@@ -502,19 +502,26 @@ public abstract void removeHandshakeCompletedListener(
502
502
503
503
504
504
/**
505
- * Starts an SSL handshake on this connection. Common reasons include
506
- * a need to use new encryption keys, to change cipher suites, or to
507
- * initiate a new session. To force complete reauthentication, the
508
- * current session could be invalidated before starting this handshake.
509
- *
510
- * <P> If data has already been sent on the connection, it continues
505
+ * Starts handshaking on this {@code SSLSocket}.
506
+ * <P>
507
+ * Common reasons include a need to initiate a new protected session,
508
+ * create new encryption keys, or to change cipher suites. To force
509
+ * complete reauthentication, the current session should be invalidated
510
+ * before starting this handshake.
511
+ * <P>
512
+ * The behavior of this method is protocol (and possibly implementation)
513
+ * dependent. For example, in TLSv1.3 calling this method after the
514
+ * connection has been established will force a key update. For prior TLS
515
+ * versions it will force a renegotiation (re-handshake).
516
+ * <P>
517
+ * If data has already been sent on the connection, it continues
511
518
* to flow during this handshake. When the handshake completes, this
512
519
* will be signaled with an event.
513
- *
520
+ * <P>
514
521
* This method is synchronous for the initial handshake on a connection
515
522
* and returns when the negotiated handshake is complete. Some
516
523
* protocols may not support multiple handshakes on an existing socket
517
- * and may throw an IOException.
524
+ * and may throw an {@code IOException} .
518
525
*
519
526
* @throws IOException on a network level error
520
527
* @see #addHandshakeCompletedListener(HandshakeCompletedListener)
0 commit comments