All Downloads are FREE. Search and download functionalities are using the official Maven repository.

java.io.SerializablePermission Maven / Gradle / Ivy

There is a newer version: 1.3.1
Show newest version
/*

This is not an official specification document, and usage is restricted.

NOTICE


(c) 2005-2007 Sun Microsystems, Inc. All Rights Reserved.

Neither this file nor any files generated from it describe a complete specification, and they may only be used as described below. For example, no permission is given for you to incorporate this file, in whole or in part, in an implementation of a Java specification.

Sun Microsystems Inc. owns the copyright in this file and it is provided to you for informative, as opposed to normative, use. The file and any files generated from it may be used to generate other informative documentation, such as a unified set of documents of API signatures for a platform that includes technologies expressed as Java APIs. The file may also be used to produce "compilation stubs," which allow applications to be compiled and validated for such platforms.

Any work generated from this file, such as unified javadocs or compiled stub files, must be accompanied by this notice in its entirety.

This work corresponds to the API signatures of JSR 219: Foundation Profile 1.1. In the event of a discrepency between this work and the JSR 219 specification, which is available at http://www.jcp.org/en/jsr/detail?id=219, the latter takes precedence. */ package java.io; import java.security.*; import java.util.Enumeration; import java.util.Hashtable; import java.util.StringTokenizer; /** * This class is for Serializable permissions. A SerializablePermission * contains a name (also referred to as a "target name") but * no actions list; you either have the named permission * or you don't. * *

* The target name is the name of the Serializable permission (see below). * *

* The following table lists all the possible SerializablePermission target names, * and for each provides a description of what the permission allows * and a discussion of the risks of granting code the permission. *

* *

* * * * * * * * * * * * * * * * * * *
Permission Target NameWhat the Permission AllowsRisks of Allowing this Permission
enableSubclassImplementationSubclass implementation of ObjectOutputStream or ObjectInputStream * to override the default serialization or deserialization, respectively, * of objectsCode can use this to serialize or * deserialize classes in a purposefully malfeasant manner. For example, * during serialization, malicious code can use this to * purposefully store confidential private field data in a way easily accessible * to attackers. Or, during deserializaiton it could, for example, deserialize * a class with all its private fields zeroed out.
enableSubstitutionSubstitution of one object for another during * serialization or deserializationThis is dangerous because malicious code * can replace the actual object with one which has incorrect or * malignant data.
* * @see java.security.BasicPermission * @see java.security.Permission * @see java.security.Permissions * @see java.security.PermissionCollection * @see java.lang.SecurityManager * * @version 1.13, 02/02/00 * * @author Joe Fialli * @since 1.2 */ public final class SerializablePermission extends BasicPermission { /** * @serial */ private String actions; /** * Creates a new SerializablePermission with the specified name. * The name is the symbolic name of the SerializablePermission, such as * "enableSubstitution", etc. * * @param name the name of the SerializablePermission. */ public SerializablePermission(String name) { super(name); } /** * Creates a new SerializablePermission object with the specified name. * The name is the symbolic name of the SerializablePermission, and the * actions String is currently unused and should be null. * * @param name the name of the SerializablePermission. * @param actions currently unused and must be set to null */ public SerializablePermission(String name, String actions) { super(name, actions); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy