blob: 8a3ea96cbf1581d9785abb19f4f70238e33ea5fc [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.kerby.kerberos.kerb.util;
import org.apache.kerby.kerberos.kerb.KrbCodec;
import org.apache.kerby.kerberos.kerb.KrbException;
import org.apache.kerby.kerberos.kerb.ccache.CredentialCache;
import org.apache.kerby.kerberos.kerb.crypto.EncryptionHandler;
import org.apache.kerby.kerberos.kerb.keytab.Keytab;
import org.apache.kerby.kerberos.kerb.type.base.EncryptedData;
import org.apache.kerby.kerberos.kerb.type.base.EncryptionKey;
import org.apache.kerby.kerberos.kerb.type.base.EncryptionType;
import org.apache.kerby.kerberos.kerb.type.base.KeyUsage;
import org.apache.kerby.kerberos.kerb.type.base.PrincipalName;
import org.apache.kerby.kerberos.kerb.type.ticket.EncTicketPart;
import org.apache.kerby.kerberos.kerb.type.ticket.Ticket;
import org.apache.kerby.util.CryptoUtil;
import org.junit.Before;
import org.junit.Test;
import java.io.IOException;
import java.io.InputStream;
import java.util.Arrays;
import java.util.List;
import static org.assertj.core.api.Assertions.assertThat;
import static org.junit.Assume.assumeTrue;
/*
The principal keys for krbtgt/SH.INTEL.COM@SH.INTEL.COM
KVNO Principal
---- --------------------------------------------------------------------------
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (des-cbc-crc)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (des3-cbc-raw)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (des-hmac-sha1)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (aes256-cts-hmac-sha1-96)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (aes128-cts-hmac-sha1-96)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (arcfour-hmac)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (camellia256-cts-cmac)
2 krbtgt/SH.INTEL.COM@SH.INTEL.COM (camellia128-cts-cmac)
*/
public class EncryptionTest {
private Keytab keytab;
private CredentialCache cc;
@Before
public void setUp() throws IOException {
try (InputStream kis = EncryptionTest.class.getResourceAsStream("/krbtgt.keytab")) {
keytab = Keytab.loadKeytab(kis);
}
}
@Test
public void testAes128() throws IOException, KrbException {
testEncWith("aes128-cts-hmac-sha1-96.cc");
}
@Test
public void testAes256() throws IOException, KrbException {
assumeTrue(CryptoUtil.isAES256Enabled());
testEncWith("aes256-cts-hmac-sha1-96.cc");
}
@Test
public void testRc4() throws IOException, KrbException {
testEncWith("arcfour-hmac.cc");
}
@Test
public void testCamellia128() throws IOException, KrbException {
testEncWith("camellia128-cts-cmac.cc");
}
@Test
public void testCamellia256() throws IOException, KrbException {
testEncWith("camellia256-cts-cmac.cc");
}
@Test
public void testDesCbcCrc() throws IOException, KrbException {
testEncWith("des-cbc-crc.cc");
}
@Test
public void testDes3CbcSha1() throws IOException, KrbException {
testEncWith("des3-cbc-sha1.cc");
}
private void testEncWith(String ccFile) throws IOException, KrbException, KrbException {
InputStream cis = CcacheTest.class.getResourceAsStream("/" + ccFile);
cc = new CredentialCache();
cc.load(cis);
Ticket ticket = getTicket();
EncryptionType keyType = ticket.getEncryptedEncPart().getEType();
EncryptionKey key = getServerKey(keyType);
if (!EncryptionHandler.isImplemented(keyType)) {
System.err.println("Key type not supported yet: " + keyType.getName());
return;
}
byte[] decrypted = EncryptionHandler.decrypt(
ticket.getEncryptedEncPart(), key, KeyUsage.KDC_REP_TICKET);
assertThat(decrypted).isNotNull();
EncTicketPart encPart = KrbCodec.decode(decrypted, EncTicketPart.class);
assertThat(encPart).isNotNull();
ticket.setEncPart(encPart);
EncryptedData encrypted = EncryptionHandler.encrypt(
decrypted, key, KeyUsage.KDC_REP_TICKET);
byte[] decrypted2 = EncryptionHandler.decrypt(
encrypted, key, KeyUsage.KDC_REP_TICKET);
if (!Arrays.equals(decrypted, decrypted2)) {
System.err.println("Encryption checking failed after decryption for key type: "
+ keyType.getName());
}
}
private EncryptionKey getServerKey(EncryptionType keyType) {
return keytab.getKey(getServer(), keyType);
}
private PrincipalName getServer() {
// only one, krbtgt/SH.INTEL.COM@SH.INTEL.COM
List<PrincipalName> principals = keytab.getPrincipals();
PrincipalName server = principals.get(0);
return server;
}
private Ticket getTicket() {
return cc.getCredentials().get(0).getTicket();
}
}