3054N/A * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved. 0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 0N/A * This code is free software; you can redistribute it and/or modify it 0N/A * under the terms of the GNU General Public License version 2 only, as 2362N/A * published by the Free Software Foundation. Oracle designates this 0N/A * particular file as subject to the "Classpath" exception as provided 2362N/A * by Oracle in the LICENSE file that accompanied this code. 0N/A * This code is distributed in the hope that it will be useful, but WITHOUT 0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 0N/A * version 2 for more details (a copy is included in the LICENSE file that 0N/A * accompanied this code). 0N/A * You should have received a copy of the GNU General Public License version 0N/A * 2 along with this work; if not, write to the Free Software Foundation, 0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 2362N/A * or visit www.oracle.com if you need additional information or have any 0N/A * (C) Copyright IBM Corp. 1999 All Rights Reserved. 0N/A * Copyright 1997 The Open Group Research Institute. All rights reserved. 0N/A * This class encapsulates a Kerberos TGS-REQ that is sent from the 0N/A * client to the KDC. 0N/A // Used in CredentialsUtil 0N/A null,
// eTypes, // null, // int[] eTypes 0N/A null,
// AuthorizationData authorizationData 0N/A null,
// Ticket[] additionalTickets 0N/A null);
// EncryptionKey subSessionKey 50N/A // Called by Credentials, KrbCred 50N/A // check if they are valid arguments. The optional fields 50N/A // should be consistent with settings in KDCOptions. 50N/A // in TGS_REQ there could be more than one additional 50N/A // tickets, but in file-based credential cache, 50N/A // there is only one additional ticket field. 50N/A // XXX We need to revisit this to see if can't move it 50N/A // up such that FORWARDED flag set in the options 50N/A // is included in the marshaled request. 50N/A * If this is based on a forwarded ticket, record that in the 50N/A * options, because the returned TgsRep will contain the 50N/A * FORWARDED flag set. 0N/A * Sends a TGS request to the realm of the target. 0N/A * @throws KrbException 0N/A * @throws IOException 0N/A * Sends the request, waits for a reply, and returns the Credentials. 0N/A * RFC 4120, Section 5.4.2. 0N/A * For KRB_TGS_REP, the ciphertext is encrypted in the 0N/A * sub-session key from the Authenticator, or if absent, 0N/A * the session key from the ticket-granting ticket used 0N/A * To support this, use tgsReqKey to remember which key to use. 0N/A "No supported encryption types listed in default_tgs_enctypes");
0N/A // if the checksum type is one of the keyed checksum types, 0N/A // Usage will be KeyUsage.KU_PA_TGS_REQ_AUTHENTICATOR 0N/A // System.err.println(">>> KrbTgsReq: " + message);