blob: d72d46c84aba9361f39099d4c396dcbbfe7e72c3 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.kerby.kerberos.kerb.client.request;
import org.apache.kerby.kerberos.kerb.KrbErrorCode;
import org.apache.kerby.kerberos.kerb.KrbException;
import org.apache.kerby.kerberos.kerb.ccache.CredentialCache;
import org.apache.kerby.kerberos.kerb.client.KrbContext;
import org.apache.kerby.kerberos.kerb.client.PkinitOption;
import org.apache.kerby.kerberos.kerb.client.TokenOption;
import org.apache.kerby.kerberos.kerb.common.KrbUtil;
import org.apache.kerby.kerberos.kerb.type.base.EncryptionKey;
import org.apache.kerby.kerberos.kerb.type.base.HostAddress;
import org.apache.kerby.kerberos.kerb.type.base.HostAddresses;
import org.apache.kerby.kerberos.kerb.type.base.KeyUsage;
import org.apache.kerby.kerberos.kerb.type.base.PrincipalName;
import org.apache.kerby.kerberos.kerb.type.kdc.AsReq;
import org.apache.kerby.kerberos.kerb.type.kdc.EncAsRepPart;
import org.apache.kerby.kerberos.kerb.type.kdc.EncKdcRepPart;
import org.apache.kerby.kerberos.kerb.type.kdc.KdcRep;
import org.apache.kerby.kerberos.kerb.type.kdc.KdcReqBody;
import org.apache.kerby.kerberos.kerb.type.ticket.TgtTicket;
import java.io.File;
import java.io.IOException;
import java.util.List;
public class AsRequest extends KdcRequest {
private PrincipalName clientPrincipal;
private EncryptionKey clientKey;
public AsRequest(KrbContext context) {
super(context);
setServerPrincipal(makeTgsPrincipal());
}
public PrincipalName getClientPrincipal() {
return clientPrincipal;
}
public void setClientPrincipal(PrincipalName clientPrincipal) {
this.clientPrincipal = clientPrincipal;
}
public void setClientKey(EncryptionKey clientKey) {
this.clientKey = clientKey;
}
@Override
public EncryptionKey getClientKey() throws KrbException {
return clientKey;
}
@Override
public void process() throws KrbException {
super.process();
KdcReqBody body = getReqBody(null);
AsReq asReq = new AsReq();
asReq.setReqBody(body);
asReq.setPaData(getPreauthContext().getOutputPaData());
setKdcReq(asReq);
}
@Override
public void processResponse(KdcRep kdcRep) throws KrbException {
setKdcRep(kdcRep);
PrincipalName clientPrincipal = getKdcRep().getCname();
String clientRealm = getKdcRep().getCrealm();
clientPrincipal.setRealm(clientRealm);
if (!(getRequestOptions().contains(PkinitOption.USE_ANONYMOUS)
&& KrbUtil.pricipalCompareIgnoreRealm(clientPrincipal, getClientPrincipal()))
&& !getRequestOptions().contains(TokenOption.USER_ID_TOKEN)
&& !clientPrincipal.equals(getClientPrincipal())) {
throw new KrbException(KrbErrorCode.KDC_ERR_CLIENT_NAME_MISMATCH);
}
byte[] decryptedData = decryptWithClientKey(getKdcRep().getEncryptedEncPart(),
KeyUsage.AS_REP_ENCPART);
if ((decryptedData[0] & 0x1f) == 26) {
decryptedData[0] = (byte) (decryptedData[0] - 1);
}
EncKdcRepPart encKdcRepPart = new EncAsRepPart();
try {
encKdcRepPart.decode(decryptedData);
} catch (IOException e) {
throw new KrbException("Failed to decode EncAsRepPart", e);
}
getKdcRep().setEncPart(encKdcRepPart);
if (getChosenNonce() != encKdcRepPart.getNonce()) {
throw new KrbException("Nonce didn't match");
}
PrincipalName returnedServerPrincipal = encKdcRepPart.getSname();
returnedServerPrincipal.setRealm(encKdcRepPart.getSrealm());
PrincipalName requestedServerPrincipal = getServerPrincipal();
if (requestedServerPrincipal.getRealm() == null) {
requestedServerPrincipal.setRealm(getContext().getKrbSetting().getKdcRealm());
}
if (!returnedServerPrincipal.equals(requestedServerPrincipal)) {
throw new KrbException(KrbErrorCode.KDC_ERR_SERVER_NOMATCH);
}
HostAddresses hostAddresses = getHostAddresses();
if (hostAddresses != null) {
List<HostAddress> requestHosts = hostAddresses.getElements();
if (!requestHosts.isEmpty()) {
List<HostAddress> responseHosts = encKdcRepPart.getCaddr().getElements();
for (HostAddress h : requestHosts) {
if (!responseHosts.contains(h)) {
throw new KrbException("Unexpected client host");
}
}
}
}
}
public TgtTicket getTicket() {
TgtTicket tgtTicket = new TgtTicket(getKdcRep().getTicket(),
(EncAsRepPart) getKdcRep().getEncPart(), getKdcRep().getCname());
return tgtTicket;
}
private PrincipalName makeTgsPrincipal() {
return KrbUtil.makeTgsPrincipal(getContext().getKrbSetting().getKdcRealm());
}
protected CredentialCache resolveCredCache(File ccacheFile) throws IOException {
CredentialCache cc = new CredentialCache();
cc.load(ccacheFile);
return cc;
}
}