package gnu.crypto.sasl.plain; // ---------------------------------------------------------------------------- // $Id: PlainServer.java,v 1.4 2005/10/06 04:24:18 rsdio Exp $ // // Copyright (C) 2003 Free Software Foundation, Inc. // // This file is part of GNU Crypto. // // GNU Crypto is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation; either version 2, or (at your option) // any later version. // // GNU Crypto is distributed in the hope that it will be useful, but // WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, write to the // // Free Software Foundation Inc., // 51 Franklin Street, Fifth Floor, // Boston, MA 02110-1301 // USA // // Linking this library statically or dynamically with other modules is // making a combined work based on this library. Thus, the terms and // conditions of the GNU General Public License cover the whole // combination. // // As a special exception, the copyright holders of this library give // you permission to link this library with independent modules to // produce an executable, regardless of the license terms of these // independent modules, and to copy and distribute the resulting // executable under terms of your choice, provided that you also meet, // for each linked independent module, the terms and conditions of the // license of that module. An independent module is a module which is // not derived from or based on this library. If you modify this // library, you may extend this exception to your version of the // library, but you are not obligated to do so. If you do not wish to // do so, delete this exception statement from your version. // ---------------------------------------------------------------------------- import gnu.crypto.Registry; import gnu.crypto.sasl.NoSuchUserException; import gnu.crypto.sasl.ServerMechanism; import java.io.IOException; import java.io.UnsupportedEncodingException; import java.util.Arrays; import java.util.HashMap; import java.util.Map; import java.util.NoSuchElementException; import java.util.StringTokenizer; import javax.security.sasl.SaslException; import javax.security.sasl.SaslServer; /** * <p>The PLAIN SASL server-side mechanism.</p> * * @version $Revision: 1.4 $ */ public class PlainServer extends ServerMechanism implements SaslServer { // Constants and variables // ------------------------------------------------------------------------- // Constructor(s) // ------------------------------------------------------------------------- public PlainServer() { super(Registry.SASL_PLAIN_MECHANISM); } // Class methods // ------------------------------------------------------------------------- // Instance methods // ------------------------------------------------------------------------- // abstract methods implementation ----------------------------------------- protected void initMechanism() throws SaslException { } protected void resetMechanism() throws SaslException { } // javax.security.sasl.SaslServer interface implementation ----------------- public byte[] evaluateResponse(final byte[] response) throws SaslException { if (response == null) { return null; } try { final String nullStr = new String("\0"); final StringTokenizer strtok = new StringTokenizer(new String(response), nullStr, true); authorizationID = strtok.nextToken(); if (!authorizationID.equals(nullStr)) { strtok.nextToken(); } else { authorizationID = null; } final String id = strtok.nextToken(); if (id.equals(nullStr)) { throw new SaslException("No identity given"); } if (authorizationID == null) { authorizationID = id; } if ((!authorizationID.equals(nullStr)) && (!authorizationID.equals(id))) { throw new SaslException("Delegation not supported"); } strtok.nextToken(); final byte[] pwd; try { pwd = strtok.nextToken().getBytes("UTF-8"); } catch (UnsupportedEncodingException x) { throw new SaslException("evaluateResponse()", x); } if (pwd == null) { throw new SaslException("No password given"); } final byte[] password; try { password = new String(lookupPassword(id)).getBytes("UTF-8"); } catch (UnsupportedEncodingException x) { throw new SaslException("evaluateResponse()", x); } if (!Arrays.equals(pwd, password)) { throw new SaslException("Password incorrect"); } this.complete = true; return null; } catch (NoSuchElementException x) { throw new SaslException("evaluateResponse()", x); } } protected String getNegotiatedQOP() { return Registry.QOP_AUTH; } // other methods ----------------------------------------------------------- private char[] lookupPassword(final String userName) throws SaslException { try { if (!authenticator.contains(userName)) { throw new NoSuchUserException(userName); } final Map userID = new HashMap(); userID.put(Registry.SASL_USERNAME, userName); final Map credentials = authenticator.lookup(userID); final String password = (String) credentials.get(Registry.SASL_PASSWORD); if (password == null) { throw new SaslException("lookupPassword()", new InternalError()); } return password.toCharArray(); } catch (IOException x) { if (x instanceof SaslException) { throw (SaslException) x; } throw new SaslException("lookupPassword()", x); } } }