- /*
- * @(#)SerializablePermission.java 1.13 00/02/02
- *
- * Copyright 1997-2000 Sun Microsystems, Inc. All Rights Reserved.
- *
- * This software is the proprietary information of Sun Microsystems, Inc.
- * Use is subject to license terms.
- *
- */
-
- package java.io;
-
- import java.security.*;
- import java.util.Enumeration;
- import java.util.Hashtable;
- import java.util.StringTokenizer;
-
- /**
- * This class is for Serializable permissions. A SerializablePermission
- * contains a name (also referred to as a "target name") but
- * no actions list; you either have the named permission
- * or you don't.
- *
- * <P>
- * The target name is the name of the Serializable permission (see below).
- *
- * <P>
- * The following table lists all the possible SerializablePermission target names,
- * and for each provides a description of what the permission allows
- * and a discussion of the risks of granting code the permission.
- * <P>
- *
- * <table border=1 cellpadding=5>
- * <tr>
- * <th>Permission Target Name</th>
- * <th>What the Permission Allows</th>
- * <th>Risks of Allowing this Permission</th>
- * </tr>
- *
- * <tr>
- * <td>enableSubclassImplementation</td>
- * <td>Subclass implementation of ObjectOutputStream or ObjectInputStream
- * to override the default serialization or deserialization, respectively,
- * of objects</td>
- * <td>Code can use this to serialize or
- * deserialize classes in a purposefully malfeasant manner. For example,
- * during serialization, malicious code can use this to
- * purposefully store confidential private field data in a way easily accessible
- * to attackers. Or, during deserializaiton it could, for example, deserialize
- * a class with all its private fields zeroed out.</td>
- * </tr>
- *
- * <tr>
- * <td>enableSubstitution</td>
- * <td>Substitution of one object for another during
- * serialization or deserialization</td>
- * <td>This is dangerous because malicious code
- * can replace the actual object with one which has incorrect or
- * malignant data.</td>
- * </tr>
- *
- * </table>
- *
- * @see java.security.BasicPermission
- * @see java.security.Permission
- * @see java.security.Permissions
- * @see java.security.PermissionCollection
- * @see java.lang.SecurityManager
- *
- * @version 1.13, 02/02/00
- *
- * @author Joe Fialli
- * @since 1.2
- */
-
- /* code was borrowed originally from java.lang.RuntimePermission. */
-
- public final class SerializablePermission extends BasicPermission {
-
- /**
- * @serial
- */
- private String actions;
-
- /**
- * Creates a new SerializablePermission with the specified name.
- * The name is the symbolic name of the SerializablePermission, such as
- * "enableSubstitution", etc.
- *
- * @param name the name of the SerializablePermission.
- */
-
-
- public SerializablePermission(String name)
- {
- super(name);
- }
-
- /**
- * Creates a new SerializablePermission object with the specified name.
- * The name is the symbolic name of the SerializablePermission, and the
- * actions String is currently unused and should be null. This
- * constructor exists for use by the <code>Policy</code> object
- * to instantiate new Permission objects.
- *
- * @param name the name of the SerializablePermission.
- * @param actions currently unused and must be set to null
- */
-
- public SerializablePermission(String name, String actions)
- {
- super(name, actions);
- }
- }