jdk/test/sun/security/krb5/auto/Context.java
author weijun
Wed, 07 Nov 2012 14:13:01 +0800
changeset 14413 e954df027393
parent 14342 8435a30053c1
child 15006 10d6aacdd67f
permissions -rw-r--r--
6355584: Introduce constrained Kerberos delegation Reviewed-by: valeriep
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     1
/*
14342
8435a30053c1 7197491: update copyright year to match last edit in jdk8 jdk repository
alanb
parents: 12199
diff changeset
     2
 * Copyright (c) 2008, 2012, Oracle and/or its affiliates. All rights reserved.
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     4
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     7
 * published by the Free Software Foundation.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     8
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     9
 * This code is distributed in the hope that it will be useful, but WITHOUT
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    10
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    11
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    12
 * version 2 for more details (a copy is included in the LICENSE file that
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    13
 * accompanied this code).
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    14
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    15
 * You should have received a copy of the GNU General Public License version
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    16
 * 2 along with this work; if not, write to the Free Software Foundation,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    17
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    18
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    19
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    20
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    21
 * questions.
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    22
 */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    23
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    24
import com.sun.security.auth.module.Krb5LoginModule;
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    25
import java.security.Key;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    26
import java.security.PrivilegedActionException;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    27
import java.security.PrivilegedExceptionAction;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    28
import java.util.Arrays;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    29
import java.util.HashMap;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    30
import java.util.Map;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    31
import javax.security.auth.Subject;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    32
import javax.security.auth.kerberos.KerberosKey;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    33
import javax.security.auth.kerberos.KerberosTicket;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    34
import javax.security.auth.login.LoginContext;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    35
import org.ietf.jgss.GSSContext;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    36
import org.ietf.jgss.GSSCredential;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    37
import org.ietf.jgss.GSSException;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    38
import org.ietf.jgss.GSSManager;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    39
import org.ietf.jgss.GSSName;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    40
import org.ietf.jgss.MessageProp;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    41
import org.ietf.jgss.Oid;
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    42
import com.sun.security.jgss.ExtendedGSSContext;
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    43
import com.sun.security.jgss.InquireType;
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
    44
import com.sun.security.jgss.AuthorizationDataEntry;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    45
import com.sun.security.jgss.ExtendedGSSCredential;
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    46
import java.io.ByteArrayInputStream;
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    47
import java.io.ByteArrayOutputStream;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    48
import java.security.Principal;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    49
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    50
/**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    51
 * Context of a JGSS subject, encapsulating Subject and GSSContext.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    52
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    53
 * Three "constructors", which acquire the (private) credentials and fill
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    54
 * it into the Subject:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    55
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    56
 * 1. static fromJAAS(): Creates a Context using a JAAS login config entry
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    57
 * 2. static fromUserPass(): Creates a Context using a username and a password
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    58
 * 3. delegated(): A new context which uses the delegated credentials from a
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    59
 *    previously established acceptor Context
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    60
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    61
 * Two context initiators, which create the GSSContext object inside:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    62
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    63
 * 1. startAsClient()
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    64
 * 2. startAsServer()
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    65
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    66
 * Privileged action:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    67
 *    doAs(): Performs an action in the name of the Subject
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    68
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    69
 * Handshake process:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    70
 *    static handShake(initiator, acceptor)
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    71
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    72
 * A four-phase typical data communication which includes all four GSS
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    73
 * actions (wrap, unwrap, getMic and veryfyMiC):
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    74
 *    static transmit(message, from, to)
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    75
 */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    76
public class Context {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    77
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    78
    private Subject s;
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
    79
    private ExtendedGSSContext x;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    80
    private String name;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    81
    private GSSCredential cred;     // see static method delegated().
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    82
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    83
    static boolean usingStream = false;
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    84
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    85
    private Context() {}
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    86
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    87
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    88
     * Using the delegated credentials from a previous acceptor
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    89
     * @param c
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    90
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    91
    public Context delegated() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    92
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    93
        out.s = s;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    94
        try {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    95
            out.cred = Subject.doAs(s, new PrivilegedExceptionAction<GSSCredential>() {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    96
                @Override
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    97
                public GSSCredential run() throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    98
                    GSSCredential cred = x.getDelegCred();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    99
                    if (cred == null && x.getCredDelegState() ||
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   100
                            cred != null && !x.getCredDelegState()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   101
                        throw new Exception("getCredDelegState not match");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   102
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   103
                    return cred;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   104
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   105
            });
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   106
        } catch (PrivilegedActionException pae) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   107
            throw pae.getException();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   108
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   109
        out.name = name + " as " + out.cred.getName().toString();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   110
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   111
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   112
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   113
    /**
12199
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   114
     * No JAAS login at all, can be used to test JGSS without JAAS
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   115
     */
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   116
    public static Context fromThinAir() throws Exception {
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   117
        Context out = new Context();
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   118
        out.s = new Subject();
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   119
        return out;
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   120
    }
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   121
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   122
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   123
     * Logins with a JAAS login config entry name
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   124
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   125
    public static Context fromJAAS(final String name) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   126
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   127
        out.name = name;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   128
        LoginContext lc = new LoginContext(name);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   129
        lc.login();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   130
        out.s = lc.getSubject();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   131
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   132
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   133
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   134
    public static Context fromUserPass(
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   135
            String user, char[] pass, boolean storeKey) throws Exception {
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   136
        return fromUserPass(null, user, pass, storeKey);
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   137
    }
12199
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   138
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   139
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   140
     * Logins with a username and a password, using Krb5LoginModule directly
12199
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   141
     * @param s existing subject, test multiple princ & creds for single subj
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   142
     * @param storeKey true if key should be saved, used on acceptor side
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   143
     */
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   144
    public static Context fromUserPass(Subject s,
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   145
            String user, char[] pass, boolean storeKey) throws Exception {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   146
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   147
        out.name = user;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   148
        out.s = s == null ? new Subject() : s;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   149
        Krb5LoginModule krb5 = new Krb5LoginModule();
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   150
        Map<String, String> map = new HashMap<>();
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   151
        Map<String, Object> shared = new HashMap<>();
1575
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   152
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   153
        if (pass != null) {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   154
            map.put("useFirstPass", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   155
            shared.put("javax.security.auth.login.name", user);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   156
            shared.put("javax.security.auth.login.password", pass);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   157
        } else {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   158
            map.put("doNotPrompt", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   159
            map.put("useTicketCache", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   160
            if (user != null) {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   161
                map.put("principal", user);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   162
            }
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   163
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   164
        if (storeKey) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   165
            map.put("storeKey", "true");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   166
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   167
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   168
        krb5.initialize(out.s, null, shared, map);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   169
        krb5.login();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   170
        krb5.commit();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   171
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   172
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   173
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   174
    /**
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   175
     * Logins with a username and a keytab, using Krb5LoginModule directly
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   176
     * @param storeKey true if key should be saved, used on acceptor side
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   177
     */
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   178
    public static Context fromUserKtab(String user, String ktab, boolean storeKey)
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   179
            throws Exception {
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   180
        Context out = new Context();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   181
        out.name = user;
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   182
        out.s = new Subject();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   183
        Krb5LoginModule krb5 = new Krb5LoginModule();
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   184
        Map<String, String> map = new HashMap<>();
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   185
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   186
        map.put("doNotPrompt", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   187
        map.put("useTicketCache", "false");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   188
        map.put("useKeyTab", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   189
        map.put("keyTab", ktab);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   190
        map.put("principal", user);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   191
        if (storeKey) {
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   192
            map.put("storeKey", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   193
        }
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   194
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   195
        krb5.initialize(out.s, null, null, map);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   196
        krb5.login();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   197
        krb5.commit();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   198
        return out;
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   199
    }
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   200
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   201
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   202
     * Starts as a client
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   203
     * @param target communication peer
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   204
     * @param mech GSS mech
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   205
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   206
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   207
    public void startAsClient(final String target, final Oid mech) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   208
        doAs(new Action() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   209
            @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   210
            public byte[] run(Context me, byte[] dummy) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   211
                GSSManager m = GSSManager.getInstance();
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   212
                me.x = (ExtendedGSSContext)m.createContext(
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   213
                          target.indexOf('@') < 0 ?
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   214
                            m.createName(target, null) :
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   215
                            m.createName(target, GSSName.NT_HOSTBASED_SERVICE),
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   216
                        mech,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   217
                        cred,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   218
                        GSSContext.DEFAULT_LIFETIME);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   219
                return null;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   220
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   221
        }, null);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   222
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   223
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   224
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   225
     * Starts as a server
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   226
     * @param mech GSS mech
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   227
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   228
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   229
    public void startAsServer(final Oid mech) throws Exception {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   230
        startAsServer(null, mech, false);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   231
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   232
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   233
    public void startAsServer(final String name, final Oid mech) throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   234
        startAsServer(name, mech, false);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   235
    }
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   236
    /**
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   237
     * Starts as a server with the specified service name
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   238
     * @param name the service name
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   239
     * @param mech GSS mech
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   240
     * @throws java.lang.Exception
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   241
     */
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   242
    public void startAsServer(final String name, final Oid mech, final boolean asInitiator) throws Exception {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   243
        doAs(new Action() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   244
            @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   245
            public byte[] run(Context me, byte[] dummy) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   246
                GSSManager m = GSSManager.getInstance();
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   247
                me.cred = m.createCredential(
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   248
                        name == null ? null :
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   249
                          (name.indexOf('@') < 0 ?
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   250
                            m.createName(name, null) :
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   251
                            m.createName(name, GSSName.NT_HOSTBASED_SERVICE)),
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   252
                        GSSCredential.INDEFINITE_LIFETIME,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   253
                        mech,
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   254
                        asInitiator?
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   255
                                GSSCredential.INITIATE_AND_ACCEPT:
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   256
                                GSSCredential.ACCEPT_ONLY);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   257
                me.x = (ExtendedGSSContext)m.createContext(me.cred);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   258
                return null;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   259
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   260
        }, null);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   261
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   262
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   263
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   264
     * Accesses the internal GSSContext object. Currently it's used for --
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   265
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   266
     * 1. calling requestXXX() before handshake
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   267
     * 2. accessing source name
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   268
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   269
     * Note: If the application needs to do any privileged call on this
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   270
     * object, please use doAs(). Otherwise, it can be done directly. The
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   271
     * methods listed above are all non-privileged calls.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   272
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   273
     * @return the GSSContext object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   274
     */
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   275
    public ExtendedGSSContext x() {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   276
        return x;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   277
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   278
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   279
    /**
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   280
     * Accesses the internal subject.
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   281
     * @return the subject
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   282
     */
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   283
    public Subject s() {
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   284
        return s;
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   285
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   286
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   287
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   288
     * Disposes the GSSContext within
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   289
     * @throws org.ietf.jgss.GSSException
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   290
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   291
    public void dispose() throws GSSException {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   292
        x.dispose();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   293
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   294
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   295
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   296
     * Does something using the Subject inside
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   297
     * @param action the action
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   298
     * @param in the input byte
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   299
     * @return the output byte
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   300
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   301
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   302
    public byte[] doAs(final Action action, final byte[] in) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   303
        try {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   304
            return Subject.doAs(s, new PrivilegedExceptionAction<byte[]>() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   305
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   306
                @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   307
                public byte[] run() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   308
                    return action.run(Context.this, in);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   309
                }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   310
            });
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   311
        } catch (PrivilegedActionException pae) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   312
            throw pae.getException();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   313
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   314
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   315
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   316
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   317
     * Prints status of GSSContext and Subject
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   318
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   319
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   320
    public void status() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   321
        System.out.println("STATUS OF " + name.toUpperCase());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   322
        try {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   323
            StringBuffer sb = new StringBuffer();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   324
            if (x.getAnonymityState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   325
                sb.append("anon, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   326
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   327
            if (x.getConfState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   328
                sb.append("conf, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   329
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   330
            if (x.getCredDelegState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   331
                sb.append("deleg, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   332
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   333
            if (x.getIntegState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   334
                sb.append("integ, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   335
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   336
            if (x.getMutualAuthState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   337
                sb.append("mutual, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   338
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   339
            if (x.getReplayDetState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   340
                sb.append("rep det, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   341
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   342
            if (x.getSequenceDetState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   343
                sb.append("seq det, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   344
            }
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   345
            if (x instanceof ExtendedGSSContext) {
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   346
                if (((ExtendedGSSContext)x).getDelegPolicyState()) {
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   347
                    sb.append("deleg policy, ");
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   348
                }
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   349
            }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   350
            System.out.println("Context status of " + name + ": " + sb.toString());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   351
            System.out.println(x.getSrcName() + " -> " + x.getTargName());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   352
        } catch (Exception e) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   353
            ;// Don't care
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   354
        }
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   355
        if (s != null) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   356
            System.out.println("====== START SUBJECT CONTENT =====");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   357
            for (Principal p: s.getPrincipals()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   358
                System.out.println("    Principal: " + p);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   359
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   360
            for (Object o : s.getPublicCredentials()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   361
                System.out.println("    " + o.getClass());
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   362
                System.out.println("        " + o);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   363
            }
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   364
            System.out.println("====== Private Credentials Set ======");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   365
            for (Object o : s.getPrivateCredentials()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   366
                System.out.println("    " + o.getClass());
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   367
                if (o instanceof KerberosTicket) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   368
                    KerberosTicket kt = (KerberosTicket) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   369
                    System.out.println("        " + kt.getServer() + " for " + kt.getClient());
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   370
                } else if (o instanceof KerberosKey) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   371
                    KerberosKey kk = (KerberosKey) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   372
                    System.out.print("        " + kk.getKeyType() + " " + kk.getVersionNumber() + " " + kk.getAlgorithm() + " ");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   373
                    for (byte b : kk.getEncoded()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   374
                        System.out.printf("%02X", b & 0xff);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   375
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   376
                    System.out.println();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   377
                } else if (o instanceof Map) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   378
                    Map map = (Map) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   379
                    for (Object k : map.keySet()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   380
                        System.out.println("        " + k + ": " + map.get(k));
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   381
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   382
                } else {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   383
                    System.out.println("        " + o);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   384
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   385
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   386
            System.out.println("====== END SUBJECT CONTENT =====");
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   387
        }
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   388
        if (x != null && x instanceof ExtendedGSSContext) {
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   389
            if (x.isEstablished()) {
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   390
                ExtendedGSSContext ex = (ExtendedGSSContext)x;
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   391
                Key k = (Key)ex.inquireSecContext(
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   392
                        InquireType.KRB5_GET_SESSION_KEY);
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   393
                if (k == null) {
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   394
                    throw new Exception("Session key cannot be null");
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   395
                }
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   396
                System.out.println("Session key is: " + k);
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   397
                boolean[] flags = (boolean[])ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   398
                        InquireType.KRB5_GET_TKT_FLAGS);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   399
                if (flags == null) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   400
                    throw new Exception("Ticket flags cannot be null");
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   401
                }
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   402
                System.out.println("Ticket flags is: " + Arrays.toString(flags));
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   403
                String authTime = (String)ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   404
                        InquireType.KRB5_GET_AUTHTIME);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   405
                if (authTime == null) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   406
                    throw new Exception("Auth time cannot be null");
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   407
                }
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   408
                System.out.println("AuthTime is: " + authTime);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   409
                if (!x.isInitiator()) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   410
                    AuthorizationDataEntry[] ad = (AuthorizationDataEntry[])ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   411
                            InquireType.KRB5_GET_AUTHZ_DATA);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   412
                    System.out.println("AuthzData is: " + Arrays.toString(ad));
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   413
                }
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   414
            }
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   415
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   416
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   417
10696
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   418
    public byte[] wrap(byte[] t, final boolean privacy)
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   419
            throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   420
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   421
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   422
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   423
                System.out.printf("wrap %s privacy from %s: ", privacy?"with":"without", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   424
                MessageProp p1 = new MessageProp(0, privacy);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   425
                byte[] out;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   426
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   427
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   428
                    me.x.wrap(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   429
                    out = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   430
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   431
                    out = me.x.wrap(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   432
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   433
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   434
                return out;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   435
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   436
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   437
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   438
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   439
    public byte[] unwrap(byte[] t, final boolean privacy)
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   440
            throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   441
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   442
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   443
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   444
                System.out.printf("unwrap %s privacy from %s: ", privacy?"with":"without", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   445
                MessageProp p1 = new MessageProp(0, privacy);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   446
                byte[] bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   447
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   448
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   449
                    me.x.unwrap(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   450
                    bytes = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   451
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   452
                    bytes = me.x.unwrap(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   453
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   454
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   455
                return bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   456
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   457
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   458
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   459
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   460
    public byte[] getMic(byte[] t) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   461
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   462
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   463
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   464
                MessageProp p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   465
                byte[] bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   466
                p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   467
                System.out.printf("getMic from %s: ", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   468
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   469
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   470
                    me.x.getMIC(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   471
                    bytes = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   472
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   473
                    bytes = me.x.getMIC(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   474
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   475
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   476
                return bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   477
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   478
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   479
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   480
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   481
    public void verifyMic(byte[] t, final byte[] msg) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   482
        doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   483
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   484
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   485
                MessageProp p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   486
                System.out.printf("verifyMic from %s: ", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   487
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   488
                    me.x.verifyMIC(new ByteArrayInputStream(input),
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   489
                            new ByteArrayInputStream(msg), p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   490
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   491
                    me.x.verifyMIC(input, 0, input.length,
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   492
                            msg, 0, msg.length,
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   493
                            p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   494
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   495
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   496
                return null;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   497
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   498
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   499
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   500
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   501
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   502
     * Transmits a message from one Context to another. The sender wraps the
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   503
     * message and sends it to the receiver. The receiver unwraps it, creates
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   504
     * a MIC of the clear text and sends it back to the sender. The sender
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   505
     * verifies the MIC against the message sent earlier.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   506
     * @param message the message
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   507
     * @param s1 the sender
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   508
     * @param s2 the receiver
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   509
     * @throws java.lang.Exception If anything goes wrong
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   510
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   511
    static public void transmit(final String message, final Context s1,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   512
            final Context s2) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   513
        final byte[] messageBytes = message.getBytes();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   514
        System.out.printf("-------------------- TRANSMIT from %s to %s------------------------\n",
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   515
                s1.name, s2.name);
10696
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   516
        byte[] wrapped = s1.wrap(messageBytes, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   517
        byte[] unwrapped = s2.unwrap(wrapped, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   518
        if (!Arrays.equals(messageBytes, unwrapped)) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   519
            throw new Exception("wrap/unwrap mismatch");
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   520
        }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   521
        byte[] mic = s2.getMic(unwrapped);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   522
        s1.verifyMic(mic, messageBytes);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   523
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   524
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   525
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   526
     * Returns a string description of a MessageProp object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   527
     * @param prop the object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   528
     * @return the description
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   529
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   530
    static public String printProp(MessageProp prop) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   531
        StringBuffer sb = new StringBuffer();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   532
        sb.append("MessagePop: ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   533
        sb.append("QOP="+ prop.getQOP() + ", ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   534
        sb.append(prop.getPrivacy()?"privacy, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   535
        sb.append(prop.isDuplicateToken()?"dup, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   536
        sb.append(prop.isGapToken()?"gap, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   537
        sb.append(prop.isOldToken()?"old, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   538
        sb.append(prop.isUnseqToken()?"unseq, ":"");
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   539
        if (prop.getMinorStatus() != 0) {
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   540
            sb.append(prop.getMinorString()+ "(" + prop.getMinorStatus()+")");
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   541
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   542
        return sb.toString();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   543
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   544
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   545
    public Context impersonate(final String someone) throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   546
        try {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   547
            GSSCredential creds = Subject.doAs(s, new PrivilegedExceptionAction<GSSCredential>() {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   548
                @Override
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   549
                public GSSCredential run() throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   550
                    GSSManager m = GSSManager.getInstance();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   551
                    GSSName other = m.createName(someone, GSSName.NT_USER_NAME);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   552
                    if (Context.this.cred == null) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   553
                        Context.this.cred = m.createCredential(GSSCredential.INITIATE_ONLY);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   554
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   555
                    return ((ExtendedGSSCredential)Context.this.cred).impersonate(other);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   556
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   557
            });
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   558
            Context out = new Context();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   559
            out.s = s;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   560
            out.cred = creds;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   561
            out.name = name + " as " + out.cred.getName().toString();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   562
            return out;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   563
        } catch (PrivilegedActionException pae) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   564
            throw pae.getException();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   565
        }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   566
    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   567
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   568
    public byte[] take(final byte[] in) throws Exception {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   569
        return doAs(new Action() {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   570
            @Override
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   571
            public byte[] run(Context me, byte[] input) throws Exception {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   572
                if (me.x.isEstablished()) {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   573
                    System.out.println(name + " side established");
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   574
                    if (input != null) {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   575
                        throw new Exception("Context established but " +
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   576
                                "still receive token at " + name);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   577
                    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   578
                    return null;
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   579
                } else {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   580
                    if (me.x.isInitiator()) {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   581
                        System.out.println(name + " call initSecContext");
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   582
                        return me.x.initSecContext(input, 0, input.length);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   583
                    } else {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   584
                        System.out.println(name + " call acceptSecContext");
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   585
                        return me.x.acceptSecContext(input, 0, input.length);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   586
                    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   587
                }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   588
            }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   589
        }, in);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   590
    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   591
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   592
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   593
     * Handshake (security context establishment process) between two Contexts
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   594
     * @param c the initiator
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   595
     * @param s the acceptor
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   596
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   597
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   598
    static public void handshake(final Context c, final Context s) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   599
        byte[] t = new byte[0];
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   600
        while (!c.x.isEstablished() || !s.x.isEstablished()) {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   601
            t = c.take(t);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   602
            t = s.take(t);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   603
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   604
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   605
}