blob: 1d3d73a595a60b40ddc59d7ab90647b19a68bc38 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package javax.net.ssl;
import java.nio.ByteBuffer;
/**
* The abstract implementation of secure communications using SSL, TLS, or other
* protocols. It includes the setup, handshake, and encrypt/decrypt
* functionality needed to create a secure connection.
*
* <h3>Default configuration</h3>
* <p>{@code SSLEngine} instances obtained from default {@link SSLContext} are configured as
* follows:
*
* <h4>Protocols</h4>
* <table>
* <thead>
* <tr>
* <th>Protocol</th>
* <th>Supported (API Levels)</th>
* <th>Enabled by default (API Levels)</th>
* </tr>
* </thead>
* <tbody>
* <tr>
* <td>SSLv3</td>
* <td>1+</td>
* <td>1+</td>
* </tr>
* <tr>
* <td>TLSv1</td>
* <td>1+</td>
* <td>1+</td>
* </tr>
* <tr>
* <td>TLSv1.1</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLSv1.2</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* </tbody>
* </table>
*
* <h4>Cipher suites</h4>
* <table>
* <thead>
* <tr>
* <th>Cipher suite</th>
* <th>Supported (API Levels)</th>
* <th>Enabled by default (API Levels)</th>
* </tr>
* </thead>
* <tbody>
* <tr>
* <td>SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>9&ndash;22</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
* <td>9&ndash;22</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DHE_DSS_WITH_DES_CBC_SHA</td>
* <td>9&ndash;22</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DHE_RSA_WITH_DES_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_DH_anon_WITH_DES_CBC_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_DH_anon_WITH_RC4_128_MD5</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_RSA_EXPORT_WITH_RC4_40_MD5</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_DES_CBC_SHA</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_NULL_MD5</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_NULL_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_RC4_128_MD5</td>
* <td>9+</td>
* <td>9&ndash;19</td>
* </tr>
* <tr>
* <td>SSL_RSA_WITH_RC4_128_SHA</td>
* <td>9+</td>
* <td>9+</td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
* <td>9&ndash;22</td>
* <td>9&ndash;22</td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
* <td>20&ndash;22</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
* <td>20&ndash;22</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
* <td>9&ndash;22</td>
* <td>20&ndash;22</td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
* <td>20&ndash;22</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
* <td>20&ndash;22</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
* <td>9+</td>
* <td>9+</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
* <td>9+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_DSS_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_RSA_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
* <td>9+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_DH_anon_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_NULL_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_ECDSA_WITH_RC4_128_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_NULL_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_RSA_WITH_RC4_128_SHA</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_NULL_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_anon_WITH_NULL_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDH_anon_WITH_RC4_128_SHA</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_EMPTY_RENEGOTIATION_INFO_SCSV</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_FALLBACK_SCSV</td>
* <td>21+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA</td>
* <td>21+</td>
* <td>21+</td>
* </tr>
* <tr>
* <td>TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA</td>
* <td>21+</td>
* <td>21+</td>
* </tr>
* <tr>
* <td>TLS_NULL_WITH_NULL_NULL</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_PSK_WITH_3DES_EDE_CBC_SHA</td>
* <td>21+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_PSK_WITH_AES_128_CBC_SHA</td>
* <td>21+</td>
* <td>21+</td>
* </tr>
* <tr>
* <td>TLS_PSK_WITH_AES_256_CBC_SHA</td>
* <td>21+</td>
* <td>21+</td>
* </tr>
* <tr>
* <td>TLS_PSK_WITH_RC4_128_SHA</td>
* <td>21+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_128_CBC_SHA</td>
* <td>9+</td>
* <td>9+</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_128_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_128_GCM_SHA256</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_256_CBC_SHA</td>
* <td>9+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_256_CBC_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_AES_256_GCM_SHA384</td>
* <td>20+</td>
* <td>20+</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_DES_CBC_SHA</td>
* <td>1&ndash;8</td>
* <td>1&ndash;8</td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_NULL_MD5</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_NULL_SHA</td>
* <td>1&ndash;8</td>
* <td></td>
* </tr>
* <tr>
* <td>TLS_RSA_WITH_NULL_SHA256</td>
* <td>20+</td>
* <td></td>
* </tr>
* </tbody>
* </table>
*
* <p><em>NOTE</em>: PSK cipher suites are enabled by default only if the {@code SSLContext} through
* which the engine was created has been initialized with a {@code PSKKeyManager}.
*
* @since 1.5
*/
public abstract class SSLEngine {
private final String peerHost;
private final int peerPort;
/**
* Creates a new {@code SSLEngine} instance.
*/
protected SSLEngine() {
peerHost = null;
peerPort = -1;
}
/**
* Creates a new {@code SSLEngine} instance with the specified host and
* port.
*
* @param host
* the name of the host.
* @param port
* the port of the host.
*/
protected SSLEngine(String host, int port) {
this.peerHost = host;
this.peerPort = port;
}
/**
* Returns the name of the peer host.
*
* @return the name of the peer host, or {@code null} if none is available.
*/
public String getPeerHost() {
return peerHost;
}
/**
* Returns the port number of the peer host.
*
* @return the port number of the peer host, or {@code -1} is none is
* available.
*/
public int getPeerPort() {
return peerPort;
}
/**
* Initiates a handshake on this engine.
* <p>
* Calling this method is not needed for the initial handshake: it will be
* called by {@code wrap} or {@code unwrap} if the initial handshake has not
* been started yet.
*
* @throws SSLException
* if starting the handshake fails.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public abstract void beginHandshake() throws SSLException;
/**
* Notifies this engine instance that no more inbound network data will be
* sent to this engine.
*
* @throws SSLException
* if this engine did not receive a needed protocol specific
* close notification message from the peer.
*/
public abstract void closeInbound() throws SSLException;
/**
* Notifies this engine instance that no more outbound application data will
* be sent to this engine.
*/
public abstract void closeOutbound();
/**
* Returns a delegate task for this engine instance. Some engine operations
* may require the results of blocking or long running operations, and the
* {@code SSLEngineResult} instances returned by this engine may indicate
* that a delegated task result is needed. In this case the
* {@link Runnable#run() run} method of the returned {@code Runnable}
* delegated task must be called.
*
* @return a delegate task, or {@code null} if none are available.
*/
public abstract Runnable getDelegatedTask();
/**
* Returns the SSL cipher suite names that are enabled in this engine
* instance.
*
* @return the SSL cipher suite names that are enabled in this engine
* instance.
*/
public abstract String[] getEnabledCipherSuites();
/**
* Returns the protocol version names that are enabled in this engine
* instance.
*
* @return the protocol version names that are enabled in this engine
* instance.
*/
public abstract String[] getEnabledProtocols();
/**
* Returns whether new SSL sessions may be established by this engine.
*
* @return {@code true} if new session may be established, {@code false} if
* existing sessions must be reused.
*/
public abstract boolean getEnableSessionCreation();
/**
* Returns the status of the handshake of this engine instance.
*
* @return the status of the handshake of this engine instance.
*/
public abstract SSLEngineResult.HandshakeStatus getHandshakeStatus();
/**
* Returns whether this engine instance will require client authentication.
*
* @return {@code true} if this engine will require client authentication,
* {@code false} if no client authentication is needed.
*/
public abstract boolean getNeedClientAuth();
/**
* Returns the SSL session for this engine instance.
*
* @return the SSL session for this engine instance.
*/
public abstract SSLSession getSession();
/**
* Returns the SSL cipher suite names that are supported by this engine.
* These cipher suites can be enabled using
* {@link #setEnabledCipherSuites(String[])}.
*
* @return the SSL cipher suite names that are supported by this engine.
*/
public abstract String[] getSupportedCipherSuites();
/**
* Returns the protocol names that are supported by this engine. These
* protocols can be enables using {@link #setEnabledProtocols(String[])}.
*
* @return the protocol names that are supported by this engine.
*/
public abstract String[] getSupportedProtocols();
/**
* Returns whether this engine is set to act in client mode when
* handshaking.
*
* @return {@code true} if the engine is set to do handshaking in client
* mode.
*/
public abstract boolean getUseClientMode();
/**
* Returns whether this engine will request client authentication.
*
* @return {@code true} if client authentication will be requested,
* {@code false} otherwise.
*/
public abstract boolean getWantClientAuth();
/**
* Returns whether no more inbound data will be accepted by this engine.
*
* @return {@code true} if no more inbound data will be accepted by this
* engine, {@code false} otherwise.
*/
public abstract boolean isInboundDone();
/**
* Returns whether no more outbound data will be produced by this engine.
*
* @return {@code true} if no more outbound data will be producted by this
* engine, {@code otherwise} false.
*/
public abstract boolean isOutboundDone();
/**
* Sets the SSL cipher suite names that should be enabled in this engine
* instance. Only cipher suites listed by {@code getSupportedCipherSuites()}
* are allowed.
*
* @param suites
* the SSL cipher suite names to be enabled.
* @throws IllegalArgumentException
* if one of the specified cipher suites is not supported, or if
* {@code suites} is {@code null}.
*/
public abstract void setEnabledCipherSuites(String[] suites);
/**
* Sets the protocol version names that should be enabled in this engine
* instance. Only protocols listed by {@code getSupportedProtocols()} are
* allowed.
*
* @param protocols
* the protocol version names to be enabled.
* @throws IllegalArgumentException
* if one of the protocol version names is not supported, or if
* {@code protocols} is {@code null}.
*/
public abstract void setEnabledProtocols(String[] protocols);
/**
* Sets whether new SSL sessions may be established by this engine instance.
*
* @param flag
* {@code true} if new SSL sessions may be established,
* {@code false} if existing SSL sessions must be reused.
*/
public abstract void setEnableSessionCreation(boolean flag);
/**
* Sets whether this engine must require client authentication. The client
* authentication is one of:
* <ul>
* <li>authentication required</li>
* <li>authentication requested</li>
* <li>no authentication needed</li>
* </ul>
* This method overrides the setting of {@link #setWantClientAuth(boolean)}.
*
* @param need
* {@code true} if client authentication is required,
* {@code false} if no authentication is needed.
*/
public abstract void setNeedClientAuth(boolean need);
/**
* Sets whether this engine should act in client (or server) mode when
* handshaking.
*
* @param mode
* {@code true} if this engine should act in client mode,
* {@code false} if not.
* @throws IllegalArgumentException
* if this method is called after starting the initial
* handshake.
*/
public abstract void setUseClientMode(boolean mode);
/**
* Sets whether this engine should request client authentication. The client
* authentication is one of the following:
* <ul>
* <li>authentication required</li>
* <li>authentication requested</li>
* <li>no authentication needed</li>
* </ul>
* This method overrides the setting of {@link #setNeedClientAuth(boolean)}.
*
* @param want
* {@code true} if client authentication should be requested,
* {@code false} if no authentication is needed.
*/
public abstract void setWantClientAuth(boolean want);
/**
* Decodes the incoming network data buffer into application data buffers.
* If a handshake has not been started yet, it will automatically be
* started.
*
* @param src
* the buffer with incoming network data
* @param dsts
* the array of destination buffers for incoming application
* data.
* @param offset
* the offset in the array of destination buffers to which data
* is to be transferred.
* @param length
* the maximum number of destination buffers to be used.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws IndexOutOfBoundsException
* if {@code length} is greater than
* {@code dsts.length - offset}.
* @throws java.nio.ReadOnlyBufferException
* if one of the destination buffers is read-only.
* @throws IllegalArgumentException
* if {@code src}, {@code dsts}, or one of the entries in
* {@code dsts} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public abstract SSLEngineResult unwrap(ByteBuffer src,
ByteBuffer[] dsts,
int offset,
int length) throws SSLException;
/**
* Encodes the outgoing application data buffers into the network data
* buffer. If a handshake has not been started yet, it will automatically be
* started.
*
* @param srcs
* the array of source buffers of outgoing application data.
* @param offset
* the offset in the array of source buffers from which data is
* to be retrieved.
* @param length
* the maximum number of source buffers to be used.
* @param dst
* the destination buffer for network data.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws IndexOutOfBoundsException
* if {@code length} is greater than
* {@code srcs.length - offset}.
* @throws java.nio.ReadOnlyBufferException
* if the destination buffer is readonly.
* @throws IllegalArgumentException
* if {@code srcs}, {@code dst}, or one the entries in
* {@code srcs} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public abstract SSLEngineResult wrap(ByteBuffer[] srcs, int offset, int length, ByteBuffer dst)
throws SSLException;
/**
* Decodes the incoming network data buffer into the application data
* buffer. If a handshake has not been started yet, it will automatically be
* started.
*
* @param src
* the buffer with incoming network data
* @param dst
* the destination buffer for incoming application data.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws java.nio.ReadOnlyBufferException
* if one of the destination buffers is read-only.
* @throws IllegalArgumentException
* if {@code src} or {@code dst} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public SSLEngineResult unwrap(ByteBuffer src, ByteBuffer dst) throws SSLException {
return unwrap(src, new ByteBuffer[] { dst }, 0, 1);
}
/**
* Decodes the incoming network data buffer into the application data
* buffers. If a handshake has not been started yet, it will automatically
* be started.
*
* @param src
* the buffer with incoming network data
* @param dsts
* the array of destination buffers for incoming application
* data.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws java.nio.ReadOnlyBufferException
* if one of the destination buffers is read-only.
* @throws IllegalArgumentException
* if {@code src} or {@code dsts} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public SSLEngineResult unwrap(ByteBuffer src, ByteBuffer[] dsts) throws SSLException {
if (dsts == null) {
throw new IllegalArgumentException("Byte buffer array dsts is null");
}
return unwrap(src, dsts, 0, dsts.length);
}
/**
* Encodes the outgoing application data buffers into the network data
* buffer. If a handshake has not been started yet, it will automatically be
* started.
*
* @param srcs
* the array of source buffers of outgoing application data.
* @param dst
* the destination buffer for network data.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws java.nio.ReadOnlyBufferException
* if the destination buffer is readonly.
* @throws IllegalArgumentException
* if {@code srcs} or {@code dst} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public SSLEngineResult wrap(ByteBuffer[] srcs, ByteBuffer dst) throws SSLException {
if (srcs == null) {
throw new IllegalArgumentException("Byte buffer array srcs is null");
}
return wrap(srcs, 0, srcs.length, dst);
}
/**
* Encodes the outgoing application data buffer into the network data
* buffer. If a handshake has not been started yet, it will automatically be
* started.
*
* @param src
* the source buffers of outgoing application data.
* @param dst
* the destination buffer for network data.
* @return the result object of this operation.
* @throws SSLException
* if a problem occurred while processing the data.
* @throws java.nio.ReadOnlyBufferException
* if the destination buffer is readonly.
* @throws IllegalArgumentException
* if {@code src} or {@code dst} is {@code null}.
* @throws IllegalStateException
* if the engine does not have all the needed settings (e.g.
* client/server mode not set).
*/
public SSLEngineResult wrap(ByteBuffer src, ByteBuffer dst) throws SSLException {
return wrap(new ByteBuffer[] { src }, 0, 1, dst);
}
/**
* Returns a new SSLParameters based on this SSLSocket's current
* cipher suites, protocols, and client authentication settings.
*
* @since 1.6
*/
public SSLParameters getSSLParameters() {
SSLParameters p = new SSLParameters();
p.setCipherSuites(getEnabledCipherSuites());
p.setProtocols(getEnabledProtocols());
p.setNeedClientAuth(getNeedClientAuth());
p.setWantClientAuth(getWantClientAuth());
return p;
}
/**
* Sets various SSL handshake parameters based on the SSLParameter
* argument. Specifically, sets the SSLEngine's enabled cipher
* suites if the parameter's cipher suites are non-null. Similarly
* sets the enabled protocols. If the parameters specify the want
* or need for client authentication, those requirements are set
* on the SSLEngine, otherwise both are set to false.
* @since 1.6
*/
public void setSSLParameters(SSLParameters p) {
String[] cipherSuites = p.getCipherSuites();
if (cipherSuites != null) {
setEnabledCipherSuites(cipherSuites);
}
String[] protocols = p.getProtocols();
if (protocols != null) {
setEnabledProtocols(protocols);
}
if (p.getNeedClientAuth()) {
setNeedClientAuth(true);
} else if (p.getWantClientAuth()) {
setWantClientAuth(true);
} else {
setWantClientAuth(false);
}
}
}