org.bouncycastle.tls.TlsClient Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bctls-fips Show documentation
Show all versions of bctls-fips Show documentation
The Bouncy Castle Java APIs for the TLS, including a JSSE provider. The APIs are designed primarily to be used in conjunction with the BC FIPS provider. The APIs may also be used with other providers although if being used in a FIPS context it is the responsibility of the user to ensure that any other providers used are FIPS certified and used appropriately.
package org.bouncycastle.tls;
import java.io.IOException;
import java.util.Hashtable;
import java.util.Vector;
/**
* Interface describing a TLS client endpoint.
*/
public interface TlsClient
extends TlsPeer
{
void init(TlsClientContext context);
/**
* Return the session this client wants to resume, if any. Note that the peer's certificate
* chain for the session (if any) may need to be periodically revalidated.
*
* @return A {@link TlsSession} representing the resumable session to be used for this
* connection, or null to use a new session.
* @see SessionParameters#getPeerCertificate()
*/
TlsSession getSessionToResume();
boolean isFallback();
int[] getCipherSuites();
// Hashtable is (Integer -> byte[])
Hashtable getClientExtensions()
throws IOException;
/**
* If this client is offering TLS 1.3 or higher, this method may be called to determine for which
* groups a key share should be included in the initial ClientHello. Groups that were not included
* in the supported_groups extension (by {@link #getClientExtensions()} will be ignored. The protocol
* will then add a suitable key_share extension to the ClientHello extensions.
*
* @return a {@link Vector} of {@link NamedGroup named group} values, possibly empty or null.
* @throws IOException
*/
Vector getEarlyKeyShareGroups();
void notifyServerVersion(ProtocolVersion selectedVersion)
throws IOException;
/**
* Notifies the client of the session_id sent in the ServerHello.
*
* @param sessionID
* @see TlsContext#getSession()
*/
void notifySessionID(byte[] sessionID);
void notifySelectedCipherSuite(int selectedCipherSuite);
// Hashtable is (Integer -> byte[])
void processServerExtensions(Hashtable serverExtensions)
throws IOException;
// Vector is (SupplementalDataEntry)
void processServerSupplementalData(Vector serverSupplementalData)
throws IOException;
TlsPSKIdentity getPSKIdentity() throws IOException;
TlsSRPIdentity getSRPIdentity() throws IOException;
TlsDHGroupVerifier getDHGroupVerifier() throws IOException;
TlsSRPConfigVerifier getSRPConfigVerifier() throws IOException;
TlsAuthentication getAuthentication()
throws IOException;
// Vector is (SupplementalDataEntry)
Vector getClientSupplementalData()
throws IOException;
/**
* RFC 5077 3.3. NewSessionTicket Handshake Message
*
* This method will be called (only) when a NewSessionTicket handshake message is received. The
* ticket is opaque to the client and clients MUST NOT examine the ticket under the assumption
* that it complies with e.g. RFC 5077 4. Recommended Ticket Construction.
*
* @param newSessionTicket The ticket.
* @throws IOException
*/
void notifyNewSessionTicket(NewSessionTicket newSessionTicket)
throws IOException;
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy