/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11Cipher.java | 131 // associated session, if any 132 private Session session; field in class:P11Cipher 393 if ((session == null) || (token.explicitCancel == false)) { 401 token.p11.C_EncryptFinal(session.id(), 0, buffer, 0, bufLen); 403 token.p11.C_DecryptFinal(session.id(), 0, buffer, 0, bufLen); 419 if (session == null) { 420 session = token.getOpSession(); 428 token.p11.C_EncryptInit(session.id(), mechParams, p11Key.keyID); 430 token.p11.C_DecryptInit(session.id(), mechParams, p11Key.keyID); 433 // release session whe [all...] |
H A D | P11TlsMasterSecretGenerator.java | 132 Session session = null; 134 session = token.getObjSession(); 137 long keyID = token.p11.C_DeriveKey(session.id(), 148 SecretKey key = P11Key.masterSecretKey(session, keyID, 154 token.releaseSession(session);
|
H A D | P11Signature.java | 102 // associated session, if any 103 private Session session; field in class:P11Signature 244 if ((session == null) || (token.explicitCancel == false)) { 247 if (session.hasObjects() == false) { 248 session = token.killSession(session); 256 token.p11.C_SignFinal(session.id(), 0); 264 token.p11.C_Sign(session.id(), digest); 278 token.p11.C_VerifyFinal(session.id(), signature); 286 token.p11.C_Verify(session [all...] |
H A D | P11KeyAgreement.java | 192 Session session = null; 194 session = token.getOpSession(); 201 long keyID = token.p11.C_DeriveKey(session.id(), 207 token.p11.C_GetAttributeValue(session.id(), keyID, attributes); 209 token.p11.C_DestroyObject(session.id(), keyID); 230 token.releaseSession(session); 307 Session session = null; 309 session = token.getObjSession(); 316 long keyID = token.p11.C_DeriveKey(session.id(), 322 token.p11.C_GetAttributeValue(session [all...] |
H A D | Secmod.java | 615 Session session = null; 617 session = token.getOpSession(); 633 handle = token.p11.C_CreateObject(session.id(), attrs); 642 token.releaseSession(session); 645 TrustAttributes(Token token, Session session, long handle) argument 655 token.p11.C_GetAttributeValue(session.id(), handle, attrs); 666 token.p11.C_GetAttributeValue(session.id(), handle, attrs); 728 Session session = null; 730 session = token.getOpSession(); 735 token.p11.C_FindObjectsInit(session [all...] |
H A D | P11KeyGenerator.java | 251 Session session = null; 253 session = token.getObjSession(); 274 (session.id(), new CK_MECHANISM(mechanism), attributes); 276 (session, keyID, algorithm, significantKeySize, attributes); 280 token.releaseSession(session);
|
H A D | P11SecretKeyFactory.java | 149 Session session = null; 151 session = token.getObjSession(); 152 long newKeyID = token.p11.C_CopyObject(session.id(), 154 p11Key = (P11Key) (P11Key.secretKey(session, 161 token.releaseSession(session); 249 Session session = null; 264 session = token.getObjSession(); 265 long keyID = token.p11.C_CreateObject(session.id(), attributes); 267 (session, keyID, algorithm, keyLength, attributes); 272 token.releaseSession(session); [all...] |
H A D | P11KeyPairGenerator.java | 307 Session session = null; 309 session = token.getObjSession(); 315 (session.id(), new CK_MECHANISM(mechanism), 318 (session, keyIDs[0], algorithm, keySize, publicKeyTemplate); 320 (session, keyIDs[1], algorithm, keySize, privateKeyTemplate); 325 token.releaseSession(session);
|
H A D | Session.java | 37 * A session object. Sessions are obtained via the SessionManager, 39 * this class, the id() method to obtain the session id. 52 // session id 55 // number of objects created within this session 58 // time this session was last used 99 // XXX update statistics in session manager if n == 1 118 "Internal error: close session with active objects"); 154 // handle to the native session 158 SessionRef(Session session, long id, Token token) { argument 159 super(session, refQueu [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | ClientHandshaker.java | 87 * of the session we're trying to resume. 155 session.getPeerCertificates()[0].getPublicKey(); 278 session.setPeerSupportedSignatureAlgorithms( 363 * Server chooses session parameters given options created by the 364 * client -- basically, cipher options, session id, and someday a 369 * can resume the pre-existing session we asked resume. The other 459 // creating a new session (i.e. in the full handshake). 480 // so far so good, let's look at the session 481 if (session != null) { 483 if (session [all...] |
H A D | X509TrustManagerImpl.java | 193 SSLSession session = sslSocket.getHandshakeSession(); 194 if (session == null) { 195 throw new CertificateException("No handshake session"); 202 String hostname = session.getPeerHost(); 208 ProtocolVersion.valueOf(session.getProtocol()); 210 if (session instanceof ExtendedSSLSession) { 212 (ExtendedSSLSession)session; 245 SSLSession session = engine.getHandshakeSession(); 246 if (session == null) { 247 throw new CertificateException("No handshake session"); [all...] |
H A D | ServerHandshaker.java | 268 * server replies with a ServerHello listing the ones which this session 441 // security since each connection in the session can hold 443 // creation of a session a rare thing... 449 session = null; // forget about the current session 452 // the client's asked to rejoin an existing session, and the server 453 // permits this; (b) the other one, where a new session is created. 456 // client is trying to resume a session, let's see... 462 // Check if we can use the fast path, resuming a session. We 463 // can do so iff we have a valid record for that session, an [all...] |
H A D | X509KeyManagerImpl.java | 156 SSLSession session = sslSocket.getHandshakeSession(); 158 if (session != null) { 160 ProtocolVersion.valueOf(session.getProtocol()); 164 if (session instanceof ExtendedSSLSession) { 166 (ExtendedSSLSession)session; 185 SSLSession session = engine.getHandshakeSession(); 186 if (session != null) { 188 ProtocolVersion.valueOf(session.getProtocol()); 192 if (session instanceof ExtendedSSLSession) { 194 (ExtendedSSLSession)session; [all...] |
/openjdk7/jdk/src/share/classes/com/sun/net/ssl/internal/www/protocol/https/ |
H A D | DelegateHttpsURLConnection.java | 114 public boolean verify(String hostname, javax.net.ssl.SSLSession session) { argument 118 if (session.getCipherSuite().startsWith("TLS_KRB5")) { 120 HostnameChecker.getServerName(getPeerPrincipal(session)); 123 Certificate[] serverChain = session.getPeerCertificates(); 143 * Get the peer principal from the session 145 private Principal getPeerPrincipal(javax.net.ssl.SSLSession session) argument 150 principal = session.getPeerPrincipal();
|
/openjdk7/jdk/src/share/classes/com/sun/tools/example/debug/bdi/ |
H A D | ExecutionManager.java | 56 private Session session; field in class:ExecutionManager 166 return session == null ? null : session.vm; 170 if (session == null) { 191 if (session != null) { 192 session.setTraceMode(mode); 201 return session.interrupted; 352 //### ways in which session start-up can fail. (maddox 12/18/98) 444 session = s; 467 session [all...] |
/openjdk7/jdk/src/share/classes/com/sun/jndi/ldap/ext/ |
H A D | StartTlsResponseImpl.java | 166 * Negotiates a TLS session using the default SSL socket factory. 170 * @return The negotiated SSL session 172 * the TLS session. 182 * Negotiates a TLS session using an SSL socket factory. 186 * and returns the negotiated session information. 205 * @return The negotiated SSL session 207 * the TLS session. 398 * @param session the SSLSession used on the connection to host. 402 private boolean verify(String hostname, SSLSession session) argument 416 if (session 466 getPeerPrincipal(SSLSession session) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/https/ |
H A D | HttpsClient.java | 83 * <LI>It exposes key SSL session attributes, specifically the 134 // last negotiated SSL session 135 private SSLSession session; field in class:HttpsClient 461 // Register a handshake callback so our session state tracks any 462 // later session renegotiations. 564 session = s.getSession(); 580 // if we are reusing a cached https session, 582 // set the ssl session 583 session = ((SSLSocket)serverSocket).getSession(); 602 String cipher = session [all...] |
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/ |
H A D | testEnabledProtocols.java | 35 * session 212 SSLSession session = socket.getSession(); 213 session.invalidate(); 295 SSLSession session = sslSocket.getSession(); 296 session.invalidate(); 297 String protocolName = session.getProtocol();
|
H A D | SessionTimeOutTests.java | 32 * @summary Need new APIs to get/set session timeout and session cache size. 44 * 1. general test, i.e timeout is set to x and session invalidates when 51 * lifetime of a session < current_session_timeout, such that 52 * current_session_timeout > 0, for all sessions cached by the session 189 SSLSession session = (SSLSession) sessions.elementAt(i); 191 long creationTime = session.getCreationTime(); 194 System.out.print(session + " " + lifetime + " "); 195 if (sessCtx.getSession(session.getId()) == null) { 206 + " obove session"); [all...] |
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/ |
H A D | DelegatedTaskWrongException.java | 165 SSLSession session = ssle1.getSession(); 166 int appBufferMax = session.getApplicationBufferSize(); 167 int netBufferMax = session.getPacketBufferSize();
|
H A D | CloseEngineException.java | 220 SSLSession session = ssle1.getSession(); 221 int appBufferMax = session.getApplicationBufferSize(); 222 int netBufferMax = session.getPacketBufferSize();
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ |
H A D | ReverseNameLookup.java | 138 SSLSession session = sslSocket.getSession(); 139 if (!session.getPeerHost().equals("127.0.0.1")) {
|
/openjdk7/jdk/test/java/rmi/transport/pinClientSocketFactory/ |
H A D | PinClientSocketFactory.java | 94 Session session = factoryStub.getSession(); 95 session.ping();
|
/openjdk7/jdk/src/share/classes/javax/net/ssl/ |
H A D | HttpsURLConnection.java | 103 * as part of defining the session. 122 * defining the session. 201 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/ |
H A D | DebugReportsOneExtraByte.java | 299 SSLSession session = clientEngine.getSession(); 300 int appBufferMax = session.getApplicationBufferSize(); 301 int netBufferMax = session.getPacketBufferSize();
|