/openjdk7/jdk/src/share/classes/javax/net/ssl/ |
H A D | HostnameVerifier.java | 52 * @param session SSLSession used on the connection to host 55 public boolean verify(String hostname, SSLSession session); argument
|
H A D | HandshakeCompletedEvent.java | 38 * this event class provides direct access to some important session 55 private transient SSLSession session; field in class:HandshakeCompletedEvent 66 session = s; 71 * Returns the session that triggered this event. 77 return session; 82 * Returns the cipher suite in use by the session which was produced 86 * @return the name of the cipher suite negotiated during this session. 90 return session.getCipherSuite(); 114 return session.getLocalCertificates(); 120 * of defining the session [all...] |
H A D | SSLSessionBindingEvent.java | 62 * @param session the SSLSession acting as the source of the event 64 * @exception IllegalArgumentException if <code>session</code> is null. 66 public SSLSessionBindingEvent(SSLSession session, String name) argument 68 super(session);
|
/openjdk7/jdk/src/share/classes/com/sun/tools/example/debug/bdi/ |
H A D | JDIEventSource.java | 49 private /*final*/ Session session; field in class:JDIEventSource 58 JDIEventSource(Session session) { argument 60 this.session = session; 61 this.runtime = session.runtime; 62 this.queue = session.vm.eventQueue(); 73 session.running = false; 81 session.interrupted = es.suspendedAll(); 94 for (JDIListener jl : session.runtime.jdiListeners) { 98 session [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | SessionManager.java | 38 * Session manager. There is one session manager object per PKCS#11 39 * provider. It allows code to checkout a session, release it 42 * The session manager pools sessions to minimize the number of 47 * The reason for this separation is how PKCS#11 deals with session objects. 48 * It defines that when a session is closed, all objects created within 49 * that session are destroyed. In other words, we may never close a session 52 * close a session, see P11Signature. 122 Session session = objSessions.poll(); 123 if (session ! 153 ensureValid(Session session) argument 158 killSession(Session session) argument 171 releaseSession(Session session) argument 184 demoteObjSession(Session session) argument 221 closeSession(Session session) argument 237 remove(Session session) argument 250 release(Session session) argument [all...] |
H A D | P11TlsPrfGenerator.java | 124 Session session = null; 126 session = token.getOpSession(); 128 (session.id(), new CK_MECHANISM(mechanism), p11Key.keyID); 129 token.p11.C_SignUpdate(session.id(), 0, label, 0, label.length); 130 token.p11.C_SignUpdate(session.id(), 0, seed, 0, seed.length); 132 (session.id(), spec.getOutputLength()); 137 token.releaseSession(session); 146 Session session = null; 148 session = token.getOpSession(); 149 long keyID = token.p11.C_DeriveKey(session [all...] |
H A D | P11ECDHKeyAgreement.java | 122 Session session = null; 124 session = token.getOpSession(); 133 long keyID = token.p11.C_DeriveKey(session.id(), 139 token.p11.C_GetAttributeValue(session.id(), keyID, attributes); 141 token.p11.C_DestroyObject(session.id(), keyID); 147 token.releaseSession(session); 184 Session session = null; 186 session = token.getObjSession(); 195 long keyID = token.p11.C_DeriveKey(session.id(), 201 token.p11.C_GetAttributeValue(session [all...] |
H A D | P11SecureRandom.java | 45 * Also note that we obtain the PKCS#11 session on demand, no need to tie one 95 Session session = null; 97 session = token.getOpSession(); 98 token.p11.C_SeedRandom(session.id(), seed); 117 token.releaseSession(session); 180 Session session = null; 182 session = token.getOpSession(); 183 token.p11.C_GenerateRandom(session.id(), bytes); 188 token.releaseSession(session);
|
H A D | P11RSAKeyFactory.java | 200 Session session = null; 202 session = token.getObjSession(); 203 long keyID = token.p11.C_CreateObject(session.id(), attributes); 205 (session, keyID, "RSA", n.bitLength(), attributes); 207 token.releaseSession(session); 222 Session session = null; 224 session = token.getObjSession(); 225 long keyID = token.p11.C_CreateObject(session.id(), attributes); 227 (session, keyID, "RSA", n.bitLength(), attributes); 229 token.releaseSession(session); 263 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 283 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11Mac.java | 57 /* unitialized, all fields except session have arbitrary values */ 60 /* session initialized, no data processed yet */ 63 /* session initialized, data processed */ 87 // associated session, if any 88 private Session session; field in class:P11Mac 148 if ((session == null) || (token.explicitCancel == false)) { 152 token.p11.C_SignFinal(session.id(), 0); 162 if (session == null) { 163 session = token.getOpSession(); 167 (session [all...] |
H A D | P11DHKeyFactory.java | 182 Session session = null; 184 session = token.getObjSession(); 185 long keyID = token.p11.C_CreateObject(session.id(), attributes); 187 (session, keyID, "DH", p.bitLength(), attributes); 189 token.releaseSession(session); 204 Session session = null; 206 session = token.getObjSession(); 207 long keyID = token.p11.C_CreateObject(session.id(), attributes); 209 (session, keyID, "DH", p.bitLength(), attributes); 211 token.releaseSession(session); 215 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 237 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11DSAKeyFactory.java | 177 Session session = null; 179 session = token.getObjSession(); 180 long keyID = token.p11.C_CreateObject(session.id(), attributes); 182 (session, keyID, "DSA", p.bitLength(), attributes); 184 token.releaseSession(session); 200 Session session = null; 202 session = token.getObjSession(); 203 long keyID = token.p11.C_CreateObject(session.id(), attributes); 205 (session, keyID, "DSA", p.bitLength(), attributes); 207 token.releaseSession(session); 211 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 235 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11KeyFactory.java | 92 Session[] session = new Session[1]; 95 return (T)implGetPublicKeySpec(p11Key, keySpec, session); 97 return (T)implGetPrivateKeySpec(p11Key, keySpec, session); 102 session[0] = token.releaseSession(session[0]); 142 Session[] session) throws PKCS11Exception, InvalidKeySpecException; 145 Session[] session) throws PKCS11Exception, InvalidKeySpecException; 141 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 144 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument
|
H A D | P11TlsRsaPremasterSecretGenerator.java | 93 Session session = null; 95 session = token.getObjSession(); 99 (session.id(), new CK_MECHANISM(mechanism, version), attributes); 101 (session, keyID, "TlsRsaPremasterSecret", 48 << 3, attributes); 106 token.releaseSession(session);
|
H A D | P11Key.java | 89 // phantom reference notification clean up for session keys 92 P11Key(String type, Session session, long keyID, String algorithm, argument 95 this.token = session.token; 117 sessionKeyRef = new SessionKeyRef(this, keyID, session); 206 + (tokenObject ? "token" : "session") + " object"; 250 private static CK_ATTRIBUTE[] getAttributes(Session session, long keyID, argument 272 session.token.p11.C_GetAttributeValue 273 (session.id(), keyID, desiredAttributes); 283 static SecretKey secretKey(Session session, long keyID, String algorithm, argument 285 attributes = getAttributes(session, keyI 293 masterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument 305 publicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 325 privateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 379 P11PrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 396 P11SecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 443 P11TlsMasterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument 463 P11RSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 573 P11RSAPrivateNonCRTKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 634 P11RSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 687 P11DSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 748 P11DSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 809 P11DHPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 871 P11DHPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 933 P11ECPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 993 P11ECPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 1094 private Session session; field in class:SessionKeyRef 1096 SessionKeyRef(P11Key key , long keyID, Session session) argument [all...] |
H A D | P11KeyStore.java | 310 Session session = null; 312 session = token.getOpSession(); 315 THandle h = getTokenObject(session, 320 return loadPkey(session, h.handle); 323 THandle h = getTokenObject(session, 328 return loadSkey(session, h.handle); 339 token.releaseSession(session); 931 Session session = null; 933 session = token.getOpSession(); 948 (session, ATTR_CLASS_SKE 1194 loadCert(Session session, long oHandle) argument 1211 loadChain(Session session, X509Certificate endCert) argument 1264 loadSkey(Session session, long oHandle) argument 1314 loadPkey(Session session, long oHandle) argument 2181 getTokenObject(Session session, CK_ATTRIBUTE type, byte[] cka_id, String cka_label) argument 2683 findObjects(Session session, CK_ATTRIBUTE[] attrs) argument [all...] |
H A D | P11Digest.java | 54 /* unitialized, fields uninitialized, no session acquired */ 57 // data in buffer, all fields valid, session acquired 61 /* session initialized for digesting */ 78 // associated session, if any 79 private Session session; field in class:P11Digest 130 if (session == null) { 138 token.p11.C_DigestFinal(session.id(), buffer, 0, buffer.length); 158 if (session == null) { 159 session = token.getOpSession(); 189 n = token.p11.C_DigestSingle(session [all...] |
H A D | Token.java | 64 // session manager to pool sessions 132 // create session manager and open a test session 163 // uses cached result if current. session is optional and may be null 164 boolean isLoggedIn(Session session) throws PKCS11Exception { argument 169 loggedIn = isLoggedInNow(session); 177 boolean isLoggedInNow(Session session) throws PKCS11Exception { argument 178 boolean allocSession = (session == null); 181 session = getOpSession(); 183 CK_SESSION_INFO info = p11.C_GetSessionInfo(session 197 ensureLoggedIn(Session session) argument 271 releaseSession(Session session) argument 275 killSession(Session session) argument [all...] |
H A D | P11TlsKeyMaterialGenerator.java | 147 Session session = null; 149 session = token.getObjSession(); 164 long keyID = token.p11.C_DeriveKey(session.id(), 172 (session, out.hClientMacSecret, "MAC", macBits, attributes); 174 (session, out.hServerMacSecret, "MAC", macBits, attributes); 177 clientCipherKey = P11Key.secretKey(session, out.hClientKey, 179 serverCipherKey = P11Key.secretKey(session, out.hServerKey, 196 token.releaseSession(session);
|
H A D | P11ECKeyFactory.java | 230 Session session = null; 232 session = token.getObjSession(); 233 long keyID = token.p11.C_CreateObject(session.id(), attributes); 235 (session, keyID, "EC", params.getCurve().getField().getFieldSize(), attributes); 237 token.releaseSession(session); 251 Session session = null; 253 session = token.getObjSession(); 254 long keyID = token.p11.C_CreateObject(session.id(), attributes); 256 (session, keyID, "EC", params.getCurve().getField().getFieldSize(), attributes); 258 token.releaseSession(session); 262 implGetPublicKeySpec(P11Key key, Class keySpec, Session[] session) argument 284 implGetPrivateKeySpec(P11Key key, Class keySpec, Session[] session) argument [all...] |
H A D | P11RSACipher.java | 79 // associated session, if any 80 private Session session; field in class:P11RSACipher 237 if ((session == null) || (token.explicitCancel == false)) { 240 if (session.hasObjects() == false) { 241 session = token.killSession(session); 251 (session.id(), buffer, 0, inLen, buffer, 0, outLen); 255 (session.id(), buffer, 0, inLen, buffer, 0, outLen); 260 (session.id(), tmpBuffer); 264 (session [all...] |
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/https/ |
H A D | DefaultHostnameVerifier.java | 42 public boolean verify(String hostname, SSLSession session) { argument
|
/openjdk7/jdk/test/sun/security/ssl/sanity/interop/ |
H A D | JSSEClient.java | 60 SSLSession session = socket.getSession(); 61 session.invalidate(); 62 String cipherSuite = session.getCipherSuite(); 66 String protocol = session.getProtocol(); 71 session.getPeerCertificates(); 73 Certificate[] certificates = session.getLocalCertificates();
|
/openjdk7/jdk/test/sun/security/pkcs11/fips/ |
H A D | JSSEClient.java | 59 SSLSession session = socket.getSession(); 60 session.invalidate(); 61 String cipherSuite = session.getCipherSuite(); 65 String protocol = session.getProtocol(); 70 session.getPeerCertificates(); 72 Certificate[] certificates = session.getLocalCertificates();
|
/openjdk7/jdk/test/sun/security/pkcs11/sslecc/ |
H A D | JSSEClient.java | 59 SSLSession session = socket.getSession(); 60 session.invalidate(); 61 String cipherSuite = session.getCipherSuite(); 65 String protocol = session.getProtocol(); 70 session.getPeerCertificates(); 72 Certificate[] certificates = session.getLocalCertificates();
|