aboutsummaryrefslogtreecommitdiff
path: root/libjava/java/security/Security.java
diff options
context:
space:
mode:
Diffstat (limited to 'libjava/java/security/Security.java')
-rw-r--r--libjava/java/security/Security.java339
1 files changed, 277 insertions, 62 deletions
diff --git a/libjava/java/security/Security.java b/libjava/java/security/Security.java
index 87a0088..c5187d8 100644
--- a/libjava/java/security/Security.java
+++ b/libjava/java/security/Security.java
@@ -1,107 +1,322 @@
-/* Copyright (C) 2000 Free Software Foundation
+/* Security.java --- Java base security class implmentation
+ Copyright (C) 1999, 2001 Free Software Foundation, Inc.
- This file is part of libgcj.
+This file is part of GNU Classpath.
-This software is copyrighted work licensed under the terms of the
-Libgcj License. Please consult the file "LIBGCJ_LICENSE" for
-details. */
+GNU Classpath is free software; you can redistribute it and/or modify
+it under the terms of the GNU General Public License as published by
+the Free Software Foundation; either version 2, or (at your option)
+any later version.
-package java.security;
+GNU Classpath is distributed in the hope that it will be useful, but
+WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with GNU Classpath; see the file COPYING. If not, write to the
+Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
+02111-1307 USA.
+
+As a special exception, if you link this library with other files to
+produce an executable, this library does not by itself cause the
+resulting executable to be covered by the GNU General Public License.
+This exception does not however invalidate any other reasons why the
+executable file might be covered by the GNU General Public License. */
+package java.security;
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.IOException;
+import java.io.FileNotFoundException;
+import java.security.Provider;
+import java.util.Vector;
import java.util.Enumeration;
import java.util.Properties;
-import java.util.Vector;
/**
- * @author Tom Tromey <tromey@cygnus.com>
- * @date February 8, 2000.
- */
+ Security class that loads the Providers and provides an
+ interface to security properties.
-/**
- * Written using on-line Java Platform 1.2 API Specification.
- * Status: Still missing the deprecated getAlgorithmProperty method.
+ @author Mark Benvenuto <ivymccough@worldnet.att.net>
*/
-public final class Security
+public final class Security extends Object
{
- public static int insertProviderAt (Provider provider, int position)
+ private static Vector providers = new Vector();
+ private static int providerCount = 0;
+ private static Properties secprops;
+
+ static
{
- SecurityManager sm = System.getSecurityManager ();
- if (sm != null)
+ loadProviders();
+ }
+
+ private static void loadProviders()
+ {
+ String separator = System.getProperty("file.separator");
+ String secfilestr = System.getProperty("java.home") +
+ separator + "lib" + separator + "security" + separator +
+ "classpath.security";
+
+ providerCount = 0;
+ try
+ {
+ File secFile = new File(secfilestr);
+ FileInputStream fin = new FileInputStream(secFile);
+ secprops = new Properties();
+ secprops.load(fin);
+
+ int i = 1;
+ String name;
+ StringBuffer pname = new StringBuffer("security.provider.");
+
+ while ((name = secprops.getProperty(pname.append(i).toString())) !=
+ null)
+ {
+ Exception exception = null;
+ try
+ {
+ providers.addElement(Class.forName(name).newInstance());
+ providerCount++;
+ i++;
+ }
+ catch (ClassNotFoundException x)
+ {
+ exception = x;
+ }
+ catch (InstantiationException x)
+ {
+ exception = x;
+ }
+ catch (IllegalAccessException x)
+ {
+ exception = x;
+ }
+ if (exception != null)
+ System.err.println ("Error loading security provider " + name
+ + ": " + exception);
+ }
+ }
+ catch (FileNotFoundException ignored)
+ {
+ // Actually we probibly shouldn't ignore these, once the security
+ // properties file is actually installed somewhere.
+ }
+ catch (IOException ignored)
{
- // FIXME: need SecurityPermission.
- // sm.checkSecurityAccess ("insertProvider." + provider.getName ());
}
- if (providers.indexOf (provider) != -1)
- return -1;
- if (position > providers.size ())
- position = providers.size ();
- providers.insertElementAt (provider, position);
- return providers.indexOf (provider);
}
- public static int addProvider (Provider provider)
+ /**
+ Gets a specific property for an algorithm. This is used to produce specialized
+ algorithm parsers.
+
+ @deprecated it used to a return the value of a propietary property
+ for the "SUN" Cryptographic Service Provider to obtain
+ algorithm-specific parameters. Used AlogorithmParameters and
+ KeyFactory instead.
+
+ @param algName name of algorithm to get property of
+ @param propName name of property to check
+
+ @return a string containing the value of the property
+ */
+ public static String getAlgorithmProperty(String algName, String propName)
{
- return insertProviderAt (provider, providers.size ());
+ /* TODO: Figure out what this actually does */
+ return null;
}
- public static void removeProvider (String name)
+ /**
+ Adds a new provider at the specified position. This allows dynamic loading
+ of providers. It will check for duplication of providers.
+
+ This class checks the security manager with the call checkSecurityAccess
+ with "insertProvider."+provider.getName() to see if the user can add this
+ provider.
+
+ @param provider the provider to add
+ @param position position to add the provider at
+
+ @return the position the provider was added at, or -1 if a duplicate provider
+ was found
+
+ @throws SecurityException - if the security manager denies access to add a
+ new provider
+ */
+ public static int insertProviderAt(Provider provider, int position)
{
- SecurityManager sm = System.getSecurityManager ();
+ SecurityManager sm = System.getSecurityManager();
if (sm != null)
+ sm.checkSecurityAccess("insertProvider." + provider.getName());
+
+ for (int i = 0; i < providerCount; i++)
{
- // FIXME: need SecurityPermission.
- // sm.checkSecurityAccess ("removeProvider." + name);
+ if (((Provider) providers.elementAt(i)).getName() ==
+ provider.getName())
+ return -1;
}
- Provider p = getProvider (name);
- if (p != null)
- providers.removeElement (p);
- }
- public static Provider[] getProviders ()
- {
- Provider[] r = new Provider[providers.size ()];
- providers.copyInto (r);
- return r;
+ if (position < 0)
+ position = 0;
+ if (position > providerCount)
+ position = providerCount;
+
+ providers.insertElementAt(provider, position);
+ providerCount++;
+
+ return position;
}
- public static Provider getProvider (String name)
+
+ /**
+ Adds a new provider. This allows dynamic loading
+ of providers. It will check for duplication of providers.
+
+ This method checks the security manager with the call checkSecurityAccess
+ with "insertProvider."+provider.getName() to see if the user can add this
+ provider.
+
+ @param provider the provider to add
+
+ @return the position the provider was added at, or -1 if a duplicate provider
+ was found
+
+ @throws SecurityException - if the security manager denies access to add a
+ new provider
+ */
+ public static int addProvider(Provider provider)
{
- Enumeration e = providers.elements ();
- while (e.hasMoreElements ())
+ SecurityManager sm = System.getSecurityManager();
+
+ if (sm != null)
+ sm.checkSecurityAccess("insertProvider." + provider.getName());
+
+ for (int i = 0; i < providerCount; i++)
{
- Provider p = (Provider) e.nextElement ();
- if (name.equals (p.getName ()))
- return p;
+ if (((Provider) providers.elementAt(i)).getName() ==
+ provider.getName())
+ return -1;
}
- return null;
+
+ providers.addElement(provider);
+ providerCount++;
+
+ return providerCount - 1;
}
- public static String getProperty (String key)
+ /**
+ Removes a provider. This allows dynamic unloading
+ of providers. It will automatically shift up providers to a higher
+ ranking. If the provider is not installed, it fails silently.
+
+ This method checks the security manager with the call checkSecurityAccess
+ with "removeProvider."+provider.getName() to see if the user can remove this
+ provider.
+
+ @param name name of the provider to add
+
+ @throws SecurityException - if the security manager denies access to remove a
+ new provider
+ */
+ public static void removeProvider(String name)
{
- SecurityManager sm = System.getSecurityManager ();
+ SecurityManager sm = System.getSecurityManager();
if (sm != null)
+ sm.checkSecurityAccess("removeProvider." + name);
+
+ Provider p = null;
+ for (int i = 0; i < providerCount; i++)
{
- // FIXME: need SecurityPermission.
- // sm.checkSecurityAccess ("getProperty." + key);
+ if (((Provider) providers.elementAt(i)).getName() == name)
+ {
+ p = (Provider) providers.elementAt(i);
+ break;
+ }
}
- return props.getProperty (key);
+
+ if (p != null)
+ if (providers.removeElement(p))
+ providerCount--;
+
}
- public static void setProperty (String key, String value)
+ /**
+ Returns array containing all the providers. It is in the preference order
+ of the providers.
+
+ @return an array of installed providers
+ */
+ public static Provider[] getProviders()
{
- SecurityManager sm = System.getSecurityManager ();
- if (sm != null)
+ Provider array[] = new Provider[providerCount];
+ for (int i = 0; i < providerCount; i++)
+ array[i] = (Provider) providers.elementAt(i);
+ return array;
+ }
+
+ /**
+ Returns the provider with the specified name. It will return null
+ if the provider cannot be found.
+
+ @param name name of the requested provider
+
+ @return requested provider
+ */
+ public static Provider getProvider(String name)
+ {
+ Provider p = null;
+ for (int i = 0; i < providerCount; i++)
{
- // FIXME: need SecurityPermission.
- // sm.checkSecurityAccess ("setProperty." + key);
+ p = (Provider) providers.elementAt(i);
+ if (p.getName() == name)
+ break;
}
- props.setProperty (key, value);
+ return p;
+ }
+
+ /**
+ Gets the value of a security property.
+
+ This method checks the security manager with the call checkSecurityAccess
+ with "getProperty."+key to see if the user can get this property.
+
+ @param key property to get
+
+ @return value of the property
+
+ @throws SecurityException - if the security manager denies access to
+ getting a property
+ */
+ public static String getProperty(String key)
+ {
+ SecurityManager sm = System.getSecurityManager();
+ if (sm != null)
+ sm.checkSecurityAccess("getProperty." + key);
+
+ return secprops.getProperty(key);
}
- // The providers we list.
- private static Vector providers = new Vector ();
- // Security propertiesl
- private static Properties props = new Properties ();
+ /**
+ Sets the value of a security property.
+
+ This method checks the security manager with the call checkSecurityAccess
+ with "setProperty."+key to see if the user can get this property.
+
+ @param key property to set
+ @param datnum new value of property
+
+ @throws SecurityException - if the security manager denies access to
+ setting a property
+ */
+ public static void setProperty(String key, String datnum)
+ {
+ SecurityManager sm = System.getSecurityManager();
+ if (sm != null)
+ sm.checkSecurityAccess("setProperty." + key);
+
+ secprops.put(key, datnum);
+ }
}