Package | Description |
---|---|
net.jini.core.constraint |
Defines constraints and collections of constraints that can be used to control
method invocation, and an interface that proxies implement to allow clients
to specify constraints for remote method calls.
|
net.jini.jeri.ssl |
Provides implementations of
Endpoint and ServerEndpoint that use TLS/SSL and HTTPS (HTTP over
TLS/SSL) to support invocation constraints. |
Modifier and Type | Interface and Description |
---|---|
interface |
RelativeTimeConstraint
Implemented by constraints that are expressed in terms of relative time,
to support conversion to absolute time constraints.
|
Modifier and Type | Class and Description |
---|---|
class |
ClientAuthentication
Represents a constraint on authentication of the client to the server.
|
class |
ClientMaxPrincipal
Represents a constraint on the client, such that if the client
authenticates itself, then it may only authenticate itself as one or more
of the specified principals.
|
class |
ClientMaxPrincipalType
Represents a constraint on the client, such that if the client
authenticates itself, then it may only authenticate itself as principals
that are instances of one or more of the specified classes.
|
class |
ClientMinPrincipal
Represents a constraint on the client, such that if the client
authenticates itself, then it must authenticate itself as at least all of
the specified principals.
|
class |
ClientMinPrincipalType
Represents a constraint on the client, such that if the client
authenticates itself, then it must authenticate itself such that, for each
specified class, at least one authenticated principal is an instance of
that class.
|
class |
Confidentiality
Represents a constraint on the confidentiality of message contents.
|
class |
ConnectionAbsoluteTime
Represents a constraint on the absolute time by which a network connection
must be established.
|
class |
ConnectionRelativeTime
Represents a constraint on the maximum amount of time to wait for a
network connection to be established.
|
class |
ConstraintAlternatives
Combines two or more constraint alternatives into a single overall
constraint.
|
class |
Delegation
Represents a constraint on delegation from the client to the server.
|
class |
DelegationAbsoluteTime
Represents a constraint on delegation, such that if delegation is permitted,
it be permitted only for a range of absolute times.
|
class |
DelegationRelativeTime
Represents a constraint on delegation, such that if delegation is permitted,
it be permitted only for a range of time measured relative to the start of
the remote call.
|
class |
Integrity
Represents a constraint on the integrity of message contents, covering not
only data transmitted in band as part of the remote call itself, but also
out-of-band downloaded code.
|
class |
ServerAuthentication
Represents a constraint on authentication of the server to the client.
|
class |
ServerMinPrincipal
Represents a constraint on the server, such that if the server
authenticates itself, then it must authenticate itself as at least all of
the specified principals.
|
Modifier and Type | Method and Description |
---|---|
static InvocationConstraint |
ConstraintAlternatives.create(Collection c)
Returns a constraint representing the specified alternative constraints,
with duplicate constraints removed.
|
static InvocationConstraint |
ConstraintAlternatives.create(InvocationConstraint[] constraints)
Returns a constraint representing the specified alternative constraints,
with duplicate constraints removed.
|
InvocationConstraint |
RelativeTimeConstraint.makeAbsolute(long baseTime)
Converts this constraint to absolute time.
|
InvocationConstraint |
DelegationRelativeTime.makeAbsolute(long baseTime)
Returns a
DelegationAbsoluteTime instance with times obtained
by adding the specified base time argument to the duration values
from this instance. |
InvocationConstraint |
ConstraintAlternatives.makeAbsolute(long baseTime)
Returns a constraint equal to the result of taking the constraints in
this instance, replacing each constraint that is an instance of
RelativeTimeConstraint with the result of invoking that
constraint's makeAbsolute method with the specified base
time, and invoking the create method of this class with
the revised collection of constraints. |
InvocationConstraint |
ConnectionRelativeTime.makeAbsolute(long baseTime)
Returns a
ConnectionAbsoluteTime instance with time obtained
by adding the specified base time argument to the duration value
from this instance. |
Modifier and Type | Method and Description |
---|---|
static InvocationConstraint |
ConstraintAlternatives.create(InvocationConstraint[] constraints)
Returns a constraint representing the specified alternative constraints,
with duplicate constraints removed.
|
Constructor and Description |
---|
ConstraintAlternatives(InvocationConstraint[] constraints)
Creates an instance containing the specified alternative constraints,
with duplicate constraints removed.
|
InvocationConstraints(InvocationConstraint[] reqs,
InvocationConstraint[] prefs)
Creates an instance that has all of the constraints from the first
array,
reqs , added as requirements if the array is a
non-null value, and has all of the constraints from
the second array, prefs , added as preferences if the
array is a non-null value. |
InvocationConstraints(InvocationConstraint[] reqs,
InvocationConstraint[] prefs)
Creates an instance that has all of the constraints from the first
array,
reqs , added as requirements if the array is a
non-null value, and has all of the constraints from
the second array, prefs , added as preferences if the
array is a non-null value. |
InvocationConstraints(InvocationConstraint req,
InvocationConstraint pref)
Creates an instance that has the first constraint,
req ,
added as a requirement if it is a non-null value, and has
the second constraint, pref , added as a preference if it
is a non-null value and is not a duplicate of the
requirement. |
Modifier and Type | Class and Description |
---|---|
class |
ConfidentialityStrength
Represents a constraint that, if confidentiality of message contents is
ensured, the specified strength of confidentiality be used.
|