3789983e89
Reviewed-by: darcy, ihse
209 lines
9.0 KiB
Java
209 lines
9.0 KiB
Java
/*
|
|
* Copyright (c) 2005, 2014, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 4641821
|
|
* @summary hashCode() and equals() for KerberosKey and KerberosTicket
|
|
*/
|
|
|
|
/*
|
|
* Must setup KDC and Kerberos configuration file
|
|
*/
|
|
|
|
import java.net.InetAddress;
|
|
import java.util.Date;
|
|
import javax.security.auth.kerberos.*;
|
|
|
|
public class KerberosHashEqualsTest {
|
|
public static void main(String[] args) throws Exception {
|
|
new KerberosHashEqualsTest().check();
|
|
}
|
|
|
|
void checkSame(Object o1, Object o2) {
|
|
if(!o1.equals(o2)) {
|
|
throw new RuntimeException("equals() fails");
|
|
}
|
|
if(o1.hashCode() != o2.hashCode()) {
|
|
throw new RuntimeException("hashCode() not same");
|
|
}
|
|
}
|
|
|
|
void checkNotSame(Object o1, Object o2) {
|
|
if(o1.equals(o2)) {
|
|
throw new RuntimeException("equals() succeeds");
|
|
}
|
|
}
|
|
|
|
void check() throws Exception {
|
|
KerberosKey k1, k2;
|
|
k1 = new KerberosKey(newKP("A"), "pass".getBytes(), 1, 1);
|
|
k2 = new KerberosKey(newKP("A"), "pass".getBytes(), 1, 1);
|
|
checkSame(k1, k1); // me to me
|
|
checkSame(k1, k2); // same
|
|
|
|
k2.destroy();
|
|
checkNotSame(k1, k2);
|
|
checkNotSame(k2, k1);
|
|
checkSame(k2, k2);
|
|
|
|
k1.destroy();
|
|
checkNotSame(k1, k2);
|
|
|
|
// Destroyed key has string and hashCode
|
|
k1.toString(); k1.hashCode();
|
|
|
|
// a little different
|
|
k1 = new KerberosKey(newKP("A"), "pass".getBytes(), 1, 1);
|
|
k2 = new KerberosKey(newKP("B"), "pass".getBytes(), 1, 1);
|
|
checkNotSame(k1, k2);
|
|
|
|
k2 = new KerberosKey(newKP("A"), "ssap".getBytes(), 1, 1);
|
|
checkNotSame(k1, k2);
|
|
|
|
k2 = new KerberosKey(newKP("A"), "pass".getBytes(), 2, 1);
|
|
checkNotSame(k1, k2);
|
|
|
|
k2 = new KerberosKey(newKP("A"), "pass".getBytes(), 1, 2);
|
|
checkNotSame(k1, k2);
|
|
|
|
// Null
|
|
k1 = new KerberosKey(null, "pass".getBytes(), 1, 2);
|
|
checkNotSame(k1, k2); // null to non-null
|
|
k2 = new KerberosKey(null, "pass".getBytes(), 1, 2);
|
|
checkSame(k1, k2); // null to null
|
|
|
|
// Even key with null principal has a string and hashCode
|
|
k1.toString(); k1.hashCode();
|
|
|
|
checkNotSame(k1, "Another Object");
|
|
|
|
EncryptionKey e1, e2;
|
|
e1 = new EncryptionKey("pass".getBytes(), 1);
|
|
e2 = new EncryptionKey("pass".getBytes(), 1);
|
|
checkSame(e1, e1); // me to me
|
|
checkSame(e1, e2); // same
|
|
|
|
e2.destroy();
|
|
checkNotSame(e1, e2);
|
|
checkNotSame(e2, e1);
|
|
checkSame(e2, e2);
|
|
|
|
e1.destroy();
|
|
checkNotSame(e1, e2);
|
|
|
|
// Destroyed key has string and hashCode
|
|
e1.toString(); e1.hashCode();
|
|
|
|
// a little different
|
|
e1 = new EncryptionKey("pass".getBytes(), 1);
|
|
e2 = new EncryptionKey("ssap".getBytes(), 1);
|
|
checkNotSame(e1, e2);
|
|
|
|
e2 = new EncryptionKey("pass".getBytes(), 2);
|
|
checkNotSame(e1, e2);
|
|
|
|
checkNotSame(e1, "Another Object");
|
|
|
|
KerberosTicket t1, t2;
|
|
t1 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkSame(t1, t1);
|
|
checkSame(t1, t2);
|
|
t2 = new KerberosTicket("asn11".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client1"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server1"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass1".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 2, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {false, true}, new Date(0), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(1), new Date(0), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(1), new Date(0), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(1), new Date(0), null);
|
|
checkNotSame(t1, t2);
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(0), new InetAddress[2]);
|
|
checkNotSame(t1, t2);
|
|
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(1), null);
|
|
t1 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true}, new Date(0), new Date(0), new Date(0), new Date(2), null);
|
|
checkSame(t1, t2); // renewtill is useless
|
|
|
|
t2.destroy();
|
|
checkNotSame(t1, t2);
|
|
t2.hashCode(); t2.toString();
|
|
|
|
// destroyed tickets doesn't equal to each other
|
|
checkNotSame(t2, t1);
|
|
checkSame(t2, t2);
|
|
|
|
t2 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true, true, true, true, true, true, true, true, true}, new Date(0), new Date(0), new Date(0), new Date(1), null);
|
|
t1 = new KerberosTicket("asn1".getBytes(), newKP("client"), newKP("server"), "pass".getBytes(), 1, new boolean[] {true, true, true, true, true, true, true, true, true, true}, new Date(0), new Date(0), new Date(0), new Date(2), null);
|
|
checkNotSame(t1, t2); // renewtill is useful
|
|
|
|
checkNotSame(t1, "Another Object");
|
|
|
|
KerberosCredMessage m1, m2;
|
|
m1 = new KerberosCredMessage(newKP("C"), newKP("S"), "message".getBytes());
|
|
m2 = new KerberosCredMessage(newKP("C"), newKP("S"), "message".getBytes());
|
|
checkSame(m1, m1); // me to me
|
|
checkSame(m1, m2); // same
|
|
|
|
m2.destroy();
|
|
checkNotSame(m1, m2);
|
|
checkNotSame(m2, m1);
|
|
checkSame(m2, m2);
|
|
|
|
m1.destroy();
|
|
checkNotSame(m1, m2);
|
|
|
|
// Destroyed message has string and hashCode
|
|
m1.toString(); m1.hashCode();
|
|
|
|
// a little different
|
|
m1 = new KerberosCredMessage(newKP("C"), newKP("S"), "message".getBytes());
|
|
m2 = new KerberosCredMessage(newKP("A"), newKP("S"), "message".getBytes());
|
|
checkNotSame(m1, m2);
|
|
|
|
m2 = new KerberosCredMessage(newKP("C"), newKP("B"), "message".getBytes());
|
|
checkNotSame(m1, m2);
|
|
|
|
m1 = new KerberosCredMessage(newKP("C"), newKP("S"), "hello".getBytes());
|
|
checkNotSame(m1, m2);
|
|
|
|
checkNotSame(m1, "Another Object");
|
|
|
|
System.out.println("Good!");
|
|
}
|
|
|
|
KerberosPrincipal newKP(String s) {
|
|
return new KerberosPrincipal(s + "@JLABS.SFBAY.SUN.COM");
|
|
}
|
|
}
|