jdk/test/com/sun/security/sasl/digest/Unbound.java
changeset 14340 e150cbaf584e
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/jdk/test/com/sun/security/sasl/digest/Unbound.java	Fri Nov 02 10:48:04 2012 +0800
@@ -0,0 +1,132 @@
+/*
+ * Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+/*
+ * @test
+ * @bug 7110803
+ * @summary SASL service for multiple hostnames
+ * @run main Unbound jmx
+ * @run main/fail Unbound j
+ */
+import javax.security.sasl.*;
+import javax.security.auth.callback.*;
+import java.util.*;
+
+public class Unbound {
+    private static final String MECH = "DIGEST-MD5";
+    private static final String SERVER_FQDN = "machineX.imc.org";
+    private static final String PROTOCOL = "jmx";
+
+    private static final byte[] EMPTY = new byte[0];
+
+    private static String pwfile, namesfile, proxyfile;
+    private static boolean auto;
+    private static boolean verbose = false;
+
+    private static void init(String[] args) throws Exception {
+        if (args.length == 1) {
+            pwfile = "pw.properties";
+            namesfile = "names.properties";
+            auto = true;
+        } else {
+            int i = 1;
+            if (args[i].equals("-m")) {
+                i++;
+                auto = false;
+            }
+            if (args.length > i) {
+                pwfile = args[i++];
+
+                if (args.length > i) {
+                    namesfile = args[i++];
+
+                    if (args.length > i) {
+                        proxyfile = args[i];
+                    }
+                }
+            } else {
+                pwfile = "pw.properties";
+                namesfile = "names.properties";
+            }
+        }
+    }
+
+    public static void main(String[] args) throws Exception {
+
+        init(args);
+
+        CallbackHandler clntCbh = new ClientCallbackHandler(auto);
+
+        CallbackHandler srvCbh =
+            new PropertiesFileCallbackHandler(pwfile, namesfile, proxyfile);
+
+        SaslClient clnt = Sasl.createSaslClient(
+            new String[]{MECH}, null, PROTOCOL, SERVER_FQDN, null, clntCbh);
+
+        Map props = System.getProperties();
+        props.put("com.sun.security.sasl.digest.realm", SERVER_FQDN);
+
+        SaslServer srv = Sasl.createSaslServer(MECH, args[0], null, props,
+            srvCbh);
+
+        if (clnt == null) {
+            throw new IllegalStateException(
+                "Unable to find client impl for " + MECH);
+        }
+        if (srv == null) {
+            throw new IllegalStateException(
+                "Unable to find server impl for " + MECH);
+        }
+
+        byte[] response = (clnt.hasInitialResponse()?
+            clnt.evaluateChallenge(EMPTY) : EMPTY);
+        byte[] challenge;
+
+        while (!clnt.isComplete() || !srv.isComplete()) {
+            challenge = srv.evaluateResponse(response);
+
+            if (challenge != null) {
+                response = clnt.evaluateChallenge(challenge);
+            }
+        }
+
+        if (clnt.isComplete() && srv.isComplete()) {
+            if (verbose) {
+                System.out.println("SUCCESS");
+                System.out.println("authzid is " + srv.getAuthorizationID());
+            }
+        } else {
+            throw new IllegalStateException(
+                "FAILURE: mismatched state:" +
+                    " client complete? " + clnt.isComplete() +
+                    " server complete? " + srv.isComplete());
+        }
+
+        if (!SERVER_FQDN.equalsIgnoreCase((String)
+                srv.getNegotiatedProperty(Sasl.BOUND_SERVER_NAME))) {
+            throw new Exception("Server side gets wrong requested server name");
+        }
+        clnt.dispose();
+        srv.dispose();
+    }
+}