| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package java.net; |
| |
| import java.security.Permission; |
| import java.security.PermissionCollection; |
| import java.util.Enumeration; |
| import java.util.Vector; |
| |
| /** |
| * This class represents a list of {@code SocketPermission} objects and provides |
| * a method to check whether or not a specific permission is implied by this |
| * {@code SocketPermissionCollection}. |
| */ |
| final class SocketPermissionCollection extends PermissionCollection { |
| |
| private static final long serialVersionUID = 2787186408602843674L; |
| |
| private Vector<Permission> permissions = new Vector<Permission>(); |
| |
| // Constructs a new instance of this class. |
| public SocketPermissionCollection() { |
| super(); |
| } |
| |
| // Adds the argument to the collection. |
| @Override |
| public void add(Permission permission) { |
| if (isReadOnly()) { |
| throw new IllegalStateException(); |
| } |
| if (!(permission instanceof SocketPermission)) { |
| throw new IllegalArgumentException(permission.toString()); |
| } |
| permissions.addElement(permission); |
| } |
| |
| // Returns an enumeration of the permissions |
| @Override |
| public Enumeration<Permission> elements() { |
| return permissions.elements(); |
| } |
| |
| /** |
| * Returns whether this permission collection implies {@code permission}. |
| * Basically it tests whether {@code permission} is the subset of this |
| * collection. |
| */ |
| @Override |
| public boolean implies(Permission permission) { |
| if (!(permission instanceof SocketPermission)) { |
| return false; |
| } |
| SocketPermission sp, argPerm = (SocketPermission) permission; |
| int pmask = argPerm.actionsMask; |
| int allMask = 0; |
| int i = 0, count = permissions.size(); |
| while ((i < count) && ((allMask & pmask) != pmask)) { |
| sp = (SocketPermission) permissions.elementAt(i); |
| if (sp.checkHost(argPerm)) { |
| if ((sp.actionsMask & SocketPermission.SP_RESOLVE) == SocketPermission.SP_RESOLVE) { |
| allMask |= SocketPermission.SP_RESOLVE; |
| } |
| // Only set flags if the port range and host can be implied |
| if ((argPerm.portMin >= sp.portMin) |
| && (argPerm.portMax <= sp.portMax)) { |
| if ((sp.actionsMask & SocketPermission.SP_CONNECT) == SocketPermission.SP_CONNECT) { |
| allMask |= SocketPermission.SP_CONNECT; |
| } |
| if ((sp.actionsMask & SocketPermission.SP_ACCEPT) == SocketPermission.SP_ACCEPT) { |
| allMask |= SocketPermission.SP_ACCEPT; |
| } |
| if ((sp.actionsMask & SocketPermission.SP_LISTEN) == SocketPermission.SP_LISTEN) { |
| allMask |= SocketPermission.SP_LISTEN; |
| } |
| } |
| } |
| ++i; |
| } |
| |
| return (allMask & pmask) == pmask; |
| } |
| } |