Lines Matching refs:codebase

82      * value of "java.rmi.server.codebase" property, as cached at class
88 new GetPropertyAction("java.rmi.server.codebase"));
94 /** list of URLs represented by the codebase property, if valid */
97 /** table of class loaders that use codebase property for annotation */
110 * table mapping codebase URL path and context class loader pairs
129 * java.rmi.server.codebase property as the URL path.
135 * If it hasn't already been done, convert the codebase property
153 public static Class<?> loadClass(String codebase, String name,
160 "codebase = \"" + (codebase != null ? codebase : "") + "\"" +
166 if (codebase != null) {
167 urls = pathToURLs(codebase);
219 * "java.rmi.server.codebase" property.
227 * Get the codebase URL path for the class loader, if it supports
286 * Returns a classloader that loads classes from the given codebase URL
290 public static ClassLoader getClassLoader(String codebase)
296 if (codebase != null) {
297 urls = pathToURLs(codebase);
350 * annotated with the value of the "java.rmi.server.codebase" property.
358 * codebase URL path in the current execution context.
382 "(no security manager: codebase disabled), " +
391 "(no security manager: codebase disabled)", e);
400 * Get or create the RMI class loader for this codebase URL path
415 * to access all of the URLs in the codebase path, wrap the
423 * resolved without the security-offending codebase anyway;
431 "(access to codebase denied), " +
444 "(access to codebase denied)", e);
455 "class \"" + name + "\" " + "found via codebase, " +
462 "class \"" + name + "\" not found via codebase", e);
474 public static Class<?> loadProxyClass(String codebase, String[] interfaces,
481 "codebase = \"" + (codebase != null ? codebase : "") + "\"" +
489 * the likelihood that the proxy's codebase annotation will be
498 * attempt to define the proxy class succeeds, the codebase
526 if (codebase != null) {
527 urls = pathToURLs(codebase);
543 "(no security manager: codebase disabled) " +
550 "(no security manager: codebase disabled) " +
560 * Get or create the RMI class loader for this codebase URL path
575 * to access all of the URLs in the codebase path, wrap the
583 * resolved without the security-offending codebase anyway;
590 "(access to codebase denied) " +
601 "(access to codebase denied) " +
681 "proxy interfaces found via codebase, " +
817 * Look up the RMI class loader for the given codebase URL path
825 * If the requested codebase URL path is empty, the supplied
854 * Look up the codebase URL path and parent class loader pair
875 * loader instance for the requested codebase URL path and
878 * necessary to load classes from its codebase URL path.
901 * LoaderKey holds a codebase URL path and parent class loader pair
955 * queue. The entry contains the codebase URL path and parent class
978 * codebase URL path should execute with.
1009 // add permissions reuiqred to load from codebase URL path
1045 * If the codebase is a file, the permission required
1046 * to actually read classes from the codebase URL is
1134 /** string form of loader's codebase URL path, also an optimization */