All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.tls.AbstractTlsPeer Maven / Gradle / Ivy

Go to download

The Bouncy Castle Java APIs for the TLS, including a JSSE provider. The APIs are designed primarily to be used in conjunction with the BC FIPS provider. The APIs may also be used with other providers although if being used in a FIPS context it is the responsibility of the user to ensure that any other providers used are FIPS certified and used appropriately.

There is a newer version: 2.0.19
Show newest version
package org.bouncycastle.tls;

import java.io.IOException;

import org.bouncycastle.tls.crypto.TlsCrypto;

/**
 * Base class for a TLS client or server.
 */
public abstract class AbstractTlsPeer
    implements TlsPeer
{
    private final TlsCrypto crypto;

    private volatile TlsCloseable closeHandle;

    protected AbstractTlsPeer(TlsCrypto crypto)
    {
        this.crypto = crypto;
    }

    /**
     * Get the {@link ProtocolVersion} values that are supported by this peer.
     * 

* WARNING: Mixing DTLS and TLS versions in the returned array is currently NOT supported. Use a * separate (sub-)class for each case. * * @return an array of supported {@link ProtocolVersion} values. */ protected ProtocolVersion[] getSupportedVersions() { return ProtocolVersion.TLSv13.downTo(ProtocolVersion.TLSv12); } protected abstract int[] getSupportedCipherSuites(); public void cancel() throws IOException { TlsCloseable closeHandle = this.closeHandle; if (null != closeHandle) { closeHandle.close(); } } public TlsCrypto getCrypto() { return crypto; } public void notifyCloseHandle(TlsCloseable closeHandle) { this.closeHandle = closeHandle; } public void notifyHandshakeBeginning() throws IOException { } public int getHandshakeTimeoutMillis() { return 0; } public boolean allowLegacyResumption() { return false; } public int getMaxCertificateChainLength() { return 10; } public int getMaxHandshakeMessageSize() { return 32768; } public short[] getPskKeyExchangeModes() { return new short[]{ PskKeyExchangeMode.psk_dhe_ke }; } public boolean requiresCloseNotify() { return true; } public boolean requiresExtendedMasterSecret() { return false; } public boolean shouldCheckSigAlgOfPeerCerts() { return true; } public boolean shouldUseExtendedMasterSecret() { return true; } public boolean shouldUseExtendedPadding() { return false; } public boolean shouldUseGMTUnixTime() { /* * draft-mathewson-no-gmtunixtime-00 2. For the reasons we discuss above, we recommend that * TLS implementors MUST by default set the entire value the ClientHello.Random and * ServerHello.Random fields, including gmt_unix_time, to a cryptographically random * sequence. */ return false; } public void notifySecureRenegotiation(boolean secureRenegotiation) throws IOException { if (!secureRenegotiation) { throw new TlsFatalAlert(AlertDescription.handshake_failure); } } public TlsKeyExchangeFactory getKeyExchangeFactory() throws IOException { return new DefaultTlsKeyExchangeFactory(); } public void notifyAlertRaised(short alertLevel, short alertDescription, String message, Throwable cause) { } public void notifyAlertReceived(short alertLevel, short alertDescription) { } public void notifyHandshakeComplete() throws IOException { } public TlsHeartbeat getHeartbeat() { return null; } public short getHeartbeatPolicy() { return HeartbeatMode.peer_not_allowed_to_send; } public int getRenegotiationPolicy() { return RenegotiationPolicy.DENY; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy