a5c160c711
Reviewed-by: mullan
197 lines
6.8 KiB
Java
197 lines
6.8 KiB
Java
/*
|
|
* Copyright (c) 2004, 2021, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 5014493
|
|
* @summary SaslServer.wrap throws NullPointerException when security
|
|
* layer negotiated.
|
|
* @run main/manual ConfSecurityLayer
|
|
*/
|
|
|
|
/*
|
|
* Set logging to FINEST to view exchange.
|
|
* See run-conf-wjaas.csh for instructions for how to run this test.
|
|
*/
|
|
|
|
import javax.security.sasl.*;
|
|
import javax.security.auth.callback.*;
|
|
import javax.security.auth.Subject;
|
|
import javax.security.auth.login.*;
|
|
import com.sun.security.auth.callback.*;
|
|
import java.util.HashMap;
|
|
|
|
public class ConfSecurityLayer {
|
|
private static final String MECH = "GSSAPI";
|
|
private static final String SERVER_FQDN = "machineX.imc.org";
|
|
private static final String PROTOCOL = "sample";
|
|
|
|
private static String namesfile, proxyfile;
|
|
private static final byte[] EMPTY = new byte[0];
|
|
private static boolean auto;
|
|
private static boolean verbose = false;
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
if (args.length == 0) {
|
|
namesfile = null;
|
|
auto = true;
|
|
} else {
|
|
int i = 0;
|
|
if (args[i].equals("-m")) {
|
|
i++;
|
|
auto = false;
|
|
}
|
|
if (args.length > i) {
|
|
namesfile = args[i++];
|
|
if (args.length > i) {
|
|
proxyfile = args[i];
|
|
}
|
|
} else {
|
|
namesfile = null;
|
|
}
|
|
}
|
|
|
|
CallbackHandler clntCbh = null;
|
|
final CallbackHandler srvCbh = new PropertiesFileCallbackHandler(
|
|
null, namesfile, proxyfile);
|
|
|
|
Subject clntSubj = doLogin("client");
|
|
Subject srvSubj = doLogin("server");
|
|
final HashMap clntprops = new HashMap();
|
|
final HashMap srvprops = new HashMap();
|
|
|
|
clntprops.put(Sasl.QOP, "auth-conf");
|
|
srvprops.put(Sasl.QOP, "auth,auth-int,auth-conf");
|
|
|
|
final SaslClient clnt = (SaslClient)
|
|
Subject.callAs(clntSubj, () ->Sasl.createSaslClient(
|
|
new String[]{MECH}, null, PROTOCOL, SERVER_FQDN,
|
|
clntprops, null));
|
|
|
|
if (verbose) {
|
|
System.out.println(clntSubj);
|
|
System.out.println(srvSubj);
|
|
}
|
|
final SaslServer srv = (SaslServer)
|
|
Subject.callAs(srvSubj, () ->
|
|
Sasl.createSaslServer(MECH, PROTOCOL, SERVER_FQDN,
|
|
srvprops, srvCbh));
|
|
|
|
|
|
if (clnt == null) {
|
|
throw new IllegalStateException(
|
|
"Unable to find client impl for " + MECH);
|
|
}
|
|
if (srv == null) {
|
|
throw new IllegalStateException(
|
|
"Unable to find server impl for " + MECH);
|
|
}
|
|
|
|
byte[] response;
|
|
byte[] challenge;
|
|
|
|
response = Subject.callAs(clntSubj,
|
|
() -> (clnt.hasInitialResponse()? clnt.evaluateChallenge(EMPTY) : EMPTY));
|
|
|
|
while (!clnt.isComplete() || !srv.isComplete()) {
|
|
final byte[] responseCopy = response;
|
|
challenge = Subject.callAs(srvSubj,
|
|
() -> srv.evaluateResponse(responseCopy));
|
|
|
|
if (challenge != null) {
|
|
final byte[] challengeCopy = challenge;
|
|
response = Subject.callAs(clntSubj,
|
|
() -> clnt.evaluateChallenge(challengeCopy));
|
|
}
|
|
}
|
|
|
|
if (clnt.isComplete() && srv.isComplete()) {
|
|
if (verbose) {
|
|
System.out.println("SUCCESS");
|
|
System.out.println("authzid is " + srv.getAuthorizationID());
|
|
}
|
|
} else {
|
|
throw new IllegalStateException("FAILURE: mismatched state:" +
|
|
" client complete? " + clnt.isComplete() +
|
|
" server complete? " + srv.isComplete());
|
|
}
|
|
|
|
if (verbose) {
|
|
System.out.println(clnt.getNegotiatedProperty(Sasl.QOP));
|
|
}
|
|
|
|
// Now try to use security layer
|
|
|
|
byte[] clntBuf = new byte[]{0, 1, 2, 3};
|
|
byte[] wrappedClnt = clnt.wrap(clntBuf, 0, clntBuf.length);
|
|
System.out.println("plaintext2: " + bytesToString(clntBuf));
|
|
System.out.println("wrapped2: " + bytesToString(wrappedClnt));
|
|
|
|
byte[] srvBuf = new byte[]{10, 11, 12, 13};
|
|
byte[] wrappedSrv = srv.wrap(srvBuf, 0, srvBuf.length);
|
|
System.out.println("plaintext1: " + bytesToString(srvBuf));
|
|
System.out.println("wrapped1: " + bytesToString(wrappedSrv));
|
|
|
|
byte[] unwrapped1 = clnt.unwrap(wrappedSrv, 0, wrappedSrv.length);
|
|
System.out.println("unwrapped1: " + bytesToString(unwrapped1));
|
|
|
|
byte[] unwrapped2 = srv.unwrap(wrappedClnt, 0, wrappedClnt.length);
|
|
System.out.println("unwrapped2: " + bytesToString(unwrapped2));
|
|
}
|
|
|
|
private static Subject doLogin(String msg) throws LoginException {
|
|
LoginContext lc = null;
|
|
if (verbose) {
|
|
System.out.println(msg);
|
|
}
|
|
try {
|
|
lc = new LoginContext(msg, new TextCallbackHandler());
|
|
|
|
// Attempt authentication
|
|
// You might want to do this in a "for" loop to give
|
|
// user more than one chance to enter correct username/password
|
|
lc.login();
|
|
|
|
} catch (LoginException le) {
|
|
throw le;
|
|
}
|
|
return lc.getSubject();
|
|
}
|
|
|
|
private static String bytesToString(byte[] digest) {
|
|
// Get character representation of digest
|
|
StringBuffer digestString = new StringBuffer();
|
|
|
|
for (int i = 0; i < digest.length; i++) {
|
|
if ((digest[i] & 0x000000ff) < 0x10) {
|
|
digestString.append("0" +
|
|
Integer.toHexString(digest[i] & 0x000000ff));
|
|
} else {
|
|
digestString.append(
|
|
Integer.toHexString(digest[i] & 0x000000ff));
|
|
}
|
|
}
|
|
return digestString.toString();
|
|
}
|
|
}
|