Searched refs:session (Results 26 - 50 of 95) sorted by relevance

1234

/openjdk7/jdk/src/share/classes/sun/security/pkcs11/
H A DP11Cipher.java131 // associated session, if any
132 private Session session; field in class:P11Cipher
393 if ((session == null) || (token.explicitCancel == false)) {
401 token.p11.C_EncryptFinal(session.id(), 0, buffer, 0, bufLen);
403 token.p11.C_DecryptFinal(session.id(), 0, buffer, 0, bufLen);
419 if (session == null) {
420 session = token.getOpSession();
428 token.p11.C_EncryptInit(session.id(), mechParams, p11Key.keyID);
430 token.p11.C_DecryptInit(session.id(), mechParams, p11Key.keyID);
433 // release session whe
[all...]
H A DP11TlsMasterSecretGenerator.java132 Session session = null;
134 session = token.getObjSession();
137 long keyID = token.p11.C_DeriveKey(session.id(),
148 SecretKey key = P11Key.masterSecretKey(session, keyID,
154 token.releaseSession(session);
H A DP11Signature.java102 // associated session, if any
103 private Session session; field in class:P11Signature
244 if ((session == null) || (token.explicitCancel == false)) {
247 if (session.hasObjects() == false) {
248 session = token.killSession(session);
256 token.p11.C_SignFinal(session.id(), 0);
264 token.p11.C_Sign(session.id(), digest);
278 token.p11.C_VerifyFinal(session.id(), signature);
286 token.p11.C_Verify(session
[all...]
H A DP11KeyAgreement.java192 Session session = null;
194 session = token.getOpSession();
201 long keyID = token.p11.C_DeriveKey(session.id(),
207 token.p11.C_GetAttributeValue(session.id(), keyID, attributes);
209 token.p11.C_DestroyObject(session.id(), keyID);
230 token.releaseSession(session);
307 Session session = null;
309 session = token.getObjSession();
316 long keyID = token.p11.C_DeriveKey(session.id(),
322 token.p11.C_GetAttributeValue(session
[all...]
H A DSecmod.java615 Session session = null;
617 session = token.getOpSession();
633 handle = token.p11.C_CreateObject(session.id(), attrs);
642 token.releaseSession(session);
645 TrustAttributes(Token token, Session session, long handle) argument
655 token.p11.C_GetAttributeValue(session.id(), handle, attrs);
666 token.p11.C_GetAttributeValue(session.id(), handle, attrs);
728 Session session = null;
730 session = token.getOpSession();
735 token.p11.C_FindObjectsInit(session
[all...]
H A DP11KeyGenerator.java251 Session session = null;
253 session = token.getObjSession();
274 (session.id(), new CK_MECHANISM(mechanism), attributes);
276 (session, keyID, algorithm, significantKeySize, attributes);
280 token.releaseSession(session);
H A DP11SecretKeyFactory.java149 Session session = null;
151 session = token.getObjSession();
152 long newKeyID = token.p11.C_CopyObject(session.id(),
154 p11Key = (P11Key) (P11Key.secretKey(session,
161 token.releaseSession(session);
249 Session session = null;
264 session = token.getObjSession();
265 long keyID = token.p11.C_CreateObject(session.id(), attributes);
267 (session, keyID, algorithm, keyLength, attributes);
272 token.releaseSession(session);
[all...]
H A DP11KeyPairGenerator.java307 Session session = null;
309 session = token.getObjSession();
315 (session.id(), new CK_MECHANISM(mechanism),
318 (session, keyIDs[0], algorithm, keySize, publicKeyTemplate);
320 (session, keyIDs[1], algorithm, keySize, privateKeyTemplate);
325 token.releaseSession(session);
H A DSession.java37 * A session object. Sessions are obtained via the SessionManager,
39 * this class, the id() method to obtain the session id.
52 // session id
55 // number of objects created within this session
58 // time this session was last used
99 // XXX update statistics in session manager if n == 1
118 "Internal error: close session with active objects");
154 // handle to the native session
158 SessionRef(Session session, long id, Token token) { argument
159 super(session, refQueu
[all...]
/openjdk7/jdk/src/share/classes/sun/security/ssl/
H A DClientHandshaker.java87 * of the session we're trying to resume.
155 session.getPeerCertificates()[0].getPublicKey();
278 session.setPeerSupportedSignatureAlgorithms(
363 * Server chooses session parameters given options created by the
364 * client -- basically, cipher options, session id, and someday a
369 * can resume the pre-existing session we asked resume. The other
459 // creating a new session (i.e. in the full handshake).
480 // so far so good, let's look at the session
481 if (session != null) {
483 if (session
[all...]
H A DX509TrustManagerImpl.java193 SSLSession session = sslSocket.getHandshakeSession();
194 if (session == null) {
195 throw new CertificateException("No handshake session");
202 String hostname = session.getPeerHost();
208 ProtocolVersion.valueOf(session.getProtocol());
210 if (session instanceof ExtendedSSLSession) {
212 (ExtendedSSLSession)session;
245 SSLSession session = engine.getHandshakeSession();
246 if (session == null) {
247 throw new CertificateException("No handshake session");
[all...]
H A DServerHandshaker.java268 * server replies with a ServerHello listing the ones which this session
441 // security since each connection in the session can hold
443 // creation of a session a rare thing...
449 session = null; // forget about the current session
452 // the client's asked to rejoin an existing session, and the server
453 // permits this; (b) the other one, where a new session is created.
456 // client is trying to resume a session, let's see...
462 // Check if we can use the fast path, resuming a session. We
463 // can do so iff we have a valid record for that session, an
[all...]
H A DX509KeyManagerImpl.java156 SSLSession session = sslSocket.getHandshakeSession();
158 if (session != null) {
160 ProtocolVersion.valueOf(session.getProtocol());
164 if (session instanceof ExtendedSSLSession) {
166 (ExtendedSSLSession)session;
185 SSLSession session = engine.getHandshakeSession();
186 if (session != null) {
188 ProtocolVersion.valueOf(session.getProtocol());
192 if (session instanceof ExtendedSSLSession) {
194 (ExtendedSSLSession)session;
[all...]
/openjdk7/jdk/src/share/classes/com/sun/net/ssl/internal/www/protocol/https/
H A DDelegateHttpsURLConnection.java114 public boolean verify(String hostname, javax.net.ssl.SSLSession session) { argument
118 if (session.getCipherSuite().startsWith("TLS_KRB5")) {
120 HostnameChecker.getServerName(getPeerPrincipal(session));
123 Certificate[] serverChain = session.getPeerCertificates();
143 * Get the peer principal from the session
145 private Principal getPeerPrincipal(javax.net.ssl.SSLSession session) argument
150 principal = session.getPeerPrincipal();
/openjdk7/jdk/src/share/classes/com/sun/tools/example/debug/bdi/
H A DExecutionManager.java56 private Session session; field in class:ExecutionManager
166 return session == null ? null : session.vm;
170 if (session == null) {
191 if (session != null) {
192 session.setTraceMode(mode);
201 return session.interrupted;
352 //### ways in which session start-up can fail. (maddox 12/18/98)
444 session = s;
467 session
[all...]
/openjdk7/jdk/src/share/classes/com/sun/jndi/ldap/ext/
H A DStartTlsResponseImpl.java166 * Negotiates a TLS session using the default SSL socket factory.
170 * @return The negotiated SSL session
172 * the TLS session.
182 * Negotiates a TLS session using an SSL socket factory.
186 * and returns the negotiated session information.
205 * @return The negotiated SSL session
207 * the TLS session.
398 * @param session the SSLSession used on the connection to host.
402 private boolean verify(String hostname, SSLSession session) argument
416 if (session
466 getPeerPrincipal(SSLSession session) argument
[all...]
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/https/
H A DHttpsClient.java83 * <LI>It exposes key SSL session attributes, specifically the
134 // last negotiated SSL session
135 private SSLSession session; field in class:HttpsClient
461 // Register a handshake callback so our session state tracks any
462 // later session renegotiations.
564 session = s.getSession();
580 // if we are reusing a cached https session,
582 // set the ssl session
583 session = ((SSLSocket)serverSocket).getSession();
602 String cipher = session
[all...]
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/
H A DtestEnabledProtocols.java35 * session
212 SSLSession session = socket.getSession();
213 session.invalidate();
295 SSLSession session = sslSocket.getSession();
296 session.invalidate();
297 String protocolName = session.getProtocol();
H A DSessionTimeOutTests.java32 * @summary Need new APIs to get/set session timeout and session cache size.
44 * 1. general test, i.e timeout is set to x and session invalidates when
51 * lifetime of a session < current_session_timeout, such that
52 * current_session_timeout > 0, for all sessions cached by the session
189 SSLSession session = (SSLSession) sessions.elementAt(i);
191 long creationTime = session.getCreationTime();
194 System.out.print(session + " " + lifetime + " ");
195 if (sessCtx.getSession(session.getId()) == null) {
206 + " obove session");
[all...]
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/
H A DDelegatedTaskWrongException.java165 SSLSession session = ssle1.getSession();
166 int appBufferMax = session.getApplicationBufferSize();
167 int netBufferMax = session.getPacketBufferSize();
H A DCloseEngineException.java220 SSLSession session = ssle1.getSession();
221 int appBufferMax = session.getApplicationBufferSize();
222 int netBufferMax = session.getPacketBufferSize();
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/
H A DReverseNameLookup.java138 SSLSession session = sslSocket.getSession();
139 if (!session.getPeerHost().equals("127.0.0.1")) {
/openjdk7/jdk/test/java/rmi/transport/pinClientSocketFactory/
H A DPinClientSocketFactory.java94 Session session = factoryStub.getSession();
95 session.ping();
/openjdk7/jdk/src/share/classes/javax/net/ssl/
H A DHttpsURLConnection.java103 * as part of defining the session.
122 * defining the session.
201 public boolean verify(String hostname, SSLSession session) { argument
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/
H A DDebugReportsOneExtraByte.java299 SSLSession session = clientEngine.getSession();
300 int appBufferMax = session.getApplicationBufferSize();
301 int netBufferMax = session.getPacketBufferSize();

Completed in 62 milliseconds

1234