diff options
Diffstat (limited to 'core/src/main/java/org/bouncycastle/crypto/tls/AbstractTlsPeer.java')
-rw-r--r-- | core/src/main/java/org/bouncycastle/crypto/tls/AbstractTlsPeer.java | 42 |
1 files changed, 0 insertions, 42 deletions
diff --git a/core/src/main/java/org/bouncycastle/crypto/tls/AbstractTlsPeer.java b/core/src/main/java/org/bouncycastle/crypto/tls/AbstractTlsPeer.java deleted file mode 100644 index 26ad6d34..00000000 --- a/core/src/main/java/org/bouncycastle/crypto/tls/AbstractTlsPeer.java +++ /dev/null @@ -1,42 +0,0 @@ -package org.bouncycastle.crypto.tls; - -import java.io.IOException; - -public abstract class AbstractTlsPeer - implements TlsPeer -{ - public boolean shouldUseGMTUnixTime() - { - /* - * draft-mathewson-no-gmtunixtime-00 2. For the reasons we discuss above, we recommend that - * TLS implementors MUST by default set the entire value the ClientHello.Random and - * ServerHello.Random fields, including gmt_unix_time, to a cryptographically random - * sequence. - */ - return false; - } - - public void notifySecureRenegotiation(boolean secureRenegotiation) throws IOException - { - if (!secureRenegotiation) - { - /* - * RFC 5746 3.4/3.6. In this case, some clients/servers may want to terminate the handshake instead - * of continuing; see Section 4.1/4.3 for discussion. - */ - throw new TlsFatalAlert(AlertDescription.handshake_failure); - } - } - - public void notifyAlertRaised(short alertLevel, short alertDescription, String message, Exception cause) - { - } - - public void notifyAlertReceived(short alertLevel, short alertDescription) - { - } - - public void notifyHandshakeComplete() throws IOException - { - } -} |