Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/test/sun/security/krb5/auto/ForwardableCheck.java
38853 views
/*1* Copyright (c) 2014, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223/*24* @test25* @bug 802258226* @summary Relax response flags checking in sun.security.krb5.KrbKdcRep.check.27* @compile -XDignore.symbol.file ForwardableCheck.java28* @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock ForwardableCheck29*/3031import org.ietf.jgss.GSSException;32import sun.security.jgss.GSSUtil;3334import java.util.Arrays;3536public class ForwardableCheck {3738public static void main(String[] args) throws Exception {39OneKDC kdc = new OneKDC(null);40kdc.writeJAASConf();4142// USER can impersonate someone else43kdc.setOption(KDC.Option.ALLOW_S4U2SELF,44Arrays.asList(OneKDC.USER + "@" + OneKDC.REALM));45// USER2 is sensitive46kdc.setOption(KDC.Option.SENSITIVE_ACCOUNTS,47Arrays.asList(OneKDC.USER2 + "@" + OneKDC.REALM));4849Context c;5051// USER2 is sensitive but it's still able to get a normal ticket52c = Context.fromUserPass(OneKDC.USER2, OneKDC.PASS2, false);5354// ... and connect to another account55c.startAsClient(OneKDC.USER, GSSUtil.GSS_KRB5_MECH_OID);56c.x().requestCredDeleg(true);57c.x().requestMutualAuth(false);5859c.take(new byte[0]);6061if (!c.x().isEstablished()) {62throw new Exception("Context should have been established");63}6465// ... but will not be able to delegate itself66if (c.x().getCredDelegState()) {67throw new Exception("Impossible");68}6970// Although USER is allowed to impersonate other people,71// it cannot impersonate USER2 coz it's sensitive.72c = Context.fromUserPass(OneKDC.USER, OneKDC.PASS, false);73try {74c.impersonate(OneKDC.USER2);75throw new Exception("Should fail");76} catch (GSSException e) {77e.printStackTrace();78}79}80}818283