Categories:
Audio (13)
Biotech (29)
Bytecode (36)
Database (77)
Framework (7)
Game (7)
General (507)
Graphics (53)
I/O (35)
IDE (2)
JAR Tools (101)
JavaBeans (21)
JDBC (121)
JDK (426)
JSP (20)
Logging (108)
Mail (58)
Messaging (8)
Network (84)
PDF (97)
Report (7)
Scripting (84)
Security (32)
Server (121)
Servlet (26)
SOAP (24)
Testing (54)
Web (15)
XML (309)
Collections:
Other Resources:
JDK 17 java.naming.jmod - Naming Module
JDK 17 java.naming.jmod is the JMOD file for JDK 17 Naming module.
JDK 17 Naming module compiled class files are stored in \fyicenter\jdk-17.0.5\jmods\java.naming.jmod.
JDK 17 Naming module compiled class files are also linked and stored in the \fyicenter\jdk-17.0.5\lib\modules JImage file.
JDK 17 Naming module source code files are stored in \fyicenter\jdk-17.0.5\lib\src.zip\java.naming.
You can click and view the content of each source code file in the list below.
✍: FYIcenter
⏎ com/sun/jndi/ldap/sasl/LdapSasl.java
/* * Copyright (c) 1999, 2011, Oracle and/or its affiliates. All rights reserved. * ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. * * * * * * * * * * * * * * * * * * * * */ package com.sun.jndi.ldap.sasl; import java.io.*; import java.security.cert.X509Certificate; import java.util.Vector; import java.util.Hashtable; import java.util.StringTokenizer; import javax.naming.AuthenticationException; import javax.naming.AuthenticationNotSupportedException; import javax.naming.NamingException; import javax.naming.ldap.Control; import javax.security.auth.callback.CallbackHandler; import javax.security.sasl.*; import com.sun.jndi.ldap.Connection; import com.sun.jndi.ldap.LdapClient; import com.sun.jndi.ldap.LdapResult; import sun.security.util.ChannelBindingException; import sun.security.util.TlsChannelBinding; import sun.security.util.TlsChannelBinding.TlsChannelBindingType; /** * Handles SASL support. * * @author Vincent Ryan * @author Rosanna Lee */ public final class LdapSasl { // SASL stuff private static final String SASL_CALLBACK = "java.naming.security.sasl.callback"; private static final String SASL_AUTHZ_ID = "java.naming.security.sasl.authorizationId"; private static final String SASL_REALM = "java.naming.security.sasl.realm"; private static final int LDAP_SUCCESS = 0; private static final int LDAP_SASL_BIND_IN_PROGRESS = 14; // LDAPv3 // TLS channel binding type property private static final String CHANNEL_BINDING_TYPE = "com.sun.jndi.ldap.tls.cbtype"; // internal TLS channel binding property private static final String CHANNEL_BINDING = "jdk.internal.sasl.tlschannelbinding"; private LdapSasl() { } /** * Performs SASL bind. * Creates a SaslClient by using a default CallbackHandler * that uses the Context.SECURITY_PRINCIPAL and Context.SECURITY_CREDENTIALS * properties to satisfy the callbacks, and by using the * SASL_AUTHZ_ID property as the authorization id. If the SASL_AUTHZ_ID * property has not been set, Context.SECURITY_PRINCIPAL is used. * If SASL_CALLBACK has been set, use that instead of the default * CallbackHandler. * <p> * If bind is successful and the selected SASL mechanism has a security * layer, set inStream and outStream to be filter streams that use * the security layer. These will be used for subsequent communication * with the server. * * @param conn The non-null connection to use for sending an LDAP BIND * @param server Non-null string name of host to connect to * @param dn Non-null DN to bind as; also used as authentication ID * @param pw Possibly null password; can be byte[], char[] or String * @param authMech A non-null space-separated list of SASL authentication * mechanisms. * @param env The possibly null environment of the context, possibly containing * properties for used by SASL mechanisms * @param bindCtls The possibly null controls to accompany the bind * @return LdapResult containing status of the bind */ @SuppressWarnings("unchecked") public static LdapResult saslBind(LdapClient clnt, Connection conn, String server, String dn, Object pw, String authMech, Hashtable<?,?> env, Control[] bindCtls) throws IOException, NamingException { SaslClient saslClnt = null; boolean cleanupHandler = false; // Use supplied callback handler or create default CallbackHandler cbh = (env != null) ? (CallbackHandler)env.get(SASL_CALLBACK) : null; if (cbh == null) { cbh = new DefaultCallbackHandler(dn, pw, (String)env.get(SASL_REALM)); cleanupHandler = true; } // Prepare parameters for creating SASL client String authzId = (env != null) ? (String)env.get(SASL_AUTHZ_ID) : null; String[] mechs = getSaslMechanismNames(authMech); // Internal TLS Channel Binding property cannot be set explicitly if (env.get(CHANNEL_BINDING) != null) { throw new NamingException(CHANNEL_BINDING + " property cannot be set explicitly"); } Hashtable<String, Object> envProps = (Hashtable<String, Object>) env; try { // Prepare TLS Channel Binding data if (conn.isTlsConnection()) { TlsChannelBindingType cbType; try { cbType = TlsChannelBinding.parseType((String)env.get(CHANNEL_BINDING_TYPE)); } catch (ChannelBindingException e) { throw wrapInNamingException(e); } if (cbType == TlsChannelBindingType.TLS_SERVER_END_POINT) { // set tls-server-end-point channel binding X509Certificate cert = conn.getTlsServerCertificate(); if (cert != null) { TlsChannelBinding tlsCB; try { tlsCB = TlsChannelBinding.create(cert); } catch (ChannelBindingException e) { throw wrapInNamingException(e); } envProps = (Hashtable<String, Object>) env.clone(); envProps.put(CHANNEL_BINDING, tlsCB.getData()); } else { throw new SaslException("No suitable certificate to generate " + "TLS Channel Binding data"); } } } // Create SASL client to use using SASL package saslClnt = Sasl.createSaslClient( mechs, authzId, "ldap", server, envProps, cbh); if (saslClnt == null) { throw new AuthenticationNotSupportedException(authMech); } LdapResult res; String mechName = saslClnt.getMechanismName(); byte[] response = saslClnt.hasInitialResponse() ? saslClnt.evaluateChallenge(NO_BYTES) : null; res = clnt.ldapBind(null, response, bindCtls, mechName, true); while (!saslClnt.isComplete() && (res.status == LDAP_SASL_BIND_IN_PROGRESS || res.status == LDAP_SUCCESS)) { response = saslClnt.evaluateChallenge( res.serverCreds != null? res.serverCreds : NO_BYTES); if (res.status == LDAP_SUCCESS) { if (response != null) { throw new AuthenticationException( "SASL client generated response after success"); } break; } res = clnt.ldapBind(null, response, bindCtls, mechName, true); } if (res.status == LDAP_SUCCESS) { if (!saslClnt.isComplete()) { throw new AuthenticationException( "SASL authentication not complete despite server claims"); } String qop = (String) saslClnt.getNegotiatedProperty(Sasl.QOP); // If negotiated integrity or privacy, if (qop != null && (qop.equalsIgnoreCase("auth-int") || qop.equalsIgnoreCase("auth-conf"))) { InputStream newIn = new SaslInputStream(saslClnt, conn.inStream); OutputStream newOut = new SaslOutputStream(saslClnt, conn.outStream); conn.replaceStreams(newIn, newOut); } else { saslClnt.dispose(); } } return res; } catch (SaslException e) { NamingException ne = new AuthenticationException( authMech); ne.setRootCause(e); throw ne; } finally { if (cleanupHandler) { ((DefaultCallbackHandler)cbh).clearPassword(); } } } /** * Returns an array of SASL mechanisms given a string of space * separated SASL mechanism names. * @param The non-null string containing the mechanism names * @return A non-null array of String; each element of the array * contains a single mechanism name. */ private static String[] getSaslMechanismNames(String str) { StringTokenizer parser = new StringTokenizer(str); Vector<String> mechs = new Vector<>(10); while (parser.hasMoreTokens()) { mechs.addElement(parser.nextToken()); } String[] mechNames = new String[mechs.size()]; for (int i = 0; i < mechs.size(); i++) { mechNames[i] = mechs.elementAt(i); } return mechNames; } private static NamingException wrapInNamingException(Exception e) { NamingException ne = new NamingException(); ne.setRootCause(e); return ne; } private static final byte[] NO_BYTES = new byte[0]; }
⏎ com/sun/jndi/ldap/sasl/LdapSasl.java
Or download all of them as a single archive file:
File name: java.naming-17.0.5-src.zip File size: 490626 bytes Release date: 2022-09-13 Download
⇒ JDK 17 java.net.http.jmod - Net HTTP Module
2023-09-23, 6456👍, 0💬
Popular Posts:
JDK 1.1 source code directory contains Java source code for JDK 1.1 core classes: "C:\fyicenter\jdk-...
How to download and install JDK (Java Development Kit) 8? If you want to write Java applications, yo...
layout.jar is a component in iText Java library to provide layout functionalities. iText Java librar...
What Is commons-logging-1.2.jar? commons-logging-1.2.jar is the JAR file for Apache Commons Logging ...
Jetty provides an HTTP server, HTTP client, and javax.servlet container. These components are open s...