src/java.base/share/classes/sun/security/ssl/SSLEngineOutputRecord.java
author wetmore
Fri, 11 May 2018 15:53:12 -0700
branchJDK-8145252-TLS13-branch
changeset 56542 56aaa6cb3693
parent 47216 71c04702a3d5
child 56660 66c803c3ce32
permissions -rw-r--r--
Initial TLSv1.3 Implementation
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
     2
 * Copyright (c) 1996, 2018, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.security.ssl;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    28
import java.io.IOException;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    29
import java.nio.ByteBuffer;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    30
import java.util.LinkedList;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    31
import javax.net.ssl.SSLHandshakeException;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    32
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    33
import sun.security.ssl.SSLCipher.SSLWriteCipher;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    34
import sun.security.ssl.KeyUpdate.KeyUpdateMessage;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
/**
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    37
 * {@code OutputRecord} implementation for {@code SSLEngine}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
 */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    39
final class SSLEngineOutputRecord extends OutputRecord implements SSLRecord {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    40
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    41
    private HandshakeFragment fragmenter = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    42
    private boolean isTalkingToV2 = false;      // SSLv2Hello
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    43
    private ByteBuffer v2ClientHello = null;    // SSLv2Hello
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    44
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    45
    private boolean isCloseWaiting = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    46
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    47
    SSLEngineOutputRecord(HandshakeHash handshakeHash) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    48
        super(handshakeHash, SSLWriteCipher.nullTlsWriteCipher());
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    49
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    50
        this.packetSize = SSLRecord.maxRecordSize;
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    51
        this.protocolVersion = ProtocolVersion.NONE;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    52
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    54
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 30904
diff changeset
    55
    public synchronized void close() throws IOException {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    56
        if (!isClosed) {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    57
            if (fragmenter != null && fragmenter.hasAlert()) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    58
                isCloseWaiting = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    59
            } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    60
                super.close();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    61
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    62
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    63
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    64
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    65
    @Override
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    66
    void encodeAlert(byte level, byte description) throws IOException {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    67
        if (fragmenter == null) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    68
           fragmenter = new HandshakeFragment();
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    69
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    70
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    71
        fragmenter.queueUpAlert(level, description);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    72
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    74
    @Override
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    75
    void encodeHandshake(byte[] source,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    76
            int offset, int length) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    77
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    78
        if (fragmenter == null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    79
           fragmenter = new HandshakeFragment();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    80
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    81
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    82
        if (firstMessage) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    83
            firstMessage = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    85
            if ((helloVersion == ProtocolVersion.SSL20Hello) &&
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    86
                (source[offset] == SSLHandshake.CLIENT_HELLO.id) &&
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    87
                                            //  5: recode header size
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    88
                (source[offset + 4 + 2 + 32] == 0)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    89
                                            // V3 session ID is empty
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    90
                                            //  4: handshake header size
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    91
                                            //  2: client_version in ClientHello
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    92
                                            // 32: random in ClientHello
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    93
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    94
                // Double space should be big enough for the converted message.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    95
                v2ClientHello = encodeV2ClientHello(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    96
                        source, (offset + 4), (length - 4));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
    98
                v2ClientHello.position(2);     // exclude the header
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
    99
                handshakeHash.deliver(v2ClientHello);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   100
                v2ClientHello.position(0);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   101
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   102
                return;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   103
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   104
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   105
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   106
        byte handshakeType = source[offset];
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   107
        if (handshakeHash.isHashable(handshakeType)) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   108
            handshakeHash.deliver(source, offset, length);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   109
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   110
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   111
        fragmenter.queueUpFragment(source, offset, length);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   112
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   113
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   114
    @Override
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   115
    void encodeChangeCipherSpec() throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   116
        if (fragmenter == null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   117
           fragmenter = new HandshakeFragment();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   118
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   119
        fragmenter.queueUpChangeCipherSpec();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   120
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   121
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   122
    @Override
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   123
    void encodeV2NoCipher() throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   124
        isTalkingToV2 = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   127
    @Override
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   128
    Ciphertext encode(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   129
        ByteBuffer[] srcs, int srcsOffset, int srcsLength,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   130
        ByteBuffer[] dsts, int dstsOffset, int dstsLength) throws IOException {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   131
        return encode(srcs, srcsOffset, srcsLength, dsts[0]);
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   132
    }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   133
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   134
    private Ciphertext encode(ByteBuffer[] sources, int offset, int length,
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   135
            ByteBuffer destination) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   137
        if (writeCipher.authenticator.seqNumOverflow()) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   138
            if (SSLLogger.isOn && SSLLogger.isOn("ssl")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   139
                SSLLogger.fine(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   140
                    "sequence number extremely close to overflow " +
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   141
                    "(2^64-1 packets). Closing connection.");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   142
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   144
            throw new SSLHandshakeException("sequence number overflow");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   145
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   147
        // Don't process the incoming record until all of the
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   148
        // buffered records get handled.
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   149
        Ciphertext ct = acquireCiphertext(destination);
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   150
        if (ct != null) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   151
            return ct;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   152
        }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   153
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   154
        if (sources == null || sources.length == 0) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   155
            return null;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   156
        }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   157
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   158
        int srcsRemains = 0;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   159
        for (int i = offset; i < offset + length; i++) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   160
            srcsRemains += sources[i].remaining();
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   161
        }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   162
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   163
        if (srcsRemains == 0) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   164
            return null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   167
        int dstLim = destination.limit();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   168
        boolean isFirstRecordOfThePayload = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   169
        int packetLeftSize = Math.min(maxRecordSize, packetSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   170
        boolean needMorePayload = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   171
        long recordSN = 0L;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   172
        while (needMorePayload) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   173
            int fragLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   174
            if (isFirstRecordOfThePayload && needToSplitPayload()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   175
                needMorePayload = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   176
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   177
                fragLen = 1;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   178
                isFirstRecordOfThePayload = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   179
            } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   180
                needMorePayload = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   181
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   182
                if (packetLeftSize > 0) {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   183
                    fragLen =writeCipher.calculateFragmentSize(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   184
                            packetLeftSize, headerSize);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   185
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   186
                    fragLen = Math.min(fragLen, Record.maxDataSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   187
                } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   188
                    fragLen = Record.maxDataSize;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   189
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   190
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   191
                if (fragmentSize > 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   192
                    fragLen = Math.min(fragLen, fragmentSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   193
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   194
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   195
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   196
            int dstPos = destination.position();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   197
            int dstContent = dstPos + headerSize +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   198
                                writeCipher.getExplicitNonceSize();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   199
            destination.position(dstContent);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   201
            int remains = Math.min(fragLen, destination.remaining());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   202
            fragLen = 0;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   203
            int srcsLen = offset + length;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   204
            for (int i = offset; (i < srcsLen) && (remains > 0); i++) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   205
                int amount = Math.min(sources[i].remaining(), remains);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   206
                int srcLimit = sources[i].limit();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   207
                sources[i].limit(sources[i].position() + amount);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   208
                destination.put(sources[i]);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   209
                sources[i].limit(srcLimit);         // restore the limit
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   210
                remains -= amount;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   211
                fragLen += amount;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   212
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   213
                if (remains > 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   214
                    offset++;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   215
                    length--;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   216
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   217
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   218
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   219
            destination.limit(destination.position());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   220
            destination.position(dstContent);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   221
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   222
            if (SSLLogger.isOn && SSLLogger.isOn("record")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   223
                SSLLogger.fine(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   224
                        "WRITE: " + protocolVersion + " " +
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   225
                        ContentType.APPLICATION_DATA.name +
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   226
                        ", length = " + destination.remaining());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   227
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   228
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   229
            // Encrypt the fragment and wrap up a record.
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   230
            recordSN = encrypt(writeCipher,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   231
                    ContentType.APPLICATION_DATA.id, destination,
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   232
                    dstPos, dstLim, headerSize,
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   233
                    protocolVersion);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   234
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   235
            if (SSLLogger.isOn && SSLLogger.isOn("packet")) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   236
                ByteBuffer temporary = destination.duplicate();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   237
                temporary.limit(temporary.position());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   238
                temporary.position(dstPos);
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   239
                SSLLogger.fine("Raw write", temporary);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   240
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   241
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   242
            packetLeftSize -= destination.position() - dstPos;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   243
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   244
            // remain the limit unchanged
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   245
            destination.limit(dstLim);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   246
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   247
            if (isFirstAppOutputRecord) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   248
                isFirstAppOutputRecord = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   249
            }
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   250
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   251
            if (writeCipher.atKeyLimit()) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   252
                if (SSLLogger.isOn && SSLLogger.isOn("ssl")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   253
                    SSLLogger.fine("KeyUpdate: triggered");
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   254
                }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   255
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   256
                PostHandshakeContext p = new PostHandshakeContext(tc);
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   257
                KeyUpdate.handshakeProducer.produce(p,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   258
                        new KeyUpdateMessage(p, KeyUpdateMessage.REQUSTED));
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   259
            }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   260
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   261
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   262
        return new Ciphertext(ContentType.APPLICATION_DATA.id,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   263
                SSLHandshake.NOT_APPLICABLE.id, recordSN);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   266
    private Ciphertext acquireCiphertext(ByteBuffer destination) throws IOException {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   267
        if (isTalkingToV2) {              // SSLv2Hello
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   268
            // We don't support SSLv2.  Send an SSLv2 error message
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   269
            // so that the connection can be closed gracefully.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   270
            //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   271
            // Please don't change the limit of the destination buffer.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   272
            destination.put(SSLRecord.v2NoCipher);
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   273
            if (SSLLogger.isOn && SSLLogger.isOn("packet")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   274
                SSLLogger.fine("Raw write", SSLRecord.v2NoCipher);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   275
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   276
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   277
            isTalkingToV2 = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   278
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   279
            return new Ciphertext(ContentType.ALERT.id,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   280
                    SSLHandshake.NOT_APPLICABLE.id, -1L);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   281
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   282
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   283
        if (v2ClientHello != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   284
            // deliver the SSLv2 format ClientHello message
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   285
            //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   286
            // Please don't change the limit of the destination buffer.
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   287
            if (SSLLogger.isOn) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   288
                if (SSLLogger.isOn("record")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   289
                     SSLLogger.fine(Thread.currentThread().getName() +
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   290
                            ", WRITE: SSLv2 ClientHello message" +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   291
                            ", length = " + v2ClientHello.remaining());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   292
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   293
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   294
                if (SSLLogger.isOn("packet")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   295
                    SSLLogger.fine("Raw write", v2ClientHello);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   296
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   297
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   298
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   299
            destination.put(v2ClientHello);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   300
            v2ClientHello = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   301
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   302
            return new Ciphertext(ContentType.HANDSHAKE.id,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   303
                   SSLHandshake.CLIENT_HELLO.id, -1L);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   304
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   305
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   306
        if (fragmenter != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   307
            return fragmenter.acquireCiphertext(destination);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   308
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   309
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   310
        return null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   313
    @Override
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   314
    boolean isEmpty() {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   315
        return (!isTalkingToV2) && (v2ClientHello == null) &&
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   316
                ((fragmenter == null) || fragmenter.isEmpty());
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   317
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   318
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   319
    // buffered record fragment
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   320
    private static class RecordMemo {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   321
        byte            contentType;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   322
        byte            majorVersion;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   323
        byte            minorVersion;
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   324
        SSLWriteCipher  encodeCipher;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   325
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   326
        byte[]          fragment;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   327
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   328
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   329
    private static class HandshakeMemo extends RecordMemo {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   330
        byte            handshakeType;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   331
        int             acquireOffset;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   334
    final class HandshakeFragment {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   335
        private LinkedList<RecordMemo> handshakeMemos = new LinkedList<>();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   336
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   337
        void queueUpFragment(byte[] source,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   338
                int offset, int length) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   339
            HandshakeMemo memo = new HandshakeMemo();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   340
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   341
            memo.contentType = ContentType.HANDSHAKE.id;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   342
            memo.majorVersion = protocolVersion.major;  // kick start version?
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   343
            memo.minorVersion = protocolVersion.minor;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   344
            memo.encodeCipher = writeCipher;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   345
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   346
            memo.handshakeType = source[offset];
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   347
            memo.acquireOffset = 0;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   348
            memo.fragment = new byte[length - 4];       // 4: header size
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   349
                                                        //    1: HandshakeType
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   350
                                                        //    3: message length
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   351
            System.arraycopy(source, offset + 4, memo.fragment, 0, length - 4);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   352
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   353
            handshakeMemos.add(memo);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   354
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   355
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   356
        void queueUpChangeCipherSpec() {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   357
            RecordMemo memo = new RecordMemo();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   358
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   359
            memo.contentType = ContentType.CHANGE_CIPHER_SPEC.id;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   360
            memo.majorVersion = protocolVersion.major;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   361
            memo.minorVersion = protocolVersion.minor;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   362
            memo.encodeCipher = writeCipher;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   363
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   364
            memo.fragment = new byte[1];
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   365
            memo.fragment[0] = 1;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   366
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   367
            handshakeMemos.add(memo);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   368
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   369
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   370
        void queueUpAlert(byte level, byte description) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   371
            RecordMemo memo = new RecordMemo();
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   372
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   373
            memo.contentType = ContentType.ALERT.id;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   374
            memo.majorVersion = protocolVersion.major;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   375
            memo.minorVersion = protocolVersion.minor;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   376
            memo.encodeCipher = writeCipher;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   377
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   378
            memo.fragment = new byte[2];
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   379
            memo.fragment[0] = level;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   380
            memo.fragment[1] = description;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   381
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   382
            handshakeMemos.add(memo);
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   383
        }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   384
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   385
        Ciphertext acquireCiphertext(ByteBuffer dstBuf) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   386
            if (isEmpty()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   387
                return null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   388
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   389
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   390
            RecordMemo memo = handshakeMemos.getFirst();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   391
            HandshakeMemo hsMemo = null;
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   392
            if (memo.contentType == ContentType.HANDSHAKE.id) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   393
                hsMemo = (HandshakeMemo)memo;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   394
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   395
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   396
            // ChangeCipherSpec message is pretty small.  Don't worry about
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   397
            // the fragmentation of ChangeCipherSpec record.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   398
            int fragLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   399
            if (packetSize > 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   400
                fragLen = Math.min(maxRecordSize, packetSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   401
                fragLen = memo.encodeCipher.calculateFragmentSize(
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   402
                        fragLen, headerSize);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   403
            } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   404
                fragLen = Record.maxDataSize;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   405
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   406
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   407
            if (fragmentSize > 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   408
                fragLen = Math.min(fragLen, fragmentSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   409
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   410
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   411
            int dstPos = dstBuf.position();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   412
            int dstLim = dstBuf.limit();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   413
            int dstContent = dstPos + headerSize +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   414
                                    memo.encodeCipher.getExplicitNonceSize();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   415
            dstBuf.position(dstContent);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   416
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   417
            if (hsMemo != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   418
                int remainingFragLen = fragLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   419
                while ((remainingFragLen > 0) && !handshakeMemos.isEmpty()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   420
                    int memoFragLen = hsMemo.fragment.length;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   421
                    if (hsMemo.acquireOffset == 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   422
                        // Don't fragment handshake message header
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   423
                        if (remainingFragLen <= 4) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   424
                            break;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   425
                        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   426
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   427
                        dstBuf.put(hsMemo.handshakeType);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   428
                        dstBuf.put((byte)((memoFragLen >> 16) & 0xFF));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   429
                        dstBuf.put((byte)((memoFragLen >> 8) & 0xFF));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   430
                        dstBuf.put((byte)(memoFragLen & 0xFF));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   431
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   432
                        remainingFragLen -= 4;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   433
                    } // Otherwise, handshake message is fragmented.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   434
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   435
                    int chipLen = Math.min(remainingFragLen,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   436
                            (memoFragLen - hsMemo.acquireOffset));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   437
                    dstBuf.put(hsMemo.fragment, hsMemo.acquireOffset, chipLen);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   438
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   439
                    hsMemo.acquireOffset += chipLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   440
                    if (hsMemo.acquireOffset == memoFragLen) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   441
                        handshakeMemos.removeFirst();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   442
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   443
                        // still have space for more records?
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   444
                        if ((remainingFragLen > chipLen) &&
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   445
                                 !handshakeMemos.isEmpty()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   446
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   447
                            // look for the next buffered record fragment
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   448
                            RecordMemo rm = handshakeMemos.getFirst();
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   449
                            if (rm.contentType == ContentType.HANDSHAKE.id &&
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   450
                                    rm.encodeCipher == hsMemo.encodeCipher) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   451
                                hsMemo = (HandshakeMemo)rm;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   452
                            } else {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   453
                                // not of the flight, break the loop
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   454
                                break;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   455
                            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   456
                        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   457
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   458
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   459
                    remainingFragLen -= chipLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   460
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   461
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   462
                fragLen -= remainingFragLen;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   463
            } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   464
                fragLen = Math.min(fragLen, memo.fragment.length);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   465
                dstBuf.put(memo.fragment, 0, fragLen);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   466
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   467
                handshakeMemos.removeFirst();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   468
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   469
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   470
            dstBuf.limit(dstBuf.position());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   471
            dstBuf.position(dstContent);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   472
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   473
            if (SSLLogger.isOn && SSLLogger.isOn("record")) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   474
                SSLLogger.fine(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   475
                        "WRITE: " + protocolVersion + " " +
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   476
                        ContentType.nameOf(memo.contentType) +
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   477
                        ", length = " + dstBuf.remaining());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   478
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   479
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   480
            // Encrypt the fragment and wrap up a record.
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   481
            long recordSN = encrypt(
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   482
                    memo.encodeCipher,
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   483
                    memo.contentType, dstBuf,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   484
                    dstPos, dstLim, headerSize,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   485
                    ProtocolVersion.valueOf(memo.majorVersion,
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   486
                            memo.minorVersion));
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   487
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   488
            if (SSLLogger.isOn && SSLLogger.isOn("packet")) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   489
                ByteBuffer temporary = dstBuf.duplicate();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   490
                temporary.limit(temporary.position());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   491
                temporary.position(dstPos);
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   492
                SSLLogger.fine("Raw write", temporary);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   493
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   494
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   495
            // remain the limit unchanged
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   496
            dstBuf.limit(dstLim);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   497
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   498
            // Reset the fragmentation offset.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   499
            if (hsMemo != null) {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   500
                return new Ciphertext(hsMemo.contentType,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   501
                        hsMemo.handshakeType, recordSN);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   502
            } else {
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   503
                if (isCloseWaiting &&
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   504
                        memo.contentType == ContentType.ALERT.id) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   505
                    close();
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   506
                }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   507
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   508
                return new Ciphertext(memo.contentType,
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   509
                        SSLHandshake.NOT_APPLICABLE.id, recordSN);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   510
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   511
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   512
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   513
        boolean isEmpty() {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   514
            return handshakeMemos.isEmpty();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   515
        }
56542
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   516
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   517
        boolean hasAlert() {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   518
            for (RecordMemo memo : handshakeMemos) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   519
                if (memo.contentType ==  ContentType.ALERT.id) {
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   520
                    return true;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   521
                }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   522
            }
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   523
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   524
            return false;
56aaa6cb3693 Initial TLSv1.3 Implementation
wetmore
parents: 47216
diff changeset
   525
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
    /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   529
     * Need to split the payload except the following cases:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   530
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   531
     * 1. protocol version is TLS 1.1 or later;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   532
     * 2. bulk cipher does not use CBC mode, including null bulk cipher suites.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   533
     * 3. the payload is the first application record of a freshly
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   534
     *    negotiated TLS session.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   535
     * 4. the CBC protection is disabled;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   536
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   537
     * By default, we counter chosen plaintext issues on CBC mode
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   538
     * ciphersuites in SSLv3/TLS1.0 by sending one byte of application
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   539
     * data in the first record of every payload, and the rest in
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   540
     * subsequent record(s). Note that the issues have been solved in
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   541
     * TLS 1.1 or later.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   542
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   543
     * It is not necessary to split the very first application record of
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   544
     * a freshly negotiated TLS session, as there is no previous
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   545
     * application data to guess.  To improve compatibility, we will not
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   546
     * split such records.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   547
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   548
     * This avoids issues in the outbound direction.  For a full fix,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   549
     * the peer must have similar protections.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   551
    boolean needToSplitPayload() {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   552
        return (!protocolVersion.useTLS11PlusSpec()) &&
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   553
                writeCipher.isCBCMode() && !isFirstAppOutputRecord &&
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 27292
diff changeset
   554
                Record.enableCBCProtection;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
}