Class ExtendedSSLSession
- All Implemented Interfaces:
SSLSession
SSLSession
interface to support additional
session attributes.- Since:
- 1.7
-
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionbyte[]
exportKeyingMaterialData
(String label, byte[] context, int length) Generates Exported Keying Material (EKM) calculated according to the algorithms defined in RFCs 5705/8446.exportKeyingMaterialKey
(String keyAlg, String label, byte[] context, int length) Generates Exported Keying Material (EKM) calculated according to the algorithms defined in RFCs 5705/8446.abstract String[]
Obtains an array of supported signature algorithms that the local side is willing to use.abstract String[]
Obtains an array of supported signature algorithms that the peer is able to use.Obtains aList
containing allSNIServerName
s of the requested Server Name Indication (SNI) extension.List
<byte[]> Returns aList
containing DER-encoded OCSP responses (using the ASN.1 type OCSPResponse defined in RFC 6960) for the client to verify status of the server's certificate during handshaking.Methods declared in class Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
Modifier and TypeMethodDescriptionprotected Object
clone()
Creates and returns a copy of this object.boolean
Indicates whether some other object is "equal to" this one.protected void
finalize()
Deprecated, for removal: This API element is subject to removal in a future version.Finalization is deprecated and subject to removal in a future release.final Class
<?> getClass()
Returns the runtime class of thisObject
.int
hashCode()
Returns a hash code value for this object.final void
notify()
Wakes up a single thread that is waiting on this object's monitor.final void
Wakes up all threads that are waiting on this object's monitor.toString()
Returns a string representation of the object.final void
wait()
Causes the current thread to wait until it is awakened, typically by being notified or interrupted.final void
wait
(long timeoutMillis) Causes the current thread to wait until it is awakened, typically by being notified or interrupted, or until a certain amount of real time has elapsed.final void
wait
(long timeoutMillis, int nanos) Causes the current thread to wait until it is awakened, typically by being notified or interrupted, or until a certain amount of real time has elapsed.Methods declared in interface SSLSession
getApplicationBufferSize, getCipherSuite, getCreationTime, getId, getLastAccessedTime, getLocalCertificates, getLocalPrincipal, getPacketBufferSize, getPeerCertificateChain, getPeerCertificates, getPeerHost, getPeerPort, getPeerPrincipal, getProtocol, getSessionContext, getValue, getValueNames, invalidate, isValid, putValue, removeValue
Modifier and TypeMethodDescriptionint
Gets the current size of the largest application data that is expected when using this session.Returns the name of the SSL cipher suite which is used for all connections in the session.long
Returns the time at which this Session representation was created, in milliseconds since midnight, January 1, 1970 UTC.byte[]
getId()
Returns the identifier assigned to this Session.long
Returns the last time this Session representation was accessed by the session level infrastructure, in milliseconds since midnight, January 1, 1970 UTC.Returns the certificate(s) that were sent to the peer during handshaking.Returns the principal that was sent to the peer during handshaking.int
Gets the current size of the largest SSL/TLS/DTLS packet that is expected when using this session.default X509Certificate[]
Deprecated, for removal: This API element is subject to removal in a future version.TheSSLSession.getPeerCertificates()
method that returns an array ofjava.security.cert.Certificate
should be used instead.Returns the identity of the peer which was established as part of defining the session.Returns the host name of the peer in this session.int
Returns the port number of the peer in this session.Returns the identity of the peer which was established as part of defining the session.Returns the standard name of the protocol used for all connections in the session.Returns the context in which this session is bound.Returns the object bound to the given name in the session's application layer data.String[]
Returns an array of the names of all the application layer data objects bound into the Session.void
Invalidates the session.boolean
isValid()
Returns whether this session is valid and available for resuming or joining.void
Binds the specifiedvalue
object into the session's application layer data with the givenname
.void
removeValue
(String name) Removes the object bound to the given name in the session's application layer data.
-
Constructor Details
-
ExtendedSSLSession
public ExtendedSSLSession()Constructor for subclasses to call.
-
-
Method Details
-
getLocalSupportedSignatureAlgorithms
Obtains an array of supported signature algorithms that the local side is willing to use.Note: this method is used to indicate to the peer which signature algorithms may be used for digital signatures in TLS/DTLS 1.2. It is not meaningful for TLS/DTLS versions prior to 1.2.
The signature algorithm name must be a standard Java Security name (such as "SHA1withRSA", "SHA256withECDSA", and so on). See the Java Security Standard Algorithm Names document for information about standard algorithm names.
Note: the local supported signature algorithms should conform to the algorithm constraints specified by
getAlgorithmConstraints()
method inSSLParameters
.- Returns:
- An array of supported signature algorithms, in descending order of preference. The return value is an empty array if no signature algorithm is supported.
- External Specifications
- See Also:
-
getPeerSupportedSignatureAlgorithms
Obtains an array of supported signature algorithms that the peer is able to use.Note: this method is used to indicate to the local side which signature algorithms may be used for digital signatures in TLS/DTLS 1.2. It is not meaningful for TLS/DTLS versions prior to 1.2.
The signature algorithm name must be a standard Java Security name (such as "SHA1withRSA", "SHA256withECDSA", and so on). See the Java Security Standard Algorithm Names document for information about standard algorithm names.
- Returns:
- An array of supported signature algorithms, in descending order of preference. The return value is an empty array if the peer has not sent the supported signature algorithms.
- External Specifications
- See Also:
-
getRequestedServerNames
Obtains aList
containing allSNIServerName
s of the requested Server Name Indication (SNI) extension.In server mode, unless the return
List
is empty, the server should use the requested server names to guide its selection of an appropriate authentication certificate, and/or other aspects of security policy.In client mode, unless the return
List
is empty, the client should use the requested server names to guide its endpoint identification of the peer's identity, and/or other aspects of security policy.- Returns:
- a non-null immutable list of
SNIServerName
s of the requested server name indications. The returned list may be empty if no server name indications were requested. - Throws:
UnsupportedOperationException
- if the underlying provider does not implement the operation- Since:
- 1.8
- See Also:
-
getStatusResponses
Returns aList
containing DER-encoded OCSP responses (using the ASN.1 type OCSPResponse defined in RFC 6960) for the client to verify status of the server's certificate during handshaking.This method only applies to certificate-based server authentication. An
X509ExtendedTrustManager
will use the returned value for server certificate validation.- Implementation Requirements:
- This method throws UnsupportedOperationException by default. Classes derived from ExtendedSSLSession must implement this method.
- Returns:
- a non-null unmodifiable list of byte arrays, each entry
containing a DER-encoded OCSP response (using the
ASN.1 type OCSPResponse defined in RFC 6960). The order
of the responses must match the order of the certificates
presented by the server in its Certificate message (See
SSLSession.getLocalCertificates()
for server mode, andSSLSession.getPeerCertificates()
for client mode). It is possible that fewer response entries may be returned than the number of presented certificates. If an entry in the list is a zero-length byte array, it should be treated by the caller as if the OCSP entry for the corresponding certificate is missing. The returned list may be empty if no OCSP responses were presented during handshaking or if OCSP stapling is not supported by either endpoint for this handshake. - Throws:
UnsupportedOperationException
- if the underlying provider does not implement the operation- Since:
- 9
- See Also:
-
exportKeyingMaterialKey
public SecretKey exportKeyingMaterialKey(String keyAlg, String label, byte[] context, int length) throws SSLKeyException Generates Exported Keying Material (EKM) calculated according to the algorithms defined in RFCs 5705/8446.RFC 5705 (for (D)TLSv1.2 and earlier) calculates different EKM values depending on whether
context
is null or non-null/empty. RFC 8446 (TLSv1.3) treats a null context as non-null/empty.label
will be converted to bytes using theStandardCharsets.UTF_8
character encoding.- Implementation Requirements:
- The default implementation throws
UnsupportedOperationException
. - Parameters:
keyAlg
- the algorithm of the resultantSecretKey
object. See the SecretKey Algorithms section in the Java Security Standard Algorithm Names Specification for information about standard secret key algorithm names.label
- the label bytes used in the EKM calculation.label
will be converted to abyte[]
before the operation begins.context
- the context bytes used in the EKM calculation, or nulllength
- the number of bytes of EKM material needed- Returns:
- a
SecretKey
that containslength
bytes of the EKM material - Throws:
SSLKeyException
- if the key cannot be generatedIllegalArgumentException
- ifkeyAlg
is empty,length
is non-positive, or if thelabel
orcontext
length can not be accommodatedNullPointerException
- ifkeyAlg
orlabel
is nullIllegalStateException
- if this session does not have the necessary key generation material (for example, a session under construction during handshaking)UnsupportedOperationException
- if the underlying provider does not implement the operation- Since:
- 25
- External Specifications
-
exportKeyingMaterialData
public byte[] exportKeyingMaterialData(String label, byte[] context, int length) throws SSLKeyException Generates Exported Keying Material (EKM) calculated according to the algorithms defined in RFCs 5705/8446.RFC 5705 (for (D)TLSv1.2 and earlier) calculates different EKM values depending on whether
context
is null or non-null/empty. RFC 8446 (TLSv1.3) treats a null context as non-null/empty.label
will be converted to bytes using theStandardCharsets.UTF_8
character encoding.Depending on the chosen underlying key derivation mechanism, the raw bytes might not be extractable/exportable. In such cases, the
exportKeyingMaterialKey(String, String, byte[], int)
method should be used instead to access the generated key material.- Implementation Requirements:
- The default implementation throws
UnsupportedOperationException
. - Parameters:
label
- the label bytes used in the EKM calculation.label
will be converted to abyte[]
before the operation begins.context
- the context bytes used in the EKM calculation, or nulllength
- the number of bytes of EKM material needed- Returns:
- a byte array of size
length
that contains the EKM material - Throws:
SSLKeyException
- if the key cannot be generatedIllegalArgumentException
- iflength
is non-positive, or if thelabel
orcontext
length can not be accommodatedNullPointerException
- iflabel
is nullIllegalStateException
- if this session does not have the necessary key generation material (for example, a session under construction during handshaking)UnsupportedOperationException
- if the underlying provider does not implement the operation, or if the derived keying material is not extractable- Since:
- 25
- External Specifications
-