src/jdk.security.jgss/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Base.java
author rwestberg
Fri, 01 Jun 2018 10:15:48 +0200
changeset 50336 1b6ea6bcd21a
parent 47216 71c04702a3d5
permissions -rw-r--r--
8203237: JFR TestBiasedLockRevocationEvents should ignore events unrelated to the test Reviewed-by: egahlin, mgronlun
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
44534
a076dffbc2c1 8165641: Deprecate Object.finalize
rriggs
parents: 26630
diff changeset
     2
 * Copyright (c) 2003, 2017, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
package com.sun.security.sasl.gsskerb;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
25403
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    29
import java.util.Locale;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.util.Map;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.util.logging.Level;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import javax.security.sasl.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import com.sun.security.sasl.util.AbstractSaslImpl;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import org.ietf.jgss.*;
25403
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    35
import com.sun.security.jgss.ExtendedGSSContext;
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    36
import com.sun.security.jgss.InquireType;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
abstract class GssKrb5Base extends AbstractSaslImpl {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
    private static final String KRB5_OID_STR = "1.2.840.113554.1.2.2";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
    protected static Oid KRB5_OID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
    protected static final byte[] EMPTY = new byte[0];
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
    static {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
            KRB5_OID = new Oid(KRB5_OID_STR);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
        } catch (GSSException ignore) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
    protected GSSContext secCtx = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
    protected static final int JGSS_QOP = 0;    // unrelated to SASL QOP mask
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 5506
diff changeset
    53
    protected GssKrb5Base(Map<String, ?> props, String className)
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 5506
diff changeset
    54
        throws SaslException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
        super(props, className);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
     * Retrieves this mechanism's name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
     * @return  The string "GSSAPI".
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
    public String getMechanismName() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
        return "GSSAPI";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
25403
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    67
    @Override
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    68
    public Object getNegotiatedProperty(String propName) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    69
        if (!completed) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    70
            throw new IllegalStateException("Authentication incomplete");
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    71
        }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    72
        String xprefix = "com.sun.security.jgss.inquiretype.";
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    73
        if (propName.startsWith(xprefix)) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    74
            String type = propName.substring(xprefix.length());
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    75
            if (logger.isLoggable(Level.FINEST)) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    76
                logger.logp(Level.FINE, "GssKrb5Base",
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    77
                        "getNegotiatedProperty", propName);
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    78
            }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    79
            for (InquireType t: InquireType.values()) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    80
                if (t.name().toLowerCase(Locale.US).equals(type)) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    81
                    try {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    82
                        return ((ExtendedGSSContext)secCtx).inquireSecContext(t);
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    83
                    } catch (GSSException e) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    84
                        if (logger.isLoggable(Level.FINEST)) {
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    85
                            logger.log(Level.WARNING, "inquireSecContext error", e);
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    86
                        }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    87
                        return null;
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    88
                    }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    89
                }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    90
            }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    91
            // No such InquireType. Although not likely to be defined
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    92
            // as a property in a parent class, still try it.
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    93
        }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    94
        return super.getNegotiatedProperty(propName);
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    95
    }
e982fe3e83a4 8044085: Access ExtendedGSSContext.inquireSecContext() result through SASL
weijun
parents: 23010
diff changeset
    96
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
    public byte[] unwrap(byte[] incoming, int start, int len)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
        throws SaslException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
        if (!completed) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
            throw new IllegalStateException("GSSAPI authentication not completed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
        // integrity will be true if either privacy or integrity negotiated
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
        if (!integrity) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
            throw new IllegalStateException("No security layer negotiated");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
        try {
17209
6f556e154816 8012082: SASL: auth-conf negotiated, but unencrypted data is accepted, reset to unencrypt
weijun
parents: 10336
diff changeset
   109
            MessageProp msgProp = new MessageProp(JGSS_QOP, privacy);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
            byte[] answer = secCtx.unwrap(incoming, start, len, msgProp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
            if (logger.isLoggable(Level.FINEST)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
                traceOutput(myClassName, "KRB501:Unwrap", "incoming: ",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
                    incoming, start, len);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
                traceOutput(myClassName, "KRB502:Unwrap", "unwrapped: ",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
                    answer, 0, answer.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
            return answer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
        } catch (GSSException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
            throw new SaslException("Problems unwrapping SASL buffer", e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
    public byte[] wrap(byte[] outgoing, int start, int len) throws SaslException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
        if (!completed) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
            throw new IllegalStateException("GSSAPI authentication not completed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
        // integrity will be true if either privacy or integrity negotiated
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
        if (!integrity) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
            throw new IllegalStateException("No security layer negotiated");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
        // Generate GSS token
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
        try {
17209
6f556e154816 8012082: SASL: auth-conf negotiated, but unencrypted data is accepted, reset to unencrypt
weijun
parents: 10336
diff changeset
   135
            MessageProp msgProp = new MessageProp(JGSS_QOP, privacy);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
            byte[] answer = secCtx.wrap(outgoing, start, len, msgProp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
            if (logger.isLoggable(Level.FINEST)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
                traceOutput(myClassName, "KRB503:Wrap", "outgoing: ",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
                    outgoing, start, len);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
                traceOutput(myClassName, "KRB504:Wrap", "wrapped: ",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
                    answer, 0, answer.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
            return answer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
        } catch (GSSException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
            throw new SaslException("Problem performing GSS wrap", e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
    public void dispose() throws SaslException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
        if (secCtx != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
                secCtx.dispose();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
            } catch (GSSException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
                throw new SaslException("Problem disposing GSS context", e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
            secCtx = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
44534
a076dffbc2c1 8165641: Deprecate Object.finalize
rriggs
parents: 26630
diff changeset
   161
    @SuppressWarnings("deprecation")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
    protected void finalize() throws Throwable {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
        dispose();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
}