aboutsummaryrefslogtreecommitdiff
path: root/libjava/java/security/AccessController.java
blob: c830fa4c3fab99b4a211256d0c368727cf438a0e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
/* AccessController.java --- Access control context and permission checker
   Copyright (C) 2001 Free Software Foundation, Inc.

This file is part of GNU Classpath.

GNU Classpath is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2, or (at your option)
any later version.

GNU Classpath is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
General Public License for more details.

You should have received a copy of the GNU General Public License
along with GNU Classpath; see the file COPYING.  If not, write to the
Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
02111-1307 USA.

As a special exception, if you link this library with other files to
produce an executable, this library does not by itself cause the
resulting executable to be covered by the GNU General Public License.
This exception does not however invalidate any other reasons why the
executable file might be covered by the GNU General Public License. */

package java.security;

/**
 * Access control context and permission checker.
 * Can check permissions in the access control context of the current thread
 * through the <code>checkPermission()</code> method.
 * Manipulates the access control context for code that needs to be executed
 * the protection domain of the calling class (by explicitly ignoring the
 * context of the calling code) in the <code>doPriviliged()</code> methods.
 * And provides a <code>getContext()</code> method which gives the access
 * control context of the current thread that can be used for checking
 * permissions at a later time and/or in another thread.
 * <p>
 * XXX - Mostly a stub implementation at the moment. Needs native support
 * from the VM to function correctly. XXX - Do not forget to think about
 * how to handle <code>java.lang.reflect.Method.invoke()</code> on the
 * <code>doPrivileged()</code> methods.
 *
 * @author Mark Wielaard (mark@klomp.org)
 * @since 1.2
 */
public final class AccessController
{
  /**
   * This class only has static methods so there is no public contructor.
   */
  private AccessController()
  {
  }

  /**
   * Checks wether the access control context of the current thread allows
   * the given Permission. Throws an <code>AccessControlException</code>
   * when the permission is not allowed in the current context. Otherwise
   * returns silently without throwing an exception.
   *
   * @param perm the permission to be checked.
   * @exception AccessControlException thrown if the current context does not
   * allow the given permission.
   */
  public static void checkPermission(Permission perm)
  {
    getContext().checkPermission(perm);
  }

  /**
   * Calls the <code>run()</code> method of the given action with as
   * (initial) access control context only the protection domain of the
   * calling class. Calls to <code>checkPermission()</code> in the
   * <code>run()</code> method ignore all earlier protection domains of
   * classes in the call chain. Note that the protection domains of classes
   * called by the code in the <code>run()</code> method are not ignored.
   *
   * @param action the <code>PrivilegedAction</code> whose <code>run()</code>
   * should be be called.
   * @returns the result of the <code>action.run()</code> method.
   */
  public static Object doPrivileged(PrivilegedAction action)
  {
    return action.run();
  }

  /**
   * Calls the <code>run()</code> method of the given action with as
   * (initial) access control context the given context combined with the
   * protection domain of the calling class. Calls to
   * <code>checkPermission()</code> in the <code>run()</code> method ignore
   * all earlier protection domains of classes in the call chain, but add
   * checks for the protection domains given in the supplied context.
   *
   * @param action the <code>PrivilegedAction</code> whose <code>run()</code>
   * should be be called.
   * @param context the <code>AccessControlContext</code> whose protection
   * domains should be added to the protection domain of the calling class.
   * @returns the result of the <code>action.run()</code> method.
   */
  public static Object doPrivileged(PrivilegedAction action,
				    AccessControlContext context)
  {
    return action.run();
  }

  /**
   * Calls the <code>run()</code> method of the given action with as
   * (initial) access control context only the protection domain of the
   * calling class. Calls to <code>checkPermission()</code> in the
   * <code>run()</code> method ignore all earlier protection domains of
   * classes in the call chain. Note that the protection domains of classes
   * called by the code in the <code>run()</code> method are not ignored.
   * If the <code>run()</code> method throws an exception then this method
   * will wrap that exception in an <code>PrivilegedActionException</code>.
   *
   * @param action the <code>PrivilegedExceptionAction</code> whose
   * <code>run()</code> should be be called.
   * @returns the result of the <code>action.run()</code> method.
   * @exception PriviligedActionException wrapped around any exception that
   * is thrown in the <code>run()</code> method.
   */
  public static Object doPrivileged(PrivilegedExceptionAction action)
    throws PrivilegedActionException
  {

    try
      {
	return action.run();
      }
    catch (Exception e)
      {
	throw new PrivilegedActionException(e);
      }
  }

  /**
   * Calls the <code>run()</code> method of the given action with as
   * (initial) access control context the given context combined with the
   * protection domain of the calling class. Calls to
   * <code>checkPermission()</code> in the <code>run()</code> method ignore
   * all earlier protection domains of classes in the call chain, but add
   * checks for the protection domains given in the supplied context.
   * If the <code>run()</code> method throws an exception then this method
   * will wrap that exception in an <code>PrivilegedActionException</code>.
   *
   * @param action the <code>PrivilegedExceptionAction</code> whose
   * <code>run()</code> should be be called.
   * @param context the <code>AccessControlContext</code> whose protection
   * domains should be added to the protection domain of the calling class.
   * @returns the result of the <code>action.run()</code> method.
   * @exception PriviligedActionException wrapped around any exception that
   * is thrown in the <code>run()</code> method.
   */
  public static Object doPrivileged(PrivilegedExceptionAction action,
				    AccessControlContext context)
    throws PrivilegedActionException
  {

    try
      {
	return action.run();
      }
    catch (Exception e)
      {
	throw new PrivilegedActionException(e);
      }
  }

  /**
   * Returns the complete access control context of the current thread.
   * <p>
   * XXX - Should this include all the protection domains in the call chain
   * or only the domains till the last <code>doPrivileged()</code> call?
   * <p>
   * XXX - needs native support. Currently returns an empty context.
   */
  public static AccessControlContext getContext()
  {
    // For now just return an new empty context
    return new AccessControlContext(new ProtectionDomain[0]);
  }
}
> (MessageDigest) Class.forName(classname).newInstance(); m.algorithm = algorithm; m.provider = provider; return m; } catch (ClassNotFoundException cnfe) { throw new NoSuchAlgorithmException(algorithm + ": Class not found."); } catch (InstantiationException ie) { throw new NoSuchAlgorithmException(algorithm + ": Class instantiation failed."); } catch (IllegalAccessException iae) { throw new NoSuchAlgorithmException(algorithm + ": Illegal Access"); } } /** Gets the provider that the MessageDigest is from. @return the provider the this MessageDigest */ public final Provider getProvider() { return provider; } /** Updates the digest with the byte. @param input byte to update the digest with */ public void update(byte input) { engineUpdate(input); } /** Updates the digest with the bytes from the array from the specified offset to the specified length. @param input bytes to update the digest with @param offset the offset to start at @param len length of the data to update with */ public void update(byte[]input, int offset, int len) { engineUpdate(input, offset, len); } /** Updates the digest with the bytes from the array. @param input bytes to update the digest with */ public void update(byte[]input) { engineUpdate(input, 0, input.length); } /** Computes the digest of the stored data. @return a byte array representing the message digest */ public byte[] digest() { return lastDigest = engineDigest(); } /** Computes the final digest of the stored bytes and returns them. @param buf An array of bytes to store the digest @param offset An offset to start storing the digest at @param len The length of the buffer @return Returns the length of the buffer */ public int digest(byte[]buf, int offset, int len) throws DigestException { return engineDigest(buf, offset, len); } /** Computes a final update using the input array of bytes, then computes a final digest and returns it. It calls update(input) and then digest(); @param buf An array of bytes to perform final update with @return a byte array representing the message digest */ public byte[] digest(byte[]input) { update(input); return digest(); } /** Returns a representation of the MessageDigest as a String. @return a string representing the message digest */ public String toString() { return (getClass()).getName() + " Message Digest <" + digestToString() + ">"; } /** Does a simple byte comparison of the two digests. @param digesta first digest to compare @param digestb second digest to compare @return true if they are equal, false otherwise */ public static boolean isEqual(byte[]digesta, byte[]digestb) { if (digesta.length != digestb.length) return false; for (int i = digesta.length - 1; i >= 0; --i) if (digesta[i] != digestb[i]) return false; return true; } /** Resets the message digest. */ public void reset() { engineReset(); } /** Gets the name of the algorithm currently used. The names of algorithms are usually SHA-1 or MD5. @return name of algorithm. */ public final String getAlgorithm() { return algorithm; } /** Gets the length of the message digest. The default is zero which means that this message digest does not implement this function. @return length of the message digest */ public final int getDigestLength() { return engineGetDigestLength(); } /** Returns a clone of this class if supported. If it does not then it throws CloneNotSupportedException. The cloning of this class depends on whether the subclass MessageDigestSpi implements Cloneable which contains the actual implementation of the appropriate algorithm. @return clone of this class @exception CloneNotSupportedException this class does not support cloning */ public Object clone() throws CloneNotSupportedException { if (this instanceof Cloneable) return super.clone(); else throw new CloneNotSupportedException(); } private String digestToString() { byte[] digest = lastDigest; if (digest == null) return "incomplete"; StringBuffer buf = new StringBuffer(); int len = digest.length; for (int i = 0; i < len; ++i) { byte b = digest[i]; byte high = (byte) ((b & 0xff) >>> 4); byte low = (byte) (b & 0xf); buf.append(high > 9 ? ('a' - 10) + high : '0' + high); buf.append(low > 9 ? ('a' - 10) + low : '0' + low); } return buf.toString(); } }