/* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright (c) 1997-2014 Oracle and/or its affiliates. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common Development * and Distribution License("CDDL") (collectively, the "License"). You * may not use this file except in compliance with the License. You can * obtain a copy of the License at * https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html * or packager/legal/LICENSE.txt. See the License for the specific * language governing permissions and limitations under the License. * * When distributing the software, include this License Header Notice in each * file and include the License file at packager/legal/LICENSE.txt. * * GPL Classpath Exception: * Oracle designates this particular file as subject to the "Classpath" * exception as provided by Oracle in the GPL Version 2 section of the License * file that accompanied this code. * * Modifications: * If applicable, add the following below the License Header, with the fields * enclosed by brackets [] replaced by your own identifying information: * "Portions Copyright [year] [name of copyright owner]" * * Contributor(s): * If you wish your version of this file to be governed by only the CDDL or * only the GPL Version 2, indicate your decision by adding "[Contributor] * elects to include this software in this distribution under the [CDDL or GPL * Version 2] license." If you don't indicate a single choice of license, a * recipient has the option to distribute your version of this file under * either the CDDL, the GPL Version 2 or to extend the choice of license to * its licensees as provided above. However, if you add GPL Version 2 code * and therefore, elected the GPL Version 2 license, then the option applies * only if the new code is made subject to such option by the copyright * holder. */ package com.sun.enterprise.security.auth.realm.ldap; import java.util.*; import java.io.IOException; import java.util.logging.Level; import javax.naming.CompositeName; import javax.naming.Context; import javax.naming.NamingEnumeration; import javax.naming.NamingException; import javax.naming.directory.Attribute; import javax.naming.directory.DirContext; import javax.naming.directory.InitialDirContext; import javax.naming.directory.SearchControls; import javax.naming.directory.SearchResult; import javax.security.auth.login.LoginException; import java.security.Principal; // imported from the ldap booster pack import com.sun.jndi.ldap.obj.GroupOfURLs; import javax.security.auth.x500.X500Principal; import com.sun.enterprise.security.auth.realm.BadRealmException; import com.sun.enterprise.security.auth.realm.NoSuchUserException; import com.sun.enterprise.security.auth.realm.NoSuchRealmException; import com.sun.enterprise.security.auth.realm.InvalidOperationException; import com.sun.enterprise.security.auth.realm.IASRealm; import java.lang.StringBuffer; import java.util.regex.Matcher; import org.glassfish.internal.api.RelativePathResolver; import org.jvnet.hk2.annotations.Service; import sun.security.x509.X500Name; /** * Realm wrapper for supporting LDAP authentication. * * <P>See LDAPLoginModule documentation for more details on the operation * of the LDAP realm and login module. * * <P>The ldap realm needs the following properties in its configuration: * <ul> * <li>directory - URL of LDAP directory to use * <li>base-dn - The base DN to use for user searches. * <li>jaas-ctx - JAAS context name used to access LoginModule for * authentication. * </ul> * * <P>Besides JDK Context properties start with java.naming, javax.security, * one can also set connection pool related properties starting with * com.sun.jndi.ldap.connect.pool. * See http://java.sun.com/products/jndi/tutorial/ldap/connect/config.html * for details. * Also, the following optional attributes can also be specified: * <ul> * <li>search-filter - LDAP filter to use for searching for the user * entry based on username given to iAS. The default value is * <code>uid=%s</code> where %s is expanded to the username. * <li>group-base-dn - The base DN to use for group searches. By default * its value is the same as base-dn. * <li>group-search-filter - The LDAP filter to use for searching group * membership of a given user. The default value is <code> * uniquemember=%d</code> where %d is expanded to the DN of the * user found by the user search. * <li>group-target - The attribute which value(s) are interpreted as * group membership names of the user. Default value is <code>cn</code>. * <li>search-bind-dn - The dn of ldap user. optional and no default value. * <li>search-bind-password - The password of search-bind-dn.optional and * no default value. * <li>pool-size - The JNDI ldap connection pool size. * </ul> * * @see com.sun.enterprise.security.auth.login.LDAPLoginModule * */ @Service public final class LDAPRealm extends IASRealm { // Descriptive string of the authentication type of this realm. public static final String AUTH_TYPE = "ldap"; // These are property names which should be in auth-realm in server.xml public static final String PARAM_DIRURL="directory"; public static final String PARAM_USERDN="base-dn"; // These are optional, defaults are provided // %s = subject name // %d = DN of user search result public static final String PARAM_SEARCH_FILTER="search-filter"; public static final String PARAM_GRPDN="group-base-dn"; public static final String PARAM_GRP_SEARCH_FILTER="group-search-filter"; public static final String PARAM_GRP_TARGET="group-target"; public static final String PARAM_MODE="mode"; public static final String PARAM_JNDICF="jndiCtxFactory"; public static final String PARAM_POOLSIZE="pool-size"; // These are optional, no default values are provided public static final String PARAM_BINDDN="search-bind-dn"; public static final String PARAM_BINDPWD="search-bind-password"; // Only find-bind mode is supported so mode attribute is not exposed yet public static final String MODE_FIND_BIND="find-bind"; // Expansion strings public static final String SUBST_SUBJECT_NAME="%s"; public static final String SUBST_SUBJECT_DN="%d"; // Defaults private static final String SEARCH_FILTER_DEFAULT= "uid="+SUBST_SUBJECT_NAME; private static final String GRP_SEARCH_FILTER_DEFAULT= "uniquemember="+SUBST_SUBJECT_DN; private static final String GRP_TARGET_DEFAULT="cn"; private static final String MODE_DEFAULT=MODE_FIND_BIND; private static final String JNDICF_DEFAULT= "com.sun.jndi.ldap.LdapCtxFactory"; private static final int POOLSIZE_DEFAULT=5; private final String[] _dnOnly = {"dn"}; private static final String SUN_JNDI_POOL = "com.sun.jndi.ldap.connect.pool"; private static final String SUN_JNDI_POOL_ = "com.sun.jndi.ldap.connect.pool."; private static final String SUN_JNDI_POOL_PROTOCOL = "com.sun.jndi.ldap.connect.pool.protocol"; private static final String SUN_JNDI_POOL_MAXSIZE = "com.sun.jndi.ldap.connect.pool.maxsize"; // dynamic group related properties. private static final String DYNAMIC_GROUP_OBJECT_FACTORY = "com.sun.jndi.ldap.obj.LdapGroupFactory"; public static final String DYNAMIC_GROUP_FACTORY_OBJECT_PROPERTY = "java.naming.factory.object"; private static final String DYNAMIC_GROUP_STATE_FACTORY = "com.sun.jndi.ldap.obj.LdapGroupFactory"; public static final String DYNAMIC_GROUP_STATE_FACTORY_PROPERTY = "java.naming.factory.state"; public static final String LDAP_SOCKET_FACTORY = "java.naming.ldap.factory.socket"; public static final String DEFAULT_SSL_LDAP_SOCKET_FACTORY = "com.sun.enterprise.security.auth.realm.ldap.CustomSocketFactory"; public static final String LDAPS_URL = "ldaps://"; public static final String DEFAULT_POOL_PROTOCOL = "plain ssl"; public static final String DYNAMIC_GROUP_FILTER = "(&(objectclass=groupofuniquenames)(objectclass=*groupofurls*))"; public static final String SSL = "SSL"; private HashMap groupCache; private Vector emptyVector; private Properties ldapBindProps = new Properties(); /** * Initialize a realm with some properties. This can be used * when instantiating realms from their descriptions. This * method may only be called a single time. * * @param props Initialization parameters used by this realm. * @exception BadRealmException If the configuration parameters * identify a corrupt realm. * @exception NoSuchRealmException If the configuration parameters * specify a realm which doesn't exist. * */ public synchronized void init(Properties props) throws BadRealmException, NoSuchRealmException { super.init(props); String url = props.getProperty(PARAM_DIRURL); String dn = props.getProperty(PARAM_USERDN); String jaasCtx = props.getProperty(IASRealm.JAAS_CONTEXT_PARAM); if (url==null || dn==null || jaasCtx==null) { String msg = sm.getString("ldaprealm.badconfig", url, dn, jaasCtx); throw new BadRealmException(msg); } this.setProperty(PARAM_DIRURL, url); ldapBindProps.setProperty(Context.PROVIDER_URL, url); this.setProperty(PARAM_USERDN, dn); this.setProperty(IASRealm.JAAS_CONTEXT_PARAM, jaasCtx); String mode = props.getProperty(PARAM_MODE, MODE_DEFAULT); if (!MODE_DEFAULT.equals(mode)) { String msg = sm.getString("ldaprealm.badmode", mode); throw new BadRealmException(msg); } this.setProperty(PARAM_MODE, mode); String ctxF = props.getProperty(PARAM_JNDICF, JNDICF_DEFAULT); this.setProperty(PARAM_JNDICF, ctxF); ldapBindProps.setProperty(Context.INITIAL_CONTEXT_FACTORY, ctxF); String searchFilter = props.getProperty( PARAM_SEARCH_FILTER, SEARCH_FILTER_DEFAULT); this.setProperty(PARAM_SEARCH_FILTER,searchFilter); String grpDN = props.getProperty(PARAM_GRPDN, dn); this.setProperty(PARAM_GRPDN, grpDN); String grpSearchFilter = props.getProperty( PARAM_GRP_SEARCH_FILTER, GRP_SEARCH_FILTER_DEFAULT); this.setProperty(PARAM_GRP_SEARCH_FILTER, grpSearchFilter); String grpTarget = props.getProperty( PARAM_GRP_TARGET, GRP_TARGET_DEFAULT); this.setProperty(PARAM_GRP_TARGET, grpTarget); String objectFactory = props.getProperty( DYNAMIC_GROUP_FACTORY_OBJECT_PROPERTY, DYNAMIC_GROUP_OBJECT_FACTORY); this.setProperty(DYNAMIC_GROUP_FACTORY_OBJECT_PROPERTY, objectFactory); ldapBindProps.setProperty(DYNAMIC_GROUP_FACTORY_OBJECT_PROPERTY, objectFactory); String stateFactory = props.getProperty( DYNAMIC_GROUP_STATE_FACTORY_PROPERTY, DYNAMIC_GROUP_STATE_FACTORY); this.setProperty(DYNAMIC_GROUP_STATE_FACTORY_PROPERTY, stateFactory); ldapBindProps.setProperty(DYNAMIC_GROUP_STATE_FACTORY_PROPERTY, stateFactory); String bindDN = props.getProperty(PARAM_BINDDN); if (bindDN != null) { this.setProperty(PARAM_BINDDN, bindDN); ldapBindProps.setProperty(Context.SECURITY_PRINCIPAL, bindDN); } String bindPWD = props.getProperty(PARAM_BINDPWD); if (bindPWD != null) { //If the passwors is aliased, de-alias it try { bindPWD = RelativePathResolver.getRealPasswordFromAlias(bindPWD); }catch(Exception ex) { _logger.log(Level.WARNING, "ldaprealm.pwd.dealiasing.failed",ex); } this.setProperty(PARAM_BINDPWD, bindPWD); ldapBindProps.setProperty(Context.SECURITY_CREDENTIALS, bindPWD); } Enumeration penum = props.propertyNames(); while (penum.hasMoreElements()) { String propName = (String)penum.nextElement(); if (propName.startsWith("java.naming.") || propName.startsWith("javax.security.") || propName.startsWith("com.sun.jndi.ldap.")) { ldapBindProps.setProperty(propName, props.getProperty(propName)); } else if (propName.startsWith(SUN_JNDI_POOL_) && !SUN_JNDI_POOL_MAXSIZE.equals(propName)) { if (System.getProperty(propName) == null) { System.setProperty(propName, props.getProperty(propName)); } } } String poolSize = Integer.getInteger(PARAM_POOLSIZE,POOLSIZE_DEFAULT).toString(); String sunPoolSizeStr = props.getProperty(SUN_JNDI_POOL_MAXSIZE, poolSize); //Precedence rule: SUN_JNDI_POOL_MAXSIZE > PARAM_POOLSIZE > POOLSIZE_DEFAULT try { sunPoolSizeStr = Integer.valueOf(sunPoolSizeStr).toString(); } catch(Exception ex) { sunPoolSizeStr = poolSize; } if (System.getProperty(SUN_JNDI_POOL_MAXSIZE) == null) { System.setProperty(SUN_JNDI_POOL_MAXSIZE, sunPoolSizeStr); } this.setProperty(PARAM_POOLSIZE, sunPoolSizeStr); String usePool = props.getProperty(SUN_JNDI_POOL, "true"); ldapBindProps.setProperty(SUN_JNDI_POOL, usePool); if( url.startsWith(LDAPS_URL)) { ldapBindProps.setProperty(LDAP_SOCKET_FACTORY, DEFAULT_SSL_LDAP_SOCKET_FACTORY); if (System.getProperty(SUN_JNDI_POOL_PROTOCOL) == null) { System.setProperty(SUN_JNDI_POOL_PROTOCOL,DEFAULT_POOL_PROTOCOL); } if (_logger.isLoggable(Level.FINE)) { _logger.log(Level.FINE, "LDAPRealm : Using custom socket factory for SSL with pooling"); } } if (_logger.isLoggable(Level.FINE)) { Properties tempProps = (Properties)ldapBindProps.clone(); tempProps.remove(Context.SECURITY_CREDENTIALS); _logger.log(Level.FINE, "LDAPRealm : " + tempProps); } groupCache = new HashMap(); emptyVector = new Vector(); } /** * Returns a short (preferably less than fifteen characters) description * of the kind of authentication which is supported by this realm. * * @return Description of the kind of authentication that is directly * supported by this realm. */ public String getAuthType() { return AUTH_TYPE; } private String[] addMappedGroupNames(String[] grpList) { if (groupMapper == null) { return grpList; } ArrayList<String> finalresult = new ArrayList<String>(); for (String grp : grpList) { ArrayList<String> result = new ArrayList<String>(); groupMapper.getMappedGroups(grp, result); finalresult.add(grp); if (!result.isEmpty()) { finalresult.addAll(result); } } return finalresult.toArray(new String[finalresult.size()]); } /** * Get binding properties defined in server.xml for LDAP server. * */ private Properties getLdapBindProps() { return (Properties)ldapBindProps.clone(); } private List<String> getGroups(String userDN) { //no authentication has happened through the realm. DirContext ctx = null; String srcFilter = null; try { ctx = new InitialDirContext(getLdapBindProps()); String _username = userDN; try { X500Name name = new X500Name(userDN); _username = name.getCommonName(); } catch (IOException e) { //Ignoring the exception to suppot simple group names as userDN //Issue GLASSFISH-19595 } if (_username == null && userDN != null && userDN.startsWith("uid")) { //handle uid=XXX here where cn is not present //TODO :maybe there is a better way to handle this?? int first = userDN.indexOf("uid="); int last = userDN.indexOf(","); if (first != -1 && last != -1) { _username = userDN.substring(first + 4, last); } } StringBuffer sb = new StringBuffer(getProperty(PARAM_GRP_SEARCH_FILTER)); substitute(sb, SUBST_SUBJECT_NAME, _username); substitute(sb, SUBST_SUBJECT_DN, userDN); srcFilter = sb.toString(); List<String> groupsList = new ArrayList<String>(); groupsList.addAll(groupSearch(ctx, getProperty(PARAM_GRPDN), srcFilter, getProperty(PARAM_GRP_TARGET))); // search filter is constructed internally as // as a groupofURLS groupsList.addAll(dynamicGroupSearch(ctx, getProperty(PARAM_GRPDN), getProperty(PARAM_GRP_TARGET), userDN)); return groupsList; } catch (Exception e) { _logger.log(Level.WARNING, "ldaprealm.groupsearcherror",e); } finally { if (ctx != null) { try { ctx.close(); } catch (NamingException e) { _logger.log(Level.WARNING, "ldaprealm.exception", e); } } } return null; } /** * Returns the name of all the groups that this user belongs to. * Note that this information is only known after the user has * logged in. This is called from web path role verification, though * it should not be. * * @param username Name of the user in this realm whose group listing * is needed. * @return Enumeration of group names (strings). * @exception InvalidOperationException thrown if the realm does not * support this operation - e.g. Certificate realm does not support * this operation. */ public Enumeration getGroupNames (String username) throws InvalidOperationException, NoSuchUserException { Vector v = (Vector)groupCache.get(username); if (v == null) { //Note : assuming the username is a userDN here List<String> searchedGrps = getGroups(username); if (searchedGrps != null) { return Collections.enumeration(searchedGrps); } if (_logger.isLoggable(Level.FINE)) { _logger.log(Level.FINE, "No groups available for: "+username); } // we don't load group here as we need to bind ctx to user with // password before doing that and password is not available here return emptyVector.elements(); } else { if (groupMapper != null) { Vector ret = new Vector(); ret.addAll(v); ArrayList<String> result = new ArrayList<String>(); for (Object o : v) { String grp = (String)o; ArrayList<String> tmp =this.getMappedGroupNames(grp); result.addAll(tmp); } ret.addAll(result); return ret.elements(); } else { return v.elements(); } } } /** * Set group membership info for a user. * * <P>See bugs 4646133,4646270 on why this is here. * */ private void setGroupNames(String username, String[] groups) { Vector v = new Vector(groups.length); for (int i=0; i<groups.length; i++) { v.add(groups[i]); } groupCache.put(username, v); } /** * Supports mode=find-bind. See class documentation. * */ public String[] findAndBind(String _username, char[] _password) throws LoginException { // do search for user, substituting %s for username _username = RFC2254Encode(_username); StringBuffer sb = new StringBuffer(getProperty(PARAM_SEARCH_FILTER)); substitute(sb, SUBST_SUBJECT_NAME, _username); String userid = sb.toString(); // attempt to bind as the user DirContext ctx = null; String srcFilter = null; String[] grpList = null; try { ctx = new InitialDirContext(getLdapBindProps()); String realUserDN = userSearch(ctx, getProperty(PARAM_USERDN), userid); if (realUserDN == null) { String msg = sm.getString("ldaprealm.usernotfound", _username); throw new LoginException(msg); } boolean bindSuccessful = bindAsUser(realUserDN, _password); if (bindSuccessful == false) { String msg = sm.getString("ldaprealm.bindfailed", realUserDN); throw new LoginException(msg); } // search groups using above connection, substituting %d (and %s) sb = new StringBuffer(getProperty(PARAM_GRP_SEARCH_FILTER)); substitute(sb, SUBST_SUBJECT_NAME, _username); substitute(sb, SUBST_SUBJECT_DN, realUserDN); srcFilter = sb.toString(); ArrayList groupsList = new ArrayList(); groupsList.addAll(groupSearch(ctx, getProperty(PARAM_GRPDN), srcFilter, getProperty(PARAM_GRP_TARGET))); // search filter is constructed internally as // as a groupofURLS groupsList.addAll(dynamicGroupSearch(ctx, getProperty(PARAM_GRPDN), getProperty(PARAM_GRP_TARGET), realUserDN)); grpList = new String[groupsList.size()]; groupsList.toArray(grpList); } catch (Exception e) { LoginException le=new LoginException(e.toString()); le.initCause(e); _logger.log(Level.SEVERE, "ldaprealm.exception", le); throw le; } finally { if (ctx != null) { try { ctx.close(); } catch (NamingException e) {} } } if (_logger.isLoggable(Level.FINE)) { _logger.log(Level.FINE, "LDAP:Group search filter: " + srcFilter); StringBuffer gb = new StringBuffer(); gb.append("Group memberships found: "); if (grpList.length > 0) { for (int i=0; i<grpList.length; i++) { gb.append(" "+grpList[i]); } } else { gb.append("(null)"); } if (_logger.isLoggable(Level.FINE)) { _logger.log(Level.FINE, "LDAP: "+ gb.toString()); } } grpList = addAssignGroups(grpList); grpList = this.addMappedGroupNames(grpList); setGroupNames(_username, grpList); if(_logger.isLoggable(Level.FINE)){ _logger.log(Level.FINE, "LDAP: login succeeded for: " + _username); } return grpList; } /** * Do anonymous search for the user. Should be unique if exists. * */ private String userSearch(DirContext ctx, String baseDN, String filter) { if (_logger.isLoggable(Level.FINEST)) { _logger.log(Level.FINE, "search: baseDN: "+ baseDN + " filter: " + filter); } String foundDN = null; NamingEnumeration namingEnum = null; SearchControls ctls = new SearchControls(); ctls.setReturningAttributes(_dnOnly); ctls.setSearchScope(SearchControls.SUBTREE_SCOPE); ctls.setCountLimit(1); try { namingEnum = ctx.search(baseDN, filter, ctls); if (namingEnum.hasMore()) { SearchResult res = (SearchResult)namingEnum.next(); StringBuffer sb = new StringBuffer(); //for dn name with '/' CompositeName compDN = new CompositeName(res.getName()); String ldapDN = compDN.get(0); sb.append(ldapDN); if (res.isRelative()) { sb.append(","); sb.append(baseDN); } foundDN = sb.toString(); if (_logger.isLoggable(Level.FINEST)) { _logger.log(Level.FINE, "Found user DN: " + foundDN); } } } catch (Exception e) { _logger.log(Level.WARNING, "ldaprealm.searcherror", filter); _logger.log(Level.WARNING, "security.exception", e); } finally { if (namingEnum != null) { try { namingEnum.close(); } catch(Exception ex) { } } } return foundDN; } /** * Attempt to bind as a specific DN. * */ private boolean bindAsUser(String bindDN, char[] password) { boolean bindSuccessful=false; Properties p = getLdapBindProps(); p.put(Context.SECURITY_PRINCIPAL, bindDN); p.put(Context.SECURITY_CREDENTIALS, new String(password)); DirContext ctx = null; try { ctx = new InitialDirContext(p); bindSuccessful = true; } catch (Exception e) { if (_logger.isLoggable(Level.FINEST)) { _logger.finest("Error binding to directory as: " + bindDN); _logger.finest("Exception from JNDI: " + e.toString()); } } finally { if (ctx != null) { try { ctx.close(); } catch (NamingException e) {} } } return bindSuccessful; } /** * Search for group membership using the given connection. * */ private List dynamicGroupSearch(DirContext ctx, String baseDN, String target, String userDN) { List groupList = new ArrayList(); String filter = DYNAMIC_GROUP_FILTER; String[] targets = new String[] { target, "memberUrl" }; try { SearchControls ctls = new SearchControls(); ctls.setReturningAttributes(targets); ctls.setSearchScope(SearchControls.SUBTREE_SCOPE); ctls.setReturningObjFlag(true); NamingEnumeration e = ctx.search(baseDN, filter, ctls); while(e.hasMore()) { SearchResult res = (SearchResult)e.next(); Object searchedObject = res.getObject(); if (searchedObject instanceof GroupOfURLs){ // dynamic group GroupOfURLs gurls = (GroupOfURLs) searchedObject; Principal x500principal = new X500Principal(userDN); if (gurls.isMember(x500principal)) { Attribute grpAttr = res.getAttributes().get(target); int sz = grpAttr.size(); for (int i=0; i<sz; i++) { String s = (String)grpAttr.get(i); groupList.add(s); } } } // recommended by Jaya Hangal from JDK team if (searchedObject instanceof Context) { ((Context)searchedObject).close(); } } } catch (Exception e) { _logger.log(Level.WARNING, "ldaprealm.searcherror", filter); _logger.log(Level.WARNING, "security.exception", e); } return groupList; } /** * Search for group membership using the given connection. * */ private List groupSearch(DirContext ctx, String baseDN, String filter, String target) { List groupList = new ArrayList(); try { String[] targets = new String[1]; targets[0] = target; SearchControls ctls = new SearchControls(); ctls.setReturningAttributes(targets); ctls.setSearchScope(SearchControls.SUBTREE_SCOPE); NamingEnumeration e = ctx.search(baseDN, filter.replaceAll(Matcher.quoteReplacement("\\"), Matcher.quoteReplacement("\\\\")), ctls); while(e.hasMore()) { SearchResult res = (SearchResult)e.next(); Attribute grpAttr = res.getAttributes().get(target); int sz = grpAttr.size(); for (int i=0; i<sz; i++) { String s = (String)grpAttr.get(i); groupList.add(s); } } } catch (Exception e) { _logger.log(Level.WARNING, "ldaprealm.searcherror", filter); _logger.log(Level.WARNING, "security.exception", e); } return groupList; } /** * Do string substitution. target is replaced by value for all * occurences. * */ private static void substitute(StringBuffer sb, String target, String value) { int i = sb.indexOf(target); while (i >= 0) { sb.replace(i, i+target.length(), value); i = sb.indexOf(target); } } /** * Escape special chars in search filter, according to RFC2254 * @param inName * @return */ private String RFC2254Encode(String inName) { int len = inName.length(); StringBuffer buf = new StringBuffer(len); for (int i = 0; i < len; i++) { char ch = inName.charAt(i); switch (ch) { case '*' : buf.append("\\2a"); break; case '(' : buf.append("\\28"); break; case ')' : buf.append("\\29"); break; case '\\' : buf.append("\\5c"); break; case 0 : buf.append("\\00"); break; default : buf.append(ch); } } return buf.toString(); } }