/* | 
|
 * Copyright (c) 2010, 2012, Oracle and/or its affiliates. All rights reserved. | 
|
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | 
|
 * | 
|
 * This code is free software; you can redistribute it and/or modify it | 
|
 * under the terms of the GNU General Public License version 2 only, as | 
|
 * published by the Free Software Foundation.  Oracle designates this | 
|
 * particular file as subject to the "Classpath" exception as provided | 
|
 * by Oracle in the LICENSE file that accompanied this code. | 
|
 * | 
|
 * This code is distributed in the hope that it will be useful, but WITHOUT | 
|
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | 
|
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License | 
|
 * version 2 for more details (a copy is included in the LICENSE file that | 
|
 * accompanied this code). | 
|
 * | 
|
 * You should have received a copy of the GNU General Public License version | 
|
 * 2 along with this work; if not, write to the Free Software Foundation, | 
|
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. | 
|
 * | 
|
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA | 
|
 * or visit www.oracle.com if you need additional information or have any | 
|
 * questions. | 
|
*/  | 
|
package javax.net.ssl;  | 
|
import java.util.List;  | 
|
/** | 
|
 * Extends the <code>SSLSession</code> interface to support additional | 
|
 * session attributes. | 
|
 * | 
|
 * @since 1.7 | 
|
*/  | 
|
public abstract class ExtendedSSLSession implements SSLSession {  | 
|
    /** | 
|
     * Obtains an array of supported signature algorithms that the local side | 
|
     * is willing to use. | 
|
     * <p> | 
|
     * Note: this method is used to indicate to the peer which signature | 
|
     * algorithms may be used for digital signatures since TLS 1.2. It is | 
|
     * not meaningful for TLS versions prior to 1.2. | 
|
     * <p> | 
|
     * The signature algorithm name must be a standard Java Security | 
|
     * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). | 
|
     * See Appendix A in the <a href= | 
|
     * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA"> | 
|
     * Java Cryptography Architecture API Specification & Reference </a> | 
|
     * for information about standard algorithm names. | 
|
     * <p> | 
|
     * Note: the local supported signature algorithms should conform to | 
|
     * the algorithm constraints specified by | 
|
     * {@link SSLParameters#getAlgorithmConstraints getAlgorithmConstraints()} | 
|
     * method in <code>SSLParameters</code>. | 
|
     * | 
|
     * @return An array of supported signature algorithms, in descending | 
|
     *     order of preference.  The return value is an empty array if | 
|
     *     no signature algorithm is supported. | 
|
     * | 
|
     * @see SSLParameters#getAlgorithmConstraints | 
|
*/  | 
|
public abstract String[] getLocalSupportedSignatureAlgorithms();  | 
|
    /** | 
|
     * Obtains an array of supported signature algorithms that the peer is | 
|
     * able to use. | 
|
     * <p> | 
|
     * Note: this method is used to indicate to the local side which signature | 
|
     * algorithms may be used for digital signatures since TLS 1.2. It is | 
|
     * not meaningful for TLS versions prior to 1.2. | 
|
     * <p> | 
|
     * The signature algorithm name must be a standard Java Security | 
|
     * name (such as "SHA1withRSA", "SHA256withECDSA", and so on). | 
|
     * See Appendix A in the <a href= | 
|
     * "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html#AppA"> | 
|
     * Java Cryptography Architecture API Specification & Reference </a> | 
|
     * for information about standard algorithm names. | 
|
     * | 
|
     * @return An array of supported signature algorithms, in descending | 
|
     *     order of preference.  The return value is an empty array if | 
|
     *     the peer has not sent the supported signature algorithms. | 
|
     * | 
|
     * @see X509KeyManager | 
|
     * @see X509ExtendedKeyManager | 
|
*/  | 
|
public abstract String[] getPeerSupportedSignatureAlgorithms();  | 
|
    /** | 
|
     * Obtains a {@link List} containing all {@link SNIServerName}s | 
|
     * of the requested Server Name Indication (SNI) extension. | 
|
     * <P> | 
|
     * In server mode, unless the return {@link List} is empty, | 
|
     * the server should use the requested server names to guide its | 
|
     * selection of an appropriate authentication certificate, and/or | 
|
     * other aspects of security policy. | 
|
     * <P> | 
|
     * In client mode, unless the return {@link List} is empty, | 
|
     * the client should use the requested server names to guide its | 
|
     * endpoint identification of the peer's identity, and/or | 
|
     * other aspects of security policy. | 
|
     * | 
|
     * @return a non-null immutable list of {@link SNIServerName}s of the | 
|
     *         requested server name indications. The returned list may be | 
|
     *         empty if no server name indications were requested. | 
|
     * @throws UnsupportedOperationException if the underlying provider | 
|
     *         does not implement the operation | 
|
     * | 
|
     * @see SNIServerName | 
|
     * @see X509ExtendedTrustManager | 
|
     * @see X509ExtendedKeyManager | 
|
     * | 
|
     * @since 1.8 | 
|
*/  | 
|
public List<SNIServerName> getRequestedServerNames() {  | 
|
throw new UnsupportedOperationException();  | 
|
}  | 
|
}  |