protected void cleanupHandshake() { super.cleanupHandshake(); this.selectedSessionID = null; this.keyExchange = null; this.authentication = null; this.certificateStatus = null; this.certificateRequest = null; }
protected void cleanupHandshake() { super.cleanupHandshake(); this.keyExchange = null; this.serverCredentials = null; this.certificateRequest = null; this.prepareFinishHash = null; }
protected void cleanupHandshake() { super.cleanupHandshake(); this.keyExchange = null; this.serverCredentials = null; this.certificateRequest = null; this.prepareFinishHash = null; }
protected void cleanupHandshake() { super.cleanupHandshake(); this.selectedSessionID = null; this.keyExchange = null; this.authentication = null; this.certificateStatus = null; this.certificateRequest = null; }
protected void handleFailure() { this.closed = true; this.failedWithError = true; /* * RFC 2246 7.2.1. The session becomes unresumable if any connection is terminated * without proper close_notify messages with level equal to warning. */ // TODO This isn't quite in the right place. Also, as of TLS 1.1 the above is obsolete. invalidateSession(); recordStream.safeClose(); if (!appDataReady) { cleanupHandshake(); } }
protected void handleClose(boolean user_canceled) throws IOException { if (!closed) { this.closed = true; if (user_canceled && !appDataReady) { raiseAlertWarning(AlertDescription.user_canceled, "User canceled handshake"); } raiseAlertWarning(AlertDescription.close_notify, "Connection closed"); recordStream.safeClose(); if (!appDataReady) { cleanupHandshake(); } } }