Package javax.security.sasl

Examples of javax.security.sasl.AuthorizeCallback


      @Override
      public void handle(Callback[] callbacks)
          throws UnsupportedCallbackException, SaslException {
        NameCallback nc = null;
        PasswordCallback pc = null;
        AuthorizeCallback ac = null;
       
        for (Callback callback : callbacks) {
          if (callback instanceof NameCallback) {
            nc = (NameCallback)callback;
            assertEquals(user, nc.getName());
          } else if (callback instanceof PasswordCallback) {
            pc = (PasswordCallback)callback;
            if (!password.equals(new String(pc.getPassword()))) {
              throw new IllegalArgumentException("wrong password");
            }
          } else if (callback instanceof AuthorizeCallback) {
            ac = (AuthorizeCallback)callback;
            assertEquals(user, ac.getAuthorizationID());
            assertEquals(user, ac.getAuthenticationID());
            ac.setAuthorized(true);
            ac.setAuthorizedID(ac.getAuthenticationID());
          } else {
            throw new UnsupportedCallbackException(callback,
                "Unsupported SASL PLAIN Callback");
          }
        }
View Full Code Here


    /**
     * Test for <code>AuthorizeCallback(String authnID, String authzID)</code>
     * and get/set methods
     */
    public void test01() {
        AuthorizeCallback auth = new AuthorizeCallback(null, null);
        assertNull(auth.getAuthenticationID());
        assertNull(auth.getAuthorizationID());
        assertNull(auth.getAuthorizedID());
        assertFalse(auth.isAuthorized());

        auth.setAuthorized(true);
        assertTrue(auth.isAuthorized());
        assertNull(auth.getAuthorizedID());

        auth.setAuthorized(false);
        assertNull(auth.getAuthorizedID());
        assertFalse(auth.isAuthorized());

        auth.setAuthorizedID("ZZZ");
        auth.setAuthorized(true);
        assertEquals(auth.getAuthorizedID(), "ZZZ");
        assertNull(auth.getAuthorizationID());
        assertTrue(auth.isAuthorized());
    }
View Full Code Here

                "Long String LongString Long String LongString Long String LongString Long String LongString Long String LongString Long String LongString" };
        String[] newAuthorizedIDs = {
                "new authorizedIDs",
                "another authorizedIDs",
                "some long string for authorized IDs some long string for authorized IDs some long string for authorized IDs" };
        AuthorizeCallback auth;
        for (int i = 0; i < authenticationIDs.length; i++) {
            for (int j = 0; j < authorizedIDs.length; j++) {
                auth = new AuthorizeCallback(authenticationIDs[i],
                        authorizedIDs[j]);
                assertEquals(auth.getAuthenticationID(), authenticationIDs[i]);
                assertEquals(auth.getAuthorizationID(), authorizedIDs[j]);
                assertNull(auth.getAuthorizedID());
                assertFalse(auth.isAuthorized());

                auth.setAuthorized(true);
                assertTrue(auth.isAuthorized());
                assertEquals(auth.getAuthorizedID(), auth.getAuthorizationID());

                auth.setAuthorized(false);
                assertNull(auth.getAuthorizedID());
                assertFalse(auth.isAuthorized());

                for (int l = 0; l < newAuthorizedIDs.length; l++) {
                    auth.setAuthorizedID(newAuthorizedIDs[l]);
                    assertNull(auth.getAuthorizedID());
                    auth.setAuthorized(true);
                    assertFalse(auth.getAuthorizedID().equals(
                            auth.getAuthorizationID()));
                    assertEquals(auth.getAuthorizedID(), newAuthorizedIDs[l]);
                    auth.setAuthorizedID(newAuthorizedIDs[l] + " ZZZ");
                    assertFalse(auth.getAuthorizedID().equals(
                            auth.getAuthorizationID()));
                    assertFalse(auth.getAuthorizedID().equals(
                            newAuthorizedIDs[l]));
                    assertEquals(auth.getAuthorizedID(), newAuthorizedIDs[l]
                            + " ZZZ");

                    auth.setAuthorized(false);
                }

            }
        }
    }
View Full Code Here

     * DomainCallbackHandler Methods
     */

    public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
        if (callbacks.length == 1 && callbacks[0] instanceof AuthorizeCallback) {
            AuthorizeCallback acb = (AuthorizeCallback) callbacks[0];
            String authenticationId = acb.getAuthenticationID();
            String authorizationId = acb.getAuthorizationID();

            acb.setAuthorized(authenticationId.equals(authorizationId));

            return;
        }

        NameCallback nameCallBack = null;
View Full Code Here

        return true;
    }

    public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
        if (callbacks.length == 1 && callbacks[0] instanceof AuthorizeCallback) {
            AuthorizeCallback acb = (AuthorizeCallback) callbacks[0];
            String authenticationId = acb.getAuthenticationID();
            String authorizationId = acb.getAuthorizationID();

            acb.setAuthorized(authenticationId.equals(authorizationId));

            return;
        }

        ConnectionManager connectionManager = this.connectionManager.getValue();
View Full Code Here

        }

        // Second Pass - Now iterate the Callback(s) requiring a response.
        for (Callback current : toRespondTo) {
            if (current instanceof AuthorizeCallback) {
                AuthorizeCallback authorizeCallback = (AuthorizeCallback) current;
                // Don't support impersonating another identity
                authorizeCallback.setAuthorized(authorizeCallback.getAuthenticationID().equals(authorizeCallback.getAuthorizationID()));
            } else if (current instanceof PasswordCallback) {
                if (user == null) {
                    throw new UserNotFoundException(userName);
                }
                String password = user.require(PASSWORD).asString();
View Full Code Here

        }

        // Second Pass - Now iterate the Callback(s) requiring a response.
        for (Callback current : toRespondTo) {
            if (current instanceof AuthorizeCallback) {
                AuthorizeCallback authorizeCallback = (AuthorizeCallback) current;
                // Don't support impersonating another identity
                authorizeCallback.setAuthorized(authorizeCallback.getAuthenticationID().equals(
                        authorizeCallback.getAuthorizationID()));
            } else if (current instanceof PasswordCallback) {
                if (userFound == false) {
                    throw new UserNotFoundException(userName);
                }
                String password = users.get(userName).toString();
View Full Code Here

        {
            throw new SaslException("Invalid PLAIN encoding, authcid null terminator not found");
        }

        PlainPasswordCallback passwordCb;
        AuthorizeCallback authzCb;

        try
        {
            // we do not currently support authcid in any meaningful way
            String authzid = new String(response, authzidNullPosition + 1, authcidNullPosition - authzidNullPosition - 1, "utf8");
View Full Code Here

    @Override
    public void handle(Callback[] callbacks) throws InvalidToken,
        UnsupportedCallbackException {
      NameCallback nc = null;
      PasswordCallback pc = null;
      AuthorizeCallback ac = null;
      for (Callback callback : callbacks) {
        if (callback instanceof AuthorizeCallback) {
          ac = (AuthorizeCallback) callback;
        } else if (callback instanceof NameCallback) {
          nc = (NameCallback) callback;
        } else if (callback instanceof PasswordCallback) {
          pc = (PasswordCallback) callback;
        } else if (callback instanceof RealmCallback) {
          continue; // realm is ignored
        } else {
          throw new UnsupportedCallbackException(callback,
              "Unrecognized SASL DIGEST-MD5 Callback");
        }
      }
      if (pc != null) {
        TokenIdentifier tokenIdentifier = getIdentifier(nc.getDefaultName(), secretManager);
        char[] password = getPassword(tokenIdentifier);
        UserGroupInformation user = null;
        user = tokenIdentifier.getUser(); // may throw exception
        connection.attemptingUser = user;
        if (LOG.isDebugEnabled()) {
          LOG.debug("SASL server DIGEST-MD5 callback: setting password "
              + "for client: " + tokenIdentifier.getUser());
        }
        pc.setPassword(password);
      }
      if (ac != null) {
        String authid = ac.getAuthenticationID();
        String authzid = ac.getAuthorizationID();
        if (authid.equals(authzid)) {
          ac.setAuthorized(true);
        } else {
          ac.setAuthorized(false);
        }
        if (ac.isAuthorized()) {
          if (LOG.isDebugEnabled()) {
            String username =
              getIdentifier(authzid, secretManager).getUser().getUserName();
            LOG.debug("SASL server DIGEST-MD5 callback: setting "
                + "canonicalized client ID: " + username);
          }
          ac.setAuthorizedID(authzid);
        }
      }
    }
View Full Code Here

    /** {@inheritDoc} */
    @Override
    public void handle(Callback[] callbacks) throws
        UnsupportedCallbackException {
      AuthorizeCallback ac = null;
      for (Callback callback : callbacks) {
        if (callback instanceof AuthorizeCallback) {
          ac = (AuthorizeCallback) callback;
        } else {
          throw new UnsupportedCallbackException(callback,
              "Unrecognized SASL GSSAPI Callback");
        }
      }
      if (ac != null) {
        String authid = ac.getAuthenticationID();
        String authzid = ac.getAuthorizationID();
        if (authid.equals(authzid)) {
          ac.setAuthorized(true);
        } else {
          ac.setAuthorized(false);
        }
        if (ac.isAuthorized()) {
          if (LOG.isDebugEnabled())
            LOG.debug("SASL server GSSAPI callback: setting "
                + "canonicalized client ID: " + authzid);
          ac.setAuthorizedID(authzid);
        }
      }
    }
View Full Code Here

TOP

Related Classes of javax.security.sasl.AuthorizeCallback

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.