|
JavaTM 2 Platform Std. Ed. v1.4.0 |
||||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |
java.lang.Object | +--java.security.Security
This class centralizes all security properties and common security methods. One of its primary uses is to manage providers.
Method Summary | |
static int |
addProvider(Provider provider)
Adds a provider to the next position available. |
static String |
getAlgorithmProperty(String algName,
String propName)
Deprecated. This method used to return the value of a proprietary property in the master file of the "SUN" Cryptographic Service Provider in order to determine how to parse algorithm-specific parameters. Use the new provider-based and algorithm-independent AlgorithmParameters and KeyFactory engine
classes (introduced in the Java 2 platform) instead. |
static Set |
getAlgorithms(String serviceName)
Returns a Set of Strings containing the names of all available algorithms or types for the specified Java cryptographic service (e.g., Signature, MessageDigest, Cipher, Mac, KeyStore). |
static String |
getProperty(String key)
Gets a security property value. |
static Provider |
getProvider(String name)
Returns the provider installed with the specified name, if any. |
static Provider[] |
getProviders()
Returns an array containing all the installed providers. |
static Provider[] |
getProviders(Map filter)
Returns an array containing all installed providers that satisfy the specified selection criteria, or null if no such providers have been installed. |
static Provider[] |
getProviders(String filter)
Returns an array containing all installed providers that satisfy the specified selection criterion, or null if no such providers have been installed. |
static int |
insertProviderAt(Provider provider,
int position)
Adds a new provider, at a specified position. |
static void |
removeProvider(String name)
Removes the provider with the specified name. |
static void |
setProperty(String key,
String datum)
Sets a security property value. |
Methods inherited from class java.lang.Object |
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait |
Method Detail |
public static String getAlgorithmProperty(String algName, String propName)
AlgorithmParameters
and KeyFactory
engine
classes (introduced in the Java 2 platform) instead.
algName
- the algorithm name.propName
- the name of the property to get.
public static int insertProviderAt(Provider provider, int position)
If the given provider is installed at the requested position,
the provider that used to be at that position, and all providers
with a position greater than position
, are shifted up
one position (towards the end of the list of installed providers).
A provider cannot be added if it is already installed.
First, if there is a security manager, its
checkSecurityAccess
method is called with the string
"insertProvider."+provider.getName()
to see if it's ok to add a new provider.
If the default implementation of checkSecurityAccess
is used (i.e., that method is not overriden), then this will result in
a call to the security manager's checkPermission
method
with a
SecurityPermission("insertProvider."+provider.getName())
permission.
provider
- the provider to be added.position
- the preference position that the caller would
like for this provider.
SecurityException
- if a security manager exists and its SecurityManager.checkSecurityAccess(java.lang.String)
method
denies access to add a new providergetProvider(java.lang.String)
,
removeProvider(java.lang.String)
,
SecurityPermission
public static int addProvider(Provider provider)
First, if there is a security manager, its
checkSecurityAccess
method is called with the string
"insertProvider."+provider.getName()
to see if it's ok to add a new provider.
If the default implementation of checkSecurityAccess
is used (i.e., that method is not overriden), then this will result in
a call to the security manager's checkPermission
method
with a
SecurityPermission("insertProvider."+provider.getName())
permission.
provider
- the provider to be added.
SecurityException
- if a security manager exists and its SecurityManager.checkSecurityAccess(java.lang.String)
method
denies access to add a new providergetProvider(java.lang.String)
,
removeProvider(java.lang.String)
,
SecurityPermission
public static void removeProvider(String name)
When the specified provider is removed, all providers located at a position greater than where the specified provider was are shifted down one position (towards the head of the list of installed providers).
This method returns silently if the provider is not installed.
First, if there is a security manager, its
checkSecurityAccess
method is called with the string "removeProvider."+name
to see if it's ok to remove the provider.
If the default implementation of checkSecurityAccess
is used (i.e., that method is not overriden), then this will result in
a call to the security manager's checkPermission
method
with a SecurityPermission("removeProvider."+name)
permission.
name
- the name of the provider to remove.
SecurityException
- if a security manager exists and its SecurityManager.checkSecurityAccess(java.lang.String)
method
denies
access to remove the providergetProvider(java.lang.String)
,
addProvider(java.security.Provider)
public static Provider[] getProviders()
public static Provider getProvider(String name)
name
- the name of the provider to get.
removeProvider(java.lang.String)
,
addProvider(java.security.Provider)
public static Provider[] getProviders(String filter)
A cryptographic service is always associated with a particular algorithm or type. For example, a digital signature service is always associated with a particular algorithm (e.g., DSA), and a CertificateFactory service is always associated with a particular certificate type (e.g., X.509).
The selection criterion must be specified in one of the following two formats:
The cryptographic service name must not contain any dots.
A provider satisfies the specified selection criterion iff the provider implements the specified algorithm or type for the specified cryptographic service.
For example, "CertificateFactory.X.509" would be satisfied by any provider that supplied a CertificateFactory implementation for X.509 certificates.
The cryptographic service name must not contain any dots. There must be one or more space charaters between the the <algorithm_or_type> and the <attribute_name>.
A provider satisfies this selection criterion iff the provider implements the specified algorithm or type for the specified cryptographic service and its implementation meets the constraint expressed by the specified attribute name/value pair.
For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied by any provider that implemented the SHA1withDSA signature algorithm with a keysize of 1024 (or larger).
See Appendix A in the Java Cryptogaphy Architecture API Specification & Reference for information about standard cryptographic service names, standard algorithm names and standard attribute names.
filter
- the criterion for selecting
providers. The filter is case-insensitive.
InvalidParameterException
- if the filter is not in the required formatpublic static Provider[] getProviders(Map filter)
The selection criteria are represented by a map. Each map entry represents a selection criterion. A provider is selected iff it satisfies all selection criteria. The key for any entry in such a map must be in one of the following two formats:
The cryptographic service name must not contain any dots.
The value associated with the key must be an empty string.
A provider satisfies this selection criterion iff the provider implements the specified algorithm or type for the specified cryptographic service.
The cryptographic service name must not contain any dots. There must be one or more space charaters between the <algorithm_or_type> and the <attribute_name>.
The value associated with the key must be a non-empty string. A provider satisfies this selection criterion iff the provider implements the specified algorithm or type for the specified cryptographic service and its implementation meets the constraint expressed by the specified attribute name/value pair.
See Appendix A in the Java Cryptogaphy Architecture API Specification & Reference for information about standard cryptographic service names, standard algorithm names and standard attribute names.
filter
- the criteria for selecting
providers. The filter is case-insensitive.
InvalidParameterException
- if the filter is not in the required formatpublic static String getProperty(String key)
First, if there is a security manager, its
checkPermission
method is called with a
java.security.SecurityPermission("getProperty."+key)
permission to see if it's ok to retrieve the specified
security property value..
key
- the key of the property being retrieved.
SecurityException
- if a security manager exists and its SecurityManager.checkPermission(java.security.Permission)
method
denies
access to retrieve the specified security property valuesetProperty(java.lang.String, java.lang.String)
,
SecurityPermission
public static void setProperty(String key, String datum)
First, if there is a security manager, its
checkPermission
method is called with a
java.security.SecurityPermission("setProperty."+key)
permission to see if it's ok to set the specified
security property value.
key
- the name of the property to be set.datum
- the value of the property to be set.
SecurityException
- if a security manager exists and its SecurityManager.checkPermission(java.security.Permission)
method
denies access to set the specified security property valuegetProperty(java.lang.String)
,
SecurityPermission
public static Set getAlgorithms(String serviceName)
serviceName
- the name of the Java cryptographic
service (e.g., Signature, MessageDigest, Cipher, Mac, KeyStore).
Note: this parameter is case-insensitive.
|
JavaTM 2 Platform Std. Ed. v1.4.0 |
||||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |
Java, Java 2D, and JDBC are trademarks or registered trademarks of Sun Microsystems, Inc. in the US and other countries.
Copyright 1993-2002 Sun Microsystems, Inc. 901 San Antonio Road
Palo Alto, California, 94303, U.S.A. All Rights Reserved.