Path: blob/master/test/jdk/sun/security/krb5/auto/KeyTabCompat.java
41152 views
/*1* Copyright (c) 2011, 2018, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223/*24* @test25* @bug 6894072 8004488 819448626* @summary always refresh keytab27* @library /test/lib28* @compile -XDignore.symbol.file KeyTabCompat.java29* @run main jdk.test.lib.FileInstaller TestHosts TestHosts30* @run main/othervm -Djdk.net.hosts.file=TestHosts KeyTabCompat31*/3233import javax.security.auth.kerberos.KerberosKey;34import sun.security.jgss.GSSUtil;3536/*37* There are 2 compat issues to check:38*39* 1. If there is only KerberosKeys in private credential set and no40* KerberosPrincipal. JAAS login should go on.41* 2. If KeyTab is used, user won't get KerberosKeys from42* private credentials set.43*/44public class KeyTabCompat {4546public static void main(String[] args)47throws Exception {48OneKDC kdc = new OneKDC("aes128-cts");49kdc.writeJAASConf();50kdc.addPrincipal(OneKDC.SERVER, "pass1".toCharArray());51kdc.writeKtab(OneKDC.KTAB);5253Context c, s;5455// Part 156c = Context.fromUserPass(OneKDC.USER, OneKDC.PASS, false);57s = Context.fromUserPass(OneKDC.USER2, OneKDC.PASS2, true);5859s.s().getPrincipals().clear();6061c.startAsClient(OneKDC.USER2, GSSUtil.GSS_KRB5_MECH_OID);62s.startAsServer(GSSUtil.GSS_KRB5_MECH_OID);6364Context.handshake(c, s);6566// Part 267c = Context.fromJAAS("client");68s = Context.fromJAAS("server");6970c.startAsClient(OneKDC.SERVER, GSSUtil.GSS_KRB5_MECH_OID);71s.startAsServer(GSSUtil.GSS_KRB5_MECH_OID);72s.status();7374if (s.s().getPrivateCredentials(KerberosKey.class).size() != 0) {75throw new Exception("There should be no KerberosKey");76}77}78}798081