/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/**
* <p>This class centralizes all security properties and common security
* methods. One of its primary uses is to manage providers.
*
* @author Benjamin Renaud
*/
public final class Security {
/* Are we debugging? -- for developers */
/* The java.security properties */
// An element in the cache
private static class ProviderProperty {
}
static {
// doPrivileged here because there are multiple
// things in initialize that might require privs.
// (the FileInputStream call and the File.exists call,
// the securityPropFile call, etc)
initialize();
return null;
}
});
}
private static void initialize() {
props = new Properties();
boolean loadedProps = false;
boolean overrideAll = false;
// first load the system properties file
// to determine the value of security.overridePropertiesFile
try {
loadedProps = true;
propFile);
}
} catch (IOException e) {
propFile);
e.printStackTrace();
}
} finally {
try {
} catch (IOException ioe) {
}
}
}
}
}
("security.overridePropertiesFile"))) {
overrideAll = true;
}
if (overrideAll) {
props = new Properties();
("overriding other security properties files!");
}
}
// now load the user-specified file so its values
// will win if they conflict with the earlier values
if (extraPropFile != null) {
try {
} else {
}
loadedProps = true;
propURL);
if (overrideAll) {
("overriding other security properties files!");
}
}
} catch (Exception e) {
("unable to load security properties from " +
e.printStackTrace();
}
} finally {
try {
} catch (IOException ioe) {
}
}
}
}
}
}
if (!loadedProps) {
"-- using defaults");
}
}
}
/*
* Initialize to default values, if <java.home>/lib/java.security
* is not found.
*/
private static void initializeStatic() {
}
/**
* Don't let anyone instantiate this.
*/
private Security() {
}
// maybe check for a system property which will specify where to
// look. Someday.
}
/**
* Looks up providers, and returns the property (and its associated
* provider) mapping the key, if any.
* The order in which the providers are looked up is the
* provider-preference order, as specificed in the security
* properties file.
*/
// Is there a match if we do a case-insensitive property name
// comparison? Let's try ...
break;
}
}
}
return newEntry;
}
}
return entry;
}
/**
* Returns the property (if any) mapping the key for the given provider.
*/
// Is there a match if we do a case-insensitive property name
// comparison? Let's try ...
break;
}
}
}
return prop;
}
/**
* Gets a specified property for an algorithm. The algorithm name
* should be a standard name. See the <a href=
* "{@docRoot}/../technotes/guides/security/StandardNames.html">
* Java Cryptography Architecture Standard Algorithm Name Documentation</a>
* for information about standard algorithm names.
*
* One possible use is by specialized algorithm parsers, which may map
* classes to algorithms which they understand (much like Key parsers
* do).
*
* @param algName the algorithm name.
*
* @param propName the name of the property to get.
*
* @return the value of the specified property.
*
* @deprecated This method used to return the value of a proprietary
* property in the master file of the "SUN" Cryptographic Service
* Provider in order to determine how to parse algorithm-specific
* parameters. Use the new provider-based and algorithm-independent
* <code>AlgorithmParameters</code> and <code>KeyFactory</code> engine
* classes (introduced in the J2SE version 1.2 platform) instead.
*/
+ "." + algName);
} else {
return null;
}
}
/**
* Adds a new provider, at a specified position. The position is
* the preference order in which providers are searched for
* requested algorithms. The position is 1-based, that is,
* 1 is most preferred, followed by 2, and so on.
*
* <p>If the given provider is installed at the requested position,
* the provider that used to be at that position, and all providers
* with a position greater than <code>position</code>, are shifted up
* one position (towards the end of the list of installed providers).
*
* <p>A provider cannot be added if it is already installed.
*
* <p>First, if there is a security manager, its
* <code>checkSecurityAccess</code>
* method is called with the string
* <code>"insertProvider."+provider.getName()</code>
* to see if it's ok to add a new provider.
* If the default implementation of <code>checkSecurityAccess</code>
* is used (i.e., that method is not overriden), then this will result in
* a call to the security manager's <code>checkPermission</code> method
* with a
* <code>SecurityPermission("insertProvider."+provider.getName())</code>
* permission.
*
* @param provider the provider to be added.
*
* @param position the preference position that the caller would
* like for this provider.
*
* @return the actual preference position in which the provider was
* added, or -1 if the provider was not added because it is
* already installed.
*
* @throws NullPointerException if provider is null
* @throws SecurityException
* if a security manager exists and its <code>{@link
* java.lang.SecurityManager#checkSecurityAccess}</code> method
* denies access to add a new provider
*
* @see #getProvider
* @see #removeProvider
* @see java.security.SecurityPermission
*/
int position) {
return -1;
}
}
/**
* Adds a provider to the next position available.
*
* <p>First, if there is a security manager, its
* <code>checkSecurityAccess</code>
* method is called with the string
* <code>"insertProvider."+provider.getName()</code>
* to see if it's ok to add a new provider.
* If the default implementation of <code>checkSecurityAccess</code>
* is used (i.e., that method is not overriden), then this will result in
* a call to the security manager's <code>checkPermission</code> method
* with a
* <code>SecurityPermission("insertProvider."+provider.getName())</code>
* permission.
*
* @param provider the provider to be added.
*
* @return the preference position in which the provider was
* added, or -1 if the provider was not added because it is
* already installed.
*
* @throws NullPointerException if provider is null
* @throws SecurityException
* if a security manager exists and its <code>{@link
* java.lang.SecurityManager#checkSecurityAccess}</code> method
* denies access to add a new provider
*
* @see #getProvider
* @see #removeProvider
* @see java.security.SecurityPermission
*/
/*
* We can't assign a position here because the statically
* registered providers may not have been installed yet.
* insertProviderAt() will fix that value after it has
* loaded the static providers.
*/
}
/**
* Removes the provider with the specified name.
*
* <p>When the specified provider is removed, all providers located
* at a position greater than where the specified provider was are shifted
* down one position (towards the head of the list of installed
* providers).
*
* <p>This method returns silently if the provider is not installed or
* if name is null.
*
* <p>First, if there is a security manager, its
* <code>checkSecurityAccess</code>
* method is called with the string <code>"removeProvider."+name</code>
* to see if it's ok to remove the provider.
* If the default implementation of <code>checkSecurityAccess</code>
* is used (i.e., that method is not overriden), then this will result in
* a call to the security manager's <code>checkPermission</code> method
* with a <code>SecurityPermission("removeProvider."+name)</code>
* permission.
*
* @param name the name of the provider to remove.
*
* @throws SecurityException
* if a security manager exists and its <code>{@link
* java.lang.SecurityManager#checkSecurityAccess}</code> method
* denies
* access to remove the provider
*
* @see #getProvider
* @see #addProvider
*/
}
/**
* Returns an array containing all the installed providers. The order of
* the providers in the array is their preference order.
*
* @return an array of all the installed providers.
*/
}
/**
* Returns the provider installed with the specified name, if
* any. Returns null if no provider with the specified name is
* installed or if name is null.
*
* @param name the name of the provider to get.
*
* @return the provider of the specified name.
*
* @see #removeProvider
* @see #addProvider
*/
}
/**
* Returns an array containing all installed providers that satisfy the
* specified selection criterion, or null if no such providers have been
* installed. The returned providers are ordered
* according to their <a href=
* "#insertProviderAt(java.security.Provider, int)">preference order</a>.
*
* <p> A cryptographic service is always associated with a particular
* algorithm or type. For example, a digital signature service is
* always associated with a particular algorithm (e.g., DSA),
* and a CertificateFactory service is always associated with
* a particular certificate type (e.g., X.509).
*
* <p>The selection criterion must be specified in one of the following two
* formats:
* <ul>
* <li> <i><crypto_service>.<algorithm_or_type></i> <p> The
* cryptographic service name must not contain any dots.
* <p> A
* provider satisfies the specified selection criterion iff the provider
* implements the
* specified algorithm or type for the specified cryptographic service.
* <p> For example, "CertificateFactory.X.509"
* would be satisfied by any provider that supplied
* a CertificateFactory implementation for X.509 certificates.
* <li> <i><crypto_service>.<algorithm_or_type>
* <attribute_name>:< attribute_value></i>
* <p> The cryptographic service name must not contain any dots. There
* must be one or more space charaters between the
* <i><algorithm_or_type></i> and the <i><attribute_name></i>.
* <p> A provider satisfies this selection criterion iff the
* provider implements the specified algorithm or type for the specified
* cryptographic service and its implementation meets the
* <p> For example, "Signature.SHA1withDSA KeySize:1024" would be
* satisfied by any provider that implemented
* the SHA1withDSA signature algorithm with a keysize of 1024 (or larger).
*
* </ul>
*
* <p> See the <a href=
* "{@docRoot}/../technotes/guides/security/StandardNames.html">
* Java Cryptography Architecture Standard Algorithm Name Documentation</a>
* for information about standard cryptographic service names, standard
* algorithm names and standard attribute names.
*
* @param filter the criterion for selecting
* providers. The filter is case-insensitive.
*
* @return all the installed providers that satisfy the selection
* criterion, or null if no such providers have been installed.
*
* @throws InvalidParameterException
* if the filter is not in the required format
* @throws NullPointerException if filter is null
*
* @see #getProviders(java.util.Map)
* @since 1.3
*/
if (index == -1) {
value = "";
} else {
}
return (getProviders(hashtableFilter));
}
/**
* Returns an array containing all installed providers that satisfy the
* specified* selection criteria, or null if no such providers have been
* installed. The returned providers are ordered
* according to their <a href=
* "#insertProviderAt(java.security.Provider, int)">preference order</a>.
*
* <p>The selection criteria are represented by a map.
* Each map entry represents a selection criterion.
* A provider is selected iff it satisfies all selection
* criteria. The key for any entry in such a map must be in one of the
* following two formats:
* <ul>
* <li> <i><crypto_service>.<algorithm_or_type></i>
* <p> The cryptographic service name must not contain any dots.
* <p> The value associated with the key must be an empty string.
* <p> A provider
* satisfies this selection criterion iff the provider implements the
* specified algorithm or type for the specified cryptographic service.
* <li> <i><crypto_service>.<algorithm_or_type> <attribute_name></i>
* <p> The cryptographic service name must not contain any dots. There
* must be one or more space charaters between the <i><algorithm_or_type></i>
* and the <i><attribute_name></i>.
* <p> The value associated with the key must be a non-empty string.
* A provider satisfies this selection criterion iff the
* provider implements the specified algorithm or type for the specified
* cryptographic service and its implementation meets the
* </ul>
*
* <p> See the <a href=
* "../../../technotes/guides/security/StandardNames.html">
* Java Cryptography Architecture Standard Algorithm Name Documentation</a>
* for information about standard cryptographic service names, standard
* algorithm names and standard attribute names.
*
* @param filter the criteria for selecting
* providers. The filter is case-insensitive.
*
* @return all the installed providers that satisfy the selection
* criteria, or null if no such providers have been installed.
*
* @throws InvalidParameterException
* if the filter is not in the required format
* @throws NullPointerException if filter is null
*
* @see #getProviders(java.lang.String)
* @since 1.3
*/
// Get all installed providers first.
// Then only return those providers who satisfy the selection criteria.
// Returns all installed providers
// if the selection criteria is null.
return allProviders;
}
boolean firstSearch = true;
// For each selection criterion, remove providers
// which don't satisfy the criterion from the candidate set.
if (firstSearch) {
firstSearch = false;
}
// For each provider in the candidates set, if it
// isn't in the newCandidate set, we should remove
// it from the candidate set.
}
}
} else {
candidates = null;
break;
}
}
return null;
}
return result;
}
// Map containing cached Spi Class objects of the specified type
/**
* Return the Class object for the given engine type
* (e.g. "MessageDigest"). Works for Spis in the java.security package
* only.
*/
return clazz;
}
try {
return clazz;
} catch (ClassNotFoundException e) {
throw new AssertionError("Spi class not found", e);
}
}
/*
* Returns an array of objects: the first object in the array is
* an instance of an implementation of the requested algorithm
* and type, and the second object in the array identifies the provider
* of that implementation.
* The <code>provider</code> argument can be null, in which case all
* configured providers will be searched in order of preference.
*/
return GetInstance.getInstance
} else {
return GetInstance.getInstance
}
}
return GetInstance.getInstance
} else {
return GetInstance.getInstance
}
}
/*
* Returns an array of objects: the first object in the array is
* an instance of an implementation of the requested algorithm
* and type, and the second object in the array identifies the provider
* of that implementation.
* The <code>provider</code> argument cannot be null.
*/
throws NoSuchAlgorithmException {
return GetInstance.getInstance
}
return GetInstance.getInstance
}
/**
* Gets a security property value.
*
* <p>First, if there is a security manager, its
* <code>checkPermission</code> method is called with a
* <code>java.security.SecurityPermission("getProperty."+key)</code>
* permission to see if it's ok to retrieve the specified
* security property value..
*
* @param key the key of the property being retrieved.
*
* @return the value of the security property corresponding to key.
*
* @throws SecurityException
* if a security manager exists and its <code>{@link
* java.lang.SecurityManager#checkPermission}</code> method
* denies
* access to retrieve the specified security property value
* @throws NullPointerException is key is null
*
* @see #setProperty
* @see java.security.SecurityPermission
*/
key));
}
return name;
}
/**
* Sets a security property value.
*
* <p>First, if there is a security manager, its
* <code>checkPermission</code> method is called with a
* <code>java.security.SecurityPermission("setProperty."+key)</code>
* permission to see if it's ok to set the specified
* security property value.
*
* @param key the name of the property to be set.
*
* @param datum the value of the property to be set.
*
* @throws SecurityException
* if a security manager exists and its <code>{@link
* java.lang.SecurityManager#checkPermission}</code> method
* denies access to set the specified security property value
* @throws NullPointerException if key or datum is null
*
* @see #getProperty
* @see java.security.SecurityPermission
*/
}
/*
* Implementation detail: If the property we just set in
* setProperty() was either "package.access" or
* "package.definition", we need to signal to the SecurityManager
* class that the value has just changed, and that it should
* invalidate it's local cache values.
*
* Rather than create a new API entry for this function,
* we use reflection to set a private variable.
*/
try {
/* Get the class via the bootstrap class loader. */
"java.lang.SecurityManager", false, null);
boolean accessible = false;
if (pa) {
accessible = f.isAccessible();
f.setAccessible(true);
} else {
accessible = f.isAccessible();
f.setAccessible(true);
}
f.setBoolean(f, false);
}
/* If we couldn't get the class, it hasn't
* been loaded yet. If there is no such
* field, we shouldn't try to set it. There
* shouldn't be a security execption, as we
* are loaded by boot class loader, and we
* are inside a doPrivileged() here.
*
* NOOP: don't do anything...
*/
}
return null;
} /* run */
}); /* PrivilegedAction */
} /* if */
}
}
}
/*
* Returns all providers who satisfy the specified
* criterion.
*/
Provider[] allProviders) {
// The first component is the service name.
// The second is the algorithm name.
// If the third isn't null, that is the attrinute name.
}
Provider[] allProviders) {
attrName, filterValue)) {
}
}
return candidates;
}
/*
* Returns true if the given provider satisfies
* the selection criterion key:value.
*/
}
// Check whether the provider has a property
// whose key is the same as the given key.
// Check whether we have an alias instead
// of a standard name in the key.
serviceName + "." +
prov);
if (standardName != null) {
}
}
// The provider doesn't have the given
// key in its property list.
return false;
}
}
// If the key is in the format of:
// <crypto_service>.<algorithm_or_type>,
// there is no need to check the value.
return true;
}
// If we get here, the key must be in the
// format of <crypto_service>.<algorithm_or_provider> <attribute_name>.
if (isStandardAttr(attrName)) {
} else {
}
}
/*
* Returns true if the attribute is a standard attribute;
* otherwise, returns false.
*/
// For now, we just have two standard attributes:
// KeySize and ImplementedIn.
return true;
return true;
return false;
}
/*
* Returns true if the requested attribute value is supported;
* otherwise, returns false.
*/
// For KeySize, prop is the max key size the
// provider supports for a specific <crypto_service>.<algorithm>.
if (requestedSize <= maxSize) {
return true;
} else {
return false;
}
}
// For Type, prop is the type of the implementation
// for a specific <crypto service>.<algorithm>.
}
return false;
}
if (algIndex < 0) {
// There must be a dot in the filter, and the dot
// shouldn't be at the beginning of this string.
throw new InvalidParameterException("Invalid filter");
}
// The filterValue is an empty string. So the filterKey
// should be in the format of <crypto_service>.<algorithm_or_type>.
// There must be a algorithm or type name.
throw new InvalidParameterException("Invalid filter");
}
} else {
// The filterValue is a non-empty string. So the filterKey must be
// in the format of
// <crypto_service>.<algorithm_or_type> <attribute_name>
if (attrIndex == -1) {
// There is no attribute name in the filter.
throw new InvalidParameterException("Invalid filter");
} else {
// There is no attribute name in the filter.
throw new InvalidParameterException("Invalid filter");
}
}
// There must be an algorithm name in the filter.
throw new InvalidParameterException("Invalid filter");
} else {
}
}
return result;
}
/**
* Returns a Set of Strings containing the names of all available
* algorithms or types for the specified Java cryptographic service
* (e.g., Signature, MessageDigest, Cipher, Mac, KeyStore). Returns
* an empty Set if there is no provider that supports the
* specified service or if serviceName is null. For a complete list
* of Java cryptographic services, please see the
* <a href="../../../technotes/guides/security/crypto/CryptoSpec.html">Java
* Cryptography Architecture API Specification & Reference</a>.
* Note: the returned set is immutable.
*
* @param serviceName the name of the Java cryptographic
* service (e.g., Signature, MessageDigest, Cipher, Mac, KeyStore).
* Note: this parameter is case-insensitive.
*
* @return a Set of Strings containing the names of all available
* algorithms or types for the specified Java cryptographic service
* or an empty set if no provider supports the specified service.
*
* @since 1.4
**/
return Collections.EMPTY_SET;
}
// Check the keys for each provider.
e.hasMoreElements(); ) {
// We should skip the currentKey if it contains a
// whitespace. The reason is: such an entry in the
// provider property contains attributes for the
// implementation of an algorithm. We are only interested
// in entries which lead to the implementation
// classes.
}
}
}
}
}
}