View results here -> http://tck2.jboss.com/cc/buildresults/jboss-3.2?log=log20040603230221Lbuild.74

BUILD COMPLETE -  build.74
Date of build: 06/03/2004 23:02:21
Time to build: 10 minutes 48 seconds
Last changed: 06/03/2004 22:40:05
Last log entry: Allows subclasses to access ivars

 Unit Tests: (0)
No Tests Run
This project doesn't have any tests
 

 Modifications since last build:  (19)
1.6.4.5modifiedstarksmsecurity/src/main/org/jboss/security/auth/spi/DatabaseServerLoginModule.javaAllows subclasses to access ivars
1.28.2.15modifiedstarksmsecurity/build.xmlUpdate the jbosssx-client.jar to include the PBEUtils and related classes
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/plugins/PBEUtils.javaEcrypt a password using the JaasSecurityDomain password Usage: PBEUtils salt count domain-password password salt : the Salt attribute from the JaasSecurityDomain count : the IterationCount attribute from the JaasSecurityDomain domain-password : the plaintext password that maps to the KeyStorePass attribute from the JaasSecurityDomain password : the plaintext password that should be encrypted with the JaasSecurityDomain password
1.1.2.2modifiedstarksmsecurity/src/main/org/jboss/security/plugins/FilePassword.javaOnly use the Logger inside of the toCharArray so the main methodcan be used with only the jbosssx.jar
1.3.2.7modifiedstarksmconnector/src/main/org/jboss/resource/security/AbstractPasswordCredentialLoginModule.javaExpose the MBeanServer ivar
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/Base64Utils.javaBase64 encoding/decoding utilities
1.1.2.1modifiedstarksmconnector/src/etc/example-config/hsqldb-encrypted-ds.xmlThe Hypersonic embedded database JCA connection factory configthat illustrates the use of the JaasSecurityDomainIdentityLoginModuleto use encrypted password in the data source configuration
1.1.2.1modifiedstarksmconnector/src/main/org/jboss/resource/security/JaasSecurityDomainIdentityLoginModule.javaA login module for statically defining a data source username and password that uses a password that has been ecrypted by a JaasSecurityDomain. The base64 format of the data source password may be generated using the PBEUtils command: java -cp jbosssx.jar org.jboss.security.plugins.PBEUtils salt count domain-password data-source-password salt : the Salt attribute from the JaasSecurityDomain count : the IterationCount attribute from the JaasSecurityDomain domain-password : the plaintext password that maps to the KeyStorePass attribute from the JaasSecurityDomain data-source-password : the plaintext password for the data source that should be encrypted with the JaasSecurityDomain password
1.12.4.14modifiedstarksmsecurity/src/main/org/jboss/security/plugins/JaasSecurityManagerService.javaFactor out the common privileged actions
1.27.2.12modifiedstarksmsecurity/src/main/org/jboss/security/plugins/JaasSecurityManager.javaFactor out the common privileged actions
1.1.2.1modifiedstarksmtestsuite/src/resources/security/jaassecdomain-tests-service.xmlConfig for JaasSecurityDomain tests
1.1.2.2modifiedstarksmtestsuite/src/main/org/jboss/test/security/test/JaasSecurityDomainUnitTestCase.javaUse the security/jaassecdomain-tests-service.xml deployment and add correctthe creation of the tst.password file
1.3.2.5modifiedstarksmtestsuite/src/resources/security-spec/service-inf/jboss-service.xmlAdd Salt and IterationCount attributes
1.1.2.1modifiedstarksmtestsuite/src/main/org/jboss/test/security/test/JaasSecurityDomainUnitTestCase.javaAdd tests of the JaasSecurityDomain encode/decode ops and new formats of theKeyStorePass attribute value.
1.6.2.9modifiedstarksmsecurity/src/main/org/jboss/security/plugins/JaasSecurityDomain.javaGeneralize the KeyStorePass attribute to support non-plaintext values. Thevalue is now one of:- The plaintext password for the KeyStore(or whatever format is usedby the KeyStore). The toCharArray() value of the string is used without anymanipulation.- A command to execute to obtain the plaintext password. The formatis '{EXT}...' where the '...' is the exact command line that will be passedto the Runtime.exec(String) method to execute a platform command. The firstline of the command output is used as the password.- A class to create to obtain the plaintext password. The formatis '{CLASS}classname[:ctorarg]' where the '[:ctorarg]' is an optionalstring delimited by the ':' from the classname that will be passed to theclassname ctor. The password is obtained from classname by invoking a 'char[]toCharArray()' method if found, otherwise, the 'String toString()' method isused.- The KeyStorePass is also used in combination with the Salt and IterationCountattributes to create a PBE secret key used with the encode/decode operations.
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/plugins/FilePassword.javaRead a password in opaque form to a file for use with the FilePassword accessor in conjunction with the JaasSecurityDomain {CLASS}org.jboss.security.plugins.FilePassword:password-file format of the KeyStorePass attribute. The original opaque password file can be created by running: java org.jboss.security.plugins.FilePassword salt count password password-file Running java org.jboss.security.plugins.FilePassword will generate a usage message.
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/plugins/TmpFilePassword.javaRead a password from a file specified via the ctor and then overwrite the file contents with garbage, and then remove it. This may be used as a password accessor in conjunction with the JaasSecurityDomain {CLASS}org.jboss.security.plugins.TmpFilePassword:password-file format of the KeyStorePass attribute.
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/plugins/ConsolePassword.javaRead a password from the System.in stream. This may be used as a password accessor in conjunction with the JaasSecurityDomain {CLASS}org.jboss.security.plugins.ConsolePassword format of the KeyStorePass attribute.
1.1.2.1modifiedstarksmsecurity/src/main/org/jboss/security/plugins/SubjectActions.javaCommon PrivilegedAction used by classes in the org.jboss.security.plugins package

Reply via email to