jdk/test/sun/security/krb5/auto/Context.java
author stefank
Mon, 25 Aug 2014 09:10:13 +0200
changeset 26314 f8bc1966fb30
parent 25661 929c829a8400
child 26629 3b9ed8175488
permissions -rw-r--r--
8055416: Several vm/gc/heap/summary "After GC" events emitted for the same GC ID Reviewed-by: brutisso, ehelin
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     1
/*
23010
6dadb192ad81 8029235: Update copyright year to match last edit in jdk8 jdk repository for 2013
lana
parents: 18536
diff changeset
     2
 * Copyright (c) 2008, 2013, Oracle and/or its affiliates. All rights reserved.
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     4
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     7
 * published by the Free Software Foundation.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     8
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
     9
 * This code is distributed in the hope that it will be useful, but WITHOUT
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    10
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    11
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    12
 * version 2 for more details (a copy is included in the LICENSE file that
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    13
 * accompanied this code).
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    14
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    15
 * You should have received a copy of the GNU General Public License version
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    16
 * 2 along with this work; if not, write to the Free Software Foundation,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    17
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    18
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    19
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    20
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4336
diff changeset
    21
 * questions.
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    22
 */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    23
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    24
import com.sun.security.auth.module.Krb5LoginModule;
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    25
import java.security.Key;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    26
import java.security.PrivilegedActionException;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    27
import java.security.PrivilegedExceptionAction;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    28
import java.util.Arrays;
25661
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
    29
import java.util.Base64;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    30
import java.util.HashMap;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    31
import java.util.Map;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    32
import javax.security.auth.Subject;
25661
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
    33
import javax.security.auth.kerberos.KerberosCredMessage;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    34
import javax.security.auth.kerberos.KerberosKey;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    35
import javax.security.auth.kerberos.KerberosTicket;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    36
import javax.security.auth.login.LoginContext;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    37
import org.ietf.jgss.GSSContext;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    38
import org.ietf.jgss.GSSCredential;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    39
import org.ietf.jgss.GSSException;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    40
import org.ietf.jgss.GSSManager;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    41
import org.ietf.jgss.GSSName;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    42
import org.ietf.jgss.MessageProp;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    43
import org.ietf.jgss.Oid;
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    44
import com.sun.security.jgss.ExtendedGSSContext;
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
    45
import com.sun.security.jgss.InquireType;
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
    46
import com.sun.security.jgss.AuthorizationDataEntry;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    47
import com.sun.security.jgss.ExtendedGSSCredential;
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    48
import java.io.ByteArrayInputStream;
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    49
import java.io.ByteArrayOutputStream;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    50
import java.security.Principal;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    51
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    52
/**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    53
 * Context of a JGSS subject, encapsulating Subject and GSSContext.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    54
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    55
 * Three "constructors", which acquire the (private) credentials and fill
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    56
 * it into the Subject:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    57
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    58
 * 1. static fromJAAS(): Creates a Context using a JAAS login config entry
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    59
 * 2. static fromUserPass(): Creates a Context using a username and a password
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    60
 * 3. delegated(): A new context which uses the delegated credentials from a
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    61
 *    previously established acceptor Context
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    62
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    63
 * Two context initiators, which create the GSSContext object inside:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    64
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    65
 * 1. startAsClient()
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    66
 * 2. startAsServer()
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    67
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    68
 * Privileged action:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    69
 *    doAs(): Performs an action in the name of the Subject
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    70
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    71
 * Handshake process:
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    72
 *    static handShake(initiator, acceptor)
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    73
 *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    74
 * A four-phase typical data communication which includes all four GSS
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    75
 * actions (wrap, unwrap, getMic and veryfyMiC):
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    76
 *    static transmit(message, from, to)
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    77
 */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    78
public class Context {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    79
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    80
    private Subject s;
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
    81
    private ExtendedGSSContext x;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    82
    private String name;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    83
    private GSSCredential cred;     // see static method delegated().
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    84
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    85
    static boolean usingStream = false;
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
    86
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    87
    private Context() {}
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    88
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    89
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    90
     * Using the delegated credentials from a previous acceptor
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    91
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    92
    public Context delegated() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    93
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
    94
        out.s = s;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    95
        try {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    96
            out.cred = Subject.doAs(s, new PrivilegedExceptionAction<GSSCredential>() {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    97
                @Override
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    98
                public GSSCredential run() throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
    99
                    GSSCredential cred = x.getDelegCred();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   100
                    if (cred == null && x.getCredDelegState() ||
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   101
                            cred != null && !x.getCredDelegState()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   102
                        throw new Exception("getCredDelegState not match");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   103
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   104
                    return cred;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   105
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   106
            });
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   107
        } catch (PrivilegedActionException pae) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   108
            throw pae.getException();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   109
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   110
        out.name = name + " as " + out.cred.getName().toString();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   111
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   112
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   113
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   114
    /**
12199
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   115
     * No JAAS login at all, can be used to test JGSS without JAAS
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   116
     */
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   117
    public static Context fromThinAir() throws Exception {
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   118
        Context out = new Context();
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   119
        out.s = new Subject();
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   120
        return out;
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   121
    }
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   122
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   123
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   124
     * Logins with a JAAS login config entry name
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   125
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   126
    public static Context fromJAAS(final String name) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   127
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   128
        out.name = name;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   129
        LoginContext lc = new LoginContext(name);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   130
        lc.login();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   131
        out.s = lc.getSubject();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   132
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   133
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   134
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   135
    /**
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   136
     * Logins with username/password as a new Subject
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   137
     */
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   138
    public static Context fromUserPass(
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   139
            String user, char[] pass, boolean storeKey) throws Exception {
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   140
        return fromUserPass(new Subject(), user, pass, storeKey);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   141
    }
12199
3de38eedde69 7152176: More krb5 tests
weijun
parents: 11526
diff changeset
   142
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   143
    /**
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   144
     * Logins with username/password as an existing Subject. The
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   145
     * same subject can be used multiple times to simulate multiple logins.
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   146
     * @param s existing subject
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   147
     */
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   148
    public static Context fromUserPass(Subject s,
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   149
            String user, char[] pass, boolean storeKey) throws Exception {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   150
        Context out = new Context();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   151
        out.name = user;
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   152
        out.s = s;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   153
        Krb5LoginModule krb5 = new Krb5LoginModule();
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   154
        Map<String, String> map = new HashMap<>();
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   155
        Map<String, Object> shared = new HashMap<>();
1575
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   156
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   157
        if (pass != null) {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   158
            map.put("useFirstPass", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   159
            shared.put("javax.security.auth.login.name", user);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   160
            shared.put("javax.security.auth.login.password", pass);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   161
        } else {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   162
            map.put("doNotPrompt", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   163
            map.put("useTicketCache", "true");
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   164
            if (user != null) {
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   165
                map.put("principal", user);
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   166
            }
e0f1979051b5 6765491: Krb5LoginModule a little too restrictive, and the doc is not clear.
weijun
parents: 1574
diff changeset
   167
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   168
        if (storeKey) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   169
            map.put("storeKey", "true");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   170
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   171
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   172
        krb5.initialize(out.s, null, shared, map);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   173
        krb5.login();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   174
        krb5.commit();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   175
        return out;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   176
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   177
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   178
    /**
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   179
     * Logins with username/keytab as an existing Subject. The
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   180
     * same subject can be used multiple times to simulate multiple logins.
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   181
     */
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   182
    public static Context fromUserKtab(
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   183
            String user, String ktab, boolean storeKey) throws Exception {
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   184
        return fromUserKtab(new Subject(), user, ktab, storeKey);
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   185
    }
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   186
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   187
    /**
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   188
     * Logins with username/keytab as a new subject,
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   189
     */
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   190
    public static Context fromUserKtab(Subject s,
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   191
            String user, String ktab, boolean storeKey) throws Exception {
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   192
        Context out = new Context();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   193
        out.name = user;
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 14413
diff changeset
   194
        out.s = s;
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   195
        Krb5LoginModule krb5 = new Krb5LoginModule();
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7816
diff changeset
   196
        Map<String, String> map = new HashMap<>();
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   197
18536
092411ced388 8001326: Improve Kerberos caching
weijun
parents: 16065
diff changeset
   198
        map.put("isInitiator", "false");
5774
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   199
        map.put("doNotPrompt", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   200
        map.put("useTicketCache", "false");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   201
        map.put("useKeyTab", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   202
        map.put("keyTab", ktab);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   203
        map.put("principal", user);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   204
        if (storeKey) {
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   205
            map.put("storeKey", "true");
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   206
        }
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   207
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   208
        krb5.initialize(out.s, null, null, map);
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   209
        krb5.login();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   210
        krb5.commit();
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   211
        return out;
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   212
    }
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   213
4b9857e483c1 6951366: kerberos login failure on win2008 with AD set to win2000 compat mode
weijun
parents: 5506
diff changeset
   214
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   215
     * Starts as a client
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   216
     * @param target communication peer
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   217
     * @param mech GSS mech
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   218
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   219
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   220
    public void startAsClient(final String target, final Oid mech) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   221
        doAs(new Action() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   222
            @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   223
            public byte[] run(Context me, byte[] dummy) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   224
                GSSManager m = GSSManager.getInstance();
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   225
                me.x = (ExtendedGSSContext)m.createContext(
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   226
                          target.indexOf('@') < 0 ?
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   227
                            m.createName(target, null) :
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   228
                            m.createName(target, GSSName.NT_HOSTBASED_SERVICE),
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   229
                        mech,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   230
                        cred,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   231
                        GSSContext.DEFAULT_LIFETIME);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   232
                return null;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   233
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   234
        }, null);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   235
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   236
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   237
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   238
     * Starts as a server
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   239
     * @param mech GSS mech
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   240
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   241
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   242
    public void startAsServer(final Oid mech) throws Exception {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   243
        startAsServer(null, mech, false);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   244
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   245
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   246
    public void startAsServer(final String name, final Oid mech) throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   247
        startAsServer(name, mech, false);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   248
    }
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   249
    /**
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   250
     * Starts as a server with the specified service name
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   251
     * @param name the service name
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   252
     * @param mech GSS mech
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   253
     * @throws java.lang.Exception
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   254
     */
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   255
    public void startAsServer(final String name, final Oid mech, final boolean asInitiator) throws Exception {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   256
        doAs(new Action() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   257
            @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   258
            public byte[] run(Context me, byte[] dummy) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   259
                GSSManager m = GSSManager.getInstance();
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   260
                me.cred = m.createCredential(
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   261
                        name == null ? null :
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   262
                          (name.indexOf('@') < 0 ?
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   263
                            m.createName(name, null) :
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   264
                            m.createName(name, GSSName.NT_HOSTBASED_SERVICE)),
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   265
                        GSSCredential.INDEFINITE_LIFETIME,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   266
                        mech,
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   267
                        asInitiator?
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   268
                                GSSCredential.INITIATE_AND_ACCEPT:
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   269
                                GSSCredential.ACCEPT_ONLY);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   270
                me.x = (ExtendedGSSContext)m.createContext(me.cred);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   271
                return null;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   272
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   273
        }, null);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   274
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   275
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   276
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   277
     * Accesses the internal GSSContext object. Currently it's used for --
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   278
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   279
     * 1. calling requestXXX() before handshake
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   280
     * 2. accessing source name
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   281
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   282
     * Note: If the application needs to do any privileged call on this
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   283
     * object, please use doAs(). Otherwise, it can be done directly. The
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   284
     * methods listed above are all non-privileged calls.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   285
     *
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   286
     * @return the GSSContext object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   287
     */
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   288
    public ExtendedGSSContext x() {
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   289
        return x;
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   290
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   291
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   292
    /**
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   293
     * Accesses the internal subject.
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   294
     * @return the subject
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   295
     */
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   296
    public Subject s() {
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   297
        return s;
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   298
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   299
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   300
    /**
16065
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   301
     * Returns the cred inside, if there is one
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   302
     */
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   303
    public GSSCredential cred() {
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   304
        return cred;
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   305
    }
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   306
2d0b844bfbb6 8000653: SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
weijun
parents: 15006
diff changeset
   307
    /**
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   308
     * Disposes the GSSContext within
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   309
     * @throws org.ietf.jgss.GSSException
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   310
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   311
    public void dispose() throws GSSException {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   312
        x.dispose();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   313
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   314
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   315
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   316
     * Does something using the Subject inside
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   317
     * @param action the action
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   318
     * @param in the input byte
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   319
     * @return the output byte
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   320
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   321
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   322
    public byte[] doAs(final Action action, final byte[] in) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   323
        try {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   324
            return Subject.doAs(s, new PrivilegedExceptionAction<byte[]>() {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   325
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   326
                @Override
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   327
                public byte[] run() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   328
                    return action.run(Context.this, in);
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   329
                }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   330
            });
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   331
        } catch (PrivilegedActionException pae) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   332
            throw pae.getException();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   333
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   334
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   335
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   336
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   337
     * Prints status of GSSContext and Subject
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   338
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   339
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   340
    public void status() throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   341
        System.out.println("STATUS OF " + name.toUpperCase());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   342
        try {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   343
            StringBuffer sb = new StringBuffer();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   344
            if (x.getAnonymityState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   345
                sb.append("anon, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   346
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   347
            if (x.getConfState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   348
                sb.append("conf, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   349
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   350
            if (x.getCredDelegState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   351
                sb.append("deleg, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   352
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   353
            if (x.getIntegState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   354
                sb.append("integ, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   355
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   356
            if (x.getMutualAuthState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   357
                sb.append("mutual, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   358
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   359
            if (x.getReplayDetState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   360
                sb.append("rep det, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   361
            }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   362
            if (x.getSequenceDetState()) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   363
                sb.append("seq det, ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   364
            }
4336
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   365
            if (x instanceof ExtendedGSSContext) {
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   366
                if (((ExtendedGSSContext)x).getDelegPolicyState()) {
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   367
                    sb.append("deleg policy, ");
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   368
                }
4c792c19266e 6853328: Support OK-AS-DELEGATE flag
weijun
parents: 3483
diff changeset
   369
            }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   370
            System.out.println("Context status of " + name + ": " + sb.toString());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   371
            System.out.println(x.getSrcName() + " -> " + x.getTargName());
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   372
        } catch (Exception e) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   373
            ;// Don't care
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   374
        }
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   375
        if (s != null) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   376
            System.out.println("====== START SUBJECT CONTENT =====");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   377
            for (Principal p: s.getPrincipals()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   378
                System.out.println("    Principal: " + p);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   379
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   380
            for (Object o : s.getPublicCredentials()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   381
                System.out.println("    " + o.getClass());
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 9035
diff changeset
   382
                System.out.println("        " + o);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   383
            }
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   384
            System.out.println("====== Private Credentials Set ======");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   385
            for (Object o : s.getPrivateCredentials()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   386
                System.out.println("    " + o.getClass());
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   387
                if (o instanceof KerberosTicket) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   388
                    KerberosTicket kt = (KerberosTicket) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   389
                    System.out.println("        " + kt.getServer() + " for " + kt.getClient());
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   390
                } else if (o instanceof KerberosKey) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   391
                    KerberosKey kk = (KerberosKey) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   392
                    System.out.print("        " + kk.getKeyType() + " " + kk.getVersionNumber() + " " + kk.getAlgorithm() + " ");
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   393
                    for (byte b : kk.getEncoded()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   394
                        System.out.printf("%02X", b & 0xff);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   395
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   396
                    System.out.println();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   397
                } else if (o instanceof Map) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   398
                    Map map = (Map) o;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   399
                    for (Object k : map.keySet()) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   400
                        System.out.println("        " + k + ": " + map.get(k));
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   401
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   402
                } else {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   403
                    System.out.println("        " + o);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   404
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   405
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   406
            System.out.println("====== END SUBJECT CONTENT =====");
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   407
        }
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   408
        if (x != null && x instanceof ExtendedGSSContext) {
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   409
            if (x.isEstablished()) {
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   410
                ExtendedGSSContext ex = (ExtendedGSSContext)x;
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   411
                Key k = (Key)ex.inquireSecContext(
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   412
                        InquireType.KRB5_GET_SESSION_KEY);
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   413
                if (k == null) {
25661
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   414
                    throw new Exception("(Old) Session key cannot be null");
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   415
                }
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   416
                System.out.println("(Old) Session key is: " + k);
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   417
                Key k2 = (Key)ex.inquireSecContext(
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   418
                        InquireType.KRB5_GET_SESSION_KEY_EX);
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   419
                if (k2 == null) {
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   420
                    throw new Exception("Session key cannot be null");
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   421
                }
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   422
                System.out.println("Session key is: " + k);
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   423
                boolean[] flags = (boolean[])ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   424
                        InquireType.KRB5_GET_TKT_FLAGS);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   425
                if (flags == null) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   426
                    throw new Exception("Ticket flags cannot be null");
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   427
                }
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   428
                System.out.println("Ticket flags is: " + Arrays.toString(flags));
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   429
                String authTime = (String)ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   430
                        InquireType.KRB5_GET_AUTHTIME);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   431
                if (authTime == null) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   432
                    throw new Exception("Auth time cannot be null");
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   433
                }
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   434
                System.out.println("AuthTime is: " + authTime);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   435
                if (!x.isInitiator()) {
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   436
                    AuthorizationDataEntry[] ad = (AuthorizationDataEntry[])ex.inquireSecContext(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   437
                            InquireType.KRB5_GET_AUTHZ_DATA);
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   438
                    System.out.println("AuthzData is: " + Arrays.toString(ad));
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 3482
diff changeset
   439
                }
25661
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   440
                try {
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   441
                    KerberosCredMessage tok = (KerberosCredMessage)ex.inquireSecContext(
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   442
                            InquireType.KRB5_GET_KRB_CRED);
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   443
                    System.out.println("KRB_CRED is " +
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   444
                            (tok == null?"not ":"") + "available");
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   445
                    if (tok != null) {
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   446
                        System.out.println("From " + tok.getSender() + " to "
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   447
                                + tok.getRecipient());
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   448
                        System.out.println(Base64.getEncoder().encodeToString(tok.getEncoded()));
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   449
                    }
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   450
                } catch (Exception e) {
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   451
                    System.out.println("KRB_CRED is not available: " + e);
929c829a8400 8043071: Expose session key and KRB_CRED through extended GSS-API
weijun
parents: 23010
diff changeset
   452
                }
3482
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   453
            }
4aaa66ce712d 6710360: export Kerberos session key to applications
weijun
parents: 1575
diff changeset
   454
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   455
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   456
10696
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   457
    public byte[] wrap(byte[] t, final boolean privacy)
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   458
            throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   459
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   460
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   461
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   462
                System.out.printf("wrap %s privacy from %s: ", privacy?"with":"without", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   463
                MessageProp p1 = new MessageProp(0, privacy);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   464
                byte[] out;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   465
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   466
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   467
                    me.x.wrap(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   468
                    out = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   469
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   470
                    out = me.x.wrap(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   471
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   472
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   473
                return out;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   474
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   475
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   476
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   477
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   478
    public byte[] unwrap(byte[] t, final boolean privacy)
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   479
            throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   480
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   481
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   482
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   483
                System.out.printf("unwrap %s privacy from %s: ", privacy?"with":"without", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   484
                MessageProp p1 = new MessageProp(0, privacy);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   485
                byte[] bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   486
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   487
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   488
                    me.x.unwrap(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   489
                    bytes = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   490
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   491
                    bytes = me.x.unwrap(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   492
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   493
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   494
                return bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   495
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   496
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   497
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   498
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   499
    public byte[] getMic(byte[] t) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   500
        return doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   501
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   502
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   503
                MessageProp p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   504
                byte[] bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   505
                p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   506
                System.out.printf("getMic from %s: ", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   507
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   508
                    ByteArrayOutputStream os = new ByteArrayOutputStream();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   509
                    me.x.getMIC(new ByteArrayInputStream(input), os, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   510
                    bytes = os.toByteArray();
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   511
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   512
                    bytes = me.x.getMIC(input, 0, input.length, p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   513
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   514
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   515
                return bytes;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   516
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   517
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   518
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   519
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   520
    public void verifyMic(byte[] t, final byte[] msg) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   521
        doAs(new Action() {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   522
            @Override
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   523
            public byte[] run(Context me, byte[] input) throws Exception {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   524
                MessageProp p1 = new MessageProp(0, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   525
                System.out.printf("verifyMic from %s: ", me.name);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   526
                if (usingStream) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   527
                    me.x.verifyMIC(new ByteArrayInputStream(input),
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   528
                            new ByteArrayInputStream(msg), p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   529
                } else {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   530
                    me.x.verifyMIC(input, 0, input.length,
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   531
                            msg, 0, msg.length,
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   532
                            p1);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   533
                }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   534
                System.out.println(printProp(p1));
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   535
                return null;
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   536
            }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   537
        }, t);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   538
    }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   539
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   540
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   541
     * Transmits a message from one Context to another. The sender wraps the
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   542
     * message and sends it to the receiver. The receiver unwraps it, creates
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   543
     * a MIC of the clear text and sends it back to the sender. The sender
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   544
     * verifies the MIC against the message sent earlier.
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   545
     * @param message the message
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   546
     * @param s1 the sender
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   547
     * @param s2 the receiver
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   548
     * @throws java.lang.Exception If anything goes wrong
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   549
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   550
    static public void transmit(final String message, final Context s1,
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   551
            final Context s2) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   552
        final byte[] messageBytes = message.getBytes();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   553
        System.out.printf("-------------------- TRANSMIT from %s to %s------------------------\n",
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   554
                s1.name, s2.name);
10696
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   555
        byte[] wrapped = s1.wrap(messageBytes, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   556
        byte[] unwrapped = s2.unwrap(wrapped, true);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   557
        if (!Arrays.equals(messageBytes, unwrapped)) {
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   558
            throw new Exception("wrap/unwrap mismatch");
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   559
        }
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   560
        byte[] mic = s2.getMic(unwrapped);
3811a12690ce 7077640: gss wrap for cfx doesn't handle rrc != 0
weijun
parents: 9499
diff changeset
   561
        s1.verifyMic(mic, messageBytes);
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   562
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   563
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   564
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   565
     * Returns a string description of a MessageProp object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   566
     * @param prop the object
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   567
     * @return the description
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   568
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   569
    static public String printProp(MessageProp prop) {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   570
        StringBuffer sb = new StringBuffer();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   571
        sb.append("MessagePop: ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   572
        sb.append("QOP="+ prop.getQOP() + ", ");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   573
        sb.append(prop.getPrivacy()?"privacy, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   574
        sb.append(prop.isDuplicateToken()?"dup, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   575
        sb.append(prop.isGapToken()?"gap, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   576
        sb.append(prop.isOldToken()?"old, ":"");
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   577
        sb.append(prop.isUnseqToken()?"unseq, ":"");
7801
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   578
        if (prop.getMinorStatus() != 0) {
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   579
            sb.append(prop.getMinorString()+ "(" + prop.getMinorStatus()+")");
814c8359b104 6975866: api/org_ietf/jgss/GSSContext/index.html#wrapUnwrapIOTest started to fail since jdk7 b102
weijun
parents: 5774
diff changeset
   580
        }
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   581
        return sb.toString();
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   582
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   583
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   584
    public Context impersonate(final String someone) throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   585
        try {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   586
            GSSCredential creds = Subject.doAs(s, new PrivilegedExceptionAction<GSSCredential>() {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   587
                @Override
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   588
                public GSSCredential run() throws Exception {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   589
                    GSSManager m = GSSManager.getInstance();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   590
                    GSSName other = m.createName(someone, GSSName.NT_USER_NAME);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   591
                    if (Context.this.cred == null) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   592
                        Context.this.cred = m.createCredential(GSSCredential.INITIATE_ONLY);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   593
                    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   594
                    return ((ExtendedGSSCredential)Context.this.cred).impersonate(other);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   595
                }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   596
            });
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   597
            Context out = new Context();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   598
            out.s = s;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   599
            out.cred = creds;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   600
            out.name = name + " as " + out.cred.getName().toString();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   601
            return out;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   602
        } catch (PrivilegedActionException pae) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   603
            throw pae.getException();
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   604
        }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   605
    }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   606
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   607
    public byte[] take(final byte[] in) throws Exception {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   608
        return doAs(new Action() {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   609
            @Override
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   610
            public byte[] run(Context me, byte[] input) throws Exception {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   611
                if (me.x.isEstablished()) {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   612
                    System.out.println(name + " side established");
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   613
                    if (input != null) {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   614
                        throw new Exception("Context established but " +
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   615
                                "still receive token at " + name);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   616
                    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   617
                    return null;
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   618
                } else {
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   619
                    if (me.x.isInitiator()) {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   620
                        System.out.println(name + " call initSecContext");
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   621
                        return me.x.initSecContext(input, 0, input.length);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   622
                    } else {
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 14342
diff changeset
   623
                        System.out.println(name + " call acceptSecContext");
11526
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   624
                        return me.x.acceptSecContext(input, 0, input.length);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   625
                    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   626
                }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   627
            }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   628
        }, in);
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   629
    }
efcd7eae978f 7118809: rcache deadlock
weijun
parents: 10696
diff changeset
   630
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   631
    /**
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   632
     * Handshake (security context establishment process) between two Contexts
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   633
     * @param c the initiator
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   634
     * @param s the acceptor
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   635
     * @throws java.lang.Exception
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   636
     */
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   637
    static public void handshake(final Context c, final Context s) throws Exception {
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   638
        byte[] t = new byte[0];
18536
092411ced388 8001326: Improve Kerberos caching
weijun
parents: 16065
diff changeset
   639
        while (true) {
092411ced388 8001326: Improve Kerberos caching
weijun
parents: 16065
diff changeset
   640
            if (t != null || !c.x.isEstablished()) t = c.take(t);
092411ced388 8001326: Improve Kerberos caching
weijun
parents: 16065
diff changeset
   641
            if (t != null || !s.x.isEstablished()) t = s.take(t);
092411ced388 8001326: Improve Kerberos caching
weijun
parents: 16065
diff changeset
   642
            if (c.x.isEstablished() && s.x.isEstablished()) break;
1454
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   643
        }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   644
    }
d9b6f1de641f 6706974: Add krb5 test infrastructure
weijun
parents:
diff changeset
   645
}