Package javax.security.auth.kerberos

Examples of javax.security.auth.kerberos.KerberosPrincipal


   
    @Test
    public void testKerberosNameSimple() throws Exception
    {
        KerberosPrincipal kp = new KerberosPrincipal( "abc" );
        List<String> names = KerberosUtils.getNames( kp );
    
        assertEquals( 1, names.size() );
        assertEquals( "abc", names.get( 0 ) );
    }
View Full Code Here



    @Test
    public void testKerberosNameSimpleWithRealm() throws Exception
    {
        KerberosPrincipal kp = new KerberosPrincipal( "abc@APACHE.ORG" );
        List<String> names = KerberosUtils.getNames( kp );
    
        assertEquals( 1, names.size() );
        assertEquals( "abc", names.get( 0 ) );
    }
View Full Code Here

    }
   
    @Test
    public void testKerberosNameThree() throws Exception
    {
        KerberosPrincipal kp = new KerberosPrincipal( "abc/def/ghi" );
        List<String> names = KerberosUtils.getNames( kp );
    
        assertEquals( 3, names.size() );
        assertEquals( "abc", names.get( 0 ) );
        assertEquals( "def", names.get( 1 ) );
View Full Code Here

    }

    @Test
    public void testKerberosNameThreeWithRealm() throws Exception
    {
        KerberosPrincipal kp = new KerberosPrincipal( "abc/def/ghi@APACHE.ORG" );
        List<String> names = KerberosUtils.getNames( kp );
    
        assertEquals( 3, names.size() );
        assertEquals( "abc", names.get( 0 ) );
        assertEquals( "def", names.get( 1 ) );
View Full Code Here

    }

   
    private static void getClientEntry( AuthenticationContext authContext ) throws KerberosException, InvalidTicketException
    {
        KerberosPrincipal principal = authContext.getRequest().getClientPrincipal();
        PrincipalStore store = authContext.getStore();

        PrincipalStoreEntry storeEntry = getEntry( principal, store, ErrorType.KDC_ERR_C_PRINCIPAL_UNKNOWN );
        authContext.setClientEntry( storeEntry );
    }
View Full Code Here

    }
   
   
    private static void getServerEntry( AuthenticationContext authContext ) throws KerberosException, InvalidTicketException
    {
        KerberosPrincipal principal = authContext.getRequest().getServerPrincipal();
        PrincipalStore store = authContext.getStore();
   
        authContext.setServerEntry( getEntry( principal, store, ErrorType.KDC_ERR_S_PRINCIPAL_UNKNOWN ) );
    }   
View Full Code Here

   
    private static void generateTicket( AuthenticationContext authContext ) throws KerberosException, InvalidTicketException
    {
        KdcRequest request = authContext.getRequest();
        CipherTextHandler cipherTextHandler = authContext.getCipherTextHandler();
        KerberosPrincipal serverPrincipal = request.getServerPrincipal();

        EncryptionType encryptionType = authContext.getEncryptionType();
        EncryptionKey serverKey = authContext.getServerEntry().getKeyMap().get( encryptionType );

        KerberosPrincipal ticketPrincipal = request.getServerPrincipal();
        EncTicketPartModifier newTicketBody = new EncTicketPartModifier();
        KdcServer config = authContext.getConfig();

        // The INITIAL flag indicates that a ticket was issued using the AS protocol.
        newTicketBody.setFlag( TicketFlag.INITIAL );
View Full Code Here

            sb.append( "Monitoring " + SERVICE_NAME + " context:" );

            sb.append( "\n\t" + "clockSkew              " + clockSkew );
            sb.append( "\n\t" + "clientAddress          " + clientAddress );

            KerberosPrincipal clientPrincipal = authContext.getClientEntry().getPrincipal();
            PrincipalStoreEntry clientEntry = authContext.getClientEntry();

            sb.append( "\n\t" + "principal              " + clientPrincipal );
            sb.append( "\n\t" + "cn                     " + clientEntry.getCommonName() );
            sb.append( "\n\t" + "realm                  " + clientEntry.getRealmName() );
            sb.append( "\n\t" + "principal              " + clientEntry.getPrincipal() );
            sb.append( "\n\t" + "SAM type               " + clientEntry.getSamType() );

            KerberosPrincipal serverPrincipal = authContext.getRequest().getServerPrincipal();
            PrincipalStoreEntry serverEntry = authContext.getServerEntry();

            sb.append( "\n\t" + "principal              " + serverPrincipal );
            sb.append( "\n\t" + "cn                     " + serverEntry.getCommonName() );
            sb.append( "\n\t" + "realm                  " + serverEntry.getRealmName() );
View Full Code Here

     * Tests that key derivation can be performed for a DES key.
     */
    @Test
    public void testDesKerberosKey()
    {
        KerberosPrincipal principal = new KerberosPrincipal( "hnelson@EXAMPLE.COM" );
        KerberosKey key = new KerberosKey( principal, "secret".toCharArray(), "DES" );

        assertEquals( "DES key length", 8, key.getEncoded().length );
    }
View Full Code Here

     * Tests that key derivation can be performed for a Triple-DES key.
     */
    @Test
    public void testTripleDesKerberosKey()
    {
        KerberosPrincipal principal = new KerberosPrincipal( "hnelson@EXAMPLE.COM" );
        String algorithm = VendorHelper.getTripleDesAlgorithm();
        KerberosKey key = new KerberosKey( principal, "secret".toCharArray(), algorithm );

        assertEquals( "DESede key length", 24, key.getEncoded().length );
    }
View Full Code Here

TOP

Related Classes of javax.security.auth.kerberos.KerberosPrincipal

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.