package org.apache.harmony.xnet.provider.jsse; /* * #%L * Matos * $Id:$ * $HeadURL:$ * %% * Copyright (C) 2010 - 2014 Orange SA * %% * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * #L% */ import com.francetelecom.rd.stubs.annotation.Code; public abstract class HandshakeProtocol { // Fields public static final int NEED_UNWRAP = 1; public static final int NOT_HANDSHAKING = 2; public static final int FINISHED = 3; public static final int NEED_TASK = 4; protected int status; protected HandshakeIODataStream io_stream; protected SSLRecordProtocol recordProtocol; protected SSLParametersImpl parameters; protected java.util.Vector<DelegatedTask> delegatedTasks; protected boolean nonBlocking; protected SSLSessionImpl session; protected ClientHello clientHello; protected ServerHello serverHello; protected CertificateMessage serverCert; protected ServerKeyExchange serverKeyExchange; protected CertificateRequest certificateRequest; protected ServerHelloDone serverHelloDone; protected CertificateMessage clientCert; protected ClientKeyExchange clientKeyExchange; protected CertificateVerify certificateVerify; protected Finished clientFinished; protected Finished serverFinished; protected boolean changeCipherSpecReceived; protected boolean isResuming; protected byte [] preMasterSecret; protected java.lang.Exception delegatedTaskErr; protected boolean needSendHelloRequest; public SSLEngineImpl engineOwner; public SSLSocketImpl socketOwner; // Constructors protected HandshakeProtocol(java.lang.Object arg1){ } // Methods protected void shutdown(){ } public abstract void start(); protected void stop(){ } public byte [] wrap(){ return (byte []) null; } public void send(Message arg1){ } protected void fatalAlert(byte arg1, java.lang.String arg2){ } protected void fatalAlert(byte arg1, java.lang.String arg2, java.lang.Exception arg3){ } protected void fatalAlert(byte arg1, javax.net.ssl.SSLException arg2){ } public javax.net.ssl.SSLEngineResult.HandshakeStatus getStatus(){ return (javax.net.ssl.SSLEngineResult.HandshakeStatus) null; } public abstract void unwrap(byte [] arg1); public SSLSessionImpl getSession(){ return (SSLSessionImpl) null; } public abstract void unwrapSSLv2(byte [] arg1); public void setRecordProtocol(SSLRecordProtocol arg1){ } protected void sendHelloRequest(){ } protected void unexpectedMessage(){ } public void computerMasterSecret(){ } protected void verifyFinished(byte [] arg1){ } protected void sendChangeCipherSpec(){ } protected void sendWarningAlert(byte arg1){ } protected void clearMessages(){ } protected static int getRSAKeyLength(java.security.PublicKey arg1) throws java.security.NoSuchAlgorithmException, java.security.spec.InvalidKeySpecException{ return 0; } protected void computerVerifyDataTLS(java.lang.String arg1, byte [] arg2){ } protected void computerVerifyDataSSLv3(byte [] arg1, byte [] arg2){ } protected void computerReferenceVerifyDataTLS(java.lang.String arg1){ } protected void computerReferenceVerifyDataSSLv3(byte [] arg1){ } @Code("return new Runnable() { public void run() {} };") public java.lang.Runnable getTask(){ return (java.lang.Runnable) null; } }