Searched refs:obsoleted (Results 1 - 4 of 4) sorted by relevance
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | CipherSuite.java | 120 // obsoleted since protocol version 121 final int obsoleted; field in class:CipherSuite 131 boolean allowed, int obsoleted, int supported, PRF prfAlg) { 158 this.obsoleted = obsoleted; 176 this.obsoleted = ProtocolVersion.LIMIT_MAX_VALUE; 267 boolean allowed, int obsoleted, int supported, PRF prf) { 270 cipher, allowed, obsoleted, supported, prf); 292 boolean allowed, int obsoleted) { 293 // If this is an obsoleted suit 129 CipherSuite(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted, int supported, PRF prfAlg) argument 265 add(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted, int supported, PRF prf) argument 290 add(String name, int id, int priority, KeyExchange keyExchange, BulkCipher cipher, boolean allowed, int obsoleted) argument [all...] |
H A D | Handshaker.java | 553 * In TLS 1.1, many weak or vulnerable cipher suites were obsoleted, 558 * the client cannot request to negotiate those obsoleted cipher 559 * suites. That is, the obsoleted suites should not be included in the 561 * suites, the active cipher suites, which does not contain obsoleted 576 if (suite.obsoleted > activeProtocols.min.v && 584 if (suite.obsoleted <= activeProtocols.min.v) { 586 "Ignoring obsoleted cipher suite: " + suite); 603 * In TLS 1.1, many weak or vulnerable cipher suites were obsoleted, 621 if (suite.isAvailable() && suite.obsoleted > protocol.v &&
|
H A D | SSLContextImpl.java | 343 suite.obsoleted > protocols.min.v && 352 if (suite.obsoleted <= protocols.min.v) { 354 "Ignoring obsoleted cipher suite: " + suite);
|
H A D | ServerHandshaker.java | 926 // must not negotiate the obsoleted weak cipher suites. 927 if (protocolVersion.v >= suite.obsoleted) {
|
Completed in 1538 milliseconds