blob: c03b9217ca919e74a1891985c60341ef2414ed61 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.server.kerberos.shared.keytab;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
import java.nio.ByteBuffer;
import java.security.InvalidKeyException;
import java.text.ParseException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Date;
import java.util.List;
import java.util.Map;
import javax.crypto.spec.DESKeySpec;
import org.apache.directory.api.util.Strings;
import org.apache.directory.server.kerberos.shared.crypto.encryption.KerberosKeyFactory;
import org.apache.directory.shared.kerberos.KerberosTime;
import org.apache.directory.shared.kerberos.KerberosUtils;
import org.apache.directory.shared.kerberos.codec.types.EncryptionType;
import org.apache.directory.shared.kerberos.components.EncryptionKey;
import org.junit.Test;
import org.junit.runner.RunWith;
import com.mycila.junit.concurrent.Concurrency;
import com.mycila.junit.concurrent.ConcurrentJunitRunner;
/**
* Tests 'keytab' formatted files.
*
* All values are in network byte order. All text is ASCII.
*
* @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
*/
@RunWith(ConcurrentJunitRunner.class)
@Concurrency()
public class KeytabTest
{
private static final byte[] keytab1 = new byte[]
{ ( byte ) 0x05, ( byte ) 0x02, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x3C, ( byte ) 0x00,
( byte ) 0x02, ( byte ) 0x00, ( byte ) 0x0B, ( byte ) 0x45, ( byte ) 0x58, ( byte ) 0x41, ( byte ) 0x4D,
( byte ) 0x50, ( byte ) 0x4C, ( byte ) 0x45, ( byte ) 0x2E, ( byte ) 0x43, ( byte ) 0x4F, ( byte ) 0x4D,
( byte ) 0x00, ( byte ) 0x04, ( byte ) 0x6C, ( byte ) 0x64, ( byte ) 0x61, ( byte ) 0x70, ( byte ) 0x00,
( byte ) 0x10, ( byte ) 0x77, ( byte ) 0x77, ( byte ) 0x77, ( byte ) 0x2E, ( byte ) 0x76, ( byte ) 0x65,
( byte ) 0x72, ( byte ) 0x69, ( byte ) 0x73, ( byte ) 0x69, ( byte ) 0x67, ( byte ) 0x6E, ( byte ) 0x2E,
( byte ) 0x63, ( byte ) 0x6F, ( byte ) 0x6D, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x01,
( byte ) 0x45, ( byte ) 0xD9, ( byte ) 0x60, ( byte ) 0xBE, ( byte ) 0x01, ( byte ) 0x00, ( byte ) 0x03,
( byte ) 0x00, ( byte ) 0x08, ( byte ) 0xD5, ( byte ) 0xE6, ( byte ) 0xC4, ( byte ) 0xD0, ( byte ) 0xFE,
( byte ) 0x25, ( byte ) 0x07, ( byte ) 0x0D };
private static final byte[] keytab2 = new byte[]
{ ( byte ) 0x05, ( byte ) 0x02, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x3C, ( byte ) 0x00,
( byte ) 0x02, ( byte ) 0x00, ( byte ) 0x0B, ( byte ) 0x45, ( byte ) 0x58, ( byte ) 0x41, ( byte ) 0x4D,
( byte ) 0x50, ( byte ) 0x4C, ( byte ) 0x45, ( byte ) 0x2E, ( byte ) 0x43, ( byte ) 0x4F, ( byte ) 0x4D,
( byte ) 0x00, ( byte ) 0x04, ( byte ) 0x48, ( byte ) 0x54, ( byte ) 0x54, ( byte ) 0x50, ( byte ) 0x00,
( byte ) 0x10, ( byte ) 0x77, ( byte ) 0x77, ( byte ) 0x77, ( byte ) 0x2E, ( byte ) 0x76, ( byte ) 0x65,
( byte ) 0x72, ( byte ) 0x69, ( byte ) 0x73, ( byte ) 0x69, ( byte ) 0x67, ( byte ) 0x6E, ( byte ) 0x2E,
( byte ) 0x63, ( byte ) 0x6F, ( byte ) 0x6D, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x01,
( byte ) 0x45, ( byte ) 0xD7, ( byte ) 0x96, ( byte ) 0x79, ( byte ) 0x04, ( byte ) 0x00, ( byte ) 0x03,
( byte ) 0x00, ( byte ) 0x08, ( byte ) 0x13, ( byte ) 0xD9, ( byte ) 0x19, ( byte ) 0x98, ( byte ) 0x23,
( byte ) 0x8F, ( byte ) 0x9E, ( byte ) 0x31 };
/**
* Read the first keytab test bytes and check for the presence of a valid DES key.
*
* @throws Exception
*/
@Test
public void testReadKeytab1() throws Exception
{
Keytab keytab = Keytab.read( keytab1 );
assertTrue( "Keytab version", Arrays.equals( Keytab.VERSION_0X502_BYTES, keytab.getKeytabVersion() ) );
assertEquals( "Entries size", 1, keytab.getEntries().size() );
KeytabEntry entry = keytab.getEntries().get( 0 );
EncryptionKey key = entry.getKey();
try
{
assertTrue( DESKeySpec.isParityAdjusted( key.getKeyValue(), 0 ) );
}
catch ( InvalidKeyException ike )
{
fail( "Key is invalid." );
}
}
/**
* Read the second keytab test bytes and check for the presence of a valid DES key.
*
* @throws Exception
*/
@Test
public void testReadKeytab2() throws Exception
{
Keytab keytab = Keytab.read( keytab2 );
assertTrue( "Keytab version", Arrays.equals( Keytab.VERSION_0X502_BYTES, keytab.getKeytabVersion() ) );
assertEquals( "Entries size", 1, keytab.getEntries().size() );
KeytabEntry entry = keytab.getEntries().get( 0 );
EncryptionKey key = entry.getKey();
try
{
assertTrue( DESKeySpec.isParityAdjusted( key.getKeyValue(), 0 ) );
}
catch ( InvalidKeyException ike )
{
fail( "Key is invalid." );
}
}
/**
* Test the writing of a keytab file.
*
* @throws Exception
*/
@Test
public void testWriteKeytab() throws Exception
{
List<KeytabEntry> entries = new ArrayList<KeytabEntry>();
entries.add( getEntry1() );
entries.add( getEntry1() );
Keytab writer = Keytab.getInstance();
writer.setEntries( entries );
ByteBuffer buffer = writer.write();
System.out.println( Strings.dumpBytes( buffer.array() ) );
assertEquals( "Expected file size.", 130, buffer.limit() );
}
private KeytabEntry getEntry1() throws ParseException
{
String principalName = "HTTP/www.verisign.com@EXAMPLE.COM";
int principalType = 1;
String zuluTime = "20070217235745Z";
Date date = null;
synchronized ( KerberosUtils.UTC_DATE_FORMAT )
{
date = KerberosUtils.UTC_DATE_FORMAT.parse( zuluTime );
}
KerberosTime timeStamp = new KerberosTime( date.getTime() );
byte keyVersion = 1;
String passPhrase = "secret";
Map<EncryptionType, EncryptionKey> keys = KerberosKeyFactory.getKerberosKeys( principalName, passPhrase );
EncryptionKey key = keys.get( EncryptionType.DES_CBC_MD5 );
return new KeytabEntry( principalName, principalType, timeStamp, keyVersion, key );
}
}