Initiate a new session negotiation.
Initiate a new session negotiation. Any SendBytes commands following this one will be held back (i.e. back-pressured) until the new handshake is completed, meaning that the bytes following this message will be encrypted according to the requirements outlined here.
Each of the values in this message is optional and will have the following effect if provided:
- enabledCipherSuites
will be passed to SSLEngine::setEnabledCipherSuites()
- enabledProtocols
will be passed to SSLEngine::setEnabledProtocols()
- clientAuth
will be passed to SSLEngine::setWantClientAuth()
or SSLEngine.setNeedClientAuth()
, respectively
- sslParameters
will be passed to SSLEngine::setSSLParameters()
Please note that passing clientAuth = None
means that no change is done
on client authentication requirements while clientAuth = Some(ClientAuth.None)
switches off client authentication.
Send the given akka.util.ByteString across the encrypted session to the peer.
Plaintext bytes emitted by the SSLEngine are received over one specific encryption session and this class bundles the bytes with the SSLSession object.
Plaintext bytes emitted by the SSLEngine are received over one specific encryption session and this class bundles the bytes with the SSLSession object. When the session changes due to renegotiation (which can be initiated by either party) the new session value will not compare equal to the previous one.
The Java API for getting session information is given by the SSLSession object, the Scala API adapters are offered below.
If the underlying transport is closed before the final TLS closure command is received from the peer then the SSLEngine will throw an SSLException that warns about possible truncation attacks.
If the underlying transport is closed before the final TLS closure command is received from the peer then the SSLEngine will throw an SSLException that warns about possible truncation attacks. This exception is caught and translated into this message when encountered. Most of the time this occurs not because of a malicious attacker but due to a connection abort or a misbehaving communication peer.
This is the supertype of all messages that the SslTls stage emits on the plaintext side.
This is the supertype of all messages that the SslTls stage accepts on its plaintext side.
Java API: obtain the default value of NegotiateNewSession (which will leave the SSLEngine’s settings unchanged).