blob: 04781efc322f5779a3326f4e946f6cf44b26b25d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
package org.bouncycastle.crypto.tls;
import java.security.SecureRandom;
public interface TlsContext
{
SecureRandom getSecureRandom();
SecurityParameters getSecurityParameters();
boolean isServer();
ProtocolVersion getClientVersion();
ProtocolVersion getServerVersion();
/**
* Used to get the resumable session, if any, used by this connection. Only available after the
* handshake has successfully completed.
*
* @return A {@link TlsSession} representing the resumable session used by this connection, or
* null if no resumable session available.
* @see {@link TlsPeer#notifyHandshakeComplete()}
*/
TlsSession getResumableSession();
Object getUserObject();
void setUserObject(Object userObject);
/**
* Export keying material according to RFC 5705: "Keying Material Exporters for TLS".
*
* @param asciiLabel indicates which application will use the exported keys.
* @param context_value allows the application using the exporter to mix its own data with the TLS PRF for
* the exporter output.
* @param length the number of bytes to generate
* @return a pseudorandom bit string of 'length' bytes generated from the master_secret.
*/
byte[] exportKeyingMaterial(String asciiLabel, byte[] context_value, int length);
}
|