jdk/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
author ddehaven
Wed, 12 Oct 2016 08:47:53 -0700
changeset 41596 a6382b6ba29d
parent 41555 8a2a5a88376a
child 42338 a60f280f803c
permissions -rw-r--r--
8165271: Fix use of reflection to gain access to private fields Reviewed-by: mchung
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
37584
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
     2
 * Copyright (c) 2002, 2016, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
32834
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 31918
diff changeset
    26
package jdk.internal.misc;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
36511
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
    28
import java.lang.module.ModuleDescriptor;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.util.jar.JarFile;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.io.Console;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.io.FileDescriptor;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
    32
import java.io.FilePermission;
37584
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
    33
import java.io.ObjectInputStream;
38466
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
    34
import java.io.RandomAccessFile;
5288
e91651d24b2a 6909281: 6u19 b99(pit):Error loading first applet in browser session( both FF && IE, windows ): NPE is thrown
mullan
parents: 5183
diff changeset
    35
import java.security.ProtectionDomain;
8816
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
    36
import java.security.AccessController;
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
    37
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
/** A repository of "shared secrets", which are a mechanism for
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
    calling implementation-private methods in another package without
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
    using reflection. A package-private class implements a public
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
    interface and provides the ability to call package-private methods
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
    within that package; the object implementing that interface is
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
    provided through a third package to which access is restricted.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
    This framework avoids the primary disadvantage of using reflection
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
    for this purpose, namely the loss of compile-time checking. */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
public class SharedSecrets {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
    private static final Unsafe unsafe = Unsafe.getUnsafe();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
    private static JavaUtilJarAccess javaUtilJarAccess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
    private static JavaLangAccess javaLangAccess;
36511
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
    51
    private static JavaLangModuleAccess javaLangModuleAccess;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
    52
    private static JavaLangReflectModuleAccess javaLangReflectModuleAccess;
34372
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    53
    private static JavaLangInvokeAccess javaLangInvokeAccess;
23009
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
    54
    private static JavaLangRefAccess javaLangRefAccess;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
    private static JavaIOAccess javaIOAccess;
31918
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
    56
    private static JavaNetInetAddressAccess javaNetInetAddressAccess;
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
    57
    private static JavaNetHttpCookieAccess javaNetHttpCookieAccess;
40696
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
    58
    private static JavaNetSocketAccess javaNetSocketAccess;
41555
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
    59
    private static JavaNetUriAccess javaNetUriAccess;
41596
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
    60
    private static JavaNetURLClassLoaderAccess javaNetURLClassLoaderAccess;
1143
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
    61
    private static JavaNioAccess javaNioAccess;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
    private static JavaIOFileDescriptorAccess javaIOFileDescriptorAccess;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
    63
    private static JavaIOFilePermissionAccess javaIOFilePermissionAccess;
5183
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
    64
    private static JavaSecurityProtectionDomainAccess javaSecurityProtectionDomainAccess;
8816
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
    65
    private static JavaSecurityAccess javaSecurityAccess;
18223
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
    66
    private static JavaUtilZipFileAccess javaUtilZipFileAccess;
36511
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
    67
    private static JavaUtilResourceBundleAccess javaUtilResourceBundleAccess;
11896
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
    68
    private static JavaAWTAccess javaAWTAccess;
25385
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
    69
    private static JavaAWTFontAccess javaAWTFontAccess;
30906
1b67cbb0adce 8080663: Use sun.misc.SharedSecrets to allow access from java.management to @ConstructorProperties
jbachorik
parents: 25859
diff changeset
    70
    private static JavaBeansAccess javaBeansAccess;
37584
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
    71
    private static JavaObjectInputStreamAccess javaObjectInputStreamAccess;
38466
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
    72
    private static JavaIORandomAccessFileAccess javaIORandomAccessFileAccess;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
    public static JavaUtilJarAccess javaUtilJarAccess() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
        if (javaUtilJarAccess == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
            // Ensure JarFile is initialized; we know that that class
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
            // provides the shared secret
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
            unsafe.ensureClassInitialized(JarFile.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
        return javaUtilJarAccess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
    public static void setJavaUtilJarAccess(JavaUtilJarAccess access) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
        javaUtilJarAccess = access;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
    public static void setJavaLangAccess(JavaLangAccess jla) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
        javaLangAccess = jla;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
    public static JavaLangAccess getJavaLangAccess() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
        return javaLangAccess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
34372
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    95
    public static void setJavaLangInvokeAccess(JavaLangInvokeAccess jlia) {
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    96
        javaLangInvokeAccess = jlia;
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    97
    }
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    98
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
    99
    public static JavaLangInvokeAccess getJavaLangInvokeAccess() {
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   100
        if (javaLangInvokeAccess == null) {
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   101
            try {
40258
e6ba2e5c7a29 8163373: Rewrite GenerateJLIClassesPlugin to avoid reflective calls into java.lang.invoke
redestad
parents: 38466
diff changeset
   102
                Class<?> c = Class.forName("java.lang.invoke.MethodHandleImpl");
34372
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   103
                unsafe.ensureClassInitialized(c);
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   104
            } catch (ClassNotFoundException e) {};
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   105
        }
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   106
        return javaLangInvokeAccess;
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   107
    }
ccdd9223ab7a 8143911: Reintegrate JEP 259: Stack-Walking API
mchung
parents: 34370
diff changeset
   108
36511
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   109
    public static void setJavaLangModuleAccess(JavaLangModuleAccess jlrma) {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   110
        javaLangModuleAccess = jlrma;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   111
    }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   112
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   113
    public static JavaLangModuleAccess getJavaLangModuleAccess() {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   114
        if (javaLangModuleAccess == null) {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   115
            unsafe.ensureClassInitialized(ModuleDescriptor.class);
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   116
        }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   117
        return javaLangModuleAccess;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   118
    }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   119
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   120
    public static void setJavaLangReflectModuleAccess(JavaLangReflectModuleAccess jlrma) {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   121
        javaLangReflectModuleAccess = jlrma;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   122
    }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   123
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   124
    public static JavaLangReflectModuleAccess getJavaLangReflectModuleAccess() {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   125
        if (javaLangReflectModuleAccess == null)
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   126
            unsafe.ensureClassInitialized(java.lang.reflect.Module.class);
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   127
        return javaLangReflectModuleAccess;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   128
    }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   129
23009
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   130
    public static void setJavaLangRefAccess(JavaLangRefAccess jlra) {
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   131
        javaLangRefAccess = jlra;
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   132
    }
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   133
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   134
    public static JavaLangRefAccess getJavaLangRefAccess() {
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   135
        return javaLangRefAccess;
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   136
    }
e2c92ddeb57f 6857566: (bf) DirectByteBuffer garbage creation can outpace reclamation
plevart
parents: 19809
diff changeset
   137
41555
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   138
    public static void setJavaNetUriAccess(JavaNetUriAccess jnua) {
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   139
        javaNetUriAccess = jnua;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
41555
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   142
    public static JavaNetUriAccess getJavaNetUriAccess() {
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   143
        if (javaNetUriAccess == null)
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   144
            unsafe.ensureClassInitialized(java.net.URI.class);
8a2a5a88376a 8168073: Speed up URI creation during module bootstrap
redestad
parents: 41377
diff changeset
   145
        return javaNetUriAccess;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
41596
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   148
    public static void setJavaNetURLClassLoaderAccess(JavaNetURLClassLoaderAccess jnua) {
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   149
        javaNetURLClassLoaderAccess = jnua;
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   150
    }
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   151
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   152
    public static JavaNetURLClassLoaderAccess getJavaNetURLClassLoaderAccess() {
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   153
        if (javaNetURLClassLoaderAccess == null)
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   154
            unsafe.ensureClassInitialized(java.net.URLClassLoader.class);
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   155
        return javaNetURLClassLoaderAccess;
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   156
    }
a6382b6ba29d 8165271: Fix use of reflection to gain access to private fields
ddehaven
parents: 41555
diff changeset
   157
31918
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   158
    public static void setJavaNetInetAddressAccess(JavaNetInetAddressAccess jna) {
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   159
        javaNetInetAddressAccess = jna;
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   160
    }
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   161
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   162
    public static JavaNetInetAddressAccess getJavaNetInetAddressAccess() {
36229
ceb026e2731f 8150521: SharedSecrets.getJavaNetInetAddressAccess should ensure that InetAddress is initialised
vtewari
parents: 34372
diff changeset
   163
        if (javaNetInetAddressAccess == null)
ceb026e2731f 8150521: SharedSecrets.getJavaNetInetAddressAccess should ensure that InetAddress is initialised
vtewari
parents: 34372
diff changeset
   164
            unsafe.ensureClassInitialized(java.net.InetAddress.class);
31918
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   165
        return javaNetInetAddressAccess;
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   166
    }
1f13aceb00d7 8132705: Refactor SharedSecrets in sun.misc.JavaNetAccess
rriggs
parents: 30906
diff changeset
   167
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   168
    public static void setJavaNetHttpCookieAccess(JavaNetHttpCookieAccess a) {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   169
        javaNetHttpCookieAccess = a;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   170
    }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   171
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   172
    public static JavaNetHttpCookieAccess getJavaNetHttpCookieAccess() {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   173
        if (javaNetHttpCookieAccess == null)
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   174
            unsafe.ensureClassInitialized(java.net.HttpCookie.class);
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   175
        return javaNetHttpCookieAccess;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   176
    }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10044
diff changeset
   177
40696
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   178
    public static void setJavaNetSocketAccess(JavaNetSocketAccess jnsa) {
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   179
        javaNetSocketAccess = jnsa;
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   180
    }
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   181
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   182
    public static JavaNetSocketAccess getJavaNetSocketAccess() {
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   183
        if (javaNetSocketAccess == null)
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   184
            unsafe.ensureClassInitialized(java.net.ServerSocket.class);
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   185
        return javaNetSocketAccess;
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   186
    }
d38ae985f810 8165180: Provide a shared secret to access non-public ServerSocket constructor
mchung
parents: 40258
diff changeset
   187
1143
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   188
    public static void setJavaNioAccess(JavaNioAccess jna) {
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   189
        javaNioAccess = jna;
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   190
    }
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   191
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   192
    public static JavaNioAccess getJavaNioAccess() {
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   193
        if (javaNioAccess == null) {
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   194
            // Ensure java.nio.ByteOrder is initialized; we know that
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   195
            // this class initializes java.nio.Bits that provides the
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   196
            // shared secret.
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   197
            unsafe.ensureClassInitialized(java.nio.ByteOrder.class);
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   198
        }
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   199
        return javaNioAccess;
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   200
    }
645d4b930f93 6682020: (bf) Support monitoring of direct and mapped buffer usage
alanb
parents: 2
diff changeset
   201
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
    public static void setJavaIOAccess(JavaIOAccess jia) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
        javaIOAccess = jia;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
    public static JavaIOAccess getJavaIOAccess() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
        if (javaIOAccess == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
            unsafe.ensureClassInitialized(Console.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
        return javaIOAccess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
    public static void setJavaIOFileDescriptorAccess(JavaIOFileDescriptorAccess jiofda) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
        javaIOFileDescriptorAccess = jiofda;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   217
    public static JavaIOFilePermissionAccess getJavaIOFilePermissionAccess() {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   218
        if (javaIOFilePermissionAccess == null)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   219
            unsafe.ensureClassInitialized(FilePermission.class);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   220
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   221
        return javaIOFilePermissionAccess;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   222
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   223
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   224
    public static void setJavaIOFilePermissionAccess(JavaIOFilePermissionAccess jiofpa) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   225
        javaIOFilePermissionAccess = jiofpa;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   226
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 40696
diff changeset
   227
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
    public static JavaIOFileDescriptorAccess getJavaIOFileDescriptorAccess() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
        if (javaIOFileDescriptorAccess == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
            unsafe.ensureClassInitialized(FileDescriptor.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
        return javaIOFileDescriptorAccess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
5183
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   235
    public static void setJavaSecurityProtectionDomainAccess
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   236
        (JavaSecurityProtectionDomainAccess jspda) {
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   237
            javaSecurityProtectionDomainAccess = jspda;
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   238
    }
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   239
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   240
    public static JavaSecurityProtectionDomainAccess
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   241
        getJavaSecurityProtectionDomainAccess() {
5288
e91651d24b2a 6909281: 6u19 b99(pit):Error loading first applet in browser session( both FF && IE, windows ): NPE is thrown
mullan
parents: 5183
diff changeset
   242
            if (javaSecurityProtectionDomainAccess == null)
e91651d24b2a 6909281: 6u19 b99(pit):Error loading first applet in browser session( both FF && IE, windows ): NPE is thrown
mullan
parents: 5183
diff changeset
   243
                unsafe.ensureClassInitialized(ProtectionDomain.class);
5183
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   244
            return javaSecurityProtectionDomainAccess;
7825d97c4cf2 6633872: Policy/PolicyFile leak dynamic ProtectionDomains.
mullan
parents: 2277
diff changeset
   245
    }
8816
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   246
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   247
    public static void setJavaSecurityAccess(JavaSecurityAccess jsa) {
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   248
        javaSecurityAccess = jsa;
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   249
    }
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   250
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   251
    public static JavaSecurityAccess getJavaSecurityAccess() {
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   252
        if (javaSecurityAccess == null) {
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   253
            unsafe.ensureClassInitialized(AccessController.class);
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   254
        }
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   255
        return javaSecurityAccess;
29f983feda95 6907662: System clipboard should ensure access restrictions
denis
parents: 8556
diff changeset
   256
    }
11896
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   257
18223
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   258
    public static JavaUtilZipFileAccess getJavaUtilZipFileAccess() {
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   259
        if (javaUtilZipFileAccess == null)
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   260
            unsafe.ensureClassInitialized(java.util.zip.ZipFile.class);
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   261
        return javaUtilZipFileAccess;
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   262
    }
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   263
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   264
    public static void setJavaUtilZipFileAccess(JavaUtilZipFileAccess access) {
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   265
        javaUtilZipFileAccess = access;
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   266
    }
35a5c2462991 8008593: Better URLClassLoader resource management
chegar
parents: 11902
diff changeset
   267
11896
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   268
    public static void setJavaAWTAccess(JavaAWTAccess jaa) {
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   269
        javaAWTAccess = jaa;
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   270
    }
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   271
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   272
    public static JavaAWTAccess getJavaAWTAccess() {
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   273
        // this may return null in which case calling code needs to
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   274
        // provision for.
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   275
        return javaAWTAccess;
eb4d5334fccf 6351654: Problem with java/classes_util_i18n
okutsu
parents: 10044
diff changeset
   276
    }
23581
0ca496340112 8038343: Eliminate use of reflection to access JavaBeans Introspector
alanb
parents: 23009
diff changeset
   277
25385
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   278
    public static void setJavaAWTFontAccess(JavaAWTFontAccess jafa) {
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   279
        javaAWTFontAccess = jafa;
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   280
    }
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   281
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   282
    public static JavaAWTFontAccess getJavaAWTFontAccess() {
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   283
        // this may return null in which case calling code needs to
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   284
        // provision for.
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   285
        return javaAWTFontAccess;
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   286
    }
2c53e38b77aa 8038092: Re-examine Bidi reflective dependency on java.awt.font
naoto
parents: 23581
diff changeset
   287
30906
1b67cbb0adce 8080663: Use sun.misc.SharedSecrets to allow access from java.management to @ConstructorProperties
jbachorik
parents: 25859
diff changeset
   288
    public static JavaBeansAccess getJavaBeansAccess() {
1b67cbb0adce 8080663: Use sun.misc.SharedSecrets to allow access from java.management to @ConstructorProperties
jbachorik
parents: 25859
diff changeset
   289
        return javaBeansAccess;
23581
0ca496340112 8038343: Eliminate use of reflection to access JavaBeans Introspector
alanb
parents: 23009
diff changeset
   290
    }
0ca496340112 8038343: Eliminate use of reflection to access JavaBeans Introspector
alanb
parents: 23009
diff changeset
   291
30906
1b67cbb0adce 8080663: Use sun.misc.SharedSecrets to allow access from java.management to @ConstructorProperties
jbachorik
parents: 25859
diff changeset
   292
    public static void setJavaBeansAccess(JavaBeansAccess access) {
1b67cbb0adce 8080663: Use sun.misc.SharedSecrets to allow access from java.management to @ConstructorProperties
jbachorik
parents: 25859
diff changeset
   293
        javaBeansAccess = access;
23581
0ca496340112 8038343: Eliminate use of reflection to access JavaBeans Introspector
alanb
parents: 23009
diff changeset
   294
    }
36511
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   295
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   296
    public static JavaUtilResourceBundleAccess getJavaUtilResourceBundleAccess() {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   297
        return javaUtilResourceBundleAccess;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   298
    }
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   299
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   300
    public static void setJavaUtilResourceBundleAccess(JavaUtilResourceBundleAccess access) {
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   301
        javaUtilResourceBundleAccess = access;
9d0388c6b336 8142968: Module System implementation
alanb
parents: 36229
diff changeset
   302
    }
37584
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   303
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   304
    public static JavaObjectInputStreamAccess getJavaObjectInputStreamAccess() {
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   305
        if (javaObjectInputStreamAccess == null) {
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   306
            unsafe.ensureClassInitialized(ObjectInputStream.class);
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   307
        }
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   308
        return javaObjectInputStreamAccess;
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   309
    }
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   310
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   311
    public static void setJavaObjectInputStreamAccess(JavaObjectInputStreamAccess access) {
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   312
        javaObjectInputStreamAccess = access;
0cc00d7a0755 8144430: Improve JMX connections
sjiang
parents: 36511
diff changeset
   313
    }
38466
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   314
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   315
    public static void setJavaIORandomAccessFileAccess(JavaIORandomAccessFileAccess jirafa) {
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   316
        javaIORandomAccessFileAccess = jirafa;
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   317
    }
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   318
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   319
    public static JavaIORandomAccessFileAccess getJavaIORandomAccessFileAccess() {
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   320
        if (javaIORandomAccessFileAccess == null) {
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   321
            unsafe.ensureClassInitialized(RandomAccessFile.class);
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   322
        }
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   323
        return javaIORandomAccessFileAccess;
4bcf5f2bb351 8147588: Jar file and Zip file not removed in spite of the OPEN_DELETE flag
sherman
parents: 37584
diff changeset
   324
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
}