Lines Matching defs:handshaker

203     private Handshaker                  handshaker;
359 * State is cs_START until we initialize the handshaker.
414 * Initialize the handshaker object. This means:
421 * . otherwise (cs_START or cs_DATA), create the appropriate handshaker
461 handshaker = new ServerHandshaker(this, sslContext,
466 handshaker = new ClientHandshaker(this, sslContext,
471 handshaker.setEnabledCipherSuites(enabledCipherSuites);
472 handshaker.setEnableSessionCreation(enableSessionCreation);
487 } else if (handshaker != null) {
488 if (handshaker.taskOutstanding()) {
512 if (handshaker != null) {
513 handshaker.checkThrown();
578 readCipher = handshaker.newReadCipher();
579 readMAC = handshaker.newReadMAC();
615 writeCipher = handshaker.newWriteCipher();
616 writeMAC = handshaker.newWriteMAC();
649 * . otherwise, call initHandshake() to initialize the handshaker
666 // handshaker already setup, proceed
682 // initialize the handshaker, move to cs_RENEGOTIATE
698 // Note that handshaker.kickstart() writes the message
702 if (!handshaker.activated()) {
706 handshaker.activate(protocolVersion);
708 handshaker.activate(null);
711 if (handshaker instanceof ClientHandshaker) {
713 handshaker.kickstart();
719 handshaker.kickstart();
723 handshaker.handshakeHash.reset();
788 * See if the handshaker needs to report back some SSLException.
977 * handshaker ... if there isn't one, create one. This
987 if (!handshaker.activated()) {
991 handshaker.activate(protocolVersion);
993 handshaker.activate(null);
1001 * The handshaker state machine will ensure that it's
1004 handshaker.process_record(inputRecord, expectingFinished);
1007 if (handshaker.invalidated) {
1008 handshaker = null;
1013 } else if (handshaker.isDone()) {
1016 handshaker.isSecureRenegotiation();
1017 clientVerifyData = handshaker.getClientVerifyData();
1018 serverVerifyData = handshaker.getServerVerifyData();
1020 sess = handshaker.getSession();
1025 handshaker = null;
1030 } else if (handshaker.taskOutstanding()) {
1175 * See if the handshaker needs to report back some SSLException.
1567 if (handshaker != null) {
1568 return handshaker.getTask();
1746 if (handshaker != null) {
1747 handshaker.handshakeAlert(description);
1771 // handshaker has not started.
1773 (handshaker == null || !handshaker.started())) {
1826 if ((handshaker != null) && !handshaker.activated()) {
1827 handshaker.setEnableSessionCreation(enableSessionCreation);
1852 if ((handshaker != null) &&
1853 (handshaker instanceof ServerHandshaker) &&
1854 !handshaker.activated()) {
1855 ((ServerHandshaker) handshaker).setClientAuth(doClientAuth);
1875 if ((handshaker != null) &&
1876 (handshaker instanceof ServerHandshaker) &&
1877 !handshaker.activated()) {
1878 ((ServerHandshaker) handshaker).setClientAuth(doClientAuth);
1912 * If we have a handshaker, but haven't started
1914 * handshaker, and start from scratch. Don't
1918 assert(handshaker != null);
1919 if (!handshaker.activated()) {
1984 if ((handshaker != null) && !handshaker.activated()) {
1985 handshaker.setEnabledCipherSuites(enabledCipherSuites);
2024 if ((handshaker != null) && !handshaker.activated()) {
2025 handshaker.setEnabledProtocols(enabledProtocols);
2055 if ((handshaker != null) && !handshaker.started()) {
2056 handshaker.setIdentificationProtocol(identificationProtocol);
2057 handshaker.setAlgorithmConstraints(algorithmConstraints);