Categories:
Audio (13)
Biotech (29)
Bytecode (36)
Database (77)
Framework (7)
Game (7)
General (507)
Graphics (53)
I/O (35)
IDE (2)
JAR Tools (101)
JavaBeans (21)
JDBC (121)
JDK (426)
JSP (20)
Logging (108)
Mail (58)
Messaging (8)
Network (84)
PDF (97)
Report (7)
Scripting (84)
Security (32)
Server (121)
Servlet (26)
SOAP (24)
Testing (54)
Web (15)
XML (309)
Collections:
Other Resources:
JRE 8 rt.jar - javax.* Package Source Code
JRE 8 rt.jar is the JAR file for JRE 8 RT (Runtime) libraries.
JRE (Java Runtime) 8 is the runtime environment included in JDK 8.
JRE 8 rt.jar libraries are divided into 6 packages:
com.* - Internal Oracle and Sun Microsystems libraries java.* - Standard Java API libraries. javax.* - Extended Java API libraries. jdk.* - JDK supporting libraries. org.* - Third party libraries. sun.* - Old libraries developed by Sun Microsystems.
JAR File Information:
Directory of C:\fyicenter\jdk-1.8.0_191\jre\lib 63,596,151 rt.jar
Here is the list of Java classes of the javax.* package in JRE 1.8.0_191 rt.jar. Java source codes are also provided.
✍: FYIcenter
⏎ javax/naming/ldap/StartTlsResponse.java
/* * Copyright (c) 2000, 2001, Oracle and/or its affiliates. All rights reserved. * ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. * * * * * * * * * * * * * * * * * * * * */ package javax.naming.ldap; import java.io.IOException; import javax.net.ssl.SSLSession; import javax.net.ssl.SSLSocketFactory; import javax.net.ssl.HostnameVerifier; /** * This class implements the LDAPv3 Extended Response for StartTLS as * defined in * <a href="http://www.ietf.org/rfc/rfc2830.txt">Lightweight Directory * Access Protocol (v3): Extension for Transport Layer Security</a> * * The object identifier for StartTLS is 1.3.6.1.4.1.1466.20037 * and no extended response value is defined. * *<p> * The Start TLS extended request and response are used to establish * a TLS connection over the existing LDAP connection associated with * the JNDI context on which <tt>extendedOperation()</tt> is invoked. * Typically, a JNDI program uses the StartTLS extended request and response * classes as follows. * <blockquote><pre> * import javax.naming.ldap.*; * * // Open an LDAP association * LdapContext ctx = new InitialLdapContext(); * * // Perform a StartTLS extended operation * StartTlsResponse tls = * (StartTlsResponse) ctx.extendedOperation(new StartTlsRequest()); * * // Open a TLS connection (over the existing LDAP association) and get details * // of the negotiated TLS session: cipher suite, peer certificate, ... * SSLSession session = tls.negotiate(); * * // ... use ctx to perform protected LDAP operations * * // Close the TLS connection (revert back to the underlying LDAP association) * tls.close(); * * // ... use ctx to perform unprotected LDAP operations * * // Close the LDAP association * ctx.close; * </pre></blockquote> * * @since 1.4 * @see StartTlsRequest * @author Vincent Ryan */ public abstract class StartTlsResponse implements ExtendedResponse { // Constant /** * The StartTLS extended response's assigned object identifier * is 1.3.6.1.4.1.1466.20037. */ public static final String OID = "1.3.6.1.4.1.1466.20037"; // Called by subclass /** * Constructs a StartTLS extended response. * A concrete subclass must have a public no-arg constructor. */ protected StartTlsResponse() { } // ExtendedResponse methods /** * Retrieves the StartTLS response's object identifier string. * * @return The object identifier string, "1.3.6.1.4.1.1466.20037". */ public String getID() { return OID; } /** * Retrieves the StartTLS response's ASN.1 BER encoded value. * Since the response has no defined value, null is always * returned. * * @return The null value. */ public byte[] getEncodedValue() { return null; } // StartTls-specific methods /** * Overrides the default list of cipher suites enabled for use on the * TLS connection. The cipher suites must have already been listed by * <tt>SSLSocketFactory.getSupportedCipherSuites()</tt> as being supported. * Even if a suite has been enabled, it still might not be used because * the peer does not support it, or because the requisite certificates * (and private keys) are not available. * * @param suites The non-null list of names of all the cipher suites to * enable. * @see #negotiate */ public abstract void setEnabledCipherSuites(String[] suites); /** * Sets the hostname verifier used by <tt>negotiate()</tt> * after the TLS handshake has completed and the default hostname * verification has failed. * <tt>setHostnameVerifier()</tt> must be called before * <tt>negotiate()</tt> is invoked for it to have effect. * If called after * <tt>negotiate()</tt>, this method does not do anything. * * @param verifier The non-null hostname verifier callback. * @see #negotiate */ public abstract void setHostnameVerifier(HostnameVerifier verifier); /** * Negotiates a TLS session using the default SSL socket factory. * <p> * This method is equivalent to <tt>negotiate(null)</tt>. * * @return The negotiated SSL session * @throws IOException If an IO error was encountered while establishing * the TLS session. * @see #setEnabledCipherSuites * @see #setHostnameVerifier */ public abstract SSLSession negotiate() throws IOException; /** * Negotiates a TLS session using an SSL socket factory. * <p> * Creates an SSL socket using the supplied SSL socket factory and * attaches it to the existing connection. Performs the TLS handshake * and returns the negotiated session information. * <p> * If cipher suites have been set via <tt>setEnabledCipherSuites</tt> * then they are enabled before the TLS handshake begins. * <p> * Hostname verification is performed after the TLS handshake completes. * The default hostname verification performs a match of the server's * hostname against the hostname information found in the server's certificate. * If this verification fails and no callback has been set via * <tt>setHostnameVerifier</tt> then the negotiation fails. * If this verification fails and a callback has been set via * <tt>setHostnameVerifier</tt>, then the callback is used to determine whether * the negotiation succeeds. * <p> * If an error occurs then the SSL socket is closed and an IOException * is thrown. The underlying connection remains intact. * * @param factory The possibly null SSL socket factory to use. * If null, the default SSL socket factory is used. * @return The negotiated SSL session * @throws IOException If an IO error was encountered while establishing * the TLS session. * @see #setEnabledCipherSuites * @see #setHostnameVerifier */ public abstract SSLSession negotiate(SSLSocketFactory factory) throws IOException; /** * Closes the TLS connection gracefully and reverts back to the underlying * connection. * * @throws IOException If an IO error was encountered while closing the * TLS connection */ public abstract void close() throws IOException; private static final long serialVersionUID = 8372842182579276418L; }
⏎ javax/naming/ldap/StartTlsResponse.java
Or download all of them as a single archive file:
File name: jre-rt-javax-1.8.0_191-src.zip File size: 5381005 bytes Release date: 2018-10-28 Download
⇒ JRE 8 rt.jar - org.* Package Source Code
2023-02-07, 191096👍, 5💬
Popular Posts:
What Is commons-codec-1.4.jar? commons-codec-1.4.jar is the JAR file for Apache Commons Codec 1.4, w...
ANTLR is a powerful parser generator for multiple programming languages including Java. ANTLR contai...
ASM is an all purpose Java bytecode manipulation and analysis framework. It can be used to modify ex...
Apache Log4j 1.2 Bridge allows applications coded to use Log4j 1.2 API to use Log4j 2 instead. Bytec...
XOM™ is a new XML object model. It is an open source (LGPL), tree-based API for processing XML with ...