Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/src/share/classes/com/sun/security/jgss/GSSUtil.java
38924 views
1
/*
2
* Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
package com.sun.security.jgss;
27
28
import javax.security.auth.Subject;
29
import org.ietf.jgss.GSSName;
30
import org.ietf.jgss.GSSCredential;
31
32
/**
33
* GSS-API Utilities for using in conjunction with Sun Microsystem's
34
* implementation of Java GSS-API.
35
*/
36
@jdk.Exported
37
public class GSSUtil {
38
39
/**
40
* Use this method to convert a GSSName and GSSCredential into a
41
* Subject. Typically this would be done by a server that wants to
42
* impersonate a client thread at the Java level by setting a client
43
* Subject in the current access control context. If the server is merely
44
* interested in using a principal based policy in its local JVM, then
45
* it only needs to provide the GSSName of the client.
46
*
47
* The elements from the GSSName are placed in the principals set of this
48
* Subject and those from the GSSCredential are placed in the private
49
* credentials set of the Subject. Any Kerberos specific elements that
50
* are added to the subject will be instances of the standard Kerberos
51
* implementation classes defined in javax.security.auth.kerberos.
52
*
53
* @return a Subject with the entries that contain elements from the
54
* given GSSName and GSSCredential.
55
*
56
* @param principals a GSSName containing one or more mechanism specific
57
* representations of the same entity. These mechanism specific
58
* representations will be populated in the returned Subject's principal
59
* set.
60
*
61
* @param credentials a GSSCredential containing one or more mechanism
62
* specific credentials for the same entity. These mechanism specific
63
* credentials will be populated in the returned Subject's private
64
* credential set. Passing in a value of null will imply that the private
65
* credential set should be left empty.
66
*/
67
public static Subject createSubject(GSSName principals,
68
GSSCredential credentials) {
69
70
return sun.security.jgss.GSSUtil.getSubject(principals,
71
credentials);
72
}
73
}
74
75