org.bouncycastle.tls.TlsClient Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bctls-jdk15to18 Show documentation
Show all versions of bctls-jdk15to18 Show documentation
The Bouncy Castle Java APIs for TLS and DTLS, including a provider for the JSSE.
package org.bouncycastle.tls;
import java.io.IOException;
import java.util.Hashtable;
import java.util.Vector;
/**
* Interface describing a TLS client endpoint.
*/
public interface TlsClient
extends TlsPeer
{
void init(TlsClientContext context);
/**
* Return the session this client wants to resume, if any. Note that the peer's certificate
* chain for the session (if any) may need to be periodically revalidated.
*
* @return A {@link TlsSession} representing the resumable session to be used for this
* connection, or null to use a new session.
* @see SessionParameters#getPeerCertificate()
*/
TlsSession getSessionToResume();
boolean isFallback();
// Hashtable is (Integer -> byte[])
Hashtable getClientExtensions()
throws IOException;
/**
* If this client is offering TLS 1.3 or higher, this method may be called to determine for which
* groups a key share should be included in the initial ClientHello. Groups that were not included
* in the supported_groups extension (by {@link #getClientExtensions()} will be ignored. The protocol
* will then add a suitable key_share extension to the ClientHello extensions.
*
* @return a {@link Vector} of {@link NamedGroup named group} values, possibly empty or null.
* @throws IOException
*/
Vector getEarlyKeyShareGroups();
void notifyServerVersion(ProtocolVersion selectedVersion)
throws IOException;
/**
* Notifies the client of the session_id sent in the ServerHello.
*
* @param sessionID
* @see TlsContext#getSession()
*/
void notifySessionID(byte[] sessionID);
void notifySelectedCipherSuite(int selectedCipherSuite);
/**
* The TlsClientProtocol implementation validates that any server extensions received correspond
* to client extensions sent. If further processing of the server extensions is needed, it can
* be done in this callback.
*
* NOTE: This is not called for session resumption handshakes.
*
* @param serverExtensions
* (Integer -> byte[])
* @throws IOException
*/
void processServerExtensions(Hashtable serverExtensions)
throws IOException;
// Vector is (SupplementalDataEntry)
void processServerSupplementalData(Vector serverSupplementalData)
throws IOException;
TlsPSKIdentity getPSKIdentity() throws IOException;
TlsSRPIdentity getSRPIdentity() throws IOException;
TlsDHGroupVerifier getDHGroupVerifier() throws IOException;
TlsSRPConfigVerifier getSRPConfigVerifier() throws IOException;
TlsAuthentication getAuthentication()
throws IOException;
// Vector is (SupplementalDataEntry)
Vector getClientSupplementalData()
throws IOException;
/**
* RFC 5077 3.3. NewSessionTicket Handshake Message
*
* This method will be called (only) when a NewSessionTicket handshake message is received. The
* ticket is opaque to the client and clients MUST NOT examine the ticket under the assumption
* that it complies with e.g. RFC 5077 4. Recommended Ticket Construction.
*
* @param newSessionTicket The ticket.
* @throws IOException
*/
void notifyNewSessionTicket(NewSessionTicket newSessionTicket)
throws IOException;
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy