src/java.base/share/classes/sun/security/ssl/SupportedGroupsExtension.java
author apetcher
Tue, 28 Aug 2018 14:46:44 -0400
branchJDK-8171279-XDH-TLS-branch-2
changeset 56871 bda6e40cd2f4
parent 56864 ec60669bc501
child 56878 55bac0266042
permissions -rw-r--r--
giving up on signature problem
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     1
/*
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
     2
 * Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     4
 *
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    10
 *
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    15
 * accompanied this code).
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    16
 *
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    20
 *
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    23
 * questions.
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    24
 */
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    25
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    26
package sun.security.ssl;
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    27
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    28
import java.io.IOException;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    29
import java.nio.ByteBuffer;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    30
import java.security.AccessController;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    31
import java.security.AlgorithmConstraints;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    32
import java.security.AlgorithmParameters;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    33
import java.security.CryptoPrimitive;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
    34
import java.security.GeneralSecurityException;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    35
import java.security.NoSuchAlgorithmException;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
    36
import java.security.SecureRandom;
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
    37
import java.security.spec.AlgorithmParameterSpec;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    38
import java.security.spec.ECGenParameterSpec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    39
import java.security.spec.ECParameterSpec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    40
import java.security.spec.InvalidParameterSpecException;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
    41
import java.security.spec.NamedParameterSpec;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    42
import java.text.MessageFormat;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    43
import java.util.ArrayList;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    44
import java.util.Collections;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    45
import java.util.EnumSet;
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
    46
import java.util.concurrent.ConcurrentHashMap;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    47
import java.util.LinkedList;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    48
import java.util.List;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    49
import java.util.Locale;
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    50
import java.util.Map;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
    51
import java.util.Optional;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    52
import javax.crypto.spec.DHParameterSpec;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    53
import javax.net.ssl.SSLProtocolException;
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    54
import sun.security.action.GetPropertyAction;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    55
import static sun.security.ssl.SSLExtension.CH_SUPPORTED_GROUPS;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    56
import static sun.security.ssl.SSLExtension.EE_SUPPORTED_GROUPS;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    57
import sun.security.ssl.SSLExtension.ExtensionConsumer;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    58
import sun.security.ssl.SSLExtension.SSLExtensionSpec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    59
import sun.security.ssl.SSLHandshake.HandshakeMessage;
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
    60
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    61
/**
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    62
 * Pack of the "supported_groups" extensions [RFC 4492/7919].
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    63
 */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    64
final class SupportedGroupsExtension {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    65
    static final HandshakeProducer chNetworkProducer =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    66
            new CHSupportedGroupsProducer();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    67
    static final ExtensionConsumer chOnLoadConsumer =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    68
            new CHSupportedGroupsConsumer();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    69
    static final SSLStringizer sgsStringizer =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    70
            new SupportedGroupsStringizer();
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    71
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    72
    static final HandshakeProducer eeNetworkProducer =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    73
            new EESupportedGroupsProducer();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    74
    static final ExtensionConsumer eeOnLoadConsumer =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    75
            new EESupportedGroupsConsumer();
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    76
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    77
    /**
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    78
     * The "supported_groups" extension.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    79
     */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    80
    static final class SupportedGroupsSpec implements SSLExtensionSpec {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    81
        final int[] namedGroupsIds;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    82
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    83
        private SupportedGroupsSpec(int[] namedGroupsIds) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    84
            this.namedGroupsIds = namedGroupsIds;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    85
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    86
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    87
        private SupportedGroupsSpec(List<NamedGroup> namedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    88
            this.namedGroupsIds = new int[namedGroups.size()];
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    89
            int i = 0;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    90
            for (NamedGroup ng : namedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    91
                namedGroupsIds[i++] = ng.id;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    92
            }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    93
        }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
    94
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    95
        private SupportedGroupsSpec(ByteBuffer m) throws IOException  {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    96
            if (m.remaining() < 2) {      // 2: the length of the list
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    97
                throw new SSLProtocolException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    98
                    "Invalid supported_groups extension: insufficient data");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
    99
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   100
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   101
            byte[] ngs = Record.getBytes16(m);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   102
            if (m.hasRemaining()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   103
                throw new SSLProtocolException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   104
                    "Invalid supported_groups extension: unknown extra data");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   105
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   106
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   107
            if ((ngs == null) || (ngs.length == 0) || (ngs.length % 2 != 0)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   108
                throw new SSLProtocolException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   109
                    "Invalid supported_groups extension: incomplete data");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   110
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   111
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   112
            int[] ids = new int[ngs.length / 2];
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   113
            for (int i = 0, j = 0; i < ngs.length;) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   114
                ids[j++] = ((ngs[i++] & 0xFF) << 8) | (ngs[i++] & 0xFF);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   115
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   116
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   117
            this.namedGroupsIds = ids;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   118
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   119
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   120
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   121
        public String toString() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   122
            MessageFormat messageFormat = new MessageFormat(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   123
                "\"versions\": '['{0}']'", Locale.ENGLISH);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   124
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   125
            if (namedGroupsIds == null || namedGroupsIds.length == 0) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   126
                Object[] messageFields = {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   127
                        "<no supported named group specified>"
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   128
                    };
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   129
                return messageFormat.format(messageFields);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   130
            } else {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   131
                StringBuilder builder = new StringBuilder(512);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   132
                boolean isFirst = true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   133
                for (int ngid : namedGroupsIds) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   134
                    if (isFirst) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   135
                        isFirst = false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   136
                    } else {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   137
                        builder.append(", ");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   138
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   139
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   140
                    builder.append(NamedGroup.nameOf(ngid));
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   141
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   142
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   143
                Object[] messageFields = {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   144
                        builder.toString()
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   145
                    };
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   146
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   147
                return messageFormat.format(messageFields);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   148
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   149
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   150
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   151
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   152
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   153
            class SupportedGroupsStringizer implements SSLStringizer {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   154
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   155
        public String toString(ByteBuffer buffer) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   156
            try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   157
                return (new SupportedGroupsSpec(buffer)).toString();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   158
            } catch (IOException ioe) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   159
                // For debug logging only, so please swallow exceptions.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   160
                return ioe.getMessage();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   161
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   162
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   163
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   164
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   165
    enum NamedGroupType {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   166
        NAMED_GROUP_ECDHE,          // Elliptic Curve Groups (ECDHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   167
        NAMED_GROUP_FFDHE,          // Finite Field Groups (DHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   168
        NAMED_GROUP_XDH,            // Finite Field Groups (XDH)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   169
        NAMED_GROUP_ARBITRARY,      // arbitrary prime and curves (ECDHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   170
        NAMED_GROUP_NONE;           // Not predefined named group
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   171
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   172
        boolean isSupported(List<CipherSuite> cipherSuites) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   173
            for (CipherSuite cs : cipherSuites) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   174
                if (cs.keyExchange == null || cs.keyExchange.groupType == this) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   175
                    return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   176
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   177
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   178
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   179
            return false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   180
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   181
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   182
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   183
    public static abstract class NamedGroupFunctions {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   184
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   185
        // cache to speed up the parameters construction
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   186
        protected static final Map<NamedGroup, AlgorithmParameters>
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   187
            namedGroupParams = new ConcurrentHashMap<>();
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   188
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   189
        private final NamedGroup ng;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   190
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   191
        protected NamedGroupFunctions(NamedGroup ng) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   192
            this.ng = ng;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   193
        }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   194
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   195
        public AlgorithmParameters getParameters() {
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   196
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   197
            AlgorithmParameters result = namedGroupParams.get(ng);
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   198
            if (result == null) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   199
                Optional<AlgorithmParameters> paramsOpt = getParametersImpl();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   200
                if (paramsOpt.isPresent()) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   201
                    result = paramsOpt.get();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   202
                    namedGroupParams.put(ng, result);
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   203
                }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   204
            }
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   205
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   206
            return result;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   207
        }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   208
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   209
        public NamedGroup getNamedGroup() {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   210
            return ng;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   211
        }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   212
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   213
        public abstract SSLKeyAgreementCredentials decodeCredentials(byte[] encoded)
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   214
            throws IOException, GeneralSecurityException;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   215
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   216
        public abstract  SSLPossession createPossession(SecureRandom random);
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   217
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   218
        public abstract  SSLKeyDerivation createKeyDerivation(HandshakeContext hc)
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   219
            throws IOException;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   220
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   221
        protected abstract Optional<AlgorithmParameters> getParametersImpl();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   222
        public abstract AlgorithmParameterSpec getParameterSpec();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   223
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   224
        public abstract boolean isAvailable();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   225
    }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   226
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   227
    private static class FFDHFunctions extends NamedGroupFunctions {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   228
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   229
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   230
        FFDHFunctions(NamedGroup ng) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   231
            super(ng);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   232
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   233
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   234
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   235
        public SSLKeyAgreementCredentials decodeCredentials(byte[] encoded)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   236
                throws IOException, GeneralSecurityException {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   237
            return DHKeyExchange.DHECredentials.valueOf(getNamedGroup(), encoded);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   238
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   239
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   240
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   241
        public SSLPossession createPossession(SecureRandom random) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   242
            return new DHKeyExchange.DHEPossession(getNamedGroup(), random);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   243
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   244
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   245
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   246
        public SSLKeyDerivation createKeyDerivation(HandshakeContext hc)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   247
                throws IOException {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   248
            return DHKeyExchange.kaGenerator.createKeyDerivation(hc);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   249
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   250
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   251
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   252
        public AlgorithmParameterSpec getParameterSpec() {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   253
            return getDHParameterSpec();
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   254
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   255
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   256
        DHParameterSpec getDHParameterSpec() {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   257
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   258
            AlgorithmParameters params = getParameters();
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   259
            try {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   260
                return params.getParameterSpec(DHParameterSpec.class);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   261
            } catch (InvalidParameterSpecException ipse) {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   262
                // should be unlikely
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   263
                return getPredefinedDHParameterSpec(getNamedGroup());
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   264
            }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   265
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   266
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   267
        private static DHParameterSpec getFFDHEDHParameterSpec(
56861
3c83db004067 minor code cleanup
apetcher
parents: 56860
diff changeset
   268
            NamedGroup namedGroup) {
3c83db004067 minor code cleanup
apetcher
parents: 56860
diff changeset
   269
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   270
            DHParameterSpec spec = null;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   271
            switch (namedGroup) {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   272
                case FFDHE_2048:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   273
                    spec = PredefinedDHParameterSpecs.ffdheParams.get(2048);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   274
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   275
                case FFDHE_3072:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   276
                    spec = PredefinedDHParameterSpecs.ffdheParams.get(3072);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   277
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   278
                case FFDHE_4096:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   279
                    spec = PredefinedDHParameterSpecs.ffdheParams.get(4096);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   280
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   281
                case FFDHE_6144:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   282
                    spec = PredefinedDHParameterSpecs.ffdheParams.get(6144);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   283
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   284
                case FFDHE_8192:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   285
                    spec = PredefinedDHParameterSpecs.ffdheParams.get(8192);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   286
            }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   287
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   288
            return spec;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   289
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   290
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   291
        private static DHParameterSpec getPredefinedDHParameterSpec(
56861
3c83db004067 minor code cleanup
apetcher
parents: 56860
diff changeset
   292
            NamedGroup namedGroup) {
3c83db004067 minor code cleanup
apetcher
parents: 56860
diff changeset
   293
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   294
            DHParameterSpec spec = null;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   295
            switch (namedGroup) {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   296
                case FFDHE_2048:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   297
                    spec = PredefinedDHParameterSpecs.definedParams.get(2048);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   298
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   299
                case FFDHE_3072:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   300
                    spec = PredefinedDHParameterSpecs.definedParams.get(3072);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   301
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   302
                case FFDHE_4096:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   303
                    spec = PredefinedDHParameterSpecs.definedParams.get(4096);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   304
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   305
                case FFDHE_6144:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   306
                    spec = PredefinedDHParameterSpecs.definedParams.get(6144);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   307
                    break;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   308
                case FFDHE_8192:
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   309
                    spec = PredefinedDHParameterSpecs.definedParams.get(8192);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   310
            }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   311
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   312
            return spec;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   313
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   314
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   315
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   316
        public boolean isAvailable() {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   317
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   318
            AlgorithmParameters params = getParameters();
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   319
            return params != null;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   320
        }
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   321
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   322
        @Override
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   323
        protected Optional<AlgorithmParameters> getParametersImpl() {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   324
            try {
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   325
                AlgorithmParameters params = JsseJce.getAlgorithmParameters("DiffieHellman");
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   326
                AlgorithmParameterSpec spec = getFFDHEDHParameterSpec(getNamedGroup());
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   327
                params.init(spec);
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   328
                return Optional.of(params);
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   329
            } catch(InvalidParameterSpecException | NoSuchAlgorithmException ex) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   330
                return Optional.empty();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   331
            }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   332
        }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   333
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   334
    }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   335
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   336
    private static class ECDHFunctions extends NamedGroupFunctions {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   337
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   338
        ECDHFunctions(NamedGroup ng) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   339
            super(ng);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   340
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   341
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   342
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   343
        public SSLKeyAgreementCredentials decodeCredentials(byte[] encoded)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   344
        throws IOException, GeneralSecurityException {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   345
            return ECDHKeyExchange.ECDHECredentials.valueOf(getNamedGroup(), encoded);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   346
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   347
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   348
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   349
        public SSLPossession createPossession(SecureRandom random) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   350
            return new ECDHKeyExchange.ECDHEPossession(getNamedGroup(), random);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   351
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   352
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   353
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   354
        public SSLKeyDerivation createKeyDerivation(HandshakeContext hc)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   355
                throws IOException {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   356
            return ECDHKeyExchange.ecdheKAGenerator.createKeyDerivation(hc);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   357
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   358
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   359
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   360
        public AlgorithmParameterSpec getParameterSpec() {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   361
            return SupportedGroups.getECGenParamSpec(getNamedGroup());
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   362
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   363
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   364
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   365
        public boolean isAvailable() {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   366
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   367
            AlgorithmParameters params = getParameters();
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   368
            return params != null;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   369
        }
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   370
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   371
        @Override
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   372
        protected Optional<AlgorithmParameters> getParametersImpl() {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   373
            try {
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   374
                AlgorithmParameters params = JsseJce.getAlgorithmParameters("EC");
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   375
                AlgorithmParameterSpec spec = new ECGenParameterSpec(getNamedGroup().oid);
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   376
                params.init(spec);
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   377
                return Optional.of(params);
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   378
            } catch(InvalidParameterSpecException | NoSuchAlgorithmException ex) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   379
                return Optional.empty();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   380
            }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   381
        }
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   382
    }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   383
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   384
    private static class XDHFunctions extends NamedGroupFunctions {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   385
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   386
        XDHFunctions(NamedGroup ng) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   387
            super(ng);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   388
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   389
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   390
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   391
        public SSLKeyAgreementCredentials decodeCredentials(byte[] encoded)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   392
                throws IOException, GeneralSecurityException {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   393
            return XDHKeyExchange.XDHECredentials.valueOf(getNamedGroup(), encoded);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   394
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   395
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   396
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   397
        public SSLPossession createPossession(SecureRandom random) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   398
            return new XDHKeyExchange.XDHEPossession(getNamedGroup(), random);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   399
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   400
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   401
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   402
        public SSLKeyDerivation createKeyDerivation(HandshakeContext hc)
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   403
                throws IOException {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   404
            return XDHKeyExchange.xdheKAGenerator.createKeyDerivation(hc);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   405
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   406
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   407
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   408
        public AlgorithmParameterSpec getParameterSpec() {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   409
            return new NamedParameterSpec(getNamedGroup().algorithm);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   410
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   411
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   412
        @Override
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   413
        public boolean isAvailable() {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   414
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   415
            try {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   416
                JsseJce.getKeyAgreement(getNamedGroup().algorithm);
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   417
                return true;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   418
            } catch (NoSuchAlgorithmException ex) {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   419
                return false;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   420
            }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   421
        }
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   422
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   423
        @Override
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   424
        protected Optional<AlgorithmParameters> getParametersImpl() {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   425
            return Optional.empty();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   426
        }
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   427
    }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   428
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   429
    static enum NamedGroup {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   430
        // Elliptic Curves (RFC 4492)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   431
        //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   432
        // See sun.security.util.CurveDB for the OIDs
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   433
        // NIST K-163
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   434
        SECT163_K1  (0x0001, "sect163k1", "1.3.132.0.1", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   435
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   436
        SECT163_R1  (0x0002, "sect163r1", "1.3.132.0.2", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   437
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   438
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   439
        // NIST B-163
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   440
        SECT163_R2  (0x0003, "sect163r2", "1.3.132.0.15", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   441
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   442
        SECT193_R1  (0x0004, "sect193r1", "1.3.132.0.24", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   443
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   444
        SECT193_R2  (0x0005, "sect193r2", "1.3.132.0.25", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   445
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   446
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   447
        // NIST K-233
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   448
        SECT233_K1  (0x0006, "sect233k1", "1.3.132.0.26", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   449
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   450
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   451
        // NIST B-233
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   452
        SECT233_R1  (0x0007, "sect233r1", "1.3.132.0.27", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   453
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   454
        SECT239_K1  (0x0008, "sect239k1", "1.3.132.0.3", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   455
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   456
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   457
        // NIST K-283
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   458
        SECT283_K1  (0x0009, "sect283k1", "1.3.132.0.16", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   459
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   460
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   461
        // NIST B-283
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   462
        SECT283_R1  (0x000A, "sect283r1", "1.3.132.0.17", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   463
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   464
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   465
        // NIST K-409
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   466
        SECT409_K1  (0x000B, "sect409k1", "1.3.132.0.36", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   467
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   468
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   469
        // NIST B-409
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   470
        SECT409_R1  (0x000C, "sect409r1", "1.3.132.0.37", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   471
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   472
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   473
        // NIST K-571
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   474
        SECT571_K1  (0x000D, "sect571k1", "1.3.132.0.38", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   475
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   476
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   477
        // NIST B-571
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   478
        SECT571_R1  (0x000E, "sect571r1", "1.3.132.0.39", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   479
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   480
        SECP160_K1  (0x000F, "secp160k1", "1.3.132.0.9", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   481
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   482
        SECP160_R1  (0x0010, "secp160r1", "1.3.132.0.8", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   483
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   484
        SECP160_R2  (0x0011, "secp160r2", "1.3.132.0.30", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   485
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   486
        SECP192_K1  (0x0012, "secp192k1", "1.3.132.0.31", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   487
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   488
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   489
        // NIST P-192
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   490
        SECP192_R1  (0x0013, "secp192r1", "1.2.840.10045.3.1.1", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   491
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   492
        SECP224_K1  (0x0014, "secp224k1", "1.3.132.0.32", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   493
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   494
        // NIST P-224
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   495
        SECP224_R1  (0x0015, "secp224r1", "1.3.132.0.33", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   496
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   497
        SECP256_K1  (0x0016, "secp256k1", "1.3.132.0.10", false,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   498
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   499
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   500
        // NIST P-256
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   501
        SECP256_R1  (0x0017, "secp256r1", "1.2.840.10045.3.1.7", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   502
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   503
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   504
        // NIST P-384
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   505
        SECP384_R1  (0x0018, "secp384r1", "1.3.132.0.34", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   506
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   507
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   508
        // NIST P-521
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   509
        SECP521_R1  (0x0019, "secp521r1", "1.3.132.0.35", true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   510
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   511
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   512
        // x25519 and x448
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   513
        X25519      (0x001D, "x25519", true, "x25519",
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   514
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   515
        X448        (0x001E, "x448", true, "x448",
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   516
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   517
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   518
        // Finite Field Diffie-Hellman Ephemeral Parameters (RFC 7919)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   519
        FFDHE_2048  (0x0100, "ffdhe2048",  true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   520
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   521
        FFDHE_3072  (0x0101, "ffdhe3072",  true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   522
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   523
        FFDHE_4096  (0x0102, "ffdhe4096",  true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   524
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   525
        FFDHE_6144  (0x0103, "ffdhe6144",  true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   526
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   527
        FFDHE_8192  (0x0104, "ffdhe8192",  true,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   528
                            ProtocolVersion.PROTOCOLS_TO_13),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   529
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   530
        // Elliptic Curves (RFC 4492)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   531
        //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   532
        // arbitrary prime and characteristic-2 curves
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   533
        ARBITRARY_PRIME  (0xFF01, "arbitrary_explicit_prime_curves",
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   534
                            ProtocolVersion.PROTOCOLS_TO_12),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   535
        ARBITRARY_CHAR2  (0xFF02, "arbitrary_explicit_char2_curves",
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   536
                            ProtocolVersion.PROTOCOLS_TO_12);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   537
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   538
        final int id;               // hash + signature
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   539
        final NamedGroupType type;  // group type
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   540
        final String name;          // literal name
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   541
        final String oid;           // object identifier of the named group
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   542
        final String algorithm;     // signature algorithm
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   543
        final boolean isFips;       // can be used in FIPS mode?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   544
        final ProtocolVersion[] supportedProtocols;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   545
        private final NamedGroupFunctions functions;    // may be null
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   546
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   547
        // Constructor used for Elliptic Curve Groups (ECDHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   548
        private NamedGroup(int id, String name, String oid, boolean isFips,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   549
                ProtocolVersion[] supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   550
            this.id = id;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   551
            this.type = NamedGroupType.NAMED_GROUP_ECDHE;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   552
            this.functions = new ECDHFunctions(this);
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   553
            this.name = name;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   554
            this.oid = oid;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   555
            this.algorithm = "EC";
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   556
            this.isFips = isFips;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   557
            this.supportedProtocols = supportedProtocols;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   558
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   559
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   560
        // Constructor used for Elliptic Curve Groups (XDH)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   561
        private NamedGroup(int id, String name,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   562
                boolean isFips, String algorithm,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   563
                ProtocolVersion[] supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   564
            this.id = id;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   565
            this.type = NamedGroupType.NAMED_GROUP_XDH;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   566
            this.functions = new XDHFunctions(this);
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   567
            this.name = name;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   568
            this.oid = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   569
            this.algorithm = algorithm;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   570
            this.isFips = isFips;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   571
            this.supportedProtocols = supportedProtocols;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   572
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   573
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   574
        // Constructor used for Finite Field Diffie-Hellman Groups (FFDHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   575
        private NamedGroup(int id, String name, boolean isFips,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   576
                ProtocolVersion[] supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   577
            this.id = id;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   578
            this.type = NamedGroupType.NAMED_GROUP_FFDHE;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   579
            this.functions = new FFDHFunctions(this);
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   580
            this.name = name;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   581
            this.oid = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   582
            this.algorithm = "DiffieHellman";
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   583
            this.isFips = isFips;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   584
            this.supportedProtocols = supportedProtocols;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   585
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   586
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   587
        // Constructor used for arbitrary prime and curves (ECDHE)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   588
        private NamedGroup(int id, String name,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   589
                ProtocolVersion[] supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   590
            this.id = id;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   591
            this.type = NamedGroupType.NAMED_GROUP_ARBITRARY;
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   592
            this.functions = null;
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   593
            this.name = name;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   594
            this.oid = null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   595
            this.algorithm = "EC";
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   596
            this.isFips = false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   597
            this.supportedProtocols = supportedProtocols;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   598
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   599
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   600
        Optional<NamedGroupFunctions> getFunctions() {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   601
            return Optional.ofNullable(functions);
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   602
        }
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   603
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   604
        static NamedGroup valueOf(int id) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   605
            for (NamedGroup group : NamedGroup.values()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   606
                if (group.id == id) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   607
                    return group;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   608
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   609
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   610
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   611
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   612
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   613
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   614
        static NamedGroup valueOf(ECParameterSpec params) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   615
            String oid = JsseJce.getNamedCurveOid(params);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   616
            if ((oid != null) && (!oid.isEmpty())) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   617
                for (NamedGroup group : NamedGroup.values()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   618
                    if ((group.type == NamedGroupType.NAMED_GROUP_ECDHE) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   619
                            oid.equals(group.oid)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   620
                        return group;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   621
                    }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   622
                }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   623
            }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   624
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   625
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   626
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   627
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   628
        static NamedGroup valueOf(DHParameterSpec params) {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   629
            for (NamedGroup ng : NamedGroup.values()) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   630
                if (ng.type != NamedGroupType.NAMED_GROUP_FFDHE) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   631
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   632
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   633
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   634
                DHParameterSpec ngParams = null;
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   635
                // functions is non-null for FFDHE type
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   636
                AlgorithmParameters aps = ng.functions.getParameters();
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   637
                try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   638
                    ngParams = aps.getParameterSpec(DHParameterSpec.class);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   639
                } catch (InvalidParameterSpecException ipse) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   640
                    // should be unlikely
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   641
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   642
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   643
                if (ngParams == null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   644
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   645
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   646
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   647
                if (ngParams.getP().equals(params.getP()) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   648
                        ngParams.getG().equals(params.getG())) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   649
                    return ng;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   650
                }
43693
e340c8d10cbb 8173783: IllegalArgumentException: jdk.tls.namedGroups
coffeys
parents: 41473
diff changeset
   651
            }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   652
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   653
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   654
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   655
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   656
        static NamedGroup nameOf(String name) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   657
            for (NamedGroup group : NamedGroup.values()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   658
                if (group.name.equals(name)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   659
                    return group;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   660
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   661
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   662
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   663
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   664
        }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   665
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   666
        static String nameOf(int id) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   667
            for (NamedGroup group : NamedGroup.values()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   668
                if (group.id == id) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   669
                    return group.name;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   670
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   671
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   672
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   673
            return "UNDEFINED-NAMED-GROUP(" + id + ")";
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   674
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   675
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   676
        boolean isAvailable(List<ProtocolVersion> protocolVersions) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   677
            for (ProtocolVersion pv : supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   678
                if (protocolVersions.contains(pv)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   679
                    return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   680
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   681
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   682
            return false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   683
        }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   684
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   685
        boolean isAvailable(ProtocolVersion protocolVersion) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   686
            for (ProtocolVersion pv : supportedProtocols) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   687
                if (protocolVersion == pv) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   688
                    return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   689
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   690
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   691
            return false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   692
        }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   693
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   694
        boolean isSupported(List<CipherSuite> cipherSuites) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   695
            for (CipherSuite cs : cipherSuites) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   696
                boolean isMatch = isAvailable(cs.supportedProtocols);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   697
                if (isMatch && (cs.keyExchange == null ||
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   698
                        cs.keyExchange.groupType == type)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   699
                    return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   700
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   701
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   702
            return false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   703
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   704
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   705
        // lazy loading of parameters
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   706
        AlgorithmParameters getParameters() {
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   707
            if (functions == null) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   708
                return null;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   709
            }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   710
            return functions.getParameters();
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   711
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   712
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   713
        AlgorithmParameterSpec getParameterSpec() {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   714
            Optional<NamedGroupFunctions> ngf = getFunctions();
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   715
            if (ngf.isEmpty()) {
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   716
                return null;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   717
            }
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   718
            return ngf.get().getParameterSpec();
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   719
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   720
    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   721
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   722
    static class SupportedGroups {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   723
        // To switch off the supported_groups extension for DHE cipher suite.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   724
        static final boolean enableFFDHE =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   725
                Utilities.getBooleanProperty("jsse.enableFFDHE", true);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   726
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   727
        // the supported named groups
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   728
        static final NamedGroup[] supportedNamedGroups;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   729
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   730
        static {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   731
            boolean requireFips = SunJSSE.isFIPS();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   732
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   733
            // The value of the System Property defines a list of enabled named
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   734
            // groups in preference order, separated with comma.  For example:
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   735
            //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   736
            //      jdk.tls.namedGroups="secp521r1, secp256r1, ffdhe2048"
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   737
            //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   738
            // If the System Property is not defined or the value is empty, the
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   739
            // default groups and preferences will be used.
51398
3c389a284345 8209416: Refactoring GetPropertyAction calls in security libs
weijun
parents: 50768
diff changeset
   740
            String property = GetPropertyAction
3c389a284345 8209416: Refactoring GetPropertyAction calls in security libs
weijun
parents: 50768
diff changeset
   741
                    .privilegedGetProperty("jdk.tls.namedGroups");
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   742
            if (property != null && property.length() != 0) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   743
                // remove double quote marks from beginning/end of the property
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   744
                if (property.length() > 1 && property.charAt(0) == '"' &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   745
                        property.charAt(property.length() - 1) == '"') {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   746
                    property = property.substring(1, property.length() - 1);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   747
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   748
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   749
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   750
            ArrayList<NamedGroup> groupList;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   751
            if (property != null && property.length() != 0) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   752
                String[] groups = property.split(",");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   753
                groupList = new ArrayList<>(groups.length);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   754
                for (String group : groups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   755
                    group = group.trim();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   756
                    if (!group.isEmpty()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   757
                        NamedGroup namedGroup = NamedGroup.nameOf(group);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   758
                        if (namedGroup != null &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   759
                                (!requireFips || namedGroup.isFips)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   760
                            if (isAvailableGroup(namedGroup)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   761
                                groupList.add(namedGroup);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   762
                            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   763
                        }   // ignore unknown groups
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   764
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   765
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   766
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   767
                if (groupList.isEmpty()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   768
                    throw new IllegalArgumentException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   769
                            "System property jdk.tls.namedGroups(" +
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   770
                            property + ") contains no supported named groups");
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   771
                }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   772
            } else {        // default groups
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   773
                NamedGroup[] groups;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   774
                if (requireFips) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   775
                    groups = new NamedGroup[] {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   776
                        // only NIST curves in FIPS mode
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   777
                        NamedGroup.SECP256_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   778
                        NamedGroup.SECP384_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   779
                        NamedGroup.SECP521_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   780
                        NamedGroup.SECT283_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   781
                        NamedGroup.SECT283_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   782
                        NamedGroup.SECT409_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   783
                        NamedGroup.SECT409_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   784
                        NamedGroup.SECT571_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   785
                        NamedGroup.SECT571_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   786
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   787
                        // FFDHE 2048
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   788
                        NamedGroup.FFDHE_2048,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   789
                        NamedGroup.FFDHE_3072,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   790
                        NamedGroup.FFDHE_4096,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   791
                        NamedGroup.FFDHE_6144,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   792
                        NamedGroup.FFDHE_8192,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   793
                    };
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   794
                } else {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   795
                    groups = new NamedGroup[] {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   796
                        // NIST curves first
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   797
                        NamedGroup.SECP256_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   798
                        NamedGroup.SECP384_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   799
                        NamedGroup.SECP521_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   800
                        NamedGroup.SECT283_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   801
                        NamedGroup.SECT283_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   802
                        NamedGroup.SECT409_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   803
                        NamedGroup.SECT409_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   804
                        NamedGroup.SECT571_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   805
                        NamedGroup.SECT571_R1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   806
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   807
                        // non-NIST curves
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   808
                        NamedGroup.SECP256_K1,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   809
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   810
                        // XDH
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   811
                        NamedGroup.X25519,
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   812
                        NamedGroup.X448,
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   813
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   814
                        // FFDHE 2048
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   815
                        NamedGroup.FFDHE_2048,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   816
                        NamedGroup.FFDHE_3072,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   817
                        NamedGroup.FFDHE_4096,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   818
                        NamedGroup.FFDHE_6144,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   819
                        NamedGroup.FFDHE_8192,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   820
                    };
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   821
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   822
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   823
                groupList = new ArrayList<>(groups.length);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   824
                for (NamedGroup group : groups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   825
                    if (isAvailableGroup(group)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   826
                        groupList.add(group);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   827
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   828
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   829
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   830
                if (groupList.isEmpty() &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   831
                        SSLLogger.isOn && SSLLogger.isOn("ssl")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   832
                    SSLLogger.warning("No default named groups");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   833
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   834
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   835
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   836
            supportedNamedGroups = new NamedGroup[groupList.size()];
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   837
            int i = 0;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   838
            for (NamedGroup namedGroup : groupList) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   839
                supportedNamedGroups[i++] = namedGroup;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   840
            }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   841
        }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   842
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   843
        // check whether the group is supported by the underlying providers
56871
bda6e40cd2f4 giving up on signature problem
apetcher
parents: 56864
diff changeset
   844
        private static boolean isAvailableGroup(NamedGroup namedGroup) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   845
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   846
            Optional<NamedGroupFunctions> ngfOpt = namedGroup.getFunctions();
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   847
            if (ngfOpt.isEmpty()) {
56858
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   848
                return false;
829e9b5ace08 Patching in old branch
apetcher
parents: 51398
diff changeset
   849
            }
56864
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   850
            NamedGroupFunctions ngf = ngfOpt.get();
ec60669bc501 Factoring out some duplicate code.
apetcher
parents: 56862
diff changeset
   851
            return ngf.isAvailable();
43693
e340c8d10cbb 8173783: IllegalArgumentException: jdk.tls.namedGroups
coffeys
parents: 41473
diff changeset
   852
        }
e340c8d10cbb 8173783: IllegalArgumentException: jdk.tls.namedGroups
coffeys
parents: 41473
diff changeset
   853
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   854
        static ECGenParameterSpec getECGenParamSpec(NamedGroup namedGroup) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   855
            if (namedGroup.type != NamedGroupType.NAMED_GROUP_ECDHE) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   856
                throw new RuntimeException(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   857
                        "Not a named EC group: " + namedGroup);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   858
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   859
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   860
            // functions is non-null for ECDHE type
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   861
            AlgorithmParameters params = namedGroup.functions.getParameters();
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   862
            try {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   863
                return params.getParameterSpec(ECGenParameterSpec.class);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   864
            } catch (InvalidParameterSpecException ipse) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   865
                // should be unlikely
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   866
                return new ECGenParameterSpec(namedGroup.oid);
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   867
            }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   868
        }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   869
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   870
        static AlgorithmParameters getParameters(NamedGroup ng) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   871
            AlgorithmParameters params = null;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   872
            if (ng.functions != null) {
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   873
                params = ng.functions.getParameters();
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   874
            }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   875
            return params;
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   876
        }
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   877
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   878
        // Is there any supported group permitted by the constraints?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   879
        static boolean isActivatable(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   880
                AlgorithmConstraints constraints, NamedGroupType type) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   881
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   882
            boolean hasFFDHEGroups = false;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   883
            for (NamedGroup namedGroup : supportedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   884
                if (namedGroup.type == type) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   885
                    if (constraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   886
                            EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   887
                            namedGroup.algorithm,
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   888
                            getParameters(namedGroup))) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   889
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   890
                        return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   891
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   892
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   893
                    if (!hasFFDHEGroups &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   894
                            (type == NamedGroupType.NAMED_GROUP_FFDHE)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   895
                        hasFFDHEGroups = true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   896
                    }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   897
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   898
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   899
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   900
            // For compatibility, if no FFDHE groups are defined, the non-FFDHE
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   901
            // compatible mode (using DHE cipher suite without FFDHE extension)
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   902
            // is allowed.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   903
            //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   904
            // Note that the constraints checking on DHE parameters will be
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   905
            // performed during key exchanging in a handshake.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   906
            return !hasFFDHEGroups && type == NamedGroupType.NAMED_GROUP_FFDHE;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   907
        }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   908
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   909
        // Is the named group permitted by the constraints?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   910
        static boolean isActivatable(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   911
                AlgorithmConstraints constraints, NamedGroup namedGroup) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   912
            if (!isSupported(namedGroup)) {
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   913
                return false;
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   914
            }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   915
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   916
            return constraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   917
                            EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   918
                            namedGroup.algorithm,
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   919
                            getParameters(namedGroup));
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   920
        }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   921
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   922
        // Is there any supported group permitted by the constraints?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   923
        static boolean isSupported(NamedGroup namedGroup) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   924
            for (NamedGroup group : supportedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   925
                if (namedGroup.id == group.id) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   926
                    return true;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   927
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   928
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   929
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   930
            return false;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   931
        }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   932
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   933
        static NamedGroup getPreferredGroup(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   934
                ProtocolVersion negotiatedProtocol,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   935
                AlgorithmConstraints constraints, NamedGroupType type,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   936
                List<NamedGroup> requestedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   937
            for (NamedGroup namedGroup : requestedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   938
                if ((namedGroup.type == type) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   939
                        namedGroup.isAvailable(negotiatedProtocol) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   940
                        constraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   941
                                EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   942
                                namedGroup.algorithm,
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   943
                                getParameters(namedGroup))) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   944
                    return namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   945
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   946
            }
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
   947
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   948
            return null;
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   949
        }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
   950
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   951
        static NamedGroup getPreferredGroup(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   952
                ProtocolVersion negotiatedProtocol,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   953
                AlgorithmConstraints constraints, NamedGroupType type) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   954
            for (NamedGroup namedGroup : supportedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   955
                if ((namedGroup.type == type) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   956
                        namedGroup.isAvailable(negotiatedProtocol) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   957
                        constraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   958
                                EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   959
                                namedGroup.algorithm,
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
   960
                                getParameters(namedGroup))) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   961
                    return namedGroup;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   962
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   963
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   964
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   965
            return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   966
        }
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
   967
    }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
   968
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   969
    /**
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   970
     * Network data producer of a "supported_groups" extension in
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   971
     * the ClientHello handshake message.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   972
     */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   973
    private static final class CHSupportedGroupsProducer
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   974
            extends SupportedGroups implements HandshakeProducer {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   975
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   976
        private CHSupportedGroupsProducer() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   977
            // blank
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   978
        }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   979
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   980
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   981
        public byte[] produce(ConnectionContext context,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   982
                HandshakeMessage message) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   983
            // The producing happens in client side only.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   984
            ClientHandshakeContext chc = (ClientHandshakeContext)context;
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   985
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   986
            // Is it a supported and enabled extension?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   987
            if (!chc.sslConfig.isAvailable(CH_SUPPORTED_GROUPS)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   988
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   989
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   990
                        "Ignore unavailable supported_groups extension");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   991
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   992
                return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   993
            }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
   994
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   995
            // Produce the extension.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   996
            ArrayList<NamedGroup> namedGroups =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   997
                new ArrayList<>(SupportedGroups.supportedNamedGroups.length);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   998
            for (NamedGroup ng : SupportedGroups.supportedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
   999
                if ((!SupportedGroups.enableFFDHE) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1000
                    (ng.type == NamedGroupType.NAMED_GROUP_FFDHE)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1001
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1002
                }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1003
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1004
                if (ng.isAvailable(chc.activeProtocols) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1005
                        ng.isSupported(chc.activeCipherSuites) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1006
                        chc.algorithmConstraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1007
                            EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
  1008
                            ng.algorithm, getParameters(ng))) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1009
                    namedGroups.add(ng);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1010
                } else if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1011
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1012
                        "Ignore inactive or disabled named group: " + ng.name);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1013
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1014
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1015
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1016
            if (namedGroups.isEmpty()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1017
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1018
                    SSLLogger.warning("no available named group");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1019
                }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1020
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1021
                return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1022
            }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1023
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1024
            int vectorLen = namedGroups.size() << 1;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1025
            byte[] extData = new byte[vectorLen + 2];
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1026
            ByteBuffer m = ByteBuffer.wrap(extData);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1027
            Record.putInt16(m, vectorLen);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1028
            for (NamedGroup namedGroup : namedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1029
                    Record.putInt16(m, namedGroup.id);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1030
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1031
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1032
            // Update the context.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1033
            chc.clientRequestedNamedGroups =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1034
                    Collections.<NamedGroup>unmodifiableList(namedGroups);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1035
            chc.handshakeExtensions.put(CH_SUPPORTED_GROUPS,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1036
                    new SupportedGroupsSpec(namedGroups));
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1037
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1038
            return extData;
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1039
        }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1040
    }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1041
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1042
    /**
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1043
     * Network data producer of a "supported_groups" extension in
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1044
     * the ClientHello handshake message.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1045
     */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1046
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1047
            class CHSupportedGroupsConsumer implements ExtensionConsumer {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1048
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1049
        private CHSupportedGroupsConsumer() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1050
            // blank
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1051
        }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1052
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1053
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1054
        public void consume(ConnectionContext context,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1055
            HandshakeMessage message, ByteBuffer buffer) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1056
            // The consuming happens in server side only.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1057
            ServerHandshakeContext shc = (ServerHandshakeContext)context;
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1058
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1059
            // Is it a supported and enabled extension?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1060
            if (!shc.sslConfig.isAvailable(CH_SUPPORTED_GROUPS)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1061
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1062
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1063
                        "Ignore unavailable supported_groups extension");
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1064
                }
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1065
                return;     // ignore the extension
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1066
            }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1067
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1068
            // Parse the extension.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1069
            SupportedGroupsSpec spec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1070
            try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1071
                spec = new SupportedGroupsSpec(buffer);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1072
            } catch (IOException ioe) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1073
                shc.conContext.fatal(Alert.UNEXPECTED_MESSAGE, ioe);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1074
                return;     // fatal() always throws, make the compiler happy.
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1075
            }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1076
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1077
            // Update the context.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1078
            List<NamedGroup> knownNamedGroups = new LinkedList<>();
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1079
            for (int id : spec.namedGroupsIds) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1080
                NamedGroup ng = NamedGroup.valueOf(id);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1081
                if (ng != null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1082
                    knownNamedGroups.add(ng);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1083
                }
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1084
            }
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1085
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1086
            shc.clientRequestedNamedGroups = knownNamedGroups;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1087
            shc.handshakeExtensions.put(CH_SUPPORTED_GROUPS, spec);
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1088
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1089
            // No impact on session resumption.
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1090
        }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1091
    }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1092
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1093
    /**
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1094
     * Network data producer of a "supported_groups" extension in
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1095
     * the EncryptedExtensions handshake message.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1096
     */
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1097
    private static final class EESupportedGroupsProducer
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1098
            extends SupportedGroups implements HandshakeProducer {
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1099
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1100
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1101
        private EESupportedGroupsProducer() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1102
            // blank
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1103
        }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1104
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1105
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1106
        public byte[] produce(ConnectionContext context,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1107
                HandshakeMessage message) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1108
            // The producing happens in server side only.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1109
            ServerHandshakeContext shc = (ServerHandshakeContext)context;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1110
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1111
            // Is it a supported and enabled extension?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1112
            if (!shc.sslConfig.isAvailable(EE_SUPPORTED_GROUPS)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1113
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1114
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1115
                        "Ignore unavailable supported_groups extension");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1116
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1117
                return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1118
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1119
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1120
            // Produce the extension.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1121
            //
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1122
            // Contains all groups the server supports, regardless of whether
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1123
            // they are currently supported by the client.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1124
            ArrayList<NamedGroup> namedGroups = new ArrayList<>(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1125
                    SupportedGroups.supportedNamedGroups.length);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1126
            for (NamedGroup ng : SupportedGroups.supportedNamedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1127
                if ((!SupportedGroups.enableFFDHE) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1128
                    (ng.type == NamedGroupType.NAMED_GROUP_FFDHE)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1129
                    continue;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1130
                }
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1131
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1132
                if (ng.isAvailable(shc.activeProtocols) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1133
                        ng.isSupported(shc.activeCipherSuites) &&
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1134
                        shc.algorithmConstraints.permits(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1135
                            EnumSet.of(CryptoPrimitive.KEY_AGREEMENT),
56862
b9f6f8606065 Improve parameters cache organization
apetcher
parents: 56861
diff changeset
  1136
                            ng.algorithm, getParameters(ng))) {
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1137
                    namedGroups.add(ng);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1138
                } else if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1139
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1140
                        "Ignore inactive or disabled named group: " + ng.name);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1141
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1142
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1143
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1144
            if (namedGroups.isEmpty()) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1145
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1146
                    SSLLogger.warning("no available named group");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1147
                }
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1148
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1149
                return null;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1150
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1151
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1152
            int vectorLen = namedGroups.size() << 1;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1153
            byte[] extData = new byte[vectorLen + 2];
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1154
            ByteBuffer m = ByteBuffer.wrap(extData);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1155
            Record.putInt16(m, vectorLen);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1156
            for (NamedGroup namedGroup : namedGroups) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1157
                    Record.putInt16(m, namedGroup.id);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1158
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1159
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1160
            // Update the context.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1161
            shc.conContext.serverRequestedNamedGroups =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1162
                    Collections.<NamedGroup>unmodifiableList(namedGroups);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1163
            SupportedGroupsSpec spec = new SupportedGroupsSpec(namedGroups);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1164
            shc.handshakeExtensions.put(EE_SUPPORTED_GROUPS, spec);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1165
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1166
            return extData;
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1167
        }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1168
    }
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1169
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1170
    private static final
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1171
            class EESupportedGroupsConsumer implements ExtensionConsumer {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1172
        // Prevent instantiation of this class.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1173
        private EESupportedGroupsConsumer() {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1174
            // blank
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1175
        }
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1176
50768
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1177
        @Override
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1178
        public void consume(ConnectionContext context,
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1179
            HandshakeMessage message, ByteBuffer buffer) throws IOException {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1180
            // The consuming happens in client side only.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1181
            ClientHandshakeContext chc = (ClientHandshakeContext)context;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1182
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1183
            // Is it a supported and enabled extension?
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1184
            if (!chc.sslConfig.isAvailable(EE_SUPPORTED_GROUPS)) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1185
                if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1186
                    SSLLogger.fine(
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1187
                        "Ignore unavailable supported_groups extension");
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1188
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1189
                return;     // ignore the extension
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1190
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1191
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1192
            // Parse the extension.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1193
            SupportedGroupsSpec spec;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1194
            try {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1195
                spec = new SupportedGroupsSpec(buffer);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1196
            } catch (IOException ioe) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1197
                chc.conContext.fatal(Alert.UNEXPECTED_MESSAGE, ioe);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1198
                return;     // fatal() always throws, make the compiler happy.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1199
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1200
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1201
            // Update the context.
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1202
            List<NamedGroup> knownNamedGroups =
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1203
                    new ArrayList<>(spec.namedGroupsIds.length);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1204
            for (int id : spec.namedGroupsIds) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1205
                NamedGroup ng = NamedGroup.valueOf(id);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1206
                if (ng != null) {
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1207
                    knownNamedGroups.add(ng);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1208
                }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1209
            }
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1210
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1211
            chc.conContext.serverRequestedNamedGroups = knownNamedGroups;
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1212
            chc.handshakeExtensions.put(EE_SUPPORTED_GROUPS, spec);
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1213
68fa3d4026ea 8196584: TLS 1.3 Implementation
xuelei
parents: 47216
diff changeset
  1214
            // No impact on session resumption.
45064
b1b45177051b 8140436: Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS
xuelei
parents: 43693
diff changeset
  1215
        }
39563
1449ed425710 8148516: Improve the default strength of EC in JDK
xuelei
parents: 37814
diff changeset
  1216
    }
14330
e4cb78065603 8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
ohrstrom
parents:
diff changeset
  1217
}