mirror of
https://github.com/openjdk/jdk.git
synced 2025-09-16 09:04:41 +02:00
8187443: Forest Consolidation: Move files to unified layout
Reviewed-by: darcy, ihse
This commit is contained in:
parent
270fe13182
commit
3789983e89
56923 changed files with 3 additions and 15727 deletions
|
@ -0,0 +1,342 @@
|
|||
/*
|
||||
* Copyright (c) 2000, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation. Oracle designates this
|
||||
* particular file as subject to the "Classpath" exception as provided
|
||||
* by Oracle in the LICENSE file that accompanied this code.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
package javax.security.auth.kerberos;
|
||||
|
||||
import java.util.Arrays;
|
||||
import javax.crypto.SecretKey;
|
||||
import javax.security.auth.DestroyFailedException;
|
||||
|
||||
/**
|
||||
* This class encapsulates a long term secret key for a Kerberos
|
||||
* principal.<p>
|
||||
*
|
||||
* A {@code KerberosKey} object includes an EncryptionKey, a
|
||||
* {@link KerberosPrincipal} as its owner, and the version number
|
||||
* of the key.<p>
|
||||
*
|
||||
* An EncryptionKey is defined in Section 4.2.9 of the Kerberos Protocol
|
||||
* Specification (<a href=http://www.ietf.org/rfc/rfc4120.txt>RFC 4120</a>) as:
|
||||
* <pre>
|
||||
* EncryptionKey ::= SEQUENCE {
|
||||
* keytype [0] Int32 -- actually encryption type --,
|
||||
* keyvalue [1] OCTET STRING
|
||||
* }
|
||||
* </pre>
|
||||
* The key material of a {@code KerberosKey} is defined as the value
|
||||
* of the {@code keyValue} above.<p>
|
||||
*
|
||||
* All Kerberos JAAS login modules that obtain a principal's password and
|
||||
* generate the secret key from it should use this class.
|
||||
* Sometimes, such as when authenticating a server in
|
||||
* the absence of user-to-user authentication, the login module will store
|
||||
* an instance of this class in the private credential set of a
|
||||
* {@link javax.security.auth.Subject Subject} during the commit phase of the
|
||||
* authentication process.<p>
|
||||
*
|
||||
* A Kerberos service using a keytab to read secret keys should use
|
||||
* the {@link KeyTab} class, where latest keys can be read when needed.<p>
|
||||
*
|
||||
* It might be necessary for the application to be granted a
|
||||
* {@link javax.security.auth.PrivateCredentialPermission
|
||||
* PrivateCredentialPermission} if it needs to access the {@code KerberosKey}
|
||||
* instance from a Subject. This permission is not needed when the
|
||||
* application depends on the default JGSS Kerberos mechanism to access the
|
||||
* {@code KerberosKey}. In that case, however, the application will need an
|
||||
* appropriate
|
||||
* {@link javax.security.auth.kerberos.ServicePermission ServicePermission}.<p>
|
||||
*
|
||||
* When creating a {@code KerberosKey} using the
|
||||
* {@link #KerberosKey(KerberosPrincipal, char[], String)} constructor,
|
||||
* an implementation may accept non-IANA algorithm names (For example,
|
||||
* "ArcFourMac" for "rc4-hmac"), but the {@link #getAlgorithm} method
|
||||
* must always return the IANA algorithm name.
|
||||
*
|
||||
* @implNote Old algorithm names used before JDK 9 are supported in the
|
||||
* {@link #KerberosKey(KerberosPrincipal, char[], String)} constructor in this
|
||||
* implementation for compatibility reasons, which are "DES" (and null) for
|
||||
* "des-cbc-md5", "DESede" for "des3-cbc-sha1-kd", "ArcFourHmac" for "rc4-hmac",
|
||||
* "AES128" for "aes128-cts-hmac-sha1-96", and "AES256" for
|
||||
* "aes256-cts-hmac-sha1-96".
|
||||
*
|
||||
* @author Mayank Upadhyay
|
||||
* @since 1.4
|
||||
*/
|
||||
public class KerberosKey implements SecretKey {
|
||||
|
||||
private static final long serialVersionUID = -4625402278148246993L;
|
||||
|
||||
/**
|
||||
* The principal that this secret key belongs to.
|
||||
*
|
||||
* @serial
|
||||
*/
|
||||
private KerberosPrincipal principal;
|
||||
|
||||
/**
|
||||
* the version number of this secret key
|
||||
*
|
||||
* @serial
|
||||
*/
|
||||
private final int versionNum;
|
||||
|
||||
/**
|
||||
* {@code KeyImpl} is serialized by writing out the ASN.1 encoded bytes
|
||||
* of the encryption key.
|
||||
*
|
||||
* @serial
|
||||
*/
|
||||
|
||||
private KeyImpl key;
|
||||
private transient boolean destroyed = false;
|
||||
|
||||
/**
|
||||
* Constructs a {@code KerberosKey} from the given bytes when the key type
|
||||
* and key version number are known. This can be used when reading the
|
||||
* secret key information from a Kerberos "keytab".
|
||||
*
|
||||
* @param principal the principal that this secret key belongs to
|
||||
* @param keyBytes the key material for the secret key
|
||||
* @param keyType the key type for the secret key as defined by the
|
||||
* Kerberos protocol specification.
|
||||
* @param versionNum the version number of this secret key
|
||||
*/
|
||||
public KerberosKey(KerberosPrincipal principal,
|
||||
byte[] keyBytes,
|
||||
int keyType,
|
||||
int versionNum) {
|
||||
this.principal = principal;
|
||||
this.versionNum = versionNum;
|
||||
key = new KeyImpl(keyBytes, keyType);
|
||||
}
|
||||
|
||||
/**
|
||||
* Constructs a {@code KerberosKey} from a principal's password using the
|
||||
* specified algorithm name. The algorithm name (case insensitive) should
|
||||
* be provided as the encryption type string defined on the IANA
|
||||
* <a href="https://www.iana.org/assignments/kerberos-parameters/kerberos-parameters.xhtml#kerberos-parameters-1">Kerberos Encryption Type Numbers</a>
|
||||
* page. The version number of the key generated will be 0.
|
||||
*
|
||||
* @param principal the principal that this password belongs to
|
||||
* @param password the password that should be used to compute the key
|
||||
* @param algorithm the name for the algorithm that this key will be
|
||||
* used for
|
||||
* @throws IllegalArgumentException if the name of the
|
||||
* algorithm passed is unsupported.
|
||||
*/
|
||||
public KerberosKey(KerberosPrincipal principal,
|
||||
char[] password,
|
||||
String algorithm) {
|
||||
|
||||
this.principal = principal;
|
||||
this.versionNum = 0;
|
||||
// Pass principal in for salt
|
||||
key = new KeyImpl(principal, password, algorithm);
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the principal that this key belongs to.
|
||||
*
|
||||
* @return the principal this key belongs to.
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final KerberosPrincipal getPrincipal() {
|
||||
if (destroyed) {
|
||||
throw new IllegalStateException("This key is no longer valid");
|
||||
}
|
||||
return principal;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the key version number.
|
||||
*
|
||||
* @return the key version number.
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final int getVersionNumber() {
|
||||
if (destroyed) {
|
||||
throw new IllegalStateException("This key is no longer valid");
|
||||
}
|
||||
return versionNum;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the key type for this long-term key.
|
||||
*
|
||||
* @return the key type.
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final int getKeyType() {
|
||||
// KeyImpl already checked if destroyed
|
||||
return key.getKeyType();
|
||||
}
|
||||
|
||||
/*
|
||||
* Methods from java.security.Key
|
||||
*/
|
||||
|
||||
/**
|
||||
* Returns the standard algorithm name for this key. The algorithm names
|
||||
* are the encryption type string defined on the IANA
|
||||
* <a href="https://www.iana.org/assignments/kerberos-parameters/kerberos-parameters.xhtml#kerberos-parameters-1">Kerberos Encryption Type Numbers</a>
|
||||
* page.
|
||||
* <p>
|
||||
* This method can return the following value not defined on the IANA page:
|
||||
* <ol>
|
||||
* <li>none: for etype equal to 0</li>
|
||||
* <li>unknown: for etype greater than 0 but unsupported by
|
||||
* the implementation</li>
|
||||
* <li>private: for etype smaller than 0</li>
|
||||
* </ol>
|
||||
*
|
||||
* @return the name of the algorithm associated with this key.
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final String getAlgorithm() {
|
||||
// KeyImpl already checked if destroyed
|
||||
return key.getAlgorithm();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the name of the encoding format for this secret key.
|
||||
*
|
||||
* @return the String "RAW"
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final String getFormat() {
|
||||
// KeyImpl already checked if destroyed
|
||||
return key.getFormat();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the key material of this secret key.
|
||||
*
|
||||
* @return the key material
|
||||
* @throws IllegalStateException if the key is destroyed
|
||||
*/
|
||||
public final byte[] getEncoded() {
|
||||
// KeyImpl already checked if destroyed
|
||||
return key.getEncoded();
|
||||
}
|
||||
|
||||
/**
|
||||
* Destroys this key by clearing out the key material of this secret key.
|
||||
*
|
||||
* @throws DestroyFailedException if some error occurs while destorying
|
||||
* this key.
|
||||
*/
|
||||
public void destroy() throws DestroyFailedException {
|
||||
if (!destroyed) {
|
||||
key.destroy();
|
||||
principal = null;
|
||||
destroyed = true;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/** Determines if this key has been destroyed.*/
|
||||
public boolean isDestroyed() {
|
||||
return destroyed;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns an informative textual representation of this {@code KerberosKey}.
|
||||
*
|
||||
* @return an informative textual representation of this {@code KerberosKey}.
|
||||
*/
|
||||
public String toString() {
|
||||
if (destroyed) {
|
||||
return "Destroyed KerberosKey";
|
||||
}
|
||||
return "Kerberos Principal " + principal +
|
||||
"Key Version " + versionNum +
|
||||
"key " + key.toString();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a hash code for this {@code KerberosKey}.
|
||||
*
|
||||
* @return a hash code for this {@code KerberosKey}.
|
||||
* @since 1.6
|
||||
*/
|
||||
public int hashCode() {
|
||||
int result = 17;
|
||||
if (isDestroyed()) {
|
||||
return result;
|
||||
}
|
||||
result = 37 * result + Arrays.hashCode(getEncoded());
|
||||
result = 37 * result + getKeyType();
|
||||
if (principal != null) {
|
||||
result = 37 * result + principal.hashCode();
|
||||
}
|
||||
return result * 37 + versionNum;
|
||||
}
|
||||
|
||||
/**
|
||||
* Compares the specified object with this {@code KerberosKey} for
|
||||
* equality. Returns true if the given object is also a
|
||||
* {@code KerberosKey} and the two
|
||||
* {@code KerberosKey} instances are equivalent.
|
||||
* A destroyed {@code KerberosKey} object is only equal to itself.
|
||||
*
|
||||
* @param other the object to compare to
|
||||
* @return true if the specified object is equal to this {@code KerberosKey},
|
||||
* false otherwise.
|
||||
* @since 1.6
|
||||
*/
|
||||
public boolean equals(Object other) {
|
||||
|
||||
if (other == this) {
|
||||
return true;
|
||||
}
|
||||
|
||||
if (! (other instanceof KerberosKey)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
KerberosKey otherKey = ((KerberosKey) other);
|
||||
if (isDestroyed() || otherKey.isDestroyed()) {
|
||||
return false;
|
||||
}
|
||||
|
||||
if (versionNum != otherKey.getVersionNumber() ||
|
||||
getKeyType() != otherKey.getKeyType() ||
|
||||
!Arrays.equals(getEncoded(), otherKey.getEncoded())) {
|
||||
return false;
|
||||
}
|
||||
|
||||
if (principal == null) {
|
||||
if (otherKey.getPrincipal() != null) {
|
||||
return false;
|
||||
}
|
||||
} else {
|
||||
if (!principal.equals(otherKey.getPrincipal())) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue