blob: b3d7d985f92883bfdfe26c2929ab823bf4818727 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
package org.bouncycastle.crypto.tls;
import java.security.SecureRandom;
import org.bouncycastle.crypto.prng.RandomGenerator;
public interface TlsContext
{
RandomGenerator getNonceRandomGenerator();
SecureRandom getSecureRandom();
SecurityParameters getSecurityParameters();
boolean isServer();
ProtocolVersion getClientVersion();
ProtocolVersion getServerVersion();
/**
* Used to get the resumable session, if any, used by this connection. Only available after the
* handshake has successfully completed.
*
* @return A {@link TlsSession} representing the resumable session used by this connection, or
* null if no resumable session available.
* @see TlsPeer#notifyHandshakeComplete()
*/
TlsSession getResumableSession();
Object getUserObject();
void setUserObject(Object userObject);
/**
* Export keying material according to RFC 5705: "Keying Material Exporters for TLS".
*
* @param asciiLabel indicates which application will use the exported keys.
* @param context_value allows the application using the exporter to mix its own data with the TLS PRF for
* the exporter output.
* @param length the number of bytes to generate
* @return a pseudorandom bit string of 'length' bytes generated from the master_secret.
*/
byte[] exportKeyingMaterial(String asciiLabel, byte[] context_value, int length);
}
|