src/java.base/share/classes/javax/net/ssl/ExtendedSSLSession.java

Print this page

        

*** 1,7 **** /* ! * Copyright (c) 2010, 2012, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this --- 1,7 ---- /* ! * Copyright (c) 2010, 2015, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this
*** 26,36 **** package javax.net.ssl; import java.util.List; /** ! * Extends the <code>SSLSession</code> interface to support additional * session attributes. * * @since 1.7 */ public abstract class ExtendedSSLSession implements SSLSession { --- 26,36 ---- package javax.net.ssl; import java.util.List; /** ! * Extends the {@code SSLSession} interface to support additional * session attributes. * * @since 1.7 */ public abstract class ExtendedSSLSession implements SSLSession {
*** 37,48 **** /** * Obtains an array of supported signature algorithms that the local side * is willing to use. * <p> * Note: this method is used to indicate to the peer which signature ! * algorithms may be used for digital signatures in TLS 1.2. It is ! * not meaningful for TLS versions prior to 1.2. * <p> * The signature algorithm name must be a standard Java Security * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). * See Appendix A in the <a href= * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA"> --- 37,48 ---- /** * Obtains an array of supported signature algorithms that the local side * is willing to use. * <p> * Note: this method is used to indicate to the peer which signature ! * algorithms may be used for digital signatures in TLS/DTLS 1.2. It is ! * not meaningful for TLS/DTLS versions prior to 1.2. * <p> * The signature algorithm name must be a standard Java Security * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). * See Appendix A in the <a href= * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA">
*** 50,60 **** * for information about standard algorithm names. * <p> * Note: the local supported signature algorithms should conform to * the algorithm constraints specified by * {@link SSLParameters#getAlgorithmConstraints getAlgorithmConstraints()} ! * method in <code>SSLParameters</code>. * * @return An array of supported signature algorithms, in descending * order of preference. The return value is an empty array if * no signature algorithm is supported. * --- 50,60 ---- * for information about standard algorithm names. * <p> * Note: the local supported signature algorithms should conform to * the algorithm constraints specified by * {@link SSLParameters#getAlgorithmConstraints getAlgorithmConstraints()} ! * method in {@code SSLParameters}. * * @return An array of supported signature algorithms, in descending * order of preference. The return value is an empty array if * no signature algorithm is supported. *
*** 65,76 **** /** * Obtains an array of supported signature algorithms that the peer is * able to use. * <p> * Note: this method is used to indicate to the local side which signature ! * algorithms may be used for digital signatures in TLS 1.2. It is ! * not meaningful for TLS versions prior to 1.2. * <p> * The signature algorithm name must be a standard Java Security * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). * See Appendix A in the <a href= * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA"> --- 65,76 ---- /** * Obtains an array of supported signature algorithms that the peer is * able to use. * <p> * Note: this method is used to indicate to the local side which signature ! * algorithms may be used for digital signatures in TLS/DTLS 1.2. It is ! * not meaningful for TLS/DTLS versions prior to 1.2. * <p> * The signature algorithm name must be a standard Java Security * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). * See Appendix A in the <a href= * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA">