Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* Conditions Of Use
*
* This software was developed by employees of the National Institute of
* Standards and Technology (NIST), an agency of the Federal Government.
* Pursuant to title 15 Untied States Code Section 105, works of NIST
* employees are not subject to copyright protection in the United States
* and are considered to be in the public domain. As a result, a formal
* license is not needed to use the software.
*
* This software is provided by NIST as a service and is expressly
* provided "AS IS." NIST MAKES NO WARRANTY OF ANY KIND, EXPRESS, IMPLIED
* OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTY OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT
* AND DATA ACCURACY. NIST does not warrant or make any representations
* regarding the use of the software or the results thereof, including but
* not limited to the correctness, accuracy, reliability or usefulness of
* the software.
*
* Permission to use this software is contingent upon your acceptance
* of the terms of this agreement
*
* .
*
*/
/* This class is entirely derived from TCPMessageProcessor,
* by making some minor changes.
*
* Daniel J. Martinez Manzano
* Acknowledgement: Jeff Keyser suggested that a
* Stop mechanism be added to this. Niklas Uhrberg suggested that
* a means to limit the number of simultaneous active connections
* should be added. Mike Andrews suggested that the thread be
* accessible so as to implement clean stop using Thread.join().
*
*/
/******************************************************************************
* Product of NIST/ITL Advanced Networking Technologies Division (ANTD). *
******************************************************************************/
package android.gov.nist.javax.sip.stack;
import android.gov.nist.core.CommonLogger;
import android.gov.nist.core.HostPort;
import android.gov.nist.core.LogWriter;
import android.gov.nist.core.StackLogger;
import android.gov.nist.javax.sip.SipStackImpl;
import java.io.IOException;
import java.net.InetAddress;
import java.net.Socket;
import java.net.SocketException;
import java.net.UnknownHostException;
import java.util.Collection;
import java.util.Iterator;
import javax.net.ssl.SSLException;
import javax.net.ssl.SSLServerSocket;
/**
* Sit in a loop waiting for incoming tls connections and start a new thread to handle each new
* connection. This is the active object that creates new TLS MessageChannels (one for each new
* accept socket).
*
* @version 1.2 $Revision: 1.29 $ $Date: 2010-12-02 22:04:13 $
*
* @author M. Ranganathan
*
*/
public class TLSMessageProcessor extends ConnectionOrientedMessageProcessor implements Runnable {
private static StackLogger logger = CommonLogger.getLogger(TLSMessageProcessor.class);
/**
* Constructor.
*
* @param ipAddress -- inet address where I am listening.
* @param sipStack SIPStack structure.
* @param port port where this message processor listens.
*/
protected TLSMessageProcessor(InetAddress ipAddress, SIPTransactionStack sipStack, int port) {
super(ipAddress, port, "tls",sipStack);
}
/**
* Start the processor.
*/
public void start() throws IOException {
Thread thread = new Thread(this);
thread.setName("MessageProcessorThread-TLS-" + getIpAddress().getHostAddress() + '/' + getPort());
// ISSUE 184
thread.setPriority(sipStack.getThreadPriority());
thread.setDaemon(true);
this.sock = sipStack.getNetworkLayer().createSSLServerSocket(this.getPort(), 0,
this.getIpAddress());
if(sipStack.getClientAuth() == ClientAuthType.Want || sipStack.getClientAuth() == ClientAuthType.Default) {
// we set it to true in Default case as well to keep backward compatibility and default behavior
((SSLServerSocket) this.sock).setWantClientAuth(true);
} else {
((SSLServerSocket) this.sock).setWantClientAuth(false);
}
if(sipStack.getClientAuth() == ClientAuthType.Enabled) {
((SSLServerSocket) this.sock).setNeedClientAuth(true);
} else {
((SSLServerSocket) this.sock).setNeedClientAuth(false);
}
((SSLServerSocket) this.sock).setUseClientMode(false);
String []enabledCiphers = ((SipStackImpl)sipStack).getEnabledCipherSuites();
((SSLServerSocket)sock).setEnabledProtocols(((SipStackImpl)sipStack).getEnabledProtocols());
((SSLServerSocket) this.sock).setEnabledCipherSuites(enabledCiphers);
if(sipStack.getClientAuth() == ClientAuthType.Want || sipStack.getClientAuth() == ClientAuthType.Default) {
// we set it to true in Default case as well to keep backward compatibility and default behavior
((SSLServerSocket) this.sock).setWantClientAuth(true);
} else {
((SSLServerSocket) this.sock).setWantClientAuth(false);
}
if(logger.isLoggingEnabled(StackLogger.TRACE_DEBUG)) {
logger.logDebug("SSLServerSocket want client auth " + ((SSLServerSocket) this.sock).getWantClientAuth());
logger.logDebug("SSLServerSocket need client auth " + ((SSLServerSocket) this.sock).getNeedClientAuth());
}
this.isRunning = true;
thread.start();
}
/**
* Run method for the thread that gets created for each accept socket.
*/
public void run() {
// Accept new connectins on our socket.
while (this.isRunning) {
Socket newsock = null;
try {
synchronized (this) {
// sipStack.maxConnections == -1 means we are
// willing to handle an "infinite" number of
// simultaneous connections (no resource limitation).
// This is the default behavior.
while (sipStack.maxConnections != -1
&& this.nConnections >= sipStack.maxConnections) {
try {
this.wait();
if (!this.isRunning)
return;
} catch (InterruptedException ex) {
break;
}
}
this.nConnections++;
}
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug(" waiting to accept new connection!");
}
newsock = sock.accept();
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug("Accepting new connection!");
}
} catch (SocketException ex) {
if ( this.isRunning ) {
logger.logError(
"Fatal - SocketException occured while Accepting connection", ex);
this.isRunning = false;
break;
}
} catch (SSLException ex) {
this.isRunning = false;
logger.logError(
"Fatal - SSSLException occured while Accepting connection", ex);
break;
} catch (IOException ex) {
// Problem accepting connection.
logger.logError("Problem Accepting Connection", ex);
continue;
} catch (Exception ex) {
logger.logError("Unexpected Exception!", ex);
continue;
}
// Note that for an incoming message channel, the
// thread is already running
if(isRunning) {
try {
// lyolik: even if SocketException is thrown (could be a result of bad handshake,
// it's not a reason to stop execution
TLSMessageChannel newChannel = new TLSMessageChannel(newsock, sipStack, this, "TLSMessageChannelThread-" + nConnections);
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG))
logger.logDebug(Thread.currentThread() + " adding incoming channel " + newChannel.getKey());
// https://code.google.com/p/jain-sip/issues/detail?id=14 add it only if the handshake has been completed successfully
if(newChannel.isHandshakeCompleted()) {
incomingMessageChannels.put(newChannel.getKey(), newChannel);
}
} catch (Exception ex) {
logger.logError("A problem occured while Accepting connection", ex);
}
}
}
}
/**
* Stop the message processor. Feature suggested by Jeff Keyser.
*/
public synchronized void stop() {
if (!isRunning)
return;
isRunning = false;
try {
sock.close();
} catch (IOException e) {
e.printStackTrace();
}
Collection en = messageChannels.values();
for (Iterator it = en.iterator(); it.hasNext();) {
TLSMessageChannel next = (TLSMessageChannel) it.next();
next.close();
}
for (Iterator incomingMCIterator = incomingMessageChannels.values().iterator(); incomingMCIterator
.hasNext();) {
TLSMessageChannel next = (TLSMessageChannel) incomingMCIterator.next();
next.close();
}
this.notify();
}
public synchronized MessageChannel createMessageChannel(HostPort targetHostPort)
throws IOException {
String key = MessageChannel.getKey(targetHostPort, "TLS");
if (messageChannels.get(key) != null) {
return (TLSMessageChannel) this.messageChannels.get(key);
} else {
TLSMessageChannel retval = new TLSMessageChannel(targetHostPort.getInetAddress(),
targetHostPort.getPort(), sipStack, this);
this.messageChannels.put(key, retval);
retval.isCached = true;
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug("key " + key);
logger.logDebug("Creating " + retval);
}
return retval;
}
}
public synchronized MessageChannel createMessageChannel(InetAddress host, int port)
throws IOException {
try {
String key = MessageChannel.getKey(host, port, "TLS");
if (messageChannels.get(key) != null) {
return (TLSMessageChannel) this.messageChannels.get(key);
} else {
TLSMessageChannel retval = new TLSMessageChannel(host, port, sipStack, this);
this.messageChannels.put(key, retval);
retval.isCached = true;
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug("key " + key);
logger.logDebug("Creating " + retval);
}
return retval;
}
} catch (UnknownHostException ex) {
throw new IOException(ex.getMessage());
}
}
/**
* Default target port for TLS
*/
public int getDefaultTargetPort() {
return 5061;
}
/**
* TLS is a secure protocol.
*/
public boolean isSecure() {
return true;
}
}