/openjdk7/jdk/src/share/classes/javax/net/ssl/ |
H A D | HostnameVerifier.java | 52 * @param session SSLSession used on the connection to host 55 public boolean verify(String hostname, SSLSession session); argument
|
H A D | SSLSessionBindingEvent.java | 62 * @param session the SSLSession acting as the source of the event 64 * @exception IllegalArgumentException if <code>session</code> is null. 66 public SSLSessionBindingEvent(SSLSession session, String name) argument 68 super(session);
|
H A D | HandshakeCompletedEvent.java | 38 * this event class provides direct access to some important session 55 private transient SSLSession session; field in class:HandshakeCompletedEvent 66 session = s; 71 * Returns the session that triggered this event. 77 return session; 82 * Returns the cipher suite in use by the session which was produced 86 * @return the name of the cipher suite negotiated during this session. 90 return session.getCipherSuite(); 114 return session.getLocalCertificates(); 120 * of defining the session [all...] |
H A D | HttpsURLConnection.java | 103 * as part of defining the session. 122 * defining the session. 201 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/https/ |
H A D | DefaultHostnameVerifier.java | 42 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ |
H A D | ClientHelloRead.java | 190 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ |
H A D | PostThruProxy.java | 199 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | B6216082.java | 161 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | CloseKeepAliveCached.java | 195 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | HttpsPost.java | 185 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | PostThruProxyWithAuth.java | 194 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | Redirect.java | 179 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | RetryHttps.java | 177 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11KeyFactory.java | 92 Session[] session = new Session[1]; 95 return (T)implGetPublicKeySpec(p11Key, keySpec, session); 97 return (T)implGetPrivateKeySpec(p11Key, keySpec, session); 102 session[0] = token.releaseSession(session[0]); 142 Session[] session) throws PKCS11Exception, InvalidKeySpecException; 145 Session[] session) throws PKCS11Exception, InvalidKeySpecException; 141 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 144 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
|
H A D | P11DHKeyFactory.java | 182 Session session = null; 184 session = token.getObjSession(); 185 long keyID = token.p11.C_CreateObject(session.id(), attributes); 187 (session, keyID, "DH", p.bitLength(), attributes); 189 token.releaseSession(session); 204 Session session = null; 206 session = token.getObjSession(); 207 long keyID = token.p11.C_CreateObject(session.id(), attributes); 209 (session, keyID, "DH", p.bitLength(), attributes); 211 token.releaseSession(session); 215 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 237 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11DSAKeyFactory.java | 177 Session session = null; 179 session = token.getObjSession(); 180 long keyID = token.p11.C_CreateObject(session.id(), attributes); 182 (session, keyID, "DSA", p.bitLength(), attributes); 184 token.releaseSession(session); 200 Session session = null; 202 session = token.getObjSession(); 203 long keyID = token.p11.C_CreateObject(session.id(), attributes); 205 (session, keyID, "DSA", p.bitLength(), attributes); 207 token.releaseSession(session); 211 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 235 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11RSAKeyFactory.java | 200 Session session = null; 202 session = token.getObjSession(); 203 long keyID = token.p11.C_CreateObject(session.id(), attributes); 205 (session, keyID, "RSA", n.bitLength(), attributes); 207 token.releaseSession(session); 222 Session session = null; 224 session = token.getObjSession(); 225 long keyID = token.p11.C_CreateObject(session.id(), attributes); 227 (session, keyID, "RSA", n.bitLength(), attributes); 229 token.releaseSession(session); 263 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 283 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | Session.java | 37 * A session object. Sessions are obtained via the SessionManager, 39 * this class, the id() method to obtain the session id. 52 // session id 55 // number of objects created within this session 58 // time this session was last used 99 // XXX update statistics in session manager if n == 1 118 "Internal error: close session with active objects"); 154 // handle to the native session 158 SessionRef(Session session, long id, Token token) { argument 159 super(session, refQueu [all...] |
/openjdk7/jdk/src/share/classes/com/sun/net/ssl/internal/www/protocol/https/ |
H A D | DelegateHttpsURLConnection.java | 114 public boolean verify(String hostname, javax.net.ssl.SSLSession session) { argument 118 if (session.getCipherSuite().startsWith("TLS_KRB5")) { 120 HostnameChecker.getServerName(getPeerPrincipal(session)); 123 Certificate[] serverChain = session.getPeerCertificates(); 143 * Get the peer principal from the session 145 private Principal getPeerPrincipal(javax.net.ssl.SSLSession session) argument 150 principal = session.getPeerPrincipal();
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ProtocolVersion/ |
H A D | HttpsProtocols.java | 164 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ |
H A D | ProxyAuthTest.java | 178 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/ |
H A D | CriticalSubjectAltName.java | 264 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | GetResponseCode.java | 252 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ |
H A D | JavaxHTTPSConnection.java | 248 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/src/share/classes/com/sun/jndi/ldap/ext/ |
H A D | StartTlsResponseImpl.java | 166 * Negotiates a TLS session using the default SSL socket factory. 170 * @return The negotiated SSL session 172 * the TLS session. 182 * Negotiates a TLS session using an SSL socket factory. 186 * and returns the negotiated session information. 205 * @return The negotiated SSL session 207 * the TLS session. 398 * @param session the SSLSession used on the connection to host. 402 private boolean verify(String hostname, SSLSession session) argument 416 if (session 466 getPeerPrincipal(SSLSession session) argument [all...] |