/* * The contents of this file are subject to the terms of the Common Development and * Distribution License (the License). You may not use this file except in compliance with the * License. * * You can obtain a copy of the License at legal/CDDLv1.0.txt. See the License for the * specific language governing permission and limitations under the License. * * When distributing Covered Software, include this CDDL Header Notice in each file and include * the License file at legal/CDDLv1.0.txt. If applicable, add the following below the CDDL * Header, with the fields enclosed by brackets [] replaced by your own identifying * information: "Portions Copyright [year] [name of copyright owner]". * * Copyright 2006-2008 Sun Microsystems, Inc. * Portions Copyright 2014-2015 ForgeRock AS. */ package org.opends.server.schema; import static org.opends.server.schema.SchemaConstants.*; import org.forgerock.i18n.slf4j.LocalizedLogger; import org.forgerock.opendj.ldap.ByteSequence; import org.forgerock.opendj.ldap.ByteString; import org.forgerock.opendj.ldap.ConditionResult; import org.forgerock.opendj.ldap.schema.SchemaBuilder; import org.opends.server.api.PasswordStorageScheme; import static org.opends.server.core.DirectoryServer.*; /** * Implementation of the userPasswordMatch matching rule, which can be used * to determine whether a clear-text value matches an encoded password. *
* This matching rule serves a similar purpose to the equivalent * AuthPasswordEqualityMatchingRule defined in RFC 3112 (http://tools.ietf.org/html/rfc3112). */ public class UserPasswordEqualityMatchingRule extends AbstractPasswordEqualityMatchingRuleImpl { private static final LocalizedLogger logger = LocalizedLogger.getLoggerForThisClass(); /** {@inheritDoc} */ @Override protected ConditionResult valuesMatch(ByteSequence attributeValue, ByteSequence assertionValue) { // We must be able to decode the attribute value using the user password // syntax. String[] userPWComponents; try { userPWComponents = UserPasswordSyntax.decodeUserPassword(attributeValue.toString()); } catch (Exception e) { logger.traceException(e); return ConditionResult.FALSE; } // The first element of the array will be the scheme. // Make sure that we support the requested scheme. PasswordStorageScheme> storageScheme = getPasswordStorageScheme(userPWComponents[0]); if (storageScheme == null) { // It's not a scheme that we can support. return ConditionResult.FALSE; } // We support the scheme, so make the determination. return ConditionResult.valueOf( storageScheme.passwordMatches(assertionValue, ByteString.valueOfUtf8(userPWComponents[1]))); } /** * Adds the user password equality matching rule to the provided schema builder. * * @param builder * where to add the matching rule */ public static void addUserPasswordEqualityMatchingRule(SchemaBuilder builder) { builder.buildMatchingRule(EMR_USER_PASSWORD_OID) .names(EMR_USER_PASSWORD_NAME) .syntaxOID(SYNTAX_OCTET_STRING_OID).description(EMR_USER_PASSWORD_DESCRIPTION) .implementation(new UserPasswordEqualityMatchingRule()) .addToSchema(); } }