src/java.security.jgss/share/classes/sun/security/jgss/krb5/InitSecContextToken.java
author phh
Sat, 30 Nov 2019 14:33:05 -0800
changeset 59330 5b96c12f909d
parent 50187 261d0ac3b09d
permissions -rw-r--r--
8234541: C1 emits an empty message when it inlines successfully Summary: Use "inline" as the message when successfull Reviewed-by: thartmann, mdoerr Contributed-by: navy.xliu@gmail.com
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
50187
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
     2
 * Copyright (c) 2000, 2018, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 3483
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 3483
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 3483
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 3483
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 3483
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.security.jgss.krb5;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import org.ietf.jgss.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.io.InputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.io.IOException;
50187
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    31
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    32
import sun.security.action.GetPropertyAction;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import sun.security.krb5.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.net.InetAddress;
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
    35
import sun.security.krb5.internal.AuthorizationData;
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
    36
import sun.security.krb5.internal.KerberosTime;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
class InitSecContextToken extends InitialToken {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
50187
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    40
    // If non-mutual authentication is requested, there is no AP-REP message.
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    41
    // The acceptor thus has no chance to send the seq-number field to the
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    42
    // initiator. In this case, the initiator and acceptor should has an
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    43
    // agreement to derive acceptor's initial seq-number if the acceptor wishes
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    44
    // to send messages to the initiator.
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    45
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    46
    // If this flag is true, it will the same as the initiator's initial
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    47
    // seq-number (as MIT krb5 and Windows SSPI do). Otherwise, it will be zero
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    48
    // (as Heimdal does). The default value is true.
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    49
    private static final boolean ACCEPTOR_USE_INITIATOR_SEQNUM;
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    50
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    51
    static {
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    52
        // The ACCEPTOR_USE_INITIATOR_SEQNUM value is determined by the system
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    53
        // property "sun.security.krb5.acceptor.sequence.number.nonmutual",
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    54
        // which can be set to "initiator", "zero" or "0".
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    55
        String propName = "sun.security.krb5.acceptor.sequence.number.nonmutual";
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    56
        String s = GetPropertyAction.privilegedGetProperty(propName, "initiator");
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    57
        if (s.equals("initiator")) {
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    58
            ACCEPTOR_USE_INITIATOR_SEQNUM = true;
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    59
        } else if (s.equals("zero") || s.equals("0")) {
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    60
            ACCEPTOR_USE_INITIATOR_SEQNUM = false;
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    61
        } else {
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    62
            throw new AssertionError("Unrecognized value for " + propName
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    63
                    + ": " + s);
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    64
        }
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    65
    }
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
    66
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
    private KrbApReq apReq = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
     * For the context initiator to call. It constructs a new
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
     * InitSecContextToken to send over to the peer containing the desired
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
     * flags and the AP-REQ. It also updates the context with the local
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
     * sequence number and shared context key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
     * (When mutual auth is enabled the peer has an opportunity to
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
     * renegotiate the session key in the followup AcceptSecContextToken
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
     * that it sends.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
    InitSecContextToken(Krb5Context context,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
                               Credentials tgt,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
                               Credentials serviceTicket)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
        throws KrbException, IOException, GSSException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
        boolean mutualRequired = context.getMutualAuthState();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
        boolean useSubkey = true; // MIT Impl will crash if this is not set!
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
        boolean useSequenceNumber = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
        OverloadedChecksum gssChecksum =
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
            new OverloadedChecksum(context, tgt, serviceTicket);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
        Checksum checksum = gssChecksum.getChecksum();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
    92
        context.setTktFlags(serviceTicket.getFlags());
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
    93
        context.setAuthTime(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
    94
                new KerberosTime(serviceTicket.getAuthTime()).toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
        apReq = new KrbApReq(serviceTicket,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
                             mutualRequired,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
                             useSubkey,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
                             useSequenceNumber,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
                             checksum);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
        context.resetMySequenceNumber(apReq.getSeqNumber().intValue());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
        EncryptionKey subKey = apReq.getSubKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
        if (subKey != null)
10697
ecee258b7d87 7077646: gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY
weijun
parents: 9249
diff changeset
   105
            context.setKey(Krb5Context.INITIATOR_SUBKEY, subKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
        else
10697
ecee258b7d87 7077646: gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY
weijun
parents: 9249
diff changeset
   107
            context.setKey(Krb5Context.SESSION_KEY, serviceTicket.getSessionKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
        if (!mutualRequired)
50187
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   110
            context.resetPeerSequenceNumber(
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   111
                    ACCEPTOR_USE_INITIATOR_SEQNUM
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   112
                    ? apReq.getSeqNumber().intValue()
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   113
                    : 0);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
     * For the context acceptor to call. It reads the bytes out of an
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
     * InputStream and constructs an InitSecContextToken with them.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
     */
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 10697
diff changeset
   120
    InitSecContextToken(Krb5Context context, Krb5AcceptCredential cred,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
                               InputStream is)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
        throws IOException, GSSException, KrbException  {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
        int tokenId = ((is.read()<<8) | is.read());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
        if (tokenId != Krb5Token.AP_REQ_ID)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
            throw new GSSException(GSSException.DEFECTIVE_TOKEN, -1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
                                   "AP_REQ token id does not match!");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
        // XXX Modify KrbApReq cons to take an InputStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
        byte[] apReqBytes =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
            new sun.security.util.DerValue(is).toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
        //debug("=====ApReqBytes: [" + getHexBytes(apReqBytes) + "]\n");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
        InetAddress addr = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
        if (context.getChannelBinding() != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
            addr = context.getChannelBinding().getInitiatorAddress();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
        }
15006
10d6aacdd67f 8005447: default principal should act as anyone
weijun
parents: 10697
diff changeset
   139
        apReq = new KrbApReq(apReqBytes, cred, addr);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
        //debug("\nReceived AP-REQ and authenticated it.\n");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   142
        EncryptionKey sessionKey = apReq.getCreds().getSessionKey();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
          System.out.println("\n\nSession key from service ticket is: " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
          getHexBytes(sessionKey.getBytes()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
        */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
        EncryptionKey subKey = apReq.getSubKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
        if (subKey != null) {
10697
ecee258b7d87 7077646: gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY
weijun
parents: 9249
diff changeset
   151
            context.setKey(Krb5Context.INITIATOR_SUBKEY, subKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
              System.out.println("Sub-Session key from authenticator is: " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
              getHexBytes(subKey.getBytes()) + "\n");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
            */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
        } else {
10697
ecee258b7d87 7077646: gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY
weijun
parents: 9249
diff changeset
   157
            context.setKey(Krb5Context.SESSION_KEY, sessionKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
            //System.out.println("Sub-Session Key Missing in Authenticator.\n");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
9249
7aa2fc5371c5 7030180: AES 128/256 decrypt exception
weijun
parents: 5506
diff changeset
   161
        OverloadedChecksum gssChecksum = new OverloadedChecksum(
7aa2fc5371c5 7030180: AES 128/256 decrypt exception
weijun
parents: 5506
diff changeset
   162
                context, apReq.getChecksum(), sessionKey, subKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
        gssChecksum.setContextFlags(context);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
        Credentials delegCred = gssChecksum.getDelegatedCreds();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
        if (delegCred != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
            Krb5CredElement credElement =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
                Krb5InitCredential.getInstance(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
                                   (Krb5NameElement)context.getSrcName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
                                   delegCred);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
            context.setDelegCred(credElement);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
        Integer apReqSeqNumber = apReq.getSeqNumber();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
        int peerSeqNumber = (apReqSeqNumber != null ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
                             apReqSeqNumber.intValue() :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
                             0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
        context.resetPeerSequenceNumber(peerSeqNumber);
50187
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   178
        if (!context.getMutualAuthState()) {
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   179
            context.resetMySequenceNumber(
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   180
                    ACCEPTOR_USE_INITIATOR_SEQNUM
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   181
                            ? peerSeqNumber
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   182
                            : 0);
261d0ac3b09d 8201627: Kerberos sequence number issues
weijun
parents: 47216
diff changeset
   183
        }
3483
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
   184
        context.setAuthTime(
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
   185
                new KerberosTime(apReq.getCreds().getAuthTime()).toString());
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
   186
        context.setTktFlags(apReq.getCreds().getFlags());
a16fce1820ef 6821190: more InquireType values for ExtendedGSSContext
weijun
parents: 715
diff changeset
   187
        AuthorizationData ad = apReq.getCreds().getAuthzData();
26629
3b9ed8175488 8042900: Allow com.sun.security.jgss to be in different module than org.ietf.jgss
weijun
parents: 25859
diff changeset
   188
        context.setAuthzData(ad);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
    public final KrbApReq getKrbApReq() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
        return apReq;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
    public final byte[] encode() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
        byte[] apReqBytes = apReq.getMessage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
        byte[] retVal = new byte[2 + apReqBytes.length];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
        writeInt(Krb5Token.AP_REQ_ID, retVal, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
        System.arraycopy(apReqBytes, 0, retVal, 2, apReqBytes.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
        //      System.out.println("GSS-Token with AP_REQ is:");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
        //      System.out.println(getHexBytes(retVal));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
        return retVal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
}