#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) #pragma warning disable using System; using System.Collections; using System.IO; using BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls { /// Interface describing a TLS server endpoint. public interface TlsServer : TlsPeer { void Init(TlsServerContext context); /// Return the specified session, if available. /// /// Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated. /// /// the ID of the session to resume. /// A with the specified session ID, or null. /// TlsSession GetSessionToResume(byte[] sessionID); byte[] GetNewSessionID(); /// Return the external PSK to select from the ClientHello. /// /// WARNING: EXPERIMENTAL FEATURE, UNSTABLE API /// Note that this will only be called when TLS 1.3 or higher is amongst the offered protocol versions, and one /// or more PSKs are actually offered. /// /// an of instances. /// The corresponding to the selected identity, or null to not select /// any. TlsPskExternal GetExternalPsk(IList identities); void NotifySession(TlsSession session); /// void NotifyClientVersion(ProtocolVersion clientVersion); /// void NotifyFallback(bool isFallback); /// void NotifyOfferedCipherSuites(int[] offeredCipherSuites); /// (Int32 -> byte[]) /// void ProcessClientExtensions(IDictionary clientExtensions); /// ProtocolVersion GetServerVersion(); /// int[] GetSupportedGroups(); /// int GetSelectedCipherSuite(); /// (Int32 -> byte[]) /// IDictionary GetServerExtensions(); /// (Int32 -> byte[]) /// void GetServerExtensionsForConnection(IDictionary serverExtensions); /// (SupplementalDataEntry) /// IList GetServerSupplementalData(); /// Return server credentials to use. /// /// The returned value may be null, or else it MUST implement exactly one of /// , , or /// , depending on the key exchange that was negotiated. /// /// a object or null for anonymous key exchanges. /// TlsCredentials GetCredentials(); /// /// This method will be called (only) if the server included an extension of type "status_request" with empty /// "extension_data" in the extended server hello. See RFC 3546 3.6. Certificate Status Request. If a /// non-null is returned, it is sent to the client as a handshake message of /// type "certificate_status". /// /// A to be sent to the client (or null for none). /// CertificateStatus GetCertificateStatus(); /// CertificateRequest GetCertificateRequest(); /// TlsPskIdentityManager GetPskIdentityManager(); /// TlsSrpLoginParameters GetSrpLoginParameters(); /// TlsDHConfig GetDHConfig(); /// TlsECConfig GetECDHConfig(); /// (SupplementalDataEntry) /// void ProcessClientSupplementalData(IList clientSupplementalData); /// Called by the protocol handler to report the client certificate, only if /// returned non-null. /// /// Note: this method is responsible for certificate verification and validation. /// /// the effective client certificate (may be an empty chain). /// void NotifyClientCertificate(Certificate clientCertificate); /// RFC 5077 3.3. NewSessionTicket Handshake Message. /// /// This method will be called (only) if a NewSessionTicket extension was sent by the server. See RFC 5077 /// 4. Recommended Ticket Construction for recommended format and protection. /// /// The ticket. /// NewSessionTicket GetNewSessionTicket(); } } #pragma warning restore #endif