From 83eb494c762abd1255479fd87c6e4d1281d4eeed Mon Sep 17 00:00:00 2001
From: neil_a_wilson <neil_a_wilson@localhost>
Date: Sun, 28 Jan 2007 21:26:52 +0000
Subject: [PATCH] Update a number of files to ensure that they have the svn:eol-style property set correctly.

---
 opendj-sdk/opends/tests/unit-tests-testng/src/server/org/opends/server/core/RejectUnauthReqTests.java | 1472 +++++++++++++++++++++++++++++-----------------------------
 1 files changed, 736 insertions(+), 736 deletions(-)

diff --git a/opendj-sdk/opends/tests/unit-tests-testng/src/server/org/opends/server/core/RejectUnauthReqTests.java b/opendj-sdk/opends/tests/unit-tests-testng/src/server/org/opends/server/core/RejectUnauthReqTests.java
index eb52394..70593a9 100644
--- a/opendj-sdk/opends/tests/unit-tests-testng/src/server/org/opends/server/core/RejectUnauthReqTests.java
+++ b/opendj-sdk/opends/tests/unit-tests-testng/src/server/org/opends/server/core/RejectUnauthReqTests.java
@@ -1,737 +1,737 @@
-/*
- * CDDL HEADER START
- *
- * The contents of this file are subject to the terms of the
- * Common Development and Distribution License, Version 1.0 only
- * (the "License").  You may not use this file except in compliance
- * with the License.
- *
- * You can obtain a copy of the license at
- * trunk/opends/resource/legal-notices/OpenDS.LICENSE
- * or https://OpenDS.dev.java.net/OpenDS.LICENSE.
- * See the License for the specific language governing permissions
- * and limitations under the License.
- *
- * When distributing Covered Code, include this CDDL HEADER in each
- * file and include the License file at
- * trunk/opends/resource/legal-notices/OpenDS.LICENSE.  If applicable,
- * add the following below this CDDL HEADER, with the fields enclosed
- * by brackets "[]" replaced with your own identifying * information:
- *      Portions Copyright [yyyy] [name of copyright owner]
- *
- * CDDL HEADER END
- *
- *
- *      Portions Copyright 2006 Sun Microsystems, Inc.
- */
-package org.opends.server.core;
-
-
-import java.net.Socket;
-import java.util.ArrayList;
-import java.util.concurrent.atomic.AtomicInteger;
-import java.io.UnsupportedEncodingException;
-import java.io.IOException;
-
-import org.testng.annotations.Test;
-import org.testng.annotations.BeforeClass;
-import org.opends.server.TestCaseUtils;
-import org.opends.server.protocols.asn1.ASN1OctetString;
-import org.opends.server.protocols.internal.InternalClientConnection;
-import org.opends.server.types.DN;
-import org.opends.server.types.AuthenticationInfo;
-import org.opends.server.types.ResultCode;
-import org.opends.server.protocols.asn1.ASN1Reader;
-import org.opends.server.protocols.asn1.ASN1Writer;
-import org.opends.server.protocols.ldap.LDAPControl;
-import org.opends.server.protocols.ldap.LDAPMessage;
-import org.opends.server.protocols.ldap.UnbindRequestProtocolOp;
-import org.opends.server.protocols.ldap.LDAPException;
-import org.opends.server.tools.*;
-import org.testng.annotations.*;
-import static org.testng.Assert.*;
-import static org.opends.server.util.ServerConstants.*;
-
-/**
- * A set of testcases for configuration attribute 
- * "ds-cfg-reject-unauthenticated-requests".
- * 
- */
-
-public class RejectUnauthReqTests extends CoreTestCase
-{
-
-  /**
-   * Utility method which is called by the testcase sending an ADD request.
-   * @param authentication The flag to set the authentication on and off.
-   * @return The error code of operation performed.
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  private int performAddOperation(boolean authentication) throws Exception
-  {
-    String filePath = TestCaseUtils.createTempFile(
-      "dn: o=rejectTestCase,o=test",
-      "objectclass: top",
-      "objectclass: organization",
-      "o: rejectTestCase",
-      "description: Reject Test Case");
-    String[] args = null;
-    if(authentication)
-      args = new String []
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-D","cn=directory manager",
-        "-w","password",
-        "-a",
-        "-f", filePath,
-      };
-    else
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-a",
-        "-f", filePath,
-      };
-    return LDAPModify.mainModify(args, false, null,null);
-  }
-
-
-
-  /**
-   * Utility method which is called by the testcase sending a MODIFY request.
-   * @param authentication The flag to set the authentication on and off.
-   * @return The error code of operation performed.
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  private int performModifyOperation(boolean authentication) throws Exception
-  {
-    String path = TestCaseUtils.createTempFile(
-       "dn: o=rejectTestCase,o=test",
-       "changetype: modify",
-       "replace: description",
-       "description: New Description");
-    String[] args = null;
-    if(authentication)
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-D","cn=directory manager",
-        "-w","password",
-        "-f", path
-      };
-    else
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-f", path
-      };
-    return LDAPModify.mainModify(args, false, null, null);
-  }
-
-
-
-  /**
-   * Utility method which is called by the testcase sending a COMPARE request.
-   * @param authentication The flag to set the authentication on and off.
-   * @return The error code of operation performed.
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  private int performCompareOperation(boolean authentication) throws Exception
-  {
-    String[] args = null;
-    if(authentication)
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-D", "cn=Directory Manager",
-        "-w", "password",
-        "o:test",
-        "o=test"
-      };
-    else
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "o:test",
-        "o=test"
-      };
-
-    return LDAPCompare.mainCompare(args, false, null, null);
-  }
-
-
-
-  /**
-   * Utility method which is called by the testcase sending a MODRDN request.
-   * @param authentication The flag to set the authentication on and off.
-   * @return The error code of operation performed.
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  private int performModRdnOperation(boolean authentication) throws Exception
-  {
-    String path= TestCaseUtils.createTempFile("dn: o=rejectTestCase,o=Test",
-      "changetype: modrdn",
-      "newrdn: o=mod_rejectTestCase",
-      "deleteoldrdn: 0");
-    String[] args = null;
-    if(authentication)
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-D","cn=directory manager",
-        "-w","password",
-        "-f", path
-      };
-    else
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-f", path
-      };
-    return LDAPModify.mainModify(args, false, null, null);
-  }
-
-
-
-  /**
-   * Utility method which is called by the testcase sending a DELETE request.
-   * @param authentication The flag to set the authentication on and off.
-   * @return The error code of operation performed.
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  private int performDeleteOperation(boolean authentication) throws Exception
-  {
-    String[] args = null;
-    if(authentication)
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "-V", "3",
-        "-D", "cn=Directory Manager",
-        "-w", "password",
-        "o=mod_rejectTestCase,o=test"
-      };
-    else
-      args = new String[]
-      {
-        "-h", "127.0.0.1",
-        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-        "o=mod_rejectTestCase,o=test"
-      };
-    return LDAPDelete.mainDelete(args, false, null, null);
-  }
-
-  /**
-   * Ensures that the Directory Server is running before executing the
-   * testcases.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @BeforeClass()
-  public void startServer()
-         throws Exception
-  {
-    TestCaseUtils.startServer();
-    TestCaseUtils.initializeTestBackend(true);
-  }
-
-
-  /**
-   * Tests whether an authenticated SEARCH request will be allowed with the
-   * default configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests".
-   */
-  @Test()
-  public void testAuthSearchDefCfg()
-  {
-    String[] args = {
-      "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-D", "cn=Directory Manager",
-      "-w", "password",
-      "-b", "",
-      "-s", "base",
-      "(objectClass=*)"
-      };
-
-    assertEquals(LDAPSearch.mainSearch(args, false, null, System.err), 0);
-  }
-
-
-
-  /**
-   * Tests whether an unauthenticated SEARCH request will be allowed with the
-   * default configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests".
-   */
-  @Test()
-  public void testUnauthSearchDefCfg()
-  {
-    String[] args = {
-      "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-b", "",
-      "-s", "base",
-      "(objectClass=*)"
-      };
-
-    assertEquals(LDAPSearch.mainSearch(args, false, null, System.err), 0);
-  }
-
-
-
-  /**
-   * Tests whether an authenticated BIND request will be allowed with the
-   * default configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests" .
-   */
-  @Test()
-  public void testAuthBindDefCfg()
-  {
-    InternalClientConnection conn =
-       new InternalClientConnection(new AuthenticationInfo());
-    ASN1OctetString user =
-       new ASN1OctetString("cn=Directory Manager");
-    ASN1OctetString password =
-       new ASN1OctetString("password");
-    BindOperation bindOperation = conn.processSimpleBind(user,password);
-    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
-  }
-
-
-
-  /**
-   * Tests whether an Unauthenticated BIND request will be allowed with the
-   * default configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests".
-   */
-  @Test()
-  public void testUnauthBindDefCfg()
-  {
-    InternalClientConnection conn =
-        new InternalClientConnection(new AuthenticationInfo());
-    BindOperation bindOperation = conn.processSimpleBind(DN.nullDN(),null);
-    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
-  }
-
-
-  /**
-   * Tests whether the Who Am I? extended operation with an internal
-   * authenticated connection succeeds with default setting of
-   * "ds-cfg-reject-unauthenticated-requests".
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test()
-  public void testAuthWAIDefCfg() throws Exception
-  {
-    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
-    ASN1Reader reader = new ASN1Reader(s);
-    ASN1Writer writer = new ASN1Writer(s);
-
-    AtomicInteger nextMessageID = new AtomicInteger(1);
-    LDAPAuthenticationHandler authHandler =
-         new LDAPAuthenticationHandler(reader, writer, "localhost",
-                                       nextMessageID);
-    authHandler.doSimpleBind(3, new ASN1OctetString("cn=Directory Manager"),
-                             new ASN1OctetString("password"),
-                             new ArrayList<LDAPControl>(),
-                             new ArrayList<LDAPControl>());
-    ASN1OctetString authzID = authHandler.requestAuthorizationIdentity();
-    assertNotNull(authzID);
-
-    LDAPMessage unbindMessage = new LDAPMessage(nextMessageID.getAndIncrement(),
-                                                new UnbindRequestProtocolOp());
-    writer.writeElement(unbindMessage.encode());
-    s.close();
-  }
-
-
-
-  /**
-   * Tests whether the who am I? extended operation with an internal
-   * unauthenticated connection succeeds with default setting of
-   * "ds-cfg-reject-unauthenticated-requests".
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test()
-  public void testUnauthWAIDefCfg() throws Exception
-  {
-    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
-    ASN1Reader reader = new ASN1Reader(s);
-    ASN1Writer writer = new ASN1Writer(s);
-
-    AtomicInteger nextMessageID = new AtomicInteger(1);
-    LDAPAuthenticationHandler authHandler =
-         new LDAPAuthenticationHandler(reader, writer, "localhost",
-                                       nextMessageID);
-    ASN1OctetString authzID = authHandler.requestAuthorizationIdentity();
-    assertNull(authzID);
-
-    LDAPMessage unbindMessage = new LDAPMessage(nextMessageID.getAndIncrement(),
-                                                new UnbindRequestProtocolOp());
-    writer.writeElement(unbindMessage.encode());
-    s.close();
-  }
-
-
-
-  /**
-   * Tests the use of the StartTLS extended operation to communicate with the
-   * server in conjunction with no authentication and using blind trust
-   * with the default configuration settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test()
-  public void testStartTLSUnauthDefCfg() throws Exception
-  {
-    String[] argSearch =
-    {
-     "-h", "127.0.0.1",
-     "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-     "-D", "cn=directory manager",
-     "-w", "password",
-     "-q",
-     "-X",
-     "-b", "",
-     "-s", "base",
-     "(objectClass=*)"
-    };
-    assertEquals(LDAPSearch.mainSearch(
-                    argSearch, false, null, System.err),0);
-  }
-
-
-
-  /**
-   * Tests the whether the authenticated ADD,MODIFY,COMPARE,MODRDN and DELETE
-   * requests succeed with the default configuration settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test()
-  public void testOtherOpsAuthDefCfg() throws Exception
-  {
-    assertEquals(performAddOperation(true),0);
-
-    assertEquals(performModifyOperation(true),0);
-
-    assertEquals(performCompareOperation(true), 0);
-
-    assertEquals(performModRdnOperation(true), 0);
-
-    assertEquals(performDeleteOperation(true),0);
-  }
-
-
-
-  /**
-   * Tests the whether the unauthenticated ADD,MODIFY,COMPARE,MODRDN and
-   * DELETE requests succeed with the default configuration settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test()
-  public void testOtherOpsUnauthDefCfg() throws Exception
-  {
-    assertEquals(performAddOperation(false),0);
-
-    assertEquals(performModifyOperation(false),0);
-
-    assertEquals(performCompareOperation(false), 0);
-
-    assertEquals(performModRdnOperation(false), 0);
-
-    assertEquals(performDeleteOperation(false),0);
-  }
-
-
-
-  /**
-   * Tests whether change in the configuration attribute takes effect
-   * on-the-fly.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests.testAuthSearchDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testUnauthSearchDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testAuthBindDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testUnauthBindDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testUnauthWAIDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testAuthWAIDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testStartTLSUnauthDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testOtherOpsUnauthDefCfg",
-    "org.opends.server.core.RejectUnauthReqTests.testOtherOpsAuthDefCfg"
-  })
-  public void  testChangeAndVerifyRejUnauthReqCfgAttr()  throws Exception
-  {
-    //Verify the default setting of the configuration attribute.
-    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),false);
-    String path = TestCaseUtils.createTempFile(
-       "dn: cn=config",
-       "changetype: modify",
-       "replace: ds-cfg-reject-unauthenticated-requests",
-       "ds-cfg-reject-unauthenticated-requests: true");
-
-    String[] args =
-    {
-      "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-D", "cn=Directory Manager",
-      "-w", "password",
-      "-f",  path
-    };
-
-    assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
-    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),true);
-  }
-
-
-
-  /**
-   * Tests whether both authenticated and unauthenticated SEARCH requests
-   *  will be allowed with the  new configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests" .
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests." +
-           "testChangeAndVerifyRejUnauthReqCfgAttr"
-  })
-  public void testSearchNewCfg()
-  {
-    String[] args = {
-      "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-b", "",
-      "-s", "base",
-      "(objectClass=*)"
-      };
-
-    assertFalse(LDAPSearch.mainSearch(args, false, null, null)==0);
-
-    String[] authArgs =  {
-     "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-D", "cn=Directory Manager",
-      "-w", "password",
-      "-b", "",
-      "-s", "base",
-      "(objectClass=*)"
-    }  ;
-    assertEquals(LDAPSearch.mainSearch(
-                  authArgs, false, null, System.err), 0);
-  }
-
-
-
-   /**
-   * Tests whether authenticated and unauthenticated BIND requests will be
-    * allowed with the new configuration settings for
-   * "ds-cfg-reject-unauthenticated-requests" .
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests." +
-        "testChangeAndVerifyRejUnauthReqCfgAttr"})
-  public void testBindNewCfg()
-  {
-    InternalClientConnection conn =
-          new InternalClientConnection(new AuthenticationInfo());
-    ASN1OctetString user =
-          new ASN1OctetString("cn=Directory Manager");
-    ASN1OctetString password =
-          new ASN1OctetString("password");
-    //Unauthenticated BIND request.
-    BindOperation bindOperation = conn.processSimpleBind(DN.nullDN(),null);
-    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
-    //Authenticated BIND request.
-    bindOperation = conn.processSimpleBind(user,password);
-    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
-  }
-
-
-
-  /**
-   * Tests the use of the StartTLS extended operation to communicate with the
-   * server in conjunction with no authentication and using blind trust.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests." +
-        "testChangeAndVerifyRejUnauthReqCfgAttr"})
-  public void testStartTLSNoAuthTrustAll() throws Exception
-  {
-    String[] argSearch =
-    {
-     "-h", "127.0.0.1",
-     "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-     "-D", "cn=directory manager",
-     "-w", "password",
-     "-q",
-     "-X",
-     "-b", "",
-     "-s", "base",
-     "(objectClass=*)"
-    };
-    assertEquals(LDAPSearch.mainSearch(
-                    argSearch, false, null, System.err),0);
-  }
-
-
-
-
-  /**
-   * Tests whether the Who Am I? extended operation with an internal
-   * authenticated connection succeeds with new setting of
-   * "ds-cfg-reject-unauthenticated-requests".
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests." +
-        "testChangeAndVerifyRejUnauthReqCfgAttr"})
-
-  public void testAuthWAINewCfg() throws Exception
-  {
-    InternalClientConnection conn =
-       InternalClientConnection.getRootConnection();
-    ExtendedOperation extOp =
-       conn.processExtendedOperation(OID_WHO_AM_I_REQUEST, null);
-    assertEquals(extOp.getResultCode(), ResultCode.SUCCESS);
-    assertNotNull(extOp.getResponseValue());
-  }
-
-
-
-  /**
-   * Tests whether the who am I? extended operation with an
-   * unauthenticated connection fails with new setting of
-   * "ds-cfg-reject-unauthenticated-requests".
-   *
-   * @throws  UnsupportedEncodingException If an unexpected problem occurs.
-   * @throws  IOException If an unexpected problem occurs.
-   * @throws  ClientException If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-    "org.opends.server.core.RejectUnauthReqTests." +
-        "testChangeAndVerifyRejUnauthReqCfgAttr"})
-  public void testUnauthWAINewCfg() throws UnsupportedEncodingException,
-                                          IOException,ClientException
-  {
-    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
-    ASN1Reader reader = new ASN1Reader(s);
-    ASN1Writer writer = new ASN1Writer(s);
-    AtomicInteger nextMessageID = new AtomicInteger(1);
-    LDAPAuthenticationHandler authHandler =
-         new LDAPAuthenticationHandler(reader, writer, "localhost",
-                                       nextMessageID);
-    ASN1OctetString authzID = null;
-    try
-    {
-      authzID = authHandler.requestAuthorizationIdentity();
-    }
-    catch(LDAPException e)
-    {
-      assertNull(authzID);
-    }
-    finally
-    {
-      LDAPMessage unbindMessage = new LDAPMessage(
-                                    nextMessageID.getAndIncrement(),
-                                    new UnbindRequestProtocolOp());
-      writer.writeElement(unbindMessage.encode());
-      s.close();
-    }
-  }
-
-
-
-  /**
-   * Tests the whether the authenticated ADD,MODIFY,COMPARE,MODRDN and DELETE
-   * requests succeed with the new configuration settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-        "org.opends.server.core.RejectUnauthReqTests." +
-            "testChangeAndVerifyRejUnauthReqCfgAttr"})
-  public void testOtherOpsAuthNewCfg() throws Exception {
-
-    assertEquals(performAddOperation(true),0);
-
-    assertEquals(performModifyOperation(true),0);
-
-    assertEquals(performCompareOperation(true), 0);
-
-    assertEquals(performModRdnOperation(true), 0);
-
-    assertEquals(performDeleteOperation(true),0);
-  }
-
-
-
-  /**
-   * Tests the whether the unauthenticated ADD,MODIFY,COMPARE,MODRDN and
-   * DELETE requests fail with the new configuration settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @Test(dependsOnMethods = {
-        "org.opends.server.core.RejectUnauthReqTests." +
-            "testChangeAndVerifyRejUnauthReqCfgAttr"})
-  public void testOtherOpsUnauthNewCfg() throws Exception
-  {
-    assertFalse(performAddOperation(false)==0);
-
-    assertFalse(performModifyOperation(false)==0);
-
-    assertFalse(performCompareOperation(false)==0);
-
-    assertFalse(performModRdnOperation(false)==0);
-
-    assertFalse(performDeleteOperation(false)==0);
-  }
-
-
-  /**
-   * Resets the configuration attribute to the default settings.
-   *
-   * @throws  Exception  If an unexpected problem occurs.
-   */
-  @AfterClass()
-  public void  testResetRejUnauthReqCfgAttr()  throws Exception
-  {
-    //Verify the modified setting of the configuration attribute.
-    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),true);
-    String path = TestCaseUtils.createTempFile(
-       "dn: cn=config",
-       "changetype: modify",
-       "replace: ds-cfg-reject-unauthenticated-requests",
-       "ds-cfg-reject-unauthenticated-requests: false");
-
-    String[] args =
-    {
-      "-h", "127.0.0.1",
-      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
-      "-D", "cn=Directory Manager",
-      "-w", "password",
-      "-f",  path
-    };
-
-    assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
-    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),false);
-  }
-
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License").  You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at
+ * trunk/opends/resource/legal-notices/OpenDS.LICENSE
+ * or https://OpenDS.dev.java.net/OpenDS.LICENSE.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at
+ * trunk/opends/resource/legal-notices/OpenDS.LICENSE.  If applicable,
+ * add the following below this CDDL HEADER, with the fields enclosed
+ * by brackets "[]" replaced with your own identifying * information:
+ *      Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ *
+ *
+ *      Portions Copyright 2006 Sun Microsystems, Inc.
+ */
+package org.opends.server.core;
+
+
+import java.net.Socket;
+import java.util.ArrayList;
+import java.util.concurrent.atomic.AtomicInteger;
+import java.io.UnsupportedEncodingException;
+import java.io.IOException;
+
+import org.testng.annotations.Test;
+import org.testng.annotations.BeforeClass;
+import org.opends.server.TestCaseUtils;
+import org.opends.server.protocols.asn1.ASN1OctetString;
+import org.opends.server.protocols.internal.InternalClientConnection;
+import org.opends.server.types.DN;
+import org.opends.server.types.AuthenticationInfo;
+import org.opends.server.types.ResultCode;
+import org.opends.server.protocols.asn1.ASN1Reader;
+import org.opends.server.protocols.asn1.ASN1Writer;
+import org.opends.server.protocols.ldap.LDAPControl;
+import org.opends.server.protocols.ldap.LDAPMessage;
+import org.opends.server.protocols.ldap.UnbindRequestProtocolOp;
+import org.opends.server.protocols.ldap.LDAPException;
+import org.opends.server.tools.*;
+import org.testng.annotations.*;
+import static org.testng.Assert.*;
+import static org.opends.server.util.ServerConstants.*;
+
+/**
+ * A set of testcases for configuration attribute 
+ * "ds-cfg-reject-unauthenticated-requests".
+ * 
+ */
+
+public class RejectUnauthReqTests extends CoreTestCase
+{
+
+  /**
+   * Utility method which is called by the testcase sending an ADD request.
+   * @param authentication The flag to set the authentication on and off.
+   * @return The error code of operation performed.
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  private int performAddOperation(boolean authentication) throws Exception
+  {
+    String filePath = TestCaseUtils.createTempFile(
+      "dn: o=rejectTestCase,o=test",
+      "objectclass: top",
+      "objectclass: organization",
+      "o: rejectTestCase",
+      "description: Reject Test Case");
+    String[] args = null;
+    if(authentication)
+      args = new String []
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-D","cn=directory manager",
+        "-w","password",
+        "-a",
+        "-f", filePath,
+      };
+    else
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-a",
+        "-f", filePath,
+      };
+    return LDAPModify.mainModify(args, false, null,null);
+  }
+
+
+
+  /**
+   * Utility method which is called by the testcase sending a MODIFY request.
+   * @param authentication The flag to set the authentication on and off.
+   * @return The error code of operation performed.
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  private int performModifyOperation(boolean authentication) throws Exception
+  {
+    String path = TestCaseUtils.createTempFile(
+       "dn: o=rejectTestCase,o=test",
+       "changetype: modify",
+       "replace: description",
+       "description: New Description");
+    String[] args = null;
+    if(authentication)
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-D","cn=directory manager",
+        "-w","password",
+        "-f", path
+      };
+    else
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-f", path
+      };
+    return LDAPModify.mainModify(args, false, null, null);
+  }
+
+
+
+  /**
+   * Utility method which is called by the testcase sending a COMPARE request.
+   * @param authentication The flag to set the authentication on and off.
+   * @return The error code of operation performed.
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  private int performCompareOperation(boolean authentication) throws Exception
+  {
+    String[] args = null;
+    if(authentication)
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-D", "cn=Directory Manager",
+        "-w", "password",
+        "o:test",
+        "o=test"
+      };
+    else
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "o:test",
+        "o=test"
+      };
+
+    return LDAPCompare.mainCompare(args, false, null, null);
+  }
+
+
+
+  /**
+   * Utility method which is called by the testcase sending a MODRDN request.
+   * @param authentication The flag to set the authentication on and off.
+   * @return The error code of operation performed.
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  private int performModRdnOperation(boolean authentication) throws Exception
+  {
+    String path= TestCaseUtils.createTempFile("dn: o=rejectTestCase,o=Test",
+      "changetype: modrdn",
+      "newrdn: o=mod_rejectTestCase",
+      "deleteoldrdn: 0");
+    String[] args = null;
+    if(authentication)
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-D","cn=directory manager",
+        "-w","password",
+        "-f", path
+      };
+    else
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-f", path
+      };
+    return LDAPModify.mainModify(args, false, null, null);
+  }
+
+
+
+  /**
+   * Utility method which is called by the testcase sending a DELETE request.
+   * @param authentication The flag to set the authentication on and off.
+   * @return The error code of operation performed.
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  private int performDeleteOperation(boolean authentication) throws Exception
+  {
+    String[] args = null;
+    if(authentication)
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "-V", "3",
+        "-D", "cn=Directory Manager",
+        "-w", "password",
+        "o=mod_rejectTestCase,o=test"
+      };
+    else
+      args = new String[]
+      {
+        "-h", "127.0.0.1",
+        "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+        "o=mod_rejectTestCase,o=test"
+      };
+    return LDAPDelete.mainDelete(args, false, null, null);
+  }
+
+  /**
+   * Ensures that the Directory Server is running before executing the
+   * testcases.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @BeforeClass()
+  public void startServer()
+         throws Exception
+  {
+    TestCaseUtils.startServer();
+    TestCaseUtils.initializeTestBackend(true);
+  }
+
+
+  /**
+   * Tests whether an authenticated SEARCH request will be allowed with the
+   * default configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests".
+   */
+  @Test()
+  public void testAuthSearchDefCfg()
+  {
+    String[] args = {
+      "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-D", "cn=Directory Manager",
+      "-w", "password",
+      "-b", "",
+      "-s", "base",
+      "(objectClass=*)"
+      };
+
+    assertEquals(LDAPSearch.mainSearch(args, false, null, System.err), 0);
+  }
+
+
+
+  /**
+   * Tests whether an unauthenticated SEARCH request will be allowed with the
+   * default configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests".
+   */
+  @Test()
+  public void testUnauthSearchDefCfg()
+  {
+    String[] args = {
+      "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-b", "",
+      "-s", "base",
+      "(objectClass=*)"
+      };
+
+    assertEquals(LDAPSearch.mainSearch(args, false, null, System.err), 0);
+  }
+
+
+
+  /**
+   * Tests whether an authenticated BIND request will be allowed with the
+   * default configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests" .
+   */
+  @Test()
+  public void testAuthBindDefCfg()
+  {
+    InternalClientConnection conn =
+       new InternalClientConnection(new AuthenticationInfo());
+    ASN1OctetString user =
+       new ASN1OctetString("cn=Directory Manager");
+    ASN1OctetString password =
+       new ASN1OctetString("password");
+    BindOperation bindOperation = conn.processSimpleBind(user,password);
+    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
+  }
+
+
+
+  /**
+   * Tests whether an Unauthenticated BIND request will be allowed with the
+   * default configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests".
+   */
+  @Test()
+  public void testUnauthBindDefCfg()
+  {
+    InternalClientConnection conn =
+        new InternalClientConnection(new AuthenticationInfo());
+    BindOperation bindOperation = conn.processSimpleBind(DN.nullDN(),null);
+    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
+  }
+
+
+  /**
+   * Tests whether the Who Am I? extended operation with an internal
+   * authenticated connection succeeds with default setting of
+   * "ds-cfg-reject-unauthenticated-requests".
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test()
+  public void testAuthWAIDefCfg() throws Exception
+  {
+    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
+    ASN1Reader reader = new ASN1Reader(s);
+    ASN1Writer writer = new ASN1Writer(s);
+
+    AtomicInteger nextMessageID = new AtomicInteger(1);
+    LDAPAuthenticationHandler authHandler =
+         new LDAPAuthenticationHandler(reader, writer, "localhost",
+                                       nextMessageID);
+    authHandler.doSimpleBind(3, new ASN1OctetString("cn=Directory Manager"),
+                             new ASN1OctetString("password"),
+                             new ArrayList<LDAPControl>(),
+                             new ArrayList<LDAPControl>());
+    ASN1OctetString authzID = authHandler.requestAuthorizationIdentity();
+    assertNotNull(authzID);
+
+    LDAPMessage unbindMessage = new LDAPMessage(nextMessageID.getAndIncrement(),
+                                                new UnbindRequestProtocolOp());
+    writer.writeElement(unbindMessage.encode());
+    s.close();
+  }
+
+
+
+  /**
+   * Tests whether the who am I? extended operation with an internal
+   * unauthenticated connection succeeds with default setting of
+   * "ds-cfg-reject-unauthenticated-requests".
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test()
+  public void testUnauthWAIDefCfg() throws Exception
+  {
+    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
+    ASN1Reader reader = new ASN1Reader(s);
+    ASN1Writer writer = new ASN1Writer(s);
+
+    AtomicInteger nextMessageID = new AtomicInteger(1);
+    LDAPAuthenticationHandler authHandler =
+         new LDAPAuthenticationHandler(reader, writer, "localhost",
+                                       nextMessageID);
+    ASN1OctetString authzID = authHandler.requestAuthorizationIdentity();
+    assertNull(authzID);
+
+    LDAPMessage unbindMessage = new LDAPMessage(nextMessageID.getAndIncrement(),
+                                                new UnbindRequestProtocolOp());
+    writer.writeElement(unbindMessage.encode());
+    s.close();
+  }
+
+
+
+  /**
+   * Tests the use of the StartTLS extended operation to communicate with the
+   * server in conjunction with no authentication and using blind trust
+   * with the default configuration settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test()
+  public void testStartTLSUnauthDefCfg() throws Exception
+  {
+    String[] argSearch =
+    {
+     "-h", "127.0.0.1",
+     "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+     "-D", "cn=directory manager",
+     "-w", "password",
+     "-q",
+     "-X",
+     "-b", "",
+     "-s", "base",
+     "(objectClass=*)"
+    };
+    assertEquals(LDAPSearch.mainSearch(
+                    argSearch, false, null, System.err),0);
+  }
+
+
+
+  /**
+   * Tests the whether the authenticated ADD,MODIFY,COMPARE,MODRDN and DELETE
+   * requests succeed with the default configuration settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test()
+  public void testOtherOpsAuthDefCfg() throws Exception
+  {
+    assertEquals(performAddOperation(true),0);
+
+    assertEquals(performModifyOperation(true),0);
+
+    assertEquals(performCompareOperation(true), 0);
+
+    assertEquals(performModRdnOperation(true), 0);
+
+    assertEquals(performDeleteOperation(true),0);
+  }
+
+
+
+  /**
+   * Tests the whether the unauthenticated ADD,MODIFY,COMPARE,MODRDN and
+   * DELETE requests succeed with the default configuration settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test()
+  public void testOtherOpsUnauthDefCfg() throws Exception
+  {
+    assertEquals(performAddOperation(false),0);
+
+    assertEquals(performModifyOperation(false),0);
+
+    assertEquals(performCompareOperation(false), 0);
+
+    assertEquals(performModRdnOperation(false), 0);
+
+    assertEquals(performDeleteOperation(false),0);
+  }
+
+
+
+  /**
+   * Tests whether change in the configuration attribute takes effect
+   * on-the-fly.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests.testAuthSearchDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testUnauthSearchDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testAuthBindDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testUnauthBindDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testUnauthWAIDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testAuthWAIDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testStartTLSUnauthDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testOtherOpsUnauthDefCfg",
+    "org.opends.server.core.RejectUnauthReqTests.testOtherOpsAuthDefCfg"
+  })
+  public void  testChangeAndVerifyRejUnauthReqCfgAttr()  throws Exception
+  {
+    //Verify the default setting of the configuration attribute.
+    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),false);
+    String path = TestCaseUtils.createTempFile(
+       "dn: cn=config",
+       "changetype: modify",
+       "replace: ds-cfg-reject-unauthenticated-requests",
+       "ds-cfg-reject-unauthenticated-requests: true");
+
+    String[] args =
+    {
+      "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-D", "cn=Directory Manager",
+      "-w", "password",
+      "-f",  path
+    };
+
+    assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
+    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),true);
+  }
+
+
+
+  /**
+   * Tests whether both authenticated and unauthenticated SEARCH requests
+   *  will be allowed with the  new configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests" .
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests." +
+           "testChangeAndVerifyRejUnauthReqCfgAttr"
+  })
+  public void testSearchNewCfg()
+  {
+    String[] args = {
+      "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-b", "",
+      "-s", "base",
+      "(objectClass=*)"
+      };
+
+    assertFalse(LDAPSearch.mainSearch(args, false, null, null)==0);
+
+    String[] authArgs =  {
+     "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-D", "cn=Directory Manager",
+      "-w", "password",
+      "-b", "",
+      "-s", "base",
+      "(objectClass=*)"
+    }  ;
+    assertEquals(LDAPSearch.mainSearch(
+                  authArgs, false, null, System.err), 0);
+  }
+
+
+
+   /**
+   * Tests whether authenticated and unauthenticated BIND requests will be
+    * allowed with the new configuration settings for
+   * "ds-cfg-reject-unauthenticated-requests" .
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests." +
+        "testChangeAndVerifyRejUnauthReqCfgAttr"})
+  public void testBindNewCfg()
+  {
+    InternalClientConnection conn =
+          new InternalClientConnection(new AuthenticationInfo());
+    ASN1OctetString user =
+          new ASN1OctetString("cn=Directory Manager");
+    ASN1OctetString password =
+          new ASN1OctetString("password");
+    //Unauthenticated BIND request.
+    BindOperation bindOperation = conn.processSimpleBind(DN.nullDN(),null);
+    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
+    //Authenticated BIND request.
+    bindOperation = conn.processSimpleBind(user,password);
+    assertEquals(bindOperation.getResultCode(), ResultCode.SUCCESS);
+  }
+
+
+
+  /**
+   * Tests the use of the StartTLS extended operation to communicate with the
+   * server in conjunction with no authentication and using blind trust.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests." +
+        "testChangeAndVerifyRejUnauthReqCfgAttr"})
+  public void testStartTLSNoAuthTrustAll() throws Exception
+  {
+    String[] argSearch =
+    {
+     "-h", "127.0.0.1",
+     "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+     "-D", "cn=directory manager",
+     "-w", "password",
+     "-q",
+     "-X",
+     "-b", "",
+     "-s", "base",
+     "(objectClass=*)"
+    };
+    assertEquals(LDAPSearch.mainSearch(
+                    argSearch, false, null, System.err),0);
+  }
+
+
+
+
+  /**
+   * Tests whether the Who Am I? extended operation with an internal
+   * authenticated connection succeeds with new setting of
+   * "ds-cfg-reject-unauthenticated-requests".
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests." +
+        "testChangeAndVerifyRejUnauthReqCfgAttr"})
+
+  public void testAuthWAINewCfg() throws Exception
+  {
+    InternalClientConnection conn =
+       InternalClientConnection.getRootConnection();
+    ExtendedOperation extOp =
+       conn.processExtendedOperation(OID_WHO_AM_I_REQUEST, null);
+    assertEquals(extOp.getResultCode(), ResultCode.SUCCESS);
+    assertNotNull(extOp.getResponseValue());
+  }
+
+
+
+  /**
+   * Tests whether the who am I? extended operation with an
+   * unauthenticated connection fails with new setting of
+   * "ds-cfg-reject-unauthenticated-requests".
+   *
+   * @throws  UnsupportedEncodingException If an unexpected problem occurs.
+   * @throws  IOException If an unexpected problem occurs.
+   * @throws  ClientException If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+    "org.opends.server.core.RejectUnauthReqTests." +
+        "testChangeAndVerifyRejUnauthReqCfgAttr"})
+  public void testUnauthWAINewCfg() throws UnsupportedEncodingException,
+                                          IOException,ClientException
+  {
+    Socket s = new Socket("127.0.0.1", (int) TestCaseUtils.getServerLdapPort());
+    ASN1Reader reader = new ASN1Reader(s);
+    ASN1Writer writer = new ASN1Writer(s);
+    AtomicInteger nextMessageID = new AtomicInteger(1);
+    LDAPAuthenticationHandler authHandler =
+         new LDAPAuthenticationHandler(reader, writer, "localhost",
+                                       nextMessageID);
+    ASN1OctetString authzID = null;
+    try
+    {
+      authzID = authHandler.requestAuthorizationIdentity();
+    }
+    catch(LDAPException e)
+    {
+      assertNull(authzID);
+    }
+    finally
+    {
+      LDAPMessage unbindMessage = new LDAPMessage(
+                                    nextMessageID.getAndIncrement(),
+                                    new UnbindRequestProtocolOp());
+      writer.writeElement(unbindMessage.encode());
+      s.close();
+    }
+  }
+
+
+
+  /**
+   * Tests the whether the authenticated ADD,MODIFY,COMPARE,MODRDN and DELETE
+   * requests succeed with the new configuration settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+        "org.opends.server.core.RejectUnauthReqTests." +
+            "testChangeAndVerifyRejUnauthReqCfgAttr"})
+  public void testOtherOpsAuthNewCfg() throws Exception {
+
+    assertEquals(performAddOperation(true),0);
+
+    assertEquals(performModifyOperation(true),0);
+
+    assertEquals(performCompareOperation(true), 0);
+
+    assertEquals(performModRdnOperation(true), 0);
+
+    assertEquals(performDeleteOperation(true),0);
+  }
+
+
+
+  /**
+   * Tests the whether the unauthenticated ADD,MODIFY,COMPARE,MODRDN and
+   * DELETE requests fail with the new configuration settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @Test(dependsOnMethods = {
+        "org.opends.server.core.RejectUnauthReqTests." +
+            "testChangeAndVerifyRejUnauthReqCfgAttr"})
+  public void testOtherOpsUnauthNewCfg() throws Exception
+  {
+    assertFalse(performAddOperation(false)==0);
+
+    assertFalse(performModifyOperation(false)==0);
+
+    assertFalse(performCompareOperation(false)==0);
+
+    assertFalse(performModRdnOperation(false)==0);
+
+    assertFalse(performDeleteOperation(false)==0);
+  }
+
+
+  /**
+   * Resets the configuration attribute to the default settings.
+   *
+   * @throws  Exception  If an unexpected problem occurs.
+   */
+  @AfterClass()
+  public void  testResetRejUnauthReqCfgAttr()  throws Exception
+  {
+    //Verify the modified setting of the configuration attribute.
+    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),true);
+    String path = TestCaseUtils.createTempFile(
+       "dn: cn=config",
+       "changetype: modify",
+       "replace: ds-cfg-reject-unauthenticated-requests",
+       "ds-cfg-reject-unauthenticated-requests: false");
+
+    String[] args =
+    {
+      "-h", "127.0.0.1",
+      "-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
+      "-D", "cn=Directory Manager",
+      "-w", "password",
+      "-f",  path
+    };
+
+    assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
+    assertEquals(DirectoryServer.rejectUnauthenticatedRequests(),false);
+  }
+
 }
\ No newline at end of file

--
Gitblit v1.10.0