Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/krb5/auto/KDC.java
41152 views
1
/*
2
* Copyright (c) 2008, 2020, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
import jdk.test.lib.Platform;
25
26
import java.lang.reflect.Constructor;
27
import java.lang.reflect.Field;
28
import java.lang.reflect.InvocationTargetException;
29
import java.net.*;
30
import java.io.*;
31
import java.lang.reflect.Method;
32
import java.nio.file.Files;
33
import java.nio.file.Paths;
34
import java.util.*;
35
import java.util.concurrent.*;
36
import java.util.stream.Collectors;
37
import java.util.stream.Stream;
38
39
import sun.security.krb5.*;
40
import sun.security.krb5.internal.*;
41
import sun.security.krb5.internal.ccache.CredentialsCache;
42
import sun.security.krb5.internal.crypto.EType;
43
import sun.security.krb5.internal.crypto.KeyUsage;
44
import sun.security.krb5.internal.ktab.KeyTab;
45
import sun.security.util.DerInputStream;
46
import sun.security.util.DerOutputStream;
47
import sun.security.util.DerValue;
48
49
/**
50
* A KDC server.
51
*
52
* Note: By setting the system property native.kdc.path to a native
53
* krb5 installation, this class starts a native KDC with the
54
* given realm and host. It can also add new principals and save keytabs.
55
* Other features might not be available.
56
* <p>
57
* Features:
58
* <ol>
59
* <li> Supports TCP and UDP
60
* <li> Supports AS-REQ and TGS-REQ
61
* <li> Principal db and other settings hard coded in application
62
* <li> Options, say, request preauth or not
63
* </ol>
64
* Side effects:
65
* <ol>
66
* <li> The Sun-internal class <code>sun.security.krb5.Config</code> is a
67
* singleton and initialized according to Kerberos settings (krb5.conf and
68
* java.security.krb5.* system properties). This means once it's initialized
69
* it will not automatically notice any changes to these settings (or file
70
* changes of krb5.conf). The KDC class normally does not touch these
71
* settings (except for the <code>writeKtab()</code> method). However, to make
72
* sure nothing ever goes wrong, if you want to make any changes to these
73
* settings after calling a KDC method, call <code>Config.refresh()</code> to
74
* make sure your changes are reflected in the <code>Config</code> object.
75
* </ol>
76
* System properties recognized:
77
* <ul>
78
* <li>test.kdc.save.ccache
79
* </ul>
80
* Issues and TODOs:
81
* <ol>
82
* <li> Generates krb5.conf to be used on another machine, currently the kdc is
83
* always localhost
84
* <li> More options to KDC, say, error output, say, response nonce !=
85
* request nonce
86
* </ol>
87
* Note: This program uses internal krb5 classes (including reflection to
88
* access private fields and methods).
89
* <p>
90
* Usages:
91
* <p>
92
* 1. Init and start the KDC:
93
* <pre>
94
* KDC kdc = KDC.create("REALM.NAME", port, isDaemon);
95
* KDC kdc = KDC.create("REALM.NAME");
96
* </pre>
97
* Here, <code>port</code> is the UDP and TCP port number the KDC server
98
* listens on. If zero, a random port is chosen, which you can use getPort()
99
* later to retrieve the value.
100
* <p>
101
* If <code>isDaemon</code> is true, the KDC worker threads will be daemons.
102
* <p>
103
* The shortcut <code>KDC.create("REALM.NAME")</code> has port=0 and
104
* isDaemon=false, and is commonly used in an embedded KDC.
105
* <p>
106
* 2. Adding users:
107
* <pre>
108
* kdc.addPrincipal(String principal_name, char[] password);
109
* kdc.addPrincipalRandKey(String principal_name);
110
* </pre>
111
* A service principal's name should look like "host/f.q.d.n". The second form
112
* generates a random key. To expose this key, call <code>writeKtab()</code> to
113
* save the keys into a keytab file.
114
* <p>
115
* Note that you need to add the principal name krbtgt/REALM.NAME yourself.
116
* <p>
117
* Note that you can safely add a principal at any time after the KDC is
118
* started and before a user requests info on this principal.
119
* <p>
120
* 3. Other public methods:
121
* <ul>
122
* <li> <code>getPort</code>: Returns the port number the KDC uses
123
* <li> <code>getRealm</code>: Returns the realm name
124
* <li> <code>writeKtab</code>: Writes all principals' keys into a keytab file
125
* <li> <code>saveConfig</code>: Saves a krb5.conf file to access this KDC
126
* <li> <code>setOption</code>: Sets various options
127
* </ul>
128
* Read the javadoc for details. Lazy developer can use <code>OneKDC</code>
129
* directly.
130
*/
131
public class KDC {
132
133
public static final int DEFAULT_LIFETIME = 39600;
134
public static final int DEFAULT_RENEWTIME = 86400;
135
136
public static final String NOT_EXISTING_HOST = "not.existing.host";
137
138
// What etypes the KDC supports. Comma-separated strings. Null for all.
139
// Please note native KDCs might use different names.
140
private static final String SUPPORTED_ETYPES
141
= System.getProperty("kdc.supported.enctypes");
142
143
// The native KDC
144
private final NativeKdc nativeKdc;
145
146
// The native KDC process
147
private Process kdcProc = null;
148
149
// Under the hood.
150
151
// Principal db. principal -> pass. A case-insensitive TreeMap is used
152
// so that even if the client provides a name with different case, the KDC
153
// can still locate the principal and give back correct salt.
154
private TreeMap<String,char[]> passwords = new TreeMap<>
155
(String.CASE_INSENSITIVE_ORDER);
156
157
// Non default salts. Precisely, there should be different salts for
158
// different etypes, pretend they are the same at the moment.
159
private TreeMap<String,String> salts = new TreeMap<>
160
(String.CASE_INSENSITIVE_ORDER);
161
162
// Non default s2kparams for newer etypes. Precisely, there should be
163
// different s2kparams for different etypes, pretend they are the same
164
// at the moment.
165
private TreeMap<String,byte[]> s2kparamses = new TreeMap<>
166
(String.CASE_INSENSITIVE_ORDER);
167
168
// Alias for referrals.
169
private TreeMap<String,KDC> aliasReferrals = new TreeMap<>
170
(String.CASE_INSENSITIVE_ORDER);
171
172
// Alias for local resolution.
173
private TreeMap<String,PrincipalName> alias2Principals = new TreeMap<>
174
(String.CASE_INSENSITIVE_ORDER);
175
176
// Realm name
177
private String realm;
178
// KDC
179
private String kdc;
180
// Service port number
181
private int port;
182
// The request/response job queue
183
private BlockingQueue<Job> q = new ArrayBlockingQueue<>(100);
184
// Options
185
private Map<Option,Object> options = new HashMap<>();
186
// Realm-specific krb5.conf settings
187
private List<String> conf = new ArrayList<>();
188
189
private Thread thread1, thread2, thread3;
190
private volatile boolean udpConsumerReady = false;
191
private volatile boolean tcpConsumerReady = false;
192
private volatile boolean dispatcherReady = false;
193
DatagramSocket u1 = null;
194
ServerSocket t1 = null;
195
196
public static enum KtabMode { APPEND, EXISTING };
197
198
/**
199
* Option names, to be expanded forever.
200
*/
201
public static enum Option {
202
/**
203
* Whether pre-authentication is required. Default Boolean.TRUE
204
*/
205
PREAUTH_REQUIRED,
206
/**
207
* Only issue TGT in RC4
208
*/
209
ONLY_RC4_TGT,
210
/**
211
* Use RC4 as the first in preauth
212
*/
213
RC4_FIRST_PREAUTH,
214
/**
215
* Use only one preauth, so that some keys are not easy to generate
216
*/
217
ONLY_ONE_PREAUTH,
218
/**
219
* Set all name-type to a value in response
220
*/
221
RESP_NT,
222
/**
223
* Multiple ETYPE-INFO-ENTRY with same etype but different salt
224
*/
225
DUP_ETYPE,
226
/**
227
* What backend server can be delegated to
228
*/
229
OK_AS_DELEGATE,
230
/**
231
* Allow S4U2self, List<String> of middle servers.
232
* If not set, means KDC does not understand S4U2self at all, therefore
233
* would ignore any PA-FOR-USER request and send a ticket using the
234
* cname of teh requestor. If set, it returns FORWARDABLE tickets to
235
* a server with its name in the list
236
*/
237
ALLOW_S4U2SELF,
238
/**
239
* Allow S4U2proxy, Map<String,List<String>> of middle servers to
240
* backends. If not set or a backend not in a server's list,
241
* Krb5.KDC_ERR_POLICY will be send for S4U2proxy request.
242
*/
243
ALLOW_S4U2PROXY,
244
/**
245
* Sensitive accounts can never be delegated.
246
*/
247
SENSITIVE_ACCOUNTS,
248
/**
249
* If true, will check if TGS-REQ contains a non-null addresses field.
250
*/
251
CHECK_ADDRESSES,
252
};
253
254
/**
255
* A standalone KDC server.
256
*/
257
public static void main(String[] args) throws Exception {
258
int port = args.length > 0 ? Integer.parseInt(args[0]) : 0;
259
KDC kdc = create("RABBIT.HOLE", "kdc.rabbit.hole", port, false);
260
kdc.addPrincipal("dummy", "bogus".toCharArray());
261
kdc.addPrincipal("foo", "bar".toCharArray());
262
kdc.addPrincipalRandKey("krbtgt/RABBIT.HOLE");
263
kdc.addPrincipalRandKey("server/host.rabbit.hole");
264
kdc.addPrincipalRandKey("backend/host.rabbit.hole");
265
KDC.saveConfig("krb5.conf", kdc, "forwardable = true");
266
}
267
268
/**
269
* Creates and starts a KDC running as a daemon on a random port.
270
* @param realm the realm name
271
* @return the running KDC instance
272
* @throws java.io.IOException for any socket creation error
273
*/
274
public static KDC create(String realm) throws IOException {
275
return create(realm, "kdc." + realm.toLowerCase(Locale.US), 0, true);
276
}
277
278
public static KDC existing(String realm, String kdc, int port) {
279
KDC k = new KDC(realm, kdc);
280
k.port = port;
281
return k;
282
}
283
284
/**
285
* Creates and starts a KDC server.
286
* @param realm the realm name
287
* @param port the TCP and UDP port to listen to. A random port will to
288
* chosen if zero.
289
* @param asDaemon if true, KDC threads will be daemons. Otherwise, not.
290
* @return the running KDC instance
291
* @throws java.io.IOException for any socket creation error
292
*/
293
public static KDC create(String realm, String kdc, int port,
294
boolean asDaemon) throws IOException {
295
return new KDC(realm, kdc, port, asDaemon);
296
}
297
298
/**
299
* Sets an option
300
* @param key the option name
301
* @param value the value
302
*/
303
public void setOption(Option key, Object value) {
304
if (value == null) {
305
options.remove(key);
306
} else {
307
options.put(key, value);
308
}
309
}
310
311
/**
312
* Writes or appends keys into a keytab.
313
* <p>
314
* Attention: This is the most basic one of a series of methods below on
315
* keytab creation or modification. All these methods reference krb5.conf
316
* settings. If you need to modify krb5.conf or switch to another krb5.conf
317
* later, please call <code>Config.refresh()</code> again. For example:
318
* <pre>
319
* kdc.writeKtab("/etc/kdc/ktab", true); // Config is initialized,
320
* System.setProperty("java.security.krb5.conf", "/home/mykrb5.conf");
321
* Config.refresh();
322
* </pre>
323
* Inside this method there are 2 places krb5.conf is used:
324
* <ol>
325
* <li> (Fatal) Generating keys: EncryptionKey.acquireSecretKeys
326
* <li> (Has workaround) Creating PrincipalName
327
* </ol>
328
* @param tab the keytab file name
329
* @param append true if append, otherwise, overwrite.
330
* @param names the names to write into, write all if names is empty
331
*/
332
public void writeKtab(String tab, boolean append, String... names)
333
throws IOException, KrbException {
334
KeyTab ktab = null;
335
if (nativeKdc == null) {
336
ktab = append ? KeyTab.getInstance(tab) : KeyTab.create(tab);
337
}
338
Iterable<String> entries =
339
(names.length != 0) ? Arrays.asList(names): passwords.keySet();
340
for (String name : entries) {
341
if (name.indexOf('@') < 0) {
342
name = name + "@" + realm;
343
}
344
if (nativeKdc == null) {
345
char[] pass = passwords.get(name);
346
int kvno = 0;
347
if (Character.isDigit(pass[pass.length - 1])) {
348
kvno = pass[pass.length - 1] - '0';
349
}
350
PrincipalName pn = new PrincipalName(name,
351
name.indexOf('/') < 0 ?
352
PrincipalName.KRB_NT_UNKNOWN :
353
PrincipalName.KRB_NT_SRV_HST);
354
ktab.addEntry(pn,
355
getSalt(pn),
356
pass,
357
kvno,
358
true);
359
} else {
360
nativeKdc.ktadd(name, tab);
361
}
362
}
363
if (nativeKdc == null) {
364
ktab.save();
365
}
366
}
367
368
/**
369
* Writes all principals' keys from multiple KDCs into one keytab file.
370
* @throws java.io.IOException for any file output error
371
* @throws sun.security.krb5.KrbException for any realm and/or principal
372
* name error.
373
*/
374
public static void writeMultiKtab(String tab, KDC... kdcs)
375
throws IOException, KrbException {
376
KeyTab.create(tab).save(); // Empty the old keytab
377
appendMultiKtab(tab, kdcs);
378
}
379
380
/**
381
* Appends all principals' keys from multiple KDCs to one keytab file.
382
*/
383
public static void appendMultiKtab(String tab, KDC... kdcs)
384
throws IOException, KrbException {
385
for (KDC kdc: kdcs) {
386
kdc.writeKtab(tab, true);
387
}
388
}
389
390
/**
391
* Write a ktab for this KDC.
392
*/
393
public void writeKtab(String tab) throws IOException, KrbException {
394
writeKtab(tab, false);
395
}
396
397
/**
398
* Appends keys in this KDC to a ktab.
399
*/
400
public void appendKtab(String tab) throws IOException, KrbException {
401
writeKtab(tab, true);
402
}
403
404
/**
405
* Adds a new principal to this realm with a given password.
406
* @param user the principal's name. For a service principal, use the
407
* form of host/f.q.d.n
408
* @param pass the password for the principal
409
*/
410
public void addPrincipal(String user, char[] pass) {
411
addPrincipal(user, pass, null, null);
412
}
413
414
/**
415
* Adds a new principal to this realm with a given password.
416
* @param user the principal's name. For a service principal, use the
417
* form of host/f.q.d.n
418
* @param pass the password for the principal
419
* @param salt the salt, or null if a default value will be used
420
* @param s2kparams the s2kparams, or null if a default value will be used
421
*/
422
public void addPrincipal(
423
String user, char[] pass, String salt, byte[] s2kparams) {
424
if (user.indexOf('@') < 0) {
425
user = user + "@" + realm;
426
}
427
if (nativeKdc != null) {
428
if (!user.equals("krbtgt/" + realm)) {
429
nativeKdc.addPrincipal(user, new String(pass));
430
}
431
passwords.put(user, new char[0]);
432
} else {
433
passwords.put(user, pass);
434
if (salt != null) {
435
salts.put(user, salt);
436
}
437
if (s2kparams != null) {
438
s2kparamses.put(user, s2kparams);
439
}
440
}
441
}
442
443
/**
444
* Adds a new principal to this realm with a random password
445
* @param user the principal's name. For a service principal, use the
446
* form of host/f.q.d.n
447
*/
448
public void addPrincipalRandKey(String user) {
449
addPrincipal(user, randomPassword());
450
}
451
452
/**
453
* Returns the name of this realm
454
* @return the name of this realm
455
*/
456
public String getRealm() {
457
return realm;
458
}
459
460
/**
461
* Returns the name of kdc
462
* @return the name of kdc
463
*/
464
public String getKDC() {
465
return kdc;
466
}
467
468
/**
469
* Add realm-specific krb5.conf setting
470
*/
471
public void addConf(String s) {
472
conf.add(s);
473
}
474
475
/**
476
* Writes a krb5.conf for one or more KDC that includes KDC locations for
477
* each realm and the default realm name. You can also add extra strings
478
* into the file. The method should be called like:
479
* <pre>
480
* KDC.saveConfig("krb5.conf", kdc1, kdc2, ..., line1, line2, ...);
481
* </pre>
482
* Here you can provide one or more kdc# and zero or more line# arguments.
483
* The line# will be put after [libdefaults] and before [realms]. Therefore
484
* you can append new lines into [libdefaults] and/or create your new
485
* stanzas as well. Note that a newline character will be appended to
486
* each line# argument.
487
* <p>
488
* For example:
489
* <pre>
490
* KDC.saveConfig("krb5.conf", this);
491
* </pre>
492
* generates:
493
* <pre>
494
* [libdefaults]
495
* default_realm = REALM.NAME
496
*
497
* [realms]
498
* REALM.NAME = {
499
* kdc = host:port_number
500
* # realm-specific settings
501
* }
502
* </pre>
503
*
504
* Another example:
505
* <pre>
506
* KDC.saveConfig("krb5.conf", kdc1, kdc2, "forwardable = true", "",
507
* "[domain_realm]",
508
* ".kdc1.com = KDC1.NAME");
509
* </pre>
510
* generates:
511
* <pre>
512
* [libdefaults]
513
* default_realm = KDC1.NAME
514
* forwardable = true
515
*
516
* [domain_realm]
517
* .kdc1.com = KDC1.NAME
518
*
519
* [realms]
520
* KDC1.NAME = {
521
* kdc = host:port1
522
* }
523
* KDC2.NAME = {
524
* kdc = host:port2
525
* }
526
* </pre>
527
* @param file the name of the file to write into
528
* @param kdc the first (and default) KDC
529
* @param more more KDCs or extra lines (in their appearing order) to
530
* insert into the krb5.conf file. This method reads each argument's type
531
* to determine what it's for. This argument can be empty.
532
* @throws java.io.IOException for any file output error
533
*/
534
public static void saveConfig(String file, KDC kdc, Object... more)
535
throws IOException {
536
StringBuffer sb = new StringBuffer();
537
sb.append("[libdefaults]\ndefault_realm = ");
538
sb.append(kdc.realm);
539
sb.append("\n");
540
for (Object o : more) {
541
if (o instanceof String) {
542
sb.append(o);
543
sb.append("\n");
544
}
545
}
546
sb.append("\n[realms]\n");
547
sb.append(kdc.realmLine());
548
for (Object o : more) {
549
if (o instanceof KDC) {
550
sb.append(((KDC) o).realmLine());
551
}
552
}
553
Files.write(Paths.get(file), sb.toString().getBytes());
554
}
555
556
/**
557
* Returns the service port of the KDC server.
558
* @return the KDC service port
559
*/
560
public int getPort() {
561
return port;
562
}
563
564
/**
565
* Register an alias name to be referred to a different KDC for
566
* resolution, according to RFC 6806.
567
* @param alias Alias name (i.e. [email protected]).
568
* @param referredKDC KDC to which the alias is referred for resolution.
569
*/
570
public void registerAlias(String alias, KDC referredKDC) {
571
aliasReferrals.remove(alias);
572
aliasReferrals.put(alias, referredKDC);
573
}
574
575
/**
576
* Register an alias to be resolved to a Principal Name locally,
577
* according to RFC 6806.
578
* @param alias Alias name (i.e. [email protected]).
579
* @param user Principal Name to which the alias is resolved.
580
*/
581
public void registerAlias(String alias, String user)
582
throws RealmException {
583
alias2Principals.remove(alias);
584
alias2Principals.put(alias, new PrincipalName(user));
585
}
586
587
// Private helper methods
588
589
/**
590
* Private constructor, cannot be called outside.
591
* @param realm
592
*/
593
private KDC(String realm, String kdc) {
594
this.realm = realm;
595
this.kdc = kdc;
596
this.nativeKdc = null;
597
}
598
599
/**
600
* A constructor that starts the KDC service also.
601
*/
602
protected KDC(String realm, String kdc, int port, boolean asDaemon)
603
throws IOException {
604
this.realm = realm;
605
this.kdc = kdc;
606
this.nativeKdc = NativeKdc.get(this);
607
startServer(port, asDaemon);
608
}
609
/**
610
* Generates a 32-char random password
611
* @return the password
612
*/
613
private static char[] randomPassword() {
614
char[] pass = new char[32];
615
Random r = new Random();
616
for (int i=0; i<31; i++)
617
pass[i] = (char)('a' + r.nextInt(26));
618
// The last char cannot be a number, otherwise, keyForUser()
619
// believes it's a sign of kvno
620
pass[31] = 'Z';
621
return pass;
622
}
623
624
/**
625
* Generates a random key for the given encryption type.
626
* @param eType the encryption type
627
* @return the generated key
628
* @throws sun.security.krb5.KrbException for unknown/unsupported etype
629
*/
630
private static EncryptionKey generateRandomKey(int eType)
631
throws KrbException {
632
return genKey0(randomPassword(), "NOTHING", null, eType, null);
633
}
634
635
/**
636
* Returns the password for a given principal
637
* @param p principal
638
* @return the password
639
* @throws sun.security.krb5.KrbException when the principal is not inside
640
* the database.
641
*/
642
private char[] getPassword(PrincipalName p, boolean server)
643
throws KrbException {
644
String pn = p.toString();
645
if (p.getRealmString() == null) {
646
pn = pn + "@" + getRealm();
647
}
648
char[] pass = passwords.get(pn);
649
if (pass == null) {
650
throw new KrbException(server?
651
Krb5.KDC_ERR_S_PRINCIPAL_UNKNOWN:
652
Krb5.KDC_ERR_C_PRINCIPAL_UNKNOWN, pn.toString());
653
}
654
return pass;
655
}
656
657
/**
658
* Returns the salt string for the principal.
659
* @param p principal
660
* @return the salt
661
*/
662
protected String getSalt(PrincipalName p) {
663
String pn = p.toString();
664
if (p.getRealmString() == null) {
665
pn = pn + "@" + getRealm();
666
}
667
if (salts.containsKey(pn)) {
668
return salts.get(pn);
669
}
670
if (passwords.containsKey(pn)) {
671
try {
672
// Find the principal name with correct case.
673
p = new PrincipalName(passwords.ceilingEntry(pn).getKey());
674
} catch (RealmException re) {
675
// Won't happen
676
}
677
}
678
String s = p.getRealmString();
679
if (s == null) s = getRealm();
680
for (String n: p.getNameStrings()) {
681
s += n;
682
}
683
return s;
684
}
685
686
/**
687
* Returns the s2kparams for the principal given the etype.
688
* @param p principal
689
* @param etype encryption type
690
* @return the s2kparams, might be null
691
*/
692
protected byte[] getParams(PrincipalName p, int etype) {
693
switch (etype) {
694
case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96:
695
case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96:
696
case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA256_128:
697
case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA384_192:
698
String pn = p.toString();
699
if (p.getRealmString() == null) {
700
pn = pn + "@" + getRealm();
701
}
702
if (s2kparamses.containsKey(pn)) {
703
return s2kparamses.get(pn);
704
}
705
if (etype < EncryptedData.ETYPE_AES128_CTS_HMAC_SHA256_128) {
706
return new byte[]{0, 0, 0x10, 0};
707
} else {
708
return new byte[]{0, 0, (byte) 0x80, 0};
709
}
710
default:
711
return null;
712
}
713
}
714
715
/**
716
* Returns the key for a given principal of the given encryption type
717
* @param p the principal
718
* @param etype the encryption type
719
* @param server looking for a server principal?
720
* @return the key
721
* @throws sun.security.krb5.KrbException for unknown/unsupported etype
722
*/
723
EncryptionKey keyForUser(PrincipalName p, int etype, boolean server)
724
throws KrbException {
725
try {
726
// Do not call EncryptionKey.acquireSecretKeys(), otherwise
727
// the krb5.conf config file would be loaded.
728
Integer kvno = null;
729
// For service whose password ending with a number, use it as kvno.
730
// Kvno must be postive.
731
if (p.toString().indexOf('/') > 0) {
732
char[] pass = getPassword(p, server);
733
if (Character.isDigit(pass[pass.length-1])) {
734
kvno = pass[pass.length-1] - '0';
735
}
736
}
737
return genKey0(getPassword(p, server), getSalt(p),
738
getParams(p, etype), etype, kvno);
739
} catch (KrbException ke) {
740
throw ke;
741
} catch (Exception e) {
742
throw new RuntimeException(e); // should not happen
743
}
744
}
745
746
/**
747
* Returns a KerberosTime.
748
*
749
* @param offset offset from NOW in seconds
750
*/
751
private static KerberosTime timeAfter(int offset) {
752
return new KerberosTime(new Date().getTime() + offset * 1000L);
753
}
754
755
/**
756
* Generates key from password.
757
*/
758
private static EncryptionKey genKey0(
759
char[] pass, String salt, byte[] s2kparams,
760
int etype, Integer kvno) throws KrbException {
761
return new EncryptionKey(EncryptionKeyDotStringToKey(
762
pass, salt, s2kparams, etype),
763
etype, kvno);
764
}
765
766
/**
767
* Processes an incoming request and generates a response.
768
* @param in the request
769
* @return the response
770
* @throws java.lang.Exception for various errors
771
*/
772
protected byte[] processMessage(byte[] in) throws Exception {
773
if ((in[0] & 0x1f) == Krb5.KRB_AS_REQ)
774
return processAsReq(in);
775
else
776
return processTgsReq(in);
777
}
778
779
/**
780
* Processes a TGS_REQ and generates a TGS_REP (or KRB_ERROR)
781
* @param in the request
782
* @return the response
783
* @throws java.lang.Exception for various errors
784
*/
785
protected byte[] processTgsReq(byte[] in) throws Exception {
786
TGSReq tgsReq = new TGSReq(in);
787
PrincipalName service = tgsReq.reqBody.sname;
788
if (options.containsKey(KDC.Option.RESP_NT)) {
789
service = new PrincipalName((int)options.get(KDC.Option.RESP_NT),
790
service.getNameStrings(), service.getRealm());
791
}
792
try {
793
System.out.println(realm + "> " + tgsReq.reqBody.cname +
794
" sends TGS-REQ for " +
795
service + ", " + tgsReq.reqBody.kdcOptions);
796
KDCReqBody body = tgsReq.reqBody;
797
int[] eTypes = filterSupported(KDCReqBodyDotEType(body));
798
if (eTypes.length == 0) {
799
throw new KrbException(Krb5.KDC_ERR_ETYPE_NOSUPP);
800
}
801
int e2 = eTypes[0]; // etype for outgoing session key
802
int e3 = eTypes[0]; // etype for outgoing ticket
803
804
PAData[] pas = tgsReq.pAData;
805
806
Ticket tkt = null;
807
EncTicketPart etp = null;
808
809
PrincipalName cname = null;
810
boolean allowForwardable = true;
811
boolean isReferral = false;
812
if (body.kdcOptions.get(KDCOptions.CANONICALIZE)) {
813
System.out.println(realm + "> verifying referral for " +
814
body.sname.getNameString());
815
KDC referral = aliasReferrals.get(body.sname.getNameString());
816
if (referral != null) {
817
service = new PrincipalName(
818
PrincipalName.TGS_DEFAULT_SRV_NAME +
819
PrincipalName.NAME_COMPONENT_SEPARATOR_STR +
820
referral.getRealm(), PrincipalName.KRB_NT_SRV_INST,
821
this.getRealm());
822
System.out.println(realm + "> referral to " +
823
referral.getRealm());
824
isReferral = true;
825
}
826
}
827
828
if (pas == null || pas.length == 0) {
829
throw new KrbException(Krb5.KDC_ERR_PADATA_TYPE_NOSUPP);
830
} else {
831
PrincipalName forUserCName = null;
832
for (PAData pa: pas) {
833
if (pa.getType() == Krb5.PA_TGS_REQ) {
834
APReq apReq = new APReq(pa.getValue());
835
tkt = apReq.ticket;
836
int te = tkt.encPart.getEType();
837
EncryptionKey kkey = keyForUser(tkt.sname, te, true);
838
byte[] bb = tkt.encPart.decrypt(kkey, KeyUsage.KU_TICKET);
839
DerInputStream derIn = new DerInputStream(bb);
840
DerValue der = derIn.getDerValue();
841
etp = new EncTicketPart(der.toByteArray());
842
// Finally, cname will be overwritten by PA-FOR-USER
843
// if it exists.
844
cname = etp.cname;
845
System.out.println(realm + "> presenting a ticket of "
846
+ etp.cname + " to " + tkt.sname);
847
} else if (pa.getType() == Krb5.PA_FOR_USER) {
848
if (options.containsKey(Option.ALLOW_S4U2SELF)) {
849
PAForUserEnc p4u = new PAForUserEnc(
850
new DerValue(pa.getValue()), null);
851
forUserCName = p4u.name;
852
System.out.println(realm + "> See PA_FOR_USER "
853
+ " in the name of " + p4u.name);
854
}
855
}
856
}
857
if (forUserCName != null) {
858
List<String> names = (List<String>)
859
options.get(Option.ALLOW_S4U2SELF);
860
if (!names.contains(cname.toString())) {
861
// Mimic the normal KDC behavior. When a server is not
862
// allowed to send S4U2self, do not send an error.
863
// Instead, send a ticket which is useless later.
864
allowForwardable = false;
865
}
866
cname = forUserCName;
867
}
868
if (tkt == null) {
869
throw new KrbException(Krb5.KDC_ERR_PADATA_TYPE_NOSUPP);
870
}
871
}
872
873
// Session key for original ticket, TGT
874
EncryptionKey ckey = etp.key;
875
876
// Session key for session with the service
877
EncryptionKey key = generateRandomKey(e2);
878
879
// Check time, TODO
880
KerberosTime from = body.from;
881
KerberosTime till = body.till;
882
if (from == null || from.isZero()) {
883
from = timeAfter(0);
884
}
885
if (till == null) {
886
throw new KrbException(Krb5.KDC_ERR_NEVER_VALID); // TODO
887
} else if (till.isZero()) {
888
till = timeAfter(DEFAULT_LIFETIME);
889
}
890
891
boolean[] bFlags = new boolean[Krb5.TKT_OPTS_MAX+1];
892
if (body.kdcOptions.get(KDCOptions.FORWARDABLE)
893
&& allowForwardable) {
894
List<String> sensitives = (List<String>)
895
options.get(Option.SENSITIVE_ACCOUNTS);
896
if (sensitives != null && sensitives.contains(cname.toString())) {
897
// Cannot make FORWARDABLE
898
} else {
899
bFlags[Krb5.TKT_OPTS_FORWARDABLE] = true;
900
}
901
}
902
// We do not request for addresses for FORWARDED tickets
903
if (options.containsKey(Option.CHECK_ADDRESSES)
904
&& body.kdcOptions.get(KDCOptions.FORWARDED)
905
&& body.addresses != null) {
906
throw new KrbException(Krb5.KDC_ERR_BADOPTION);
907
}
908
if (body.kdcOptions.get(KDCOptions.FORWARDED) ||
909
etp.flags.get(Krb5.TKT_OPTS_FORWARDED)) {
910
bFlags[Krb5.TKT_OPTS_FORWARDED] = true;
911
}
912
if (body.kdcOptions.get(KDCOptions.RENEWABLE)) {
913
bFlags[Krb5.TKT_OPTS_RENEWABLE] = true;
914
//renew = timeAfter(3600 * 24 * 7);
915
}
916
if (body.kdcOptions.get(KDCOptions.PROXIABLE)) {
917
bFlags[Krb5.TKT_OPTS_PROXIABLE] = true;
918
}
919
if (body.kdcOptions.get(KDCOptions.POSTDATED)) {
920
bFlags[Krb5.TKT_OPTS_POSTDATED] = true;
921
}
922
if (body.kdcOptions.get(KDCOptions.ALLOW_POSTDATE)) {
923
bFlags[Krb5.TKT_OPTS_MAY_POSTDATE] = true;
924
}
925
if (body.kdcOptions.get(KDCOptions.CNAME_IN_ADDL_TKT)) {
926
if (!options.containsKey(Option.ALLOW_S4U2PROXY)) {
927
// Don't understand CNAME_IN_ADDL_TKT
928
throw new KrbException(Krb5.KDC_ERR_BADOPTION);
929
} else {
930
Map<String,List<String>> map = (Map<String,List<String>>)
931
options.get(Option.ALLOW_S4U2PROXY);
932
Ticket second = KDCReqBodyDotFirstAdditionalTicket(body);
933
EncryptionKey key2 = keyForUser(
934
second.sname, second.encPart.getEType(), true);
935
byte[] bb = second.encPart.decrypt(key2, KeyUsage.KU_TICKET);
936
DerInputStream derIn = new DerInputStream(bb);
937
DerValue der = derIn.getDerValue();
938
EncTicketPart tktEncPart = new EncTicketPart(der.toByteArray());
939
if (!tktEncPart.flags.get(Krb5.TKT_OPTS_FORWARDABLE)) {
940
//throw new KrbException(Krb5.KDC_ERR_BADOPTION);
941
}
942
PrincipalName client = tktEncPart.cname;
943
System.out.println(realm + "> and an additional ticket of "
944
+ client + " to " + second.sname);
945
if (map.containsKey(cname.toString())) {
946
if (map.get(cname.toString()).contains(service.toString())) {
947
System.out.println(realm + "> S4U2proxy OK");
948
} else {
949
throw new KrbException(Krb5.KDC_ERR_BADOPTION);
950
}
951
} else {
952
throw new KrbException(Krb5.KDC_ERR_BADOPTION);
953
}
954
cname = client;
955
}
956
}
957
958
String okAsDelegate = (String)options.get(Option.OK_AS_DELEGATE);
959
if (okAsDelegate != null && (
960
okAsDelegate.isEmpty() ||
961
okAsDelegate.contains(service.getNameString()))) {
962
bFlags[Krb5.TKT_OPTS_DELEGATE] = true;
963
}
964
bFlags[Krb5.TKT_OPTS_INITIAL] = true;
965
966
KerberosTime renewTill = etp.renewTill;
967
if (renewTill != null && body.kdcOptions.get(KDCOptions.RENEW)) {
968
// till should never pass renewTill
969
if (till.greaterThan(renewTill)) {
970
till = renewTill;
971
}
972
if (System.getProperty("test.set.null.renew") != null) {
973
// Testing 8186576, see NullRenewUntil.java.
974
renewTill = null;
975
}
976
}
977
978
TicketFlags tFlags = new TicketFlags(bFlags);
979
EncTicketPart enc = new EncTicketPart(
980
tFlags,
981
key,
982
cname,
983
new TransitedEncoding(1, new byte[0]), // TODO
984
timeAfter(0),
985
from,
986
till, renewTill,
987
body.addresses != null ? body.addresses
988
: etp.caddr,
989
null);
990
EncryptionKey skey = keyForUser(service, e3, true);
991
if (skey == null) {
992
throw new KrbException(Krb5.KDC_ERR_SUMTYPE_NOSUPP); // TODO
993
}
994
Ticket t = new Ticket(
995
System.getProperty("test.kdc.diff.sname") != null ?
996
new PrincipalName("xx" + service.toString()) :
997
service,
998
new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET)
999
);
1000
EncTGSRepPart enc_part = new EncTGSRepPart(
1001
key,
1002
new LastReq(new LastReqEntry[] {
1003
new LastReqEntry(0, timeAfter(-10))
1004
}),
1005
body.getNonce(), // TODO: detect replay
1006
timeAfter(3600 * 24),
1007
// Next 5 and last MUST be same with ticket
1008
tFlags,
1009
timeAfter(0),
1010
from,
1011
till, renewTill,
1012
service,
1013
body.addresses,
1014
null
1015
);
1016
EncryptedData edata = new EncryptedData(ckey, enc_part.asn1Encode(),
1017
KeyUsage.KU_ENC_TGS_REP_PART_SESSKEY);
1018
TGSRep tgsRep = new TGSRep(null,
1019
cname,
1020
t,
1021
edata);
1022
System.out.println(" Return " + tgsRep.cname
1023
+ " ticket for " + tgsRep.ticket.sname + ", flags "
1024
+ tFlags);
1025
1026
DerOutputStream out = new DerOutputStream();
1027
out.write(DerValue.createTag(DerValue.TAG_APPLICATION,
1028
true, (byte)Krb5.KRB_TGS_REP), tgsRep.asn1Encode());
1029
return out.toByteArray();
1030
} catch (KrbException ke) {
1031
ke.printStackTrace(System.out);
1032
KRBError kerr = ke.getError();
1033
KDCReqBody body = tgsReq.reqBody;
1034
System.out.println(" Error " + ke.returnCode()
1035
+ " " +ke.returnCodeMessage());
1036
if (kerr == null) {
1037
kerr = new KRBError(null, null, null,
1038
timeAfter(0),
1039
0,
1040
ke.returnCode(),
1041
body.cname,
1042
service,
1043
KrbException.errorMessage(ke.returnCode()),
1044
null);
1045
}
1046
return kerr.asn1Encode();
1047
}
1048
}
1049
1050
/**
1051
* Processes a AS_REQ and generates a AS_REP (or KRB_ERROR)
1052
* @param in the request
1053
* @return the response
1054
* @throws java.lang.Exception for various errors
1055
*/
1056
protected byte[] processAsReq(byte[] in) throws Exception {
1057
ASReq asReq = new ASReq(in);
1058
byte[] asReqbytes = asReq.asn1Encode();
1059
int[] eTypes = null;
1060
List<PAData> outPAs = new ArrayList<>();
1061
1062
PrincipalName service = asReq.reqBody.sname;
1063
if (options.containsKey(KDC.Option.RESP_NT)) {
1064
service = new PrincipalName((int)options.get(KDC.Option.RESP_NT),
1065
service.getNameStrings(),
1066
Realm.getDefault());
1067
}
1068
try {
1069
System.out.println(realm + "> " + asReq.reqBody.cname +
1070
" sends AS-REQ for " +
1071
service + ", " + asReq.reqBody.kdcOptions);
1072
1073
KDCReqBody body = asReq.reqBody;
1074
1075
eTypes = filterSupported(KDCReqBodyDotEType(body));
1076
if (eTypes.length == 0) {
1077
throw new KrbException(Krb5.KDC_ERR_ETYPE_NOSUPP);
1078
}
1079
int eType = eTypes[0];
1080
1081
if (body.kdcOptions.get(KDCOptions.CANONICALIZE)) {
1082
PrincipalName principal = alias2Principals.get(
1083
body.cname.getNameString());
1084
if (principal != null) {
1085
body.cname = principal;
1086
} else {
1087
KDC referral = aliasReferrals.get(body.cname.getNameString());
1088
if (referral != null) {
1089
body.cname = new PrincipalName(
1090
PrincipalName.TGS_DEFAULT_SRV_NAME,
1091
PrincipalName.KRB_NT_SRV_INST,
1092
referral.getRealm());
1093
throw new KrbException(Krb5.KRB_ERR_WRONG_REALM);
1094
}
1095
}
1096
}
1097
1098
EncryptionKey ckey = keyForUser(body.cname, eType, false);
1099
EncryptionKey skey = keyForUser(service, eType, true);
1100
1101
if (options.containsKey(KDC.Option.ONLY_RC4_TGT)) {
1102
int tgtEType = EncryptedData.ETYPE_ARCFOUR_HMAC;
1103
boolean found = false;
1104
for (int i=0; i<eTypes.length; i++) {
1105
if (eTypes[i] == tgtEType) {
1106
found = true;
1107
break;
1108
}
1109
}
1110
if (!found) {
1111
throw new KrbException(Krb5.KDC_ERR_ETYPE_NOSUPP);
1112
}
1113
skey = keyForUser(service, tgtEType, true);
1114
}
1115
if (ckey == null) {
1116
throw new KrbException(Krb5.KDC_ERR_ETYPE_NOSUPP);
1117
}
1118
if (skey == null) {
1119
throw new KrbException(Krb5.KDC_ERR_SUMTYPE_NOSUPP); // TODO
1120
}
1121
1122
// Session key
1123
EncryptionKey key = generateRandomKey(eType);
1124
// Check time, TODO
1125
KerberosTime from = body.from;
1126
KerberosTime till = body.till;
1127
KerberosTime rtime = body.rtime;
1128
if (from == null || from.isZero()) {
1129
from = timeAfter(0);
1130
}
1131
if (till == null) {
1132
throw new KrbException(Krb5.KDC_ERR_NEVER_VALID); // TODO
1133
} else if (till.isZero()) {
1134
till = timeAfter(DEFAULT_LIFETIME);
1135
} else if (till.greaterThan(timeAfter(24 * 3600))
1136
&& System.getProperty("test.kdc.force.till") == null) {
1137
// If till is more than 1 day later, make it renewable
1138
till = timeAfter(DEFAULT_LIFETIME);
1139
body.kdcOptions.set(KDCOptions.RENEWABLE, true);
1140
if (rtime == null) rtime = till;
1141
}
1142
if (rtime == null && body.kdcOptions.get(KDCOptions.RENEWABLE)) {
1143
rtime = timeAfter(DEFAULT_RENEWTIME);
1144
}
1145
//body.from
1146
boolean[] bFlags = new boolean[Krb5.TKT_OPTS_MAX+1];
1147
if (body.kdcOptions.get(KDCOptions.FORWARDABLE)) {
1148
List<String> sensitives = (List<String>)
1149
options.get(Option.SENSITIVE_ACCOUNTS);
1150
if (sensitives != null
1151
&& sensitives.contains(body.cname.toString())) {
1152
// Cannot make FORWARDABLE
1153
} else {
1154
bFlags[Krb5.TKT_OPTS_FORWARDABLE] = true;
1155
}
1156
}
1157
if (body.kdcOptions.get(KDCOptions.RENEWABLE)) {
1158
bFlags[Krb5.TKT_OPTS_RENEWABLE] = true;
1159
//renew = timeAfter(3600 * 24 * 7);
1160
}
1161
if (body.kdcOptions.get(KDCOptions.PROXIABLE)) {
1162
bFlags[Krb5.TKT_OPTS_PROXIABLE] = true;
1163
}
1164
if (body.kdcOptions.get(KDCOptions.POSTDATED)) {
1165
bFlags[Krb5.TKT_OPTS_POSTDATED] = true;
1166
}
1167
if (body.kdcOptions.get(KDCOptions.ALLOW_POSTDATE)) {
1168
bFlags[Krb5.TKT_OPTS_MAY_POSTDATE] = true;
1169
}
1170
bFlags[Krb5.TKT_OPTS_INITIAL] = true;
1171
if (System.getProperty("test.kdc.always.enc.pa.rep") != null) {
1172
bFlags[Krb5.TKT_OPTS_ENC_PA_REP] = true;
1173
}
1174
1175
// Creating PA-DATA
1176
DerValue[] pas2 = null, pas = null;
1177
if (options.containsKey(KDC.Option.DUP_ETYPE)) {
1178
int n = (Integer)options.get(KDC.Option.DUP_ETYPE);
1179
switch (n) {
1180
case 1: // customer's case in 7067974
1181
pas2 = new DerValue[] {
1182
new DerValue(new ETypeInfo2(1, null, null).asn1Encode()),
1183
new DerValue(new ETypeInfo2(1, "", null).asn1Encode()),
1184
new DerValue(new ETypeInfo2(
1185
1, realm, new byte[]{1}).asn1Encode()),
1186
};
1187
pas = new DerValue[] {
1188
new DerValue(new ETypeInfo(1, null).asn1Encode()),
1189
new DerValue(new ETypeInfo(1, "").asn1Encode()),
1190
new DerValue(new ETypeInfo(1, realm).asn1Encode()),
1191
};
1192
break;
1193
case 2: // we still reject non-null s2kparams and prefer E2 over E
1194
pas2 = new DerValue[] {
1195
new DerValue(new ETypeInfo2(
1196
1, realm, new byte[]{1}).asn1Encode()),
1197
new DerValue(new ETypeInfo2(1, null, null).asn1Encode()),
1198
new DerValue(new ETypeInfo2(1, "", null).asn1Encode()),
1199
};
1200
pas = new DerValue[] {
1201
new DerValue(new ETypeInfo(1, realm).asn1Encode()),
1202
new DerValue(new ETypeInfo(1, null).asn1Encode()),
1203
new DerValue(new ETypeInfo(1, "").asn1Encode()),
1204
};
1205
break;
1206
case 3: // but only E is wrong
1207
pas = new DerValue[] {
1208
new DerValue(new ETypeInfo(1, realm).asn1Encode()),
1209
new DerValue(new ETypeInfo(1, null).asn1Encode()),
1210
new DerValue(new ETypeInfo(1, "").asn1Encode()),
1211
};
1212
break;
1213
case 4: // we also ignore rc4-hmac
1214
pas = new DerValue[] {
1215
new DerValue(new ETypeInfo(23, "ANYTHING").asn1Encode()),
1216
new DerValue(new ETypeInfo(1, null).asn1Encode()),
1217
new DerValue(new ETypeInfo(1, "").asn1Encode()),
1218
};
1219
break;
1220
case 5: // "" should be wrong, but we accept it now
1221
// See s.s.k.internal.PAData$SaltAndParams
1222
pas = new DerValue[] {
1223
new DerValue(new ETypeInfo(1, "").asn1Encode()),
1224
new DerValue(new ETypeInfo(1, null).asn1Encode()),
1225
};
1226
break;
1227
}
1228
} else {
1229
int[] epas = eTypes;
1230
if (options.containsKey(KDC.Option.RC4_FIRST_PREAUTH)) {
1231
for (int i=1; i<epas.length; i++) {
1232
if (epas[i] == EncryptedData.ETYPE_ARCFOUR_HMAC) {
1233
epas[i] = epas[0];
1234
epas[0] = EncryptedData.ETYPE_ARCFOUR_HMAC;
1235
break;
1236
}
1237
};
1238
} else if (options.containsKey(KDC.Option.ONLY_ONE_PREAUTH)) {
1239
epas = new int[] { eTypes[0] };
1240
}
1241
pas2 = new DerValue[epas.length];
1242
for (int i=0; i<epas.length; i++) {
1243
pas2[i] = new DerValue(new ETypeInfo2(
1244
epas[i],
1245
epas[i] == EncryptedData.ETYPE_ARCFOUR_HMAC ?
1246
null : getSalt(body.cname),
1247
getParams(body.cname, epas[i])).asn1Encode());
1248
}
1249
boolean allOld = true;
1250
for (int i: eTypes) {
1251
if (i >= EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96 &&
1252
i != EncryptedData.ETYPE_ARCFOUR_HMAC) {
1253
allOld = false;
1254
break;
1255
}
1256
}
1257
if (allOld) {
1258
pas = new DerValue[epas.length];
1259
for (int i=0; i<epas.length; i++) {
1260
pas[i] = new DerValue(new ETypeInfo(
1261
epas[i],
1262
epas[i] == EncryptedData.ETYPE_ARCFOUR_HMAC ?
1263
null : getSalt(body.cname)
1264
).asn1Encode());
1265
}
1266
}
1267
}
1268
1269
DerOutputStream eid;
1270
if (pas2 != null) {
1271
eid = new DerOutputStream();
1272
eid.putSequence(pas2);
1273
outPAs.add(new PAData(Krb5.PA_ETYPE_INFO2, eid.toByteArray()));
1274
}
1275
if (pas != null) {
1276
eid = new DerOutputStream();
1277
eid.putSequence(pas);
1278
outPAs.add(new PAData(Krb5.PA_ETYPE_INFO, eid.toByteArray()));
1279
}
1280
1281
PAData[] inPAs = asReq.pAData;
1282
List<PAData> enc_outPAs = new ArrayList<>();
1283
1284
byte[] paEncTimestamp = null;
1285
if (inPAs != null) {
1286
for (PAData inPA : inPAs) {
1287
if (inPA.getType() == Krb5.PA_ENC_TIMESTAMP) {
1288
paEncTimestamp = inPA.getValue();
1289
}
1290
}
1291
}
1292
1293
if (paEncTimestamp == null) {
1294
Object preauth = options.get(Option.PREAUTH_REQUIRED);
1295
if (preauth == null || preauth.equals(Boolean.TRUE)) {
1296
throw new KrbException(Krb5.KDC_ERR_PREAUTH_REQUIRED);
1297
}
1298
} else {
1299
EncryptionKey pakey = null;
1300
try {
1301
EncryptedData data = newEncryptedData(
1302
new DerValue(paEncTimestamp));
1303
pakey = keyForUser(body.cname, data.getEType(), false);
1304
data.decrypt(pakey, KeyUsage.KU_PA_ENC_TS);
1305
} catch (Exception e) {
1306
KrbException ke = new KrbException(Krb5.KDC_ERR_PREAUTH_FAILED);
1307
ke.initCause(e);
1308
throw ke;
1309
}
1310
bFlags[Krb5.TKT_OPTS_PRE_AUTHENT] = true;
1311
for (PAData pa : inPAs) {
1312
if (pa.getType() == Krb5.PA_REQ_ENC_PA_REP) {
1313
Checksum ckSum = new Checksum(
1314
Checksum.CKSUMTYPE_HMAC_SHA1_96_AES128,
1315
asReqbytes, ckey, KeyUsage.KU_AS_REQ);
1316
enc_outPAs.add(new PAData(Krb5.PA_REQ_ENC_PA_REP,
1317
ckSum.asn1Encode()));
1318
bFlags[Krb5.TKT_OPTS_ENC_PA_REP] = true;
1319
break;
1320
}
1321
}
1322
}
1323
1324
TicketFlags tFlags = new TicketFlags(bFlags);
1325
EncTicketPart enc = new EncTicketPart(
1326
tFlags,
1327
key,
1328
body.cname,
1329
new TransitedEncoding(1, new byte[0]),
1330
timeAfter(0),
1331
from,
1332
till, rtime,
1333
body.addresses,
1334
null);
1335
Ticket t = new Ticket(
1336
service,
1337
new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET)
1338
);
1339
EncASRepPart enc_part = new EncASRepPart(
1340
key,
1341
new LastReq(new LastReqEntry[]{
1342
new LastReqEntry(0, timeAfter(-10))
1343
}),
1344
body.getNonce(), // TODO: detect replay?
1345
timeAfter(3600 * 24),
1346
// Next 5 and last MUST be same with ticket
1347
tFlags,
1348
timeAfter(0),
1349
from,
1350
till, rtime,
1351
service,
1352
body.addresses,
1353
enc_outPAs.toArray(new PAData[enc_outPAs.size()])
1354
);
1355
EncryptedData edata = new EncryptedData(ckey, enc_part.asn1Encode(),
1356
KeyUsage.KU_ENC_AS_REP_PART);
1357
ASRep asRep = new ASRep(
1358
outPAs.toArray(new PAData[outPAs.size()]),
1359
body.cname,
1360
t,
1361
edata);
1362
1363
System.out.println(" Return " + asRep.cname
1364
+ " ticket for " + asRep.ticket.sname + ", flags "
1365
+ tFlags);
1366
1367
DerOutputStream out = new DerOutputStream();
1368
out.write(DerValue.createTag(DerValue.TAG_APPLICATION,
1369
true, (byte)Krb5.KRB_AS_REP), asRep.asn1Encode());
1370
byte[] result = out.toByteArray();
1371
1372
// Added feature:
1373
// Write the current issuing TGT into a ccache file specified
1374
// by the system property below.
1375
String ccache = System.getProperty("test.kdc.save.ccache");
1376
if (ccache != null) {
1377
asRep.encKDCRepPart = enc_part;
1378
sun.security.krb5.internal.ccache.Credentials credentials =
1379
new sun.security.krb5.internal.ccache.Credentials(asRep);
1380
CredentialsCache cache =
1381
CredentialsCache.create(asReq.reqBody.cname, ccache);
1382
if (cache == null) {
1383
throw new IOException("Unable to create the cache file " +
1384
ccache);
1385
}
1386
cache.update(credentials);
1387
cache.save();
1388
}
1389
1390
return result;
1391
} catch (KrbException ke) {
1392
ke.printStackTrace(System.out);
1393
KRBError kerr = ke.getError();
1394
KDCReqBody body = asReq.reqBody;
1395
System.out.println(" Error " + ke.returnCode()
1396
+ " " +ke.returnCodeMessage());
1397
byte[] eData = null;
1398
if (kerr == null) {
1399
if (ke.returnCode() == Krb5.KDC_ERR_PREAUTH_REQUIRED ||
1400
ke.returnCode() == Krb5.KDC_ERR_PREAUTH_FAILED) {
1401
outPAs.add(new PAData(Krb5.PA_ENC_TIMESTAMP, new byte[0]));
1402
}
1403
if (outPAs.size() > 0) {
1404
DerOutputStream bytes = new DerOutputStream();
1405
for (PAData p: outPAs) {
1406
bytes.write(p.asn1Encode());
1407
}
1408
DerOutputStream temp = new DerOutputStream();
1409
temp.write(DerValue.tag_Sequence, bytes);
1410
eData = temp.toByteArray();
1411
}
1412
kerr = new KRBError(null, null, null,
1413
timeAfter(0),
1414
0,
1415
ke.returnCode(),
1416
body.cname,
1417
service,
1418
KrbException.errorMessage(ke.returnCode()),
1419
eData);
1420
}
1421
return kerr.asn1Encode();
1422
}
1423
}
1424
1425
private int[] filterSupported(int[] input) {
1426
int count = 0;
1427
for (int i = 0; i < input.length; i++) {
1428
if (!EType.isSupported(input[i])) {
1429
continue;
1430
}
1431
if (SUPPORTED_ETYPES != null) {
1432
boolean supported = false;
1433
for (String se : SUPPORTED_ETYPES.split(",")) {
1434
if (Config.getType(se) == input[i]) {
1435
supported = true;
1436
break;
1437
}
1438
}
1439
if (!supported) {
1440
continue;
1441
}
1442
}
1443
if (count != i) {
1444
input[count] = input[i];
1445
}
1446
count++;
1447
}
1448
if (count != input.length) {
1449
input = Arrays.copyOf(input, count);
1450
}
1451
return input;
1452
}
1453
1454
/**
1455
* Generates a line for a KDC to put inside [realms] of krb5.conf
1456
* @return REALM.NAME = { kdc = host:port etc }
1457
*/
1458
private String realmLine() {
1459
StringBuilder sb = new StringBuilder();
1460
sb.append(realm).append(" = {\n kdc = ")
1461
.append(kdc).append(':').append(port).append('\n');
1462
for (String s: conf) {
1463
sb.append(" ").append(s).append('\n');
1464
}
1465
return sb.append("}\n").toString();
1466
}
1467
1468
/**
1469
* Start the KDC service. This server listens on both UDP and TCP using
1470
* the same port number. It uses three threads to deal with requests.
1471
* They can be set to daemon threads if requested.
1472
* @param port the port number to listen to. If zero, a random available
1473
* port no less than 8000 will be chosen and used.
1474
* @param asDaemon true if the KDC threads should be daemons
1475
* @throws java.io.IOException for any communication error
1476
*/
1477
protected void startServer(int port, boolean asDaemon) throws IOException {
1478
if (nativeKdc != null) {
1479
startNativeServer(port, asDaemon);
1480
} else {
1481
startJavaServer(port, asDaemon);
1482
}
1483
}
1484
1485
private void startNativeServer(int port, boolean asDaemon) throws IOException {
1486
nativeKdc.prepare();
1487
nativeKdc.init();
1488
kdcProc = nativeKdc.kdc();
1489
}
1490
1491
private void startJavaServer(int port, boolean asDaemon) throws IOException {
1492
if (port > 0) {
1493
u1 = new DatagramSocket(port, InetAddress.getByName("127.0.0.1"));
1494
t1 = new ServerSocket(port);
1495
} else {
1496
while (true) {
1497
// Try to find a port number that's both TCP and UDP free
1498
try {
1499
port = 8000 + new java.util.Random().nextInt(10000);
1500
u1 = null;
1501
u1 = new DatagramSocket(port, InetAddress.getByName("127.0.0.1"));
1502
t1 = new ServerSocket(port);
1503
break;
1504
} catch (Exception e) {
1505
if (u1 != null) u1.close();
1506
}
1507
}
1508
}
1509
final DatagramSocket udp = u1;
1510
final ServerSocket tcp = t1;
1511
System.out.println("Start KDC on " + port);
1512
1513
this.port = port;
1514
1515
// The UDP consumer
1516
thread1 = new Thread() {
1517
public void run() {
1518
udpConsumerReady = true;
1519
while (true) {
1520
try {
1521
byte[] inbuf = new byte[8192];
1522
DatagramPacket p = new DatagramPacket(inbuf, inbuf.length);
1523
udp.receive(p);
1524
System.out.println("-----------------------------------------------");
1525
System.out.println(">>>>> UDP packet received");
1526
q.put(new Job(processMessage(Arrays.copyOf(inbuf, p.getLength())), udp, p));
1527
} catch (Exception e) {
1528
e.printStackTrace();
1529
}
1530
}
1531
}
1532
};
1533
thread1.setDaemon(asDaemon);
1534
thread1.start();
1535
1536
// The TCP consumer
1537
thread2 = new Thread() {
1538
public void run() {
1539
tcpConsumerReady = true;
1540
while (true) {
1541
try {
1542
Socket socket = tcp.accept();
1543
System.out.println("-----------------------------------------------");
1544
System.out.println(">>>>> TCP connection established");
1545
DataInputStream in = new DataInputStream(socket.getInputStream());
1546
DataOutputStream out = new DataOutputStream(socket.getOutputStream());
1547
int len = in.readInt();
1548
if (len > 65535) {
1549
throw new Exception("Huge request not supported");
1550
}
1551
byte[] token = new byte[len];
1552
in.readFully(token);
1553
q.put(new Job(processMessage(token), socket, out));
1554
} catch (Exception e) {
1555
e.printStackTrace();
1556
}
1557
}
1558
}
1559
};
1560
thread2.setDaemon(asDaemon);
1561
thread2.start();
1562
1563
// The dispatcher
1564
thread3 = new Thread() {
1565
public void run() {
1566
dispatcherReady = true;
1567
while (true) {
1568
try {
1569
q.take().send();
1570
} catch (Exception e) {
1571
}
1572
}
1573
}
1574
};
1575
thread3.setDaemon(true);
1576
thread3.start();
1577
1578
// wait for the KDC is ready
1579
try {
1580
while (!isReady()) {
1581
Thread.sleep(100);
1582
}
1583
} catch(InterruptedException e) {
1584
throw new IOException(e);
1585
}
1586
}
1587
1588
public void kinit(String user, String ccache) throws Exception {
1589
if (user.indexOf('@') < 0) {
1590
user = user + "@" + realm;
1591
}
1592
if (nativeKdc != null) {
1593
nativeKdc.kinit(user, ccache);
1594
} else {
1595
Context.fromUserPass(user, passwords.get(user), false)
1596
.ccache(ccache);
1597
}
1598
}
1599
1600
boolean isReady() {
1601
return udpConsumerReady && tcpConsumerReady && dispatcherReady;
1602
}
1603
1604
public void terminate() {
1605
if (nativeKdc != null) {
1606
System.out.println("Killing kdc...");
1607
kdcProc.destroyForcibly();
1608
System.out.println("Done");
1609
} else {
1610
try {
1611
thread1.stop();
1612
thread2.stop();
1613
thread3.stop();
1614
u1.close();
1615
t1.close();
1616
} catch (Exception e) {
1617
// OK
1618
}
1619
}
1620
}
1621
1622
public static KDC startKDC(final String host, final String krbConfFileName,
1623
final String realm, final Map<String, String> principals,
1624
final String ktab, final KtabMode mode) {
1625
1626
KDC kdc;
1627
try {
1628
kdc = KDC.create(realm, host, 0, true);
1629
kdc.setOption(KDC.Option.PREAUTH_REQUIRED, Boolean.FALSE);
1630
if (krbConfFileName != null) {
1631
KDC.saveConfig(krbConfFileName, kdc);
1632
}
1633
1634
// Add principals
1635
if (principals != null) {
1636
principals.forEach((name, password) -> {
1637
if (password == null || password.isEmpty()) {
1638
System.out.println(String.format(
1639
"KDC:add a principal '%s' with a random " +
1640
"password", name));
1641
kdc.addPrincipalRandKey(name);
1642
} else {
1643
System.out.println(String.format(
1644
"KDC:add a principal '%s' with '%s' password",
1645
name, password));
1646
kdc.addPrincipal(name, password.toCharArray());
1647
}
1648
});
1649
}
1650
1651
// Create or append keys to existing keytab file
1652
if (ktab != null) {
1653
File ktabFile = new File(ktab);
1654
switch(mode) {
1655
case APPEND:
1656
if (ktabFile.exists()) {
1657
System.out.println(String.format(
1658
"KDC:append keys to an exising keytab "
1659
+ "file %s", ktab));
1660
kdc.appendKtab(ktab);
1661
} else {
1662
System.out.println(String.format(
1663
"KDC:create a new keytab file %s", ktab));
1664
kdc.writeKtab(ktab);
1665
}
1666
break;
1667
case EXISTING:
1668
System.out.println(String.format(
1669
"KDC:use an existing keytab file %s", ktab));
1670
break;
1671
default:
1672
throw new RuntimeException(String.format(
1673
"KDC:unsupported keytab mode: %s", mode));
1674
}
1675
}
1676
1677
System.out.println(String.format(
1678
"KDC: started on %s:%s with '%s' realm",
1679
host, kdc.getPort(), realm));
1680
} catch (Exception e) {
1681
throw new RuntimeException("KDC: unexpected exception", e);
1682
}
1683
1684
return kdc;
1685
}
1686
1687
/**
1688
* Helper class to encapsulate a job in a KDC.
1689
*/
1690
private static class Job {
1691
byte[] token; // The received request at creation time and
1692
// the response at send time
1693
Socket s; // The TCP socket from where the request comes
1694
DataOutputStream out; // The OutputStream of the TCP socket
1695
DatagramSocket s2; // The UDP socket from where the request comes
1696
DatagramPacket dp; // The incoming UDP datagram packet
1697
boolean useTCP; // Whether TCP or UDP is used
1698
1699
// Creates a job object for TCP
1700
Job(byte[] token, Socket s, DataOutputStream out) {
1701
useTCP = true;
1702
this.token = token;
1703
this.s = s;
1704
this.out = out;
1705
}
1706
1707
// Creates a job object for UDP
1708
Job(byte[] token, DatagramSocket s2, DatagramPacket dp) {
1709
useTCP = false;
1710
this.token = token;
1711
this.s2 = s2;
1712
this.dp = dp;
1713
}
1714
1715
// Sends the output back to the client
1716
void send() {
1717
try {
1718
if (useTCP) {
1719
System.out.println(">>>>> TCP request honored");
1720
out.writeInt(token.length);
1721
out.write(token);
1722
s.close();
1723
} else {
1724
System.out.println(">>>>> UDP request honored");
1725
s2.send(new DatagramPacket(token, token.length, dp.getAddress(), dp.getPort()));
1726
}
1727
} catch (Exception e) {
1728
e.printStackTrace();
1729
}
1730
}
1731
}
1732
1733
/**
1734
* A native KDC using the binaries in nativePath. Attention:
1735
* this is using binaries, not an existing KDC instance.
1736
* An implementation of this takes care of configuration,
1737
* principal db managing and KDC startup.
1738
*/
1739
static abstract class NativeKdc {
1740
1741
protected Map<String,String> env;
1742
protected String nativePath;
1743
protected String base;
1744
protected String realm;
1745
protected int port;
1746
1747
NativeKdc(String nativePath, KDC kdc) {
1748
if (kdc.port == 0) {
1749
kdc.port = 8000 + new java.util.Random().nextInt(10000);
1750
}
1751
this.nativePath = nativePath;
1752
this.realm = kdc.realm;
1753
this.port = kdc.port;
1754
this.base = Paths.get("" + port).toAbsolutePath().toString();
1755
}
1756
1757
// Add a new principal
1758
abstract void addPrincipal(String user, String pass);
1759
// Add a keytab entry
1760
abstract void ktadd(String user, String ktab);
1761
// Initialize KDC
1762
abstract void init();
1763
// Start kdc
1764
abstract Process kdc();
1765
// Configuration
1766
abstract void prepare();
1767
// Fill ccache
1768
abstract void kinit(String user, String ccache);
1769
1770
static NativeKdc get(KDC kdc) {
1771
String prop = System.getProperty("native.kdc.path");
1772
if (prop == null) {
1773
return null;
1774
} else if (Files.exists(Paths.get(prop, "sbin/krb5kdc"))) {
1775
return new MIT(true, prop, kdc);
1776
} else if (Files.exists(Paths.get(prop, "kdc/krb5kdc"))) {
1777
return new MIT(false, prop, kdc);
1778
} else if (Files.exists(Paths.get(prop, "libexec/kdc"))) {
1779
return new Heimdal(prop, kdc);
1780
} else {
1781
throw new IllegalArgumentException("Strange " + prop);
1782
}
1783
}
1784
1785
Process run(boolean wait, String... cmd) {
1786
try {
1787
System.out.println("Running " + cmd2str(env, cmd));
1788
ProcessBuilder pb = new ProcessBuilder();
1789
pb.inheritIO();
1790
pb.environment().putAll(env);
1791
Process p = pb.command(cmd).start();
1792
if (wait) {
1793
if (p.waitFor() < 0) {
1794
throw new RuntimeException("exit code is not null");
1795
}
1796
return null;
1797
} else {
1798
return p;
1799
}
1800
} catch (Exception e) {
1801
throw new RuntimeException(e);
1802
}
1803
}
1804
1805
private String cmd2str(Map<String,String> env, String... cmd) {
1806
return env.entrySet().stream().map(e -> e.getKey()+"="+e.getValue())
1807
.collect(Collectors.joining(" ")) + " " +
1808
Stream.of(cmd).collect(Collectors.joining(" "));
1809
}
1810
}
1811
1812
// Heimdal KDC. Build your own and run "make install" to nativePath.
1813
static class Heimdal extends NativeKdc {
1814
1815
Heimdal(String nativePath, KDC kdc) {
1816
super(nativePath, kdc);
1817
this.env = Map.of(
1818
"KRB5_CONFIG", base + "/krb5.conf",
1819
"KRB5_TRACE", "/dev/stderr",
1820
Platform.sharedLibraryPathVariableName(), nativePath + "/lib");
1821
}
1822
1823
@Override
1824
public void addPrincipal(String user, String pass) {
1825
run(true, nativePath + "/bin/kadmin", "-l", "-r", realm,
1826
"add", "-p", pass, "--use-defaults", user);
1827
}
1828
1829
@Override
1830
public void ktadd(String user, String ktab) {
1831
run(true, nativePath + "/bin/kadmin", "-l", "-r", realm,
1832
"ext_keytab", "-k", ktab, user);
1833
}
1834
1835
@Override
1836
public void init() {
1837
run(true, nativePath + "/bin/kadmin", "-l", "-r", realm,
1838
"init", "--realm-max-ticket-life=1day",
1839
"--realm-max-renewable-life=1month", realm);
1840
}
1841
1842
@Override
1843
public Process kdc() {
1844
return run(false, nativePath + "/libexec/kdc",
1845
"--addresses=127.0.0.1", "-P", "" + port);
1846
}
1847
1848
@Override
1849
public void prepare() {
1850
try {
1851
Files.createDirectory(Paths.get(base));
1852
Files.write(Paths.get(base + "/krb5.conf"), Arrays.asList(
1853
"[libdefaults]",
1854
"default_realm = " + realm,
1855
"default_keytab_name = FILE:" + base + "/krb5.keytab",
1856
"forwardable = true",
1857
"dns_lookup_kdc = no",
1858
"dns_lookup_realm = no",
1859
"dns_canonicalize_hostname = false",
1860
"\n[realms]",
1861
realm + " = {",
1862
" kdc = localhost:" + port,
1863
"}",
1864
"\n[kdc]",
1865
"db-dir = " + base,
1866
"database = {",
1867
" label = {",
1868
" dbname = " + base + "/current-db",
1869
" realm = " + realm,
1870
" mkey_file = " + base + "/mkey.file",
1871
" acl_file = " + base + "/heimdal.acl",
1872
" log_file = " + base + "/current.log",
1873
" }",
1874
"}",
1875
SUPPORTED_ETYPES == null ? ""
1876
: ("\n[kadmin]\ndefault_keys = "
1877
+ (SUPPORTED_ETYPES + ",")
1878
.replaceAll(",", ":pw-salt ")),
1879
"\n[logging]",
1880
"kdc = 0-/FILE:" + base + "/messages.log",
1881
"krb5 = 0-/FILE:" + base + "/messages.log",
1882
"default = 0-/FILE:" + base + "/messages.log"
1883
));
1884
} catch (IOException e) {
1885
throw new UncheckedIOException(e);
1886
}
1887
}
1888
1889
@Override
1890
void kinit(String user, String ccache) {
1891
String tmpName = base + "/" + user + "." +
1892
System.identityHashCode(this) + ".keytab";
1893
ktadd(user, tmpName);
1894
run(true, nativePath + "/bin/kinit",
1895
"-f", "-t", tmpName, "-c", ccache, user);
1896
}
1897
}
1898
1899
// MIT krb5 KDC. Make your own exploded (install == false), or
1900
// "make install" into nativePath (install == true).
1901
static class MIT extends NativeKdc {
1902
1903
private boolean install; // "make install" or "make"
1904
1905
MIT(boolean install, String nativePath, KDC kdc) {
1906
super(nativePath, kdc);
1907
this.install = install;
1908
this.env = Map.of(
1909
"KRB5_KDC_PROFILE", base + "/kdc.conf",
1910
"KRB5_CONFIG", base + "/krb5.conf",
1911
"KRB5_TRACE", "/dev/stderr",
1912
Platform.sharedLibraryPathVariableName(), nativePath + "/lib");
1913
}
1914
1915
@Override
1916
public void addPrincipal(String user, String pass) {
1917
run(true, nativePath +
1918
(install ? "/sbin/" : "/kadmin/cli/") + "kadmin.local",
1919
"-q", "addprinc -pw " + pass + " " + user);
1920
}
1921
1922
@Override
1923
public void ktadd(String user, String ktab) {
1924
run(true, nativePath +
1925
(install ? "/sbin/" : "/kadmin/cli/") + "kadmin.local",
1926
"-q", "ktadd -k " + ktab + " -norandkey " + user);
1927
}
1928
1929
@Override
1930
public void init() {
1931
run(true, nativePath +
1932
(install ? "/sbin/" : "/kadmin/dbutil/") + "kdb5_util",
1933
"create", "-s", "-W", "-P", "olala");
1934
}
1935
1936
@Override
1937
public Process kdc() {
1938
return run(false, nativePath +
1939
(install ? "/sbin/" : "/kdc/") + "krb5kdc",
1940
"-n");
1941
}
1942
1943
@Override
1944
public void prepare() {
1945
try {
1946
Files.createDirectory(Paths.get(base));
1947
Files.write(Paths.get(base + "/kdc.conf"), Arrays.asList(
1948
"[kdcdefaults]",
1949
"\n[realms]",
1950
realm + "= {",
1951
" kdc_listen = " + this.port,
1952
" kdc_tcp_listen = " + this.port,
1953
" database_name = " + base + "/principal",
1954
" key_stash_file = " + base + "/.k5.ATHENA.MIT.EDU",
1955
SUPPORTED_ETYPES == null ? ""
1956
: (" supported_enctypes = "
1957
+ (SUPPORTED_ETYPES + ",")
1958
.replaceAll(",", ":normal ")),
1959
"}"
1960
));
1961
Files.write(Paths.get(base + "/krb5.conf"), Arrays.asList(
1962
"[libdefaults]",
1963
"default_realm = " + realm,
1964
"default_keytab_name = FILE:" + base + "/krb5.keytab",
1965
"forwardable = true",
1966
"dns_lookup_kdc = no",
1967
"dns_lookup_realm = no",
1968
"dns_canonicalize_hostname = false",
1969
"\n[realms]",
1970
realm + " = {",
1971
" kdc = localhost:" + port,
1972
"}",
1973
"\n[logging]",
1974
"kdc = FILE:" + base + "/krb5kdc.log"
1975
));
1976
} catch (IOException e) {
1977
throw new UncheckedIOException(e);
1978
}
1979
}
1980
1981
@Override
1982
void kinit(String user, String ccache) {
1983
String tmpName = base + "/" + user + "." +
1984
System.identityHashCode(this) + ".keytab";
1985
ktadd(user, tmpName);
1986
run(true, nativePath +
1987
(install ? "/bin/" : "/clients/kinit/") + "kinit",
1988
"-f", "-t", tmpName, "-c", ccache, user);
1989
}
1990
}
1991
1992
// Calling private methods thru reflections
1993
private static final Field getEType;
1994
private static final Constructor<EncryptedData> ctorEncryptedData;
1995
private static final Method stringToKey;
1996
private static final Field getAddlTkt;
1997
1998
static {
1999
try {
2000
ctorEncryptedData = EncryptedData.class.getDeclaredConstructor(DerValue.class);
2001
ctorEncryptedData.setAccessible(true);
2002
getEType = KDCReqBody.class.getDeclaredField("eType");
2003
getEType.setAccessible(true);
2004
stringToKey = EncryptionKey.class.getDeclaredMethod(
2005
"stringToKey",
2006
char[].class, String.class, byte[].class, Integer.TYPE);
2007
stringToKey.setAccessible(true);
2008
getAddlTkt = KDCReqBody.class.getDeclaredField("additionalTickets");
2009
getAddlTkt.setAccessible(true);
2010
} catch (NoSuchFieldException nsfe) {
2011
throw new AssertionError(nsfe);
2012
} catch (NoSuchMethodException nsme) {
2013
throw new AssertionError(nsme);
2014
}
2015
}
2016
private EncryptedData newEncryptedData(DerValue der) {
2017
try {
2018
return ctorEncryptedData.newInstance(der);
2019
} catch (Exception e) {
2020
throw new AssertionError(e);
2021
}
2022
}
2023
private static int[] KDCReqBodyDotEType(KDCReqBody body) {
2024
try {
2025
return (int[]) getEType.get(body);
2026
} catch (Exception e) {
2027
throw new AssertionError(e);
2028
}
2029
}
2030
private static byte[] EncryptionKeyDotStringToKey(char[] password, String salt,
2031
byte[] s2kparams, int keyType) throws KrbCryptoException {
2032
try {
2033
return (byte[])stringToKey.invoke(
2034
null, password, salt, s2kparams, keyType);
2035
} catch (InvocationTargetException ex) {
2036
throw (KrbCryptoException)ex.getCause();
2037
} catch (Exception e) {
2038
throw new AssertionError(e);
2039
}
2040
}
2041
private static Ticket KDCReqBodyDotFirstAdditionalTicket(KDCReqBody body) {
2042
try {
2043
return ((Ticket[])getAddlTkt.get(body))[0];
2044
} catch (Exception e) {
2045
throw new AssertionError(e);
2046
}
2047
}
2048
}
2049
2050