/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | PolicyParser.java | 554 "expected.permission.entry")); 612 e.permission = match("permission type"); 738 } else if (expect.equalsIgnoreCase("permission type")) { 753 } else if (expect.equalsIgnoreCase("permission type")) { 829 * permission java.io.FilePermission "/tmp", "read,write"; 895 * Enumerate all the permission entries in this GrantEntry. 1061 * Each permission entry in the policy configuration file is 1068 * permission java.io.FilePermission "/tmp", "read,write"; 1084 public String permission; field in class:PolicyParser.PermissionEntry 1092 PermissionEntry(String permission, String name, String action) argument [all...] |
H A D | PolicyFile.java | 142 * which consists of a number of permission entries. 150 * permission <b>Type</b> "<b>name</b> "<b>action</b>", 152 * permission <b>Type</b> "<b>name</b> "<b>action</b>", 175 * <p> A permission entry must begin with the word <code>permission</code>. 177 * a specific permission type, such as <code>java.io.FilePermission</code> 181 * many permission types, such as <code>java.io.FilePermission</code> 186 * permission specified by the <code>"<i>name</i>"</code> 189 * <p> The <code>signedBy</code> name/value pair for a permission entry 190 * is optional. If present, it indicates a signed permission [all...] |
/openjdk7/jdk/test/java/security/ProtectionDomain/ |
H A D | AllPerm.java | 89 public boolean implies(ProtectionDomain domain, Permission permission) { argument
|
/openjdk7/jdk/src/share/classes/java/io/ |
H A D | FilePermission.java | 64 * <DT> read <DD> read permission 65 * <DT> write <DD> write permission 67 * <DD> execute permission. Allows <code>Runtime.exec</code> to 70 * <DD> delete permission. Allows <code>File.delete</code> to 73 * <DD> read link permission. Allows the target of a 83 * directories. The "<<ALL FILES>>" permission with write action is 84 * especially dangerous. This grants permission to write to the entire 90 * need explicit permission to do so. 307 * Checks if this FilePermission object "implies" the specified permission. 320 * @param p the permission t 744 add(Permission permission) argument 768 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/java/net/ |
H A D | HttpURLConnection.java | 568 * permission necessary to connect to the destination host and port. 571 * the permission. 574 * permission necessary to connect to the destination 581 Permission permission = new SocketPermission(host, "connect"); 582 return permission;
|
H A D | SocketPermission.java | 106 * note that if the following permission: 115 * <p>Similarly, if the following permission: 125 * <p>Note: Granting code permission to accept or make connections to remote 560 "invalid permission: " + action); 576 "invalid permission: " + action); 779 * Checks if this socket permission object "implies" the 780 * specified permission. 807 * @param p the permission to check against. 809 * @return true if the specified permission is implied by this object, 846 * @param p the incoming permission reques 1252 add(Permission permission) argument 1278 implies(Permission permission) argument [all...] |
/openjdk7/jdk/test/java/util/concurrent/Executors/ |
H A D | PrivilegedCallables.java | 63 for (Permission permission : permissions) 64 perms.add(permission);
|
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | ProtectionDomain.java | 53 * mapped to a set of permissions by the current Policy whenever a permission 154 * time a permission is checked. 247 * statically bound} PermissionCollection then the permission will 255 * permissions, then the permission will be checked against the 260 * @param permission the Permission object to check. 262 * @return true if "permission" is implicit to this ProtectionDomain. 264 public boolean implies(Permission permission) { argument 267 // internal permission collection already has AllPermission - 273 Policy.getPolicyNoCheck().implies(this, permission)) 276 return permissions.implies(permission); [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/auth/ |
H A D | PolicyFile.java | 91 * which consists of a number of permission entries. 99 * permission <b>Type</b> "<b>name</b> "<b>action</b>", 101 * permission <b>Type</b> "<b>name</b> "<b>action</b>", 125 * <p> A permission entry must begin with the word <code>permission</code>. 127 * a specific permission type, such as <code>java.io.FilePermission</code> 131 * many permission types, such as <code>java.io.FilePermission</code> 136 * permission specified by the <code>"<i>name</i>"</code> 139 * <p> The <code>signedBy</code> name/value pair for a permission entry 140 * is optional. If present, it indicates a signed permission 1414 add(Permission permission) argument 1446 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/ftp/ |
H A D | FtpURLConnection.java | 91 Permission permission; field in class:FtpURLConnection 557 if (permission == null) { 561 permission = new SocketPermission(urlhost, "connect"); 563 return permission;
|
/openjdk7/jdk/src/share/classes/sun/misc/ |
H A D | Launcher.java | 512 public void add(java.security.Permission permission) { argument 513 throw new SecurityException("attempt to add a permission"); 526 // add permission to read any "java.*" property 568 public boolean implies(java.security.Permission permission) { argument 571 return perms.implies(permission);
|
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/jar/ |
H A D | JarURLConnection.java | 59 /* the permission to get this JAR file. This is the actual, ultimate, 60 * permission, returned by the jar file factory. 62 private Permission permission; field in class:JarURLConnection 124 /* we also ask the factory the permission that was required 125 * to get the jarFile, and set it as our permission.
|
/openjdk7/jdk/src/share/classes/sun/security/acl/ |
H A D | AclImpl.java | 147 * If there is no entry for a group or a principal an empty permission 150 * The group positive permission set is the union of all 152 * The group negative permission set is the union of all 154 * If there is a specific permission that occurs in both 155 * the postive permission set and the negative permission set, 156 * it is removed from both. The group positive and negatoive permission 159 * The individial positive permission set and the individual negative 160 * permission set is then calculated. Again abscence of an entry means 165 * Specifically, individual negative permission se 231 checkPermission(Principal principal, Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | CryptoPolicyParser.java | 45 * that JCE has new permission classes called javax.crypto.CryptoPermission 48 * The format of a permission entry in the jurisdiction policy file is: 50 * permission <crypto permission class name>[, <algorithm name> 171 ParsingException(st.lineno(), "expected permission entry"); 189 e.cryptoPermission = match("permission type"); 223 // Check whether this entry is consistent with other permission entries 242 // At the end of this permission entry 403 else if (expect.equalsIgnoreCase("permission type")) { 414 } else if (expect.equalsIgnoreCase("permission typ [all...] |
/openjdk7/jdk/src/share/classes/sun/security/tools/policytool/ |
H A D | PolicyTool.java | 261 verifyPermission(pe.permission, pe.name, pe.action); 266 Object[] source = {pe.permission}; 272 Object[] source = {pe.permission}; 276 // see if all the permission signers have public keys 449 * A Permission entry consists of a permission, name, and actions. 451 * If the permission already exists, it is not added again. 457 // first add the permission to the Policy Parser Vector 1437 // set up permission objects 1569 // get permission list 1639 // panel for permission button [all...] |
/openjdk7/jdk/test/java/util/logging/ |
H A D | TestAppletLoggerContext.java | 76 for (Permission permission : permissions) { 77 perms.add(permission);
|
/openjdk7/jdk/src/solaris/classes/java/util/prefs/ |
H A D | FileSystemPreferences.java | 217 * Unix user write/read permission 951 lockFile0(String fileName, int permission, boolean shared); argument 963 private static native int chmod(String fileName, int permission); argument
|
/openjdk7/jdk/src/solaris/native/sun/java2d/x11/ |
H A D | X11SurfaceData.c | 125 char * permission = getenv("J2D_MITSHM_PERMISSION"); local 126 if (permission != NULL) { 127 if (strcmp(permission, "common") == 0) {
|
/openjdk7/jdk/test/java/lang/ProcessBuilder/ |
H A D | Basic.java | 399 // Can't execute a directory -- permission denied 2054 // Check for correct security permission behavior 2101 // environment permission by itself insufficient 2107 // exec permission by itself insufficient 2125 // Don't need environment permission unless READING environment 2132 // Don't need environment permission unless READING environment 2160 for (Permission permission : permissions) 2161 perms.add(permission);
|