jdk/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java

Print this page
rev 5679 : 7192392: Better validation of client keys
Summary: Also reviewed by Andrew Gross<Andrew.Gross@Oracle.COM>
Reviewed-by: vinnie

*** 34,44 **** import javax.crypto.spec.*; import javax.net.ssl.*; import sun.security.internal.spec.TlsRsaPremasterSecretParameterSpec; ! import sun.security.util.KeyLength; /** * This is the client key exchange message (CLIENT --> SERVER) used with * all RSA key exchanges; it holds the RSA-encrypted pre-master secret. * --- 34,44 ---- import javax.crypto.spec.*; import javax.net.ssl.*; import sun.security.internal.spec.TlsRsaPremasterSecretParameterSpec; ! import sun.security.util.KeyUtil; /** * This is the client key exchange message (CLIENT --> SERVER) used with * all RSA key exchanges; it holds the RSA-encrypted pre-master secret. *
*** 191,201 **** if (debug != null && Debug.isOn("handshake")) { System.out.println( "unable to get the plaintext of the premaster secret"); } ! int keySize = KeyLength.getKeySize(secretKey); if (keySize > 0 && keySize != 384) { // 384 = 48 * 8 if (debug != null && Debug.isOn("handshake")) { System.out.println( "incorrect length of premaster secret: " + (keySize/8)); --- 191,201 ---- if (debug != null && Debug.isOn("handshake")) { System.out.println( "unable to get the plaintext of the premaster secret"); } ! int keySize = KeyUtil.getKeySize(secretKey); if (keySize > 0 && keySize != 384) { // 384 = 48 * 8 if (debug != null && Debug.isOn("handshake")) { System.out.println( "incorrect length of premaster secret: " + (keySize/8));