Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/src/share/classes/sun/security/krb5/EncryptedData.java
38830 views
1
/*
2
* Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
/*
27
*
28
* (C) Copyright IBM Corp. 1999 All Rights Reserved.
29
* Copyright 1997 The Open Group Research Institute. All rights reserved.
30
*/
31
32
package sun.security.krb5;
33
34
import sun.security.util.*;
35
import sun.security.krb5.internal.crypto.*;
36
import sun.security.krb5.internal.*;
37
import java.io.IOException;
38
import java.math.BigInteger;
39
40
/**
41
* This class encapsulates Kerberos encrypted data. It allows
42
* callers access to both the ASN.1 encoded form of the EncryptedData
43
* type as well as the raw cipher text.
44
*/
45
46
public class EncryptedData implements Cloneable {
47
int eType;
48
Integer kvno; // optional
49
byte[] cipher;
50
byte[] plain; // not part of ASN.1 encoding
51
52
// ----------------+-----------+----------+----------------+---------------
53
// Encryption type |etype value|block size|minimum pad size|confounder size
54
// ----------------+-----------+----------+----------------+---------------
55
public static final int
56
ETYPE_NULL = 0; // 1 0 0
57
public static final int
58
ETYPE_DES_CBC_CRC = 1; // 8 4 8
59
public static final int
60
ETYPE_DES_CBC_MD4 = 2; // 8 0 8
61
public static final int
62
ETYPE_DES_CBC_MD5 = 3; // 8 0 8
63
64
// draft-brezak-win2k-krb-rc4-hmac-04.txt
65
public static final int
66
ETYPE_ARCFOUR_HMAC = 23; // 1
67
// NOTE: the exportable RC4-HMAC is not supported;
68
// it is no longer a usable encryption type
69
public static final int
70
ETYPE_ARCFOUR_HMAC_EXP = 24; // 1
71
72
// draft-ietf-krb-wg-crypto-07.txt
73
public static final int
74
ETYPE_DES3_CBC_HMAC_SHA1_KD = 16; // 8 0 8
75
76
// draft-raeburn-krb-rijndael-krb-07.txt
77
public static final int
78
ETYPE_AES128_CTS_HMAC_SHA1_96 = 17; // 16 0 16
79
public static final int
80
ETYPE_AES256_CTS_HMAC_SHA1_96 = 18; // 16 0 16
81
82
/* used by self */
83
private EncryptedData() {
84
}
85
86
public Object clone() {
87
EncryptedData new_encryptedData = new EncryptedData();
88
new_encryptedData.eType = eType;
89
if (kvno != null) {
90
new_encryptedData.kvno = new Integer(kvno.intValue());
91
}
92
if (cipher != null) {
93
new_encryptedData.cipher = new byte[cipher.length];
94
System.arraycopy(cipher, 0, new_encryptedData.cipher,
95
0, cipher.length);
96
}
97
return new_encryptedData;
98
}
99
100
// Used in JSSE (com.sun.net.ssl.internal.KerberosPreMasterSecret)
101
public EncryptedData(
102
int new_eType,
103
Integer new_kvno,
104
byte[] new_cipher) {
105
eType = new_eType;
106
kvno = new_kvno;
107
cipher = new_cipher;
108
}
109
110
/*
111
// Not used.
112
public EncryptedData(
113
EncryptionKey key,
114
byte[] plaintext)
115
throws KdcErrException, KrbCryptoException {
116
EType etypeEngine = EType.getInstance(key.getEType());
117
cipher = etypeEngine.encrypt(plaintext, key.getBytes());
118
eType = key.getEType();
119
kvno = key.getKeyVersionNumber();
120
}
121
*/
122
123
// used in KrbApRep, KrbApReq, KrbAsReq, KrbCred, KrbPriv
124
// Used in JSSE (com.sun.net.ssl.internal.KerberosPreMasterSecret)
125
public EncryptedData(
126
EncryptionKey key,
127
byte[] plaintext,
128
int usage)
129
throws KdcErrException, KrbCryptoException {
130
EType etypeEngine = EType.getInstance(key.getEType());
131
cipher = etypeEngine.encrypt(plaintext, key.getBytes(), usage);
132
eType = key.getEType();
133
kvno = key.getKeyVersionNumber();
134
}
135
136
/*
137
// Not used.
138
public EncryptedData(
139
EncryptionKey key,
140
byte[] ivec,
141
byte[] plaintext)
142
throws KdcErrException, KrbCryptoException {
143
EType etypeEngine = EType.getInstance(key.getEType());
144
cipher = etypeEngine.encrypt(plaintext, key.getBytes(), ivec);
145
eType = key.getEType();
146
kvno = key.getKeyVersionNumber();
147
}
148
*/
149
150
/*
151
// Not used.
152
EncryptedData(
153
StringBuffer password,
154
byte[] plaintext)
155
throws KdcErrException, KrbCryptoException {
156
EncryptionKey key = new EncryptionKey(password);
157
EType etypeEngine = EType.getInstance(key.getEType());
158
cipher = etypeEngine.encrypt(plaintext, key.getBytes());
159
eType = key.getEType();
160
kvno = key.getKeyVersionNumber();
161
}
162
*/
163
public byte[] decrypt(
164
EncryptionKey key, int usage)
165
throws KdcErrException, KrbApErrException, KrbCryptoException {
166
if (eType != key.getEType()) {
167
throw new KrbCryptoException(
168
"EncryptedData is encrypted using keytype " +
169
EType.toString(eType) +
170
" but decryption key is of type " +
171
EType.toString(key.getEType()));
172
}
173
174
EType etypeEngine = EType.getInstance(eType);
175
plain = etypeEngine.decrypt(cipher, key.getBytes(), usage);
176
// The service ticket will be used in S4U2proxy request. Therefore
177
// the raw ticket is still needed.
178
//cipher = null;
179
return etypeEngine.decryptedData(plain);
180
}
181
182
/*
183
// currently destructive on cipher
184
// Not used.
185
public byte[] decrypt(
186
EncryptionKey key,
187
byte[] ivec, int usage)
188
throws KdcErrException, KrbApErrException, KrbCryptoException {
189
// XXX check for matching eType and kvno here
190
EType etypeEngine = EType.getInstance(eType);
191
plain = etypeEngine.decrypt(cipher, key.getBytes(), ivec, usage);
192
cipher = null;
193
return etypeEngine.decryptedData(plain);
194
}
195
196
// currently destructive on cipher
197
// Not used.
198
byte[] decrypt(StringBuffer password)
199
throws KdcErrException, KrbApErrException, KrbCryptoException {
200
EncryptionKey key = new EncryptionKey(password);
201
// XXX check for matching eType here
202
EType etypeEngine = EType.getInstance(eType);
203
plain = etypeEngine.decrypt(cipher, key.getBytes());
204
cipher = null;
205
return etypeEngine.decryptedData(plain);
206
}
207
*/
208
209
private byte[] decryptedData() throws KdcErrException {
210
if (plain != null) {
211
EType etypeEngine = EType.getInstance(eType);
212
return etypeEngine.decryptedData(plain);
213
}
214
return null;
215
}
216
217
/**
218
* Constructs an instance of EncryptedData type.
219
* @param encoding a single DER-encoded value.
220
* @exception Asn1Exception if an error occurs while decoding an
221
* ASN1 encoded data.
222
* @exception IOException if an I/O error occurs while reading encoded
223
* data.
224
*
225
*/
226
/* Used by self */
227
private EncryptedData(DerValue encoding)
228
throws Asn1Exception, IOException {
229
230
DerValue der = null;
231
if (encoding.getTag() != DerValue.tag_Sequence) {
232
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
233
}
234
der = encoding.getData().getDerValue();
235
if ((der.getTag() & (byte)0x1F) == (byte)0x00) {
236
eType = (der.getData().getBigInteger()).intValue();
237
} else {
238
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
239
}
240
241
if ((encoding.getData().peekByte() & 0x1F) == 1) {
242
der = encoding.getData().getDerValue();
243
int i = (der.getData().getBigInteger()).intValue();
244
kvno = new Integer(i);
245
} else {
246
kvno = null;
247
}
248
der = encoding.getData().getDerValue();
249
if ((der.getTag() & (byte)0x1F) == (byte)0x02) {
250
cipher = der.getData().getOctetString();
251
} else {
252
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
253
}
254
if (encoding.getData().available() > 0) {
255
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
256
}
257
}
258
259
/**
260
* Returns an ASN.1 encoded EncryptedData type.
261
*
262
* <pre>{@code
263
* EncryptedData ::= SEQUENCE {
264
* etype [0] Int32 -- EncryptionType --,
265
* kvno [1] UInt32 OPTIONAL,
266
* cipher [2] OCTET STRING -- ciphertext
267
* }
268
* }</pre>
269
*
270
* <p>
271
* This definition reflects the Network Working Group RFC 4120
272
* specification available at
273
* <a href="http://www.ietf.org/rfc/rfc4120.txt">
274
* http://www.ietf.org/rfc/rfc4120.txt</a>.
275
*
276
* @return byte array of encoded EncryptedData object.
277
* @exception Asn1Exception if an error occurs while decoding an
278
* ASN1 encoded data.
279
* @exception IOException if an I/O error occurs while reading
280
* encoded data.
281
*
282
*/
283
public byte[] asn1Encode() throws Asn1Exception, IOException {
284
DerOutputStream bytes = new DerOutputStream();
285
DerOutputStream temp = new DerOutputStream();
286
temp.putInteger(BigInteger.valueOf(this.eType));
287
bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT,
288
true, (byte)0x00), temp);
289
temp = new DerOutputStream();
290
if (kvno != null) {
291
// encode as an unsigned integer (UInt32)
292
temp.putInteger(BigInteger.valueOf(this.kvno.longValue()));
293
bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT,
294
true, (byte)0x01), temp);
295
temp = new DerOutputStream();
296
}
297
temp.putOctetString(this.cipher);
298
bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true,
299
(byte)0x02), temp);
300
temp = new DerOutputStream();
301
temp.write(DerValue.tag_Sequence, bytes);
302
return temp.toByteArray();
303
}
304
305
306
/**
307
* Parse (unmarshal) an EncryptedData from a DER input stream. This form
308
* parsing might be used when expanding a value which is part of
309
* a constructed sequence and uses explicitly tagged type.
310
*
311
* @param data the Der input stream value, which contains one or more
312
* marshaled value.
313
* @param explicitTag tag number.
314
* @param optional indicate if this data field is optional
315
* @exception Asn1Exception if an error occurs while decoding an
316
* ASN1 encoded data.
317
* @exception IOException if an I/O error occurs while reading
318
* encoded data.
319
* @return an instance of EncryptedData.
320
*
321
*/
322
public static EncryptedData parse(DerInputStream data,
323
byte explicitTag,
324
boolean optional)
325
throws Asn1Exception, IOException {
326
if ((optional) &&
327
(((byte)data.peekByte() & (byte)0x1F) != explicitTag))
328
return null;
329
DerValue der = data.getDerValue();
330
if (explicitTag != (der.getTag() & (byte)0x1F)) {
331
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
332
} else {
333
DerValue subDer = der.getData().getDerValue();
334
return new EncryptedData(subDer);
335
}
336
}
337
338
/**
339
* Reset asn.1 data stream after decryption, remove redundant bytes.
340
* @param data the decrypted data from decrypt().
341
* @return the reset byte array which holds exactly one asn1 datum
342
* including its tag and length.
343
*
344
*/
345
public byte[] reset(byte[] data) {
346
byte[] bytes = null;
347
// for asn.1 encoded data, we use length field to
348
// determine the data length and remove redundant paddings.
349
if ((data[1] & 0xFF) < 128) {
350
bytes = new byte[data[1] + 2];
351
System.arraycopy(data, 0, bytes, 0, data[1] + 2);
352
} else {
353
if ((data[1] & 0xFF) > 128) {
354
int len = data[1] & (byte)0x7F;
355
int result = 0;
356
for (int i = 0; i < len; i++) {
357
result |= (data[i + 2] & 0xFF) << (8 * (len - i - 1));
358
}
359
bytes = new byte[result + len + 2];
360
System.arraycopy(data, 0, bytes, 0, result + len + 2);
361
}
362
}
363
return bytes;
364
}
365
366
public int getEType() {
367
return eType;
368
}
369
370
public Integer getKeyVersionNumber() {
371
return kvno;
372
}
373
374
/**
375
* Returns the raw cipher text bytes, not in ASN.1 encoding.
376
*/
377
public byte[] getBytes() {
378
return cipher;
379
}
380
}
381
382