[multiple changes]
2004-09-21 Andreas Tobler <a.tobler@schweiz.ch> Import the big Crypto/Jessie/Security merge from Classpath. * Makefile.am: Add imported files. * Makefile.in: Regenerate. 2004-08-14 Casey Marshall <csm@gnu.org> The Big Crypto Merge of 2004. * javax/security/auth/x500/X500Principal.java: Replaced with GNU Crypto's version. Files imported from GNU Crypto. * javax/crypto/BadPaddingException.java * javax/crypto/Cipher.java * javax/crypto/CipherInputStream.java * javax/crypto/CipherOutputStream.java * javax/crypto/CipherSpi.java * javax/crypto/EncryptedPrivateKeyInfo.java * javax/crypto/ExemptionMechanism.java * javax/crypto/ExemptionMechanismException.java * javax/crypto/ExemptionMechanismSpi.java * javax/crypto/IllegalBlockSizeException.java * javax/crypto/KeyAgreement.java * javax/crypto/KeyAgreementSpi.java * javax/crypto/KeyGenerator.java * javax/crypto/KeyGeneratorSpi.java * javax/crypto/Mac.java * javax/crypto/MacSpi.java * javax/crypto/Makefile.am * javax/crypto/NoSuchPaddingException.java * javax/crypto/NullCipher.java * javax/crypto/NullCipherImpl.java * javax/crypto/SealedObject.java * javax/crypto/SecretKey.java * javax/crypto/SecretKeyFactory.java * javax/crypto/SecretKeyFactorySpi.java * javax/crypto/ShortBufferException.java * javax/crypto/interfaces/DHKey.java * javax/crypto/interfaces/DHPrivateKey.java * javax/crypto/interfaces/DHPublicKey.java * javax/crypto/interfaces/PBEKey.java * javax/crypto/spec/DESKeySpec.java * javax/crypto/spec/DESedeKeySpec.java * javax/crypto/spec/DHGenParameterSpec.java * javax/crypto/spec/DHParameterSpec.java * javax/crypto/spec/DHPrivateKeySpec.java * javax/crypto/spec/DHPublicKeySpec.java * javax/crypto/spec/IvParameterSpec.java * javax/crypto/spec/PBEKeySpec.java * javax/crypto/spec/PBEParameterSpec.java * javax/crypto/spec/RC2ParameterSpec.java * javax/crypto/spec/RC5ParameterSpec.java * javax/crypto/spec/SecretKeySpec.java * javax/security/auth/AuthPermission.java * javax/security/auth/DestroyFailedException.java * javax/security/auth/Destroyable.java * javax/security/auth/Policy.java * javax/security/auth/PrivateCredentialPermission.java * javax/security/auth/RefreshFailedException.java * javax/security/auth/Refreshable.java * javax/security/auth/Subject.java * javax/security/auth/SubjectDomainCombiner.java * javax/security/auth/callback/Callback.java * javax/security/auth/callback/CallbackHandler.java * javax/security/auth/callback/ChoiceCallback.java * javax/security/auth/callback/ConfirmationCallback.java * javax/security/auth/callback/LanguageCallback.java * javax/security/auth/callback/NameCallback.java * javax/security/auth/callback/PasswordCallback.java * javax/security/auth/callback/TextInputCallback.java * javax/security/auth/callback/TextOutputCallback.java * javax/security/auth/callback/UnsupportedCallbackException.java * javax/security/auth/login/AccountExpiredException.java * javax/security/auth/login/AppConfigurationEntry.java * javax/security/auth/login/Configuration.java * javax/security/auth/login/CredentialExpiredException.java * javax/security/auth/login/FailedLoginException.java * javax/security/auth/login/LoginContext.java * javax/security/auth/login/LoginException.java * javax/security/auth/login/NullConfiguration.java * javax/security/auth/x500/X500PrivateCredential.java * javax/security/sasl/AuthenticationException.java * javax/security/sasl/AuthorizeCallback.java * javax/security/sasl/RealmCallback.java * javax/security/sasl/RealmChoiceCallback.java * javax/security/sasl/Sasl.java * javax/security/sasl/SaslClient.java * javax/security/sasl/SaslClientFactory.java * javax/security/sasl/SaslException.java * javax/security/sasl/SaslServer.java * javax/security/sasl/SaslServerFactory.java * org/ietf/jgss/ChannelBinding.java * org/ietf/jgss/GSSContext.java * org/ietf/jgss/GSSCredential.java * org/ietf/jgss/GSSException.java * org/ietf/jgss/GSSManager.java * org/ietf/jgss/GSSName.java * org/ietf/jgss/MessageProp.java * org/ietf/jgss/Oid.java * org/ietf/jgss/MessagesBundle.properties Files imported from Jessie <http://www.nongnu.org/jessie/> * javax/net/ServerSocketFactory.java * javax/net/SocketFactory.java * javax/net/VanillaServerSocketFactory.java * javax/net/VanillaSocketFactory.java * javax/net/ssl/HandshakeCompletedEvent.java * javax/net/ssl/HandshakeCompletedListener.java * javax/net/ssl/HostnameVerifier.java * javax/net/ssl/HttpsURLConnection.java * javax/net/ssl/KeyManager.java * javax/net/ssl/KeyManagerFactory.java * javax/net/ssl/KeyManagerFactorySpi.java * javax/net/ssl/ManagerFactoryParameters.java * javax/net/ssl/SSLContext.java * javax/net/ssl/SSLContextSpi.java * javax/net/ssl/SSLException.java * javax/net/ssl/SSLHandshakeException.java * javax/net/ssl/SSLKeyException.java * javax/net/ssl/SSLPeerUnverifiedException.java * javax/net/ssl/SSLPermission.java * javax/net/ssl/SSLProtocolException.java * javax/net/ssl/SSLServerSocket.java * javax/net/ssl/SSLServerSocketFactory.java * javax/net/ssl/SSLSession.java * javax/net/ssl/SSLSessionBindingEvent.java * javax/net/ssl/SSLSessionBindingListener.java * javax/net/ssl/SSLSessionContext.java * javax/net/ssl/SSLSocket.java * javax/net/ssl/SSLSocketFactory.java * javax/net/ssl/TrivialHostnameVerifier.java * javax/net/ssl/TrustManager.java * javax/net/ssl/TrustManagerFactory.java * javax/net/ssl/TrustManagerFactorySpi.java * javax/net/ssl/X509KeyManager.java * javax/net/ssl/X509TrustManager.java * javax/security/cert/Certificate.java * javax/security/cert/CertificateEncodingException.java * javax/security/cert/CertificateException.java * javax/security/cert/CertificateExpiredException.java * javax/security/cert/CertificateNotYetValidException.java * javax/security/cert/CertificateParsingException.java * javax/security/cert/X509CertBridge.java * javax/security/cert/X509Certificate.java 2004-08-20 Casey Marshall <csm@gnu.org> * java/security/cert/X509CRLSelector.java: New file. * java/security/cert/X509CertSelector.java: New file. From-SVN: r87795
This commit is contained in:
parent
c93320c457
commit
6f5ce93bab
134 changed files with 25334 additions and 274 deletions
559
libjava/javax/security/auth/Subject.java
Normal file
559
libjava/javax/security/auth/Subject.java
Normal file
|
@ -0,0 +1,559 @@
|
|||
/* Subject.java -- a single entity in the system.
|
||||
Copyright (C) 2004 Free Software Foundation, Inc.
|
||||
|
||||
This file is part of GNU Classpath.
|
||||
|
||||
GNU Classpath is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2, or (at your option)
|
||||
any later version.
|
||||
|
||||
GNU Classpath is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with GNU Classpath; see the file COPYING. If not, write to the
|
||||
Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
||||
02111-1307 USA.
|
||||
|
||||
Linking this library statically or dynamically with other modules is
|
||||
making a combined work based on this library. Thus, the terms and
|
||||
conditions of the GNU General Public License cover the whole
|
||||
combination.
|
||||
|
||||
As a special exception, the copyright holders of this library give you
|
||||
permission to link this library with independent modules to produce an
|
||||
executable, regardless of the license terms of these independent
|
||||
modules, and to copy and distribute the resulting executable under
|
||||
terms of your choice, provided that you also meet, for each linked
|
||||
independent module, the terms and conditions of the license of that
|
||||
module. An independent module is a module which is not derived from
|
||||
or based on this library. If you modify this library, you may extend
|
||||
this exception to your version of the library, but you are not
|
||||
obligated to do so. If you do not wish to do so, delete this
|
||||
exception statement from your version. */
|
||||
|
||||
|
||||
package javax.security.auth;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.io.ObjectInputStream;
|
||||
import java.io.ObjectOutputStream;
|
||||
import java.io.Serializable;
|
||||
|
||||
import java.security.AccessControlContext;
|
||||
import java.security.AccessController;
|
||||
import java.security.DomainCombiner;
|
||||
import java.security.Principal;
|
||||
import java.security.PrivilegedAction;
|
||||
import java.security.PrivilegedActionException;
|
||||
import java.security.PrivilegedExceptionAction;
|
||||
|
||||
import java.util.AbstractSet;
|
||||
import java.util.Collection;
|
||||
import java.util.Collections;
|
||||
import java.util.HashSet;
|
||||
import java.util.Iterator;
|
||||
import java.util.LinkedList;
|
||||
import java.util.Set;
|
||||
|
||||
/**
|
||||
*
|
||||
*/
|
||||
public final class Subject implements Serializable
|
||||
{
|
||||
|
||||
// Fields.
|
||||
// -------------------------------------------------------------------------
|
||||
|
||||
private static final long serialVersionUID = -8308522755600156056L;
|
||||
|
||||
/**
|
||||
* @serial The set of principals. The type of this field is SecureSet, a
|
||||
* private inner class.
|
||||
*/
|
||||
private final Set principals;
|
||||
|
||||
/**
|
||||
* @serial The read-only flag.
|
||||
*/
|
||||
private boolean readOnly;
|
||||
|
||||
private transient final SecureSet pubCred;
|
||||
private transient final SecureSet privCred;
|
||||
|
||||
// Constructors.
|
||||
// -------------------------------------------------------------------------
|
||||
|
||||
public Subject()
|
||||
{
|
||||
principals = new SecureSet (this, SecureSet.PRINCIPALS);
|
||||
pubCred = new SecureSet (this, SecureSet.PUBLIC_CREDENTIALS);
|
||||
privCred = new SecureSet (this, SecureSet.PRIVATE_CREDENTIALS);
|
||||
readOnly = false;
|
||||
}
|
||||
|
||||
public Subject (final boolean readOnly, final Set principals,
|
||||
final Set pubCred, final Set privCred)
|
||||
{
|
||||
if (principals == null || pubCred == null || privCred == null)
|
||||
{
|
||||
throw new NullPointerException();
|
||||
}
|
||||
this.principals = new SecureSet (this, SecureSet.PRINCIPALS, principals);
|
||||
this.pubCred = new SecureSet (this, SecureSet.PUBLIC_CREDENTIALS, pubCred);
|
||||
this.privCred = new SecureSet (this, SecureSet.PRIVATE_CREDENTIALS, privCred);
|
||||
this.readOnly = readOnly;
|
||||
}
|
||||
|
||||
// Class methods.
|
||||
// -------------------------------------------------------------------------
|
||||
|
||||
/**
|
||||
* <p>Returns the subject associated with the given {@link
|
||||
* AccessControlContext}.</p>
|
||||
*
|
||||
* <p>All this method does is retrieve the Subject object from the supplied
|
||||
* context's {@link DomainCombiner}, if any, and if it is an instance of
|
||||
* a {@link SubjectDomainCombiner}.
|
||||
*
|
||||
* @param context The context to retrieve the subject from.
|
||||
* @return The subject assoctiated with the context, or <code>null</code>
|
||||
* if there is none.
|
||||
* @throws NullPointerException If <i>subject</i> is null.
|
||||
* @throws SecurityException If the caller does not have permission to get
|
||||
* the subject (<code>"getSubject"</code> target of {@link AuthPermission}.
|
||||
*/
|
||||
public static Subject getSubject (final AccessControlContext context)
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("getSubject"));
|
||||
}
|
||||
DomainCombiner dc = context.getDomainCombiner();
|
||||
if (!(dc instanceof SubjectDomainCombiner))
|
||||
{
|
||||
return null;
|
||||
}
|
||||
return ((SubjectDomainCombiner) dc).getSubject();
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Run a method as another subject. This method will obtain the current
|
||||
* {@link AccessControlContext} for this thread, then creates another with
|
||||
* a {@link SubjectDomainCombiner} with the given subject. The supplied
|
||||
* action will then be run with the modified context.</p>
|
||||
*
|
||||
* @param subject The subject to run as.
|
||||
* @param action The action to run.
|
||||
* @return The value returned by the privileged action.
|
||||
* @throws SecurityException If the caller is not allowed to run under a
|
||||
* different identity (<code>"doAs"</code> target of {@link AuthPermission}.
|
||||
*/
|
||||
public static Object doAs (final Subject subject, final PrivilegedAction action)
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("doAs"));
|
||||
}
|
||||
AccessControlContext context =
|
||||
new AccessControlContext (AccessController.getContext(),
|
||||
new SubjectDomainCombiner (subject));
|
||||
return AccessController.doPrivileged (action, context);
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Run a method as another subject. This method will obtain the current
|
||||
* {@link AccessControlContext} for this thread, then creates another with
|
||||
* a {@link SubjectDomainCombiner} with the given subject. The supplied
|
||||
* action will then be run with the modified context.</p>
|
||||
*
|
||||
* @param subject The subject to run as.
|
||||
* @param action The action to run.
|
||||
* @return The value returned by the privileged action.
|
||||
* @throws SecurityException If the caller is not allowed to run under a
|
||||
* different identity (<code>"doAs"</code> target of {@link AuthPermission}.
|
||||
* @throws PrivilegedActionException If the action throws an exception.
|
||||
*/
|
||||
public static Object doAs (final Subject subject,
|
||||
final PrivilegedExceptionAction action)
|
||||
throws PrivilegedActionException
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("doAs"));
|
||||
}
|
||||
AccessControlContext context =
|
||||
new AccessControlContext (AccessController.getContext(),
|
||||
new SubjectDomainCombiner(subject));
|
||||
return AccessController.doPrivileged (action, context);
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Run a method as another subject. This method will create a new
|
||||
* {@link AccessControlContext} derived from the given one, with a
|
||||
* {@link SubjectDomainCombiner} with the given subject. The supplied
|
||||
* action will then be run with the modified context.</p>
|
||||
*
|
||||
* @param subject The subject to run as.
|
||||
* @param action The action to run.
|
||||
* @param acc The context to use.
|
||||
* @return The value returned by the privileged action.
|
||||
* @throws SecurityException If the caller is not allowed to run under a
|
||||
* different identity (<code>"doAsPrivileged"</code> target of {@link
|
||||
* AuthPermission}.
|
||||
*/
|
||||
public static Object doAsPrivileged (final Subject subject,
|
||||
final PrivilegedAction action,
|
||||
final AccessControlContext acc)
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("doAsPrivileged"));
|
||||
}
|
||||
AccessControlContext context =
|
||||
new AccessControlContext (acc, new SubjectDomainCombiner (subject));
|
||||
return AccessController.doPrivileged (action, context);
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Run a method as another subject. This method will create a new
|
||||
* {@link AccessControlContext} derived from the given one, with a
|
||||
* {@link SubjectDomainCombiner} with the given subject. The supplied
|
||||
* action will then be run with the modified context.</p>
|
||||
*
|
||||
* @param subject The subject to run as.
|
||||
* @param action The action to run.
|
||||
* @param acc The context to use.
|
||||
* @return The value returned by the privileged action.
|
||||
* @throws SecurityException If the caller is not allowed to run under a
|
||||
* different identity (<code>"doAsPrivileged"</code> target of
|
||||
* {@link AuthPermission}.
|
||||
* @throws PrivilegedActionException If the action throws an exception.
|
||||
*/
|
||||
public static Object doAsPrivileged (final Subject subject,
|
||||
final PrivilegedExceptionAction action,
|
||||
final AccessControlContext acc)
|
||||
throws PrivilegedActionException
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("doAsPrivileged"));
|
||||
}
|
||||
AccessControlContext context =
|
||||
new AccessControlContext (acc, new SubjectDomainCombiner (subject));
|
||||
return AccessController.doPrivileged (action, context);
|
||||
}
|
||||
|
||||
// Instance methods.
|
||||
// -------------------------------------------------------------------------
|
||||
|
||||
public boolean equals (Object o)
|
||||
{
|
||||
if (!(o instanceof Subject))
|
||||
{
|
||||
return false;
|
||||
}
|
||||
Subject that = (Subject) o;
|
||||
return principals.containsAll (that.getPrincipals()) &&
|
||||
pubCred.containsAll (that.getPublicCredentials()) &&
|
||||
privCred.containsAll (that.getPrivateCredentials());
|
||||
}
|
||||
|
||||
public Set getPrincipals()
|
||||
{
|
||||
return principals;
|
||||
}
|
||||
|
||||
public Set getPrincipals(Class clazz)
|
||||
{
|
||||
HashSet result = new HashSet (principals.size());
|
||||
for (Iterator it = principals.iterator(); it.hasNext(); )
|
||||
{
|
||||
Object o = it.next();
|
||||
if (o != null && clazz.isAssignableFrom (o.getClass()))
|
||||
{
|
||||
result.add(o);
|
||||
}
|
||||
}
|
||||
return Collections.unmodifiableSet (result);
|
||||
}
|
||||
|
||||
public Set getPrivateCredentials()
|
||||
{
|
||||
return privCred;
|
||||
}
|
||||
|
||||
public Set getPrivateCredentials (Class clazz)
|
||||
{
|
||||
HashSet result = new HashSet (privCred.size());
|
||||
for (Iterator it = privCred.iterator(); it.hasNext(); )
|
||||
{
|
||||
Object o = it.next();
|
||||
if (o != null && clazz.isAssignableFrom (o.getClass()))
|
||||
{
|
||||
result.add(o);
|
||||
}
|
||||
}
|
||||
return Collections.unmodifiableSet (result);
|
||||
}
|
||||
|
||||
public Set getPublicCredentials()
|
||||
{
|
||||
return pubCred;
|
||||
}
|
||||
|
||||
public Set getPublicCredentials (Class clazz)
|
||||
{
|
||||
HashSet result = new HashSet (pubCred.size());
|
||||
for (Iterator it = pubCred.iterator(); it.hasNext(); )
|
||||
{
|
||||
Object o = it.next();
|
||||
if (o != null && clazz.isAssignableFrom (o.getClass()))
|
||||
{
|
||||
result.add(o);
|
||||
}
|
||||
}
|
||||
return Collections.unmodifiableSet (result);
|
||||
}
|
||||
|
||||
public int hashCode()
|
||||
{
|
||||
return principals.hashCode() + privCred.hashCode() + pubCred.hashCode();
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Returns whether or not this subject is read-only.</p>
|
||||
*
|
||||
* @return True is this subject is read-only.
|
||||
*/
|
||||
public boolean isReadOnly()
|
||||
{
|
||||
return readOnly;
|
||||
}
|
||||
|
||||
/**
|
||||
* <p>Marks this subject as read-only.</p>
|
||||
*
|
||||
* @throws SecurityException If the caller does not have permission to
|
||||
* set this subject as read-only (<code>"setReadOnly"</code> target of
|
||||
* {@link AuthPermission}.
|
||||
*/
|
||||
public void setReadOnly()
|
||||
{
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("setReadOnly"));
|
||||
}
|
||||
readOnly = true;
|
||||
}
|
||||
|
||||
public String toString()
|
||||
{
|
||||
return Subject.class.getName() + " [ principals=" + principals +
|
||||
", private credentials=" + privCred + ", public credentials=" +
|
||||
pubCred + ", read-only=" + readOnly + " ]";
|
||||
}
|
||||
|
||||
// Inner class.
|
||||
// -------------------------------------------------------------------------
|
||||
|
||||
/**
|
||||
* An undocumented inner class that is used for sets in the parent class.
|
||||
*/
|
||||
private static class SecureSet extends AbstractSet implements Serializable
|
||||
{
|
||||
|
||||
// Fields.
|
||||
// -----------------------------------------------------------------------
|
||||
|
||||
private static final long serialVersionUID = 7911754171111800359L;
|
||||
|
||||
static final int PRINCIPALS = 0;
|
||||
static final int PUBLIC_CREDENTIALS = 1;
|
||||
static final int PRIVATE_CREDENTIALS = 2;
|
||||
|
||||
private final Subject subject;
|
||||
private final LinkedList elements;
|
||||
private transient final int type;
|
||||
|
||||
// Constructors.
|
||||
// -----------------------------------------------------------------------
|
||||
|
||||
SecureSet (final Subject subject, final int type, final Collection elements)
|
||||
{
|
||||
this (subject, type);
|
||||
for (Iterator it = elements.iterator(); it.hasNext(); )
|
||||
{
|
||||
Object o = it.next();
|
||||
if (type == PRINCIPALS && !(o instanceof Principal))
|
||||
{
|
||||
throw new IllegalArgumentException(o+" is not a Principal");
|
||||
}
|
||||
if (!elements.contains (o))
|
||||
{
|
||||
elements.add (o);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
SecureSet (final Subject subject, final int type)
|
||||
{
|
||||
this.subject = subject;
|
||||
this.type = type;
|
||||
this.elements = new LinkedList();
|
||||
}
|
||||
|
||||
// Instance methods.
|
||||
// -----------------------------------------------------------------------
|
||||
|
||||
public synchronized int size()
|
||||
{
|
||||
return elements.size();
|
||||
}
|
||||
|
||||
public Iterator iterator()
|
||||
{
|
||||
return elements.iterator();
|
||||
}
|
||||
|
||||
public synchronized boolean add(Object element)
|
||||
{
|
||||
if (subject.isReadOnly())
|
||||
{
|
||||
throw new IllegalStateException ("subject is read-only");
|
||||
}
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
switch (type)
|
||||
{
|
||||
case PRINCIPALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPrincipals"));
|
||||
}
|
||||
if (!(element instanceof Principal))
|
||||
{
|
||||
throw new IllegalArgumentException ("element is not a Principal");
|
||||
}
|
||||
break;
|
||||
|
||||
case PUBLIC_CREDENTIALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPublicCredentials"));
|
||||
}
|
||||
break;
|
||||
|
||||
case PRIVATE_CREDENTIALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPrivateCredentials"));
|
||||
}
|
||||
break;
|
||||
|
||||
default:
|
||||
throw new Error ("this statement should be unreachable");
|
||||
}
|
||||
|
||||
if (elements.contains (element))
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
return elements.add (element);
|
||||
}
|
||||
|
||||
public synchronized boolean remove (final Object element)
|
||||
{
|
||||
if (subject.isReadOnly())
|
||||
{
|
||||
throw new IllegalStateException ("subject is read-only");
|
||||
}
|
||||
final SecurityManager sm = System.getSecurityManager();
|
||||
switch (type)
|
||||
{
|
||||
case PRINCIPALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPrincipals"));
|
||||
}
|
||||
if (!(element instanceof Principal))
|
||||
{
|
||||
throw new IllegalArgumentException ("element is not a Principal");
|
||||
}
|
||||
break;
|
||||
|
||||
case PUBLIC_CREDENTIALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPublicCredentials"));
|
||||
}
|
||||
break;
|
||||
|
||||
case PRIVATE_CREDENTIALS:
|
||||
if (sm != null)
|
||||
{
|
||||
sm.checkPermission (new AuthPermission ("modifyPrivateCredentials"));
|
||||
}
|
||||
break;
|
||||
|
||||
default:
|
||||
throw new Error("this statement should be unreachable");
|
||||
}
|
||||
|
||||
return elements.remove(element);
|
||||
}
|
||||
|
||||
public synchronized boolean contains (final Object element)
|
||||
{
|
||||
return elements.remove (element);
|
||||
}
|
||||
|
||||
public boolean removeAll (final Collection c)
|
||||
{
|
||||
if (subject.isReadOnly())
|
||||
{
|
||||
throw new IllegalStateException ("subject is read-only");
|
||||
}
|
||||
return super.removeAll (c);
|
||||
}
|
||||
|
||||
public boolean retainAll (final Collection c)
|
||||
{
|
||||
if (subject.isReadOnly())
|
||||
{
|
||||
throw new IllegalStateException ("subject is read-only");
|
||||
}
|
||||
return super.retainAll (c);
|
||||
}
|
||||
|
||||
public void clear()
|
||||
{
|
||||
if (subject.isReadOnly())
|
||||
{
|
||||
throw new IllegalStateException ("subject is read-only");
|
||||
}
|
||||
elements.clear();
|
||||
}
|
||||
|
||||
private synchronized void writeObject (ObjectOutputStream out)
|
||||
throws IOException
|
||||
{
|
||||
throw new UnsupportedOperationException ("FIXME: determine serialization");
|
||||
}
|
||||
|
||||
private void readObject (ObjectInputStream in)
|
||||
throws ClassNotFoundException, IOException
|
||||
{
|
||||
throw new UnsupportedOperationException ("FIXME: determine serialization");
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue