Searched refs:session (Results 1 - 25 of 95) sorted by relevance

1234

/openjdk7/jdk/src/share/classes/javax/net/ssl/
H A DHostnameVerifier.java52 * @param session SSLSession used on the connection to host
55 public boolean verify(String hostname, SSLSession session); argument
H A DHandshakeCompletedEvent.java38 * this event class provides direct access to some important session
55 private transient SSLSession session; field in class:HandshakeCompletedEvent
66 session = s;
71 * Returns the session that triggered this event.
77 return session;
82 * Returns the cipher suite in use by the session which was produced
86 * @return the name of the cipher suite negotiated during this session.
90 return session.getCipherSuite();
114 return session.getLocalCertificates();
120 * of defining the session
[all...]
H A DSSLSessionBindingEvent.java62 * @param session the SSLSession acting as the source of the event
64 * @exception IllegalArgumentException if <code>session</code> is null.
66 public SSLSessionBindingEvent(SSLSession session, String name) argument
68 super(session);
/openjdk7/jdk/src/share/classes/com/sun/tools/example/debug/bdi/
H A DJDIEventSource.java49 private /*final*/ Session session; field in class:JDIEventSource
58 JDIEventSource(Session session) { argument
60 this.session = session;
61 this.runtime = session.runtime;
62 this.queue = session.vm.eventQueue();
73 session.running = false;
81 session.interrupted = es.suspendedAll();
94 for (JDIListener jl : session.runtime.jdiListeners) {
98 session
[all...]
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/
H A DSessionManager.java38 * Session manager. There is one session manager object per PKCS#11
39 * provider. It allows code to checkout a session, release it
42 * The session manager pools sessions to minimize the number of
47 * The reason for this separation is how PKCS#11 deals with session objects.
48 * It defines that when a session is closed, all objects created within
49 * that session are destroyed. In other words, we may never close a session
52 * close a session, see P11Signature.
122 Session session = objSessions.poll();
123 if (session !
153 ensureValid(Session session) argument
158 killSession(Session session) argument
171 releaseSession(Session session) argument
184 demoteObjSession(Session session) argument
221 closeSession(Session session) argument
237 remove(Session session) argument
250 release(Session session) argument
[all...]
H A DP11TlsPrfGenerator.java124 Session session = null;
126 session = token.getOpSession();
128 (session.id(), new CK_MECHANISM(mechanism), p11Key.keyID);
129 token.p11.C_SignUpdate(session.id(), 0, label, 0, label.length);
130 token.p11.C_SignUpdate(session.id(), 0, seed, 0, seed.length);
132 (session.id(), spec.getOutputLength());
137 token.releaseSession(session);
146 Session session = null;
148 session = token.getOpSession();
149 long keyID = token.p11.C_DeriveKey(session
[all...]
H A DP11ECDHKeyAgreement.java122 Session session = null;
124 session = token.getOpSession();
133 long keyID = token.p11.C_DeriveKey(session.id(),
139 token.p11.C_GetAttributeValue(session.id(), keyID, attributes);
141 token.p11.C_DestroyObject(session.id(), keyID);
147 token.releaseSession(session);
184 Session session = null;
186 session = token.getObjSession();
195 long keyID = token.p11.C_DeriveKey(session.id(),
201 token.p11.C_GetAttributeValue(session
[all...]
H A DP11SecureRandom.java45 * Also note that we obtain the PKCS#11 session on demand, no need to tie one
95 Session session = null;
97 session = token.getOpSession();
98 token.p11.C_SeedRandom(session.id(), seed);
117 token.releaseSession(session);
180 Session session = null;
182 session = token.getOpSession();
183 token.p11.C_GenerateRandom(session.id(), bytes);
188 token.releaseSession(session);
H A DP11RSAKeyFactory.java200 Session session = null;
202 session = token.getObjSession();
203 long keyID = token.p11.C_CreateObject(session.id(), attributes);
205 (session, keyID, "RSA", n.bitLength(), attributes);
207 token.releaseSession(session);
222 Session session = null;
224 session = token.getObjSession();
225 long keyID = token.p11.C_CreateObject(session.id(), attributes);
227 (session, keyID, "RSA", n.bitLength(), attributes);
229 token.releaseSession(session);
263 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument
283 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
[all...]
H A DP11Mac.java57 /* unitialized, all fields except session have arbitrary values */
60 /* session initialized, no data processed yet */
63 /* session initialized, data processed */
87 // associated session, if any
88 private Session session; field in class:P11Mac
148 if ((session == null) || (token.explicitCancel == false)) {
152 token.p11.C_SignFinal(session.id(), 0);
162 if (session == null) {
163 session = token.getOpSession();
167 (session
[all...]
H A DP11DHKeyFactory.java182 Session session = null;
184 session = token.getObjSession();
185 long keyID = token.p11.C_CreateObject(session.id(), attributes);
187 (session, keyID, "DH", p.bitLength(), attributes);
189 token.releaseSession(session);
204 Session session = null;
206 session = token.getObjSession();
207 long keyID = token.p11.C_CreateObject(session.id(), attributes);
209 (session, keyID, "DH", p.bitLength(), attributes);
211 token.releaseSession(session);
215 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument
237 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
[all...]
H A DP11DSAKeyFactory.java177 Session session = null;
179 session = token.getObjSession();
180 long keyID = token.p11.C_CreateObject(session.id(), attributes);
182 (session, keyID, "DSA", p.bitLength(), attributes);
184 token.releaseSession(session);
200 Session session = null;
202 session = token.getObjSession();
203 long keyID = token.p11.C_CreateObject(session.id(), attributes);
205 (session, keyID, "DSA", p.bitLength(), attributes);
207 token.releaseSession(session);
211 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument
235 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
[all...]
H A DP11KeyFactory.java92 Session[] session = new Session[1];
95 return (T)implGetPublicKeySpec(p11Key, keySpec, session);
97 return (T)implGetPrivateKeySpec(p11Key, keySpec, session);
102 session[0] = token.releaseSession(session[0]);
142 Session[] session) throws PKCS11Exception, InvalidKeySpecException;
145 Session[] session) throws PKCS11Exception, InvalidKeySpecException;
141 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument
144 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
H A DP11TlsRsaPremasterSecretGenerator.java93 Session session = null;
95 session = token.getObjSession();
99 (session.id(), new CK_MECHANISM(mechanism, version), attributes);
101 (session, keyID, "TlsRsaPremasterSecret", 48 << 3, attributes);
106 token.releaseSession(session);
H A DP11Key.java89 // phantom reference notification clean up for session keys
92 P11Key(String type, Session session, long keyID, String algorithm, argument
95 this.token = session.token;
117 sessionKeyRef = new SessionKeyRef(this, keyID, session);
206 + (tokenObject ? "token" : "session") + " object";
250 private static CK_ATTRIBUTE[] getAttributes(Session session, long keyID, argument
272 session.token.p11.C_GetAttributeValue
273 (session.id(), keyID, desiredAttributes);
283 static SecretKey secretKey(Session session, long keyID, String algorithm, argument
285 attributes = getAttributes(session, keyI
293 masterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument
305 publicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
325 privateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
379 P11PrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
396 P11SecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
443 P11TlsMasterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument
463 P11RSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
573 P11RSAPrivateNonCRTKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
634 P11RSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
687 P11DSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
748 P11DSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
809 P11DHPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
871 P11DHPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
933 P11ECPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
993 P11ECPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument
1094 private Session session; field in class:SessionKeyRef
1096 SessionKeyRef(P11Key key , long keyID, Session session) argument
[all...]
H A DP11KeyStore.java310 Session session = null;
312 session = token.getOpSession();
315 THandle h = getTokenObject(session,
320 return loadPkey(session, h.handle);
323 THandle h = getTokenObject(session,
328 return loadSkey(session, h.handle);
339 token.releaseSession(session);
931 Session session = null;
933 session = token.getOpSession();
948 (session, ATTR_CLASS_SKE
1194 loadCert(Session session, long oHandle) argument
1211 loadChain(Session session, X509Certificate endCert) argument
1264 loadSkey(Session session, long oHandle) argument
1314 loadPkey(Session session, long oHandle) argument
2181 getTokenObject(Session session, CK_ATTRIBUTE type, byte[] cka_id, String cka_label) argument
2683 findObjects(Session session, CK_ATTRIBUTE[] attrs) argument
[all...]
H A DP11Digest.java54 /* unitialized, fields uninitialized, no session acquired */
57 // data in buffer, all fields valid, session acquired
61 /* session initialized for digesting */
78 // associated session, if any
79 private Session session; field in class:P11Digest
130 if (session == null) {
138 token.p11.C_DigestFinal(session.id(), buffer, 0, buffer.length);
158 if (session == null) {
159 session = token.getOpSession();
189 n = token.p11.C_DigestSingle(session
[all...]
H A DToken.java64 // session manager to pool sessions
132 // create session manager and open a test session
163 // uses cached result if current. session is optional and may be null
164 boolean isLoggedIn(Session session) throws PKCS11Exception { argument
169 loggedIn = isLoggedInNow(session);
177 boolean isLoggedInNow(Session session) throws PKCS11Exception { argument
178 boolean allocSession = (session == null);
181 session = getOpSession();
183 CK_SESSION_INFO info = p11.C_GetSessionInfo(session
197 ensureLoggedIn(Session session) argument
271 releaseSession(Session session) argument
275 killSession(Session session) argument
[all...]
H A DP11TlsKeyMaterialGenerator.java147 Session session = null;
149 session = token.getObjSession();
164 long keyID = token.p11.C_DeriveKey(session.id(),
172 (session, out.hClientMacSecret, "MAC", macBits, attributes);
174 (session, out.hServerMacSecret, "MAC", macBits, attributes);
177 clientCipherKey = P11Key.secretKey(session, out.hClientKey,
179 serverCipherKey = P11Key.secretKey(session, out.hServerKey,
196 token.releaseSession(session);
H A DP11ECKeyFactory.java230 Session session = null;
232 session = token.getObjSession();
233 long keyID = token.p11.C_CreateObject(session.id(), attributes);
235 (session, keyID, "EC", params.getCurve().getField().getFieldSize(), attributes);
237 token.releaseSession(session);
251 Session session = null;
253 session = token.getObjSession();
254 long keyID = token.p11.C_CreateObject(session.id(), attributes);
256 (session, keyID, "EC", params.getCurve().getField().getFieldSize(), attributes);
258 token.releaseSession(session);
262 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument
284 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
[all...]
H A DP11RSACipher.java79 // associated session, if any
80 private Session session; field in class:P11RSACipher
237 if ((session == null) || (token.explicitCancel == false)) {
240 if (session.hasObjects() == false) {
241 session = token.killSession(session);
251 (session.id(), buffer, 0, inLen, buffer, 0, outLen);
255 (session.id(), buffer, 0, inLen, buffer, 0, outLen);
260 (session.id(), tmpBuffer);
264 (session
[all...]
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/https/
H A DDefaultHostnameVerifier.java42 public boolean verify(String hostname, SSLSession session) { argument
/openjdk7/jdk/test/sun/security/ssl/sanity/interop/
H A DJSSEClient.java60 SSLSession session = socket.getSession();
61 session.invalidate();
62 String cipherSuite = session.getCipherSuite();
66 String protocol = session.getProtocol();
71 session.getPeerCertificates();
73 Certificate[] certificates = session.getLocalCertificates();
/openjdk7/jdk/test/sun/security/pkcs11/fips/
H A DJSSEClient.java59 SSLSession session = socket.getSession();
60 session.invalidate();
61 String cipherSuite = session.getCipherSuite();
65 String protocol = session.getProtocol();
70 session.getPeerCertificates();
72 Certificate[] certificates = session.getLocalCertificates();
/openjdk7/jdk/test/sun/security/pkcs11/sslecc/
H A DJSSEClient.java59 SSLSession session = socket.getSession();
60 session.invalidate();
61 String cipherSuite = session.getCipherSuite();
65 String protocol = session.getProtocol();
70 session.getPeerCertificates();
72 Certificate[] certificates = session.getLocalCertificates();

Completed in 70 milliseconds

1234