Searched refs:obsoleted (Results 1 - 4 of 4) sorted by relevance

/openjdk7/jdk/src/share/classes/sun/security/ssl/
H A DCipherSuite.java120 // obsoleted since protocol version
121 final int obsoleted; field in class:CipherSuite
131 boolean allowed, int obsoleted, int supported, PRF prfAlg) {
158 this.obsoleted = obsoleted;
176 this.obsoleted = ProtocolVersion.LIMIT_MAX_VALUE;
267 boolean allowed, int obsoleted, int supported, PRF prf) {
270 cipher, allowed, obsoleted, supported, prf);
292 boolean allowed, int obsoleted) {
293 // If this is an obsoleted suit
129 CipherSuite(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted, int supported, PRF prfAlg) argument
265 add(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted, int supported, PRF prf) argument
290 add(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted) argument
[all...]
H A DHandshaker.java553 * In TLS 1.1, many weak or vulnerable cipher suites were obsoleted,
558 * the client cannot request to negotiate those obsoleted cipher
559 * suites. That is, the obsoleted suites should not be included in the
561 * suites, the active cipher suites, which does not contain obsoleted
576 if (suite.obsoleted > activeProtocols.min.v &&
584 if (suite.obsoleted <= activeProtocols.min.v) {
586 "Ignoring obsoleted cipher suite: " + suite);
603 * In TLS 1.1, many weak or vulnerable cipher suites were obsoleted,
621 if (suite.isAvailable() && suite.obsoleted > protocol.v &&
H A DSSLContextImpl.java343 suite.obsoleted > protocols.min.v &&
352 if (suite.obsoleted <= protocols.min.v) {
354 "Ignoring obsoleted cipher suite: " + suite);
H A DServerHandshaker.java926 // must not negotiate the obsoleted weak cipher suites.
927 if (protocolVersion.v >= suite.obsoleted) {

Completed in 1538 milliseconds