Changeset 12244 in josm
- Timestamp:
- 2017-05-24T01:56:11+02:00 (8 years ago)
- Location:
- trunk
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/build.xml
r12243 r12244 144 144 <attribute name="Application-Name" value="JOSM - Java OpenStreetMap Editor"/> 145 145 <!-- Java 9 stuff. Entries are safely ignored by Java 8 --> 146 <attribute name="Add-Exports" value="java.base/sun.security.util j ava.base/sun.security.x509 jdk.deploy/com.sun.deploy.config" />147 <attribute name="Add-Opens" value="java. desktop/javax.swing.text.html java.prefs/java.util.prefs" />146 <attribute name="Add-Exports" value="java.base/sun.security.util jdk.deploy/com.sun.deploy.config" /> 147 <attribute name="Add-Opens" value="java.base/sun.security.x509 java.desktop/javax.swing.text.html java.prefs/java.util.prefs" /> 148 148 </manifest> 149 149 <zipfileset dir="images" prefix="images"/> … … 443 443 <jvmarg value="--add-exports" if:set="isJava9" /> 444 444 <jvmarg value="java.base/sun.security.util=ALL-UNNAMED" if:set="isJava9" /> 445 <jvmarg value="--add- exports" if:set="isJava9" />445 <jvmarg value="--add-opens" if:set="isJava9" /> 446 446 <jvmarg value="java.base/sun.security.x509=ALL-UNNAMED" if:set="isJava9" /> 447 447 <jvmarg value="--add-exports" if:set="isJava9" /> -
trunk/src/org/openstreetmap/josm/io/remotecontrol/DNSName.java
r11809 r12244 26 26 27 27 import java.io.IOException; 28 import java. util.Locale;28 import java.lang.reflect.Field; 29 29 30 import sun.security.util.DerOutputStream; 31 import sun.security.x509.GeneralNameInterface; 30 import org.openstreetmap.josm.tools.Utils; 32 31 33 32 /** … … 46 45 * be encoded as rfc822Name. 47 46 * 48 * This class has been copied from OpenJDK 7u repository and modified47 * This class has been copied from OpenJDK8u repository and modified 49 48 * in order to fix Java bug 8016345: 50 49 * https://bugs.openjdk.java.net/browse/JDK-8016345 51 50 * 52 * It can be deleted after a migration to a Java release fixing this bug. 51 * It can be deleted after a migration to a Java release fixing this bug: 52 * https://bugs.openjdk.java.net/browse/JDK-8054380 53 53 * <p> 54 54 * @author Amit Kapoor … … 57 57 * @since 7347 58 58 */ 59 public final class DNSName implements GeneralNameInterface { 60 private final String name; 59 public final class DNSName extends sun.security.x509.DNSName { 61 60 62 61 private static final String alpha = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; … … 71 70 */ 72 71 public DNSName(String name) throws IOException { 72 super("fake"); 73 73 if (name == null || name.isEmpty()) 74 74 throw new IOException("DNS name must not be null"); … … 95 95 } 96 96 } 97 this.name = name; 98 } 99 100 /** 101 * Return the type of the GeneralName. 102 * @return the type of the GeneralName 103 */ 104 @Override 105 public int getType() { 106 return GeneralNameInterface.NAME_DNS; 107 } 108 109 /** 110 * Return the actual name value of the GeneralName. 111 * @return the actual name value of the GeneralName 112 */ 113 public String getName() { 114 return name; 115 } 116 117 /** 118 * Encode the DNS name into the DerOutputStream. 119 * 120 * @param out the DER stream to encode the DNSName to. 121 * @throws IOException on encoding errors. 122 */ 123 @Override 124 public void encode(DerOutputStream out) throws IOException { 125 out.putIA5String(name); 126 } 127 128 /** 129 * Convert the name into user readable string. 130 */ 131 @Override 132 public String toString() { 133 return "DNSName: " + name; 134 } 135 136 /** 137 * Compares this name with another, for equality. 138 * 139 * @return true iff the names are equivalent 140 * according to RFC2459. 141 */ 142 @Override 143 public boolean equals(Object obj) { 144 if (this == obj) 145 return true; 146 147 if (!(obj instanceof DNSName)) 148 return false; 149 150 DNSName other = (DNSName) obj; 151 152 // RFC2459 mandates that these names are 153 // not case-sensitive 154 return name.equalsIgnoreCase(other.name); 155 } 156 157 /** 158 * Returns the hash code value for this object. 159 * 160 * @return a hash code value for this object. 161 */ 162 @Override 163 public int hashCode() { 164 return name.toUpperCase(Locale.ENGLISH).hashCode(); 165 } 166 167 /** 168 * Return type of constraint inputName places on this name:<ul> 169 * <li>NAME_DIFF_TYPE = -1: input name is different type from name (i.e. does not constrain). 170 * <li>NAME_MATCH = 0: input name matches name. 171 * <li>NAME_NARROWS = 1: input name narrows name (is lower in the naming subtree) 172 * <li>NAME_WIDENS = 2: input name widens name (is higher in the naming subtree) 173 * <li>NAME_SAME_TYPE = 3: input name does not match or narrow name, but is same type. 174 * </ul>. These results are used in checking NameConstraints during 175 * certification path verification. 176 * <p> 177 * RFC2459: DNS name restrictions are expressed as foo.bar.com. Any subdomain 178 * satisfies the name constraint. For example, www.foo.bar.com would 179 * satisfy the constraint but bigfoo.bar.com would not. 180 * <p> 181 * draft-ietf-pkix-new-part1-00.txt: DNS name restrictions are expressed as foo.bar.com. 182 * Any DNS name that 183 * can be constructed by simply adding to the left hand side of the name 184 * satisfies the name constraint. For example, www.foo.bar.com would 185 * satisfy the constraint but foo1.bar.com would not. 186 * <p> 187 * RFC1034: By convention, domain names can be stored with arbitrary case, but 188 * domain name comparisons for all present domain functions are done in a 189 * case-insensitive manner, assuming an ASCII character set, and a high 190 * order zero bit. 191 * <p> 192 * @param inputName to be checked for being constrained 193 * @return constraint type above 194 * @throws UnsupportedOperationException if name is not exact match, but narrowing and widening are 195 * not supported for this name type. 196 */ 197 @Override 198 public int constrains(GeneralNameInterface inputName) { 199 int constraintType; 200 if (inputName == null) 201 constraintType = NAME_DIFF_TYPE; 202 else if (inputName.getType() != NAME_DNS) 203 constraintType = NAME_DIFF_TYPE; 204 else { 205 if (!(inputName instanceof DNSName)) { 206 throw new IllegalArgumentException("inputName: " + inputName); 207 } 208 String inName = 209 (((DNSName) inputName).getName()).toLowerCase(Locale.ENGLISH); 210 String thisName = name.toLowerCase(Locale.ENGLISH); 211 if (inName.equals(thisName)) 212 constraintType = NAME_MATCH; 213 else if (thisName.endsWith(inName)) { 214 int inNdx = thisName.lastIndexOf(inName); 215 if (thisName.charAt(inNdx-1) == '.') 216 constraintType = NAME_WIDENS; 217 else 218 constraintType = NAME_SAME_TYPE; 219 } else if (inName.endsWith(thisName)) { 220 int ndx = inName.lastIndexOf(thisName); 221 if (inName.charAt(ndx-1) == '.') 222 constraintType = NAME_NARROWS; 223 else 224 constraintType = NAME_SAME_TYPE; 225 } else { 226 constraintType = NAME_SAME_TYPE; 227 } 97 try { 98 Field fName = getClass().getSuperclass().getDeclaredField("name"); 99 Utils.setObjectsAccessible(fName); 100 fName.set(this, name); 101 } catch (ReflectiveOperationException | SecurityException e) { 102 throw new IOException(e); 228 103 } 229 return constraintType;230 }231 232 /**233 * Return subtree depth of this name for purposes of determining234 * NameConstraints minimum and maximum bounds and for calculating235 * path lengths in name subtrees.236 *237 * @return distance of name from root238 * @throws UnsupportedOperationException if not supported for this name type239 */240 @Override241 public int subtreeDepth() {242 String subtree = name;243 int i = 1;244 245 /* count dots */246 for (; subtree.lastIndexOf('.') >= 0; i++) {247 subtree = subtree.substring(0, subtree.lastIndexOf('.'));248 }249 250 return i;251 104 } 252 105 } -
trunk/test/unit/org/openstreetmap/josm/io/remotecontrol/DNSNameTest.java
r10758 r12244 7 7 8 8 import org.junit.Test; 9 10 import nl.jqno.equalsverifier.EqualsVerifier;11 import nl.jqno.equalsverifier.Warning;12 9 13 10 /** … … 34 31 assertEquals("127.0.0.1", new DNSName("127.0.0.1").getName()); 35 32 } 36 37 /**38 * Unit test of methods {@link DNSName#equals} and {@link DNSName#hashCode}.39 */40 @Test41 public void testEqualsContract() {42 EqualsVerifier.forClass(DNSName.class).suppress(Warning.NULL_FIELDS).verify();43 }44 33 }
Note:
See TracChangeset
for help on using the changeset viewer.