src/java.base/share/classes/sun/security/ssl/ECDHKeyExchange.java
author chegar
Thu, 17 Oct 2019 20:54:25 +0100
branchdatagramsocketimpl-branch
changeset 58679 9c3209ff7550
parent 58678 9cf78a70fa4f
parent 57718 a93b7b28f644
permissions -rw-r--r--
datagramsocketimpl-branch: merge with default
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     1
/*
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
     2
 * Copyright (c) 2018, 2019, Oracle and/or its affiliates. All rights reserved.
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     4
 *
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    10
 *
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    15
 * accompanied this code).
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    16
 *
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    20
 *
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    23
 * questions.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    24
 */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    25
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    26
package sun.security.ssl;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    27
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    28
import java.io.IOException;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    29
import java.security.AlgorithmConstraints;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    30
import java.security.CryptoPrimitive;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    31
import java.security.GeneralSecurityException;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    32
import java.security.KeyFactory;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    33
import java.security.KeyPair;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    34
import java.security.KeyPairGenerator;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    35
import java.security.PrivateKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    36
import java.security.PublicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    37
import java.security.SecureRandom;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    38
import java.security.interfaces.ECPublicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    39
import java.security.spec.ECParameterSpec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    40
import java.security.spec.ECPoint;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    41
import java.security.spec.ECPublicKeySpec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    42
import java.util.EnumSet;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    43
import javax.crypto.KeyAgreement;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    44
import javax.crypto.SecretKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    45
import javax.net.ssl.SSLHandshakeException;
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
    46
import sun.security.ssl.NamedGroup.NamedGroupSpec;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    47
import sun.security.ssl.SupportedGroupsExtension.SupportedGroups;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    48
import sun.security.ssl.X509Authentication.X509Credentials;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    49
import sun.security.ssl.X509Authentication.X509Possession;
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    50
import sun.security.ssl.XDHKeyExchange.XDHECredentials;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    51
import sun.security.ssl.XDHKeyExchange.XDHEPossession;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    52
import sun.security.util.ECUtil;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    53
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    54
final class ECDHKeyExchange {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    55
    static final SSLPossessionGenerator poGenerator =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    56
            new ECDHEPossessionGenerator();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    57
    static final SSLKeyAgreementGenerator ecdhKAGenerator =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    58
            new ECDHKAGenerator();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    59
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    60
    // TLSv1.3
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    61
    static final SSLKeyAgreementGenerator ecdheKAGenerator =
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    62
            new ECDHEKAGenerator();
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    63
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    64
    // TLSv1-1.2, the KA gets more difficult with EC/XEC keys
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    65
    static final SSLKeyAgreementGenerator ecdheXdhKAGenerator =
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    66
            new ECDHEXDHKAGenerator();
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    67
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    68
    static final class ECDHECredentials implements NamedGroupCredentials {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    69
        final ECPublicKey popPublicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    70
        final NamedGroup namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    71
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    72
        ECDHECredentials(ECPublicKey popPublicKey, NamedGroup namedGroup) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    73
            this.popPublicKey = popPublicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    74
            this.namedGroup = namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    75
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    76
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    77
        @Override
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    78
        public PublicKey getPublicKey() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    79
            return popPublicKey;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    80
        }
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    81
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    82
        @Override
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    83
        public NamedGroup getNamedGroup() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    84
            return namedGroup;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    85
        }
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
    86
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    87
        static ECDHECredentials valueOf(NamedGroup namedGroup,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    88
            byte[] encodedPoint) throws IOException, GeneralSecurityException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    89
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
    90
            if (namedGroup.spec != NamedGroupSpec.NAMED_GROUP_ECDHE) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    91
                throw new RuntimeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    92
                    "Credentials decoding:  Not ECDHE named group");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    93
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    94
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    95
            if (encodedPoint == null || encodedPoint.length == 0) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    96
                return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    97
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    98
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
    99
            ECParameterSpec parameters =
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   100
                    (ECParameterSpec)namedGroup.keAlgParamSpec;
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   101
            ECPoint point = ECUtil.decodePoint(
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   102
                    encodedPoint, parameters.getCurve());
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   103
            KeyFactory factory = KeyFactory.getInstance("EC");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   104
            ECPublicKey publicKey = (ECPublicKey)factory.generatePublic(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   105
                    new ECPublicKeySpec(point, parameters));
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   106
            return new ECDHECredentials(publicKey, namedGroup);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   107
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   108
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   109
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   110
    static final class ECDHEPossession implements NamedGroupPossession {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   111
        final PrivateKey privateKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   112
        final ECPublicKey publicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   113
        final NamedGroup namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   114
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   115
        ECDHEPossession(NamedGroup namedGroup, SecureRandom random) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   116
            try {
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   117
                KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC");
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   118
                kpg.initialize(namedGroup.keAlgParamSpec, random);
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   119
                KeyPair kp = kpg.generateKeyPair();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   120
                privateKey = kp.getPrivate();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   121
                publicKey = (ECPublicKey)kp.getPublic();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   122
            } catch (GeneralSecurityException e) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   123
                throw new RuntimeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   124
                    "Could not generate ECDH keypair", e);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   125
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   126
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   127
            this.namedGroup = namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   128
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   129
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   130
        ECDHEPossession(ECDHECredentials credentials, SecureRandom random) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   131
            ECParameterSpec params = credentials.popPublicKey.getParams();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   132
            try {
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   133
                KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   134
                kpg.initialize(params, random);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   135
                KeyPair kp = kpg.generateKeyPair();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   136
                privateKey = kp.getPrivate();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   137
                publicKey = (ECPublicKey)kp.getPublic();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   138
            } catch (GeneralSecurityException e) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   139
                throw new RuntimeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   140
                    "Could not generate ECDH keypair", e);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   141
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   142
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   143
            this.namedGroup = credentials.namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   144
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   145
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   146
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   147
        public byte[] encode() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   148
            return ECUtil.encodePoint(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   149
                    publicKey.getW(), publicKey.getParams().getCurve());
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   150
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   151
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   152
        // called by ClientHandshaker with either the server's static or
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   153
        // ephemeral public key
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   154
        SecretKey getAgreedSecret(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   155
                PublicKey peerPublicKey) throws SSLHandshakeException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   156
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   157
            try {
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   158
                KeyAgreement ka = KeyAgreement.getInstance("ECDH");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   159
                ka.init(privateKey);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   160
                ka.doPhase(peerPublicKey, true);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   161
                return ka.generateSecret("TlsPremasterSecret");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   162
            } catch (GeneralSecurityException e) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   163
                throw (SSLHandshakeException) new SSLHandshakeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   164
                    "Could not generate secret").initCause(e);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   165
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   166
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   167
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   168
        // called by ServerHandshaker
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   169
        SecretKey getAgreedSecret(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   170
                byte[] encodedPoint) throws SSLHandshakeException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   171
            try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   172
                ECParameterSpec params = publicKey.getParams();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   173
                ECPoint point =
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   174
                        ECUtil.decodePoint(encodedPoint, params.getCurve());
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   175
                KeyFactory kf = KeyFactory.getInstance("EC");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   176
                ECPublicKeySpec spec = new ECPublicKeySpec(point, params);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   177
                PublicKey peerPublicKey = kf.generatePublic(spec);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   178
                return getAgreedSecret(peerPublicKey);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   179
            } catch (GeneralSecurityException | java.io.IOException e) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   180
                throw (SSLHandshakeException) new SSLHandshakeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   181
                    "Could not generate secret").initCause(e);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   182
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   183
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   184
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   185
        // Check constraints of the specified EC public key.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   186
        void checkConstraints(AlgorithmConstraints constraints,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   187
                byte[] encodedPoint) throws SSLHandshakeException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   188
            try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   189
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   190
                ECParameterSpec params = publicKey.getParams();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   191
                ECPoint point =
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   192
                        ECUtil.decodePoint(encodedPoint, params.getCurve());
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   193
                ECPublicKeySpec spec = new ECPublicKeySpec(point, params);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   194
53734
cb1642ccc732 8217835: Remove the experimental SunJSSE FIPS compliant mode
xuelei
parents: 53064
diff changeset
   195
                KeyFactory kf = KeyFactory.getInstance("EC");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   196
                ECPublicKey pubKey = (ECPublicKey)kf.generatePublic(spec);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   197
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   198
                // check constraints of ECPublicKey
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   199
                if (!constraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   200
                        EnumSet.of(CryptoPrimitive.KEY_AGREEMENT), pubKey)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   201
                    throw new SSLHandshakeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   202
                        "ECPublicKey does not comply to algorithm constraints");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   203
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   204
            } catch (GeneralSecurityException | java.io.IOException e) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   205
                throw (SSLHandshakeException) new SSLHandshakeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   206
                        "Could not generate ECPublicKey").initCause(e);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   207
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   208
        }
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   209
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   210
        @Override
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   211
        public PublicKey getPublicKey() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   212
            return publicKey;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   213
        }
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   214
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   215
        @Override
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   216
        public NamedGroup getNamedGroup() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   217
            return namedGroup;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   218
        }
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   219
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   220
        @Override
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   221
        public PrivateKey getPrivateKey() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   222
            return privateKey;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   223
        }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   224
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   225
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   226
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   227
            class ECDHEPossessionGenerator implements SSLPossessionGenerator {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   228
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   229
        private ECDHEPossessionGenerator() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   230
            // blank
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   231
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   232
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   233
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   234
        public SSLPossession createPossession(HandshakeContext context) {
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   235
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   236
            NamedGroup preferableNamedGroup;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   237
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   238
            // Find most preferred EC or XEC groups
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   239
            if ((context.clientRequestedNamedGroups != null) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   240
                    (!context.clientRequestedNamedGroups.isEmpty())) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   241
                preferableNamedGroup = SupportedGroups.getPreferredGroup(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   242
                        context.negotiatedProtocol,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   243
                        context.algorithmConstraints,
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   244
                        new NamedGroupSpec[] {
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   245
                            NamedGroupSpec.NAMED_GROUP_ECDHE,
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   246
                            NamedGroupSpec.NAMED_GROUP_XDH },
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   247
                        context.clientRequestedNamedGroups);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   248
            } else {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   249
                preferableNamedGroup = SupportedGroups.getPreferredGroup(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   250
                        context.negotiatedProtocol,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   251
                        context.algorithmConstraints,
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   252
                        new NamedGroupSpec[] {
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   253
                            NamedGroupSpec.NAMED_GROUP_ECDHE,
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   254
                            NamedGroupSpec.NAMED_GROUP_XDH });
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   255
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   256
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   257
            if (preferableNamedGroup != null) {
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   258
                return preferableNamedGroup.createPossession(
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   259
                    context.sslContext.getSecureRandom());
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   260
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   261
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   262
            // no match found, cannot use this cipher suite.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   263
            //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   264
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   265
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   266
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   267
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   268
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   269
            class ECDHKAGenerator implements SSLKeyAgreementGenerator {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   270
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   271
        private ECDHKAGenerator() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   272
            // blank
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   273
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   274
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   275
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   276
        public SSLKeyDerivation createKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   277
                HandshakeContext context) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   278
            if (context instanceof ServerHandshakeContext) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   279
                return createServerKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   280
                        (ServerHandshakeContext)context);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   281
            } else {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   282
                return createClientKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   283
                        (ClientHandshakeContext)context);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   284
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   285
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   286
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   287
        private SSLKeyDerivation createServerKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   288
                ServerHandshakeContext shc) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   289
            X509Possession x509Possession = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   290
            ECDHECredentials ecdheCredentials = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   291
            for (SSLPossession poss : shc.handshakePossessions) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   292
                if (!(poss instanceof X509Possession)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   293
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   294
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   295
54417
f87041131515 8217610: TLSv1.3 fail with ClassException when EC keys are stored in PKCS11
xuelei
parents: 53734
diff changeset
   296
                ECParameterSpec params =
f87041131515 8217610: TLSv1.3 fail with ClassException when EC keys are stored in PKCS11
xuelei
parents: 53734
diff changeset
   297
                        ((X509Possession)poss).getECParameterSpec();
f87041131515 8217610: TLSv1.3 fail with ClassException when EC keys are stored in PKCS11
xuelei
parents: 53734
diff changeset
   298
                if (params == null) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   299
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   300
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   301
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   302
                NamedGroup ng = NamedGroup.valueOf(params);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   303
                if (ng == null) {
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   304
                    // unlikely, have been checked during cipher suite
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   305
                    // negotiation.
53064
103ed9569fc8 8215443: The use of TransportContext.fatal() leads to bad coding style
xuelei
parents: 50768
diff changeset
   306
                    throw shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   307
                        "Unsupported EC server cert for ECDH key exchange");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   308
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   309
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   310
                for (SSLCredentials cred : shc.handshakeCredentials) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   311
                    if (!(cred instanceof ECDHECredentials)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   312
                        continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   313
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   314
                    if (ng.equals(((ECDHECredentials)cred).namedGroup)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   315
                        ecdheCredentials = (ECDHECredentials)cred;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   316
                        break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   317
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   318
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   319
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   320
                if (ecdheCredentials != null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   321
                    x509Possession = (X509Possession)poss;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   322
                    break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   323
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   324
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   325
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   326
            if (x509Possession == null || ecdheCredentials == null) {
53064
103ed9569fc8 8215443: The use of TransportContext.fatal() leads to bad coding style
xuelei
parents: 50768
diff changeset
   327
                throw shc.conContext.fatal(Alert.HANDSHAKE_FAILURE,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   328
                    "No sufficient ECDHE key agreement parameters negotiated");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   329
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   330
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   331
            return new KAKeyDerivation("ECDH", shc,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   332
                x509Possession.popPrivateKey, ecdheCredentials.popPublicKey);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   333
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   334
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   335
        private SSLKeyDerivation createClientKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   336
                ClientHandshakeContext chc) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   337
            ECDHEPossession ecdhePossession = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   338
            X509Credentials x509Credentials = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   339
            for (SSLPossession poss : chc.handshakePossessions) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   340
                if (!(poss instanceof ECDHEPossession)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   341
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   342
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   343
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   344
                NamedGroup ng = ((ECDHEPossession)poss).namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   345
                for (SSLCredentials cred : chc.handshakeCredentials) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   346
                    if (!(cred instanceof X509Credentials)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   347
                        continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   348
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   349
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   350
                    PublicKey publicKey = ((X509Credentials)cred).popPublicKey;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   351
                    if (!publicKey.getAlgorithm().equals("EC")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   352
                        continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   353
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   354
                    ECParameterSpec params =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   355
                            ((ECPublicKey)publicKey).getParams();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   356
                    NamedGroup namedGroup = NamedGroup.valueOf(params);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   357
                    if (namedGroup == null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   358
                        // unlikely, should have been checked previously
53064
103ed9569fc8 8215443: The use of TransportContext.fatal() leads to bad coding style
xuelei
parents: 50768
diff changeset
   359
                        throw chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   360
                            "Unsupported EC server cert for ECDH key exchange");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   361
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   362
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   363
                    if (ng.equals(namedGroup)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   364
                        x509Credentials = (X509Credentials)cred;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   365
                        break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   366
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   367
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   368
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   369
                if (x509Credentials != null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   370
                    ecdhePossession = (ECDHEPossession)poss;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   371
                    break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   372
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   373
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   374
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   375
            if (ecdhePossession == null || x509Credentials == null) {
53064
103ed9569fc8 8215443: The use of TransportContext.fatal() leads to bad coding style
xuelei
parents: 50768
diff changeset
   376
                throw chc.conContext.fatal(Alert.HANDSHAKE_FAILURE,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   377
                    "No sufficient ECDH key agreement parameters negotiated");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   378
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   379
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   380
            return new KAKeyDerivation("ECDH", chc,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   381
                ecdhePossession.privateKey, x509Credentials.popPublicKey);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   382
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   383
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   384
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   385
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   386
            class ECDHEKAGenerator implements SSLKeyAgreementGenerator {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   387
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   388
        private ECDHEKAGenerator() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   389
            // blank
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   390
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   391
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   392
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   393
        public SSLKeyDerivation createKeyDerivation(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   394
                HandshakeContext context) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   395
            ECDHEPossession ecdhePossession = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   396
            ECDHECredentials ecdheCredentials = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   397
            for (SSLPossession poss : context.handshakePossessions) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   398
                if (!(poss instanceof ECDHEPossession)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   399
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   400
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   401
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   402
                NamedGroup ng = ((ECDHEPossession)poss).namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   403
                for (SSLCredentials cred : context.handshakeCredentials) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   404
                    if (!(cred instanceof ECDHECredentials)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   405
                        continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   406
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   407
                    if (ng.equals(((ECDHECredentials)cred).namedGroup)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   408
                        ecdheCredentials = (ECDHECredentials)cred;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   409
                        break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   410
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   411
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   412
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   413
                if (ecdheCredentials != null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   414
                    ecdhePossession = (ECDHEPossession)poss;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   415
                    break;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   416
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   417
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   418
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   419
            if (ecdhePossession == null || ecdheCredentials == null) {
53064
103ed9569fc8 8215443: The use of TransportContext.fatal() leads to bad coding style
xuelei
parents: 50768
diff changeset
   420
                throw context.conContext.fatal(Alert.HANDSHAKE_FAILURE,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   421
                    "No sufficient ECDHE key agreement parameters negotiated");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   422
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   423
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   424
            return new KAKeyDerivation("ECDH", context,
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   425
                ecdhePossession.privateKey, ecdheCredentials.popPublicKey);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   426
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   427
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   428
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   429
    /*
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   430
     * A Generator for TLSv1-1.2 to create a ECDHE or a XDH KeyDerivation
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   431
     * object depending on the negotiated group.
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   432
     */
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   433
    private static final
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   434
            class ECDHEXDHKAGenerator implements SSLKeyAgreementGenerator {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   435
        // Prevent instantiation of this class.
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   436
        private ECDHEXDHKAGenerator() {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   437
            // blank
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   438
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   439
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   440
        @Override
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   441
        public SSLKeyDerivation createKeyDerivation(
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   442
                HandshakeContext context) throws IOException {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   443
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   444
            NamedGroupPossession namedGroupPossession = null;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   445
            NamedGroupCredentials namedGroupCredentials = null;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   446
            NamedGroup namedGroup = null;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   447
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   448
            // Find a possession/credential combo using the same named group
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   449
            search:
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   450
            for (SSLPossession poss : context.handshakePossessions) {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   451
                for (SSLCredentials cred : context.handshakeCredentials) {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   452
                    if (((poss instanceof ECDHEPossession) &&
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   453
                            (cred instanceof ECDHECredentials)) ||
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   454
                            (((poss instanceof XDHEPossession) &&
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   455
                            (cred instanceof XDHECredentials)))) {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   456
                        NamedGroupPossession p = (NamedGroupPossession)poss;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   457
                        NamedGroupCredentials c = (NamedGroupCredentials)cred;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   458
                        if (p.getNamedGroup() != c.getNamedGroup()) {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   459
                            continue;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   460
                        } else {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   461
                            namedGroup = p.getNamedGroup();
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   462
                        }
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   463
                        namedGroupPossession = p;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   464
                        namedGroupCredentials = c;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   465
                        break search;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   466
                    }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   467
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   468
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   469
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   470
            if (namedGroupPossession == null || namedGroupCredentials == null) {
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   471
                throw context.conContext.fatal(Alert.HANDSHAKE_FAILURE,
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   472
                    "No sufficient ECDHE/XDH key agreement " +
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   473
                            "parameters negotiated");
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   474
            }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   475
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   476
            String alg;
57718
a93b7b28f644 8226374: Restrict TLS signature schemes and named groups
xuelei
parents: 55353
diff changeset
   477
            switch (namedGroup.spec) {
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   478
                case NAMED_GROUP_ECDHE:
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   479
                    alg = "ECDH";
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   480
                    break;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   481
                case NAMED_GROUP_XDH:
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   482
                    alg = "XDH";
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   483
                    break;
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   484
                default:
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   485
                    throw new RuntimeException("Unexpected named group type");
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   486
            }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   487
55353
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   488
            return new KAKeyDerivation(alg, context,
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   489
                    namedGroupPossession.getPrivateKey(),
946f7f2d321c 8171279: Support X25519 and X448 in TLS
wetmore
parents: 54417
diff changeset
   490
                    namedGroupCredentials.getPublicKey());
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   491
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   492
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents:
diff changeset
   493
}