/openjdk10/jdk/test/java/sql/testng/util/ |
H A D | TestPolicy.java | 46 final PermissionCollection permissions = new Permissions(); field in class:TestPolicy 49 * Constructor which sets the minimum permissions allowing testNG to work 57 * Constructor which determines which permissions are defined for this 70 permissions.add(new AllPermission()); 74 permissions.add(new SQLPermission("setLog")); 78 permissions.add(new SQLPermission("deregisterDriver")); 82 permissions.add(new SQLPermission("setSyncFactory")); 86 permissions.add(new SQLPermission("setSyncFactory")); 87 permissions.add(new LoggingPermission("control", null)); 95 * Defines the minimal permissions require [all...] |
/openjdk10/jdk/test/java/lang/ProcessHandle/ |
H A D | PermissionTest.java | 181 private final PermissionCollection permissions = new Permissions(); field in class:TestPolicy 188 * Defines the minimal permissions required by testNG and set security 192 permissions.add(new SecurityPermission("getPolicy")); 193 permissions.add(new SecurityPermission("setPolicy")); 194 permissions.add(new RuntimePermission("getClassLoader")); 195 permissions.add(new RuntimePermission("setSecurityManager")); 196 permissions.add(new RuntimePermission("createSecurityManager")); 197 permissions.add(new PropertyPermission("testng.show.stack.frames", 199 permissions.add(new PropertyPermission("user.dir", "read")); 200 permissions [all...] |
/openjdk10/jdk/src/java.base/share/classes/java/nio/file/attribute/ |
H A D | PosixFileAttributes.java | 64 * Returns the permissions of the file. The file permissions are returned 66 * copy of the file permissions and is modifiable. This allows the result 68 * setPermissions} method to update the file's permissions. 70 * @return the file permissions 74 Set<PosixFilePermission> permissions(); method in interface:PosixFileAttributes
|
/openjdk10/jdk/src/java.base/share/classes/sun/net/ftp/ |
H A D | FtpDirEntry.java | 63 private boolean[][] permissions = null; field in class:FtpDirEntry 218 if (permissions != null) { 219 return permissions[p.value][0]; 231 if (permissions != null) { 232 return permissions[p.value][1]; 244 if (permissions != null) { 245 return permissions[p.value][2]; 251 * Sets the permissions for that file. Intended mostly to be used 253 * The permissions array is a 3x3 {@code boolean} array, the first index being 256 * <p>E.G.: {@code permissions[ 261 setPermissions(boolean[][] permissions) argument [all...] |
/openjdk10/jdk/src/java.base/share/classes/java/security/ |
H A D | ProtectionDomain.java | 50 * of permissions when being executed on behalf of a given set of Principals. 52 * A static set of permissions can be bound to a ProtectionDomain when it is 53 * constructed; such permissions are granted to the domain regardless of the 56 * mapped to a set of permissions by the current Policy whenever a permission 145 private PermissionCollection permissions; field in class:ProtectionDomain 147 /* if the permissions object has AllPermission */ 161 * Permissions. If the permissions object is not null, then 165 * The permissions granted to this domain are static, i.e. 171 * @param permissions the permissions grante 173 ProtectionDomain(CodeSource codesource, PermissionCollection permissions) argument 219 ProtectionDomain(CodeSource codesource, PermissionCollection permissions, ClassLoader classloader, Principal[] principals) argument [all...] |
H A D | AccessControlContext.java | 95 private Permission[] permissions; field in class:AccessControlContext 254 * doPrivileged() without any limit permissions. 271 * if none of the limiting permissions implied a requested permission. 277 this.permissions = tmp; 500 * Ignore the limited permissions and parent fields of a wrapper 511 if (permissions != null) { 513 for (int i=0; i < permissions.length; i++) { 514 Permission limit = permissions[i]; 533 * doPrivileged() and it does not have its own limited permissions. 535 if (permissions 718 calculateFields(AccessControlContext assigned, AccessControlContext parent, Permission[] permissions) argument [all...] |
H A D | UnresolvedPermissionCollection.java | 38 * of UnresolvedPermission permissions. 105 * get any unresolved permissions of the same type as p, 113 * always returns false for unresolved permissions 132 // Get iterator of Map values (which are lists of permissions) 144 // private Hashtable permissions; // keyed on type 147 * @serialField permissions java.util.Hashtable 149 * of permissions 152 new ObjectStreamField("permissions", Hashtable.class), 167 Hashtable<String, Vector<UnresolvedPermission>> permissions = 178 permissions [all...] |
H A D | BasicPermission.java | 38 * can be used as the base class for permissions that want to 52 * "named" permissions 286 * of BasicPermission permissions. BasicPermission objects 353 * permissions in this collection. 391 * Check and see if this set of permissions implies the permissions 467 // private Hashtable permissions; 469 * @serialField permissions java.util.Hashtable 482 new ObjectStreamField("permissions", Hashtable.class), 499 Hashtable<String, Permission> permissions [all...] |
/openjdk10/jdk/src/java.rmi/share/classes/com/sun/rmi/rmid/ |
H A D | ExecPermission.java | 182 * ExecPermission permissions. 218 * of ExecPermission permissions. ExecPermission objects 229 private Vector<Permission> permissions; field in class:ExecPermission.ExecPermissionCollection 237 permissions = new Vector<>(); 259 permissions.addElement(permission); 263 * Check and see if this set of permissions implies the permissions 276 Enumeration<Permission> e = permissions.elements(); 295 return permissions.elements();
|
H A D | ExecOptionPermission.java | 157 * ExecOptionPermission permissions. 210 * of ExecOptionPermission permissions. ExecOptionPermission objects 225 private Hashtable<String, Permission> permissions; field in class:ExecOptionPermission.ExecOptionPermissionCollection 233 permissions = new Hashtable<>(11); 260 permissions.put(p.getName(), permission); 268 * Check and see if this set of permissions implies the permissions 293 Permission x = permissions.get(pname); 308 x = permissions.get(pname); 323 x = permissions [all...] |
/openjdk10/jdk/test/java/util/logging/ |
H A D | FileHandlerPath.java | 67 * permissions granted. 273 final Permissions permissions; field in class:FileHandlerPath.SimplePolicy 278 permissions = new Permissions(); 279 permissions.add(new LoggingPermission("control", null)); // needed by new FileHandler() 280 permissions.add(new FilePermission("<<ALL FILES>>", "read")); // needed by new FileHandler() 281 permissions.add(new FilePermission(logFile, "write,delete")); // needed by new FileHandler() 282 permissions.add(new FilePermission(logFile+".lck", "write,delete")); // needed by FileHandler.close() 283 permissions.add(new FilePermission(logFile+".1", "write,delete")); // needed by new FileHandler() 284 permissions.add(new FilePermission(logFile+".1.lck", "write,delete")); // needed by FileHandler.close() 285 permissions [all...] |
H A D | TestConfigurationListeners.java | 461 final Permissions permissions; field in class:TestConfigurationListeners.SimplePolicy 463 permissions = new Permissions(); 465 permissions.add(new LoggingPermission("control", null)); 466 permissions.add(new PropertyPermission("java.util.logging.config.class", "read")); 467 permissions.add(new PropertyPermission("java.util.logging.config.file", "read")); 468 permissions.add(new PropertyPermission("java.home", "read")); 469 permissions.add(new FilePermission("<<ALL FILES>>", "read")); 475 return permissions.implies(permission); 480 return new PermissionsBuilder().addAll(permissions).toPermissions(); 485 return new PermissionsBuilder().addAll(permissions) [all...] |
/openjdk10/jdk/test/java/lang/ProcessBuilder/ |
H A D | SecurityManagerClinit.java | 41 public Policy(Permission... permissions) { argument 43 for (Permission permission : permissions)
|
/openjdk10/nashorn/src/jdk.dynalink/share/classes/jdk/dynalink/internal/ |
H A D | AccessControlContextFactory.java | 42 * Creates an access control context with no permissions. 43 * @return an access control context with no permissions. 50 * Creates an access control context limited to only the specified permissions. 51 * @param permissions the permissions for the newly created access control context. 52 * @return a new access control context limited to only the specified permissions. 54 public static AccessControlContext createAccessControlContext(final Permission... permissions) { argument 56 for(final Permission permission: permissions) { 65 * @param runtimePermissionNames the names of runtime permissions for the 68 * permissions wit [all...] |
/openjdk10/nashorn/src/jdk.scripting.nashorn/share/classes/jdk/nashorn/internal/runtime/ |
H A D | AccessControlContextFactory.java | 42 * Creates an access control context with no permissions. 43 * @return an access control context with no permissions. 50 * Creates an access control context limited to only the specified permissions. 51 * @param permissions the permissions for the newly created access control context. 52 * @return a new access control context limited to only the specified permissions. 54 public static AccessControlContext createAccessControlContext(final Permission... permissions) { argument 56 for(final Permission permission: permissions) { 65 * @param runtimePermissionNames the names of runtime permissions for the 68 * permissions wit [all...] |
/openjdk10/jdk/src/java.base/share/classes/java/security/acl/ |
H A D | AclEntry.java | 36 * objects. Each ACL entry object contains a set of permissions associated 39 * as being either positive or negative. If positive, the permissions are 40 * to be granted to the associated principal. If negative, the permissions 62 * Specifies the principal for which permissions are granted or denied 76 * Returns the principal for which permissions are granted or denied by 99 * associated principal the set of permissions in the entry), false 108 * have multiple permissions. 140 * Returns an enumeration of the permissions in this ACL entry. 142 * @return an enumeration of the permissions in this ACL entry. 144 public Enumeration<Permission> permissions(); method in interface:AclEntry [all...] |
/openjdk10/jdk/test/java/util/logging/LogManager/RootLogger/setLevel/ |
H A D | TestRootLoggerLevel.java | 124 private static final Permissions permissions(Permission... perms) { method in class:TestRootLoggerLevel.SimplePolicy 125 Permissions permissions = new Permissions(); 127 permissions.add(perm); 129 return permissions; 133 this(permissions(new LoggingPermission("control", null),
|
/openjdk10/jdk/test/java/lang/Class/getDeclaredField/ |
H A D | ClassDeclaredFieldsTest.java | 138 // A Helper class to build a set of permissions. 169 final Permissions permissions; field in class:ClassDeclaredFieldsTest.SimplePolicy 177 permissions = new Permissions(); 178 permissions.add(new RuntimePermission("accessDeclaredMembers")); 179 permissions.add(new ReflectPermission("suppressAccessChecks")); 190 return permissions.implies(permission); 196 ? allPermissions : permissions).toPermissions(); 202 ? allPermissions : permissions).toPermissions();
|
H A D | FieldSetAccessibleTest.java | 357 // A Helper class to build a set of permissions. 388 final Permissions permissions; field in class:FieldSetAccessibleTest.SimplePolicy 395 permissions = new Permissions(); 396 permissions.add(new RuntimePermission("fileSystemProvider")); 397 permissions.add(new RuntimePermission("createClassLoader")); 398 permissions.add(new RuntimePermission("closeClassLoader")); 399 permissions.add(new RuntimePermission("getClassLoader")); 400 permissions.add(new RuntimePermission("accessDeclaredMembers")); 401 permissions.add(new RuntimePermission("accessSystemModules")); 402 permissions [all...] |
/openjdk10/jaxp/test/javax/xml/jaxp/libs/jaxp/library/ |
H A D | JAXPPolicyManager.java | 104 * Set default permissions, sub-class of JAXPBaseTest should override this 165 private final PermissionCollection permissions = new Permissions(); field in class:TestPolicy 178 permissions.add(p); 182 * Set all permissions. Caution: this should not called carefully unless 185 * private void setAllPermissions() { permissions.add(new AllPermission()); 195 Enumeration<Permission> perms = permissions.elements(); 205 return permissions; 210 return permissions; 231 if (permissions.implies(perm))
|
/openjdk10/jdk/src/java.management/share/classes/com/sun/jmx/remote/security/ |
H A D | SubjectDelegator.java | 59 final Collection<Permission> permissions = new ArrayList<>(ps.size()); 62 permissions.add(new SubjectDelegationPermission(pname)); 67 for (Permission sdp : permissions) {
|
/openjdk10/jdk/test/java/lang/reflect/Proxy/nonPublicProxy/ |
H A D | NonPublicProxyClass.java | 183 final PermissionCollection permissions = new Permissions(); field in class:NonPublicProxyClass.NewInstancePolicy 187 permissions.add(new SecurityPermission("getPolicy")); 189 permissions.add(new RuntimePermission("getClassLoader")); 190 permissions.add(new ReflectPermission(NEW_PROXY_IN_PKG + "p")); 191 permissions.add(new ReflectPermission(NEW_PROXY_IN_PKG + "java.util.zip")); 195 return permissions; 199 return permissions; 203 return permissions.implies(perm); 208 Enumeration<Permission> perms = permissions.elements();
|
/openjdk10/jdk/src/java.security.jgss/share/classes/javax/security/auth/kerberos/ |
H A D | DelegationPermission.java | 237 * Check and see if this collection of permissions implies the permissions 292 // private Vector permissions; 294 * @serialField permissions java.util.Vector 298 new ObjectStreamField("permissions", Vector.class), 302 * @serialData "permissions" field (a Vector containing the DelegationPermissions). 312 Vector<Permission> permissions = new Vector<>(perms.keySet()); 315 pfields.put("permissions", permissions); 332 Vector<Permission> permissions [all...] |
/openjdk10/jdk/test/java/lang/invoke/ |
H A D | MethodHandleConstants.java | 172 final PermissionCollection permissions = new Permissions(); field in class:MethodHandleConstants.TestPolicy 174 permissions.add(new java.io.FilePermission("<<ALL FILES>>", "read")); 177 return permissions; 181 return permissions; 185 return permissions.implies(perm);
|
/openjdk10/jdk/src/java.base/share/classes/java/util/ |
H A D | PropertyPermission.java | 40 * This class is for property permissions. 225 * The hash code used is the hash code of this permissions name, that is, 421 * permissions. 514 * Check and see if this set of permissions implies the permissions 604 // Table of permissions. 608 // private Hashtable permissions; 610 * @serialField permissions java.util.Hashtable 616 new ObjectStreamField("permissions", Hashtable.class), 632 Hashtable<String, Permission> permissions [all...] |