All Known Implementing Classes:
ExtendedSSLSession
invalidate
.
Session management policies are typically used to tune performance.
In addition to the standard session attributes, SSL sessions expose these read-only attributes:
Sessions may be explicitly invalidated. Invalidation may also be done implicitly, when faced with certain kinds of errors.
1.4
- David
- BrownellMethod from javax.net.ssl.SSLSession Summary: |
---|
getApplicationBufferSize, getCipherSuite, getCreationTime, getId, getLastAccessedTime, getLocalCertificates, getLocalPrincipal, getPacketBufferSize, getPeerCertificateChain, getPeerCertificates, getPeerHost, getPeerPort, getPeerPrincipal, getProtocol, getSessionContext, getValue, getValueNames, invalidate, isValid, putValue, removeValue |
Method from javax.net.ssl.SSLSession Detail: |
---|
|
This defines the level of protection provided to the data sent on the connection, including the kind of encryption used and most aspects of how authentication is done. |
|
|
Access indicates a new connection being established using session data. Application level operations, such as getting or setting a value associated with the session, are not reflected in this access time. This information is particularly useful in session management policies. For example, a session manager thread could leave all sessions in a given context which haven't been used in a long time; or, the sessions might be sorted according to age to optimize some task. |
Note: This method is useful only when using certificate-based cipher suites. When multiple certificates are available for use in a handshake, the implementation chooses what it considers the "best" certificate chain available, and transmits that to the other side. This method allows the caller to know which certificate chain was actually used. |
|
A |
Note: This method can be used only when using certificate-based cipher suites; using it with non-certificate-based cipher suites, such as Kerberos, will throw an SSLPeerUnverifiedException. Note: this method exists for compatibility with previous releases. New applications should use #getPeerCertificates instead. |
Note: This method can be used only when using certificate-based cipher suites; using it with non-certificate-based cipher suites, such as Kerberos, will throw an SSLPeerUnverifiedException. |
For the server, this is the client's host; and for the client, it is the server's host. The name may not be a fully qualified host name or even a host name at all as it may represent a string encoding of the peer's network address. If such a name is desired, it might be resolved through a name service based on the value returned by this method.
This value is not authenticated and should not be relied upon.
It is mainly used as a hint for |
For the server, this is the client's port number; and for the client, it is the server's port number.
This value is not authenticated and should not be relied upon.
It is mainly used as a hint for |
|
This defines the protocol used in the connection. |
This context may be unavailable in some environments, in which case this method returns null.
If the context is available and there is a
security manager installed, the caller may require
permission to access it or a security exception may be thrown.
In a Java environment, the security manager's
|
For security reasons, the same named values may not be visible across different access control contexts. |
For security reasons, the same named values may not be visible across different access control contexts. |
Future connections will not be able to resume or join this session. However, any existing connection using this session can continue to use the session until the connection is closed. |
|
value object into the
session's application layer data
with the given name .
Any existing binding using the same For security reasons, the same named values may not be visible across different access control contexts. |
SessionBindingListener interface,
it is notified appropriately.
For security reasons, the same named values may not be visible across different access control contexts. |