function stringlengths 87 5.09k | validationType stringclasses 2
values | fixed stringlengths 289 7.12k |
|---|---|---|
@RequiresApi<method*start>android.support.annotation.RequiresApi<method*end>(api<method*start>android.support.annotation.RequiresApi.api<method*end> = Build.VERSION_CODES.M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
public static String<method*start>java.lang.String<method*end>[] checkPermission(Context... | annotation | @RequiresApi<method*start>android.support.annotation.RequiresApi<method*end>(api<method*start>android.support.annotation.RequiresApi.api<method*end> = Build.VERSION_CODES.M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
public static String<method*start>java.lang.String<method*end>[] checkPermission(Context... |
public void checkReadPermission(IRI<method*start>org.apache.clerezza.IRI<method*end> GraphUri) {
try {
AccessController.checkPermission<method*start>java.security.AccessController.checkPermission<method*end>(new AllPermission<method*start>java.security.AllPermission<method*end>());
} ca... | conventional | public void checkReadPermission(IRI<method*start>org.apache.clerezza.IRI<method*end> GraphUri) {
if (GraphUri.equals<method*start>org.apache.clerezza.IRI.equals<method*end>(permissionGraphName)) {
// priviledged during verfification
return;
}
SecurityManager<method*start>java.lang.SecurityMa... |
private static QuarkusSecurityIdentityio.quarkus.security.runtime.QuarkusSecurityIdentity augmentIdentity(SecurityIdentityio.quarkus.security.identity.SecurityIdentity securityIdentity, Stringjava.lang.String accessToken, Stringjava.lang.String refreshToken, RoutingContextio.vertx.ext.web.RoutingContext context) {
... | conventional | private static QuarkusSecurityIdentity<method*start>io.quarkus.security.runtime.QuarkusSecurityIdentity<method*end> augmentIdentity(SecurityIdentity<method*start>io.quarkus.security.identity.SecurityIdentity<method*end> securityIdentity, String<method*start>java.lang.String<method*end> accessToken, String<method*start>... |
protected boolean verifyStaticPermission(Principal<method*start>java.security.Principal<method*end> principal, final Permission<method*start>java.security.Permission<method*end> permission) {
Subject<method*start>javax.security.auth.Subject<method*end> subject = new Subject<method*start>javax.security.auth.Subject<... | conventional | protected boolean verifyStaticPermission(Principal<method*start>java.security.Principal<method*end> principal, final Permission<method*start>java.security.Permission<method*end> permission) {
Subject<method*start>javax.security.auth.Subject<method*end> subject = new Subject<method*start>javax.security.auth.Subject<... |
private boolean checkPerm(Permission<method*start>java.security.Permission<method*end> p, Class<method*start>java.lang.Class<method*end> caller) {
if (LOG.isLoggable<method*start>java.util.logging.Logger.isLoggable<method*end>(Level.FINE<method*start>java.util.logging.Level.FINE<method*end>)) {
LOG.fine<met... | conventional | private boolean checkPerm(Permission<method*start>java.security.Permission<method*end> p, Class<method*start>java.lang.Class<method*end> caller) {
if (LOG.isLoggable<method*start>java.util.logging.Logger.isLoggable<method*end>(Level.FINE<method*start>java.util.logging.Level.FINE<method*end>)) {
LOG.fine<met... |
public static void forbidExit() {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> securityManager = new SecurityManager<method*start>java.lang.SecurityManager<method*end>() {
System<method*start>java.lang.System<method*end>.setSecurityManager(securityManager);
} | annotation | public static void forbidExit() {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> securityManager = new SecurityManager<method*start>java.lang.SecurityManager<method*end>() {
@Override
public void checkPermission(Permission<method*start>java.security.Permission<method*end> ... |
@Override<method*start>java.lang.Override<method*end>
public void onClick(View<method*start>android.view.View<method*end> v) {
view<method*start>com.journaldev.runtimepermissions.MainActivity.view<method*end> = v;
int id = v.getId<method*start>android.view.View.getId<method*end>();
switch(id) {
case... | annotation | @Override<method*start>java.lang.Override<method*end>
public void onClick(View<method*start>android.view.View<method*end> v) {
view<method*start>com.journaldev.runtimepermissions.MainActivity.view<method*end> = v;
int id = v.getId<method*start>android.view.View.getId<method*end>();
switch(id) {
case... |
@SuppressWarnings("fallthrough")
private void cd(String path) throws URI.MalformedURIException, RemoteException, SRMException, InterruptedException {
if (!path.endsWith("/")) {
path = path + "/";
}
URI uri = new URI(pwd, path);
checkValidPath(fs.stat(uri).getType() == TFileType.DIRECTORY, "Not a... | annotation | @SuppressWarnings("fallthrough")
private void cd(String<method*start>java.lang.String<method*end> path) throws URI.MalformedURIException<method*start>org.apache.axis.types.URI.MalformedURIException<method*end>, RemoteException<method*start>java.rmi.RemoteException<method*end>, SRMException<method*start>org.dcache.srm.S... |
void checkPackageList(String packageName, final String restriction, String permission) {
if (packageName == null)
throw new NullPointerException();
String list = (String) AccessController.doPrivileged(new PrivilegedAction() {
public Object run() {
return Security.getProperty(restric... | conventional | void checkPackageList(String<method*start>java.lang.String<method*end> packageName, final String<method*start>java.lang.String<method*end> restriction, String<method*start>java.lang.String<method*end> permission) {
if (packageName == null)
throw new NullPointerException<method*start>java.lang.NullPointerExc... |
private static void checkMemberAccess(final Class<method*start>java.lang.Class<method*end><?> theClass, final Member<method*start>java.lang.reflect.Member<method*end> theMember) {
if (theMember == null || Modifier.isPublic<method*start>java.lang.reflect.Modifier.isPublic<method*end>(theMember.getModifiers<method*s... | conventional | private static void checkMemberAccess(final Class<method*start>java.lang.Class<method*end><?> theClass, final Member<method*start>java.lang.reflect.Member<method*end> theMember) {
// 1) bypass the permission check when theMember is public or null.
if (theMember == null || Modifier.isPublic<method*start>java.lan... |
@Override
public void checkCurrentUserPermissions(final List<method*start>java.util.List<method*end><Permission<method*start>org.killbill.billing.security.Permission<method*end>> permissions, final Logical<method*start>org.killbill.billing.security.Logical<method*end> logical, final TenantContext<method*start>org.killb... | annotation | @Override
public void checkCurrentUserPermissions(final List<method*start>java.util.List<method*end><Permission<method*start>org.killbill.billing.security.Permission<method*end>> permissions, final Logical<method*start>org.killbill.billing.security.Logical<method*end> logical, final TenantContext<method*start>org.killb... |
public boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler) throws Exception {
// 请求的路径
String contextPath = request.getServletPath();
String url = request.getScheme() + "://" + request.getServerName() + ":" + request.getServerPort() + request.getServletPath();
if ... | conventional | public boolean preHandle(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, Object<method*start>java.lang.Object<method*end> handler) throws Exception<method*start>java.lang.Exception<me... |
public static Token<method*start>org.wf.jwtp.provider.Token<method*end> parseToken(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, TokenStore<method*start>org.wf.jwtp.provider.TokenStore<method*end> tokenStore) {
Token<method*start>org.wf.jwtp.provider.Token<method*end> to... | conventional | public static Token<method*start>org.wf.jwtp.provider.Token<method*end> parseToken(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, TokenStore<method*start>org.wf.jwtp.provider.TokenStore<method*end> tokenStore) {
Token<method*start>org.wf.jwtp.provider.Token<method*end> to... |
@Override<method*start>java.lang.Override<method*end>
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public void setAccessible(boolean flag) {
// 如果需要开启访问权限
// 获取setAccessible()的调用者所处的类
Class<method*start>java.lang.Class<method*end><?> caller = Re... | annotation | @Override<method*start>java.lang.Override<method*end>
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public void setAccessible(boolean flag) {
AccessibleObject.checkPermission<method*start>java.lang.reflect.AccessibleObject.checkPermission<method*end>();
// 如果需要开启访问权限
if (fla... |
private st<method*start>java.lang.Class<method*end>atic void checkProxyAcc<method*start>java.lang.ClassLoader<method*end>ess(Class<?> c<method*start>java.lang.Class<method*end>aller, ClassLoader loader, Class<?>... inter<method*start>java.lang.SecurityManager<method*end>faces) {
retur<method*start>java.lan... | conventional | private st<method*start>java.lang.Class<method*end>atic void checkProxyAcc<method*start>java.lang.ClassLoader<method*end>ess(Class<?> c<method*start>java.lang.Class<method*end>aller, ClassLoader loader, Class<?>... inter<method*start>java.lang.SecurityManager<method*end>faces) {
SecurityManage<method*start>java.lan... |
@WrapInTransaction
@Override
public FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> save(final FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> var, final User<method*start>com.liferay.portal.model.User<method*end> user) throws DotDataExcept... | annotation | @WrapInTransaction
@Override
public FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> save(final FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> var, final User<method*start>com.liferay.portal.model.User<method*end> user) throws DotDataExce... |
@Override
public AuthorizeForAutoscaleV4Response authorizeForAutoscale(String crn, String userId, String tenant, String permission) {
AuthorizeForAutoscaleV4Response response = new AuthorizeForAutoscaleV4Response();
try {
restRequestThreadLocalService.setCloudbreakUserByUsernameAndTenant(userId, tenant)... | conventional | @Override<method*start>java.lang.Override<method*end>
public AuthorizeForAutoscaleV4Response<method*start>com.sequenceiq.cloudbreak.api.endpoint.v4.autoscales.response.AuthorizeForAutoscaleV4Response<method*end> authorizeForAutoscale(String<method*start>java.lang.String<method*end> crn, String<method*start>java.lang.St... |
public AccessControlContext delegatedContext(AccessControlContext authenticatedACC, Subject delegatedSubject, boolean removeCallerContext) throws SecurityException {
throw new SecurityException("Illegal AccessControlContext: null");
}
// Check if the subject delegation permission allows the
// ... | conventional | public AccessControlContext<method*start>java.security.AccessControlContext<method*end> delegatedContext(AccessControlContext<method*start>java.security.AccessControlContext<method*end> authenticatedACC, Subject<method*start>javax.security.auth.Subject<method*end> delegatedSubject, boolean removeCallerContext) throws S... |
public void secure(final Account operatedAccount, final String permission, SecuredType type, UserIdentityContext userIdentityContext) throws AuthorizationException {
if (operatedAccount == null) {
// if operatedAccount is NULL, we'll probably return a 404. But let's handle that in a central place.
... | conventional | public void secure(final Account<method*start>org.restcomm.connect.dao.entities.Account<method*end> operatedAccount, final String<method*start>java.lang.String<method*end> permission, SecuredType<method*start>org.restcomm.connect.http.security.PermissionEvaluator.SecuredType<method*end> type<method*start>org.restcomm.c... |
@Setup<method*start>org.openjdk.jmh.annotations.Setup<method*end>
public void makeFinder() throws Throwable<method*start>java.lang.Throwable<method*end> {
defaultThriftMessageClassFinder<method*start>com.linecorp.armeria.common.thrift.text.StackTracingBenchmark.defaultThriftMessageClassFinder<method*end> = new Defa... | annotation | @Setup<method*start>org.openjdk.jmh.annotations.Setup<method*end>
public void makeFinder() throws Throwable<method*start>java.lang.Throwable<method*end> {
defaultThriftMessageClassFinder<method*start>com.linecorp.armeria.common.thrift.text.StackTracingBenchmark.defaultThriftMessageClassFinder<method*end> = new Defa... |
public static <T> T runWithRestrictedPermissions(PrivilegedExceptionAction<T> action, Permission... permissions) throws Exception {
assumeTrue("runWithRestrictedPermissions requires a SecurityManager enabled", System.getSecurityManager() != null);
final AccessControlContext ctx = new AccessControlCont... | conventional | public static <T> T runWithRestrict<method*start>java.lang.Exception<method*end>edPermissions(Privile<method*start>org.apache.lucene.util.LuceneTestCase.assumeTrue<method*end>gedExceptionAction<T> action, Permission... permissions) throws Exception <method*start>java.lang.System<method*end>{
assumeTrue("runWithRest... |
public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
Permission<method*start>java.security.Permission<method*end> perm = new MBeanServerPermission<method*start>javax.management.MBeanServerPermission<method*end>("createMBeanServer");
s... | conventional | public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
Perm... |
public void setContextClassLoader(ClassLoader cl) {
contextClassLoader = cl;
} | conventional | public void setContextClassLoader(ClassLoader<method*start>java.lang.ClassLoader<method*end> cl) {
/*[PR 1FCA807]*/
SecurityManager<method*start>java.lang.SecurityManager<method*end> currentManager = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
// if there is a s... |
public boolean hasPermissionForActivity(Intent intent, String srcPackage) {
ResolveInfo target = mPm.resolveActivity(intent, 0);
if (target == null) {
// Not a valid target
return false;
}
if (TextUtils.isEmpty(target.activityInfo.permission)) {
// No permission is needed
... | conventional | public boolean hasPermissionForActivity(Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
ResolveInfo<method*start>android.content.pm.ResolveInfo<method*end> target = mPm.resolveActivity<method*start>android.content.pm.PackageManager.resolv... |
public static boolean hasPermissionForActivity(Context<method*start>android.content.Context<method*end> context, Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
PackageManager<method*start>android.content.pm.PackageManager<method*end> pm ... | conventional | public static boolean hasPermissionForActivity(Context<method*start>android.content.Context<method*end> context, Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
PackageManager<method*start>android.content.pm.PackageManager<method*end> pm ... |
private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = (JarFile<method*start>java.util.jar.JarFile<method*end>) fileCache.get<method*start>java.util.HashMap.get<method*end>(url);... | conventional | private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = (JarFile<method*start>java.util.jar.JarFile<method*end>) fileCache.get<method*start>java.util.HashMap.get<method*end>(url);... |
private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = fileCache.get<method*start>java.util.HashMap.get<method*end>(URLUtil.urlNoFragString<method*start>sun.net.util.URLUtil... | conventional | private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
assert Thread.holdsLock<method*start>java.lang.Thread.holdsLock<method*end>(instance);
JarFile<method*start>java.util.jar.JarFile<method*end> result = fileCache.get<method*start>java.... |
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getClassLoader(ObjectName<method*start>javax.management.ObjectName<method*end> name) {
ClassLoader<method*start>java.lang.ClassLoader<method*end> instance = loadersWithNames.get<method*start>java.util.Map.get<method*end>(name);
if (instance... | conventional | public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getClassLoader(ObjectName<method*start>javax.management.ObjectName<method*end> name) {
ClassLoader<method*start>java.lang.ClassLoader<method*end> instance = loadersWithNames.get<method*start>java.util.Map.get<method*end>(name);
if (instance... |
@CallerSensitive
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getParent() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
ClassLoader<method*start>java.lan... | annotation | @CallerSensitive
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getParent() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security != null) {
ClassLoad... |
@Override
public void deleteProcRoleBinding(String procId, ProcRoleRequestDto procRoleRequestDto) throws WecubeCoreException {
ProcRoleBindingEntity.permissionEnum permissionEnum = transferPermissionStrToEnum(procRoleRequestDto.getPermission());
Optional<List<ProcRoleBindingEntity>> foundMgmtData ... | annotation | @Override<method*start>java.lang.Override<method*end>
public void deleteProcRoleBinding(String<method*start>java.lang.String<method*end> procId, ProcRoleRequestDto<method*start>com.webank.wecube.platform.core.dto.workflow.ProcRoleRequestDto<method*end> procRoleRequestDto) throws WecubeCoreException<method*start>com.web... |
@Deprecated
public boolean checkTopLevelWindow(Object window) {
if (window == null) {
throw new NullPointerException("window can't be null");
}
perm = SecurityConstants.ALL_PERMISSION;
}
try {
return true;
} catch (SecurityException se) {
// just return false
}
... | conventional | @Deprecated<method*start>java.lang.Deprecated<method*end>
public boolean checkTopLevelWindow(Object<method*start>java.lang.Object<method*end> window) {
if (window == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("window can't be null");
}
Permission<m... |
@Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> findEntries(String<method*start>java.lang.String<method*end> path, String<method*start>java.lang.String<method*end> filePattern, boolean recurse) {
Object<method*start>java.lang.Object<method*end>... | annotation | @Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> findEntries(String<method*start>java.lang.String<method*end> path, String<method*start>java.lang.String<method*end> filePattern, boolean recurse) {
Object<method*start>java.lang.Object<method*end>... |
@Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> obj1) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<method*end> link = W... | annotation | @Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> obj1) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<method*end> link = W... |
private String<method*start>java.lang.String<method*end> getRealRoot(boolean isUser) {
// not sure about this, we should have already these permissions...
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<meth... | conventional | private String<method*start>java.lang.String<method*end> getRealRoot(boolean isUser) {
// not sure about this, we should have already these permissions...
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<meth... |
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean removeJobs(List<method*start>java.util.List<method*end><JobId<method*start>org.ow2.proactive.scheduler.common.job.JobId<method*end>> jobIds) throws NotConnectedException<method*start>org.ow2.proactive.scheduler... | annotation | @ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean removeJobs(List<method*start>java.util.List<method*end><JobId<method*start>org.ow2.proactive.scheduler.common.job.JobId<method*end>> jobIds) throws NotConnectedException<method*start>org.ow2.proactive.scheduler... |
public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
Permission<method*sta... | conventional | public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
Perm... |
@Override
public void onRequestPermissionsResult(int requestCode, @NonNull<method*start>androidx.annotation.NonNull<method*end> String[] permissions, @NonNull<method*start>androidx.annotation.NonNull<method*end> int[] grantResults) {
super.onRequestPermissionsResult<method*start>androidx.appcompat.app.AppCompatActi... | annotation | @Override
public void onRequestPermissionsResult(int requestCode, @NonNull<method*start>androidx.annotation.NonNull<method*end> String[] permissions, @NonNull<method*start>androidx.annotation.NonNull<method*end> int[] grantResults) {
super.onRequestPermissionsResult<method*start>androidx.appcompat.app.AppCompatActi... |
public boolean hasAccess(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> context, final HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, final boolean redirect) throws IOException<method*start>java.io.IOException<method*end> {
final boolean allowed... | conventional | public boolean hasAccess(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> context, final HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, final boolean redirect) throws IOException<method*start>java.io.IOException<method*end> {
final boolean allowed... |
@Override
public boolean hasPermissionOffline(String<method*start>java.lang.String<method*end> name, PermissionNode<method*start>fr.xephi.authme.permission.PermissionNode<method*end> node) {
User<method*start>net.luckperms.api.model.user.User<method*end> user = luckPerms.getUserManager<method*start>net.luckperms.ap... | annotation | @Override
public boolean hasPermissionOffline(String<method*start>java.lang.String<method*end> name, PermissionNode<method*start>fr.xephi.authme.permission.PermissionNode<method*end> node) {
User<method*start>net.luckperms.api.model.user.User<method*end> user = luckPerms.getUserManager<method*start>net.luckperms.ap... |
private static void checkMBeanTrustPermission(final Class<method*start>java.lang.Class<method*end> theClass) throws
Permission<method*start>java.security.Permission<method*end> perm = new MBeanTrustPermission<method*start>javax.management.MBeanTrustPermission<method*end>("register");
PrivilegedAction<... | conventional | private static void checkMBeanTrustPermission(final Class<method*start>java.lang.Class<method*end> theClass) throws SecurityException<method*start>java.lang.SecurityException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System... |
@Override<method*start>java.lang.Override<method*end>
public void createLink(Path<method*start>java.nio.file.Path<method*end> linkPath, Path<method*start>java.nio.file.Path<method*end> targetPath) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<metho... | annotation | @Override<method*start>java.lang.Override<method*end>
public void createLink(Path<method*start>java.nio.file.Path<method*end> linkPath, Path<method*start>java.nio.file.Path<method*end> targetPath) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<metho... |
@Override<method*start>java.lang.Override<method*end>
public String<method*start>java.lang.String<method*end> registerConfigProvider(String<method*start>java.lang.String<method*end> className, Map<method*start>java.util.Map<method*end> properties, String<method*start>java.lang.String<method*end> layer, String<method*st... | annotation | @Override<method*start>java.lang.Override<method*end>
public String<method*start>java.lang.String<method*end> registerConfigProvider(String<method*start>java.lang.String<method*end> className, Map<method*start>java.util.Map<method*end> properties, String<method*start>java.lang.String<method*end> layer, String<method*st... |
public static synchronized boolean checkRemoveCallerContext(Subject subject) {
try {
final Principal[] dp = subject.getPrincipals().toArray(new Principal[0]);
for (int i = 0; i < dp.length; i++) {
final String pname = dp[i].getClass().getName() + "." + dp[i].getName();
final ... | conventional | public static synchronized boolean checkRemoveCallerContext(Subject<method*start>javax.security.auth.Subject<method*end> subject) {
try {
final Principal<method*start>java.security.Principal<method*end>[] dp = subject.getPrincipals<method*start>javax.security.auth.Subject.getPrincipals<method*end>().toArray... |
@Ove<method*start>java.util.Set<method*end>rride
public Set<String> getCallerGroups(Creden<method*start>javax.security.enterprise.identitystore.CredentialValidationResult<method*end>tialValidationResult validationResult) {
LdapContext searchContext = cre<method*start>org.glassfish.soteria.identitystores.Ldap... | annotation | @Ove<method*start>java.util.Set<method*end>rride
public Set<String> getCallerGroups(Creden<method*start>javax.security.enterprise.identitystore.CredentialValidationResult<method*end>tialValidationResult validationResult) {
// Make sure caller has permission to invoke this method
SecurityManager secu<method*star... |
@Override
@ImmediateService
public boolean killJobs(List<String> jobIds) throws NotConnectedException, PermissionException {
if (jobIds.isEmpty()) {
return false;
}
List<JobId> jobIdsConverted = jobIds.stream().map(JobIdImpl::makeJobId).collect(Collectors.toList());
return schedulingService.kil... | annotation | @Override<method*start>java.lang.Override<method*end>
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean killJobs(List<method*start>java.util.List<method*end><String<method*start>java.lang.String<method*end>> jobIds) throws NotConnectedException<method*start>or... |
@Implementation(minSdk<method*start>org.robolectric.annotation.Implements.minSdk<method*end> = M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
protected void grantRuntimePermission(String<method*start>java.lang.String<method*end> packageName, String<method*start>java.lang.String<method*end> permissionName,... | annotation | @Implementation(minSdk<method*start>org.robolectric.annotation.Implements.minSdk<method*end> = M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
protected void grantRuntimePermission(String<method*start>java.lang.String<method*end> packageName, String<method*start>java.lang.String<method*end> permissionName,... |
public byte[] getHardwareAddress() throws SocketException {
catch (SecurityException e) {
if (!getInetAddresses().hasMoreElements()) {
// don't have connect permission to any local address
return null;
}
}
}
for (InetAddress addr : add... | conventional | public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sec = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sec != null) {
try {
... |
@Override<method*start>java.lang.Override<method*end>
public void setAdmin(String<method*start>java.lang.String<method*end> domain, String<method*start>java.lang.String<method*end> requestAdminLoginName, String<method*start>java.lang.String<method*end> targetUserLoginName, Admin<method*start>org.krakenapps.dom.model.Ad... | annotation | @Override<method*start>java.lang.Override<method*end>
public void setAdmin(String<method*start>java.lang.String<method*end> domain, String<method*start>java.lang.String<method*end> requestAdminLoginName, String<method*start>java.lang.String<method*end> targetUserLoginName, Admin<method*start>org.krakenapps.dom.model.Ad... |
public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
sec.checkPermission<method*start>java.lang.SecurityManager.checkPermission<method*end>(new NetPermission("getNetworkInformation"));
} catch (SecurityException e) {
if (!getI... | conventional | public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sec = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sec != null) {
try {
... |
public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
if (!isAlive()) {
return EMPTY_STACK_TRACE;
}
StackTraceElement<method*start>ja... | conventional | public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
// check for getStackTrace permission
SecurityManager security = System.getSecurityManager<method*start>java... |
@Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> getResources(String<method*start>java.lang.String<method*end> name) throws IOException<method*start>java.io.IOException<method*end> {
Object<method*start>java.lang.Object<method*end> sm = System.g... | annotation | @Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> getResources(String<method*start>java.lang.String<method*end> name) throws IOException<method*start>java.io.IOException<method*end> {
Object<method*start>java.lang.Object<method*end> sm = System.g... |
private Bitmap<method*start>android.graphics.Bitmap<method*end> getThumbnailOfLastPhoto(Context<method*start>android.content.Context<method*end> context) {
Cursor<method*start>android.database.Cursor<method*end> cursor = MediaStore.Images.Media.query<method*start>android.provider.MediaStore.Images.Media.query<... | conventional | private Bitmap<method*start>android.graphics.Bitmap<method*end> getThumbnailOfLastPhoto(Context<method*start>android.content.Context<method*end> context) {
boolean canReadExternalStorage = context.checkPermission<method*start>android.content.Context.checkPermission<method*end>(Manifest.permission.READ_EXTERNAL_STOR... |
protected ModelAndView onSubmit(HttpServletRequest request, HttpServletResponse response, Object cmd, BindException errors) throws Exception {
LoginCommand command = (LoginCommand) cmd;
UsernamePasswordToken token = new UsernamePasswordToken(command.getUsername(), command.getPassword());
try {
// 登录... | conventional | protected ModelAndView<method*start>org.springframework.web.servlet.ModelAndView<method*end> onSubmit(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, Object<method*start>java.lang.Obj... |
public void download(final Context android.content.Context context, final String java.lang.String path, final String java.lang.String name, @Nullable android.support.annotation.Nullable MessageDispatcher view) {
@Override
public void onPermissionDenied(PermissionDeniedResponsecom.karumi.dexte... | annotation | public void download(final Context<method*start>android.content.Context<method*end> context, final String<method*start>java.lang.String<method*end> path, final String<method*start>java.lang.String<method*end> name, @Nullable<method*start>android.support.annotation.Nullable<method*end> MessageDispatcher view) {
if (... |
public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
if (!isAlive()) {
return EMPTY_STACK_TRACE;
}
StackTraceElement<method*start>ja... | conventional | public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
// check for getStackTrace permission
SecurityManager security = System.getSecurityManager<method*start>java... |
static void check(URL<method*start>java.net.URL<method*end> url) throws IOException<method*start>java.io.IOException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security ... | conventional | static void check(URL<method*start>java.net.URL<method*end> url) throws IOException<method*start>java.io.IOException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security ... |
@Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public RestAction<method*start>net.dv8tion.jda.api.requests.RestAction<method*end><Void<method*start>java.lang.Void<method*end>> moveVoiceMember(@Nonnull<method*start>javax.annotation.Nonnull<method*end> Mem... | annotation | @Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public RestAction<method*start>net.dv8tion.jda.api.requests.RestAction<method*end><Void<method*start>java.lang.Void<method*end>> moveVoiceMember(@Nonnull<method*start>javax.annotation.Nonnull<method*end> Mem... |
public static boolean isCallable(@Nullable<method*start>androidx.annotation.Nullable<method*end> final PackageManager<method*start>android.content.pm.PackageManager<method*end> pm, @Nullable<method*start>androidx.annotation.Nullable<method*end> final Intent<method*start>android.content.Intent<method*end> intent) {
... | conventional | public static boolean isCallable(@Nullable<method*start>androidx.annotation.Nullable<method*end> final PackageManager<method*start>android.content.pm.PackageManager<method*end> pm, @Nullable<method*start>androidx.annotation.Nullable<method*end> final Intent<method*start>android.content.Intent<method*end> intent) {
... |
private static AccessControlContext<method*start>java.security.AccessControlContext<method*end> getSubjectContext(final Subject<method*start>javax.security.auth.Subject<method*end> subject, final AccessControlContext<method*start>java.security.AccessControlContext<method*end> context) {
final SecurityManager<method... | conventional | private static AccessControlContext<method*start>java.security.AccessControlContext<method*end> getSubjectContext(final Subject<method*start>javax.security.auth.Subject<method*end> subject, final AccessControlContext<method*start>java.security.AccessControlContext<method*end> context) {
final SecurityManager<method... |
private void createEndpoint() {
try {
Class.forName("com.sun.net.httpserver.HttpServer");
} catch (Exception e) {
throw new UnsupportedOperationException("NOT SUPPORTED");
}
WSEndpoint wse = WSEndpoint.create((Class<?>) implementor.getClass(), true, InstanceResolver.createSingleton(... | conventional | private void createEndpoint() {
// Checks permission for "publishEndpoint"
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
sm.checkPermission<method*start>java.lang.Sec... |
public void unlock(AbstractJcrNode node) throws PathNotFoundException<method*start>javax.jcr.PathNotFoundException<method*end>, LockException<method*start>javax.jcr.lock.LockException<method*end>, AccessDeniedException<method*start>javax.jcr.AccessDeniedException<method*end>, InvalidItemStateException<method*start>java... | annotation | public void unlock(AbstractJcrNode node) throws PathNotFoundException<method*start>javax.jcr.PathNotFoundException<method*end>, LockException<method*start>javax.jcr.lock.LockException<method*end>, AccessDeniedException<method*start>javax.jcr.AccessDeniedException<method*end>, InvalidItemStateException<method*start>java... |
End of preview. Expand in Data Studio
- Downloads last month
- 9