/*
|
* The contents of this file are subject to the terms of the Common Development and
|
* Distribution License (the License). You may not use this file except in compliance with the
|
* License.
|
*
|
* You can obtain a copy of the License at legal/CDDLv1.0.txt. See the License for the
|
* specific language governing permission and limitations under the License.
|
*
|
* When distributing Covered Software, include this CDDL Header Notice in each file and include
|
* the License file at legal/CDDLv1.0.txt. If applicable, add the following below the CDDL
|
* Header, with the fields enclosed by brackets [] replaced by your own identifying
|
* information: "Portions Copyright [year] [name of copyright owner]".
|
*
|
* Copyright 2006-2008 Sun Microsystems, Inc.
|
* Portions Copyright 2014-2015 ForgeRock AS.
|
*/
|
package org.opends.server.schema;
|
|
import static org.opends.server.schema.SchemaConstants.*;
|
|
import static org.opends.server.core.DirectoryServer.*;
|
|
import org.forgerock.i18n.slf4j.LocalizedLogger;
|
import org.forgerock.opendj.ldap.ByteSequence;
|
import org.forgerock.opendj.ldap.ConditionResult;
|
import org.forgerock.opendj.ldap.schema.SchemaBuilder;
|
import org.opends.server.api.PasswordStorageScheme;
|
|
/** This class implements the authPasswordMatch matching rule defined in RFC 3112. */
|
public class AuthPasswordEqualityMatchingRule extends AbstractPasswordEqualityMatchingRuleImpl
|
{
|
private static final LocalizedLogger logger = LocalizedLogger.getLoggerForThisClass();
|
|
@Override
|
protected ConditionResult valuesMatch(ByteSequence attributeValue, ByteSequence assertionValue)
|
{
|
// We must be able to decode the attribute value using the authentication password syntax.
|
String[] authPWComponents;
|
try
|
{
|
authPWComponents = AuthPasswordSyntax.decodeAuthPassword(attributeValue.toString());
|
}
|
catch (Exception e)
|
{
|
logger.traceException(e);
|
return ConditionResult.FALSE;
|
}
|
|
// The first element of the array will be the scheme.
|
// Make sure that we support the requested scheme.
|
PasswordStorageScheme<?> storageScheme = getAuthPasswordStorageScheme(authPWComponents[0]);
|
if (storageScheme == null)
|
{
|
// It's not a scheme that we can support.
|
return ConditionResult.FALSE;
|
}
|
// We support the scheme, so make the determination.
|
return ConditionResult.valueOf(storageScheme.authPasswordMatches(
|
assertionValue, authPWComponents[1], authPWComponents[2]));
|
}
|
|
/**
|
* Adds the auth password equality matching rule to the provided schema builder.
|
*
|
* @param builder
|
* where to add the matching rule
|
*/
|
public static void addAuthPasswordEqualityMatchingRule(SchemaBuilder builder)
|
{
|
builder.buildMatchingRule(EMR_AUTH_PASSWORD_OID)
|
.names(EMR_AUTH_PASSWORD_NAME)
|
.syntaxOID(SYNTAX_AUTH_PASSWORD_OID).description(EMR_AUTH_PASSWORD_DESCRIPTION)
|
.implementation(new AuthPasswordEqualityMatchingRule())
|
.addToSchema();
|
}
|
}
|