|
@@ -12,10 +12,14 @@
|
|
* See the License for the specific language governing permissions and
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
* limitations under the License.
|
|
*/
|
|
*/
|
|
|
|
+
|
|
package net.sf.acegisecurity.providers.dao;
|
|
package net.sf.acegisecurity.providers.dao;
|
|
|
|
|
|
import junit.framework.TestCase;
|
|
import junit.framework.TestCase;
|
|
|
|
|
|
|
|
+import net.sf.acegisecurity.providers.encoding.*;
|
|
|
|
+
|
|
|
|
+
|
|
/**
|
|
/**
|
|
* <p>
|
|
* <p>
|
|
* TestCase for PlaintextPasswordEncoder.
|
|
* TestCase for PlaintextPasswordEncoder.
|
|
@@ -25,35 +29,36 @@ import junit.framework.TestCase;
|
|
* @version $Id$
|
|
* @version $Id$
|
|
*/
|
|
*/
|
|
public class PlaintextPasswordEncoderTest extends TestCase {
|
|
public class PlaintextPasswordEncoderTest extends TestCase {
|
|
|
|
+ //~ Methods ================================================================
|
|
|
|
+
|
|
|
|
+ public void testBasicFunctionality() {
|
|
|
|
+ PlaintextPasswordEncoder pe = new PlaintextPasswordEncoder();
|
|
|
|
+
|
|
|
|
+ String raw = "abc123";
|
|
|
|
+ String rawDiffCase = "AbC123";
|
|
|
|
+ String badRaw = "abc321";
|
|
|
|
+
|
|
|
|
+ // should be able to validate even without encoding
|
|
|
|
+ String encoded = raw;
|
|
|
|
+ assertTrue(pe.isPasswordValid(encoded, raw, null)); // no SALT source
|
|
|
|
+ assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
+
|
|
|
|
+ // now make sure encoded version it gives us back is comparable as well
|
|
|
|
+ encoded = pe.encodePassword(raw, null);
|
|
|
|
+ assertTrue(pe.isPasswordValid(encoded, raw, null)); // no SALT source
|
|
|
|
+ assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
+
|
|
|
|
+ // make sure default is not to ignore password case
|
|
|
|
+ encoded = pe.encodePassword(rawDiffCase, null);
|
|
|
|
+ assertFalse(pe.isPasswordValid(encoded, raw, null));
|
|
|
|
+
|
|
|
|
+ // now check for ignore password case
|
|
|
|
+ pe = new PlaintextPasswordEncoder();
|
|
|
|
+ pe.setIgnorePasswordCase(true);
|
|
|
|
|
|
- public void testBasicFunctionality() {
|
|
|
|
- PlaintextPasswordEncoder pe = new PlaintextPasswordEncoder();
|
|
|
|
-
|
|
|
|
- String raw = "abc123";
|
|
|
|
- String rawDiffCase = "AbC123";
|
|
|
|
- String badRaw = "abc321";
|
|
|
|
- // should be able to validate even without encoding
|
|
|
|
- String encoded = raw;
|
|
|
|
- assertTrue(pe.isPasswordValid(encoded, raw, null)); // no SALT source
|
|
|
|
- assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
-
|
|
|
|
- // now make sure encoded version it gives us back is comparable as well
|
|
|
|
- encoded = pe.encodePassword(raw, null);
|
|
|
|
- assertTrue(pe.isPasswordValid(encoded, raw, null)); // no SALT source
|
|
|
|
- assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
-
|
|
|
|
- // make sure default is not to ignore password case
|
|
|
|
- encoded = pe.encodePassword(rawDiffCase, null);
|
|
|
|
- assertFalse(pe.isPasswordValid(encoded, raw, null));
|
|
|
|
-
|
|
|
|
- // now check for ignore password case
|
|
|
|
- pe = new PlaintextPasswordEncoder();
|
|
|
|
- pe.setIgnorePasswordCase(true);
|
|
|
|
-
|
|
|
|
- // should be able to validate even without encoding
|
|
|
|
- encoded = pe.encodePassword(rawDiffCase, null);
|
|
|
|
- assertTrue(pe.isPasswordValid(encoded, raw, null));
|
|
|
|
- assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-}
|
|
|
|
|
|
+ // should be able to validate even without encoding
|
|
|
|
+ encoded = pe.encodePassword(rawDiffCase, null);
|
|
|
|
+ assertTrue(pe.isPasswordValid(encoded, raw, null));
|
|
|
|
+ assertFalse(pe.isPasswordValid(encoded, badRaw, null));
|
|
|
|
+ }
|
|
|
|
+}
|