Author: erodriguez
Date: Wed Mar 16 21:38:42 2005
New Revision: 157903
URL: http://svn.apache.org/viewcvs?view=rev&rev=157903
Log:
Import updates related to exception handling change and move to kerberos-common.
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/AuthenticationService.java
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/ErrorService.java
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/KerberosService.java
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/TicketGrantingService.java
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/protocol/KerberosProtocolHandler.java
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/sam/TimestampChecker.java
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/AuthenticationService.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/AuthenticationService.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/AuthenticationService.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/AuthenticationService.java
Wed Mar 16 21:38:42 2005
@@ -26,6 +26,8 @@
import org.apache.kerberos.crypto.encryption.EncryptionEngine;
import org.apache.kerberos.crypto.encryption.EncryptionEngineFactory;
import org.apache.kerberos.crypto.encryption.EncryptionType;
+import org.apache.kerberos.exceptions.ErrorType;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.io.decoder.EncryptedDataDecoder;
import org.apache.kerberos.io.decoder.EncryptedTimestampDecoder;
import org.apache.kerberos.io.encoder.EncAsRepPartEncoder;
@@ -92,7 +94,7 @@
if ( entry == null )
{
- throw KerberosException.KDC_ERR_C_PRINCIPAL_UNKNOWN;
+ throw new KerberosException( ErrorType.KDC_ERR_C_PRINCIPAL_UNKNOWN
);
}
EncryptionKey clientKey = null;
@@ -107,7 +109,7 @@
if ( preAuthData == null )
{
- throw new KdcErrorPreauthRequired(
preparePreAuthenticationError() );
+ throw new KerberosException(
ErrorType.KDC_ERR_PREAUTH_REQUIRED, preparePreAuthenticationError() );
}
EncryptedTimeStamp timestamp = null;
@@ -129,27 +131,27 @@
}
catch (KerberosException ke)
{
- throw
KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
catch (IOException ioe)
{
- throw
KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
catch (ClassCastException cce)
{
- throw
KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
}
}
if ( timestamp == null )
{
- throw new KdcErrorPreauthRequired(
preparePreAuthenticationError() );
+ throw new KerberosException(
ErrorType.KDC_ERR_PREAUTH_REQUIRED, preparePreAuthenticationError() );
}
if ( !timestamp.getTimeStamp().isInClockSkew(
config.getClockSkew() ) )
{
- throw KerberosException.KDC_ERR_PREAUTH_FAILED;
+ throw new KerberosException(
ErrorType.KDC_ERR_PREAUTH_FAILED );
}
/*
@@ -167,7 +169,7 @@
if ( preAuthData == null || preAuthData.length == 0 )
{
- throw new KdcErrorPreauthRequired(
preparePreAuthenticationError() );
+ throw new KerberosException(
ErrorType.KDC_ERR_PREAUTH_REQUIRED, preparePreAuthenticationError() );
}
try
@@ -243,7 +245,7 @@
if ( serverKey == null )
{
- throw KerberosException.KDC_ERR_S_PRINCIPAL_UNKNOWN;
+ throw new KerberosException( ErrorType.KDC_ERR_S_PRINCIPAL_UNKNOWN
);
}
KerberosPrincipal ticketPrincipal =
request.getServerPrincipal();
@@ -271,7 +273,7 @@
request.getKdcOptions().get(KdcOptions.FORWARDED) ||
request.getKdcOptions().get(KdcOptions.ENC_TKT_IN_SKEY))
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setSessionKey(new RandomKey().getNewSessionKey());
@@ -285,7 +287,7 @@
{
// TODO - possibly allow req.from range
if (!config.isPostdateAllowed())
- throw KerberosException.KDC_ERR_POLICY;
+ throw new KerberosException(
ErrorType.KDC_ERR_POLICY );
newTicketBody.setFlag(TicketFlags.INVALID);
newTicketBody.setStartTime(request.getFrom());
}
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/ErrorService.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/ErrorService.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/ErrorService.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/ErrorService.java
Wed Mar 16 21:38:42 2005
@@ -17,6 +17,7 @@
package org.apache.kerberos.kdc;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.messages.ErrorMessage;
import org.apache.kerberos.messages.ErrorMessageModifier;
import org.apache.kerberos.messages.value.KerberosTime;
@@ -39,7 +40,7 @@
KerberosTime now = new KerberosTime();
- modifier.setErrorCode( exception.getOrdinal() );
+ modifier.setErrorCode( exception.getErrorCode() );
modifier.setExplanatoryText( exception.getMessage() );
modifier.setServerPrincipal( config.getKdcPrincipal() );
modifier.setServerTime( now );
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/KerberosService.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/KerberosService.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/KerberosService.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/KerberosService.java
Wed Mar 16 21:38:42 2005
@@ -31,6 +31,8 @@
import org.apache.kerberos.crypto.encryption.EncryptionEngine;
import org.apache.kerberos.crypto.encryption.EncryptionEngineFactory;
import org.apache.kerberos.crypto.encryption.EncryptionType;
+import org.apache.kerberos.exceptions.ErrorType;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.io.decoder.AuthenticatorDecoder;
import org.apache.kerberos.io.decoder.EncTicketPartDecoder;
import org.apache.kerberos.kdc.replay.InMemoryReplayCache;
@@ -100,7 +102,7 @@
}
}
- throw KerberosException.KDC_ERR_ETYPE_NOSUPP;
+ throw new KerberosException( ErrorType.KDC_ERR_ETYPE_NOSUPP );
}
protected void verifyTicket( Ticket ticket, KerberosPrincipal
serverPrincipal )
@@ -109,7 +111,7 @@
if ( !ticket.getRealm().equals( config.getPrimaryRealm() )
&& !ticket.getServerPrincipal().equals(
serverPrincipal ) )
{
- throw KerberosException.KRB_AP_ERR_NOT_US;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_NOT_US );
}
}
@@ -119,17 +121,17 @@
{
if ( authHeader.getProtocolVersionNumber() != 5 )
{
- throw KerberosException.KRB_AP_ERR_BADVERSION;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BADVERSION );
}
if ( authHeader.getMessageType() != MessageType.KRB_AP_REQ )
{
- throw KerberosException.KRB_AP_ERR_MSG_TYPE;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_MSG_TYPE );
}
if ( authHeader.getTicket().getTicketVersionNumber() != 5 )
{
- throw KerberosException.KRB_AP_ERR_BADVERSION;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BADVERSION );
}
KerberosPrincipal serverPrincipal = ticket.getServerPrincipal();
@@ -150,10 +152,10 @@
// TODO - check server key version number, skvno;
requires store
if ( false )
{
- throw KerberosException.KRB_AP_ERR_BADKEYVER;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BADKEYVER );
}
- throw KerberosException.KRB_AP_ERR_NOKEY;
+ throw new KerberosException( ErrorType.KRB_AP_ERR_NOKEY
);
}
try
@@ -168,7 +170,7 @@
}
catch (KerberosException ke)
{
- throw KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
Authenticator authenticator;
@@ -183,12 +185,12 @@
}
catch (KerberosException ke)
{
- throw KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
if ( !authenticator.getClientPrincipal().getName().equals(
ticket.getClientPrincipal().getName() ) )
{
- throw KerberosException.KRB_AP_ERR_BADMATCH;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BADMATCH );
}
// TODO - need to get at IP Address for sender
@@ -205,27 +207,27 @@
if( replayCache.isReplay( authenticator.getClientTime(),
authenticator.getClientPrincipal() ) )
{
- throw KerberosException.KRB_AP_ERR_REPEAT;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_REPEAT );
}
replayCache.save( authenticator.getClientTime(),
authenticator.getClientPrincipal() );
if ( !authenticator.getClientTime().isInClockSkew(
config.getClockSkew() ) )
{
- throw KerberosException.KRB_AP_ERR_SKEW;
+ throw new KerberosException( ErrorType.KRB_AP_ERR_SKEW
);
}
if ( ticket.getStartTime() != null &&
!ticket.getStartTime().isInClockSkew( config.getClockSkew() ) ||
ticket.getFlag( TicketFlags.INVALID ) )
{
// it hasn't yet become valid
- throw KerberosException.KRB_AP_ERR_TKT_NYV;
+ throw new KerberosException( ErrorType.KRB_AP_ERR_TKT_NYV );
}
// TODO - doesn't take into account skew
if ( !ticket.getEndTime().greaterThan( new KerberosTime() ) )
{
- throw KerberosException.KRB_AP_ERR_TKT_EXPIRED;
+ throw new KerberosException( ErrorType.KRB_AP_ERR_TKT_EXPIRED );
}
authHeader.setOption( ApOptions.MUTUAL_REQUIRED );
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/TicketGrantingService.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/TicketGrantingService.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/TicketGrantingService.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/kdc/TicketGrantingService.java
Wed Mar 16 21:38:42 2005
@@ -30,6 +30,8 @@
import org.apache.kerberos.crypto.encryption.EncryptionEngine;
import org.apache.kerberos.crypto.encryption.EncryptionEngineFactory;
import org.apache.kerberos.crypto.encryption.EncryptionType;
+import org.apache.kerberos.exceptions.ErrorType;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.io.decoder.ApplicationRequestDecoder;
import org.apache.kerberos.io.decoder.AuthorizationDataDecoder;
import org.apache.kerberos.io.encoder.EncTgsRepPartEncoder;
@@ -103,7 +105,7 @@
{
if ( request.getPreAuthData()[0].getDataType() !=
PreAuthenticationDataType.PA_TGS_REQ )
{
- throw KerberosException.KDC_ERR_PADATA_TYPE_NOSUPP;
+ throw new KerberosException(
ErrorType.KDC_ERR_PADATA_TYPE_NOSUPP );
}
byte[] undecodedAuthHeader =
request.getPreAuthData()[0].getDataValue();
@@ -119,7 +121,7 @@
{
if ( authChecksum == null )
{
- throw KerberosException.KRB_AP_ERR_INAPP_CKSUM;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_INAPP_CKSUM );
}
/*
@@ -152,7 +154,7 @@
if ( !equal )
{
- throw KerberosException.KRB_AP_ERR_MODIFIED;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_MODIFIED );
}
}
@@ -177,7 +179,7 @@
endif
endif
*/
- throw KerberosException.KDC_ERR_S_PRINCIPAL_UNKNOWN;
+ throw new KerberosException(
ErrorType.KDC_ERR_S_PRINCIPAL_UNKNOWN );
}
return serverKey;
}
@@ -222,7 +224,7 @@
{
if ( !tgt.getFlag( TicketFlags.FORWARDABLE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.FORWARDABLE );
@@ -232,7 +234,7 @@
{
if ( !tgt.getFlag( TicketFlags.FORWARDABLE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.FORWARDED );
newTicketBody.setClientAddresses(
request.getAddresses() );
@@ -248,7 +250,7 @@
{
if ( !tgt.getFlag( TicketFlags.PROXIABLE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.PROXIABLE );
@@ -258,7 +260,7 @@
{
if ( !tgt.getFlag( TicketFlags.PROXIABLE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.PROXY );
@@ -270,7 +272,7 @@
{
if ( !tgt.getFlag( TicketFlags.MAY_POSTDATE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.MAY_POSTDATE );
@@ -280,7 +282,7 @@
{
if ( !tgt.getFlag( TicketFlags.MAY_POSTDATE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
newTicketBody.setFlag( TicketFlags.POSTDATED );
@@ -288,7 +290,7 @@
if ( !config.isPostdateAllowed() )
{
- throw KerberosException.KDC_ERR_POLICY;
+ throw new KerberosException(
ErrorType.KDC_ERR_POLICY );
}
newTicketBody.setStartTime( request.getFrom() );
@@ -298,12 +300,12 @@
{
if ( !tgt.getFlag( TicketFlags.INVALID ) )
{
- throw KerberosException.KDC_ERR_POLICY;
+ throw new KerberosException(
ErrorType.KDC_ERR_POLICY );
}
if ( tgt.getStartTime().greaterThan( new KerberosTime()
) )
{
- throw KerberosException.KRB_AP_ERR_TKT_NYV;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_TKT_NYV );
}
/*
@@ -319,7 +321,7 @@
if ( request.getOption( KdcOptions.RESERVED ) ||
request.getOption( KdcOptions.RENEWABLE_OK ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
}
@@ -336,12 +338,12 @@
{
if ( !tgt.getFlag( TicketFlags.RENEWABLE ) )
{
- throw KerberosException.KDC_ERR_BADOPTION;
+ throw new KerberosException(
ErrorType.KDC_ERR_BADOPTION );
}
if ( tgt.getRenewTill().greaterThan( now ) )
{
- throw KerberosException.KRB_AP_ERR_TKT_EXPIRED;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_TKT_EXPIRED );
}
echoTicket( newTicketBody, tgt );
@@ -445,11 +447,11 @@
}
catch (KerberosException e)
{
- throw
KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
catch (IOException ioe)
{
- throw
KerberosException.KRB_AP_ERR_BAD_INTEGRITY;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BAD_INTEGRITY );
}
AuthorizationData ticketData =
tgt.getAuthorizationData();
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/protocol/KerberosProtocolHandler.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/protocol/KerberosProtocolHandler.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/protocol/KerberosProtocolHandler.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/protocol/KerberosProtocolHandler.java
Wed Mar 16 21:38:42 2005
@@ -19,10 +19,11 @@
import java.io.IOException;
+import org.apache.kerberos.exceptions.ErrorType;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.kdc.AuthenticationService;
import org.apache.kerberos.kdc.ErrorService;
import org.apache.kerberos.kdc.KdcConfiguration;
-import org.apache.kerberos.kdc.KerberosException;
import org.apache.kerberos.kdc.TicketGrantingService;
import org.apache.kerberos.messages.AuthenticationReply;
import org.apache.kerberos.messages.ErrorMessage;
@@ -94,10 +95,10 @@
case 11:
case 13:
- throw KerberosException.KRB_AP_ERR_BADDIRECTION;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_BADDIRECTION );
default:
- throw
KerberosException.KRB_AP_ERR_MSG_TYPE;
+ throw new KerberosException(
ErrorType.KRB_AP_ERR_MSG_TYPE );
}
}
catch ( KerberosException ke )
Modified:
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/sam/TimestampChecker.java
URL:
http://svn.apache.org/viewcvs/directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/sam/TimestampChecker.java?view=diff&r1=157902&r2=157903
==============================================================================
---
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/sam/TimestampChecker.java
(original)
+++
directory/protocol-providers/kerberos/trunk/core/src/java/org/apache/kerberos/sam/TimestampChecker.java
Wed Mar 16 21:38:42 2005
@@ -24,9 +24,9 @@
import org.apache.kerberos.crypto.encryption.EncryptionEngine;
import org.apache.kerberos.crypto.encryption.EncryptionEngineFactory;
import org.apache.kerberos.crypto.encryption.EncryptionType;
+import org.apache.kerberos.exceptions.KerberosException;
import org.apache.kerberos.io.decoder.EncryptedDataDecoder;
import org.apache.kerberos.io.decoder.EncryptedTimestampDecoder;
-import org.apache.kerberos.kdc.KerberosException;
import org.apache.kerberos.messages.value.EncryptedData;
import org.apache.kerberos.messages.value.EncryptedTimeStamp;
import org.apache.kerberos.messages.value.EncryptionKey;