| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.harmony.xnet.provider.jsse; |
| |
| import java.security.Principal; |
| import java.security.SecureRandom; |
| import java.security.cert.Certificate; |
| import java.security.cert.CertificateEncodingException; |
| import java.security.cert.X509Certificate; |
| import java.util.HashMap; |
| import java.util.Map; |
| import javax.net.ssl.SSLPeerUnverifiedException; |
| import javax.net.ssl.SSLSession; |
| import javax.net.ssl.SSLSessionBindingEvent; |
| import javax.net.ssl.SSLSessionBindingListener; |
| import javax.net.ssl.SSLSessionContext; |
| import libcore.util.EmptyArray; |
| |
| public final class SSLSessionImpl implements SSLSession, Cloneable { |
| |
| /* |
| * Holds default instances so class preloading doesn't create an instance of |
| * it. |
| */ |
| private static class DefaultHolder { |
| public static final SSLSessionImpl NULL_SESSION = new SSLSessionImpl(null); |
| } |
| |
| private long creationTime; |
| private boolean isValid = true; |
| private final Map<String, Object> values = new HashMap<String, Object>(); |
| |
| byte[] id; |
| long lastAccessedTime; |
| ProtocolVersion protocol; |
| CipherSuite cipherSuite; |
| SSLSessionContext context; |
| X509Certificate[] localCertificates; |
| X509Certificate[] peerCertificates; |
| private String peerHost; |
| private int peerPort = -1; |
| byte[] master_secret; |
| byte[] clientRandom; |
| byte[] serverRandom; |
| final boolean isServer; |
| |
| public static SSLSessionImpl getNullSession() { |
| return DefaultHolder.NULL_SESSION; |
| } |
| |
| public SSLSessionImpl(CipherSuite cipher_suite, SecureRandom secureRandom) { |
| creationTime = System.currentTimeMillis(); |
| lastAccessedTime = creationTime; |
| if (cipher_suite == null) { |
| this.cipherSuite = CipherSuite.SSL_NULL_WITH_NULL_NULL; |
| id = EmptyArray.BYTE; |
| isServer = false; |
| isValid = false; |
| } else { |
| this.cipherSuite = cipher_suite; |
| id = new byte[32]; |
| secureRandom.nextBytes(id); |
| long time = creationTime / 1000; |
| id[28] = (byte) ((time & 0xFF000000) >>> 24); |
| id[29] = (byte) ((time & 0x00FF0000) >>> 16); |
| id[30] = (byte) ((time & 0x0000FF00) >>> 8); |
| id[31] = (byte) ((time & 0x000000FF)); |
| isServer = true; |
| } |
| |
| } |
| |
| public SSLSessionImpl(SecureRandom secureRandom) { |
| this(null, secureRandom); |
| } |
| |
| public int getApplicationBufferSize() { |
| return SSLRecordProtocol.MAX_DATA_LENGTH; |
| } |
| |
| public String getCipherSuite() { |
| return cipherSuite.getName(); |
| } |
| |
| public long getCreationTime() { |
| return creationTime; |
| } |
| |
| public byte[] getId() { |
| return id; |
| } |
| |
| public long getLastAccessedTime() { |
| return lastAccessedTime; |
| } |
| |
| public Certificate[] getLocalCertificates() { |
| return localCertificates; |
| } |
| |
| public Principal getLocalPrincipal() { |
| if (localCertificates != null && localCertificates.length > 0) { |
| return localCertificates[0].getSubjectX500Principal(); |
| } |
| return null; |
| } |
| |
| public int getPacketBufferSize() { |
| return SSLRecordProtocol.MAX_SSL_PACKET_SIZE; |
| } |
| |
| public javax.security.cert.X509Certificate[] getPeerCertificateChain() |
| throws SSLPeerUnverifiedException { |
| if (peerCertificates == null) { |
| throw new SSLPeerUnverifiedException("No peer certificate"); |
| } |
| javax.security.cert.X509Certificate[] certs = new javax.security.cert.X509Certificate[peerCertificates.length]; |
| for (int i = 0; i < certs.length; i++) { |
| try { |
| certs[i] = javax.security.cert.X509Certificate.getInstance(peerCertificates[i] |
| .getEncoded()); |
| } catch (javax.security.cert.CertificateException ignored) { |
| } catch (CertificateEncodingException ignored) { |
| } |
| } |
| return certs; |
| } |
| |
| public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { |
| if (peerCertificates == null) { |
| throw new SSLPeerUnverifiedException("No peer certificate"); |
| } |
| return peerCertificates; |
| } |
| |
| public String getPeerHost() { |
| return peerHost; |
| } |
| |
| public int getPeerPort() { |
| return peerPort; |
| } |
| |
| public Principal getPeerPrincipal() throws SSLPeerUnverifiedException { |
| if (peerCertificates == null) { |
| throw new SSLPeerUnverifiedException("No peer certificate"); |
| } |
| return peerCertificates[0].getSubjectX500Principal(); |
| } |
| |
| public String getProtocol() { |
| return (protocol == null) ? "NONE" : protocol.name; |
| } |
| |
| public SSLSessionContext getSessionContext() { |
| return context; |
| } |
| |
| public Object getValue(String name) { |
| if (name == null) { |
| throw new IllegalArgumentException("name == null"); |
| } |
| return values.get(name); |
| } |
| |
| public String[] getValueNames() { |
| return values.keySet().toArray(new String[values.size()]); |
| } |
| |
| public void invalidate() { |
| isValid = false; |
| context = null; |
| } |
| |
| public boolean isValid() { |
| if (isValid && context != null && context.getSessionTimeout() != 0 |
| && lastAccessedTime + context.getSessionTimeout() > System.currentTimeMillis()) { |
| isValid = false; |
| } |
| return isValid; |
| } |
| |
| public void putValue(String name, Object value) { |
| if (name == null || value == null) { |
| throw new IllegalArgumentException("name == null || value == null"); |
| } |
| Object old = values.put(name, value); |
| if (value instanceof SSLSessionBindingListener) { |
| ((SSLSessionBindingListener) value).valueBound(new SSLSessionBindingEvent(this, name)); |
| } |
| if (old instanceof SSLSessionBindingListener) { |
| ((SSLSessionBindingListener) old).valueUnbound(new SSLSessionBindingEvent(this, name)); |
| } |
| |
| } |
| |
| public void removeValue(String name) { |
| if (name == null) { |
| throw new IllegalArgumentException("name == null"); |
| } |
| Object old = values.remove(name); |
| if (old instanceof SSLSessionBindingListener) { |
| SSLSessionBindingListener listener = (SSLSessionBindingListener) old; |
| listener.valueUnbound(new SSLSessionBindingEvent(this, name)); |
| } |
| } |
| |
| @Override |
| public Object clone() { |
| try { |
| return super.clone(); |
| } catch (CloneNotSupportedException e) { |
| throw new AssertionError(e); |
| } |
| } |
| |
| void setPeer(String peerHost, int peerPort) { |
| this.peerHost = peerHost; |
| this.peerPort = peerPort; |
| } |
| } |