Thanks for your reply. For example, Hibernate does not perform any bytecode manipulation on its own, but it uses a proxying library that creates proxies at the bytecode level.
If you do not manipulate bytecode, how do you enforce security policies then? Regards, Myoungkyu Les Hazlewood-2 wrote: > > Hiya, > > The project (now named Shiro) does not perform bytecode manipulation of > any > sort. > > Regards, > > Les > > On Sat, Jun 27, 2009 at 11:26 PM, mksong <[email protected]> wrote: > >> >> Hello, All >> >> I am carring out an experiment on JSecurity's bytecode engineering. >> >> I tested JSecurity to see if the framework would generate any >> >> bytecode related to security or add anything to the existing ones. >> >> With the attached log file, I am not sure if JSecurity does bytecode >> engineering or not. >> (Here are the log file at loading time and the slide file explaing what I >> did: >> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/> >> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/>) >> >> Is it true? >> >> -- >> View this message in context: >> http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3168851.html >> Sent from the Shiro User mailing list archive at Nabble.com. >> >> > > -- View this message in context: http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3170891.html Sent from the Shiro User mailing list archive at Nabble.com.
