org.bouncycastle.jsse.BCSNIServerName Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of impersonator Show documentation
Show all versions of impersonator Show documentation
Spoof TLS/JA3/JA4 and HTTP/2 fingerprints in Java
The newest version!
package org.bouncycastle.jsse;
import org.bouncycastle.tls.NameType;
import org.bouncycastle.tls.TlsUtils;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.encoders.Hex;
public abstract class BCSNIServerName
{
private final int nameType;
private final byte[] encoded;
protected BCSNIServerName(int nameType, byte[] encoded)
{
if (!TlsUtils.isValidUint8(nameType))
{
throw new IllegalArgumentException("'nameType' should be between 0 and 255");
}
if (encoded == null)
{
throw new NullPointerException("'encoded' cannot be null");
}
this.nameType = nameType;
this.encoded = TlsUtils.clone(encoded);
}
public final int getType()
{
return nameType;
}
public final byte[] getEncoded()
{
return (byte[])TlsUtils.clone(encoded);
}
@Override
public boolean equals(Object obj)
{
if (this == obj)
{
return true;
}
if (!(obj instanceof BCSNIServerName))
{
return false;
}
BCSNIServerName other = (BCSNIServerName)obj;
return nameType == other.nameType
&& Arrays.areEqual(encoded, other.encoded);
}
@Override
public int hashCode()
{
return nameType ^ Arrays.hashCode(encoded);
}
@Override
public String toString()
{
//-DM Hex.toHexString
return "{type=" + NameType.getText((short)nameType) + ", value=" + Hex.toHexString(encoded) + "}";
}
}