/openjdk7/jdk/test/java/io/File/ |
H A D | SetAccess.java | 59 permission(f).charAt(2) != 'w') 63 permission(f).charAt(2) != '-') 67 !permission(f).matches(".(.w.){3}")) 71 !permission(f).matches(".(.-.){3}")) 74 permission(f).charAt(2) != 'w') 77 permission(f).charAt(2) != '-') 81 permission(f).charAt(3) != 'x') 85 permission(f).charAt(3) != '-') 89 !permission(f).matches(".(..x){3}")) 93 !permission( 181 private static String permission(File f) throws Exception { method in class:SetAccess [all...] |
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | PolicySpi.java | 52 * @param permission check whether this permission is granted to the 55 * @return boolean true if the permission is granted to the domain. 58 (ProtectionDomain domain, Permission permission); 57 engineImplies(ProtectionDomain domain, Permission permission) argument
|
H A D | Permission.java | 36 * for a <code>java.io.FilePermission</code> object, the permission name is 42 * that don't need such a list; you either have the named permission (such 47 * "permission p1 implies permission p2" means that 48 * if one is granted permission p1, one is naturally granted permission p2. 54 * provide methods that can change the state of a permission 72 * Constructs a permission with the specified name. 83 * Implements the guard interface for a permission. The 85 * passing this permission objec 122 implies(Permission permission) argument [all...] |
H A D | PermissionCollection.java | 35 * <LI> add a permission to the collection using the <code>add</code> method. 36 * <LI> check to see if a particular permission is implied in the 66 * permission to the appropriate collection. 68 * <p>Whenever a permission is added to a heterogeneous PermissionCollection 70 * PermissionCollection of the specified permission's type, the 72 * the <code>newPermissionCollection</code> method on the permission's class 76 * is free to store the permission in any type of PermissionCollection it 79 * that stores the permission objects in a Hashtable. 103 * Adds a permission object to the current collection of permission object 113 add(Permission permission) argument 124 implies(Permission permission) argument [all...] |
H A D | UnresolvedPermissionCollection.java | 53 * Key is permission type, value is a list of the UnresolvedPermissions 68 * Adds a permission to this UnresolvedPermissionCollection. 69 * The key for the hash is the unresolved permission's type (class) name. 71 * @param permission the Permission object to add. 74 public void add(Permission permission) argument 76 if (! (permission instanceof UnresolvedPermission)) 77 throw new IllegalArgumentException("invalid permission: "+ 78 permission); 79 UnresolvedPermission up = (UnresolvedPermission) permission; 108 public boolean implies(Permission permission) argument [all...] |
H A D | AllPermission.java | 35 * The AllPermission is a permission that implies all other permissions. 41 * a permission to code. This permission should be used only during testing, 86 * Checks if the specified permission is "implied" by 89 * @param p the permission to check against. 179 * Adds a permission to the AllPermissions. The key for the hash is 180 * permission.path. 182 * @param permission the Permission object to add. 184 * @exception IllegalArgumentException - if the permission is not a 191 public void add(Permission permission) argument 211 implies(Permission permission) argument [all...] |
H A D | Permissions.java | 108 * Adds a permission object to the PermissionCollection for the class the 109 * permission belongs to. For example, if <i>permission</i> is a 114 * a new PermissionCollection object (and adds the permission to it) 117 * @param permission the Permission object to add. 125 public void add(Permission permission) { argument 133 pc = getPermissionCollection(permission, true); 134 pc.add(permission); 138 if (permission instanceof AllPermission) { 141 if (permission instanceo 174 implies(Permission permission) argument 498 add(Permission permission) argument 514 implies(Permission permission) argument [all...] |
H A D | ProtectionDomain.java | 53 * mapped to a set of permissions by the current Policy whenever a permission 154 * time a permission is checked. 247 * statically bound} PermissionCollection then the permission will 255 * permissions, then the permission will be checked against the 260 * @param permission the Permission object to check. 262 * @return true if "permission" is implicit to this ProtectionDomain. 264 public boolean implies(Permission permission) { argument 267 // internal permission collection already has AllPermission - 273 Policy.getPolicyNoCheck().implies(this, permission)) 276 return permissions.implies(permission); [all...] |
H A D | BasicPermission.java | 44 * The name for a BasicPermission is the name of the given permission 57 * named permission or you don't.) 77 // does this permission have a wildcard at the end? 83 // is this permission the old-style exitVM permission (pre JDK 1.6)? 124 * Name is the symbolic name of the permission, such as 159 * Checks if the specified permission is "implied" by 170 * @param p the permission to check against. 172 * @return true if the passed permission is equal to or 173 * implied by this permission, fals 365 add(Permission permission) argument 408 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/acl/ |
H A D | PermissionImpl.java | 32 * The PermissionImpl class implements the permission 38 private String permission; field in class:PermissionImpl 41 * Construct a permission object using a string. 42 * @param permission the stringified version of the permission. 44 public PermissionImpl(String permission) { argument 45 this.permission = permission; 49 * This function returns true if the object passed matches the permission 57 return permission [all...] |
H A D | AclEntryImpl.java | 75 * That is the user or group is denied the permission set 91 * permissions. This method adds a permission to the ACL entry. 92 * @param permission The permission to be associated with 94 * @return true if the permission was added, false if the 95 * permission was already part of the permission set. 97 public boolean addPermission(Permission permission) { argument 99 if (permissionSet.contains(permission)) 102 permissionSet.addElement(permission); 115 removePermission(Permission permission) argument 127 checkPermission(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/java/security/acl/ |
H A D | AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); argument 114 * Removes the specified permission from this ACL entry. 116 * @param permission th 121 removePermission(Permission permission) argument 132 checkPermission(Permission permission) argument [all...] |
H A D | Acl.java | 54 * principal is considered to have a null (empty) permission set.<p> 57 * particular permission, and a negative entry that denies the 58 * principal the same permission, the result is as though the 59 * permission was never granted or denied. <p> 167 * specified principal, an empty permission set is returned.<p> 169 * <li>Otherwise, the principal's group permission sets are determined. 172 * The group positive permission set is the union of all 174 * The group negative permission set is the union of all 176 * If there is a specific permission that occurs in both 177 * the positive permission se 232 checkPermission(Principal principal, Permission permission) argument [all...] |
/openjdk7/jdk/src/solaris/native/java/util/ |
H A D | FileSystemPreferences.c | 40 jclass thisclass, jstring java_fname, jint permission) { 43 result = chmod(fname, permission); 63 jclass thisclass, jstring java_fname, jint permission, jboolean shared) { 84 fd = open(fname, O_WRONLY|O_CREAT, permission); 39 Java_java_util_prefs_FileSystemPreferences_chmod(JNIEnv *env, jclass thisclass, jstring java_fname, jint permission) argument 62 Java_java_util_prefs_FileSystemPreferences_lockFile0(JNIEnv *env, jclass thisclass, jstring java_fname, jint permission, jboolean shared) argument
|
/openjdk7/jdk/test/java/security/Permission/ |
H A D | ToString.java | 43 throw new Exception("The expected permission.toString() is " + 49 throw new Exception("The expected permission.toString() is " + 60 public boolean implies(Permission permission) { argument
|
/openjdk7/jdk/test/java/security/ProtectionDomain/ |
H A D | AllPerm.java | 89 public boolean implies(ProtectionDomain domain, Permission permission) { argument
|
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/gopher/ |
H A D | Handler.java | 78 Permission permission; field in class:GopherURLConnection 92 if (permission == null) { 96 permission = new SocketPermission(host, "connect"); 98 return permission;
|
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | CryptoAllPermission.java | 33 * The CryptoAllPermission is a permission that implies 58 * Checks if the specified permission is implied by 61 * @param p the permission to check against. 63 * @return true if the specified permission is an 132 * Adds a permission to the CryptoAllPermissions. 134 * @param permission the Permission object to add. 139 public void add(Permission permission) argument 145 if (permission != CryptoAllPermission.INSTANCE) 153 * expressed in "permission". 157 * @return true if the given permission i 160 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/rmi/rmid/ |
H A D | ExecOptionPermission.java | 33 * The ExecOptionPermission class represents permission for rmid to use 44 * does this permission have a wildcard at the end? 68 * Checks if the specified permission is "implied" by 80 * @param p the permission to check against. 82 * @return true if the passed permission is equal to or 83 * implied by this permission, false otherwise. 216 * A ExecOptionPermissionCollection handles comparing a permission like 239 * Adds a permission to the collection. The key for the hash is 240 * permission.name. 242 * @param permission th 251 add(Permission permission) argument 277 implies(Permission permission) argument [all...] |
H A D | ExecPermission.java | 33 * The ExecPermission class represents permission for rmid to execute 38 * execute permission. A pathname that ends in "/*" (where "/" is 115 * Checks if this ExecPermission object "implies" the specified permission. 125 * @param p the permission to check against. 127 * @return true if the specified permission is implied by this object, 242 * Adds a permission to the collection. 244 * @param permission the Permission object to add. 246 * @exception IllegalArgumentException - if the permission is not a 252 public void add(Permission permission) argument 254 if (! (permission instanceo 272 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/mailto/ |
H A D | MailToURLConnection.java | 49 Permission permission; field in class:MailToURLConnection 109 if (permission == null) { 112 permission = new SocketPermission(host, "connect"); 114 return permission;
|
/openjdk7/jdk/src/share/classes/javax/security/auth/kerberos/ |
H A D | DelegationPermission.java | 50 * target permission is specified as follows: 56 * To give the "backup" service a proxiable nfs service ticket the target permission 134 * Checks if this Kerberos delegation permission object "implies" the 135 * specified permission. 138 * @param p the permission to check against. 140 * @return true if the specified permission is implied by this object, 279 * expressed in "permission". 283 * @return true if "permission" is a proper subset of a permission in 287 public boolean implies(Permission permission) { argument 314 add(Permission permission) argument [all...] |
H A D | ServicePermission.java | 58 * Granting this permission implies that the caller can use a cached 61 * permission also implies that the TGT can be obtained by an 76 * For example, to specify the permission to access to the TGT to 77 * initiate a security context the permission is constructed as follows: 84 * service the permission is constructed as follows: 89 * For a Kerberized server the action is "accept". For example, the permission 169 * Checks if this Kerberos service permission object "implies" the 170 * specified permission. 173 * @param p the permission to check against. 175 * @return true if the specified permission i 477 implies(Permission permission) argument 521 add(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/javax/smartcardio/ |
H A D | CardPermission.java | 33 * A permission for Smart Card operations. A CardPermission consists of the 34 * name of the card terminal the permission applies to and a set of actions 126 * if this permission applies to all terminals. <code>actions</code> 216 * Checks if this CardPermission object implies the specified permission. 219 * <li><p><code>permission</code> is an instance of CardPermission,</p> 220 * <li><p><code>permission</code>'s actions are a proper subset of this 223 * <code>*</code> or equal to <code>permission</code>'s <code>name</code>. 227 * @param permission the permission to check against 229 * specified permission 231 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/java/util/ |
H A D | PropertyPermission.java | 61 * <DD> read permission. Allows <code>System.getProperty</code> to 64 * <DD> write permission. Allows <code>System.setProperty</code> to 70 * Care should be taken before granting code permission to access 71 * certain system properties. For example, granting permission to 74 * installation directory). Also, granting permission to access 172 * permission. 182 * @param p the permission to check against. 184 * @return true if the specified permission is implied by this object, 298 "invalid permission: " + actions); 314 "invalid permission 478 add(Permission permission) argument 522 implies(Permission permission) argument [all...] |