jdk/src/share/classes/javax/security/auth/Subject.java
author mullan
Mon, 18 Aug 2014 08:45:08 -0400
changeset 25989 6a57ce3f21f1
parent 25188 e680ab7f208e
permissions -rw-r--r--
7026255: Methods of Subject that throw SecurityException do not specify what permissions are required Reviewed-by: xuelei
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
     2
 * Copyright (c) 1998, 2014, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package javax.security.auth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.util.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.lang.reflect.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.text.MessageFormat;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.security.AccessController;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.security.AccessControlContext;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.DomainCombiner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.Permission;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
import java.security.PermissionCollection;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.Principal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.security.PrivilegedAction;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.security.PrivilegedExceptionAction;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import java.security.PrivilegedActionException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.security.ProtectionDomain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import sun.security.util.ResourcesMgr;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
/**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    45
 * <p> A {@code Subject} represents a grouping of related information
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
 * for a single entity, such as a person.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
 * Such information includes the Subject's identities as well as
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
 * its security-related attributes
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 * (passwords and cryptographic keys, for example).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 * <p> Subjects may potentially have multiple identities.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    52
 * Each identity is represented as a {@code Principal}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    53
 * within the {@code Subject}.  Principals simply bind names to a
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    54
 * {@code Subject}.  For example, a {@code Subject} that happens
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
 * to be a person, Alice, might have two Principals:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
 * one which binds "Alice Bar", the name on her driver license,
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    57
 * to the {@code Subject}, and another which binds,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
 * "999-99-9999", the number on her student identification card,
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    59
 * to the {@code Subject}.  Both Principals refer to the same
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    60
 * {@code Subject} even though each has a different name.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    62
 * <p> A {@code Subject} may also own security-related attributes,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
 * which are referred to as credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 * Sensitive credentials that require special protection, such as
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 * private cryptographic keys, are stored within a private credential
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    66
 * {@code Set}.  Credentials intended to be shared, such as
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
 * public key certificates or Kerberos server tickets are stored
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    68
 * within a public credential {@code Set}.  Different permissions
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
 * are required to access and modify the different credential Sets.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    71
 * <p> To retrieve all the Principals associated with a {@code Subject},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    72
 * invoke the {@code getPrincipals} method.  To retrieve
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    73
 * all the public or private credentials belonging to a {@code Subject},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    74
 * invoke the {@code getPublicCredentials} method or
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    75
 * {@code getPrivateCredentials} method, respectively.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    76
 * To modify the returned {@code Set} of Principals and credentials,
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    77
 * use the methods defined in the {@code Set} class.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
 * For example:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
 * <pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
 *      Subject subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
 *      Principal principal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
 *      Object credential;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
 *      // add a Principal and credential to the Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
 *      subject.getPrincipals().add(principal);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
 *      subject.getPublicCredentials().add(credential);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
 * </pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    89
 * <p> This {@code Subject} class implements {@code Serializable}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    90
 * While the Principals associated with the {@code Subject} are serialized,
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    91
 * the credentials associated with the {@code Subject} are not.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    92
 * Note that the {@code java.security.Principal} class
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    93
 * does not implement {@code Serializable}.  Therefore all concrete
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    94
 * {@code Principal} implementations associated with Subjects
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    95
 * must implement {@code Serializable}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
 * @see java.security.Principal
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
 * @see java.security.DomainCombiner
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
public final class Subject implements java.io.Serializable {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
    private static final long serialVersionUID = -8308522755600156056L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   105
     * A {@code Set} that provides a view of all of this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
     * Subject's Principals
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
     * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
     * @serial Each element in this set is a
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   111
     *          {@code java.security.Principal}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   112
     *          The set is a {@code Subject.SecureSet}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
    Set<Principal> principals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
     * Sets that provide a view of all of this
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
     * Subject's Credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
    transient Set<Object> pubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
    transient Set<Object> privCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
     * Whether this Subject is read-only
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
     * @serial
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
    private volatile boolean readOnly = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
    private static final int PRINCIPAL_SET = 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
    private static final int PUB_CREDENTIAL_SET = 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
    private static final int PRIV_CREDENTIAL_SET = 3;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
    private static final ProtectionDomain[] NULL_PD_ARRAY
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
        = new ProtectionDomain[0];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   138
     * Create an instance of a {@code Subject}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   139
     * with an empty {@code Set} of Principals and empty
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
     * Sets of public and private credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   142
     * <p> The newly constructed Sets check whether this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
     * has been set read-only before permitting subsequent modifications.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
     * The newly created Sets also prevent illegal modifications
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   145
     * by ensuring that callers have sufficient permissions.  These Sets
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   146
     * also prohibit null elements, and attempts to add or query a null
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   147
     * element will result in a {@code NullPointerException}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
     * <p> To modify the Principals Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   150
     * {@code AuthPermission("modifyPrincipals")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
     * To modify the public credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   152
     * {@code AuthPermission("modifyPublicCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
     * To modify the private credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   154
     * {@code AuthPermission("modifyPrivateCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    public Subject() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
        this.principals = Collections.synchronizedSet
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
                        (new SecureSet<Principal>(this, PRINCIPAL_SET));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
        this.pubCredentials = Collections.synchronizedSet
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
                        (new SecureSet<Object>(this, PUB_CREDENTIAL_SET));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
        this.privCredentials = Collections.synchronizedSet
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
                        (new SecureSet<Object>(this, PRIV_CREDENTIAL_SET));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   167
     * Create an instance of a {@code Subject} with
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
     * Principals and credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
     * <p> The Principals and credentials from the specified Sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
     * are copied into newly constructed Sets.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   172
     * These newly created Sets check whether this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
     * has been set read-only before permitting subsequent modifications.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * The newly created Sets also prevent illegal modifications
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   175
     * by ensuring that callers have sufficient permissions.  These Sets
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   176
     * also prohibit null elements, and attempts to add or query a null
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   177
     * element will result in a {@code NullPointerException}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
     * <p> To modify the Principals Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   180
     * {@code AuthPermission("modifyPrincipals")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
     * To modify the public credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   182
     * {@code AuthPermission("modifyPublicCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
     * To modify the private credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   184
     * {@code AuthPermission("modifyPrivateCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   186
     * @param readOnly true if the {@code Subject} is to be read-only,
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   187
     *          and false otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   189
     * @param principals the {@code Set} of Principals
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   190
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   192
     * @param pubCredentials the {@code Set} of public credentials
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   193
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   195
     * @param privCredentials the {@code Set} of private credentials
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   196
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   198
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   199
     *          {@code principals}, {@code pubCredentials},
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   200
     *          or {@code privCredentials} are {@code null},
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   201
     *          or a null value exists within any of these three
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   202
     *          Sets.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
    public Subject(boolean readOnly, Set<? extends Principal> principals,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
                   Set<?> pubCredentials, Set<?> privCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
    {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   207
        collectionNullClean(principals);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   208
        collectionNullClean(pubCredentials);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   209
        collectionNullClean(privCredentials);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
        this.principals = Collections.synchronizedSet(new SecureSet<Principal>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
                                (this, PRINCIPAL_SET, principals));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
        this.pubCredentials = Collections.synchronizedSet(new SecureSet<Object>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
                                (this, PUB_CREDENTIAL_SET, pubCredentials));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
        this.privCredentials = Collections.synchronizedSet(new SecureSet<Object>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
                                (this, PRIV_CREDENTIAL_SET, privCredentials));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
        this.readOnly = readOnly;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   221
     * Set this {@code Subject} to be read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
     * <p> Modifications (additions and removals) to this Subject's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   224
     * {@code Principal} {@code Set} and
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
     * credential Sets will be disallowed.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   226
     * The {@code destroy} operation on this Subject's credentials will
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
     * still be permitted.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   229
     * <p> Subsequent attempts to modify the Subject's {@code Principal}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
     * and credential Sets will result in an
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   231
     * {@code IllegalStateException} being thrown.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   232
     * Also, once a {@code Subject} is read-only,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
     * it can not be reset to being writable again.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   235
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   236
     *         caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   237
     *         {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   238
     *         AuthPermission("setReadOnly")} permission to set this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   239
     *         {@code Subject} to be read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
    public void setReadOnly() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   244
            sm.checkPermission(AuthPermissionHolder.SET_READ_ONLY_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
        this.readOnly = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   251
     * Query whether this {@code Subject} is read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   253
     * @return true if this {@code Subject} is read-only, false otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
    public boolean isReadOnly() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
        return this.readOnly;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   260
     * Get the {@code Subject} associated with the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   261
     * {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   263
     * <p> The {@code AccessControlContext} may contain many
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   264
     * Subjects (from nested {@code doAs} calls).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   265
     * In this situation, the most recent {@code Subject} associated
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   266
     * with the {@code AccessControlContext} is returned.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   268
     * @param  acc the {@code AccessControlContext} from which to retrieve
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   269
     *          the {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   271
     * @return  the {@code Subject} associated with the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   272
     *          {@code AccessControlContext}, or {@code null}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   273
     *          if no {@code Subject} is associated
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   274
     *          with the provided {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   276
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   277
     *          caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   278
     *          {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   279
     *          AuthPermission("getSubject")} permission to get the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   280
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   282
     * @throws NullPointerException if the provided
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   283
     *          {@code AccessControlContext} is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
    public static Subject getSubject(final AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   289
            sm.checkPermission(AuthPermissionHolder.GET_SUBJECT_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   292
        Objects.requireNonNull(acc, ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   293
                ("invalid.null.AccessControlContext.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
        // return the Subject from the DomainCombiner of the provided context
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
        return AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
            (new java.security.PrivilegedAction<Subject>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
            public Subject run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
                DomainCombiner dc = acc.getDomainCombiner();
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   300
                if (!(dc instanceof SubjectDomainCombiner)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
                    return null;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   302
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
                SubjectDomainCombiner sdc = (SubjectDomainCombiner)dc;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
                return sdc.getSubject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   310
     * Perform work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
     * <p> This method first retrieves the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   313
     * {@code AccessControlContext} via
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   314
     * {@code AccessController.getContext},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   315
     * and then instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
     * using the retrieved context along with a new
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   317
     * {@code SubjectDomainCombiner} (constructed using
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   318
     * the provided {@code Subject}).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   319
     * Finally, this method invokes {@code AccessController.doPrivileged},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   320
     * passing it the provided {@code PrivilegedAction},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   321
     * as well as the newly constructed {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   323
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   324
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   325
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   327
     * @param <T> the type of the value returned by the PrivilegedAction's
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   328
     *                  {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   329
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   331
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
     * @return the value returned by the PrivilegedAction's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   334
     *                  {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   336
     * @throws NullPointerException if the {@code PrivilegedAction}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   337
     *                  is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   339
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   340
     *                  caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   341
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   342
     *                  AuthPermission("doAs")} permission to invoke this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   343
     *                  method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
    public static <T> T doAs(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
                        final java.security.PrivilegedAction<T> action) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   350
            sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   352
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   353
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   354
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
        // set up the new Subject-based AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
        // for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
        final AccessControlContext currentAcc = AccessController.getContext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
                                        createContext(subject, currentAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   367
     * Perform work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
     * <p> This method first retrieves the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   370
     * {@code AccessControlContext} via
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   371
     * {@code AccessController.getContext},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   372
     * and then instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
     * using the retrieved context along with a new
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   374
     * {@code SubjectDomainCombiner} (constructed using
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   375
     * the provided {@code Subject}).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   376
     * Finally, this method invokes {@code AccessController.doPrivileged},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   377
     * passing it the provided {@code PrivilegedExceptionAction},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   378
     * as well as the newly constructed {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   380
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   381
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   382
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   384
     * @param <T> the type of the value returned by the
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   385
     *                  PrivilegedExceptionAction's {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   386
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   388
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
     * @return the value returned by the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   391
     *                  PrivilegedExceptionAction's {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   393
     * @throws PrivilegedActionException if the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   394
     *                  {@code PrivilegedExceptionAction.run}
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   395
     *                  method throws a checked exception.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   397
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   398
     *                  {@code PrivilegedExceptionAction} is
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   399
     *                  {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   401
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   402
     *                  caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   403
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   404
     *                  AuthPermission("doAs")} permission to invoke this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   405
     *                  method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
    public static <T> T doAs(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
                        final java.security.PrivilegedExceptionAction<T> action)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
                        throws java.security.PrivilegedActionException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   413
            sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   416
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   417
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
        // set up the new Subject-based AccessControlContext for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
        final AccessControlContext currentAcc = AccessController.getContext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
                                        createContext(subject, currentAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   429
     * Perform privileged work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   431
     * <p> This method behaves exactly as {@code Subject.doAs},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
     * except that instead of retrieving the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   433
     * {@code AccessControlContext}, it uses the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   434
     * {@code AccessControlContext}.  If the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   435
     * {@code AccessControlContext} is {@code null},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   436
     * this method instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
     * with an empty collection of ProtectionDomains.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   439
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   440
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   441
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   443
     * @param <T> the type of the value returned by the PrivilegedAction's
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   444
     *                  {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   445
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   447
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   449
     * @param acc the {@code AccessControlContext} to be tied to the
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   450
     *                  specified <i>subject</i> and <i>action</i>.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
     * @return the value returned by the PrivilegedAction's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   453
     *                  {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   455
     * @throws NullPointerException if the {@code PrivilegedAction}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   456
     *                  is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   458
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   459
     *                  caller does not have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   460
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   461
     *                  AuthPermission("doAsPrivileged")} permission to invoke
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   462
     *                  this method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
    public static <T> T doAsPrivileged(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
                        final java.security.PrivilegedAction<T> action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
                        final java.security.AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   470
            sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   473
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   474
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
        // set up the new Subject-based AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
        // for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
        final AccessControlContext callerAcc =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
                (acc == null ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
                new AccessControlContext(NULL_PD_ARRAY) :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
                acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
                                        createContext(subject, callerAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   490
     * Perform privileged work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   492
     * <p> This method behaves exactly as {@code Subject.doAs},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
     * except that instead of retrieving the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   494
     * {@code AccessControlContext}, it uses the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   495
     * {@code AccessControlContext}.  If the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   496
     * {@code AccessControlContext} is {@code null},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   497
     * this method instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
     * with an empty collection of ProtectionDomains.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   500
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   501
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   502
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   504
     * @param <T> the type of the value returned by the
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   505
     *                  PrivilegedExceptionAction's {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   506
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   508
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   510
     * @param acc the {@code AccessControlContext} to be tied to the
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   511
     *                  specified <i>subject</i> and <i>action</i>.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   513
     * @return the value returned by the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   514
     *                  PrivilegedExceptionAction's {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   516
     * @throws PrivilegedActionException if the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   517
     *                  {@code PrivilegedExceptionAction.run}
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   518
     *                  method throws a checked exception.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   520
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   521
     *                  {@code PrivilegedExceptionAction} is
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   522
     *                  {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   524
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   525
     *                  caller does not have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   526
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   527
     *                  AuthPermission("doAsPrivileged")} permission to invoke
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   528
     *                  this method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
    public static <T> T doAsPrivileged(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
                        final java.security.PrivilegedExceptionAction<T> action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
                        final java.security.AccessControlContext acc)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
                        throws java.security.PrivilegedActionException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   537
            sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   540
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   541
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
        // set up the new Subject-based AccessControlContext for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
        final AccessControlContext callerAcc =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
                (acc == null ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
                new AccessControlContext(NULL_PD_ARRAY) :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
                acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
                                        createContext(subject, callerAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
    private static AccessControlContext createContext(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
                                        final AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
            (new java.security.PrivilegedAction<AccessControlContext>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
            public AccessControlContext run() {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   562
                if (subject == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
                    return new AccessControlContext(acc, null);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   564
                } else {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
                    return new AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
                                        (acc,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
                                        new SubjectDomainCombiner(subject));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
            }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   569
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   574
     * Return the {@code Set} of Principals associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   575
     * {@code Subject}.  Each {@code Principal} represents
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   576
     * an identity for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   578
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   579
     * internal {@code Principal} {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   580
     * to the returned {@code Set} affects the internal
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   581
     * {@code Principal} {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   583
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   584
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   585
     * AuthPermission("modifyPrincipals")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   586
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   588
     * @return  the {@code Set} of Principals associated with this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   589
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
    public Set<Principal> getPrincipals() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
        return principals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   599
     * Return a {@code Set} of Principals associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   600
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   601
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   603
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   604
     * internal {@code Principal} {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   605
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   606
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   607
     * will not affect the internal {@code Principal} {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   609
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   610
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   611
     * @param c the returned {@code Set} of Principals will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   612
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   614
     * @return a {@code Set} of Principals that are instances of the
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   615
     *          specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   617
     * @throws NullPointerException if the specified {@code Class}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   618
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
    public <T extends Principal> Set<T> getPrincipals(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   622
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   623
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
        return new ClassSet<T>(PRINCIPAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   631
     * Return the {@code Set} of public credentials held by this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   632
     * {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   634
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   635
     * internal public Credential {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   636
     * to the returned {@code Set} affects the internal public
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   637
     * Credential {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   639
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   640
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   641
     * AuthPermission("modifyPublicCredentials")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   642
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   644
     * @return  a {@code Set} of public credentials held by this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   645
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
    public Set<Object> getPublicCredentials() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
        return pubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   655
     * Return the {@code Set} of private credentials held by this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   656
     * {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   658
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   659
     * internal private Credential {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   660
     * to the returned {@code Set} affects the internal private
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   661
     * Credential {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   663
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   664
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   665
     * AuthPermission("modifyPrivateCredentials")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   666
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   668
     * <p> While iterating through the {@code Set},
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   669
     * a {@code SecurityException} is thrown if a security manager is installed
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   670
     * and the caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   671
     * to access a particular Credential.  The {@code Iterator}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   672
     * is nevertheless advanced to the next element in the {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   674
     * @return  a {@code Set} of private credentials held by this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   675
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
    public Set<Object> getPrivateCredentials() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
        // XXX
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
        // we do not need a security check for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
        // AuthPermission(getPrivateCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
        // because we already restrict access to private credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
        // via the PrivateCredentialPermission.  all the extra AuthPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
        // would do is protect the set operations themselves
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
        // (like size()), which don't seem security-sensitive.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
        return privCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   693
     * Return a {@code Set} of public credentials associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   694
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   695
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   697
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   698
     * internal public Credential {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   699
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   700
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   701
     * will not affect the internal public Credential {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   703
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   704
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   705
     * @param c the returned {@code Set} of public credentials will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   708
     * @return a {@code Set} of public credentials that are instances
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   709
     *          of the  specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   710
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   711
     * @throws NullPointerException if the specified {@code Class}
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   712
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
    public <T> Set<T> getPublicCredentials(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   716
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   717
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   718
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
        return new ClassSet<T>(PUB_CREDENTIAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   725
     * Return a {@code Set} of private credentials associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   726
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   727
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   728
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   729
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   730
     * {@link PrivateCredentialPermission} to access all of the requested
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   731
     * Credentials, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   732
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   733
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   734
     * internal private Credential {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   735
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   736
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   737
     * will not affect the internal private Credential {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   739
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   740
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   741
     * @param c the returned {@code Set} of private credentials will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   744
     * @return a {@code Set} of private credentials that are instances
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   745
     *          of the  specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   746
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   747
     * @throws NullPointerException if the specified {@code Class}
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   748
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
    public <T> Set<T> getPrivateCredentials(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
        // XXX
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
        // we do not need a security check for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
        // AuthPermission(getPrivateCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
        // because we already restrict access to private credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
        // via the PrivateCredentialPermission.  all the extra AuthPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
        // would do is protect the set operations themselves
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
        // (like size()), which don't seem security-sensitive.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   760
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   761
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   762
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
        return new ClassSet<T>(PRIV_CREDENTIAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   769
     * Compares the specified Object with this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
     * for equality.  Returns true if the given object is also a Subject
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   771
     * and the two {@code Subject} instances are equivalent.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   772
     * More formally, two {@code Subject} instances are
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   773
     * equal if their {@code Principal} and {@code Credential}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   774
     * Sets are equal.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
     * @param o Object to be compared for equality with this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   777
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
     * @return true if the specified Object is equal to this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   780
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   782
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   783
     *         caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   784
     *         permission to access the private credentials for this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   785
     *         {@code Subject} or the provided {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   787
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
    public boolean equals(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   790
        if (o == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
            return false;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   792
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   794
        if (this == o) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
            return true;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   796
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
        if (o instanceof Subject) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
            final Subject that = (Subject)o;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
            // check the principal and credential sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
            Set<Principal> thatPrincipals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
            synchronized(that.principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
                // avoid deadlock from dual locks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
                thatPrincipals = new HashSet<Principal>(that.principals);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
            if (!principals.equals(thatPrincipals)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
            Set<Object> thatPubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
            synchronized(that.pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
                // avoid deadlock from dual locks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
                thatPubCredentials = new HashSet<Object>(that.pubCredentials);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
            if (!pubCredentials.equals(thatPubCredentials)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
            Set<Object> thatPrivCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
            synchronized(that.privCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
                // avoid deadlock from dual locks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
                thatPrivCredentials = new HashSet<Object>(that.privCredentials);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
            if (!privCredentials.equals(thatPrivCredentials)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   835
     * Return the String representation of this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   837
     * @return the String representation of this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   839
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
    public String toString() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
        return toString(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
     * package private convenience method to print out the Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
     * without firing off a security check when trying to access
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
     * the Private Credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
    String toString(boolean includePrivateCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   851
        String s = ResourcesMgr.getString("Subject.");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
        String suffix = "";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
            Iterator<Principal> pI = principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
            while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
                Principal p = pI.next();
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   858
                suffix = suffix + ResourcesMgr.getString(".Principal.") +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   859
                        p.toString() + ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
        synchronized(pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
            Iterator<Object> pI = pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
            while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
                Object o = pI.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
                suffix = suffix +
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   868
                        ResourcesMgr.getString(".Public.Credential.") +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   869
                        o.toString() + ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
        if (includePrivateCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
            synchronized(privCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
                Iterator<Object> pI = privCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
                while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
                    try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
                        Object o = pI.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
                        suffix += ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   880
                                        (".Private.Credential.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
                                        o.toString() +
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   882
                                        ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   883
                    } catch (SecurityException se) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
                        suffix += ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   885
                                (".Private.Credential.inaccessible.");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
                        break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
        return s + suffix;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   895
     * Returns a hashcode for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   897
     * @return a hashcode for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   899
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   900
     *         caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   901
     *         permission to access this Subject's private credentials.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   903
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   904
    public int hashCode() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
         * The hashcode is derived exclusive or-ing the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
         * hashcodes of this Subject's Principals and credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
         * If a particular credential was destroyed
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   911
         * ({@code credential.hashCode()} throws an
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   912
         * {@code IllegalStateException}),
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   913
         * the hashcode for that credential is derived via:
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   914
         * {@code credential.getClass().toString().hashCode()}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   915
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
        int hashCode = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
90ce3da70b43 Initial load
duke
parents:
diff changeset
   919
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
            Iterator<Principal> pIterator = principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
            while (pIterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
                Principal p = pIterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
                hashCode ^= p.hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
        synchronized(pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
            Iterator<Object> pubCIterator = pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
            while (pubCIterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
                hashCode ^= getCredHashCode(pubCIterator.next());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
        return hashCode;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
     * get a credential's hashcode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
    private int getCredHashCode(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
            return o.hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
        } catch (IllegalStateException ise) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
            return o.getClass().toString().hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
     * Writes this object out to a stream (i.e., serializes it).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   949
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
    private void writeObject(java.io.ObjectOutputStream oos)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
                throws java.io.IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
            oos.defaultWriteObject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
     * Reads this object from a stream (i.e., deserializes it)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
     */
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   960
    @SuppressWarnings("unchecked")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
    private void readObject(java.io.ObjectInputStream s)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
                throws java.io.IOException, ClassNotFoundException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   964
        ObjectInputStream.GetField gf = s.readFields();
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   965
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   966
        readOnly = gf.get("readOnly", false);
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   967
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   968
        Set<Principal> inputPrincs = (Set<Principal>)gf.get("principals", null);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   970
        Objects.requireNonNull(inputPrincs,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   971
                ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   972
22310
dc88d16495ab 8024306: Enhance Subject consistency
weijun
parents: 20831
diff changeset
   973
        // Rewrap the principals into a SecureSet
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   974
        try {
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   975
            principals = Collections.synchronizedSet(new SecureSet<Principal>
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   976
                                (this, PRINCIPAL_SET, inputPrincs));
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   977
        } catch (NullPointerException npe) {
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   978
            // Sometimes people deserialize the principals set only.
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   979
            // Subject is not accessible, so just don't fail.
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   980
            principals = Collections.synchronizedSet
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   981
                        (new SecureSet<Principal>(this, PRINCIPAL_SET));
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   982
        }
22310
dc88d16495ab 8024306: Enhance Subject consistency
weijun
parents: 20831
diff changeset
   983
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   984
        // The Credential {@code Set} is not serialized, but we do not
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   985
        // want the default deserialization routine to set it to null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
        this.pubCredentials = Collections.synchronizedSet
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
                        (new SecureSet<Object>(this, PUB_CREDENTIAL_SET));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
        this.privCredentials = Collections.synchronizedSet
90ce3da70b43 Initial load
duke
parents:
diff changeset
   989
                        (new SecureSet<Object>(this, PRIV_CREDENTIAL_SET));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   990
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
90ce3da70b43 Initial load
duke
parents:
diff changeset
   992
    /**
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   993
     * Tests for null-clean collections (both non-null reference and
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   994
     * no null elements)
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   995
     *
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   996
     * @param coll A {@code Collection} to be tested for null references
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   997
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   998
     * @throws NullPointerException if the specified collection is either
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   999
     *            {@code null} or contains a {@code null} element
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1000
     */
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1001
    private static void collectionNullClean(Collection<?> coll) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1002
        boolean hasNullElements = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1003
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1004
        Objects.requireNonNull(coll,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1005
                ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1006
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1007
        try {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1008
            hasNullElements = coll.contains(null);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1009
        } catch (NullPointerException npe) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1010
            // A null-hostile collection may choose to throw
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1011
            // NullPointerException if contains(null) is called on it
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1012
            // rather than returning false.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1013
            // If this happens we know the collection is null-clean.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1014
            hasNullElements = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1015
        } finally {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1016
            if (hasNullElements) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1017
                throw new NullPointerException
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1018
                    (ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1019
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1020
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1021
    }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1022
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1023
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
     * Prevent modifications unless caller has permission.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
     * @serial include
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
    private static class SecureSet<E>
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1029
        implements Set<E>, java.io.Serializable {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1030
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
        private static final long serialVersionUID = 7911754171111800359L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
         * @serialField this$0 Subject The outer Subject instance.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
         * @serialField elements LinkedList The elements in this set.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
        private static final ObjectStreamField[] serialPersistentFields = {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
            new ObjectStreamField("this$0", Subject.class),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
            new ObjectStreamField("elements", LinkedList.class),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
            new ObjectStreamField("which", int.class)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
        };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1042
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
        Subject subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1044
        LinkedList<E> elements;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
         * @serial An integer identifying the type of objects contained
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1048
         *      in this set.  If {@code which == 1},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
         *      this is a Principal set and all the elements are
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1050
         *      of type {@code java.security.Principal}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1051
         *      If {@code which == 2}, this is a public credential
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1052
         *      set and all the elements are of type {@code Object}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1053
         *      If {@code which == 3}, this is a private credential
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1054
         *      set and all the elements are of type {@code Object}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1055
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1056
        private int which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1057
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1058
        SecureSet(Subject subject, int which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1059
            this.subject = subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1061
            this.elements = new LinkedList<E>();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1063
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
        SecureSet(Subject subject, int which, Set<? extends E> set) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
            this.subject = subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
            this.elements = new LinkedList<E>(set);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
        public int size() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
            return elements.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1074
        public Iterator<E> iterator() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
            final LinkedList<E> list = elements;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
            return new Iterator<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
                ListIterator<E> i = list.listIterator(0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
                public boolean hasNext() {return i.hasNext();}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1080
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
                public E next() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1082
                    if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1083
                        return i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1084
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1086
                    SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1087
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1089
                            sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1090
                                (list.get(i.nextIndex()).getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1091
                                subject.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1092
                        } catch (SecurityException se) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1093
                            i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1094
                            throw (se);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1095
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
                    return i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1099
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
                public void remove() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
                    if (subject.isReadOnly()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
                        throw new IllegalStateException(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1104
                                ("Subject.is.read.only"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1106
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
                    java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1109
                        switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
                        case Subject.PRINCIPAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1111
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1113
                        case Subject.PUB_CREDENTIAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1114
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1116
                        default:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1117
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1119
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
                    i.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1122
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
            };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
        public boolean add(E o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1128
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1129
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1130
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
            if (subject.isReadOnly()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
                throw new IllegalStateException
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1133
                        (ResourcesMgr.getString("Subject.is.read.only"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
            java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
            if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1138
                switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
                case Subject.PRINCIPAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1140
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
                case Subject.PUB_CREDENTIAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1143
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1145
                default:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1146
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1151
            switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
                if (!(o instanceof Principal)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
                    throw new SecurityException(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1155
                        ("attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
                // ok to add Objects of any kind to credential sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1160
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1162
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1163
            // check for duplicates
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
            if (!elements.contains(o))
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
                return elements.add(o);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1166
            else {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1169
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
        public boolean remove(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1173
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1174
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1175
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1190
                if (next.equals(o)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
                    e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
                    return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
        public boolean contains(Object o) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1199
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1200
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1201
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1202
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1205
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1207
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
                    // For private credentials:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
                    // If the caller does not have read permission for
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
                    // for o.getClass(), we throw a SecurityException.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
                    // Otherwise we check the private cred set to see whether
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
                    // it contains the Object
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
                    SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
                        sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
                                                (o.getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
                                                subject.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1230
                if (next.equals(o)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
                    return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1237
        public boolean addAll(Collection<? extends E> c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1238
            boolean result = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1239
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1240
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1241
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1242
            for (E item : c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1243
                result |= this.add(item);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1244
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1245
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1246
            return result;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1247
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1248
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
        public boolean removeAll(Collection<?> c) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1250
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1251
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
            boolean modified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
                Iterator<?> ce = c.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
                while (ce.hasNext()) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1269
                    if (next.equals(ce.next())) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
                            e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
                            modified = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
            return modified;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1279
        public boolean containsAll(Collection<?> c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1280
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1281
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1282
            for (Object item : c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1283
                if (this.contains(item) == false) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1284
                    return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1285
                }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1286
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1287
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1288
            return true;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1289
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1290
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
        public boolean retainAll(Collection<?> c) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1292
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1293
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
            boolean modified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1309
                if (c.contains(next) == false) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1310
                    e.remove();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1311
                    modified = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1315
            return modified;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
        public void clear() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1321
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1322
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
                e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1336
        public boolean isEmpty() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1337
            return elements.isEmpty();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1338
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1339
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1340
        public Object[] toArray() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1341
            final Iterator<E> e = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1342
            while (e.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1343
                // The next() method performs a security manager check
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1344
                // on each element in the SecureSet.  If we make it all
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1345
                // the way through we should be able to simply return
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1346
                // element's toArray results.  Otherwise we'll let
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1347
                // the SecurityException pass up the call stack.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1348
                e.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1349
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1350
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1351
            return elements.toArray();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1352
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1353
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1354
        public <T> T[] toArray(T[] a) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1355
            final Iterator<E> e = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1356
            while (e.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1357
                // The next() method performs a security manager check
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1358
                // on each element in the SecureSet.  If we make it all
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1359
                // the way through we should be able to simply return
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1360
                // element's toArray results.  Otherwise we'll let
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1361
                // the SecurityException pass up the call stack.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1362
                e.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1363
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1364
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1365
            return elements.toArray(a);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1366
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1367
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1368
        public boolean equals(Object o) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1369
            if (o == this) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1370
                return true;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1371
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1372
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1373
            if (!(o instanceof Set)) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1374
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1375
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1376
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1377
            Collection<?> c = (Collection<?>) o;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1378
            if (c.size() != size()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1379
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1380
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1381
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1382
            try {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1383
                return containsAll(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1384
            } catch (ClassCastException unused)   {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1385
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1386
            } catch (NullPointerException unused) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1387
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1388
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1389
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1390
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1391
        public int hashCode() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1392
            int h = 0;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1393
            Iterator<E> i = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1394
            while (i.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1395
                E obj = i.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1396
                if (obj != null) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1397
                    h += obj.hashCode();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1398
                }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1399
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1400
            return h;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1401
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1402
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
         * Writes this object out to a stream (i.e., serializes it).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
         * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
         * @serialData If this is a private credential set,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
         *      a security check is performed to ensure that
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
         *      the caller has permission to access each credential
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
         *      in the set.  If the security check passes,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
         *      the set is serialized.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
        private void writeObject(java.io.ObjectOutputStream oos)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
                throws java.io.IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1417
            if (which == Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1418
                // check permissions before serializing
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
                Iterator<E> i = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
                while (i.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
                    i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
            ObjectOutputStream.PutField fields = oos.putFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
            fields.put("this$0", subject);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
            fields.put("elements", elements);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
            fields.put("which", which);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
            oos.writeFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
10709
d865c9f21240 7092375: Security Libraries don't build with javac -Werror
xuelei
parents: 7179
diff changeset
  1431
        @SuppressWarnings("unchecked")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
        private void readObject(ObjectInputStream ois)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
            throws IOException, ClassNotFoundException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
            ObjectInputStream.GetField fields = ois.readFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
            subject = (Subject) fields.get("this$0", null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
            which = fields.get("which", 0);
20806
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1438
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1439
            LinkedList<E> tmp = (LinkedList<E>) fields.get("elements", null);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1440
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1441
            Subject.collectionNullClean(tmp);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1442
20806
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1443
            if (tmp.getClass() != LinkedList.class) {
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1444
                elements = new LinkedList<E>(tmp);
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1445
            } else {
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1446
                elements = tmp;
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1447
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1449
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1452
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1453
     * This class implements a {@code Set} which returns only
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1454
     * members that are an instance of a specified Class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
    private class ClassSet<T> extends AbstractSet<T> {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
        private int which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
        private Class<T> c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
        private Set<T> set;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
        ClassSet(int which, Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
            this.c = c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
            set = new HashSet<T>();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1466
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1467
            switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1468
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1469
                synchronized(principals) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1470
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1471
            case Subject.PUB_CREDENTIAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1472
                synchronized(pubCredentials) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1473
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1474
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
                synchronized(privCredentials) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
10709
d865c9f21240 7092375: Security Libraries don't build with javac -Werror
xuelei
parents: 7179
diff changeset
  1480
        @SuppressWarnings("unchecked")     /*To suppress warning from line 1374*/
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
        private void populateSet() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
            final Iterator<?> iterator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
            switch(which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
                iterator = Subject.this.principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
            case Subject.PUB_CREDENTIAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
                iterator = Subject.this.pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
                iterator = Subject.this.privCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
            // Check whether the caller has permisson to get
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
            // credentials of Class c
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
            while (iterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
                Object next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
                if (which == Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
                        (new java.security.PrivilegedAction<Object>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
                        public Object run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
                            return iterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
                    next = iterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1509
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
                if (c.isAssignableFrom(next.getClass())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
                    if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
                        set.add((T)next);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
                        // Check permission for private creds
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
                        SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
                        if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
                            sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
                                                (next.getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
                                                Subject.this.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
                        set.add((T)next);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
        public int size() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
            return set.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
        public Iterator<T> iterator() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
            return set.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
        public boolean add(T o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
            if (!o.getClass().isAssignableFrom(c)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
                MessageFormat form = new MessageFormat(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1539
                        ("attempting.to.add.an.object.which.is.not.an.instance.of.class"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
                Object[] source = {c.toString()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
                throw new SecurityException(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
            return set.add(o);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1545
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
    }
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1547
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
  1548
    static final class AuthPermissionHolder {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1549
        static final AuthPermission DO_AS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1550
            new AuthPermission("doAs");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1551
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1552
        static final AuthPermission DO_AS_PRIVILEGED_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1553
            new AuthPermission("doAsPrivileged");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1554
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1555
        static final AuthPermission SET_READ_ONLY_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1556
            new AuthPermission("setReadOnly");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1557
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1558
        static final AuthPermission GET_SUBJECT_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1559
            new AuthPermission("getSubject");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1560
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1561
        static final AuthPermission MODIFY_PRINCIPALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1562
            new AuthPermission("modifyPrincipals");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1563
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1564
        static final AuthPermission MODIFY_PUBLIC_CREDENTIALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1565
            new AuthPermission("modifyPublicCredentials");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1566
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1567
        static final AuthPermission MODIFY_PRIVATE_CREDENTIALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1568
            new AuthPermission("modifyPrivateCredentials");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1569
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
}