blob: 3812c8af42c0ddbfb4d4af300d5648a882c00d7c [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.server.core.operations.add;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;
import org.apache.directory.api.ldap.model.constants.LdapSecurityConstants;
import org.apache.directory.api.ldap.model.constants.SchemaConstants;
import org.apache.directory.api.ldap.model.entry.Attribute;
import org.apache.directory.api.ldap.model.entry.DefaultAttribute;
import org.apache.directory.api.ldap.model.entry.DefaultEntry;
import org.apache.directory.api.ldap.model.entry.DefaultModification;
import org.apache.directory.api.ldap.model.entry.Entry;
import org.apache.directory.api.ldap.model.entry.Modification;
import org.apache.directory.api.ldap.model.entry.ModificationOperation;
import org.apache.directory.api.ldap.model.name.Dn;
import org.apache.directory.api.ldap.model.password.PasswordUtil;
import org.apache.directory.api.ldap.model.schema.AttributeType;
import org.apache.directory.ldap.client.api.LdapConnection;
import org.apache.directory.server.core.annotations.CreateDS;
import org.apache.directory.server.core.api.interceptor.Interceptor;
import org.apache.directory.server.core.hash.CryptPasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Md5PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Pkcs5s2PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Sha256PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Sha384PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Sha512PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.ShaPasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Smd5PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Ssha256PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Ssha384PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.Ssha512PasswordHashingInterceptor;
import org.apache.directory.server.core.hash.SshaPasswordHashingInterceptor;
import org.apache.directory.server.core.integ.AbstractLdapTestUnit;
import org.apache.directory.server.core.integ.FrameworkRunner;
import org.apache.directory.server.core.integ.IntegrationUtils;
import org.junit.Test;
import org.junit.runner.RunWith;
/**
* Test case for checking PasswordHashingInterceptor.
*
* @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
*/
@RunWith(FrameworkRunner.class)
@CreateDS(name = "PasswordHashingInterceptorTest-DS")
public class PasswordHashingInterceptorTest extends AbstractLdapTestUnit
{
@Test
public void testAllMechanisms() throws Exception
{
List<Class<?>> allMechanism = new ArrayList<Class<?>>();
allMechanism.add( CryptPasswordHashingInterceptor.class );
allMechanism.add( Md5PasswordHashingInterceptor.class );
allMechanism.add( Sha256PasswordHashingInterceptor.class );
allMechanism.add( Sha384PasswordHashingInterceptor.class );
allMechanism.add( Sha512PasswordHashingInterceptor.class );
allMechanism.add( ShaPasswordHashingInterceptor.class );
allMechanism.add( Smd5PasswordHashingInterceptor.class );
allMechanism.add( Ssha256PasswordHashingInterceptor.class );
allMechanism.add( Ssha384PasswordHashingInterceptor.class );
allMechanism.add( Ssha512PasswordHashingInterceptor.class );
allMechanism.add( SshaPasswordHashingInterceptor.class );
allMechanism.add( Pkcs5s2PasswordHashingInterceptor.class );
Entry entry = new DefaultEntry( service.getSchemaManager(), "cn=test,ou=system",
"objectClass: person",
"cn: test",
"sn: sn_test",
"userPassword: secret" );
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
List<Interceptor> interceptors = service.getInterceptors();
for ( int i = 0; i < allMechanism.size(); i++ )
{
Interceptor hashMech = ( Interceptor ) allMechanism.get( i ).newInstance();
hashMech.init( service );
// make sure to remove the last added mechanism
if ( i > 0 )
{
interceptors.remove( interceptors.size() - 1 );
}
interceptors.add( hashMech );
service.setInterceptors( interceptors );
connection.add( entry );
// System.out.println( "using hash mechanism " + hashMech.getName() );
testAddWithPlainPassword();
testModifyWithPlainPassword();
testModifyWithEmptyPassword();
testAddWithHashedPassword();
testModifyWithHashedPassword();
connection.delete( entry.getDn() );
}
}
public void testAddWithPlainPassword() throws Exception
{
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
byte[] plainPwd = "secret".getBytes();
Dn dn = new Dn( "cn=test,ou=system" );
Entry entry = connection.lookup( dn );
Attribute pwdAt = entry.get( SchemaConstants.USER_PASSWORD_AT );
assertFalse( Arrays.equals( plainPwd, pwdAt.getBytes() ) );
assertTrue( PasswordUtil.compareCredentials( plainPwd, pwdAt.getBytes() ) );
}
public void testModifyWithPlainPassword() throws Exception
{
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
byte[] plainPwd = "newsecret".getBytes();
Dn dn = new Dn( "cn=test,ou=system" );
AttributeType pwdAtType = getService().getSchemaManager().lookupAttributeTypeRegistry(
SchemaConstants.USER_PASSWORD_AT );
Attribute pwdAt = new DefaultAttribute( pwdAtType );
pwdAt.add( plainPwd );
Modification mod = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE, pwdAt );
connection.modify( dn, mod );
Entry entry = connection.lookup( dn );
pwdAt = entry.get( pwdAtType );
assertFalse( Arrays.equals( plainPwd, pwdAt.getBytes() ) );
assertTrue( PasswordUtil.compareCredentials( plainPwd, pwdAt.getBytes() ) );
}
public void testModifyWithEmptyPassword() throws Exception
{
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
Dn dn = new Dn( "cn=test,ou=system" );
AttributeType pwdAtType = getService().getSchemaManager().lookupAttributeTypeRegistry(
SchemaConstants.USER_PASSWORD_AT );
Attribute pwdAt = new DefaultAttribute( pwdAtType );
pwdAt.add( ( byte[] ) null );
Modification mod = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE, pwdAt );
connection.modify( dn, mod );
Entry entry = connection.lookup( dn );
pwdAt = entry.get( pwdAtType );
assertNull( pwdAt );
}
public void testAddWithHashedPassword() throws Exception
{
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
byte[] plainPwd = "secret".getBytes();
byte[] hashedPwd = PasswordUtil.createStoragePassword( plainPwd, LdapSecurityConstants.HASH_METHOD_SSHA );
Dn dn = new Dn( "cn=testHash,ou=system" );
Entry entry = new DefaultEntry( getService().getSchemaManager(), dn );
entry.add( "ObjectClass", "top", "person" );
entry.add( "sn", "TEST" );
entry.add( "cn", "testHash" );
entry.add( SchemaConstants.USER_PASSWORD_AT, hashedPwd );
connection.add( entry );
entry = connection.lookup( dn );
Attribute pwdAt = entry.get( SchemaConstants.USER_PASSWORD_AT );
assertTrue( Arrays.equals( hashedPwd, pwdAt.getBytes() ) );
assertTrue( PasswordUtil.compareCredentials( plainPwd, pwdAt.getBytes() ) );
connection.delete( dn );
}
public void testModifyWithHashedPassword() throws Exception
{
LdapConnection connection = IntegrationUtils.getAdminConnection( getService() );
byte[] plainPwd = "xyzsecret".getBytes();
byte[] hashedPwd = PasswordUtil.createStoragePassword( plainPwd, LdapSecurityConstants.HASH_METHOD_SSHA256 );
Dn dn = new Dn( "cn=test,ou=system" );
AttributeType pwdAtType = getService().getSchemaManager().lookupAttributeTypeRegistry(
SchemaConstants.USER_PASSWORD_AT );
Attribute pwdAt = new DefaultAttribute( pwdAtType );
pwdAt.add( hashedPwd );
Modification mod = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE, pwdAt );
connection.modify( dn, mod );
Entry entry = connection.lookup( dn );
pwdAt = entry.get( pwdAtType );
assertTrue( Arrays.equals( hashedPwd, pwdAt.getBytes() ) );
assertTrue( PasswordUtil.compareCredentials( plainPwd, pwdAt.getBytes() ) );
}
}