src/java.base/share/classes/sun/security/ssl/Alert.java
branchJDK-8145252-TLS13-branch
changeset 56542 56aaa6cb3693
parent 47216 71c04702a3d5
child 56674 d2ba9e6f1cac
equal deleted inserted replaced
56541:92cbbfc996f3 56542:56aaa6cb3693
       
     1 /*
       
     2  * Copyright (c) 2003, 2018, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.  Oracle designates this
       
     8  * particular file as subject to the "Classpath" exception as provided
       
     9  * by Oracle in the LICENSE file that accompanied this code.
       
    10  *
       
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    14  * version 2 for more details (a copy is included in the LICENSE file that
       
    15  * accompanied this code).
       
    16  *
       
    17  * You should have received a copy of the GNU General Public License version
       
    18  * 2 along with this work; if not, write to the Free Software Foundation,
       
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    20  *
       
    21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    22  * or visit www.oracle.com if you need additional information or have any
       
    23  * questions.
       
    24  */
       
    25 
       
    26 package sun.security.ssl;
       
    27 
       
    28 import java.io.IOException;
       
    29 import java.nio.ByteBuffer;
       
    30 import java.text.MessageFormat;
       
    31 import java.util.Locale;
       
    32 import javax.net.ssl.*;
       
    33 
       
    34 /**
       
    35  * SSL/(D)TLS Alter description
       
    36  */
       
    37 enum Alert {
       
    38     // Please refer to TLS Alert Registry for the latest (D)TLS Alert values:
       
    39     //     https://www.iana.org/assignments/tls-parameters/
       
    40     CLOSE_NOTIFY            ((byte)0,   "close_notify", false),
       
    41     UNEXPECTED_MESSAGE      ((byte)10,  "unexpected_message", false),
       
    42     BAD_RECORD_MAC          ((byte)20,  "bad_record_mac", false),
       
    43     DECRYPTION_FAILED       ((byte)21,  "decryption_failed", false),
       
    44     RECORD_OVERFLOW         ((byte)22,  "record_overflow", false),
       
    45     DECOMPRESSION_FAILURE   ((byte)30,  "decompression_failure", false),
       
    46     HANDSHAKE_FAILURE       ((byte)40,  "handshake_failure", true),
       
    47     NO_CERTIFICATE          ((byte)41,  "no_certificate", true),
       
    48     BAD_CERTIFICATE         ((byte)42,  "bad_certificate", true),
       
    49     UNSUPPORTED_CERTIFCATE  ((byte)43,  "unsupported_certificate", true),
       
    50     CERTIFICATE_REVOKED     ((byte)44,  "certificate_revoked", true),
       
    51     CERTIFICATE_EXPIRED     ((byte)45,  "certificate_expired", true),
       
    52     CERTIFICATE_UNKNOWN     ((byte)46,  "certificate_unknown", true),
       
    53     ILLEGAL_PARAMETER       ((byte)47,  "illegal_parameter", true),
       
    54     UNKNOWN_CA              ((byte)48,  "unknown_ca", true),
       
    55     ACCESS_DENIED           ((byte)49,  "access_denied", true),
       
    56     DECODE_ERROR            ((byte)50,  "decode_error", true),
       
    57     DECRYPT_ERROR           ((byte)51,  "decrypt_error", true),
       
    58     EXPORT_RESTRICTION      ((byte)60,  "export_restriction", true),
       
    59     PROTOCOL_VERSION        ((byte)70,  "protocol_version", true),
       
    60     INSUFFICIENT_SECURITY   ((byte)71,  "insufficient_security", true),
       
    61     INTERNAL_ERROR          ((byte)80,  "internal_error", false),
       
    62     INAPPROPRIATE_FALLBACK  ((byte)86,  "inappropriate_fallback", false),
       
    63     USER_CANCELED           ((byte)90,  "user_canceled", false),
       
    64     NO_RENEGOTIATION        ((byte)100, "no_renegotiation", true),
       
    65     MISSING_EXTENSION       ((byte)109, "missing_extension", true),
       
    66     UNSUPPORTED_EXTENSION   ((byte)110, "unsupported_extension", true),
       
    67     CERT_UNOBTAINABLE       ((byte)111, "certificate_unobtainable", true),
       
    68     UNRECOGNIZED_NAME       ((byte)112, "unrecognized_name", true),
       
    69     BAD_CERT_STATUS_RESPONSE((byte)113,
       
    70                                     "bad_certificate_status_response", true),
       
    71     BAD_CERT_HASH_VALUE     ((byte)114, "bad_certificate_hash_value", true),
       
    72     UNKNOWN_PSK_IDENTITY    ((byte)115, "unknown_psk_identity", true),
       
    73     CERTIFICATE_REQUIRED    ((byte)116, "certificate_required", true),
       
    74     NO_APPLICATION_PROTOCOL ((byte)120, "no_application_protocol", true);
       
    75 
       
    76     // ordinal value of the Alert
       
    77     final byte id;
       
    78 
       
    79     // description of the Alert
       
    80     final String description;
       
    81 
       
    82     // Does tha alert happen during handshake only?
       
    83     final boolean handshakeOnly;
       
    84 
       
    85     // Alert message consumer
       
    86     static final SSLConsumer alertConsumer = new AlertConsumer();
       
    87 
       
    88     private Alert(byte id, String description, boolean handshakeOnly) {
       
    89         this.id = id;
       
    90         this.description = description;
       
    91         this.handshakeOnly = handshakeOnly;
       
    92     }
       
    93 
       
    94     static Alert valueOf(byte id) {
       
    95         for (Alert al : Alert.values()) {
       
    96             if (al.id == id) {
       
    97                 return al;
       
    98             }
       
    99         }
       
   100 
       
   101         return null;
       
   102     }
       
   103 
       
   104     static String nameOf(byte id) {
       
   105         for (Alert al : Alert.values()) {
       
   106             if (al.id == id) {
       
   107                 return al.description;
       
   108             }
       
   109         }
       
   110 
       
   111         return "UNKNOWN ALERT (" + (id & 0x0FF) + ")";
       
   112     }
       
   113 
       
   114     SSLException createSSLException(String reason) {
       
   115         return createSSLException(reason, null);
       
   116     }
       
   117 
       
   118     SSLException createSSLException(String reason, Throwable cause) {
       
   119         if (reason == null) {
       
   120             reason = (cause != null) ? cause.getMessage() : "";
       
   121         }
       
   122 
       
   123         SSLException ssle = handshakeOnly ?
       
   124                 new SSLHandshakeException(reason) : new SSLException(reason);
       
   125         if (cause != null) {
       
   126             ssle.initCause(cause);
       
   127         }
       
   128 
       
   129         return ssle;
       
   130     }
       
   131 
       
   132     /**
       
   133      * SSL/(D)TLS Alert level.
       
   134      */
       
   135     enum Level {
       
   136         WARNING ((byte)1, "warning"),
       
   137         FATAL   ((byte)2, "fatal");
       
   138 
       
   139         // ordinal value of the Alert level
       
   140         final byte level;
       
   141 
       
   142         // description of the Alert level
       
   143         final String description;
       
   144 
       
   145         private Level(byte level, String description) {
       
   146             this.level = level;
       
   147             this.description = description;
       
   148         }
       
   149 
       
   150         static Level valueOf(byte level) {
       
   151             for (Level lv : Level.values()) {
       
   152                 if (lv.level == level) {
       
   153                     return lv;
       
   154                 }
       
   155             }
       
   156 
       
   157             return null;
       
   158         }
       
   159 
       
   160         static String nameOf(byte level) {
       
   161             for (Level lv : Level.values()) {
       
   162                 if (lv.level == level) {
       
   163                     return lv.description;
       
   164                 }
       
   165             }
       
   166 
       
   167             return "UNKNOWN ALERT LEVEL (" + (level & 0x0FF) + ")";
       
   168         }
       
   169     }
       
   170 
       
   171     /**
       
   172      * The Alert message.
       
   173      */
       
   174     private static final class AlertMessage {
       
   175         private final byte level;       // level
       
   176         private final byte id;          // description
       
   177 
       
   178         AlertMessage(TransportContext context,
       
   179                 ByteBuffer m) throws IOException {
       
   180             //  struct {
       
   181             //      AlertLevel level;
       
   182             //      AlertDescription description;
       
   183             //  } Alert;
       
   184             if (m.remaining() != 2) {
       
   185                 context.fatal(Alert.ILLEGAL_PARAMETER,
       
   186                     "Invalid Alert message: no sufficient data");
       
   187             }
       
   188 
       
   189             this.level = m.get();   // level
       
   190             this.id = m.get();      // description
       
   191         }
       
   192 
       
   193         @Override
       
   194         public String toString() {
       
   195             MessageFormat messageFormat = new MessageFormat(
       
   196                     "\"Alert\": '{'\n" +
       
   197                     "  \"level\"      : \"{0}\",\n" +
       
   198                     "  \"description\": \"{1}\"\n" +
       
   199                     "'}'",
       
   200                     Locale.ENGLISH);
       
   201 
       
   202             Object[] messageFields = {
       
   203                 Level.nameOf(level),
       
   204                 Alert.nameOf(id)
       
   205             };
       
   206 
       
   207             return messageFormat.format(messageFields);
       
   208         }
       
   209     }
       
   210 
       
   211     /**
       
   212      * Consumer of alert messages
       
   213      */
       
   214     private static final class AlertConsumer implements SSLConsumer {
       
   215         // Prevent instantiation of this class.
       
   216         private AlertConsumer() {
       
   217             // blank
       
   218         }
       
   219 
       
   220         @Override
       
   221         public void consume(ConnectionContext context,
       
   222                 ByteBuffer m) throws IOException {
       
   223             TransportContext tc = (TransportContext)context;
       
   224 
       
   225             AlertMessage am = new AlertMessage(tc, m);
       
   226             if (SSLLogger.isOn && SSLLogger.isOn("ssl")) {
       
   227                 SSLLogger.fine("Received alert message", am);
       
   228             }
       
   229 
       
   230             Level level = Level.valueOf(am.level);
       
   231             Alert alert = Alert.valueOf(am.id);
       
   232             if (alert == Alert.CLOSE_NOTIFY) {
       
   233                 if (tc.handshakeContext != null) {
       
   234                     tc.fatal(Alert.UNEXPECTED_MESSAGE,
       
   235                             "Received close_notify during handshake");
       
   236                 }
       
   237 
       
   238                 tc.isInputCloseNotified = true;
       
   239                 tc.closeInbound();
       
   240             } else if ((level == Level.WARNING) && (alert != null)) {
       
   241                 // Terminate the connection if an alert with a level of warning
       
   242                 // is received during handshaking, except the no_certificate
       
   243                 // warning.
       
   244                 if (alert.handshakeOnly && (tc.handshakeContext != null)) {
       
   245                     // It's OK to get a no_certificate alert from a client of
       
   246                     // which we requested client authentication.  However,
       
   247                     // if we required it, then this is not acceptable.
       
   248                      if (tc.sslConfig.isClientMode ||
       
   249                             alert != Alert.NO_CERTIFICATE ||
       
   250                             (tc.sslConfig.clientAuthType !=
       
   251                                     ClientAuthType.CLIENT_AUTH_REQUESTED)) {
       
   252                         tc.fatal(Alert.HANDSHAKE_FAILURE,
       
   253                             "received handshake warning: " + alert.description);
       
   254                     }  // Otherwise, ignore the warning
       
   255                 }   // Otherwise, ignore the warning.
       
   256             } else {    // fatal or unknown
       
   257                 String diagnostic;
       
   258                 if (alert == null) {
       
   259                     alert = Alert.UNEXPECTED_MESSAGE;
       
   260                     diagnostic = "Unknown alert description (" + am.id + ")";
       
   261                 } else {
       
   262                     diagnostic = "Received fatal alert: " + alert.description;
       
   263                 }
       
   264 
       
   265                 tc.fatal(alert, diagnostic, true, null);
       
   266             }
       
   267         }
       
   268     }
       
   269 }