All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.conscrypt.ConscryptFileDescriptorSocket Maven / Gradle / Ivy

There is a newer version: 2.5.2
Show newest version
/*
 * Copyright (C) 2017 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.conscrypt;

import static org.conscrypt.SSLUtils.EngineStates.STATE_CLOSED;
import static org.conscrypt.SSLUtils.EngineStates.STATE_HANDSHAKE_COMPLETED;
import static org.conscrypt.SSLUtils.EngineStates.STATE_HANDSHAKE_STARTED;
import static org.conscrypt.SSLUtils.EngineStates.STATE_NEW;
import static org.conscrypt.SSLUtils.EngineStates.STATE_READY;
import static org.conscrypt.SSLUtils.EngineStates.STATE_READY_HANDSHAKE_CUT_THROUGH;

import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.net.InetAddress;
import java.net.Socket;
import java.net.SocketException;
import java.security.InvalidKeyException;
import java.security.PrivateKey;
import java.security.cert.CertificateEncodingException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.security.interfaces.ECKey;
import java.security.spec.ECParameterSpec;
import javax.crypto.SecretKey;
import javax.net.ssl.SSLException;
import javax.net.ssl.SSLHandshakeException;
import javax.net.ssl.SSLParameters;
import javax.net.ssl.SSLProtocolException;
import javax.net.ssl.SSLSession;
import javax.net.ssl.X509KeyManager;
import javax.net.ssl.X509TrustManager;
import javax.security.auth.x500.X500Principal;
import org.conscrypt.ExternalSession.Provider;
import org.conscrypt.NativeRef.SSL_SESSION;

/**
 * Implementation of the class OpenSSLSocketImpl based on OpenSSL.
 * 

* Extensions to SSLSocket include: *

    *
  • handshake timeout *
  • session tickets *
  • Server Name Indication *
*/ class ConscryptFileDescriptorSocket extends OpenSSLSocketImpl implements NativeCrypto.SSLHandshakeCallbacks, SSLParametersImpl.AliasChooser, SSLParametersImpl.PSKCallbacks { private static final boolean DBG_STATE = false; // @GuardedBy("ssl"); private int state = STATE_NEW; /** * Wrapper around the underlying SSL object. */ private final NativeSsl ssl; /** * Protected by synchronizing on ssl. Starts as null, set by * getInputStream. */ // @GuardedBy("ssl"); private SSLInputStream is; /** * Protected by synchronizing on ssl. Starts as null, set by * getInputStream. */ // @GuardedBy("ssl"); private SSLOutputStream os; private final SSLParametersImpl sslParameters; /* * A CloseGuard object on Android. On other platforms, this is nothing. */ private final Object guard = Platform.closeGuardGet(); /** * Private key for the TLS Channel ID extension. This field is client-side * only. Set during startHandshake. */ private OpenSSLKey channelIdPrivateKey; private final ActiveSession activeSession; /** * A snapshot of the active session when the engine was closed. */ private SessionSnapshot closedSession; /** * The session object exposed externally from this class. */ private final SSLSession externalSession = Platform.wrapSSLSession(new ExternalSession(new Provider() { @Override public ConscryptSession provideSession() { return ConscryptFileDescriptorSocket.this.provideSession(); } })); private int writeTimeoutMilliseconds = 0; private int handshakeTimeoutMilliseconds = -1; // -1 = same as timeout; 0 = infinite // The constructors should not be called except from the Platform class, because we may // want to construct a subclass instead. ConscryptFileDescriptorSocket(SSLParametersImpl sslParameters) throws IOException { this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } ConscryptFileDescriptorSocket(String hostname, int port, SSLParametersImpl sslParameters) throws IOException { super(hostname, port); this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } ConscryptFileDescriptorSocket(InetAddress address, int port, SSLParametersImpl sslParameters) throws IOException { super(address, port); this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } ConscryptFileDescriptorSocket(String hostname, int port, InetAddress clientAddress, int clientPort, SSLParametersImpl sslParameters) throws IOException { super(hostname, port, clientAddress, clientPort); this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } ConscryptFileDescriptorSocket(InetAddress address, int port, InetAddress clientAddress, int clientPort, SSLParametersImpl sslParameters) throws IOException { super(address, port, clientAddress, clientPort); this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } ConscryptFileDescriptorSocket(Socket socket, String hostname, int port, boolean autoClose, SSLParametersImpl sslParameters) throws IOException { super(socket, hostname, port, autoClose); this.sslParameters = sslParameters; this.ssl = newSsl(sslParameters, this); activeSession = new ActiveSession(ssl, sslParameters.getSessionContext()); } private static NativeSsl newSsl(SSLParametersImpl sslParameters, ConscryptFileDescriptorSocket engine) throws SSLException { return NativeSsl.newInstance(sslParameters, engine, engine, engine); } /** * Starts a TLS/SSL handshake on this connection using some native methods * from the OpenSSL library. It can negotiate new encryption keys, change * cipher suites, or initiate a new session. The certificate chain is * verified if the correspondent property in java.Security is set. All * listeners are notified at the end of the TLS/SSL handshake. */ @Override public final void startHandshake() throws IOException { checkOpen(); synchronized (ssl) { if (state == STATE_NEW) { transitionTo(STATE_HANDSHAKE_STARTED); } else { // We've either started the handshake already or have been closed. // Do nothing in both cases. return; } } boolean releaseResources = true; try { Platform.closeGuardOpen(guard, "close"); // Prepare the SSL object for the handshake. ssl.initialize(getHostname(), channelIdPrivateKey); // For clients, offer to resume a previously cached session to avoid the // full TLS handshake. if (getUseClientMode()) { NativeSslSession cachedSession = clientSessionContext().getCachedSession( getHostnameOrIP(), getPort(), sslParameters); if (cachedSession != null) { cachedSession.offerToResume(ssl); } } // Temporarily use a different timeout for the handshake process int savedReadTimeoutMilliseconds = getSoTimeout(); int savedWriteTimeoutMilliseconds = getSoWriteTimeout(); if (handshakeTimeoutMilliseconds >= 0) { setSoTimeout(handshakeTimeoutMilliseconds); setSoWriteTimeout(handshakeTimeoutMilliseconds); } synchronized (ssl) { if (state == STATE_CLOSED) { return; } } try { ssl.doHandshake(Platform.getFileDescriptor(socket), getSoTimeout()); // Update the session from the current state of the SSL object. activeSession.onPeerCertificateAvailable(getHostnameOrIP(), getPort()); } catch (CertificateException e) { SSLHandshakeException wrapper = new SSLHandshakeException(e.getMessage()); wrapper.initCause(e); throw wrapper; } catch (SSLException e) { // Swallow this exception if it's thrown as the result of an interruption. // // TODO: SSL_read and SSL_write return -1 when interrupted, but SSL_do_handshake // will throw the last sslError that it saw before sslSelect, usually SSL_WANT_READ // (or WANT_WRITE). Catching that exception here doesn't seem much worse than // changing the native code to return a "special" native pointer value when that // happens. synchronized (ssl) { if (state == STATE_CLOSED) { return; } } // Write CCS errors to EventLog String message = e.getMessage(); // Must match error string of SSL_R_UNEXPECTED_CCS if (message.contains("unexpected CCS")) { String logMessage = String.format("ssl_unexpected_ccs: host=%s", getHostnameOrIP()); Platform.logEvent(logMessage); } throw e; } synchronized (ssl) { if (state == STATE_CLOSED) { return; } } // Restore the original timeout now that the handshake is complete if (handshakeTimeoutMilliseconds >= 0) { setSoTimeout(savedReadTimeoutMilliseconds); setSoWriteTimeout(savedWriteTimeoutMilliseconds); } synchronized (ssl) { releaseResources = (state == STATE_CLOSED); if (state == STATE_HANDSHAKE_STARTED) { transitionTo(STATE_READY_HANDSHAKE_CUT_THROUGH); } else { transitionTo(STATE_READY); } if (!releaseResources) { // Unblock threads that are waiting for our state to transition // into STATE_READY or STATE_READY_HANDSHAKE_CUT_THROUGH. ssl.notifyAll(); } } } catch (SSLProtocolException e) { throw(SSLHandshakeException) new SSLHandshakeException("Handshake failed").initCause(e); } finally { // on exceptional exit, treat the socket as closed if (releaseResources) { synchronized (ssl) { // Mark the socket as closed since we might have reached this as // a result on an exception thrown by the handshake process. // // The state will already be set to closed if we reach this as a result of // an early return or an interruption due to a concurrent call to close(). transitionTo(STATE_CLOSED); ssl.notifyAll(); } try { shutdownAndFreeSslNative(); } catch (IOException ignored) { // Ignored. } } } } @Override @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks / client_cert_cb public final void clientCertificateRequested(byte[] keyTypeBytes, int[] signatureAlgs, byte[][] asn1DerEncodedPrincipals) throws CertificateEncodingException, SSLException { ssl.chooseClientCertificate(keyTypeBytes, signatureAlgs, asn1DerEncodedPrincipals); } @Override @SuppressWarnings("unused") // used by native psk_client_callback public final int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { return ssl.clientPSKKeyRequested(identityHint, identity, key); } @Override @SuppressWarnings("unused") // used by native psk_server_callback public final int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { return ssl.serverPSKKeyRequested(identityHint, identity, key); } @Override @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks / info_callback public final void onSSLStateChange(int type, int val) { if (type != NativeConstants.SSL_CB_HANDSHAKE_DONE) { // We only care about successful completion. return; } // The handshake has completed successfully ... // First, update the state. synchronized (ssl) { if (state == STATE_CLOSED) { // Someone called "close" but the handshake hasn't been interrupted yet. return; } // Now that we've fixed up our state, we can tell waiting threads that // we're ready. transitionTo(STATE_READY); } // Let listeners know we are finally done notifyHandshakeCompletedListeners(); synchronized (ssl) { // Notify all threads waiting for the handshake to complete. ssl.notifyAll(); } } @Override @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks / new_session_callback public final void onNewSessionEstablished(long sslSessionNativePtr) { try { // Increment the reference count to "take ownership" of the session resource. NativeCrypto.SSL_SESSION_up_ref(sslSessionNativePtr); // Create a native reference which will release the SSL_SESSION in its finalizer. // This constructor will only throw if the native pointer passed in is NULL, which // BoringSSL guarantees will not happen. NativeRef.SSL_SESSION ref = new SSL_SESSION(sslSessionNativePtr); NativeSslSession nativeSession = NativeSslSession.newInstance(ref, activeSession); // Cache the newly established session. AbstractSessionContext ctx = sessionContext(); ctx.cacheSession(nativeSession); } catch (Exception ignored) { // Ignore. } } @Override public final long serverSessionRequested(byte[] id) { // TODO(nathanmittler): Implement server-side caching for TLS < 1.3 return 0; } @Override public final void verifyCertificateChain(byte[][] certChain, String authMethod) throws CertificateException { try { if (certChain == null || certChain.length == 0) { throw new CertificateException("Peer sent no certificate"); } X509Certificate[] peerCertChain = SSLUtils.decodeX509CertificateChain(certChain); X509TrustManager x509tm = sslParameters.getX509TrustManager(); if (x509tm == null) { throw new CertificateException("No X.509 TrustManager"); } // Update the peer information on the session. activeSession.onPeerCertificatesReceived(getHostnameOrIP(), getPort(), peerCertChain); if (getUseClientMode()) { Platform.checkServerTrusted(x509tm, peerCertChain, authMethod, this); } else { String authType = peerCertChain[0].getPublicKey().getAlgorithm(); Platform.checkClientTrusted(x509tm, peerCertChain, authType, this); } } catch (CertificateException e) { throw e; } catch (Exception e) { throw new CertificateException(e); } } @Override public final InputStream getInputStream() throws IOException { checkOpen(); InputStream returnVal; synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("Socket is closed."); } if (is == null) { is = new SSLInputStream(); } returnVal = is; } // Block waiting for a handshake without a lock held. It's possible that the socket // is closed at this point. If that happens, we'll still return the input stream but // all reads on it will throw. waitForHandshake(); return returnVal; } @Override public final OutputStream getOutputStream() throws IOException { checkOpen(); OutputStream returnVal; synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("Socket is closed."); } if (os == null) { os = new SSLOutputStream(); } returnVal = os; } // Block waiting for a handshake without a lock held. It's possible that the socket // is closed at this point. If that happens, we'll still return the output stream but // all writes on it will throw. waitForHandshake(); return returnVal; } private void assertReadableOrWriteableState() { if (state == STATE_READY || state == STATE_READY_HANDSHAKE_CUT_THROUGH) { return; } throw new AssertionError("Invalid state: " + state); } private void waitForHandshake() throws IOException { startHandshake(); synchronized (ssl) { while (state != STATE_READY && state != STATE_READY_HANDSHAKE_CUT_THROUGH && state != STATE_CLOSED) { try { ssl.wait(); } catch (InterruptedException e) { Thread.currentThread().interrupt(); throw new IOException("Interrupted waiting for handshake", e); } } if (state == STATE_CLOSED) { throw new SocketException("Socket is closed"); } } } /** * This inner class provides input data stream functionality * for the OpenSSL native implementation. It is used to * read data received via SSL protocol. */ private class SSLInputStream extends InputStream { /** * OpenSSL only lets one thread read at a time, so this is used to * make sure we serialize callers of SSL_read. Thread is already * expected to have completed handshaking. */ private final Object readLock = new Object(); SSLInputStream() { } /** * Reads one byte. If there is no data in the underlying buffer, * this operation can block until the data will be * available. */ @Override public int read() throws IOException { byte[] buffer = new byte[1]; int result = read(buffer, 0, 1); return (result != -1) ? buffer[0] & 0xff : -1; } /** * Method acts as described in spec for superclass. * @see java.io.InputStream#read(byte[],int,int) */ @Override public int read(byte[] buf, int offset, int byteCount) throws IOException { Platform.blockGuardOnNetwork(); checkOpen(); ArrayUtils.checkOffsetAndCount(buf.length, offset, byteCount); if (byteCount == 0) { return 0; } synchronized (readLock) { synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("socket is closed"); } if (DBG_STATE) { assertReadableOrWriteableState(); } } int ret = ssl.read( Platform.getFileDescriptor(socket), buf, offset, byteCount, getSoTimeout()); if (ret == -1) { synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("socket is closed"); } } } return ret; } } void awaitPendingOps() { if (DBG_STATE) { synchronized (ssl) { if (state != STATE_CLOSED) { throw new AssertionError("State is: " + state); } } } synchronized (readLock) {} } } /** * This inner class provides output data stream functionality * for the OpenSSL native implementation. It is used to * write data according to the encryption parameters given in SSL context. */ private class SSLOutputStream extends OutputStream { /** * OpenSSL only lets one thread write at a time, so this is used * to make sure we serialize callers of SSL_write. Thread is * already expected to have completed handshaking. */ private final Object writeLock = new Object(); SSLOutputStream() { } /** * Method acts as described in spec for superclass. * @see java.io.OutputStream#write(int) */ @Override public void write(int oneByte) throws IOException { byte[] buffer = new byte[1]; buffer[0] = (byte) (oneByte & 0xff); write(buffer); } /** * Method acts as described in spec for superclass. * @see java.io.OutputStream#write(byte[],int,int) */ @Override public void write(byte[] buf, int offset, int byteCount) throws IOException { Platform.blockGuardOnNetwork(); checkOpen(); ArrayUtils.checkOffsetAndCount(buf.length, offset, byteCount); if (byteCount == 0) { return; } synchronized (writeLock) { synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("socket is closed"); } if (DBG_STATE) { assertReadableOrWriteableState(); } } ssl.write(Platform.getFileDescriptor(socket), buf, offset, byteCount, writeTimeoutMilliseconds); synchronized (ssl) { if (state == STATE_CLOSED) { throw new SocketException("socket is closed"); } } } } void awaitPendingOps() { if (DBG_STATE) { synchronized (ssl) { if (state != STATE_CLOSED) { throw new AssertionError("State is: " + state); } } } synchronized (writeLock) {} } } @Override public final SSLSession getSession() { return externalSession; } private ConscryptSession provideSession() { boolean handshakeCompleted = false; synchronized (ssl) { if (state == STATE_CLOSED) { return closedSession != null ? closedSession : SSLNullSession.getNullSession(); } try { handshakeCompleted = state >= STATE_READY; if (!handshakeCompleted && isConnected()) { waitForHandshake(); handshakeCompleted = true; } } catch (IOException e) { // Fall through. } } if (!handshakeCompleted) { // return an invalid session with // invalid cipher suite of "SSL_NULL_WITH_NULL_NULL" return SSLNullSession.getNullSession(); } return activeSession; } private ConscryptSession provideHandshakeSession() { synchronized (ssl) { return state >= STATE_HANDSHAKE_STARTED && state < STATE_READY ? activeSession : SSLNullSession.getNullSession(); } } @Override final SSLSession getActiveSession() { return activeSession; } @Override public final SSLSession getHandshakeSession() { synchronized (ssl) { if (state >= STATE_HANDSHAKE_STARTED && state < STATE_READY) { return Platform.wrapSSLSession(new ExternalSession(new Provider() { @Override public ConscryptSession provideSession() { return ConscryptFileDescriptorSocket.this.provideHandshakeSession(); } })); } return null; } } @Override public final boolean getEnableSessionCreation() { return sslParameters.getEnableSessionCreation(); } @Override public final void setEnableSessionCreation(boolean flag) { sslParameters.setEnableSessionCreation(flag); } @Override public final String[] getSupportedCipherSuites() { return NativeCrypto.getSupportedCipherSuites(); } @Override public final String[] getEnabledCipherSuites() { return sslParameters.getEnabledCipherSuites(); } @Override public final void setEnabledCipherSuites(String[] suites) { sslParameters.setEnabledCipherSuites(suites); } @Override public final String[] getSupportedProtocols() { return NativeCrypto.getSupportedProtocols(); } @Override public final String[] getEnabledProtocols() { return sslParameters.getEnabledProtocols(); } @Override public final void setEnabledProtocols(String[] protocols) { sslParameters.setEnabledProtocols(protocols); } /** * This method enables session ticket support. * * @param useSessionTickets True to enable session tickets */ @Override public final void setUseSessionTickets(boolean useSessionTickets) { sslParameters.setUseSessionTickets(useSessionTickets); } /** * This method enables Server Name Indication. If the hostname is not a valid SNI hostname, * the SNI extension will be omitted from the handshake. * * @param hostname the desired SNI hostname, or null to disable */ @Override public final void setHostname(String hostname) { sslParameters.setUseSni(hostname != null); super.setHostname(hostname); } /** * Enables/disables TLS Channel ID for this server socket. * *

This method needs to be invoked before the handshake starts. * * @throws IllegalStateException if this is a client socket or if the handshake has already * started. */ @Override public final void setChannelIdEnabled(boolean enabled) { if (getUseClientMode()) { throw new IllegalStateException("Client mode"); } synchronized (ssl) { if (state != STATE_NEW) { throw new IllegalStateException( "Could not enable/disable Channel ID after the initial handshake has" + " begun."); } } sslParameters.channelIdEnabled = enabled; } /** * Gets the TLS Channel ID for this server socket. Channel ID is only available once the * handshake completes. * * @return channel ID or {@code null} if not available. * * @throws IllegalStateException if this is a client socket or if the handshake has not yet * completed. * @throws SSLException if channel ID is available but could not be obtained. */ @Override public final byte[] getChannelId() throws SSLException { if (getUseClientMode()) { throw new IllegalStateException("Client mode"); } synchronized (ssl) { if (state != STATE_READY) { throw new IllegalStateException( "Channel ID is only available after handshake completes"); } } return ssl.getTlsChannelId(); } /** * Sets the {@link PrivateKey} to be used for TLS Channel ID by this client socket. * *

This method needs to be invoked before the handshake starts. * * @param privateKey private key (enables TLS Channel ID) or {@code null} for no key (disables * TLS Channel ID). The private key must be an Elliptic Curve (EC) key based on the NIST * P-256 curve (aka SECG secp256r1 or ANSI X9.62 prime256v1). * * @throws IllegalStateException if this is a server socket or if the handshake has already * started. */ @Override public final void setChannelIdPrivateKey(PrivateKey privateKey) { if (!getUseClientMode()) { throw new IllegalStateException("Server mode"); } synchronized (ssl) { if (state != STATE_NEW) { throw new IllegalStateException( "Could not change Channel ID private key after the initial handshake has" + " begun."); } } if (privateKey == null) { sslParameters.channelIdEnabled = false; channelIdPrivateKey = null; } else { sslParameters.channelIdEnabled = true; try { ECParameterSpec ecParams = null; if (privateKey instanceof ECKey) { ecParams = ((ECKey) privateKey).getParams(); } if (ecParams == null) { // Assume this is a P-256 key, as specified in the contract of this method. ecParams = OpenSSLECGroupContext.getCurveByName("prime256v1").getECParameterSpec(); } channelIdPrivateKey = OpenSSLKey.fromECPrivateKeyForTLSStackOnly(privateKey, ecParams); } catch (InvalidKeyException e) { // Will have error in startHandshake } } } @Override byte[] getTlsUnique() { return ssl.getTlsUnique(); } @Override byte[] exportKeyingMaterial(String label, byte[] context, int length) throws SSLException { synchronized (ssl) { if (state < STATE_HANDSHAKE_COMPLETED || state == STATE_CLOSED) { return null; } } return ssl.exportKeyingMaterial(label, context, length); } @Override public final boolean getUseClientMode() { return sslParameters.getUseClientMode(); } @Override public final void setUseClientMode(boolean mode) { synchronized (ssl) { if (state != STATE_NEW) { throw new IllegalArgumentException( "Could not change the mode after the initial handshake has begun."); } } sslParameters.setUseClientMode(mode); } @Override public final boolean getWantClientAuth() { return sslParameters.getWantClientAuth(); } @Override public final boolean getNeedClientAuth() { return sslParameters.getNeedClientAuth(); } @Override public final void setNeedClientAuth(boolean need) { sslParameters.setNeedClientAuth(need); } @Override public final void setWantClientAuth(boolean want) { sslParameters.setWantClientAuth(want); } /** * Note write timeouts are not part of the javax.net.ssl.SSLSocket API */ @Override public final void setSoWriteTimeout(int writeTimeoutMilliseconds) throws SocketException { this.writeTimeoutMilliseconds = writeTimeoutMilliseconds; Platform.setSocketWriteTimeout(this, writeTimeoutMilliseconds); } /** * Note write timeouts are not part of the javax.net.ssl.SSLSocket API */ @Override public final int getSoWriteTimeout() throws SocketException { return writeTimeoutMilliseconds; } /** * Set the handshake timeout on this socket. This timeout is specified in * milliseconds and will be used only during the handshake process. */ @Override public final void setHandshakeTimeout(int handshakeTimeoutMilliseconds) throws SocketException { this.handshakeTimeoutMilliseconds = handshakeTimeoutMilliseconds; } @Override @SuppressWarnings("UnsynchronizedOverridesSynchronized") public final void close() throws IOException { // TODO: Close SSL sockets using a background thread so they close gracefully. SSLInputStream sslInputStream; SSLOutputStream sslOutputStream; if (ssl == null) { // close() has been called before we've initialized the socket, so just // return. return; } synchronized (ssl) { if (state == STATE_CLOSED) { // close() has already been called, so do nothing and return. return; } int oldState = state; transitionTo(STATE_CLOSED); if (oldState == STATE_NEW) { // The handshake hasn't been started yet, so there's no OpenSSL related // state to clean up. We still need to close the underlying socket if // we're wrapping it and were asked to autoClose. free(); closeUnderlyingSocket(); ssl.notifyAll(); return; } if (oldState != STATE_READY && oldState != STATE_READY_HANDSHAKE_CUT_THROUGH) { // If we're in these states, we still haven't returned from startHandshake. // We call SSL_interrupt so that we can interrupt SSL_do_handshake and then // set the state to STATE_CLOSED. startHandshake will handle all cleanup // after SSL_do_handshake returns, so we don't have anything to do here. ssl.interrupt(); ssl.notifyAll(); return; } ssl.notifyAll(); // We've already returned from startHandshake, so we potentially have // input and output streams to clean up. sslInputStream = is; sslOutputStream = os; } // Don't bother interrupting unless we have something to interrupt. if (sslInputStream != null || sslOutputStream != null) { ssl.interrupt(); } // Wait for the input and output streams to finish any reads they have in // progress. If there are no reads in progress at this point, future reads will // throw because state == STATE_CLOSED if (sslInputStream != null) { sslInputStream.awaitPendingOps(); } if (sslOutputStream != null) { sslOutputStream.awaitPendingOps(); } shutdownAndFreeSslNative(); } private void shutdownAndFreeSslNative() throws IOException { try { Platform.blockGuardOnNetwork(); ssl.shutdown(Platform.getFileDescriptor(socket)); } catch (IOException ignored) { /* * Note that although close() can throw * IOException, the RI does not throw if there * is problem sending a "close notify" which * can happen if the underlying socket is closed. */ } finally { free(); closeUnderlyingSocket(); } } private void closeUnderlyingSocket() throws IOException { super.close(); } private void free() { if (!ssl.isClosed()) { ssl.close(); Platform.closeGuardClose(guard); } } @Override protected final void finalize() throws Throwable { try { /* * Just worry about our own state. Notably we do not try and * close anything. The SocketImpl, either our own * PlainSocketImpl, or the Socket we are wrapping, will do * that. This might mean we do not properly SSL_shutdown, but * if you want to do that, properly close the socket yourself. * * The reason why we don't try to SSL_shutdown, is that there * can be a race between finalizers where the PlainSocketImpl * finalizer runs first and closes the socket. However, in the * meanwhile, the underlying file descriptor could be reused * for another purpose. If we call SSL_shutdown, the * underlying socket BIOs still have the old file descriptor * and will write the close notify to some unsuspecting * reader. */ if (guard != null) { Platform.closeGuardWarnIfOpen(guard); } if (ssl != null) { synchronized (ssl) { transitionTo(STATE_CLOSED); } } } finally { super.finalize(); } } @Override public final void setApplicationProtocolSelector(ApplicationProtocolSelector selector) { setApplicationProtocolSelector( selector == null ? null : new ApplicationProtocolSelectorAdapter(this, selector)); } @Override final void setApplicationProtocolSelector(ApplicationProtocolSelectorAdapter selector) { sslParameters.setApplicationProtocolSelector(selector); } @Override final void setApplicationProtocols(String[] protocols) { sslParameters.setApplicationProtocols(protocols); } @Override final String[] getApplicationProtocols() { return sslParameters.getApplicationProtocols(); } @Override public final String getApplicationProtocol() { return SSLUtils.toProtocolString(ssl.getApplicationProtocol()); } @Override public final String getHandshakeApplicationProtocol() { synchronized (ssl) { return state >= STATE_HANDSHAKE_STARTED && state < STATE_READY ? getApplicationProtocol() : null; } } @Override public final SSLParameters getSSLParameters() { SSLParameters params = super.getSSLParameters(); Platform.getSSLParameters(params, sslParameters, this); return params; } @Override public final void setSSLParameters(SSLParameters p) { super.setSSLParameters(p); Platform.setSSLParameters(p, sslParameters, this); } @Override public final String chooseServerAlias(X509KeyManager keyManager, String keyType) { return keyManager.chooseServerAlias(keyType, null, this); } @Override public final String chooseClientAlias(X509KeyManager keyManager, X500Principal[] issuers, String[] keyTypes) { return keyManager.chooseClientAlias(keyTypes, issuers, this); } @Override @SuppressWarnings("deprecation") // PSKKeyManager is deprecated, but in our own package public final String chooseServerPSKIdentityHint(PSKKeyManager keyManager) { return keyManager.chooseServerKeyIdentityHint(this); } @Override @SuppressWarnings("deprecation") // PSKKeyManager is deprecated, but in our own package public final String chooseClientPSKIdentity(PSKKeyManager keyManager, String identityHint) { return keyManager.chooseClientKeyIdentity(identityHint, this); } @Override @SuppressWarnings("deprecation") // PSKKeyManager is deprecated, but in our own package public final SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { return keyManager.getKey(identityHint, identity, this); } private ClientSessionContext clientSessionContext() { return sslParameters.getClientSessionContext(); } private AbstractSessionContext sessionContext() { return sslParameters.getSessionContext(); } private void transitionTo(int newState) { switch (newState) { case STATE_CLOSED: { if (!ssl.isClosed() && state >= STATE_HANDSHAKE_STARTED && state < STATE_CLOSED ) { closedSession = new SessionSnapshot(activeSession); } break; } default: { break; } } // Update the state this.state = newState; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy