Lines Matching refs:protocolVersion
191 protocolVersion, clientRequestedVersion,
199 new KerberosClientKeyExchange(protocolVersion,
239 localSupportedSignAlgs, protocolVersion));
244 new Finished(protocolVersion, input, cipherSuite));
417 clientRequestedVersion = mesg.protocolVersion;
432 m1.protocolVersion = protocolVersion;
474 if (oldVersion != protocolVersion) {
579 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
605 session = new SSLSessionImpl(protocolVersion, CipherSuite.C_NULL,
610 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
633 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
759 protocolVersion);
766 m3 = new DH_ServerKeyExchange(dh, protocolVersion);
778 protocolVersion);
819 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
842 localSignAlgs, protocolVersion);
849 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
927 if (protocolVersion.v >= suite.obsoleted) {
932 if (protocolVersion.v < suite.supported) {
946 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1035 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1053 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1068 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1085 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1140 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1396 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {
1418 boolean valid = mesg.verify(protocolVersion, handshakeHash,
1524 Finished mesg = new Finished(protocolVersion, handshakeHash,
1626 if (protocolVersion.v >= ProtocolVersion.TLS12.v) {