Lines Matching defs:entry

163  * <p> A grant entry must begin with the word <code>grant</code>.
175 * <p> A permission entry must begin with the word <code>permission</code>.
189 * <p> The <code>signedBy</code> name/value pair for a permission entry
193 * suppose you have the following grant entry:
207 * <p> Items that appear in an entry must appear in the specified order
209 * "<i>action</i>"). An entry is terminated with a semicolon.
372 * <p> A grant entry must begin with the word <code>grant</code>.
378 * <p> A permission entry must begin with the word <code>permission</code>.
393 * <p>The <code>signedBy</code> name/value pair for a permission entry
397 * suppose you have the following grant entry:
410 * <p>Items that appear in an entry must appear in the specified order
412 * "<i>action</i>"). An entry is terminated with a semicolon.
778 ge.signedBy + "' - ignoring entry");
795 * Add one policy entry to the list.
801 debug.println("Adding policy entry: ");
825 PolicyEntry entry = new PolicyEntry(codesource, ge.principals);
848 // Add it to entry
866 entry.add(perm);
888 entry.add(perm);
913 newInfo.policyEntries.add(entry);
1273 for (PolicyEntry entry : pi.policyEntries) {
1274 addPermissions(perms, cs, principals, entry);
1280 for (PolicyEntry entry : pi.identityPolicyEntries) {
1281 addPermissions(perms, cs, principals, entry);
1308 final PolicyEntry entry) {
1312 "\tPolicy CodeSource: " + entry.getCodeSource() + "\n" +
1320 return new Boolean(entry.getCodeSource().implies(cs));
1328 // CodeSource does not imply - return and try next policy entry
1334 List<PolicyParser.PrincipalEntry> entryPs = entry.getPrincipals();
1351 // policy entry has no principals -
1354 addPerms(perms, principals, entry);
1362 // current thread has no principals but this policy entry
1371 // current thread has principals and this policy entry
1372 // has principals. see if policy entry principals match
1378 // see if principal entry is a PrincipalComparator
1389 // see if policy entry principal is in current ACC
1396 // policy entry principal not in current ACC -
1397 // immediately return and go to next policy entry
1433 // immediately return and go to next policy entry
1439 // see if policy entry principal is in current ACC
1450 // policy entry principal not in current ACC -
1451 // immediately return and go to next policy entry
1461 // all policy entry principals were found in the current ACC -
1467 addPerms(perms, principals, entry);
1472 PolicyEntry entry) {
1473 for (int i = 0; i < entry.permissions.size(); i++) {
1474 Permission p = entry.permissions.get(i);
1482 entry.getPrincipals(),
1492 * This method returns, true, if the principal in the policy entry,
1494 * This method also returns, true, if the policy entry's principal
1503 * @param pppe a Principal specified in a policy grant entry.
1506 * principal in the policy entry, pppe. This method
1507 * also returns true if the policy entry's principal
1537 * @param entryPs list of principals for the Policy entry.
1561 + "of a Principal-based grant entry."
1653 debug.println("self entry expansion " +
1676 // 1) the entry's Principal class and name are not wildcarded
1677 // 2) the entry's Principal name is wildcarded only
1678 // 3) the entry's Principal class and name are wildcarded
1686 // from the Policy entry
1699 // that is equal to policy entry principal class name
2018 "' - ignoring entry");
2046 * Each entry in the policy configuration file is represented by a
2053 * null, meaning that this policy entry is given to all comers, as
2067 * For example, the entry
2096 * Given a Permission and a CodeSource, create a policy entry.
2125 * add a Permission object to this entry.
2126 * No need to sync add op because perms are added to entry only
2127 * while entry is being initialized
2134 * Return the CodeSource for this policy entry