1,69 @@
@@ -0,0 +1,69 @@
|
||||
/* Copyright 2004 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.encoding; |
||||
|
||||
import junit.framework.TestCase; |
||||
|
||||
|
||||
/** |
||||
* <p> |
||||
* TestCase for PlaintextPasswordEncoder. |
||||
* </p> |
||||
* |
||||
* @author colin sampaleanu |
||||
* @author Ben Alex |
||||
* @version $Id$ |
||||
*/ |
||||
public class PlaintextPasswordEncoderTests extends TestCase { |
||||
//~ Methods ================================================================
|
||||
|
||||
public void testBasicFunctionality() { |
||||
PlaintextPasswordEncoder pe = new PlaintextPasswordEncoder(); |
||||
|
||||
String raw = "abc123"; |
||||
String rawDiffCase = "AbC123"; |
||||
String badRaw = "abc321"; |
||||
String salt = "THIS_IS_A_SALT"; |
||||
|
||||
String encoded = pe.encodePassword(raw, salt); |
||||
assertEquals("abc123{THIS_IS_A_SALT}", encoded); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
|
||||
// make sure default is not to ignore password case
|
||||
assertFalse(pe.isIgnorePasswordCase()); |
||||
encoded = pe.encodePassword(rawDiffCase, salt); |
||||
assertFalse(pe.isPasswordValid(encoded, raw, salt)); |
||||
|
||||
// now check for ignore password case
|
||||
pe = new PlaintextPasswordEncoder(); |
||||
pe.setIgnorePasswordCase(true); |
||||
|
||||
// should be able to validate even without encoding
|
||||
encoded = pe.encodePassword(rawDiffCase, salt); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
} |
||||
|
||||
public void testMergeDemerge() { |
||||
PlaintextPasswordEncoder pwd = new PlaintextPasswordEncoder(); |
||||
|
||||
String merged = pwd.encodePassword("password", "foo"); |
||||
String[] demerged = pwd.obtainPasswordAndSalt(merged); |
||||
assertEquals("password", demerged[0]); |
||||
assertEquals("foo", demerged[1]); |
||||
} |
||||
} |
||||
@ -0,0 +1,50 @@
@@ -0,0 +1,50 @@
|
||||
/* Copyright 2004 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.encoding; |
||||
|
||||
import junit.framework.TestCase; |
||||
|
||||
|
||||
/** |
||||
* <p> |
||||
* TestCase for ShaPasswordEncoder. |
||||
* </p> |
||||
* |
||||
* @author colin sampaleanu |
||||
* @author Ben Alex |
||||
* @version $Id$ |
||||
*/ |
||||
public class ShaPasswordEncoderTests extends TestCase { |
||||
//~ Methods ================================================================
|
||||
|
||||
public void testBasicFunctionality() { |
||||
ShaPasswordEncoder pe = new ShaPasswordEncoder(); |
||||
String raw = "abc123"; |
||||
String badRaw = "abc321"; |
||||
String salt = "THIS_IS_A_SALT"; |
||||
String encoded = pe.encodePassword(raw, salt); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
assertTrue(encoded.length() == 40); |
||||
|
||||
// now try Base64
|
||||
pe.setEncodeHashAsBase64(true); |
||||
encoded = pe.encodePassword(raw, salt); |
||||
assertTrue(pe.isPasswordValid(encoded, raw, salt)); |
||||
assertFalse(pe.isPasswordValid(encoded, badRaw, salt)); |
||||
assertTrue(encoded.length() != 40); |
||||
} |
||||
} |
||||
Loading…
Reference in new issue