/* * Copyright (c) 2002, 2005, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package com.sun.jndi.ldap; import java.util.Arrays; // JDK 1.2 import java.util.Hashtable; import java.io.OutputStream; import javax.naming.ldap.Control; /** * Extends SimpleClientId to add property values specific for Digest-MD5. * This includes: * realm, authzid, qop, strength, maxbuffer, mutual-auth, reuse, * all policy-related selection properties. * Two DigestClientIds are identical iff they pass the SimpleClientId * equals() test and that all of these property values are the same. * * @author Rosanna Lee */ class DigestClientId extends SimpleClientId { private static final String[] SASL_PROPS = { "java.naming.security.sasl.authorizationId", "java.naming.security.sasl.realm", "javax.security.sasl.qop", "javax.security.sasl.strength", "javax.security.sasl.reuse", "javax.security.sasl.server.authentication", "javax.security.sasl.maxbuffer", "javax.security.sasl.policy.noplaintext", "javax.security.sasl.policy.noactive", "javax.security.sasl.policy.nodictionary", "javax.security.sasl.policy.noanonymous", "javax.security.sasl.policy.forward", "javax.security.sasl.policy.credentials", }; final private String[] propvals; final private int myHash; private int pHash = 0; DigestClientId(int version, String hostname, int port, String protocol, Control[] bindCtls, OutputStream trace, String socketFactory, String username, Object passwd, Hashtable env) { super(version, hostname, port, protocol, bindCtls, trace, socketFactory, username, passwd); if (env == null) { propvals = null; } else { // Could be smarter and apply default values for props // but for now, we just record and check exact matches propvals = new String[SASL_PROPS.length]; for (int i = 0; i < SASL_PROPS.length; i++) { propvals[i] = (String) env.get(SASL_PROPS[i]); if (propvals[i] != null) { pHash = pHash * 31 + propvals[i].hashCode(); } } } myHash = super.hashCode() + pHash; } public boolean equals(Object obj) { if (!(obj instanceof DigestClientId)) { return false; } DigestClientId other = (DigestClientId)obj; return myHash == other.myHash && pHash == other.pHash && super.equals(obj) && Arrays.equals(propvals, other.propvals); } public int hashCode() { return myHash; } public String toString() { if (propvals != null) { StringBuffer buf = new StringBuffer(); for (int i = 0; i < propvals.length; i++) { buf.append(':'); if (propvals[i] != null) { buf.append(propvals[i]); } } return super.toString() + buf.toString(); } else { return super.toString(); } } }