Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2009-2015 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*
*
* This file incorporates work covered by the following copyright and
* permission notice:
*
* Copyright 2004 The Apache Software Foundation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.pdd.pop.ext.glassfish.grizzly.ssl;
import com.pdd.pop.ext.glassfish.grizzly.Connection;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.security.cert.CertificateFactory;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLSession;
import javax.security.cert.X509Certificate;
import com.pdd.pop.ext.glassfish.grizzly.Grizzly;
/**
*
* @author oleksiys
*/
public class SSLSupportImpl implements SSLSupport {
private static final Logger logger = Grizzly.logger(SSLSupportImpl.class);
/**
* A mapping table to determine the number of effective bits in the key
* when using a cipher suite containing the specified cipher name. The
* underlying data came from the TLS Specification (RFC 2246), Appendix C.
*/
private static final CipherData ciphers[] = {
new CipherData("_WITH_NULL_", 0),
new CipherData("_WITH_IDEA_CBC_", 128),
new CipherData("_WITH_RC2_CBC_40_", 40),
new CipherData("_WITH_RC4_40_", 40),
new CipherData("_WITH_RC4_128_", 128),
new CipherData("_WITH_DES40_CBC_", 40),
new CipherData("_WITH_DES_CBC_", 56),
new CipherData("_WITH_3DES_EDE_CBC_", 168),
new CipherData("_WITH_AES_128_", 128),
new CipherData("_WITH_AES_256_", 256)
};
public static final String KEY_SIZE_KEY = "SSL_KEY_SIZE";
private final SSLEngine engine;
private volatile SSLSession session;
public SSLSupportImpl(Connection connection) {
engine = SSLUtils.getSSLEngine(connection);
if (engine == null) {
throw new IllegalStateException("SSLEngine is null");
}
session = engine.getSession();
}
@Override
public String getCipherSuite() throws IOException {
// Look up the current SSLSession
/* SJSAS 6439313
* SSLSession session = ssl.getSession();
*/
if (session == null) {
return null;
}
return session.getCipherSuite();
}
@Override
public Object[] getPeerCertificateChain() throws IOException {
return getPeerCertificateChain(false);
}
protected java.security.cert.X509Certificate[] getX509Certificates(
SSLSession session) throws IOException {
X509Certificate jsseCerts[] = null;
try {
jsseCerts = session.getPeerCertificateChain();
} catch (Throwable ex) {
// Get rid of the warning in the logs when no Client-Cert is
// available
}
if (jsseCerts == null) {
jsseCerts = new X509Certificate[0];
}
java.security.cert.X509Certificate[] x509Certs =
new java.security.cert.X509Certificate[jsseCerts.length];
for (int i = 0; i < x509Certs.length; i++) {
try {
byte buffer[] = jsseCerts[i].getEncoded();
CertificateFactory cf =
CertificateFactory.getInstance("X.509");
ByteArrayInputStream stream =
new ByteArrayInputStream(buffer);
x509Certs[i] = (java.security.cert.X509Certificate) cf.generateCertificate(stream);
if (logger.isLoggable(Level.FINE)) {
logger.log(Level.FINE, "Cert #" + i + " = " + x509Certs[i]);
}
} catch (Exception ex) {
logger.log(Level.INFO, "Error translating " + jsseCerts[i], ex);
return null;
}
}
if (x509Certs.length < 1) {
return null;
}
return x509Certs;
}
@Override
public Object[] getPeerCertificateChain(boolean force)
throws IOException {
// Look up the current SSLSession
/* SJSAS 6439313
SSLSession session = ssl.getSession();
*/
if (session == null) {
return null;
}
// Convert JSSE's certificate format to the ones we need
X509Certificate[] jsseCerts = null;
try {
jsseCerts = session.getPeerCertificateChain();
} catch (Exception bex) {
// ignore.
}
if (jsseCerts == null) {
jsseCerts = new X509Certificate[0];
}
if (jsseCerts.length <= 0 && force) {
session.invalidate();
// handshaker.handshake(connection, engineConfigurator);
/* SJSAS 6439313
session = ssl.getSession();
*/
// START SJSAS 6439313
session = engine.getSession();
// END SJSAS 6439313
}
return getX509Certificates(session);
}
/**
* Copied from com.pdd.pop.ext.apache.catalina.valves.CertificateValve
*/
@Override
public Integer getKeySize()
throws IOException {
// Look up the current SSLSession
/* SJSAS 6439313
SSLSession session = ssl.getSession();
*/
SSLSupport.CipherData c_aux[] = ciphers;
if (session == null) {
return null;
}
Integer keySize = (Integer) session.getValue(KEY_SIZE_KEY);
if (keySize == null) {
int size = 0;
String cipherSuite = session.getCipherSuite();
for (int i = 0; i < c_aux.length; i++) {
if (cipherSuite.contains(c_aux[i].phrase)) {
size = c_aux[i].keySize;
break;
}
}
keySize = size;
session.putValue(KEY_SIZE_KEY, keySize);
}
return keySize;
}
@Override
public String getSessionId() throws IOException {
// Look up the current SSLSession
/* SJSAS 6439313
* SSLSession session = ssl.getSession();
*/
if (session == null) {
return null;
}
// Expose ssl_session (getId)
byte[] ssl_session = session.getId();
if (ssl_session == null) {
return null;
}
StringBuilder buf = new StringBuilder("");
for (int x = 0; x < ssl_session.length; x++) {
String digit = Integer.toHexString((int) ssl_session[x]);
if (digit.length() < 2) {
buf.append('0');
}
if (digit.length() > 2) {
digit = digit.substring(digit.length() - 2);
}
buf.append(digit);
}
return buf.toString();
}
}