blob: 20219e082465efdd216181cd9ac8486378f73a00 [file] [log] [blame]
/*
* Copyright (C) 2007 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.harmony.xnet.provider.jsse;
import java.io.IOException;
import java.net.InetAddress;
import java.net.Socket;
import java.security.PrivateKey;
import java.security.interfaces.ECPrivateKey;
import java.security.interfaces.DSAPrivateKey;
import java.security.interfaces.RSAPrivateKey;
import javax.net.ssl.SSLException;
/**
* OpenSSL-based implementation of server sockets.
*
* This class only supports SSLv3 and TLSv1. This should be documented elsewhere
* later, for example in the package.html or a separate reference document.
*/
public class OpenSSLServerSocketImpl extends javax.net.ssl.SSLServerSocket {
private final SSLParametersImpl sslParameters;
private String[] enabledProtocols = NativeCrypto.getSupportedProtocols();
private String[] enabledCipherSuites = NativeCrypto.getDefaultCipherSuites();
private String[] enabledCompressionMethods = NativeCrypto.getDefaultCompressionMethods();
protected OpenSSLServerSocketImpl(SSLParametersImpl sslParameters) throws IOException {
this.sslParameters = sslParameters;
}
protected OpenSSLServerSocketImpl(int port, SSLParametersImpl sslParameters)
throws IOException {
super(port);
this.sslParameters = sslParameters;
}
protected OpenSSLServerSocketImpl(int port, int backlog, SSLParametersImpl sslParameters)
throws IOException {
super(port, backlog);
this.sslParameters = sslParameters;
}
protected OpenSSLServerSocketImpl(int port,
int backlog,
InetAddress iAddress,
SSLParametersImpl sslParameters)
throws IOException {
super(port, backlog, iAddress);
this.sslParameters = sslParameters;
}
@Override
public boolean getEnableSessionCreation() {
return sslParameters.getEnableSessionCreation();
}
@Override
public void setEnableSessionCreation(boolean flag) {
sslParameters.setEnableSessionCreation(flag);
}
/**
* The names of the protocols' versions that may be used on this SSL
* connection.
* @return an array of protocols names
*/
@Override
public String[] getSupportedProtocols() {
return NativeCrypto.getSupportedProtocols();
}
/**
* The names of the protocols' versions that in use on this SSL connection.
*
* @return an array of protocols names
*/
@Override
public String[] getEnabledProtocols() {
return enabledProtocols.clone();
}
/**
* This method enables the protocols' versions listed by
* getSupportedProtocols().
*
* @param protocols names of all the protocols to enable.
*
* @throws IllegalArgumentException when one or more of the names in the
* array are not supported, or when the array is null.
*/
@Override
public void setEnabledProtocols(String[] protocols) {
enabledProtocols = NativeCrypto.checkEnabledProtocols(protocols);
}
@Override
public String[] getSupportedCipherSuites() {
return NativeCrypto.getSupportedCipherSuites();
}
@Override
public String[] getEnabledCipherSuites() {
return enabledCipherSuites.clone();
}
/**
* This method enables the cipher suites listed by
* getSupportedCipherSuites().
*
* @param suites the names of all the cipher suites to enable
* @throws IllegalArgumentException when one or more of the ciphers in array
* suites are not supported, or when the array is null.
*/
@Override
public void setEnabledCipherSuites(String[] suites) {
enabledCipherSuites = NativeCrypto.checkEnabledCipherSuites(suites);
}
public String[] getSupportedCompressionMethods() {
return NativeCrypto.getSupportedCompressionMethods();
}
public String[] getEnabledCompressionMethods() {
return enabledCompressionMethods.clone();
}
/**
* This method enables the compression methods listed by
* getSupportedCompressionMethods().
*
* @param suites the names of all the compression methods to enable
* @throws IllegalArgumentException when one or more of the ciphers in array
* suites are not supported, or when the array is null.
*/
public void setEnabledCompressionMethods(String[] methods) {
enabledCompressionMethods = NativeCrypto.checkEnabledCompressionMethods(methods);
}
@Override
public boolean getWantClientAuth() {
return sslParameters.getWantClientAuth();
}
@Override
public void setWantClientAuth(boolean want) {
sslParameters.setWantClientAuth(want);
}
@Override
public boolean getNeedClientAuth() {
return sslParameters.getNeedClientAuth();
}
@Override
public void setNeedClientAuth(boolean need) {
sslParameters.setNeedClientAuth(need);
}
@Override
public void setUseClientMode(boolean mode) {
sslParameters.setUseClientMode(mode);
}
@Override
public boolean getUseClientMode() {
return sslParameters.getUseClientMode();
}
@Override
public Socket accept() throws IOException {
if (!sslParameters.getUseClientMode()) {
checkEnabledCipherSuites();
}
OpenSSLSocketImpl socket = new OpenSSLSocketImpl(sslParameters,
enabledProtocols.clone(),
enabledCipherSuites.clone(),
enabledCompressionMethods.clone());
implAccept(socket);
return socket;
}
/**
* Check if any of the enabled cipher suites has a chance to work.
* Not 100% accurate, just a useful diagnostic that the RI does.
*/
private void checkEnabledCipherSuites() throws SSLException {
/* Loop over all enabled cipher suites. If we find a problem,
* we just continue to the next one. If we find one that could
* work, we return. This basically makes sure the caller has
* configured some appropriate certificate/key unless
* an anonymous cipher is picked.
*/
for (String enabledCipherSuite : enabledCipherSuites) {
if (enabledCipherSuite.equals(NativeCrypto.TLS_EMPTY_RENEGOTIATION_INFO_SCSV)) {
continue;
}
String keyType = CipherSuite.getByName(enabledCipherSuite).getServerKeyType();
if (keyType == null) {
// anonymous always work
return;
}
if (keyType.equals(CipherSuite.KEY_TYPE_RSA)
|| keyType.equals(CipherSuite.KEY_TYPE_DH_RSA)) {
if (checkForPrivateKey(keyType, RSAPrivateKey.class)) {
return;
}
continue;
}
if (keyType.equals(CipherSuite.KEY_TYPE_DSA)
|| keyType.equals(CipherSuite.KEY_TYPE_DH_DSA)) {
if (checkForPrivateKey(keyType, DSAPrivateKey.class)) {
return;
}
continue;
}
if (keyType.equals(CipherSuite.KEY_TYPE_EC)
|| keyType.equals(CipherSuite.KEY_TYPE_EC_RSA)
|| keyType.equals(CipherSuite.KEY_TYPE_EC_EC)) {
if (checkForPrivateKey(keyType, ECPrivateKey.class)) {
return;
}
continue;
}
throw new IllegalStateException("Unknown key type " + keyType);
}
throw new SSLException("Could not find any key store entries "
+ "to support the enabled cipher suites.");
}
private boolean checkForPrivateKey(String keyType, Class keyClass) {
String alias = sslParameters.getKeyManager().chooseServerAlias(keyType, null, null);
if (alias == null) {
return false;
}
PrivateKey key = sslParameters.getKeyManager().getPrivateKey(alias);
return (key != null && keyClass.isAssignableFrom(key.getClass()));
}
}