/openjdk9/jdk/test/javax/net/ssl/sanity/ciphersuites/ |
H A D | NoKerberos.java | 26 * @summary Sanity check to ensure that Kerberos cipher suites cannot be 50 * Checks that the given array of supported cipher suites does not include 51 * any Kerberos cipher suites. 54 for (String suites: supportedSuites) { 55 if (KERBEROS_CIPHER_SUITES.contains(suites)) { 56 throw new RuntimeException("Supported list of cipher suites " + 57 " should not include Kerberos cipher suites"); 75 // attempt to enable each of the Kerberos cipher suites 77 String[] suites = { kcs }; 79 sslSocket.setEnabledCipherSuites(suites); [all...] |
H A D | CipherSuitesInOrder.java | 159 // show all of the supported cipher suites 161 "All supported cipher suites"); 181 // check the order of default cipher suites of SSLContext 184 "Default cipher suites in SSLContext"); 186 // check the order of supported cipher suites of SSLContext 189 "Supported cipher suites in SSLContext"); 193 // Check the cipher suites order of SSLEngine 197 // check the order of endabled cipher suites 200 "Enabled cipher suites in SSLEngine"); 202 // check the order of supported cipher suites 242 checkSuites(String[] suites, String title) argument 257 showSuites(String[] suites, String title) argument [all...] |
H A D | CheckCipherSuites.java | 28 * @ignore JSSE supported cipher suites are changed with CR 6916074, 243 private static void showSuites(String[] suites) { argument 244 if ((suites == null) || (suites.length == 0)) { 247 for (int i = 0; i < suites.length; i++) { 248 System.out.println(" " + suites[i]);
|
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.hotspot/src/org/graalvm/compiler/hotspot/meta/ |
H A D | HotSpotProviders.java | 45 private final SuitesProvider suites; field in class:HotSpotProviders 52 HotSpotForeignCallsProvider foreignCalls, LoweringProvider lowerer, Replacements replacements, NodeCostProvider nodeCostProvider, SuitesProvider suites, 56 this.suites = suites; 74 return suites; 51 HotSpotProviders(MetaAccessProvider metaAccess, HotSpotCodeCacheProvider codeCache, ConstantReflectionProvider constantReflection, ConstantFieldProvider constantField, HotSpotForeignCallsProvider foreignCalls, LoweringProvider lowerer, Replacements replacements, NodeCostProvider nodeCostProvider, SuitesProvider suites, HotSpotRegistersProvider registers, SnippetReflectionProvider snippetReflection, HotSpotWordTypes wordTypes, Plugins graphBuilderPlugins) argument
|
/openjdk9/jdk/test/sun/security/ssl/GenSSLConfigs/ |
H A D | TestThread.java | 58 // Defines the cipher suites that'll be used in initial 61 public void setBasicCipherSuites (String suites []) 62 { basicCipherSuites = suites; }
|
H A D | Handler.java | 56 public void setRenegotiateSuites (String suites []) 57 { renegotiateSuites = suites; } 105 if (message.equalsIgnoreCase ("no cipher suites in common")) {
|
H A D | ServerThread.java | 60 public void setRenegotiateSuites (String suites []) 61 { renegotiateSuites = suites; }
|
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.java/src/org/graalvm/compiler/java/ |
H A D | SuitesProviderBase.java | 45 Suites suites = createSuites(); 46 suites.setImmutable(); 47 return suites;
|
/openjdk9/jdk/test/sun/security/ssl/ClientHandshaker/ |
H A D | CipherSuiteOrder.java | 115 System.out.println("server enabled suites: "); 117 String suites[] = sslSocket.getEnabledCipherSuites(); 118 for (int i = 0; i < suites.length; i++) 119 System.out.println(suites[i]); 158 * Pick a random order for the suites that is different from the 169 System.out.println("client enabled suites: "); 171 String[] suites = sslSocket.getEnabledCipherSuites(); 172 for (int i = 0; i < suites.length; i++) 173 System.out.println(suites[i]);
|
/openjdk9/jdk/src/java.naming/share/classes/javax/naming/ldap/ |
H A D | StartTlsResponse.java | 123 * Overrides the default list of cipher suites enabled for use on the 124 * TLS connection. The cipher suites must have already been listed by 130 * @param suites The non-null list of names of all the cipher suites to 134 public abstract void setEnabledCipherSuites(String[] suites); argument 170 * If cipher suites have been set via {@code setEnabledCipherSuites}
|
/openjdk9/jdk/src/java.naming/share/classes/com/sun/jndi/ldap/ext/ |
H A D | StartTlsResponseImpl.java | 104 * The list of cipher suites to be enabled. 106 private transient String[] suites = null; field in class:StartTlsResponseImpl 125 * Overrides the default list of cipher suites enabled for use on the 126 * TLS connection. The cipher suites must have already been listed by 132 * @param suites The non-null list of names of all the cipher suites to 136 public void setEnabledCipherSuites(String[] suites) { argument 137 // The impl does accept null suites, although the spec requires 139 this.suites = suites [all...] |
/openjdk9/jdk/test/javax/net/ssl/SSLEngine/ |
H A D | TestAllSuites.java | 27 * @ignore JSSE supported cipher suites are changed with CR 6916074, 33 * Iterate through all the suites using both TLS and SSLv3, and turn 96 String [] suites = ssle1.getSupportedCipherSuites(); 98 for (int i = 0; i < suites.length; i++) { 101 runTest(suites[i], protocols[j]); 117 * Don't run the Kerberized suites for now. 137 String [] suites = new String [] { suite }; 139 ssle1.setEnabledCipherSuites(suites); 140 ssle2.setEnabledCipherSuites(suites);
|
H A D | Basics.java | 29 * @ignore JSSE supported cipher suites are changed with CR 6916074, 81 String [] suites = ssle.getSupportedCipherSuites(); 82 String secondSuite = suites[1]; 85 printStrings("Supported Ciphersuites", suites); 90 suites = ssle.getEnabledCipherSuites(); 92 !(suites[0].equals(secondSuite))) {
|
/openjdk9/jdk/test/sun/security/ssl/DHKeyExchange/ |
H A D | DHEKeySizing.java | 253 String[] suites = new String [] {cipherSuite}; 255 ssle1.setEnabledCipherSuites(suites); 256 ssle2.setEnabledCipherSuites(suites); 366 if (!cs.equals(suites[0])) { 367 throw new Exception("suites not equal: " + cs + "/" + suites[0]); 371 if (!cs.equals(suites[0])) { 372 throw new Exception("suites not equal: " + cs + "/" + suites[0]);
|
H A D | LegacyDHEKeyExchange.java | 135 String[] suites = new String [] {"TLS_DHE_RSA_WITH_AES_128_CBC_SHA"}; 136 sslSocket.setEnabledCipherSuites(suites);
|
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.jtt/src/org/graalvm/compiler/jtt/optimize/ |
H A D | NestedLoop_EA.java | 42 Suites suites = super.createSuites(); 43 ListIterator<BasePhase<? super HighTierContext>> position = suites.getHighTier().findPhase(PartialEscapePhase.class); 48 return suites;
|
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.core/src/org/graalvm/compiler/core/ |
H A D | GraalCompiler.java | 109 public final Suites suites; field in class:GraalCompiler.Request 123 * @param suites 129 OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) { 137 this.suites = suites; 162 PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, 164 return compile(new Request<>(graph, installedCodeOwner, providers, backend, graphBuilderSuite, optimisticOpts, profilingInfo, suites, lirSuites, compilationResult, factory)); 178 emitFrontEnd(r.providers, r.backend, r.graph, r.graphBuilderSuite, r.optimisticOpts, r.profilingInfo, r.suites); 192 ProfilingInfo profilingInfo, Suites suites) { 205 suites 128 Request(StructuredGraph graph, ResolvedJavaMethod installedCodeOwner, Providers providers, Backend backend, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) argument 161 compileGraph(StructuredGraph graph, ResolvedJavaMethod installedCodeOwner, Providers providers, Backend backend, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites, LIRSuites lirSuites, T compilationResult, CompilationResultBuilderFactory factory) argument 191 emitFrontEnd(Providers providers, TargetProvider target, StructuredGraph graph, PhaseSuite<HighTierContext> graphBuilderSuite, OptimisticOptimizations optimisticOpts, ProfilingInfo profilingInfo, Suites suites) argument [all...] |
/openjdk9/jdk/src/java.base/share/classes/javax/net/ssl/ |
H A D | SSLServerSocket.java | 47 * suites and protocols, whether client 186 * Returns the list of cipher suites which are currently enabled 191 * cipher suites. 199 * The returned array includes cipher suites from the list of standard 204 * include other cipher suites that the provider supports. 206 * @return an array of cipher suites enabled 214 * Sets the cipher suites enabled for use by accepted connections. 216 * The cipher suites must have been listed by getSupportedCipherSuites() 218 * only suites listed in the <code>suites</cod [all...] |
H A D | SSLSocket.java | 85 * <P>There are two groups of cipher suites which you will need to know 86 * about when managing cipher suites: <UL> 88 * <LI> <em>Supported</em> cipher suites: all the suites which are 92 * <LI> <em>Enabled</em> cipher suites, which may be fewer 93 * than the full set of supported suites. This group is 96 * Initially, a default set of cipher suites will be enabled on 102 * suites which authenticate servers and provide confidentiality 110 * preferences: what cipher suites to use, whether the socket should be 265 * Returns the names of the cipher suites whic [all...] |
/openjdk9/jdk/test/javax/net/ssl/sanity/pluggability/ |
H A D | MySSLEngineImpl.java | 65 public void setEnabledCipherSuites(String[] suites) {} argument
|
H A D | MySSLSocketFacImpl.java | 80 public void setEnabledCipherSuites(String suites[]) {} argument
|
/openjdk9/hotspot/src/jdk.internal.vm.compiler/share/classes/org.graalvm.compiler.core.test/src/org/graalvm/compiler/core/test/tutorial/ |
H A D | InvokeGraal.java | 106 Suites suites = backend.getSuites().getDefaultSuites(); 126 GraalCompiler.compileGraph(graph, method, providers, backend, graphBuilderSuite, optimisticOpts, profilingInfo, suites, lirSuites, compilationResult, factory);
|
/openjdk9/jdk/src/java.base/share/classes/sun/security/ssl/ |
H A D | SSLServerSocketImpl.java | 57 * of your application support "anonymous" cipher suites, you may be 58 * able to configure a server socket to accept those suites. 79 /* what cipher suites to use by default */ 99 * Whether local cipher suites preference in server side should be 170 * Returns the names of the cipher suites which could be enabled for use 172 * be enabled by default, since this list may include cipher suites which 175 * certain kinds of certificates to use certain cipher suites. 185 * Returns the list of cipher suites which are currently enabled 195 * Controls which particular SSL cipher suites are enabled for use 198 * @param suites Name 202 setEnabledCipherSuites(String[] suites) argument [all...] |
/openjdk9/jdk/test/javax/net/ssl/ALPN/ |
H A D | SSLSocketAlpnTest.java | 176 String[] suites = sslp.getCipherSuites(); 177 sslp.setCipherSuites(suites); 271 String[] suites = sslp.getCipherSuites(); 272 sslp.setCipherSuites(suites);
|
H A D | SSLServerSocketAlpnTest.java | 170 String[] suites = sslp.getCipherSuites(); 171 sslp.setCipherSuites(suites); 275 String[] suites = sslp.getCipherSuites(); 276 sslp.setCipherSuites(suites);
|