Categories:
Audio (13)
Biotech (29)
Bytecode (36)
Database (77)
Framework (7)
Game (7)
General (507)
Graphics (53)
I/O (35)
IDE (2)
JAR Tools (101)
JavaBeans (21)
JDBC (121)
JDK (426)
JSP (20)
Logging (108)
Mail (58)
Messaging (8)
Network (84)
PDF (97)
Report (7)
Scripting (84)
Security (32)
Server (121)
Servlet (26)
SOAP (24)
Testing (54)
Web (15)
XML (309)
Collections:
Other Resources:
JDK 11 java.naming.jmod - Naming Module
JDK 11 java.naming.jmod is the JMOD file for JDK 11 Naming module.
JDK 11 Naming module compiled class files are stored in \fyicenter\jdk-11.0.1\jmods\java.naming.jmod.
JDK 11 Naming module compiled class files are also linked and stored in the \fyicenter\jdk-11.0.1\lib\modules JImage file.
JDK 11 Naming module source code files are stored in \fyicenter\jdk-11.0.1\lib\src.zip\java.naming.
You can click and view the content of each source code file in the list below.
✍: FYIcenter
⏎ com/sun/jndi/ldap/sasl/LdapSasl.java
/* * Copyright (c) 1999, 2011, Oracle and/or its affiliates. All rights reserved. * ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. * * * * * * * * * * * * * * * * * * * * */ package com.sun.jndi.ldap.sasl; import java.io.*; import java.util.Vector; import java.util.Hashtable; import java.util.StringTokenizer; import javax.naming.AuthenticationException; import javax.naming.AuthenticationNotSupportedException; import javax.naming.NamingException; import javax.naming.ldap.Control; import javax.security.auth.callback.CallbackHandler; import javax.security.sasl.*; import com.sun.jndi.ldap.Connection; import com.sun.jndi.ldap.LdapClient; import com.sun.jndi.ldap.LdapResult; /** * Handles SASL support. * * @author Vincent Ryan * @author Rosanna Lee */ final public class LdapSasl { // SASL stuff private static final String SASL_CALLBACK = "java.naming.security.sasl.callback"; private static final String SASL_AUTHZ_ID = "java.naming.security.sasl.authorizationId"; private static final String SASL_REALM = "java.naming.security.sasl.realm"; private static final int LDAP_SUCCESS = 0; private static final int LDAP_SASL_BIND_IN_PROGRESS = 14; // LDAPv3 private LdapSasl() { } /** * Performs SASL bind. * Creates a SaslClient by using a default CallbackHandler * that uses the Context.SECURITY_PRINCIPAL and Context.SECURITY_CREDENTIALS * properties to satisfy the callbacks, and by using the * SASL_AUTHZ_ID property as the authorization id. If the SASL_AUTHZ_ID * property has not been set, Context.SECURITY_PRINCIPAL is used. * If SASL_CALLBACK has been set, use that instead of the default * CallbackHandler. * <p> * If bind is successful and the selected SASL mechanism has a security * layer, set inStream and outStream to be filter streams that use * the security layer. These will be used for subsequent communication * with the server. * * @param conn The non-null connection to use for sending an LDAP BIND * @param server Non-null string name of host to connect to * @param dn Non-null DN to bind as; also used as authentication ID * @param pw Possibly null password; can be byte[], char[] or String * @param authMech A non-null space-separated list of SASL authentication * mechanisms. * @param env The possibly null environment of the context, possibly containing * properties for used by SASL mechanisms * @param bindCtls The possibly null controls to accompany the bind * @return LdapResult containing status of the bind */ @SuppressWarnings("unchecked") public static LdapResult saslBind(LdapClient clnt, Connection conn, String server, String dn, Object pw, String authMech, Hashtable<?,?> env, Control[] bindCtls) throws IOException, NamingException { SaslClient saslClnt = null; boolean cleanupHandler = false; // Use supplied callback handler or create default CallbackHandler cbh = (env != null) ? (CallbackHandler)env.get(SASL_CALLBACK) : null; if (cbh == null) { cbh = new DefaultCallbackHandler(dn, pw, (String)env.get(SASL_REALM)); cleanupHandler = true; } // Prepare parameters for creating SASL client String authzId = (env != null) ? (String)env.get(SASL_AUTHZ_ID) : null; String[] mechs = getSaslMechanismNames(authMech); try { // Create SASL client to use using SASL package saslClnt = Sasl.createSaslClient( mechs, authzId, "ldap", server, (Hashtable<String, ?>)env, cbh); if (saslClnt == null) { throw new AuthenticationNotSupportedException(authMech); } LdapResult res; String mechName = saslClnt.getMechanismName(); byte[] response = saslClnt.hasInitialResponse() ? saslClnt.evaluateChallenge(NO_BYTES) : null; res = clnt.ldapBind(null, response, bindCtls, mechName, true); while (!saslClnt.isComplete() && (res.status == LDAP_SASL_BIND_IN_PROGRESS || res.status == LDAP_SUCCESS)) { response = saslClnt.evaluateChallenge( res.serverCreds != null? res.serverCreds : NO_BYTES); if (res.status == LDAP_SUCCESS) { if (response != null) { throw new AuthenticationException( "SASL client generated response after success"); } break; } res = clnt.ldapBind(null, response, bindCtls, mechName, true); } if (res.status == LDAP_SUCCESS) { if (!saslClnt.isComplete()) { throw new AuthenticationException( "SASL authentication not complete despite server claims"); } String qop = (String) saslClnt.getNegotiatedProperty(Sasl.QOP); // If negotiated integrity or privacy, if (qop != null && (qop.equalsIgnoreCase("auth-int") || qop.equalsIgnoreCase("auth-conf"))) { InputStream newIn = new SaslInputStream(saslClnt, conn.inStream); OutputStream newOut = new SaslOutputStream(saslClnt, conn.outStream); conn.replaceStreams(newIn, newOut); } else { saslClnt.dispose(); } } return res; } catch (SaslException e) { NamingException ne = new AuthenticationException( authMech); ne.setRootCause(e); throw ne; } finally { if (cleanupHandler) { ((DefaultCallbackHandler)cbh).clearPassword(); } } } /** * Returns an array of SASL mechanisms given a string of space * separated SASL mechanism names. * @param The non-null string containing the mechanism names * @return A non-null array of String; each element of the array * contains a single mechanism name. */ private static String[] getSaslMechanismNames(String str) { StringTokenizer parser = new StringTokenizer(str); Vector<String> mechs = new Vector<>(10); while (parser.hasMoreTokens()) { mechs.addElement(parser.nextToken()); } String[] mechNames = new String[mechs.size()]; for (int i = 0; i < mechs.size(); i++) { mechNames[i] = mechs.elementAt(i); } return mechNames; } private static final byte[] NO_BYTES = new byte[0]; }
⏎ com/sun/jndi/ldap/sasl/LdapSasl.java
Or download all of them as a single archive file:
File name: java.naming-11.0.1-src.zip File size: 461792 bytes Release date: 2018-11-04 Download
⇒ JDK 11 java.net.http.jmod - Net HTTP Module
2020-09-30, 60672👍, 0💬
Popular Posts:
Java Servlet 3.0 Specification API. JAR File Size and Download Location: File name: servlet-api.jar,...
JDK 7 tools.jar is the JAR file for JDK 7 tools. It contains Java classes to support different JDK t...
How to read XML document with DTD validation from socket connections with the socket\DelayedInput.ja.. .
JDK 17 java.desktop.jmod is the JMOD file for JDK 17 Desktop module. JDK 17 Desktop module compiled ...
JUnit Source Code Files are provided in the source package file, junit-4.13.2-sources.jar .You can b...