Searched refs:permission (Results 101 - 119 of 119) sorted by relevance

12345

/openjdk7/jdk/src/share/classes/sun/security/provider/
H A DPolicyParser.java554 "expected.permission.entry"));
612 e.permission = match("permission type");
738 } else if (expect.equalsIgnoreCase("permission type")) {
753 } else if (expect.equalsIgnoreCase("permission type")) {
829 * permission java.io.FilePermission "/tmp", "read,write";
895 * Enumerate all the permission entries in this GrantEntry.
1061 * Each permission entry in the policy configuration file is
1068 * permission java.io.FilePermission "/tmp", "read,write";
1084 public String permission; field in class:PolicyParser.PermissionEntry
1092 PermissionEntry(String permission, String name, String action) argument
[all...]
H A DPolicyFile.java142 * which consists of a number of permission entries.
150 * permission <b>Type</b> "<b>name</b> "<b>action</b>",
152 * permission <b>Type</b> "<b>name</b> "<b>action</b>",
175 * <p> A permission entry must begin with the word <code>permission</code>.
177 * a specific permission type, such as <code>java.io.FilePermission</code>
181 * many permission types, such as <code>java.io.FilePermission</code>
186 * permission specified by the <code>"<i>name</i>"</code>
189 * <p> The <code>signedBy</code> name/value pair for a permission entry
190 * is optional. If present, it indicates a signed permission
[all...]
/openjdk7/jdk/test/java/security/ProtectionDomain/
H A DAllPerm.java89 public boolean implies(ProtectionDomain domain, Permission permission) { argument
/openjdk7/jdk/src/share/classes/java/io/
H A DFilePermission.java64 * <DT> read <DD> read permission
65 * <DT> write <DD> write permission
67 * <DD> execute permission. Allows <code>Runtime.exec</code> to
70 * <DD> delete permission. Allows <code>File.delete</code> to
73 * <DD> read link permission. Allows the target of a
83 * directories. The "&lt;&lt;ALL FILES>>" permission with write action is
84 * especially dangerous. This grants permission to write to the entire
90 * need explicit permission to do so.
307 * Checks if this FilePermission object "implies" the specified permission.
320 * @param p the permission t
744 add(Permission permission) argument
768 implies(Permission permission) argument
[all...]
/openjdk7/jdk/src/share/classes/java/net/
H A DHttpURLConnection.java568 * permission necessary to connect to the destination host and port.
571 * the permission.
574 * permission necessary to connect to the destination
581 Permission permission = new SocketPermission(host, "connect");
582 return permission;
H A DSocketPermission.java106 * note that if the following permission:
115 * <p>Similarly, if the following permission:
125 * <p>Note: Granting code permission to accept or make connections to remote
560 "invalid permission: " + action);
576 "invalid permission: " + action);
779 * Checks if this socket permission object "implies" the
780 * specified permission.
807 * @param p the permission to check against.
809 * @return true if the specified permission is implied by this object,
846 * @param p the incoming permission reques
1252 add(Permission permission) argument
1278 implies(Permission permission) argument
[all...]
/openjdk7/jdk/test/java/util/concurrent/Executors/
H A DPrivilegedCallables.java63 for (Permission permission : permissions)
64 perms.add(permission);
/openjdk7/jdk/src/share/classes/java/security/
H A DProtectionDomain.java53 * mapped to a set of permissions by the current Policy whenever a permission
154 * time a permission is checked.
247 * statically bound} PermissionCollection then the permission will
255 * permissions, then the permission will be checked against the
260 * @param permission the Permission object to check.
262 * @return true if "permission" is implicit to this ProtectionDomain.
264 public boolean implies(Permission permission) { argument
267 // internal permission collection already has AllPermission -
273 Policy.getPolicyNoCheck().implies(this, permission))
276 return permissions.implies(permission);
[all...]
/openjdk7/jdk/src/share/classes/com/sun/security/auth/
H A DPolicyFile.java91 * which consists of a number of permission entries.
99 * permission <b>Type</b> "<b>name</b> "<b>action</b>",
101 * permission <b>Type</b> "<b>name</b> "<b>action</b>",
125 * <p> A permission entry must begin with the word <code>permission</code>.
127 * a specific permission type, such as <code>java.io.FilePermission</code>
131 * many permission types, such as <code>java.io.FilePermission</code>
136 * permission specified by the <code>"<i>name</i>"</code>
139 * <p> The <code>signedBy</code> name/value pair for a permission entry
140 * is optional. If present, it indicates a signed permission
1414 add(Permission permission) argument
1446 implies(Permission permission) argument
[all...]
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/ftp/
H A DFtpURLConnection.java91 Permission permission; field in class:FtpURLConnection
557 if (permission == null) {
561 permission = new SocketPermission(urlhost, "connect");
563 return permission;
/openjdk7/jdk/src/share/classes/sun/misc/
H A DLauncher.java512 public void add(java.security.Permission permission) { argument
513 throw new SecurityException("attempt to add a permission");
526 // add permission to read any "java.*" property
568 public boolean implies(java.security.Permission permission) { argument
571 return perms.implies(permission);
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/jar/
H A DJarURLConnection.java59 /* the permission to get this JAR file. This is the actual, ultimate,
60 * permission, returned by the jar file factory.
62 private Permission permission; field in class:JarURLConnection
124 /* we also ask the factory the permission that was required
125 * to get the jarFile, and set it as our permission.
/openjdk7/jdk/src/share/classes/sun/security/acl/
H A DAclImpl.java147 * If there is no entry for a group or a principal an empty permission
150 * The group positive permission set is the union of all
152 * The group negative permission set is the union of all
154 * If there is a specific permission that occurs in both
155 * the postive permission set and the negative permission set,
156 * it is removed from both. The group positive and negatoive permission
159 * The individial positive permission set and the individual negative
160 * permission set is then calculated. Again abscence of an entry means
165 * Specifically, individual negative permission se
231 checkPermission(Principal principal, Permission permission) argument
[all...]
/openjdk7/jdk/src/share/classes/javax/crypto/
H A DCryptoPolicyParser.java45 * that JCE has new permission classes called javax.crypto.CryptoPermission
48 * The format of a permission entry in the jurisdiction policy file is:
50 * permission <crypto permission class name>[, <algorithm name>
171 ParsingException(st.lineno(), "expected permission entry");
189 e.cryptoPermission = match("permission type");
223 // Check whether this entry is consistent with other permission entries
242 // At the end of this permission entry
403 else if (expect.equalsIgnoreCase("permission type")) {
414 } else if (expect.equalsIgnoreCase("permission typ
[all...]
/openjdk7/jdk/src/share/classes/sun/security/tools/policytool/
H A DPolicyTool.java261 verifyPermission(pe.permission, pe.name, pe.action);
266 Object[] source = {pe.permission};
272 Object[] source = {pe.permission};
276 // see if all the permission signers have public keys
449 * A Permission entry consists of a permission, name, and actions.
451 * If the permission already exists, it is not added again.
457 // first add the permission to the Policy Parser Vector
1437 // set up permission objects
1569 // get permission list
1639 // panel for permission button
[all...]
/openjdk7/jdk/test/java/util/logging/
H A DTestAppletLoggerContext.java76 for (Permission permission : permissions) {
77 perms.add(permission);
/openjdk7/jdk/src/solaris/classes/java/util/prefs/
H A DFileSystemPreferences.java217 * Unix user write/read permission
951 lockFile0(String fileName, int permission, boolean shared); argument
963 private static native int chmod(String fileName, int permission); argument
/openjdk7/jdk/src/solaris/native/sun/java2d/x11/
H A DX11SurfaceData.c125 char * permission = getenv("J2D_MITSHM_PERMISSION"); local
126 if (permission != NULL) {
127 if (strcmp(permission, "common") == 0) {
/openjdk7/jdk/test/java/lang/ProcessBuilder/
H A DBasic.java399 // Can't execute a directory -- permission denied
2054 // Check for correct security permission behavior
2101 // environment permission by itself insufficient
2107 // exec permission by itself insufficient
2125 // Don't need environment permission unless READING environment
2132 // Don't need environment permission unless READING environment
2160 for (Permission permission : permissions)
2161 perms.add(permission);

Completed in 87 milliseconds

12345