src/java.base/share/classes/javax/security/auth/Subject.java
author darcy
Wed, 09 Oct 2019 09:57:41 -0700
changeset 58519 6e017b301287
parent 57950 4612a3cfb927
child 58679 9c3209ff7550
permissions -rw-r--r--
8231262: Suppress warnings on non-serializable instance fields in security libs serializable classes Reviewed-by: mullan, chegar
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
     2
 * Copyright (c) 1998, 2019, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4331
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package javax.security.auth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.util.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.lang.reflect.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.text.MessageFormat;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.security.AccessController;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.security.AccessControlContext;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.DomainCombiner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.Permission;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
import java.security.PermissionCollection;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.Principal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.security.PrivilegedAction;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.security.PrivilegedExceptionAction;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import java.security.PrivilegedActionException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.security.ProtectionDomain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import sun.security.util.ResourcesMgr;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
/**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    45
 * <p> A {@code Subject} represents a grouping of related information
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
 * for a single entity, such as a person.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
 * Such information includes the Subject's identities as well as
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
 * its security-related attributes
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 * (passwords and cryptographic keys, for example).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 * <p> Subjects may potentially have multiple identities.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    52
 * Each identity is represented as a {@code Principal}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    53
 * within the {@code Subject}.  Principals simply bind names to a
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    54
 * {@code Subject}.  For example, a {@code Subject} that happens
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
 * to be a person, Alice, might have two Principals:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
 * one which binds "Alice Bar", the name on her driver license,
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    57
 * to the {@code Subject}, and another which binds,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
 * "999-99-9999", the number on her student identification card,
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    59
 * to the {@code Subject}.  Both Principals refer to the same
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    60
 * {@code Subject} even though each has a different name.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    62
 * <p> A {@code Subject} may also own security-related attributes,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
 * which are referred to as credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 * Sensitive credentials that require special protection, such as
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 * private cryptographic keys, are stored within a private credential
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    66
 * {@code Set}.  Credentials intended to be shared, such as
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
 * public key certificates or Kerberos server tickets are stored
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    68
 * within a public credential {@code Set}.  Different permissions
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
 * are required to access and modify the different credential Sets.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    71
 * <p> To retrieve all the Principals associated with a {@code Subject},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    72
 * invoke the {@code getPrincipals} method.  To retrieve
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    73
 * all the public or private credentials belonging to a {@code Subject},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    74
 * invoke the {@code getPublicCredentials} method or
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    75
 * {@code getPrivateCredentials} method, respectively.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    76
 * To modify the returned {@code Set} of Principals and credentials,
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    77
 * use the methods defined in the {@code Set} class.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
 * For example:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
 * <pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
 *      Subject subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
 *      Principal principal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
 *      Object credential;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
 *      // add a Principal and credential to the Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
 *      subject.getPrincipals().add(principal);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
 *      subject.getPublicCredentials().add(credential);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
 * </pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
 *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    89
 * <p> This {@code Subject} class implements {@code Serializable}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    90
 * While the Principals associated with the {@code Subject} are serialized,
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    91
 * the credentials associated with the {@code Subject} are not.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    92
 * Note that the {@code java.security.Principal} class
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    93
 * does not implement {@code Serializable}.  Therefore all concrete
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    94
 * {@code Principal} implementations associated with Subjects
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
    95
 * must implement {@code Serializable}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
 *
45434
4582657c7260 8181082: class-level since tag issues in java.base & java.datatransfer module
mli
parents: 31061
diff changeset
    97
 * @since 1.4
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
 * @see java.security.Principal
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
 * @see java.security.DomainCombiner
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
public final class Subject implements java.io.Serializable {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
   103
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    private static final long serialVersionUID = -8308522755600156056L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   107
     * A {@code Set} that provides a view of all of this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
     * Subject's Principals
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
     * @serial Each element in this set is a
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   111
     *          {@code java.security.Principal}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   112
     *          The set is a {@code Subject.SecureSet}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     */
58519
6e017b301287 8231262: Suppress warnings on non-serializable instance fields in security libs serializable classes
darcy
parents: 57950
diff changeset
   114
    @SuppressWarnings("serial") // Not statically typed as Serializable
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
    Set<Principal> principals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
     * Sets that provide a view of all of this
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
     * Subject's Credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
    transient Set<Object> pubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
    transient Set<Object> privCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
     * Whether this Subject is read-only
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
     * @serial
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
    private volatile boolean readOnly = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
    private static final int PRINCIPAL_SET = 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
    private static final int PUB_CREDENTIAL_SET = 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    private static final int PRIV_CREDENTIAL_SET = 3;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
    private static final ProtectionDomain[] NULL_PD_ARRAY
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
        = new ProtectionDomain[0];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   139
     * Create an instance of a {@code Subject}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   140
     * with an empty {@code Set} of Principals and empty
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     * Sets of public and private credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   143
     * <p> The newly constructed Sets check whether this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
     * has been set read-only before permitting subsequent modifications.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
     * The newly created Sets also prevent illegal modifications
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   146
     * by ensuring that callers have sufficient permissions.  These Sets
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   147
     * also prohibit null elements, and attempts to add or query a null
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   148
     * element will result in a {@code NullPointerException}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
     * <p> To modify the Principals Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   151
     * {@code AuthPermission("modifyPrincipals")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
     * To modify the public credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   153
     * {@code AuthPermission("modifyPublicCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
     * To modify the private credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   155
     * {@code AuthPermission("modifyPrivateCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
    public Subject() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
        this.principals = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   160
                        (new SecureSet<>(this, PRINCIPAL_SET));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
        this.pubCredentials = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   162
                        (new SecureSet<>(this, PUB_CREDENTIAL_SET));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
        this.privCredentials = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   164
                        (new SecureSet<>(this, PRIV_CREDENTIAL_SET));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   168
     * Create an instance of a {@code Subject} with
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
     * Principals and credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
     * <p> The Principals and credentials from the specified Sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
     * are copied into newly constructed Sets.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   173
     * These newly created Sets check whether this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * has been set read-only before permitting subsequent modifications.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
     * The newly created Sets also prevent illegal modifications
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   176
     * by ensuring that callers have sufficient permissions.  These Sets
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   177
     * also prohibit null elements, and attempts to add or query a null
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   178
     * element will result in a {@code NullPointerException}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
     * <p> To modify the Principals Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   181
     * {@code AuthPermission("modifyPrincipals")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
     * To modify the public credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   183
     * {@code AuthPermission("modifyPublicCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
     * To modify the private credential Set, the caller must have
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   185
     * {@code AuthPermission("modifyPrivateCredentials")}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   187
     * @param readOnly true if the {@code Subject} is to be read-only,
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   188
     *          and false otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   190
     * @param principals the {@code Set} of Principals
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   191
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   193
     * @param pubCredentials the {@code Set} of public credentials
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   194
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   196
     * @param privCredentials the {@code Set} of private credentials
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   197
     *          to be associated with this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   199
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   200
     *          {@code principals}, {@code pubCredentials},
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   201
     *          or {@code privCredentials} are {@code null},
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   202
     *          or a null value exists within any of these three
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   203
     *          Sets.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
    public Subject(boolean readOnly, Set<? extends Principal> principals,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
                   Set<?> pubCredentials, Set<?> privCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
    {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   208
        collectionNullClean(principals);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   209
        collectionNullClean(pubCredentials);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   210
        collectionNullClean(privCredentials);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   212
        this.principals = Collections.synchronizedSet(new SecureSet<>
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
                                (this, PRINCIPAL_SET, principals));
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   214
        this.pubCredentials = Collections.synchronizedSet(new SecureSet<>
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
                                (this, PUB_CREDENTIAL_SET, pubCredentials));
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   216
        this.privCredentials = Collections.synchronizedSet(new SecureSet<>
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
                                (this, PRIV_CREDENTIAL_SET, privCredentials));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
        this.readOnly = readOnly;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   222
     * Set this {@code Subject} to be read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
     * <p> Modifications (additions and removals) to this Subject's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   225
     * {@code Principal} {@code Set} and
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
     * credential Sets will be disallowed.
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   227
     * The {@code destroy} operation on this Subject's credentials will
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
     * still be permitted.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   230
     * <p> Subsequent attempts to modify the Subject's {@code Principal}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
     * and credential Sets will result in an
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   232
     * {@code IllegalStateException} being thrown.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   233
     * Also, once a {@code Subject} is read-only,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
     * it can not be reset to being writable again.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   236
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   237
     *         caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   238
     *         {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   239
     *         AuthPermission("setReadOnly")} permission to set this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   240
     *         {@code Subject} to be read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
    public void setReadOnly() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   245
            sm.checkPermission(AuthPermissionHolder.SET_READ_ONLY_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
        this.readOnly = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   252
     * Query whether this {@code Subject} is read-only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   254
     * @return true if this {@code Subject} is read-only, false otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
    public boolean isReadOnly() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
        return this.readOnly;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   261
     * Get the {@code Subject} associated with the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   262
     * {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   264
     * <p> The {@code AccessControlContext} may contain many
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   265
     * Subjects (from nested {@code doAs} calls).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   266
     * In this situation, the most recent {@code Subject} associated
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   267
     * with the {@code AccessControlContext} is returned.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   269
     * @param  acc the {@code AccessControlContext} from which to retrieve
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   270
     *          the {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   272
     * @return  the {@code Subject} associated with the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   273
     *          {@code AccessControlContext}, or {@code null}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   274
     *          if no {@code Subject} is associated
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   275
     *          with the provided {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   277
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   278
     *          caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   279
     *          {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   280
     *          AuthPermission("getSubject")} permission to get the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   281
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   283
     * @throws NullPointerException if the provided
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   284
     *          {@code AccessControlContext} is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
    public static Subject getSubject(final AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   290
            sm.checkPermission(AuthPermissionHolder.GET_SUBJECT_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   293
        Objects.requireNonNull(acc, ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   294
                ("invalid.null.AccessControlContext.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
        // return the Subject from the DomainCombiner of the provided context
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
        return AccessController.doPrivileged
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   298
            (new java.security.PrivilegedAction<>() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
            public Subject run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
                DomainCombiner dc = acc.getDomainCombiner();
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   301
                if (!(dc instanceof SubjectDomainCombiner)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
                    return null;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   303
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
                SubjectDomainCombiner sdc = (SubjectDomainCombiner)dc;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
                return sdc.getSubject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   311
     * Perform work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
     * <p> This method first retrieves the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   314
     * {@code AccessControlContext} via
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   315
     * {@code AccessController.getContext},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   316
     * and then instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
     * using the retrieved context along with a new
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   318
     * {@code SubjectDomainCombiner} (constructed using
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   319
     * the provided {@code Subject}).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   320
     * Finally, this method invokes {@code AccessController.doPrivileged},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   321
     * passing it the provided {@code PrivilegedAction},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   322
     * as well as the newly constructed {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   324
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   325
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   326
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   328
     * @param <T> the type of the value returned by the PrivilegedAction's
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   329
     *                  {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   330
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   332
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
     * @return the value returned by the PrivilegedAction's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   335
     *                  {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   337
     * @throws NullPointerException if the {@code PrivilegedAction}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   338
     *                  is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   340
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   341
     *                  caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   342
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   343
     *                  AuthPermission("doAs")} permission to invoke this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   344
     *                  method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
    public static <T> T doAs(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
                        final java.security.PrivilegedAction<T> action) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   351
            sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   353
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   354
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   355
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
        // set up the new Subject-based AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
        // for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
        final AccessControlContext currentAcc = AccessController.getContext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
                                        createContext(subject, currentAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   368
     * Perform work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
     * <p> This method first retrieves the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   371
     * {@code AccessControlContext} via
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   372
     * {@code AccessController.getContext},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   373
     * and then instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
     * using the retrieved context along with a new
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   375
     * {@code SubjectDomainCombiner} (constructed using
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   376
     * the provided {@code Subject}).
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   377
     * Finally, this method invokes {@code AccessController.doPrivileged},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   378
     * passing it the provided {@code PrivilegedExceptionAction},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   379
     * as well as the newly constructed {@code AccessControlContext}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   381
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   382
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   383
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   385
     * @param <T> the type of the value returned by the
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   386
     *                  PrivilegedExceptionAction's {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   387
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   389
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
     * @return the value returned by the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   392
     *                  PrivilegedExceptionAction's {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   394
     * @throws PrivilegedActionException if the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   395
     *                  {@code PrivilegedExceptionAction.run}
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   396
     *                  method throws a checked exception.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   398
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   399
     *                  {@code PrivilegedExceptionAction} is
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   400
     *                  {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   402
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   403
     *                  caller does not have an
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   404
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   405
     *                  AuthPermission("doAs")} permission to invoke this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   406
     *                  method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
    public static <T> T doAs(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
                        final java.security.PrivilegedExceptionAction<T> action)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
                        throws java.security.PrivilegedActionException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   414
            sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   417
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   418
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
        // set up the new Subject-based AccessControlContext for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
        final AccessControlContext currentAcc = AccessController.getContext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
                                        createContext(subject, currentAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   430
     * Perform privileged work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   432
     * <p> This method behaves exactly as {@code Subject.doAs},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
     * except that instead of retrieving the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   434
     * {@code AccessControlContext}, it uses the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   435
     * {@code AccessControlContext}.  If the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   436
     * {@code AccessControlContext} is {@code null},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   437
     * this method instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     * with an empty collection of ProtectionDomains.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   440
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   441
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   442
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   444
     * @param <T> the type of the value returned by the PrivilegedAction's
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   445
     *                  {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   446
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   448
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   450
     * @param acc the {@code AccessControlContext} to be tied to the
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   451
     *                  specified <i>subject</i> and <i>action</i>.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
     * @return the value returned by the PrivilegedAction's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   454
     *                  {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   456
     * @throws NullPointerException if the {@code PrivilegedAction}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   457
     *                  is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   459
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   460
     *                  caller does not have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   461
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   462
     *                  AuthPermission("doAsPrivileged")} permission to invoke
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   463
     *                  this method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
    public static <T> T doAsPrivileged(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
                        final java.security.PrivilegedAction<T> action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
                        final java.security.AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   471
            sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   474
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   475
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
        // set up the new Subject-based AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
        // for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
        final AccessControlContext callerAcc =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
                (acc == null ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
                new AccessControlContext(NULL_PD_ARRAY) :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
                acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
                                        createContext(subject, callerAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   491
     * Perform privileged work as a particular {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   493
     * <p> This method behaves exactly as {@code Subject.doAs},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
     * except that instead of retrieving the current Thread's
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   495
     * {@code AccessControlContext}, it uses the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   496
     * {@code AccessControlContext}.  If the provided
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   497
     * {@code AccessControlContext} is {@code null},
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   498
     * this method instantiates a new {@code AccessControlContext}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
     * with an empty collection of ProtectionDomains.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   501
     * @param subject the {@code Subject} that the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   502
     *                  {@code action} will run as.  This parameter
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   503
     *                  may be {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   505
     * @param <T> the type of the value returned by the
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   506
     *                  PrivilegedExceptionAction's {@code run} method.
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   507
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
     * @param action the code to be run as the specified
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   509
     *                  {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   511
     * @param acc the {@code AccessControlContext} to be tied to the
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   512
     *                  specified <i>subject</i> and <i>action</i>.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   513
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
     * @return the value returned by the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   515
     *                  PrivilegedExceptionAction's {@code run} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   517
     * @throws PrivilegedActionException if the
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   518
     *                  {@code PrivilegedExceptionAction.run}
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   519
     *                  method throws a checked exception.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   521
     * @throws NullPointerException if the specified
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   522
     *                  {@code PrivilegedExceptionAction} is
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   523
     *                  {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   525
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   526
     *                  caller does not have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   527
     *                  {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   528
     *                  AuthPermission("doAsPrivileged")} permission to invoke
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   529
     *                  this method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
    public static <T> T doAsPrivileged(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
                        final java.security.PrivilegedExceptionAction<T> action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
                        final java.security.AccessControlContext acc)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
                        throws java.security.PrivilegedActionException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
        java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
        if (sm != null) {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
   538
            sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   541
        Objects.requireNonNull(action,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   542
                ResourcesMgr.getString("invalid.null.action.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
        // set up the new Subject-based AccessControlContext for doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
        final AccessControlContext callerAcc =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
                (acc == null ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
                new AccessControlContext(NULL_PD_ARRAY) :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
                acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
        // call doPrivileged and push this new context on the stack
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
        return java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
                                        (action,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
                                        createContext(subject, callerAcc));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
    private static AccessControlContext createContext(final Subject subject,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
                                        final AccessControlContext acc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
        return java.security.AccessController.doPrivileged
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   561
            (new java.security.PrivilegedAction<>() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
            public AccessControlContext run() {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   563
                if (subject == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
                    return new AccessControlContext(acc, null);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   565
                } else {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
                    return new AccessControlContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
                                        (acc,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
                                        new SubjectDomainCombiner(subject));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
            }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   570
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   575
     * Return the {@code Set} of Principals associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   576
     * {@code Subject}.  Each {@code Principal} represents
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   577
     * an identity for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   579
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   580
     * internal {@code Principal} {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   581
     * to the returned {@code Set} affects the internal
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   582
     * {@code Principal} {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   584
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   585
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   586
     * AuthPermission("modifyPrincipals")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   587
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   589
     * @return  the {@code Set} of Principals associated with this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   590
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
    public Set<Principal> getPrincipals() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
        return principals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   600
     * Return a {@code Set} of Principals associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   601
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   602
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   604
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   605
     * internal {@code Principal} {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   606
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   607
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   608
     * will not affect the internal {@code Principal} {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   609
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   610
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   611
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   612
     * @param c the returned {@code Set} of Principals will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   615
     * @return a {@code Set} of Principals that are instances of the
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   616
     *          specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   618
     * @throws NullPointerException if the specified {@code Class}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   619
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
    public <T extends Principal> Set<T> getPrincipals(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   623
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   624
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
        return new ClassSet<T>(PRINCIPAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
90ce3da70b43 Initial load
duke
parents:
diff changeset
   631
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   632
     * Return the {@code Set} of public credentials held by this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   633
     * {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   635
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   636
     * internal public Credential {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   637
     * to the returned {@code Set} affects the internal public
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   638
     * Credential {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   640
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   641
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   642
     * AuthPermission("modifyPublicCredentials")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   643
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   644
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   645
     * @return  a {@code Set} of public credentials held by this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   646
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
    public Set<Object> getPublicCredentials() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
        return pubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   656
     * Return the {@code Set} of private credentials held by this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   657
     * {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   659
     * <p> The returned {@code Set} is backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   660
     * internal private Credential {@code Set}.  Any modification
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   661
     * to the returned {@code Set} affects the internal private
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   662
     * Credential {@code Set} as well.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   664
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   665
     * {@link AuthPermission#AuthPermission(String)
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   666
     * AuthPermission("modifyPrivateCredentials")} permission to modify
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   667
     * the returned set, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   669
     * <p> While iterating through the {@code Set},
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   670
     * a {@code SecurityException} is thrown if a security manager is installed
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   671
     * and the caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   672
     * to access a particular Credential.  The {@code Iterator}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   673
     * is nevertheless advanced to the next element in the {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   675
     * @return  a {@code Set} of private credentials held by this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   676
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
    public Set<Object> getPrivateCredentials() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
        // XXX
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
        // we do not need a security check for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
        // AuthPermission(getPrivateCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
        // because we already restrict access to private credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
        // via the PrivateCredentialPermission.  all the extra AuthPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
        // would do is protect the set operations themselves
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
        // (like size()), which don't seem security-sensitive.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
        return privCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   694
     * Return a {@code Set} of public credentials associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   695
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   696
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   698
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   699
     * internal public Credential {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   700
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   701
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   702
     * will not affect the internal public Credential {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   704
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   705
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   706
     * @param c the returned {@code Set} of public credentials will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   709
     * @return a {@code Set} of public credentials that are instances
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   710
     *          of the  specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   711
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   712
     * @throws NullPointerException if the specified {@code Class}
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   713
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
    public <T> Set<T> getPublicCredentials(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   716
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   717
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   718
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
        return new ClassSet<T>(PUB_CREDENTIAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   726
     * Return a {@code Set} of private credentials associated with this
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   727
     * {@code Subject} that are instances or subclasses of the specified
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   728
     * {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   729
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   730
     * <p> If a security manager is installed, the caller must have a
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   731
     * {@link PrivateCredentialPermission} to access all of the requested
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   732
     * Credentials, or a {@code SecurityException} will be thrown.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   733
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   734
     * <p> The returned {@code Set} is not backed by this Subject's
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   735
     * internal private Credential {@code Set}.  A new
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   736
     * {@code Set} is created and returned for each method invocation.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   737
     * Modifications to the returned {@code Set}
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   738
     * will not affect the internal private Credential {@code Set}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   739
     *
18771
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   740
     * @param <T> the type of the class modeled by {@code c}
9dadb0719cea 8019772: Fix doclint issues in javax.crypto and javax.security subpackages
juh
parents: 14342
diff changeset
   741
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   742
     * @param c the returned {@code Set} of private credentials will all be
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
     *          instances of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   745
     * @return a {@code Set} of private credentials that are instances
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   746
     *          of the  specified {@code Class}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   747
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   748
     * @throws NullPointerException if the specified {@code Class}
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   749
     *          is {@code null}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
    public <T> Set<T> getPrivateCredentials(Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
        // XXX
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
        // we do not need a security check for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
        // AuthPermission(getPrivateCredentials)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
        // because we already restrict access to private credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
        // via the PrivateCredentialPermission.  all the extra AuthPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
        // would do is protect the set operations themselves
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
        // (like size()), which don't seem security-sensitive.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   760
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   761
        Objects.requireNonNull(c,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   762
                ResourcesMgr.getString("invalid.null.Class.provided"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
        // always return an empty Set instead of null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
        // so LoginModules can add to the Set if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
        return new ClassSet<T>(PRIV_CREDENTIAL_SET, c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   770
     * Compares the specified Object with this {@code Subject}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
     * for equality.  Returns true if the given object is also a Subject
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   772
     * and the two {@code Subject} instances are equivalent.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   773
     * More formally, two {@code Subject} instances are
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   774
     * equal if their {@code Principal} and {@code Credential}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
     * Sets are equal.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   777
     * @param o Object to be compared for equality with this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   778
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   780
     * @return true if the specified Object is equal to this
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   781
     *          {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   783
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   784
     *         caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   785
     *         permission to access the private credentials for this
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   786
     *         {@code Subject} or the provided {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   788
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
    public boolean equals(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   791
        if (o == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
            return false;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   793
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   795
        if (this == o) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
            return true;
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   797
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
        if (o instanceof Subject) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
            final Subject that = (Subject)o;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
            // check the principal and credential sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
            Set<Principal> thatPrincipals;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
            synchronized(that.principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
                // avoid deadlock from dual locks
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   807
                thatPrincipals = new HashSet<>(that.principals);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
            if (!principals.equals(thatPrincipals)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
            Set<Object> thatPubCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
            synchronized(that.pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
                // avoid deadlock from dual locks
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   816
                thatPubCredentials = new HashSet<>(that.pubCredentials);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
            if (!pubCredentials.equals(thatPubCredentials)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
            Set<Object> thatPrivCredentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
            synchronized(that.privCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
                // avoid deadlock from dual locks
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   825
                thatPrivCredentials = new HashSet<>(that.privCredentials);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
            if (!privCredentials.equals(thatPrivCredentials)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   836
     * Return the String representation of this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   838
     * @return the String representation of this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   840
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
    public String toString() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
        return toString(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
     * package private convenience method to print out the Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
     * without firing off a security check when trying to access
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
     * the Private Credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
    String toString(boolean includePrivateCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   852
        String s = ResourcesMgr.getString("Subject.");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
        String suffix = "";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
            Iterator<Principal> pI = principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
            while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
                Principal p = pI.next();
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   859
                suffix = suffix + ResourcesMgr.getString(".Principal.") +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   860
                        p.toString() + ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
        synchronized(pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
            Iterator<Object> pI = pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
            while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
                Object o = pI.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
                suffix = suffix +
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   869
                        ResourcesMgr.getString(".Public.Credential.") +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   870
                        o.toString() + ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
        if (includePrivateCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
            synchronized(privCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
                Iterator<Object> pI = privCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
                while (pI.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
                    try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
                        Object o = pI.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
                        suffix += ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   881
                                        (".Private.Credential.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
                                        o.toString() +
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   883
                                        ResourcesMgr.getString("NEWLINE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
                    } catch (SecurityException se) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
                        suffix += ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
   886
                                (".Private.Credential.inaccessible.");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
                        break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
        return s + suffix;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   896
     * Returns a hashcode for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
     *
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   898
     * @return a hashcode for this {@code Subject}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   900
     * @throws SecurityException if a security manager is installed and the
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   901
     *         caller does not have a {@link PrivateCredentialPermission}
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   902
     *         permission to access this Subject's private credentials.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
     */
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
   904
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
    public int hashCode() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
         * The hashcode is derived exclusive or-ing the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
         * hashcodes of this Subject's Principals and credentials.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   911
         * If a particular credential was destroyed
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   912
         * ({@code credential.hashCode()} throws an
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   913
         * {@code IllegalStateException}),
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   914
         * the hashcode for that credential is derived via:
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   915
         * {@code credential.getClass().toString().hashCode()}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
        int hashCode = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   919
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
            Iterator<Principal> pIterator = principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
            while (pIterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
                Principal p = pIterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
                hashCode ^= p.hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
        synchronized(pubCredentials) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
            Iterator<Object> pubCIterator = pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
            while (pubCIterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
                hashCode ^= getCredHashCode(pubCIterator.next());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
        return hashCode;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
     * get a credential's hashcode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
    private int getCredHashCode(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
            return o.hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
        } catch (IllegalStateException ise) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
            return o.getClass().toString().hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   949
     * Writes this object out to a stream (i.e., serializes it).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
     */
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
   951
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
    private void writeObject(java.io.ObjectOutputStream oos)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
                throws java.io.IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
        synchronized(principals) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
            oos.defaultWriteObject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
     * Reads this object from a stream (i.e., deserializes it)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
     */
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   962
    @SuppressWarnings("unchecked")
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
   963
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
    private void readObject(java.io.ObjectInputStream s)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
                throws java.io.IOException, ClassNotFoundException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   967
        ObjectInputStream.GetField gf = s.readFields();
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   968
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   969
        readOnly = gf.get("readOnly", false);
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   970
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   971
        Set<Principal> inputPrincs = (Set<Principal>)gf.get("principals", null);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   973
        Objects.requireNonNull(inputPrincs,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   974
                ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   975
22310
dc88d16495ab 8024306: Enhance Subject consistency
weijun
parents: 20831
diff changeset
   976
        // Rewrap the principals into a SecureSet
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   977
        try {
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   978
            principals = Collections.synchronizedSet(new SecureSet<>
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   979
                                (this, PRINCIPAL_SET, inputPrincs));
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   980
        } catch (NullPointerException npe) {
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   981
            // Sometimes people deserialize the principals set only.
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   982
            // Subject is not accessible, so just don't fail.
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   983
            principals = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   984
                        (new SecureSet<>(this, PRINCIPAL_SET));
23913
049a0df69b88 8030655: Regression: 14_01 Security fix 8024306 causes test failures
weijun
parents: 22317
diff changeset
   985
        }
22310
dc88d16495ab 8024306: Enhance Subject consistency
weijun
parents: 20831
diff changeset
   986
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
   987
        // The Credential {@code Set} is not serialized, but we do not
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
        // want the default deserialization routine to set it to null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   989
        this.pubCredentials = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   990
                        (new SecureSet<>(this, PUB_CREDENTIAL_SET));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
        this.privCredentials = Collections.synchronizedSet
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
   992
                        (new SecureSet<>(this, PRIV_CREDENTIAL_SET));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   993
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   994
90ce3da70b43 Initial load
duke
parents:
diff changeset
   995
    /**
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   996
     * Tests for null-clean collections (both non-null reference and
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   997
     * no null elements)
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   998
     *
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
   999
     * @param coll A {@code Collection} to be tested for null references
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1000
     *
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
  1001
     * @throws NullPointerException if the specified collection is either
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1002
     *            {@code null} or contains a {@code null} element
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1003
     */
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1004
    private static void collectionNullClean(Collection<?> coll) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1005
        boolean hasNullElements = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1006
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1007
        Objects.requireNonNull(coll,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1008
                ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1009
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1010
        try {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1011
            hasNullElements = coll.contains(null);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1012
        } catch (NullPointerException npe) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1013
            // A null-hostile collection may choose to throw
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1014
            // NullPointerException if contains(null) is called on it
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1015
            // rather than returning false.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1016
            // If this happens we know the collection is null-clean.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1017
            hasNullElements = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1018
        } finally {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1019
            if (hasNullElements) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1020
                throw new NullPointerException
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1021
                    (ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1022
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1023
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1024
    }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1025
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1026
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
     * Prevent modifications unless caller has permission.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1029
     * @serial include
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1030
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
    private static class SecureSet<E>
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1032
        implements Set<E>, java.io.Serializable {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
  1034
        @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
        private static final long serialVersionUID = 7911754171111800359L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
         * @serialField this$0 Subject The outer Subject instance.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
         * @serialField elements LinkedList The elements in this set.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
         */
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
  1041
        @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1042
        private static final ObjectStreamField[] serialPersistentFields = {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
            new ObjectStreamField("this$0", Subject.class),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1044
            new ObjectStreamField("elements", LinkedList.class),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
            new ObjectStreamField("which", int.class)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
        };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
        Subject subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
        LinkedList<E> elements;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
         * @serial An integer identifying the type of objects contained
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1053
         *      in this set.  If {@code which == 1},
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1054
         *      this is a Principal set and all the elements are
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1055
         *      of type {@code java.security.Principal}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1056
         *      If {@code which == 2}, this is a public credential
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1057
         *      set and all the elements are of type {@code Object}.
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1058
         *      If {@code which == 3}, this is a private credential
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1059
         *      set and all the elements are of type {@code Object}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1061
        private int which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1063
        SecureSet(Subject subject, int which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
            this.subject = subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
            this.elements = new LinkedList<E>();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
        SecureSet(Subject subject, int which, Set<? extends E> set) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
            this.subject = subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
            this.elements = new LinkedList<E>(set);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1074
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
        public int size() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
            return elements.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
        public Iterator<E> iterator() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1080
            final LinkedList<E> list = elements;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
            return new Iterator<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1082
                ListIterator<E> i = list.listIterator(0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1083
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1084
                public boolean hasNext() {return i.hasNext();}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1086
                public E next() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1087
                    if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
                        return i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1089
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1090
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1091
                    SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1092
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1093
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1094
                            sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1095
                                (list.get(i.nextIndex()).getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
                                subject.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
                        } catch (SecurityException se) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
                            i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1099
                            throw (se);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
                    return i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1104
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
                public void remove() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1106
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
                    if (subject.isReadOnly()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
                        throw new IllegalStateException(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1109
                                ("Subject.is.read.only"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1111
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
                    java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1113
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1114
                        switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
                        case Subject.PRINCIPAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1116
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1117
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
                        case Subject.PUB_CREDENTIAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1119
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
                        default:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1122
                            sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
                    i.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1128
            };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1130
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
        public boolean add(E o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1133
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1134
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1135
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
            if (subject.isReadOnly()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
                throw new IllegalStateException
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1138
                        (ResourcesMgr.getString("Subject.is.read.only"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1140
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
            java.lang.SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
            if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
                switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
                case Subject.PRINCIPAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1145
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
                case Subject.PUB_CREDENTIAL_SET:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1148
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
                default:
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1151
                    sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
            switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
                if (!(o instanceof Principal)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
                    throw new SecurityException(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1160
                        ("attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1162
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1163
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
                // ok to add Objects of any kind to credential sets
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
            // check for duplicates
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
            if (!elements.contains(o))
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
                return elements.add(o);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1171
            else {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1173
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1174
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
        public boolean remove(Object o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1178
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1179
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1180
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1195
                if (next.equals(o)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
                    e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
                    return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1201
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
        public boolean contains(Object o) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1204
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1205
            Objects.requireNonNull(o,
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1206
                    ResourcesMgr.getString("invalid.null.input.s."));
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1207
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
                    // For private credentials:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
                    // If the caller does not have read permission for
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
                    // for o.getClass(), we throw a SecurityException.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
                    // Otherwise we check the private cred set to see whether
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
                    // it contains the Object
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
                    SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
                    if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
                        sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
                                                (o.getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
                                                subject.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1235
                if (next.equals(o)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
                    return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1242
        public boolean addAll(Collection<? extends E> c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1243
            boolean result = false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1244
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1245
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1246
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1247
            for (E item : c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1248
                result |= this.add(item);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1249
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1250
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1251
            return result;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1252
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1253
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
        public boolean removeAll(Collection<?> c) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1255
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1256
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
            boolean modified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
                Iterator<?> ce = c.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
                while (ce.hasNext()) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1274
                    if (next.equals(ce.next())) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
                            e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
                            modified = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
            return modified;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1284
        public boolean containsAll(Collection<?> c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1285
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1286
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1287
            for (Object item : c) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1288
                if (this.contains(item) == false) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1289
                    return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1290
                }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1291
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1292
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1293
            return true;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1294
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1295
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
        public boolean retainAll(Collection<?> c) {
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1297
            collectionNullClean(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1298
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
            boolean modified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1314
                if (c.contains(next) == false) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1315
                    e.remove();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1316
                    modified = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
            return modified;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1321
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1322
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
        public void clear() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
            final Iterator<E> e = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
            while (e.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
                E next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
                if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
                    next = e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
                    next = java.security.AccessController.doPrivileged
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
                        (new java.security.PrivilegedAction<E>() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
                        public E run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
                            return e.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
                e.remove();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1341
        public boolean isEmpty() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1342
            return elements.isEmpty();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1343
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1344
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1345
        public Object[] toArray() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1346
            final Iterator<E> e = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1347
            while (e.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1348
                // The next() method performs a security manager check
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1349
                // on each element in the SecureSet.  If we make it all
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1350
                // the way through we should be able to simply return
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1351
                // element's toArray results.  Otherwise we'll let
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1352
                // the SecurityException pass up the call stack.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1353
                e.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1354
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1355
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1356
            return elements.toArray();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1357
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1358
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1359
        public <T> T[] toArray(T[] a) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1360
            final Iterator<E> e = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1361
            while (e.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1362
                // The next() method performs a security manager check
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1363
                // on each element in the SecureSet.  If we make it all
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1364
                // the way through we should be able to simply return
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1365
                // element's toArray results.  Otherwise we'll let
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1366
                // the SecurityException pass up the call stack.
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1367
                e.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1368
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1369
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1370
            return elements.toArray(a);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1371
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1372
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1373
        public boolean equals(Object o) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1374
            if (o == this) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1375
                return true;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1376
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1377
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1378
            if (!(o instanceof Set)) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1379
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1380
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1381
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1382
            Collection<?> c = (Collection<?>) o;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1383
            if (c.size() != size()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1384
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1385
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1386
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1387
            try {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1388
                return containsAll(c);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1389
            } catch (ClassCastException unused)   {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1390
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1391
            } catch (NullPointerException unused) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1392
                return false;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1393
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1394
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1395
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1396
        public int hashCode() {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1397
            int h = 0;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1398
            Iterator<E> i = iterator();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1399
            while (i.hasNext()) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1400
                E obj = i.next();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1401
                if (obj != null) {
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1402
                    h += obj.hashCode();
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1403
                }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1404
            }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1405
            return h;
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1406
        }
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1407
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
         * Writes this object out to a stream (i.e., serializes it).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
         * @serialData If this is a private credential set,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
         *      a security check is performed to ensure that
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
         *      the caller has permission to access each credential
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
         *      in the set.  If the security check passes,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
         *      the set is serialized.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
         */
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
  1417
        @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1418
        private void writeObject(java.io.ObjectOutputStream oos)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
                throws java.io.IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
            if (which == Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
                // check permissions before serializing
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
                Iterator<E> i = iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
                while (i.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
                    i.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
            ObjectOutputStream.PutField fields = oos.putFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
            fields.put("this$0", subject);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
            fields.put("elements", elements);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
            fields.put("which", which);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
            oos.writeFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
10709
d865c9f21240 7092375: Security Libraries don't build with javac -Werror
xuelei
parents: 7179
diff changeset
  1435
        @SuppressWarnings("unchecked")
57950
4612a3cfb927 8229999: Apply java.io.Serial annotations to security types in java.base
darcy
parents: 47216
diff changeset
  1436
        @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
        private void readObject(ObjectInputStream ois)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
            throws IOException, ClassNotFoundException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1439
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
            ObjectInputStream.GetField fields = ois.readFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
            subject = (Subject) fields.get("this$0", null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
            which = fields.get("which", 0);
20806
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1443
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1444
            LinkedList<E> tmp = (LinkedList<E>) fields.get("elements", null);
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1445
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1446
            Subject.collectionNullClean(tmp);
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1447
20806
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1448
            if (tmp.getClass() != LinkedList.class) {
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1449
                elements = new LinkedList<E>(tmp);
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1450
            } else {
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1451
                elements = tmp;
d94588b7854d 8015731: Subject java.security.auth.subject to improvements
weijun
parents: 14342
diff changeset
  1452
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
        }
25188
e680ab7f208e 8015081: javax.security.auth.Subject.toString() throws NPE
ascarpino
parents: 23913
diff changeset
  1454
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
    /**
18830
90956ead732f 8020557: javadoc cleanup in javax.security
juh
parents: 18771
diff changeset
  1458
     * This class implements a {@code Set} which returns only
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
     * members that are an instance of a specified Class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
    private class ClassSet<T> extends AbstractSet<T> {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
        private int which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
        private Class<T> c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
        private Set<T> set;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1466
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1467
        ClassSet(int which, Class<T> c) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1468
            this.which = which;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1469
            this.c = c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1470
            set = new HashSet<T>();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1471
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1472
            switch (which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1473
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1474
                synchronized(principals) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
            case Subject.PUB_CREDENTIAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
                synchronized(pubCredentials) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
                synchronized(privCredentials) { populateSet(); }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
10709
d865c9f21240 7092375: Security Libraries don't build with javac -Werror
xuelei
parents: 7179
diff changeset
  1485
        @SuppressWarnings("unchecked")     /*To suppress warning from line 1374*/
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
        private void populateSet() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
            final Iterator<?> iterator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
            switch(which) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
            case Subject.PRINCIPAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
                iterator = Subject.this.principals.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
            case Subject.PUB_CREDENTIAL_SET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
                iterator = Subject.this.pubCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
                iterator = Subject.this.privCredentials.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
            // Check whether the caller has permisson to get
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
            // credentials of Class c
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
            while (iterator.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
                Object next;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
                if (which == Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
                    next = java.security.AccessController.doPrivileged
30033
b9c86c17164a 8078468: Update security libraries to use diamond with anonymous classes
darcy
parents: 29492
diff changeset
  1507
                        (new java.security.PrivilegedAction<>() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
                        public Object run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1509
                            return iterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
                    });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
                    next = iterator.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
                if (c.isAssignableFrom(next.getClass())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
                    if (which != Subject.PRIV_CREDENTIAL_SET) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
                        set.add((T)next);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
                        // Check permission for private creds
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
                        SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
                        if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
                            sm.checkPermission(new PrivateCredentialPermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
                                                (next.getClass().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
                                                Subject.this.getPrincipals()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
                        set.add((T)next);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
30438
c261149b9fff 8034820: Wrong isAssignableFrom test when adding Principal to Subject
mullan
parents: 30033
diff changeset
  1532
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
        public int size() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
            return set.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
30438
c261149b9fff 8034820: Wrong isAssignableFrom test when adding Principal to Subject
mullan
parents: 30033
diff changeset
  1537
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
        public Iterator<T> iterator() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
            return set.iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
30438
c261149b9fff 8034820: Wrong isAssignableFrom test when adding Principal to Subject
mullan
parents: 30033
diff changeset
  1542
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
        public boolean add(T o) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
30438
c261149b9fff 8034820: Wrong isAssignableFrom test when adding Principal to Subject
mullan
parents: 30033
diff changeset
  1545
            if (!c.isAssignableFrom(o.getClass())) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
                MessageFormat form = new MessageFormat(ResourcesMgr.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5506
diff changeset
  1547
                        ("attempting.to.add.an.object.which.is.not.an.instance.of.class"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1548
                Object[] source = {c.toString()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1549
                throw new SecurityException(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1550
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1551
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1552
            return set.add(o);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1553
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1554
    }
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1555
25989
6a57ce3f21f1 7026255: Methods of Subject that throw SecurityException do not specify what permissions are required
mullan
parents: 25188
diff changeset
  1556
    static final class AuthPermissionHolder {
4331
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1557
        static final AuthPermission DO_AS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1558
            new AuthPermission("doAs");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1559
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1560
        static final AuthPermission DO_AS_PRIVILEGED_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1561
            new AuthPermission("doAsPrivileged");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1562
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1563
        static final AuthPermission SET_READ_ONLY_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1564
            new AuthPermission("setReadOnly");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1565
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1566
        static final AuthPermission GET_SUBJECT_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1567
            new AuthPermission("getSubject");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1568
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1569
        static final AuthPermission MODIFY_PRINCIPALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1570
            new AuthPermission("modifyPrincipals");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1571
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1572
        static final AuthPermission MODIFY_PUBLIC_CREDENTIALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1573
            new AuthPermission("modifyPublicCredentials");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1574
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1575
        static final AuthPermission MODIFY_PRIVATE_CREDENTIALS_PERMISSION =
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1576
            new AuthPermission("modifyPrivateCredentials");
ba7050c934f2 6903638: Remove dependency on AuthPermission from SecurityConstants
mchung
parents: 2
diff changeset
  1577
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
}