/openjdk7/jdk/src/share/classes/java/security/ |
H A D | ProtectionDomain.java | 47 * of permissions when being executed on behalf of a given set of Principals. 49 * A static set of permissions can be bound to a ProtectionDomain when it is 50 * constructed; such permissions are granted to the domain regardless of the 53 * mapped to a set of permissions by the current Policy whenever a permission 104 private PermissionCollection permissions; field in class:ProtectionDomain 106 /* if the permissions object has AllPermission */ 122 * Permissions. If the permissions object is not null, then 124 * Permissions object. The only permissions granted to this domain 128 * @param permissions the permissions grante 130 ProtectionDomain(CodeSource codesource, PermissionCollection permissions) argument 175 ProtectionDomain(CodeSource codesource, PermissionCollection permissions, ClassLoader classloader, Principal[] principals) argument [all...] |
H A D | UnresolvedPermissionCollection.java | 36 * of UnresolvedPermission permissions. 95 * get any unresolved permissions of the same type as p, 105 * always returns false for unresolved permissions 124 // Get iterator of Map values (which are lists of permissions) 140 // private Hashtable permissions; // keyed on type 143 * @serialField permissions java.util.Hashtable 145 * of permissions 148 new ObjectStreamField("permissions", Hashtable.class), 163 Hashtable<String, Vector<UnresolvedPermission>> permissions = 178 permissions [all...] |
H A D | BasicPermission.java | 41 * can be used as the base class for permissions that want to 55 * "named" permissions 290 * of BasicPermission permissions. BasicPermission objects 359 * permissions in this collection. 399 * Check and see if this set of permissions implies the permissions 485 // private Hashtable permissions; 487 * @serialField permissions java.util.Hashtable 500 new ObjectStreamField("permissions", Hashtable.class), 517 Hashtable<String, Permission> permissions [all...] |
/openjdk7/jdk/src/share/classes/java/nio/file/attribute/ |
H A D | PosixFileAttributes.java | 64 * Returns the permissions of the file. The file permissions are returned 66 * copy of the file permissions and is modifiable. This allows the result 68 * setPermissions} method to update the file's permissions. 70 * @return the file permissions 74 Set<PosixFilePermission> permissions(); method in interface:PosixFileAttributes
|
H A D | AclEntry.java | 47 * <li><p> The {@link #permissions permissions} component is a set of 48 * {@link AclEntryPermission permissions} 168 * Sets the permissions component of this builder. On return, the 169 * permissions component of this builder is a copy of the given set. 186 * Sets the permissions component of this builder. On return, the 187 * permissions component of this builder is a copy of the permissions in 244 * components is {@code null}. The initial value of the permissions and 282 * Returns a copy of the permissions componen 286 public Set<AclEntryPermission> permissions() { method in class:AclEntry [all...] |
/openjdk7/jdk/src/share/classes/sun/net/ftp/ |
H A D | FtpDirEntry.java | 63 private boolean[][] permissions = null; field in class:FtpDirEntry 218 if (permissions != null) { 219 return permissions[p.value][0]; 231 if (permissions != null) { 232 return permissions[p.value][1]; 244 if (permissions != null) { 245 return permissions[p.value][2]; 251 * Sets the permissions for that file. Intended mostly to be used 253 * The permissions array is a 3x3 {@code boolean} array, the first index being 256 * <p>E.G.: {@code permissions[ 261 setPermissions(boolean[][] permissions) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/rmi/rmid/ |
H A D | ExecPermission.java | 183 * ExecPermission permissions. 219 * of ExecPermission permissions. ExecPermission objects 230 private Vector<Permission> permissions; field in class:ExecPermission.ExecPermissionCollection 238 permissions = new Vector<>(); 260 permissions.addElement(permission); 264 * Check and see if this set of permissions implies the permissions 277 Enumeration<Permission> e = permissions.elements(); 296 return permissions.elements();
|
H A D | ExecOptionPermission.java | 158 * ExecOptionPermission permissions. 211 * of ExecOptionPermission permissions. ExecOptionPermission objects 226 private Hashtable<String, Permission> permissions; field in class:ExecOptionPermission.ExecOptionPermissionCollection 234 permissions = new Hashtable<>(11); 261 permissions.put(p.getName(), permission); 269 * Check and see if this set of permissions implies the permissions 294 Permission x = permissions.get(pname); 309 x = permissions.get(pname); 324 x = permissions [all...] |
/openjdk7/jdk/test/java/lang/ProcessBuilder/ |
H A D | SecurityManagerClinit.java | 41 public Policy(Permission... permissions) { argument 43 for (Permission permission : permissions)
|
/openjdk7/jdk/src/share/classes/java/security/acl/ |
H A D | AclEntry.java | 36 * objects. Each ACL entry object contains a set of permissions associated 39 * as being either positive or negative. If positive, the permissions are 40 * to be granted to the associated principal. If negative, the permissions 57 * Specifies the principal for which permissions are granted or denied 71 * Returns the principal for which permissions are granted or denied by 94 * associated principal the set of permissions in the entry), false 103 * have multiple permissions. 135 * Returns an enumeration of the permissions in this ACL entry. 137 * @return an enumeration of the permissions in this ACL entry. 139 public Enumeration<Permission> permissions(); method in interface:AclEntry [all...] |
/openjdk7/jdk/src/share/classes/javax/security/auth/kerberos/ |
H A D | DelegationPermission.java | 278 * Check and see if this collection of permissions implies the permissions 344 // private Vector permissions; 346 * @serialField permissions java.util.Vector 350 new ObjectStreamField("permissions", Vector.class), 354 * @serialData "permissions" field (a Vector containing the DelegationPermissions). 364 Vector<Permission> permissions = new Vector<>(perms.size()); 367 permissions.addAll(perms); 371 pfields.put("permissions", permissions); [all...] |
H A D | ServicePermission.java | 468 * Check and see if this collection of permissions implies the permissions 490 // more than one action and the collection has individual permissions 551 // private Vector permissions; 554 * @serialField permissions java.util.Vector 558 new ObjectStreamField("permissions", Vector.class), 562 * @serialData "permissions" field (a Vector containing the ServicePermissions). 572 Vector<Permission> permissions = new Vector<>(perms.size()); 575 permissions.addAll(perms); 579 pfields.put("permissions", permission [all...] |
/openjdk7/jdk/src/share/classes/sun/security/acl/ |
H A D | AclEntryImpl.java | 34 * or groups with permissions in the ACL. 35 * The entry may be used as a way of granting or denying permissions. 44 * Construct an ACL entry that associates a user with permissions 74 * This method sets the ACL to have negative permissions. 91 * permissions. This method adds a permission to the ACL entry. 132 * return an enumeration of the permissions in this ACL entry. 134 public Enumeration<Permission> permissions() { method in class:AclEntryImpl 152 Enumeration<Permission> e = permissions();
|
H A D | AclImpl.java | 91 * group or a principal with a set of permissions. Each 143 * This method returns the set of allowed permissions for the 144 * specified principal. This set of allowed permissions is calculated 151 * the positive permissions of each group that the individual belongs to. 153 * the negative permissions of each group that the individual belongs to. 163 * The set of permissions granted to the principal is then calculated using 164 * the simple rule: Individual permissions always override the Group permissions. 166 * denial of permissions) overrides the group positive permission set. 181 // canonicalize the sets. That is remove common permissions fro [all...] |
/openjdk7/jdk/src/share/classes/java/util/ |
H A D | PropertyPermission.java | 43 * This class is for property permissions. 223 * The hash code used is the hash code of this permissions name, that is, 426 * permissions. 513 * Check and see if this set of permissions implies the permissions 608 // Table of permissions. 612 // private Hashtable permissions; 614 * @serialField permissions java.util.Hashtable 620 new ObjectStreamField("permissions", Hashtable.class), 636 Hashtable permissions [all...] |
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | CryptoPermission.java | 465 * permissions. 478 private Vector permissions; field in class:CryptoPermissionCollection 485 permissions = new Vector(3); 505 permissions.addElement(permission); 523 Enumeration e = permissions.elements(); 543 return permissions.elements();
|
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/IPAcl/ |
H A D | AclEntryImpl.java | 61 for (Enumeration<Permission> en = i.permissions(); en.hasMoreElements();){ 104 * the set of permissions in the entry), false otherwise. 114 * have multiple permissions. 155 * Returns an enumeration of the permissions in this ACL entry. 157 * @return an enumeration of the permissions in this ACL entry. 159 public Enumeration<Permission> permissions(){ method in class:AclEntryImpl 176 * Returns the principal for which permissions are granted or denied by this ACL 186 * Specifies the principal for which permissions are granted or denied by
|
H A D | AclImpl.java | 46 * AclEntry, contains a set of permissions and a set of communities associated with a 49 * If positive, the permissions are to be granted to the associated principal. 50 * If negative, the permissions are to be denied. 102 * with a set of permissions. Each principal can have at most one positive ACL entry 103 * (specifying permissions to be granted to the principal) and one negative ACL entry 104 * (specifying permissions to be denied). If there is already an ACL entry 172 * Returns an enumeration for the set of allowed permissions for 175 * This set of allowed permissions is calculated as follows: 184 * @return the permission set specifying the permissions the principal 193 return ent.permissions(); [all...] |
/openjdk7/jdk/src/share/classes/java/io/ |
H A D | FilePermission.java | 647 * permissions, so the effective permission is "read,write", 689 * A FilePermissionCollection stores a set of FilePermission permissions. 702 * permissions, so the effective permission is "read,write". 759 * Check and see if this set of permissions implies the permissions 812 // private Vector permissions; 815 * @serialField permissions java.util.Vector 819 new ObjectStreamField("permissions", Vector.class), 823 * @serialData "permissions" field (a Vector containing the FilePermissions). 833 Vector<Permission> permissions [all...] |
/openjdk7/jdk/test/java/util/concurrent/Executors/ |
H A D | PrivilegedCallables.java | 56 // A Policy class designed to make permissions fiddling very easy. 61 public void setPermissions(Permission...permissions) { 63 for (Permission permission : permissions)
|
/openjdk7/jdk/src/share/classes/java/net/ |
H A D | SocketPermission.java | 1269 * Check and see if this collection of permissions implies the permissions 1329 // private Vector permissions; 1332 * @serialField permissions java.util.Vector 1336 new ObjectStreamField("permissions", Vector.class), 1340 * @serialData "permissions" field (a Vector containing the SocketPermissions). 1350 Vector permissions = new Vector(perms.size()); 1353 permissions.addAll(perms); 1357 pfields.put("permissions", permissions); [all...] |
/openjdk7/jdk/test/java/nio/file/attribute/PosixFileAttributeView/ |
H A D | Basic.java | 45 * permissions have been updated. 51 // change permissions and re-read them. 55 throw new RuntimeException("Actual permissions: " + 61 Files.setAttribute(file, "posix:permissions", perms); 62 current = (Set<PosixFilePermission>)Files.getAttribute(file, "posix:permissions"); 64 throw new RuntimeException("Actual permissions: " + 71 * Check that the actual permissions of a file match or make it more 79 throw new RuntimeException("Actual permissions: " + 104 .permissions()); 115 .permissions()); [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/auth/ |
H A D | PolicyFile.java | 322 // all the permissions required for the PolicyFile initialization 836 // all the permissions required for the PolicyFile initialization 862 * the set of permissions for that principal's protection domain. 868 * @return the set of permissions according to the policy. 881 * the set of permissions for that principal's protection domain. 883 * @param permissions the permissions to populate 888 * @return the set of permissions according to the policy. 920 for (int j = 0; j < entry.permissions.size(); j++) { 921 Permission p = entry.permissions 1340 Vector<Permission> permissions; field in class:PolicyFile.PolicyEntry [all...] |
/openjdk7/jdk/src/share/classes/com/sun/jmx/mbeanserver/ |
H A D | MBeanInstantiator.java | 774 Permissions permissions = new Permissions(); 775 permissions.add(new MBeanPermission("*", null, name, "getClassLoader")); 776 ProtectionDomain protectionDomain = new ProtectionDomain(null, permissions);
|
/openjdk7/jdk/test/java/nio/file/Files/ |
H A D | FileAttributes.java | 106 checkEqual(attrs.permissions(), Files.getAttribute(file, "posix:permissions")); 111 Set<PosixFilePermission> orig = attrs.permissions(); 116 Files.setAttribute(file, "posix:permissions", newPerms); 118 Files.setAttribute(file, "posix:permissions", orig); 127 checkEqual(attrs.permissions(), map.get("permissions")); // check one
|