/openjdk7/jdk/test/java/rmi/activation/Activatable/inactiveGroup/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 9 permission java.net.SocketPermission "*:1024-", "connect,accept,listen"; 12 permission java.rmi.RMIPermission "exportRemoteInterface.ActivateMe";
|
/openjdk7/jdk/test/java/rmi/activation/Activatable/nestedActivate/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 9 permission java.net.SocketPermission "*:1024-", "connect,accept,listen"; 12 permission java.rmi.RMIPermission "exportRemoteInterface.ActivateMe";
|
/openjdk7/jdk/test/java/rmi/activation/ActivationGroup/downloadActivationGroup/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 8 permission java.lang.RuntimePermission "accessClassInPackage.sun.rmi.server"; 9 permission java.net.SocketPermission "*:1024-", "connect,accept,listen";
|
/openjdk7/jdk/test/java/rmi/activation/ActivationSystem/modifyDescriptor/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 9 permission java.util.PropertyPermission "test.message", "read"; 12 permission java.net.SocketPermission "*:1024-", "connect,accept,listen";
|
/openjdk7/jdk/test/java/rmi/activation/ActivationSystem/stubClassesPermitted/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 8 // give the group permission to create a class that the main test process can not create 9 permission java.lang.RuntimePermission "accessClassInPackage.sun.security.provider"; 12 permission java.net.SocketPermission "*:1024-", "connect,accept,listen";
|
/openjdk7/jdk/test/java/rmi/activation/ActivationSystem/unregisterGroup/ |
H A D | group.security.policy | 6 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 9 permission java.net.SocketPermission "*:1024-", "connect,accept,listen"; 10 permission java.util.PropertyPermission "unregisterGroup.port", "read";
|
/openjdk7/jdk/test/java/rmi/server/RMISocketFactory/useSocketFactory/registry/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 14 permission java.util.PropertyPermission "user.name", "read"; 17 permission java.io.FilePermission "${java.home}${/}bin${/}java", "execute"; 20 permission java.util.PropertyPermission "test.classes", "read"; 21 permission java.util.PropertyPermission "test.src", "read"; 22 permission java.util.PropertyPermission "user.dir", "read"; 23 permission java.util.PropertyPermission "java.home", "read"; 25 permission java.util.PropertyPermission "rmi.registry.port", "read"; 27 permission jav [all...] |
/openjdk7/jdk/test/java/rmi/activation/Activatable/downloadParameterClass/ |
H A D | group.security.policy | 7 permission java.io.FilePermission ".${/}codebase1", "read,write,delete"; 8 permission java.io.FilePermission ".${/}codebase1${/}-", "read,write"; 9 permission java.io.FilePermission ".${/}codebase2", "read,write,delete"; 10 permission java.io.FilePermission ".${/}codebase2${/}-", "read,write,delete"; 13 permission java.net.SocketPermission "*:1024-", "connect,accept,listen";
|
/openjdk7/jdk/test/java/rmi/dgc/VMID/ |
H A D | security.policy | 6 permission java.security.AllPermission; 12 permission java.util.PropertyPermission "test.classes", "read"; 13 permission java.util.PropertyPermission "test.src", "read"; 14 permission java.util.PropertyPermission "user.dir", "read"; 15 permission java.util.PropertyPermission "java.home", "read";
|
/openjdk7/jdk/test/java/rmi/registry/classPathCodebase/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.io.FilePermission "${test.classes}", "read,write,delete"; 12 permission java.io.FilePermission "${test.classes}${/}-", "read,write,delete"; 14 permission java.io.FilePermission ".", "read,write,delete"; 15 permission java.io.FilePermission ".${/}-", "read,write,delete"; 18 permission java.util.PropertyPermission "test.classes", "read"; 19 permission java.util.PropertyPermission "test.src", "read"; 20 permission java.util.PropertyPermission "user.dir", "read"; 21 permission java.util.PropertyPermission "java.home", "read"; 24 permission jav [all...] |
/openjdk7/jdk/test/java/rmi/server/RMIClassLoader/delegateToContextLoader/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.lang.RuntimePermission "createClassLoader"; 12 permission java.lang.RuntimePermission "setContextClassLoader"; 15 permission java.io.FilePermission "${test.classes}", "read,write,delete"; 16 permission java.io.FilePermission "${test.classes}${/}-", "read,write,delete"; 18 permission java.io.FilePermission ".${/}codebase", "read,write,delete"; 19 permission java.io.FilePermission ".${/}codebase${/}-", "read,write,delete"; 22 permission java.util.PropertyPermission "test.classes", "read"; 23 permission java.util.PropertyPermission "test.src", "read"; 24 permission jav [all...] |
/openjdk7/jdk/test/java/rmi/transport/checkLeaseInfoLeak/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.io.FilePermission "..${/}..${/}test.props", "read"; 14 permission java.io.FilePermission "${java.home}${/}bin${/}java", "execute"; 17 permission java.util.PropertyPermission "test.classes", "read"; 18 permission java.util.PropertyPermission "test.src", "read"; 19 permission java.util.PropertyPermission "user.dir", "read"; 20 permission java.util.PropertyPermission "java.home", "read"; 22 permission java.util.PropertyPermission "rmi.registry.port", "read"; 23 permission java.util.PropertyPermission "java.security.policy", "read"; 24 permission jav [all...] |
/openjdk7/jdk/test/com/sun/tools/attach/ |
H A D | java.policy.deny | 7 permission com.sun.tools.attach.AttachPermission "createAttachProvider"; 10 permission java.lang.RuntimePermission "accessClassInPackage.sun.misc"; 11 permission java.lang.RuntimePermission "accessClassInPackage.sun.tools.attach"; 12 permission java.lang.RuntimePermission "loadLibrary.attach"; 13 permission java.util.PropertyPermission "sun.jvmstat.*", "read"; 14 permission java.util.PropertyPermission "java.io.tmpdir", "read"; 17 permission java.io.FilePermission "<<ALL FILES>>", "read,write,delete";
|
H A D | java.policy.allow | 7 permission com.sun.tools.attach.AttachPermission "attachVirtualMachine"; 8 permission com.sun.tools.attach.AttachPermission "createAttachProvider"; 11 permission java.lang.RuntimePermission "accessClassInPackage.sun.misc"; 12 permission java.lang.RuntimePermission "accessClassInPackage.sun.tools.attach"; 13 permission java.lang.RuntimePermission "accessClassInPackage.sun.jvmstat.monitor"; 14 permission java.lang.RuntimePermission "loadLibrary.attach"; 15 permission java.util.PropertyPermission "sun.jvmstat.*", "read"; 16 permission java.util.PropertyPermission "java.io.tmpdir", "read"; 19 permission java.io.FilePermission "<<ALL FILES>>", "read,write,delete";
|
/openjdk7/jdk/test/java/rmi/server/RMIClassLoader/loadProxyClasses/ |
H A D | security.policy | 6 permission java.security.AllPermission; 12 permission java.io.FilePermission "${test.classes}${/}-", "read,write,delete"; 13 permission java.io.FilePermission ".${/}-", "read,write,delete"; 15 permission java.lang.RuntimePermission "createClassLoader"; 16 permission java.lang.RuntimePermission "getClassLoader"; 17 permission java.lang.RuntimePermission "setContextClassLoader"; 20 permission java.util.PropertyPermission "test.classes", "read"; 21 permission java.util.PropertyPermission "test.src", "read"; 22 permission java.util.PropertyPermission "user.dir", "read"; 23 permission jav [all...] |
/openjdk7/jdk/test/java/rmi/server/RMIClassLoader/useCodebaseOnly/ |
H A D | security.policy | 6 permission java.security.AllPermission; 12 permission java.util.PropertyPermission 14 permission java.util.PropertyPermission 18 permission java.io.FilePermission 20 permission java.io.FilePermission 24 permission java.util.PropertyPermission "test.classes", "read"; 25 permission java.util.PropertyPermission "test.src", "read"; 26 permission java.util.PropertyPermission "user.dir", "read"; 27 permission java.util.PropertyPermission "java.home", "read"; 30 permission jav [all...] |
/openjdk7/jdk/src/share/classes/sun/security/acl/ |
H A D | PermissionImpl.java | 32 * The PermissionImpl class implements the permission 38 private String permission; field in class:PermissionImpl 41 * Construct a permission object using a string. 42 * @param permission the stringified version of the permission. 44 public PermissionImpl(String permission) { argument 45 this.permission = permission; 49 * This function returns true if the object passed matches the permission 57 return permission [all...] |
H A D | AclEntryImpl.java | 75 * That is the user or group is denied the permission set 91 * permissions. This method adds a permission to the ACL entry. 92 * @param permission The permission to be associated with 94 * @return true if the permission was added, false if the 95 * permission was already part of the permission set. 97 public boolean addPermission(Permission permission) { argument 99 if (permissionSet.contains(permission)) 102 permissionSet.addElement(permission); 115 removePermission(Permission permission) argument 127 checkPermission(Permission permission) argument [all...] |
/openjdk7/jdk/test/java/rmi/dgc/dgcImplInsulation/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.net.SocketPermission "*:1024-", "accept,connect,listen";
|
/openjdk7/jdk/test/java/rmi/server/clientStackTrace/ |
H A D | security.policy | 6 permission java.security.AllPermission; 11 permission java.net.SocketPermission "*:1024-", "connect,accept,listen";
|
/openjdk7/jdk/src/share/classes/java/security/acl/ |
H A D | AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); argument 114 * Removes the specified permission from this ACL entry. 116 * @param permission th 121 removePermission(Permission permission) argument 132 checkPermission(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | AllPermission.java | 35 * The AllPermission is a permission that implies all other permissions. 41 * a permission to code. This permission should be used only during testing, 86 * Checks if the specified permission is "implied" by 89 * @param p the permission to check against. 179 * Adds a permission to the AllPermissions. The key for the hash is 180 * permission.path. 182 * @param permission the Permission object to add. 184 * @exception IllegalArgumentException - if the permission is not a 191 public void add(Permission permission) argument 211 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | CryptoAllPermission.java | 33 * The CryptoAllPermission is a permission that implies 58 * Checks if the specified permission is implied by 61 * @param p the permission to check against. 63 * @return true if the specified permission is an 132 * Adds a permission to the CryptoAllPermissions. 134 * @param permission the Permission object to add. 139 public void add(Permission permission) argument 145 if (permission != CryptoAllPermission.INSTANCE) 153 * expressed in "permission". 157 * @return true if the given permission i 160 implies(Permission permission) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/rmi/rmid/ |
H A D | ExecPermission.java | 33 * The ExecPermission class represents permission for rmid to execute 38 * execute permission. A pathname that ends in "/*" (where "/" is 115 * Checks if this ExecPermission object "implies" the specified permission. 125 * @param p the permission to check against. 127 * @return true if the specified permission is implied by this object, 242 * Adds a permission to the collection. 244 * @param permission the Permission object to add. 246 * @exception IllegalArgumentException - if the permission is not a 252 public void add(Permission permission) argument 254 if (! (permission instanceo 272 implies(Permission permission) argument [all...] |
/openjdk7/jdk/test/java/io/File/ |
H A D | SetAccess.java | 59 permission(f).charAt(2) != 'w') 63 permission(f).charAt(2) != '-') 67 !permission(f).matches(".(.w.){3}")) 71 !permission(f).matches(".(.-.){3}")) 74 permission(f).charAt(2) != 'w') 77 permission(f).charAt(2) != '-') 81 permission(f).charAt(3) != 'x') 85 permission(f).charAt(3) != '-') 89 !permission(f).matches(".(..x){3}")) 93 !permission( 181 private static String permission(File f) throws Exception { method in class:SetAccess [all...] |