/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/ |
H A D | CloseInboundException.java | 235 SSLSession session = ssle1.getSession(); 236 int appBufferMax = session.getApplicationBufferSize(); 237 int netBufferMax = session.getPacketBufferSize();
|
H A D | EmptyExtensionData.java | 96 SSLSession session = ssle.getSession(); 97 int appBufferMax = session.getApplicationBufferSize(); 98 int netBufferMax = session.getPacketBufferSize();
|
H A D | EngineEnforceUseClientMode.java | 264 SSLSession session = ssle1.getSession(); 265 int appBufferMax = session.getApplicationBufferSize(); 266 int netBufferMax = session.getPacketBufferSize();
|
H A D | SSLEngineBadBufferArrayAccess.java | 397 SSLSession session = serverEngine.getSession(); 398 int appBufferMax = session.getApplicationBufferSize(); 399 int netBufferMax = session.getPacketBufferSize();
|
H A D | SSLEngineDeadlock.java | 320 SSLSession session = clientEngine.getSession(); 321 int appBufferMax = session.getApplicationBufferSize(); 322 int netBufferMax = session.getPacketBufferSize();
|
H A D | RehandshakeFinished.java | 183 // Prime the session cache with a good session 184 // Second connection should be a simple session resumption. 424 SSLSession session = clientEngine.getSession(); 425 int appBufferMax = session.getApplicationBufferSize(); 426 int netBufferMax = session.getPacketBufferSize();
|
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ |
H A D | Arrays.java | 211 SSLSession session = ssle1.getSession(); 212 int appBufferMax = session.getApplicationBufferSize(); 213 int netBufferMax = session.getPacketBufferSize();
|
H A D | ExtendedKeyEngine.java | 218 SSLSession session = ssle1.getSession(); 219 int appBufferMax = session.getApplicationBufferSize(); 220 int netBufferMax = session.getPacketBufferSize();
|
H A D | NoAuthClientAuth.java | 235 log("\tInvalidating session, setting client auth, " + 301 SSLSession session = clientEngine.getSession(); 302 int appBufferMax = session.getApplicationBufferSize(); 303 int netBufferMax = session.getPacketBufferSize();
|
H A D | TestAllSuites.java | 299 SSLSession session = ssle1.getSession(); 300 int appBufferMax = session.getApplicationBufferSize(); 301 int netBufferMax = session.getPacketBufferSize();
|
H A D | LargeBufs.java | 234 SSLSession session = ssle1.getSession(); 237 // appBufferMax = session.getApplicationBufferSize(); 243 netBufferMax = session.getPacketBufferSize();
|
/openjdk7/jdk/test/sun/security/ssl/templates/ |
H A D | SSLEngineTemplate.java | 283 SSLSession session = clientEngine.getSession(); 284 int appBufferMax = session.getApplicationBufferSize(); 285 int netBufferMax = session.getPacketBufferSize();
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | SSLContextImpl.java | 837 SSLSession session = sslSocket.getHandshakeSession(); 838 if (session == null) { 839 throw new CertificateException("No handshake session"); 846 String hostname = session.getPeerHost(); 853 ProtocolVersion.valueOf(session.getProtocol()); 856 if (session instanceof ExtendedSSLSession) { 858 (ExtendedSSLSession)session; 879 SSLSession session = engine.getHandshakeSession(); 880 if (session == null) { 881 throw new CertificateException("No handshake session"); [all...] |
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ |
H A D | ClientHelloRead.java | 190 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ |
H A D | ProxyAuthTest.java | 178 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/ |
H A D | CriticalSubjectAltName.java | 264 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | GetResponseCode.java | 252 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/ |
H A D | HttpsURLConnectionLocalCertificateChain.java | 80 public boolean verify(String hostname, SSLSession session) { argument 82 Certificate [] certs = session.getPeerCertificates();
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | SunPKCS11.java | 1163 Session session = null; 1165 session = token.getOpSession(); 1168 p11.C_Login(session.id(), CKU_USER, pin); 1189 token.releaseSession(session); 1243 Session session = null; 1245 session = token.getOpSession(); 1246 p11.C_Logout(session.id()); 1262 token.releaseSession(session);
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/wrapper/ |
H A D | CK_TOKEN_INFO.java | 242 long sessionMax, long session, 254 this.ulSessionCount = session; 240 CK_TOKEN_INFO(char[] label, char[] vendor, char[] model, char[] serialNo, long flags, long sessionMax, long session, long rwSessionMax, long rwSession, long pinLenMax, long pinLenMin, long totalPubMem, long freePubMem, long totalPrivMem, long freePrivMem, CK_VERSION hwVer, CK_VERSION fwVer, char[] utcTime) argument
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ProtocolVersion/ |
H A D | HttpsProtocols.java | 164 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ |
H A D | B6216082.java | 161 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | CloseKeepAliveCached.java | 195 public boolean verify(String hostname, SSLSession session) { argument
|
H A D | CookieHttpsClientTest.java | 133 public boolean verify(String hostname, SSLSession session) {
|
H A D | HttpsCreateSockTest.java | 213 public boolean verify(String hostname, SSLSession session) { argument
|