mirror of
https://github.com/AngelAuraMC/Amethyst-Android.git
synced 2026-04-20 17:47:03 -04:00
Upload sources
This commit is contained in:
180
app/src/main/java/sun/misc/SharedSecrets.java
Normal file
180
app/src/main/java/sun/misc/SharedSecrets.java
Normal file
@@ -0,0 +1,180 @@
|
||||
/*
|
||||
* Copyright (c) 2002, 2011, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation. Oracle designates this
|
||||
* particular file as subject to the "Classpath" exception as provided
|
||||
* by Oracle in the LICENSE file that accompanied this code.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
package sun.misc;
|
||||
|
||||
import java.util.jar.JarFile;
|
||||
import java.io.Console;
|
||||
import java.io.FileDescriptor;
|
||||
import java.security.ProtectionDomain;
|
||||
import java.util.zip.Adler32;
|
||||
//import javax.security.auth.kerberos.KeyTab;
|
||||
|
||||
import java.security.AccessController;
|
||||
|
||||
/** A repository of "shared secrets", which are a mechanism for
|
||||
calling implementation-private methods in another package without
|
||||
using reflection. A package-private class implements a public
|
||||
interface and provides the ability to call package-private methods
|
||||
within that package; the object implementing that interface is
|
||||
provided through a third package to which access is restricted.
|
||||
This framework avoids the primary disadvantage of using reflection
|
||||
for this purpose, namely the loss of compile-time checking. */
|
||||
|
||||
public class SharedSecrets {
|
||||
private static final FakeUnsafe FakeUnsafe = FakeUnsafe.getUnsafe();
|
||||
private static JavaUtilJarAccess javaUtilJarAccess;
|
||||
//private static JavaLangAccess javaLangAccess;
|
||||
private static JavaIOAccess javaIOAccess;
|
||||
//private static JavaNetAccess javaNetAccess;
|
||||
private static JavaNetHttpCookieAccess javaNetHttpCookieAccess;
|
||||
private static JavaNioAccess javaNioAccess;
|
||||
private static JavaIOFileDescriptorAccess javaIOFileDescriptorAccess;
|
||||
private static JavaSecurityProtectionDomainAccess javaSecurityProtectionDomainAccess;
|
||||
//private static JavaSecurityAccess javaSecurityAccess;
|
||||
//private static JavaxSecurityAuthKerberosAccess javaxSecurityAuthKerberosAccess;
|
||||
private static JavaUtilZipAccess javaUtilZipAccess;
|
||||
|
||||
public static JavaUtilJarAccess javaUtilJarAccess() {
|
||||
if (javaUtilJarAccess == null) {
|
||||
// Ensure JarFile is initialized; we know that that class
|
||||
// provides the shared secret
|
||||
FakeUnsafe.ensureClassInitialized(JarFile.class);
|
||||
}
|
||||
return javaUtilJarAccess;
|
||||
}
|
||||
|
||||
public static void setJavaUtilJarAccess(JavaUtilJarAccess access) {
|
||||
javaUtilJarAccess = access;
|
||||
}
|
||||
/*
|
||||
public static void setJavaLangAccess(JavaLangAccess jla) {
|
||||
javaLangAccess = jla;
|
||||
}
|
||||
|
||||
public static JavaLangAccess getJavaLangAccess() {
|
||||
return javaLangAccess;
|
||||
}
|
||||
|
||||
public static void setJavaNetAccess(JavaNetAccess jna) {
|
||||
javaNetAccess = jna;
|
||||
}
|
||||
|
||||
public static JavaNetAccess getJavaNetAccess() {
|
||||
return javaNetAccess;
|
||||
}
|
||||
*/
|
||||
public static void setJavaNetHttpCookieAccess(JavaNetHttpCookieAccess a) {
|
||||
javaNetHttpCookieAccess = a;
|
||||
}
|
||||
|
||||
public static JavaNetHttpCookieAccess getJavaNetHttpCookieAccess() {
|
||||
if (javaNetHttpCookieAccess == null)
|
||||
FakeUnsafe.ensureClassInitialized(java.net.HttpCookie.class);
|
||||
return javaNetHttpCookieAccess;
|
||||
}
|
||||
|
||||
public static void setJavaNioAccess(JavaNioAccess jna) {
|
||||
javaNioAccess = jna;
|
||||
}
|
||||
|
||||
public static JavaNioAccess getJavaNioAccess() {
|
||||
if (javaNioAccess == null) {
|
||||
// Ensure java.nio.ByteOrder is initialized; we know that
|
||||
// this class initializes java.nio.Bits that provides the
|
||||
// shared secret.
|
||||
FakeUnsafe.ensureClassInitialized(java.nio.ByteOrder.class);
|
||||
}
|
||||
return javaNioAccess;
|
||||
}
|
||||
|
||||
public static void setJavaIOAccess(JavaIOAccess jia) {
|
||||
javaIOAccess = jia;
|
||||
}
|
||||
|
||||
public static JavaIOAccess getJavaIOAccess() {
|
||||
if (javaIOAccess == null) {
|
||||
FakeUnsafe.ensureClassInitialized(Console.class);
|
||||
}
|
||||
return javaIOAccess;
|
||||
}
|
||||
|
||||
public static void setJavaIOFileDescriptorAccess(JavaIOFileDescriptorAccess jiofda) {
|
||||
javaIOFileDescriptorAccess = jiofda;
|
||||
}
|
||||
|
||||
public static JavaIOFileDescriptorAccess getJavaIOFileDescriptorAccess() {
|
||||
if (javaIOFileDescriptorAccess == null)
|
||||
FakeUnsafe.ensureClassInitialized(FileDescriptor.class);
|
||||
|
||||
return javaIOFileDescriptorAccess;
|
||||
}
|
||||
|
||||
public static void setJavaSecurityProtectionDomainAccess
|
||||
(JavaSecurityProtectionDomainAccess jspda) {
|
||||
javaSecurityProtectionDomainAccess = jspda;
|
||||
}
|
||||
|
||||
public static JavaSecurityProtectionDomainAccess
|
||||
getJavaSecurityProtectionDomainAccess() {
|
||||
if (javaSecurityProtectionDomainAccess == null)
|
||||
FakeUnsafe.ensureClassInitialized(ProtectionDomain.class);
|
||||
return javaSecurityProtectionDomainAccess;
|
||||
}
|
||||
/*
|
||||
public static void setJavaSecurityAccess(JavaSecurityAccess jsa) {
|
||||
javaSecurityAccess = jsa;
|
||||
}
|
||||
|
||||
public static JavaSecurityAccess getJavaSecurityAccess() {
|
||||
if (javaSecurityAccess == null) {
|
||||
FakeUnsafe.ensureClassInitialized(AccessController.class);
|
||||
}
|
||||
return javaSecurityAccess;
|
||||
}
|
||||
|
||||
public static void setJavaxSecurityAuthKerberosAccess
|
||||
(JavaxSecurityAuthKerberosAccess jsaka) {
|
||||
javaxSecurityAuthKerberosAccess = jsaka;
|
||||
}
|
||||
|
||||
public static JavaxSecurityAuthKerberosAccess
|
||||
getJavaxSecurityAuthKerberosAccess() {
|
||||
if (javaxSecurityAuthKerberosAccess == null)
|
||||
FakeUnsafe.ensureClassInitialized(KeyTab.class);
|
||||
return javaxSecurityAuthKerberosAccess;
|
||||
}
|
||||
*/
|
||||
public static void setJavaUtilZipAccess(JavaUtilZipAccess access) {
|
||||
javaUtilZipAccess = access;
|
||||
}
|
||||
|
||||
public static JavaUtilZipAccess getJavaUtilZipAccess() {
|
||||
if (javaUtilZipAccess == null) {
|
||||
FakeUnsafe.ensureClassInitialized(Adler32.class);
|
||||
}
|
||||
return javaUtilZipAccess;
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user