src/java.base/share/classes/sun/security/ssl/ServerKeyExchange.java
branchJDK-8145252-TLS13-branch
changeset 56542 56aaa6cb3693
child 56704 c3ee22c3a0f6
equal deleted inserted replaced
56541:92cbbfc996f3 56542:56aaa6cb3693
       
     1 /*
       
     2  * Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.  Oracle designates this
       
     8  * particular file as subject to the "Classpath" exception as provided
       
     9  * by Oracle in the LICENSE file that accompanied this code.
       
    10  *
       
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    14  * version 2 for more details (a copy is included in the LICENSE file that
       
    15  * accompanied this code).
       
    16  *
       
    17  * You should have received a copy of the GNU General Public License version
       
    18  * 2 along with this work; if not, write to the Free Software Foundation,
       
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    20  *
       
    21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    22  * or visit www.oracle.com if you need additional information or have any
       
    23  * questions.
       
    24  */
       
    25 
       
    26 package sun.security.ssl;
       
    27 
       
    28 import java.io.IOException;
       
    29 import java.nio.ByteBuffer;
       
    30 import java.util.Map;
       
    31 import sun.security.ssl.SSLHandshake.HandshakeMessage;
       
    32 
       
    33 /**
       
    34  * Pack of the ServerKeyExchange handshake message.
       
    35  */
       
    36 final class ServerKeyExchange {
       
    37     static final SSLConsumer handshakeConsumer =
       
    38         new ServerKeyExchangeConsumer();
       
    39     static final HandshakeProducer handshakeProducer =
       
    40         new ServerKeyExchangeProducer();
       
    41 
       
    42     /**
       
    43      * The "ServerKeyExchange" handshake message producer.
       
    44      */
       
    45     private static final
       
    46             class ServerKeyExchangeProducer implements HandshakeProducer {
       
    47         // Prevent instantiation of this class.
       
    48         private ServerKeyExchangeProducer() {
       
    49             // blank
       
    50         }
       
    51 
       
    52         @Override
       
    53         public byte[] produce(ConnectionContext context,
       
    54                 HandshakeMessage message) throws IOException {
       
    55             // The producing happens in server side only.
       
    56             ServerHandshakeContext shc = (ServerHandshakeContext)context;
       
    57 
       
    58             SSLKeyExchange ke =
       
    59                 SSLKeyExchange.valueOf(shc.negotiatedCipherSuite.keyExchange);
       
    60             if (ke != null) {
       
    61                 for (Map.Entry<Byte, HandshakeProducer> hc :
       
    62                         ke.getHandshakeProducers(shc)) {
       
    63                     if (hc.getKey() == SSLHandshake.SERVER_KEY_EXCHANGE.id) {
       
    64                         return hc.getValue().produce(context, message);
       
    65                     }
       
    66                 }
       
    67             }
       
    68 
       
    69             // not producer defined.
       
    70             shc.conContext.fatal(Alert.HANDSHAKE_FAILURE,
       
    71                     "No ServerKeyExchange handshake message can be produced.");
       
    72             return null;    // make the compiler happe
       
    73         }
       
    74     }
       
    75 
       
    76     /**
       
    77      * The "ServerKeyExchange" handshake message consumer.
       
    78      */
       
    79     private static final
       
    80             class ServerKeyExchangeConsumer implements SSLConsumer {
       
    81         // Prevent instantiation of this class.
       
    82         private ServerKeyExchangeConsumer() {
       
    83             // blank
       
    84         }
       
    85 
       
    86         @Override
       
    87         public void consume(ConnectionContext context,
       
    88                 ByteBuffer message) throws IOException {
       
    89             // The producing happens in client side only.
       
    90             ClientHandshakeContext chc = (ClientHandshakeContext)context;
       
    91 
       
    92             // clean up this consumer
       
    93             chc.handshakeConsumers.remove(SSLHandshake.SERVER_KEY_EXCHANGE.id);
       
    94 
       
    95             SSLKeyExchange ke =
       
    96                 SSLKeyExchange.valueOf(chc.negotiatedCipherSuite.keyExchange);
       
    97             if (ke != null) {
       
    98                 for (Map.Entry<Byte, SSLConsumer> hc :
       
    99                         ke.getHandshakeConsumers(chc)) {
       
   100                     if (hc.getKey() == SSLHandshake.SERVER_KEY_EXCHANGE.id) {
       
   101                         hc.getValue().consume(context, message);
       
   102                         return;
       
   103                     }
       
   104                 }
       
   105             }
       
   106 
       
   107             // not comsumer defined.
       
   108             chc.conContext.fatal(Alert.UNEXPECTED_MESSAGE,
       
   109                         "Unexpected ServerKeyExchange handshake message.");
       
   110         }
       
   111     }
       
   112 }
       
   113