Searched refs:suites (Results 1 - 25 of 42) sorted by relevance

12

/openjdk9/jdk/test/javax/net/ssl/sanity/ciphersuites/
H A DNoKerberos.java26 * @summary Sanity check to ensure that Kerberos cipher suites cannot be
50 * Checks that the given array of supported cipher suites does not include
51 * any Kerberos cipher suites.
54 for (String suites: supportedSuites) {
55 if (KERBEROS_CIPHER_SUITES.contains(suites)) {
56 throw new RuntimeException("Supported list of cipher suites " +
57 " should not include Kerberos cipher suites");
75 // attempt to enable each of the Kerberos cipher suites
77 String[] suites = { kcs };
79 sslSocket.setEnabledCipherSuites(suites);
[all...]
H A DCipherSuitesInOrder.java159 // show all of the supported cipher suites
161 "All supported cipher suites");
181 // check the order of default cipher suites of SSLContext
184 "Default cipher suites in SSLContext");
186 // check the order of supported cipher suites of SSLContext
189 "Supported cipher suites in SSLContext");
193 // Check the cipher suites order of SSLEngine
197 // check the order of endabled cipher suites
200 "Enabled cipher suites in SSLEngine");
202 // check the order of supported cipher suites
242 checkSuites(String[] suites, String title) argument
257 showSuites(String[] suites, String title) argument
[all...]
H A DCheckCipherSuites.java28 * @ignore JSSE supported cipher suites are changed with CR 6916074,
243 private static void showSuites(String[] suites) { argument
244 if ((suites == null) || (suites.length == 0)) {
247 for (int i = 0; i < suites.length; i++) {
248 System.out.println(" " + suites[i]);
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.hotspot/src/org/graalvm/compiler/hotspot/meta/
H A DHotSpotProviders.java45 private final SuitesProvider suites; field in class:HotSpotProviders
52 HotSpotForeignCallsProvider foreignCalls, LoweringProvider lowerer, Replacements replacements, NodeCostProvider nodeCostProvider, SuitesProvider suites,
56 this.suites = suites;
74 return suites;
51 HotSpotProviders(MetaAccessProvider metaAccess, HotSpotCodeCacheProvider codeCache, ConstantReflectionProvider constantReflection, ConstantFieldProvider constantField, HotSpotForeignCallsProvider foreignCalls, LoweringProvider lowerer, Replacements replacements, NodeCostProvider nodeCostProvider, SuitesProvider suites, HotSpotRegistersProvider registers, SnippetReflectionProvider snippetReflection, HotSpotWordTypes wordTypes, Plugins graphBuilderPlugins) argument
/openjdk9/jdk/test/sun/security/ssl/GenSSLConfigs/
H A DTestThread.java58 // Defines the cipher suites that'll be used in initial
61 public void setBasicCipherSuites (String suites [])
62 { basicCipherSuites = suites; }
H A DHandler.java56 public void setRenegotiateSuites (String suites [])
57 { renegotiateSuites = suites; }
105 if (message.equalsIgnoreCase ("no cipher suites in common")) {
H A DServerThread.java60 public void setRenegotiateSuites (String suites [])
61 { renegotiateSuites = suites; }
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.java/src/org/graalvm/compiler/java/
H A DSuitesProviderBase.java45 Suites suites = createSuites();
46 suites.setImmutable();
47 return suites;
/openjdk9/jdk/test/sun/security/ssl/ClientHandshaker/
H A DCipherSuiteOrder.java115 System.out.println("server enabled suites: ");
117 String suites[] = sslSocket.getEnabledCipherSuites();
118 for (int i = 0; i < suites.length; i++)
119 System.out.println(suites[i]);
158 * Pick a random order for the suites that is different from the
169 System.out.println("client enabled suites: ");
171 String[] suites = sslSocket.getEnabledCipherSuites();
172 for (int i = 0; i < suites.length; i++)
173 System.out.println(suites[i]);
/openjdk9/jdk/src/java.naming/share/classes/javax/naming/ldap/
H A DStartTlsResponse.java123 * Overrides the default list of cipher suites enabled for use on the
124 * TLS connection. The cipher suites must have already been listed by
130 * @param suites The non-null list of names of all the cipher suites to
134 public abstract void setEnabledCipherSuites(String[] suites); argument
170 * If cipher suites have been set via {@code setEnabledCipherSuites}
/openjdk9/jdk/src/java.naming/share/classes/com/sun/jndi/ldap/ext/
H A DStartTlsResponseImpl.java104 * The list of cipher suites to be enabled.
106 private transient String[] suites = null; field in class:StartTlsResponseImpl
125 * Overrides the default list of cipher suites enabled for use on the
126 * TLS connection. The cipher suites must have already been listed by
132 * @param suites The non-null list of names of all the cipher suites to
136 public void setEnabledCipherSuites(String[] suites) { argument
137 // The impl does accept null suites, although the spec requires
139 this.suites = suites
[all...]
/openjdk9/jdk/test/javax/net/ssl/SSLEngine/
H A DTestAllSuites.java27 * @ignore JSSE supported cipher suites are changed with CR 6916074,
33 * Iterate through all the suites using both TLS and SSLv3, and turn
96 String [] suites = ssle1.getSupportedCipherSuites();
98 for (int i = 0; i < suites.length; i++) {
101 runTest(suites[i], protocols[j]);
117 * Don't run the Kerberized suites for now.
137 String [] suites = new String [] { suite };
139 ssle1.setEnabledCipherSuites(suites);
140 ssle2.setEnabledCipherSuites(suites);
H A DBasics.java29 * @ignore JSSE supported cipher suites are changed with CR 6916074,
81 String [] suites = ssle.getSupportedCipherSuites();
82 String secondSuite = suites[1];
85 printStrings("Supported Ciphersuites", suites);
90 suites = ssle.getEnabledCipherSuites();
92 !(suites[0].equals(secondSuite))) {
/openjdk9/jdk/test/sun/security/ssl/DHKeyExchange/
H A DDHEKeySizing.java253 String[] suites = new String [] {cipherSuite};
255 ssle1.setEnabledCipherSuites(suites);
256 ssle2.setEnabledCipherSuites(suites);
366 if (!cs.equals(suites[0])) {
367 throw new Exception("suites not equal: " + cs + "/" + suites[0]);
371 if (!cs.equals(suites[0])) {
372 throw new Exception("suites not equal: " + cs + "/" + suites[0]);
H A DLegacyDHEKeyExchange.java135 String[] suites = new String [] {"TLS_DHE_RSA_WITH_AES_128_CBC_SHA"};
136 sslSocket.setEnabledCipherSuites(suites);
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.jtt/src/org/graalvm/compiler/jtt/optimize/
H A DNestedLoop_EA.java42 Suites suites = super.createSuites();
43 ListIterator<BasePhase<? super HighTierContext>> position = suites.getHighTier().findPhase(PartialEscapePhase.class);
48 return suites;
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.core/src/org/graalvm/compiler/core/
H A DGraalCompiler.java109 public final Suites suites; field in class:GraalCompiler.Request
123 * @param suites
129 OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) {
137 this.suites = suites;
162 PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult,
164 return compile(new Request<>(graph, installedCodeOwner, providers, backend, graphBuilderSuite, optimisticOpts, profilingInfo, suites, lirSuites, compilationResult, factory));
178 emitFrontEnd(r.providers, r.backend, r.graph, r.graphBuilderSuite, r.optimisticOpts, r.profilingInfo, r.suites);
192 ProfilingInfo profilingInfo, Suites suites) {
205 suites
128 Request(StructuredGraph graph, ResolvedJavaMethod installedCodeOwner, Providers providers, Backend backend, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) argument
161 compileGraph(StructuredGraph graph, ResolvedJavaMethod installedCodeOwner, Providers providers, Backend backend, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) argument
191 emitFrontEnd(Providers providers, TargetProvider target, StructuredGraph graph, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites) argument
[all...]
/openjdk9/jdk/src/java.base/share/classes/javax/net/ssl/
H A DSSLServerSocket.java47 * suites and protocols, whether client
186 * Returns the list of cipher suites which are currently enabled
191 * cipher suites.
199 * The returned array includes cipher suites from the list of standard
204 * include other cipher suites that the provider supports.
206 * @return an array of cipher suites enabled
214 * Sets the cipher suites enabled for use by accepted connections.
216 * The cipher suites must have been listed by getSupportedCipherSuites()
218 * only suites listed in the <code>suites</cod
[all...]
H A DSSLSocket.java85 * <P>There are two groups of cipher suites which you will need to know
86 * about when managing cipher suites: <UL>
88 * <LI> <em>Supported</em> cipher suites: all the suites which are
92 * <LI> <em>Enabled</em> cipher suites, which may be fewer
93 * than the full set of supported suites. This group is
96 * Initially, a default set of cipher suites will be enabled on
102 * suites which authenticate servers and provide confidentiality
110 * preferences: what cipher suites to use, whether the socket should be
265 * Returns the names of the cipher suites whic
[all...]
/openjdk9/jdk/test/javax/net/ssl/sanity/pluggability/
H A DMySSLEngineImpl.java65 public void setEnabledCipherSuites(String[] suites) {} argument
H A DMySSLSocketFacImpl.java80 public void setEnabledCipherSuites(String suites[]) {} argument
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.core.test/src/org/graalvm/compiler/core/test/tutorial/
H A DInvokeGraal.java106 Suites suites = backend.getSuites().getDefaultSuites();
126 GraalCompiler.compileGraph(graph, method, providers, backend, graphBuilderSuite, optimisticOpts, profilingInfo, suites, lirSuites, compilationResult, factory);
/openjdk9/jdk/src/java.base/share/classes/sun/security/ssl/
H A DSSLServerSocketImpl.java57 * of your application support "anonymous" cipher suites, you may be
58 * able to configure a server socket to accept those suites.
79 /* what cipher suites to use by default */
99 * Whether local cipher suites preference in server side should be
170 * Returns the names of the cipher suites which could be enabled for use
172 * be enabled by default, since this list may include cipher suites which
175 * certain kinds of certificates to use certain cipher suites.
185 * Returns the list of cipher suites which are currently enabled
195 * Controls which particular SSL cipher suites are enabled for use
198 * @param suites Name
202 setEnabledCipherSuites(String[] suites) argument
[all...]
/openjdk9/jdk/test/javax/net/ssl/ALPN/
H A DSSLSocketAlpnTest.java176 String[] suites = sslp.getCipherSuites();
177 sslp.setCipherSuites(suites);
271 String[] suites = sslp.getCipherSuites();
272 sslp.setCipherSuites(suites);
H A DSSLServerSocketAlpnTest.java170 String[] suites = sslp.getCipherSuites();
171 sslp.setCipherSuites(suites);
275 String[] suites = sslp.getCipherSuites();
276 sslp.setCipherSuites(suites);

Completed in 199 milliseconds

12