jdk/src/share/classes/sun/security/ssl/Authenticator.java
changeset 16913 a6f4d1626ad9
child 17185 510e5f180f31
equal deleted inserted replaced
16911:6cc48540fcd7 16913:a6f4d1626ad9
       
     1 /*
       
     2  * Copyright (c) 2012, 2013, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.  Oracle designates this
       
     8  * particular file as subject to the "Classpath" exception as provided
       
     9  * by Oracle in the LICENSE file that accompanied this code.
       
    10  *
       
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    14  * version 2 for more details (a copy is included in the LICENSE file that
       
    15  * accompanied this code).
       
    16  *
       
    17  * You should have received a copy of the GNU General Public License version
       
    18  * 2 along with this work; if not, write to the Free Software Foundation,
       
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    20  *
       
    21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    22  * or visit www.oracle.com if you need additional information or have any
       
    23  * questions.
       
    24  */
       
    25 
       
    26 package sun.security.ssl;
       
    27 
       
    28 import java.util.Arrays;
       
    29 
       
    30 /**
       
    31  * This class represents an SSL/TLS message authentication token,
       
    32  * which encapsulates a sequence number and ensures that attempts to
       
    33  * delete or reorder messages can be detected.
       
    34  *
       
    35  * Each SSL/TLS connection state contains a sequence number, which
       
    36  * is maintained separately for read and write states.  The sequence
       
    37  * number MUST be set to zero whenever a connection state is made the
       
    38  * active state.  Sequence numbers are of type uint64 and may not
       
    39  * exceed 2^64-1.  Sequence numbers do not wrap.  If a SSL/TLS
       
    40  * implementation would need to wrap a sequence number, it must
       
    41  * renegotiate instead.  A sequence number is incremented after each
       
    42  * record: specifically, the first record transmitted under a
       
    43  * particular connection state MUST use sequence number 0.
       
    44  */
       
    45 class Authenticator {
       
    46 
       
    47     // byte array containing the additional authentication information for
       
    48     // each record
       
    49     private final byte[] block;
       
    50 
       
    51     // the block size of SSL v3.0:
       
    52     // sequence number + record type + + record length
       
    53     private static final int BLOCK_SIZE_SSL = 8 + 1 + 2;
       
    54 
       
    55     // the block size of TLS v1.0 and later:
       
    56     // sequence number + record type + protocol version + record length
       
    57     private static final int BLOCK_SIZE_TLS = 8 + 1 + 2 + 2;
       
    58 
       
    59     /**
       
    60      * Default construct, no message authentication token is initialized.
       
    61      *
       
    62      * Note that this construct can only be called for null MAC
       
    63      */
       
    64     Authenticator() {
       
    65         block = new byte[0];
       
    66     }
       
    67 
       
    68     /**
       
    69      * Constructs the message authentication token for the specified
       
    70      * SSL/TLS protocol.
       
    71      */
       
    72     Authenticator(ProtocolVersion protocolVersion) {
       
    73         if (protocolVersion.v >= ProtocolVersion.TLS10.v) {
       
    74             block = new byte[BLOCK_SIZE_TLS];
       
    75             block[9] = protocolVersion.major;
       
    76             block[10] = protocolVersion.minor;
       
    77         } else {
       
    78             block = new byte[BLOCK_SIZE_SSL];
       
    79         }
       
    80     }
       
    81 
       
    82     /**
       
    83      * Checks whether the sequence number is close to wrap.
       
    84      *
       
    85      * Sequence numbers are of type uint64 and may not exceed 2^64-1.
       
    86      * Sequence numbers do not wrap. When the sequence number is near
       
    87      * to wrap, we need to close the connection immediately.
       
    88      *
       
    89      * @return true if the sequence number is close to wrap
       
    90      */
       
    91     final boolean seqNumOverflow() {
       
    92         /*
       
    93          * Conservatively, we don't allow more records to be generated
       
    94          * when there are only 2^8 sequence numbers left.
       
    95          */
       
    96         return (block.length != 0 &&
       
    97                 block[0] == (byte)0xFF && block[1] == (byte)0xFF &&
       
    98                 block[2] == (byte)0xFF && block[3] == (byte)0xFF &&
       
    99                 block[4] == (byte)0xFF && block[5] == (byte)0xFF &&
       
   100                 block[6] == (byte)0xFF);
       
   101     }
       
   102 
       
   103     /**
       
   104      * Checks whether the sequence number close to renew.
       
   105      *
       
   106      * Sequence numbers are of type uint64 and may not exceed 2^64-1.
       
   107      * Sequence numbers do not wrap.  If a TLS
       
   108      * implementation would need to wrap a sequence number, it must
       
   109      * renegotiate instead.
       
   110      *
       
   111      * @return true if the sequence number is huge enough to renew
       
   112      */
       
   113     final boolean seqNumIsHuge() {
       
   114         /*
       
   115          * Conservatively, we should ask for renegotiation when there are
       
   116          * only 2^48 sequence numbers left.
       
   117          */
       
   118         return (block.length != 0 &&
       
   119                 block[0] == (byte)0xFF && block[1] == (byte)0xFF);
       
   120     }
       
   121 
       
   122     /**
       
   123      * Gets the current sequence number.
       
   124      *
       
   125      * @return the byte array of the current sequence number
       
   126      */
       
   127     final byte[] sequenceNumber() {
       
   128         return Arrays.copyOf(block, 8);
       
   129     }
       
   130 
       
   131     /**
       
   132      * Acquires the current message authentication information with the
       
   133      * specified record type and fragment length, and then increases the
       
   134      * sequence number.
       
   135      *
       
   136      * @param  type the record type
       
   137      * @param  length the fragment of the record
       
   138      * @return the byte array of the current message authentication information
       
   139      */
       
   140     final byte[] acquireAuthenticationBytes(byte type, int length) {
       
   141         byte[] copy = block.clone();
       
   142 
       
   143         if (block.length != 0) {
       
   144             copy[8] = type;
       
   145             copy[copy.length - 2] = (byte)(length >> 8);
       
   146             copy[copy.length - 1] = (byte)(length);
       
   147 
       
   148             /*
       
   149              * Increase the sequence number in the block array
       
   150              * it is a 64-bit number stored in big-endian format
       
   151              */
       
   152             int k = 7;
       
   153             while ((k >= 0) && (++block[k] == 0)) {
       
   154                 k--;
       
   155             }
       
   156         }
       
   157 
       
   158         return copy;
       
   159     }
       
   160 
       
   161 }