[jboss-cvs] JBossAS SVN: r59906 - in branches/Branch_4_2: testsuite/src/main/org/jboss/test/security/test and 1 other directories.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Mon Jan 22 03:09:17 EST 2007


Author: scott.stark at jboss.org
Date: 2007-01-22 03:09:17 -0500 (Mon, 22 Jan 2007)
New Revision: 59906

Added:
   branches/Branch_4_2/connector/src/main/org/jboss/resource/security/PBEIdentityLoginModule.java
   branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/ExecPasswordCmd.java
   branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/SecurityUtilUnitTestCase.java
Modified:
   branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/XMLLoginModulesUnitTestCase.java
   branches/Branch_4_2/testsuite/src/resources/security/login-config.xml
Log:
JBAS-2895, add an extension to SecureIdentityLoginModule that allows more control over the password and encryption used to mask the jca password

Added: branches/Branch_4_2/connector/src/main/org/jboss/resource/security/PBEIdentityLoginModule.java
===================================================================
--- branches/Branch_4_2/connector/src/main/org/jboss/resource/security/PBEIdentityLoginModule.java	                        (rev 0)
+++ branches/Branch_4_2/connector/src/main/org/jboss/resource/security/PBEIdentityLoginModule.java	2007-01-22 08:09:17 UTC (rev 59906)
@@ -0,0 +1,266 @@
+/*
+ * JBoss, Home of Professional Open Source.
+ * Copyright 2006, Red Hat Middleware LLC, and individual contributors
+ * as indicated by the @author tags. See the copyright.txt file in the
+ * distribution for a full listing of individual contributors.
+ *
+ * This is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2.1 of
+ * the License, or (at your option) any later version.
+ *
+ * This software is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this software; if not, write to the Free
+ * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ */
+package org.jboss.resource.security;
+
+import java.security.acl.Group;
+import java.security.Principal;
+import java.util.Map;
+import javax.resource.spi.security.PasswordCredential;
+import javax.security.auth.Subject;
+import javax.security.auth.callback.CallbackHandler;
+import javax.security.auth.login.LoginException;
+import javax.crypto.Cipher;
+import javax.crypto.SecretKey;
+import javax.crypto.SecretKeyFactory;
+import javax.crypto.spec.PBEKeySpec;
+import javax.crypto.spec.PBEParameterSpec;
+
+import org.jboss.security.SimplePrincipal;
+import org.jboss.security.Util;
+import org.jboss.logging.Logger;
+
+/** An example of how one could encrypt the database password for a jca
+  connection factory. The corresponding login config entry illustrates
+  the usage:
+ 
+   <application-policy name = "testPBEIdentityLoginModule">
+      <authentication>
+         <login-module code = "org.jboss.resource.security.PBEIdentityLoginModule"
+            flag = "required">
+            <module-option name = "principal">sa</module-option>
+            <module-option name = "userName">sa</module-option>
+            <!--
+            output from:
+               org.jboss.resource.security.PBEIdentityLoginModule
+               thesecret testPBEIdentityLoginModule abcdefgh 19 PBEWithMD5AndDES 
+            -->
+            <module-option name = "password">3fp7R/7TMjyTTxhmePdJVk</module-option>
+            <module-option name = "ignoreMissigingMCF">true</module-option>
+            <module-option name = "pbealgo">PBEWithMD5AndDES</module-option>
+            <module-option name = "pbepass">testPBEIdentityLoginModule</module-option>
+            <module-option name = "salt">abcdefgh</module-option>
+            <module-option name = "iterationCount">19</module-option>
+            <module-option name = "managedConnectionFactoryName">jboss.jca:service=LocalTxCM,name=DefaultDS</module-option>
+         </login-module>
+      </authentication>
+   </application-policy>
+
+ This uses password based encryption (PBE) with algorithm parameters dervived
+ from pbealgo, pbepass, salt, iterationCount options:
+ + pbealgo - the PBE algorithm to use. Defaults to PBEwithMD5andDES.
+ + pbepass - the PBE password to use. Can use the JaasSecurityDomain {CLASS}
+ and {EXT} syntax to obtain the password from outside of the configuration.
+ Defaults to "jaas is the way".
+ + salt - the PBE salt as a string. Defaults to {1, 7, 2, 9, 3, 11, 4, 13}.
+ + iterationCount - the PBE iterationCount. Defaults to 37.
+
+ * @author Scott.Stark at jboss.org
+ * @author <a href="mailto:noel.rocher at jboss.org">Noel Rocher</a> 29, june 2004 username & userName issue
+ * @version $Revision: 57189 $
+ */
+public class PBEIdentityLoginModule
+   extends AbstractPasswordCredentialLoginModule
+{
+   /**
+    * Class logger
+    */
+   private static final Logger log = Logger.getLogger(SecureIdentityLoginModule.class);
+
+   private String username;
+   private String password;
+   /** The Blowfish key material */
+   private char[] pbepass = "jaas is the way".toCharArray();
+   private String pbealgo = "PBEwithMD5andDES";
+   private byte[] salt = {1, 7, 2, 9, 3, 11, 4, 13};
+   private int iterationCount = 37;
+   private PBEParameterSpec cipherSpec;
+
+   public PBEIdentityLoginModule()
+   {
+   }
+   PBEIdentityLoginModule(String algo, char[] pass, byte[] pbesalt, int iter)
+   {
+      if( pass != null )
+         pbepass = pass;
+      if( algo != null )
+         pbealgo = algo;
+      if( pbesalt != null )
+         salt = pbesalt;
+      if( iter > 0 )
+         iterationCount = iter;
+   }
+
+   public void initialize(Subject subject, CallbackHandler handler, Map sharedState, Map options)
+   {
+      super.initialize(subject, handler, sharedState, options);
+      // NR : we keep this username for compatibility
+      username = (String) options.get("username");
+      if( username == null )
+      {
+      	// NR : try with userName
+        username = (String) options.get("userName");      	
+        if( username == null )
+        {
+         throw new IllegalArgumentException("The user name is a required option");
+        }
+     }
+      password = (String) options.get("password");
+      if( password == null )
+      {
+         throw new IllegalArgumentException("The password is a required option");
+      }
+      // Look for the cipher password and algo parameters
+      String tmp = (String) options.get("pbepass");
+      if( tmp != null )
+      {
+         try
+         {
+            pbepass = Util.loadPassword(tmp);
+         }
+         catch(Exception e)
+         {
+            throw new IllegalStateException(e);
+         }
+      }
+      tmp = (String) options.get("pbealgo");
+      if( tmp != null )
+         pbealgo = tmp;
+      tmp = (String) options.get("salt");
+      if( tmp != null )
+         salt = tmp.substring(0, 8).getBytes();
+      tmp = (String) options.get("iterationCount");
+      if( tmp != null )
+         iterationCount = Integer.parseInt(tmp);
+   }
+
+   public boolean login() throws LoginException
+   {
+      log.trace("login called");
+      if( super.login() == true )
+         return true;
+
+      super.loginOk = true;
+      return true;
+   }
+
+   public boolean commit() throws LoginException
+   {
+      Principal principal = new SimplePrincipal(username);
+      SubjectActions.addPrincipals(subject, principal);
+      sharedState.put("javax.security.auth.login.name", username);
+      // Decode the encrypted password
+      try
+      {
+         char[] decodedPassword = decode(password);
+         PasswordCredential cred = new PasswordCredential(username, decodedPassword);
+         cred.setManagedConnectionFactory(getMcf());
+         SubjectActions.addCredentials(subject, cred);
+      }
+      catch(Exception e)
+      {
+         log.debug("Failed to decode password", e);
+         throw new LoginException("Failed to decode password: "+e.getMessage());
+      }
+      return true;
+   }
+
+   public boolean abort()
+   {
+      username = null;
+      password = null;
+      return true;
+   }
+
+   protected Principal getIdentity()
+   {
+      log.trace("getIdentity called, username="+username);
+      Principal principal = new SimplePrincipal(username);
+      return principal;
+   }
+
+   protected Group[] getRoleSets() throws LoginException
+   {
+      Group[] empty = new Group[0];
+      return empty;
+   }
+
+   private String encode(String secret)
+      throws Exception
+   {
+      // Create the PBE secret key
+      cipherSpec = new PBEParameterSpec(salt, iterationCount);
+      PBEKeySpec keySpec = new PBEKeySpec(pbepass);
+      SecretKeyFactory factory = SecretKeyFactory.getInstance(pbealgo);
+      SecretKey cipherKey = factory.generateSecret(keySpec);
+
+      // Decode the secret
+      Cipher cipher = Cipher.getInstance(pbealgo);
+      cipher.init(Cipher.ENCRYPT_MODE, cipherKey, cipherSpec);
+      byte[] encoding = cipher.doFinal(secret.getBytes());
+      return Util.tob64(encoding);
+   }
+
+   private char[] decode(String secret)
+      throws Exception
+   {
+      // Create the PBE secret key
+      cipherSpec = new PBEParameterSpec(salt, iterationCount);
+      PBEKeySpec keySpec = new PBEKeySpec(pbepass);
+      SecretKeyFactory factory = SecretKeyFactory.getInstance(pbealgo);
+      SecretKey cipherKey = factory.generateSecret(keySpec);
+      // Decode the secret
+      byte[] encoding = Util.fromb64(secret);
+      Cipher cipher = Cipher.getInstance(pbealgo);
+      cipher.init(Cipher.DECRYPT_MODE, cipherKey, cipherSpec);
+      byte[] decode = cipher.doFinal(encoding);
+      return new String(decode).toCharArray();
+   }
+
+   /** Main entry point to encrypt a password using the hard-coded pass phrase 
+    * 
+    * @param args - [0] = the password to encode
+    *    [1] = PBE password 
+    *    [2] = PBE salt 
+    *    [3] = PBE iterationCount 
+    *    [4] = PBE algo 
+    * @throws Exception
+    */ 
+   public static void main(String[] args) throws Exception
+   {
+      String algo = null;
+      char[] pass = "jaas is the way".toCharArray();
+      byte[] salt = null;
+      int iter = -1;
+      if( args.length >= 2 )
+         pass = args[1].toCharArray();
+      if( args.length >= 3 )
+         salt = args[2].getBytes();
+      if( args.length >= 4 )
+         iter = Integer.decode(args[3]);
+      if( args.length >= 5 )
+         algo = args[4];
+
+      PBEIdentityLoginModule pbe = new PBEIdentityLoginModule(algo, pass, salt, iter);
+      String encode = pbe.encode(args[0]);
+      System.out.println("Encoded password: "+encode);
+   }
+}


Property changes on: branches/Branch_4_2/connector/src/main/org/jboss/resource/security/PBEIdentityLoginModule.java
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Id,Revision
Name: svn:eol-style
   + native

Added: branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/ExecPasswordCmd.java
===================================================================
--- branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/ExecPasswordCmd.java	                        (rev 0)
+++ branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/ExecPasswordCmd.java	2007-01-22 08:09:17 UTC (rev 59906)
@@ -0,0 +1,37 @@
+/*
+ * JBoss, Home of Professional Open Source
+ * Copyright 2006, Red Hat Middleware LLC, and individual contributors
+ * by the @authors tag. See the copyright.txt in the distribution for a
+ * full listing of individual contributors.
+ *
+ * This is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2.1 of
+ * the License, or (at your option) any later version.
+ *
+ * This software is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this software; if not, write to the Free
+ * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ */
+package org.jboss.test.security.test;
+
+/**
+ * A test class for the {EXT}... Util.loadPassword method. 
+ * 
+ * @author Scott.Stark at jboss.org
+ * @version $Revision:$
+ */
+public class ExecPasswordCmd
+{
+   public static void main(String[] args)
+   {
+      System.out.println("password3");
+      System.out.flush();
+   }
+}


Property changes on: branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/ExecPasswordCmd.java
___________________________________________________________________
Name: svn:keywords
   + Id,Revision
Name: svn:eol-style
   + native

Added: branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/SecurityUtilUnitTestCase.java
===================================================================
--- branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/SecurityUtilUnitTestCase.java	                        (rev 0)
+++ branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/SecurityUtilUnitTestCase.java	2007-01-22 08:09:17 UTC (rev 59906)
@@ -0,0 +1,122 @@
+/*
+ * JBoss, Home of Professional Open Source.
+ * Copyright 2006, Red Hat Middleware LLC, and individual contributors
+ * as indicated by the @author tags. See the copyright.txt file in the
+ * distribution for a full listing of individual contributors.
+ *
+ * This is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2.1 of
+ * the License, or (at your option) any later version.
+ *
+ * This software is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this software; if not, write to the Free
+ * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ */
+package org.jboss.test.security.test;
+
+import java.io.File;
+import java.io.FileWriter;
+import java.util.Arrays;
+
+import org.jboss.security.Util;
+import org.jboss.security.plugins.FilePassword;
+import org.jboss.test.BaseTestCase;
+import org.jboss.util.StringPropertyReplacer;
+
+/**
+ org.jboss.security.Util tests
+ 
+ @author Scott.Stark at jboss.org
+ @version $Revision: 57211 $
+*/
+public class SecurityUtilUnitTestCase
+   extends BaseTestCase
+{
+   private File tmpPassword;
+   private File password;
+
+   public SecurityUtilUnitTestCase(String name)
+   {
+      super(name);
+   }
+
+   protected void setUp() throws Exception
+   {
+      super.setUp();
+      // Create a tmp password file for testTmpFilePassword
+      tmpPassword = new File(System.getProperty("java.io.tmpdir"), "tmp.password");
+      FileWriter writer = new FileWriter(tmpPassword);
+      writer.write("password1");
+      writer.close();
+
+      // Create the opaque password file for testFilePassword
+      password = new File(System.getProperty("java.io.tmpdir")+ "/tst.password");
+      String[] args2 = {
+         "12345678", // salt
+         "17", // count
+         "password2", // password
+         password.getAbsolutePath() // password-file
+      };
+      FilePassword.main(args2);
+      getLog().info("Created password file: "+args2[2]);
+   }
+   protected void tearDown() throws Exception
+   {
+      tmpPassword.delete();
+      password.delete();
+      super.tearDown();   
+   }
+
+   /**
+    * Test {CLASS}org.jboss.security.plugins.TmpFilePassword
+    * @throws Exception
+    */
+   public void testTmpFilePassword() throws Exception
+   {
+      String passwordCmd = "{CLASS}org.jboss.security.plugins.TmpFilePassword:${java.io.tmpdir}/tmp.password,5000";
+      passwordCmd = StringPropertyReplacer.replaceProperties(passwordCmd);
+      char[] password = Util.loadPassword(passwordCmd);
+      assertTrue("password1", Arrays.equals(password, "password1".toCharArray()));
+   }
+   /**
+    * Test {CLASS}org.jboss.security.plugins.FilePassword
+    * @throws Exception
+    */
+   public void testFilePassword() throws Exception
+   {
+      String passwordCmd = "{CLASS}org.jboss.security.plugins.FilePassword:${java.io.tmpdir}/tst.password";
+      passwordCmd = StringPropertyReplacer.replaceProperties(passwordCmd);
+      char[] password = Util.loadPassword(passwordCmd);
+      assertTrue("password2", Arrays.equals(password, "password2".toCharArray()));
+   }
+   /**
+    * Test {EXT}org.jboss.test.security.test.ExecPasswordCmd
+    * @throws Exception
+    */
+   public void testExtPassword() throws Exception
+   {
+      // First check for java.exe or java as the binary
+      File java = new File(System.getProperty("java.home"), "/bin/java");
+      File javaExe = new File(System.getProperty("java.home"), "/bin/java.exe");
+      String jre;
+      if( java.exists() )
+         jre = java.getAbsolutePath();
+      else
+         jre = javaExe.getAbsolutePath();
+      // Build the command to run this jre
+      String cmd = jre
+      + " -cp "+System.getProperty("java.class.path")
+      + " org.jboss.test.security.test.ExecPasswordCmd";
+      String passwordCmd = "{EXT}"+cmd;
+      char[] password = Util.loadPassword(passwordCmd);
+      assertTrue("password3", Arrays.equals(password, "password3".toCharArray()));
+   }
+
+}


Property changes on: branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/SecurityUtilUnitTestCase.java
___________________________________________________________________
Name: svn:keywords
   + Id,Revision
Name: svn:eol-style
   + native

Modified: branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/XMLLoginModulesUnitTestCase.java
===================================================================
--- branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/XMLLoginModulesUnitTestCase.java	2007-01-22 08:06:26 UTC (rev 59905)
+++ branches/Branch_4_2/testsuite/src/main/org/jboss/test/security/test/XMLLoginModulesUnitTestCase.java	2007-01-22 08:09:17 UTC (rev 59906)
@@ -21,12 +21,20 @@
  */
 package org.jboss.test.security.test;
 
+import java.util.Arrays;
 import java.util.Map;
 import java.util.Iterator;
 import java.util.Set;
+import java.io.File;
+import java.io.FileWriter;
 import java.io.InputStream;
 import java.io.InputStreamReader;
 import java.security.acl.Group;
+
+import javax.management.MBeanServer;
+import javax.management.MBeanServerBuilder;
+import javax.management.MBeanServerFactory;
+import javax.resource.spi.security.PasswordCredential;
 import javax.security.auth.login.Configuration;
 import javax.security.auth.login.AppConfigurationEntry;
 import javax.security.auth.login.LoginContext;
@@ -44,6 +52,8 @@
 import org.jboss.security.auth.spi.UsersObjectModelFactory;
 import org.jboss.security.auth.callback.UsernamePasswordHandler;
 import org.jboss.security.SimplePrincipal;
+import org.jboss.security.Util;
+import org.jboss.util.StringPropertyReplacer;
 import org.jboss.xb.binding.Unmarshaller;
 import org.jboss.xb.binding.UnmarshallerFactory;
 import org.jboss.xb.binding.sunday.unmarshalling.DefaultSchemaResolver;
@@ -119,6 +129,52 @@
          roles.equals("/security/config/roles.properites"));
    }
 
+   public void testPBEIdentityLoginModule()
+      throws Exception
+   {
+      // Create our own MBeanServer
+      MBeanServer server = MBeanServerFactory.createMBeanServer("jboss");
+      getLog().info("testPBEIdentityLoginModule");
+      // Login using the testPBEIdentityLoginModuleTmpFilePassword config
+      UsernamePasswordHandler handler = new UsernamePasswordHandler("sa", "thesecret".toCharArray());
+      LoginContext lc = new LoginContext("testPBEIdentityLoginModule", handler);
+      lc.login();
+      Subject subject = lc.getSubject();
+      Set pcs = subject.getPrivateCredentials(PasswordCredential.class);
+      assertEquals("PasswordCredential", 1, pcs.size());
+      PasswordCredential pc = (PasswordCredential) pcs.iterator().next();
+      assertEquals("PasswordCredential.sa", "sa", pc.getUserName());
+      assertEquals("PasswordCredential.password", "thesecret", new String(pc.getPassword()));
+      lc.logout();
+      MBeanServerFactory.releaseMBeanServer(server);
+   }
+   public void testPBEIdentityLoginModuleTmpFilePassword()
+      throws Exception
+   {
+      // Create a tmp password file for TmpFilePassword
+      File tmpPassword = new File(System.getProperty("java.io.tmpdir"), "tmp.password");
+      FileWriter writer = new FileWriter(tmpPassword);
+      writer.write("testPBEIdentityLoginModuleTmpFilePassword");
+      writer.close();
+
+      // Create our own MBeanServer
+      MBeanServer server = MBeanServerFactory.createMBeanServer("jboss");
+      getLog().info("testPBEIdentityLoginModuleTmpFilePassword");
+      // Login using the testPBEIdentityLoginModuleTmpFilePassword config
+      UsernamePasswordHandler handler = new UsernamePasswordHandler("sa", "thesecret2".toCharArray());
+      LoginContext lc = new LoginContext("testPBEIdentityLoginModuleTmpFilePassword", handler);
+      lc.login();
+      Subject subject = lc.getSubject();
+      Set pcs = subject.getPrivateCredentials(PasswordCredential.class);
+      assertEquals("PasswordCredential", 1, pcs.size());
+      PasswordCredential pc = (PasswordCredential) pcs.iterator().next();
+      assertEquals("PasswordCredential.sa", "sa", pc.getUserName());
+      assertEquals("PasswordCredential.password", "thesecret2", new String(pc.getPassword()));
+      lc.logout();
+      MBeanServerFactory.releaseMBeanServer(server);
+      tmpPassword.delete();
+   }
+
    /**
     * @throws Exception
     */

Modified: branches/Branch_4_2/testsuite/src/resources/security/login-config.xml
===================================================================
--- branches/Branch_4_2/testsuite/src/resources/security/login-config.xml	2007-01-22 08:06:26 UTC (rev 59905)
+++ branches/Branch_4_2/testsuite/src/resources/security/login-config.xml	2007-01-22 08:09:17 UTC (rev 59906)
@@ -197,6 +197,50 @@
        </authentication>
     </application-policy>
 
+   <!-- Test PBEIdentityLoginModule key externalization -->
+   <application-policy name = "testPBEIdentityLoginModule">
+      <authentication>
+         <login-module code = "org.jboss.resource.security.PBEIdentityLoginModule"
+            flag = "required">
+            <module-option name = "principal">sa</module-option>
+            <module-option name = "userName">sa</module-option>
+            <!--
+            output from:
+               org.jboss.resource.security.PBEIdentityLoginModule
+               thesecret testPBEIdentityLoginModule abcdefgh 19 PBEWithMD5AndDES 
+            -->
+            <module-option name = "password">3fp7R/7TMjyTTxhmePdJVk</module-option>
+            <module-option name = "ignoreMissigingMCF">true</module-option>
+            <module-option name = "pbealgo">PBEWithMD5AndDES</module-option>
+            <module-option name = "pbepass">testPBEIdentityLoginModule</module-option>
+            <module-option name = "salt">abcdefgh</module-option>
+            <module-option name = "iterationCount">19</module-option>
+            <module-option name = "managedConnectionFactoryName">jboss.jca:service=LocalTxCM,name=DefaultDS</module-option>
+         </login-module>
+      </authentication>
+   </application-policy>
+   <application-policy name = "testPBEIdentityLoginModuleTmpFilePassword">
+      <authentication>
+         <login-module code = "org.jboss.resource.security.PBEIdentityLoginModule"
+            flag = "required">
+            <module-option name = "principal">sa</module-option>
+            <module-option name = "userName">sa</module-option>
+            <!--
+               output from:
+               org.jboss.resource.security.PBEIdentityLoginModule
+               thesecret2 testPBEIdentityLoginModuleTmpFilePassword abcdefgh 19 PBEWithMD5AndDES 
+            -->
+            <module-option name = "password">2zff525DS/OgTuWuJtHYHa</module-option>
+            <module-option name = "ignoreMissigingMCF">true</module-option>
+            <module-option name = "pbealgo">PBEWithMD5AndDES</module-option>
+            <module-option name = "pbepass">{CLASS}org.jboss.security.plugins.TmpFilePassword:${java.io.tmpdir}/tmp.password,5000</module-option>
+            <module-option name = "salt">abcdefgh</module-option>
+            <module-option name = "iterationCount">19</module-option>
+            <module-option name = "managedConnectionFactoryName">jboss.jca:service=LocalTxCM,name=DefaultDS</module-option>
+         </login-module>
+      </authentication>
+   </application-policy>
+   
    <application-policy name="other">
       <authentication>
          <login-module code="org.jboss.test.security.test.LoginModulesUnitTestCase$TestLoginModule"




More information about the jboss-cvs-commits mailing list