Home | History | Annotate | Download | only in ssl

Lines Matching defs:ssl

17 package org.conscrypt.javax.net.ssl;
95 import javax.net.ssl.ExtendedSSLSession;
96 import javax.net.ssl.HandshakeCompletedEvent;
97 import javax.net.ssl.HandshakeCompletedListener;
98 import javax.net.ssl.KeyManager;
99 import javax.net.ssl.SNIHostName;
100 import javax.net.ssl.SNIServerName;
101 import javax.net.ssl.SSLContext;
102 import javax.net.ssl.SSLEngine;
103 import javax.net.ssl.SSLException;
104 import javax.net.ssl.SSLHandshakeException;
105 import javax.net.ssl.SSLParameters;
106 import javax.net.ssl.SSLPeerUnverifiedException;
107 import javax.net.ssl.SSLProtocolException;
108 import javax.net.ssl.SSLServerSocket;
109 import javax.net.ssl.SSLSession;
110 import javax.net.ssl.SSLSocket;
111 import javax.net.ssl.SSLSocketFactory;
112 import javax.net.ssl.StandardConstants;
113 import javax.net.ssl.TrustManager;
114 import javax.net.ssl.X509KeyManager;
115 import javax.net.ssl.X509TrustManager;
172 SSLSocket ssl = (SSLSocket) sf.createSocket();
173 assertNotSame(ssl.getSupportedCipherSuites(), ssl.getSupportedCipherSuites());
298 SSLSocket ssl = (SSLSocket) sf.createSocket();
299 assertNotSame(ssl.getEnabledCipherSuites(), ssl.getEnabledCipherSuites());
305 SSLSocket ssl = (SSLSocket) sf.createSocket();
306 String[] array = new String[] {ssl.getEnabledCipherSuites()[0]};
308 ssl.setEnabledCipherSuites(array);
310 assertEquals(originalFirstElement, ssl.getEnabledCipherSuites()[0]);
316 SSLSocket ssl = (SSLSocket) sf.createSocket();
318 ssl.setEnabledCipherSuites(null);
324 ssl.setEnabledCipherSuites(new String[1]);
330 ssl.setEnabledCipherSuites(new String[] {"Bogus"});
335 ssl.setEnabledCipherSuites(new String[0]);
336 ssl.setEnabledCipherSuites(ssl.getEnabledCipherSuites());
337 ssl.setEnabledCipherSuites(ssl.getSupportedCipherSuites());
339 String[] cipherSuites = new String[] {ssl.getSupportedCipherSuites()[0]};
340 ssl.setEnabledCipherSuites(cipherSuites);
341 assertEquals(Arrays.asList(cipherSuites), Arrays.asList(ssl.getEnabledCipherSuites()));
347 SSLSocket ssl = (SSLSocket) sf.createSocket();
348 assertNotSame(ssl.getSupportedProtocols(), ssl.getSupportedProtocols());
354 SSLSocket ssl = (SSLSocket) sf.createSocket();
355 assertNotSame(ssl.getEnabledProtocols(), ssl.getEnabledProtocols());
361 SSLSocket ssl = (SSLSocket) sf.createSocket();
362 String[] array = new String[] {ssl.getEnabledProtocols()[0]};
364 ssl.setEnabledProtocols(array);
366 assertEquals(originalFirstElement, ssl.getEnabledProtocols()[0]);
372 SSLSocket ssl = (SSLSocket) sf.createSocket();
374 ssl.setEnabledProtocols(null);
380 ssl.setEnabledProtocols(new String[1]);
386 ssl.setEnabledProtocols(new String[] {"Bogus"});
391 ssl.setEnabledProtocols(new String[0]);
392 ssl.setEnabledProtocols(ssl.getEnabledProtocols());
393 ssl.setEnabledProtocols(ssl.getSupportedProtocols());
395 for (String protocol : ssl.getSupportedProtocols()) {
398 ssl.setEnabledProtocols(new String[] {protocol});
405 ssl.setEnabledProtocols(protocols);
407 Arrays.deepToString(ssl.getEnabledProtocols()));
479 SSLSocket ssl = (SSLSocket) sf.createSocket();
480 SSLSession session = ssl.getSession();
1437 SSLSocket ssl = (SSLSocket) sf.createSocket();
1438 SSLParameters p = ssl.getSSLParameters();
1441 assertNotSame(cipherSuites, ssl.getEnabledCipherSuites());
1442 assertEquals(Arrays.asList(cipherSuites), Arrays.asList(ssl.getEnabledCipherSuites()));
1444 assertNotSame(protocols, ssl.getEnabledProtocols());
1445 assertEquals(Arrays.asList(protocols), Arrays.asList(ssl.getEnabledProtocols()));
1446 assertEquals(p.getWantClientAuth(), ssl.getWantClientAuth());
1447 assertEquals(p.getNeedClientAuth(), ssl.getNeedClientAuth());
1460 SSLSocket ssl = (SSLSocket) sf.createSocket();
1461 String[] defaultCipherSuites = ssl.getEnabledCipherSuites();
1462 String[] defaultProtocols = ssl.getEnabledProtocols();
1463 String[] supportedCipherSuites = ssl.getSupportedCipherSuites();
1464 String[] supportedProtocols = ssl.getSupportedProtocols();
1467 ssl.setSSLParameters(p);
1469 Arrays.asList(ssl.getEnabledCipherSuites()));
1470 assertEquals(Arrays.asList(defaultProtocols), Arrays.asList(ssl.getEnabledProtocols()));
1474 ssl.setSSLParameters(p);
1476 Arrays.asList(ssl.getEnabledCipherSuites()));
1478 Arrays.asList(supportedProtocols), Arrays.asList(ssl.getEnabledProtocols()));
1483 assertFalse(ssl.getNeedClientAuth());
1484 assertFalse(ssl.getWantClientAuth());
1485 ssl.setSSLParameters(p);
1486 assertTrue(ssl.getNeedClientAuth());
1487 assertFalse(ssl.getWantClientAuth());
1489 assertTrue(ssl.getNeedClientAuth());
1490 assertFalse(ssl.getWantClientAuth());
1491 ssl.setSSLParameters(p);
1492 assertFalse(ssl.getNeedClientAuth());
1493 assertTrue(ssl.getWantClientAuth());
1495 assertFalse(ssl.getNeedClientAuth());
1496 assertTrue(ssl.getWantClientAuth());
1497 ssl.setSSLParameters(p);
1498 assertFalse(ssl.getNeedClientAuth());
1499 assertFalse(ssl.getWantClientAuth());
1617 // so that no SSL shutdown is sent
1859 // Second connection with client NPN already set on the SSL context, but
2061 // This test checks the size of ClientHello of the default SSLSocket. TLS/SSL handshakes
2233 // 1. Creates a listening server socket (a plain one rather than a TLS/SSL one).
2235 // TLS/SSL handshake.
2265 // 3. Create a client socket, connect it to the server socket, and start the TLS/SSL
2274 // Initiate the TLS/SSL handshake which is expected to fail as soon as the
2619 client.setEnabledProtocols(new String[] {"SSL"});
2620 fail("SSLSocket should not support SSL protocol");