use of com.unboundid.asn1.ASN1Exception in project jmulticard by ctt-gob-es.
the class TestDerBoolean method testCheckTagWithWrongTagMustThrowException.
/**
* Test method for {@link es.gob.jmulticard.asn1.DecoderObject#checkTag(byte)}.
*/
public static final void testCheckTagWithWrongTagMustThrowException() {
try {
final DerBoolean db = new DerBoolean();
db.checkTag((byte) 0x02);
} catch (final Asn1Exception e) {
// $NON-NLS-1$
System.out.println("Todo normal, ha saltado " + e);
} catch (final Exception e) {
// $NON-NLS-1$ //$NON-NLS-2$
Assert.fail("Se esperaba " + Asn1Exception.class.getName() + " pero se obtuvo " + e.getClass().getName());
}
}
use of com.unboundid.asn1.ASN1Exception in project wildfly-elytron by wildfly-security.
the class Gs2SaslServer method restoreTokenHeader.
/**
* Recompute and restore the initial context token header for the given token.
*
* @param token the initial context token without the token header
* @return the initial context token with the token header restored
* @throws ASN1Exception if the mechanism OID cannot be DER encoded
*/
private byte[] restoreTokenHeader(byte[] token) throws ASN1Exception {
final DEREncoder encoder = new DEREncoder();
encoder.encodeImplicit(APPLICATION_SPECIFIC_MASK, 0);
encoder.startSequence();
try {
encoder.writeEncoded(mechanism.getDER());
} catch (GSSException e) {
throw new ASN1Exception(e);
}
encoder.writeEncoded(token);
encoder.endSequence();
return encoder.getEncoded();
}
use of com.unboundid.asn1.ASN1Exception in project wildfly-elytron by wildfly-security.
the class AbstractAlgorithmParametersSpiImpl method engineInit.
/**
* Implementation of the {@code engineInit} method.
*
* @param params the encoded parameter specification
* @throws IOException if decoding failed
*/
protected final void engineInit(final byte[] params) throws IOException {
final DERDecoder decoder = new DERDecoder(params);
try {
parameterSpec = engineDecode(decoder);
encoded = params;
} catch (ASN1Exception e) {
throw log.failedToDecode(e);
}
}
use of com.unboundid.asn1.ASN1Exception in project ldapsdk by pingidentity.
the class Filter method decode.
/**
* Decodes the provided ASN.1 element as a search filter.
*
* @param filterElement The ASN.1 element containing the encoded search
* filter.
*
* @return The decoded search filter.
*
* @throws LDAPException If the provided ASN.1 element cannot be decoded as
* a search filter.
*/
@NotNull()
public static Filter decode(@NotNull final ASN1Element filterElement) throws LDAPException {
final byte filterType = filterElement.getType();
final Filter[] filterComps;
final Filter notComp;
final String attrName;
final ASN1OctetString assertionValue;
final ASN1OctetString subInitial;
final ASN1OctetString[] subAny;
final ASN1OctetString subFinal;
final String matchingRuleID;
final boolean dnAttributes;
switch(filterType) {
case FILTER_TYPE_AND:
case FILTER_TYPE_OR:
notComp = null;
attrName = null;
assertionValue = null;
subInitial = null;
subAny = NO_SUB_ANY;
subFinal = null;
matchingRuleID = null;
dnAttributes = false;
final ASN1Set compSet;
try {
compSet = ASN1Set.decodeAsSet(filterElement);
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_COMPS.get(StaticUtils.getExceptionMessage(ae)), ae);
}
final ASN1Element[] compElements = compSet.elements();
filterComps = new Filter[compElements.length];
for (int i = 0; i < compElements.length; i++) {
filterComps[i] = decode(compElements[i]);
}
break;
case FILTER_TYPE_NOT:
filterComps = NO_FILTERS;
attrName = null;
assertionValue = null;
subInitial = null;
subAny = NO_SUB_ANY;
subFinal = null;
matchingRuleID = null;
dnAttributes = false;
final ASN1Element notFilterElement;
try {
notFilterElement = ASN1Element.decode(filterElement.getValue());
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_NOT_COMP.get(StaticUtils.getExceptionMessage(ae)), ae);
}
notComp = decode(notFilterElement);
break;
case FILTER_TYPE_EQUALITY:
case FILTER_TYPE_GREATER_OR_EQUAL:
case FILTER_TYPE_LESS_OR_EQUAL:
case FILTER_TYPE_APPROXIMATE_MATCH:
filterComps = NO_FILTERS;
notComp = null;
subInitial = null;
subAny = NO_SUB_ANY;
subFinal = null;
matchingRuleID = null;
dnAttributes = false;
final ASN1Sequence avaSequence;
try {
avaSequence = ASN1Sequence.decodeAsSequence(filterElement);
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_AVA.get(StaticUtils.getExceptionMessage(ae)), ae);
}
final ASN1Element[] avaElements = avaSequence.elements();
if (avaElements.length != 2) {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_INVALID_AVA_ELEMENT_COUNT.get(avaElements.length));
}
attrName = ASN1OctetString.decodeAsOctetString(avaElements[0]).stringValue();
assertionValue = ASN1OctetString.decodeAsOctetString(avaElements[1]);
break;
case FILTER_TYPE_SUBSTRING:
filterComps = NO_FILTERS;
notComp = null;
assertionValue = null;
matchingRuleID = null;
dnAttributes = false;
final ASN1Sequence subFilterSequence;
try {
subFilterSequence = ASN1Sequence.decodeAsSequence(filterElement);
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_SUBSTRING.get(StaticUtils.getExceptionMessage(ae)), ae);
}
final ASN1Element[] subFilterElements = subFilterSequence.elements();
if (subFilterElements.length != 2) {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_INVALID_SUBSTR_ASSERTION_COUNT.get(subFilterElements.length));
}
attrName = ASN1OctetString.decodeAsOctetString(subFilterElements[0]).stringValue();
final ASN1Sequence subSequence;
try {
subSequence = ASN1Sequence.decodeAsSequence(subFilterElements[1]);
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_SUBSTRING.get(StaticUtils.getExceptionMessage(ae)), ae);
}
ASN1OctetString tempSubInitial = null;
ASN1OctetString tempSubFinal = null;
final ArrayList<ASN1OctetString> subAnyList = new ArrayList<>(1);
final ASN1Element[] subElements = subSequence.elements();
for (final ASN1Element subElement : subElements) {
switch(subElement.getType()) {
case SUBSTRING_TYPE_SUBINITIAL:
if (tempSubInitial == null) {
tempSubInitial = ASN1OctetString.decodeAsOctetString(subElement);
} else {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_MULTIPLE_SUBINITIAL.get());
}
break;
case SUBSTRING_TYPE_SUBANY:
subAnyList.add(ASN1OctetString.decodeAsOctetString(subElement));
break;
case SUBSTRING_TYPE_SUBFINAL:
if (tempSubFinal == null) {
tempSubFinal = ASN1OctetString.decodeAsOctetString(subElement);
} else {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_MULTIPLE_SUBFINAL.get());
}
break;
default:
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_INVALID_SUBSTR_TYPE.get(StaticUtils.toHex(subElement.getType())));
}
}
subInitial = tempSubInitial;
subAny = subAnyList.toArray(new ASN1OctetString[subAnyList.size()]);
subFinal = tempSubFinal;
break;
case FILTER_TYPE_PRESENCE:
filterComps = NO_FILTERS;
notComp = null;
assertionValue = null;
subInitial = null;
subAny = NO_SUB_ANY;
subFinal = null;
matchingRuleID = null;
dnAttributes = false;
attrName = ASN1OctetString.decodeAsOctetString(filterElement).stringValue();
break;
case FILTER_TYPE_EXTENSIBLE_MATCH:
filterComps = NO_FILTERS;
notComp = null;
subInitial = null;
subAny = NO_SUB_ANY;
subFinal = null;
final ASN1Sequence emSequence;
try {
emSequence = ASN1Sequence.decodeAsSequence(filterElement);
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_CANNOT_DECODE_EXTMATCH.get(StaticUtils.getExceptionMessage(ae)), ae);
}
String tempAttrName = null;
ASN1OctetString tempAssertionValue = null;
String tempMatchingRuleID = null;
boolean tempDNAttributes = false;
for (final ASN1Element e : emSequence.elements()) {
switch(e.getType()) {
case EXTENSIBLE_TYPE_ATTRIBUTE_NAME:
if (tempAttrName == null) {
tempAttrName = ASN1OctetString.decodeAsOctetString(e).stringValue();
} else {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_MULTIPLE_ATTRS.get());
}
break;
case EXTENSIBLE_TYPE_MATCHING_RULE_ID:
if (tempMatchingRuleID == null) {
tempMatchingRuleID = ASN1OctetString.decodeAsOctetString(e).stringValue();
} else {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_MULTIPLE_MRIDS.get());
}
break;
case EXTENSIBLE_TYPE_MATCH_VALUE:
if (tempAssertionValue == null) {
tempAssertionValue = ASN1OctetString.decodeAsOctetString(e);
} else {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_MULTIPLE_VALUES.get());
}
break;
case EXTENSIBLE_TYPE_DN_ATTRIBUTES:
try {
if (tempDNAttributes) {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_MULTIPLE_DNATTRS.get());
} else {
tempDNAttributes = ASN1Boolean.decodeAsBoolean(e).booleanValue();
}
} catch (final ASN1Exception ae) {
Debug.debugException(ae);
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_DNATTRS_NOT_BOOLEAN.get(StaticUtils.getExceptionMessage(ae)), ae);
}
break;
default:
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_INVALID_TYPE.get(StaticUtils.toHex(e.getType())));
}
}
if ((tempAttrName == null) && (tempMatchingRuleID == null)) {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_NO_ATTR_OR_MRID.get());
}
if (tempAssertionValue == null) {
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_EXTMATCH_NO_VALUE.get());
}
attrName = tempAttrName;
assertionValue = tempAssertionValue;
matchingRuleID = tempMatchingRuleID;
dnAttributes = tempDNAttributes;
break;
default:
throw new LDAPException(ResultCode.DECODING_ERROR, ERR_FILTER_ELEMENT_INVALID_TYPE.get(StaticUtils.toHex(filterElement.getType())));
}
return new Filter(null, filterType, filterComps, notComp, attrName, assertionValue, subInitial, subAny, subFinal, matchingRuleID, dnAttributes);
}
use of com.unboundid.asn1.ASN1Exception in project ldapsdk by pingidentity.
the class LDAPConnectionReader method readResponse.
/**
* Reads a response from the server, blocking if necessary until the response
* has been received. This should only be used for connections operating in
* synchronous mode.
*
* @param messageID The message ID for the response to be read. Any
* response read with a different message ID will be
* discarded, unless it is an unsolicited notification in
* which case it will be provided to any registered
* unsolicited notification handler.
*
* @return The response read from the server.
*
* @throws LDAPException If a problem occurs while reading the response.
*/
@NotNull()
@SuppressWarnings("deprecation")
LDAPResponse readResponse(final int messageID) throws LDAPException {
while (true) {
try {
final LDAPResponse response = LDAPMessage.readLDAPResponseFrom(asn1StreamReader, false, connection.getCachedSchema());
if (response == null) {
return new ConnectionClosedResponse(ResultCode.SERVER_DOWN, null);
}
connection.setLastCommunicationTime();
if (response.getMessageID() == messageID) {
return response;
}
if ((response instanceof ExtendedResult) && (response.getMessageID() == 0)) {
// This is an intermediate response message, so handle it
// appropriately.
ExtendedResult extendedResult = (ExtendedResult) response;
final String oid = extendedResult.getOID();
if (NoticeOfDisconnectionExtendedResult.NOTICE_OF_DISCONNECTION_RESULT_OID.equals(oid)) {
extendedResult = new NoticeOfDisconnectionExtendedResult(extendedResult);
connection.setDisconnectInfo(DisconnectType.SERVER_CLOSED_WITH_NOTICE, extendedResult.getDiagnosticMessage(), null);
} else if (com.unboundid.ldap.sdk.unboundidds.extensions.InteractiveTransactionAbortedExtendedResult.INTERACTIVE_TRANSACTION_ABORTED_RESULT_OID.equals(oid)) {
extendedResult = new com.unboundid.ldap.sdk.unboundidds.extensions.InteractiveTransactionAbortedExtendedResult(extendedResult);
}
final UnsolicitedNotificationHandler handler = connection.getConnectionOptions().getUnsolicitedNotificationHandler();
if (handler == null) {
if (Debug.debugEnabled(DebugType.LDAP)) {
Debug.debug(Level.WARNING, DebugType.LDAP, WARN_READER_UNHANDLED_UNSOLICITED_NOTIFICATION.get(response));
}
} else {
handler.handleUnsolicitedNotification(connection, extendedResult);
}
continue;
}
if (Debug.debugEnabled(DebugType.LDAP)) {
Debug.debug(Level.WARNING, DebugType.LDAP, WARN_READER_DISCARDING_UNEXPECTED_RESPONSE.get(response, messageID));
}
} catch (final LDAPException le) {
// If the cause was a SocketTimeoutException, then we shouldn't
// terminate the connection, but we should propagate the failure to
// the client with the appropriate result.
final Throwable t = le.getCause();
if ((t != null) && (t instanceof SocketTimeoutException)) {
Debug.debugException(Level.FINEST, le);
throw new LDAPException(ResultCode.TIMEOUT, le.getMessage(), le);
} else {
Debug.debugException(le);
}
// We should terminate the connection regardless of the type of
// exception, but might want to customize the debug message.
final String message;
Level debugLevel = Level.SEVERE;
if (t == null) {
connection.setDisconnectInfo(DisconnectType.DECODE_ERROR, le.getMessage(), t);
message = le.getMessage();
debugLevel = Level.WARNING;
} else if (t instanceof IOException) {
connection.setDisconnectInfo(DisconnectType.IO_ERROR, le.getMessage(), t);
message = ERR_READER_CLOSING_DUE_TO_IO_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(t));
debugLevel = Level.WARNING;
} else if (t instanceof ASN1Exception) {
connection.setDisconnectInfo(DisconnectType.DECODE_ERROR, le.getMessage(), t);
message = ERR_READER_CLOSING_DUE_TO_ASN1_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(t));
} else {
connection.setDisconnectInfo(DisconnectType.LOCAL_ERROR, le.getMessage(), t);
message = ERR_READER_CLOSING_DUE_TO_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(t));
}
Debug.debug(debugLevel, DebugType.LDAP, message, t);
@SuppressWarnings("deprecation") final boolean autoReconnect = connection.getConnectionOptions().autoReconnect();
if (!autoReconnect) {
closeRequested = true;
}
closeInternal(true, message);
throw le;
} catch (final Exception e) {
Debug.debugException(e);
// We should terminate the connection regardless of the type of
// exception, but might want to customize the debug message.
final String message;
Level debugLevel = Level.SEVERE;
if (e instanceof IOException) {
connection.setDisconnectInfo(DisconnectType.IO_ERROR, null, e);
message = ERR_READER_CLOSING_DUE_TO_IO_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(e));
debugLevel = Level.WARNING;
} else if (e instanceof ASN1Exception) {
connection.setDisconnectInfo(DisconnectType.DECODE_ERROR, null, e);
message = ERR_READER_CLOSING_DUE_TO_ASN1_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(e));
} else {
connection.setDisconnectInfo(DisconnectType.LOCAL_ERROR, null, e);
message = ERR_READER_CLOSING_DUE_TO_EXCEPTION.get(connection.getHostPort(), StaticUtils.getExceptionMessage(e));
}
Debug.debug(debugLevel, DebugType.LDAP, message, e);
@SuppressWarnings("deprecation") final boolean autoReconnect = connection.getConnectionOptions().autoReconnect();
if (!autoReconnect) {
closeRequested = true;
}
closeInternal(true, message);
throw new LDAPException(ResultCode.SERVER_DOWN, message, e);
}
}
}
Aggregations