GNU Classpath (0.20) | |
Frames | No Frames |
1: /* Security.java --- Java base security class implementation 2: Copyright (C) 1999, 2001, 2002, 2003, 2004, 2005, 2006 3: Free Software Foundation, Inc. 4: 5: This file is part of GNU Classpath. 6: 7: GNU Classpath is free software; you can redistribute it and/or modify 8: it under the terms of the GNU General Public License as published by 9: the Free Software Foundation; either version 2, or (at your option) 10: any later version. 11: 12: GNU Classpath is distributed in the hope that it will be useful, but 13: WITHOUT ANY WARRANTY; without even the implied warranty of 14: MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 15: General Public License for more details. 16: 17: You should have received a copy of the GNU General Public License 18: along with GNU Classpath; see the file COPYING. If not, write to the 19: Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 20: 02110-1301 USA. 21: 22: Linking this library statically or dynamically with other modules is 23: making a combined work based on this library. Thus, the terms and 24: conditions of the GNU General Public License cover the whole 25: combination. 26: 27: As a special exception, the copyright holders of this library give you 28: permission to link this library with independent modules to produce an 29: executable, regardless of the license terms of these independent 30: modules, and to copy and distribute the resulting executable under 31: terms of your choice, provided that you also meet, for each linked 32: independent module, the terms and conditions of the license of that 33: module. An independent module is a module which is not derived from 34: or based on this library. If you modify this library, you may extend 35: this exception to your version of the library, but you are not 36: obligated to do so. If you do not wish to do so, delete this 37: exception statement from your version. */ 38: 39: 40: package java.security; 41: 42: import gnu.classpath.SystemProperties; 43: 44: import gnu.classpath.Configuration; 45: import gnu.classpath.VMStackWalker; 46: 47: import java.io.IOException; 48: import java.io.InputStream; 49: import java.net.URL; 50: import java.util.Collections; 51: import java.util.Enumeration; 52: import java.util.HashMap; 53: import java.util.HashSet; 54: import java.util.Iterator; 55: import java.util.LinkedHashSet; 56: import java.util.Map; 57: import java.util.Properties; 58: import java.util.Set; 59: import java.util.Vector; 60: 61: /** 62: * This class centralizes all security properties and common security methods. 63: * One of its primary uses is to manage providers. 64: * 65: * @author Mark Benvenuto (ivymccough@worldnet.att.net) 66: */ 67: public final class Security 68: { 69: private static final String ALG_ALIAS = "Alg.Alias."; 70: 71: private static Vector providers = new Vector(); 72: private static Properties secprops = new Properties(); 73: 74: static 75: { 76: String base = SystemProperties.getProperty("gnu.classpath.home.url"); 77: String vendor = SystemProperties.getProperty("gnu.classpath.vm.shortname"); 78: 79: // Try VM specific security file 80: boolean loaded = loadProviders (base, vendor); 81: 82: // Append classpath standard provider if possible 83: if (!loadProviders (base, "classpath") 84: && !loaded 85: && providers.size() == 0) 86: { 87: if (Configuration.DEBUG) 88: { 89: /* No providers found and both security files failed to 90: * load properly. Give a warning in case of DEBUG is 91: * enabled. Could be done with java.util.logging later. 92: */ 93: System.err.println 94: ("WARNING: could not properly read security provider files:"); 95: System.err.println 96: (" " + base + "/security/" + vendor 97: + ".security"); 98: System.err.println 99: (" " + base + "/security/" + "classpath" 100: + ".security"); 101: System.err.println 102: (" Falling back to standard GNU security provider"); 103: } 104: providers.addElement (new gnu.java.security.provider.Gnu()); 105: } 106: } 107: // This class can't be instantiated. 108: private Security() 109: { 110: } 111: 112: /** 113: * Tries to load the vender specific security providers from the given 114: * base URL. Returns true if the resource could be read and completely 115: * parsed successfully, false otherwise. 116: */ 117: private static boolean loadProviders(String baseUrl, String vendor) 118: { 119: if (baseUrl == null || vendor == null) 120: return false; 121: 122: boolean result = true; 123: String secfilestr = baseUrl + "/security/" + vendor + ".security"; 124: try 125: { 126: InputStream fin = new URL(secfilestr).openStream(); 127: secprops.load(fin); 128: 129: int i = 1; 130: String name; 131: while ((name = secprops.getProperty("security.provider." + i)) != null) 132: { 133: Exception exception = null; 134: try 135: { 136: providers.addElement(Class.forName(name).newInstance()); 137: } 138: catch (ClassNotFoundException x) 139: { 140: exception = x; 141: } 142: catch (InstantiationException x) 143: { 144: exception = x; 145: } 146: catch (IllegalAccessException x) 147: { 148: exception = x; 149: } 150: 151: if (exception != null) 152: { 153: System.err.println ("WARNING: Error loading security provider " 154: + name + ": " + exception); 155: result = false; 156: } 157: i++; 158: } 159: } 160: catch (IOException ignored) 161: { 162: result = false; 163: } 164: 165: return result; 166: } 167: 168: /** 169: * Gets a specified property for an algorithm. The algorithm name should be a 170: * standard name. See Appendix A in the Java Cryptography Architecture API 171: * Specification & Reference for information about standard algorithm 172: * names. One possible use is by specialized algorithm parsers, which may map 173: * classes to algorithms which they understand (much like {@link Key} parsers 174: * do). 175: * 176: * @param algName the algorithm name. 177: * @param propName the name of the property to get. 178: * @return the value of the specified property. 179: * @deprecated This method used to return the value of a proprietary property 180: * in the master file of the "SUN" Cryptographic Service Provider in order to 181: * determine how to parse algorithm-specific parameters. Use the new 182: * provider-based and algorithm-independent {@link AlgorithmParameters} and 183: * {@link KeyFactory} engine classes (introduced in the Java 2 platform) 184: * instead. 185: */ 186: public static String getAlgorithmProperty(String algName, String propName) 187: { 188: if (algName == null || propName == null) 189: return null; 190: 191: String property = String.valueOf(propName) + "." + String.valueOf(algName); 192: Provider p; 193: for (Iterator i = providers.iterator(); i.hasNext(); ) 194: { 195: p = (Provider) i.next(); 196: for (Iterator j = p.keySet().iterator(); j.hasNext(); ) 197: { 198: String key = (String) j.next(); 199: if (key.equalsIgnoreCase(property)) 200: return p.getProperty(key); 201: } 202: } 203: return null; 204: } 205: 206: /** 207: * <p>Adds a new provider, at a specified position. The position is the 208: * preference order in which providers are searched for requested algorithms. 209: * Note that it is not guaranteed that this preference will be respected. The 210: * position is 1-based, that is, <code>1</code> is most preferred, followed by 211: * <code>2</code>, and so on.</p> 212: * 213: * <p>If the given provider is installed at the requested position, the 214: * provider that used to be at that position, and all providers with a 215: * position greater than position, are shifted up one position (towards the 216: * end of the list of installed providers).</p> 217: * 218: * <p>A provider cannot be added if it is already installed.</p> 219: * 220: * <p>First, if there is a security manager, its <code>checkSecurityAccess() 221: * </code> method is called with the string <code>"insertProvider."+provider. 222: * getName()</code> to see if it's ok to add a new provider. If the default 223: * implementation of <code>checkSecurityAccess()</code> is used (i.e., that 224: * method is not overriden), then this will result in a call to the security 225: * manager's <code>checkPermission()</code> method with a 226: * <code>SecurityPermission("insertProvider."+provider.getName())</code> 227: * permission.</p> 228: * 229: * @param provider the provider to be added. 230: * @param position the preference position that the caller would like for 231: * this provider. 232: * @return the actual preference position in which the provider was added, or 233: * <code>-1</code> if the provider was not added because it is already 234: * installed. 235: * @throws SecurityException if a security manager exists and its 236: * {@link SecurityManager#checkSecurityAccess(String)} method denies access 237: * to add a new provider. 238: * @see #getProvider(String) 239: * @see #removeProvider(String) 240: * @see SecurityPermission 241: */ 242: public static int insertProviderAt(Provider provider, int position) 243: { 244: SecurityManager sm = System.getSecurityManager(); 245: if (sm != null) 246: sm.checkSecurityAccess("insertProvider." + provider.getName()); 247: 248: position--; 249: int max = providers.size (); 250: for (int i = 0; i < max; i++) 251: { 252: if (((Provider) providers.elementAt(i)).getName().equals(provider.getName())) 253: return -1; 254: } 255: 256: if (position < 0) 257: position = 0; 258: if (position > max) 259: position = max; 260: 261: providers.insertElementAt(provider, position); 262: 263: return position + 1; 264: } 265: 266: /** 267: * <p>Adds a provider to the next position available.</p> 268: * 269: * <p>First, if there is a security manager, its <code>checkSecurityAccess() 270: * </code> method is called with the string <code>"insertProvider."+provider. 271: * getName()</code> to see if it's ok to add a new provider. If the default 272: * implementation of <code>checkSecurityAccess()</code> is used (i.e., that 273: * method is not overriden), then this will result in a call to the security 274: * manager's <code>checkPermission()</code> method with a 275: * <code>SecurityPermission("insertProvider."+provider.getName())</code> 276: * permission.</p> 277: * 278: * @param provider the provider to be added. 279: * @return the preference position in which the provider was added, or 280: * <code>-1</code> if the provider was not added because it is already 281: * installed. 282: * @throws SecurityException if a security manager exists and its 283: * {@link SecurityManager#checkSecurityAccess(String)} method denies access 284: * to add a new provider. 285: * @see #getProvider(String) 286: * @see #removeProvider(String) 287: * @see SecurityPermission 288: */ 289: public static int addProvider(Provider provider) 290: { 291: return insertProviderAt (provider, providers.size () + 1); 292: } 293: 294: /** 295: * <p>Removes the provider with the specified name.</p> 296: * 297: * <p>When the specified provider is removed, all providers located at a 298: * position greater than where the specified provider was are shifted down 299: * one position (towards the head of the list of installed providers).</p> 300: * 301: * <p>This method returns silently if the provider is not installed.</p> 302: * 303: * <p>First, if there is a security manager, its <code>checkSecurityAccess() 304: * </code> method is called with the string <code>"removeProvider."+name</code> 305: * to see if it's ok to remove the provider. If the default implementation of 306: * <code>checkSecurityAccess()</code> is used (i.e., that method is not 307: * overriden), then this will result in a call to the security manager's 308: * <code>checkPermission()</code> method with a <code>SecurityPermission( 309: * "removeProvider."+name)</code> permission.</p> 310: * 311: * @param name the name of the provider to remove. 312: * @throws SecurityException if a security manager exists and its 313: * {@link SecurityManager#checkSecurityAccess(String)} method denies access 314: * to remove the provider. 315: * @see #getProvider(String) 316: * @see #addProvider(Provider) 317: */ 318: public static void removeProvider(String name) 319: { 320: SecurityManager sm = System.getSecurityManager(); 321: if (sm != null) 322: sm.checkSecurityAccess("removeProvider." + name); 323: 324: int max = providers.size (); 325: for (int i = 0; i < max; i++) 326: { 327: if (((Provider) providers.elementAt(i)).getName().equals(name)) 328: { 329: providers.remove(i); 330: break; 331: } 332: } 333: } 334: 335: /** 336: * Returns an array containing all the installed providers. The order of the 337: * providers in the array is their preference order. 338: * 339: * @return an array of all the installed providers. 340: */ 341: public static Provider[] getProviders() 342: { 343: Provider[] array = new Provider[providers.size ()]; 344: providers.copyInto (array); 345: return array; 346: } 347: 348: /** 349: * Returns the provider installed with the specified name, if any. Returns 350: * <code>null</code> if no provider with the specified name is installed. 351: * 352: * @param name the name of the provider to get. 353: * @return the provider of the specified name. 354: * @see #removeProvider(String) 355: * @see #addProvider(Provider) 356: */ 357: public static Provider getProvider(String name) 358: { 359: if (name == null) 360: return null; 361: else 362: { 363: name = name.trim(); 364: if (name.length() == 0) 365: return null; 366: } 367: Provider p; 368: int max = providers.size (); 369: for (int i = 0; i < max; i++) 370: { 371: p = (Provider) providers.elementAt(i); 372: if (p.getName().equals(name)) 373: return p; 374: } 375: return null; 376: } 377: 378: /** 379: * <p>Gets a security property value.</p> 380: * 381: * <p>First, if there is a security manager, its <code>checkPermission()</code> 382: * method is called with a <code>SecurityPermission("getProperty."+key)</code> 383: * permission to see if it's ok to retrieve the specified security property 384: * value.</p> 385: * 386: * @param key the key of the property being retrieved. 387: * @return the value of the security property corresponding to key. 388: * @throws SecurityException if a security manager exists and its 389: * {@link SecurityManager#checkPermission(Permission)} method denies access 390: * to retrieve the specified security property value. 391: * @see #setProperty(String, String) 392: * @see SecurityPermission 393: */ 394: public static String getProperty(String key) 395: { 396: // XXX To prevent infinite recursion when the SecurityManager calls us, 397: // don't do a security check if the caller is trusted (by virtue of having 398: // been loaded by the bootstrap class loader). 399: SecurityManager sm = System.getSecurityManager(); 400: if (sm != null && VMStackWalker.getCallingClassLoader() != null) 401: sm.checkSecurityAccess("getProperty." + key); 402: 403: return secprops.getProperty(key); 404: } 405: 406: /** 407: * <p>Sets a security property value.</p> 408: * 409: * <p>First, if there is a security manager, its <code>checkPermission()</code> 410: * method is called with a <code>SecurityPermission("setProperty."+key)</code> 411: * permission to see if it's ok to set the specified security property value. 412: * </p> 413: * 414: * @param key the name of the property to be set. 415: * @param datum the value of the property to be set. 416: * @throws SecurityException if a security manager exists and its 417: * {@link SecurityManager#checkPermission(Permission)} method denies access 418: * to set the specified security property value. 419: * @see #getProperty(String) 420: * @see SecurityPermission 421: */ 422: public static void setProperty(String key, String datum) 423: { 424: SecurityManager sm = System.getSecurityManager(); 425: if (sm != null) 426: sm.checkSecurityAccess("setProperty." + key); 427: 428: if (datum == null) 429: secprops.remove(key); 430: else 431: secprops.put(key, datum); 432: } 433: 434: /** 435: * Returns a Set of Strings containing the names of all available algorithms 436: * or types for the specified Java cryptographic service (e.g., Signature, 437: * MessageDigest, Cipher, Mac, KeyStore). Returns an empty Set if there is no 438: * provider that supports the specified service. For a complete list of Java 439: * cryptographic services, please see the Java Cryptography Architecture API 440: * Specification & Reference. Note: the returned set is immutable. 441: * 442: * @param serviceName the name of the Java cryptographic service (e.g., 443: * Signature, MessageDigest, Cipher, Mac, KeyStore). Note: this parameter is 444: * case-insensitive. 445: * @return a Set of Strings containing the names of all available algorithms 446: * or types for the specified Java cryptographic service or an empty set if 447: * no provider supports the specified service. 448: * @since 1.4 449: */ 450: public static Set getAlgorithms(String serviceName) 451: { 452: HashSet result = new HashSet(); 453: if (serviceName == null || serviceName.length() == 0) 454: return result; 455: 456: serviceName = serviceName.trim(); 457: if (serviceName.length() == 0) 458: return result; 459: 460: serviceName = serviceName.toUpperCase()+"."; 461: Provider[] providers = getProviders(); 462: int ndx; 463: for (int i = 0; i < providers.length; i++) 464: for (Enumeration e = providers[i].propertyNames(); e.hasMoreElements(); ) 465: { 466: String service = ((String) e.nextElement()).trim(); 467: if (service.toUpperCase().startsWith(serviceName)) 468: { 469: service = service.substring(serviceName.length()).trim(); 470: ndx = service.indexOf(' '); // get rid of attributes 471: if (ndx != -1) 472: service = service.substring(0, ndx); 473: result.add(service); 474: } 475: } 476: return Collections.unmodifiableSet(result); 477: } 478: 479: /** 480: * <p>Returns an array containing all installed providers that satisfy the 481: * specified selection criterion, or <code>null</code> if no such providers 482: * have been installed. The returned providers are ordered according to their 483: * preference order.</p> 484: * 485: * <p>A cryptographic service is always associated with a particular 486: * algorithm or type. For example, a digital signature service is always 487: * associated with a particular algorithm (e.g., <i>DSA</i>), and a 488: * CertificateFactory service is always associated with a particular 489: * certificate type (e.g., <i>X.509</i>).</p> 490: * 491: * <p>The selection criterion must be specified in one of the following two 492: * formats:</p> 493: * 494: * <ul> 495: * <li><p><crypto_service>.<algorithm_or_type></p> 496: * <p>The cryptographic service name must not contain any dots.</p> 497: * <p>A provider satisfies the specified selection criterion iff the 498: * provider implements the specified algorithm or type for the specified 499: * cryptographic service.</p> 500: * <p>For example, "CertificateFactory.X.509" would be satisfied by any 501: * provider that supplied a CertificateFactory implementation for X.509 502: * certificates.</p></li> 503: * 504: * <li><p><crypto_service>.<algorithm_or_type> <attribute_name>:<attribute_value></p> 505: * <p>The cryptographic service name must not contain any dots. There must 506: * be one or more space charaters between the the <algorithm_or_type> 507: * and the <attribute_name>.</p> 508: * <p>A provider satisfies this selection criterion iff the provider 509: * implements the specified algorithm or type for the specified 510: * cryptographic service and its implementation meets the constraint 511: * expressed by the specified attribute name/value pair.</p> 512: * <p>For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied 513: * by any provider that implemented the SHA1withDSA signature algorithm 514: * with a keysize of 1024 (or larger).</p></li> 515: * </ul> 516: * 517: * <p>See Appendix A in the Java Cryptogaphy Architecture API Specification 518: * & Reference for information about standard cryptographic service names, 519: * standard algorithm names and standard attribute names.</p> 520: * 521: * @param filter the criterion for selecting providers. The filter is case- 522: * insensitive. 523: * @return all the installed providers that satisfy the selection criterion, 524: * or null if no such providers have been installed. 525: * @throws InvalidParameterException if the filter is not in the required 526: * format. 527: * @see #getProviders(Map) 528: */ 529: public static Provider[] getProviders(String filter) 530: { 531: if (providers == null || providers.isEmpty()) 532: return null; 533: 534: if (filter == null || filter.length() == 0) 535: return getProviders(); 536: 537: HashMap map = new HashMap(1); 538: int i = filter.indexOf(':'); 539: if (i == -1) // <service>.<algorithm> 540: map.put(filter, ""); 541: else // <service>.<algorithm> <attribute>:<value> 542: map.put(filter.substring(0, i), filter.substring(i+1)); 543: 544: return getProviders(map); 545: } 546: 547: /** 548: * <p>Returns an array containing all installed providers that satisfy the 549: * specified selection criteria, or <code>null</code> if no such providers 550: * have been installed. The returned providers are ordered according to their 551: * preference order.</p> 552: * 553: * <p>The selection criteria are represented by a map. Each map entry 554: * represents a selection criterion. A provider is selected iff it satisfies 555: * all selection criteria. The key for any entry in such a map must be in one 556: * of the following two formats:</p> 557: * 558: * <ul> 559: * <li><p><crypto_service>.<algorithm_or_type></p> 560: * <p>The cryptographic service name must not contain any dots.</p> 561: * <p>The value associated with the key must be an empty string.</p> 562: * <p>A provider satisfies this selection criterion iff the provider 563: * implements the specified algorithm or type for the specified 564: * cryptographic service.</p></li> 565: * 566: * <li><p><crypto_service>.<algorithm_or_type> <attribute_name></p> 567: * <p>The cryptographic service name must not contain any dots. There must 568: * be one or more space charaters between the <algorithm_or_type> and 569: * the <attribute_name>.</p> 570: * <p>The value associated with the key must be a non-empty string. A 571: * provider satisfies this selection criterion iff the provider implements 572: * the specified algorithm or type for the specified cryptographic service 573: * and its implementation meets the constraint expressed by the specified 574: * attribute name/value pair.</p></li> 575: * </ul> 576: * 577: * <p>See Appendix A in the Java Cryptogaphy Architecture API Specification 578: * & Reference for information about standard cryptographic service names, 579: * standard algorithm names and standard attribute names.</p> 580: * 581: * @param filter the criteria for selecting providers. The filter is case- 582: * insensitive. 583: * @return all the installed providers that satisfy the selection criteria, 584: * or <code>null</code> if no such providers have been installed. 585: * @throws InvalidParameterException if the filter is not in the required 586: * format. 587: * @see #getProviders(String) 588: */ 589: public static Provider[] getProviders(Map filter) 590: { 591: if (providers == null || providers.isEmpty()) 592: return null; 593: 594: if (filter == null) 595: return getProviders(); 596: 597: Set querries = filter.keySet(); 598: if (querries == null || querries.isEmpty()) 599: return getProviders(); 600: 601: LinkedHashSet result = new LinkedHashSet(providers); // assume all 602: int dot, ws; 603: String querry, service, algorithm, attribute, value; 604: LinkedHashSet serviceProviders = new LinkedHashSet(); // preserve insertion order 605: for (Iterator i = querries.iterator(); i.hasNext(); ) 606: { 607: querry = (String) i.next(); 608: if (querry == null) // all providers 609: continue; 610: 611: querry = querry.trim(); 612: if (querry.length() == 0) // all providers 613: continue; 614: 615: dot = querry.indexOf('.'); 616: if (dot == -1) // syntax error 617: throw new InvalidParameterException( 618: "missing dot in '" + String.valueOf(querry)+"'"); 619: 620: value = (String) filter.get(querry); 621: // deconstruct querry into [service, algorithm, attribute] 622: if (value == null || value.trim().length() == 0) // <service>.<algorithm> 623: { 624: value = null; 625: attribute = null; 626: service = querry.substring(0, dot).trim(); 627: algorithm = querry.substring(dot+1).trim(); 628: } 629: else // <service>.<algorithm> <attribute> 630: { 631: ws = querry.indexOf(' '); 632: if (ws == -1) 633: throw new InvalidParameterException( 634: "value (" + String.valueOf(value) + 635: ") is not empty, but querry (" + String.valueOf(querry) + 636: ") is missing at least one space character"); 637: value = value.trim(); 638: attribute = querry.substring(ws+1).trim(); 639: // was the dot in the attribute? 640: if (attribute.indexOf('.') != -1) 641: throw new InvalidParameterException( 642: "attribute_name (" + String.valueOf(attribute) + 643: ") in querry (" + String.valueOf(querry) + ") contains a dot"); 644: 645: querry = querry.substring(0, ws).trim(); 646: service = querry.substring(0, dot).trim(); 647: algorithm = querry.substring(dot+1).trim(); 648: } 649: 650: // service and algorithm must not be empty 651: if (service.length() == 0) 652: throw new InvalidParameterException( 653: "<crypto_service> in querry (" + String.valueOf(querry) + 654: ") is empty"); 655: 656: if (algorithm.length() == 0) 657: throw new InvalidParameterException( 658: "<algorithm_or_type> in querry (" + String.valueOf(querry) + 659: ") is empty"); 660: 661: selectProviders(service, algorithm, attribute, value, result, serviceProviders); 662: result.retainAll(serviceProviders); // eval next retaining found providers 663: if (result.isEmpty()) // no point continuing 664: break; 665: } 666: 667: if (result.isEmpty()) 668: return null; 669: 670: return (Provider[]) result.toArray(new Provider[result.size()]); 671: } 672: 673: private static void selectProviders(String svc, String algo, String attr, 674: String val, LinkedHashSet providerSet, 675: LinkedHashSet result) 676: { 677: result.clear(); // ensure we start with an empty result set 678: for (Iterator i = providerSet.iterator(); i.hasNext(); ) 679: { 680: Provider p = (Provider) i.next(); 681: if (provides(p, svc, algo, attr, val)) 682: result.add(p); 683: } 684: } 685: 686: private static boolean provides(Provider p, String svc, String algo, 687: String attr, String val) 688: { 689: Iterator it; 690: String serviceDotAlgorithm = null; 691: String key = null; 692: String realVal; 693: boolean found = false; 694: // if <svc>.<algo> <attr> is in the set then so is <svc>.<algo> 695: // but it may be stored under an alias <algo>. resolve 696: outer: for (int r = 0; r < 3; r++) // guard against circularity 697: { 698: serviceDotAlgorithm = (svc+"."+String.valueOf(algo)).trim(); 699: for (it = p.keySet().iterator(); it.hasNext(); ) 700: { 701: key = (String) it.next(); 702: if (key.equalsIgnoreCase(serviceDotAlgorithm)) // eureka 703: { 704: found = true; 705: break outer; 706: } 707: // it may be there but as an alias 708: if (key.equalsIgnoreCase(ALG_ALIAS + serviceDotAlgorithm)) 709: { 710: algo = p.getProperty(key); 711: continue outer; 712: } 713: // else continue inner 714: } 715: } 716: 717: if (!found) 718: return false; 719: 720: // found a candidate for the querry. do we have an attr to match? 721: if (val == null) // <service>.<algorithm> querry 722: return true; 723: 724: // <service>.<algorithm> <attribute>; find the key entry that match 725: String realAttr; 726: int limit = serviceDotAlgorithm.length() + 1; 727: for (it = p.keySet().iterator(); it.hasNext(); ) 728: { 729: key = (String) it.next(); 730: if (key.length() <= limit) 731: continue; 732: 733: if (key.substring(0, limit).equalsIgnoreCase(serviceDotAlgorithm+" ")) 734: { 735: realAttr = key.substring(limit).trim(); 736: if (! realAttr.equalsIgnoreCase(attr)) 737: continue; 738: 739: // eveything matches so far. do the value 740: realVal = p.getProperty(key); 741: if (realVal == null) 742: return false; 743: 744: realVal = realVal.trim(); 745: // is it a string value? 746: if (val.equalsIgnoreCase(realVal)) 747: return true; 748: 749: // assume value is a number. cehck for greater-than-or-equal 750: return (new Integer(val).intValue() >= new Integer(realVal).intValue()); 751: } 752: } 753: 754: return false; 755: } 756: }
GNU Classpath (0.20) |