/* * Portions Copyright 2000-2009 Sun Microsystems, Inc. All Rights Reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Sun designates this * particular file as subject to the "Classpath" exception as provided * by Sun in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, * CA 95054 USA or visit www.sun.com if you need additional information or * have any questions. */ /* * * (C) Copyright IBM Corp. 1999 All Rights Reserved. * Copyright 1997 The Open Group Research Institute. All rights reserved. */ package sun.security.krb5; import sun.security.krb5.internal.*; import sun.security.util.*; import java.net.*; import java.util.Vector; import java.io.IOException; import java.math.BigInteger; import sun.security.krb5.internal.ccache.CCacheOutputStream; /** * This class encapsulates a Kerberos principal. */ public class PrincipalName implements Cloneable { //name types /** * Name type not known */ public static final int KRB_NT_UNKNOWN = 0; /** * Just the name of the principal as in DCE, or for users */ public static final int KRB_NT_PRINCIPAL = 1; /** * Service and other unique instance (krbtgt) */ public static final int KRB_NT_SRV_INST = 2; /** * Service with host name as instance (telnet, rcommands) */ public static final int KRB_NT_SRV_HST = 3; /** * Service with host as remaining components */ public static final int KRB_NT_SRV_XHST = 4; /** * Unique ID */ public static final int KRB_NT_UID = 5; /** * TGS Name */ public static final String TGS_DEFAULT_SRV_NAME = "krbtgt"; public static final int TGS_DEFAULT_NT = KRB_NT_SRV_INST; public static final char NAME_COMPONENT_SEPARATOR = '/'; public static final char NAME_REALM_SEPARATOR = '@'; public static final char REALM_COMPONENT_SEPARATOR = '.'; public static final String NAME_COMPONENT_SEPARATOR_STR = "/"; public static final String NAME_REALM_SEPARATOR_STR = "@"; public static final String REALM_COMPONENT_SEPARATOR_STR = "."; private int nameType; private String[] nameStrings; // Principal names don't mutate often private Realm nameRealm; // optional; a null realm means use default // Note: the nameRealm is not included in the default ASN.1 encoding // salt for principal private String salt = null; protected PrincipalName() { } public PrincipalName(String[] nameParts, int type) throws IllegalArgumentException, IOException { if (nameParts == null) { throw new IllegalArgumentException("Null input not allowed"); } nameStrings = new String[nameParts.length]; System.arraycopy(nameParts, 0, nameStrings, 0, nameParts.length); nameType = type; nameRealm = null; } public PrincipalName(String[] nameParts) throws IOException { this(nameParts, KRB_NT_UNKNOWN); } public Object clone() { PrincipalName pName = new PrincipalName(); pName.nameType = nameType; if (nameStrings != null) { pName.nameStrings = new String[nameStrings.length]; System.arraycopy(nameStrings,0,pName.nameStrings,0, nameStrings.length); } if (nameRealm != null) { pName.nameRealm = (Realm)nameRealm.clone(); } return pName; } /* * Added to workaround a bug where the equals method that takes a * PrincipalName is not being called but Object.equals(Object) is * being called. */ public boolean equals(Object o) { if (o instanceof PrincipalName) return equals((PrincipalName)o); else return false; } public boolean equals(PrincipalName other) { if (!equalsWithoutRealm(other)) { return false; } if ((nameRealm != null && other.nameRealm == null) || (nameRealm == null && other.nameRealm != null)) { return false; } if (nameRealm != null && other.nameRealm != null) { if (!nameRealm.equals(other.nameRealm)) { return false; } } return true; } boolean equalsWithoutRealm(PrincipalName other) { if (nameType != KRB_NT_UNKNOWN && other.nameType != KRB_NT_UNKNOWN && nameType != other.nameType) return false; if ((nameStrings != null && other.nameStrings == null) || (nameStrings == null && other.nameStrings != null)) return false; if (nameStrings != null && other.nameStrings != null) { if (nameStrings.length != other.nameStrings.length) return false; for (int i = 0; i < nameStrings.length; i++) if (!nameStrings[i].equals(other.nameStrings[i])) return false; } return true; } /** * Returns the ASN.1 encoding of the *
* This definition reflects the Network Working Group RFC 4120
* specification available at
*
* http://www.ietf.org/rfc/rfc4120.txt.
*
* @param encoding a Der-encoded data.
* @exception Asn1Exception if an error occurs while decoding
* an ASN1 encoded data.
* @exception Asn1Exception if there is an ASN1 encoding error
* @exception IOException if an I/O error occurs
* @exception IllegalArgumentException if encoding is null
* reading encoded data.
*
*/
public PrincipalName(DerValue encoding)
throws Asn1Exception, IOException {
nameRealm = null;
DerValue der;
if (encoding == null) {
throw new IllegalArgumentException("Null input not allowed");
}
if (encoding.getTag() != DerValue.tag_Sequence) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
der = encoding.getData().getDerValue();
if ((der.getTag() & 0x1F) == 0x00) {
BigInteger bint = der.getData().getBigInteger();
nameType = bint.intValue();
} else {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
der = encoding.getData().getDerValue();
if ((der.getTag() & 0x01F) == 0x01) {
DerValue subDer = der.getData().getDerValue();
if (subDer.getTag() != DerValue.tag_SequenceOf) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
VectorPrincipalName
from a DER
* input stream. This form
* parsing might be used when expanding a value which is part of
* a constructed sequence and uses explicitly tagged type.
*
* @exception Asn1Exception on error.
* @param data the Der input stream value, which contains one or
* more marshaled value.
* @param explicitTag tag number.
* @param optional indicate if this data field is optional
* @return an instance of PrincipalName
.
*
*/
public static PrincipalName parse(DerInputStream data,
byte explicitTag, boolean
optional)
throws Asn1Exception, IOException {
if ((optional) && (((byte)data.peekByte() & (byte)0x1F) !=
explicitTag))
return null;
DerValue der = data.getDerValue();
if (explicitTag != (der.getTag() & (byte)0x1F))
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
else {
DerValue subDer = der.getData().getDerValue();
return new PrincipalName(subDer);
}
}
// This is protected because the definition of a principal
// string is fixed
// XXX Error checkin consistent with MIT krb5_parse_name
// Code repetition, realm parsed again by class Realm
protected static String[] parseName(String name) {
VectorPrincipalName
object.
* @return the byte array of the encoded PrncipalName object.
* @exception Asn1Exception if an error occurs while decoding an ASN1 encoded data.
* @exception IOException if an I/O error occurs while reading encoded data.
*
*/
public byte[] asn1Encode() throws Asn1Exception, IOException {
DerOutputStream bytes = new DerOutputStream();
DerOutputStream temp = new DerOutputStream();
BigInteger bint = BigInteger.valueOf(this.nameType);
temp.putInteger(bint);
bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x00), temp);
temp = new DerOutputStream();
DerValue der[] = new DerValue[nameStrings.length];
for (int i = 0; i < nameStrings.length; i++) {
der[i] = new DerValue(DerValue.tag_GeneralString, nameStrings[i]);
}
temp.putSequence(der);
bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x01), temp);
temp = new DerOutputStream();
temp.write(DerValue.tag_Sequence, bytes);
return temp.toByteArray();
}
/**
* Checks if two PrincipalName
objects have identical values in their corresponding data fields.
*
* @param pname the other PrincipalName
object.
* @return true if two have identical values, otherwise, return false.
*/
// It is used in sun.security.krb5.internal.ccache
package.
public boolean match(PrincipalName pname) {
boolean matched = true;
//name type is just a hint, no two names can be the same ignoring name type.
// if (this.nameType != pname.nameType) {
// matched = false;
// }
if ((this.nameRealm != null) && (pname.nameRealm != null)) {
if (!(this.nameRealm.toString().equalsIgnoreCase(pname.nameRealm.toString()))) {
matched = false;
}
}
if (this.nameStrings.length != pname.nameStrings.length) {
matched = false;
} else {
for (int i = 0; i < this.nameStrings.length; i++) {
if (!(this.nameStrings[i].equalsIgnoreCase(pname.nameStrings[i]))) {
matched = false;
}
}
}
return matched;
}
/**
* Writes data field values of PrincipalName
in FCC format to an output stream.
*
* @param cos a CCacheOutputStream
for writing data.
* @exception IOException if an I/O exception occurs.
* @see sun.security.krb5.internal.ccache.CCacheOutputStream
*/
public void writePrincipal(CCacheOutputStream cos) throws IOException {
cos.write32(nameType);
cos.write32(nameStrings.length);
if (nameRealm != null) {
byte[] realmBytes = null;
realmBytes = nameRealm.toString().getBytes();
cos.write32(realmBytes.length);
cos.write(realmBytes, 0, realmBytes.length);
}
byte[] bytes = null;
for (int i = 0; i < nameStrings.length; i++) {
bytes = nameStrings[i].getBytes();
cos.write32(bytes.length);
cos.write(bytes, 0, bytes.length);
}
}
/**
* Creates a KRB_NT_SRV_INST name from the supplied
* name components and realm.
* @param primary the primary component of the name
* @param instance the instance component of the name
* @param realm the realm
* @throws KrbException
*/
protected PrincipalName(String primary, String instance, String realm,
int type)
throws KrbException {
if (type != KRB_NT_SRV_INST) {
throw new KrbException(Krb5.KRB_ERR_GENERIC, "Bad name type");
}
String[] nParts = new String[2];
nParts[0] = primary;
nParts[1] = instance;
this.nameStrings = nParts;
this.nameRealm = new Realm(realm);
this.nameType = type;
}
/**
* Returns the instance component of a name.
* In a multi-component name such as a KRB_NT_SRV_INST
* name, the second component is returned.
* Null is returned if there are not two or more
* components in the name.
* @returns instance component of a multi-component name.
*/
public String getInstanceComponent()
{
if (nameStrings != null && nameStrings.length >= 2)
{
return new String(nameStrings[1]);
}
return null;
}
static String mapHostToRealm(String name) {
String result = null;
try {
String subname = null;
Config c = Config.getInstance();
if ((result = c.getDefault(name, "domain_realm")) != null)
return result;
else {
for (int i = 1; i < name.length(); i++) {
if ((name.charAt(i) == '.') && (i != name.length() - 1)) { //mapping could be .ibm.com = AUSTIN.IBM.COM
subname = name.substring(i);
result = c.getDefault(subname, "domain_realm");
if (result != null) {
break;
}
else {
subname = name.substring(i + 1); //or mapping could be ibm.com = AUSTIN.IBM.COM
result = c.getDefault(subname, "domain_realm");
if (result != null) {
break;
}
}
}
}
}
} catch (KrbException e) {
}
return result;
}
}