mirror of
git://gcc.gnu.org/git/gcc.git
synced 2024-12-23 22:29:53 +08:00
28f7d9d05a
gcc/java: 2001-04-25 Bryce McKinlay <bryce@waitaki.otago.ac.nz> * decl.c (init_decl_processing): Add new class "protectionDomain" field. * class.c (make_class_data): Set initial value for "protectionDomain". libjava: 2001-04-25 Bryce McKinlay <bryce@albatross.co.nz> java.security merge and ClassLoader compliance fixes. * java/lang/Class.h (Class): Include ProtectionDomain.h. New protectionDomain field. (forName): Add initialize parameter. Fixes declaration to comply with JDK spec. * java/lang/natClass.cc (forName): Correct declaration of the three-arg variant. Honour "initialize" flag. (getProtectionDomain0): New method. * java/lang/Class.java: Fix forName() declaration. (getPackage): New method based on Classpath implementation. (getProtectionDomain0): New native method decl. (getProtectionDomain): New method. * java/lang/ClassLoader.java (getParent): Now final. (definedPackages): New field. (getPackage): New. (defineClass): New variant with protectionDomain argument. (definePackage): New. (getPackages): New. (findSystemClass): Now final. (getSystemResourceAsStream): Remove redundant "final" modifier. (getSystemResource): Remove redundant "final" modifier. (getResources): Now final. (protectionDomainPermission): New static field. (unknownProtectionDomain): Ditto. (defaultProtectionDomain): Ditto. (getSystemClassLoader): Now non-native. * java/util/ResourceBundle.java (tryGetSomeBundle): Use the correct arguments for Class.forName(). * java/lang/Package.java: New file. * gnu/gcj/runtime/VMClassLoader.java (getVMClassLoader): Removed. (instance): Static initialize singleton. (findClass): Override this, not findSystemClass. * java/lang/natClassLoader.cc (defineClass0): Set class's protectionDomain field as specified. (getSystemClassLoader): Removed. (findClass): Renamed from findSystemClass. Call the interpreter via URLClassLoader.findClass if loading class via dlopen fails. * java/security/*.java: java.security import/merge with Classpath. * java/security/acl/*.java: Likewise. * java/security/interfaces/*.java: Likewise. * java/security/spec/*.java: Likewise. * java/net/NetPermission.java: Likewise. * java/net/SocketPermission.java: Likewise. * gnu/java/security/provider/DefaultPolicy.java: Likewise. * Makefile.am: Add new classes. * Makefile.in: Rebuilt. * gcj/javaprims.h: CNI namespace rebuild. From-SVN: r41543
323 lines
8.9 KiB
Java
323 lines
8.9 KiB
Java
/* Security.java --- Java base security class implmentation
|
|
Copyright (C) 1999, 2001 Free Software Foundation, Inc.
|
|
|
|
This file is part of GNU Classpath.
|
|
|
|
GNU Classpath is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2, or (at your option)
|
|
any later version.
|
|
|
|
GNU Classpath is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with GNU Classpath; see the file COPYING. If not, write to the
|
|
Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
|
02111-1307 USA.
|
|
|
|
As a special exception, if you link this library with other files to
|
|
produce an executable, this library does not by itself cause the
|
|
resulting executable to be covered by the GNU General Public License.
|
|
This exception does not however invalidate any other reasons why the
|
|
executable file might be covered by the GNU General Public License. */
|
|
|
|
package java.security;
|
|
import java.io.File;
|
|
import java.io.FileInputStream;
|
|
import java.io.IOException;
|
|
import java.io.FileNotFoundException;
|
|
import java.security.Provider;
|
|
import java.util.Vector;
|
|
import java.util.Enumeration;
|
|
import java.util.Properties;
|
|
|
|
/**
|
|
Security class that loads the Providers and provides an
|
|
interface to security properties.
|
|
|
|
@author Mark Benvenuto <ivymccough@worldnet.att.net>
|
|
*/
|
|
|
|
public final class Security extends Object
|
|
{
|
|
private static Vector providers = new Vector();
|
|
private static int providerCount = 0;
|
|
private static Properties secprops;
|
|
|
|
static
|
|
{
|
|
loadProviders();
|
|
}
|
|
|
|
private static void loadProviders()
|
|
{
|
|
String separator = System.getProperty("file.separator");
|
|
String secfilestr = System.getProperty("java.home") +
|
|
separator + "lib" + separator + "security" + separator +
|
|
"classpath.security";
|
|
|
|
providerCount = 0;
|
|
try
|
|
{
|
|
File secFile = new File(secfilestr);
|
|
FileInputStream fin = new FileInputStream(secFile);
|
|
secprops = new Properties();
|
|
secprops.load(fin);
|
|
|
|
int i = 1;
|
|
String name;
|
|
StringBuffer pname = new StringBuffer("security.provider.");
|
|
|
|
while ((name = secprops.getProperty(pname.append(i).toString())) !=
|
|
null)
|
|
{
|
|
Exception exception = null;
|
|
try
|
|
{
|
|
providers.addElement(Class.forName(name).newInstance());
|
|
providerCount++;
|
|
i++;
|
|
}
|
|
catch (ClassNotFoundException x)
|
|
{
|
|
exception = x;
|
|
}
|
|
catch (InstantiationException x)
|
|
{
|
|
exception = x;
|
|
}
|
|
catch (IllegalAccessException x)
|
|
{
|
|
exception = x;
|
|
}
|
|
if (exception != null)
|
|
System.err.println ("Error loading security provider " + name
|
|
+ ": " + exception);
|
|
}
|
|
}
|
|
catch (FileNotFoundException ignored)
|
|
{
|
|
// Actually we probibly shouldn't ignore these, once the security
|
|
// properties file is actually installed somewhere.
|
|
}
|
|
catch (IOException ignored)
|
|
{
|
|
}
|
|
}
|
|
|
|
/**
|
|
Gets a specific property for an algorithm. This is used to produce specialized
|
|
algorithm parsers.
|
|
|
|
@deprecated it used to a return the value of a propietary property
|
|
for the "SUN" Cryptographic Service Provider to obtain
|
|
algorithm-specific parameters. Used AlogorithmParameters and
|
|
KeyFactory instead.
|
|
|
|
@param algName name of algorithm to get property of
|
|
@param propName name of property to check
|
|
|
|
@return a string containing the value of the property
|
|
*/
|
|
public static String getAlgorithmProperty(String algName, String propName)
|
|
{
|
|
/* TODO: Figure out what this actually does */
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
Adds a new provider at the specified position. This allows dynamic loading
|
|
of providers. It will check for duplication of providers.
|
|
|
|
This class checks the security manager with the call checkSecurityAccess
|
|
with "insertProvider."+provider.getName() to see if the user can add this
|
|
provider.
|
|
|
|
@param provider the provider to add
|
|
@param position position to add the provider at
|
|
|
|
@return the position the provider was added at, or -1 if a duplicate provider
|
|
was found
|
|
|
|
@throws SecurityException - if the security manager denies access to add a
|
|
new provider
|
|
*/
|
|
public static int insertProviderAt(Provider provider, int position)
|
|
{
|
|
SecurityManager sm = System.getSecurityManager();
|
|
if (sm != null)
|
|
sm.checkSecurityAccess("insertProvider." + provider.getName());
|
|
|
|
for (int i = 0; i < providerCount; i++)
|
|
{
|
|
if (((Provider) providers.elementAt(i)).getName() ==
|
|
provider.getName())
|
|
return -1;
|
|
}
|
|
|
|
if (position < 0)
|
|
position = 0;
|
|
if (position > providerCount)
|
|
position = providerCount;
|
|
|
|
providers.insertElementAt(provider, position);
|
|
providerCount++;
|
|
|
|
return position;
|
|
}
|
|
|
|
|
|
/**
|
|
Adds a new provider. This allows dynamic loading
|
|
of providers. It will check for duplication of providers.
|
|
|
|
This method checks the security manager with the call checkSecurityAccess
|
|
with "insertProvider."+provider.getName() to see if the user can add this
|
|
provider.
|
|
|
|
@param provider the provider to add
|
|
|
|
@return the position the provider was added at, or -1 if a duplicate provider
|
|
was found
|
|
|
|
@throws SecurityException - if the security manager denies access to add a
|
|
new provider
|
|
*/
|
|
public static int addProvider(Provider provider)
|
|
{
|
|
SecurityManager sm = System.getSecurityManager();
|
|
|
|
if (sm != null)
|
|
sm.checkSecurityAccess("insertProvider." + provider.getName());
|
|
|
|
for (int i = 0; i < providerCount; i++)
|
|
{
|
|
if (((Provider) providers.elementAt(i)).getName() ==
|
|
provider.getName())
|
|
return -1;
|
|
}
|
|
|
|
providers.addElement(provider);
|
|
providerCount++;
|
|
|
|
return providerCount - 1;
|
|
}
|
|
|
|
/**
|
|
Removes a provider. This allows dynamic unloading
|
|
of providers. It will automatically shift up providers to a higher
|
|
ranking. If the provider is not installed, it fails silently.
|
|
|
|
This method checks the security manager with the call checkSecurityAccess
|
|
with "removeProvider."+provider.getName() to see if the user can remove this
|
|
provider.
|
|
|
|
@param name name of the provider to add
|
|
|
|
@throws SecurityException - if the security manager denies access to remove a
|
|
new provider
|
|
*/
|
|
public static void removeProvider(String name)
|
|
{
|
|
SecurityManager sm = System.getSecurityManager();
|
|
if (sm != null)
|
|
sm.checkSecurityAccess("removeProvider." + name);
|
|
|
|
Provider p = null;
|
|
for (int i = 0; i < providerCount; i++)
|
|
{
|
|
if (((Provider) providers.elementAt(i)).getName() == name)
|
|
{
|
|
p = (Provider) providers.elementAt(i);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (p != null)
|
|
if (providers.removeElement(p))
|
|
providerCount--;
|
|
|
|
}
|
|
|
|
/**
|
|
Returns array containing all the providers. It is in the preference order
|
|
of the providers.
|
|
|
|
@return an array of installed providers
|
|
*/
|
|
public static Provider[] getProviders()
|
|
{
|
|
Provider array[] = new Provider[providerCount];
|
|
for (int i = 0; i < providerCount; i++)
|
|
array[i] = (Provider) providers.elementAt(i);
|
|
return array;
|
|
}
|
|
|
|
/**
|
|
Returns the provider with the specified name. It will return null
|
|
if the provider cannot be found.
|
|
|
|
@param name name of the requested provider
|
|
|
|
@return requested provider
|
|
*/
|
|
public static Provider getProvider(String name)
|
|
{
|
|
Provider p = null;
|
|
for (int i = 0; i < providerCount; i++)
|
|
{
|
|
p = (Provider) providers.elementAt(i);
|
|
if (p.getName() == name)
|
|
break;
|
|
}
|
|
return p;
|
|
}
|
|
|
|
/**
|
|
Gets the value of a security property.
|
|
|
|
This method checks the security manager with the call checkSecurityAccess
|
|
with "getProperty."+key to see if the user can get this property.
|
|
|
|
@param key property to get
|
|
|
|
@return value of the property
|
|
|
|
@throws SecurityException - if the security manager denies access to
|
|
getting a property
|
|
*/
|
|
public static String getProperty(String key)
|
|
{
|
|
SecurityManager sm = System.getSecurityManager();
|
|
if (sm != null)
|
|
sm.checkSecurityAccess("getProperty." + key);
|
|
|
|
return secprops.getProperty(key);
|
|
}
|
|
|
|
|
|
/**
|
|
Sets the value of a security property.
|
|
|
|
This method checks the security manager with the call checkSecurityAccess
|
|
with "setProperty."+key to see if the user can get this property.
|
|
|
|
@param key property to set
|
|
@param datnum new value of property
|
|
|
|
@throws SecurityException - if the security manager denies access to
|
|
setting a property
|
|
*/
|
|
public static void setProperty(String key, String datnum)
|
|
{
|
|
SecurityManager sm = System.getSecurityManager();
|
|
if (sm != null)
|
|
sm.checkSecurityAccess("setProperty." + key);
|
|
|
|
secprops.put(key, datnum);
|
|
}
|
|
}
|