src/java.base/share/classes/sun/security/ssl/SSLSocketImpl.java
author erikj
Tue, 12 Sep 2017 19:03:39 +0200
changeset 47216 71c04702a3d5
parent 42778 jdk/src/java.base/share/classes/sun/security/ssl/SSLSocketImpl.java@3c8baf9075f1
child 47271 dc9b1da1314b
permissions -rw-r--r--
8187443: Forest Consolidation: Move files to unified layout Reviewed-by: darcy, ihse
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
36641
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
     2
 * Copyright (c) 1996, 2016, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5195
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5195
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5195
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5195
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5195
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
package sun.security.ssl;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.io.*;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
    30
import java.nio.*;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.net.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.security.GeneralSecurityException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.security.AccessController;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.AccessControlContext;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.PrivilegedAction;
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
    36
import java.security.AlgorithmConstraints;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.util.*;
100
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
    38
import java.util.concurrent.TimeUnit;
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
    39
import java.util.concurrent.locks.ReentrantLock;
42706
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
    40
import java.util.function.BiFunction;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import javax.crypto.BadPaddingException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import javax.net.ssl.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
32834
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 32649
diff changeset
    45
import jdk.internal.misc.JavaNetInetAddressAccess;
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 32649
diff changeset
    46
import jdk.internal.misc.SharedSecrets;
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
    47
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 * Implementation of an SSL socket.  This is a normal connection type
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 * socket, implementing SSL over some lower level socket, such as TCP.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 * Because it is layered over some lower level socket, it MUST override
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
 * all default socket methods.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
 * <P> This API offers a non-traditional option for establishing SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
 * connections.  You may first establish the connection directly, then pass
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
 * that connection to the SSL socket constructor with a flag saying which
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
 * role should be taken in the handshake protocol.  (The two ends of the
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
 * connection must not choose the same role!)  This allows setup of SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
 * proxying or tunneling, and also allows the kind of "role reversal"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
 * that is required for most FTP data transfers.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
 * @see javax.net.ssl.SSLSocket
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
 * @see SSLServerSocket
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 * @author David Brownell
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
 */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
    67
public final class SSLSocketImpl extends BaseSSLSocketImpl {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
     * ERROR HANDLING GUIDELINES
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
     * (which exceptions to throw and catch and which not to throw and catch)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
     * . if there is an IOException (SocketException) when accessing the
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
     *   underlying Socket, pass it through
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
     * . do not throw IOExceptions, throw SSLExceptions (or a subclass)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
     * . for internal errors (things that indicate a bug in JSSE or a
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
     *   grossly misconfigured J2RE), throw either an SSLException or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
     *   a RuntimeException at your convenience.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
     * . handshaking code (Handshaker or HandshakeMessage) should generally
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
     *   pass through exceptions, but can handle them if they know what to
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
     *   do.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
     * . exception chaining should be used for all new code. If you happen
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
     *   to touch old code that does not use chaining, you should change it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
     * . there is a top level exception handler that sits at all entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
     *   points from application code to SSLSocket read/write code. It
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
     *   makes sure that all errors are handled (see handleException()).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
     * . JSSE internal code should generally not call close(), call
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
     *   closeInternal().
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
     * There's a state machine associated with each connection, which
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
     * among other roles serves to negotiate session changes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
     * - START with constructor, until the TCP connection's around.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
     * - HANDSHAKE picks session parameters before allowing traffic.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
     *          There are many substates due to sequencing requirements
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
     *          for handshake messages.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
     * - DATA may be transmitted.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
     * - RENEGOTIATE state allows concurrent data and handshaking
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
     *          traffic ("same" substates as HANDSHAKE), and terminates
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
     *          in selection of new session (and connection) parameters
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
     * - ERROR state immediately precedes abortive disconnect.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
     * - SENT_CLOSE sent a close_notify to the peer. For layered,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
     *          non-autoclose socket, must now read close_notify
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
     *          from peer before closing the connection. For nonlayered or
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     *          non-autoclose socket, close connection and go onto
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
     *          cs_CLOSED state.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
     * - CLOSED after sending close_notify alert, & socket is closed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
     *          SSL connection objects are not reused.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
     * - APP_CLOSED once the application calls close(). Then it behaves like
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
     *          a closed socket, e.g.. getInputStream() throws an Exception.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
     * State affects what SSL record types may legally be sent:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
     * - Handshake ... only in HANDSHAKE and RENEGOTIATE states
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
     * - App Data ... only in DATA and RENEGOTIATE states
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
     * - Alert ... in HANDSHAKE, DATA, RENEGOTIATE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
     * Re what may be received:  same as what may be sent, except that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
     * HandshakeRequest handshaking messages can come from servers even
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
     * in the application data state, to request entry to RENEGOTIATE.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
     * The state machine within HANDSHAKE and RENEGOTIATE states controls
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
     * the pending session, not the connection state, until the change
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
     * cipher spec and "Finished" handshake messages are processed and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
     * make the "new" session become the current one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
     * NOTE: details of the SMs always need to be nailed down better.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
     * The text above illustrates the core ideas.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
     *                +---->-------+------>--------->-------+
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
     *                |            |                        |
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
     *     <-----<    ^            ^  <-----<               v
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     *START>----->HANDSHAKE>----->DATA>----->RENEGOTIATE  SENT_CLOSE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
     *                v            v               v        |   |
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
     *                |            |               |        |   v
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
     *                +------------+---------------+        v ERROR
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
     *                |                                     |   |
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
     *                v                                     |   |
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
     *               ERROR>------>----->CLOSED<--------<----+-- +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
     *                                     |
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
     *                                     v
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
     *                                 APP_CLOSED
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
     *
28059
e576535359cc 8067377: My hobby: caning, then then canning, the the can-can
martin
parents: 25859
diff changeset
   152
     * ALSO, note that the purpose of handshaking (renegotiation is
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
     * included) is to assign a different, and perhaps new, session to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
     * the connection.  The SSLv3 spec is a bit confusing on that new
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
     * protocol feature.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
    private static final int    cs_START = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
    private static final int    cs_HANDSHAKE = 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
    private static final int    cs_DATA = 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
    private static final int    cs_RENEGOTIATE = 3;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
    private static final int    cs_ERROR = 4;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   162
    private static final int    cs_SENT_CLOSE = 5;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    private static final int    cs_CLOSED = 6;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    private static final int    cs_APP_CLOSED = 7;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
     * Drives the protocol state machine.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
     */
19223
e27cda06fe6a 8013809: deadlock in SSLSocketImpl between between write and close
xuelei
parents: 16913
diff changeset
   169
    private volatile int        connectionState;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
     * Flag indicating if the next record we receive MUST be a Finished
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
     * message. Temporarily set during the handshake to ensure that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * a change cipher spec message is followed by a finished message.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
    private boolean             expectingFinished;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
     * For improved diagnostics, we detail connection closure
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
     * If the socket is closed (connectionState >= cs_ERROR),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
     * closeReason != null indicates if the socket was closed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
     * because of an error or because or normal shutdown.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
    private SSLException        closeReason;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
     * Per-connection private state that doesn't change when the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
     * session is changed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   190
    private ClientAuthType      doClientAuth =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   191
                                        ClientAuthType.CLIENT_AUTH_NONE;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
    private boolean             roleIsServer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
    private boolean             enableSessionCreation = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
    private String              host;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
    private boolean             autoClose = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
    private AccessControlContext acc;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   198
    // The cipher suites enabled for use on this connection.
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   199
    private CipherSuiteList     enabledCipherSuites;
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   200
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   201
    // The endpoint identification protocol
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   202
    private String              identificationProtocol = null;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   203
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   204
    // The cryptographic algorithm constraints
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   205
    private AlgorithmConstraints    algorithmConstraints = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   207
    // The server name indication and matchers
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   208
    List<SNIServerName>         serverNames =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   209
                                    Collections.<SNIServerName>emptyList();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   210
    Collection<SNIMatcher>      sniMatchers =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   211
                                    Collections.<SNIMatcher>emptyList();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   212
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   213
    // Is the serverNames set to empty with SSLParameters.setServerNames()?
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   214
    private boolean             noSniExtension = false;
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   215
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   216
    // Is the sniMatchers set to empty with SSLParameters.setSNIMatchers()?
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   217
    private boolean             noSniMatcher = false;
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   218
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   219
    // Configured application protocol values
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   220
    String[] applicationProtocols = new String[0];
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   221
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   222
    // Negotiated application protocol value.
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   223
    //
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   224
    // The value under negotiation will be obtained from handshaker.
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   225
    String applicationProtocol = null;
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
   226
42706
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
   227
    // Callback function that selects the application protocol value during
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
   228
    // the SSL/TLS handshake.
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
   229
    BiFunction<SSLSocket, List<String>, String> applicationProtocolSelector;
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
   230
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
     * READ ME * READ ME * READ ME * READ ME * READ ME * READ ME *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
     * IMPORTANT STUFF TO UNDERSTANDING THE SYNCHRONIZATION ISSUES.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
     * READ ME * READ ME * READ ME * READ ME * READ ME * READ ME *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
     * There are several locks here.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
     * The primary lock is the per-instance lock used by
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
     * synchronized(this) and the synchronized methods.  It controls all
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
     * access to things such as the connection state and variables which
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
     * affect handshaking.  If we are inside a synchronized method, we
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
     * can access the state directly, otherwise, we must use the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
     * synchronized equivalents.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
     * The handshakeLock is used to ensure that only one thread performs
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
     * the *complete initial* handshake.  If someone is handshaking, any
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
     * stray application or startHandshake() requests who find the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
     * connection state is cs_HANDSHAKE will stall on handshakeLock
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
     * until handshaking is done.  Once the handshake is done, we either
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
     * succeeded or failed, but we can never go back to the cs_HANDSHAKE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
     * or cs_START state again.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
     * Note that the read/write() calls here in SSLSocketImpl are not
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
     * obviously synchronized.  In fact, it's very nonintuitive, and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
     * requires careful examination of code paths.  Grab some coffee,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
     * and be careful with any code changes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
     * There can be only three threads active at a time in the I/O
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
     * subsection of this class.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
     *    1.  startHandshake
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
     *    2.  AppInputStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
     *    3.  AppOutputStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
     * One thread could call startHandshake().
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
     * AppInputStream/AppOutputStream read() and write() calls are each
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
     * synchronized on 'this' in their respective classes, so only one
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
     * app. thread will be doing a SSLSocketImpl.read() or .write()'s at
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
     * a time.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
     * If handshaking is required (state cs_HANDSHAKE), and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
     * getConnectionState() for some/all threads returns cs_HANDSHAKE,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
     * only one can grab the handshakeLock, and the rest will stall
90ce3da70b43 Initial load
duke
parents:
diff changeset
   272
     * either on getConnectionState(), or on the handshakeLock if they
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
     * happen to successfully race through the getConnectionState().
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
     * If a writer is doing the initial handshaking, it must create a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
     * temporary reader to read the responses from the other side.  As a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   277
     * side-effect, the writer's reader will have priority over any
90ce3da70b43 Initial load
duke
parents:
diff changeset
   278
     * other reader.  However, the writer's reader is not allowed to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   279
     * consume any application data.  When handshakeLock is finally
90ce3da70b43 Initial load
duke
parents:
diff changeset
   280
     * released, we either have a cs_DATA connection, or a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
     * cs_CLOSED/cs_ERROR socket.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
     * The writeLock is held while writing on a socket connection and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
     * also to protect the MAC and cipher for their direction.  The
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
     * writeLock is package private for Handshaker which holds it while
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
     * writing the ChangeCipherSpec message.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
     * To avoid the problem of a thread trying to change operational
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
     * modes on a socket while handshaking is going on, we synchronize
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
     * on 'this'.  If handshaking has not started yet, we tell the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
     * handshaker to change its mode.  If handshaking has started,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
     * we simply store that request until the next pending session
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
     * is created, at which time the new handshaker's state is set.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
     * The readLock is held during readRecord(), which is responsible
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   296
     * for reading an SSLInputRecord, decrypting it, and processing it.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
     * The readLock ensures that these three steps are done atomically
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   298
     * and that once started, no other thread can block on SSLInputRecord.read.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
     * This is necessary so that processing of close_notify alerts
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
     * from the peer are handled properly.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
   302
    private final Object        handshakeLock = new Object();
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   303
    final ReentrantLock         writeLock = new ReentrantLock();
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
   304
    private final Object        readLock = new Object();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   306
    InputRecord                 inputRecord;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   307
    OutputRecord                outputRecord;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
    /*
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   310
     * security parameters for secure renegotiation.
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   311
     */
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   312
    private boolean             secureRenegotiation;
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   313
    private byte[]              clientVerifyData;
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   314
    private byte[]              serverVerifyData;
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   315
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   316
    /*
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
     * The authentication context holds all information used to establish
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
     * who this end of the connection is (certificate chains, private keys,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
     * etc) and who is trusted (e.g. as CAs or websites).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
    private SSLContextImpl      sslContext;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
     * This connection is one of (potentially) many associated with
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
     * any given session.  The output of the handshake protocol is a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
     * new session ... although all the protocol description talks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
     * about changing the cipher spec (and it does change), in fact
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
     * that's incidental since it's done by changing everything that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
     * is associated with a session at the same time.  (TLS/IETF may
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
     * change that to add client authentication w/o new key exchg.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
     */
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   333
    private Handshaker                  handshaker;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   334
    private SSLSessionImpl              sess;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   335
    private volatile SSLSessionImpl     handshakeSession;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
     * If anyone wants to get notified about handshake completions,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
     * they'll show up on this list.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
    private HashMap<HandshakeCompletedListener, AccessControlContext>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
                                                        handshakeListeners;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
     * Reuse the same internal input/output streams.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
    private InputStream         sockInput;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
    private OutputStream        sockOutput;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
     * These input and output streams block their data in SSL records,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
     * and usually arrange integrity and privacy protection for those
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
     * records.  The guts of the SSL protocol are wrapped up in these
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
     * streams, and in the handshaking that establishes the details of
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
     * that integrity and privacy protection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
    private AppInputStream      input;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
    private AppOutputStream     output;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
    /*
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   363
     * The protocol versions enabled for use on this connection.
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   364
     *
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   365
     * Note: we support a pseudo protocol called SSLv2Hello which when
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   366
     * set will result in an SSL v2 Hello being sent with SSL (version 3.0)
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   367
     * or TLS (version 3.1, 3.2, etc.) version info.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
    private ProtocolList enabledProtocols;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
     * The SSL version associated with this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   374
    private ProtocolVersion     protocolVersion = ProtocolVersion.DEFAULT_TLS;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
    /* Class and subclass dynamic debugging support */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
    private static final Debug debug = Debug.getInstance("ssl");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   379
    /*
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   380
     * Whether local cipher suites preference in server side should be
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   381
     * honored during handshaking?
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   382
     */
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   383
    private boolean preferLocalCipherSuites = false;
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   384
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   385
    /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   386
     * The maximum expected network packet size for SSL/TLS/DTLS records.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   387
     */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   388
    private int maximumPacketSize = 0;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   389
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   390
    /*
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   391
     * Is the local name service trustworthy?
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   392
     *
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   393
     * If the local name service is not trustworthy, reverse host name
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   394
     * resolution should not be performed for endpoint identification.
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   395
     */
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   396
    static final boolean trustNameService =
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   397
            Debug.getBooleanProperty("jdk.tls.trustNameService", false);
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
   398
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
    // CONSTRUCTORS AND INITIALIZATION CODE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
     * Constructs an SSL connection to a named host at a specified port,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
     * using the authentication context provided.  This endpoint acts as
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
     * the client, and may rejoin an existing SSL session if appropriate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
     * @param context authentication context to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
     * @param host name of the host with which to connect
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
     * @param port number of the server's port
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
    SSLSocketImpl(SSLContextImpl context, String host, int port)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
            throws IOException, UnknownHostException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
        this.host = host;
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   416
        this.serverNames =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   417
            Utilities.addToSNIServerNameList(this.serverNames, this.host);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
        init(context, false);
2068
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   419
        SocketAddress socketAddress =
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   420
               host != null ? new InetSocketAddress(host, port) :
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   421
               new InetSocketAddress(InetAddress.getByName(null), port);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
        connect(socketAddress, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
     * Constructs an SSL connection to a server at a specified address.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
     * and TCP port, using the authentication context provided.  This
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
     * endpoint acts as the client, and may rejoin an existing SSL session
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
     * if appropriate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
     * @param context authentication context to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
     * @param address the server's host
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
     * @param port its port
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
    SSLSocketImpl(SSLContextImpl context, InetAddress host, int port)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
        init(context, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
        SocketAddress socketAddress = new InetSocketAddress(host, port);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
        connect(socketAddress, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
     * Constructs an SSL connection to a named host at a specified port,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
     * using the authentication context provided.  This endpoint acts as
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
     * the client, and may rejoin an existing SSL session if appropriate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
     * @param context authentication context to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
     * @param host name of the host with which to connect
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
     * @param port number of the server's port
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
     * @param localAddr the local address the socket is bound to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
     * @param localPort the local port the socket is bound to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
    SSLSocketImpl(SSLContextImpl context, String host, int port,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
            InetAddress localAddr, int localPort)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
            throws IOException, UnknownHostException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
        this.host = host;
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   460
        this.serverNames =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   461
            Utilities.addToSNIServerNameList(this.serverNames, this.host);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
        init(context, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
        bind(new InetSocketAddress(localAddr, localPort));
2068
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   464
        SocketAddress socketAddress =
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   465
               host != null ? new InetSocketAddress(host, port) :
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
   466
               new InetSocketAddress(InetAddress.getByName(null), port);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
        connect(socketAddress, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
     * Constructs an SSL connection to a server at a specified address.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
     * and TCP port, using the authentication context provided.  This
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
     * endpoint acts as the client, and may rejoin an existing SSL session
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
     * if appropriate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
     * @param context authentication context to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
     * @param address the server's host
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
     * @param port its port
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
     * @param localAddr the local address the socket is bound to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
     * @param localPort the local port the socket is bound to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
    SSLSocketImpl(SSLContextImpl context, InetAddress host, int port,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
            InetAddress localAddr, int localPort)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
        init(context, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
        bind(new InetSocketAddress(localAddr, localPort));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
        SocketAddress socketAddress = new InetSocketAddress(host, port);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
        connect(socketAddress, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
     * Package-private constructor used ONLY by SSLServerSocket.  The
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
     * java.net package accepts the TCP connection after this call is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
     * made.  This just initializes handshake state to use "server mode",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
     * giving control over the use of SSL client authentication.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
    SSLSocketImpl(SSLContextImpl context, boolean serverMode,
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   500
            CipherSuiteList suites, ClientAuthType clientAuth,
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   501
            boolean sessionCreation, ProtocolList protocols,
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   502
            String identificationProtocol,
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   503
            AlgorithmConstraints algorithmConstraints,
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   504
            Collection<SNIMatcher> sniMatchers,
38865
429c08bd6158 8158978: ALPN not working when values are set directly on a SSLServerSocket
wetmore
parents: 37601
diff changeset
   505
            boolean preferLocalCipherSuites,
429c08bd6158 8158978: ALPN not working when values are set directly on a SSLServerSocket
wetmore
parents: 37601
diff changeset
   506
            String[] applicationProtocols) throws IOException {
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   507
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
        doClientAuth = clientAuth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
        enableSessionCreation = sessionCreation;
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   511
        this.identificationProtocol = identificationProtocol;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   512
        this.algorithmConstraints = algorithmConstraints;
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   513
        this.sniMatchers = sniMatchers;
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
   514
        this.preferLocalCipherSuites = preferLocalCipherSuites;
38865
429c08bd6158 8158978: ALPN not working when values are set directly on a SSLServerSocket
wetmore
parents: 37601
diff changeset
   515
        this.applicationProtocols = applicationProtocols;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
        init(context, serverMode);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
         * Override what was picked out for us.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
        enabledCipherSuites = suites;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
        enabledProtocols = protocols;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
     * Package-private constructor used to instantiate an unconnected
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
     * socket. The java.net package will connect it, either when the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
     * connect() call is made by the application.  This instance is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
     * meant to set handshake state to use "client mode".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
    SSLSocketImpl(SSLContextImpl context) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
        super();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
        init(context, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
     * Layer SSL traffic over an existing connection, rather than creating
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
     * a new connection.  The existing connection may be used only for SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
     * traffic (using this SSLSocket) until the SSLSocket.close() call
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
     * returns. However, if a protocol error is detected, that existing
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
     * connection is automatically closed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
     * <P> This particular constructor always uses the socket in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
     * role of an SSL client. It may be useful in cases which start
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
     * using SSL after some initial data transfers, for example in some
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
     * SSL tunneling applications or as part of some kinds of application
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
     * protocols which negotiate use of a SSL based security.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
     * @param sock the existing connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
     * @param context the authentication context to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
    SSLSocketImpl(SSLContextImpl context, Socket sock, String host,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
            int port, boolean autoClose) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
        super(sock);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
        // We always layer over a connected socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
        if (!sock.isConnected()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
            throw new SocketException("Underlying socket is not connected");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
        this.host = host;
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   562
        this.serverNames =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   563
            Utilities.addToSNIServerNameList(this.serverNames, this.host);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
        init(context, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
        this.autoClose = autoClose;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
        doneConnect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
    /**
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   570
     * Creates a server mode {@link Socket} layered over an
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   571
     * existing connected socket, and is able to read data which has
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   572
     * already been consumed/removed from the {@link Socket}'s
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   573
     * underlying {@link InputStream}.
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   574
     */
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   575
    SSLSocketImpl(SSLContextImpl context, Socket sock,
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   576
            InputStream consumed, boolean autoClose) throws IOException {
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   577
        super(sock, consumed);
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   578
        // We always layer over a connected socket
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   579
        if (!sock.isConnected()) {
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   580
            throw new SocketException("Underlying socket is not connected");
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   581
        }
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   582
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   583
        // In server mode, it is not necessary to set host and serverNames.
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   584
        // Otherwise, would require a reverse DNS lookup to get the hostname.
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   585
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   586
        init(context, true);
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   587
        this.autoClose = autoClose;
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   588
        doneConnect();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   589
    }
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   590
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   591
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
     * Initializes the client socket.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
    private void init(SSLContextImpl context, boolean isServer) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
        sslContext = context;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
        sess = SSLSessionImpl.nullSession;
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
   597
        handshakeSession = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
         * role is as specified, state is START until after
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
         * the low level connection's established.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
        roleIsServer = isServer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   604
        connectionState = cs_START;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   605
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   606
        // initial security parameters for secure renegotiation
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   607
        secureRenegotiation = false;
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   608
        clientVerifyData = new byte[0];
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   609
        serverVerifyData = new byte[0];
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
   610
9246
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
   611
        enabledCipherSuites =
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
   612
                sslContext.getDefaultCipherSuiteList(roleIsServer);
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
   613
        enabledProtocols =
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
   614
                sslContext.getDefaultProtocolList(roleIsServer);
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
   615
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   616
        inputRecord = new SSLSocketInputRecord();;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   617
        outputRecord = new SSLSocketOutputRecord();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   618
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   619
        maximumPacketSize = outputRecord.getMaxPacketSize();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
        // save the acc
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
        acc = AccessController.getContext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   623
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
        input = new AppInputStream(this);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
        output = new AppOutputStream(this);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
     * Connects this socket to the server with a specified timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
     * value.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   631
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
     * This method is either called on an unconnected SSLSocketImpl by the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
     * application, or it is called in the constructor of a regular
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
     * SSLSocketImpl. If we are layering on top on another socket, then
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
     * this method should not be called, because we assume that the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
     * underlying socket is already connected by the time it is passed to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
     * us.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
     * @param   endpoint the <code>SocketAddress</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
     * @param   timeout  the timeout value to be used, 0 is no timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
     * @throws  IOException if an error occurs during the connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
     * @throws  SocketTimeoutException if timeout expires before connecting
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
   644
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
    public void connect(SocketAddress endpoint, int timeout)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   648
        if (isLayered()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
            throw new SocketException("Already connected");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
        if (!(endpoint instanceof InetSocketAddress)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
            throw new SocketException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
                                  "Cannot handle non-Inet socket addresses.");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
        super.connect(endpoint, timeout);
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   658
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   659
        if (host == null || host.length() == 0) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   660
            useImplicitHost(false);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   661
        }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
   662
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
        doneConnect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
     * Initialize the handshaker and socket streams.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
     * Called by connect, the layered constructor, and SSLServerSocket.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   670
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
    void doneConnect() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
         * Save the input and output streams.  May be done only after
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
         * java.net actually connects using the socket "self", else
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
         * we get some pretty bizarre failure modes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
         */
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   677
        sockInput = super.getInputStream();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
   678
        sockOutput = super.getOutputStream();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   680
        inputRecord.setDeliverStream(sockOutput);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   681
        outputRecord.setDeliverStream(sockOutput);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   682
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
         * Move to handshaking state, with pending session initialized
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
         * to defaults and the appropriate kind of handshaker set up.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
        initHandshaker();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
   690
    private synchronized int getConnectionState() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
        return connectionState;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
   694
    private synchronized void setConnectionState(int state) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   695
        connectionState = state;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
    AccessControlContext getAcc() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
        return acc;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   700
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   701
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
    // READING AND WRITING RECORDS
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
    /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   707
     * Application data record output.
12428
e9feb65d37fa 7157903: JSSE client sockets are very slow
wetmore
parents: 11026
diff changeset
   708
     *
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   709
     * Application data can't be sent until the first handshake establishes
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   710
     * a session.
12428
e9feb65d37fa 7157903: JSSE client sockets are very slow
wetmore
parents: 11026
diff changeset
   711
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   712
    void writeRecord(byte[] source, int offset, int length) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
         * The loop is in case of HANDSHAKE --> ERROR transitions, etc
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
         */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   716
        // Don't bother to check the emptiness of source applicatoin data
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   717
        // before the security connection established.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   718
        for (boolean readyForApp = false; !readyForApp;) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
             * Not all states support passing application data.  We
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
             * synchronize access to the connection state, so that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
             * synchronous handshakes can complete cleanly.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
            switch (getConnectionState()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   726
                /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   727
                 * We've deferred the initial handshaking till just now,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   728
                 * when presumably a thread's decided it's OK to block for
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   729
                 * longish periods of time for I/O purposes (as well as
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   730
                 * configured the cipher suites it wants to use).
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   731
                 */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   732
                case cs_HANDSHAKE:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   733
                    performInitialHandshake();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   734
                    break;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   735
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   736
                case cs_DATA:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   737
                case cs_RENEGOTIATE:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   738
                    readyForApp = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   739
                    break;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   741
                case cs_ERROR:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   742
                    fatal(Alerts.alert_close_notify,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   743
                            "error while writing to socket");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   744
                    break; // dummy
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   745
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   746
                case cs_SENT_CLOSE:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   747
                case cs_CLOSED:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   748
                case cs_APP_CLOSED:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   749
                    // we should never get here (check in AppOutputStream)
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   750
                    // this is just a fallback
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   751
                    if (closeReason != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   752
                        throw closeReason;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   753
                    } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   754
                        throw new SocketException("Socket closed");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   755
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   757
                /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   758
                 * Else something's goofy in this state machine's use.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   759
                 */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   760
                default:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   761
                    throw new SSLProtocolException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   762
                            "State error, send app data");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
        // Don't bother to really write empty records.  We went this
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
        // far to drive the handshake machinery, for correctness; not
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
        // writing empty records improves performance by cutting CPU
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
        // time and network resource usage.  However, some protocol
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
        // implementations are fragile and don't like to see empty
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
        // records, so this also increases robustness.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   773
        //
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   774
        if (length > 0) {
34528
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   775
            IOException ioe = null;
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   776
            byte description = 0;    // 0: never used, make the compiler happy
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   777
            writeLock.lock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   778
            try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   779
                outputRecord.deliver(source, offset, length);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   780
            } catch (SSLHandshakeException she) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   781
                // may be record sequence number overflow
34528
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   782
                description = Alerts.alert_handshake_failure;
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   783
                ioe = she;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   784
            } catch (IOException e) {
34528
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   785
                description = Alerts.alert_unexpected_message;
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   786
                ioe = e;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   787
            } finally {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   788
                writeLock.unlock();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
            }
34528
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   790
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   791
            // Be care of deadlock. Please don't place the call to fatal()
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   792
            // into the writeLock locked block.
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   793
            if (ioe != null) {
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   794
                fatal(description, ioe);
279258fb670b 8141651: Deadlock in sun.security.ssl.SSLSocketImpl
xuelei
parents: 34380
diff changeset
   795
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
        }
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   797
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   798
        /*
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   799
         * Check the sequence number state
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   800
         *
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   801
         * Note that in order to maintain the connection I/O
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   802
         * properly, we check the sequence number after the last
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   803
         * record writing process. As we request renegotiation
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   804
         * or close the connection for wrapped sequence number
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   805
         * when there is enough sequence number space left to
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   806
         * handle a few more records, so the sequence number
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   807
         * of the last record cannot be wrapped.
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   808
         *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   809
         * Don't bother to kickstart the renegotiation when the
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   810
         * local is asking for it.
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
   811
         */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   812
        if ((connectionState == cs_DATA) && outputRecord.seqNumIsHuge()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   813
            /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   814
             * Ask for renegotiation when need to renew sequence number.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   815
             *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   816
             * Don't bother to kickstart the renegotiation when the local is
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   817
             * asking for it.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   818
             */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   819
            if (debug != null && Debug.isOn("ssl")) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   820
                System.out.println(Thread.currentThread().getName() +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   821
                        ", request renegotiation " +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   822
                        "to avoid sequence number overflow");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   823
            }
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   824
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   825
            startHandshake();
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   826
        }
100
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
   827
    }
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
   828
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   829
    /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   830
     * Alert record output.
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   831
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   832
    void writeAlert(byte level, byte description) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   833
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   834
        // If the record is a close notify alert, we need to honor
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   835
        // socket option SO_LINGER. Note that we will try to send
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   836
        // the close notify even if the SO_LINGER set to zero.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   837
        if ((description == Alerts.alert_close_notify) && getSoLinger() >= 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   838
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   839
            // keep and clear the current thread interruption status.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   840
            boolean interrupted = Thread.interrupted();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   841
            try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   842
                if (writeLock.tryLock(getSoLinger(), TimeUnit.SECONDS)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   843
                    try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   844
                        outputRecord.encodeAlert(level, description);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   845
                    } finally {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   846
                        writeLock.unlock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   847
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   848
                } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   849
                    SSLException ssle = new SSLException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   850
                            "SO_LINGER timeout," +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   851
                            " close_notify message cannot be sent.");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   852
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   853
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   854
                    // For layered, non-autoclose sockets, we are not
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   855
                    // able to bring them into a usable state, so we
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   856
                    // treat it as fatal error.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   857
                    if (isLayered() && !autoClose) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   858
                        // Note that the alert description is
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   859
                        // specified as -1, so no message will be send
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   860
                        // to peer anymore.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   861
                        fatal((byte)(-1), ssle);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   862
                    } else if ((debug != null) && Debug.isOn("ssl")) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   863
                        System.out.println(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   864
                            Thread.currentThread().getName() +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   865
                            ", received Exception: " + ssle);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   866
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   867
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   868
                    // RFC2246 requires that the session becomes
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   869
                    // unresumable if any connection is terminated
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   870
                    // without proper close_notify messages with
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   871
                    // level equal to warning.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   872
                    //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   873
                    // RFC4346 no longer requires that a session not be
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   874
                    // resumed if failure to properly close a connection.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   875
                    //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   876
                    // We choose to make the session unresumable if
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   877
                    // failed to send the close_notify message.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   878
                    //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   879
                    sess.invalidate();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   880
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   881
            } catch (InterruptedException ie) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   882
                // keep interrupted status
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   883
                interrupted = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   884
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   885
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   886
            // restore the interrupted status
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   887
            if (interrupted) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   888
                Thread.currentThread().interrupt();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   889
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   890
        } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   891
            writeLock.lock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   892
            try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   893
                outputRecord.encodeAlert(level, description);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   894
            } finally {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   895
                writeLock.unlock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   896
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   897
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   898
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   899
        // Don't bother to check sequence number overlap here.  If sequence
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   900
        // number is huge, there should be enough sequence number space to
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   901
        // request renegotiation in next application data read and write.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   902
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   903
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   905
    int bytesInCompletePacket() throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   906
        if (getConnectionState() == cs_HANDSHAKE) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   907
            performInitialHandshake();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   908
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   909
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   910
        synchronized (readLock) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   911
            int state = getConnectionState();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   912
            if ((state == cs_CLOSED) ||
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   913
                    (state == cs_ERROR) || (state == cs_APP_CLOSED)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   914
                return -1;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   915
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   916
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   917
            try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   918
                return inputRecord.bytesInCompletePacket(sockInput);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   919
            } catch (EOFException eofe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   920
                boolean handshaking = (connectionState <= cs_HANDSHAKE);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   921
                boolean rethrow = requireCloseNotify || handshaking;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   922
                if ((debug != null) && Debug.isOn("ssl")) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   923
                    System.out.println(Thread.currentThread().getName() +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   924
                        ", received EOFException: "
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   925
                        + (rethrow ? "error" : "ignored"));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   926
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   927
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   928
                if (!rethrow) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   929
                    // treat as if we had received a close_notify
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   930
                    closeInternal(false);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   931
                } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   932
                    SSLException e;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   933
                    if (handshaking) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   934
                        e = new SSLHandshakeException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   935
                            "Remote host terminated the handshake");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   936
                    } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   937
                        e = new SSLProtocolException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   938
                            "Remote host terminated the handshake");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   939
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   940
                    e.initCause(eofe);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   941
                    throw e;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   942
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   943
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   944
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   945
            return -1;
10915
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   946
        }
1e20964cebf3 7064341: jsse/runtime security problem
xuelei
parents: 9514
diff changeset
   947
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   949
    // the caller have synchronized readLock
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   950
    void expectingFinishFlight() {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   951
        inputRecord.expectingFinishFlight();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   952
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   953
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
    /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   955
     * Read an application data record.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   956
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   957
     * Alerts and handshake messages are internally handled directly.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   959
    int readRecord(ByteBuffer buffer) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
        if (getConnectionState() == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
            performInitialHandshake();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   963
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   964
        return readRecord(buffer, true);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   967
    /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   968
     * Read a record, no application data input required.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   969
     *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   970
     * Alerts and handshake messages are internally handled directly.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   971
     */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   972
    int readRecord(boolean needAppData) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   973
        return readRecord(null, needAppData);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   974
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   975
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
     * Clear the pipeline of records from the peer, optionally returning
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
     * application data.   Caller is responsible for knowing that it's
90ce3da70b43 Initial load
duke
parents:
diff changeset
   979
     * possible to do this kind of clearing, if they don't want app
90ce3da70b43 Initial load
duke
parents:
diff changeset
   980
     * data -- e.g. since it's the initial SSL handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   981
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   982
     * Don't synchronize (this) during a blocking read() since it
90ce3da70b43 Initial load
duke
parents:
diff changeset
   983
     * protects data which is accessed on the write side as well.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   984
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   985
    private int readRecord(ByteBuffer buffer, boolean needAppData)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
        int state;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
   989
        // readLock protects reading and processing of an SSLInputRecord.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   990
        // It keeps the reading from sockInput and processing of the record
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
        // atomic so that no two threads can be blocked on the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   992
        // read from the same input stream at the same time.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   993
        // This is required for example when a reader thread is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   994
        // blocked on the read and another thread is trying to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   995
        // close the socket. For a non-autoclose, layered socket,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   996
        // the thread performing the close needs to read the close_notify.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   997
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   998
        // Use readLock instead of 'this' for locking because
90ce3da70b43 Initial load
duke
parents:
diff changeset
   999
        // 'this' also protects data accessed during writing.
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1000
        synchronized (readLock) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1001
            /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1002
             * Read and handle records ... return application data
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1003
             * ONLY if it's needed.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1004
             */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1005
            Plaintext plainText = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1006
            while (((state = getConnectionState()) != cs_CLOSED) &&
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1007
                    (state != cs_ERROR) && (state != cs_APP_CLOSED)) {
36641
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1008
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1009
                /*
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1010
                 * clean the buffer and check if it is too small, e.g. because
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1011
                 * the AppInputStream did not have the chance to see the
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1012
                 * current packet length but rather something like that of the
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1013
                 * handshake before. In that case we return 0 at this point to
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1014
                 * give the caller the chance to adjust the buffer.
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1015
                 */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1016
                if (buffer != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1017
                    buffer.clear();
36641
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1018
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1019
                    if (buffer.remaining() <
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1020
                            inputRecord.bytesInCompletePacket(sockInput)) {
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1021
                        return 0;
cbff2fd02f9e 8149169: SSLSocketInputRecord.decodeInputRecord buffer overflow
clanger
parents: 34958
diff changeset
  1022
                    }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1023
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1025
                /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1026
                 * Read a record ... maybe emitting an alert if we get a
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1027
                 * comprehensible but unsupported "hello" message during
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1028
                 * format checking (e.g. V2).
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1029
                 */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1030
                try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1031
                    plainText = inputRecord.decode(sockInput, buffer);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1032
                } catch (BadPaddingException bpe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1033
                    byte alertType = (state != cs_DATA) ?
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1034
                            Alerts.alert_handshake_failure :
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1035
                            Alerts.alert_bad_record_mac;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1036
                    fatal(alertType, bpe.getMessage(), bpe);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1037
                } catch (SSLProtocolException spe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1038
                    try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1039
                        fatal(Alerts.alert_unexpected_message, spe);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1040
                    } catch (IOException x) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1041
                        // discard this exception, throw the original exception
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1042
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1043
                    throw spe;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1044
                } catch (SSLHandshakeException she) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1045
                    // may be record sequence number overflow
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1046
                    fatal(Alerts.alert_handshake_failure, she);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1047
                } catch (EOFException eof) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1048
                    boolean handshaking = (connectionState <= cs_HANDSHAKE);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1049
                    boolean rethrow = requireCloseNotify || handshaking;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1050
                    if ((debug != null) && Debug.isOn("ssl")) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1051
                        System.out.println(Thread.currentThread().getName() +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1052
                            ", received EOFException: "
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1053
                            + (rethrow ? "error" : "ignored"));
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1054
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1055
                    if (rethrow) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1056
                        SSLException e;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1057
                        if (handshaking) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1058
                            e = new SSLHandshakeException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1059
                                    "Remote host terminated the handshake");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1060
                        } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1061
                            e = new SSLProtocolException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1062
                                    "Remote host terminated the connection");
5182
62836694baeb 6898739: TLS renegotiation issue
xuelei
parents: 2068
diff changeset
  1063
                        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1064
                        e.initCause(eof);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1065
                        throw e;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1066
                    } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1067
                        // treat as if we had received a close_notify
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1068
                        closeInternal(false);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
                    }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1071
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1072
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1073
                // PlainText should never be null. Process input record.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1074
                int volume = processInputRecord(plainText, needAppData);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1075
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1076
                if (plainText.contentType == Record.ct_application_data) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1077
                    return volume;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1078
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1079
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1080
                if (plainText.contentType == Record.ct_handshake) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1081
                    if (!needAppData && connectionState == cs_DATA) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1082
                        return volume;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1083
                    }   // otherwise, need to read more for app data.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1084
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1086
                // continue to read more net data
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1087
            }   // while
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1089
            //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1090
            // couldn't read, due to some kind of error
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1091
            //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1092
            return -1;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1093
        }  // readLock synchronization
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1094
    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1095
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1096
    /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1097
     * Process the plainText input record.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1098
     */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1099
    private synchronized int processInputRecord(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1100
            Plaintext plainText, boolean needAppData) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1102
        /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1103
         * Process the record.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1104
         */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1105
        int volume = 0;    // no application data
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1106
        switch (plainText.contentType) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1107
            case Record.ct_handshake:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1108
                /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1109
                 * Handshake messages always go to a pending session
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1110
                 * handshaker ... if there isn't one, create one.  This
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1111
                 * must work asynchronously, for renegotiation.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1112
                 *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1113
                 * NOTE that handshaking will either resume a session
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1114
                 * which was in the cache (and which might have other
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1115
                 * connections in it already), or else will start a new
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1116
                 * session (new keys exchanged) with just this connection
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1117
                 * in it.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1118
                 */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1119
                initHandshaker();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1120
                if (!handshaker.activated()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1121
                    // prior to handshaking, activate the handshake
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1122
                    if (connectionState == cs_RENEGOTIATE) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1123
                        // don't use SSLv2Hello when renegotiating
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1124
                        handshaker.activate(protocolVersion);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1125
                    } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1126
                        handshaker.activate(null);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1127
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1128
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1130
                /*
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1131
                 * process the handshake record ... may contain just
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1132
                 * a partial handshake message or multiple messages.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1133
                 *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1134
                 * The handshaker state machine will ensure that it's
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1135
                 * a finished message.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1136
                 */
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1137
                handshaker.processRecord(plainText.fragment, expectingFinished);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1138
                expectingFinished = false;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1139
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1140
                if (handshaker.invalidated) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1141
                    handshaker = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1142
                    inputRecord.setHandshakeHash(null);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1143
                    outputRecord.setHandshakeHash(null);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1144
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1145
                    // if state is cs_RENEGOTIATE, revert it to cs_DATA
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1146
                    if (connectionState == cs_RENEGOTIATE) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1147
                        connectionState = cs_DATA;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
                    }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1149
                } else if (handshaker.isDone()) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1150
                    // reset the parameters for secure renegotiation.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1151
                    secureRenegotiation =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1152
                                    handshaker.isSecureRenegotiation();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1153
                    clientVerifyData = handshaker.getClientVerifyData();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1154
                    serverVerifyData = handshaker.getServerVerifyData();
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  1155
                    // set connection ALPN value
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  1156
                    applicationProtocol =
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  1157
                        handshaker.getHandshakeApplicationProtocol();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1159
                    sess = handshaker.getSession();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1160
                    handshakeSession = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1161
                    handshaker = null;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1162
                    inputRecord.setHandshakeHash(null);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1163
                    outputRecord.setHandshakeHash(null);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1164
                    connectionState = cs_DATA;
28543
31afdc0e77af 8046656: Update protocol support
wetmore
parents: 28059
diff changeset
  1165
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
                    //
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1167
                    // Tell folk about handshake completion, but do
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1168
                    // it in a separate thread.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
                    //
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1170
                    if (handshakeListeners != null) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1171
                        HandshakeCompletedEvent event =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1172
                            new HandshakeCompletedEvent(this, sess);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1173
34716
7477a052aecc 8056152: API to create Threads that do not inherit inheritable thread-local initial values
chegar
parents: 34528
diff changeset
  1174
                        Thread thread = new Thread(
7477a052aecc 8056152: API to create Threads that do not inherit inheritable thread-local initial values
chegar
parents: 34528
diff changeset
  1175
                            null,
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1176
                            new NotifyHandshake(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1177
                                handshakeListeners.entrySet(), event),
34716
7477a052aecc 8056152: API to create Threads that do not inherit inheritable thread-local initial values
chegar
parents: 34528
diff changeset
  1178
                            "HandshakeCompletedNotify-Thread",
7477a052aecc 8056152: API to create Threads that do not inherit inheritable thread-local initial values
chegar
parents: 34528
diff changeset
  1179
                            0,
7477a052aecc 8056152: API to create Threads that do not inherit inheritable thread-local initial values
chegar
parents: 34528
diff changeset
  1180
                            false);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1181
                        thread.start();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1182
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1183
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1184
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1185
                break;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1187
            case Record.ct_application_data:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1188
                if (connectionState != cs_DATA
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1189
                        && connectionState != cs_RENEGOTIATE
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1190
                        && connectionState != cs_SENT_CLOSE) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1191
                    throw new SSLProtocolException(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1192
                        "Data received in non-data state: " +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1193
                        connectionState);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1194
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1195
                if (expectingFinished) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1196
                    throw new SSLProtocolException
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1197
                            ("Expecting finished message, received data");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1198
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1199
                if (!needAppData) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1200
                    throw new SSLException("Discarding app data");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1201
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1202
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1203
                volume = plainText.fragment.remaining();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1204
                break;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1205
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1206
            case Record.ct_alert:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1207
                recvAlert(plainText.fragment);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1208
                break;
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1209
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1210
            case Record.ct_change_cipher_spec:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1211
                if ((connectionState != cs_HANDSHAKE
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1212
                        && connectionState != cs_RENEGOTIATE)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1213
                    // For the CCS message arriving in the wrong state
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1214
                    fatal(Alerts.alert_unexpected_message,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1215
                            "illegal change cipher spec msg, conn state = "
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1216
                            + connectionState);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1217
                } else if (plainText.fragment.remaining() != 1
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1218
                        || plainText.fragment.get() != 1) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1219
                    // For structural/content issues with the CCS
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1220
                    fatal(Alerts.alert_unexpected_message,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1221
                            "Malformed change cipher spec msg");
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1222
                }
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1223
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1224
                //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1225
                // The first message after a change_cipher_spec
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1226
                // record MUST be a "Finished" handshake record,
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1227
                // else it's a protocol violation.  We force this
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1228
                // to be checked by a minor tweak to the state
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1229
                // machine.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1230
                //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1231
                handshaker.receiveChangeCipherSpec();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1233
                CipherBox readCipher;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1234
                Authenticator readAuthenticator;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1235
                try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1236
                    readCipher = handshaker.newReadCipher();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1237
                    readAuthenticator = handshaker.newReadAuthenticator();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1238
                } catch (GeneralSecurityException e) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1239
                    // can't happen
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1240
                    throw new SSLException("Algorithm missing:  ", e);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1241
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1242
                inputRecord.changeReadCiphers(readAuthenticator, readCipher);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1244
                // next message MUST be a finished message
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1245
                expectingFinished = true;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1246
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1247
                break;
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1248
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1249
            default:
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1250
                //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1251
                // TLS requires that unrecognized records be ignored.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1252
                //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1253
                if (debug != null && Debug.isOn("ssl")) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1254
                    System.out.println(Thread.currentThread().getName() +
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1255
                        ", Received record type: " + plainText.contentType);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1256
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1257
                break;
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1258
        }
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1259
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1260
        /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1261
         * Check the sequence number state
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1262
         *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1263
         * Note that in order to maintain the connection I/O
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1264
         * properly, we check the sequence number after the last
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1265
         * record reading process. As we request renegotiation
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1266
         * or close the connection for wrapped sequence number
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1267
         * when there is enough sequence number space left to
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1268
         * handle a few more records, so the sequence number
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1269
         * of the last record cannot be wrapped.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1270
         *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1271
         * Don't bother to kickstart the renegotiation when the
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1272
         * local is asking for it.
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1273
         */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1274
        if ((connectionState == cs_DATA) && inputRecord.seqNumIsHuge()) {
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1275
            /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1276
             * Ask for renegotiation when need to renew sequence number.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1277
             *
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1278
             * Don't bother to kickstart the renegotiation when the local is
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1279
             * asking for it.
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1280
             */
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1281
            if (debug != null && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1282
                System.out.println(Thread.currentThread().getName() +
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1283
                        ", request renegotiation " +
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1284
                        "to avoid sequence number overflow");
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1285
            }
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1286
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1287
            startHandshake();
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1288
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1289
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1290
        return volume;
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1291
    }
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1292
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1293
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
    // HANDSHAKE RELATED CODE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
     * Return the AppInputStream. For use by Handshaker only.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
    AppInputStream getAppInputStream() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
        return input;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
    /**
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1306
     * Return the AppOutputStream. For use by Handshaker only.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
     */
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1308
    AppOutputStream getAppOutputStream() {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1309
        return output;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
     * Initialize the handshaker object. This means:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1315
     *  . if a handshake is already in progress (state is cs_HANDSHAKE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
     *    or cs_RENEGOTIATE), do nothing and return
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
     *  . if the socket is already closed, throw an Exception (internal error)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
     *  . otherwise (cs_START or cs_DATA), create the appropriate handshaker
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1321
     *    object, and advance the connection state (to cs_HANDSHAKE or
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1322
     *    cs_RENEGOTIATE, respectively).
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
     * This method is called right after a new socket is created, when
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
     * starting renegotiation, or when changing client/ server mode of the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
     * socket.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
    private void initHandshaker() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
        switch (connectionState) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
        // Starting a new handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
        case cs_START:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
        case cs_DATA:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
        // We're already in the middle of a handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
        case cs_HANDSHAKE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
        case cs_RENEGOTIATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
        // Anyone allowed to call this routine is required to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
        // do so ONLY if the connection state is reasonable...
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
        default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
            throw new IllegalStateException("Internal error");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1351
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1352
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
        // state is either cs_START or cs_DATA
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1354
        if (connectionState == cs_START) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
            connectionState = cs_HANDSHAKE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1356
        } else { // cs_DATA
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
            connectionState = cs_RENEGOTIATE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
        }
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  1359
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
        if (roleIsServer) {
5182
62836694baeb 6898739: TLS renegotiation issue
xuelei
parents: 2068
diff changeset
  1361
            handshaker = new ServerHandshaker(this, sslContext,
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1362
                    enabledProtocols, doClientAuth,
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1363
                    protocolVersion, connectionState == cs_HANDSHAKE,
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1364
                    secureRenegotiation, clientVerifyData, serverVerifyData);
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1365
            handshaker.setSNIMatchers(sniMatchers);
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
  1366
            handshaker.setUseCipherSuitesOrder(preferLocalCipherSuites);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1367
        } else {
5182
62836694baeb 6898739: TLS renegotiation issue
xuelei
parents: 2068
diff changeset
  1368
            handshaker = new ClientHandshaker(this, sslContext,
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1369
                    enabledProtocols,
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1370
                    protocolVersion, connectionState == cs_HANDSHAKE,
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1371
                    secureRenegotiation, clientVerifyData, serverVerifyData);
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1372
            handshaker.setSNIServerNames(serverNames);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1374
        handshaker.setMaximumPacketSize(maximumPacketSize);
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1375
        handshaker.setEnabledCipherSuites(enabledCipherSuites);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1376
        handshaker.setEnableSessionCreation(enableSessionCreation);
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  1377
        handshaker.setApplicationProtocols(applicationProtocols);
42706
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  1378
        handshaker.setApplicationProtocolSelectorSSLSocket(
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  1379
            applicationProtocolSelector);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
     * Synchronously perform the initial handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
     * If the handshake is already in progress, this method blocks until it
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1386
     * is completed. If the initial handshake has already been completed,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1387
     * it returns immediately.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
    private void performInitialHandshake() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
        // use handshakeLock and the state check to make sure only
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1391
        // one thread performs the handshake
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1392
        synchronized (handshakeLock) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1393
            if (getConnectionState() == cs_HANDSHAKE) {
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1394
                kickstartHandshake();
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1395
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
                /*
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1397
                 * All initial handshaking goes through this operation
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1398
                 * until we have a valid SSL connection.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1399
                 *
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1400
                 * Handle handshake messages only, need no application data.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1401
                 */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1402
                readRecord(false);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
     * Starts an SSL handshake on this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  1410
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
    public void startHandshake() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
        // start an ssl handshake that could be resumed from timeout exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
        startHandshake(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1417
     * Starts an ssl handshake on this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1418
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
     * @param resumable indicates the handshake process is resumable from a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
     *          certain exception. If <code>resumable</code>, the socket will
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
     *          be reserved for exceptions like timeout; otherwise, the socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
     *          will be closed, no further communications could be done.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
    private void startHandshake(boolean resumable) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
        checkWrite();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
            if (getConnectionState() == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
                // do initial handshake
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
                performInitialHandshake();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
                // start renegotiation
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
                kickstartHandshake();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
        } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
            // shutdown and rethrow (wrapped) exception as appropriate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
            handleException(e, resumable);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1439
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
     * Kickstart the handshake if it is not already in progress.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
     * This means:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1443
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1444
     *  . if handshaking is already underway, do nothing and return
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1445
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
     *  . if the socket is not connected or already closed, throw an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1447
     *    Exception.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1449
     *  . otherwise, call initHandshake() to initialize the handshaker
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
     *    object and progress the state. Then, send the initial
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
     *    handshaking message if appropriate (always on clients and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1452
     *    on servers when renegotiating).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1454
    private synchronized void kickstartHandshake() throws IOException {
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1455
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
        switch (connectionState) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
        case cs_HANDSHAKE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
            // handshaker already setup, proceed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
        case cs_DATA:
6856
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1463
            if (!secureRenegotiation && !Handshaker.allowUnsafeRenegotiation) {
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1464
                throw new SSLHandshakeException(
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1465
                        "Insecure renegotiation is not allowed");
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1466
            }
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1467
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1468
            if (!secureRenegotiation) {
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1469
                if (debug != null && Debug.isOn("handshake")) {
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1470
                    System.out.println(
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1471
                        "Warning: Using insecure renegotiation");
533f4ad71f88 6914943: Implement final TLS renegotiation fix
xuelei
parents: 5506
diff changeset
  1472
                }
5182
62836694baeb 6898739: TLS renegotiation issue
xuelei
parents: 2068
diff changeset
  1473
            }
62836694baeb 6898739: TLS renegotiation issue
xuelei
parents: 2068
diff changeset
  1474
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
            // initialize the handshaker, move to cs_RENEGOTIATE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
            initHandshaker();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
        case cs_RENEGOTIATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
            // handshaking already in progress, return
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
         * The only way to get a socket in the state is when
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
         * you have an unconnected socket.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
        case cs_START:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
            throw new SocketException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
                "handshaking attempted on unconnected socket");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
        default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
            throw new SocketException("connection is closed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
        // Kickstart handshake state machine if we need to ...
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
        //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
        // Note that handshaker.kickstart() writes the message
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
        // to its HandshakeOutStream, which calls back into
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
        // SSLSocketImpl.writeRecord() to send it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
        //
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1502
        if (!handshaker.activated()) {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1503
             // prior to handshaking, activate the handshake
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1504
            if (connectionState == cs_RENEGOTIATE) {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1505
                // don't use SSLv2Hello when renegotiating
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1506
                handshaker.activate(protocolVersion);
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1507
            } else {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1508
                handshaker.activate(null);
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1509
            }
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  1510
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
            if (handshaker instanceof ClientHandshaker) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
                // send client hello
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
                handshaker.kickstart();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
                if (connectionState == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
                    // initial handshake, no kickstart message to send
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
                    // we want to renegotiate, send hello request
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
                    handshaker.kickstart();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
    // CLOSURE RELATED CALLS
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
     * Return whether the socket has been explicitly closed by the application.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  1532
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
    public boolean isClosed() {
19223
e27cda06fe6a 8013809: deadlock in SSLSocketImpl between between write and close
xuelei
parents: 16913
diff changeset
  1534
        return connectionState == cs_APP_CLOSED;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
     * Return whether we have reached end-of-file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
     * If the socket is not connected, has been shutdown because of an error
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
     * or has been closed, throw an Exception.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
    boolean checkEOF() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
        switch (getConnectionState()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1545
        case cs_START:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
            throw new SocketException("Socket is not connected");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1547
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1548
        case cs_HANDSHAKE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1549
        case cs_DATA:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1550
        case cs_RENEGOTIATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1551
        case cs_SENT_CLOSE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1552
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1553
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1554
        case cs_APP_CLOSED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1555
            throw new SocketException("Socket is closed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1556
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1557
        case cs_ERROR:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1558
        case cs_CLOSED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1559
        default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1560
            // either closed because of error, or normal EOF
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1561
            if (closeReason == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1562
                return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1563
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1564
            IOException e = new SSLException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1565
                        ("Connection has been shutdown: " + closeReason);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
            e.initCause(closeReason);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1569
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1572
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1573
     * Check if we can write data to this socket. If not, throw an IOException.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1575
    void checkWrite() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1576
        if (checkEOF() || (getConnectionState() == cs_SENT_CLOSE)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
            // we are at EOF, write must throw Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
            throw new SocketException("Connection closed by remote host");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1579
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1582
    private void closeSocket() throws IOException {
1580
9af5946d4060 6745052: SLServerSocket file descriptor leak
xuelei
parents: 100
diff changeset
  1583
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1584
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1585
            System.out.println(Thread.currentThread().getName() +
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1586
                                                ", called closeSocket()");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1587
        }
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1588
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1589
        super.close();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1590
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1591
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1592
    private void closeSocket(boolean selfInitiated) throws IOException {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1593
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1594
            System.out.println(Thread.currentThread().getName() +
11018
be74e8b8f3eb 7111548: unexpected debug log message
xuelei
parents: 10336
diff changeset
  1595
                ", called closeSocket(" + selfInitiated + ")");
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1596
        }
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1597
        if (!isLayered() || autoClose) {
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1598
            super.close();
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1599
        } else if (selfInitiated) {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1600
            // layered && non-autoclose
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1601
            // read close_notify alert to clear input stream
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1602
            waitForClose(false);
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1603
        }
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1604
    }
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1605
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
     * Closing the connection is tricky ... we can't officially close the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
     * connection until we know the other end is ready to go away too,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
     * and if ever the connection gets aborted we must forget session
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
     * state (it becomes invalid).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
     * Closes the SSL connection.  SSL includes an application level
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
     * shutdown handshake; you should close SSL sockets explicitly
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
     * rather than leaving it for finalization, so that your remote
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
     * peer does not experience a protocol error.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  1619
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
    public void close() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1622
            System.out.println(Thread.currentThread().getName() +
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1623
                                                    ", called close()");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1624
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
        closeInternal(true);  // caller is initiating close
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1626
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1627
        // Clearup the resources.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1628
        try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1629
            synchronized (readLock) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1630
                inputRecord.close();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1631
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1632
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1633
            writeLock.lock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1634
            try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1635
                outputRecord.close();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1636
            } finally {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1637
                writeLock.unlock();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1638
            }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1639
        } catch (IOException ioe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1640
           // ignore
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1641
        }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1642
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
        setConnectionState(cs_APP_CLOSED);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1644
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
     * Don't synchronize the whole method because waitForClose()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
     * (which calls readRecord()) might be called.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
     * @param selfInitiated Indicates which party initiated the close.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
     * If selfInitiated, this side is initiating a close; for layered and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
     * non-autoclose socket, wait for close_notify response.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
     * If !selfInitiated, peer sent close_notify; we reciprocate but
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1654
     * no need to wait for response.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1655
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
    private void closeInternal(boolean selfInitiated) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1657
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1658
            System.out.println(Thread.currentThread().getName() +
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1659
                        ", called closeInternal(" + selfInitiated + ")");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1660
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1661
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1662
        int state = getConnectionState();
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1663
        boolean closeSocketCalled = false;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1664
        Throwable cachedThrowable = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1665
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1666
            switch (state) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1667
            case cs_START:
13370
785cedd026db 7179879: SSLSocket connect times out instead of throwing socket closed exception
coffeys
parents: 12428
diff changeset
  1668
                // unconnected socket or handshaking has not been initialized
785cedd026db 7179879: SSLSocket connect times out instead of throwing socket closed exception
coffeys
parents: 12428
diff changeset
  1669
                closeSocket(selfInitiated);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1670
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1671
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1672
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1673
             * If we're closing down due to error, we already sent (or else
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1674
             * received) the fatal alert ... no niceties, blow the connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1675
             * away as quickly as possible (even if we didn't allocate the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1676
             * socket ourselves; it's unusable, regardless).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1677
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1678
            case cs_ERROR:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1679
                closeSocket();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1680
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1681
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1682
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1683
             * Sometimes close() gets called more than once.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1684
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1685
            case cs_CLOSED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1686
            case cs_APP_CLOSED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1687
                 break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1688
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1689
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1690
             * Otherwise we indicate clean termination.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1691
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1692
            // case cs_HANDSHAKE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1693
            // case cs_DATA:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1694
            // case cs_RENEGOTIATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1695
            // case cs_SENT_CLOSE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1696
            default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1697
                synchronized (this) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1698
                    if (((state = getConnectionState()) == cs_CLOSED) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1699
                       (state == cs_ERROR) || (state == cs_APP_CLOSED)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1700
                        return;  // connection was closed while we waited
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1701
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1702
                    if (state != cs_SENT_CLOSE) {
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1703
                        try {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1704
                            warning(Alerts.alert_close_notify);
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1705
                            connectionState = cs_SENT_CLOSE;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1706
                        } catch (Throwable th) {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1707
                            // we need to ensure socket is closed out
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1708
                            // if we encounter any errors.
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1709
                            connectionState = cs_ERROR;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1710
                            // cache this for later use
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1711
                            cachedThrowable = th;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1712
                            closeSocketCalled = true;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1713
                            closeSocket(selfInitiated);
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1714
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1715
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1716
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1717
                // If state was cs_SENT_CLOSE before, we don't do the actual
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1718
                // closing since it is already in progress.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1719
                if (state == cs_SENT_CLOSE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1720
                    if (debug != null && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1721
                        System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1722
                            ", close invoked again; state = " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1723
                            getConnectionState());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1724
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1725
                    if (selfInitiated == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1726
                        // We were called because a close_notify message was
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1727
                        // received. This may be due to another thread calling
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1728
                        // read() or due to our call to waitForClose() below.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1729
                        // In either case, just return.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1730
                        return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1731
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1732
                    // Another thread explicitly called close(). We need to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1733
                    // wait for the closing to complete before returning.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1734
                    synchronized (this) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1735
                        while (connectionState < cs_CLOSED) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1736
                            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1737
                                this.wait();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1738
                            } catch (InterruptedException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1739
                                // ignore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1740
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1741
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1742
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1743
                    if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1744
                        System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1745
                            ", after primary close; state = " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1746
                            getConnectionState());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1747
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1748
                    return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1749
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1750
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1751
                if (!closeSocketCalled)  {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1752
                    closeSocketCalled = true;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1753
                    closeSocket(selfInitiated);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1754
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1755
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1756
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1757
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1758
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1759
            synchronized (this) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1760
                // Upon exit from this method, the state is always >= cs_CLOSED
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1761
                connectionState = (connectionState == cs_APP_CLOSED)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1762
                                ? cs_APP_CLOSED : cs_CLOSED;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1763
                // notify any threads waiting for the closing to finish
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1764
                this.notifyAll();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1765
            }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1766
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1767
            if (cachedThrowable != null) {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1768
               /*
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1769
                * Rethrow the error to the calling method
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1770
                * The Throwable caught can only be an Error or RuntimeException
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1771
                */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1772
                if (cachedThrowable instanceof Error) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1773
                    throw (Error)cachedThrowable;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1774
                } else if (cachedThrowable instanceof RuntimeException) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1775
                    throw (RuntimeException)cachedThrowable;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1776
                }   // Otherwise, unlikely
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1777
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1778
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1779
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1780
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1781
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1782
     * Reads a close_notify or a fatal alert from the input stream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1783
     * Keep reading records until we get a close_notify or until
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1784
     * the connection is otherwise closed.  The close_notify or alert
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1785
     * might be read by another reader,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1786
     * which will then process the close and set the connection state.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1787
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1788
    void waitForClose(boolean rethrow) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1789
        if (debug != null && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1790
            System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1791
                ", waiting for close_notify or alert: state "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1792
                + getConnectionState());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1793
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1794
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1795
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1796
            int state;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1797
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1798
            while (((state = getConnectionState()) != cs_CLOSED) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1799
                   (state != cs_ERROR) && (state != cs_APP_CLOSED)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1800
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1801
                // Ask for app data and then throw it away
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1802
                try {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1803
                    readRecord(true);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1804
                } catch (SocketTimeoutException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1805
                    // if time out, ignore the exception and continue
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1806
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1807
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1808
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1809
            if (debug != null && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1810
                System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1811
                    ", Exception while waiting for close " +e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1812
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1813
            if (rethrow) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1814
                throw e; // pass exception up
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1815
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1816
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1817
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1818
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1819
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1820
    // EXCEPTION AND ALERT HANDLING
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1821
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1822
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1823
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1824
     * Handle an exception. This method is called by top level exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1825
     * handlers (in read(), write()) to make sure we always shutdown the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1826
     * connection correctly and do not pass runtime exception to the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1827
     * application.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1828
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1829
    void handleException(Exception e) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1830
        handleException(e, true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1831
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1832
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1833
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1834
     * Handle an exception. This method is called by top level exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1835
     * handlers (in read(), write(), startHandshake()) to make sure we
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1836
     * always shutdown the connection correctly and do not pass runtime
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1837
     * exception to the application.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1838
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1839
     * This method never returns normally, it always throws an IOException.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1840
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1841
     * We first check if the socket has already been shutdown because of an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1842
     * error. If so, we just rethrow the exception. If the socket has not
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1843
     * been shutdown, we sent a fatal alert and remember the exception.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1844
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1845
     * @param e the Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1846
     * @param resumable indicates the caller process is resumable from the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1847
     *          exception. If <code>resumable</code>, the socket will be
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1848
     *          reserved for exceptions like timeout; otherwise, the socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1849
     *          will be closed, no further communications could be done.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1850
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  1851
    private synchronized void handleException(Exception e, boolean resumable)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1852
        throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1853
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1854
            System.out.println(Thread.currentThread().getName() +
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  1855
                        ", handling exception: " + e.toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1856
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1857
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1858
        // don't close the Socket in case of timeouts or interrupts if
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1859
        // the process is resumable.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1860
        if (e instanceof InterruptedIOException && resumable) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1861
            throw (IOException)e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1862
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1863
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1864
        // if we've already shutdown because of an error,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1865
        // there is nothing to do except rethrow the exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1866
        if (closeReason != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1867
            if (e instanceof IOException) { // includes SSLException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1868
                throw (IOException)e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1869
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1870
                // this is odd, not an IOException.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1871
                // normally, this should not happen
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1872
                // if closeReason has been already been set
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1873
                throw Alerts.getSSLException(Alerts.alert_internal_error, e,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1874
                                      "Unexpected exception");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1875
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1876
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1877
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1878
        // need to perform error shutdown
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1879
        boolean isSSLException = (e instanceof SSLException);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1880
        if ((!isSSLException) && (e instanceof IOException)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1881
            // IOException from the socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1882
            // this means the TCP connection is already dead
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1883
            // we call fatal just to set the error status
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1884
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1885
                fatal(Alerts.alert_unexpected_message, e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1886
            } catch (IOException ee) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1887
                // ignore (IOException wrapped in SSLException)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1888
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1889
            // rethrow original IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1890
            throw (IOException)e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1891
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1892
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1893
        // must be SSLException or RuntimeException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1894
        byte alertType;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1895
        if (isSSLException) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1896
            if (e instanceof SSLHandshakeException) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1897
                alertType = Alerts.alert_handshake_failure;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1898
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1899
                alertType = Alerts.alert_unexpected_message;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1900
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1901
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1902
            alertType = Alerts.alert_internal_error;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1903
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1904
        fatal(alertType, e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1905
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1906
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1907
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1908
     * Send a warning alert.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1909
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1910
    void warning(byte description) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1911
        sendAlert(Alerts.alert_warning, description);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1912
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1913
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1914
    synchronized void fatal(byte description, String diagnostic)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1915
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1916
        fatal(description, diagnostic, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1917
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1918
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1919
    synchronized void fatal(byte description, Throwable cause)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1920
            throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1921
        fatal(description, null, cause);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1922
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1923
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1924
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1925
     * Send a fatal alert, and throw an exception so that callers will
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1926
     * need to stand on their heads to accidentally continue processing.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1927
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1928
    synchronized void fatal(byte description, String diagnostic,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1929
            Throwable cause) throws IOException {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1930
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1931
        // Be care of deadlock. Please don't synchronize readLock.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1932
        try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1933
            inputRecord.close();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1934
        } catch (IOException ioe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1935
            // ignore
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1936
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1937
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1938
        sess.invalidate();
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  1939
        if (handshakeSession != null) {
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  1940
            handshakeSession.invalidate();
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  1941
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1942
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1943
        int oldState = connectionState;
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1944
        if (connectionState < cs_ERROR) {
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1945
            connectionState = cs_ERROR;
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1946
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1947
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1948
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1949
         * Has there been an error received yet?  If not, remember it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1950
         * By RFC 2246, we don't bother waiting for a response.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1951
         * Fatal errors require immediate shutdown.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1952
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1953
        if (closeReason == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1954
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1955
             * Try to clear the kernel buffer to avoid TCP connection resets.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1956
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1957
            if (oldState == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1958
                sockInput.skip(sockInput.available());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1959
            }
100
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  1960
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  1961
            // If the description equals -1, the alert won't be sent to peer.
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  1962
            if (description != -1) {
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  1963
                sendAlert(Alerts.alert_fatal, description);
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  1964
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1965
            if (cause instanceof SSLException) { // only true if != null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1966
                closeReason = (SSLException)cause;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1967
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1968
                closeReason =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1969
                    Alerts.getSSLException(description, cause, diagnostic);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1970
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1971
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1972
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1973
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1974
         * Clean up our side.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1975
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1976
        closeSocket();
1763
0a6b65d56746 6750401: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes,with PCKS11 provider
wetmore
parents: 1580
diff changeset
  1977
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1978
        // Be care of deadlock. Please don't synchronize writeLock.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1979
        try {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1980
            outputRecord.close();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1981
        } catch (IOException ioe) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1982
            // ignore
9514
bdb24db75fe8 7025227: SSLSocketImpl does not close the TCP layer socket if a close notify cannot be sent to the peer
coffeys
parents: 9246
diff changeset
  1983
        }
1763
0a6b65d56746 6750401: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes,with PCKS11 provider
wetmore
parents: 1580
diff changeset
  1984
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1985
        throw closeReason;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1986
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1987
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1988
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1989
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1990
     * Process an incoming alert ... caller must already have synchronized
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1991
     * access to "this".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1992
     */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1993
    private void recvAlert(ByteBuffer fragment) throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1994
        byte level = fragment.get();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1995
        byte description = fragment.get();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  1996
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1997
        if (description == -1) { // check for short message
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1998
            fatal(Alerts.alert_illegal_parameter, "Short alert message");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1999
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2000
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2001
        if (debug != null && (Debug.isOn("record") ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2002
                Debug.isOn("handshake"))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2003
            synchronized (System.out) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2004
                System.out.print(Thread.currentThread().getName());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2005
                System.out.print(", RECV " + protocolVersion + " ALERT:  ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2006
                if (level == Alerts.alert_fatal) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2007
                    System.out.print("fatal, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2008
                } else if (level == Alerts.alert_warning) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2009
                    System.out.print("warning, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2010
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2011
                    System.out.print("<level " + (0x0ff & level) + ">, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2012
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2013
                System.out.println(Alerts.alertDescription(description));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2014
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2015
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2016
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2017
        if (level == Alerts.alert_warning) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2018
            if (description == Alerts.alert_close_notify) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2019
                if (connectionState == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2020
                    fatal(Alerts.alert_unexpected_message,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2021
                                "Received close_notify during handshake");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2022
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2023
                    closeInternal(false);  // reply to close
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2024
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2025
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2026
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2027
                //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2028
                // The other legal warnings relate to certificates,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2029
                // e.g. no_certificate, bad_certificate, etc; these
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2030
                // are important to the handshaking code, which can
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2031
                // also handle illegal protocol alerts if needed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2032
                //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2033
                if (handshaker != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2034
                    handshaker.handshakeAlert(description);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2035
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2036
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2037
        } else { // fatal or unknown level
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2038
            String reason = "Received fatal alert: "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2039
                + Alerts.alertDescription(description);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2040
            if (closeReason == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2041
                closeReason = Alerts.getSSLException(description, reason);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2042
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2043
            fatal(Alerts.alert_unexpected_message, reason);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2044
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2045
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2046
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2047
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2048
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2049
     * Emit alerts.  Caller must have synchronized with "this".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2050
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2051
    private void sendAlert(byte level, byte description) {
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2052
        // the connectionState cannot be cs_START
100
01ef29ca378f 6447412: Issue with socket.close() for ssl sockets when poweroff on other system
xuelei
parents: 2
diff changeset
  2053
        if (connectionState >= cs_SENT_CLOSE) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2054
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2055
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2056
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2057
        // For initial handshaking, don't send alert message to peer if
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2058
        // handshaker has not started.
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2059
        //
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2060
        // Shall we send an fatal alter to terminate the connection gracefully?
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2061
        if (connectionState <= cs_HANDSHAKE &&
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2062
                (handshaker == null || !handshaker.started() ||
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2063
                        !handshaker.activated())) {
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2064
            return;
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2065
        }
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2066
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2067
        boolean useDebug = debug != null && Debug.isOn("ssl");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2068
        if (useDebug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2069
            synchronized (System.out) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2070
                System.out.print(Thread.currentThread().getName());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2071
                System.out.print(", SEND " + protocolVersion + " ALERT:  ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2072
                if (level == Alerts.alert_fatal) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2073
                    System.out.print("fatal, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2074
                } else if (level == Alerts.alert_warning) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2075
                    System.out.print("warning, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2076
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2077
                    System.out.print("<level = " + (0x0ff & level) + ">, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2078
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2079
                System.out.println("description = "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2080
                        + Alerts.alertDescription(description));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2081
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2082
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2083
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2084
        try {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2085
            writeAlert(level, description);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2086
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2087
            if (useDebug) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2088
                System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2089
                    ", Exception sending alert: " + e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2090
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2091
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2092
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2093
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2094
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2095
    // VARIOUS OTHER METHODS
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2096
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2097
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2098
    // used by Handshaker
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2099
    void changeWriteCiphers() throws IOException {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2100
        Authenticator writeAuthenticator;
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2101
        CipherBox writeCipher;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2102
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2103
            writeCipher = handshaker.newWriteCipher();
16913
a6f4d1626ad9 8011680: Re-integrate AEAD implementation of JSSE
xuelei
parents: 16126
diff changeset
  2104
            writeAuthenticator = handshaker.newWriteAuthenticator();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2105
        } catch (GeneralSecurityException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2106
            // "can't happen"
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 10128
diff changeset
  2107
            throw new SSLException("Algorithm missing:  ", e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2108
        }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2109
        outputRecord.changeWriteCiphers(writeAuthenticator, writeCipher);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2110
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2111
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2112
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2113
     * Updates the SSL version associated with this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2114
     * Called from Handshaker once it has determined the negotiated version.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2115
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2116
    synchronized void setVersion(ProtocolVersion protocolVersion) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2117
        this.protocolVersion = protocolVersion;
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2118
        outputRecord.setVersion(protocolVersion);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2119
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2120
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2121
    //
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2122
    // ONLY used by ClientHandshaker for the server hostname during handshaking
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2123
    //
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2124
    synchronized String getHost() {
2068
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
  2125
        // Note that the host may be null or empty for localhost.
cdbc5929b91e 5067458: Loopback SSLSocketImpl createSocket is throwing an exception
xuelei
parents: 1763
diff changeset
  2126
        if (host == null || host.length() == 0) {
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2127
            useImplicitHost(true);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2128
        }
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2129
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2130
        return host;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2131
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2132
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2133
    /*
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2134
     * Try to set and use the implicit specified hostname
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2135
     */
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2136
    private synchronized void useImplicitHost(boolean noSniUpdate) {
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2137
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2138
        // Note: If the local name service is not trustworthy, reverse
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2139
        // host name resolution should not be performed for endpoint
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2140
        // identification.  Use the application original specified
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2141
        // hostname or IP address instead.
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2142
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2143
        // Get the original hostname via jdk.internal.misc.SharedSecrets
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2144
        InetAddress inetAddress = getInetAddress();
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2145
        if (inetAddress == null) {      // not connected
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2146
            return;
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2147
        }
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2148
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2149
        JavaNetInetAddressAccess jna =
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2150
                SharedSecrets.getJavaNetInetAddressAccess();
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2151
        String originalHostname = jna.getOriginalHostName(inetAddress);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2152
        if ((originalHostname != null) &&
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2153
                (originalHostname.length() != 0)) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2154
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2155
            host = originalHostname;
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2156
            if (!noSniUpdate && serverNames.isEmpty() && !noSniExtension) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2157
                serverNames =
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2158
                        Utilities.addToSNIServerNameList(serverNames, host);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2159
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2160
                if (!roleIsServer &&
42778
3c8baf9075f1 8171337: Check for correct SSLEngineImpl/SSLSocketImpl.setSSLParameters handshaker update method
xuelei
parents: 42706
diff changeset
  2161
                        (handshaker != null) && !handshaker.activated()) {
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2162
                    handshaker.setSNIServerNames(serverNames);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2163
                }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2164
            }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2165
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2166
            return;
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2167
        }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2168
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2169
        // No explicitly specified hostname, no server name indication.
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2170
        if (!trustNameService) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2171
            // The local name service is not trustworthy, use IP address.
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2172
            host = inetAddress.getHostAddress();
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2173
        } else {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2174
            // Use the underlying reverse host name resolution service.
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2175
            host = getInetAddress().getHostName();
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2176
        }
31687
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2177
    }
d6eb4f028c60 8067694: Improved certification checking
xuelei
parents: 30904
diff changeset
  2178
5162
0dbedf4fdb8c 6614957: HttpsURLConnection not using the set SSLSocketFactory for creating all its Sockets
chegar
parents: 2068
diff changeset
  2179
    // ONLY used by HttpsClient to setup the URI specified hostname
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2180
    //
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2181
    // Please NOTE that this method MUST be called before calling to
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2182
    // SSLSocket.setSSLParameters(). Otherwise, the {@code host} parameter
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2183
    // may override SNIHostName in the customized server name indication.
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2184
    public synchronized void setHost(String host) {
5162
0dbedf4fdb8c 6614957: HttpsURLConnection not using the set SSLSocketFactory for creating all its Sockets
chegar
parents: 2068
diff changeset
  2185
        this.host = host;
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2186
        this.serverNames =
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2187
            Utilities.addToSNIServerNameList(this.serverNames, this.host);
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2188
42778
3c8baf9075f1 8171337: Check for correct SSLEngineImpl/SSLSocketImpl.setSSLParameters handshaker update method
xuelei
parents: 42706
diff changeset
  2189
        if (!roleIsServer && (handshaker != null) && !handshaker.activated()) {
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2190
            handshaker.setSNIServerNames(serverNames);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2191
        }
5162
0dbedf4fdb8c 6614957: HttpsURLConnection not using the set SSLSocketFactory for creating all its Sockets
chegar
parents: 2068
diff changeset
  2192
    }
0dbedf4fdb8c 6614957: HttpsURLConnection not using the set SSLSocketFactory for creating all its Sockets
chegar
parents: 2068
diff changeset
  2193
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2194
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2195
     * Gets an input stream to read from the peer on the other side.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2196
     * Data read from this stream was always integrity protected in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2197
     * transit, and will usually have been confidentiality protected.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2198
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2199
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2200
    public synchronized InputStream getInputStream() throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2201
        if (isClosed()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2202
            throw new SocketException("Socket is closed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2203
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2204
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2205
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2206
         * Can't call isConnected() here, because the Handshakers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2207
         * do some initialization before we actually connect.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2208
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2209
        if (connectionState == cs_START) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2210
            throw new SocketException("Socket is not connected");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2211
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2212
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2213
        return input;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2214
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2215
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2216
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2217
     * Gets an output stream to write to the peer on the other side.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2218
     * Data written on this stream is always integrity protected, and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2219
     * will usually be confidentiality protected.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2220
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2221
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2222
    public synchronized OutputStream getOutputStream() throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2223
        if (isClosed()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2224
            throw new SocketException("Socket is closed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2225
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2226
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2227
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2228
         * Can't call isConnected() here, because the Handshakers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2229
         * do some initialization before we actually connect.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2230
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2231
        if (connectionState == cs_START) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2232
            throw new SocketException("Socket is not connected");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2233
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2234
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2235
        return output;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2236
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2237
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2238
    /**
28059
e576535359cc 8067377: My hobby: caning, then then canning, the the can-can
martin
parents: 25859
diff changeset
  2239
     * Returns the SSL Session in use by this connection.  These can
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2240
     * be long lived, and frequently correspond to an entire login session
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2241
     * for some user.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2242
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2243
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2244
    public SSLSession getSession() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2245
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2246
         * Force a synchronous handshake, if appropriate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2247
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2248
        if (getConnectionState() == cs_HANDSHAKE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2249
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2250
                // start handshaking, if failed, the connection will be closed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2251
                startHandshake(false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2252
            } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2253
                // handshake failed. log and return a nullSession
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2254
                if (debug != null && Debug.isOn("handshake")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2255
                      System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2256
                          ", IOException in getSession():  " + e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2257
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2258
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2259
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2260
        synchronized (this) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2261
            return sess;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2262
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2263
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2264
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2265
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2266
    public synchronized SSLSession getHandshakeSession() {
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2267
        return handshakeSession;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2268
    }
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2269
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2270
    synchronized void setHandshakeSession(SSLSessionImpl session) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2271
        // update the fragment size, which may be negotiated during handshaking
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2272
        inputRecord.changeFragmentSize(session.getNegotiatedMaxFragSize());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2273
        outputRecord.changeFragmentSize(session.getNegotiatedMaxFragSize());
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2274
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2275
        handshakeSession = session;
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2276
    }
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2277
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2278
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2279
     * Controls whether new connections may cause creation of new SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2280
     * sessions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2281
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2282
     * As long as handshaking has not started, we can change
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2283
     * whether we enable session creations.  Otherwise,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2284
     * we will need to wait for the next handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2285
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2286
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2287
    public synchronized void setEnableSessionCreation(boolean flag) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2288
        enableSessionCreation = flag;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2289
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2290
        if ((handshaker != null) && !handshaker.activated()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2291
            handshaker.setEnableSessionCreation(enableSessionCreation);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2292
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2293
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2294
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2295
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2296
     * Returns true if new connections may cause creation of new SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2297
     * sessions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2298
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2299
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2300
    public synchronized boolean getEnableSessionCreation() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2301
        return enableSessionCreation;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2302
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2303
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2304
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2305
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2306
     * Sets the flag controlling whether a server mode socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2307
     * *REQUIRES* SSL client authentication.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2308
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2309
     * As long as handshaking has not started, we can change
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2310
     * whether client authentication is needed.  Otherwise,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2311
     * we will need to wait for the next handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2312
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2313
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2314
    public synchronized void setNeedClientAuth(boolean flag) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2315
        doClientAuth = (flag ? ClientAuthType.CLIENT_AUTH_REQUIRED :
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2316
                ClientAuthType.CLIENT_AUTH_NONE);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2317
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2318
        if ((handshaker != null) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2319
                (handshaker instanceof ServerHandshaker) &&
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2320
                !handshaker.activated()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2321
            ((ServerHandshaker) handshaker).setClientAuth(doClientAuth);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2322
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2323
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2324
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2325
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2326
    public synchronized boolean getNeedClientAuth() {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2327
        return (doClientAuth == ClientAuthType.CLIENT_AUTH_REQUIRED);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2328
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2329
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2330
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2331
     * Sets the flag controlling whether a server mode socket
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2332
     * *REQUESTS* SSL client authentication.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2333
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2334
     * As long as handshaking has not started, we can change
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2335
     * whether client authentication is requested.  Otherwise,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2336
     * we will need to wait for the next handshake.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2337
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2338
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2339
    public synchronized void setWantClientAuth(boolean flag) {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2340
        doClientAuth = (flag ? ClientAuthType.CLIENT_AUTH_REQUESTED :
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2341
                ClientAuthType.CLIENT_AUTH_NONE);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2342
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2343
        if ((handshaker != null) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2344
                (handshaker instanceof ServerHandshaker) &&
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2345
                !handshaker.activated()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2346
            ((ServerHandshaker) handshaker).setClientAuth(doClientAuth);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2347
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2348
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2349
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2350
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2351
    public synchronized boolean getWantClientAuth() {
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2352
        return (doClientAuth == ClientAuthType.CLIENT_AUTH_REQUESTED);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2353
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2354
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2355
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2356
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2357
     * Sets the flag controlling whether the socket is in SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2358
     * client or server mode.  Must be called before any SSL
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2359
     * traffic has started.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2360
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2361
    @Override
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 10128
diff changeset
  2362
    @SuppressWarnings("fallthrough")
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2363
    public synchronized void setUseClientMode(boolean flag) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2364
        switch (connectionState) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2365
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2366
        case cs_START:
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2367
            /*
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2368
             * If we need to change the socket mode and the enabled
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2369
             * protocols and cipher suites haven't specifically been
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2370
             * set by the user, change them to the corresponding
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2371
             * default ones.
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2372
             */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2373
            if (roleIsServer != (!flag)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2374
                if (sslContext.isDefaultProtocolList(enabledProtocols)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2375
                    enabledProtocols =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2376
                            sslContext.getDefaultProtocolList(!flag);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2377
                }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2378
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2379
                if (sslContext.isDefaultCipherSuiteList(enabledCipherSuites)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2380
                    enabledCipherSuites =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2381
                            sslContext.getDefaultCipherSuiteList(!flag);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2382
                }
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2383
            }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2384
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2385
            roleIsServer = !flag;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2386
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2387
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2388
        case cs_HANDSHAKE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2389
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2390
             * If we have a handshaker, but haven't started
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2391
             * SSL traffic, we can throw away our current
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2392
             * handshaker, and start from scratch.  Don't
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2393
             * need to call doneConnect() again, we already
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2394
             * have the streams.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2395
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2396
            assert(handshaker != null);
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2397
            if (!handshaker.activated()) {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2398
                /*
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2399
                 * If we need to change the socket mode and the enabled
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2400
                 * protocols and cipher suites haven't specifically been
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2401
                 * set by the user, change them to the corresponding
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2402
                 * default ones.
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2403
                 */
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2404
                if (roleIsServer != (!flag)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2405
                    if (sslContext.isDefaultProtocolList(enabledProtocols)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2406
                        enabledProtocols =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2407
                                sslContext.getDefaultProtocolList(!flag);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2408
                    }
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2409
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2410
                    if (sslContext.isDefaultCipherSuiteList(
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2411
                                                    enabledCipherSuites)) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2412
                        enabledCipherSuites =
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2413
                            sslContext.getDefaultCipherSuiteList(!flag);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2414
                    }
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2415
                }
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2416
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2417
                roleIsServer = !flag;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2418
                connectionState = cs_START;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2419
                initHandshaker();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2420
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2421
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2422
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2423
            // If handshake has started, that's an error.  Fall through...
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2424
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2425
        default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2426
            if (debug != null && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2427
                System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2428
                    ", setUseClientMode() invoked in state = " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2429
                    connectionState);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2430
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2431
            throw new IllegalArgumentException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2432
                "Cannot change mode after SSL traffic has started");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2433
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2434
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2435
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2436
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2437
    public synchronized boolean getUseClientMode() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2438
        return !roleIsServer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2439
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2440
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2441
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2442
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2443
     * Returns the names of the cipher suites which could be enabled for use
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2444
     * on an SSL connection.  Normally, only a subset of these will actually
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2445
     * be enabled by default, since this list may include cipher suites which
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2446
     * do not support the mutual authentication of servers and clients, or
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2447
     * which do not protect data confidentiality.  Servers may also need
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2448
     * certain kinds of certificates to use certain cipher suites.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2449
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2450
     * @return an array of cipher suite names
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2451
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2452
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2453
    public String[] getSupportedCipherSuites() {
13815
2de30ecf335e 7199066: Typo in method name
xuelei
parents: 13370
diff changeset
  2454
        return sslContext.getSupportedCipherSuiteList().toStringArray();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2455
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2456
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2457
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2458
     * Controls which particular cipher suites are enabled for use on
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2459
     * this connection.  The cipher suites must have been listed by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2460
     * getCipherSuites() as being supported.  Even if a suite has been
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2461
     * enabled, it might never be used if no peer supports it or the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2462
     * requisite certificates (and private keys) are not available.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2463
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2464
     * @param suites Names of all the cipher suites to enable.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2465
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2466
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2467
    public synchronized void setEnabledCipherSuites(String[] suites) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2468
        enabledCipherSuites = new CipherSuiteList(suites);
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2469
        if ((handshaker != null) && !handshaker.activated()) {
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2470
            handshaker.setEnabledCipherSuites(enabledCipherSuites);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2471
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2472
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2473
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2474
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2475
     * Returns the names of the SSL cipher suites which are currently enabled
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2476
     * for use on this connection.  When an SSL socket is first created,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2477
     * all enabled cipher suites <em>(a)</em> protect data confidentiality,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2478
     * by traffic encryption, and <em>(b)</em> can mutually authenticate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2479
     * both clients and servers.  Thus, in some environments, this value
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2480
     * might be empty.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2481
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2482
     * @return an array of cipher suite names
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2483
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2484
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2485
    public synchronized String[] getEnabledCipherSuites() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2486
        return enabledCipherSuites.toStringArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2487
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2488
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2489
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2490
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2491
     * Returns the protocols that are supported by this implementation.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2492
     * A subset of the supported protocols may be enabled for this connection
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2493
     * @return an array of protocol names.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2494
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2495
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2496
    public String[] getSupportedProtocols() {
9246
c459f79af46b 6976117: SSLContext.getInstance("TLSv1.1") returns SSLEngines/SSLSockets without TLSv1.1 enabled
xuelei
parents: 7043
diff changeset
  2497
        return sslContext.getSuportedProtocolList().toStringArray();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2498
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2499
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2500
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2501
     * Controls which protocols are enabled for use on
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2502
     * this connection.  The protocols must have been listed by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2503
     * getSupportedProtocols() as being supported.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2504
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2505
     * @param protocols protocols to enable.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2506
     * @exception IllegalArgumentException when one of the protocols
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2507
     *  named by the parameter is not supported.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2508
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2509
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2510
    public synchronized void setEnabledProtocols(String[] protocols) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2511
        enabledProtocols = new ProtocolList(protocols);
7039
6464c8e62a18 4873188: Support TLS 1.1
xuelei
parents: 6856
diff changeset
  2512
        if ((handshaker != null) && !handshaker.activated()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2513
            handshaker.setEnabledProtocols(enabledProtocols);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2514
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2515
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2516
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2517
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2518
    public synchronized String[] getEnabledProtocols() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2519
        return enabledProtocols.toStringArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2520
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2521
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2522
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2523
     * Assigns the socket timeout.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2524
     * @see java.net.Socket#setSoTimeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2525
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2526
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2527
    public void setSoTimeout(int timeout) throws SocketException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2528
        if ((debug != null) && Debug.isOn("ssl")) {
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2529
            System.out.println(Thread.currentThread().getName() +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2530
                ", setSoTimeout(" + timeout + ") called");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2531
        }
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2532
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2533
        super.setSoTimeout(timeout);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2534
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2535
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2536
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2537
     * Registers an event listener to receive notifications that an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2538
     * SSL handshake has completed on this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2539
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2540
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2541
    public synchronized void addHandshakeCompletedListener(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2542
            HandshakeCompletedListener listener) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2543
        if (listener == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2544
            throw new IllegalArgumentException("listener is null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2545
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2546
        if (handshakeListeners == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2547
            handshakeListeners = new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2548
                HashMap<HandshakeCompletedListener, AccessControlContext>(4);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2549
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2550
        handshakeListeners.put(listener, AccessController.getContext());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2551
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2552
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2553
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2554
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2555
     * Removes a previously registered handshake completion listener.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2556
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2557
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2558
    public synchronized void removeHandshakeCompletedListener(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2559
            HandshakeCompletedListener listener) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2560
        if (handshakeListeners == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2561
            throw new IllegalArgumentException("no listeners");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2562
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2563
        if (handshakeListeners.remove(listener) == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2564
            throw new IllegalArgumentException("listener not registered");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2565
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2566
        if (handshakeListeners.isEmpty()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2567
            handshakeListeners = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2568
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2569
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2570
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2571
    /**
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2572
     * Returns the SSLParameters in effect for this SSLSocket.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2573
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2574
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2575
    public synchronized SSLParameters getSSLParameters() {
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2576
        SSLParameters params = super.getSSLParameters();
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2577
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2578
        // the super implementation does not handle the following parameters
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2579
        params.setEndpointIdentificationAlgorithm(identificationProtocol);
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2580
        params.setAlgorithmConstraints(algorithmConstraints);
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2581
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2582
        if (sniMatchers.isEmpty() && !noSniMatcher) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2583
            // 'null' indicates none has been set
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2584
            params.setSNIMatchers(null);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2585
        } else {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2586
            params.setSNIMatchers(sniMatchers);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2587
        }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2588
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2589
        if (serverNames.isEmpty() && !noSniExtension) {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2590
            // 'null' indicates none has been set
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2591
            params.setServerNames(null);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2592
        } else {
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2593
            params.setServerNames(serverNames);
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2594
        }
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2595
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
  2596
        params.setUseCipherSuitesOrder(preferLocalCipherSuites);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2597
        params.setMaximumPacketSize(maximumPacketSize);
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2598
        params.setApplicationProtocols(applicationProtocols);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2599
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2600
        // DTLS handshake retransmissions parameter does not apply here.
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2601
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2602
        return params;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2603
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2604
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2605
    /**
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2606
     * Applies SSLParameters to this socket.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2607
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2608
    @Override
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31918
diff changeset
  2609
    public synchronized void setSSLParameters(SSLParameters params) {
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2610
        super.setSSLParameters(params);
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2611
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2612
        // the super implementation does not handle the following parameters
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2613
        identificationProtocol = params.getEndpointIdentificationAlgorithm();
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2614
        algorithmConstraints = params.getAlgorithmConstraints();
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
  2615
        preferLocalCipherSuites = params.getUseCipherSuitesOrder();
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2616
        maximumPacketSize = params.getMaximumPacketSize();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2617
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2618
        // DTLS handshake retransmissions parameter does not apply here.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2619
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2620
        if (maximumPacketSize != 0) {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2621
            outputRecord.changePacketSize(maximumPacketSize);
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2622
        } else {
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2623
            // use the implicit maximum packet size.
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2624
            maximumPacketSize = outputRecord.getMaxPacketSize();
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2625
        }
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2626
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2627
        List<SNIServerName> sniNames = params.getServerNames();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2628
        if (sniNames != null) {
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2629
            noSniExtension = sniNames.isEmpty();
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2630
            serverNames = sniNames;
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2631
        }
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2632
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2633
        Collection<SNIMatcher> matchers = params.getSNIMatchers();
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2634
        if (matchers != null) {
37601
6517589dcc94 8144566: Custom HostnameVerifier disables SNI extension
xuelei
parents: 36641
diff changeset
  2635
            noSniMatcher = matchers.isEmpty();
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2636
            sniMatchers = matchers;
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2637
        }
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2638
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2639
        applicationProtocols = params.getApplicationProtocols();
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2640
42778
3c8baf9075f1 8171337: Check for correct SSLEngineImpl/SSLSocketImpl.setSSLParameters handshaker update method
xuelei
parents: 42706
diff changeset
  2641
        if ((handshaker != null) && !handshaker.activated()) {
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2642
            handshaker.setIdentificationProtocol(identificationProtocol);
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2643
            handshaker.setAlgorithmConstraints(algorithmConstraints);
30904
ec0224270f90 8043758: Datagram Transport Layer Security (DTLS)
xuelei
parents: 29923
diff changeset
  2644
            handshaker.setMaximumPacketSize(maximumPacketSize);
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2645
            handshaker.setApplicationProtocols(applicationProtocols);
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2646
            if (roleIsServer) {
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2647
                handshaker.setSNIMatchers(sniMatchers);
19823
f0fd09e20528 7188657: There should be a way to reorder the JSSE ciphers
xuelei
parents: 19223
diff changeset
  2648
                handshaker.setUseCipherSuitesOrder(preferLocalCipherSuites);
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2649
            } else {
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2650
                handshaker.setSNIServerNames(serverNames);
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2651
            }
7043
5e2d1edeb2c7 6916074: Add support for TLS 1.2
xuelei
parents: 7039
diff changeset
  2652
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2653
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2654
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2655
    @Override
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2656
    public synchronized String getApplicationProtocol() {
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2657
        return applicationProtocol;
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2658
    }
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2659
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2660
    @Override
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2661
    public synchronized String getHandshakeApplicationProtocol() {
34958
82de431119cd 8145849: ALPN: getHandshakeApplicationProtocol() always return null
wetmore
parents: 34716
diff changeset
  2662
        if ((handshaker != null) && handshaker.started()) {
34380
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2663
            return handshaker.getHandshakeApplicationProtocol();
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2664
        }
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2665
        return null;
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2666
    }
2b2609379881 8144093: JEP 244/8051498 - TLS Application-Layer Protocol Negotiation Extension
vinnie
parents: 32834
diff changeset
  2667
42706
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2668
    @Override
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2669
    public synchronized void setHandshakeApplicationProtocolSelector(
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2670
        BiFunction<SSLSocket, List<String>, String> selector) {
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2671
        applicationProtocolSelector = selector;
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2672
        if ((handshaker != null) && !handshaker.activated()) {
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2673
            handshaker.setApplicationProtocolSelectorSSLSocket(selector);
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2674
        }
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2675
    }
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2676
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2677
    @Override
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2678
    public synchronized BiFunction<SSLSocket, List<String>, String>
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2679
        getHandshakeApplicationProtocolSelector() {
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2680
        return this.applicationProtocolSelector;
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2681
    }
796cf076d69b 8170282: Enable ALPN parameters to be supplied during the TLS handshake
vinnie
parents: 38865
diff changeset
  2682
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2683
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2684
    // We allocate a separate thread to deliver handshake completion
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2685
    // events.  This ensures that the notifications don't block the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2686
    // protocol state machine.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2687
    //
29923
e3ee0996bedb 8042332: Enhance thread contexts in security libraries
valeriep
parents: 28550
diff changeset
  2688
    private static class NotifyHandshake implements Runnable {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2689
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2690
        private Set<Map.Entry<HandshakeCompletedListener,AccessControlContext>>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2691
                targets;        // who gets notified
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2692
        private HandshakeCompletedEvent event;          // the notification
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2693
29923
e3ee0996bedb 8042332: Enhance thread contexts in security libraries
valeriep
parents: 28550
diff changeset
  2694
        NotifyHandshake(
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2695
            Set<Map.Entry<HandshakeCompletedListener,AccessControlContext>>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2696
            entrySet, HandshakeCompletedEvent e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2697
10128
f505a8514bd7 7065972: Some race condition may happen in SSLSocketImpl class
xuelei
parents: 9514
diff changeset
  2698
            targets = new HashSet<>(entrySet);          // clone the entry set
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2699
            event = e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2700
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2701
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2702
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2703
        public void run() {
10128
f505a8514bd7 7065972: Some race condition may happen in SSLSocketImpl class
xuelei
parents: 9514
diff changeset
  2704
            // Don't need to synchronize, as it only runs in one thread.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2705
            for (Map.Entry<HandshakeCompletedListener,AccessControlContext>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2706
                entry : targets) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2707
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2708
                final HandshakeCompletedListener l = entry.getKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2709
                AccessControlContext acc = entry.getValue();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2710
                AccessController.doPrivileged(new PrivilegedAction<Void>() {
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2711
                    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2712
                    public Void run() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2713
                        l.handshakeCompleted(event);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2714
                        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2715
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2716
                }, acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2717
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2718
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2719
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2720
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2721
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2722
     * Returns a printable representation of this end of the connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2723
     */
14664
e71aa0962e70 8003950: Adds missing Override annotations and removes unnecessary imports in sun.security.ssl
xuelei
parents: 14194
diff changeset
  2724
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2725
    public String toString() {
24969
afa6934dd8e8 8041679: Replace uses of StringBuffer with StringBuilder within core library classes
psandoz
parents: 21278
diff changeset
  2726
        StringBuilder retval = new StringBuilder(80);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2727
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2728
        retval.append(Integer.toHexString(hashCode()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2729
        retval.append("[");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2730
        retval.append(sess.getCipherSuite());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2731
        retval.append(": ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2732
14194
971f46db533d 7068321: Support TLS Server Name Indication (SNI) Extension in JSSE Server
xuelei
parents: 13815
diff changeset
  2733
        retval.append(super.toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2734
        retval.append("]");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2735
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2736
        return retval.toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2737
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2738
}