-
com.quickwebframework.util.pattern.WildcardPattern.implies()
-
com.sun.enterprise.deployment.MethodDescriptor.implies()
Indicates if a method descriptor implies the other one
-
com.sun.jini.start.AggregatePolicyProvider.implies()
If the given protection domain is the protection domain of this class, then true
is returned. Otherwise, delegates to the implies
method of the currently active sub-policy to determine if the given permission is implied by the permissions for the specified protection domain.
@param domain protection domain in which to check implication
@param permission permission to test implication of
@return true
if permission is implied by permissions ofgiven protection domain, false
otherwise
-
com.sun.jini.start.LoaderSplitPolicyProvider.implies()
If the given protection domain is the protection domain of this class, then true
is returned. If not, delegates to the implies
method of the underlying policy associated with the loader of the given class (the loader-specific policy if the class loader is null
, the same as or a child of the loader specified in the constructor for this instance, or the default loader otherwise).
@param domain protection domain in which to check implication
@param permission permission to test implication of
@return true
if permission is implied by permissions ofgiven protection domain, false
otherwise
-
com.sun.security.auth.PrincipalComparator.implies()
Check if the specified
Subject
is implied by this object.
@return true if the specified Subject
is implied bythis object, or false otherwise.
-
de.fosd.typechef.featureexpr.FeatureExpr.implies()
-
gabriel.Permission.implies()
Checks if one permission implies the other, for example permission to read /config might imply the permission to read /config/special
Permission implies another permission if both are equal. Override this for more complex permissions.
@param other Permission to check if it is implied by this permission
@return true if this permission implies the passed permission
-
java.io.FilePermission.implies()
Checks if this FilePermission object "implies" the specified permission.
More specifically, this method returns true if:
- p is an instanceof FilePermission,
- p's actions are a proper subset of this object's actions, and
- p's pathname is implied by this object's pathname. For example, "/tmp/*" implies "/tmp/foo", since "/tmp/*" encompasses all files in the "/tmp" directory, including the one named "foo".
@param p the permission to check against.
@return
true
if the specified permission is not
null
and is implied by this object,
false
otherwise.
-
java.net.SocketPermission.implies()
Checks if this socket permission object "implies" the specified permission.
More specifically, this method first ensures that all of the following are true (and returns false if any of them are not):
- p is an instanceof SocketPermission,
- p's actions are a proper subset of this object's actions, and
- p's port range is included in this port range. Note: port range is ignored when p only contains the action, 'resolve'.
Then
implies
checks each of the following, in order, and for each returns true if the stated condition is true:
- If this object was initialized with a single IP address and one of p's IP addresses is equal to this object's IP address.
- If this object is a wildcard domain (such as *.sun.com), and p's canonical name (the name without any preceding *) ends with this object's canonical host name. For example, *.sun.com implies *.eng.sun.com..
- If this object was not initialized with a single IP address, and one of this object's IP addresses equals one of p's IP addresses.
- If this canonical name equals p's canonical name.
If none of the above are true,
implies
returns false.
@param p the permission to check against.
@return true if the specified permission is implied by this object,false if not.
-
java.security.BasicPermission.implies()
Checks if the specified permission is "implied" by this object.
More specifically, this method returns true if:
- p's class is the same as this object's class, and
- p's name equals or (in the case of wildcards) is implied by this object's name. For example, "a.b.*" implies "a.b.c".
@param p the permission to check against.
@return true if the passed permission is equal to orimplied by this permission, false otherwise.
-
java.security.CodeSource.implies()
sun.com/classes/foo.jar" and null certificates:
http: http://*.sun.com/classes/ http://java.sun.com/classes/- http://java.sun.com/classes/foo.jar
Note that if this CodeSource has a null location and a null certificate chain, then it implies every other CodeSource.
@param codesource CodeSource to compare against.
@return true if the specified codesource is implied by this codesource,false if not.
-
java.security.Permission.implies()
Checks if the specified permission's actions are "implied by" this object's actions.
This must be implemented by subclasses of Permission, as they are the only ones that can impose semantics on a Permission object.
The implies
method is used by the AccessController to determine whether or not a requested permission is implied by another permission that is known to be valid in the current execution context.
@param permission the permission to check against.
@return true if the specified permission is implied by this object,false if not.
-
java.security.PermissionCollection.implies()
Checks to see if the specified permission is implied by the collection of Permission objects held in this PermissionCollection.
@param permission the Permission object to compare.
@return true if "permission" is implied by the permissions inthe collection, false if not.
-
java.security.Permissions.implies()
Checks to see if this object's PermissionCollection for permissions of the specified permission's class implies the permissions expressed in the
permission object. Returns true if the combination of permissions in the appropriate PermissionCollection (e.g., a FilePermissionCollection for a FilePermission) together imply the specified permission.
For example, suppose there is a FilePermissionCollection in this Permissions object, and it contains one FilePermission that specifies "read" access for all files in all subdirectories of the "/tmp" directory, and another FilePermission that specifies "write" access for all files in the "/tmp/scratch/foo" directory. Then if the implies
method is called with a permission specifying both "read" and "write" access to files in the "/tmp/scratch/foo" directory, true
is returned.
Additionally, if this PermissionCollection contains the AllPermission, this method will always return true.
@param permission the Permission object to check.
@return true if "permission" is implied by the permissions in thePermissionCollection it belongs to, false if not.
-
java.security.Policy.implies()
Evaluates the global policy for the permissions granted to the ProtectionDomain and tests whether the permission is granted.
@param domain the ProtectionDomain to test
@param permission the Permission object to be tested for implication.
@return true if "permission" is a proper subset of a permissiongranted to this ProtectionDomain.
@see java.security.ProtectionDomain
@since 1.4
-
java.security.ProtectionDomain.implies()
Check and see if this ProtectionDomain implies the permissions expressed in the Permission object.
The set of permissions evaluated is a function of whether the ProtectionDomain was constructed with a static set of permissions or it was bound to a dynamically mapped set of permissions.
If the ProtectionDomain was constructed to a {@link #ProtectionDomain(CodeSource,PermissionCollection) statically bound} PermissionCollection then the permission willonly be checked against the PermissionCollection supplied at construction.
However, if the ProtectionDomain was constructed with the constructor variant which supports {@link #ProtectionDomain(CodeSource,PermissionCollection,ClassLoader,java.security.Principal[]) dynamically binding}permissions, then the permission will be checked against the combination of the PermissionCollection supplied at construction and the current Policy binding.
@param permission the Permission object to check.
@return true if "permission" is implicit to this ProtectionDomain.
-
java.security.UnresolvedPermission.implies()
This method always returns false for unresolved permissions. That is, an UnresolvedPermission is never considered to imply another permission.
@param p the permission to check against.
@return false.
-
javax.management.MBeanPermission.implies()
-
javax.management.MBeanServerPermission.implies()
-
javax.security.auth.kerberos.DelegationPermission.implies()
Checks if this Kerberos delegation permission object "implies" the specified permission.
If none of the above are true, {@code implies} returns false.
@param p the permission to check against.
@return true if the specified permission is implied by this object,false if not.
-
javax.security.auth.kerberos.ServicePermission.implies()
Checks if this Kerberos service permission object "implies" the specified permission.
If none of the above are true, {@code implies} returns false.
@param p the permission to check against.
@return true if the specified permission is implied by this object,false if not.
-
javax.security.jacc.WebResourcePermission.implies()
-
kodkod.ast.Formula.implies()
Returns the implication of the specified formula by this. The effect of this method is the same as calling this.compose(IMPLIES, formula).
@return this.compose(IMPLIES, formula)
-
kodkod.engine.bool.BooleanFactory.implies()
Returns a boolean value whose meaning is [[v0]] => [[v1]]. The behavior of this method is unspecified if v0 or v1 are not components of this factory.
@requires v0 + v1 in this.components
@return { v: BooleanValue | [[v]] = [[v0]] => [[v1]] }
@effects this.components' = this.components + v
@throws NullPointerException - any of the arguments are null
-
macromedia.asc.semantics.Slot.implies()
-
net.bytten.metazelda.Condition.implies()
Determines whether another Condition is necessarily true if this one is.
@param other the other Condition
@return whether the other Condition is implied by this one
-
net.jini.security.GrantPermission.implies()
Returns
true
if the given permission is a
GrantPermission
implied by this permission, or
false
otherwise. Implication is defined as follows: for a given
GrantPermission g
, let
c(g)
denote the set of all permissions contained within
g
or within arbitrarily nested
GrantPermission
s inside
g
, excluding nested
GrantPermission
s themselves. Then, a
GrantPermission g1
is implied by another
GrantPermission g2
if and only if each permission in
c(g1)
is implied by
c(g2)
.
Implication of contained java.security.UnresolvedPermission
s is special-cased: an UnresolvedPermission p1
is taken to imply another UnresolvedPermission p2
if and only if the serialized representations of p1
and p2
are identical.
@param permission permission to check
@return true
if given permission is implied by thispermission, false
otherwise
-
net.jini.security.policy.DynamicPolicyProvider.implies()
Behaves as specified by {@link Policy#implies}.
-
net.jini.security.policy.PolicyFileProvider.implies()
Behaves as specified by {@link Policy#implies}.
-
org.apache.derby.security.DatabasePermission.implies()
Checks if this DatabasePermission implies a specified permission.
This method returns true if:
- p is an instanceof DatabasePermission and
- p's directory pathname is implied by this object's pathname. For example, "/tmp/*" implies "/tmp/foo", since "/tmp/*" encompasses the "/tmp" directory and all files in that directory, including the one named "foo".
@param p the permission to check against
@return true if the specified permission is implied by this object,false if not
@see Permission#implies(Permission)
-
org.apache.derby.security.SystemPermission.implies()
Does this permission imply another. Only true if the other permission is a SystemPermission with the same name and all the actions of the permission are present in this. Note that none of the actions imply any other with this SystemPermission.
-
org.apache.felix.framework.security.util.Permissions.implies()
@param target the permission to be implied
@param bundle if not null then allow implicit permissions like file access to local data area
@return true if the permission is implied by this permissions object.
-
org.apache.hadoop.fs.permission.FsAction.implies()
-
org.apache.isis.security.shiro.authorization.IsisPermission.implies()
-
org.apache.openejb.server.auth.IPAddressPermission.implies()
-
org.apache.sentry.policy.common.Privilege.implies()
-
org.apache.shiro.authz.Permission.implies()
Returns {@code true} if this current instance
implies all the functionality and/or resource accessdescribed by the specified {@code Permission} argument, {@code false} otherwise.
That is, this current instance must be exactly equal to or a superset of the functionalty and/or resource access described by the given {@code Permission} argument. Yet another way of saying thiswould be:
If "permission1 implies permission2", i.e. permission1.implies(permission2)
, then any Subject granted {@code permission1} would have ability greater than or equal to that defined by{@code permission2}.
@param p the permission to check for behavior/functionality comparison.
@return {@code true} if this current instance implies all the functionality and/or resource accessdescribed by the specified {@code Permission} argument, {@code false} otherwise.
-
org.apache.shiro.authz.permission.WildcardPermission.implies()
-
org.apache.wicket.security.actions.WaspAction.implies()
Check if the supplied action is implied by this WaspAction.
@param other the action to check
@return true if the action is implied, false otherwise.
-
org.apache.wicket.security.hive.authorization.Permission.implies()
Check if this permission implies the specified permission.
@param permission
@return true if this implies the permission, false otherwise.
-
org.jboss.naming.JndiPermission.implies()
Checks if this JndiPermission object "implies" the specified permission.
More specifically, this method returns true if:
- p is an instanceof JndiPermission,
- p's actions are a proper subset of this object's actions, and
- p's pathname is implied by this object's pathname. For example, "/tmp/*" implies "/tmp/foo", since "/tmp/*" encompasses all files in the "/tmp" directory, including the one named "foo".
@param p the permission to check against.
@return
true
if the specified permission is not
null
and is implied by this object,
false
otherwise.
-
org.osgi.service.event.TopicPermission.implies()
Determines if the specified permission is implied by this object.
This method checks that the topic name of the target is implied by the topic name of this object. The list of {@code TopicPermission} actionsmust either match or allow for the list of the target object to imply the target {@code TopicPermission} action.
x/y/*,"publish" -> x/y/z,"publish" is true *,"subscribe" -> x/y,"subscribe" is true *,"publish" -> x/y,"subscribe" is false x/y,"publish" -> x/y/z,"publish" is false
@param p The target permission to interrogate.
@return {@code true} if the specified {@code TopicPermission} action isimplied by this object; {@code false} otherwise.
-
org.wicketstuff.security.actions.WaspAction.implies()
Check if the supplied action is implied by this WaspAction.
@param other the action to check
@return true if the action is implied, false otherwise.
-
org.wicketstuff.security.hive.authorization.Permission.implies()
Check if this permission implies the specified permission.
@param permission
@return true if this implies the permission, false otherwise.