[Beepcore-java-commits] CVS: beepcore-java/src/org/beepcore/beep/profile/sasl/otp SASLOTPProfile.jav
Status: Beta
Brought to you by:
huston
|
From: Huston F. <hu...@us...> - 2002-10-05 15:32:09
|
Update of /cvsroot/beepcore-java/beepcore-java/src/org/beepcore/beep/profile/sasl/otp
In directory usw-pr-cvs1:/tmp/cvs-serv7819/src/org/beepcore/beep/profile/sasl/otp
Modified Files:
SASLOTPProfile.java OTPDictionary.java OTPGenerator.java
OTPAuthenticator.java
Log Message:
changed to use commons-logging
Index: SASLOTPProfile.java
===================================================================
RCS file: /cvsroot/beepcore-java/beepcore-java/src/org/beepcore/beep/profile/sasl/otp/SASLOTPProfile.java,v
retrieving revision 1.8
retrieving revision 1.9
diff -C2 -r1.8 -r1.9
*** SASLOTPProfile.java 22 Aug 2002 17:51:31 -0000 1.8
--- SASLOTPProfile.java 5 Oct 2002 15:32:06 -0000 1.9
***************
*** 25,28 ****
--- 25,31 ----
import sun.misc.BASE64Encoder;
+ import org.apache.commons.logging.Log;
+ import org.apache.commons.logging.LogFactory;
+
import org.beepcore.beep.core.*;
import org.beepcore.beep.profile.*;
***************
*** 33,37 ****
import org.beepcore.beep.profile.sasl.otp.database.*;
import org.beepcore.beep.transport.tcp.*;
- import org.beepcore.beep.util.*;
--- 36,39 ----
***************
*** 73,76 ****
--- 75,80 ----
// Instance Data
+ private Log log = LogFactory.getLog(this.getClass());
+
private Hashtable authenticators;
private MD5 md5;
***************
*** 138,142 ****
String authorize, authenticate, challenge = null;
! Log.logEntry(Log.SEV_DEBUG, SASL_OTP, "SASL-OTP Start Channel CCL");
OTPAuthenticator temp = new OTPAuthenticator(this);
--- 142,146 ----
String authorize, authenticate, challenge = null;
! log.debug("SASL-OTP Start Channel CCL");
OTPAuthenticator temp = new OTPAuthenticator(this);
***************
*** 154,159 ****
try {
blob = temp.receiveIDs(data);
! Log.logEntry(Log.SEV_DEBUG, SASL_OTP,
! "Challenge is=>" + challenge);
} catch (SASLException szf) {
temp.abortNoThrow(szf.getMessage());
--- 158,164 ----
try {
blob = temp.receiveIDs(data);
! if (log.isDebugEnabled()) {
! log.debug("Challenge is=>" + challenge);
! }
} catch (SASLException szf) {
temp.abortNoThrow(szf.getMessage());
***************
*** 163,168 ****
return;
}
! Log.logEntry(Log.SEV_DEBUG, SASL_OTP,
! "Blobbed64 Challenge is=>" + data);
}
channel.setMessageListener(temp);
--- 168,174 ----
return;
}
! if (log.isDebugEnabled()) {
! log.debug("Blobbed64 Challenge is=>" + data);
! }
}
channel.setMessageListener(temp);
***************
*** 180,184 ****
}
! Log.logEntry(Log.SEV_DEBUG, "Started an SASL-OTP Channel");
} catch (Exception x) {
channel.getSession().terminate(x.getMessage());
--- 186,190 ----
}
! log.debug("Started an SASL-OTP Channel");
} catch (Exception x) {
channel.getSession().terminate(x.getMessage());
***************
*** 306,314 ****
boolean success = false;
! if (authenticateId == null ||
! session == null ||
! pwd == null ) {
! Log.logEntry(Log.SEV_ERROR, SASL_OTP,
! ERR_INVALID_ID + authenticateId);
throw new InvalidParameterException(ERR_INVALID_ID
--- 312,316 ----
boolean success = false;
! if (authenticateId == null || session == null || pwd == null ) {
throw new InvalidParameterException(ERR_INVALID_ID
***************
*** 370,376 ****
} else {
success = true;
- Log.logEntry(Log.SEV_DEBUG, SASL_OTP,
- "Wow, cool!!! " + session
- + " is valid for\n" + cred.toString());
}
}
--- 372,375 ----
***************
*** 408,414 ****
if (authenticateId == null) {
- Log.logEntry(Log.SEV_ERROR, SASL_OTP,
- ERR_INVALID_ID + authenticateId);
-
throw new InvalidParameterException(ERR_INVALID_ID
+ authenticateId);
--- 407,410 ----
***************
*** 469,475 ****
} else {
success = true;
- Log.logEntry(Log.SEV_DEBUG, SASL_OTP,
- "Wow, cool!!! " + session
- + " is valid for\n" + cred.toString());
}
}
--- 465,468 ----
***************
*** 584,590 ****
} else {
success = true;
- Log.logEntry(Log.SEV_DEBUG, SASL_OTP,
- "Wow, cool!!! " + session
- + " is valid for\n" + cred.toString());
}
}
--- 577,580 ----
***************
*** 594,602 ****
return session;
- }
-
- static void printHex(byte buff[])
- {
- Log.logEntry(Log.SEV_DEBUG, SASL_OTP, convertBytesToHex(buff));
}
--- 584,587 ----
Index: OTPDictionary.java
===================================================================
RCS file: /cvsroot/beepcore-java/beepcore-java/src/org/beepcore/beep/profile/sasl/otp/OTPDictionary.java,v
retrieving revision 1.2
retrieving revision 1.3
diff -C2 -r1.2 -r1.3
*** OTPDictionary.java 8 Nov 2001 05:51:34 -0000 1.2
--- OTPDictionary.java 5 Oct 2002 15:32:06 -0000 1.3
***************
*** 22,29 ****
import java.util.StringTokenizer;
import org.beepcore.beep.profile.sasl.SASLException;
import org.beepcore.beep.profile.sasl.InvalidParameterException;
- import org.beepcore.beep.util.ConsoleLog;
- import org.beepcore.beep.util.Log;
--- 22,30 ----
import java.util.StringTokenizer;
+ import org.apache.commons.logging.Log;
+ import org.apache.commons.logging.LogFactory;
+
import org.beepcore.beep.profile.sasl.SASLException;
import org.beepcore.beep.profile.sasl.InvalidParameterException;
***************
*** 449,452 ****
--- 450,455 ----
"YELL", "YOGA", "YOKE" };
+ private static Log slog = LogFactory.getLog(OTPDictionary.class);
+
static public String find(int index) throws InvalidParameterException
{
***************
*** 491,495 ****
if (i == null) {
! Log.logEntry(Log.SEV_ERROR, "OTPDictionary", ERR_INVALID_HASH);
throw new InvalidParameterException("Invalid OTP word=>" + s);
--- 494,498 ----
if (i == null) {
! slog.error(ERR_INVALID_HASH);
throw new InvalidParameterException("Invalid OTP word=>" + s);
***************
*** 521,526 ****
if (st.countTokens() != 6) {
! Log.logEntry(Log.SEV_ERROR, "OTPDictionary",
! "Failed to hash=>" + words);
throw new InvalidParameterException(ERR_INVALID_HASH);
--- 524,528 ----
if (st.countTokens() != 6) {
! slog.error("Failed to hash=>" + words);
throw new InvalidParameterException(ERR_INVALID_HASH);
***************
*** 587,591 ****
}
! Log.logEntry(Log.SEV_CRITICAL, "OTPDictionary", ERR_INVALID_HASH);
throw new RuntimeException(ERR_INVALID_HASH);
--- 589,593 ----
}
! slog.error(ERR_INVALID_HASH);
throw new RuntimeException(ERR_INVALID_HASH);
Index: OTPGenerator.java
===================================================================
RCS file: /cvsroot/beepcore-java/beepcore-java/src/org/beepcore/beep/profile/sasl/otp/OTPGenerator.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -C2 -r1.4 -r1.5
*** OTPGenerator.java 8 Nov 2001 05:51:34 -0000 1.4
--- OTPGenerator.java 5 Oct 2002 15:32:06 -0000 1.5
***************
*** 254,257 ****
--- 254,262 ----
}
+ static void printHex(byte buff[])
+ {
+ System.out.println(SASLOTPProfile.convertBytesToHex(buff));
+ }
+
/**
* Method main is the method used to run the OTP generator.
***************
*** 296,300 ****
}
! SASLOTPProfile.printHex(hash);
passphrase = SASLOTPProfile.convertBytesToHex(hash);
--- 301,305 ----
}
! printHex(hash);
passphrase = SASLOTPProfile.convertBytesToHex(hash);
Index: OTPAuthenticator.java
===================================================================
RCS file: /cvsroot/beepcore-java/beepcore-java/src/org/beepcore/beep/profile/sasl/otp/OTPAuthenticator.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -C2 -r1.11 -r1.12
*** OTPAuthenticator.java 10 Nov 2001 21:33:29 -0000 1.11
--- OTPAuthenticator.java 5 Oct 2002 15:32:06 -0000 1.12
***************
*** 25,30 ****
import java.util.StringTokenizer;
import org.beepcore.beep.core.*;
- import org.beepcore.beep.util.*;
import org.beepcore.beep.profile.sasl.*;
import org.beepcore.beep.profile.sasl.otp.algorithm.*;
--- 25,32 ----
import java.util.StringTokenizer;
+ import org.apache.commons.logging.Log;
+ import org.apache.commons.logging.LogFactory;
+
import org.beepcore.beep.core.*;
import org.beepcore.beep.profile.sasl.*;
import org.beepcore.beep.profile.sasl.otp.algorithm.*;
***************
*** 97,100 ****
--- 99,104 ----
// Data
+ private Log log = LogFactory.getLog(this.getClass());
+
private int state;
private Algorithm algorithm;
***************
*** 113,118 ****
OTPAuthenticator(SASLOTPProfile otpProfile)
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Creating Listener OTP Authenticator");
authenticated = null;
--- 117,121 ----
OTPAuthenticator(SASLOTPProfile otpProfile)
{
! log.debug("Creating Listener OTP Authenticator");
authenticated = null;
***************
*** 134,139 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Starting OTP Authenticator");
if (state != STATE_UNKNOWN) {
--- 137,141 ----
throws SASLException
{
! log.debug("Starting OTP Authenticator");
if (state != STATE_UNKNOWN) {
***************
*** 153,158 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator Receiving IDs");
// If we're listening, the last state we should
--- 155,159 ----
throws SASLException
{
! log.debug("OTP Authenticator Receiving IDs");
// If we're listening, the last state we should
***************
*** 162,166 ****
}
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH, "Data is" + data);
int i = data.charAt(0); // data.indexOf(SPACE_CHAR);
--- 163,169 ----
}
! if (log.isDebugEnabled()) {
! log.debug("Data is" + data);
! }
int i = data.charAt(0); // data.indexOf(SPACE_CHAR);
***************
*** 194,199 ****
}
! Log.logEntry(Log.SEV_DEBUG,
! "Fetching DB for " + authenticated);
try
--- 197,203 ----
}
! if (log.isDebugEnabled()) {
! log.debug("Fetching DB for " + authenticated);
! }
try
***************
*** 243,248 ****
challenge.append(SPACE);
challenge.append(EXT);
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Generated Challenge=>" + challenge.toString());
try
--- 247,253 ----
challenge.append(SPACE);
challenge.append(EXT);
! if (log.isDebugEnabled()) {
! log.debug("Generated Challenge=>" + challenge.toString());
! }
try
***************
*** 271,277 ****
boolean doInit = false;
byte responseHash[] = null;
!
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator validating response");
// If we're listening, the last state we should
--- 276,281 ----
boolean doInit = false;
byte responseHash[] = null;
!
! log.debug("OTP Authenticator validating response");
// If we're listening, the last state we should
***************
*** 298,309 ****
response = response.substring(WORD.length());
long l = OTPDictionary.convertWordsToHash(response);
! responseHash = profile.convertLongToBytes(l);
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Hacked response=>" + response);
} else if (response.indexOf(HEX) != -1) {
response = response.substring(HEX.length());
responseHash = profile.convertHexToBytes(response);
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Hacked response=>" + response);
} else {
abort(ERR_UNEXPECTED_MESSAGE);
--- 302,315 ----
response = response.substring(WORD.length());
long l = OTPDictionary.convertWordsToHash(response);
! responseHash = profile.convertLongToBytes(l);
! if (log.isDebugEnabled()) {
! log.debug("Hacked response=>" + response);
! }
} else if (response.indexOf(HEX) != -1) {
response = response.substring(HEX.length());
responseHash = profile.convertHexToBytes(response);
! if (log.isDebugEnabled()) {
! log.debug("Hacked response=>" + response);
! }
} else {
abort(ERR_UNEXPECTED_MESSAGE);
***************
*** 330,335 ****
byte nextHash[] = database.getLastHash();
byte responseHash[] = algorithm.generateHash(hash);
! Log.logEntry(Log.SEV_DEBUG_VERBOSE,"Test====>"+profile.convertBytesToHex(responseHash));
! Log.logEntry(Log.SEV_DEBUG_VERBOSE,"Control=>"+profile.convertBytesToHex(nextHash));
boolean match = true;
for(int i = 0; i < 8; i++)
--- 336,343 ----
byte nextHash[] = database.getLastHash();
byte responseHash[] = algorithm.generateHash(hash);
! if (log.isTraceEnabled()) {
! log.trace("Test====>"+profile.convertBytesToHex(responseHash));
! log.trace("Control=>"+profile.convertBytesToHex(nextHash));
! }
boolean match = true;
for(int i = 0; i < 8; i++)
***************
*** 351,355 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, "Validating init-* response");
// Extract the various elements of the request
String oldHashData;
--- 359,363 ----
throws SASLException
{
! log.debug("Validating init-* response");
// Extract the various elements of the request
String oldHashData;
***************
*** 368,395 ****
newParms = st.nextToken();
newHashData = st.nextToken();
! Log.logEntry(Log.SEV_DEBUG,"Command=>"+command);
! Log.logEntry(Log.SEV_DEBUG,"OldHashData=>"+oldHashData);
! Log.logEntry(Log.SEV_DEBUG,"newParms=>"+newParms);
! Log.logEntry(Log.SEV_DEBUG,"newHashData=>"+newHashData);
// Validate login
Algorithm a = profile.getAlgorithm(database.getAlgorithmName());
! if(profile.HEX_INIT.startsWith(command))//command.indexOf(profile.HEX_INIT) != -1)
! {
! Log.logEntry(Log.SEV_DEBUG,"CMD is "+profile.HEX_INIT);
oldHash = profile.convertHexToBytes(oldHashData);
! }
! else if(profile.WORD_INIT.startsWith(command))//command.indexOf(profile.WORD_INIT) != -1)
! {
! Log.logEntry(Log.SEV_DEBUG,"CMD is "+profile.WORD_INIT);
// @todo obviate the 2nd step when you get a chance
long l = OTPDictionary.convertWordsToHash(oldHashData);
oldHash = profile.convertLongToBytes(l);
! }
! else
! {
abort(ERR_UNKNOWN_COMMAND+command);
}
! Log.logEntry(Log.SEV_DEBUG,"Retrieved from init-* oldHash=>"+profile.convertBytesToHex(oldHash));
// Compare the hash and fail if it doesn't match
--- 376,404 ----
newParms = st.nextToken();
newHashData = st.nextToken();
! if (log.isDebugEnabled()) {
! log.debug("Command=>"+command);
! log.debug("OldHashData=>"+oldHashData);
! log.debug("newParms=>"+newParms);
! log.debug("newHashData=>"+newHashData);
! }
// Validate login
Algorithm a = profile.getAlgorithm(database.getAlgorithmName());
! if(profile.HEX_INIT.startsWith(command)) {
! log.debug("CMD is "+profile.HEX_INIT);
oldHash = profile.convertHexToBytes(oldHashData);
! } else if(profile.WORD_INIT.startsWith(command)) {
! log.debug("CMD is "+profile.WORD_INIT);
// @todo obviate the 2nd step when you get a chance
long l = OTPDictionary.convertWordsToHash(oldHashData);
oldHash = profile.convertLongToBytes(l);
! } else {
abort(ERR_UNKNOWN_COMMAND+command);
}
!
! if (log.isDebugEnabled()) {
! log.debug("Retrieved from init-* oldHash=>" +
! profile.convertBytesToHex(oldHash));
! }
// Compare the hash and fail if it doesn't match
***************
*** 405,413 ****
st = new StringTokenizer(newParms);
// Now do even weirder update of the db.
! Log.logEntry(Log.SEV_DEBUG,"Auth=>"+authenticated);
! Log.logEntry(Log.SEV_DEBUG,"Hash=>"+newHashData);
profile.getUserDatabase().addUser(authenticated, algorithm,
newHashData, seed, sequence);
! Log.logEntry(Log.SEV_DEBUG, "Successful Authentication!");
return cred;
}
--- 414,424 ----
st = new StringTokenizer(newParms);
// Now do even weirder update of the db.
! if (log.isDebugEnabled()) {
! log.debug("Auth=>"+authenticated);
! log.debug("Hash=>"+newHashData);
! }
profile.getUserDatabase().addUser(authenticated, algorithm,
newHashData, seed, sequence);
! log.debug("Successful Authentication!");
return cred;
}
***************
*** 434,439 ****
String authorizedId, String authenticateId)
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator Initiator Construtor");
authenticated = authenticateId;
--- 445,449 ----
String authorizedId, String authenticateId)
{
! log.debug("OTP Authenticator Initiator Construtor");
authenticated = authenticateId;
***************
*** 442,450 ****
database = db;
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Dict.getA()" + database.getAlgorithmName());
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Dict.getA()"
! + profile.getAlgorithm(database.getAlgorithmName()));
algorithm = profile.getAlgorithm(database.getAlgorithmName());
--- 452,460 ----
database = db;
! if (log.isDebugEnabled()) {
! log.debug("Dict.getA()" + database.getAlgorithmName());
! log.debug("Dict.getA()"
! + profile.getAlgorithm(database.getAlgorithmName()));
! }
algorithm = profile.getAlgorithm(database.getAlgorithmName());
***************
*** 493,498 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator sending Identities");
// Grok and validate the parameters
--- 503,507 ----
throws SASLException
{
! log.debug("OTP Authenticator sending Identities");
// Grok and validate the parameters
***************
*** 512,520 ****
temp.append(authenticateId);
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "AuthOTP Using=>" + temp.toString() + "<=");
Blob blob = new Blob(Blob.STATUS_NONE, temp.toString());
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "AuthOTP Using=>" + blob.toString() + "<=");
try {
channel.sendMSG(new StringOutputDataStream(blob.toString()),
--- 521,531 ----
temp.append(authenticateId);
! if (log.isDebugEnabled()) {
! log.debug("AuthOTP Using=>" + temp.toString() + "<=");
! }
Blob blob = new Blob(Blob.STATUS_NONE, temp.toString());
! if (log.isDebugEnabled()) {
! log.debug("AuthOTP Using=>" + blob.toString() + "<=");
! }
try {
channel.sendMSG(new StringOutputDataStream(blob.toString()),
***************
*** 532,537 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator received Challenge");
// If we're initiating, the last state we should
--- 543,547 ----
throws SASLException
{
! log.debug("OTP Authenticator received Challenge");
// If we're initiating, the last state we should
***************
*** 553,558 ****
String seed = null, algo = null;
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Tokenizing=>" + challenge);
StringTokenizer st = new StringTokenizer(challenge);
--- 563,569 ----
String seed = null, algo = null;
! if (log.isDebugEnabled()) {
! log.debug("Tokenizing=>" + challenge);
! }
StringTokenizer st = new StringTokenizer(challenge);
***************
*** 575,581 ****
abort("Invalid Seed");
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Algo is=>" + algo + " seed is=>" + seed + " seq=>"
! + sequence);
String phrase = new String(seed + password);
--- 586,593 ----
abort("Invalid Seed");
! if (log.isDebugEnabled()) {
! log.debug("Algo is=>" + algo + " seed is=>" + seed + " seq=>"
! + sequence);
! }
String phrase = new String(seed + password);
***************
*** 590,599 ****
}
! profile.printHex(temp);
long l = profile.convertBytesToLong(temp);
phrase = new String(WORD + OTPDictionary.convertHashToWords(l));
!
! Log.logEntry(Log.SEV_DEBUG,
! "Prelim response is =>" + phrase + "<=");
// IF this is an init request
--- 602,614 ----
}
! if (log.isDebugEnabled()) {
! log.debug(SASLOTPProfile.convertBytesToHex(temp));
! }
long l = profile.convertBytesToLong(temp);
phrase = new String(WORD + OTPDictionary.convertHashToWords(l));
!
! if (log.isDebugEnabled()) {
! log.debug("Prelim response is =>" + phrase + "<=");
! }
// IF this is an init request
***************
*** 605,609 ****
sb.append(initData);
phrase = sb.toString();
! Log.logEntry(Log.SEV_DEBUG,"Produced INIT response of "+phrase);
}
try
--- 620,626 ----
sb.append(initData);
phrase = sb.toString();
! if (log.isDebugEnabled()) {
! log.debug("Produced INIT response of "+phrase);
! }
}
try
***************
*** 626,631 ****
throws SASLException
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator Completing!");
// If we're initiating, the last state we should
--- 643,647 ----
throws SASLException
{
! log.debug("OTP Authenticator Completing!");
// If we're initiating, the last state we should
***************
*** 643,648 ****
throws SASLException
{
! Log.logEntry(Log.SEV_ERROR, OTP_AUTH,
! "Aborting OTP Authenticator because " + message);
state = STATE_ABORT;
throw new SASLException(message);
--- 659,663 ----
throws SASLException
{
! log.error("Aborting OTP Authenticator because " + message);
state = STATE_ABORT;
throw new SASLException(message);
***************
*** 657,662 ****
void abortNoThrow(String message)
{
! Log.logEntry(Log.SEV_ERROR, OTP_AUTH,
! "Aborting OTP Authenticator because " + message);
state = STATE_ABORT;
}
--- 672,676 ----
void abortNoThrow(String message)
{
! log.error("Aborting OTP Authenticator because " + message);
state = STATE_ABORT;
}
***************
*** 680,685 ****
try
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator.receiveMSG");
String data = null;
--- 694,698 ----
try
{
! log.debug("OTP Authenticator.receiveMSG");
String data = null;
***************
*** 705,710 ****
}
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "MSG DATA=>" + data);
String status = blob.getStatus();
--- 718,724 ----
}
! if (log.isDebugEnabled()) {
! log.debug("MSG DATA=>" + data);
! }
String status = blob.getStatus();
***************
*** 733,739 ****
state = STATE_COMPLETE;
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "Wow, cool!!! " + channel.getSession()
! + " is valid for\n" + cred.toString());
try
{
--- 747,754 ----
state = STATE_COMPLETE;
! if (log.isDebugEnabled()) {
! log.debug("" + channel.getSession()
! + " is valid for\n" + cred.toString());
! }
try
{
***************
*** 784,789 ****
public void receiveRPY(Message message)
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator.receiveRPY");
Blob blob = null;
--- 799,803 ----
public void receiveRPY(Message message)
{
! log.debug("OTP Authenticator.receiveRPY");
Blob blob = null;
***************
*** 814,821 ****
if ((status != null)
! && status.equals(SASLProfile.SASL_STATUS_ABORT)) {
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTPAuthenticator receiveRPY got an RPY=>"
! + blob.getData());
sendAbort = false;
abort(ERR_PEER_ABORTED + blob.getData());
--- 828,835 ----
if ((status != null)
! && status.equals(SASLProfile.SASL_STATUS_ABORT))
! {
! log.debug("OTPAuthenticator receiveRPY got an RPY=>"
! + blob.getData());
sendAbort = false;
abort(ERR_PEER_ABORTED + blob.getData());
***************
*** 850,854 ****
catch(Exception x)
{
! Log.logEntry(Log.SEV_ERROR, x);
synchronized (this) {
this.notify();
--- 864,868 ----
catch(Exception x)
{
! log.error(x);
synchronized (this) {
this.notify();
***************
*** 888,893 ****
public void receiveERR(Message message)
{
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "OTP Authenticator.receiveERR");
try {
--- 902,906 ----
public void receiveERR(Message message)
{
! log.debug("OTP Authenticator.receiveERR");
try {
***************
*** 898,903 ****
is.read(buff);
Blob b = new Blob(new String(buff));
! Log.logEntry(Log.SEV_DEBUG, OTP_AUTH,
! "ERR received=>\n" + b.getData());
abort(new String(buff));
--- 911,917 ----
is.read(buff);
Blob b = new Blob(new String(buff));
! if (log.isDebugEnabled()) {
! log.debug("ERR received=>\n" + b.getData());
! }
abort(new String(buff));
|